wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
Sarvo Singh
Sep 09, 2024
0 Likes
0 Discussions
109 Reads

Uniprocessor Scheduling


Uniprocessor scheduling is one of the prime aspects when dealing with operating systems. It tries to allocate the CPU time of one processor among various competing processes or tasks. Its main objective is the optimization of system performance, fairness, and responsiveness by effective allocation of the CPU time to competing processes.


Scheduling Criteria


Several criteria are used to evaluate the efficiency of a uniprocessor scheduling algorithm. These are:


CPU Utilization: It is the time for which the CPU remains busy in executing the processes. Throughput: It is the number of processes executed in a unit of time. Turnaround Time: This is the complete time taken to finish a process. Waiting Time: The time spent by a process in the ready queue waiting. Response Time: The time that takes to respond to any process request. Scheduling Algorithms Various uniprocessor scheduling algorithms have been developed to optimize these criteria. A number of well-known algorithms are as follows:


First-Come-First-Served FCFS Scheduling: This is simple to implement, but may result in poor performance and starvation. SJF Scheduling: This is optimal with respect to average waiting time but may lead to starvation. Priority Scheduling: In this strategy, each process is assigned a priority based on its priority number or some other factors. Round Robin RR Scheduling: In this strategy, each process is granted a fixed time slice, also referred to as a time quantum.

Multilevel Feedback Queue Scheduling (MFQ): This is a variant of the round-robin scheduling strategy with more than one queue, each with a different time quanta. Every algorithm has its high and low points, and the choice between them depends upon the real needs of a system.


Comments ()


Sign in

Read Next

Concurrency and memory

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Answer

Blog banner

History of Money

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Elements and Principles of Photography

Blog banner

Memory Management

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

File System

Blog banner

Access management

Blog banner

Zero-Day Attack

Blog banner

Procedure For Corporate High-Tech Investigations

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Photography

Blog banner

What if COVID does not exist!

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Proof-of-Stake (PoS)

Blog banner

From Model Mistakes to Metrics

Blog banner

Types of Big Data

Blog banner

Blockchain Security Technique

Blog banner

UniProcessor Scheduling

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Footprinting

Blog banner

Data Visualization- Importance and tools (Tableau,Power BI, Matplotlib)

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Memory heirachy (Operating system)

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Deadlock

Blog banner

Direct Memory Access

Blog banner

Jira service Management

Blog banner

Virtual memory in os

Blog banner

LTE Technology

Blog banner

Smart Shoephone: Is that technology overdose!?

Blog banner

Self managing devices

Blog banner

Use case of K-means clustering

Blog banner

Fitness

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Big Data Architecture

Blog banner

Mumbai Metro 3

Blog banner