wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Disk scheduling

profile
Darshan Somaiya
Sep 13, 2024
0 Likes
0 Discussions
170 Reads

Disk scheduling refers to the algorithms used by the operating system to manage the order in which read and write requests to the disk are processed. These algorithms aim to minimize seek time, which is the time taken for the disk's read-write head to move to the correct track.


The commonly used disk scheduling algorithms include:

1. **First Come First Serve (FCFS)** 

  - Processes requests in the order they arrive.

  - Simple but can lead to high seek times if requests are scattered across the disk.


2. **Shortest Seek Time First (SSTF)** 

  - Selects the request closest to the current position of the read-write head.

  - Minimizes seek time, but can cause starvation if requests for distant cylinders are continuously delayed.


3. **SCAN (Elevator Algorithm)** 

  - The disk head moves in one direction, servicing requests until it reaches the end, then reverses direction.

  - It scans back and forth across the disk, ensuring fairness and reducing seek times compared to FCFS.


4. **C-SCAN (Circular SCAN)** 

  - Similar to SCAN, but the head moves in one direction and, after reaching the end, returns to the beginning without servicing any requests on the return trip.

  - Provides more uniform wait times.


5. **LOOK** 

  - A variant of SCAN, but the head only goes as far as the last request in each direction, instead of going to the end of the disk.


6. **C-LOOK** 

  - Similar to C-SCAN, but the head moves only as far as the last request before reversing direction, then jumps back to the first request.


These algorithms balance efficiency and fairness, aiming to reduce the total seek time and optimize disk performance.


Comments ()


Sign in

Read Next

Deadlock

Blog banner

GIS Topography

Blog banner

What is Packet Filtering?

Blog banner

CoWIN

Blog banner

Importance Of Blockchain

Blog banner

Blog on Smartsheet.

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

How to write a cover letter

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

The Memory Hierarchy

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Service Operations in ITSM

Blog banner

What is Spyware?

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

operating system

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

Caching windows

Blog banner

evolution of operating system - Disha Parekh

Blog banner

MAILFENCE

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Memory heirachy (Operating system)

Blog banner

E-Governance

Blog banner

Getting into anime My anime suggestions

Blog banner

Big Data Architecture

Blog banner

Cross site scripting Attack

Blog banner

Virtual Memory

Blog banner

Excel records

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Danger assessment in GIS

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Memory Management - operating system

Blog banner

Modern Operating System - Khush bagaria

Blog banner

File Management

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Cyber Laws In India and Around the World

Blog banner

Navigating the Digital Battlefield: Security Breaches and Effective Countermeasures

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Odoo

Blog banner