wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
62 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

This too shall pass

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Constrains in service design

Blog banner

Importance of Website

Blog banner

Puri Jagannath temple

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Blockchain in IoT Applications

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Mendeley (management software)

Blog banner

Difference Between Classification And Clustering

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

IoT Evolution

Blog banner

DURGA POOJA

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

virtual machine

Blog banner

Process State

Blog banner

Virtual Memory

Blog banner

PHONE TECHNOLOGY

Blog banner

MAILFENCE

Blog banner

Why is online marketing is important in current scenario

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

PERT Overview

Blog banner

Fashion design

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Service Transition Process in ITSM

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

USPS mail

Blog banner

Predicting Student Performance with Data Science

Blog banner

Spotify

Blog banner

TAILS OS

Blog banner

Email Privacy

Blog banner

How to feel Happy everyday day

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Big Data Architecture

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Virtual Machine

Blog banner

OS ASSIGNMENT

Blog banner

LINUX

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Cache memory

Blog banner