wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Khush Bagaria
Aug 15, 2024
0 Likes
0 Discussions
119 Reads

1. Deadlock

 

Deadlock in an operating system occurs when a set of processes become stuck because each process is waiting for a resource that another process holds, and none of the processes can proceed. This situation usually arises in multi-process systems where processes share resources such as files, memory, or devices. The four necessary conditions for deadlock, often referred to as Coffman’s conditions, are mutual exclusion, hold and wait, no preemption, and circular wait. If all these conditions hold simultaneously, the system can enter a deadlock state. Deadlocks can be addressed through prevention, avoidance, or detection and recovery methods. Prevention involves designing the system to negate one or more of the Coffman conditions, while avoidance uses algorithms like Banker’s Algorithm to ensure the system never enters an unsafe state. Detection and recovery involve allowing the deadlock to occur but having mechanisms to identify and resolve it by terminating processes or rolling them back.

 

2.Starvation

 

Starvation occurs in an operating system when a process waits indefinitely to gain access to a resource it needs, even though the resource is available at times. This typically happens in scheduling algorithms that favor certain processes over others, like when a low-priority process is continually preempted by higher-priority processes. Starvation is a significant problem because it can lead to reduced system performance and inefficiency. Solutions to starvation include using aging, a technique where the priority of a waiting process is gradually increased, ensuring that every process eventually gets a chance to execute. By incorporating aging into scheduling algorithms, the operating system can prevent starvation by ensuring that processes waiting for resources for a long time are eventually given access, thus maintaining system fairness.


Comments ()


Sign in

Read Next

Technical SEO : Total Guide

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Question

Blog banner

Types of E-Commerce

Blog banner

Operating System Objectives and Functions

Blog banner

Outlook mail

Blog banner

Threats To Computer System

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

10 Signs your Computer has Virus

Blog banner

Is Brushing After Eating Damaging Your Teeth? (Fact or Myth)

Blog banner

Memory Management in Operating System

Blog banner

Disk scheduling

Blog banner

What is metaverse?

Blog banner

Deadlock in Operating System

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Zero-Day Attack

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Cache memory

Blog banner

Data Analytics in Data Science

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Hosting basics

Blog banner

NETSUITE

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Memory management and virtual memory

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Types Of scheduling

Blog banner

Paginng In OS

Blog banner

Confidence Building Activities for the New School Year

Blog banner

Memory Management

Blog banner

Operating Systems Overview

Blog banner

WINDOWS I/ O

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Modern Operating System

Blog banner

Security Issues and Countermeasures

Blog banner

Lifestyle of a photographer

Blog banner

Mumbai

Blog banner

Understanding the 'Ambiverts'

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

5 Common Faults In Construction Tenders

Blog banner

NodeJs

Blog banner

IP ADDRESS

Blog banner