Comparative Analysis of Various Scheduling Algorithms
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
Scheduling is the technique used for controlling the order of the job which is to be performed by a CPU of a computer. The motive of scheduling is to engage the CPU at its maximum capacity and no process shall wait for longer time and to finish the entire task in minimum possible time. In this paper, we discuss various types of Scheduling algorithms and Compare their performance on terms of throughput and waiting time. First of them is First Come First Served (FCFS) which is a non-preemptive and the simplest scheduling. FCFS is good for long job. Second is Shortest Job First (SJF) scheduling which selects that job first which has least processing time i.e. the processing demanding the less CPU time is executed first. Next is Round Robin (RR) scheduling, it removes the drawbacks of FCFS by preempting running jobs periodically. But if the length of time quantum is too short then more time will waste in context switching. Last one is Priority Based scheduling where each process is assigned a priority (preference) to create the order of execution.
Authors and Affiliations
Lalit Kishor , Dinesh Goyal
A Survey on Access Control of Cloud Data
t-Among the emerging technologies, cloud computing provides a flexible, on-demand computing infrastructure for a number of applications. Cloud computing is about moving computing from the single desktop pc/data c...
An effective Golden Section Search Approach based Distribution Load Flow
Abstract—This paper presents an effective Golden Section Search approach based Distribution Load Flow (DLF) for planning of distributed generators as PQ and/or PV node. The practical distribution system may have diffe...
DESIGN OF WI-FI INTEGRATED SOPHISTICATED METER USING EMBEDDED SYSTEM
Focusing on a recent real time issue Electricity Hacking and malactivities in bill processing, a prototype Impregnable Device for secured metering (IDSM) is designed which consists of a sophisticated meter(SM) differing...
A KNOWLEDGE BASED APPROACH FOR AUTOMATIC DATABASE NORMALIZATION
Normalization is a process of analyzing the given relational schemas based on the functional dependencies and using primary key to achieve minimum data redundancy. Normalization is one of the key issues to be carried out...
Energy efficient and Demand based Topology Maintenance for various network traffic conditions
Due to the nodes’ limited resource in the adhoc networks, the scalability is the crucial for network operation. Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the firs...