wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk Scheduling

profile
Rishi Chauhan
Sep 09, 2024
0 Likes
0 Discussions
77 Reads

Disk scheduling in an operating system is the method used to determine the order in which disk I/O requests are serviced. Efficient disk scheduling is essential because disk I/O is relatively slow, and multiple requests may arrive simultaneously. The primary goal of disk scheduling is to reduce the total seek time, which is the time taken by the disk's read/write head to move to the correct track where the data resides.

Key Terms:

  • Seek Time: Time required to move the disk arm to the desired track.
  • Rotational Latency: Time for the disk to rotate the required sector under the read/write head.
  • Transfer Time: Time taken to transfer data after the head is positioned.

Common Disk Scheduling Algorithms:

  1. First-Come, First-Served (FCFS):
  • This algorithm services requests in the order they arrive.
  • Pros: Simple and fair.
  • Cons: Can lead to high seek times and inefficient disk utilization, as the head may have to move back and forth frequently (the “convoy effect”).
  1. Shortest Seek Time First (SSTF):
  • SSTF selects the request closest to the current head position, minimizing seek time for each operation.
  • Pros: Reduces average seek time compared to FCFS.
  • Cons: Can cause starvation for requests far from the head, as closer requests are always prioritized.
  1. SCAN (Elevator Algorithm):
  • The disk head moves in one direction (e.g., inward), servicing requests, and then reverses direction when it reaches the end.
  • Pros: Reduces starvation and provides more efficient head movement than SSTF.
  • Cons: Edge requests may wait longer since the head services requests in a sweeping motion.
  1. C-SCAN (Circular SCAN):
  • The disk head moves in one direction to the end of the disk, then jumps back to the beginning without servicing requests on the way back.
  • Pros: Provides more uniform wait times compared to SCAN.
  • Cons: The jump-back can introduce a small delay for requests near the start of the disk.
  1. LOOK and C-LOOK:
  • Variants of SCAN and C-SCAN where the disk head only goes as far as the furthest request, reducing unnecessary movement.
  • Pros: More efficient in terms of minimizing head movement.

Efficient disk scheduling reduces seek times, improves system performance, and ensures fair access to disk resources for multiple processes.


Comments ()


Sign in

Read Next

Virtual memory

Blog banner

CoWIN

Blog banner

What is Segmentation?

Blog banner

Water Resources are about to exhaust...

Blog banner

Virtual Machine

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Memory Management in an Operating System

Blog banner

Twisted world

Blog banner

Life

Blog banner

File Management

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Malware Defense

Blog banner

Rapido

Blog banner

Embedded Operating System

Blog banner

Google classroom

Blog banner

Firewall in Computer Network

Blog banner

Data Visualization in Decision-Making

Blog banner

Data Structures

Blog banner

Corporate Discipline.

Blog banner

Incident management in ITSM

Blog banner

Outlook mail

Blog banner

TRAIN TRAVELING

Blog banner

Segmentation and paging concept

Blog banner

Health is Wealth

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

WINDOWS I/ O

Blog banner

History of ITIL

Blog banner

GOOGLE

Blog banner

Memory Management - operating system

Blog banner

OS Assignment 3 Deadlock

Blog banner

Models of Information Security.

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

Importance of Education

Blog banner

The art of being alone

Blog banner

Oracle Corporation

Blog banner

Memory Management

Blog banner

What is metaverse?

Blog banner

Latest Email Marketing Techniques

Blog banner

File Allocation Methods

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner