Chapter 10 FileSystem Interface File Concept n Contiguous
- Slides: 37
Chapter 10: File-System Interface
File Concept n Contiguous logical address space n Types: l Data 4 numeric 4 character 4 binary l Program Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 2 Silberschatz, Galvin and Gagne © 2005
File Structure n None - sequence of words, bytes n Simple record structure Lines l Fixed length l Variable length n Complex Structures l Formatted document l Relocatable load file n Can simulate last two with first method by inserting appropriate control characters l n Who decides: Operating system l Program l Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 3 Silberschatz, Galvin and Gagne © 2005
File Attributes n Name – only information kept in human-readable form n Identifier – unique tag (number) identifies file within file system n Type – needed for systems that support different types n Location – pointer to file location on device n Size – current file size n Protection – controls who can do reading, writing, executing n Time, date, and user identification – data for protection, security, and usage monitoring n Information about files are kept in the directory structure, which is maintained on the disk Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 4 Silberschatz, Galvin and Gagne © 2005
File Operations n File is an abstract data type n Create n Write n Read n Reposition within file n Delete n Truncate n Open(Fi) – search the directory structure on disk for entry Fi, and move the content of entry to memory n Close (Fi) – move the content of entry Fi in memory to directory structure on disk Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 5 Silberschatz, Galvin and Gagne © 2005
Open Files n Several pieces of data are needed to manage open files: l File pointer: pointer to last read/write location, per process that has the file open l File-open count: counter of number of times a file is open – to allow removal of data from open-file table when last processes closes it l Disk location of the file: cache of data access information l Access rights: per-process access mode information Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 6 Silberschatz, Galvin and Gagne © 2005
Open File Locking n Provided by some operating systems and file systems n Mediates access to a file n Mandatory or advisory: l Mandatory – access is denied depending on locks held and requested l Advisory – processes can find status of locks and decide what to do Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 7 Silberschatz, Galvin and Gagne © 2005
File Types – Name, Extension Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 8 Silberschatz, Galvin and Gagne © 2005
Access Methods n Sequential Access read next write next reset no read after last write (rewrite) n Direct Access read n write n position to n read next write next rewrite n n = relative block number Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 9 Silberschatz, Galvin and Gagne © 2005
Sequential-access File Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 10 Silberschatz, Galvin and Gagne © 2005
Simulation of Sequential Access on a Direct-access File Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 11 Silberschatz, Galvin and Gagne © 2005
Example of Index and Relative Files Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 12 Silberschatz, Galvin and Gagne © 2005
Directory Structure n A collection of nodes containing information about all files Directory Files F 1 F 2 F 3 F 4 Fn Both the directory structure and the files reside on disk Backups of these two structures are kept on tapes Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 13 Silberschatz, Galvin and Gagne © 2005
A Typical File-system Organization Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 14 Silberschatz, Galvin and Gagne © 2005
Operations Performed on Directory n Search for a file n Create a file n Delete a file n List a directory n Rename a file n Traverse the file system Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 15 Silberschatz, Galvin and Gagne © 2005
Organize the Directory (Logically) to Obtain n Efficiency – locating a file quickly n Naming – convenient to users l Two users can have same name for different files l The same file can have several different names n Grouping – logical grouping of files by properties, (e. g. , all Java programs, all games, …) Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 16 Silberschatz, Galvin and Gagne © 2005
Single-Level Directory n A single directory for all users Naming problem Grouping problem Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 17 Silberschatz, Galvin and Gagne © 2005
Two-Level Directory n Separate directory for each user n Path name n Can have the same file name for different user n Efficient searching n No grouping capability Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 18 Silberschatz, Galvin and Gagne © 2005
Tree-Structured Directories Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 19 Silberschatz, Galvin and Gagne © 2005
Tree-Structured Directories (Cont) n Efficient searching n Grouping Capability n Current directory (working directory) l cd /spell/mail/prog l type list Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 20 Silberschatz, Galvin and Gagne © 2005
Tree-Structured Directories (Cont) n Absolute or relative path name n Creating a new file is done in current directory n Delete a file rm <file-name> n Creating a new subdirectory is done in current directory mkdir <dir-name> Example: if in current directory /mail mkdir count mail prog copy prt exp count Deleting “mail” deleting the entire subtree rooted by “mail” Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 21 Silberschatz, Galvin and Gagne © 2005
Acyclic-Graph Directories n Have shared subdirectories and files Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 22 Silberschatz, Galvin and Gagne © 2005
Acyclic-Graph Directories (Cont. ) n Two different names (aliasing) n If dict deletes list dangling pointer Solutions: l Backpointers, so we can delete all pointers Variable size records a problem l Backpointers using a daisy chain organization l Entry-hold-count solution n New directory entry type l Link – another name (pointer) to an existing file l Resolve the link – follow pointer to locate the file Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 23 Silberschatz, Galvin and Gagne © 2005
General Graph Directory Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 24 Silberschatz, Galvin and Gagne © 2005
General Graph Directory (Cont. ) n How do we guarantee no cycles? l Allow only links to file not subdirectories l Garbage collection l Every time a new link is added use a cycle detection algorithm to determine whether it is OK Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 25 Silberschatz, Galvin and Gagne © 2005
File System Mounting n A file system must be mounted before it can be accessed n A unmounted file system (i. e. Fig. 11 -11(b)) is mounted at a mount point Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 26 Silberschatz, Galvin and Gagne © 2005
(a) Existing. (b) Unmounted Partition Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 27 Silberschatz, Galvin and Gagne © 2005
Mount Point Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 28 Silberschatz, Galvin and Gagne © 2005
File Sharing n Sharing of files on multi-user systems is desirable n Sharing may be done through a protection scheme n On distributed systems, files may be shared across a network n Network File System (NFS) is a common distributed file-sharing method Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 29 Silberschatz, Galvin and Gagne © 2005
File Sharing – Multiple Users n User IDs identify users, allowing permissions and protections to be per-user n Group IDs allow users to be in groups, permitting group access rights Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 30 Silberschatz, Galvin and Gagne © 2005
File Sharing – Remote File Systems n Uses networking to allow file system access between systems Manually via programs like FTP l Automatically, seamlessly using distributed file systems l Semi automatically via the world wide web n Client-server model allows clients to mount remote file systems from servers l Server can serve multiple clients l Client and user-on-client identification is insecure or complicated l NFS is standard UNIX client-server file sharing protocol l CIFS is standard Windows protocol l Standard operating system file calls are translated into remote calls n Distributed Information Systems (distributed naming services) such as LDAP, DNS, NIS, Active Directory implement unified access to information needed for remote computing l Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 31 Silberschatz, Galvin and Gagne © 2005
File Sharing – Failure Modes n Remote file systems add new failure modes, due to network failure, server failure n Recovery from failure can involve state information about status of each remote request n Stateless protocols such as NFS include all information in each request, allowing easy recovery but less security Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 32 Silberschatz, Galvin and Gagne © 2005
File Sharing – Consistency Semantics n Consistency semantics specify how multiple users are to access a shared file simultaneously l Similar to Ch 7 process synchronization algorithms 4 Tend to be less complex due to disk I/O and network latency (for remote file systems l Andrew File System (AFS) implemented complex remote file sharing semantics l Unix file system (UFS) implements: 4 Writes to an open file visible immediately to other users of the same open file 4 Sharing file pointer to allow multiple users to read and write concurrently l AFS has session semantics 4 Writes only visible to sessions starting after the file is closed Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 33 Silberschatz, Galvin and Gagne © 2005
Protection n File owner/creator should be able to control: l what can be done l by whom n Types of access l Read l Write l Execute l Append l Delete l List Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 34 Silberschatz, Galvin and Gagne © 2005
Access Lists and Groups n Mode of access: read, write, execute n Three classes of users RWX a) owner access 7 111 RWX b) group access 6 110 RWX c) public access 1 001 n Ask manager to create a group (unique name), say G, and add some users to the group. n For a particular file (say game) or subdirectory, define an appropriate access. owner chmod group public 761 game Attach a group to a file chgrp Operating System Concepts – 7 th Edition, Jan 1, 2005 G game 10. 35 Silberschatz, Galvin and Gagne © 2005
A Sample UNIX Directory Listing Operating System Concepts – 7 th Edition, Jan 1, 2005 10. 36 Silberschatz, Galvin and Gagne © 2005
End of Chapter 10
- Pathname lookup in linux's virtual filesystem
- Posix filesystem
- Ubi filesystem
- File-file yang dibuat oleh user pada jenis file di linux
- What is interface in java
- Office interface vs industrial interface
- Office interface vs industrial interface
- Interface------------ an interface *
- File system interface
- Non contiguous memory allocation
- Maximum contiguous subsequence
- Contiguous logical address space
- Contiguous tissue
- Single-user contiguous scheme
- Nebulous in the great gatsby
- Postfix expression
- External fragmentation definition
- Virtual memory
- Non contiguous memory allocation
- Jihad
- Non contiguous memory allocation
- Linked allocation
- Paging in non contiguous memory allocation
- International sea law
- Contiguous united states land area
- Physical image vs logical image
- Fungsi sistem file
- Remote file access in distributed file system
- What does a markup tag tells the web browser
- In a file-oriented information system, a transaction file
- File concept in os
- File concept
- File concept
- The similarities of real self and ideal self
- Contoh selling concept
- Php file
- Enter.php?chapter=
- File.php?chapter=