wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and starvation

profile
Jwala the Beast
Aug 15, 2024
0 Likes
0 Discussions
37 Reads

Deadlock and starvation are two key issues in concurrent computing systems, particularly in operating systems and database management.


**Deadlock** occurs when a set of processes become stuck in a state where each process is waiting for a resource that is held by another process in the set. This creates a cycle of dependencies with no process able to proceed. For example, if Process A holds Resource 1 and is waiting for Resource 2 (held by Process B), while Process B is waiting for Resource 1, neither process can continue, resulting in a deadlock.


**Starvation**, on the other hand, happens when a process is perpetually denied necessary resources to proceed because other processes are continuously being given those resources. This usually occurs due to improper resource allocation policies or scheduling algorithms. For instance, if a high-priority process keeps preempting resources from a lower-priority process, the lower-priority process may never get the resources it needs to complete its task.


Both issues need to be managed through effective resource management strategies, such as deadlock detection and recovery mechanisms, and fair scheduling policies to ensure that all processes get a chance to execute.


Comments ()


Sign in

Read Next

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

Optimization of operating system design

Blog banner

What is thread and multithreading ?

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

OS Assignment 3

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Memory input output management

Blog banner

File management In Operating System

Blog banner

MPL and how its effects?

Blog banner

Quality check in IT services

Blog banner

Logical and physical address

Blog banner

Security Issues and Countermeasures

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Uniprocessor Scheduling

Blog banner

USPS mail

Blog banner

HR Automation : Need of the hour

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Virtual memory

Blog banner

I/O buffer and its techniques

Blog banner

Odoo

Blog banner

Social media

Blog banner

Lucidchart

Blog banner

Cyber Security Standards

Blog banner

Technological Advancement

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Education?

Blog banner

Europe Through My Lens

Blog banner

MENDELEY

Blog banner

MUTUAL EXCLUSION

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Privacy in Social Media and Online Services

Blog banner

Having passion in life

Blog banner

Consumer to consumer Business model

Blog banner

Memory management

Blog banner

Microsoft Windows Overview

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Virtual machine and virtualizing

Blog banner

What your Favorite colour says about You?

Blog banner

What is Amazon?

Blog banner

What is metaverse?

Blog banner