Placement algorithm - process allocation, Computer Engineering

Placement algorithm - computer architecture:

Different strategies can be taken as to how space is allocated to processes:

  • First fit: Allocate the first hole that is large enough. Searching may begin either at the starting of the set of holes or where the previous first-fit search ended.
  • Best fit: Allocate the shortest hole that is large enough. The whole list of holes must be searched unless it is sorted by size. This strategy generated the smallest leftover hole.
  • Worst fit: Allocate the biggest hole. On the contrary, this strategy aims to generate the largest leftover hole, which can be large enough to hold another process. Experiments have shown that first fit and best fit both are better than worst fit in terms of storage utilization and decreasing time

341_Placement algorithm.png

Posted Date: 10/13/2012 5:52:31 AM | Location : United States







Related Discussions:- Placement algorithm - process allocation, Assignment Help, Ask Question on Placement algorithm - process allocation, Get Answer, Expert's Help, Placement algorithm - process allocation Discussions

Write discussion on Placement algorithm - process allocation
Your posts are moderated
Related Questions
(a) How does a data cache take advantage of spatial locality? Give an suitable example. (b) What are the basic differences between a write-allocate and no-write-allocate po

A minterm is an AND expression involving all input variables in either inverted or non-inverted form.For one particular row the associated mintermis the only minterm which equals l

Assembly directives and pseudo-ops: Assembly directives are which instructions that executed by the assembler at assembly time, not by the CPU at run time. They can build the

Which is more efficient, a switch statement or an if else chain? Ans) The differences, if any, are likely to be small. The switch statement was designed to be efficiently impl

What is EDI (Electronic Data Interchange)? EDI: Electronic Data Interchange (EDI) is used by organizations for transactions that happen on regular basis to a pre-determined for

Multi-Layer Network Architectures: As we considered we saw in the previous lecture that perceptrons have limited scope in the type of concepts that they can learn - but they c

Q. A. Which gates are called Universal Gates? Why? B. State and prove any one of the DeMorgen's Laws. Show that these theorems can be extended up to any number of variables.

Objectives After examining this unit, learner's will be able to understand discuss the importance and needs of interconnection network; explain the part of interconn

Define Terminal symbols? Terminal symbols: These are literal strings forming the input of a formal grammar and can't be broken down in slighter units without losing literal m

Explain about the Microsoft and the Netscape With the increasing competition between certain vendors especially the Microsoft and the Netscape, there have been a number of chan