how Round robin scheduling algorithm is useful than others ?, Basic Computer Science

Assignment Help:
Round robin (RR) is one of the simplest, oldest, fairest and most extensively used algorithms.
• In the round robin scheduling, processes are posted in a FIFO manner but are given a limited amount of CPU time known as a time-slice or a quantum.
• If a process does not complete previous to its CPU-time expires, the CPU is preempted and given to the next process waiting in a queue. The preempted process is then positioned at the back of the ready list.
• Round Robin Scheduling is preemptive (at the end of time-slice) consequently it is effective in time-sharing environments in which the system needs to assurance reasonable response times for interactive users.
• The only interesting matter with round robin scheme is the length of the quantum. Putting the quantum too short causes too many context switches and lower the CPU competence. Conversely, setting the quantum too long may cause poor response time and approximates FCFS.
• In any occurrence, the average waiting time under round robin scheduling is often fairly long.

Related Discussions:- how Round robin scheduling algorithm is useful than others ?

Computer architecture, Consider a CPU that implements two parallel fetch-ex...

Consider a CPU that implements two parallel fetch-execute pipelines for superscalar processing. Show the performance improvement over scalar pipeline processing and no-pipeline pro

Briefly explain main parts of the camera, Question 1 Briefly explain main ...

Question 1 Briefly explain main parts of the Camera Question 2 Write a note on: Ripple Edit Tool, Rate Stretch Tool & Track Selection Tool Question 3 What is Pixel

Basic parts of a computers, The basic parts of a computers are shown in Fig...

The basic parts of a computers are shown in Figure.   Input devices such as a keyboard, mouse or scanner are used to enter input (data and/or instructions), directly

Keystroke logger and data-stealing, Keystroke logger and Data-stealing: ...

Keystroke logger and Data-stealing: Keystroke loggers: This is a program, once installed on the system, which intercepts the keys when entering the password or the Credit Ca

Readymade versus custom-made software, READYMADE VERSUS CUSTOM-MADE SOFTWAR...

READYMADE VERSUS CUSTOM-MADE SOFTWARE Nursing care software can be in two forms. Software can be custom-made with the help of a computer programmer, suited for a client with v

Wide area networks and metropolitan area networks, Metropolitan Area Networ...

Metropolitan Area Networks : These type of networks generally cover specific metropolitan area and provide to them all the services.  Wide Area Networks (WANs): Wide Are

Immediate addressing, These addressing modes are: With immediate addressing...

These addressing modes are: With immediate addressing, no lookup of data is essentially required. The data is located in the operands of the instruction itself, not in a different

Java Assignment, Hi? are you conversant with Java that is J2SE 6 coz i have...

Hi? are you conversant with Java that is J2SE 6 coz i have assignments on this area?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd