wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Niraj Parulekar
Aug 13, 2024
0 Likes
0 Discussions
93 Reads

1] Deadlock :
                       Deadlock is a situation where a set of processes becomes stuck, each waiting for a resource that the other  processes in the set are holding. This results in a cycle of dependencies where no process can proceed, leading to a complete halt in the system. Deadlock typically occurs under four conditions, known as        Coffman’s conditions:

1. Mutual Exclusion: At least one resource must be held in a non-shareable mode, meaning that only one                                               process can use the resource at a time.

2. Hold and Wait: A process holding at least one resource is waiting to acquire additional resources that are                                         currently being held by other processes.

3. No Preemption: A resource can be released only voluntarily by the process holding it after that process has                                      completed its task.

4. Circular Wait: There must be a circular chain of processes, where each process holds at least one resource                                 that the next process in the chain needs.

--Deadlock prevention, avoidance, detection, and recovery are the primary strategies used to handle deadlocks.

  Prevention involves breaking one of Coffman’s conditions, whereas avoidance uses algorithms like the Banker’s    Algorithm to ensure that the system remains in a safe state. Detection algorithms can identify deadlock when it      occurs, and recovery techniques involve terminating or rolling back processes to break the deadlock.

2] Starvation :
                    Starvation, on the other hand, occurs when a process is perpetually denied the resources it needs to proceed. Unlike deadlock, where processes are waiting on each other in a cycle, starvation involves one or more processes being overlooked in favor of others. This often happens in scheduling algorithms that prioritize certain processes, causing lower-priority processes to wait indefinitely.

For example, in a priority-based scheduling system, a low-priority process might never get CPU time if higher-priority processes continuously arrive. Starvation is particularly problematic in systems where fairness and equitable resource allocation are critical.

To mitigate starvation, algorithms such as aging are used, where the priority of a process increases the longer it waits, eventually ensuring that it will receive the necessary resources.


Comments ()


Sign in

Read Next

PHONE TECHNOLOGY

Blog banner

Operation system

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Artificial Intelligence (AI)

Blog banner

What is OS Fingerprinting?

Blog banner

Mumbai Metro 3

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

"Games and the future"

Blog banner

Big Data Architecture

Blog banner

Mobile Security

Blog banner

SQL Injection Techniques

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Measuring IT Risk

Blog banner

BrainGate Technology

Blog banner

AI and cyber Security

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Ethical Hacking

Blog banner

File management

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Deadlock

Blog banner

DIGITAL ECONOMY

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Music

Blog banner

Rain bow

Blog banner

Virtual Machine

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Operating Systems Overview

Blog banner

Social Engineering

Blog banner

ADIDAS

Blog banner

Ubiquitous Computing

Blog banner

Short note on Microsoft office

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

EFT

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Evolution of Operating Sytems

Blog banner