Disk-scheduling algorithms

Assignment Help Computer Networking
Reference no: EM133893755

Part 1:

A disk drive has 300 cylinders, numbered 0 to 299. The drive is currently serving a request at cylinder 51, and the previous request was at cylinder 56. The pending requests are received in the following order: 72, 56, 103, 111, 17, 189, 236, 198, and 88.

Describe how the disk arm moves to satisfy all the pending requests for each of the following disk-scheduling algorithms.

FCFS

SSTF

SCAN

Calculate the total distance (in cylinders) that the disk arm moves for each of the above disk-scheduling algorithms. Compare the algorithms and explain which algorithm is the most efficient (the shortest distance) for this scenario.

Part 2:

Compare the algorithms and determine which is the fairest for the next process in the queue. Explain why this algorithm will always be the fairest disk-scheduling algorithm.

Describe an example of circumstances where fairness would be an important goal. Describe a scenario where it would be important that the operating system be unfair.

Reference no: EM133893755

Questions Cloud

Fifth dimension of new man model- development : As a Mental Health NP how will you incorporate the fifth dimension of the new man's model- development throughout the lifespan into your assessment
Udp and tcp use one complement for their checksums : UDP and TCP use one's complement for their checksums. What is the one's complement of the sum of these bytes? How does the receiver detect errors?
Conflict at work is never easy : Conflict at work is never easy. Sometimes you may not agree with a supervisor, peer, or client. What are some techniques you can use to address conflict?
Building the spine-and-leaf network at layer : What are the advantages and disadvantages of building the spine-and-leaf network at layer 2 (VLANs) or layer 3 (subnets)?
Disk-scheduling algorithms : Calculate the total distance (in cylinders) that the disk arm moves for each of the above disk-scheduling algorithms.
What is happening with data when employee on company : What is happening with data when a employee on a company is trying o do their job and get access the data base of the company,
Create hierarchical file system : Create a hierarchical file system as shown above. What is a command line tool we use to keep an eye on network traffic and bandwidth usage in real time?
Describe the details of the currently installed memory : Describe the details of the currently installed memory. Describe the details of the new memory you would purchase for the upgrade.
Commission analysis on competitive effects of mergers : List the six primary services that were the focus of the Commission's analysis on the competitive effects of mergers.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd