wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Khush Bagaria
Aug 15, 2024
0 Likes
0 Discussions
119 Reads

1. Deadlock

 

Deadlock in an operating system occurs when a set of processes become stuck because each process is waiting for a resource that another process holds, and none of the processes can proceed. This situation usually arises in multi-process systems where processes share resources such as files, memory, or devices. The four necessary conditions for deadlock, often referred to as Coffman’s conditions, are mutual exclusion, hold and wait, no preemption, and circular wait. If all these conditions hold simultaneously, the system can enter a deadlock state. Deadlocks can be addressed through prevention, avoidance, or detection and recovery methods. Prevention involves designing the system to negate one or more of the Coffman conditions, while avoidance uses algorithms like Banker’s Algorithm to ensure the system never enters an unsafe state. Detection and recovery involve allowing the deadlock to occur but having mechanisms to identify and resolve it by terminating processes or rolling them back.

 

2.Starvation

 

Starvation occurs in an operating system when a process waits indefinitely to gain access to a resource it needs, even though the resource is available at times. This typically happens in scheduling algorithms that favor certain processes over others, like when a low-priority process is continually preempted by higher-priority processes. Starvation is a significant problem because it can lead to reduced system performance and inefficiency. Solutions to starvation include using aging, a technique where the priority of a waiting process is gradually increased, ensuring that every process eventually gets a chance to execute. By incorporating aging into scheduling algorithms, the operating system can prevent starvation by ensuring that processes waiting for resources for a long time are eventually given access, thus maintaining system fairness.


Comments ()


Sign in

Read Next

Direct Memory Access

Blog banner

Deadlock

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

TRELLO

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

What is Spyware?

Blog banner

Tracking Emails & Email Crimes

Blog banner

Theads

Blog banner

Starvation and Deadlock.

Blog banner

What your Favorite colour says about You?

Blog banner

Uniprocessor scheduling

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Clarizen

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

MUTUAL EXCLUSION

Blog banner

Evolution of Operating System

Blog banner

HACKING MOBILE PLATFORM

Blog banner

38_Exploring The Honeynet Project

Blog banner

Major achievement

Blog banner

An Overivew Of Cache Memory

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Modern OS

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Traveling

Blog banner

Old age lifestyle

Blog banner

Chicken Dum Biryani

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Data Exfiltration

Blog banner

FASHION

Blog banner

Vikrant’s first blog

Blog banner

Uniprocessor Scheduling

Blog banner

Evolution of Operating system.

Blog banner

Service transition principles

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Google App Engine

Blog banner

Life

Blog banner