wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
Sarvo Singh
Sep 09, 2024
0 Likes
0 Discussions
110 Reads

Uniprocessor Scheduling


Uniprocessor scheduling is one of the prime aspects when dealing with operating systems. It tries to allocate the CPU time of one processor among various competing processes or tasks. Its main objective is the optimization of system performance, fairness, and responsiveness by effective allocation of the CPU time to competing processes.


Scheduling Criteria


Several criteria are used to evaluate the efficiency of a uniprocessor scheduling algorithm. These are:


CPU Utilization: It is the time for which the CPU remains busy in executing the processes. Throughput: It is the number of processes executed in a unit of time. Turnaround Time: This is the complete time taken to finish a process. Waiting Time: The time spent by a process in the ready queue waiting. Response Time: The time that takes to respond to any process request. Scheduling Algorithms Various uniprocessor scheduling algorithms have been developed to optimize these criteria. A number of well-known algorithms are as follows:


First-Come-First-Served FCFS Scheduling: This is simple to implement, but may result in poor performance and starvation. SJF Scheduling: This is optimal with respect to average waiting time but may lead to starvation. Priority Scheduling: In this strategy, each process is assigned a priority based on its priority number or some other factors. Round Robin RR Scheduling: In this strategy, each process is granted a fixed time slice, also referred to as a time quantum.

Multilevel Feedback Queue Scheduling (MFQ): This is a variant of the round-robin scheduling strategy with more than one queue, each with a different time quanta. Every algorithm has its high and low points, and the choice between them depends upon the real needs of a system.


Comments ()


Sign in

Read Next

Process State

Blog banner

INTERNET

Blog banner

SPAM

Blog banner

Characteristics of Etherum

Blog banner

Hosting basics

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

I/O Buffering

Blog banner

Question

Blog banner

ODOO

Blog banner

Deadlock and Starvation

Blog banner

Deadlock

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Evolution of operating systems

Blog banner

38_Exploring The Honeynet Project

Blog banner

objectives and functions of operating system

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

How to feel Happy everyday day

Blog banner

Population

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Friendship

Blog banner

Blog on Smartsheet.

Blog banner

Memory Management of Operating System(OS)

Blog banner

TRIGGERS IN DATABASE

Blog banner

Benefits of yoga and meditation

Blog banner

Types of Threads

Blog banner

Bharat Maps

Blog banner

Water Resources are about to exhaust...

Blog banner

Service Design Principles

Blog banner

SQL Injection practice on DVWA

Blog banner

Bots and Cyber Security

Blog banner

Title: Modern Operating Systems: Powering the Digital Era

Blog banner

Why Mumbai Professionals Are Switching Back to Home-Style Tiffin Meals

Blog banner

Memory hierarchy

Blog banner

Importance of education

Blog banner

Deadlock

Blog banner

Importance of internet

Blog banner

Paid Email

Blog banner

Risk mitigation and management

Blog banner

IT Service Continuity Management

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Data Lake

Blog banner