wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor scheduling

profile
Palak Santoki
Sep 09, 2024
0 Likes
0 Discussions
69 Reads

Types of Scheduling

  1. Long-term scheduling - the adding and removing of processes to the pool of processes
  2. Medium-term scheduling - the adding and removing processes partially or fully from memory
  3. Short-term scheduling - the execution of a process by the CPU
  4. I/O scheduling - choosing which process will be handled by the available I/O devices

Scheduling Criteria

  • response time - time from point of submission to when the results are received (start)
  • turnaround time - time from point of submission to when the results are completed (end)
  • deadline - maximize percentage of deadlines met

User Oriented, Other

  • Predictability - a job should run the same regardless of the load

System Oriented, Performance Related

  • throughput - amount of processes completed per time unit
  • processor utilization - ratio of time processor is busy

System Oriented, Other

  • fairness - no process should starve
  • enforcement of priorities - scheduling policy should favor processes of higher priority
  • balancing resources - keep resources busy.



Comments ()


Sign in

Read Next

Digital Forensics Challenges and Tools

Blog banner

Raid and levels of raid.

Blog banner

Expert System In AI

Blog banner

How to Run your First android App

Blog banner

MySQL

Blog banner

Blog on Smartsheet.

Blog banner

c

Blog banner

OS assignment 3

Blog banner

IT RISK

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

File management

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

I/O Management and Disk Scheduling

Blog banner

Deadlock

Blog banner

A Journey By Train

Blog banner

John Titor: The Time Traveler

Blog banner

File Systems in OS.

Blog banner

How To Secure Operating Systems ?

Blog banner

All you need to know about Website Traffic

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Blockchain Security Technique

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Smartsheet

Blog banner

Concurrency and memory

Blog banner

TAILS OS

Blog banner

Cache memory

Blog banner

AI and cyber Security

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Full Disk Encryption

Blog banner

Record Blocking

Blog banner

Blockchain in IoT Applications

Blog banner

Theads

Blog banner

Decoding Confusion Matrix

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Short note on Microsoft office

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

security requirements for safe e-payment

Blog banner

Ethical Hacking

Blog banner

Bulk E-mail software

Blog banner

memory management

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner