Ssos - U5
Ssos - U5
Handled By
Dr.N.SUDHA
ASSOCIATE PROFESSOR
DEPARTMENT OF COMPUTER SCIENCE
SYSTEM SOFTWARE AND OPERATING SYSTEM – 43A
TEXT BOOKS
Course Study :
Consists of 5 Units : Unit 1 & 2 – System Software
Unit 3 to 5 – Operating Systems
Max.Marks : 100 Marks
Internal : 50 Marks
External : 50Marks
UNIT - V
Device and Information Management Disk Performance optimization : Operation of moving head
disk storage – Need for disk scheduling – seek optimization – File and Database Systems : File
System – Functions – organization – allocating and freeing space – File Descriptor – Access
Control Matrix.
DISK SCHEDULING
Disk scheduling is done by operating systems to schedule I/O requests arriving for
the disk. Disk scheduling is also known as I/O scheduling. Multiple I/O requests may arrive by
different processes and only one I/O request can be served at a time by the disk controller.
OPERATION OF MOVING HEAD DISK STORAGE
Data is recorded on a series of magnetic disk or platters. These disks are connected by
a common spindle that spins at very high speed. The data is accessed (ie., either read or written)
by a series of read-write heads, one head per disk surface.
• FCFS
• SSTF(Shortest Seek Time First)
• Scan Scheduling
• N-step Scan Scheduling
•C-Scan Scheduling
• Eschenbach Scheme
Disk arm movement is circular as in C-SCAN, but with several important exceptions.
Every cylinder is serviced for exactly one full track of information whether or not there is a
request for that cylinder. Requests are reordered for service within a cylinder to take advantage of
rotational position, but if two requests overlap sector positions within a cylinder, only one is
serviced for the current sweep of the disk arm.
This strategy is designed for handling heavy loads. This is the only scheme which not
only attempts to optimize seek time but also rotational delay.
Disk Scheduling Algorithms
FILE AND DATA BASE SYSTEMS
File is a named collection of data which resides on secondary storage device such as
tape or disk.
The various files manipulation are
Create , Open , Close
Destroy , Copy , Rename , List
Individual data items in the file may be manipulated by operations like
read,
write
Update
Insert
Delete
There for files may be characterized by
Volatility
Activity
Size
FILE SYSTEM
File system generally contains
Access method – Concerned with the manner in which the data stored in the
file is accessed.
File Management – Concerned with providing the mechanism for the files to
be stored , referenced, shared and secured.
Auxiliary storage management - Concerned with allocating space for the
files on a secondary storage device.
File Integrity mechanism – Concerned with guaranteeing that the information
the file is not corrupted. When file integrity is assured the information suppose to be in the file
should be there.
The file systems is primarily concern with managing the secondary storage
space particularly disk storage.
The file system may be organized as
- Root directory
- User Directories
- User files
FILE SYSTEM FUNCTIONS
File Location
In Block chaining entries in the user directory points to the first block of each file. The
fixed-length blocks comprising a file contains two portions a data block and a pointer to the next
block. The smallest unit of allocation is a fixed sized block that ordinarily consists of many
sectors. It is common to make the block size one full track on a disk. Locating a particular
record requires searching the block until the appropriate record is found.
Index block chaining
Link allocation method can not support direct access to solve this problem index allocation is
used.
It store all pointer together in the index table.
It bring all the pointer together in to one location called the index block.
Each file contain its own index block, the entry in the index block points to block no of the file.
Directory entry contains
File name
Index block
When the first block is return a free block is allocated and its address is shown in the entry of the
index block.
Advantages
No external fragmentation.
Support Direct access.
Support sequential access
Number of disk seeks is minimal.
Disadvantages
It suffer from wastage spaces.
Maximum allowable file size depends on size of an index block.
Block Oriented File Mapping
In block oriented file mapping instead of using pointers , the system uses block
numbers. A file map contains one entry for each block on the desk. Entries in the user directory
points to the first entry in the file map for each file. Each entry in the file map contains the block
number of the next block in that file. Thus all the blocks in the file may be located by following
the entries in the file map. The entry in the file map that corresponds to the last entry of a
particular file is set to a sentinel value NIL to indicate that the last block of the file has been
reached.
Some of the entries in the file map are set to free to indicate that the block is available for
allocation. The system may either search the file map linearly to locate a free block. An
advantage of the scheme is that physical adjacencies on the desk are reflected in the file map.
FILE DESCRIPTOR
A file descriptor or file control block is a control block containing information the systems needs
to manage a file. It is highly system depend structure. A file descriptor includes
symbolic file name
location of file in secondary storage
file organization
device type
access control
data type
disposition
creation data and time
destroy date
date and time last modified
access activity counts
The file descriptor is maintained in the secondary storage.
They are primary storage when the file is operated.
ACCESS CONTROL MATRIX
One way to control access to files is to create a two-dimensional access control matrix listing all
the users and all the files in the system. The entry Aij is 1 is I user ii is allowed access to file j :
otherwise Aij = 0. In an installation with a large number of users and a large number of files, this
matrix would be very large –and very sparse. Allowing one user
Access to another user’s files is the exception rather that the rule. To make such a matrix concept
useful, it would be necessary to use codes to indicate various kinds of access such as readonly,
writeonly, executeonly, readwrite,etc.
A technique that requires considerably less space is to control access to various user classes. A
common classification scheme is
Owner – Normally, this is the user who created the file.
1. Specified User - The owner specifies that another individual may use the file.
2. Group or Project – Users are often members of a group working on a particular project. In
this case the various members of the group may all be granted access to each other’s project-
related files.
3. Public- Most systems allow a file to be designated as public so that it may be accessed by any
member of the system’s user community. Public access normally allows users to read or execute
a file, but not to write it.