What is the difference between CPU contention and CPU ready queue?
'CPU contention’ and 'CPU ready queue’ are two related terms, but they address slightly different aspects of the same problem.
'CPU contention’ describes conflicts between different virtual machines in a virtualized hardware system where they are competing for the same resources. The term 'CPU contention’ might describe an event or series of events, or it might generically refer to situations where these kinds of conflicts occur.
By contrast, 'CPU ready queue’ is a term used to describe a facility in virtualization as well as a metric that can be affected by CPU contention. VMWare, a major distributor of virtualization software, has defined CPU ready queue as "the time a virtual machine must wait in a ready-to-run state before it can be scheduled on a CPU."
In other words, CPU contention is the problem, and CPU ready queue is a way to measure it. If CPU ready queue or wait time is too high, IT professionals must investigate and figure out what’s happening — for instance, whether virtual machines are correctly placed in a virtual environment, whether overall resources are sufficient for good operation, and whether there is specific CPU contention, or bottlenecks related to system calibration or setup.
More Q&As from our experts
- What does the mobile network state mean?
- With more big data solutions moving to the cloud, how will that impact network performance and security?
- What is the difference between cloud computing and web hosting?
- Cloud Computing
- Citrix Server
- Application Virtualization
- Clean Computing
- Desktop Virtualization
- Full Virtualization
- Network Virtualization
- Paravirtualized Operating System
- Server Virtualization
Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
- Data Governance Is Everyone's Business
- Key Applications for AI in the Supply Chain
- Service Mesh for Mere Mortals - Free 100+ page eBook
- Do You Need a Head of Remote?
- Web Data Collection in 2022 - Everything you need to know
- How to Protect Microsoft 365 from NOBELIUM Hackers
- 5 Steps to Streamline Security for your Hybrid Network