Explain policies for process scheduling, Computer Engineering

Assignment Help:

Explain any three policies for process scheduling that uses resource consumption information.

All three policies for process scheduling are explained below in brief:

1. First-come First-served (FCFS) (FIFO)

- Jobs are scheduled in order of coming

- Nonpreemptive

  • Problem:

- Average waiting time can be huge if small jobs wait behind long ones

- May cause poor overlap of I/O and CPU and convoy consequences

2. Shortest Job First (SJF)

- Select the job with the shortest next CPU burst

-For minimizing average waiting time provably optimal

  • Problem:

- Not possible knowing the length of the next CPU burst

3. Round Robin (RR)

- Frequently used for timesharing

- Ready queue is function as a circular queue (FIFO)

- Each process is specified a time slice termed as a quantum

- This is run for the quantum or till it blocks

- RR allocates the CPU uniformly or fairly across each participant. If average queue length is n, all participants get 1/n

- Since the time quantum grows, RR becomes FCFS

- Smaller quanta are usually desirable, since they improve response time

  • Problem:

- Context-switch over-head of frequent context-switch


Related Discussions:- Explain policies for process scheduling

++ c, how to find the integral of a function represented by collection of e...

how to find the integral of a function represented by collection of experimental data

What are delay systems in telecommunication networks, What are delay system...

What are delay systems in telecommunication networks? Delay System: A class of telecommunication networks like data a network that places the call or message arrivals in a qu

Displays a message when an applet starts up, Write an applet that sets the ...

Write an applet that sets the background colour to cyan and foreground colour to red and displays a message that illustrates the order in which various applet methods are called wh

Differentiate between protected and real modes of an intel, Differentiate b...

Differentiate between protected and real modes of an Intel microprocessor Operation of Real mode interrupt: When microprocessor completes executing the current instruction, it

Target - data phase, Target abort -computer architecture: Usually, a t...

Target abort -computer architecture: Usually, a target holds DEVSEL# asserted through the final data phase. However, if a target desserts DEVSEL# before disconnecting without

Calculate quantities from information in bayesian network, 1. A Bayesian ne...

1. A Bayesian network is shown for the variables paper Thickness, paper Alignment and Print Quality. The conditional probabilities are provided in the tables beside the nodes. Here

Define word/byte rotation and xor bit masking encryption, Define Word/byte ...

Define Word/byte rotation and XOR bit masking encryption technique to make sure secured transactions on the net? Word/byte rotation and XOR bit masking: In this process t

Explain sr latch with nand gate, Explain SR Latch with NAND Gate? SR La...

Explain SR Latch with NAND Gate? SR Latch has two useful states: Set state, when output Q=1 and Q'=0. Reset state, when output Q=0 and Q'=1.Output Qand Q' are normally

Explain vehicle tracking system, Case Study - A taxi company has 200 taxies...

Case Study - A taxi company has 200 taxies. The company provides its services to all the nine districts in Mauritius, about 20 taxies per district. A taxi is normally attached to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd