how Round robin scheduling algorithm is useful than others ?, Basic Computer Science

Assignment Help:
Round robin (RR) is one of the simplest, oldest, fairest and most extensively used algorithms.
• In the round robin scheduling, processes are posted in a FIFO manner but are given a limited amount of CPU time known as a time-slice or a quantum.
• If a process does not complete previous to its CPU-time expires, the CPU is preempted and given to the next process waiting in a queue. The preempted process is then positioned at the back of the ready list.
• Round Robin Scheduling is preemptive (at the end of time-slice) consequently it is effective in time-sharing environments in which the system needs to assurance reasonable response times for interactive users.
• The only interesting matter with round robin scheme is the length of the quantum. Putting the quantum too short causes too many context switches and lower the CPU competence. Conversely, setting the quantum too long may cause poor response time and approximates FCFS.
• In any occurrence, the average waiting time under round robin scheduling is often fairly long.

Related Discussions:- how Round robin scheduling algorithm is useful than others ?

Compiler, Compiler A compiler is a special program which transla...

Compiler A compiler is a special program which translates programs written in high level language into machine language. The original program is called the source progra

Convert string to super ascii, A string S is said to be "Super ASCII", if i...

A string S is said to be "Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''''''''a''''''''-'''''''

College management system project, E-R diagram and details for college mana...

E-R diagram and details for college management system

Internet, how to get tamil information in internet

how to get tamil information in internet

Login, Login Because the information on a network is sharable, network...

Login Because the information on a network is sharable, networks are very susceptible to unauthorized intruders. In order to prevent unauthorized access to use the services o

Z80 CPU STATUS FLAGS, function of each status flags Z80 status flags

function of each status flags Z80 status flags

Discuss the objectives of query processing, Question 1 Differentiate betwe...

Question 1 Differentiate between PL/SQL functions and procedures Question 2 Draw the diagram of logical structure of oracle database and explain it in brief Question 3 D

Hypermedia, Hypermedia: When the desired webpage loads into your brows...

Hypermedia: When the desired webpage loads into your browser you will see the text comes in, the pictures arrives, the animation gets loaded and so on. You will notice that so

Software Engineering, You are an engineer involved in the development of a ...

You are an engineer involved in the development of a financial system. During installation, you discover that this system will make a significant number of people redundant. The pe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd