Differentiate Preemptive and Nonpreemptive Scheduling?, Basic Computer Science

The Scheduling algorithms can be divided into two parts with respect to how they deal with clock interrupts.
1) Nonpreemptive Scheduling:
A scheduling discipline is no preemptive if, once a process has been given the CPU, the CPU cannot be taken away from that process.
Following are some characteristics of nonpreemptive scheduling

a) In nonpreemptive system, short jobs are produced to wait by longer jobs but the complete treatment of all processes is fair.
b) In nonpreemptive system, response times are more expected because incoming high priority jobs cannot relocate waiting jobs.
c) In nonpreemptive scheduling, a scheduler executes jobs in the following two conditions.
o When a process switches from running condition to the waiting state.
o When a process come to an end.

2) Preemptive Scheduling:
A scheduling regulation is preemptive if, one time a process has been given the CPU can taken away.

The policy of allowing processes that are logically run able to be for now suspended is called Preemptive Scheduling and it is contrast to the "run to completion" technique.
Posted Date: 5/2/2012 7:59:05 AM | Location : United States







Related Discussions:- Differentiate Preemptive and Nonpreemptive Scheduling?, Assignment Help, Ask Question on Differentiate Preemptive and Nonpreemptive Scheduling?, Get Answer, Expert's Help, Differentiate Preemptive and Nonpreemptive Scheduling? Discussions

Write discussion on Differentiate Preemptive and Nonpreemptive Scheduling?
Your posts are moderated
Related Questions
Bidirectional Search-Artificial intelligence: We've concentrated so far on searches where the point of the search is to search a solution, not the path to the solution. In anot

what is the computer science

Example of flowcharting: Example Problem statement: To find out whether a given number is even or odd. Algorithm: Step 1 Start Step 2 INPUT the number n  Step 3

TELECOMMUNICATIONS STANDARDS: They are defined internationally by the CCITT (Consultative Committee for International Telegraphy and Telephones), but to deal with the rapidly

They are particular register instructions. They are used to load bytes or sequences of bytes onto a register. LODS (LODSB) (LODSW) LAHF LDS LEA LES LODS (LODSB) (LODSW) INSTRUCTION

classify computer system according to capacity. how they are different from computer according to the classification of technology.provide the comparative study also.

THE FIRST GENERATION (1949-1955) The computers in this generation have the following characteristics:     Physically large in size     Inflexible in operations

#question.a tree has 0 off springs at each node. if it had a label L, what will be the maximum number of nodes that the tree can have. only an expression involving the number of no

An IP address consists of 4 contiguous octets and is generally written in Dotted Decimal Notation in the form: A.B.C.D Where: A represents the most significant octet, D the leas

is there any oppurtunity for a mca to teach mcasubjects online