wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor scheduling

profile
Shyaan Vanani
Sep 09, 2024
0 Likes
0 Discussions
98 Reads

Uniprocessor scheduling refers to how a single CPU (uniprocessor) manages the execution of multiple processes. Since only one process can run at a time, the system needs to decide the order in which processes are executed. The goal is to optimize CPU usage and improve system performance. There are several types of uniprocessor scheduling algorithms:


1. First-Come, First-Served (FCFS): Processes are executed in the order they arrive. Simple but can lead to long wait times if a process with a long execution time arrives first.


2. Shortest Job Next (SJN): The process with the shortest execution time is selected first. It minimizes waiting time but requires knowledge of job length in advance.


3. Priority Scheduling: Each process is assigned a priority, and the CPU executes the highest-priority process first. Lower-priority processes may starve if higher-priority processes keep arriving.


4. Round Robin (RR): Each process gets a fixed time slice (or quantum). After its time slice expires, the process goes to the back of the queue. This ensures fairness but may increase context switching overhead.


5. Multilevel Queue Scheduling: Processes are divided into multiple queues based on priority or type, and each queue has its own scheduling algorithm.


6. Multilevel Feedback Queue: A dynamic version of multilevel queue scheduling where processes can move between queues based on their behavior (e.g., CPU-bound vs. I/O-bound processes).


Uniprocessor scheduling ensures that resources are used efficiently and processes run smoothly on single-core systems.


Comments ()


Sign in

Read Next

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

10 Problems you face if you are an Otaku

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

THE ACTORS LIFE

Blog banner

Security issues

Blog banner

Worms, viruses and Bots

Blog banner

Deadlock and Starvation

Blog banner

Service Strategy In ITSM

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

CyberSecurity Color Wheel

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

Sessions In OS.

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

The Five Steps of Data Science

Blog banner

Data Mining

Blog banner

Cache memory

Blog banner

Cache memory

Blog banner

Defining youtubr

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

GUIDE TO GIS

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

FREE VERSION OF G-MAIL

Blog banner

OS Assignment-3

Blog banner

Dos (Denial of service) Attack

Blog banner

MODERN OPERATING SYSTEM

Blog banner

The Golden Temple , Amritsar

Blog banner

File management

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Article on IT development trends

Blog banner

My favourite food

Blog banner

Odoo

Blog banner

Major achievement

Blog banner

What is OS Fingerprinting?

Blog banner

Direct memory access

Blog banner

Importance of education

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Cloud Computing

Blog banner

Trello ( management software)

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

Social Engineering

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner