wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Darshan Somaiya
Sep 13, 2024
0 Likes
0 Discussions
169 Reads

Disk scheduling refers to the algorithms used by the operating system to manage the order in which read and write requests to the disk are processed. These algorithms aim to minimize seek time, which is the time taken for the disk's read-write head to move to the correct track.


The commonly used disk scheduling algorithms include:

1. **First Come First Serve (FCFS)** 

  - Processes requests in the order they arrive.

  - Simple but can lead to high seek times if requests are scattered across the disk.


2. **Shortest Seek Time First (SSTF)** 

  - Selects the request closest to the current position of the read-write head.

  - Minimizes seek time, but can cause starvation if requests for distant cylinders are continuously delayed.


3. **SCAN (Elevator Algorithm)** 

  - The disk head moves in one direction, servicing requests until it reaches the end, then reverses direction.

  - It scans back and forth across the disk, ensuring fairness and reducing seek times compared to FCFS.


4. **C-SCAN (Circular SCAN)** 

  - Similar to SCAN, but the head moves in one direction and, after reaching the end, returns to the beginning without servicing any requests on the return trip.

  - Provides more uniform wait times.


5. **LOOK** 

  - A variant of SCAN, but the head only goes as far as the last request in each direction, instead of going to the end of the disk.


6. **C-LOOK** 

  - Similar to C-SCAN, but the head moves only as far as the last request before reversing direction, then jumps back to the first request.


These algorithms balance efficiency and fairness, aiming to reduce the total seek time and optimize disk performance.


Comments ()


Sign in

Read Next

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Artical on FreshBooks

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Deadlock

Blog banner

Save Environment

Blog banner

RACI model in IT services

Blog banner

Social Engineering Attacks

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Operating system

Blog banner

Technological Advancement

Blog banner

Game via listing method

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

FREE VERSION OF G-MAIL

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Deadlock in Operating System

Blog banner

Importance of Network Security Risk

Blog banner

What is thread and alse multithreading

Blog banner

Virtual memory

Blog banner

DISK SCHEDULING

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Game Theory in Blockchain

Blog banner

Starvation

Blog banner

Rain bow

Blog banner

Uniprocessor Scheduling

Blog banner

MYNTRA

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

DATA VAULT

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Harsh Rathod

Blog banner

OPERATING SYSTEM

Blog banner

Os assignment

Blog banner

Way to make your meal healthier.

Blog banner

Understanding E-mail Servers

Blog banner

Operating Systems Overview

Blog banner