wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor scheduling

profile
Palak Santoki
Sep 09, 2024
0 Likes
0 Discussions
69 Reads

Types of Scheduling

  1. Long-term scheduling - the adding and removing of processes to the pool of processes
  2. Medium-term scheduling - the adding and removing processes partially or fully from memory
  3. Short-term scheduling - the execution of a process by the CPU
  4. I/O scheduling - choosing which process will be handled by the available I/O devices

Scheduling Criteria

  • response time - time from point of submission to when the results are received (start)
  • turnaround time - time from point of submission to when the results are completed (end)
  • deadline - maximize percentage of deadlines met

User Oriented, Other

  • Predictability - a job should run the same regardless of the load

System Oriented, Performance Related

  • throughput - amount of processes completed per time unit
  • processor utilization - ratio of time processor is busy

System Oriented, Other

  • fairness - no process should starve
  • enforcement of priorities - scheduling policy should favor processes of higher priority
  • balancing resources - keep resources busy.



Comments ()


Sign in

Read Next

Development Of Modern Operating System

Blog banner

Photorec - media recovery tool

Blog banner

Objectives and Functions of Operating System

Blog banner

Optimization of operating system design

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Emerging threats in cyber Forensics

Blog banner

Full Disk Encryption

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Online Education

Blog banner

Defining youtubr

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

I/O Management and Disk Scheduling

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Basic Security For SOAP Services

Blog banner

operating system

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

Operating system

Blog banner

Memory input output management

Blog banner

Reconnaissance

Blog banner

Buffers in Operating Systems

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Cyber Security in Data Breaching

Blog banner

Malicious softwares

Blog banner

Embaded operating system

Blog banner

PHONE TECHNOLOGY

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

How To Secure Operating Systems ?

Blog banner

DBMS and various career options related to it.

Blog banner

Hacking Mobile Platforms

Blog banner

Starvation and Deadlock.

Blog banner

Is Pursuing a Dance Career in India Worth it?

Blog banner

Technical SEO : Total Guide

Blog banner

Deadlock

Blog banner

Jira service Management

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Virtual machine and virtualizing

Blog banner

Memory Management

Blog banner

Virtual Memory

Blog banner

Microsoft Windows Overview

Blog banner

Memory Management in an Operating System

Blog banner