wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Niraj Parulekar
Aug 13, 2024
0 Likes
0 Discussions
94 Reads

1] Deadlock :
                       Deadlock is a situation where a set of processes becomes stuck, each waiting for a resource that the other  processes in the set are holding. This results in a cycle of dependencies where no process can proceed, leading to a complete halt in the system. Deadlock typically occurs under four conditions, known as        Coffman’s conditions:

1. Mutual Exclusion: At least one resource must be held in a non-shareable mode, meaning that only one                                               process can use the resource at a time.

2. Hold and Wait: A process holding at least one resource is waiting to acquire additional resources that are                                         currently being held by other processes.

3. No Preemption: A resource can be released only voluntarily by the process holding it after that process has                                      completed its task.

4. Circular Wait: There must be a circular chain of processes, where each process holds at least one resource                                 that the next process in the chain needs.

--Deadlock prevention, avoidance, detection, and recovery are the primary strategies used to handle deadlocks.

  Prevention involves breaking one of Coffman’s conditions, whereas avoidance uses algorithms like the Banker’s    Algorithm to ensure that the system remains in a safe state. Detection algorithms can identify deadlock when it      occurs, and recovery techniques involve terminating or rolling back processes to break the deadlock.

2] Starvation :
                    Starvation, on the other hand, occurs when a process is perpetually denied the resources it needs to proceed. Unlike deadlock, where processes are waiting on each other in a cycle, starvation involves one or more processes being overlooked in favor of others. This often happens in scheduling algorithms that prioritize certain processes, causing lower-priority processes to wait indefinitely.

For example, in a priority-based scheduling system, a low-priority process might never get CPU time if higher-priority processes continuously arrive. Starvation is particularly problematic in systems where fairness and equitable resource allocation are critical.

To mitigate starvation, algorithms such as aging are used, where the priority of a process increases the longer it waits, eventually ensuring that it will receive the necessary resources.


Comments ()


Sign in

Read Next

Process, process creation and process termination

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Esri India launches Policy Maps.

Blog banner

Virtual Memory

Blog banner

Zomato (Income Sources)

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Deadlock

Blog banner

E-Governance

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Virtual memory

Blog banner

GraphQL

Blog banner

How to tie a Tie

Blog banner

Predicting Student Performance with Data Science

Blog banner

Zero-Day Attack

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

What is Influencer Marketing and its Trends

Blog banner

A Short History of GIS

Blog banner

LISP - Library Management System

Blog banner

Is Your Password Complex Enough?

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

THE DESIRE OF MANY

Blog banner

Firewall

Blog banner

Consumer to consumer Business model

Blog banner

Teenagers of Today

Blog banner

Deadlock in operating system

Blog banner

Benefits and drawback of web security.

Blog banner

Environmental Management using GIS

Blog banner

File management

Blog banner

Famous Indian dishes that where misunderstood to be Indian

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Virtual memory

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

The Right way of cooking

Blog banner

Twisted world

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Life

Blog banner

10 Signs your Computer has Virus

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Types of Big Data

Blog banner