Describe Priority Scheduling algorithm of operating system?, Basic Computer Science

Assignment Help:
Priority Scheduling

• The fundamental idea is straightforward: each process is assigned a priority, and priority is permitted to run. Equal-Priority processes are scheduled in FCFS order. The shortest-Job-First (SJF) algorithm is a special case of general priority scheduling algorithm.
• Priority can be defined either internally or outwardly. Internally distinct priorities use some measurable quantities or behaviors to compute priority of a process.
• An SJF algorithm is simply a priority algorithm where the priority is the inverse of the (predicted) next CPU burst. That is, the longer the CPU explodes, the lower the priority and vice versa.
Illustrations of Internal priorities are
• Deadlines.
• Memory necessities.
• CPU Vs I/O necessities.
• File necessities,
for example, number of open files.
Externally distinct priorities are set by criteria that are external to operating system for example:
• The significance of process.
• Kind or amount of funds being rewarded for computer use.
• The division sponsoring the work.
• A preemptive priority algorithm will preemptive the CPU if the priority of the newly arrival process is higher than the priority of the currently running process.
• This scheduling can be either preemptive or non preemptive
• A non-preemptive priority algorithm will simply put the new process at the head of the ready queue.
A major trouble with priority scheduling is indefinite blocking or starvation. A solution to the trouble of indefinite blockage of the low-priority process is aging. Aging is a method of gradually increasing the priority of processes that wait in the system for an extended period of time.

Related Discussions:- Describe Priority Scheduling algorithm of operating system?

What is multi-protocol label switching (mpls), QUESTION (a) What is Mul...

QUESTION (a) What is Multi-Protocol Label Switching (MPLS)? List the main advantage of running MPLS in a service provider network (b) What is a label? Explain the structure

Cryptography, Consider the one-time pad encryption scheme to encrypt a 1-bi...

Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event "message

Spreadsheet software , Spreadsheet Software : Consider the grid in Fig. ...

Spreadsheet Software : Consider the grid in Fig. 9.4. It is split into rows and columns and is a pictorial representation of a typical spreadsheet program.  Figure: Spr

Stub cables, Stub cables: The stub cables are for bi-directional data m...

Stub cables: The stub cables are for bi-directional data movement between LRU and current mode coupler.  The stub cables also supply power from the LRUs to the current couplers

Fourth generation of computers, THE FOURTH GENERATION (1975 ONWARDS) ...

THE FOURTH GENERATION (1975 ONWARDS) This generation of computers have one or more of the following characteristics:     Semi-conductor memory instead of core memo

C++, Write a C++ program that declares three integers and three strings. Th...

Write a C++ program that declares three integers and three strings. The program prompts the user for three characters and three integers and prints them all on one line.

Define Program formation process, For the formation of a program it is nece...

For the formation of a program it is necessary to follow five steps: Design of the algorithm, stage the problem to be solved is reputable and the best solution is proposed, creatin

Digital logic design, Find the complement of the following decimal 7

Find the complement of the following decimal 7

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd