wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
39 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Incident management in ITSM

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Memory management

Blog banner

Operating system

Blog banner

Indian Culture and Tradition

Blog banner

Real-time Scheduling - 53003230061

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

Importance of Website

Blog banner

Hello World

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

Introduction to GIS

Blog banner

Service design process in ITSM

Blog banner

Assignment-3

Blog banner

MEMORY HIERARCHY

Blog banner

Vulnerability Assessment

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

How to Find the Right Therapist For Me?

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

IT service level agreement

Blog banner

Virtual memory

Blog banner

1.1 basic elements

Blog banner

Install Ubuntu Easily

Blog banner

Service transistion under difficult conditions

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

What are Tenders its various types

Blog banner

File System

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

1.1 basic elements

Blog banner

Threads and concurrency

Blog banner

Evolution of Operating System

Blog banner

De-Coding Love

Blog banner

IOT- Internet Of Things

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Paging

Blog banner

Importance Of Time

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Classification Vs Clustring? What's the diffrence?

Blog banner

Virtual memory

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner