1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
trasher [3.6K]
3 years ago
9

Consider a system running 10 I/O-bound processes and 2 CPU-bound process. Assume that the I/O-bound processes issue an I/O opera

tion once for every millisecond of CPU computing and that each I/O operation takes 10 milliseconds to complete (we assume that there is no competition among I/O operations). Assume that the CPU-bound processes do not issue any I/O operations. A round-robin scheduler with quantum size 1 milliseconds is used to schedule all these 12 processes together. We assume that the context-switching overhead is 0.1 millisecond and that all processes are long-running tasks. Calculate the CPU utilization. HTML EditorKeyboard Shortcuts
Computers and Technology
1 answer:
Vinil7 [7]3 years ago
8 0

Answer / Explanation:

According to question given at every 1 millisecond,  i/o operation done and it will be completed in 10 ms . so 10 i/o operation have  

Time = 10 * 1 + .1 * 10 = 11ms ...(here 0.1 switching overhead )

cpu task for which we can consider it runs for 10 ms because i/o operation will be completed in 10ms ... (given as all process are long running tasks)  

so if case 1 ... time quantum is 1ms then cpu task takes = 10*1+10*0.1(switching after every 1ms quantum time) = 11ms  

Therefore,

cpu utilization = useful work/ total work

                          = (10 * 1 + 10 * 1) / 11 + 11 =  20/22 =90.90%

case 2 time quantum = 10ms,

so cpu takes = 10*1+1*.1=10.1

cpu utilization = 20/ 11+10.1= 20/ 21.1 = 94.78%

For further clarity,

We could consider the below approach for solving the question.

(a) Time quantum is 1 ms.

Whether a CPU bound or I/O bound process, it switches every one millisecond and when doing so, it incurs a 0.1 ms overhead. Thus, for every 1.1 ms, the CPU is actually utilized only 1 ms. So CPU utilization is 11.1 ∗ 100 = 91%

(b) Time quantum is 10 ms.

Here, there is a difference between CPU bound and I/O bound processes. A CPU bound process can use the full 10 ms time slot, whereas an I/O bound process can have it only for 1 ms because another I/O bound process in the queue will snatch the time from it.

So a CPU bound process takes 10 ms, 10 I/O bound processes would take 10*1 =10ms. So, the CPU would be utilized for a total of 20 ms out of 21.1 ms. (Total time is 10*1.1 + 10.1=21.1ms).

Thus the CPU utilization is 2021.1∗100 = 95%

You might be interested in
What is the importance of internet safety?
bearhunter [10]

Answer:

1. Identity theft

2. Safety for you and your family and personal info

3. Harrasement and bullying prevention

Some things never to share on the internet with strangers...

1. Full name

2. Birthday

3. State or city of home

4. Pictures of yourself

5. Personal info about you or your family members

6. Personal social media links and tags

Explanation:

hOPE THIS HELPS!! I think some people need a reminder of this sometimes! you didnt give any options so i hope this helps you!

7 0
3 years ago
Choose the list of the best uses for word processing software.
coldgirl [10]
Microsoft Word is one that I can think of the top of my head.
5 0
4 years ago
A _____ is a web site that allows users to edit and change its content easily and rapidly.
Ivenika [448]

The web site you are looking for is Wiki, web application that allows users to easily add and edit content on a web page.

7 0
3 years ago
Which of the following will display a string whose address is in the dx register: a.
worty [1.4K]

Answer:

a)

Explanation:

Function 9 of interrupt 21h is display string.

8 0
3 years ago
Hard drives have the largest capacity of any storage device. <br> a. True <br> b. False
VMariaS [17]
It's false as they store way lesser than we think
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is the first stage of perception
    6·2 answers
  • _____ supplement operating system software in ways that increase the security or capabilities of the computer system. firewalls,
    15·1 answer
  • A(n) ____ uses the communication interface to request resources, and the server responds to these requests.
    15·1 answer
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    15·1 answer
  • Saved
    5·1 answer
  • The variable named var2 declared above will include an ending NULL character.
    9·1 answer
  • The market is in <br> until the price of goods reflects equal supply and demand.
    10·1 answer
  • One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malformed se
    6·1 answer
  • What is a key differentiator of Conversational Artificial Intelligence (AI)
    11·1 answer
  • Write a function that takes a list and returns its first element​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!