wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

Supervised and Unsupervised Learning

Blog banner

File Organization and Access

Blog banner

Theads

Blog banner

Virtual Machine

Blog banner

Electronic Funds Transfer

Blog banner

Uniprocessor Scheduling

Blog banner

Ethical Hacking

Blog banner

Importance Of Blockchain

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Data Science in Mental Health Prediction

Blog banner

SQL Injection Techniques

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

"THINGS TO REMEMBER WHEN YOU'RE AT YOUR LOWEST"

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

IP ADDRESS

Blog banner

RAID_142

Blog banner

Virtual memory

Blog banner

Yahoo! mail

Blog banner

Uniprocessor Scheduling

Blog banner

What is Vishing?

Blog banner

E-learning

Blog banner

Buffer Overflow

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Data Warehouse Bus Matrix

Blog banner

Note on Process, Process creation and Process termination

Blog banner

AIS & ANN based Malware detection for Android OS - Nupur Bhatt

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Deadlock in operating system

Blog banner

Facebook marketing

Blog banner

Blockchain Security Technique

Blog banner

Big Data Architecture

Blog banner

Deadlock

Blog banner

TRELLO

Blog banner

BharatPe

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

CoWIN

Blog banner

OS Assignment 3 Deadlock

Blog banner

File Management

Blog banner

Question

Blog banner