Explain policies for process scheduling, Computer Engineering

Assignment Help:

Explain any three policies for process scheduling that uses resource consumption information.

All three policies for process scheduling are explained below in brief:

1. First-come First-served (FCFS) (FIFO)

- Jobs are scheduled in order of coming

- Nonpreemptive

  • Problem:

- Average waiting time can be huge if small jobs wait behind long ones

- May cause poor overlap of I/O and CPU and convoy consequences

2. Shortest Job First (SJF)

- Select the job with the shortest next CPU burst

-For minimizing average waiting time provably optimal

  • Problem:

- Not possible knowing the length of the next CPU burst

3. Round Robin (RR)

- Frequently used for timesharing

- Ready queue is function as a circular queue (FIFO)

- Each process is specified a time slice termed as a quantum

- This is run for the quantum or till it blocks

- RR allocates the CPU uniformly or fairly across each participant. If average queue length is n, all participants get 1/n

- Since the time quantum grows, RR becomes FCFS

- Smaller quanta are usually desirable, since they improve response time

  • Problem:

- Context-switch over-head of frequent context-switch


Related Discussions:- Explain policies for process scheduling

Illustrate high performance fortran, In 1993 High Performance FORTRAN Forum...

In 1993 High Performance FORTRAN Forum which is a group of academicians and many leading software and hardware vendors in field of parallel processing established an informal langu

Explain normans execution-evaluation cycle model, Question 1: (a) How ...

Question 1: (a) How would you explain human reasoning? (b) Explain the different types of human reasoning? Question 2: (a) What are the computational factors affec

Draw state diagram, Draw the state diagram of a process from its creation t...

Draw the state diagram of a process from its creation to termination, including all transitions, and briefly elaborate every state and every transition. When a process executes

Wireless Networking, Suppose you work in a network security company, and yo...

Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wire

Example to show a single digit, Q. Example to show a single digit ? Dis...

Q. Example to show a single digit ? Displaying a single digit (0 to 9) Presume that a value 5 is stored in BL register then to output BL as ASCII value add character ‘0' to

What are the 2 ieee standards for floating point numbers, What are the 2 IE...

What are the 2 IEEE standards for floating point numbers? 1.single 2.double

How to reduce total amount of disk space in ftp, Q. How to reduce total amo...

Q. How to reduce total amount of disk space in FTP? FTP service compress files to reduce total amount of disk space the files require. Before transferring a file user should te

Explain an intermediate language, Assemblies are made up of IL code modules...

Assemblies are made up of IL code modules and the metadata that explains them. Although programs may be compiled by an IDE or the command line, in fact, they are easily translated

What are the various functional verification methodologies, What are the va...

What are the various functional verification methodologies Ans: TLM (Transaction Level Modelling) Linting RTL Simulation (Environment  involving  :  stimulus  generators,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd