wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Darshan Somaiya
Sep 13, 2024
0 Likes
0 Discussions
169 Reads

Disk scheduling refers to the algorithms used by the operating system to manage the order in which read and write requests to the disk are processed. These algorithms aim to minimize seek time, which is the time taken for the disk's read-write head to move to the correct track.


The commonly used disk scheduling algorithms include:

1. **First Come First Serve (FCFS)** 

  - Processes requests in the order they arrive.

  - Simple but can lead to high seek times if requests are scattered across the disk.


2. **Shortest Seek Time First (SSTF)** 

  - Selects the request closest to the current position of the read-write head.

  - Minimizes seek time, but can cause starvation if requests for distant cylinders are continuously delayed.


3. **SCAN (Elevator Algorithm)** 

  - The disk head moves in one direction, servicing requests until it reaches the end, then reverses direction.

  - It scans back and forth across the disk, ensuring fairness and reducing seek times compared to FCFS.


4. **C-SCAN (Circular SCAN)** 

  - Similar to SCAN, but the head moves in one direction and, after reaching the end, returns to the beginning without servicing any requests on the return trip.

  - Provides more uniform wait times.


5. **LOOK** 

  - A variant of SCAN, but the head only goes as far as the last request in each direction, instead of going to the end of the disk.


6. **C-LOOK** 

  - Similar to C-SCAN, but the head moves only as far as the last request before reversing direction, then jumps back to the first request.


These algorithms balance efficiency and fairness, aiming to reduce the total seek time and optimize disk performance.


Comments ()


Sign in

Read Next

Software

Blog banner

Service transition principles

Blog banner

M commerce

Blog banner

AOL Mail

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

DBMS and various career options related to it.

Blog banner

SESSION HIJACKING

Blog banner

Trello ( management software)

Blog banner

Steganography and Steganalysis

Blog banner

SPAM

Blog banner

Deadlock and Starvation

Blog banner

From Model Mistakes to Metrics

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

How China Regained It's World's Largest Growing Economy Status

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Virtual Memory

Blog banner

Art and Culture of Rajasthan

Blog banner

E-Governance

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

LinkedIn

Blog banner

Starting Android Activity Using Intent

Blog banner

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

A True Friendship

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Mumbai Metro 3

Blog banner

Memory management and virtual memory

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Security requirements for Safe E-Payments

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Latest Email Marketing Techniques

Blog banner

My favourite food

Blog banner

How Does SSO Works

Blog banner

Proton mail

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Memory Management

Blog banner

Risk factors in service transistion

Blog banner

How to tie a Tie

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner