wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Raj Darji 1501
Sep 09, 2024
0 Likes
0 Discussions
84 Reads

DISK SCHEDULING

  • Disk scheduling is a technique operating systems use to manage the order in which disk I/O (input/output) requests are processed. Disk scheduling is also known as I/O Scheduling. The main goals of disk scheduling are to optimize the performance of disk operations, reduce the time it takes to access data and improve overall system efficiency.
  • In this article, we will explore the different types of disk scheduling algorithms and their functions. By understanding and implementing these algorithms, we can optimize system performance and ensure faster data retrieval.

Importance of Disk Scheduling in Operating System:

  • Multiple I/O requests may arrive by different processes and only one I/O request can be served at a time by the disk controller. Thus other I/O requests need to wait in the waiting queue and need to be scheduled.
  • Two or more requests may be far from each other so this can result in greater disk arm movement.
  • Hard drives are one of the slowest parts of the computer system and thus need to be accessed in an efficient manner.

Key Terms Associated with Disk Scheduling

  • Seek Time: Seek time is the time taken to locate the disk arm to a specified track where the data is to be read or written. So the disk scheduling algorithm that gives a minimum average seek time is better.
  • Rotational Latency: Rotational Latency is the time taken by the desired sector of the disk to rotate into a position so that it can access the read/write heads. So the disk scheduling algorithm that gives minimum rotational latency is better.
  • Transfer Time: Transfer time is the time to transfer the data. It depends on the rotating speed of the disk and the number of bytes to be transferred.
  • Disk Access Time:
  • Disk Access Time = Seek Time + Rotational Latency + Transfer Time

Comments ()


Sign in

Read Next

BITCOIN WALLET

Blog banner

Deadlock

Blog banner

Having passion in life

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Real-time Scheduling - 53003230061

Blog banner

10 Problems you face if you are an Otaku

Blog banner

What is Vishing?

Blog banner

Constrains in service design

Blog banner

De-Coding Love

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

"Audit" In Data Science

Blog banner

Deadlock and starvation in operating system

Blog banner

Hey Aryan here

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Photorec - media recovery tool

Blog banner

How Cyber Forensics help prevent Crimes

Blog banner

What is Minting & Mining

Blog banner

The Rich Heritage Of Patola Sarees: Gujarat’s Timeless Weaving Art

Blog banner

Functions of Operating System

Blog banner

IoT Architecture Based Security

Blog banner

Swiggi

Blog banner

GUIDE TO GIS

Blog banner

Student Grade Calculator in LISP

Blog banner

Teenagers of Today

Blog banner

Memory Management

Blog banner

GIS in Disaster Management

Blog banner

What are Tenders its various types

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

E-Governance

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Networking 101: How to Build Meaningful Connections in College

Blog banner

Traditional Unix System

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

A Deep Dive

Blog banner

Memory management

Blog banner

Modern operating system

Blog banner

Why Friendship at Work is Important

Blog banner

Jira Software

Blog banner

Atlantis - The Lost Island.........

Blog banner

Facebook marketing

Blog banner