wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation

profile
Shreya Mantry
Sep 09, 2024
0 Likes
0 Discussions
68 Reads
  • WHAT IS STARVATION?

Starvation is a problem where a process runs out of resources in the OS because those resources are being utilized by other processes. That means that a process terminates without completion due lack of resources. Another name for starvation is Lived lock.


  • WHEN DOES STARVATION OCCUR?

Starvation can occur where a process is unable to obtain a necessary resource, such as CPU time, memory, or I/O resources, for an extended period. This typically occurs because other processes or threads are monopolizing the resource, preventing fair access for others. Resource allocation mechanisms within an operating system, like scheduling algorithms, are responsible for managing and preventing starvation.


  • CAUSES OF STARVATION

~ One of the main causes of starvation is an unfair scheduling policy. Some scheduling algorithms, such as the Priority Scheduling algorithm, favor high-priority processes over low-priority ones. If the system is busy with high-priority processes, the low-priority processes might be left waiting indefinitely.

~ Another cause could be resource allocation issues. If a certain process holds a resource that another process needs to continue execution, and it doesn't release it, the waiting process can starve


  • SOLUTION

Starvation can be cured using a technique that is regarded as aging. In aging, priority of process increases with time and thus guarantees that poor processes will equally run in the system. 


  • DIFFERENCE BETWEEN DEADLOCK AND STARVATION

Deadlock is a state where all processes become blocked and the processes are waiting for their resources to be released, whereas in a starvation situation, a process is never given a chance to execute because it is always preempted by a higher-priority process.


Comments ()


Sign in

Read Next

Latest Email Marketing Techniques

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

This too shall pass

Blog banner

M commerce

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Password Generator - Lisp

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Memory management

Blog banner

Online Games

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Social Media Sentiment Analysis

Blog banner

NIKE

Blog banner

Basic Security For SOAP Services

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

K-means use cases

Blog banner

Spyware

Blog banner

TRIGGERS IN DATABASE

Blog banner

Service Strategy In ITSM

Blog banner

Ethical Hacking

Blog banner

Virtual Machine's

Blog banner

Dudhasagar waterfall ?

Blog banner

security requirements for safe e-payment

Blog banner

Race Condition

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Linux VServer Architecture

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Disk Management

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

How to insert contacts in zoho crm using php

Blog banner

10 Interesting Facts about Death Note

Blog banner

Windows Operating System

Blog banner

What is Network Security?

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

KASHMIR TRIPS

Blog banner

Interrupts in OS

Blog banner

Proton mail

Blog banner

PERSONAL STORIES

Blog banner

Trends that began during the pandemic

Blog banner