wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
NAHIDA SHAIKH
Sep 11, 2024
0 Likes
0 Discussions
107 Reads

Uniprocessor scheduling in operating systems manages how the CPU handles tasks when only one processor is available. Here are the main approaches:


### 1. **Preemptive Scheduling**: 

The CPU can be taken away from a process mid-execution to allow another process to run.

- **Round Robin (RR)**: Each process gets a fixed time slice. If it doesn’t finish, it goes to the back of the queue.

- **Priority Scheduling**: CPU is assigned based on priority. A higher-priority task can interrupt a lower-priority one.

- **Shortest Remaining Time First (SRTF)**: The process with the least time left to execute runs next, preempting if needed.


### 2. **Non-Preemptive Scheduling**: 

Once a process starts, it runs to completion before another process can be scheduled.

- **First-Come, First-Served (FCFS)**: Processes are scheduled in the order they arrive.

- **Shortest Job First (SJF)**: The process with the shortest duration runs first.


### 3. **Multilevel Queue Scheduling**: 

Processes are divided into categories, each with its own queue and scheduling algorithm.


### 4. **Multilevel Feedback Queue**: 

Processes can move between different priority queues based on their behavior, adapting to system needs.


The choice of scheduling algorithm impacts system performance, balancing fairness, CPU utilization, and response time.


Comments ()


Sign in

Read Next

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

What is Internet

Blog banner

Vulnerability Assessment

Blog banner

Scheduling

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Challenges and risks in service operations

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

About myself

Blog banner

Internet of Things and cyber security

Blog banner

Sage business cloud accounting

Blog banner

Busted : Common Web Security Myths

Blog banner

Wedding photographer

Blog banner

Deadlock Prevention

Blog banner

Sage

Blog banner

Threads

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Hello World

Blog banner

Microsoft powerpoint presentation

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Regression Analysis

Blog banner

Child labour

Blog banner

Sagar Parikrama

Blog banner

E-Cash (Electronic Cash)

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Service Design Model

Blog banner

Multiprocessor and scheduling

Blog banner

Interesting fact about kangaroo.

Blog banner

FRIENDSHIP

Blog banner

Raid

Blog banner

Threat management

Blog banner

Computer Security

Blog banner

OS Assignment 3 Deadlock

Blog banner

Senseless Teeths

Blog banner

american greatines

Blog banner

Crypto tax evasion

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

IT Service Continuity Management

Blog banner

Raid and levels of raid.

Blog banner