wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
39 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Types of email

Blog banner

Fault Tolerance

Blog banner

John Titor: The Time Traveler

Blog banner

Scheduling

Blog banner

Spotify

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

MY FIRST BLOG?

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

The Role of Summer Camps in Early Childhood Development

Blog banner

SQL Injection

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

Women empowerment

Blog banner

Cache Memory

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Memory Management

Blog banner

Processes: Process Description and Control.

Blog banner

Beatbox

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Email Privacy

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Deadlock

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Retiring ISS

Blog banner

The Golden Temple , Amritsar

Blog banner

INTERNET SECURITY

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Constrains in service design

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Threat management

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Impact of social media on the human life

Blog banner

Scheduling in Operating Systems

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Direct memory access (DMA)

Blog banner

Education: Key to your Prosperity

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Sagar Parikrama

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Beauty of indian railway

Blog banner