wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

INSTAGRAM

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

GIS Bharat Maps

Blog banner

Modern operating system

Blog banner

Bit Coins

Blog banner

Security Breaches in Stock market trading

Blog banner

Virtual Machine

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Types of OS

Blog banner

DIGITAL TECHNOLOGY

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

My favourite food

Blog banner

Instagram

Blog banner

Social Media.

Blog banner

File management

Blog banner

Risk mitigation and management

Blog banner

Deadlock

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Malicious softwares

Blog banner

E-Governance

Blog banner

Trello ( management software)

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Cache memory

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Operating system

Blog banner

Principal of concurrency

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Esri India launches Policy Maps.

Blog banner

Predicting Student Performance with Data Science

Blog banner

'Positivity in life'

Blog banner

USES OF WHATSAPP

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Outlook mail

Blog banner

MOVEMBER

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

How to feel Happy everyday day

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Layers Of Blockchain

Blog banner

The Rise of Evil Twin Attacks: A New Kind Of Spoofing Cyberattack

Blog banner