skip to main content
article

Defining deadlock

Published:01 January 2003Publication History
Skip Abstract Section

Abstract

Deadlock has been widely studied in many fields of computer science, notably in communications, database, and operating systems. Perhaps because (at least one state called) deadlock is tractable, there exists extensive literature on the subject. Deadlock was apparently decisively defined over thirty years ago, with its characteristics and handlers. Yet, much of the literature remains inconsistent in its treatment of this anomaly.A more precise definition is clearly needed to distinguish between the different states that are termed deadlock. A classification of dead states is required to distinguish the causes and appropriate handlers for each. We introduce a model to structure our research.

References

  1. M. Andrews, B. Awerbuch, A. Fernandez, T. Leighto, Z. Liu, and J. Kleinberg, "Universal-stability Results and Performance Bounds for Greedy Contention-resolution Protocols," Journal of the ACM, vol. 48, no. 1, pp. 39--69, Jan. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Bernstein, and N. Goodman, "Concurrency Control in Distributed Database Systems," ACM Computer Surveys, vol. 13, no. 2, pp. 185--211, June 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. G. Coffman, E. G., M. J. Elphick, and A. Shoshani, "System Deadlocks," ACM Computing Surveys, vol. 3, no. 2, pp. 67--78, June 1971. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. G. Coffman and P. J. Denning, Operating Systems Theory, Prentice Hall, Englewood Cliffs, NJ, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. S. Davis and T. M. Rajkumar, Operating Systems, A Systematic View, 5 th ed., Addison-Wesley, Reading, Mass., p. 123, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. W. Dijkstra, "Cooperating Sequential Processes," Programming Languages, Academic Press, London, 1965.Google ScholarGoogle Scholar
  7. L. Dowdy and C. Lowery, P. S. to Operating Systems, Prentice Hall, Englewood Cliffs, NJ. 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Floyd and K. Fall, "Promoting the Use of End-to-end Congestion Control in the Internet," IEEE/ACM Transactions on Networks, vol. 7, no. 4, pp. 458--472. Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. I. M. Flynn and A. M. McHoes, Understanding Operating Systems, Brooks/Cole, Australia, pp. 109--110, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. C. Holt, "Some Deadlock Properties of Computer Systems," ACM Computing Surveys, vol. 4, no. 3, pp. 179--196, Sept. 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Horner, Operating Systems, Concept and Applications, Scott, Foresman and Co. Glenville, III., pp. 160, 105, 182, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. S. Lai, "Protocol Traps in Computer Networks- a Catalog. IEEE Transactions on Communications," Com-30, no. 6, pp. 1434--1448, June 1982.Google ScholarGoogle ScholarCross RefCross Ref
  13. G. N. Levine, "The Control of Starvation," International Journal of General Systems, vol. 15, pp. 113--127, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  14. G. N. Levine, "A Model for Software Reuse," Proceedings of the 5th Workshop of Specification of Behavior Semantics, OOPSLA '96, pp. 71--87, Oct. 1996.Google ScholarGoogle Scholar
  15. J. C. Mogul and K. K. Ramakrishnan, "Eliminating Receive Livelock in an Interrupt-driven Kernel," ACM Trans. on Computer Systems, vol. 15, no. 3, pp. 217--252, Aug. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Nutt, Operating Systems, a Modern Perspective, 2nd edition, Addison-Wesley, Reading, Mass., pp. 150, 279, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. R. Pinkert and L. L. Weat, Operating Systems, Prentice Hall, Englewood Cliffs, NJ, p. 48, 1989.Google ScholarGoogle Scholar
  18. P. J. Plauger, "On Being Fast Enough," Embedded Systems Prog., vol. 4, no. l, pp. 81--92, Jan. 1991.Google ScholarGoogle Scholar
  19. D. J. Rosenkrantz, R. E., Stearns, and P. M. Lewis, "System Level Concurrency Control for Distributed Database Systems," ACM Trans. on Database Systems, vol. 3, no. 2, pp. 178--198, June 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Silberschatz, P. B. Galvin, and G. Gagne, Operating Systems Concepts, 6th edition, Addison-Wesley, Reading, Mass., pp. 204, 243, 244, 266, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. W. Stallings, Operating Systems, Internals and Design Principles, 3rd edition, Prentice Hall, Englewood Hills, NJ, pp. 254, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Tanenbaum, Computer Networks, 4th edition, Prentice Hall, Upper Saddler River, NJ. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Tanenbaum, Modern Operating Systems, 2nd edition, Prentice Hall, Upper Saddle River, NJ, p. 185, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Tanenbaum, Operating Systems, Design and Implementation, 2nd edition, Prentice Hall, Upper Saddle River, NJ, pp. 67--69, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Y. C. Tay and W. T. Loke, "On Deadlocks of Exclusive AND-requests for Resources," Distributed Computing, Springer-Verlag, #9, pp. 77--94, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. Tsichritzis, and F. Lochovsky, Data Base Management Systems, Academic Press, London, p. 260, 1977.Google ScholarGoogle Scholar
  27. R. Turner, Operating Systems Design and Implementations, Macmillan Pub. Co., London, p. 140, 1986.Google ScholarGoogle Scholar
  28. R. J. Van Glabbeek, "Notes on the Methodology of CCS and CSP," Theoretical Computer Science, pp. 329--349, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. H. Wu, W. Chin, and J. Jaffar, "An Efficient Distributed Deadlock Avoidance Algorithm for the AND Model," IEEE Trans. on Software Engineering, vol. 28, no. 1, pp. 18--29, Jan. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGOPS Operating Systems Review
    ACM SIGOPS Operating Systems Review  Volume 37, Issue 1
    January 2003
    60 pages
    ISSN:0163-5980
    DOI:10.1145/881775
    Issue’s Table of Contents

    Copyright © 2003 Author

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 1 January 2003

    Check for updates

    Qualifiers

    • article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader