wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Darshan Somaiya
Sep 13, 2024
0 Likes
0 Discussions
170 Reads

Disk scheduling refers to the algorithms used by the operating system to manage the order in which read and write requests to the disk are processed. These algorithms aim to minimize seek time, which is the time taken for the disk's read-write head to move to the correct track.


The commonly used disk scheduling algorithms include:

1. **First Come First Serve (FCFS)** 

  - Processes requests in the order they arrive.

  - Simple but can lead to high seek times if requests are scattered across the disk.


2. **Shortest Seek Time First (SSTF)** 

  - Selects the request closest to the current position of the read-write head.

  - Minimizes seek time, but can cause starvation if requests for distant cylinders are continuously delayed.


3. **SCAN (Elevator Algorithm)** 

  - The disk head moves in one direction, servicing requests until it reaches the end, then reverses direction.

  - It scans back and forth across the disk, ensuring fairness and reducing seek times compared to FCFS.


4. **C-SCAN (Circular SCAN)** 

  - Similar to SCAN, but the head moves in one direction and, after reaching the end, returns to the beginning without servicing any requests on the return trip.

  - Provides more uniform wait times.


5. **LOOK** 

  - A variant of SCAN, but the head only goes as far as the last request in each direction, instead of going to the end of the disk.


6. **C-LOOK** 

  - Similar to C-SCAN, but the head moves only as far as the last request before reversing direction, then jumps back to the first request.


These algorithms balance efficiency and fairness, aiming to reduce the total seek time and optimize disk performance.


Comments ()


Sign in

Read Next

Uniprocessor scheduling

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

Importance Of Time

Blog banner

Smitten Kitchen Keepers

Blog banner

Self-love: Being the reason of your own smile

Blog banner

USES OF WHATSAPP

Blog banner

Android Application Components and Activity Lifecycle

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

Operating system evolution

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

In the world of Technology...

Blog banner

SESSION HIJACKING

Blog banner

Never give up

Blog banner

Virtual Machine

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Travelling blog

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

PERSONAL STORIES

Blog banner

Deadlock in operating system

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Risk mitigation and management

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Internet of Things

Blog banner

Social Media.

Blog banner

Impact of social media on the human life

Blog banner

Basic Security For SOAP Services

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

E-Cash (Electronic Cash)

Blog banner

EID UL FITR

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

CONCURRENCY

Blog banner

Service Operations in ITSM

Blog banner

Race Condition in Operating Theatre

Blog banner

Memory Management in Operating System

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Password Generator - Lisp

Blog banner

Why we fail after giving 100% ?

Blog banner

Hey Aryan here

Blog banner