wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation and Deadlock.

profile
Naitik Poriya undefined
Jul 05, 2024
0 Likes
0 Discussions
38 Reads

System performance and stability may be affected by starvation and deadlock, which are two critical concerns in operating systems.

 

Starvation occurs when a process is continually refused the resources it needs to execute. Resource allocation policies often lead to this situation where some processes are favored over others. For example, low-priority processes may starve if high-priority processes perpetually demand and receive resources in a priority-based scheduling algorithm. This may result in resource utilization that is unfair and inefficient.

 

Conversely, deadlock is the state of affairs whereby two or more processes are unable to proceed with their execution since they are each waiting for a resource held by another process from the same set. This results into circular dependency: Process A waits for a resource that Process B holds while at the same time Process B waits for a resource that Process A holds. Deadlock can destroy an entire system as it could make processes hang indefinitely if not properly managed.

 

There are various strategies that can be employed to mitigate both starvation and deadlock:

 

Starvation: Fairness policies should be established so as to guarantee all the processes equal opportunities to access resources. In this regard, techniques such as aging can increase priority of processes that have been waiting for long thus reducing chances of starvation.


Comments ()


Sign in

Read Next

INTRANET

Blog banner

Mumbai Metro 3

Blog banner

File management

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Deadlock and Starvation

Blog banner

Uniprocessor Scheduling

Blog banner

What is thread and alse multithreading

Blog banner

Linux 94

Blog banner

Deadlock and Starvation

Blog banner

Buffer Overflow

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Music

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Article on Fresh Book

Blog banner

THE ACTORS LIFE

Blog banner

Cache memory

Blog banner

How return on investment is defined in IT services

Blog banner

Blog name

Blog banner

clock

Blog banner

Virtual memory

Blog banner

Go Daddy

Blog banner

Getting into anime My anime suggestions

Blog banner

How to Conquer Depression ?

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

MAILFENCE

Blog banner

Buffering

Blog banner

Processes: Process Description and Control.

Blog banner

Benefits and drawback of web security.

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Session Hijacking Techniques

Blog banner

What is Influencer Marketing and its Trends

Blog banner

SQL Injection

Blog banner

Virtual memory

Blog banner

10 Reasons to date your best friend

Blog banner

A True Friendship

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Study of Backdoor and Trojan tools

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Deadlock in Operating System

Blog banner