Give the example of first come first served scheduling, Computer Engineering

Assignment Help:

Consider  the  following set of jobs with  their  arrival  times,  execution  time  (in minutes), and deadlines.

Job Ids

Arrival Time

Execution time

Deadline

1

0

5

5

2

1

15

25

3

3

12

10

4

7

25

50

5

10

5

12

Calculate the mean turn-around time, the mean weighted turn-around time and the throughput for FCFS

Chart for First Come First Served scheduling (FCFS)

1

2

3

4

5

0       5                                     20                       32                                                                           57    62

Turnaround time = Terminated time - Arrival time i.e. T =  Tr - Ta

Therefore, turnaround time for different jobs is

For job 1, T1 = 5-0=5 unit time

For job 2, T2 = 20-1=19 unit time

For job 3, T3 = 32-3=29 unit time

For job 4, T4 = 57-7=50 unit time

For job 5, T5 = 62-10=52 unit time

Mean turnaround time, Tm = (T1+T2+T3+T4+T5)/5= 155/5=31 unit time/job

Throughput= no of process completed per unit time= 5/62= 0.081 jobs/unit time


Related Discussions:- Give the example of first come first served scheduling

When one speech sample appears in time multiplexed system, In a time multip...

In a time multiplexed space switching system, one speech sample appears every? One speech sample shows every 125 micro sec, in a time multiplexed space switching system.

Priority interrupt and synchronous bus, What is a Priority Interrupt? A...

What is a Priority Interrupt? Ans: A priority interrupt is a type of interrupt that establishes a priority over the many sources to determine which condition is to be serviced

Interaction design, This unit introduces the most important ID terminology,...

This unit introduces the most important ID terminology, explains why ID is important, and gives a description of the main ID activities and the characteristics of the ID process. I

Voice identifier - biometric computer security systems, Voice Identifier - ...

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

Internal conditioning, types of internal conditioning with explanations and...

types of internal conditioning with explanations and examples

more data items and methods, Create a class called ticket that records the...

Create a class called ticket that records the information of a performance ticket.The class should include at least six data items: performanceId, seatRow, seatNo, class, price, da

List factors that determine the storage device performance, List the factor...

List the factors that determine the storage device performance. i.Access time ii.Cycle time iii.Transfer Rate.

How to copy several files in one stroke, Q. How to copy several files in on...

Q. How to copy several files in one stroke? The COPY command can also be used to copy several files in one stroke by using wildcards. For example, consider the following comman

Determine the begin - end keywords, Determine the begin - end keywords ...

Determine the begin - end keywords Group several statements together. Cause the statements to be evaluated sequentially (one at a time) -> Any timing within sequential group

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd