wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation and Deadlock.

profile
Naitik Poriya undefined
Jul 05, 2024
0 Likes
0 Discussions
38 Reads

System performance and stability may be affected by starvation and deadlock, which are two critical concerns in operating systems.

 

Starvation occurs when a process is continually refused the resources it needs to execute. Resource allocation policies often lead to this situation where some processes are favored over others. For example, low-priority processes may starve if high-priority processes perpetually demand and receive resources in a priority-based scheduling algorithm. This may result in resource utilization that is unfair and inefficient.

 

Conversely, deadlock is the state of affairs whereby two or more processes are unable to proceed with their execution since they are each waiting for a resource held by another process from the same set. This results into circular dependency: Process A waits for a resource that Process B holds while at the same time Process B waits for a resource that Process A holds. Deadlock can destroy an entire system as it could make processes hang indefinitely if not properly managed.

 

There are various strategies that can be employed to mitigate both starvation and deadlock:

 

Starvation: Fairness policies should be established so as to guarantee all the processes equal opportunities to access resources. In this regard, techniques such as aging can increase priority of processes that have been waiting for long thus reducing chances of starvation.


Comments ()


Sign in

Read Next

How to setup a professional looking business account on Instagram?

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Supervised and Unsupervised Learning

Blog banner

Memory Management in an Operating System

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Modern operating system

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Constrains in service design

Blog banner

Memory Management - operating system

Blog banner

What is Internet

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Environmental Management using GIS

Blog banner

Data Security must be your Priority!

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Deadlock and Starvation

Blog banner

Note Taker App

Blog banner

Deadlock

Blog banner

Guidelines for a low sodium diet.

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

OPERATING SYSTEM

Blog banner

Raid and levels of raid.

Blog banner

Process Description

Blog banner

I/O buffer and its techniques

Blog banner

Fault tolerance

Blog banner

Power of words

Blog banner

OS Assignment 3

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Linux Memory Management

Blog banner

What is Segmentation?

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

On-Page SEO

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Memory management and virtual memory

Blog banner

Instagram

Blog banner

Smartsheet

Blog banner

Video games

Blog banner

Process Creation

Blog banner