wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation

profile
Omkar Bhube
Aug 15, 2024
0 Likes
0 Discussions
72 Reads

Starvation in operating systems (OS) occurs when a process is perpetually denied the necessary resources to proceed with its execution. This usually happens when a scheduling algorithm continuously favors other processes, leading to the affected process being delayed indefinitely. Starvation is often associated with priority-based scheduling, where lower-priority processes may never get CPU time because higher-priority processes keep taking precedence. To mitigate starvation, techniques like *aging* can be employed, where the priority of a waiting process is gradually increased over time to ensure it eventually gets the necessary resources.


Causes of Starvation:

Priority Scheduling: In priority-based systems, higher-priority processes can continuously preempt lower-priority ones, leading to the lower-priority processes never getting scheduled.Resource Contention: When multiple processes are competing for limited resources, a process might be continuously bypassed in favor of others, especially if the resource allocation is biased.Non-preemptive Scheduling: In systems where a process cannot be preempted once it starts, longer processes can monopolize the CPU, causing others to starve.


Solutions:

Aging: This is a common solution where the priority of a waiting process is gradually increased the longer it waits, ensuring that it will eventually be executed.Fair Scheduling

Algorithms: Some algorithms, like Round-Robin or Multilevel Queue Scheduling with time-sharing, are designed to minimize the chances of starvation by ensuring that all processes get some CPU time.Resource Allocation Policies: Implementing fair resource allocation policies can help in reducing contention and ensuring that all processes receive the resources they need in a timely manner.


Comments ()


Sign in

Read Next

Modern Operating Systems.

Blog banner

Evolution of Operating System

Blog banner

Deadlock

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

VIRTUAL MACHINES

Blog banner

INTERRUPTS

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Deadlock and Starvation

Blog banner

Senseless Teeths

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

GIS Mapping

Blog banner

What is Spyware? and examples of them.

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Elements and Principles of Photography

Blog banner

Measuring IT Risk

Blog banner

Who decides your overthinking, anyway?

Blog banner

The War With Cold On Earth

Blog banner

Social Engineering

Blog banner

Service Design Principles

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Proof-of-Stake (PoS)

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Life of a 2020-2021 student

Blog banner

Microsoft powerpoint presentation

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Goa Trip With Friends

Blog banner

PYTHON

Blog banner

Evolution of Operating System

Blog banner

Deadlock and Starvation

Blog banner

Understanding Regression Analysis

Blog banner

Evolution of Operating system.

Blog banner

Predicting Student Performance with Data Science

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Cyber Laws In India and Around the World

Blog banner

RAID

Blog banner

Operating System Objectives and Functions

Blog banner

Uniprocessor Scheduling

Blog banner

Direct memory access (DMA)

Blog banner

Deming’s Process

Blog banner

Message Passing in OS

Blog banner