wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation

profile
Omkar Bhube
Aug 15, 2024
0 Likes
0 Discussions
73 Reads

Starvation in operating systems (OS) occurs when a process is perpetually denied the necessary resources to proceed with its execution. This usually happens when a scheduling algorithm continuously favors other processes, leading to the affected process being delayed indefinitely. Starvation is often associated with priority-based scheduling, where lower-priority processes may never get CPU time because higher-priority processes keep taking precedence. To mitigate starvation, techniques like *aging* can be employed, where the priority of a waiting process is gradually increased over time to ensure it eventually gets the necessary resources.


Causes of Starvation:

Priority Scheduling: In priority-based systems, higher-priority processes can continuously preempt lower-priority ones, leading to the lower-priority processes never getting scheduled.Resource Contention: When multiple processes are competing for limited resources, a process might be continuously bypassed in favor of others, especially if the resource allocation is biased.Non-preemptive Scheduling: In systems where a process cannot be preempted once it starts, longer processes can monopolize the CPU, causing others to starve.


Solutions:

Aging: This is a common solution where the priority of a waiting process is gradually increased the longer it waits, ensuring that it will eventually be executed.Fair Scheduling

Algorithms: Some algorithms, like Round-Robin or Multilevel Queue Scheduling with time-sharing, are designed to minimize the chances of starvation by ensuring that all processes get some CPU time.Resource Allocation Policies: Implementing fair resource allocation policies can help in reducing contention and ensuring that all processes receive the resources they need in a timely manner.


Comments ()


Sign in

Read Next

Why is online marketing is important in current scenario

Blog banner

security controls

Blog banner

What is service level Agreement?

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

MEMORY MANAGEMENT

Blog banner

What are Virtual Machines

Blog banner

GIS in Disaster Management

Blog banner

Interrupts in operating system.

Blog banner

OS Evolution Achievements

Blog banner

From Model Mistakes to Metrics

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Environmental Management using GIS

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Street foods

Blog banner

The Golden Temple , Amritsar

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

MAILFENCE

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Functions of Operating System

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

IT Service as as Value Creation

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

COMMUNICATION

Blog banner

Modern Operating System - Khush bagaria

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Types of Hackers

Blog banner

E-security systems | CCTV

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Network Forensics Tools and Techniques

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Virtual memory in os

Blog banner

Health and fitness

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

Man VS Nature

Blog banner

History of Money

Blog banner

Internet: The Vast Ocean Of Knowledge.

Blog banner

Fault Tolerance in an Operating System

Blog banner

MySQL

Blog banner

MODERN OPERATING SYSTEM

Blog banner