wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Scheduling in Operating Systems

profile
Juhi Soni
Sep 09, 2024
0 Likes
0 Discussions
109 Reads

In an operating system, scheduling refers to the method by which tasks are managed and allocated CPU time. The CPU is like the brain of a computer, and scheduling helps ensure it is used efficiently by deciding which task runs at any given time. In this blog, we’ll explore three types of scheduling: Uniprocessor, Multiprocessor, and Real-time.


1. Uniprocessor Scheduling:

Uniprocessor scheduling refers to systems where only one processor (CPU) is available. This type of scheduling decides which task should be executed first from a pool of tasks. The two most common types of uniprocessor scheduling are preemptive and non-preemptive.


  • Preemptive scheduling allows the CPU to switch between tasks even if a task is not completed. For example, if you’re watching a video and suddenly open a document, the CPU will stop processing the video and switch to the document.


  • Non-preemptive scheduling lets the task finish its execution before switching to another. This is like waiting in line at the cafeteria—everyone gets served one by one.


A widely used preemptive scheduling algorithm is the Round Robin method, where each task gets a fixed amount of CPU time (known as a time slice) before switching to the next task.


2. Multiprocessor Scheduling:

In multiprocessor systems, multiple CPUs are available to process tasks simultaneously. This is like having several chefs in a kitchen preparing different meals at the same time. Scheduling in such systems is more complex as the load must be evenly distributed across all processors to avoid overloading one processor while others remain idle.

There are two main approaches:


  • Symmetric multiprocessing (SMP): Each processor works independently and shares the same scheduling queue.


  • Asymmetric multiprocessing (AMP): One processor handles the scheduling, while the others follow its instructions.


Multiprocessor scheduling is used in powerful servers and modern computers to handle heavy workloads like running multiple applications simultaneously.


3. Real-time Scheduling:

Real-time scheduling is critical in systems where tasks must be completed within a strict deadline. For example, in a self-driving car, the system must process sensor data and make decisions in real-time to ensure safety.

There are two types of real-time scheduling:


  • Hard real-time: Missing a deadline can lead to system failure, like in medical devices.


  • Soft real-time: Missing deadlines is not catastrophic but still undesirable, like in video streaming where slight delays may cause buffering.


In conclusion, scheduling is essential for efficient system performance, and different types of systems require different scheduling approaches. Whether it’s managing tasks in a single CPU, distributing loads across multiple CPUs, or meeting real-time deadlines, scheduling ensures that your computer runs smoothly.


Comments ()


Sign in

Read Next

ARTICLE ON WRIKE CORPORATION

Blog banner

IP ADDRESS

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Anomaly Detection in Behavioral Data Using Machine Learning

Blog banner

virtual machine

Blog banner

Cloud Security: Trends and Innovations

Blog banner

GIS

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

10 Signs your Computer has Virus

Blog banner

File System

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Modern Operating system

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Direct Memory Access

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

Different Types of Data

Blog banner

Importance of Network Security Risk

Blog banner

I/O buffer and its techniques

Blog banner

MENDELEY

Blog banner

Google App Engine

Blog banner

Synchronization

Blog banner

File sharing

Blog banner

OLA

Blog banner

Goa Trip With Friends

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Cyber Security in Data Breaching

Blog banner

FRIENDSHIP

Blog banner

Proof-of-Stake (PoS)

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Deadlock in operating system

Blog banner

Cache Memory

Blog banner

OPERATING SYSTEM

Blog banner

Predicting Student Performance with Data Science

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Virtualisation

Blog banner

Kernel in Operating System

Blog banner

KASHMIR TRIPS

Blog banner

Electronic Funds Transfer

Blog banner

Multicore and Multithreading

Blog banner

What is E-commerce

Blog banner