Operating System Tutorial

Operating System Tutorial Types of Operating System Evolution of Operating System Functions of Operating System Operating System Properties Operating System Services Components of Operating System Needs of the Operating System

Operating Systems

Linux Operating System Unix Operating System Ubuntu Operating System Chrome Operating Systems Fedora Operating System MAC Operating System MS Windows Operating System Solaris Operating System Cooperative Operating System CorelDRAW Operating System CentOS FreeBSD Operating Systems Batch Operating System MS-DOS Operating System Commercial Mobile Operating Systems


Difference Between Multi-programming and Multitasking Difference between C-LOOK and C-SCAN Difference between Rotational Latency and Disk Assess Time Trap vs Interrupt Difference between C-SCAN and SSTF Difference between SCAN and FCFS Difference between Seek Time and Disk Access Time Difference between SSTF and LOOK Difference between Process and Program in the Operating System Difference between Protection and Security in Operating System

How To

How to implement Monitors using Semaphores How to Install a Different Operating System on a PC


What is Kernel and Types of Kernel What is DOS Operating System What is Thread and Types of Thread What is Process Scheduler and Process Queue What is Context Switching What is CPU Scheduling What is Producer-Consumer Problem What is Semaphore in Operating System Monitors in Operating System What is Deadlock What is Paging and Segmentation What is Demand Paging What is Virtual Memory What is a Long term Scheduler What is Page Replacement in Operating System What is BSR Mode What is Convoy Effect What is Job Sequencing in Operating System Why is it critical for the Scheduler to distinguish between I/O-bound and CPU-bound programs Why is there a Need for an Operating System


Process Management Process State Scheduling Algorithm FCFS (First-come-First-Serve) Scheduling SJF (Shortest Job First) Scheduling Round-Robin CPU Scheduling Priority Based Scheduling HRRN (Highest Response Ratio Next) Scheduling Process Synchronization Lock Variable Mechanism TSL Mechanism Turn Variable Mechanism Interested Variable Mechanism Deadlock Avoidance Strategies for Handling Deadlock Deadlock Prevention Deadlock Detection and Recovery Resource Allocation Graph Banker’s Algorithm in Operating System Fixed Partitioning and Dynamic Partitioning Partitioning Algorithms Disk Scheduling Algorithms FCFS and SSTF Disk Scheduling Algorithm SCAN and C-SCAN Disk Scheduling Algorithm Look and C-Look Disk Scheduling Algorithm File in Operating System File Access Methods in Operating System File Allocation Method Directory Structure in Operating System N-Step-SCAN Disk Scheduling Feedback Queue in Operating System Contiguous Memory Allocation in Operating System Real-time Operating System Starvation in Operating System Thrashing in Operating System 5 Goals of Operating System Advantages of Operating System Advantages of UNIX Operating System Bit Vector in Operating System Booting Process in Operating System Can a Computer Run Without the Operating System Dining Philosophers Problem in Operating System Free Space Management in Operating System Inter Process Communication in Operating System Swapping in Operating System Memory Management in Operating System Multiprogramming Operating System Multitasking Operating Systems Multi-user Operating Systems Non-Contiguous Memory Allocation in Operating System Page Table in Operating System Process Scheduling in Operating System Segmentation in Operating System Simple Structure in Operating System Single-User Operating System Two Phase Locking Protocol Advantages and Disadvantages of Operating System Arithmetic operations in binary number system Assemblers in the operating system Bakery Algorithm in Operating System Benefits of Ubuntu Operating System CPU Scheduling Criteria in Operating System Critical Section in Operating System Device Management in Operating System Linux Scheduler in Operating System Long Term Scheduler in Operating System Mutex in Operating System Operating System Failure Peterson's Solution in Operating System Privileged and Non-Privileged Instructions in Operating System Swapping in Operating System Types of Operating System Zombie and Orphan Process in Operating System 62-bit operating system Advantages and Disadvantages of Batch Operating System Boot Block and Bad Block in Operating System Contiguous and Non - Contiguous Memory Allocation in Operating System Control and Distribution Systems in Operations Management Control Program in Operating System Convergent Technologies in Operating System Convoy Effect in Operating System Copy Operating Systems to SSD Core Components of Operating System Core of UNIX Operating System Correct Value to return to the Operating System Corrupted Operating System Cos is Smart Card Operating System Cosmos Operating Systems Examples Generation of Operating System Hardware Solution in Operating System Process Control Block in Operating System Function of Kernel in Operating System Operating System Layers History of Debian Operating Systems Branches and Architecture of Debian Operating Systems Features and Packages of Debian Operating Systems Installation of Operating System on a New PC Organizational Structure and Development in Debian Operating Systems User Interface in Operating System Types Of Memory in OS Operating System in Nokia Multilevel Paging in OS Memory Mapping Techniques in OS Memory Layout of a Process in Operating System Hardware Protection in Operating System Functions of File Management in Operating System Core of Linux Operating System Cache Replacement Policy in Operating System Cache Line and Cache Size in Operating System What is Memory Mapping? Difference Between Network Operating System And Distributed Operating System What is the difference between a Hard link and a Soft Link? Principles of Preemptive Scheduling Process Scheduling Algorithms What is NOS?

Difference between C-LOOK and C-SCAN Disk Scheduling Algorithm

Disk scheduling is used by operating systems to arrange the arrival of I/O requests to the disc. I/O scheduling is another name for disc scheduling. Disk scheduling is necessary because several I/O requests may occur from various processes, and the disc controller can only service one I/O request at a time. As a result, further I/O requests must wait in the queue and be scheduled. Two or more requests may be separated by a significant distance, resulting in increased disc arm movement. Because hard drives are one of the slowest components of a computer system, they must be accessible quickly. Some of the key terminology used in disc scheduling are listed below:

Seek Time: The time taken by the disk arm to identify a specific track where data is read or written is known as seek time. As a result, the disc scheduling technique with the shortest average seek time is preferable.

Rotational latency is the time it takes for a disk sector to spin up to a position that allows it to reach the read/write heads. As a result, the disc scheduling approach with the shortest rotational delay is preferable.

Transmission time: The time taken to transfer data is determined by the rotational speed of the disk and the amount of bytes to be transferred.

The total of search time, rotational delay, and transfer time is known as disc access time.

Disk Response Time: Response time is the average time that a request spends waiting for an I/O operation to complete. Average response time is the time taken to respond to all requests. Variance Response Time (VRT) is a metric for determining how individual requests are handled in terms of average response time. As a result, the disc scheduling algorithm with the shortest variance response time is preferable.


The C-LOOK algorithm is a hybrid of the LOOK and C-SCAN algorithms. In this method, The head proceeds in the opposite way from the first request to the last, serving all requests in between. After fulfilling the last request in one direction, the head leaps in the opposite direction, proceeds to the remaining requests, and then serves them as before. The head pointer will travel up to the last request to disk, unlike C-SCAN.


  • When there are no requests to be served, it does not force the head to move until the end of the disc.
  • It decreases the time spent waiting for the head to return to the cylinders it has just visited.
  • When compared to the LOOK Algorithm, it performs better.
  • It does not result in hunger.
  • It has a low reaction time and waiting time variance.


  • There is a cost associated with locating the final requests.


The Circular Elevator algorithm, commonly known as the C-SCAN algorithm, is a modified version of the SCAN method. In this technique the head pointer starts at one end of the disk and moves to the other, serving all requests in between. After reaching the other end, the head spins and returns to the start, where it serves the same remaining requests as before. Unlike a C-look, the head pointer moves to the end of the disk, regardless of whether there is a request or not.


  • When compared to the SCAN Algorithm, the waiting time for the cylinders recently visited by the head is minimised.
  • It ensures a consistent wait time.
  • It has a quicker response time.


  • Compared to the scan algorithm, it induces more seek movements.
  • This causes the head to proceed all the way to the end of the disk, even though there are no requests waiting to be served.
Difference Between C-LOOK And C-SCAN Disk Scheduling Algorithm

Main Differences

S no.




The C-LOOK method outperforms all other disc scheduling techniques.

C-SCAN, on the other hand, lags behind C-LOOK in terms of performance.


C-LOOK is a better method for handling requests than C-SCAN.

In comparison to the C-LOOK method, the processing of requests is not as good here.


C-LOOK has a low reaction time and waiting time variance.

C-SCAN ensures a consistent wait time and reaction time.


The overhead of locating the end requests in the C-LOOK algorithm is significant.

When compared to C-LOOK, the C-SCAN algorithm takes longer to seek.


The head of the C-look algorithm proceeds from 53 to serve all requests in the right direction until it reaches the last request in one end in the example above.Then it moves on to the remaining requests, serving them only in the correct direction.

The head of the C-scan algorithm goes through 53 and serves all requests in the right direction until it reaches the other end in the example above. Then it jumps to the opposite end of the network and requests only the correct one.