SlideShare uma empresa Scribd logo
1 de 13
Chapter 3: File Management
           Part 2
Learning Outcome
By the end of this lecture, student will be able to:
1) Describe free space management technique
2)Describe various technique for implementing file
   access control
3) Describe technique used to prevent data loss
Free space management
Need to reuse the space from deleted files for new
   files
Technique:
1) Using free lists
2)Using bitmaps
1) Using free lists
Some systems use a free list to manage the storage
 device’s free space
  Free list: Linked list of blocks containing the locations
   of free blocks
  Blocks are allocated from the beginning of the free list
  Newly freed blocks are appended to the end of the list
Low overhead to perform free list maintenance
 operations
Files are likely to be allocated in noncontiguous
 blocks
  Increases file access time
Free space management using a free list
2) Using bitmaps
A bitmap contains one bit for each block in memory
  ith bit corresponds to the ith block on the storage
    device
Advantage of bitmaps over free lists:
  The file system can quickly determine if contiguous
    blocks are available at certain locations on secondary
    storage
Disadvantage of bitmaps:
  The file system may need to search the entire bitmap to
    find a free block, resulting in substantial execution
    overhead
Free space management using a bitmap
Techniques for implementing
file access control
Files are often used to store sensitive data such as:
  Credit card numbers
  Passwords
  Social security numbers
Therefore, they should include mechanisms to
 control user access to data.
  1) Access control matrix
  2) Access control by user classes
1) Access control by matrix
Two-dimensional access control matrix:
  Entry aij is 1 if user i is allowed access to file j
  Otherwise aij = 0
In an installation with a large number of users and a
 large number of files, this matrix generally would be
 large and sparse
Inappropriate for most systems
Access control matrix
2)Access control by user classes
A technique that requires considerably less space is to
 control access to various user classes
User classes can include:
  The file owner
  A specified user
  Group
  Project
  Public
Access control data
  Can be stored as part of the file control block
  Often consumes an insignificant amount of space
Techniques used to prevent
data loss
Backup techniques
  Store redundant copies of information
Physical safeguards such as locks and fire alarms are
   the lowest level of data protection
Performing periodic backups is the most common
   technique used to ensure the continued availability of
   data
Techniques:
1) Physical backup
2)Logical backup
1) Physical backups
  Duplicate a storage device’s data at the bit level


2) Logical backups
  Store file system data and its logical structure
  Inspect the directory structure to determine which
    files need to be backed up, then write these files to a
    backup device in a common, often compressed,
    archival format

Mais conteúdo relacionado

Mais procurados

Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file managementKalai Selvi
 
Introduction to File System
Introduction to File SystemIntroduction to File System
Introduction to File SystemSanthiNivas
 
Ch11 file system implementation
Ch11   file system implementationCh11   file system implementation
Ch11 file system implementationWelly Dian Astika
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMSkoolkampus
 
Secondary Storage Management
Secondary Storage ManagementSecondary Storage Management
Secondary Storage ManagementPriyanshuGandhi3
 
Record storage and primary file organization
Record storage and primary file organizationRecord storage and primary file organization
Record storage and primary file organizationJafar Nesargi
 
2nd unit part 1
2nd unit  part 12nd unit  part 1
2nd unit part 1Pavan Illa
 
11.file system implementation
11.file system implementation11.file system implementation
11.file system implementationSenthil Kanth
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System InterfaceWayne Jones Jnr
 
File management in OS
File management in OSFile management in OS
File management in OSBhavik Vashi
 
FILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMSFILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMSAbhishek Dutta
 

Mais procurados (20)

File Protection
File ProtectionFile Protection
File Protection
 
Types of files
Types of filesTypes of files
Types of files
 
Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file management
 
OSCh21
OSCh21OSCh21
OSCh21
 
Introduction to File System
Introduction to File SystemIntroduction to File System
Introduction to File System
 
OSCh11
OSCh11OSCh11
OSCh11
 
Chapter12
Chapter12Chapter12
Chapter12
 
Ch11 file system implementation
Ch11   file system implementationCh11   file system implementation
Ch11 file system implementation
 
11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS11. Storage and File Structure in DBMS
11. Storage and File Structure in DBMS
 
Secondary Storage Management
Secondary Storage ManagementSecondary Storage Management
Secondary Storage Management
 
Record storage and primary file organization
Record storage and primary file organizationRecord storage and primary file organization
Record storage and primary file organization
 
File structure
File structureFile structure
File structure
 
Ch10 file system interface
Ch10   file system interfaceCh10   file system interface
Ch10 file system interface
 
2nd unit part 1
2nd unit  part 12nd unit  part 1
2nd unit part 1
 
11.file system implementation
11.file system implementation11.file system implementation
11.file system implementation
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 
File management in OS
File management in OSFile management in OS
File management in OS
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
Ntfs forensics
Ntfs forensicsNtfs forensics
Ntfs forensics
 
FILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMSFILE STRUCTURE IN DBMS
FILE STRUCTURE IN DBMS
 

Destaque

Chapter 1 part 3
Chapter 1 part 3Chapter 1 part 3
Chapter 1 part 3rohassanie
 
Course outline FP202 - Dis 2012
Course outline FP202 - Dis 2012Course outline FP202 - Dis 2012
Course outline FP202 - Dis 2012rohassanie
 
Chapter 1 part 1
Chapter 1 part 1Chapter 1 part 1
Chapter 1 part 1rohassanie
 
Jadual Waktu Sesi JUN 2012
Jadual Waktu Sesi JUN 2012Jadual Waktu Sesi JUN 2012
Jadual Waktu Sesi JUN 2012rohassanie
 
Labsheet 6 - FP 201
Labsheet 6 - FP 201Labsheet 6 - FP 201
Labsheet 6 - FP 201rohassanie
 
Chapter 2 (Part 2)
Chapter 2 (Part 2) Chapter 2 (Part 2)
Chapter 2 (Part 2) rohassanie
 
Labsheet 7 FP 201
Labsheet 7 FP 201Labsheet 7 FP 201
Labsheet 7 FP 201rohassanie
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSUnited International University
 
Chapter 1 part 2
Chapter 1 part 2Chapter 1 part 2
Chapter 1 part 2rohassanie
 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1rohassanie
 
Single level directory structure.55
Single level directory structure.55Single level directory structure.55
Single level directory structure.55myrajendra
 
File management
File managementFile management
File managementMohd Arif
 

Destaque (13)

Chapter 1 part 3
Chapter 1 part 3Chapter 1 part 3
Chapter 1 part 3
 
Course outline FP202 - Dis 2012
Course outline FP202 - Dis 2012Course outline FP202 - Dis 2012
Course outline FP202 - Dis 2012
 
Chapter 1 part 1
Chapter 1 part 1Chapter 1 part 1
Chapter 1 part 1
 
Jadual Waktu Sesi JUN 2012
Jadual Waktu Sesi JUN 2012Jadual Waktu Sesi JUN 2012
Jadual Waktu Sesi JUN 2012
 
Labsheet 6 - FP 201
Labsheet 6 - FP 201Labsheet 6 - FP 201
Labsheet 6 - FP 201
 
Chapter 2 (Part 2)
Chapter 2 (Part 2) Chapter 2 (Part 2)
Chapter 2 (Part 2)
 
Labsheet 7 FP 201
Labsheet 7 FP 201Labsheet 7 FP 201
Labsheet 7 FP 201
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFS
 
Chapter 1 part 2
Chapter 1 part 2Chapter 1 part 2
Chapter 1 part 2
 
Chapter 2 part 1
Chapter 2 part 1Chapter 2 part 1
Chapter 2 part 1
 
Lab ex 1
Lab ex 1Lab ex 1
Lab ex 1
 
Single level directory structure.55
Single level directory structure.55Single level directory structure.55
Single level directory structure.55
 
File management
File managementFile management
File management
 

Semelhante a Chapter 3 part 2

File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating SystemJanki Shah
 
File Protection in Operating System
File Protection in Operating SystemFile Protection in Operating System
File Protection in Operating SystemMeghaj Mallick
 
Report blocking ,management of files in secondry memory , static vs dynamic a...
Report blocking ,management of files in secondry memory , static vs dynamic a...Report blocking ,management of files in secondry memory , static vs dynamic a...
Report blocking ,management of files in secondry memory , static vs dynamic a...NoorMustafaSoomro
 
Protection, directory implementation
Protection, directory implementationProtection, directory implementation
Protection, directory implementationrajshreemuthiah
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...ijsrd.com
 
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdfHsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdfAAFREEN SHAIKH
 
The digital preservation technical context
The digital preservation technical contextThe digital preservation technical context
The digital preservation technical contextMichael Day
 
2 opreating system
2 opreating system2 opreating system
2 opreating systemHekmatFaisal
 
Oerating system project
Oerating system projectOerating system project
Oerating system projectHira Gul
 
Operating System
Operating SystemOperating System
Operating SystemRaja Adapa
 
System components (os)
System components (os)System components (os)
System components (os)snegacmr
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profitssusera432ea1
 
WHAT IS DATA BASE?
WHAT IS DATA BASE?WHAT IS DATA BASE?
WHAT IS DATA BASE?wardariaz9
 
Computer Software - Lecture D
Computer Software - Lecture DComputer Software - Lecture D
Computer Software - Lecture DCMDLearning
 
Computer Software | Lecture 4D
Computer Software | Lecture 4DComputer Software | Lecture 4D
Computer Software | Lecture 4DCMDLMS
 

Semelhante a Chapter 3 part 2 (20)

File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
File Protection in Operating System
File Protection in Operating SystemFile Protection in Operating System
File Protection in Operating System
 
Report blocking ,management of files in secondry memory , static vs dynamic a...
Report blocking ,management of files in secondry memory , static vs dynamic a...Report blocking ,management of files in secondry memory , static vs dynamic a...
Report blocking ,management of files in secondry memory , static vs dynamic a...
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
Protection, directory implementation
Protection, directory implementationProtection, directory implementation
Protection, directory implementation
 
Protection
ProtectionProtection
Protection
 
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
An Analyzing of different Techniques and Tools to Recover Data from Volatile ...
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdfHsc computer science paper 1 chap 1 OperatingSystem2024.pdf
Hsc computer science paper 1 chap 1 OperatingSystem2024.pdf
 
File system structure
File system structureFile system structure
File system structure
 
The digital preservation technical context
The digital preservation technical contextThe digital preservation technical context
The digital preservation technical context
 
2 opreating system
2 opreating system2 opreating system
2 opreating system
 
Oerating system project
Oerating system projectOerating system project
Oerating system project
 
Operating System
Operating SystemOperating System
Operating System
 
System components (os)
System components (os)System components (os)
System components (os)
 
Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
Files
FilesFiles
Files
 
WHAT IS DATA BASE?
WHAT IS DATA BASE?WHAT IS DATA BASE?
WHAT IS DATA BASE?
 
Computer Software - Lecture D
Computer Software - Lecture DComputer Software - Lecture D
Computer Software - Lecture D
 
Computer Software | Lecture 4D
Computer Software | Lecture 4DComputer Software | Lecture 4D
Computer Software | Lecture 4D
 

Mais de rohassanie

FP 201 - Unit 6
FP 201 - Unit 6FP 201 - Unit 6
FP 201 - Unit 6rohassanie
 
FP 201 - Unit4 Part 2
FP 201 - Unit4 Part 2FP 201 - Unit4 Part 2
FP 201 - Unit4 Part 2rohassanie
 
FP 201 - Unit 3 Part 2
FP 201 - Unit 3 Part 2FP 201 - Unit 3 Part 2
FP 201 - Unit 3 Part 2rohassanie
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5rohassanie
 
FP 202 Chapter 2 - Part 3
FP 202 Chapter 2 - Part 3FP 202 Chapter 2 - Part 3
FP 202 Chapter 2 - Part 3rohassanie
 
FP 201 Unit 2 - Part 3
FP 201 Unit 2 - Part 3FP 201 Unit 2 - Part 3
FP 201 Unit 2 - Part 3rohassanie
 
FP 201 Unit 2 - Part 2
FP 201 Unit 2 - Part 2FP 201 Unit 2 - Part 2
FP 201 Unit 2 - Part 2rohassanie
 
FP 201 Unit 3
FP 201 Unit 3 FP 201 Unit 3
FP 201 Unit 3 rohassanie
 
Labsheet2 stud
Labsheet2 studLabsheet2 stud
Labsheet2 studrohassanie
 
Labsheet1 stud
Labsheet1 studLabsheet1 stud
Labsheet1 studrohassanie
 
Introduction to C++
Introduction to C++Introduction to C++
Introduction to C++rohassanie
 

Mais de rohassanie (19)

FP 201 - Unit 6
FP 201 - Unit 6FP 201 - Unit 6
FP 201 - Unit 6
 
Fp201 unit5 1
Fp201 unit5 1Fp201 unit5 1
Fp201 unit5 1
 
FP 201 - Unit4 Part 2
FP 201 - Unit4 Part 2FP 201 - Unit4 Part 2
FP 201 - Unit4 Part 2
 
Fp201 unit4
Fp201 unit4Fp201 unit4
Fp201 unit4
 
FP 201 - Unit 3 Part 2
FP 201 - Unit 3 Part 2FP 201 - Unit 3 Part 2
FP 201 - Unit 3 Part 2
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
FP 202 Chapter 2 - Part 3
FP 202 Chapter 2 - Part 3FP 202 Chapter 2 - Part 3
FP 202 Chapter 2 - Part 3
 
FP 201 Unit 2 - Part 3
FP 201 Unit 2 - Part 3FP 201 Unit 2 - Part 3
FP 201 Unit 2 - Part 3
 
FP 201 Unit 2 - Part 2
FP 201 Unit 2 - Part 2FP 201 Unit 2 - Part 2
FP 201 Unit 2 - Part 2
 
Labsheet 5
Labsheet 5Labsheet 5
Labsheet 5
 
Labsheet 4
Labsheet 4Labsheet 4
Labsheet 4
 
FP 201 Unit 3
FP 201 Unit 3 FP 201 Unit 3
FP 201 Unit 3
 
Labsheet_3
Labsheet_3Labsheet_3
Labsheet_3
 
Labsheet2 stud
Labsheet2 studLabsheet2 stud
Labsheet2 stud
 
Labsheet1 stud
Labsheet1 studLabsheet1 stud
Labsheet1 stud
 
Unit 3
Unit 3Unit 3
Unit 3
 
Fp201 unit2 1
Fp201 unit2 1Fp201 unit2 1
Fp201 unit2 1
 
Fp201 unit1 1
Fp201 unit1 1Fp201 unit1 1
Fp201 unit1 1
 
Introduction to C++
Introduction to C++Introduction to C++
Introduction to C++
 

Chapter 3 part 2

  • 1. Chapter 3: File Management Part 2
  • 2. Learning Outcome By the end of this lecture, student will be able to: 1) Describe free space management technique 2)Describe various technique for implementing file access control 3) Describe technique used to prevent data loss
  • 3. Free space management Need to reuse the space from deleted files for new files Technique: 1) Using free lists 2)Using bitmaps
  • 4. 1) Using free lists Some systems use a free list to manage the storage device’s free space Free list: Linked list of blocks containing the locations of free blocks Blocks are allocated from the beginning of the free list Newly freed blocks are appended to the end of the list Low overhead to perform free list maintenance operations Files are likely to be allocated in noncontiguous blocks Increases file access time
  • 5. Free space management using a free list
  • 6. 2) Using bitmaps A bitmap contains one bit for each block in memory ith bit corresponds to the ith block on the storage device Advantage of bitmaps over free lists: The file system can quickly determine if contiguous blocks are available at certain locations on secondary storage Disadvantage of bitmaps: The file system may need to search the entire bitmap to find a free block, resulting in substantial execution overhead
  • 7. Free space management using a bitmap
  • 8. Techniques for implementing file access control Files are often used to store sensitive data such as: Credit card numbers Passwords Social security numbers Therefore, they should include mechanisms to control user access to data. 1) Access control matrix 2) Access control by user classes
  • 9. 1) Access control by matrix Two-dimensional access control matrix: Entry aij is 1 if user i is allowed access to file j Otherwise aij = 0 In an installation with a large number of users and a large number of files, this matrix generally would be large and sparse Inappropriate for most systems
  • 11. 2)Access control by user classes A technique that requires considerably less space is to control access to various user classes User classes can include: The file owner A specified user Group Project Public Access control data Can be stored as part of the file control block Often consumes an insignificant amount of space
  • 12. Techniques used to prevent data loss Backup techniques Store redundant copies of information Physical safeguards such as locks and fire alarms are the lowest level of data protection Performing periodic backups is the most common technique used to ensure the continued availability of data Techniques: 1) Physical backup 2)Logical backup
  • 13. 1) Physical backups Duplicate a storage device’s data at the bit level 2) Logical backups Store file system data and its logical structure Inspect the directory structure to determine which files need to be backed up, then write these files to a backup device in a common, often compressed, archival format