wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and Starvation

profile
Abutalha Solanki
Aug 15, 2024
0 Likes
0 Discussions
71 Reads

Deadlock


Deadlock is a critical issue in concurrent systems where two or more processes are stuck in a state of perpetual waiting, unable to proceed with their execution because each process is holding a resource and waiting for another resource that is held by another process. This situation leads to a standstill where none of the processes can continue, effectively bringing parts of the system to a halt.


For a deadlock to occur, four conditions must be met simultaneously:


1.Mutual Exclusion: At least one resource must be held in a non-sharable mode; that is, only one process can use the resource at any given time. If another process requests that resource, it must be blocked until the resource is released.


2. Hold and Wait: A process is currently holding at least one resource and is waiting to acquire additional resources that are currently being held by other processes.


3. No Preemption: Resources cannot be forcibly removed from the processes holding them; they must be released voluntarily by the process after it has completed its task.


4.Circular Wait: A set of processes are waiting for resources in such a way that each process in the set is waiting for a resource that is held by the next process in the set, forming a circular chain.


To manage deadlocks, several strategies can be employed:


- Deadlock Prevention: This involves designing the system in such a way that at least one of the four conditions necessary for deadlock cannot occur. For instance, by ensuring that resources are allocated in such a way that circular wait cannot occur, deadlocks can be prevented. However, this approach can be restrictive and may lead to inefficiency.


- Deadlock Avoidance: This strategy requires that the system has some additional information about how resources are requested. The system makes decisions dynamically to ensure that deadlock is avoided. The Banker's algorithm is a well-known example of a deadlock avoidance strategy, which tests whether allocating resources will keep the system in a safe state.


- Deadlock Detection and Recovery: In this approach, the system does not prevent or avoid deadlocks but instead allows them to occur, then detects them and takes action to recover. This can involve terminating one or more processes to break the deadlock or preempting resources from some processes.


Starvation


Starvation, also known as indefinite blocking, occurs when a process is perpetually denied access to the resources it needs to proceed with its execution, despite the system being in a state where these resources are technically available. Unlike deadlock, where processes are mutually blocked, starvation typically affects lower-priority processes that are continually overlooked in favor of higher-priority ones.


Starvation can happen in various scenarios, most commonly in systems where resources are allocated based on priority. For example, in a priority-based scheduling algorithm, higher-priority processes are allowed to execute before lower-priority ones. If new high-priority processes keep arriving, the low-priority process may never get a chance to run, leading to starvation.


Preventing starvation typically involves implementing strategies that ensure fairness in resource allocation. One common technique is **aging**, where the priority of a process increases the longer it waits in the queue. Over time, even a low-priority process will accumulate enough priority to eventually gain access to the resources it needs.


Both deadlock and starvation are significant concerns in the design of operating systems and concurrent systems. While deadlock can bring a system to a complete halt, starvation can degrade system performance by allowing some processes to monopolize resources indefinitely. Effective management of these issues is crucial for maintaining the reliability and efficiency of a system.


Comments ()


Sign in

Read Next

File and File System Structure

Blog banner

Study of Backdoor and Trojan tools

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

File management

Blog banner

virtual machines and virtualization

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Business-to-Business

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Memory Management

Blog banner

Understanding Regression Analysis

Blog banner

Cyber Security in Data Breaching

Blog banner

Self-love: Being the reason of your own smile

Blog banner

IoT Architecture Based Security

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Music

Blog banner

Consumer to consumer Business model

Blog banner

Strengthening Active Directory Security

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Deadlocks in operating system

Blog banner

Topic: Sessions in Operating system

Blog banner

Race Condition in Operating Theatre

Blog banner

Apple

Blog banner

Electronic Funds Transfer

Blog banner

Career v/s Job : Choose your passion

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Answer

Blog banner

Deadlocks in Operating Systems

Blog banner

Deadlock and Starvation

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Virtual Machine

Blog banner

Interrupts

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

Memory Management

Blog banner

Paging

Blog banner

Interrupts in operating system.

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

10 Signs your Computer has Virus

Blog banner

Fitness

Blog banner

Android Flashlight Application

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner