what is Shortest-Remaining-Time (SRT) Scheduling?, Basic Computer Science

• The SRT is the preemptive complement of SJF and helpful in time-sharing environment.
• In SRT scheduling, the process with the least estimated run-time to completion is run next, counting new arrivals.
• In SJF scheme, once a job begins executing, it run to end.
• In SJF scheme, a running progression may be preempted by a new arrival process with shortest predictable run-time.
• The algorithm SRT has higher transparency than its counterpart SJF.
• The SRT must keep track of the beyond time of the running process and must grip occasional preemptions.
• In this scheme, advent of small processes will run almost without delay. on the other hand, longer jobs have even longer mean waiting time.
Posted Date: 5/2/2012 8:35:44 AM | Location : United States







Related Discussions:- what is Shortest-Remaining-Time (SRT) Scheduling?, Assignment Help, Ask Question on what is Shortest-Remaining-Time (SRT) Scheduling?, Get Answer, Expert's Help, what is Shortest-Remaining-Time (SRT) Scheduling? Discussions

Write discussion on what is Shortest-Remaining-Time (SRT) Scheduling?
Your posts are moderated
Related Questions
Question 1 Explain different functions of an operating system. Explain the evolution of operating systems Question 2 Explain process creation and process termination Ques


What is meant by the terms 'row-major order' and 'column-major order'? Ans: (i) Storing the array column by column is called as column-major order and storing the array row by

QUESTION (a) Explain what is RMI? (b) Draw a diagram showing the different parts of the Java RMI architecture. (c) What is the function of the RMI security manager and RM

Q: HOW DO YOU CODE -- WITHOUT USING ARRAYS OR SPLIT FUNCTIONS -- TO SEPARATE COMMA SEPARATE NUMBER VALUES AND THEN SUM TO TOTAL? I.E., USING SUBSTRING AND INDEXOF. I''ve been try

The first report, Report #1, is to be an ordered list of the contents of the database, sorted in ascending order by a major field. Report #1 is to include all of the fields and rec

QUESTION (a) Distinguish between passive and active attacks. (b) Give two reasons why it is important to organise security awareness programs for users. (c) Explain how s

Each Many to Many relationship type maps into the Table. The primary key of this relevant is the combination of the primary keys of the participating entity types. These are also c

THE FOURTH GENERATION (1975 ONWARDS) This generation of computers have one or more of the following characteristics:     Semi-conductor memory instead of core memo

which one of the following is a valid identifier