wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
38 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Rain

Blog banner

Memory Management in Operating System

Blog banner

Pipedrive

Blog banner

Uniprocessor scheduling

Blog banner

City of Mumbai (Bombay):

Blog banner

Paid Email

Blog banner

WomenEmpowerment

Blog banner

memory managment

Blog banner

Telegram and it's features

Blog banner

Security Issues and Countermeasures

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

INTERNET

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

Memory management

Blog banner

How to write a cover letter

Blog banner

What is Packet Filtering?

Blog banner

An Overivew Of Cache Memory

Blog banner

To-Do List In LISP

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Concurrency management in operating systems

Blog banner

A True Friendship

Blog banner

A Short History of GIS

Blog banner

The Five Steps of Data Science

Blog banner

What is Spyware? and examples of them.

Blog banner

The evolution of OS

Blog banner

Mumbaicha Dabbawalla

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Data Mining

Blog banner

Having passion in life

Blog banner

Security in Operating Systems

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

Deadlock

Blog banner

Blog on health and fitness

Blog banner

GIS in Disaster Management

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

USPS mail

Blog banner

Deadlock and starvation

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Life of a 2020-2021 student

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Power of words

Blog banner