wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

VIRTUAL MACHINE

Blog banner

OPERATING SYSTEM

Blog banner

Number Guessing game --lisp

Blog banner

Deadlock

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Proton mail

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

LISP - Library Management System

Blog banner

Open Source Project By Google

Blog banner

Process and Threading

Blog banner

Security Issues and Countermeasures

Blog banner

Penetration Testing

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Define Instagram.

Blog banner

Blog name

Blog banner

Process states

Blog banner

Docker Framework

Blog banner

Culture Of Ladakh

Blog banner

Virtual memory

Blog banner

Security requirements for Safe E-Payments

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Session Vulnerabilities

Blog banner

Cache memory

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

What is Internet

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Mobile Survey

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Modern operating system

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

MYNTRA

Blog banner

Student Grade Calculator in LISP

Blog banner

'Positivity in life'

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Types of E-Commerce

Blog banner

Yoga in INDIA and ABROAD

Blog banner

BharatPe

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Virtual Machine

Blog banner

Dos (Denial of service) Attack

Blog banner