Explain policies for process scheduling, Computer Engineering

Assignment Help:

Explain any three policies for process scheduling that uses resource consumption information.

All three policies for process scheduling are explained below in brief:

1. First-come First-served (FCFS) (FIFO)

- Jobs are scheduled in order of coming

- Nonpreemptive

  • Problem:

- Average waiting time can be huge if small jobs wait behind long ones

- May cause poor overlap of I/O and CPU and convoy consequences

2. Shortest Job First (SJF)

- Select the job with the shortest next CPU burst

-For minimizing average waiting time provably optimal

  • Problem:

- Not possible knowing the length of the next CPU burst

3. Round Robin (RR)

- Frequently used for timesharing

- Ready queue is function as a circular queue (FIFO)

- Each process is specified a time slice termed as a quantum

- This is run for the quantum or till it blocks

- RR allocates the CPU uniformly or fairly across each participant. If average queue length is n, all participants get 1/n

- Since the time quantum grows, RR becomes FCFS

- Smaller quanta are usually desirable, since they improve response time

  • Problem:

- Context-switch over-head of frequent context-switch


Related Discussions:- Explain policies for process scheduling

Transaction, Explain Shadow Copy Scheme in detail.

Explain Shadow Copy Scheme in detail.

Er diagrams, how can I draw er diagram for sell & storage section of a drug...

how can I draw er diagram for sell & storage section of a drugstore?

Programming , Adavantages and disadvantages of compilers and interpreters

Adavantages and disadvantages of compilers and interpreters

What are the restrictions on subscreens, What are the restrictions on Subsc...

What are the restrictions on Subscreens? Subscreens have various restrictions.  They cannot: Set their own GUI status Have a named OK code Call another screen

How is a valid user identifier accomplished, How is a valid user identifier...

How is a valid user identifier accomplished? A valid user identifier is accomplished within one or more of given ways: • Provide some password, which only user knows. • P

Find traffic offered and lost, Discuss grade of service. During busy hour, ...

Discuss grade of service. During busy hour, 1500 calls were offered to a group of trunks and 8 calls were lost. The average call duration was 120 seconds. Calculate the traffic off

What is winchester technology, What is Winchester technology? The disk ...

What is Winchester technology? The disk and the read/write heads are placed in a sealed air-filtered enclosure known as Winchester technology.

Use of large register file, Generally the register storage is faster than c...

Generally the register storage is faster than cache andmain memory. Also register addressing uses much shorter addresses than addresses for cache and main memory. Though the number

Determine the bit value and bitstrings , Testing Your Program All progr...

Testing Your Program All programs must be thoroughly tested before they are released to users. Create some sample input files of a small size and manually figure out what the o

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd