wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation

profile
Omkar Bhube
Aug 15, 2024
0 Likes
0 Discussions
72 Reads

Starvation in operating systems (OS) occurs when a process is perpetually denied the necessary resources to proceed with its execution. This usually happens when a scheduling algorithm continuously favors other processes, leading to the affected process being delayed indefinitely. Starvation is often associated with priority-based scheduling, where lower-priority processes may never get CPU time because higher-priority processes keep taking precedence. To mitigate starvation, techniques like *aging* can be employed, where the priority of a waiting process is gradually increased over time to ensure it eventually gets the necessary resources.


Causes of Starvation:

Priority Scheduling: In priority-based systems, higher-priority processes can continuously preempt lower-priority ones, leading to the lower-priority processes never getting scheduled.Resource Contention: When multiple processes are competing for limited resources, a process might be continuously bypassed in favor of others, especially if the resource allocation is biased.Non-preemptive Scheduling: In systems where a process cannot be preempted once it starts, longer processes can monopolize the CPU, causing others to starve.


Solutions:

Aging: This is a common solution where the priority of a waiting process is gradually increased the longer it waits, ensuring that it will eventually be executed.Fair Scheduling

Algorithms: Some algorithms, like Round-Robin or Multilevel Queue Scheduling with time-sharing, are designed to minimize the chances of starvation by ensuring that all processes get some CPU time.Resource Allocation Policies: Implementing fair resource allocation policies can help in reducing contention and ensuring that all processes receive the resources they need in a timely manner.


Comments ()


Sign in

Read Next

Multiple processor scheduling

Blog banner

Cross site scripting Attack

Blog banner

Save Environment

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Modern Operating System

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Memory Management in an Operating System

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

INSTAGRAM

Blog banner

USPS mail

Blog banner

Understanding the 'Ambiverts'

Blog banner

History of ITIL

Blog banner

Deadlock in operating system

Blog banner

I/O Management and Disk Scheduling

Blog banner

Cache memory

Blog banner

Memory heirchy

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Telegram and it's features

Blog banner

SPAM

Blog banner

PHISHING

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Social Media Marketing Trends 2022

Blog banner

Network Security Risks

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Paid Email

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Place to visit in pune

Blog banner

clock

Blog banner

Have You Explored India Yet?

Blog banner

Way to make your meal healthier.

Blog banner

Best password managers: Reviews of the top products

Blog banner

Password Generator - Lisp

Blog banner

Visualization in Data Science

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Developments in Modern Operating Systems

Blog banner

How I use google in my daily life

Blog banner

Memory input output management

Blog banner

Photorec - media recovery tool

Blog banner

An Overivew Of Cache Memory

Blog banner

IT RISK

Blog banner