wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
NAHIDA SHAIKH
Sep 11, 2024
0 Likes
0 Discussions
107 Reads

Uniprocessor scheduling in operating systems manages how the CPU handles tasks when only one processor is available. Here are the main approaches:


### 1. **Preemptive Scheduling**: 

The CPU can be taken away from a process mid-execution to allow another process to run.

- **Round Robin (RR)**: Each process gets a fixed time slice. If it doesn’t finish, it goes to the back of the queue.

- **Priority Scheduling**: CPU is assigned based on priority. A higher-priority task can interrupt a lower-priority one.

- **Shortest Remaining Time First (SRTF)**: The process with the least time left to execute runs next, preempting if needed.


### 2. **Non-Preemptive Scheduling**: 

Once a process starts, it runs to completion before another process can be scheduled.

- **First-Come, First-Served (FCFS)**: Processes are scheduled in the order they arrive.

- **Shortest Job First (SJF)**: The process with the shortest duration runs first.


### 3. **Multilevel Queue Scheduling**: 

Processes are divided into categories, each with its own queue and scheduling algorithm.


### 4. **Multilevel Feedback Queue**: 

Processes can move between different priority queues based on their behavior, adapting to system needs.


The choice of scheduling algorithm impacts system performance, balancing fairness, CPU utilization, and response time.


Comments ()


Sign in

Read Next

Top 4 Places To Stay In Copenhagen

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Business Engineering

Blog banner

Cache Memory

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

"Games and the future"

Blog banner

indian premier league

Blog banner

"Audit" In Data Science

Blog banner

Cloud Security: Trends and Innovations

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Policies for Service Transition

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

The Sunny Side of Instagram

Blog banner

Social Media.

Blog banner

computer security

Blog banner

Virtual memory

Blog banner

What is semaphore in operating system?

Blog banner

Capacity management in ITSM

Blog banner

Security issues

Blog banner

I/O Buffering

Blog banner

Types of Threads

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

DISK SCHEDULING

Blog banner

My Favorite Country

Blog banner

The Right way of cooking

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

semaphores in os

Blog banner

Kernel in Operating System

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

OPERATING SYSTEM

Blog banner

Memory Management in an Operating System

Blog banner

Benefits of yoga and meditation

Blog banner

Number Guessing game --lisp

Blog banner

Process in OS

Blog banner

Service Operations Principles

Blog banner

Understanding Mobile Device Forensics

Blog banner

Rain

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner