wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Darshan Somaiya
Sep 13, 2024
0 Likes
0 Discussions
169 Reads

Disk scheduling refers to the algorithms used by the operating system to manage the order in which read and write requests to the disk are processed. These algorithms aim to minimize seek time, which is the time taken for the disk's read-write head to move to the correct track.


The commonly used disk scheduling algorithms include:

1. **First Come First Serve (FCFS)** 

  - Processes requests in the order they arrive.

  - Simple but can lead to high seek times if requests are scattered across the disk.


2. **Shortest Seek Time First (SSTF)** 

  - Selects the request closest to the current position of the read-write head.

  - Minimizes seek time, but can cause starvation if requests for distant cylinders are continuously delayed.


3. **SCAN (Elevator Algorithm)** 

  - The disk head moves in one direction, servicing requests until it reaches the end, then reverses direction.

  - It scans back and forth across the disk, ensuring fairness and reducing seek times compared to FCFS.


4. **C-SCAN (Circular SCAN)** 

  - Similar to SCAN, but the head moves in one direction and, after reaching the end, returns to the beginning without servicing any requests on the return trip.

  - Provides more uniform wait times.


5. **LOOK** 

  - A variant of SCAN, but the head only goes as far as the last request in each direction, instead of going to the end of the disk.


6. **C-LOOK** 

  - Similar to C-SCAN, but the head moves only as far as the last request before reversing direction, then jumps back to the first request.


These algorithms balance efficiency and fairness, aiming to reduce the total seek time and optimize disk performance.


Comments ()


Sign in

Read Next

E-commerce

Blog banner

Measuring IT Risk

Blog banner

Making Money through Instagram

Blog banner

Deadlock and starvation in operating system

Blog banner

Hacking

Blog banner

GUIDE TO GIS

Blog banner

Software

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Virtual Memory

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

ZOHO

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Wiretapping

Blog banner

The Evolution of Operating Systems

Blog banner

Dekkers Algorithm

Blog banner

MY FIRST BLOG?

Blog banner

Deadlock and Starvation

Blog banner

Uniprocessor Scheduling

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

PERT Overview

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

All you need to know about “On-page SEO”

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

gis substation

Blog banner

Developments in Modern Operating Systems

Blog banner

Virus

Blog banner

How To Implement Search Engine Marketing (Sem) Strategy Effectively

Blog banner

Photorec - media recovery tool

Blog banner

To travel is to live

Blog banner

The Memory Hierarchy

Blog banner

RAID_142

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Life of an army person

Blog banner

Processes : Process description and control

Blog banner

Caching windows

Blog banner

CONCURRENCY

Blog banner

File Management

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

BUFFER OVERFLOW_142

Blog banner

CSI and Organizational Change

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner