wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Krishna Rao
Aug 14, 2024
0 Likes
0 Discussions
89 Reads

Deadlock occurs when each process holds a resource and wait for other resource held by any other process. Necessary conditions for deadlock to occur are Mutual Exclusion, Hold and Wait, No Preemption and Circular Wait. In this no process holding one resource and waiting for another get executed. For example, in the below diagram, Process 1 is holding Resource 1 and waiting for resource 2 which is acquired by process 2, and process 2 is waiting for resource 1. Hence both process 1 and process 2 are in deadlock.



Starvation is the problem that occurs when high priority processes keep executing and low priority processes get blocked for indefinite time. In heavily loaded computer system, a steady stream of higher-priority processes can prevent a low-priority process from ever getting the CPU. In starvation resources are continuously utilized by high priority processes. Problem of starvation can be resolved using Aging. In Aging priority of long waiting processes is gradually increased.


Comments ()


Sign in

Read Next

Deadlock in Operating System

Blog banner

Data Analytics in Data Science

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

E-learning

Blog banner

HubSpot

Blog banner

Cache Memory(142)

Blog banner

I/O buffer and its techniques

Blog banner

differentiate thinking humanly and rationally

Blog banner

Python as a tool for data analysis

Blog banner

Developments in Modern Operating Systems

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

Buffers in Operating Systems

Blog banner

Toothache at night? What does this mean, and how to cope with it?

Blog banner

Depression

Blog banner

GIS Mapping

Blog banner

Evolution of Operating system

Blog banner

A True Friendship

Blog banner

1.1 basic elements

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Beauty of indian railway

Blog banner

Raid

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

"Audit" In Data Science

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

Data Visualization

Blog banner

VIRTUAL MACHINES

Blog banner

Decision Tree: A Diagram Model

Blog banner

Virtual memory

Blog banner

Telegram and it's features

Blog banner

Service Strategy In ITSM

Blog banner

The Peephole

Blog banner

HR Automation : Need of the hour

Blog banner

A Journey By Train

Blog banner

10 Reasons to date your best friend

Blog banner

Modern Operating System

Blog banner

GraphQL

Blog banner

Theads

Blog banner

Elegant fashion style

Blog banner

Computer Security

Blog banner

File system

Blog banner