SlideShare a Scribd company logo
1 of 15
Submitted by,
D.SHANMUGAPRIYA
I-MSC(IT)
NADAR SARASWATHI COLLEGE OF ARTS
AND SCIENCE
INTRODUCTION
 Is the second time of memory in modern linux systems.
 Swap Space:-virtual memory uses disk space as an
extension of main memory.
 Main goal for the design and implementation of swap
space is to provide the best throughput for VM system.
 Swap space use swapping use swap space to hold entire
process image.
 Some OS may support multiple swap space.
SWAP SPACE LOCATION
 Swap space can be carved out of the normal file system
or in a separate disk partition
 Catching block location information in main memory.
 Contiguous allocation for the swap file.
 But the cost of traversing is data structure still
remains.
DATA STRUCTURE FOR SWAPPING
ON LINK SYSTEMS
SWAP AREA
PAGE SLOT
Swap file
Swap map
1 0 3 0 1
WHY SWAP SPACE
 When the amount of physical memory is full and the system
need more memory resources for new process then system
may get show or collapse .
 To make RAM more efficient as compare to present state.
 EXAMPLE : Swap space equal 2xphysical RAM for up to
2GB of physical RAM and then an additional 1x physical
RAM for any amount above 2GB.
 M=amount of RAM in GB.
 S=Amount of swap in GB.
If m<2
S=m*2
Else
S=m+2
PROTECTION
 INTRODUCTION
 GOALS OF PROTECTION
 PRINCIPLES OF PROTECTION
 ACCESS CONTROL
 BASIC TERMINOLOGY
 DOMAIN
 IMPLEMENTATION
INTRODUCTION
 Protection refers to a mechanism for controlling the
access of programs processes or used to the resources
defined by a computer system.
 Protection ensures that the resources of the computer
are used in a proper way.
 It ensure that each object accessed correctly and only
by those process that are allowed to do so.
GOALS OF PROTECTION
 We need to provide protection for several reasons.
 The most obvious is the need to prevent the bad ,
intentional violation of an access restriction by user.
 A role of protection in a computer system is to provide
a mechanism for the implementation of the polices
governing resource use
 A protection system must have the flexibility to enforce
a variety of policies.
PRINCIPLES OF PROTECTION
 The time tested guiding principle for protections the
principle of least privilege.
 It dictates the programs users and even system be
given enough privileges to perform their tasks.
 The principles of least privilege can help produce a
more secure computing environment.
ACCESS CONTROL
 Is concerned with determining the allows activities of
valid users , mediating every attempt by a user to
access a resource in the system.
Access request
Subject
Access
control
polices
Objec
t
Source Guard Resources
BASIC TERMINOLOGY
 OBJECT:- Access to an object potentially implies
access to the information it contains.
 [e .g] file ,program , printer.
 ACCESS RIGHTS:-The permission granted to a user
to perform an operation .
 [e .g] Read , write , execute.
DOMAIN
 Collection of object and a set of access right for each of
the object.
 A process operates within a protection domain that
specifies the resources that the process may access.
<obj1(read , write)
<obj2(read , write)
<obj3(execute)
ACCESS CONTROL MATRIX
 View protection as a matrix
 Rows represent domains
 Columns represent object
 Each entry in the matrix consists of a set of access
rights.
Cont….
DOMAIN
/OBJECT
F1 F2 F3 PRINTER
D1 Read Read
D2 Point
D3 Read Execute
D4 Read
write
Read
write
IMPLEMENTATION
 Each column=Access control list for one object defines
who can perform what operation
Domain 1=Read ,write
Domain 2=Read
Domain 3=Read
Each Row=capability list
object 1=Read
object 4=Read , write , execute
object 5=Read , write , delete , copy

More Related Content

What's hot

Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux SystemWayne Jones Jnr
 
Shortest job first Scheduling (SJF)
Shortest job first Scheduling (SJF)Shortest job first Scheduling (SJF)
Shortest job first Scheduling (SJF)ritu98
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithmsPiyush Rochwani
 
Operating system 34 contiguous allocation
Operating system 34 contiguous allocationOperating system 34 contiguous allocation
Operating system 34 contiguous allocationVaibhav Khanna
 
Thrashing allocation frames.43
Thrashing allocation frames.43Thrashing allocation frames.43
Thrashing allocation frames.43myrajendra
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process CommunicationAdeel Rasheed
 
3. distributed file system requirements
3. distributed file system requirements3. distributed file system requirements
3. distributed file system requirementsAbDul ThaYyal
 
Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux pptOmi Vichare
 
Operating system 25 classical problems of synchronization
Operating system 25 classical problems of synchronizationOperating system 25 classical problems of synchronization
Operating system 25 classical problems of synchronizationVaibhav Khanna
 
Operating Systems: Device Management
Operating Systems: Device ManagementOperating Systems: Device Management
Operating Systems: Device ManagementDamian T. Gordon
 
Virtual memory
Virtual memoryVirtual memory
Virtual memoryAnuj Modi
 
Swap Administration in linux platform
Swap Administration in linux platformSwap Administration in linux platform
Swap Administration in linux platformashutosh123gupta
 

What's hot (20)

Cache memory
Cache memoryCache memory
Cache memory
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
 
Shortest job first Scheduling (SJF)
Shortest job first Scheduling (SJF)Shortest job first Scheduling (SJF)
Shortest job first Scheduling (SJF)
 
Kernel (OS)
Kernel (OS)Kernel (OS)
Kernel (OS)
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 
Operating system 34 contiguous allocation
Operating system 34 contiguous allocationOperating system 34 contiguous allocation
Operating system 34 contiguous allocation
 
Thrashing allocation frames.43
Thrashing allocation frames.43Thrashing allocation frames.43
Thrashing allocation frames.43
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 
File sharing
File sharingFile sharing
File sharing
 
3. distributed file system requirements
3. distributed file system requirements3. distributed file system requirements
3. distributed file system requirements
 
Introduction to linux ppt
Introduction to linux pptIntroduction to linux ppt
Introduction to linux ppt
 
Operating system 25 classical problems of synchronization
Operating system 25 classical problems of synchronizationOperating system 25 classical problems of synchronization
Operating system 25 classical problems of synchronization
 
Kernels and its types
Kernels and its typesKernels and its types
Kernels and its types
 
Operating Systems: Device Management
Operating Systems: Device ManagementOperating Systems: Device Management
Operating Systems: Device Management
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Multiprocessor
MultiprocessorMultiprocessor
Multiprocessor
 
Cpu scheduling
Cpu schedulingCpu scheduling
Cpu scheduling
 
Virtual memory
Virtual memoryVirtual memory
Virtual memory
 
Swap Administration in linux platform
Swap Administration in linux platformSwap Administration in linux platform
Swap Administration in linux platform
 

Similar to Swap space management and protection in os

Similar to Swap space management and protection in os (20)

Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
 
OSCh3
OSCh3OSCh3
OSCh3
 
OS_Ch3
OS_Ch3OS_Ch3
OS_Ch3
 
Operating system
Operating systemOperating system
Operating system
 
Ch3
Ch3Ch3
Ch3
 
Os structure
Os structureOs structure
Os structure
 
ITT Project Information Technology Basic
ITT Project Information Technology BasicITT Project Information Technology Basic
ITT Project Information Technology Basic
 
Operating System Simple Introduction
Operating System Simple IntroductionOperating System Simple Introduction
Operating System Simple Introduction
 
Operating system
Operating systemOperating system
Operating system
 
Google File System
Google File SystemGoogle File System
Google File System
 
Operating System
Operating SystemOperating System
Operating System
 
Operating system by aman kr kushwaha
Operating system by aman kr kushwahaOperating system by aman kr kushwaha
Operating system by aman kr kushwaha
 
Presentation1 cc
Presentation1 ccPresentation1 cc
Presentation1 cc
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
 
OS UNIT1.pptx
OS UNIT1.pptxOS UNIT1.pptx
OS UNIT1.pptx
 
operating system structure
operating system structureoperating system structure
operating system structure
 
chapter 3 opreating system lecture note and its is impaortamt concept for mn
chapter 3 opreating system  lecture note and its is impaortamt concept for mnchapter 3 opreating system  lecture note and its is impaortamt concept for mn
chapter 3 opreating system lecture note and its is impaortamt concept for mn
 
Operating System Introduction.pptx
Operating System Introduction.pptxOperating System Introduction.pptx
Operating System Introduction.pptx
 
Unit vos - File systems
Unit vos - File systemsUnit vos - File systems
Unit vos - File systems
 
Operating system
Operating systemOperating system
Operating system
 

More from rajshreemuthiah (20)

oracle
oracleoracle
oracle
 
quality
qualityquality
quality
 
bigdata
bigdatabigdata
bigdata
 
polymorphism
polymorphismpolymorphism
polymorphism
 
solutions and understanding text analytics
solutions and understanding text analyticssolutions and understanding text analytics
solutions and understanding text analytics
 
interface
interfaceinterface
interface
 
Testing &ampdebugging
Testing &ampdebuggingTesting &ampdebugging
Testing &ampdebugging
 
concurrency control
concurrency controlconcurrency control
concurrency control
 
Education
EducationEducation
Education
 
Formal verification
Formal verificationFormal verification
Formal verification
 
Transaction management
Transaction management Transaction management
Transaction management
 
Multi thread
Multi threadMulti thread
Multi thread
 
System testing
System testingSystem testing
System testing
 
software maintenance
software maintenancesoftware maintenance
software maintenance
 
exception handling
exception handlingexception handling
exception handling
 
e governance
e governancee governance
e governance
 
recovery management
recovery managementrecovery management
recovery management
 
Implementing polymorphism
Implementing polymorphismImplementing polymorphism
Implementing polymorphism
 
Buffer managements
Buffer managementsBuffer managements
Buffer managements
 
os linux
os linuxos linux
os linux
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Swap space management and protection in os

  • 2. INTRODUCTION  Is the second time of memory in modern linux systems.  Swap Space:-virtual memory uses disk space as an extension of main memory.  Main goal for the design and implementation of swap space is to provide the best throughput for VM system.  Swap space use swapping use swap space to hold entire process image.  Some OS may support multiple swap space.
  • 3. SWAP SPACE LOCATION  Swap space can be carved out of the normal file system or in a separate disk partition  Catching block location information in main memory.  Contiguous allocation for the swap file.  But the cost of traversing is data structure still remains.
  • 4. DATA STRUCTURE FOR SWAPPING ON LINK SYSTEMS SWAP AREA PAGE SLOT Swap file Swap map 1 0 3 0 1
  • 5. WHY SWAP SPACE  When the amount of physical memory is full and the system need more memory resources for new process then system may get show or collapse .  To make RAM more efficient as compare to present state.  EXAMPLE : Swap space equal 2xphysical RAM for up to 2GB of physical RAM and then an additional 1x physical RAM for any amount above 2GB.  M=amount of RAM in GB.  S=Amount of swap in GB. If m<2 S=m*2 Else S=m+2
  • 6. PROTECTION  INTRODUCTION  GOALS OF PROTECTION  PRINCIPLES OF PROTECTION  ACCESS CONTROL  BASIC TERMINOLOGY  DOMAIN  IMPLEMENTATION
  • 7. INTRODUCTION  Protection refers to a mechanism for controlling the access of programs processes or used to the resources defined by a computer system.  Protection ensures that the resources of the computer are used in a proper way.  It ensure that each object accessed correctly and only by those process that are allowed to do so.
  • 8. GOALS OF PROTECTION  We need to provide protection for several reasons.  The most obvious is the need to prevent the bad , intentional violation of an access restriction by user.  A role of protection in a computer system is to provide a mechanism for the implementation of the polices governing resource use  A protection system must have the flexibility to enforce a variety of policies.
  • 9. PRINCIPLES OF PROTECTION  The time tested guiding principle for protections the principle of least privilege.  It dictates the programs users and even system be given enough privileges to perform their tasks.  The principles of least privilege can help produce a more secure computing environment.
  • 10. ACCESS CONTROL  Is concerned with determining the allows activities of valid users , mediating every attempt by a user to access a resource in the system. Access request Subject Access control polices Objec t Source Guard Resources
  • 11. BASIC TERMINOLOGY  OBJECT:- Access to an object potentially implies access to the information it contains.  [e .g] file ,program , printer.  ACCESS RIGHTS:-The permission granted to a user to perform an operation .  [e .g] Read , write , execute.
  • 12. DOMAIN  Collection of object and a set of access right for each of the object.  A process operates within a protection domain that specifies the resources that the process may access. <obj1(read , write) <obj2(read , write) <obj3(execute)
  • 13. ACCESS CONTROL MATRIX  View protection as a matrix  Rows represent domains  Columns represent object  Each entry in the matrix consists of a set of access rights.
  • 14. Cont…. DOMAIN /OBJECT F1 F2 F3 PRINTER D1 Read Read D2 Point D3 Read Execute D4 Read write Read write
  • 15. IMPLEMENTATION  Each column=Access control list for one object defines who can perform what operation Domain 1=Read ,write Domain 2=Read Domain 3=Read Each Row=capability list object 1=Read object 4=Read , write , execute object 5=Read , write , delete , copy