wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

Threads

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Im Photographer

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Raid

Blog banner

Beatbox

Blog banner

Cyber Laws In India and Around the World

Blog banner

FASHION

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Critical success factors

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Fault Tolerance

Blog banner

What is Virtual Memory

Blog banner

Scheduling

Blog banner

Life of a 2020-2021 student

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

LISP - Library Management System

Blog banner

Memory management

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Difference Between Classification And Clustering

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Buffer Overflow

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Way to make your meal healthier.

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Types Of scheduling

Blog banner

Why is ITSM important in IT organization?

Blog banner

Clustering Techniques

Blog banner

Jira Software

Blog banner

operating system

Blog banner

Virtual memory

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

E-Cash (Electronic Cash)

Blog banner

Understanding the 'Ambiverts'

Blog banner

Different memory allocation strategies

Blog banner

10 Signs your Computer has Virus

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Direct Memory Access

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner