SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
DISK ALLOCATION METHODS
Presented BY :
Rollno:- 13-mc-2015
Teacher In-charge :
Dr. Sanjay Jamwal
Disk Allocation :
• Refers to how disk blocks are allocated for files.
•Allocation methods are used for:
oEffective disk space utilization.
oAllows fast file access.
Allocation Methods:
•Contiguous
•Linked
•indexed
Contiguous Allocation:
In contiguous allocation, files are assigned to contiguous areas of secondary storage.
A user specifies in advance the size of the area needed to hold a file to be created. If
the desired amount of contiguous space is not available, the file cannot be created.
• Starting block and length of the file
• Two most common strategies are:
First - fit 
Best - fit
• First-fit:- In this case as soon as the first hole (that is big enough) is encountered,
searching is stopped and memory is allocated for creating a file. Searching can
start either at the beginning of the set of holes or where the previous first-fit search
ended.
• Best - fit - In this case the entire list is searched for and the smallest hole, that is big
enough, is allocated for creating a file.
• Neither first-fit nor best-fit is clearly best in terms of storage utilization, but first-fit is
generally faster.
• External fragmentation will occur
Fig :- Contiguous Allocation
Linked Allocation (Chained Allocation):
•In linked list allocation each file is linked list of disk blocks.
• These disk blocks may be scattered through the disk.
• A few bytes of each disk block contains the address of the next block. 
•A single entry in the file allocation table
• Starting block and length of file
•No external fragmentation
•Best for sequential files
Linked Allocation
Indexed Allocation:
•In this scheme each file is provided with its own index block, which is an array of
disk block pointers (addresses).
•The Kth entry in the index block points to the Kth disk block of the file.
•The file allocation table contains block number for the index
•Indexed allocation solves this problem by bringing all the pointers together into
one location known as the index block.
•Each file has its own index block, which is an array of disk-block addresses. The
“i” entry in the index block points to the “i‘” block of the file
Indexed Allocation
• The advantage of indexed file allocation include
the absence of external fragmentation and the
efficiency of random accessing.
• indexed allocation requires lots of space for
keeping pointers.
THANKS

Contenu connexe

Tendances

13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
koolkampus
 

Tendances (20)

Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
Free Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFSFree Space Management, Efficiency & Performance, Recovery and NFS
Free Space Management, Efficiency & Performance, Recovery and NFS
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mounting
 
System calls
System callsSystem calls
System calls
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Ddbms1
Ddbms1Ddbms1
Ddbms1
 
Memory management
Memory managementMemory management
Memory management
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Virtual memory ppt
Virtual memory pptVirtual memory ppt
Virtual memory ppt
 
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
 
Register allocation and assignment
Register allocation and assignmentRegister allocation and assignment
Register allocation and assignment
 
File system structure
File system structureFile system structure
File system structure
 
Deadlock ppt
Deadlock ppt Deadlock ppt
Deadlock ppt
 
Operating system memory management
Operating system memory managementOperating system memory management
Operating system memory management
 

En vedette (13)

Docker allocating resources
Docker allocating resourcesDocker allocating resources
Docker allocating resources
 
Memory management
Memory managementMemory management
Memory management
 
Registers
RegistersRegisters
Registers
 
Understanding The Boot Process
Understanding The Boot ProcessUnderstanding The Boot Process
Understanding The Boot Process
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Spring Boot with Quartz
Spring Boot with QuartzSpring Boot with Quartz
Spring Boot with Quartz
 
Booting & shut down,
Booting & shut down,Booting & shut down,
Booting & shut down,
 
5. boot process
5. boot process5. boot process
5. boot process
 
Cpu registers
Cpu registersCpu registers
Cpu registers
 
Kernel I/O subsystem
Kernel I/O subsystemKernel I/O subsystem
Kernel I/O subsystem
 
File access methods.54
File access methods.54File access methods.54
File access methods.54
 
File organization
File organizationFile organization
File organization
 
Boot process: BIOS vs UEFI
Boot process: BIOS vs UEFIBoot process: BIOS vs UEFI
Boot process: BIOS vs UEFI
 

Similaire à Disk allocation methods

Allocation methods (1).pptx
Allocation methods (1).pptxAllocation methods (1).pptx
Allocation methods (1).pptx
ssuser55cbdb
 
File implementation
File implementationFile implementation
File implementation
Mohd Arif
 
Dynamic storage allocation techniques
Dynamic storage allocation techniquesDynamic storage allocation techniques
Dynamic storage allocation techniques
Shashwat Shriparv
 

Similaire à Disk allocation methods (20)

Allocation and free space management
Allocation and free space managementAllocation and free space management
Allocation and free space management
 
fileallocationmethods1-220104151603.pdf
fileallocationmethods1-220104151603.pdffileallocationmethods1-220104151603.pdf
fileallocationmethods1-220104151603.pdf
 
Dynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler designDynamic storage allocation techniques in Compiler design
Dynamic storage allocation techniques in Compiler design
 
Give or take a block
Give or take a blockGive or take a block
Give or take a block
 
Disk structure
Disk structureDisk structure
Disk structure
 
OS Unit5.pptx
OS Unit5.pptxOS Unit5.pptx
OS Unit5.pptx
 
Kernel Memory Allocation, Review of Relocation & Program Forms
Kernel Memory Allocation, Review of Relocation & Program FormsKernel Memory Allocation, Review of Relocation & Program Forms
Kernel Memory Allocation, Review of Relocation & Program Forms
 
File Allocation Methods.ppt
File Allocation Methods.pptFile Allocation Methods.ppt
File Allocation Methods.ppt
 
Secondary Storage Management
Secondary Storage ManagementSecondary Storage Management
Secondary Storage Management
 
Operating system 34 contiguous allocation
Operating system 34 contiguous allocationOperating system 34 contiguous allocation
Operating system 34 contiguous allocation
 
Allocation methods (1).pptx
Allocation methods (1).pptxAllocation methods (1).pptx
Allocation methods (1).pptx
 
Parallel databases
Parallel databasesParallel databases
Parallel databases
 
File implementation
File implementationFile implementation
File implementation
 
Clustering on DSS
Clustering on DSSClustering on DSS
Clustering on DSS
 
Segmentation in operating systems
Segmentation in operating systemsSegmentation in operating systems
Segmentation in operating systems
 
Module5 secondary storage
Module5 secondary storageModule5 secondary storage
Module5 secondary storage
 
Dynamic storage allocation techniques
Dynamic storage allocation techniquesDynamic storage allocation techniques
Dynamic storage allocation techniques
 
Secondarystoragedevices1 130119040144-phpapp02
Secondarystoragedevices1 130119040144-phpapp02Secondarystoragedevices1 130119040144-phpapp02
Secondarystoragedevices1 130119040144-phpapp02
 
Computer organization memory hierarchy
Computer organization memory hierarchyComputer organization memory hierarchy
Computer organization memory hierarchy
 
Deep Dive on Amazon Redshift
Deep Dive on Amazon RedshiftDeep Dive on Amazon Redshift
Deep Dive on Amazon Redshift
 

Plus de ajeela mushtaq (12)

String.ppt
String.pptString.ppt
String.ppt
 
Sets automata
Sets automataSets automata
Sets automata
 
Polymorphism
PolymorphismPolymorphism
Polymorphism
 
Mail merge
Mail mergeMail merge
Mail merge
 
Linux hotspot
Linux hotspotLinux hotspot
Linux hotspot
 
Interfaces .net
Interfaces .netInterfaces .net
Interfaces .net
 
Incremental
IncrementalIncremental
Incremental
 
Gprs
GprsGprs
Gprs
 
Graphics a buffer
Graphics a bufferGraphics a buffer
Graphics a buffer
 
Data com prsntation
Data com prsntationData com prsntation
Data com prsntation
 
Avl tree
Avl treeAvl tree
Avl tree
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 

Dernier

怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
vexqp
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
nirzagarg
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
wsppdmt
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 

Dernier (20)

怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
 
Harnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptxHarnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptx
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Vadodara [ 7014168258 ] Call Me For Genuine Models ...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...Sequential and reinforcement learning for demand side management by Margaux B...
Sequential and reinforcement learning for demand side management by Margaux B...
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........
 
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
SR-101-01012024-EN.docx  Federal Constitution  of the Swiss ConfederationSR-101-01012024-EN.docx  Federal Constitution  of the Swiss Confederation
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 

Disk allocation methods

  • 1. DISK ALLOCATION METHODS Presented BY : Rollno:- 13-mc-2015 Teacher In-charge : Dr. Sanjay Jamwal
  • 2. Disk Allocation : • Refers to how disk blocks are allocated for files. •Allocation methods are used for: oEffective disk space utilization. oAllows fast file access.
  • 4. Contiguous Allocation: In contiguous allocation, files are assigned to contiguous areas of secondary storage. A user specifies in advance the size of the area needed to hold a file to be created. If the desired amount of contiguous space is not available, the file cannot be created. • Starting block and length of the file • Two most common strategies are: First - fit  Best - fit
  • 5. • First-fit:- In this case as soon as the first hole (that is big enough) is encountered, searching is stopped and memory is allocated for creating a file. Searching can start either at the beginning of the set of holes or where the previous first-fit search ended. • Best - fit - In this case the entire list is searched for and the smallest hole, that is big enough, is allocated for creating a file. • Neither first-fit nor best-fit is clearly best in terms of storage utilization, but first-fit is generally faster. • External fragmentation will occur
  • 6. Fig :- Contiguous Allocation
  • 7. Linked Allocation (Chained Allocation): •In linked list allocation each file is linked list of disk blocks. • These disk blocks may be scattered through the disk. • A few bytes of each disk block contains the address of the next block.  •A single entry in the file allocation table • Starting block and length of file •No external fragmentation •Best for sequential files
  • 9. Indexed Allocation: •In this scheme each file is provided with its own index block, which is an array of disk block pointers (addresses). •The Kth entry in the index block points to the Kth disk block of the file. •The file allocation table contains block number for the index •Indexed allocation solves this problem by bringing all the pointers together into one location known as the index block. •Each file has its own index block, which is an array of disk-block addresses. The “i” entry in the index block points to the “i‘” block of the file
  • 11. • The advantage of indexed file allocation include the absence of external fragmentation and the efficiency of random accessing. • indexed allocation requires lots of space for keeping pointers.