wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Raj Darji 1501
Sep 09, 2024
0 Likes
0 Discussions
84 Reads

DISK SCHEDULING

  • Disk scheduling is a technique operating systems use to manage the order in which disk I/O (input/output) requests are processed. Disk scheduling is also known as I/O Scheduling. The main goals of disk scheduling are to optimize the performance of disk operations, reduce the time it takes to access data and improve overall system efficiency.
  • In this article, we will explore the different types of disk scheduling algorithms and their functions. By understanding and implementing these algorithms, we can optimize system performance and ensure faster data retrieval.

Importance of Disk Scheduling in Operating System:

  • Multiple I/O requests may arrive by different processes and only one I/O request can be served at a time by the disk controller. Thus other I/O requests need to wait in the waiting queue and need to be scheduled.
  • Two or more requests may be far from each other so this can result in greater disk arm movement.
  • Hard drives are one of the slowest parts of the computer system and thus need to be accessed in an efficient manner.

Key Terms Associated with Disk Scheduling

  • Seek Time: Seek time is the time taken to locate the disk arm to a specified track where the data is to be read or written. So the disk scheduling algorithm that gives a minimum average seek time is better.
  • Rotational Latency: Rotational Latency is the time taken by the desired sector of the disk to rotate into a position so that it can access the read/write heads. So the disk scheduling algorithm that gives minimum rotational latency is better.
  • Transfer Time: Transfer time is the time to transfer the data. It depends on the rotating speed of the disk and the number of bytes to be transferred.
  • Disk Access Time:
  • Disk Access Time = Seek Time + Rotational Latency + Transfer Time

Comments ()


Sign in

Read Next

Compromising Mobile Platforms

Blog banner

Deadlock in operating system

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Memory management

Blog banner

Security issues

Blog banner

Vulnerability Assessment

Blog banner

EID UL FITR

Blog banner

Texting is actually better than talking in person

Blog banner

File system

Blog banner

Deadlock

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Introduction to Solidity Programming for Blockchain Development

Blog banner

INTRANET

Blog banner

Child labour

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Why Data Security Is Important

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Product Discount Calculator

Blog banner

Kernel in Operating System

Blog banner

Cache Memory

Blog banner

Digital Marketing - The new way to reach end consumer

Blog banner

Travelling blog

Blog banner

Starvation and Deadlock.

Blog banner

MY FIRST BLOG?

Blog banner

Pipedrive

Blog banner

10 Signs your Computer has Virus

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Information of meesho company

Blog banner

internet email and it's applications

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Article on team management software

Blog banner

CRISP-DM Methodology

Blog banner

Mutual exclusion

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Importance of Website

Blog banner

Uniprocessor scheduling

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Penetration Testing

Blog banner

Quality check in IT services

Blog banner