wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

DISK SCHEDULING

profile
vivek pandey
Sep 09, 2024
0 Likes
0 Discussions
38 Reads

DISK SCHEDULING

  • Disk scheduling is a technique operating systems use to manage the order in which disk I/O (input/output) requests are processed. Disk scheduling is also known as I/O Scheduling. The main goals of disk scheduling are to optimize the performance of disk operations, reduce the time it takes to access data and improve overall system efficiency.
  • In this article, we will explore the different types of disk scheduling algorithms and their functions. By understanding and implementing these algorithms, we can optimize system performance and ensure faster data retrieval.

Importance of Disk Scheduling in Operating System:

  • Multiple I/O requests may arrive by different processes and only one I/O request can be served at a time by the disk controller. Thus other I/O requests need to wait in the waiting queue and need to be scheduled.
  • Two or more requests may be far from each other so this can result in greater disk arm movement.
  • Hard drives are one of the slowest parts of the computer system and thus need to be accessed in an efficient manner.

Key Terms Associated with Disk Scheduling

  • Seek Time: Seek time is the time taken to locate the disk arm to a specified track where the data is to be read or written. So the disk scheduling algorithm that gives a minimum average seek time is better.
  • Rotational Latency: Rotational Latency is the time taken by the desired sector of the disk to rotate into a position so that it can access the read/write heads. So the disk scheduling algorithm that gives minimum rotational latency is better.
  • Transfer Time: Transfer time is the time to transfer the data. It depends on the rotating speed of the disk and the number of bytes to be transferred.
  • Disk Access Time:



Comments ()


Sign in

Read Next

Virtual Memory - Explaination, Working, Steps

Blog banner

Direct Memory Access

Blog banner

The Right way of cooking

Blog banner

What is Spyware?

Blog banner

Have You Explored India Yet?

Blog banner

Access management

Blog banner

Data Exfiltration

Blog banner

Tableau

Blog banner

Every body is beautiful

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Regression Analysis

Blog banner

Interrupts in OS

Blog banner

Memory Management

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Operating Systems

Blog banner

Memory Management in Operating System

Blog banner

Deadlock and Starvation

Blog banner

Deadlocks in Operating System

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

Virtual Memory

Blog banner

What is thread and multithreading ?

Blog banner

Modern Operating System

Blog banner

Microsoft Windows Overview

Blog banner

ZOHO

Blog banner

Virtual Memory

Blog banner

Multiprocessor

Blog banner

Fault Tolerance

Blog banner

How Men and Women Process Pain Differently

Blog banner

Smartsheet

Blog banner

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Virtual memory

Blog banner

Dos (Denial of service) Attack

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Product Discount Calculator

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Why is ITSM important in IT organization?

Blog banner

USES OF WHATSAPP

Blog banner

PROCESS STATE:

Blog banner

Deadlock

Blog banner