wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling

profile
Dhruvi Bhatt
Sep 09, 2024
0 Likes
0 Discussions
62 Reads

*Process Scheduling*


Process scheduling is the allocation of CPU time to processes. The OS scheduler selects a process from the ready queue and allocates the CPU to execute it.


*Scheduling Algorithms*


1. *First-Come-First-Served (FCFS)*: Processes are executed in the order they arrive in the ready queue.

2. *Shortest Job First (SJF)*: The shortest process is executed first.

3. *Priority Scheduling*: Processes are executed based on priority, with higher-priority processes running first.

4. *Round-Robin (RR)*: Each process is allocated a fixed time slice (time quantum) in a cyclic order.

5. *Multilevel Feedback Queue (MFQ)*: Multiple queues with different priorities; processes move between queues based on their behavior.


*Scheduling Criteria*


1. *CPU Utilization*: Maximize CPU usage to minimize idle time.

2. *Throughput*: Maximize the number of processes completed per unit time.

3. *Turnaround Time*: Minimize the time between process submission and completion.

4. *Response Time*: Minimize the time between process submission and first response.

5. *Fairness*: Ensure equal allocation of resources to processes.


*Scheduling Types*


1. *Preemptive Scheduling*: The OS can suspend a running process to allocate the CPU to another process.

2. *Non-Preemptive Scheduling*: The OS cannot suspend a running process; it must complete before another process runs.


*Scheduling Data Structures*


1. *Ready Queue*: Holds processes waiting for CPU allocation.

2. *Waiting Queue*: Holds processes waiting for I/O or other resources.

3. *Zombie Process*: A process that has completed execution but still holds system resources.


*Context Switching*


Context switching occurs when the OS switches the CPU from one process to another. It involves saving the current process's state and restoring the new process's state.



Comments ()


Sign in

Read Next

Memory Management in an Operating System

Blog banner

Virtual Memory

Blog banner

What if COVID does not exist!

Blog banner

What is Email? Uses of Emails

Blog banner

The seven-step improvement process

Blog banner

Security issues

Blog banner

Zomato (Income Sources)

Blog banner

Real-time Scheduling - 53003230061

Blog banner

E-BUSINESS RISK MANAGEMENT

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Introduction to Virtual Memory - 080

Blog banner

"Mahakali cave"

Blog banner

Education: Key to your Prosperity

Blog banner

DBMS and various career options related to it.

Blog banner

Modern Operating System

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Process in OS

Blog banner

Development Of Modern Operating System

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Street foods

Blog banner

Synchronization

Blog banner

Travelling blog

Blog banner

DATA VAULT

Blog banner

MailChimp

Blog banner

Network Security Risks

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Blockchain Transactions

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

security requirements for safe e-payment

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

TRELLO

Blog banner

Multicore and multithreading 171

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Modern Operating System

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Why home remedies don’t work for Hangover?

Blog banner

Deadlock in operating system

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

PERSONAL STORIES

Blog banner

File system

Blog banner

Worms, viruses and Bots

Blog banner