Fedora :: How To Change CPU Scheduling Algorithm

May 3, 2011

I want to change linux scheduling algorithm for some of my processes but when I click on processes in ksysguard and click renice project, all of the processes use normal level cpu scheduling. Why is it such a thing and there is no priority?

View 2 Replies


ADVERTISEMENT

General :: Kernel Scheduling Algorithm

Sep 8, 2010

is linux kernel is priority preemptive kernel?if it is. where it is using round robin scheduling algorithm?when processes are scheduled for the processor process will be allocated as which sechudling alogorithm?

View 1 Replies View Related

Programming :: Which Is Scheduling Algorithm Which Will Make Thread O?

May 4, 2011

I have a timer thread, and when it expires, it sets a flag. The only problem is, if any higher priority thread comes in between, then the timer is not expired in real time.Thus i want to set a highest priority to my thread. Now, i know 2 algos, which can make my thread in real time are: SCHED_FIFO and SCHED_RR.

So, here are my queries: 1) Which scheduling algo is best suited for this purpose? 2) Is it guaranted to work in real time if i use that algo (you suggest in 1) and set the max_priority by getting the maximum settable priority for that particular algorithm using, int sched_get_priority_max(int policy);

View 2 Replies View Related

Software :: Change The Algorithm Of A Node In Ns2?

Jan 3, 2011

there are 3 nodes..A,B and C. Node A wants to send information to Node B but it does so by sending it to Node C first which then sends to B. And similarly Node B sends to A. In this simultaneously C doesn't send to both A and B. This is the in built algorithm..but i want to change it to: A and B send their packets to C and C sends both these packets to A and B..by ORing... In the receiver side...node A can receive the wanted packet and also B. Where do i change the algorithm?

View 7 Replies View Related

OpenSUSE Network :: Persist TCP Congestion Control Algorithm Change?

Jan 27, 2011

OpenSuSE 11.3 (but this is not likely a distro specific issue)Kernel 2.6.34.7, but likely applies to a number of previousAm close to launching a more extensive webpage describing in detail why and how this configuration is important, but I'm missing up to date information on how to persist the config. By default, changing the TCP Congestion Control algorithm only modifies the current system session. Docs I've read recommend that the command resetting the algorithm be written to Code:/etc/rc.d/rc.dAm confused with all the different config files, but I suspect either an existing file should be modified or an additional file should be modified in

Code:
/etc/rc.d/rc5.d/
Question:

[code]....

View 9 Replies View Related

General :: Installing Ns-2.1b5 In Fedora 14 For Implement Leach Algorithm?

Apr 27, 2011

i am new to ns2, i want to implement leach algorithm(MIT uAMPS) but i am unable to know how to install ns-2.1b5 version for it.but i successfully installed ns2.29 in fedora14.

otherwise please intimate what linux flavour will be suitable for ns-2.1b5

View 2 Replies View Related

Programming :: Implementation Of RSA Algorithm In C / C++

Aug 2, 2010

Can I know the implemention of RSA(Encryption and decryption) algorithm in C / C++.

View 1 Replies View Related

Programming :: MD5 Algorithm Implementation

Apr 27, 2011

I have a copy of the MD5 algorithm and I'm taking a look at the source. It's pretty interesting but there are a few things that I'm curious about and I was wondering if anyone a bit more intuitive than I could help me out.The function declarations in the MD5 files are a bit unfamiliar to me. There is a macro used called PROTO_LIST, which I'm still not sure as to what this thing is doing exactly, but it's littered everywhere throughout the source.The signature here isn't too unfamiliar to me with the exception of the position of the PROTO_LIST macro. So here is a function with an unnamed argument of type MD5_CTX*.To me, this resembles an initializer list found in C++ with constructors but I certainly don't think that is the case here. So my questions about this are (1) how is this legal code in C and (2) what functionality has the PROTO_LIST macro provided for the function?

View 3 Replies View Related

Software :: Best Program To Write Algorithm?

Oct 5, 2010

What would be the best program to write my algorithm, before sending them to my teacher?

View 4 Replies View Related

Ubuntu Security :: Can Make New Algorithm For /etc/shadow

Aug 16, 2011

i use SHA-512 algorithm in the /etc/shadow File But i Want to use my lgorithm ..

how i can remove the sha-512 and use my algoritm ? Because no one can des encrypt it !! He Not Know the algorithm method

View 7 Replies View Related

Software :: Algorithm To Compare Images Via Web Application

Mar 30, 2011

I want some algorithm so that I can compare images via web application, (preferably in python)

View 2 Replies View Related

Programming :: Algorithm For Binary Frequency Search?

Jul 16, 2010

I've got a bit of an obscure question for you to test your brains a wee bit. I'm trying to implement a search program to find areas of high density in a binary string.

E.g.

Code:

[0001001010
0001110001
0000001000
1001000010
0101100100]

Where density is the number of 1's / number of digits with a maximum number of digits being the current number in a buffer (in this example 50). So for the example the density for the whole buffer is 15/50. But the density of Buffer[14..20]=[1110001]=4/7. So if looking for areas of density = 1/3 it would find the longest sequences of density over 1/3.So in the example. Buffer[4..9]=[100101]=3/6=1/2 which is above 1/3 but it is within the Buffer[4..48]=[100101000011100010000001000100100001001011001]=15/45=1/3

View 5 Replies View Related

Programming :: Self Configurable Diagnosis Algorithm / Tcl Script?

Sep 13, 2010

I have an algorithm guys called "Self Configurable Diagnosis Algorithm" but i don't have program for this.help me regarding that program and which type of Tcl script will be better suitable for that.

View 3 Replies View Related

Programming :: Template Algorithm For Std::vector And Std::string?

Sep 8, 2010

I have two functions:

Quote:

void func1(std::string &s)
{
s.clear();
}

[code]....

Is there a way to create one template function for both vector and string that would clear them?

View 4 Replies View Related

Debian Configuration :: How To Encrypt Home Folder Using DES Algorithm

Jan 27, 2011

I want encrypt my home folder by using the DES? How to do it?

View 1 Replies View Related

Ubuntu :: Printing - SpliX Compression Algorithm 0x0 Does Not Exist

Aug 20, 2010

I have printer whhich work perfectly on ubuntu desktop I shared it into network and trying to print from Mac and I'm getting the following error: "SpliX Compression algorithm 0x0 does not exist" Printer - Samsung SCX-4200

View 1 Replies View Related

Ubuntu Security :: Algorithm Is Used With Full-Disk Encryption?

Oct 20, 2010

For some reason I can't find any documentation re: the algorithm(s) used by Ubuntu to encrypt the filesystem... Anyone know what it is?? AES?

View 2 Replies View Related

Programming :: Simulate Dijsktra's Algorithm Using Network Animator Of Ns2?

May 3, 2011

I need to simulate dijsktra's algorithm using network animator of ns2. how to write a tcl script for my code. This tcl script runs the dijsktra code and simulates its running on network animator.

View 1 Replies View Related

Programming :: Algorithm For Finding The Shortest Path Between Geocoordinates?

Jun 27, 2011

AStar works on the basis of straight lines, AFAIK. In my case, we have geocoordinates and I can get the straight line distance between the waypoints. But I am wondering how approximate will the route calculated on this basis be? The actual distance "by road", which actually matters can be different.

Example. Assuming A and B are on the same plane, and will be equidistant from the goal point, if we consider a straight line between A and the goal point and, B and the goal point. The distance "by road" between A and the goal point may be greater or lesser than B. But because the AStar works on the basis of straight lines, it will return both the routes as the shortest. If yes, then which algo should be considered , if we want the results on the basis of actual distance in Km/m?

View 1 Replies View Related

Programming :: Encryption And Decryption Program In Java And Using RSA Algorithm?

Feb 25, 2011

i need a program for Encryption and Decryption using RSA algorithm in JAVA ..

View 9 Replies View Related

Programming :: Fixed Base Windowing Exponentiation Algorithm?

May 2, 2009

i try to understand this algorithm but i cann't. [URL] I encounter problem understand the algorithm of fixed base windowing exponentiation algorithm ? What is fixed base in the first place ? How this algorithm works ?

View 5 Replies View Related

Slackware :: COUNT Never Reaches Zero - Algorithm Doesn't Converge

Jun 5, 2010

upgrading my notebook from Slackware 13.0 to 13.1. There are always some tricky things to wrap around when such upgrade times come, but now I think I caught a bug in mkinitrd, if I'm not wrong. mkinitd doesn't return when I run:

[code]...

After some debugging, I found that the routine copy-libs() is stuck in an infinite loop, because the statement "while [ "$COUNT" != "0" ]; do" does hold always (that is, COUNT never reaches zero). This, by its side, happens because the set of libs whose dependencies should be checked against are regenerated integrally after each step, and the algorithm doesn't converge. I could fix the problem adding some code, which removes the libraries found in the iteration "i-1" from the list of files found in the iteration "i". A patch in provided below. This done, I could build my first initrd image for Slack 13.1 and put it to run with kernel 2.6.33.4.

[code]...

View 11 Replies View Related

General :: Cron Job Not Scheduling?

Jan 9, 2011

I have a cron job to schedule the task on the third sunday of the month.I saw the previous threads but didn't find any solution.

How the cron syntax can be written.

View 14 Replies View Related

Software :: Set Top Box With Scheduling Of Tasks On 2.6.12

Mar 10, 2010

We are seeing some strange behavior on a Set top Box with the scheduling of tasks. We use 2.6.12 kernel. The issue is when we create a Task, say task1 with a priority of 46.But,this task is not Scheduled to run by the scheduler right away. It gets chance to run only after sometime. What we see here is that I create many other tasks with lower priority than task1,but they are immediately scheduled. Ideally, the task1 should have got scheduled before certain other low priority tasks as it has higher priority. Any patch is available wrt this?

View 3 Replies View Related

OpenSUSE Install :: Passwd -S Output \ Ran The Command But Nothing About The Algorithm Is Returned?

Mar 23, 2010

I read that passwd -S spits out informationabout a user's password including the encryption algorithm used to encrypt the password in /etc/shadow. I ran the command but nothing about the algorithm is returned. Is this a quirk in openSUSE?On another note, I've determined through other means that I've selected blowfishryption as evidenced by the $2blah$2blahblah format of the /etc/shadow entry. However, if I look at /etc/default/passwd it lists CRYPT=md5. If I'm using blowfish why would that variable be set to md5. onversely, if it is set to md5 why is the blowfish algorithm being invoked?

View 4 Replies View Related

Networking :: Dhcp Lease Time Algorithm Apparently Imprecise?

Mar 3, 2011

The system I am working on is a xdsl board running Linux kernel 2.6 and receiving dhcp address from a Microsoft XP PC. when looking through the dhclient.leases file I can see there's something wrong with renew time and stuff.strange calculation. as far as you know is this normal? You may find below the dhclient.lease file.

lease {
interface "tap0";
fixed-address 10.0.1.16;
filename "***";
medium "-link0 -link1 -link2";

[code]....

View 2 Replies View Related

Programming :: Algorithm - File System Block Number For Immediate Read

May 20, 2010

algorithm:breada
input: file system block number for immediate read
file system block number for asynchronous read
output:buffer containing data for immediate read {
if(first block not in cache) {
get buffer for first block
if(buffer data not valid)
initiate disk read }
if(second block not in cache) {
get buffer for second block)
if(buffer data valid) //line 1
release buffer else
initiate disk read //line 2 }
if(first block was originally in cache) //line 3 {
read first block
return buffer }
sleep (event first buffer contains valid data)
return buffer }

Here is an algorithm for block read algorithm. I have problem in
line 1: If buffer data is valid why is it releasing the buffer?
line 2: If buffer data valid why is it initiating disk read. It should have read directly from buffer?
line 3: It should be the first condition as if it is there in cache then it should return it without delay?

View 5 Replies View Related

Programming :: C Language Data Structure/ Algorithm Info Requested

Apr 2, 2010

Does anyone know of a C Language Data Structure Tutorial? I have not been able to find anything much to speak of myself.

View 4 Replies View Related

Programming :: Processor Priority Level For Algorithm For Buffer Allocation

Jan 9, 2010

The algorithm for reading and writing disk blocks use the algorithm getblk to allocate buffers from the pool. In the algorithm getblk, if the kernel removes a buffer from the free list, it must raise the processor priority level to block out interrupts before checking the free list. Why ?Where can i find the C implementation of the above algorithm for buffer allocation in the linux source code ?

View 1 Replies View Related

General :: Earliest Deadline First Scheduling?

May 28, 2009

kindly give me example of earliest deadline first scheduling?

View 5 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved