wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Raj Darji 1501
Sep 09, 2024
0 Likes
0 Discussions
84 Reads

DISK SCHEDULING

  • Disk scheduling is a technique operating systems use to manage the order in which disk I/O (input/output) requests are processed. Disk scheduling is also known as I/O Scheduling. The main goals of disk scheduling are to optimize the performance of disk operations, reduce the time it takes to access data and improve overall system efficiency.
  • In this article, we will explore the different types of disk scheduling algorithms and their functions. By understanding and implementing these algorithms, we can optimize system performance and ensure faster data retrieval.

Importance of Disk Scheduling in Operating System:

  • Multiple I/O requests may arrive by different processes and only one I/O request can be served at a time by the disk controller. Thus other I/O requests need to wait in the waiting queue and need to be scheduled.
  • Two or more requests may be far from each other so this can result in greater disk arm movement.
  • Hard drives are one of the slowest parts of the computer system and thus need to be accessed in an efficient manner.

Key Terms Associated with Disk Scheduling

  • Seek Time: Seek time is the time taken to locate the disk arm to a specified track where the data is to be read or written. So the disk scheduling algorithm that gives a minimum average seek time is better.
  • Rotational Latency: Rotational Latency is the time taken by the desired sector of the disk to rotate into a position so that it can access the read/write heads. So the disk scheduling algorithm that gives minimum rotational latency is better.
  • Transfer Time: Transfer time is the time to transfer the data. It depends on the rotating speed of the disk and the number of bytes to be transferred.
  • Disk Access Time:
  • Disk Access Time = Seek Time + Rotational Latency + Transfer Time

Comments ()


Sign in

Read Next

BUFFER OVERFLOW_142

Blog banner

Tracking Emails & Email Crimes

Blog banner

Data Mapping

Blog banner

Concurrency management in operating systems

Blog banner

Memory input output management

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Basic Security For SOAP Services

Blog banner

I/O Management and Disk Scheduling

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Predicting Student Performance with Data Science

Blog banner

Career v/s Job : Choose your passion

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

VIRTUAL MACHINE

Blog banner

Processing Crime and Incident Scenes

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

What is Minting & Mining

Blog banner

PPT methodology

Blog banner

What is a Malware ?

Blog banner

LIFEHACKER

Blog banner

Electronic Evidence in Cyber Forensics

Blog banner

In the world of Technology...

Blog banner

Layers Of Blockchain

Blog banner

Ethical Hacking

Blog banner

Ethical Hacking

Blog banner

Service Catalogue Management

Blog banner

Buffering

Blog banner

PROCESS STATE:

Blog banner

Computer Forensics and its Impact in Business Environment

Blog banner

How To Secure Operating Systems ?

Blog banner

Difference Between Classification And Clustering

Blog banner

Different memory allocation strategies

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Virtual Memory

Blog banner

security requirements for safe e-payment

Blog banner

operating system

Blog banner

Install Ubuntu in Vmware

Blog banner

IoT Evolution

Blog banner

An Overview of Virtual Machines

Blog banner

Deadlock and Starvation

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Steganography and Steganalysis

Blog banner

Ubiquitous Computing

Blog banner