wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
NAHIDA SHAIKH
Sep 11, 2024
0 Likes
0 Discussions
107 Reads

Uniprocessor scheduling in operating systems manages how the CPU handles tasks when only one processor is available. Here are the main approaches:


### 1. **Preemptive Scheduling**: 

The CPU can be taken away from a process mid-execution to allow another process to run.

- **Round Robin (RR)**: Each process gets a fixed time slice. If it doesn’t finish, it goes to the back of the queue.

- **Priority Scheduling**: CPU is assigned based on priority. A higher-priority task can interrupt a lower-priority one.

- **Shortest Remaining Time First (SRTF)**: The process with the least time left to execute runs next, preempting if needed.


### 2. **Non-Preemptive Scheduling**: 

Once a process starts, it runs to completion before another process can be scheduled.

- **First-Come, First-Served (FCFS)**: Processes are scheduled in the order they arrive.

- **Shortest Job First (SJF)**: The process with the shortest duration runs first.


### 3. **Multilevel Queue Scheduling**: 

Processes are divided into categories, each with its own queue and scheduling algorithm.


### 4. **Multilevel Feedback Queue**: 

Processes can move between different priority queues based on their behavior, adapting to system needs.


The choice of scheduling algorithm impacts system performance, balancing fairness, CPU utilization, and response time.


Comments ()


Sign in

Read Next

Shoulders

Blog banner

STARVATION

Blog banner

Linux

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Eating Well With Meal Maharaj on Busy Workdays Without Cooking

Blog banner

Security in Cloud Computing

Blog banner

Trends that began during the pandemic

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Regression Analysis

Blog banner

Deadlock and Starvation

Blog banner

Understanding E-mail Servers

Blog banner

IP ADDRESS

Blog banner

Raid

Blog banner

Dos (Denial of service) Attack

Blog banner

Hey Aryan here

Blog banner

What is M-commerce and how it's work

Blog banner

Virtual Memory

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

I/O Management and Disk Scheduling

Blog banner

Every body is beautiful

Blog banner

MySQL

Blog banner

Pink sauce pasta

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

CRISP-DM Methodology

Blog banner

What is Packet Filtering?

Blog banner

Routers

Blog banner

Product Discount Calculator

Blog banner

How to tie a Tie

Blog banner

Modern operating system

Blog banner

Buffers in Operating Systems

Blog banner

WORKFRONT SOFTWARE

Blog banner

Importance of self defence for girls

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

Uniprocessor and Types

Blog banner

Street foods

Blog banner

Education?

Blog banner

Deadlock

Blog banner

Security Issues and Countermeasures

Blog banner

Different memory allocation strategies

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Memory Management

Blog banner