Arandom seed, the name of the algorithm to use

Assignment Help Basic Computer Science
Reference no: EM13936413

In this project you will write a short-term scheduler and observe its properties. It will work as follows:
1. The scheduler will run in a single process, with simulated jobs.
2. You will implement a scheduler of SRT.
3. SRT will use burst time.
4. The program will take three arguments, a random seed, the name of the algorithm to use, and the length of time to run (in milliseconds)
5. You will simulate the clock interrupt with an alarm signal handler and setitimer(). See the example in the code (see below).
6. All I/O requests will be handled in 40 milliseconds. That is, when a job is blocked and removed from the ready queue, it can be added back at the next opportunity if 40 milliseconds have expired. You do not need to schedule a timer to simulate the I/O interrupt, just handle it when you do the clock interrupt. This way, all events happen in the alarm handler and you can deal with them in one place.
7. When a job completes, you will print out the following information:
a) Arrival time
b) Completion time
c) Service time
d) Turnaround time

Reference no: EM13936413

Questions Cloud

Follow ieee or acm paper templates : 5 Pages or more, IEEE format for the paper, Try to have a suitable Title for the IEEE paper according to requirements. Make sure you include the OS listed plus the "others" Also, that all the 40 citations should be in the paper referenced. (5 onli..
What is the hedge ratio for the given transaction : You have a long position in Stock 1 and would like to hedge it using a three-month futures contract on Stock 2. A series of daily prices is provided below. What is the hedge ratio for this  transaction?
New emerging technology and its unique selling proposition : Give a detailed information on the new emerging technology and its unique selling proposition (USP). This should be supported by relevant research.
How did supreme court analyze foley implied contract claim : Why did the Supreme Court find that Foley was not able to establish his tort claim, and how was Foley's claim different from the claims in the Petermann andTameny cases? How did the Supreme Court analyze Foley's implied contract claim, and why did ..
Arandom seed, the name of the algorithm to use : All I/O requests will be handled in 40 milliseconds. That is, when a job is blocked and removed from the ready queue, it can be added back at the next opportunity if 40 milliseconds have expired. You do not need to schedule a timer to simulate the..
Effect of fragmentation and of compacting memory : Its a programming code, so as discussed its program source code, and all the working will be shown with the program running.In this exercise, we simulate a memory allocation (we just want to see the effect of fragmentation and of compacting memory..
Appropriate marketing terminology and concepts : Discuss and analyse the stories using appropriate marketing terminology and concepts, and applying marketing frameworks, tools etc. if/where relevant. The analysis should be your own, not simply reproducing analysis contained within the news stori..
Write appropriate mutator functions that store values : A default constructor that assigns empty strings ("") to the name, department, and position member variables, and 0 to the idNumber member variable.
Create a complete alternative css style : The topic of your site can be any of your choosing. Pick something you have an active interest in, a hobby, a sport you play, a group or club you belong to, or any similar topic. Once you have selected your topic YOU MUST CONFIRM THIS WITH YOUR TU..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Impacts on society due to technological innovation

What are the some of the negative impacts on society due to technological innovation? How would you answer critics of improved technology who cite these negative impacts?

  Give an example each of following it relates saving account

If savings account is a class, give an example of each of the following as it relates to that savings account.

  Which of the following file formats can store macros

Which of the following file formats can store macros

  Whats the difference between public, private and protected

What's the difference between public, private and protected?

  Discuss the typical security vulnerabilities

Discuss the typical security vulnerabilities at each IB software and hardware level.

  Influence or change users relationship with information

How does the technology of information feed influence or change users' relationship with information?

  What is the goal of information systems planning?

What is the goal of information systems planning? What are the steps of the traditional systems development life cycle? What is prototyping? What is an RFP? What is typically included in one? How is it used?

  Explain the characteristics of value-type variables

Briefly explain the characteristics of value-type variables that are supported in the C# programming language.

  What is the recommended overlap of wap coverage

What is the recommended overlap of WAP coverage and why?

  Explaining minor or major virus threats

Write down two recent virus threats, are they minor or major threats? What software would you utilize to remove these threats?

  Sum-of-products representation

Run the program using step mode. Put the code inrto the online assignment area. Also indicate the new contents of the register affected by each instruction. For this you need to use the step mode.

  Which of the following describes a technology

Which of the following describes a technology that delivers electrical power via Ethernet ports? Please select all that apply.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd