Class that implements an fcfs schedule

Assignment Help Basic Computer Science
Reference no: EM13923662

Do a FCFS scheduler with 5 IO bound threads (1 class) and 5 processor bound threads (another class).

a) The IO bound class will be a thread class that runs an IO intensive operation.  You can write to the system out a number of times (ie 1000) or do something like read and write a file.

b) The processor bound class will be a thread class that runs a computationally intensive operation.  You can perform some math computation a number of times. No IO in the loop.

c) Create a controller class that implements an FCFS schedule and instantiates 5 objects of each class and runs each object.

2) Take the start and stop time for each thread and print out the time it takes to run.

3) Take the start and stop time to schedule and run all the threads and print out the time to run.

4) Run the program 3 times.

a) First time intersperse the IO bound and computationally intensive operations (call the start method).

b) Second time run the IO bound threads first and the processor bound second.

c) Third time run the processor bound threads first and the IO bound second.

5) Attach your code as well as a document.  The document should include snapshots (enough to demonstrate it ran) of the running code as well as results in spreadsheet form.  Results should also list the wait time for each thread.  Also calculate for each of the 3 scenarios the average wait time for the IO bound threads, processor bound threads and the overall run time for all of the threads.  Include a lessons learned contrasting how the Java environment handled the 3 scenarios.  

6) Code should follow standard practices with good commenting, variable and method names, and good formatting.

Reference no: EM13923662

Questions Cloud

Information storage in the primitive cell : Could RNA have been the original site of information storage in the primitive cell? A difficult problem with this possibility is that
Simple progressive income tax-standard deduction : Assume that there is a very simple progressive income tax in the country. The marginal tax rate is 10% for income over $5000 to $10,000. It is 20% for income over $10,000 to $25,000, and it is 30% for income over $25,000. How would your answer in par..
The distribution and parameter(s) of y : A recent survey indicated that 48% of mobile devices are iPhones. To see if this seemed to be true of Purdue's campus, you randomly ask 10 people if they use an iPhone. Assume all individuals on campus are independent, let Y be the number of peopl..
Major limitation in all real natural populations : A major limitation in all real natural populations that prevents the potential power of directional selection from being demonstrated: real nature populations
Class that implements an fcfs schedule : Create a controller class that implements an FCFS schedule and instantiates 5 objects of each class and runs each object. Take the start and stop time for each thread and print out the time it takes to run.
Case study-toyota prius marketing strategies : Analyzing a company through the help of given case study to narrow the scope for them. This assignment gives the opportunity to students to investigate new area of study totally related to consumer behavior theories but happened in the real life a..
What is the nominal annual breakeven rate : Stanovich Enterprises has 10-year, 12.0% semiannual coupon bonds outstanding. Each bond is now eligible to be called at a call price of $1,060. If the bonds are called, the company must replace them with new 10-year bonds. The flotation cost of issui..
Find an example of an actual corporate code of ethics : Perform an Internet search and find an example of an actual corporate code of ethics. Based on your understanding of the code of ethics, critique it from the perspective that it stipulates the firm's commitment to operate every facet of the business ..
Members of species globigerina bulloides : All members of species Globigerina bulloides belong to the large "Group" known as

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Analyze use of digital signatures to validate device drivers

Analyze the use of digital signatures to validate device drivers. Describe a situation where it is necessary to bypass this protection. Justify your response.

  Benefits of binary file called registry

Write down the benefits and disadvantages of configuration in binary file called registry.

  Two electric charges in microcoulomb

Write a program force.c that asks the user for two electric charges in microCoulomb (µC) and their distance in centimeters (cm), and calculates the electric force between them in Newtons (N) using Coulomb's law:F = k ·q1 ∗ q2/r ∗ r,where k = 89.8755 ..

  Developing a use case diagram

Read "The Spring Breaks 'R' Us Travel Service" of your textbook and identify name of the event, state the type of event and name the resulting use cases. Use the event decomposition technique.

  A desktop support technician for a law firm

A desktop support technician for a law firm with a group of ten legal secretaries

  Draw mind map to show risks and actions and strategies

Draw a mind map to show the risks and the actions and strategies that would ensure the integrity of your data, and the optimisation of a computer.

  Complete the requirements using dbdl

Complete the requirements using DBDL and create Diagram. Make sure all tables are normalized to 3NF and exhibit proper relationships.

  Distinguish between data and information

Distinguish between data and information

  Dependence of bp it organization

The case mentions the dependence of BP's IT organization on external contractors. Why would this be an issue? When is it a good idea for IT departments to hire contractors, and when is it not? Discuss some scenarios.

  While-end repetition structure

Create your own unique While-End  repetition structure. You decide the theme. You should provide both the pseudocode and the flowchart of your example. Be sure to provide an overview of what your repetition structure is doing.Please keep the desig..

  Realize the policy covered before

What are two items that you didn't realize the policy covered before?

  Application patch management

Application Patch Management Select three applications (not operating systems) that you frequently use. How does each of them address patch management? Visit their Web sites to determine facilities they have to alert users to new vulnerabilities

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd