wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation

profile
Shreya Mantry
Sep 09, 2024
0 Likes
0 Discussions
68 Reads
  • WHAT IS STARVATION?

Starvation is a problem where a process runs out of resources in the OS because those resources are being utilized by other processes. That means that a process terminates without completion due lack of resources. Another name for starvation is Lived lock.


  • WHEN DOES STARVATION OCCUR?

Starvation can occur where a process is unable to obtain a necessary resource, such as CPU time, memory, or I/O resources, for an extended period. This typically occurs because other processes or threads are monopolizing the resource, preventing fair access for others. Resource allocation mechanisms within an operating system, like scheduling algorithms, are responsible for managing and preventing starvation.


  • CAUSES OF STARVATION

~ One of the main causes of starvation is an unfair scheduling policy. Some scheduling algorithms, such as the Priority Scheduling algorithm, favor high-priority processes over low-priority ones. If the system is busy with high-priority processes, the low-priority processes might be left waiting indefinitely.

~ Another cause could be resource allocation issues. If a certain process holds a resource that another process needs to continue execution, and it doesn't release it, the waiting process can starve


  • SOLUTION

Starvation can be cured using a technique that is regarded as aging. In aging, priority of process increases with time and thus guarantees that poor processes will equally run in the system. 


  • DIFFERENCE BETWEEN DEADLOCK AND STARVATION

Deadlock is a state where all processes become blocked and the processes are waiting for their resources to be released, whereas in a starvation situation, a process is never given a chance to execute because it is always preempted by a higher-priority process.


Comments ()


Sign in

Read Next

Direct Memory Access

Blog banner

Big Data Architecture

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Pipedrive

Blog banner

10 Reasons to date your best friend

Blog banner

Computer security techniques

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

History of ITIL

Blog banner

Different Types of Data

Blog banner

Security Issues

Blog banner

PHISHING

Blog banner

Memory Hierarchy

Blog banner

FILE SHARING

Blog banner

File management

Blog banner

Memory Management

Blog banner

The IT Service Lifecycle

Blog banner

SQL Injection practice on DVWA

Blog banner

Short note on Microsoft office

Blog banner

Segmentation and paging concept

Blog banner

Memory Management

Blog banner

E-learning in today's world

Blog banner

Data Security must be your Priority!

Blog banner

RAID

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Sessions In OS.

Blog banner

Crypto tax evasion

Blog banner

TRAIN TRAVELING

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Have You Explored India Yet?

Blog banner

What is HTML?

Blog banner

Pink sauce pasta

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Question

Blog banner

INTRODUCTION

Blog banner

Proton mail

Blog banner

Record Blocking

Blog banner

Steganography

Blog banner

Modern Operating System

Blog banner

File management

Blog banner

Memory management

Blog banner