wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
NAHIDA SHAIKH
Sep 11, 2024
0 Likes
0 Discussions
107 Reads

Uniprocessor scheduling in operating systems manages how the CPU handles tasks when only one processor is available. Here are the main approaches:


### 1. **Preemptive Scheduling**: 

The CPU can be taken away from a process mid-execution to allow another process to run.

- **Round Robin (RR)**: Each process gets a fixed time slice. If it doesn’t finish, it goes to the back of the queue.

- **Priority Scheduling**: CPU is assigned based on priority. A higher-priority task can interrupt a lower-priority one.

- **Shortest Remaining Time First (SRTF)**: The process with the least time left to execute runs next, preempting if needed.


### 2. **Non-Preemptive Scheduling**: 

Once a process starts, it runs to completion before another process can be scheduled.

- **First-Come, First-Served (FCFS)**: Processes are scheduled in the order they arrive.

- **Shortest Job First (SJF)**: The process with the shortest duration runs first.


### 3. **Multilevel Queue Scheduling**: 

Processes are divided into categories, each with its own queue and scheduling algorithm.


### 4. **Multilevel Feedback Queue**: 

Processes can move between different priority queues based on their behavior, adapting to system needs.


The choice of scheduling algorithm impacts system performance, balancing fairness, CPU utilization, and response time.


Comments ()


Sign in

Read Next

Challenges and risks in service operations

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

OS assignment 3

Blog banner

Memory management

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Trello ( management software)

Blog banner

Python as a tool for Data science task & project

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Hacking of web server and application

Blog banner

Memory input output management

Blog banner

Memory management

Blog banner

Types Of scheduling

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Social Engineering Deceptions and Defenses

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

What is OS Fingerprinting?

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

Operating Systems

Blog banner

Race Conditions

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Processes : Process description and control

Blog banner

INTRANET

Blog banner

Making Money through Instagram

Blog banner

Interrupts - Types, Working & Importance

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

SMARTSHEET MANAGEMENT SYSTEM

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Virtual Machine's

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Principles of Concurrency

Blog banner

How To Secure Operating Systems ?

Blog banner

Computer Security

Blog banner

Blockchain

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

HUBSPOT

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

VIRTUAL MACHINES

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner