ch10[1] upto 32 and 36
TRANSCRIPT
-
7/21/2019 ch10[1] upto 32 and 36
1/42
Chapter 10: File-System InterfaceChapter 10: File-System Interface
-
7/21/2019 ch10[1] upto 32 and 36
2/42
10.2 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Chapter 10: File-System InterfaceChapter 10: File-System Interface
File Concept
Access Methods
Directory Structure
File-System Mounting
File Sharing
Protection
-
7/21/2019 ch10[1] upto 32 and 36
3/42
10.3 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
ObjectivesObjectives
To explain the function of file systems
To describe the interfaces to file systems
To discuss file-system design tradeoffs, including access methods,file sharing, file locking, and directory structures
To explore file-system protection
-
7/21/2019 ch10[1] upto 32 and 36
4/42
10.4 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File ConceptFile Concept
Contiguous logical address space
Types:
Data
numeric
characterbinary
Program
-
7/21/2019 ch10[1] upto 32 and 36
5/42
10.5 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File StructureFile Structure
None - sequence of words, bytes
Simple record structure
Lines
Fixed length
Variable length
Complex Structures Formatted document
Relocatable load file
Can simulate last two with first method by inserting appropriatecontrol characters
Who decides: Operating system
Program
-
7/21/2019 ch10[1] upto 32 and 36
6/42
10.6 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File AttributesFile Attributes
Name only information kept in human-readable form
Identifier unique tag (number) identifies file within file system
Type needed for systems that support different types
Location pointer to file location on device
Size current file size
Protection controls who can do reading, writing, executing
Time, date, and user identification data for protection, security,and usage monitoring
Information about files are kept in the directory structure, which ismaintained on the disk
-
7/21/2019 ch10[1] upto 32 and 36
7/4210.7 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File OperationsFile Operations
File is anabstract data type
Create
Write
Read
Reposition within file
Delete
Truncate
Open(Fi) search the directory structure on disk for entryFi, and
move the content of entry to memory
Close (Fi) move the content of entryFiin memory to directorystructure on disk
-
7/21/2019 ch10[1] upto 32 and 36
8/4210.8 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Open FilesOpen Files
Several pieces of data are needed to manage open files:
File pointer: pointer to last read/write location, per process thathas the file open
File-open count: counter of number of times a file is open toallow removal of data from open-file table when last processescloses it
Disk location of the file: cache of data access information
Access rights: per-process access mode information
-
7/21/2019 ch10[1] upto 32 and 36
9/4210.9 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Open File LockingOpen File Locking
Provided by some operating systems and file systems
Mediates access to a file
Mandatory or advisory:
Mandatory access is denied depending on locks held andrequested
Advisory processes can find status of locks and decide whatto do
-
7/21/2019 ch10[1] upto 32 and 36
10/4210.10 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File Locking Example Java APIFile Locking Example Java API
import java.io.*;
import java.nio.channels.*;
public class LockingExample{
public static final boolean EXCLUSIVE = false;
public static final boolean SHARED = true;
public static void main(String arsg[]) throws IOException{
FileLock sharedLock = null;
FileLock exclusiveLock = null;try{
RandomAccessFile raf = new RandomAccessFile("file.txt", "rw");
// get the channel for the file
FileChannel ch = raf.getChannel();
// this locks the first half of the file - exclusive
exclusiveLock = ch.lock(0, raf.length()/2, EXCLUSIVE);
/** Now modify the data . . . */
// release the lock
exclusiveLock.release();
-
7/21/2019 ch10[1] upto 32 and 36
11/4210.11 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File Locking Example Java API (cont)File Locking Example Java API (cont)
// this locks the second half of the file - shared
sharedLock = ch.lock(raf.length()/2+1, raf.length(),SHARED);
/** Now read the data . . . */
// release the lock
exclusiveLock.release();
}catch (java.io.IOException ioe) {
System.err.println(ioe);
}finally {
if (exclusiveLock != null)
exclusiveLock.release();
if (sharedLock != null)
sharedLock.release();}
}
}
-
7/21/2019 ch10[1] upto 32 and 36
12/4210.12 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File Types Name, ExtensionFile Types Name, Extension
-
7/21/2019 ch10[1] upto 32 and 36
13/4210.13 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Access MethodsAccess Methods
Sequential Access read next
write next
resetno read after last write
(rewrite)
Direct Accessreadnwritenposition ton
read nextwrite next
rewriten
n= relative block number
-
7/21/2019 ch10[1] upto 32 and 36
14/4210.14 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Sequential-access FileSequential-access File
-
7/21/2019 ch10[1] upto 32 and 36
15/4210.15 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Simulation of Sequential Access on a Direct-access FileSimulation of Sequential Access on a Direct-access File
-
7/21/2019 ch10[1] upto 32 and 36
16/4210.16 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Example of Index and Relative FilesExample of Index and Relative Files
-
7/21/2019 ch10[1] upto 32 and 36
17/4210.17 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Directory StructureDirectory Structure
A collection of nodes containing information about all files
F 1 F 2F 3
F 4
F n
Directory
Files
Both the directory structure and the files reside on diskBackups of these two structures are kept on tapes
-
7/21/2019 ch10[1] upto 32 and 36
18/4210.18 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
A Typical File-system OrganizationA Typical File-system Organization
-
7/21/2019 ch10[1] upto 32 and 36
19/4210.19 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Operations Performed on DirectoryOperations Performed on Directory
Search for a file
Create a file
Delete a file
List a directory
Rename a file
Traverse the file system
-
7/21/2019 ch10[1] upto 32 and 36
20/4210.20 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Organize the Directory (Logically) to ObtainOrganize the Directory (Logically) to Obtain
Efficiency locating a file quickly Naming convenient to users
Two users can have same name for different files
The same file can have several different names
Grouping logical grouping of files by properties, (e.g., all
Java programs, all games, )
-
7/21/2019 ch10[1] upto 32 and 36
21/4210.21 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Single-Level DirectorySingle-Level Directory
A single directory for all users
Naming problem
Grouping problem
-
7/21/2019 ch10[1] upto 32 and 36
22/4210.22 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Two-Level DirectoryTwo-Level Directory
Separate directory for each user
Path name Can have the same file name for different user
Efficient searching
No grouping capability
-
7/21/2019 ch10[1] upto 32 and 36
23/4210.23 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Tree-Structured DirectoriesTree-Structured Directories
-
7/21/2019 ch10[1] upto 32 and 36
24/42
10.24 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Tree-Structured Directories (Cont)Tree-Structured Directories (Cont)
Efficient searching
Grouping Capability
Current directory (working directory)
cd /spell/mail/prog
type list
-
7/21/2019 ch10[1] upto 32 and 36
25/42
10.25 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Tree-Structured Directories (Cont)Tree-Structured Directories (Cont)
Absoluteorrelativepath name
Creating a new file is done in current directory
Delete a file
rm
Creating a new subdirectory is done in current directory
mkdir Example: if in current directory/mail
mkdir count
mail
prog copy prtexpcount
Deleting maildeleting the entire subtree rooted by mail
-
7/21/2019 ch10[1] upto 32 and 36
26/42
10.26 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Acyclic-Graph DirectoriesAcyclic-Graph Directories
Have shared subdirectories and files
-
7/21/2019 ch10[1] upto 32 and 36
27/42
10.27 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Acyclic-Graph Directories (Cont.)Acyclic-Graph Directories (Cont.)
Two different names (aliasing)
Ifdictdeleteslistdangling pointer
Solutions:
Backpointers, so we can delete all pointersVariable size records a problem
Backpointers using a daisy chain organization
Entry-hold-count solution
New directory entry type
Link another name (pointer) to an existing file
Resolve the link follow pointer to locate the file
-
7/21/2019 ch10[1] upto 32 and 36
28/42
10.28 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
General Graph DirectoryGeneral Graph Directory
-
7/21/2019 ch10[1] upto 32 and 36
29/42
10.29 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
General Graph Directory (Cont.)General Graph Directory (Cont.)
How do we guarantee no cycles?
Allow only links to file not subdirectories
Garbage collection
Every time a new link is added use a cycle detectionalgorithm to determine whether it is OK
-
7/21/2019 ch10[1] upto 32 and 36
30/42
10.30 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File System MountingFile System Mounting
A file system must bemountedbefore it can be
accessed
A unmounted file system (i.e. Fig. 11-11(b)) is mountedat amount point
-
7/21/2019 ch10[1] upto 32 and 36
31/42
10.31 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
(a) Existing. (b) Unmounted Partition(a) Existing. (b) Unmounted Partition
-
7/21/2019 ch10[1] upto 32 and 36
32/42
10.32 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Mount PointMount Point
-
7/21/2019 ch10[1] upto 32 and 36
33/42
10.33 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File SharingFile Sharing
Sharing of files on multi-user systems is desirable
Sharing may be done through aprotectionscheme
On distributed systems, files may be shared across a network
Network File System (NFS) is a common distributed file-sharingmethod
-
7/21/2019 ch10[1] upto 32 and 36
34/42
10.34 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File Sharing Multiple UsersFile Sharing Multiple Users
User IDsidentify users, allowing permissions and
protections to be per-user
Group IDsallow users to be in groups, permitting groupaccess rights
-
7/21/2019 ch10[1] upto 32 and 36
35/42
10.35 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File Sharing Remote File SystemsFile Sharing Remote File Systems
Uses networking to allow file system access between systems
Manually via programs like FTP
Automatically, seamlessly usingdistributed file systems
Semi automatically via theworld wide web
Client-servermodel allows clients to mount remote file systems fromservers
Server can serve multiple clients
Client and user-on-client identification is insecure orcomplicated
NFSis standard UNIX client-server file sharing protocol
CIFSis standard Windows protocol
Standard operating system file calls are translated into remotecalls
Distributed Information Systems(distributed naming services)suchas LDAP, DNS, NIS, Active Directory implement unified access toinformation needed for remote computing
-
7/21/2019 ch10[1] upto 32 and 36
36/42
10.36 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File Sharing Failure ModesFile Sharing Failure Modes
Remote file systems add new failure modes, due to network
failure, server failure
Recovery from failure can involve state information aboutstatus of each remote request
Stateless protocols such as NFS include all information ineach request, allowing easy recovery but less security
-
7/21/2019 ch10[1] upto 32 and 36
37/42
10.37 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
File Sharing Consistency SemanticsFile Sharing Consistency Semantics
Consistency semanticsspecify how multiple users are to access
a shared file simultaneously Similar to Ch 7 process synchronization algorithms
Tend to be less complex due to disk I/O and network latency(for remote file systems
Andrew File System (AFS) implemented complex remote file
sharing semantics Unix file system (UFS) implements:
Writes to an open file visible immediately to other users ofthe same open file
Sharing file pointer to allow multiple users to read and write
concurrently AFS has session semantics
Writes only visible to sessions starting after the file is closed
-
7/21/2019 ch10[1] upto 32 and 36
38/42
10.38 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
ProtectionProtection
File owner/creator should be able to control:
what can be done
by whom
Types of access
Read Write
Execute
Append
Delete
List
-
7/21/2019 ch10[1] upto 32 and 36
39/42
10.39 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Access Lists and GroupsAccess Lists and Groups
Mode of access: read, write, execute
Three classes of usersRWX
a)owner access 7 1 1 1RWX
b)group access 6 1 1 0RWX
c)public access 1
0 0 1 Ask manager to create a group (unique name), say G, and addsome users to the group.
For a particular file (saygame) or subdirectory, define anappropriate access.
owner group public
chmod 761 game
Attach a group to a file
chgrp G game
WindowsXPAccess-controlListManagementWindowsXPAccess-controlListManagement
-
7/21/2019 ch10[1] upto 32 and 36
40/42
10.40 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
Windows XP Access-control List ManagementWindows XP Access-control List Management
-
7/21/2019 ch10[1] upto 32 and 36
41/42
10.41 Silberschatz, Galvin and Gagne 2005Operating System Concepts 7thEdition, Jan 1, 2005
A Sample UNIX Directory ListingA Sample UNIX Directory Listing
-
7/21/2019 ch10[1] upto 32 and 36
42/42
End of Chapter 10End of Chapter 10