wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation and Deadlock.

profile
Naitik Poriya undefined
Jul 05, 2024
0 Likes
0 Discussions
38 Reads

System performance and stability may be affected by starvation and deadlock, which are two critical concerns in operating systems.

 

Starvation occurs when a process is continually refused the resources it needs to execute. Resource allocation policies often lead to this situation where some processes are favored over others. For example, low-priority processes may starve if high-priority processes perpetually demand and receive resources in a priority-based scheduling algorithm. This may result in resource utilization that is unfair and inefficient.

 

Conversely, deadlock is the state of affairs whereby two or more processes are unable to proceed with their execution since they are each waiting for a resource held by another process from the same set. This results into circular dependency: Process A waits for a resource that Process B holds while at the same time Process B waits for a resource that Process A holds. Deadlock can destroy an entire system as it could make processes hang indefinitely if not properly managed.

 

There are various strategies that can be employed to mitigate both starvation and deadlock:

 

Starvation: Fairness policies should be established so as to guarantee all the processes equal opportunities to access resources. In this regard, techniques such as aging can increase priority of processes that have been waiting for long thus reducing chances of starvation.


Comments ()


Sign in

Read Next

Top 4 Places To Stay In Copenhagen

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

Evolution of operating systems

Blog banner

Loneliness

Blog banner

Virtual Machine

Blog banner

Ransomware

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Article on Zoho Corporation

Blog banner

Mutual exclusion

Blog banner

Key to success in Sports

Blog banner

Animal’s have my heart

Blog banner

THE ACTORS LIFE

Blog banner

Email Privacy

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Data Security must be your Priority!

Blog banner

SQL Injection practice on DVWA

Blog banner

Linux Threads:

Blog banner

Modern operating system

Blog banner

Memory management

Blog banner

Pipedrive

Blog banner

MODERN OPERATING SYSTEM

Blog banner

An Overivew Of Cache Memory

Blog banner

Hey Aryan here

Blog banner

Virtual machine.

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Risk management in IT

Blog banner

Deadlock and Starvation

Blog banner

Types Of Interrupt

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

LIMITED EDITION

Blog banner

File Management system

Blog banner

DBMS and various career options related to it.

Blog banner

Multicore and multithreading 171

Blog banner

Cyber Laws In India and Around the World

Blog banner

What is Minting & Mining

Blog banner

Characteristics of Etherum

Blog banner

Direct Memory Access

Blog banner

How Cyber Forensics use in AI

Blog banner

Spotify

Blog banner

Data Science in Mental Health Prediction

Blog banner