wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
38 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Disk Scheduling

Blog banner

Know your Processors!

Blog banner

Latest Email Marketing Techniques

Blog banner

The New Dr. Frankenstein who will perform first full head transplant

Blog banner

What Your Music Taste Reveals About Your Personality

Blog banner

Why You Should Not Use Free VPNs

Blog banner

Security in Operating Systems

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Reconnaissance

Blog banner

computer security

Blog banner

E-commerce

Blog banner

Social Media.

Blog banner

Virtual Memory

Blog banner

Be kind person

Blog banner

Deadlock in operating system

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Esri India launches Policy Maps.

Blog banner

Virtual Machine's

Blog banner

Place to visit in pune

Blog banner

File System

Blog banner

Deadlock

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

VIRTUAL MACHINES

Blog banner

Google

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

A Deep Dive

Blog banner

E-Cash (Electronic Cash)

Blog banner

What is Minting & Mining

Blog banner

Computer Security

Blog banner

Music helps reduce stress

Blog banner

GIS in Disaster Management

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Street foods

Blog banner

Memory

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Deadlock

Blog banner

I/O Buffering

Blog banner

Stop Racism

Blog banner

Virtual memory in windows

Blog banner