wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

STARVATION

profile
Krish Kaunder
Aug 15, 2024
0 Likes
0 Discussions
49 Reads

In operating systems, starvation (or indefinite blocking) refers to a situation where a process is perpetually denied access to resources it needs to make progress, even though the resources are available. This typically happens in systems that use scheduling algorithms for resource allocation.


Causes of Starvation:

1. Priority Scheduling: If a scheduling algorithm always favors higher-priority processes, lower-priority processes might be starved of CPU time.

2. Resource Allocation: When a process holds resources while waiting for others, and other processes keep grabbing the resources it needs, the process can end up waiting indefinitely.

3. Long Wait Queue: In some scheduling systems, processes at the end of the queue might never get a chance to execute if new processes keep arriving and getting added to the front of the queue.


Example:

Consider a system using a priority-based scheduling algorithm where high-priority processes are always chosen over low-priority ones. If high-priority processes keep entering the system, a low-priority process may never get CPU time, leading to starvation.


Solutions to Starvation:

1. Aging: Gradually increasing the priority of a waiting process over time, ensuring that it eventually gets scheduled.

2. Fair Resource Allocation: Ensuring that every process gets a fair share of resources, perhaps by implementing round-robin or time-sharing scheduling.

3. Deadlock Detection: vIdentifying potential deadlocks and resolving them, as deadlocks can lead to starvation in some cases. 


Starvation is a significant issue in operating systems and resource management algorithms, as it can lead to inefficiency and poor system performance.


Comments ()


Sign in

Read Next

Education: Key to your Prosperity

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

GIS in Disaster Management

Blog banner

Royal enfield

Blog banner

Direct Memory Access

Blog banner

Deadlock and starvation

Blog banner

Asana

Blog banner

Goa Trip With Friends

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Man In The Middle Attack

Blog banner

Microsoft powerpoint presentation

Blog banner

RAID

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

LIMITED EDITION

Blog banner

RAID_142

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Deadlock

Blog banner

Cybersecurity Standards for Automotive

Blog banner

RACI model in IT services

Blog banner

Deadlock

Blog banner

Processes : Process description and control

Blog banner

Short note on Microsoft office

Blog banner

SPEM

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Study of Backdoor and Trojan tools

Blog banner

memory managment

Blog banner

RAID

Blog banner

Direct Memory Access

Blog banner

Virtual Machine

Blog banner

File Systems in OS.

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

What is Amazon?

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Clustering Techniques

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Some web vulnerabilities

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Memory input output management

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner