wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
Sarvo Singh
Sep 09, 2024
0 Likes
0 Discussions
109 Reads

Uniprocessor Scheduling


Uniprocessor scheduling is one of the prime aspects when dealing with operating systems. It tries to allocate the CPU time of one processor among various competing processes or tasks. Its main objective is the optimization of system performance, fairness, and responsiveness by effective allocation of the CPU time to competing processes.


Scheduling Criteria


Several criteria are used to evaluate the efficiency of a uniprocessor scheduling algorithm. These are:


CPU Utilization: It is the time for which the CPU remains busy in executing the processes. Throughput: It is the number of processes executed in a unit of time. Turnaround Time: This is the complete time taken to finish a process. Waiting Time: The time spent by a process in the ready queue waiting. Response Time: The time that takes to respond to any process request. Scheduling Algorithms Various uniprocessor scheduling algorithms have been developed to optimize these criteria. A number of well-known algorithms are as follows:


First-Come-First-Served FCFS Scheduling: This is simple to implement, but may result in poor performance and starvation. SJF Scheduling: This is optimal with respect to average waiting time but may lead to starvation. Priority Scheduling: In this strategy, each process is assigned a priority based on its priority number or some other factors. Round Robin RR Scheduling: In this strategy, each process is granted a fixed time slice, also referred to as a time quantum.

Multilevel Feedback Queue Scheduling (MFQ): This is a variant of the round-robin scheduling strategy with more than one queue, each with a different time quanta. Every algorithm has its high and low points, and the choice between them depends upon the real needs of a system.


Comments ()


Sign in

Read Next

How to setup a professional looking business account on Instagram?

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

Virtualisation

Blog banner

Deadlock and Starvation

Blog banner

Virtual Machine's

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Process in OS

Blog banner

differentiate thinking humanly and rationally

Blog banner

Buffer overflow

Blog banner

GIS Bharat Maps

Blog banner

Types of Hackers.

Blog banner

RAID

Blog banner

File Allocation Methods

Blog banner

The Right way of cooking

Blog banner

Data Mining

Blog banner

THREADS (assignment 1)

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Why Friendship at Work is Important

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

DELIRIUM

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Virtual memory

Blog banner

Password Generator - Lisp

Blog banner

Optimization of operating system design

Blog banner

COMMUNICATION

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Rain

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Deadlock and Starvation

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

OS- Assignnment 1

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

How return on investment is defined in IT services

Blog banner

Bots and Cyber Security

Blog banner

Culture Of Ladakh

Blog banner

Risk factors in service transistion

Blog banner

Scheduling

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner