• Title/Summary/Keyword: FCFS

Search Result 62, Processing Time 0.022 seconds

A Review on the CPU Scheduling Algorithms: Comparative Study

  • Ali, Shahad M.;Alshahrani, Razan F.;Hadadi, Amjad H.;Alghamdi, Tahany A.;Almuhsin, Fatimah H.;El-Sharawy, Enas E.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2021
  • CPU is considered the main and most important resource in the computer system. The CPU scheduling is defined as a procedure that determines which process will enter the CPU to be executed, and another process will be waiting for its turn to be performed. CPU management scheduling algorithms are the major service in the operating systems that fulfill the maximum utilization of the CPU. This article aims to review the studies on the CPU scheduling algorithms towards comparing which is the best algorithm. After we conducted a review of the Round Robin, Shortest Job First, First Come First Served, and Priority algorithms, we found that several researchers have suggested various ways to improve CPU optimization criteria through different algorithms to improve the waiting time, response time, and turnaround time but there is no algorithm is better in all criteria.

SLA-Aware Scheduling Scheme for Market-based Computational Grid (마켓 기반 계산 그리드를 위한 SLA 인지형 스케줄링 기법)

  • Han, Young-Joo;Ye, Ren;Youn, Chan-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.220-223
    • /
    • 2011
  • For successfully commercialized grid systems, it is required to provide an efficient scheduling scheme which is able to optimize benefits for three participants such as consumers, brokers, and providers so that every participant has sufficient benefit to maintain a sustainable market. In this paper, we define this job scheduling problem as an objective optimization problem for three participants. The three objectives are to maximize the success rate of job execution, total achieved profit, and the system utilization. To address the scheduling problem, we propose heuristics referred to as SLA-aware scheduling scheme (SA) for optimal resource allocation. The simulation results show that the improvement and the effectiveness of the proposed scheme and the proposed scheme can outperform well-known scheduling schemes such as first come first serve (FCFS), shortest job first (SJF), and earliest deadline first (EDF).

Design and Implementation of a Java-Based WAP Transaction Layer with Priority Policy (자바기반 WAP 상의 우선순위 트랜잭션 계층의 설계 및 구현)

  • 이준규;임경수;안순신
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.244-251
    • /
    • 2003
  • As the Internet and wireless mobile communication is being widespread, the WAP (Wireless Application Protocol) that merges these two technologies has emerged. Also, the research of the WAP gateway that enables efficient processing of multiple user demands concurrently and prompt response to requests from various wireless devices has been performed in many working groups. The WAP stack is the most fundamental technology among these researches. In this paper, we implement the WAP container utilizing the JAVA's multithreading and applying to the connection pooling technique to manage the available resource in the container efficiently. Also, we design and implement the WTP(Wireless Transaction Protocol) layer and the UDP(User Datagram Protocol) layer based on the priority Policy. Our design and implementation showed the shorter waiting time than that of the existing FCFS(First-Come, First-Served) system in the transaction layer and its efficiency was proved through simulation.

Element Correction Method of Thermoluminescent Dosimeters (개인 피폭선량계 소자 보정법)

  • 송명재
    • Progress in Medical Physics
    • /
    • v.2 no.1
    • /
    • pp.17-28
    • /
    • 1991
  • Generally, it is an accurate radiation measurement technique for processors fo thermoluminescent dosimenters(TLDs) to characterize each element they use by producing element correction factors(FCFs). TLDs are classified into three groups such as reference. control, and field TLDs. Reference TLDs are used only for the production of ECFs for the control and field TLDs. They are kept locked in a safe place except when it is necessary to use a subset of them to produce ECFs for the control and field TLDs. The ECF of a given element is a measure of the response of the element relative to the mean response of an arbitrarily selected group of reference elements. As TLDs are used in the field, their relative responses to radiation might be decreased due to muliple readings and physical abuse. Therefore, the producditon of ECFs are performed initially and periodically during the field use. This element correction method provides an excellent tool to examine new TLDs and to monitor the reliability of old TLDs. This paper discuss the 10 step procedures developed to produce and examine ECFs.

  • PDF

Performance Comparison of CDMA and TDMA protocols in radio access system for Integrated Voice/Data Services (음성 및 데이터서비스를 위한 무선접속시스템에서 CDMA와 TDMA방식의 성능비교)

  • 고종하;양영님;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6A
    • /
    • pp.820-831
    • /
    • 1999
  • In this paper, we have compared the performance of a D-TDMA protocol with that of a CDMA protocol, in radio access system for integrated voice/data services.The D-TDMA protocol is based on a generic dynamic channel assignment approach to be followed a combination of “circuit mode” reservation for voice calls, along with dynamic first-come-first served assignment of remaining capacity for data messages. In the CDMA protocol, we have used the voice activity detection to reduce the interface power of other mobiles in internal and external cells, and analyzed the interference power ratio. Also we have computed BER(Bit Error Rate) by using this interference power ratio and evaluated voice blocking probability(voice packet loss probability) and data transmission delay, according to average data length and average data arrival rate.We have found the CDMA protocol achieves comparatively higher performance for short data length, regardless of data arrival rate. Otherwise, the data transmission delay of D-TDMA protocol is shorter than that of the CDMA protocol for long data message.

  • PDF

Resource Request Scheduling for Best Effort Service in Wireless MAN : Performance Analysis (Wireless MAN에서 Best Effort 서비스를 위한 자원 요청 스케줄링 방식의 성능 분석)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.57-60
    • /
    • 2003
  • IEEE 802.16 Wireless MAN standard specifies the air interface of fixed point-to-multipoint broadband wireless access systems providing multiple service. Among the service classes supported by the wireless MAN, the BE class is ranked on the lowest position in priority and is usually deployed by multicast and broadcast polling MAC scheme. In provisioning such BE service, the delay performance is influenced by a number of components including restrictions on resource request per SS, the number of request opportunities in upward frame, scheduling requests at BS, and contention resolution method. As candidate components of MAC function for BE service, we propose single and multiple request schemes (for controling the number of requests per SS), exhaustive and limited request schemes (for regulating the amount of grant per request) and FCFS, H-SMF, pure SMF, SS-wise Round Robin, and pure Round Robin (for scheduling requests at BS). Then, we construct MAC schemes by combining the above components and evaluate the delay performance exhibited by each MAC scheme using a simulation method. From numerical results, we investigate the effect of MAC components on average delay and delay variation and observe the dissonance on collision reduction in a resource - limited environment.

  • PDF

Queue Length Analysis of Discrete-time Queueing System under Workload Control and Single Vacation (일량제어정책과 단수휴가를 갖는 이산시간 대기행렬의 고객수 분석)

  • Lee, Se Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.1
    • /
    • pp.89-99
    • /
    • 2020
  • In this paper, we consider a dyadic server control policy that combines workload control and single vacation. Customer arrives at the system with Bernoulli process, waits until his or her turn, and then receives service on FCFS(First come first served) discipline. If there is no customer to serve in the system, the idle single server spends a vacation of discrete random variable V. If the total service times of the waiting customers at the end of vacation exceeds predetermined workload threshold D, the server starts service immediately, and if the total workload of the system at the end of the vacation is less than or equal to D, the server stands by until the workload exceeds threshold and becomes busy. For the discrete-time Geo/G/1 queueing system operated under this dyadic server control policy, an idle period is analyzed and the steady-state queue length distribution is derived in a form of generating function.

Bandwidth Management of WiMAX Systems and Performance Modeling

  • Li, Yue;He, Jian-Hua;Xing, Weixi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.2
    • /
    • pp.63-81
    • /
    • 2008
  • WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, large service coverage, and flexible quality of services (QoS). Due to the large number of connections and flexible QoS supported by WiMAX, the uplink access in WiMAX networks is very challenging since the medium access control (MAC) protocol must efficiently manage the bandwidth and related channel allocations. In this paper, we propose and investigate a cost-effective WiMAX bandwidth management scheme, named the WiMAX partial sharing scheme (WPSS), in order to provide good QoS while achieving better bandwidth utilization and network throughput. The proposed bandwidth management scheme is compared with a simple but inefficient scheme, named the WiMAX complete sharing scheme (WCPS). A maximum entropy (ME) based analytical model (MEAM) is proposed for the performance evaluation of the two bandwidth management schemes. The reason for using MEAM for the performance evaluation is that MEAM can efficiently model a large-scale system in which the number of stations or connections is generally very high, while the traditional simulation and analytical (e.g., Markov models) approaches cannot perform well due to the high computation complexity. We model the bandwidth management scheme as a queuing network model (QNM) that consists of interacting multiclass queues for different service classes. Closed form expressions for the state and blocking probability distributions are derived for those schemes. Simulation results verify the MEAM numerical results and show that WPSS can significantly improve the network’s performance compared to WCPS.

A dispatching policy for stochastic scheduling simulation considering machine breakdowns (연구연속제조업 일정계획 문제에서 기계고장을 고려한 통계적 시뮬레이션 Dispatching 방법 연구)

  • Ko, Dong-Jin;Lee, Chul-Ung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.181-192
    • /
    • 2010
  • We develop a dispatching policy for stochastic scheduling simulation especially for a continuous manufacturing system with machine breakdowns. The proposed dispatching policy computes an urgency index with the consideration of re-heating, setup cost and remaining due date. Prioritized by the index, we execute swapping or reassigning material sequences so as to minimize the total penalty cost. To evaluate the performance of the proposed policy, a discrete event simulation is developed. With 200 data sets and 20 iterations, we compare the performance of the urgency policy with those of SPT (Shortest Processing Time) and FCFS (First Come First Serve) which are the most common policies. The result shows that the proposed policy consistently gives the lowest total costs by reducing the penalty costs for lateness.

EXECUTION TIME AND POWER CONSUMPTION OPTIMIZATION in FOG COMPUTING ENVIRONMENT

  • Alghamdi, Anwar;Alzahrani, Ahmed;Thayananthan, Vijey
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.137-142
    • /
    • 2021
  • The Internet of Things (IoT) paradigm is at the forefront of present and future research activities. The huge amount of sensing data from IoT devices needing to be processed is increasing dramatically in volume, variety, and velocity. In response, cloud computing was involved in handling the challenges of collecting, storing, and processing jobs. The fog computing technology is a model that is used to support cloud computing by implementing pre-processing jobs close to the end-user for realizing low latency, less power consumption in the cloud side, and high scalability. However, it may be that some resources in fog computing networks are not suitable for some kind of jobs, or the number of requests increases outside capacity. So, it is more efficient to decrease sending jobs to the cloud. Hence some other fog resources are idle, and it is better to be federated rather than forwarding them to the cloud server. Obviously, this issue affects the performance of the fog environment when dealing with big data applications or applications that are sensitive to time processing. This research aims to build a fog topology job scheduling (FTJS) to schedule the incoming jobs which are generated from the IoT devices and discover all available fog nodes with their capabilities. Also, the fog topology job placement algorithm is introduced to deploy jobs into appropriate resources in the network effectively. Finally, by comparing our result with the state-of-art first come first serve (FCFS) scheduling technique, the overall execution time is reduced significantly by approximately 20%, the energy consumption in the cloud side is reduced by 18%.