wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
Sarvo Singh
Sep 09, 2024
0 Likes
0 Discussions
109 Reads

Uniprocessor Scheduling


Uniprocessor scheduling is one of the prime aspects when dealing with operating systems. It tries to allocate the CPU time of one processor among various competing processes or tasks. Its main objective is the optimization of system performance, fairness, and responsiveness by effective allocation of the CPU time to competing processes.


Scheduling Criteria


Several criteria are used to evaluate the efficiency of a uniprocessor scheduling algorithm. These are:


CPU Utilization: It is the time for which the CPU remains busy in executing the processes. Throughput: It is the number of processes executed in a unit of time. Turnaround Time: This is the complete time taken to finish a process. Waiting Time: The time spent by a process in the ready queue waiting. Response Time: The time that takes to respond to any process request. Scheduling Algorithms Various uniprocessor scheduling algorithms have been developed to optimize these criteria. A number of well-known algorithms are as follows:


First-Come-First-Served FCFS Scheduling: This is simple to implement, but may result in poor performance and starvation. SJF Scheduling: This is optimal with respect to average waiting time but may lead to starvation. Priority Scheduling: In this strategy, each process is assigned a priority based on its priority number or some other factors. Round Robin RR Scheduling: In this strategy, each process is granted a fixed time slice, also referred to as a time quantum.

Multilevel Feedback Queue Scheduling (MFQ): This is a variant of the round-robin scheduling strategy with more than one queue, each with a different time quanta. Every algorithm has its high and low points, and the choice between them depends upon the real needs of a system.


Comments ()


Sign in

Read Next

Evolution of Operating system

Blog banner

NETSUITE

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Fault tolerance

Blog banner

Virtual memory

Blog banner

Big Data

Blog banner

Online Education

Blog banner

Supervised and unsupervised learning

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Memory heirachy (Operating system)

Blog banner

GIS Bharat Maps

Blog banner

Security requirements for Safe E-Payments

Blog banner

HOW CAN SOCIAL MEDIA MAKE YOU HAPPIER?

Blog banner

Fashion marketing in india

Blog banner

Deadlock and Starvation

Blog banner

Windows Operating System

Blog banner

Deadlock and Starvation

Blog banner

File Organization and Access

Blog banner

PHONE TECHNOLOGY

Blog banner

Service Operations in ITSM

Blog banner

A Journey By Train

Blog banner

NETWORK SECURITY RISKS

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Semaphores

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

AOL Mail

Blog banner

Google App Engine

Blog banner

Asana

Blog banner

Social Media.

Blog banner

Mobile Survey

Blog banner

The Peephole

Blog banner

Process Description

Blog banner

Some web vulnerabilities

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Virtual Memory

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

Social Network Analysis: Ek Naya Nazariya Data Science Mein

Blog banner

HR Automation : Need of the hour

Blog banner

Cache Memory

Blog banner

Use case of K-means clustering

Blog banner