wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and starvation

profile
Jwala the Beast
Aug 15, 2024
0 Likes
0 Discussions
37 Reads

Deadlock and starvation are two key issues in concurrent computing systems, particularly in operating systems and database management.


**Deadlock** occurs when a set of processes become stuck in a state where each process is waiting for a resource that is held by another process in the set. This creates a cycle of dependencies with no process able to proceed. For example, if Process A holds Resource 1 and is waiting for Resource 2 (held by Process B), while Process B is waiting for Resource 1, neither process can continue, resulting in a deadlock.


**Starvation**, on the other hand, happens when a process is perpetually denied necessary resources to proceed because other processes are continuously being given those resources. This usually occurs due to improper resource allocation policies or scheduling algorithms. For instance, if a high-priority process keeps preempting resources from a lower-priority process, the lower-priority process may never get the resources it needs to complete its task.


Both issues need to be managed through effective resource management strategies, such as deadlock detection and recovery mechanisms, and fair scheduling policies to ensure that all processes get a chance to execute.


Comments ()


Sign in

Read Next

Social media

Blog banner

Malware Defense

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Data Warehouse Bus Matrix

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Save Girl Child

Blog banner

History of Money

Blog banner

Photorec - media recovery tool

Blog banner

Operating system evolution

Blog banner

WINDOWS I/ O

Blog banner

Threads

Blog banner

Hey Aryan here

Blog banner

Art and Culture of Rajasthan

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

History of ITIL

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Ethical Hacking

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

GOOGLE

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Dos (Denial of service) Attack

Blog banner

Virtual Memory

Blog banner

Natural Language Processing(NLP)

Blog banner

Teamwork

Blog banner

Deadlock in Operating System

Blog banner

MENDELEY

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Virtual Memory

Blog banner

Puri Jagannath temple

Blog banner

Predicting Student Performance with Data Science

Blog banner

Vulnerability Assessment

Blog banner

Zomato (Income Sources)

Blog banner

COMMUNICATION

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Fitness

Blog banner

Memory Management Techniques

Blog banner

Proof-of-Stake (PoS)

Blog banner

Different types of scam frauds

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Telegram and it's features

Blog banner

IoT Evolution

Blog banner