wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
63 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Real Time Scheduling

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Paid Email

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Objectives and functions of Operating System...

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

This is my first blog.

Blog banner

Depression

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Fashion design

Blog banner

INTERNET SECURITY

Blog banner

Security Issues and Countermeasures

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

Delhi city

Blog banner

Having passion in life

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

Virtual machine.

Blog banner

Security issues

Blog banner

Deadlock and Starvation

Blog banner

What does the Australian summer have in store for your oral health?

Blog banner

Social Media Marketing Trends 2022

Blog banner

File management

Blog banner

A True Friendship

Blog banner

GIS Bharat Maps

Blog banner

Pooja Silver

Blog banner

Understanding Gen Z: A Generation Facing Crisis and Potential

Blog banner

A Deep Dive

Blog banner

Operating system

Blog banner

The Right way of cooking

Blog banner

Direct Memory Access

Blog banner

Install Ubuntu in Vmware

Blog banner

Operating system

Blog banner

Importance Of Yoga.

Blog banner

10 Survival Tips that might save your life

Blog banner

Latest Email Marketing Techniques

Blog banner

Supervised and unsupervised learning

Blog banner

Buffer overflow

Blog banner

Sniffing: A Cyber Security Threat

Blog banner