wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Suren Kotian
Aug 13, 2024
0 Likes
0 Discussions
155 Reads

Deadlock

Definition
A deadlock is a situation in which the operating system has a set of processes that are permanently blocked. Each process in the set is waiting for a resource that is held by another process in the set.
This circular wait completes a cycle, making each process unable to proceed.


Conditions for Deadlock
Deadlock can occur only if all the following four conditions hold simultaneously:

Mutual Exclusion: At least one resource has to be held in a non-shareable mode.

Hold and Wait: There has to be a process holding at least one resource, waiting to get additional resources from other processes.
No Preemption: Resources cannot be taken forcefully from the processes having those resources; these have to be released voluntarily.

Circular wait: That is, a set of processes must exist such that every process is waiting for a resource that the next process in the set possesses. In effect, they are all waiting for each other, forming a circle.


Prevention and Avoidance
Prevention: Design resource allocation policy of the system such that at least one of the above necessary conditions cannot occur.
For example, require that all resources a process will need be requested at once.
Avoidance: Run-time resource-allocation state is dynamically analyzed to ensure that a circular wait condition can never occur. Banker algorithm is an example of a dead lock avoidance algorithm.

 

Starvation

Definition
Starvation, also known as indefinite blocking, is a situation where a process is indefinitely deprived of the resources necessary for its execution to proceed. This usually happens due to improper resource allocation policies.

Causes
Priority Scheduling: In priority scheduling-based systems, the low priority processes starve if high-priority processes are continuously given the system's resource.

Resource Allocation: If the resources are always granted to certain processes, other processes never get the resources they require to execute.

 
Prevention
Aging: Gradually increase the priority of the waiting process in the queue for the resource. This ensures that even the low priority processes eventually do get the required resources.

Fair Share Scheduling: Resources must be allocated fairly between the processes. It can be implemented using a round-robin scheduling mechanism or other algorithms that ensure that each process gets a fair slice of resource time.

 
Conclusion
Thus, deadlock and starvation are the two major issues of operating systems that bring inefficiency into them and might eventually lead to the collapse of a system.
While it is related in some respect, deadlock implies that execution of the processes has completely come to a halt because of contention for resources; on the other hand, starvation means the processes are indefinitely delayed. Resource management policies and algorithms turn out to be essential in preventing this problem in order to enable the smooth running and efficiency of a system.


Comments ()


Sign in

Read Next

Blockchain in IoT Applications

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Mumbaicha Dabbawalla

Blog banner

Consumer to consumer business mode

Blog banner

Process states

Blog banner

Health is Wealth

Blog banner

Blog on health and fitness

Blog banner

Multiprocessor and scheduling

Blog banner

Developments in Modern Operating Systems

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

Pink sauce pasta

Blog banner

Data Security must be your Priority!

Blog banner

Dangers of Using Public WiFis

Blog banner

Memory management

Blog banner

SESSION HIJACKING

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Cloud Security: Trends and Innovations

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Incident management in ITSM

Blog banner

Game via listing method

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

What is Segmentation?

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Importance of self defence for girls

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

Data carving - using hex editor

Blog banner

Memory Management

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Malware

Blog banner

Inventory management software system

Blog banner

File system

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

Texting is actually better than talking in person

Blog banner

Animal’s have my heart

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Virtual memory

Blog banner

What is Data, Information and Knowledge?

Blog banner

Uber

Blog banner