wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
39 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Electronic Evidence in Cyber Forensics

Blog banner

Memory Management - operating system

Blog banner

'C', 'C++' and 'Java': Head-to-Head

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

"Mahakali cave"

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

How Men and Women Process Pain Differently

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

Things You Should Leave Behind In 2025, Whilst In 2026

Blog banner

Virtual Machine

Blog banner

COMMUNICATION

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

Computer Security

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Review on Recovering Deleted Files

Blog banner

Deadlock and starvation

Blog banner

A small world of Sockets

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Quality check in IT services

Blog banner

HTML vs HTML5

Blog banner

Pipedrive

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

What is Internet

Blog banner

What is Segmentation?

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

Security requirements for Safe E-Payments

Blog banner

Artical on FreshBooks

Blog banner

Regression Analysis

Blog banner

Starvation and Deadlock.

Blog banner

Smitten Kitchen Keepers

Blog banner

The Evolution of Operating Systems

Blog banner

Why Progressive Web Apps (PWAs) Are Replacing Traditional Websites

Blog banner

INTRODUCTION

Blog banner

Linux 94

Blog banner

What is Virtual Memory

Blog banner

Cache Memory

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

Smartsheet

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Security and E-mail

Blog banner