wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation and Deadlock.

profile
Naitik Poriya undefined
Jul 05, 2024
0 Likes
0 Discussions
38 Reads

System performance and stability may be affected by starvation and deadlock, which are two critical concerns in operating systems.

 

Starvation occurs when a process is continually refused the resources it needs to execute. Resource allocation policies often lead to this situation where some processes are favored over others. For example, low-priority processes may starve if high-priority processes perpetually demand and receive resources in a priority-based scheduling algorithm. This may result in resource utilization that is unfair and inefficient.

 

Conversely, deadlock is the state of affairs whereby two or more processes are unable to proceed with their execution since they are each waiting for a resource held by another process from the same set. This results into circular dependency: Process A waits for a resource that Process B holds while at the same time Process B waits for a resource that Process A holds. Deadlock can destroy an entire system as it could make processes hang indefinitely if not properly managed.

 

There are various strategies that can be employed to mitigate both starvation and deadlock:

 

Starvation: Fairness policies should be established so as to guarantee all the processes equal opportunities to access resources. In this regard, techniques such as aging can increase priority of processes that have been waiting for long thus reducing chances of starvation.


Comments ()


Sign in

Read Next

Importance of self defence for girls

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Security in Cloud Computing

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

Memory management

Blog banner

Concurrency and memory

Blog banner

Hypothesis Testing in Data Science

Blog banner

Monday. com App

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Email Privacy

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Deadlock

Blog banner

Components of GIS

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Direct Memory Access

Blog banner

INTERRUPTS

Blog banner

Riddhi Miyani 53003220140

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Security Issues and Countermeasures

Blog banner

File system implementation

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

Cryptanalysis tool

Blog banner

Wedding photographer

Blog banner

Deadlock

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

Water Resources are about to exhaust...

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

A BLOG ON MYSQL

Blog banner

Creating Digitally Signed Document

Blog banner

Coping with Diagnosis Shock

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

The functions of operating system

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Question

Blog banner

Memory Management Techniques

Blog banner

Memory hierarchy

Blog banner

Why am I never satisfied with my Life?

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner