wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
63 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Capacity management in ITSM

Blog banner

The Golden Temple , Amritsar

Blog banner

Kernel Modes: User Mode vs. Kernel Mode - 80

Blog banner

10 Interesting facts you should know!!!

Blog banner

Electronic Funds Transfer

Blog banner

Khau Galli – Vile Parle

Blog banner

LIMITED EDITION

Blog banner

Types of email

Blog banner

Evolution of operating system

Blog banner

Lifestyle of a photographer

Blog banner

Deadlock and Starvation

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

STARVATION

Blog banner

Use case of K-means clustering

Blog banner

Music is life

Blog banner

Concept and definition of m-commerce

Blog banner

Every body is beautiful

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Sessions In OS.

Blog banner

Artificial Intelligence and I

Blog banner

How to make Pancakes

Blog banner

Service Strategy In ITSM

Blog banner

Virtual Memory

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Modern operating system

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Deadlocks in Operating Systems

Blog banner

Cyber Security in Data Breaching

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Semaphores

Blog banner

Why we should do reading

Blog banner

What is Amazon?

Blog banner

Jira Software

Blog banner

Uniprocessor scheduling

Blog banner

What is Influencer Marketing and its Trends

Blog banner

AOL Mail

Blog banner

Functions Of Operating Systems

Blog banner

Why is ITSM important in IT organization?

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

A book review

Blog banner

A True Friendship

Blog banner

What is OS and its overview

Blog banner