wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Uniprocessor Scheduling

profile
NAHIDA SHAIKH
Sep 11, 2024
0 Likes
0 Discussions
107 Reads

Uniprocessor scheduling in operating systems manages how the CPU handles tasks when only one processor is available. Here are the main approaches:


### 1. **Preemptive Scheduling**: 

The CPU can be taken away from a process mid-execution to allow another process to run.

- **Round Robin (RR)**: Each process gets a fixed time slice. If it doesn’t finish, it goes to the back of the queue.

- **Priority Scheduling**: CPU is assigned based on priority. A higher-priority task can interrupt a lower-priority one.

- **Shortest Remaining Time First (SRTF)**: The process with the least time left to execute runs next, preempting if needed.


### 2. **Non-Preemptive Scheduling**: 

Once a process starts, it runs to completion before another process can be scheduled.

- **First-Come, First-Served (FCFS)**: Processes are scheduled in the order they arrive.

- **Shortest Job First (SJF)**: The process with the shortest duration runs first.


### 3. **Multilevel Queue Scheduling**: 

Processes are divided into categories, each with its own queue and scheduling algorithm.


### 4. **Multilevel Feedback Queue**: 

Processes can move between different priority queues based on their behavior, adapting to system needs.


The choice of scheduling algorithm impacts system performance, balancing fairness, CPU utilization, and response time.


Comments ()


Sign in

Read Next

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Predicting Student Performance with Data Science

Blog banner

Short note on Microsoft office

Blog banner

Understanding Mobile Device Forensics

Blog banner

Senseless Teeths

Blog banner

Business-to-Business

Blog banner

Environmental Management using GIS

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

IT GOVERNANCE

Blog banner

MAILFENCE

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

How Does SSO Works

Blog banner

Buffers in Operating Systems

Blog banner

Deadlock in operating system

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

Travelling blog

Blog banner

Deadlock and Starvation

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Deadlock in Operating System

Blog banner

Buffer overflow

Blog banner

Data Lake

Blog banner

What is Spyware?

Blog banner

Asana

Blog banner

Data Science & AI

Blog banner

Virtual Machine

Blog banner

Process Description

Blog banner

Honeypot in cyber security

Blog banner

Rapido

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

Virtual memory

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

PERSONAL STORIES

Blog banner

Mobile Survey

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Process and Threading

Blog banner

Article on team management software

Blog banner

Virtual memory

Blog banner