wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Raj Darji 1501
Sep 09, 2024
0 Likes
0 Discussions
84 Reads

DISK SCHEDULING

  • Disk scheduling is a technique operating systems use to manage the order in which disk I/O (input/output) requests are processed. Disk scheduling is also known as I/O Scheduling. The main goals of disk scheduling are to optimize the performance of disk operations, reduce the time it takes to access data and improve overall system efficiency.
  • In this article, we will explore the different types of disk scheduling algorithms and their functions. By understanding and implementing these algorithms, we can optimize system performance and ensure faster data retrieval.

Importance of Disk Scheduling in Operating System:

  • Multiple I/O requests may arrive by different processes and only one I/O request can be served at a time by the disk controller. Thus other I/O requests need to wait in the waiting queue and need to be scheduled.
  • Two or more requests may be far from each other so this can result in greater disk arm movement.
  • Hard drives are one of the slowest parts of the computer system and thus need to be accessed in an efficient manner.

Key Terms Associated with Disk Scheduling

  • Seek Time: Seek time is the time taken to locate the disk arm to a specified track where the data is to be read or written. So the disk scheduling algorithm that gives a minimum average seek time is better.
  • Rotational Latency: Rotational Latency is the time taken by the desired sector of the disk to rotate into a position so that it can access the read/write heads. So the disk scheduling algorithm that gives minimum rotational latency is better.
  • Transfer Time: Transfer time is the time to transfer the data. It depends on the rotating speed of the disk and the number of bytes to be transferred.
  • Disk Access Time:
  • Disk Access Time = Seek Time + Rotational Latency + Transfer Time

Comments ()


Sign in

Read Next

De-Coding Love

Blog banner

Data Exfiltration

Blog banner

Operating system evolution

Blog banner

Blockchain technology: security risk and prevention

Blog banner

File Systems in OS.

Blog banner

Windows Operating System

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Information of meesho company

Blog banner

Disk cache

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

IT GOVERNANCE

Blog banner

Malware Defense

Blog banner

note taker app

Blog banner

Threat management

Blog banner

Remote Work in 2026

Blog banner

10 Interesting Facts about Death Note

Blog banner

Buffering

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

INTERNET SECURITY

Blog banner

Virtual Memory

Blog banner

What is Packet Filtering?

Blog banner

Study of Sniffing Tools

Blog banner

The evolution of OS

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Deadlock

Blog banner

Deadlock and Starvation

Blog banner

OS Assignment 3

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Artificial Intelligence and I

Blog banner

Virtual memory

Blog banner

Importance of self defence for girls

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

From Websites To Super Apps For Digital User Experience

Blog banner

MYNTRA

Blog banner

Stop Racism

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Full Disk Encryption

Blog banner

File and File System Structure

Blog banner

Process and Threading

Blog banner

Different types of scam Fraud

Blog banner

UniProcessor Scheduling

Blog banner