wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
63 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Different types of scam Fraud

Blog banner

UniProcessor Scheduling

Blog banner

Hey Aryan here

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Virtual machine.

Blog banner

From Model Mistakes to Metrics

Blog banner

Direct Memory Access

Blog banner

Data Security must be your Priority!

Blog banner

Mutual exclusion

Blog banner

Different Types of Data

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

Security issues

Blog banner

HUBSPOT

Blog banner

I/O Management and Disk Scheduling

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Regression Analysis

Blog banner

Privacy LAWs in IT

Blog banner

Studying ProRat

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Sessions In OS.

Blog banner

Memory heirchy

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

Multithreading in Operating System

Blog banner

Cache memory

Blog banner

Understanding the 'Ambiverts'

Blog banner

Data Lake

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Deadlock in Operating System

Blog banner

CRISP-DM Methodology

Blog banner

How to Conquer Depression ?

Blog banner

Remote Work in 2026

Blog banner

Computer Security

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Microsoft powerpoint presentation

Blog banner

Capacity management in ITSM

Blog banner

Precision-Recall in Data Science

Blog banner

26/11 The Black Day Of Mumbai

Blog banner

E-commerce

Blog banner

“CONSISTENCY” in Social Media Marketing

Blog banner

Indian Food

Blog banner