wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

DISK SCHEDULING

profile
vivek pandey
Sep 09, 2024
0 Likes
0 Discussions
38 Reads

DISK SCHEDULING

  • Disk scheduling is a technique operating systems use to manage the order in which disk I/O (input/output) requests are processed. Disk scheduling is also known as I/O Scheduling. The main goals of disk scheduling are to optimize the performance of disk operations, reduce the time it takes to access data and improve overall system efficiency.
  • In this article, we will explore the different types of disk scheduling algorithms and their functions. By understanding and implementing these algorithms, we can optimize system performance and ensure faster data retrieval.

Importance of Disk Scheduling in Operating System:

  • Multiple I/O requests may arrive by different processes and only one I/O request can be served at a time by the disk controller. Thus other I/O requests need to wait in the waiting queue and need to be scheduled.
  • Two or more requests may be far from each other so this can result in greater disk arm movement.
  • Hard drives are one of the slowest parts of the computer system and thus need to be accessed in an efficient manner.

Key Terms Associated with Disk Scheduling

  • Seek Time: Seek time is the time taken to locate the disk arm to a specified track where the data is to be read or written. So the disk scheduling algorithm that gives a minimum average seek time is better.
  • Rotational Latency: Rotational Latency is the time taken by the desired sector of the disk to rotate into a position so that it can access the read/write heads. So the disk scheduling algorithm that gives minimum rotational latency is better.
  • Transfer Time: Transfer time is the time to transfer the data. It depends on the rotating speed of the disk and the number of bytes to be transferred.
  • Disk Access Time:



Comments ()


Sign in

Read Next

Deadlock and Starvation

Blog banner

geographic information system (GIS)

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

DIGITAL ECONOMY

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Strengthening Active Directory Security

Blog banner

Evolution of OS

Blog banner

Annual Day Preparation for Toddlers: What Helps and What to Avoid

Blog banner

Privacy in Social Media and Online Services

Blog banner

Virtual Memory

Blog banner

Constrains in service design

Blog banner

Types of Threads

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Understanding the 'Ambiverts'

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Modern Operating Systems.

Blog banner

Types of Threads

Blog banner

Benefits of Yoga

Blog banner

Different memory allocation strategies

Blog banner

Disk scheduling

Blog banner

Operation system

Blog banner

BharatPe

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Memory Partitioning

Blog banner

Platonic Solids

Blog banner

Major achievement

Blog banner

A Deep Dive

Blog banner

From Model Mistakes to Metrics

Blog banner

ZOHO

Blog banner

Hacking

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Understanding Mobile Device Forensics

Blog banner

Android Flashlight Application

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Deadlock

Blog banner

Flipkart

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Direct memory access (DMA)

Blog banner