wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock

profile
Jeet Ved
Aug 15, 2024
0 Likes
0 Discussions
67 Reads

Concurrency in operating systems involves multiple processes or threads executing simultaneously, which can lead to complex interactions. Two common problems that arise in this context are deadlock and starvation. Here’s an overview of both:


1. *Deadlock*


A deadlock occurs when a set of processes or threads become stuck in a situation where each one is waiting for a resource that the others in the set are holding. Since none of them can proceed, they remain in this waiting state indefinitely. Four conditions are necessary for a deadlock to occur:


- *Mutual Exclusion:* At least one resource must be held in a non-sharable mode; only one process can use the resource at any given time.


- *Hold and Wait:* A process holding at least one resource is waiting to acquire additional resources that are currently being held by other processes.


- *No Preemption:* Resources cannot be forcibly taken away from a process; they must be released voluntarily.


- *Circular Wait:* A closed chain of processes exists, where each process holds a resource that the next process in the chain is waiting for.


*Example:* Consider two processes, P1 and P2. P1 holds Resource A and is waiting for Resource B, while P2 holds Resource B and is waiting for Resource A. Neither process can proceed, leading to a deadlock.


 *Deadlock Prevention and Avoidance*


- *Deadlock Prevention:* Modify one of the necessary conditions to ensure that a deadlock cannot occur (e.g., imposing a strict order on resource allocation to prevent circular wait).


- *Deadlock Avoidance:* Use algorithms (e.g., Banker's algorithm) to allocate resources in a way that ensures the system remains in a safe state.


 2. *Starvation*


Starvation, also known as indefinite blocking, occurs when a process is perpetually denied necessary resources because other processes keep gaining access to them first. Unlike deadlock, where processes stop making progress due to being stuck in a cycle, starvation involves one or more processes making no progress because they are continually bypassed.


*Example:* Consider a scheduling system where high-priority processes keep getting resources, and a low-priority process is continually skipped over, leading to starvation.


 *Solutions to Starvation*


- *Aging:* Gradually increase the priority of a waiting process over time to ensure it eventually gets the resources it needs.


- *Fair Scheduling Algorithms:* Use algorithms like round-robin or fair share that ensure all processes eventually receive attention.






Name:Jeet Ved


SAP ID:53003230116


DIV:B


Comments ()


Sign in

Read Next

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

File System

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

What is metaverse?

Blog banner

Memory management

Blog banner

E-security systems | CCTV

Blog banner

Socket Programming in Java

Blog banner

Linux Memory Management

Blog banner

Danger assessment in GIS

Blog banner

Sweet Mango Murabba

Blog banner

Record Blocking

Blog banner

Hosting basics

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Service Operations in ITSM

Blog banner

GIS info about Bermuda Triangle

Blog banner

Elements and Principles of Photography

Blog banner

Yahoo! mail

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Monday. com App

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

Photorec - media recovery tool

Blog banner

Password Generator - Lisp

Blog banner

GIS Mapping

Blog banner

The Memory Hierarchy

Blog banner

Modern operating system

Blog banner

What is Spyware? and examples of them.

Blog banner

Why Data Security Is Important

Blog banner

Memory Management

Blog banner

Operating Systems

Blog banner

Memory management

Blog banner

KASHMIR TRIPS

Blog banner

Ethical Hacking

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Functions of operating system

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Memory management

Blog banner

PYTHON

Blog banner

USES OF WHATSAPP

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Memory Management Techniques

Blog banner