wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
NAHIDA SHAIKH
Sep 11, 2024
0 Likes
0 Discussions
107 Reads

Uniprocessor scheduling in operating systems manages how the CPU handles tasks when only one processor is available. Here are the main approaches:


### 1. **Preemptive Scheduling**: 

The CPU can be taken away from a process mid-execution to allow another process to run.

- **Round Robin (RR)**: Each process gets a fixed time slice. If it doesn’t finish, it goes to the back of the queue.

- **Priority Scheduling**: CPU is assigned based on priority. A higher-priority task can interrupt a lower-priority one.

- **Shortest Remaining Time First (SRTF)**: The process with the least time left to execute runs next, preempting if needed.


### 2. **Non-Preemptive Scheduling**: 

Once a process starts, it runs to completion before another process can be scheduled.

- **First-Come, First-Served (FCFS)**: Processes are scheduled in the order they arrive.

- **Shortest Job First (SJF)**: The process with the shortest duration runs first.


### 3. **Multilevel Queue Scheduling**: 

Processes are divided into categories, each with its own queue and scheduling algorithm.


### 4. **Multilevel Feedback Queue**: 

Processes can move between different priority queues based on their behavior, adapting to system needs.


The choice of scheduling algorithm impacts system performance, balancing fairness, CPU utilization, and response time.


Comments ()


Sign in

Read Next

Consumer to consumer business mode

Blog banner

Software

Blog banner

Constrains in service design

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Multithreading in Operating System

Blog banner

Why Seasonal Summer Foods Are Best for Your Health?

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Concurrency and Deadlocks

Blog banner

Session Hijacking Techniques

Blog banner

Dudhasagar waterfall ?

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Yoga in INDIA and ABROAD

Blog banner

GEOLOGY AND GEO-TECTONIC FRAME WORK OF WESTERN BASTAR CRATON

Blog banner

How Cyber Forensics use in AI

Blog banner

Place to visit in pune

Blog banner

?How long does wisdom tooth pain last?

Blog banner

In the world of Technology...

Blog banner

VIRTUAL MEMORY

Blog banner

Processes : Process description and control

Blog banner

Processing Crime and Incident Scenes

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

This is my first blog.

Blog banner

Operating system

Blog banner

Self managing devices

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Modern Operating System

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Palm Vein Biometric Technology; Contactless vein authentication

Blog banner

Virtual Memory

Blog banner

Direct Memory Access

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Blockchain in IoT Applications

Blog banner

Answer

Blog banner

How Harshad Valia International School is nurturing India’s Young Minds?

Blog banner

Teamwork

Blog banner

Virtual memory

Blog banner

IP ADDRESS

Blog banner

GOOGLE

Blog banner

Deadlock

Blog banner