How to access the disk data, Computer Engineering

Assignment Help:

Q. How to Access the Disk Data?

Disks operate is semi-random mode of operation and generally referenced block wise. The data access time on a disk comprises two major components:

  • Seek time: Time to position head on a particular track. On a fixed head disks it's time taken by electronic circuit to select needed head whereas in movable head disks it's time needed to move head to a specific track.
  • Latency time: This is time needed by a sector to reach below read/write head. On an average it's half of time taken for a rotation by disk.

In addition to seek and latency time the time taken to transfer a (read/write) block of words can be considered however normally it is too small in comparison to seek time and latency and in general disk access time is concerned to be sum of seek time and latency time. Because access time of disks is large so it is advisable to read a sizeable part of data in a single go and so disks are referenced block wise. As a matter of fact you will find that in most of computer system input/output involving disk is given a very high priority. Fundamental reason for such priority is latency time which is needed once the block which is to be read passes below read-write head. It may take time of order of milliseconds to do it again, in turn delaying Input /Output and lowering performance of system.


Related Discussions:- How to access the disk data

Define relocatable programs, Relocatable programs? Ans. Relocatable pro...

Relocatable programs? Ans. Relocatable programs can be loaded almost anywhere inside the memory.

What are the different layers in r/3 system, What are the different layers ...

What are the different layers in R/3 system? There are three layer:- Presentation Layer. Application Layer. Database Layer.

Pd controller, PD controller Student should aim for Kp and Kd value that...

PD controller Student should aim for Kp and Kd value that will minimize the steady error with improved rise time and settling time. The amount of over shoot should not be more t

Forward chaining, Forward Chaining: Now we have suppose we have a set ...

Forward Chaining: Now we have suppose we have a set of axioms that we know are true statements about the world. Whether we set these to each be an initial state of the segoal

Define how ptrace is used by debuggers, State how Shared Memory is used for...

State how Shared Memory is used for inter process communication. Define how ptrace is used by debuggers.  What are modules? Explain how data mapping takes place among modules

Derive the expression of traffic capacity, Traffic Capacity is given by? ...

Traffic Capacity is given by? Traffic Capacity = Switching capacity × Theoretical maximum load.

Eequivalences rules, Eequivalences rules: This conveys a meaning that ...

Eequivalences rules: This conveys a meaning that is actually much simpler so than you would think on first inspection.  Hence we can justify this, by using the following ch

Draw and illustrate the block diagram of DMA controller, Draw and illustrat...

Draw and illustrate the block diagram of DMA controller. Also discuss the various modes in which DMAC works. Direct memory access (DMA) is a process in that an external device

Logic-based expert systems - , Logic-based Expert Systems - Artificial inte...

Logic-based Expert Systems - Artificial intelligence: Expert systems are agents which are programmed to make decisions about real world situations. They are put together by uti

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd