Explain process scheduling in time sharing, Operating System

Assignment Help:

Explain process scheduling in time sharing

The relevant features of time sharing are:

1.      Process priorities do not depend on the nature of the processes

2.      Processes are scheduled in  the Round Robin manner

3.      A running process is pre-empt when its time slice elapses

4.      Processes perhaps swapped out of memory

 

927_process scheduling in time sharing.png

 

A repercussion of the round robin scheduling is that the priority of a process changes dynamically during its life time. It is the uppermost priority process when it is scheduled. It becomes the lowest priority process while it finishes its time slice or when it is blocked because of an IO request. Its efficient priority increases with time as it waits for the CPU

The action of the time sharing scheduler perhaps summarized as follows:

1.      The scheduler maintains 2 different PCB lists- one for ready processes and another for blocked and swapped out processes

2.      The PCB list for ready processes is prepared as a queue

3.      The PCB of a newly created process is able to be added to the end of the ready queue

4.      The PCB of a terminating process is able to be simply removed from the system

5.      The scheduler always selects the PCB on the head of the ready queue

6.      When a running process complete its time slice or makes an IO request its PCB is removed from the ready queue to the blocked/swapped-out list

7.      When the IO operation anticipated by a process finishes its PCB is moved from the blocked/swapped out list to the end of the ready queue


Related Discussions:- Explain process scheduling in time sharing

Define the properties of batch operating systems, Define the properties ope...

Define the properties operating systems: Batch :- Jobs with similar needs are batched together and  run through the computer as a group by an operator or automatic job sequenc

List antivirus techniques used for protection purposes, Question: a) Th...

Question: a) There are main goals of data security. List them and elaborate on how they provide protection. b) Describe threats associated with data security. c) Describe

Batch oriented and interactive operating system., properies of Batch orient...

properies of Batch oriented and interactive operating system.

What is the translation look aside buffer (tlb), Translation Look aside Buf...

Translation Look aside Buffer In a cached system, the base addresses of the last few indexed pages is maintained in registers named the TLB that adds in faster lookup. TLB has

Difference between two tier and three tier architectures, Question: a) ...

Question: a) Illustrate with the help of a diagram, the difference between two tier and three tier architectures. b) Explain in what kind of environment, a peer to peer envi

Bind a real-time thread to an lwp, Q. Suppose an operating system maps user...

Q. Suppose an operating system maps user-level threads to the kernel utilizing the many-to-many model where the mapping is done through the use of LWPs. In addition the system allo

What is internal fragmentation?, What is internal fragmentation? Consid...

What is internal fragmentation? Consider holes of 20k assume the process requests 18 bites. If we allocate accurately the request block, we are left with a hole of 2k. The over

What are the operations of processes, What are the operations of processes?...

What are the operations of processes? Process creation A process may create several new processes. The creating process is called as parent process, where as the new proce

Multiprogramming, what are the main advantages of multiprogramming

what are the main advantages of multiprogramming

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd