wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

Importance Of Time

Blog banner

Explain website hacking issues

Blog banner

Virtual memory

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

How return on investment is defined in IT services

Blog banner

Operation system

Blog banner

virtual machine

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Swiggi

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Electronic Funds Transfer

Blog banner

Yahoo! mail

Blog banner

BIRYANI ! The history you never knew about

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Article on IT development trends

Blog banner

Big O Notation

Blog banner

Virtual Machine

Blog banner

S-Tool : Steganography

Blog banner

Answer

Blog banner

Excel records

Blog banner

Memory Management of Operating System(OS)

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Save Girl Child

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Information Technology In E- Commerce

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

HTML vs HTML5

Blog banner

Fitness

Blog banner

Direct Memory Access

Blog banner

Buffering

Blog banner

Risk factors in service transistion

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Stop Racism

Blog banner

Street foods

Blog banner

Electronic Funds Transfer

Blog banner

Odoo

Blog banner

Virtual memory

Blog banner

Evolution of Operating Systems

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Blockchain

Blog banner