尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
SUJITHA.M
I-M.SC(CS&IT)
NADAR SARASWATHI COLLEGE OF ARTS
AND SCIENCE,THENI.
FILE SHARING, SECONDARY STORAGE MANAGEMENT
FILE ALLOCATION
FILE SHARING
 In a multiuser system, there is a requirement for
allowing files to be shared among a number of
users.
 There two issues may arise.
 They are:
Access Rights
Management of simultaneous Access
ACCESS RIGHTS
 The file system provides a flexible tool for allowing file
sharing among the users.
 It provides a number of options, so that the files can be
accessed and controlled easily by the users.
 So that the user has rights to access the file which
provides at a wide range.
 There are certain lists that access rights which is
assigned to a particular user for a particular file.
 NONE:
If the user does not know the existence of the file,
he would not be allowed to read the user directory that
is included in this file.
 KNOWLEDGE:
The user can determine the exist file and the owner
of the existing file.
 EXECUTION:
The user can load and execute the file but that file
cannot be copied .
 READING:
The user can read , copy and execute for any purpose.
 APPENDING:
The user can insert data to the file, but the process
of modification and deletion is restricted.
 UPDATING:
The user can modify, delete and add data to the file.
 CHANGING PROTECTION:
The user can change the access rights which is
granted to the other user.
 DELETION:
The user can delete the file from the file system.
ACCESS THAT ARE PROVIDED IN
DIFFERENT CLASSES
 SPECIFIC USER:
The individual users who are assigned by the
user ID.
 USERGROUPS:
A set of users who are not defined individually.
 ALL:
These are the public files which is assigned by
all users.
SIMULTANEOUS ACCESS
 When access allowed to append or update a file
more than one user, the operating system must
enforce discipline.
 A brute force approach is to allow a user to lock the
entire file when it is to be updated.
 Issues of mutual exclusion and deadlock must be
addressed in designing the shared access capability.
SECONDARY STORAGE MANAGEMENT
 On Secondary storage ,a file consists of a collection of
blocks .
 The Operating system or file management system is
responsible for allocating blocks to the files .
 There are two management issues:
 Secondary storage must be allocated to the files.
 It is necessary to keep track of the space which is
available for the allocation.
FILE ALLOCATION
 The file allocation can be done using a single disk.
 The several issues are:
 When a new file is created, it requires the maximum
space.
 The space is allocated to a file as one or more
contiguous units.
 When a sort of data structure or table is used to keep
the portions which is assigned to a file.
 Such table is called as “File Allocation Table”.
PORTION SIZE
 The major issue is the size of the portion which is
allocated to a file.
 It is used to hold the entire file which is allocated.
 The major alternatives are:
VARIABLE,LARGE CONTIGUOUS PORTION:
The variable size avoids waste and the file
allocation tables are small.
BLOCKS:
 The small fixed portion provides greater flexibility.
 They may require large tables or complex structures for
allocation, so blocks are created when they are needed.
FILE ALLOCATION METHODS
 The specific allocation methods are:
 Contiguous Allocation
 Chained Allocation
 Indexed Allocation
 A single contiguous set of blocks is allocated to a file at
the time of file creation is called as “ Contiguous
Allocation”.
 The opposite extreme from contiguous allocation is
called as “Chained Allocation”.
 “Indexed Allocation” is used to address many problems
of contiguous and chained allocation.
File Allocation Methods
Contiguous Chained Indexed
Preallocation ? Necessary Possible Possible
Fixed or variable
size portions ?
Variable Fixed blocks Fixed Variable
blocks
Portion size Large Small Small Medium
Allocation
frequency
Once Low to high High Low
Time to allocate Medium Long Short Medium
File allocation
table size
One entry One entry Large Medium
FREE SPACE MANAGEMENT
 The space should be managed when the files are
allocated.
 The “Disk Allocation Table” is used to know what
blocks are available in the disk.
 The techniques that are implemented are:
BIT TABLES:
 This method is uses vector containing one bit for each
block on the disk.
 Each entry of 0 corresponds to a free block and 1
corresponds to a block in use.
CHAINED FREE PORTIONS:
Each free portion may be chained together using a
pointer and length value.
INDEXING:
The indexing approach treats free space as a file.
FREE BLOCK LIST:
 Each block is assigned as a number sequentially.
 The list of numbers of all free blocks is maintained in a
reserved portion of the disk.
 24 or 32 bits are needed to store a single block of
number.
THANKYOU!!!

More Related Content

What's hot

memory allocation methods
memory allocation methodsmemory allocation methods
memory allocation methods
Anshul gour
 
C# Drive info class
C# Drive info classC# Drive info class
C# Drive info class
Prem Kumar Badri
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating system
Jimmi Sitorus
 
Acyclic grapch directory 56(2)
Acyclic grapch directory 56(2)Acyclic grapch directory 56(2)
Acyclic grapch directory 56(2)
myrajendra
 
File Management
File ManagementFile Management
File Management
Najma Alam
 
Oerating system project
Oerating system projectOerating system project
Oerating system project
Hira Gul
 
File protection.59 to 60
File protection.59 to 60File protection.59 to 60
File protection.59 to 60
myrajendra
 
Chapter 3 part 1
Chapter 3 part 1Chapter 3 part 1
Chapter 3 part 1
rohassanie
 
Types of files
Types of filesTypes of files
Types of files
Amar Jukuntla
 
DDMS
DDMSDDMS
DDMS
Ronit BK
 
Ch10 file system interface
Ch10   file system interfaceCh10   file system interface
Ch10 file system interface
Welly Dian Astika
 
Chapter 3 part 2
Chapter 3 part 2Chapter 3 part 2
Chapter 3 part 2
rohassanie
 
Neww
NewwNeww
Windows for Everyone(Operating System)
Windows for Everyone(Operating System)Windows for Everyone(Operating System)
Windows for Everyone(Operating System)
Waleed Khan
 
Purpose of DBMS and users of DBMS
Purpose of DBMS and users of DBMSPurpose of DBMS and users of DBMS
Purpose of DBMS and users of DBMS
DharmamSavani
 
Licão 04 permissions
Licão 04 permissionsLicão 04 permissions
Licão 04 permissions
Acácio Oliveira
 
Download It
Download ItDownload It
Download It
webhostingguy
 
Web browser
Web browserWeb browser
Web browser
violybangit
 

What's hot (18)

memory allocation methods
memory allocation methodsmemory allocation methods
memory allocation methods
 
C# Drive info class
C# Drive info classC# Drive info class
C# Drive info class
 
01. english version operating system
01. english version   operating system01. english version   operating system
01. english version operating system
 
Acyclic grapch directory 56(2)
Acyclic grapch directory 56(2)Acyclic grapch directory 56(2)
Acyclic grapch directory 56(2)
 
File Management
File ManagementFile Management
File Management
 
Oerating system project
Oerating system projectOerating system project
Oerating system project
 
File protection.59 to 60
File protection.59 to 60File protection.59 to 60
File protection.59 to 60
 
Chapter 3 part 1
Chapter 3 part 1Chapter 3 part 1
Chapter 3 part 1
 
Types of files
Types of filesTypes of files
Types of files
 
DDMS
DDMSDDMS
DDMS
 
Ch10 file system interface
Ch10   file system interfaceCh10   file system interface
Ch10 file system interface
 
Chapter 3 part 2
Chapter 3 part 2Chapter 3 part 2
Chapter 3 part 2
 
Neww
NewwNeww
Neww
 
Windows for Everyone(Operating System)
Windows for Everyone(Operating System)Windows for Everyone(Operating System)
Windows for Everyone(Operating System)
 
Purpose of DBMS and users of DBMS
Purpose of DBMS and users of DBMSPurpose of DBMS and users of DBMS
Purpose of DBMS and users of DBMS
 
Licão 04 permissions
Licão 04 permissionsLicão 04 permissions
Licão 04 permissions
 
Download It
Download ItDownload It
Download It
 
Web browser
Web browserWeb browser
Web browser
 

Similar to Filesharing 180214044607

Files
FilesFiles
directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mounting
rajshreemuthiah
 
File Allocation Methods.ppt
File Allocation Methods.pptFile Allocation Methods.ppt
File Allocation Methods.ppt
BharathiLakshmiAAssi
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
Ethiopia Satlliet television
 
file management
 file management file management
file management
Sweta Kumari Barnwal
 
File structure
File structureFile structure
File structure
A. S. M. Shafi
 
Allocation method - Operating System.pptx
Allocation method - Operating System.pptxAllocation method - Operating System.pptx
Allocation method - Operating System.pptx
Indhu Periys
 
Model of file system
Model of file systemModel of file system
Model of file system
Ishucs
 
Directory structure
Directory structureDirectory structure
Directory structure
sangrampatil81
 
Ch12_OS_Lecture 5.pdf
Ch12_OS_Lecture 5.pdfCh12_OS_Lecture 5.pdf
Ch12_OS_Lecture 5.pdf
AllinOne746595
 
Ch12_OS_Lecture 4.pdf
Ch12_OS_Lecture 4.pdfCh12_OS_Lecture 4.pdf
Ch12_OS_Lecture 4.pdf
AllinOne746595
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
AsmaaFaried1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Cahaya Penyayang
 
OS Unit 4.pptx
OS Unit 4.pptxOS Unit 4.pptx
OS Unit 4.pptx
GautamBorana
 
Dude.pptx
Dude.pptxDude.pptx
Operating System-4 "File Management" by Adi.pdf
Operating System-4 "File Management" by Adi.pdfOperating System-4 "File Management" by Adi.pdf
Operating System-4 "File Management" by Adi.pdf
Prof. Dr. K. Adisesha
 
Chapter12
Chapter12Chapter12
Chapter12
Loyd Morales
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
Mohamed Gad
 
File Systems
File SystemsFile Systems
File Systems
Shipra Swati
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
Soushilove
 

Similar to Filesharing 180214044607 (20)

Files
FilesFiles
Files
 
directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mounting
 
File Allocation Methods.ppt
File Allocation Methods.pptFile Allocation Methods.ppt
File Allocation Methods.ppt
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
file management
 file management file management
file management
 
File structure
File structureFile structure
File structure
 
Allocation method - Operating System.pptx
Allocation method - Operating System.pptxAllocation method - Operating System.pptx
Allocation method - Operating System.pptx
 
Model of file system
Model of file systemModel of file system
Model of file system
 
Directory structure
Directory structureDirectory structure
Directory structure
 
Ch12_OS_Lecture 5.pdf
Ch12_OS_Lecture 5.pdfCh12_OS_Lecture 5.pdf
Ch12_OS_Lecture 5.pdf
 
Ch12_OS_Lecture 4.pdf
Ch12_OS_Lecture 4.pdfCh12_OS_Lecture 4.pdf
Ch12_OS_Lecture 4.pdf
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
OS Unit 4.pptx
OS Unit 4.pptxOS Unit 4.pptx
OS Unit 4.pptx
 
Dude.pptx
Dude.pptxDude.pptx
Dude.pptx
 
Operating System-4 "File Management" by Adi.pdf
Operating System-4 "File Management" by Adi.pdfOperating System-4 "File Management" by Adi.pdf
Operating System-4 "File Management" by Adi.pdf
 
Chapter12
Chapter12Chapter12
Chapter12
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
 
File Systems
File SystemsFile Systems
File Systems
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
 

More from kirupasuchi1996

Rotor machine,subsitution technique
Rotor machine,subsitution techniqueRotor machine,subsitution technique
Rotor machine,subsitution technique
kirupasuchi1996
 
rotor machine
rotor machinerotor machine
rotor machine
kirupasuchi1996
 
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSIONDVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
kirupasuchi1996
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
kirupasuchi1996
 
DS ppt
DS pptDS ppt
Image compression standards
Image compression standardsImage compression standards
Image compression standards
kirupasuchi1996
 
Language and Processors for Requirements Specification
Language and Processors for Requirements SpecificationLanguage and Processors for Requirements Specification
Language and Processors for Requirements Specification
kirupasuchi1996
 
Software Cost Factor
Software Cost FactorSoftware Cost Factor
Software Cost Factor
kirupasuchi1996
 
GUI components in Java
GUI components in JavaGUI components in Java
GUI components in Java
kirupasuchi1996
 
Designing Techniques in Software Engineering
Designing Techniques in Software EngineeringDesigning Techniques in Software Engineering
Designing Techniques in Software Engineering
kirupasuchi1996
 
Dmppt 180312092027
Dmppt 180312092027Dmppt 180312092027
Dmppt 180312092027
kirupasuchi1996
 
Datatransferandmanipulation 180214044522
Datatransferandmanipulation 180214044522Datatransferandmanipulation 180214044522
Datatransferandmanipulation 180214044522
kirupasuchi1996
 
B tree-180214044656
B tree-180214044656B tree-180214044656
B tree-180214044656
kirupasuchi1996
 
Addressingmodes
Addressingmodes Addressingmodes
Addressingmodes
kirupasuchi1996
 
Managing,working with files
Managing,working with filesManaging,working with files
Managing,working with files
kirupasuchi1996
 

More from kirupasuchi1996 (15)

Rotor machine,subsitution technique
Rotor machine,subsitution techniqueRotor machine,subsitution technique
Rotor machine,subsitution technique
 
rotor machine
rotor machinerotor machine
rotor machine
 
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSIONDVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
DVI,FRACTAL IMAGE,SUB BAND IMAGE,VIDEO CODING AND WAVELET BASED COMPRESSION
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
DS ppt
DS pptDS ppt
DS ppt
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
Language and Processors for Requirements Specification
Language and Processors for Requirements SpecificationLanguage and Processors for Requirements Specification
Language and Processors for Requirements Specification
 
Software Cost Factor
Software Cost FactorSoftware Cost Factor
Software Cost Factor
 
GUI components in Java
GUI components in JavaGUI components in Java
GUI components in Java
 
Designing Techniques in Software Engineering
Designing Techniques in Software EngineeringDesigning Techniques in Software Engineering
Designing Techniques in Software Engineering
 
Dmppt 180312092027
Dmppt 180312092027Dmppt 180312092027
Dmppt 180312092027
 
Datatransferandmanipulation 180214044522
Datatransferandmanipulation 180214044522Datatransferandmanipulation 180214044522
Datatransferandmanipulation 180214044522
 
B tree-180214044656
B tree-180214044656B tree-180214044656
B tree-180214044656
 
Addressingmodes
Addressingmodes Addressingmodes
Addressingmodes
 
Managing,working with files
Managing,working with filesManaging,working with files
Managing,working with files
 

Recently uploaded

An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
Safe Software
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
ScyllaDB
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
ScyllaDB
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
Databarracks
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 

Recently uploaded (20)

An Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise IntegrationAn Introduction to All Data Enterprise Integration
An Introduction to All Data Enterprise Integration
 
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time MLMongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
MongoDB vs ScyllaDB: Tractian’s Experience with Real-Time ML
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to SuccessMongoDB to ScyllaDB: Technical Comparison and the Path to Success
MongoDB to ScyllaDB: Technical Comparison and the Path to Success
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
Real-Time Persisted Events at Supercell
Real-Time Persisted Events at  SupercellReal-Time Persisted Events at  Supercell
Real-Time Persisted Events at Supercell
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Cyber Recovery Wargame
Cyber Recovery WargameCyber Recovery Wargame
Cyber Recovery Wargame
 
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State StoreElasticity vs. State? Exploring Kafka Streams Cassandra State Store
Elasticity vs. State? Exploring Kafka Streams Cassandra State Store
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
ScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDCScyllaDB Real-Time Event Processing with CDC
ScyllaDB Real-Time Event Processing with CDC
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 

Filesharing 180214044607

  • 1. SUJITHA.M I-M.SC(CS&IT) NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE,THENI. FILE SHARING, SECONDARY STORAGE MANAGEMENT FILE ALLOCATION
  • 2. FILE SHARING  In a multiuser system, there is a requirement for allowing files to be shared among a number of users.  There two issues may arise.  They are: Access Rights Management of simultaneous Access
  • 3. ACCESS RIGHTS  The file system provides a flexible tool for allowing file sharing among the users.  It provides a number of options, so that the files can be accessed and controlled easily by the users.  So that the user has rights to access the file which provides at a wide range.  There are certain lists that access rights which is assigned to a particular user for a particular file.
  • 4.  NONE: If the user does not know the existence of the file, he would not be allowed to read the user directory that is included in this file.  KNOWLEDGE: The user can determine the exist file and the owner of the existing file.  EXECUTION: The user can load and execute the file but that file cannot be copied .  READING: The user can read , copy and execute for any purpose.
  • 5.  APPENDING: The user can insert data to the file, but the process of modification and deletion is restricted.  UPDATING: The user can modify, delete and add data to the file.  CHANGING PROTECTION: The user can change the access rights which is granted to the other user.  DELETION: The user can delete the file from the file system.
  • 6. ACCESS THAT ARE PROVIDED IN DIFFERENT CLASSES  SPECIFIC USER: The individual users who are assigned by the user ID.  USERGROUPS: A set of users who are not defined individually.  ALL: These are the public files which is assigned by all users.
  • 7. SIMULTANEOUS ACCESS  When access allowed to append or update a file more than one user, the operating system must enforce discipline.  A brute force approach is to allow a user to lock the entire file when it is to be updated.  Issues of mutual exclusion and deadlock must be addressed in designing the shared access capability.
  • 8. SECONDARY STORAGE MANAGEMENT  On Secondary storage ,a file consists of a collection of blocks .  The Operating system or file management system is responsible for allocating blocks to the files .  There are two management issues:  Secondary storage must be allocated to the files.  It is necessary to keep track of the space which is available for the allocation.
  • 9. FILE ALLOCATION  The file allocation can be done using a single disk.  The several issues are:  When a new file is created, it requires the maximum space.  The space is allocated to a file as one or more contiguous units.  When a sort of data structure or table is used to keep the portions which is assigned to a file.  Such table is called as “File Allocation Table”.
  • 10. PORTION SIZE  The major issue is the size of the portion which is allocated to a file.  It is used to hold the entire file which is allocated.  The major alternatives are: VARIABLE,LARGE CONTIGUOUS PORTION: The variable size avoids waste and the file allocation tables are small. BLOCKS:  The small fixed portion provides greater flexibility.  They may require large tables or complex structures for allocation, so blocks are created when they are needed.
  • 11. FILE ALLOCATION METHODS  The specific allocation methods are:  Contiguous Allocation  Chained Allocation  Indexed Allocation  A single contiguous set of blocks is allocated to a file at the time of file creation is called as “ Contiguous Allocation”.  The opposite extreme from contiguous allocation is called as “Chained Allocation”.  “Indexed Allocation” is used to address many problems of contiguous and chained allocation.
  • 12. File Allocation Methods Contiguous Chained Indexed Preallocation ? Necessary Possible Possible Fixed or variable size portions ? Variable Fixed blocks Fixed Variable blocks Portion size Large Small Small Medium Allocation frequency Once Low to high High Low Time to allocate Medium Long Short Medium File allocation table size One entry One entry Large Medium
  • 13. FREE SPACE MANAGEMENT  The space should be managed when the files are allocated.  The “Disk Allocation Table” is used to know what blocks are available in the disk.  The techniques that are implemented are: BIT TABLES:  This method is uses vector containing one bit for each block on the disk.  Each entry of 0 corresponds to a free block and 1 corresponds to a block in use.
  • 14. CHAINED FREE PORTIONS: Each free portion may be chained together using a pointer and length value. INDEXING: The indexing approach treats free space as a file. FREE BLOCK LIST:  Each block is assigned as a number sequentially.  The list of numbers of all free blocks is maintained in a reserved portion of the disk.  24 or 32 bits are needed to store a single block of number.
  翻译: