wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

STARVATION

profile
Krish Kaunder
Aug 15, 2024
0 Likes
0 Discussions
50 Reads

In operating systems, starvation (or indefinite blocking) refers to a situation where a process is perpetually denied access to resources it needs to make progress, even though the resources are available. This typically happens in systems that use scheduling algorithms for resource allocation.


Causes of Starvation:

1. Priority Scheduling: If a scheduling algorithm always favors higher-priority processes, lower-priority processes might be starved of CPU time.

2. Resource Allocation: When a process holds resources while waiting for others, and other processes keep grabbing the resources it needs, the process can end up waiting indefinitely.

3. Long Wait Queue: In some scheduling systems, processes at the end of the queue might never get a chance to execute if new processes keep arriving and getting added to the front of the queue.


Example:

Consider a system using a priority-based scheduling algorithm where high-priority processes are always chosen over low-priority ones. If high-priority processes keep entering the system, a low-priority process may never get CPU time, leading to starvation.


Solutions to Starvation:

1. Aging: Gradually increasing the priority of a waiting process over time, ensuring that it eventually gets scheduled.

2. Fair Resource Allocation: Ensuring that every process gets a fair share of resources, perhaps by implementing round-robin or time-sharing scheduling.

3. Deadlock Detection: vIdentifying potential deadlocks and resolving them, as deadlocks can lead to starvation in some cases. 


Starvation is a significant issue in operating systems and resource management algorithms, as it can lead to inefficiency and poor system performance.


Comments ()


Sign in

Read Next

Save Environment

Blog banner

The art of being alone

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Modern Operating System - Suren Kotian

Blog banner

COMMUNICATION

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

SPAM

Blog banner

Deadlock in Operating systems

Blog banner

Strengthening Active Directory Security

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Delhi city

Blog banner

What is M-commerce and how it's work

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Security issues

Blog banner

An Overview of Virtual Machines

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

6 Digital Marketing Trends You Must Watch Out For In 2022

Blog banner

Teenagers of Today

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Smartsheet

Blog banner

Population

Blog banner

semaphores

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Blog on Smartsheet.

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

The functions of operating system

Blog banner

I/O Buffering

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Memory Management

Blog banner

Quality check in IT services

Blog banner

Importance of internet

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Cyber Security Control

Blog banner

The Right way of cooking

Blog banner

GraphQL

Blog banner