wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Deadlock and starvation in operating system

profile
Nishchay Maurya
Jul 11, 2023
0 Likes
0 Discussions
30 Reads

Deadlock

All processes keep waiting for each other to complete and none get executed. Resources are blocked by the processes.A deadlock occurs when no process can proceed and becomes blocked . In other words, a deadlock occurs when multiple processes in the CPU compete for the limited number of resources available in the CPU .Deadlocks typically occur in systems that use resource allocation policies like mutual exclusion, hold and wait, no preemption, and circular wait. Let's discuss each of these conditions:

 

1)Mutual Exclusion: At least one resource must be held in a non-shareable mode, meaning that only one process can use it at a time. If a process requests a resource that is already held by another process, it must wait until the resource is released.

 

2)Hold and Wait: A process must be holding at least one resource while waiting to acquire additional resources. If a process holds a resource and requests another that is held by a different process, a situation of deadlock can occur if the second process is also waiting for a resource held by the first process.

 

3)No Preemption: Resources cannot be forcibly taken away from a process that is currently using them. The only way a resource can be released is voluntarily by the process holding it. This condition contributes to the possibility of deadlock, as processes may hold resources indefinitely.

 

4)Circular Wait: A set of processes is involved in a circular chain, where each process is waiting for a resource held by the next process in the chain. This circular dependency leads to a situation where no process can proceed.

 

 

 

 

Starvation 

Starvation happens when a low priority program requests a system resource but cannot run because a higher priority program has been employing that resource for a long time.

 

1)High priority processes keep executing and low priority processes are blocked. Resources are continuously utilized by high priority processes.When a process is ready to start executing, it waits for the CPU to allocate the necessary resources. However, because other processes continue to block the required resources, the process must wait indefinitely.

 

2)Deadlock: In a deadlock situation, multiple processes are waiting for resources that are held by other processes, forming a circular dependency. If the deadlock resolution policy in the operating system is ineffective, processes may remain deadlocked indefinitely, resulting in resource starvation for those processes.

For example, if a process is granted a large amount of memory and holds onto it for an extended period, other processes may be unable to acquire sufficient memory and may not be able to progress.

 

3)CPU Scheduling: In a multi-programmed operating system, if a scheduling algorithm always prioritizes certain processes over others, lower-priority processes may starve for CPU time. They may experience delays or never get a chance to execute if higher-priority processes continually occupy the CPU.


Comments ()


Sign in

Read Next

Power of words

Blog banner

Getting started with Android Studio

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

Malware Defense

Blog banner

FIREWALL

Blog banner

Different Types of Data

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Interrupts

Blog banner

Lucidchart

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Challenges and risks in service operations

Blog banner

Crypto tax evasion

Blog banner

Virtual Memory

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

Financial Fraud Detection

Blog banner

Security in Cloud Computing

Blog banner

Busted : Common Web Security Myths

Blog banner

CSI and Organizational Change

Blog banner

All you need to know about “On-page SEO”

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

How to use open SSL for web server - browser communication

Blog banner

MODERN OPERATING SYSTEM

Blog banner

LIFEHACKER

Blog banner

Virtual memory in Operating System

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Memory Management

Blog banner

Deadlock

Blog banner

What are Virtual Machines

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Explain website hacking issues

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Texting is actually better than talking in person

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Understanding Business Layer in Data Science

Blog banner

Water Resources are about to exhaust...

Blog banner

Uniprocessor scheduling

Blog banner

How return on investment is defined in IT services

Blog banner

Install Ubuntu in Vmware

Blog banner

Women empowerment

Blog banner

Emerging threats in cyber Forensics

Blog banner

E-mail security

Blog banner