wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation

profile
Omkar Bhube
Aug 15, 2024
0 Likes
0 Discussions
72 Reads

Starvation in operating systems (OS) occurs when a process is perpetually denied the necessary resources to proceed with its execution. This usually happens when a scheduling algorithm continuously favors other processes, leading to the affected process being delayed indefinitely. Starvation is often associated with priority-based scheduling, where lower-priority processes may never get CPU time because higher-priority processes keep taking precedence. To mitigate starvation, techniques like *aging* can be employed, where the priority of a waiting process is gradually increased over time to ensure it eventually gets the necessary resources.


Causes of Starvation:

Priority Scheduling: In priority-based systems, higher-priority processes can continuously preempt lower-priority ones, leading to the lower-priority processes never getting scheduled.Resource Contention: When multiple processes are competing for limited resources, a process might be continuously bypassed in favor of others, especially if the resource allocation is biased.Non-preemptive Scheduling: In systems where a process cannot be preempted once it starts, longer processes can monopolize the CPU, causing others to starve.


Solutions:

Aging: This is a common solution where the priority of a waiting process is gradually increased the longer it waits, ensuring that it will eventually be executed.Fair Scheduling

Algorithms: Some algorithms, like Round-Robin or Multilevel Queue Scheduling with time-sharing, are designed to minimize the chances of starvation by ensuring that all processes get some CPU time.Resource Allocation Policies: Implementing fair resource allocation policies can help in reducing contention and ensuring that all processes receive the resources they need in a timely manner.


Comments ()


Sign in

Read Next

MAJOR ACHIEVEMENTS OF OS

Blog banner

Brain wash of social media

Blog banner

Virtual Machine

Blog banner

Service transistion under difficult conditions

Blog banner

Life of an army person

Blog banner

Modern Operating Systems

Blog banner

WHAT IS TWITTER AND HOW DOES IT WORK

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Big Data Architecture

Blog banner

A buffer overflow

Blog banner

AI and Cyber Security

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

THE DESIRE OF MANY

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Visualization in Data Science

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

Women empowerment

Blog banner

Cache memory

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Data Science & AI

Blog banner

Full Disk Encryption

Blog banner

semaphores

Blog banner

Memory Management

Blog banner

Short note on Microsoft office

Blog banner

Harsh Rathod

Blog banner

Modern operating system

Blog banner

How To Secure Operating Systems ?

Blog banner

Memory input output management

Blog banner

operating system

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Virtual Memory

Blog banner

Deadlock and Starvation

Blog banner

Capacity management in ITSM

Blog banner

Music

Blog banner

The launch of UniMap by HERE

Blog banner

What is Amazon?

Blog banner

SQL Injection

Blog banner

Security Breaches in Stock market trading

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner