wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Darshan Somaiya
Sep 13, 2024
0 Likes
0 Discussions
170 Reads

Disk scheduling refers to the algorithms used by the operating system to manage the order in which read and write requests to the disk are processed. These algorithms aim to minimize seek time, which is the time taken for the disk's read-write head to move to the correct track.


The commonly used disk scheduling algorithms include:

1. **First Come First Serve (FCFS)** 

  - Processes requests in the order they arrive.

  - Simple but can lead to high seek times if requests are scattered across the disk.


2. **Shortest Seek Time First (SSTF)** 

  - Selects the request closest to the current position of the read-write head.

  - Minimizes seek time, but can cause starvation if requests for distant cylinders are continuously delayed.


3. **SCAN (Elevator Algorithm)** 

  - The disk head moves in one direction, servicing requests until it reaches the end, then reverses direction.

  - It scans back and forth across the disk, ensuring fairness and reducing seek times compared to FCFS.


4. **C-SCAN (Circular SCAN)** 

  - Similar to SCAN, but the head moves in one direction and, after reaching the end, returns to the beginning without servicing any requests on the return trip.

  - Provides more uniform wait times.


5. **LOOK** 

  - A variant of SCAN, but the head only goes as far as the last request in each direction, instead of going to the end of the disk.


6. **C-LOOK** 

  - Similar to C-SCAN, but the head moves only as far as the last request before reversing direction, then jumps back to the first request.


These algorithms balance efficiency and fairness, aiming to reduce the total seek time and optimize disk performance.


Comments ()


Sign in

Read Next

JUSTICE FOR EVERY “BEZUBAAN ANIMAL”

Blog banner

Why Festivals Are the Best Classrooms for Young Minds?

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

Service Strategy In ITSM

Blog banner

Different Types of Data

Blog banner

Tea, Coffee, Red Wine, and Teeth: A Stain Survival Guide

Blog banner

Modern Operating Systems

Blog banner

Data Warehousing

Blog banner

MySQL

Blog banner

ProofHub

Blog banner

Disk Scheduling

Blog banner

Toothache at night? What does this mean, and how to cope with it?

Blog banner

Smartsheet

Blog banner

Webmail

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Place to visit in pune

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Supervised and Unsupervised Learning

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

TRELLO

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

VIRTUAL MACHINES

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Guidelines for a Low sodium Diet.

Blog banner

Blockchain Security Technique

Blog banner

The application udemy

Blog banner

Memory heirachy (Operating system)

Blog banner

Dos (Denial of service) Attack

Blog banner

Landslide Hazard

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

The Role of Summer Camps in Early Childhood Development

Blog banner

Top 10 Logos and their meanings

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Process, process creation and process termination

Blog banner

Evolution of operating system

Blog banner

Man VS Nature

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Why is online marketing is important in current scenario

Blog banner

Puri Jagannath temple

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner