Explain policies for process scheduling, Computer Engineering

Assignment Help:

Explain any three policies for process scheduling that uses resource consumption information.

All three policies for process scheduling are explained below in brief:

1. First-come First-served (FCFS) (FIFO)

- Jobs are scheduled in order of coming

- Nonpreemptive

  • Problem:

- Average waiting time can be huge if small jobs wait behind long ones

- May cause poor overlap of I/O and CPU and convoy consequences

2. Shortest Job First (SJF)

- Select the job with the shortest next CPU burst

-For minimizing average waiting time provably optimal

  • Problem:

- Not possible knowing the length of the next CPU burst

3. Round Robin (RR)

- Frequently used for timesharing

- Ready queue is function as a circular queue (FIFO)

- Each process is specified a time slice termed as a quantum

- This is run for the quantum or till it blocks

- RR allocates the CPU uniformly or fairly across each participant. If average queue length is n, all participants get 1/n

- Since the time quantum grows, RR becomes FCFS

- Smaller quanta are usually desirable, since they improve response time

  • Problem:

- Context-switch over-head of frequent context-switch


Related Discussions:- Explain policies for process scheduling

Digital Design, Design a serial 2’s complementer with a shift register and ...

Design a serial 2’s complementer with a shift register and a flip-flop

Advantages on electronic payment system, Advantages on electronic payment s...

Advantages on electronic payment system It gives good security schemes.  Four necessary security requirements for safe e-payments are Authentication, Encryption, Integrity,

Define congestion, Define Congestion. Congestion: This is uneconomic ...

Define Congestion. Congestion: This is uneconomic to give sufficient equipment to carry all the traffic which could possibly be offered to a telecommunication system. Inside

Simplify using k-map, Q. Simplify Using K-Map 1. M2 + M3 + M5 + M7 + M1...

Q. Simplify Using K-Map 1. M2 + M3 + M5 + M7 + M12 + M13 + M8 + M9 2. M0 + M2 + M4 + M5 + M8 + M10 + M12 3. F(W,X,Y,Z) = ∑ (0,1,2,4,5,6,8,9,12,13,14)

Differentiate memory mapped and isolated i/o, Q. Explain how does CPU perf...

Q. Explain how does CPU perform Read and Write operation on peripheral device taking suitable example in case of Asynchronous Technique. Differentiate Memory mapped and Isolated

Direct mapped strategy, Determine the layout of the specified cache for a C...

Determine the layout of the specified cache for a CPU that can address 1G x 32  of memory.  show the layout of the bits per cache location and the total number of locations.  a)

Incorporate exception handling, Assignment (to be published later) will req...

Assignment (to be published later) will require you to extend the menu-driven application developed in Assignment 2B, to incorporate the recording details of the doctors who will b

Difference between shadow and override in programming, Overriding tell us o...

Overriding tell us only the methods, but shadowing tells us the entire element.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd