Implement a framework for cpu scheduling

Assignment Help Operating System
Reference no: EM13685320

Problem Statement:

You will implement a framework for CPU scheduling with three scheduling algorithms: FIFO, round robin, and shortest job first (SJF). Jobs arrive at the CPU scheduler at arbitrary times. When a job arrives, its computation time is known. Assume that all jobs involve only computation, and perform no Input/Output. Jobs thus need to run on the CPU for a total duration equal to their known computation times. When they complete, they leave the system.

Brief descriptions of three algorithms

FIFO

Jobs are processed on a first-in-first-out basis.

Round-robin time-slicing

Pick head of queue, run a job for a time quantum, preempt it, run the next one and so on. A new job goes at the tail of the queue and so does a preempted one. If a new job arrives at the same time as a time quantum completes, the new job goes at the end of the queue.

Shortest Job First - Preemptive version (Shortest Remaining Time First) If there is more than one job, select the one with the shortest execution time. If a new job has shorter REMAINING time, preempt current job and switch to new one.

Solution Specification:

The input to your program will be a file containing job IDs with their arrival times and required computation times.

Input Format

The input command line format should be as follows (where sched is the name of your executable):

sched [-v] -[Rk|S|F] <filename>

Where the command-line flag:

- R is round robin, k is an integer specifying the time-slice

- S is shortest job first

- F is FIFO

- The -v option indicates a verbose output mode (i.e. more information is displayed)

- <filename> is the name of the input file whose format is described below 

You should submit a write-up as well as your program. Your write-up should include any known bugs, limitations, and assumptions in your program. This wirte-up should be in text-format and titled as ‘README'. It should be submitted along with your code. TA will use the ‘README' file to compile (or install) and run your program. If the TA has trouble with your program then he will contact you to makeup it.

Reference no: EM13685320

Questions Cloud

Graph a market with tax where firms pay the majority of tax : Graph a market with a tax where firms pay the majority of the tax. Graph the long run equilibrium for perfect competition. Using a similar average cost curve, graph the long run equilibrium for monopolistic competition. Compare the results.
Find the force : Find the force
A link between air pollution and autism : Find any information about a link between air pollution and autism and write a paper based on your information. News-press, peer-revised, etc. any sources
What will be the pattern of trade between two country : There are two countries (US, Mexico) producing two goods (Ipads (I), Jeans (J)). Suppose I is relatively capital intensive in production and the Mexico is relatively capital abundant. What will be the pattern of trade between the US and Mexico? Which..
Implement a framework for cpu scheduling : You will implement a framework for CPU scheduling with three scheduling algorithms: FIFO, round robin, and shortest job first (SJF). Jobs arrive at the CPU scheduler at arbitrary times.
Capital intensity of production in the labor intensive good : In the Heckscher-Ohlin model, after opening up to trade, presume a country exports a capital intensive good. What happened to the capital intensity of production in the capital intensive good? What happened to the capital intensity of production in t..
Monopolistically competitive-monopoly and oligopoly : Describe why in competitive markets there can be profit or producer surplus in the short run but not the long run. Include the idea of "economic rent" for exceptionally productive inputs. Then imagine a firm with the same cost structure but in each o..
Choose two brands of shampoo : Choose two brands of shampoo.
Marketing strategy : Marketing Strategy

Reviews

Write a Review

Operating System Questions & Answers

  Explanation of it networks

While there are difficult security concerns in any isolated computing environment, addition of a network in geographically distributed facilities.

  Difference between an exclusive lock and a shared lock

Describe the difference between an exclusive lock and a shared lock. Define deadlock and how can it be avoided? How can it be resolved once it occurs?

  Combining voice, video and data communications

Discuss the advantages and disadvantages to combining voice, video, and data communications into one interface such as Skype.

  Minimum and maximum size of an ethernet frame in bytes

Determine the minimum size and Maximum size of an Ethernet frame, in bytes?

  How many page faults are generated using lru replacement

How many page faults are generated by the following arrayinitialization loops, using LRU replacement, and assuming page frame 1 has the process in it, and the other two are initially empty.

  Solving operating system problem

Assume a time sharing operating system allocated time slices of twenty milliseconds and the machine executed an average of 5000 instructions per microsecond.

  Concept and process of data binding

Describe the idea and process of Data Binding. Include an example of statements that would be used to create a Binding object. Describe components and effects of your model statement.

  Explain type of damage the computer infections can do

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Question about about telecommunications

Think about a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk in each end office and the intermediate switch.

  Explain how a race condition is possible

the wife calls deposit (). Describe how a race condition is possible and what might be done to prevent the race condition from occurring.

  Design several security awareness posters

With the help of graphics program, design many security awareness posters on the following themes, updating antivirus signatures, watching out for e-mail viruses.

  Analyzing inter process communication

Technology and techniques for inter process communication within a DIS have evolved considerably in current years. Please critically analyze the CORBA, DCE, SOAP and SOCKETS

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd