wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
63 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Service Transition Process in ITSM

Blog banner

File Sharing

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

All you need to know about “On-page SEO”

Blog banner

Note Taker App

Blog banner

Cybersecurity Standards for Automotive

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Why we fail after giving 100% ?

Blog banner

child Labour

Blog banner

Evolution of Operating system.

Blog banner

Paddle Through Paradise: The Best Kayak Launch Points Near Arcadia

Blog banner

The IT Service Lifecycle

Blog banner

Uniprocessor Scheduling

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Security issues

Blog banner

Cache memory

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Beatbox

Blog banner

POVERTY:Causes and solutions to problems

Blog banner

Memory hierarchy

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

ADIDAS

Blog banner

Characteristics of Etherum

Blog banner

FRIENDSHIP

Blog banner

Modern Operating System

Blog banner

What is Spyware?

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

The Five Steps of Data Science

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

RAID

Blog banner

Developments in Modern Operating Systems

Blog banner

A Deep Dive

Blog banner

Virtual Machine's

Blog banner

Elegant fashion style

Blog banner

Data Analytics in Data Science

Blog banner