Skip to main content

Hard Drive Disk-Scheduling Algorithms

First­-Come­-First­-Served (FCFS)
The first­-come-first­-served (FCFS) algorithm is designed to handle requests in the order they are received, regardless of where the head is located within the disk drive. Even though this is most fair algorithm out of the three, it is also the least efficient. The graph below shows how inconsistently the head had to travel in order to serve the requests that were being sent.


Shortest-­Seek­-Time-­First (SSTF)
The shortest­-seek-­time-­first algorithm aims to handle requests with the shortest seek time from the current head location. This algorithm surprised me as I thought it was going to be more efficient than the FCFS algorithm. As shown in the graph, this algorithm was performing very well until a request was sent at cylinder 17. In this case the head waited to serve the request at cylinder 17 until very last which forced the head to travel a long distance.


SCAN
The SCAN algorithm handles requests by moving the arm from one end of the cylinder to the other and vice versa. This algorithm was by far the most efficient out of the three as it had an overall less distance to travel when handling the requests. Overall, if it were up to me, I would want to use the SCAN system on my personal computer to fulfill any requests my system may have. I think that regardless of which requests were being sent, that this algorithm would still be the most efficient overall.


As stated above, the First­-Come-­First-­Served algorithm is, and will always be, the fairest algorithm as it processes the requests in the order they are received regardless of time or where the head is at on the cylinders. Overall, I would say that the algorithms are only as efficient as the data that is being entered. I can easily see how one algorithm may be more efficient than another depending on the requests that are sent as well as where the head is positioned on the cylinder.

An example of when the operating system being fair would be important would be when multiple programs were being used at once and each one had the same priority level. In this example the user would need to know that the programs are sharing the disk writing ability and that would not matter to the user. Also, I would think that the programs would have to be on the same page as far as the number of resources being used so that one program would not be bottlenecking another.

An example of when the operating system being unfair would be important would be when there is a priority set to a specific program. Often a user will set priority to certain programs so that they may use resources quicker or more often than other programs. In an example like this the user would know which program they want to have written to the disk before the others.

References:
Silberschatz, A., Galvin, P.B., & Gagne, G. (2014). Operating System Concept Essentials (2nd ed.). Retrieved from https://redshelf.com/

Comments

Popular posts from this blog

Peering Points and the Network Application Interface

According to Gibb (2019), “Peering is a method that allows two networks to connect and exchange traffic directly without having to pay a third party to carry traffic across the Internet.” Utilizing a peering point allows users to send a receive data directly to one another without the need to route through other computer networks. Doing so allows for a quicker, more efficient, and safer form of communication.  Researching the total number of active Internet Exchange Points (IXP) proved difficult as it was hard to pinpoint an accurate number. However, according to Rosas (2021), “as of January 2021, of the 630 registered IXPs, 229 are in Europe, 126 in North America, 140 in Asia-Pacific, 96 in Latin America and the Caribbean (LAC), and 39 in Africa.” These numbers are constantly changing as new IXPs are added, and some are removed.  Finding a definitive number of Internet Service Providers (ISP) globally was also difficult to accomplish. Most sources seem to point to the Nations Encyclop

VLAN Aggregation for Efficient IP Address Allocation

The project I chose to summarize on the Internet Engineering Task Force (IETF) website was RFC: 3069, VLAN Aggregation for Efficient IP Address Allocation. Within this project, the authors point out how inefficiently a Virtual Local Area Network (VLAN) allocates IP addresses along with their proposed solutions. I have also attached a diagram showing how the network would look pertaining to this project. Currently, an IP subnet would be made for each existing customer by understanding how many hosts they currently need and may need in the future. Based on that total number, the IP subnet and gateway address would change according to how many hosts the customer requested. For example, if a customer has indicated that they need ten hosts, and they only use five, the additional five that are not in use cannot be used by another customer. An illustration of this is shown below. The proposed solution to this problem is to allocate IP addresses under the same IP subnet and gateway address uti

Access Lists and Capabilities

To implement an access matrix, we must first understand what it is. An access matrix is a protection model within an operating system consisting of objects and domains. The access matrix determines which processes interact with objects within the domain. Objects within the domain can consist of both hardware and software. The lists below show the advantages and disadvantages of access lists associated with objects, and capabilities with domains.  Access lists associated with objects Advantages  Corresponds directly to the user’s needs.  Easy revocation and review of access.  Disadvantages  Difficult to determine access rights for a domain.  Takes time to search the domain for access rights.  Capabilities with domains Advantages  Useful for localizing information for a process.  Secured against unauthorized access.  Disadvantages  Inefficient at the revocation of capabilities.  Does not correspond directly to the user’s needs.  Even though each implementation has its own strengths and w