wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk Scheduling

profile
Rishi Chauhan
Sep 09, 2024
0 Likes
0 Discussions
77 Reads

Disk scheduling in an operating system is the method used to determine the order in which disk I/O requests are serviced. Efficient disk scheduling is essential because disk I/O is relatively slow, and multiple requests may arrive simultaneously. The primary goal of disk scheduling is to reduce the total seek time, which is the time taken by the disk's read/write head to move to the correct track where the data resides.

Key Terms:

  • Seek Time: Time required to move the disk arm to the desired track.
  • Rotational Latency: Time for the disk to rotate the required sector under the read/write head.
  • Transfer Time: Time taken to transfer data after the head is positioned.

Common Disk Scheduling Algorithms:

  1. First-Come, First-Served (FCFS):
  • This algorithm services requests in the order they arrive.
  • Pros: Simple and fair.
  • Cons: Can lead to high seek times and inefficient disk utilization, as the head may have to move back and forth frequently (the “convoy effect”).
  1. Shortest Seek Time First (SSTF):
  • SSTF selects the request closest to the current head position, minimizing seek time for each operation.
  • Pros: Reduces average seek time compared to FCFS.
  • Cons: Can cause starvation for requests far from the head, as closer requests are always prioritized.
  1. SCAN (Elevator Algorithm):
  • The disk head moves in one direction (e.g., inward), servicing requests, and then reverses direction when it reaches the end.
  • Pros: Reduces starvation and provides more efficient head movement than SSTF.
  • Cons: Edge requests may wait longer since the head services requests in a sweeping motion.
  1. C-SCAN (Circular SCAN):
  • The disk head moves in one direction to the end of the disk, then jumps back to the beginning without servicing requests on the way back.
  • Pros: Provides more uniform wait times compared to SCAN.
  • Cons: The jump-back can introduce a small delay for requests near the start of the disk.
  1. LOOK and C-LOOK:
  • Variants of SCAN and C-SCAN where the disk head only goes as far as the furthest request, reducing unnecessary movement.
  • Pros: More efficient in terms of minimizing head movement.

Efficient disk scheduling reduces seek times, improves system performance, and ensures fair access to disk resources for multiple processes.


Comments ()


Sign in

Read Next

LINUX VSERVER VIRTUAL MACHINE ARCHITECTURE

Blog banner

Consumer to consumer Business model

Blog banner

Security Issues and Countermeasures

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

"Games and the future"

Blog banner

File management

Blog banner

M commerce

Blog banner

Getting into Anime

Blog banner

american greatines

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Deadlock in operating system

Blog banner

virtual machine

Blog banner

Information of meesho company

Blog banner

How Cyber Forensics use in AI

Blog banner

Memory Management

Blog banner

Modern OS

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Smartsheet

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Vulnerability Assessment

Blog banner

Memory Management

Blog banner

MODERN OPERATING SYSTEM

Blog banner

How I use google in my daily life

Blog banner

A Heartfelt Act of Kindness

Blog banner

The application udemy

Blog banner

DIGITAL TECHNOLOGY

Blog banner

Boxing

Blog banner

Depression

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Cloud Computing

Blog banner

Risk mitigation and management

Blog banner

HubSpot

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Cyber Forensics

Blog banner

Cryptanalysis tool

Blog banner

Scala - a programming tool

Blog banner

The khan mehtab transforming the modular switches company

Blog banner