wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
Sarvo Singh
Sep 09, 2024
0 Likes
0 Discussions
110 Reads

Uniprocessor Scheduling


Uniprocessor scheduling is one of the prime aspects when dealing with operating systems. It tries to allocate the CPU time of one processor among various competing processes or tasks. Its main objective is the optimization of system performance, fairness, and responsiveness by effective allocation of the CPU time to competing processes.


Scheduling Criteria


Several criteria are used to evaluate the efficiency of a uniprocessor scheduling algorithm. These are:


CPU Utilization: It is the time for which the CPU remains busy in executing the processes. Throughput: It is the number of processes executed in a unit of time. Turnaround Time: This is the complete time taken to finish a process. Waiting Time: The time spent by a process in the ready queue waiting. Response Time: The time that takes to respond to any process request. Scheduling Algorithms Various uniprocessor scheduling algorithms have been developed to optimize these criteria. A number of well-known algorithms are as follows:


First-Come-First-Served FCFS Scheduling: This is simple to implement, but may result in poor performance and starvation. SJF Scheduling: This is optimal with respect to average waiting time but may lead to starvation. Priority Scheduling: In this strategy, each process is assigned a priority based on its priority number or some other factors. Round Robin RR Scheduling: In this strategy, each process is granted a fixed time slice, also referred to as a time quantum.

Multilevel Feedback Queue Scheduling (MFQ): This is a variant of the round-robin scheduling strategy with more than one queue, each with a different time quanta. Every algorithm has its high and low points, and the choice between them depends upon the real needs of a system.


Comments ()


Sign in

Read Next

Memory Management

Blog banner

Im Photographer

Blog banner

Major achievement

Blog banner

File system

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Dancing Classes In Mumbai

Blog banner

The Five Steps of Data Science

Blog banner

virtual memory

Blog banner

INSTAGRAM

Blog banner

The Memory Hierarchy

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

MACHINE LEARNING

Blog banner

Os assignment

Blog banner

Importance Of Yoga.

Blog banner

Regression Analysis

Blog banner

Explaining Buffer Overflow with Example

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Virtual Machine

Blog banner

Video games

Blog banner

Operating system

Blog banner

Message Passing in OS

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

The Right way of cooking

Blog banner

TAILS OS

Blog banner

What is Network Security?

Blog banner

Advantage of freedom

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Objectives and functions of Operating System...

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Why am I never satisfied with my Life?

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Virtual Machine

Blog banner

Network Forensics Tools and Techniques

Blog banner

History of Money

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Big Data Architecture

Blog banner

Business Engineering

Blog banner

Defining youtubr

Blog banner

VIRUS

Blog banner

"Mahakali cave"

Blog banner