Fedora :: How To Change CPU Scheduling Algorithm
May 3, 2011
I want to change linux scheduling algorithm for some of my processes but when I click on processes in ksysguard and click renice project, all of the processes use normal level cpu scheduling. Why is it such a thing and there is no priority?
View 2 Replies
ADVERTISEMENT
Sep 8, 2010
is linux kernel is priority preemptive kernel?if it is. where it is using round robin scheduling algorithm?when processes are scheduled for the processor process will be allocated as which sechudling alogorithm?
View 1 Replies
View Related
May 4, 2011
I have a timer thread, and when it expires, it sets a flag. The only problem is, if any higher priority thread comes in between, then the timer is not expired in real time.Thus i want to set a highest priority to my thread. Now, i know 2 algos, which can make my thread in real time are: SCHED_FIFO and SCHED_RR.
So, here are my queries: 1) Which scheduling algo is best suited for this purpose? 2) Is it guaranted to work in real time if i use that algo (you suggest in 1) and set the max_priority by getting the maximum settable priority for that particular algorithm using, int sched_get_priority_max(int policy);
View 2 Replies
View Related
Jan 3, 2011
there are 3 nodes..A,B and C. Node A wants to send information to Node B but it does so by sending it to Node C first which then sends to B. And similarly Node B sends to A. In this simultaneously C doesn't send to both A and B. This is the in built algorithm..but i want to change it to: A and B send their packets to C and C sends both these packets to A and B..by ORing... In the receiver side...node A can receive the wanted packet and also B. Where do i change the algorithm?
View 7 Replies
View Related
Jan 27, 2011
OpenSuSE 11.3 (but this is not likely a distro specific issue)Kernel 2.6.34.7, but likely applies to a number of previousAm close to launching a more extensive webpage describing in detail why and how this configuration is important, but I'm missing up to date information on how to persist the config. By default, changing the TCP Congestion Control algorithm only modifies the current system session. Docs I've read recommend that the command resetting the algorithm be written to Code:/etc/rc.d/rc.dAm confused with all the different config files, but I suspect either an existing file should be modified or an additional file should be modified in
Code:
/etc/rc.d/rc5.d/
Question:
[code]....
View 9 Replies
View Related
Apr 27, 2011
i am new to ns2, i want to implement leach algorithm(MIT uAMPS) but i am unable to know how to install ns-2.1b5 version for it.but i successfully installed ns2.29 in fedora14.
otherwise please intimate what linux flavour will be suitable for ns-2.1b5
View 2 Replies
View Related
Aug 2, 2010
Can I know the implemention of RSA(Encryption and decryption) algorithm in C / C++.
View 1 Replies
View Related
Apr 27, 2011
I have a copy of the MD5 algorithm and I'm taking a look at the source. It's pretty interesting but there are a few things that I'm curious about and I was wondering if anyone a bit more intuitive than I could help me out.The function declarations in the MD5 files are a bit unfamiliar to me. There is a macro used called PROTO_LIST, which I'm still not sure as to what this thing is doing exactly, but it's littered everywhere throughout the source.The signature here isn't too unfamiliar to me with the exception of the position of the PROTO_LIST macro. So here is a function with an unnamed argument of type MD5_CTX*.To me, this resembles an initializer list found in C++ with constructors but I certainly don't think that is the case here. So my questions about this are (1) how is this legal code in C and (2) what functionality has the PROTO_LIST macro provided for the function?
View 3 Replies
View Related
Oct 5, 2010
What would be the best program to write my algorithm, before sending them to my teacher?
View 4 Replies
View Related
Aug 16, 2011
i use SHA-512 algorithm in the /etc/shadow File But i Want to use my lgorithm ..
how i can remove the sha-512 and use my algoritm ? Because no one can des encrypt it !! He Not Know the algorithm method
View 7 Replies
View Related
Mar 30, 2011
I want some algorithm so that I can compare images via web application, (preferably in python)
View 2 Replies
View Related
Jul 16, 2010
I've got a bit of an obscure question for you to test your brains a wee bit. I'm trying to implement a search program to find areas of high density in a binary string.
E.g.
Code:
[0001001010
0001110001
0000001000
1001000010
0101100100]
Where density is the number of 1's / number of digits with a maximum number of digits being the current number in a buffer (in this example 50). So for the example the density for the whole buffer is 15/50. But the density of Buffer[14..20]=[1110001]=4/7. So if looking for areas of density = 1/3 it would find the longest sequences of density over 1/3.So in the example. Buffer[4..9]=[100101]=3/6=1/2 which is above 1/3 but it is within the Buffer[4..48]=[100101000011100010000001000100100001001011001]=15/45=1/3
View 5 Replies
View Related
Sep 13, 2010
I have an algorithm guys called "Self Configurable Diagnosis Algorithm" but i don't have program for this.help me regarding that program and which type of Tcl script will be better suitable for that.
View 3 Replies
View Related
Sep 8, 2010
I have two functions:
Quote:
void func1(std::string &s)
{
s.clear();
}
[code]....
Is there a way to create one template function for both vector and string that would clear them?
View 4 Replies
View Related
Jan 27, 2011
I want encrypt my home folder by using the DES? How to do it?
View 1 Replies
View Related
Aug 20, 2010
I have printer whhich work perfectly on ubuntu desktop I shared it into network and trying to print from Mac and I'm getting the following error: "SpliX Compression algorithm 0x0 does not exist" Printer - Samsung SCX-4200
View 1 Replies
View Related
Oct 20, 2010
For some reason I can't find any documentation re: the algorithm(s) used by Ubuntu to encrypt the filesystem... Anyone know what it is?? AES?
View 2 Replies
View Related
May 3, 2011
I need to simulate dijsktra's algorithm using network animator of ns2. how to write a tcl script for my code. This tcl script runs the dijsktra code and simulates its running on network animator.
View 1 Replies
View Related
Jun 27, 2011
AStar works on the basis of straight lines, AFAIK. In my case, we have geocoordinates and I can get the straight line distance between the waypoints. But I am wondering how approximate will the route calculated on this basis be? The actual distance "by road", which actually matters can be different.
Example. Assuming A and B are on the same plane, and will be equidistant from the goal point, if we consider a straight line between A and the goal point and, B and the goal point. The distance "by road" between A and the goal point may be greater or lesser than B. But because the AStar works on the basis of straight lines, it will return both the routes as the shortest. If yes, then which algo should be considered , if we want the results on the basis of actual distance in Km/m?
View 1 Replies
View Related
Feb 25, 2011
i need a program for Encryption and Decryption using RSA algorithm in JAVA ..
View 9 Replies
View Related
May 2, 2009
i try to understand this algorithm but i cann't. [URL] I encounter problem understand the algorithm of fixed base windowing exponentiation algorithm ? What is fixed base in the first place ? How this algorithm works ?
View 5 Replies
View Related
Jun 5, 2010
upgrading my notebook from Slackware 13.0 to 13.1. There are always some tricky things to wrap around when such upgrade times come, but now I think I caught a bug in mkinitrd, if I'm not wrong. mkinitd doesn't return when I run:
[code]...
After some debugging, I found that the routine copy-libs() is stuck in an infinite loop, because the statement "while [ "$COUNT" != "0" ]; do" does hold always (that is, COUNT never reaches zero). This, by its side, happens because the set of libs whose dependencies should be checked against are regenerated integrally after each step, and the algorithm doesn't converge. I could fix the problem adding some code, which removes the libraries found in the iteration "i-1" from the list of files found in the iteration "i". A patch in provided below. This done, I could build my first initrd image for Slack 13.1 and put it to run with kernel 2.6.33.4.
[code]...
View 11 Replies
View Related
Jan 9, 2011
I have a cron job to schedule the task on the third sunday of the month.I saw the previous threads but didn't find any solution.
How the cron syntax can be written.
View 14 Replies
View Related
Mar 10, 2010
We are seeing some strange behavior on a Set top Box with the scheduling of tasks. We use 2.6.12 kernel. The issue is when we create a Task, say task1 with a priority of 46.But,this task is not Scheduled to run by the scheduler right away. It gets chance to run only after sometime. What we see here is that I create many other tasks with lower priority than task1,but they are immediately scheduled. Ideally, the task1 should have got scheduled before certain other low priority tasks as it has higher priority. Any patch is available wrt this?
View 3 Replies
View Related
Mar 23, 2010
I read that passwd -S spits out informationabout a user's password including the encryption algorithm used to encrypt the password in /etc/shadow. I ran the command but nothing about the algorithm is returned. Is this a quirk in openSUSE?On another note, I've determined through other means that I've selected blowfishryption as evidenced by the $2blah$2blahblah format of the /etc/shadow entry. However, if I look at /etc/default/passwd it lists CRYPT=md5. If I'm using blowfish why would that variable be set to md5. onversely, if it is set to md5 why is the blowfish algorithm being invoked?
View 4 Replies
View Related
Mar 3, 2011
The system I am working on is a xdsl board running Linux kernel 2.6 and receiving dhcp address from a Microsoft XP PC. when looking through the dhclient.leases file I can see there's something wrong with renew time and stuff.strange calculation. as far as you know is this normal? You may find below the dhclient.lease file.
lease {
interface "tap0";
fixed-address 10.0.1.16;
filename "***";
medium "-link0 -link1 -link2";
[code]....
View 2 Replies
View Related
May 20, 2010
algorithm:breada
input: file system block number for immediate read
file system block number for asynchronous read
output:buffer containing data for immediate read {
if(first block not in cache) {
get buffer for first block
if(buffer data not valid)
initiate disk read }
if(second block not in cache) {
get buffer for second block)
if(buffer data valid) //line 1
release buffer else
initiate disk read //line 2 }
if(first block was originally in cache) //line 3 {
read first block
return buffer }
sleep (event first buffer contains valid data)
return buffer }
Here is an algorithm for block read algorithm. I have problem in
line 1: If buffer data is valid why is it releasing the buffer?
line 2: If buffer data valid why is it initiating disk read. It should have read directly from buffer?
line 3: It should be the first condition as if it is there in cache then it should return it without delay?
View 5 Replies
View Related
Apr 2, 2010
Does anyone know of a C Language Data Structure Tutorial? I have not been able to find anything much to speak of myself.
View 4 Replies
View Related
Jan 9, 2010
The algorithm for reading and writing disk blocks use the algorithm getblk to allocate buffers from the pool. In the algorithm getblk, if the kernel removes a buffer from the free list, it must raise the processor priority level to block out interrupts before checking the free list. Why ?Where can i find the C implementation of the above algorithm for buffer allocation in the linux source code ?
View 1 Replies
View Related
May 28, 2009
kindly give me example of earliest deadline first scheduling?
View 5 Replies
View Related