Explain process scheduling in time sharing, Operating System

Assignment Help:

Explain process scheduling in time sharing

The relevant features of time sharing are:

1.      Process priorities do not depend on the nature of the processes

2.      Processes are scheduled in  the Round Robin manner

3.      A running process is pre-empt when its time slice elapses

4.      Processes perhaps swapped out of memory

 

927_process scheduling in time sharing.png

 

A repercussion of the round robin scheduling is that the priority of a process changes dynamically during its life time. It is the uppermost priority process when it is scheduled. It becomes the lowest priority process while it finishes its time slice or when it is blocked because of an IO request. Its efficient priority increases with time as it waits for the CPU

The action of the time sharing scheduler perhaps summarized as follows:

1.      The scheduler maintains 2 different PCB lists- one for ready processes and another for blocked and swapped out processes

2.      The PCB list for ready processes is prepared as a queue

3.      The PCB of a newly created process is able to be added to the end of the ready queue

4.      The PCB of a terminating process is able to be simply removed from the system

5.      The scheduler always selects the PCB on the head of the ready queue

6.      When a running process complete its time slice or makes an IO request its PCB is removed from the ready queue to the blocked/swapped-out list

7.      When the IO operation anticipated by a process finishes its PCB is moved from the blocked/swapped out list to the end of the ready queue


Related Discussions:- Explain process scheduling in time sharing

What is a buddy system?, What is a buddy system? We are dividing the me...

What is a buddy system? We are dividing the memory as powers of two therefore the division will be 2, 4, 8, 16, 32, 64, 128, 256...i.e. in powers of 2 as well as we are selecti

Explain disk scheduling algorithms-scan, SCAN o Go from the outside to...

SCAN o Go from the outside to the inside servicing requests and after that back from the outside to the inside servicing requests. o Replicate this over and over. o Diminish

Explain the application interaction protocols, Explain the Application Inte...

Explain the Application Interaction Protocols Application interaction protocols are uniquely defined for each program and are used to logically describe the data being passed b

Develop a utility in c programming, Develop a utility in C language which w...

Develop a utility in C language which will run in Linux operating systems to display following properties of the system: ? Processor speed ? Ram size ? Computer name ? System time

Replacement algorithm for tlb, Consider the following C program where M, N,...

Consider the following C program where M, N, K are predefined constants. Assume int is 4 bytes. Suppose this program is run on a machine with 4KB page size and 32 TLB entries. Init

Logic gates, Determine the equation for the y and truth table for the circu...

Determine the equation for the y and truth table for the circuits

Buffer, What is bounded buffer

What is bounded buffer

Compute how many disk input - output operations are required, Q. Consider ...

Q. Consider a file at present consisting of 100 blocks. Presume that the file control block (and the index block in the case of indexed allocation) is already in memory. Compute h

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd