wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation

profile
Omkar Bhube
Aug 15, 2024
0 Likes
0 Discussions
72 Reads

Starvation in operating systems (OS) occurs when a process is perpetually denied the necessary resources to proceed with its execution. This usually happens when a scheduling algorithm continuously favors other processes, leading to the affected process being delayed indefinitely. Starvation is often associated with priority-based scheduling, where lower-priority processes may never get CPU time because higher-priority processes keep taking precedence. To mitigate starvation, techniques like *aging* can be employed, where the priority of a waiting process is gradually increased over time to ensure it eventually gets the necessary resources.


Causes of Starvation:

Priority Scheduling: In priority-based systems, higher-priority processes can continuously preempt lower-priority ones, leading to the lower-priority processes never getting scheduled.Resource Contention: When multiple processes are competing for limited resources, a process might be continuously bypassed in favor of others, especially if the resource allocation is biased.Non-preemptive Scheduling: In systems where a process cannot be preempted once it starts, longer processes can monopolize the CPU, causing others to starve.


Solutions:

Aging: This is a common solution where the priority of a waiting process is gradually increased the longer it waits, ensuring that it will eventually be executed.Fair Scheduling

Algorithms: Some algorithms, like Round-Robin or Multilevel Queue Scheduling with time-sharing, are designed to minimize the chances of starvation by ensuring that all processes get some CPU time.Resource Allocation Policies: Implementing fair resource allocation policies can help in reducing contention and ensuring that all processes receive the resources they need in a timely manner.


Comments ()


Sign in

Read Next

Fitness

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Deadlock in operating system

Blog banner

Rapido

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

AI and cyber Security

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

What is M-commerce and how it's work

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Email Privacy

Blog banner

memory managment

Blog banner

Exploring the Power of Encase Forensic Tools: Unraveling Digital Mysteries

Blog banner

A little bit of salt is all the hash needs!

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Dancing Classes In Mumbai

Blog banner

Some web vulnerabilities

Blog banner

File sharing

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

VIRTUAL MACHINE

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Paid Email

Blog banner

PROCESS STATE:

Blog banner

Security in Cloud Computing

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

What is Data, Information and Knowledge?

Blog banner

Development Of Modern Operating System

Blog banner

Decision Tree: A Diagram Model

Blog banner

Deadlocks in operating system

Blog banner

DISK SCHEDULING

Blog banner

JIRA SOFTWARE

Blog banner

Cyber Security Control

Blog banner

Virtual memory in Operating System

Blog banner

Scala - a programming tool

Blog banner

Top 4 Places To Stay In Copenhagen

Blog banner

ProofHub

Blog banner

Women empowerment

Blog banner

Technological Advancement

Blog banner

Data Science & AI

Blog banner

Use case of K-means clustering

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

File management

Blog banner