Disk scheduling algorithms

Assignment Help Operating System
Reference no: EM1379530

You will calculate the total distance that a disk arm moves to satisfy pending requests, for different disk scheduling algorithms.

Steps

Question1. Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125. The queue of pending requests, in first-in-first-out (FIFO) order, is as follows:

92; 1,320; 879; 1,984; 1,023; 1,690; 1,123; 2,002; and 93

Question2. Calculate the total distance in cylinders?starting from the current head position?that the disk arm moves to satisfy all the pending requests, for each of the following disk scheduling algorithms:

FCFS
SSTF
SCAN
LOOK
C-SCAN

 

Reference no: EM1379530

Questions Cloud

Scientific principles behind a computer technology : Explain the scientific principles behind a computer technology and discuss how social, political, economic or ethical impact of computers on our cultural structures and beliefs.
Question about virus defense : Discuss how can an individual machine get infected with the virus you are researching and how does it spread to other equipments?
Computing total pay and net pay : Construct a Unix shell script to input number of hours worked and pay rate and compute the total pay, then the social security amount, then the net pay.
Organization institutionalizes policies : The answer gives the learner with an understanding of management's role in the development and enforcement of data security policies, standards, practices, precess and guidelines.
Disk scheduling algorithms : Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125.
Disadvantages to living in an information age : Discuss some of the disadvantages to living in an Information Age? At present more and more people rely on computers to create, store, and manage critical information.
Productivity across an organization : Explain how does an company weigh the require to share data to the maximum extent to fully utilize this resource for productivity across an organization.
Steps and sub steps required to start an e business : Discuss the steps and sub steps required to start an e-business. Assume the Idea is already approved and the viability is already established through e-business plan.
Ethernet or token ring protocol : Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?

Reviews

Write a Review

Operating System Questions & Answers

  Explain how to implement barriers using semaphores

Show how to implement barriers using semaphores. Your solution should avoid busy-waiting. Be explicit about any initializations that you need to assume.

  Minimizing average response time

Estimate the runtime order of the jobs such that it minimizes average response time.

  What would you do to influence procurement process-platform

What would you do to influence the procurement process for both platforms (hardware & OS, such as desktops, laptops, servers, etc.) and application software?

  Describe benefits of providing synchronization tool

Slim reader-writer locks favor neither readers nor writers, nor are waiting threads ordered in FIFO queue. Describe benefits of providing such a synchronization tool.

  Solving hipaa privacy issues

Suppose if we learned anything from Katrina and Joplin, paper records are susceptible to loss en masse. Can you assume having 50,000 paper records blown for miles across Joplin and trying to recreate those records later

  Database statistics

In an RDBMS, how are the three phases parsing, execution, and fetching carried out? In general, in which phase would you tune a database? Determine database statistics and why are they important.

  Write bash shell script for number files in directories

Write a bash shell script filestatic. The script should examine the number files in directories given as arguments (parameters) to this script.

  Network security case study

In this case study, you require to construct a network checklist to establish certain process that enable you and other network security specialists to assess a network from different possible threats and vulnerabilities.

  Importance of maintaining security on a lan

Discuss what roles do firewalls and proxy servers play in network security? Determine the importance of maintaining security on a LAN?

  Question about electronic monitoring

Give some discussion about Electronic checking, such as what is used in stores, through employers and by the public. Planning these questions in the response.

  Vliw processor

VLIW processor - assembler

  Explaining cpu midway through the disk-service routine

CPU with interrupt-driven I/O is busy servicing  disk request. While CPU is midway through the disk-service routine, another I/O interrupt occurs. What occurs next?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd