Explain process scheduling in time sharing, Operating System

Assignment Help:

Explain process scheduling in time sharing

The relevant features of time sharing are:

1.      Process priorities do not depend on the nature of the processes

2.      Processes are scheduled in  the Round Robin manner

3.      A running process is pre-empt when its time slice elapses

4.      Processes perhaps swapped out of memory

 

927_process scheduling in time sharing.png

 

A repercussion of the round robin scheduling is that the priority of a process changes dynamically during its life time. It is the uppermost priority process when it is scheduled. It becomes the lowest priority process while it finishes its time slice or when it is blocked because of an IO request. Its efficient priority increases with time as it waits for the CPU

The action of the time sharing scheduler perhaps summarized as follows:

1.      The scheduler maintains 2 different PCB lists- one for ready processes and another for blocked and swapped out processes

2.      The PCB list for ready processes is prepared as a queue

3.      The PCB of a newly created process is able to be added to the end of the ready queue

4.      The PCB of a terminating process is able to be simply removed from the system

5.      The scheduler always selects the PCB on the head of the ready queue

6.      When a running process complete its time slice or makes an IO request its PCB is removed from the ready queue to the blocked/swapped-out list

7.      When the IO operation anticipated by a process finishes its PCB is moved from the blocked/swapped out list to the end of the ready queue


Related Discussions:- Explain process scheduling in time sharing

Define rotational latency and disk bandwidth, Define rotational latency and...

Define rotational latency and disk bandwidth. Rotational latency is the additional time waiting for the disk to rotate the wanted sector to the disk head. The disk bandwidth is

What is segmentation?, What is segmentation? In a segmented memory mana...

What is segmentation? In a segmented memory management scheme a programmer views a program to be collection of program components called as segments. Every segment is a logical

What is meant by the phrase thread-safe, The term thread-safe in computer p...

The term thread-safe in computer programming describes that routine or portion of the program that may be called from multiple programming threads without uncalled for interactions

What is an i/o subsystem?, What is an I/O subsystem? The control of dev...

What is an I/O subsystem? The control of devices connected to the computer is a main issue while designing operating systems. Since I/O devices differ widely in their function

Explain briefly the working of semaphore with example ?, Explain briefly th...

Explain briefly the working of semaphore with example ? The E.W. Dijkstra (1965) abstracted the key idea of mutual exclusion in his concepts of semaphores. Definition A s

Explain about demand paging, Explain about demand paging? A demand pagi...

Explain about demand paging? A demand paging system is same to a paging system with swapping. Processes reside on secondary memory. When we require executing a process, we chan

List disadvantages of using a single directory, List disadvantages of using...

List disadvantages of using a single directory. Users have no privacy. Users must be careful in choosing file names, to avoid names used by others. Users may destroy each othe

Command line interface, College life is tough.  Eating pizza for every meal...

College life is tough.  Eating pizza for every meal is hitting you hard.  You are looking at working out to stay healthy.  You found a web site that tells you how many calories eac

Define race condition, Define race condition. When various process acce...

Define race condition. When various process access and manipulate similar data concurrently, then the outcome of the execution depends on certain order in which the access take

Explain the protection problems, Q. In some systems a subdirectory is able...

Q. In some systems a subdirectory is able to be read and written by an authorized user just as ordinary files can be. a. Explain the protection problems that could arise. b.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd