wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
63 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Travelling blog

Blog banner

Device driver

Blog banner

Mumbai famous street food

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

Royal enfield

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

PERT Overview

Blog banner

Big Data

Blog banner

SIEM Empowering Security

Blog banner

Fitness

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Importance of Website

Blog banner

Evolution of Operating system

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

What your Favorite colour says about You?

Blog banner

Supervised and unsupervised learning

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

LISP - Library Management System

Blog banner

Types of OS

Blog banner

Deadlock and Starvation

Blog banner

Mumbai Metro 3

Blog banner

Open relationships

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

Hash password! Is it really secured?

Blog banner

Jira Software

Blog banner

Telegram and it's features

Blog banner

MEMORY MANAGEMENT

Blog banner

Deadlock

Blog banner

Security Breaches in Stock market trading

Blog banner

RAID

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

DURGA POOJA

Blog banner

Modern operating system

Blog banner

Never give up

Blog banner

A buffer overflow

Blog banner

What is Packet Filtering?

Blog banner

Virtual Memory

Blog banner