wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Operating Systems

Blog banner

Operating system evolution

Blog banner

Blockchain in IoT Applications

Blog banner

VIRUS

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

What are Virtual Machines

Blog banner

IOT Hacking Techniques

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Social Engineering

Blog banner

BENIFITS OF YOGA

Blog banner

Multithreading in Operating System

Blog banner

E-commerce

Blog banner

Data Visualization in Decision-Making

Blog banner

Service Catalogue Management

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

SPEM

Blog banner

Importance of self defence for girls

Blog banner

A book review

Blog banner

Concurrency and Deadlocks

Blog banner

Hacking Mobile Platforms

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

THE INPACT OF SOCIAL MEDIA!

Blog banner

What is Email? Uses of Emails

Blog banner

Virtual Memory

Blog banner

Modern Operating System

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Mariana Trench: The deepest depths

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

Memory Management

Blog banner

Evolution of Operating system

Blog banner

Fitness

Blog banner

Modern operating system

Blog banner

Security Issues and Countermeasures

Blog banner

Old age lifestyle

Blog banner

Landslide Hazard

Blog banner