Presentation is loading. Please wait.

Presentation is loading. Please wait.

Operating Systems (CS 340 D) Dr. Abeer Mahmoud Princess Nora University Faculty of Computer & Information Systems Computer science Department.

Similar presentations


Presentation on theme: "Operating Systems (CS 340 D) Dr. Abeer Mahmoud Princess Nora University Faculty of Computer & Information Systems Computer science Department."— Presentation transcript:

1 Operating Systems (CS 340 D) Dr. Abeer Mahmoud Princess Nora University Faculty of Computer & Information Systems Computer science Department

2 (Chapter-11) File System Interface

3 Chapter 11: File System Interface 1.File Concept 2.Access Methods 3.Directory Structure 4.File Sharing 5.Protection Dr. Abeer Mahmoud 3

4 OBJECTIVES :  To explain the function of file systems  To describe the interfaces to file systems  To discuss file-system design tradeoffs, including access methods, file sharing, file locking, and directory structures  To explore file-system protection Dr. Abeer Mahmoud 4

5 Background Dr. Abeer Mahmoud 5

6 The file system consists of two distinct parts: 1. a collection of files, each storing related data, and 2. a directory structure, which organizes and provides information about all the files in the system. Dr. Abeer Mahmoud 6

7 File Concept  A file is a named collection of related information that is recorded on secondary storage.  Commonly, files represent programs (both source and object forms) and data.  Data files may be numeric, alphabetic, alphanumeric, or binary.  Files may be free form, such as text files, or may be formatted rigidly.   The information in a file is defined by its creator. Dr. Abeer Mahmoud 7

8 File Concept (cont.)  Many different types of information may be stored in a file  source programs, object programs, executable programs, numeric data, text, payroll records, graphic images, sound recordings, …..  A file has a certain defined structure, which depends on its type. o e.g: A text file is a sequence of characters organized into lines o A source file is a sequence of subroutines and functions, each of which is further organized as declarations followed by executable statements. o An object file is a sequence of bytes organized into blocks understandable by the system’s linker. o An executable file is a series of code sections that the loader can bring into memory and execute. Dr. Abeer Mahmoud 8

9 File Structure Dr. Abeer Mahmoud 9

10 File Structure  None - sequence of words, bytes  Simple record structure  Lines  Fixed length  Variable length  Complex Structures  Formatted document  Relocatable load file  Can simulate last two with first method by inserting appropriate control characters  Who decides:  Operating system  Program Dr. Abeer Mahmoud 10

11 File Attributes  Name – only information kept in human-readable form  Identifier – unique tag (number) identifies file within file system  Type – needed for systems that support different types  Location – pointer to file location on device  Size – current file size  Protection – controls who can do reading, writing, executing  Time, date, and user identification – data for protection, security, and usage monitoring  Information about files are kept in the directory structure, which is maintained on the disk Dr. Abeer Mahmoud 11

12 File Operations Dr. Abeer Mahmoud 12

13 File Operations  File is an abstract data type CreateWrite Two steps are necessary to create a file.  First, space in the file system must be found for the file how?  Second, an entry for the new file must be made in the directory. To write a file, we make a system call specifying both the name of the file and the information to be written to the file.  Given the name of the file, the system searches the directory to find the file’s location.  The system must keep a write pointer to the location in the file where the next write is to take place. The write pointer mustbe updated whenever a write occurs. Dr. Abeer Mahmoud 13

14 File Operations (cont.) ReadDelete To read from a file, we use a system call that 1.specifies file name and where (in memory) the next block of the file should be put. 2.the directory is searched for the associated entry, 3.the system keeps a read pointer to the location in the file where the next read is to take place. 4.Once the read has taken place, the read pointer is updated To delete a file  Provide name and search the directory for it  Having found it, we release all file space, so that it can be reused by other files, and erase the directory entry Dr. Abeer Mahmoud 14

15 File Operations (cont.) Truncating a file  The user may want to erase the contents of a file but keep its attributes. Rather than forcing the user to delete the file and then recreate it, this function allows all attributes to remain unchanged— except for file length—but lets the file be reset to length zero Dr. Abeer Mahmoud 15

16 File Types – Name, Extension Dr. Abeer Mahmoud 16

17 File Access Methods Dr. Abeer Mahmoud 17

18 Access Methods 1. Sequential Access2. Direct Access (or relative access) Information in the file is processed in order, one record after the other. This mode of access is by far the most common read next, write next reset, no read after last write (rewrite) A file is made up of fixed length of logical records that allow programs to read and write records rapidly in no particular order. read n, write n, position to n read next, write next, rewrite n n = relative block number Dr. Abeer Mahmoud 18

19 Simulation of Sequential Access on a Direct- access File Dr. Abeer Mahmoud 19

20 Directory and Disk Structure Dr. Abeer Mahmoud 20

21  A storage device can be used in its entirety for a file system. each partition can hold a file system  It can also be subdivided into partitions (each partition can hold a file system)  Partitioning is useful for limiting the sizes of individual file systems, Directory Structure  Partitions are also known as slices or (in the IBM world) minidisks.  Any entity containing a file system is generally known as a volume. Dr. Abeer Mahmoud 21

22 Directory Structure (cont..)  Each volume can be thought of as a virtual disk.  Each volume that contains a file system must also contain information about the files in the system. This is the device directory (simply as that directory)  records information—such as name, location, size, and type—for all files on that volume. file-system organization. Dr. Abeer Mahmoud 22

23  A collection of nodes containing information about all files F 1 F 2 F 3 F 4 F n Directory Files Both the directory structure and the files reside on disk Backups of these two structures are kept on tapes Directory Structure (cont..) Dr. Abeer Mahmoud 23

24 A Typical File-system Organization Dr. Abeer Mahmoud 24

25 Operations Performed on Directory  Search for a file  Create a file  Delete a file  List a directory  Rename a file  Traverse the file system Dr. Abeer Mahmoud 25

26 Organize the Directory (Logically) to Obtain  Efficiency – locating a file quickly  Naming – convenient to users  most common schemes for defining the logical structure of a directory.  Single-Level Directory  Two-Level Directory  Tree-Structured Directories Dr. Abeer Mahmoud 26

27 Single-Level Directory  A single directory for all users  The simplest structure  Limitation  Naming problem: when the number of files increases or when the system has more than one user. Since all files are in the same directory, they must have unique names  Grouping problem : Keeping track of so many files is unaffordable e.g :The MS-DOS operating system allows only 11-character file names; UNIX, in contrast, allows 255 characters. Dr. Abeer Mahmoud 27

28 Two-Level Directory  Separate directory for each user Path name Can have the same file name for different user Efficient searching No grouping capability Dr. Abeer Mahmoud 28

29 Tree-Structured Directories n Efficient searching n Grouping Capability Dr. Abeer Mahmoud 29

30 File Share and Protection Dr. Abeer Mahmoud 30

31 File Sharing  Sharing of files on multi-user systems is desirable  Sharing may be done through a protection scheme  On distributed systems, files may be shared across a network  Network File System (NFS) is a common distributed file- sharing method Dr. Abeer Mahmoud 31

32 File Sharing – Multiple Users  User IDs identify users, allowing permissions and protections to be per-user  Group IDs allow users to be in groups, permitting group access rights Dr. Abeer Mahmoud 32

33 Protection  File owner/creator should be able to control:  what can be done  by whom  Types of access  Read  Write  Execute  Append  Delete  List Dr. Abeer Mahmoud 33

34 Thank you End of Chapter 11 Dr. Abeer Mahmoud 34


Download ppt "Operating Systems (CS 340 D) Dr. Abeer Mahmoud Princess Nora University Faculty of Computer & Information Systems Computer science Department."

Similar presentations


Ads by Google