wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
39 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Cache Memory(142)

Blog banner

Hypothesis Testing in Data Science

Blog banner

Uniprocessor Scheduling

Blog banner

What are Tenders its various types

Blog banner

Evolution of Operating Sytems

Blog banner

A Traveller’s Guide to Offbeat Places in Arcadia, Florida

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Raid and levels of raid.

Blog banner

Cyber Security in Data Breaching

Blog banner

Proton mail

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Indian Culture and Tradition

Blog banner

Session Hijacking

Blog banner

Article on Fresh Book

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Dangers of Using Public WiFis

Blog banner

Inventory management software system

Blog banner

Deadlock in operating system

Blog banner

Cache memory

Blog banner

NodeJs

Blog banner

Microsoft Word

Blog banner

indian premier league

Blog banner

Types of email

Blog banner

Principal of concurrency

Blog banner

Gamer life

Blog banner

Virus

Blog banner

SPEM

Blog banner

Apple

Blog banner

What are NFT s?

Blog banner

Man VS Nature

Blog banner

Paid Email

Blog banner

Cache Memory

Blog banner

Why we should do reading

Blog banner

Introduction to Virtual Memory - 080

Blog banner

10 Interesting Facts about Death Note

Blog banner

Deadlock

Blog banner

E-learning in today's world

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

DATA WRANGLING

Blog banner

Threads and concurrency

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

AutoML: The Future of Automated Data Science

Blog banner