wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
Sarvo Singh
Sep 09, 2024
0 Likes
0 Discussions
110 Reads

Uniprocessor Scheduling


Uniprocessor scheduling is one of the prime aspects when dealing with operating systems. It tries to allocate the CPU time of one processor among various competing processes or tasks. Its main objective is the optimization of system performance, fairness, and responsiveness by effective allocation of the CPU time to competing processes.


Scheduling Criteria


Several criteria are used to evaluate the efficiency of a uniprocessor scheduling algorithm. These are:


CPU Utilization: It is the time for which the CPU remains busy in executing the processes. Throughput: It is the number of processes executed in a unit of time. Turnaround Time: This is the complete time taken to finish a process. Waiting Time: The time spent by a process in the ready queue waiting. Response Time: The time that takes to respond to any process request. Scheduling Algorithms Various uniprocessor scheduling algorithms have been developed to optimize these criteria. A number of well-known algorithms are as follows:


First-Come-First-Served FCFS Scheduling: This is simple to implement, but may result in poor performance and starvation. SJF Scheduling: This is optimal with respect to average waiting time but may lead to starvation. Priority Scheduling: In this strategy, each process is assigned a priority based on its priority number or some other factors. Round Robin RR Scheduling: In this strategy, each process is granted a fixed time slice, also referred to as a time quantum.

Multilevel Feedback Queue Scheduling (MFQ): This is a variant of the round-robin scheduling strategy with more than one queue, each with a different time quanta. Every algorithm has its high and low points, and the choice between them depends upon the real needs of a system.


Comments ()


Sign in

Read Next

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Clarizen

Blog banner

Swiggi

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Types of email

Blog banner

Music

Blog banner

NodeJs

Blog banner

Multicore and Multithreading

Blog banner

VIRTUAL MACHINES

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Operating system

Blog banner

Rain

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Data Mining

Blog banner

Modern Operating Systems.

Blog banner

URL vs Domain

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

The most common internet security threats

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

How return on investment is defined in IT services

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Sage business cloud accounting

Blog banner

Deadlock

Blog banner

THE ACTORS LIFE

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

An Overivew Of Cache Memory

Blog banner

Understanding Regression Analysis

Blog banner

Water Resources are about to exhaust...

Blog banner

Interesting fact about kangaroo.

Blog banner

Mobile Survey

Blog banner

Virtual Machine

Blog banner

How Harshad Valia International School is nurturing India’s Young Minds?

Blog banner

Proton mail

Blog banner

Types of Viruses

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Lifestyle of a photographer

Blog banner

Self managing devices

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner