wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and starvation

profile
Jwala the Beast
Aug 15, 2024
0 Likes
0 Discussions
37 Reads

Deadlock and starvation are two key issues in concurrent computing systems, particularly in operating systems and database management.


**Deadlock** occurs when a set of processes become stuck in a state where each process is waiting for a resource that is held by another process in the set. This creates a cycle of dependencies with no process able to proceed. For example, if Process A holds Resource 1 and is waiting for Resource 2 (held by Process B), while Process B is waiting for Resource 1, neither process can continue, resulting in a deadlock.


**Starvation**, on the other hand, happens when a process is perpetually denied necessary resources to proceed because other processes are continuously being given those resources. This usually occurs due to improper resource allocation policies or scheduling algorithms. For instance, if a high-priority process keeps preempting resources from a lower-priority process, the lower-priority process may never get the resources it needs to complete its task.


Both issues need to be managed through effective resource management strategies, such as deadlock detection and recovery mechanisms, and fair scheduling policies to ensure that all processes get a chance to execute.


Comments ()


Sign in

Read Next

Direct Memory Access

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Developments in Modern Operating Systems

Blog banner

Emerging threats in cyber Forensics

Blog banner

Virus

Blog banner

CoWIN

Blog banner

Threads

Blog banner

Some web vulnerabilities

Blog banner

Balance

Blog banner

Memory Management

Blog banner

Importance of self defence for girls

Blog banner

IoT Evolution

Blog banner

Banaras

Blog banner

Instagram

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

Assignment 2

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Instagram Features in 2023 That Will Leave You Stunned!

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Multiprocessor and Multicore Organization

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

File Systems in OS.

Blog banner

File management

Blog banner

Memory Management

Blog banner

An Overivew Of Cache Memory

Blog banner

Strengthening Active Directory Security

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

E-security systems | CCTV

Blog banner

Data Security must be your Priority!

Blog banner

Big Data Architecture

Blog banner

Trends that began during the pandemic

Blog banner

Types of Malware in Cyber Security

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Blockchain

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

RAID

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

The IT Service Lifecycle

Blog banner

The War With Cold On Earth

Blog banner