wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

Jira Software

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Big Data Architecture

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Operating system

Blog banner

Malware

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

ONLINE NEWSROOMS

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Service Design Model

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Types of Hackers

Blog banner

Cache memory

Blog banner

Synchronization

Blog banner

Starvation

Blog banner

Importance of Network Security Risk

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

Types of threads

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Security requirements for Safe E-Payments

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

Game via listing method

Blog banner

Virtualization

Blog banner

Multiple processor scheduling

Blog banner

Online Education

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Types of OS

Blog banner

Mumbai Metro 3

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

How to grow followers on Instagram business account?

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Cryptanalysis tool

Blog banner

Emerging threats in cyber Forensics

Blog banner

gis substation

Blog banner

Boxing

Blog banner