wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Disk scheduling

Blog banner

Operating Systems

Blog banner

Hypothesis Testing in Data Science

Blog banner

Types of Hackers

Blog banner

Having passion in life

Blog banner

BUFFER OVERFLOW_142

Blog banner

Memory management

Blog banner

10 Interesting facts you should know!!!

Blog banner

How to kiss

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

Note Taker App

Blog banner

Process, process creation and process termination

Blog banner

The Right way of cooking

Blog banner

GIS in Disaster Management

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

Veg Mix Pickle

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

How Cyber Forensics use in AI

Blog banner

Types of Threads

Blog banner

Deadlock and Starvation

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Network Forensics Tools and Techniques

Blog banner

RAID

Blog banner

Fashion design

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Mumbai famous street food

Blog banner

Types of Malware in Cyber Security

Blog banner

Game via listing method

Blog banner

Emerging threats in cyber Forensics

Blog banner

RAID

Blog banner

Spyware

Blog banner

APACHE KAFKA

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Harsh Rathod

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Know your Processors!

Blog banner

Virtual Memory

Blog banner

Student Grade Calculator in LISP

Blog banner

Processes : Process description and control

Blog banner

Smitten Kitchen Keepers

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner