SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Deadlock
Deadlock ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with Deadlock ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ Claim” (Future-Request) Edges
Claim    Request
Request    Assignment
Safe: No Cycle
A Dangerous Request
See Any Cycles?
A System Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example V U T S P = {S,T,U,V} P = {P1,P2} P1(S) = {T,U} P1(U) = {V} … P2(S) = {U} … 1 2 1 2 1 1 2
Resource (Allocation) Graph (RAG) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Invariants on RAG ,[object Object],[object Object],[object Object],[object Object]
State Transitions ,[object Object],[object Object],[object Object]
[object Object],[object Object],State Transitions (con’d)
Reduction on RAG ,[object Object],[object Object]
Theorems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data structures for RAG ,[object Object],[object Object],[object Object],[object Object],[object Object]
Deadlock Detection Algorithm ,[object Object]
Example ,[object Object],[object Object]
Recovery ,[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Serialization ,[object Object],[object Object]
One-shot Allocation ,[object Object],[object Object],[object Object]
Hierarchical Allocation ,[object Object],[object Object],[object Object],[object Object]
Proof that deadlock cannot occur ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Properties ,[object Object],[object Object],[object Object],[object Object]
Avoidance ,[object Object],[object Object],[object Object]
Banker's Algorithm ,[object Object],[object Object]
Example
P1: 2    4
P1: complete
P0: 5    10
P0: complete
Example (from text)
P2: 2    3?
P1: 2    4?
P1: complete?
Safe state ,[object Object],[object Object],[object Object],[object Object]
Example ,[object Object],[object Object],[object Object]
Unsafe state ,[object Object],[object Object],[object Object]
Example ,[object Object],[object Object]
Banker’s algorithm ,[object Object],[object Object],deadlock unsafe safe
Implementation method ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

deadlock avoidance
deadlock avoidancedeadlock avoidance
deadlock avoidance
wahab13
 
Deadlock avoidance (Safe State, Resource Allocation Graph Algorithm)
Deadlock avoidance (Safe State, Resource Allocation Graph Algorithm)Deadlock avoidance (Safe State, Resource Allocation Graph Algorithm)
Deadlock avoidance (Safe State, Resource Allocation Graph Algorithm)
Shayek Parvez
 
Operating System Deadlock Galvin
Operating System  Deadlock GalvinOperating System  Deadlock Galvin
Operating System Deadlock Galvin
Sonali Chauhan
 

Was ist angesagt? (20)

BANKER'S ALGORITHM
BANKER'S ALGORITHMBANKER'S ALGORITHM
BANKER'S ALGORITHM
 
deadlock avoidance
deadlock avoidancedeadlock avoidance
deadlock avoidance
 
Operating System: Deadlock
Operating System: DeadlockOperating System: Deadlock
Operating System: Deadlock
 
Multithreading
MultithreadingMultithreading
Multithreading
 
Methods for handling deadlock
Methods for handling deadlockMethods for handling deadlock
Methods for handling deadlock
 
Deadlock
DeadlockDeadlock
Deadlock
 
Deadlock detection and recovery by saad symbian
Deadlock detection and recovery by saad symbianDeadlock detection and recovery by saad symbian
Deadlock detection and recovery by saad symbian
 
Semaphores
SemaphoresSemaphores
Semaphores
 
Operating system critical section
Operating system   critical sectionOperating system   critical section
Operating system critical section
 
Operating Systems - "Chapter 5 Process Synchronization"
Operating Systems - "Chapter 5 Process Synchronization"Operating Systems - "Chapter 5 Process Synchronization"
Operating Systems - "Chapter 5 Process Synchronization"
 
Deadlock- Operating System
Deadlock- Operating SystemDeadlock- Operating System
Deadlock- Operating System
 
Deadlock avoidance (Safe State, Resource Allocation Graph Algorithm)
Deadlock avoidance (Safe State, Resource Allocation Graph Algorithm)Deadlock avoidance (Safe State, Resource Allocation Graph Algorithm)
Deadlock avoidance (Safe State, Resource Allocation Graph Algorithm)
 
Deadlock
DeadlockDeadlock
Deadlock
 
Process synchronization
Process synchronizationProcess synchronization
Process synchronization
 
Operating System Deadlock Galvin
Operating System  Deadlock GalvinOperating System  Deadlock Galvin
Operating System Deadlock Galvin
 
process creation OS
process creation OSprocess creation OS
process creation OS
 
Deadlock
DeadlockDeadlock
Deadlock
 
Critical Section in Operating System
Critical Section in Operating SystemCritical Section in Operating System
Critical Section in Operating System
 
Deadlock
DeadlockDeadlock
Deadlock
 
Introduction to System Calls
Introduction to System CallsIntroduction to System Calls
Introduction to System Calls
 

Ähnlich wie Deadlock

Ch8 OS
Ch8 OSCh8 OS
Ch8 OS
C.U
 

Ähnlich wie Deadlock (20)

Ice
IceIce
Ice
 
OS_Ch8
OS_Ch8OS_Ch8
OS_Ch8
 
OSCh8
OSCh8OSCh8
OSCh8
 
Chapter 7 - Deadlocks
Chapter 7 - DeadlocksChapter 7 - Deadlocks
Chapter 7 - Deadlocks
 
Deadlock Detection Algorithm
Deadlock Detection AlgorithmDeadlock Detection Algorithm
Deadlock Detection Algorithm
 
Os unit 4
Os unit 4Os unit 4
Os unit 4
 
Operating System
Operating SystemOperating System
Operating System
 
Ch8 OS
Ch8 OSCh8 OS
Ch8 OS
 
CH07.pdf
CH07.pdfCH07.pdf
CH07.pdf
 
Chapter 5(five).pdf
Chapter 5(five).pdfChapter 5(five).pdf
Chapter 5(five).pdf
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Gp1242 007 oer ppt
Gp1242 007 oer pptGp1242 007 oer ppt
Gp1242 007 oer ppt
 
Methods for handling deadlocks
Methods for handling deadlocksMethods for handling deadlocks
Methods for handling deadlocks
 
OSLec14&15(Deadlocksinopratingsystem).pptx
OSLec14&15(Deadlocksinopratingsystem).pptxOSLec14&15(Deadlocksinopratingsystem).pptx
OSLec14&15(Deadlocksinopratingsystem).pptx
 
Sucet os module_3_notes
Sucet os module_3_notesSucet os module_3_notes
Sucet os module_3_notes
 
Module-2Deadlock.ppt
Module-2Deadlock.pptModule-2Deadlock.ppt
Module-2Deadlock.ppt
 
Dead lock
Dead lockDead lock
Dead lock
 
A petri-net
A petri-netA petri-net
A petri-net
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Deadlock
DeadlockDeadlock
Deadlock
 

Mehr von Gaurav Singh Chandel (8)

Building materials
Building materialsBuilding materials
Building materials
 
Material parameter modeling
Material parameter modelingMaterial parameter modeling
Material parameter modeling
 
Honeycomb Carbon Materials
Honeycomb  Carbon MaterialsHoneycomb  Carbon Materials
Honeycomb Carbon Materials
 
Eukariotic Cell Structure
Eukariotic Cell StructureEukariotic Cell Structure
Eukariotic Cell Structure
 
Bacterial Cell
Bacterial CellBacterial Cell
Bacterial Cell
 
conducting polymers
conducting polymersconducting polymers
conducting polymers
 
Photonic Materials
Photonic MaterialsPhotonic Materials
Photonic Materials
 
Nanotechnology Applied To Life Sciences
Nanotechnology Applied To Life SciencesNanotechnology Applied To Life Sciences
Nanotechnology Applied To Life Sciences
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Deadlock