wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and starvation

profile
Aditi Upadhayay
Aug 15, 2024
0 Likes
0 Discussions
78 Reads

Deadlock

**Definition:**

Deadlock is a condition in which a set of processes are blocked, each waiting for a resource held by another process in the set. This creates a cycle of dependencies that prevent any of the processes from continuing.

**Conditions for Deadlock (Deadlock Coffins):**

1. **Mutual Exclusion**: At least one resource must be held in a non-shareable mode. If a resource is allocated to a process, no other process can use it until it is released.

2. **Hold and Wait**: Processes holding resources can request additional resources without releasing the resources they currently hold.

3. **No Preemption**: Resources cannot be forcibly taken from a process; they must be released voluntarily.

4. **Circular Wait**: A set of processes exists such that each process is waiting for a resource held by the next process in the set, forming a circular chain.

**Example:**

Consider two processes, P1 and P2, and two resources, R1 and R2:

- P1 holds R1 and requests R2.

- P2 holds R2 and requests R1.

Both processes end up waiting indefinitely for each other’s resources, resulting in a deadlock.

**Prevention Techniques:**

1. **Eliminate Mutual Exclusion**: Make resources sharable, if possible.

2. **Eliminate Hold and Wait**: Require processes to request all resources at once or release all resources before requesting new ones.

3. **Eliminate No Preemption**: Allow resources to be preempted from processes if necessary.

4. **Eliminate Circular Wait**: Impose a total ordering of resources and require processes to request resources in a specific order.

**Detection and Recovery:**

- **Detection**: Use resource allocation graphs or other algorithms to detect deadlock.

- **Recovery**: Terminate processes or preempt resources to break the deadlock cycle.

### Starvation

**Definition:**

Starvation occurs when a process is perpetually denied necessary resources because other processes are continually given priority. This results in the affected process never getting a chance to proceed.

**Causes:**

1. **Priority Scheduling**: High-priority processes might always be given resources before low-priority processes, causing the latter to starve.

2. **Resource Allocation Policies**: Certain policies might favor some processes over others, leading to long-term deprivation of resources for some processes.

**Example:**

In a system using priority scheduling:

- Process P1 has high priority and constantly preempts Process P2.

- Process P2 may never get CPU time if P1 is always arriving or requiring resources, leading to starvation of P2.

**Prevention Techniques:**

1. **Aging**: Gradually increase the priority of processes that have been waiting for a long time to ensure they eventually get resources.

2. **Fair Scheduling**: Use algorithms like round-robin or fair-share scheduling that ensure all processes get a chance to access resources.

**Detection and Recovery:**

- **Detection**: Monitor processes to detect those that have been waiting excessively.

- **Recovery**: Adjust priorities or scheduling policies to ensure all processes are eventually serviced.



Comments ()


Sign in

Read Next

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Mental Health

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

What is Amazon?

Blog banner

SESSION HIJACKING

Blog banner

Deadlock in Operating System

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Modern Operating System

Blog banner

Women Empowerment

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Clarizen

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Types of Threads

Blog banner

Scala - a programming tool

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Memory heirachy (Operating system)

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Hey Aryan here

Blog banner

Starvation and Deadlock.

Blog banner

Uber

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

The Five Steps of Data Science

Blog banner

File system implementation

Blog banner

objectives and function of operating system

Blog banner

5 Stages of Digital Marketing

Blog banner

Disk Scheduling

Blog banner

What is E-commerce

Blog banner

Memory management

Blog banner

Inventory management software system

Blog banner

Starvation

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Hacking Mobile Platforms

Blog banner

Threads

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Microsoft Windows Overview

Blog banner

Spyware

Blog banner

What is service level Agreement?

Blog banner