ch10[1] upto 32 and 36

Upload: shubham-mittal

Post on 04-Feb-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/21/2019 ch10[1] upto 32 and 36

    1/42

    Chapter 10: File-System InterfaceChapter 10: File-System Interface

  • 7/21/2019 ch10[1] upto 32 and 36

    2/42

    10.2 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Chapter 10: File-System InterfaceChapter 10: File-System Interface

    File Concept

    Access Methods

    Directory Structure

    File-System Mounting

    File Sharing

    Protection

  • 7/21/2019 ch10[1] upto 32 and 36

    3/42

    10.3 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    ObjectivesObjectives

    To explain the function of file systems

    To describe the interfaces to file systems

    To discuss file-system design tradeoffs, including access methods,file sharing, file locking, and directory structures

    To explore file-system protection

  • 7/21/2019 ch10[1] upto 32 and 36

    4/42

    10.4 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File ConceptFile Concept

    Contiguous logical address space

    Types:

    Data

    numeric

    characterbinary

    Program

  • 7/21/2019 ch10[1] upto 32 and 36

    5/42

    10.5 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File StructureFile Structure

    None - sequence of words, bytes

    Simple record structure

    Lines

    Fixed length

    Variable length

    Complex Structures Formatted document

    Relocatable load file

    Can simulate last two with first method by inserting appropriatecontrol characters

    Who decides: Operating system

    Program

  • 7/21/2019 ch10[1] upto 32 and 36

    6/42

    10.6 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File AttributesFile Attributes

    Name only information kept in human-readable form

    Identifier unique tag (number) identifies file within file system

    Type needed for systems that support different types

    Location pointer to file location on device

    Size current file size

    Protection controls who can do reading, writing, executing

    Time, date, and user identification data for protection, security,and usage monitoring

    Information about files are kept in the directory structure, which ismaintained on the disk

  • 7/21/2019 ch10[1] upto 32 and 36

    7/4210.7 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File OperationsFile Operations

    File is anabstract data type

    Create

    Write

    Read

    Reposition within file

    Delete

    Truncate

    Open(Fi) search the directory structure on disk for entryFi, and

    move the content of entry to memory

    Close (Fi) move the content of entryFiin memory to directorystructure on disk

  • 7/21/2019 ch10[1] upto 32 and 36

    8/4210.8 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Open FilesOpen Files

    Several pieces of data are needed to manage open files:

    File pointer: pointer to last read/write location, per process thathas the file open

    File-open count: counter of number of times a file is open toallow removal of data from open-file table when last processescloses it

    Disk location of the file: cache of data access information

    Access rights: per-process access mode information

  • 7/21/2019 ch10[1] upto 32 and 36

    9/4210.9 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Open File LockingOpen File Locking

    Provided by some operating systems and file systems

    Mediates access to a file

    Mandatory or advisory:

    Mandatory access is denied depending on locks held andrequested

    Advisory processes can find status of locks and decide whatto do

  • 7/21/2019 ch10[1] upto 32 and 36

    10/4210.10 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File Locking Example Java APIFile Locking Example Java API

    import java.io.*;

    import java.nio.channels.*;

    public class LockingExample{

    public static final boolean EXCLUSIVE = false;

    public static final boolean SHARED = true;

    public static void main(String arsg[]) throws IOException{

    FileLock sharedLock = null;

    FileLock exclusiveLock = null;try{

    RandomAccessFile raf = new RandomAccessFile("file.txt", "rw");

    // get the channel for the file

    FileChannel ch = raf.getChannel();

    // this locks the first half of the file - exclusive

    exclusiveLock = ch.lock(0, raf.length()/2, EXCLUSIVE);

    /** Now modify the data . . . */

    // release the lock

    exclusiveLock.release();

  • 7/21/2019 ch10[1] upto 32 and 36

    11/4210.11 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File Locking Example Java API (cont)File Locking Example Java API (cont)

    // this locks the second half of the file - shared

    sharedLock = ch.lock(raf.length()/2+1, raf.length(),SHARED);

    /** Now read the data . . . */

    // release the lock

    exclusiveLock.release();

    }catch (java.io.IOException ioe) {

    System.err.println(ioe);

    }finally {

    if (exclusiveLock != null)

    exclusiveLock.release();

    if (sharedLock != null)

    sharedLock.release();}

    }

    }

  • 7/21/2019 ch10[1] upto 32 and 36

    12/4210.12 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File Types Name, ExtensionFile Types Name, Extension

  • 7/21/2019 ch10[1] upto 32 and 36

    13/4210.13 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Access MethodsAccess Methods

    Sequential Access read next

    write next

    resetno read after last write

    (rewrite)

    Direct Accessreadnwritenposition ton

    read nextwrite next

    rewriten

    n= relative block number

  • 7/21/2019 ch10[1] upto 32 and 36

    14/4210.14 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Sequential-access FileSequential-access File

  • 7/21/2019 ch10[1] upto 32 and 36

    15/4210.15 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Simulation of Sequential Access on a Direct-access FileSimulation of Sequential Access on a Direct-access File

  • 7/21/2019 ch10[1] upto 32 and 36

    16/4210.16 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Example of Index and Relative FilesExample of Index and Relative Files

  • 7/21/2019 ch10[1] upto 32 and 36

    17/4210.17 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Directory StructureDirectory Structure

    A collection of nodes containing information about all files

    F 1 F 2F 3

    F 4

    F n

    Directory

    Files

    Both the directory structure and the files reside on diskBackups of these two structures are kept on tapes

  • 7/21/2019 ch10[1] upto 32 and 36

    18/4210.18 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    A Typical File-system OrganizationA Typical File-system Organization

  • 7/21/2019 ch10[1] upto 32 and 36

    19/4210.19 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Operations Performed on DirectoryOperations Performed on Directory

    Search for a file

    Create a file

    Delete a file

    List a directory

    Rename a file

    Traverse the file system

  • 7/21/2019 ch10[1] upto 32 and 36

    20/4210.20 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Organize the Directory (Logically) to ObtainOrganize the Directory (Logically) to Obtain

    Efficiency locating a file quickly Naming convenient to users

    Two users can have same name for different files

    The same file can have several different names

    Grouping logical grouping of files by properties, (e.g., all

    Java programs, all games, )

  • 7/21/2019 ch10[1] upto 32 and 36

    21/4210.21 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Single-Level DirectorySingle-Level Directory

    A single directory for all users

    Naming problem

    Grouping problem

  • 7/21/2019 ch10[1] upto 32 and 36

    22/4210.22 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Two-Level DirectoryTwo-Level Directory

    Separate directory for each user

    Path name Can have the same file name for different user

    Efficient searching

    No grouping capability

  • 7/21/2019 ch10[1] upto 32 and 36

    23/4210.23 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Tree-Structured DirectoriesTree-Structured Directories

  • 7/21/2019 ch10[1] upto 32 and 36

    24/42

    10.24 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Tree-Structured Directories (Cont)Tree-Structured Directories (Cont)

    Efficient searching

    Grouping Capability

    Current directory (working directory)

    cd /spell/mail/prog

    type list

  • 7/21/2019 ch10[1] upto 32 and 36

    25/42

    10.25 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Tree-Structured Directories (Cont)Tree-Structured Directories (Cont)

    Absoluteorrelativepath name

    Creating a new file is done in current directory

    Delete a file

    rm

    Creating a new subdirectory is done in current directory

    mkdir Example: if in current directory/mail

    mkdir count

    mail

    prog copy prtexpcount

    Deleting maildeleting the entire subtree rooted by mail

  • 7/21/2019 ch10[1] upto 32 and 36

    26/42

    10.26 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Acyclic-Graph DirectoriesAcyclic-Graph Directories

    Have shared subdirectories and files

  • 7/21/2019 ch10[1] upto 32 and 36

    27/42

    10.27 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Acyclic-Graph Directories (Cont.)Acyclic-Graph Directories (Cont.)

    Two different names (aliasing)

    Ifdictdeleteslistdangling pointer

    Solutions:

    Backpointers, so we can delete all pointersVariable size records a problem

    Backpointers using a daisy chain organization

    Entry-hold-count solution

    New directory entry type

    Link another name (pointer) to an existing file

    Resolve the link follow pointer to locate the file

  • 7/21/2019 ch10[1] upto 32 and 36

    28/42

    10.28 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    General Graph DirectoryGeneral Graph Directory

  • 7/21/2019 ch10[1] upto 32 and 36

    29/42

    10.29 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    General Graph Directory (Cont.)General Graph Directory (Cont.)

    How do we guarantee no cycles?

    Allow only links to file not subdirectories

    Garbage collection

    Every time a new link is added use a cycle detectionalgorithm to determine whether it is OK

  • 7/21/2019 ch10[1] upto 32 and 36

    30/42

    10.30 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File System MountingFile System Mounting

    A file system must bemountedbefore it can be

    accessed

    A unmounted file system (i.e. Fig. 11-11(b)) is mountedat amount point

  • 7/21/2019 ch10[1] upto 32 and 36

    31/42

    10.31 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    (a) Existing. (b) Unmounted Partition(a) Existing. (b) Unmounted Partition

  • 7/21/2019 ch10[1] upto 32 and 36

    32/42

    10.32 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Mount PointMount Point

  • 7/21/2019 ch10[1] upto 32 and 36

    33/42

    10.33 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File SharingFile Sharing

    Sharing of files on multi-user systems is desirable

    Sharing may be done through aprotectionscheme

    On distributed systems, files may be shared across a network

    Network File System (NFS) is a common distributed file-sharingmethod

  • 7/21/2019 ch10[1] upto 32 and 36

    34/42

    10.34 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File Sharing Multiple UsersFile Sharing Multiple Users

    User IDsidentify users, allowing permissions and

    protections to be per-user

    Group IDsallow users to be in groups, permitting groupaccess rights

  • 7/21/2019 ch10[1] upto 32 and 36

    35/42

    10.35 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File Sharing Remote File SystemsFile Sharing Remote File Systems

    Uses networking to allow file system access between systems

    Manually via programs like FTP

    Automatically, seamlessly usingdistributed file systems

    Semi automatically via theworld wide web

    Client-servermodel allows clients to mount remote file systems fromservers

    Server can serve multiple clients

    Client and user-on-client identification is insecure orcomplicated

    NFSis standard UNIX client-server file sharing protocol

    CIFSis standard Windows protocol

    Standard operating system file calls are translated into remotecalls

    Distributed Information Systems(distributed naming services)suchas LDAP, DNS, NIS, Active Directory implement unified access toinformation needed for remote computing

  • 7/21/2019 ch10[1] upto 32 and 36

    36/42

    10.36 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File Sharing Failure ModesFile Sharing Failure Modes

    Remote file systems add new failure modes, due to network

    failure, server failure

    Recovery from failure can involve state information aboutstatus of each remote request

    Stateless protocols such as NFS include all information ineach request, allowing easy recovery but less security

  • 7/21/2019 ch10[1] upto 32 and 36

    37/42

    10.37 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    File Sharing Consistency SemanticsFile Sharing Consistency Semantics

    Consistency semanticsspecify how multiple users are to access

    a shared file simultaneously Similar to Ch 7 process synchronization algorithms

    Tend to be less complex due to disk I/O and network latency(for remote file systems

    Andrew File System (AFS) implemented complex remote file

    sharing semantics Unix file system (UFS) implements:

    Writes to an open file visible immediately to other users ofthe same open file

    Sharing file pointer to allow multiple users to read and write

    concurrently AFS has session semantics

    Writes only visible to sessions starting after the file is closed

  • 7/21/2019 ch10[1] upto 32 and 36

    38/42

    10.38 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    ProtectionProtection

    File owner/creator should be able to control:

    what can be done

    by whom

    Types of access

    Read Write

    Execute

    Append

    Delete

    List

  • 7/21/2019 ch10[1] upto 32 and 36

    39/42

    10.39 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Access Lists and GroupsAccess Lists and Groups

    Mode of access: read, write, execute

    Three classes of usersRWX

    a)owner access 7 1 1 1RWX

    b)group access 6 1 1 0RWX

    c)public access 1

    0 0 1 Ask manager to create a group (unique name), say G, and addsome users to the group.

    For a particular file (saygame) or subdirectory, define anappropriate access.

    owner group public

    chmod 761 game

    Attach a group to a file

    chgrp G game

    WindowsXPAccess-controlListManagementWindowsXPAccess-controlListManagement

  • 7/21/2019 ch10[1] upto 32 and 36

    40/42

    10.40 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    Windows XP Access-control List ManagementWindows XP Access-control List Management

  • 7/21/2019 ch10[1] upto 32 and 36

    41/42

    10.41 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005

    A Sample UNIX Directory ListingA Sample UNIX Directory Listing

  • 7/21/2019 ch10[1] upto 32 and 36

    42/42

    End of Chapter 10End of Chapter 10