wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
Sarvo Singh
Sep 09, 2024
0 Likes
0 Discussions
109 Reads

Uniprocessor Scheduling


Uniprocessor scheduling is one of the prime aspects when dealing with operating systems. It tries to allocate the CPU time of one processor among various competing processes or tasks. Its main objective is the optimization of system performance, fairness, and responsiveness by effective allocation of the CPU time to competing processes.


Scheduling Criteria


Several criteria are used to evaluate the efficiency of a uniprocessor scheduling algorithm. These are:


CPU Utilization: It is the time for which the CPU remains busy in executing the processes. Throughput: It is the number of processes executed in a unit of time. Turnaround Time: This is the complete time taken to finish a process. Waiting Time: The time spent by a process in the ready queue waiting. Response Time: The time that takes to respond to any process request. Scheduling Algorithms Various uniprocessor scheduling algorithms have been developed to optimize these criteria. A number of well-known algorithms are as follows:


First-Come-First-Served FCFS Scheduling: This is simple to implement, but may result in poor performance and starvation. SJF Scheduling: This is optimal with respect to average waiting time but may lead to starvation. Priority Scheduling: In this strategy, each process is assigned a priority based on its priority number or some other factors. Round Robin RR Scheduling: In this strategy, each process is granted a fixed time slice, also referred to as a time quantum.

Multilevel Feedback Queue Scheduling (MFQ): This is a variant of the round-robin scheduling strategy with more than one queue, each with a different time quanta. Every algorithm has its high and low points, and the choice between them depends upon the real needs of a system.


Comments ()


Sign in

Read Next

Europe Through My Lens

Blog banner

Health is Wealth

Blog banner

Use case of K-means clustering

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

MySQL

Blog banner

File management

Blog banner

To travel is to live

Blog banner

Memory Management in Operating System

Blog banner

Different types of scam Fraud

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Session Hijacking Techniques

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Benefits and drawback of web security.

Blog banner

Synchronization

Blog banner

Operating Systems

Blog banner

What is Influencer Marketing and its Trends

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Data Structures

Blog banner

Sessions In OS.

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Top 5 Post-Wedding Skin Care Tips

Blog banner

Modern operating system

Blog banner

Emailing the merger document

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Memory Management

Blog banner

undefined

Blog banner

Hacking

Blog banner

Loneliness

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

The Sunny Side of Instagram

Blog banner

E-Cash (Electronic Cash)

Blog banner

Open relationships

Blog banner

Deadlock and Starvation

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

INTRODUCTION

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Deadlock and Starvation

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

Beauty of indian railway

Blog banner

Article on Team Work

Blog banner