wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor scheduling

profile
Shyaan Vanani
Sep 09, 2024
0 Likes
0 Discussions
98 Reads

Uniprocessor scheduling refers to how a single CPU (uniprocessor) manages the execution of multiple processes. Since only one process can run at a time, the system needs to decide the order in which processes are executed. The goal is to optimize CPU usage and improve system performance. There are several types of uniprocessor scheduling algorithms:


1. First-Come, First-Served (FCFS): Processes are executed in the order they arrive. Simple but can lead to long wait times if a process with a long execution time arrives first.


2. Shortest Job Next (SJN): The process with the shortest execution time is selected first. It minimizes waiting time but requires knowledge of job length in advance.


3. Priority Scheduling: Each process is assigned a priority, and the CPU executes the highest-priority process first. Lower-priority processes may starve if higher-priority processes keep arriving.


4. Round Robin (RR): Each process gets a fixed time slice (or quantum). After its time slice expires, the process goes to the back of the queue. This ensures fairness but may increase context switching overhead.


5. Multilevel Queue Scheduling: Processes are divided into multiple queues based on priority or type, and each queue has its own scheduling algorithm.


6. Multilevel Feedback Queue: A dynamic version of multilevel queue scheduling where processes can move between queues based on their behavior (e.g., CPU-bound vs. I/O-bound processes).


Uniprocessor scheduling ensures that resources are used efficiently and processes run smoothly on single-core systems.


Comments ()


Sign in

Read Next

Security Issues and Countermeasures

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

IT Service Continuity Management

Blog banner

Process Creation

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

Why we fail after giving 100% ?

Blog banner

E-learning

Blog banner

VPN

Blog banner

Ola

Blog banner

What is a geographic information system (GIS)?

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Regression Analysis

Blog banner

Android Flashlight Application

Blog banner

Components of GIS

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Blockchain Transactions

Blog banner

Khau Galli – Vile Parle

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

The application udemy

Blog banner

Memory management

Blog banner

Article on Zoho Corporation

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

To travel is to live

Blog banner

Data Acquisition in Cyber Forensics

Blog banner

Interrupts in operating system.

Blog banner

Virtual Memory

Blog banner

Fossil Hunting 101 at the Peace River, Arcadia, Florida, USA

Blog banner

Deadlock and starvation

Blog banner

Inventory management software system

Blog banner

Cache Memory

Blog banner

Disk Scheduling

Blog banner

Blockchain in IoT Applications

Blog banner

IT security management

Blog banner

Why am I never satisfied with my Life?

Blog banner

Threads

Blog banner

File Organization and Access

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Introduction to GIS

Blog banner

Os(Computer security threats)

Blog banner

virtual memory

Blog banner