wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation

profile
Omkar Bhube
Aug 15, 2024
0 Likes
0 Discussions
72 Reads

Starvation in operating systems (OS) occurs when a process is perpetually denied the necessary resources to proceed with its execution. This usually happens when a scheduling algorithm continuously favors other processes, leading to the affected process being delayed indefinitely. Starvation is often associated with priority-based scheduling, where lower-priority processes may never get CPU time because higher-priority processes keep taking precedence. To mitigate starvation, techniques like *aging* can be employed, where the priority of a waiting process is gradually increased over time to ensure it eventually gets the necessary resources.


Causes of Starvation:

Priority Scheduling: In priority-based systems, higher-priority processes can continuously preempt lower-priority ones, leading to the lower-priority processes never getting scheduled.Resource Contention: When multiple processes are competing for limited resources, a process might be continuously bypassed in favor of others, especially if the resource allocation is biased.Non-preemptive Scheduling: In systems where a process cannot be preempted once it starts, longer processes can monopolize the CPU, causing others to starve.


Solutions:

Aging: This is a common solution where the priority of a waiting process is gradually increased the longer it waits, ensuring that it will eventually be executed.Fair Scheduling

Algorithms: Some algorithms, like Round-Robin or Multilevel Queue Scheduling with time-sharing, are designed to minimize the chances of starvation by ensuring that all processes get some CPU time.Resource Allocation Policies: Implementing fair resource allocation policies can help in reducing contention and ensuring that all processes receive the resources they need in a timely manner.


Comments ()


Sign in

Read Next

Memory heirachy (Operating system)

Blog banner

IOT Hacking Techniques

Blog banner

All you need to know about Cassandra

Blog banner

Device driver

Blog banner

What is OS Fingerprinting?

Blog banner

Deadlock and Starvation

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Cache memory

Blog banner

The application udemy

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Asana

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Sage business cloud accounting

Blog banner

Process Creation

Blog banner

Data Warehousing

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Benefits and drawback of web security.

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Making Money through Instagram

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Types of E-Commerce

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

MYNTRA

Blog banner

The IT Service Lifecycle

Blog banner

What is thread and multithreading ?

Blog banner

Operating System

Blog banner

Direct Memory Access

Blog banner

EMAIL INVESTIGATION

Blog banner

BIRYANI ! The history you never knew about

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

How International Schools Build Global-Minded Students through Curriculum & Activities

Blog banner

Street foods

Blog banner

MEMORY MANAGEMENT

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Sage

Blog banner

File management

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

All you need to know about “On-page SEO”

Blog banner

Memory input output management

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

INTERNET SECURITY

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner