wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
39 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Memory management

Blog banner

The most common internet security threats

Blog banner

Deadlock and Starvation

Blog banner

Business Intelligence v/s Big Data

Blog banner

Malicious softwares

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

computer security

Blog banner

Types of Hackers

Blog banner

Rain bow

Blog banner

OLA

Blog banner

NETSUITE

Blog banner

What is HTML?

Blog banner

Deadlock in Operating systems

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Remote Work in 2026

Blog banner

HUBSPOT

Blog banner

Virtual memory

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

URL vs Domain

Blog banner

Steganography and Steganalysis

Blog banner

(Input/Output) in os

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Paging

Blog banner

Privacy in Social Media and Online Services

Blog banner

Stop Racism

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Amazon

Blog banner

bulk email software

Blog banner

PERT Overview

Blog banner

Service Strategy In ITSM

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Privacy LAWs in IT

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Service Catalogue Management

Blog banner

Service design process in ITSM

Blog banner

Deadlock and Starvation

Blog banner

Threads

Blog banner

What are NFT s?

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner