Disk scheduling algorithms

Assignment Help Operating System
Reference no: EM1379530

You will calculate the total distance that a disk arm moves to satisfy pending requests, for different disk scheduling algorithms.

Steps

Question1. Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125. The queue of pending requests, in first-in-first-out (FIFO) order, is as follows:

92; 1,320; 879; 1,984; 1,023; 1,690; 1,123; 2,002; and 93

Question2. Calculate the total distance in cylinders?starting from the current head position?that the disk arm moves to satisfy all the pending requests, for each of the following disk scheduling algorithms:

FCFS
SSTF
SCAN
LOOK
C-SCAN

 

Reference no: EM1379530

Questions Cloud

Scientific principles behind a computer technology : Explain the scientific principles behind a computer technology and discuss how social, political, economic or ethical impact of computers on our cultural structures and beliefs.
Question about virus defense : Discuss how can an individual machine get infected with the virus you are researching and how does it spread to other equipments?
Computing total pay and net pay : Construct a Unix shell script to input number of hours worked and pay rate and compute the total pay, then the social security amount, then the net pay.
Organization institutionalizes policies : The answer gives the learner with an understanding of management's role in the development and enforcement of data security policies, standards, practices, precess and guidelines.
Disk scheduling algorithms : Assume that a disk drive has 5,000 cylinders, numbered 0 to 4,999. The drive is recently serving a request at cylinder 143, and the last request was at cylinder 125.
Disadvantages to living in an information age : Discuss some of the disadvantages to living in an Information Age? At present more and more people rely on computers to create, store, and manage critical information.
Productivity across an organization : Explain how does an company weigh the require to share data to the maximum extent to fully utilize this resource for productivity across an organization.
Steps and sub steps required to start an e business : Discuss the steps and sub steps required to start an e-business. Assume the Idea is already approved and the viability is already established through e-business plan.
Ethernet or token ring protocol : Saguaro Federal has mainframes for all of its banks and businesses. Should the corporations use the Ethernet or Token Ring protocol? Describe your choice. Discuss why is this choice appropriate?

Reviews

Write a Review

Operating System Questions & Answers

  Solving a shell script issue

Determine when a script having these invisible characters are interpreted by linux or *nix shells, they are flagged as errors, since *nix uses 'n' as new lines.

  Programming language machine independence

Discuss and explain the main factors that influence programming language machine independence, and how higher levels of machine independence could be achieved.

  Question about network security

Suppose that you are the network security officer of one corporation, what will be your plan to enhance your network security firewall? VPN, Content level protection or combination of them?

  Computer privacy related question

One of the main concerns with the expanding influence of information technology is issue of personal privacy. As more and more individuals and businesses are using computers to transact business and store data the protection of individual privacy is ..

  What percentage of memory-s total operating time refreshes

Consider a dynamic RAM that must be given a refresh cycle 64 times per ms. What percentage of the memory's total operating time must be given to refreshes?

  Logical security and physical security

Discuss and explain real world examples from current events that decrease within your assigned category with your assigned group?

  Write list of three known vulnerabilities for sql server

Using the internet as a source, compile a list of three known vulnerabilities for SQL Server on Windows operating systems and three vulnerabilities for Oracle on Unix.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Computing effective memory access time

Assume that 80 percent of the accesses are in the associative memory and that, of the remaining, 10 percent (or 2 percent of the total) cause page faults.What is the effective memory access time?

  Discuss and provide examples of mutual exclusion

Discuss and provide examples of the following concurrency issues associated with an OS: 1. Mutual exclusion 2. Deadlock 3. Starvation

  Asymmetric encryption algorithm

Discuss and explain how the asymmetric encryption algorithm can be used to achieve the following targets:

  Analyse the different methods for collecting data

Analyse the different methods for collecting data Explain by taking examples 3 types of Sampling techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd