SlideShare une entreprise Scribd logo
1  sur  46
Deadlock
Deadlock ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dealing with Deadlock ,[object Object],[object Object],[object Object],[object Object],[object Object]
Relevant Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ Claim” (Future-Request) Edges
Claim    Request
Request    Assignment
Safe: No Cycle
A Dangerous Request
See Any Cycles?
A System Model ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Example V U T S P = {S,T,U,V} P = {P1,P2} P1(S) = {T,U} P1(U) = {V} … P2(S) = {U} … 1 2 1 2 1 1 2
Resource (Allocation) Graph (RAG) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Invariants on RAG ,[object Object],[object Object],[object Object],[object Object]
State Transitions ,[object Object],[object Object],[object Object]
[object Object],[object Object],State Transitions (con’d)
Reduction on RAG ,[object Object],[object Object]
Theorems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data structures for RAG ,[object Object],[object Object],[object Object],[object Object],[object Object]
Deadlock Detection Algorithm ,[object Object]
Example ,[object Object],[object Object]
Recovery ,[object Object],[object Object],[object Object]
Prevention ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Serialization ,[object Object],[object Object]
One-shot Allocation ,[object Object],[object Object],[object Object]
Hierarchical Allocation ,[object Object],[object Object],[object Object],[object Object]
Proof that deadlock cannot occur ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Properties ,[object Object],[object Object],[object Object],[object Object]
Avoidance ,[object Object],[object Object],[object Object]
Banker's Algorithm ,[object Object],[object Object]
Example
P1: 2    4
P1: complete
P0: 5    10
P0: complete
Example (from text)
P2: 2    3?
P1: 2    4?
P1: complete?
Safe state ,[object Object],[object Object],[object Object],[object Object]
Example ,[object Object],[object Object],[object Object]
Unsafe state ,[object Object],[object Object],[object Object]
Example ,[object Object],[object Object]
Banker’s algorithm ,[object Object],[object Object],deadlock unsafe safe
Implementation method ,[object Object],[object Object],[object Object],[object Object],[object Object]
Example ,[object Object]

Contenu connexe

Tendances

Tendances (20)

DeadLock in Operating-Systems
DeadLock in Operating-SystemsDeadLock in Operating-Systems
DeadLock in Operating-Systems
 
Deadlock Detection in Distributed Systems
Deadlock Detection in Distributed SystemsDeadlock Detection in Distributed Systems
Deadlock Detection in Distributed Systems
 
Dead Lock
Dead LockDead Lock
Dead Lock
 
Deadlock detection & prevention
Deadlock detection & preventionDeadlock detection & prevention
Deadlock detection & prevention
 
Dead Lock In Operating Systems
Dead Lock In Operating SystemsDead Lock In Operating Systems
Dead Lock In Operating Systems
 
Deadlock Slides
Deadlock SlidesDeadlock Slides
Deadlock Slides
 
Deadlock
DeadlockDeadlock
Deadlock
 
Deadlock Avoidance in Operating System
Deadlock Avoidance in Operating SystemDeadlock Avoidance in Operating System
Deadlock Avoidance in Operating System
 
Operating system - Deadlock
Operating system - DeadlockOperating system - Deadlock
Operating system - Deadlock
 
Deadlock in Operating System
Deadlock in Operating SystemDeadlock in Operating System
Deadlock in Operating System
 
Operating System: Deadlock
Operating System: DeadlockOperating System: Deadlock
Operating System: Deadlock
 
Deadlocks
 Deadlocks Deadlocks
Deadlocks
 
Deadlock Avoidance - OS
Deadlock Avoidance - OSDeadlock Avoidance - OS
Deadlock Avoidance - OS
 
Operating system Deadlock
Operating system DeadlockOperating system Deadlock
Operating system Deadlock
 
deadlock handling
deadlock handlingdeadlock handling
deadlock handling
 
Methods for handling deadlocks
Methods for handling deadlocksMethods for handling deadlocks
Methods for handling deadlocks
 
deadlock
deadlockdeadlock
deadlock
 
deadlock detection using Goldman's algorithm by ANIKET CHOUDHURY
deadlock detection using Goldman's algorithm by ANIKET CHOUDHURYdeadlock detection using Goldman's algorithm by ANIKET CHOUDHURY
deadlock detection using Goldman's algorithm by ANIKET CHOUDHURY
 
Deadlock Detection
Deadlock DetectionDeadlock Detection
Deadlock Detection
 
Dead Lock in operating system
Dead Lock in operating systemDead Lock in operating system
Dead Lock in operating system
 

Similaire à Deadlock

Ch8 OS
Ch8 OSCh8 OS
Ch8 OS
C.U
 

Similaire à Deadlock (20)

Ice
IceIce
Ice
 
Methods for handling deadlock
Methods for handling deadlockMethods for handling deadlock
Methods for handling deadlock
 
OS_Ch8
OS_Ch8OS_Ch8
OS_Ch8
 
OSCh8
OSCh8OSCh8
OSCh8
 
Deadlock Detection Algorithm
Deadlock Detection AlgorithmDeadlock Detection Algorithm
Deadlock Detection Algorithm
 
Os unit 4
Os unit 4Os unit 4
Os unit 4
 
Operating System
Operating SystemOperating System
Operating System
 
Ch8 OS
Ch8 OSCh8 OS
Ch8 OS
 
CH07.pdf
CH07.pdfCH07.pdf
CH07.pdf
 
Chapter 5(five).pdf
Chapter 5(five).pdfChapter 5(five).pdf
Chapter 5(five).pdf
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Gp1242 007 oer ppt
Gp1242 007 oer pptGp1242 007 oer ppt
Gp1242 007 oer ppt
 
OSLec14&15(Deadlocksinopratingsystem).pptx
OSLec14&15(Deadlocksinopratingsystem).pptxOSLec14&15(Deadlocksinopratingsystem).pptx
OSLec14&15(Deadlocksinopratingsystem).pptx
 
Sucet os module_3_notes
Sucet os module_3_notesSucet os module_3_notes
Sucet os module_3_notes
 
Module-2Deadlock.ppt
Module-2Deadlock.pptModule-2Deadlock.ppt
Module-2Deadlock.ppt
 
Dead lock
Dead lockDead lock
Dead lock
 
A petri-net
A petri-netA petri-net
A petri-net
 
Bankers
BankersBankers
Bankers
 
Deadlocks
DeadlocksDeadlocks
Deadlocks
 
Deadlock
DeadlockDeadlock
Deadlock
 

Plus de Gaurav Singh Chandel (8)

Building materials
Building materialsBuilding materials
Building materials
 
Material parameter modeling
Material parameter modelingMaterial parameter modeling
Material parameter modeling
 
Honeycomb Carbon Materials
Honeycomb  Carbon MaterialsHoneycomb  Carbon Materials
Honeycomb Carbon Materials
 
Eukariotic Cell Structure
Eukariotic Cell StructureEukariotic Cell Structure
Eukariotic Cell Structure
 
Bacterial Cell
Bacterial CellBacterial Cell
Bacterial Cell
 
conducting polymers
conducting polymersconducting polymers
conducting polymers
 
Photonic Materials
Photonic MaterialsPhotonic Materials
Photonic Materials
 
Nanotechnology Applied To Life Sciences
Nanotechnology Applied To Life SciencesNanotechnology Applied To Life Sciences
Nanotechnology Applied To Life Sciences
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Deadlock