wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Types Of scheduling

profile
Mihir undefined
Aug 15, 2024
0 Likes
0 Discussions
102 Reads

In an operating system (OS), scheduling is a critical function that determines the order in which processes are executed. There are several types of scheduling, each tailored to optimize performance, ensure fairness, and meet the specific needs of different applications.


1. Long-Term Scheduling: This type of scheduling, also known as job scheduling, controls which processes are admitted to the system for processing. It determines which jobs (programs in the job pool) enter the ready queue, regulating the degree of multiprogramming. Long-term scheduling occurs less frequently and aims to maintain a balance between I/O-bound and CPU-bound processes to optimize resource utilization.


2. Short-Term Scheduling: Also known as CPU scheduling, this type is responsible for deciding which of the processes in the ready queue will be executed by the CPU next. The short-term scheduler, or dispatcher, makes decisions frequently, every few milliseconds. Algorithms like First-Come, First-Served (FCFS), Shortest Job Next (SJN), and Round Robin (RR) are used to allocate CPU time. The goal is to maximize CPU utilization, reduce waiting time, and ensure a responsive system.


3. Medium-Term Scheduling: This involves swapping processes in and out of memory to optimize performance and manage the degree of multiprogramming. It’s a part of the swapping mechanism where inactive processes are moved to disk to free up memory for active processes. Medium-term scheduling helps balance the load on the CPU and memory.


4. Real-Time Scheduling: Specifically designed for real-time operating systems, this scheduling type ensures that processes complete within a guaranteed time frame. Real-time scheduling is divided into hard real-time and soft real-time, with the former having strict deadlines and the latter allowing some flexibility. Algorithms like Rate Monotonic Scheduling (RMS) and Earliest Deadline First (EDF) are commonly used.


Each scheduling type serves a unique purpose, contributing to the overall efficiency and functionality of the operating system.


Comments ()


Sign in

Read Next

Dove’s Real Beauty Campaign- Case Study

Blog banner

Dangers of Using Public WiFis

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Direct Memory Access

Blog banner

Diwali

Blog banner

The Rise of Polo Tourism in the USA: How Travellers Are Blending Luxury Stays with Elite Sports

Blog banner

A Deep Dive

Blog banner

Article on different management system

Blog banner

Memory management

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

Network Security Risks

Blog banner

10 Signs your Computer has Virus

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

"Audit" In Data Science

Blog banner

Processing Crime and Incident Scenes

Blog banner

Texting is actually better than talking in person

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

AOL Mail

Blog banner

Functions of Operating System

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Different Types of Data

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Cloud Computing

Blog banner

SECURITY TOOLS

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Wiretapping

Blog banner

GIS REMOTE SENSING

Blog banner

Answer

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Go Daddy

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Ethical Hacking

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Virtual Memory

Blog banner

Zoho

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

E-mail security

Blog banner

Threat management

Blog banner