wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation and Deadlock.

profile
Naitik Poriya undefined
Jul 05, 2024
0 Likes
0 Discussions
38 Reads

System performance and stability may be affected by starvation and deadlock, which are two critical concerns in operating systems.

 

Starvation occurs when a process is continually refused the resources it needs to execute. Resource allocation policies often lead to this situation where some processes are favored over others. For example, low-priority processes may starve if high-priority processes perpetually demand and receive resources in a priority-based scheduling algorithm. This may result in resource utilization that is unfair and inefficient.

 

Conversely, deadlock is the state of affairs whereby two or more processes are unable to proceed with their execution since they are each waiting for a resource held by another process from the same set. This results into circular dependency: Process A waits for a resource that Process B holds while at the same time Process B waits for a resource that Process A holds. Deadlock can destroy an entire system as it could make processes hang indefinitely if not properly managed.

 

There are various strategies that can be employed to mitigate both starvation and deadlock:

 

Starvation: Fairness policies should be established so as to guarantee all the processes equal opportunities to access resources. In this regard, techniques such as aging can increase priority of processes that have been waiting for long thus reducing chances of starvation.


Comments ()


Sign in

Read Next

E-security systems | CCTV

Blog banner

VIRUS

Blog banner

Goa Trip With Friends

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Fault Tolerance

Blog banner

 " Healing of Yoga "

Blog banner

LIFEHACKER

Blog banner

Google classroom

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Python as a tool for data analysis

Blog banner

Music is life

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

FRIENDSHIP

Blog banner

Full Disk Encryption

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Modern Operating system

Blog banner

Creating Digitally Signed Document

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

Amazon

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Service Strategy In ITSM

Blog banner

Benefits and drawback of web security.

Blog banner

Modern operating system

Blog banner

Buffer Overflow

Blog banner

USES OF WHATSAPP

Blog banner

Internet of Things

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Impact of social media on the human life

Blog banner

Models of Information Security.

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

DBMS and various career options related to it.

Blog banner

Deadlock Prevention

Blog banner

What Your Music Taste Reveals About Your Personality

Blog banner