wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor scheduling

profile
Shyaan Vanani
Sep 09, 2024
0 Likes
0 Discussions
97 Reads

Uniprocessor scheduling refers to how a single CPU (uniprocessor) manages the execution of multiple processes. Since only one process can run at a time, the system needs to decide the order in which processes are executed. The goal is to optimize CPU usage and improve system performance. There are several types of uniprocessor scheduling algorithms:


1. First-Come, First-Served (FCFS): Processes are executed in the order they arrive. Simple but can lead to long wait times if a process with a long execution time arrives first.


2. Shortest Job Next (SJN): The process with the shortest execution time is selected first. It minimizes waiting time but requires knowledge of job length in advance.


3. Priority Scheduling: Each process is assigned a priority, and the CPU executes the highest-priority process first. Lower-priority processes may starve if higher-priority processes keep arriving.


4. Round Robin (RR): Each process gets a fixed time slice (or quantum). After its time slice expires, the process goes to the back of the queue. This ensures fairness but may increase context switching overhead.


5. Multilevel Queue Scheduling: Processes are divided into multiple queues based on priority or type, and each queue has its own scheduling algorithm.


6. Multilevel Feedback Queue: A dynamic version of multilevel queue scheduling where processes can move between queues based on their behavior (e.g., CPU-bound vs. I/O-bound processes).


Uniprocessor scheduling ensures that resources are used efficiently and processes run smoothly on single-core systems.


Comments ()


Sign in

Read Next

Threads

Blog banner

Jira Software

Blog banner

Emerging threats in cyber Forensics

Blog banner

An Overview of Virtual Machines

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

Memory heirchy

Blog banner

INTERNET SECURITY

Blog banner

Be you

Blog banner

Animal’s have my heart

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Types of threads

Blog banner

Modern operating system

Blog banner

Life of an army person

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

AI and cyber Security

Blog banner

Operating Systems

Blog banner

Memory management

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Natural Language Processing(NLP)

Blog banner

Memory Management

Blog banner

Why You Should Not Use Free VPNs

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

The Benefits of Practical Life Activities in Preschool

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

SQL Injection

Blog banner

Virtual machine.

Blog banner

Virtual memory

Blog banner

Beatbox

Blog banner

Supervised and unsupervised learning

Blog banner

memory management

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

Social media

Blog banner

I/O Buffering

Blog banner

Python as a tool for data analysis

Blog banner

NETWORK SECURITY RISKS

Blog banner