Comparison of disk scheduling algorithms, Operating System

Assignment Help:

COMPARISON OF DISK SCHEDULING ALGORITHMS

Name      Description                  Remarks     (Selection according to requestor)

 

RSS        Random scheduling     for analysis and simulation

FIFO      First in first out            Fairest of them all

PRI         Priority by process     Control outside of disk queue   management

LIFO      Last in first out            Maximize locality and resource utilization

 

            (Selection according to requested item)

 

SSTF                 Shortest seek time first             High utilization, small queues

SCAN                Back and forth over disk            Better service distribution

C-SCAN            One way with fast return           Lower service variability

N-step-SCAN    Multiple queues                          Scan N records at a time        

                                                                           Service guarantee

FSCAN              SCAN using 2 queues                 load sensitive

 

 


Related Discussions:- Comparison of disk scheduling algorithms

Operating systems concepts, The code should be nicely formatted with plenty...

The code should be nicely formatted with plenty of comments. It should be easy to read, properly The summary section should include three parts: (1) Record the running t

Explain direct communication and indirect communication, Direct communicati...

Direct communication With direct communication each process that requires to communicate must explicitly name the recipient or sender of the communication. The send and receive

Palm os provides no signifies of concurrent processing, Q. Palm OS provides...

Q. Palm OS provides no signifies of concurrent processing. Discuss three major complications that concurrent processing adds to an operating system. Answer: a. A meth

What are the advantages of linked allocation, What are the advantages of Li...

What are the advantages of Linked allocation? The benefits are a. No external fragmentation b. Size of the file does not require to be declared

Explain the steps in deadlock recovery, Explain the steps in deadlock recov...

Explain the steps in deadlock recovery. a)      Exterminate off all processes involved - drastic. b)      Exterminate off one at a time till deadlock gone - select a victim.

Unix, difference between soft link and hard links

difference between soft link and hard links

Define coding in an independent service architecture, Define Coding in an i...

Define Coding in an independent service architecture Coding in an independent service architecture alleviates many of the traditional dependencies of monolithic applications.

Why we need to use a while statement when using wait method, Q. The wait()...

Q. The wait() statement in every Java program examples was part of a while loop. Describe why you would always need to use a while statement when using wait() and why you would ne

List out the advantages of windows 2000 file management, List out the advan...

List out the advantages of windows 2000 file management. Permits detailed security for individual folders and files. Built-in granular compression capabilities

Describe the buddy system of memory allocation, Buddy system of memory allo...

Buddy system of memory allocation Free memory is used to maintain in linked lists, each of similar sized blocks. Every block is of size 2^k. When some memory is needed by a th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd