wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Darshan Somaiya
Sep 13, 2024
0 Likes
0 Discussions
170 Reads

Disk scheduling refers to the algorithms used by the operating system to manage the order in which read and write requests to the disk are processed. These algorithms aim to minimize seek time, which is the time taken for the disk's read-write head to move to the correct track.


The commonly used disk scheduling algorithms include:

1. **First Come First Serve (FCFS)** 

  - Processes requests in the order they arrive.

  - Simple but can lead to high seek times if requests are scattered across the disk.


2. **Shortest Seek Time First (SSTF)** 

  - Selects the request closest to the current position of the read-write head.

  - Minimizes seek time, but can cause starvation if requests for distant cylinders are continuously delayed.


3. **SCAN (Elevator Algorithm)** 

  - The disk head moves in one direction, servicing requests until it reaches the end, then reverses direction.

  - It scans back and forth across the disk, ensuring fairness and reducing seek times compared to FCFS.


4. **C-SCAN (Circular SCAN)** 

  - Similar to SCAN, but the head moves in one direction and, after reaching the end, returns to the beginning without servicing any requests on the return trip.

  - Provides more uniform wait times.


5. **LOOK** 

  - A variant of SCAN, but the head only goes as far as the last request in each direction, instead of going to the end of the disk.


6. **C-LOOK** 

  - Similar to C-SCAN, but the head moves only as far as the last request before reversing direction, then jumps back to the first request.


These algorithms balance efficiency and fairness, aiming to reduce the total seek time and optimize disk performance.


Comments ()


Sign in

Read Next

Impacts of Data Breach On Companies Challenges and Prevention

Blog banner

Types Of scheduling

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

Junk food vs healthy food

Blog banner

How to tie a Tie

Blog banner

Music helps reduce stress

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

AI and cyber Security

Blog banner

Big Data

Blog banner

File sharing

Blog banner

TRIGGERS IN DATABASE

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

How to write a cover letter

Blog banner

BENIFITS OF YOGA

Blog banner

Top 10 Logos and their meanings

Blog banner

Dos (Denial of service) Attack

Blog banner

Subnet Masking

Blog banner

virtual machine

Blog banner

I/O Management and Disk Scheduling

Blog banner

Precision-Recall in Data Science

Blog banner

USPS mail

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Windows Operating System

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Uniprocessor Scheduling

Blog banner

The evolution of OS

Blog banner

EVOLUTION OF MICROPROCESSOR

Blog banner

FAMILY WHERE LIFE BEGINS....

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Modern Teaching Methods: Why Inquiry-based & Experiential Learning Works Best

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Security issues

Blog banner

FRIENDSHIP

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Article on IT development trends

Blog banner

Royal enfield

Blog banner

Time Series Analysis

Blog banner

Interrupts in OS

Blog banner

Modern operating systems (OS)

Blog banner

TRAIN TRAVELING

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner