wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

DISK SCHEDULING

profile
vivek pandey
Sep 09, 2024
0 Likes
0 Discussions
38 Reads

DISK SCHEDULING

  • Disk scheduling is a technique operating systems use to manage the order in which disk I/O (input/output) requests are processed. Disk scheduling is also known as I/O Scheduling. The main goals of disk scheduling are to optimize the performance of disk operations, reduce the time it takes to access data and improve overall system efficiency.
  • In this article, we will explore the different types of disk scheduling algorithms and their functions. By understanding and implementing these algorithms, we can optimize system performance and ensure faster data retrieval.

Importance of Disk Scheduling in Operating System:

  • Multiple I/O requests may arrive by different processes and only one I/O request can be served at a time by the disk controller. Thus other I/O requests need to wait in the waiting queue and need to be scheduled.
  • Two or more requests may be far from each other so this can result in greater disk arm movement.
  • Hard drives are one of the slowest parts of the computer system and thus need to be accessed in an efficient manner.

Key Terms Associated with Disk Scheduling

  • Seek Time: Seek time is the time taken to locate the disk arm to a specified track where the data is to be read or written. So the disk scheduling algorithm that gives a minimum average seek time is better.
  • Rotational Latency: Rotational Latency is the time taken by the desired sector of the disk to rotate into a position so that it can access the read/write heads. So the disk scheduling algorithm that gives minimum rotational latency is better.
  • Transfer Time: Transfer time is the time to transfer the data. It depends on the rotating speed of the disk and the number of bytes to be transferred.
  • Disk Access Time:



Comments ()


Sign in

Read Next

“CONSISTENCY” in Social Media Marketing

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Impact of social media on the human life

Blog banner

Emerging threats in cyber Forensics

Blog banner

Direct Memory Access

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

OS assignment 3

Blog banner

Financial Fraud Detection

Blog banner

Some web vulnerabilities

Blog banner

Types of email

Blog banner

Multicore and multithreading 171

Blog banner

Platonic Solids

Blog banner

THE ACTORS LIFE

Blog banner

Threads

Blog banner

BLOCKCHAIN MACHANISM

Blog banner

How Do I Get Rid of My People-Pleasing Behaviour?

Blog banner

Loneliness

Blog banner

Introduction to GIS

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Importance of Network Security Risk

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Types of E-Commerce

Blog banner

Virtual machine.

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Microsoft Windows Overview

Blog banner

Evolution of Operating System

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Deadlock and Starvation

Blog banner

BUFFER OVERFLOW_142

Blog banner

SECURITY TOOLS

Blog banner

File management in os

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Direct Memory Access

Blog banner

Clustering Techniques

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Danger assessment in GIS

Blog banner

Data Exfiltration

Blog banner

Modern Operating System - Suren Kotian

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Modern Operating System

Blog banner