wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Darshan Somaiya
Sep 13, 2024
0 Likes
0 Discussions
169 Reads

Disk scheduling refers to the algorithms used by the operating system to manage the order in which read and write requests to the disk are processed. These algorithms aim to minimize seek time, which is the time taken for the disk's read-write head to move to the correct track.


The commonly used disk scheduling algorithms include:

1. **First Come First Serve (FCFS)** 

  - Processes requests in the order they arrive.

  - Simple but can lead to high seek times if requests are scattered across the disk.


2. **Shortest Seek Time First (SSTF)** 

  - Selects the request closest to the current position of the read-write head.

  - Minimizes seek time, but can cause starvation if requests for distant cylinders are continuously delayed.


3. **SCAN (Elevator Algorithm)** 

  - The disk head moves in one direction, servicing requests until it reaches the end, then reverses direction.

  - It scans back and forth across the disk, ensuring fairness and reducing seek times compared to FCFS.


4. **C-SCAN (Circular SCAN)** 

  - Similar to SCAN, but the head moves in one direction and, after reaching the end, returns to the beginning without servicing any requests on the return trip.

  - Provides more uniform wait times.


5. **LOOK** 

  - A variant of SCAN, but the head only goes as far as the last request in each direction, instead of going to the end of the disk.


6. **C-LOOK** 

  - Similar to C-SCAN, but the head moves only as far as the last request before reversing direction, then jumps back to the first request.


These algorithms balance efficiency and fairness, aiming to reduce the total seek time and optimize disk performance.


Comments ()


Sign in

Read Next

Predicting Student Performance with Data Science

Blog banner

What is E-commerce

Blog banner

Deadlock

Blog banner

HR Automation : Need of the hour

Blog banner

c

Blog banner

Photorec - media recovery tool

Blog banner

Booting Process In Operating System

Blog banner

Operating system

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

IOT Hacking Techniques

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Bulk E-mail software

Blog banner

All you need to know about Website Traffic

Blog banner

Access management

Blog banner

Python as a tool for Data science task & project

Blog banner

Memory

Blog banner

Service Operation

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

The Power of Cyber Forensic in Solving Crimes

Blog banner

Place to visit in pune

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Data Exfiltration

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Art and Culture of Rajasthan

Blog banner

GIS in Mapping and landslide alert in Bangladesh

Blog banner

Analysis of Digital Evidence In Identity Theft Investigations

Blog banner

Virtual Memory

Blog banner

Fashion design

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

Deadlock

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

File sharing

Blog banner

Define Instagram.

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner