wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
63 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Linux Threads:

Blog banner

What is Data, Information and Knowledge?

Blog banner

Risk mitigation and management

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Tools to support CSI activities

Blog banner

Mumbaicha Dabbawalla

Blog banner

Security requirements for Safe E-Payments

Blog banner

Deming’s Process

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

E-commerce

Blog banner

Internet of Things

Blog banner

Google

Blog banner

OS ASSIGNMENT

Blog banner

Platonic Solids

Blog banner

Spotify

Blog banner

Memory Management

Blog banner

SQL Injection

Blog banner

Fitness regime by Deepesh

Blog banner

Linux -V Server Virtual Machine

Blog banner

Ransomware

Blog banner

RAID and It's Levels

Blog banner

Hey Aryan here

Blog banner

CRISP-DM Methodology

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

IoT Architecture Based Security

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Mumbai famous street food

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

Game via listing method

Blog banner

Types of Malware in Cyber Security

Blog banner

The New Rules of UI/UX Design Every Website Must Follow in 2026

Blog banner

Direct Memory Access

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

ZOHO

Blog banner

Race Conditions

Blog banner

Benefits and drawback of web security.

Blog banner

Apache Kafka

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

LINUX

Blog banner

Honeypot in cyber security

Blog banner

Google classroom

Blog banner