Explain process scheduling in time sharing, Operating System

Assignment Help:

Explain process scheduling in time sharing

The relevant features of time sharing are:

1.      Process priorities do not depend on the nature of the processes

2.      Processes are scheduled in  the Round Robin manner

3.      A running process is pre-empt when its time slice elapses

4.      Processes perhaps swapped out of memory

 

927_process scheduling in time sharing.png

 

A repercussion of the round robin scheduling is that the priority of a process changes dynamically during its life time. It is the uppermost priority process when it is scheduled. It becomes the lowest priority process while it finishes its time slice or when it is blocked because of an IO request. Its efficient priority increases with time as it waits for the CPU

The action of the time sharing scheduler perhaps summarized as follows:

1.      The scheduler maintains 2 different PCB lists- one for ready processes and another for blocked and swapped out processes

2.      The PCB list for ready processes is prepared as a queue

3.      The PCB of a newly created process is able to be added to the end of the ready queue

4.      The PCB of a terminating process is able to be simply removed from the system

5.      The scheduler always selects the PCB on the head of the ready queue

6.      When a running process complete its time slice or makes an IO request its PCB is removed from the ready queue to the blocked/swapped-out list

7.      When the IO operation anticipated by a process finishes its PCB is moved from the blocked/swapped out list to the end of the ready queue


Related Discussions:- Explain process scheduling in time sharing

Explain fifo page replacement, Explain FIFO page replacement A FIFO rep...

Explain FIFO page replacement A FIFO replacement algorithm associates with every page the time when that page was brought into memory. When a page must be changed, the oldest p

What is a semaphore, Question 1: a) State the different file attribute...

Question 1: a) State the different file attributes and briefly explain the operations that can be performed on each files. b) What is a semaphore? Describe why it is impor

Total physical memory and total virtual memory , A practical task specified...

A practical task specified in the Study Guide, Computer architecture, was to record your computer's specifications. Submit the data you recorded, which will contain the following d

Caching name translations for computers, Q. Discuss the advantages as well ...

Q. Discuss the advantages as well as disadvantages of caching name translations for computers located in remote domains. Answer: There is a performance benefit to caching nam

Keeping track of free memory, How do we keep track of where the free pieces...

How do we keep track of where the free pieces of memory are? One idea is to maintain a set of linked-lists of free space; each linked-list will store free chunks of some given size

Define a daemon process , A daemon is a process that removes itself from t...

A daemon is a process that removes itself from the terminal and disconnected, executes, in the background, waiting for requests and responding to them. It may also be described as

Differences between symmetric and asymmetric multiprocessing, Describe the ...

Describe the differences between symmetric and asymmetric multiprocessing. What are three advantages and one disadvantage of multiprocessor systems? Symmetric multiprocessing t

What are kernels and what do kernels do, What are kernels and what do kerne...

What are kernels and what do kernels do? The kernel is a program that comprises the central core of a computer operating   system. It has entire control over everything that

integrator circuit, Referring to Figure below, discuss how you would alter...

Referring to Figure below, discuss how you would alter the circuit to obtain: 1. a straightforward amplifier with gain 1, 2. a straightforward amplifier with gain 10, 3. a

Explain disadvantages of the two-level directory, How do we overcome the di...

How do we overcome the disadvantages of the two-level directory? Give links from one user directory to another, creating path names; system files become available by letting th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd