wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Starvation and Deadlock.

profile
Naitik Poriya undefined
Jul 05, 2024
0 Likes
0 Discussions
38 Reads

System performance and stability may be affected by starvation and deadlock, which are two critical concerns in operating systems.

 

Starvation occurs when a process is continually refused the resources it needs to execute. Resource allocation policies often lead to this situation where some processes are favored over others. For example, low-priority processes may starve if high-priority processes perpetually demand and receive resources in a priority-based scheduling algorithm. This may result in resource utilization that is unfair and inefficient.

 

Conversely, deadlock is the state of affairs whereby two or more processes are unable to proceed with their execution since they are each waiting for a resource held by another process from the same set. This results into circular dependency: Process A waits for a resource that Process B holds while at the same time Process B waits for a resource that Process A holds. Deadlock can destroy an entire system as it could make processes hang indefinitely if not properly managed.

 

There are various strategies that can be employed to mitigate both starvation and deadlock:

 

Starvation: Fairness policies should be established so as to guarantee all the processes equal opportunities to access resources. In this regard, techniques such as aging can increase priority of processes that have been waiting for long thus reducing chances of starvation.


Comments ()


Sign in

Read Next

Subnet Masking

Blog banner

Deadlock and starvation

Blog banner

Challenges and risks in service operations

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

IT security management

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

How to feel Happy everyday day

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

Virtual Machine

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

"Games and the future"

Blog banner

A Short History of GIS

Blog banner

Human factor, a critical weak point in the information security of an organization’s IOT

Blog banner

DISK SCHEDULING

Blog banner

Data Security must be your Priority!

Blog banner

Memory heirachy (Operating system)

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Data Structures

Blog banner

Assignment 2

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Article on Fresh Book

Blog banner

Khau Galli – Vile Parle

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Why Friendship at Work is Important

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Artificial Intelligence (AI)

Blog banner

Threat management

Blog banner

virtual machine

Blog banner

File management

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

operating system

Blog banner

Memory management

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

HUBSPOT

Blog banner

Data Analytics in Data Science

Blog banner

Vikrant’s first blog

Blog banner

computer security

Blog banner