wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation and Deadlock.

profile
Naitik Poriya undefined
Jul 05, 2024
0 Likes
0 Discussions
38 Reads

System performance and stability may be affected by starvation and deadlock, which are two critical concerns in operating systems.

 

Starvation occurs when a process is continually refused the resources it needs to execute. Resource allocation policies often lead to this situation where some processes are favored over others. For example, low-priority processes may starve if high-priority processes perpetually demand and receive resources in a priority-based scheduling algorithm. This may result in resource utilization that is unfair and inefficient.

 

Conversely, deadlock is the state of affairs whereby two or more processes are unable to proceed with their execution since they are each waiting for a resource held by another process from the same set. This results into circular dependency: Process A waits for a resource that Process B holds while at the same time Process B waits for a resource that Process A holds. Deadlock can destroy an entire system as it could make processes hang indefinitely if not properly managed.

 

There are various strategies that can be employed to mitigate both starvation and deadlock:

 

Starvation: Fairness policies should be established so as to guarantee all the processes equal opportunities to access resources. In this regard, techniques such as aging can increase priority of processes that have been waiting for long thus reducing chances of starvation.


Comments ()


Sign in

Read Next

note taker app

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Data Visualization

Blog banner

Life lesson

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Functions Of Operating Systems

Blog banner

Texting is actually better than talking in person

Blog banner

Operating system

Blog banner

Deadlock Prevention

Blog banner

Recipe of Paneer Butter Masala

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Scala - a programming tool

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Developments in Modern Operating Systems

Blog banner

Virtual memory in Operating System

Blog banner

Smartsheet

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Operating system evolution

Blog banner

Importance Of Yoga.

Blog banner

File management In Operating System

Blog banner

Friendship

Blog banner

What is Spyware? and examples of them.

Blog banner

Buffer overflow

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

 " Healing of Yoga "

Blog banner

Proof-of-Stake (PoS)

Blog banner

CRISP-DM Methodology

Blog banner

Modern operating system

Blog banner

The Features of Blockchain

Blog banner

Different types of scam frauds

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Developments in Modern Operating Systems

Blog banner

What is Spyware?

Blog banner

In the world of Technology...

Blog banner

Hey Aryan here

Blog banner

Security Issues and Countermeasures

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner