SlideShare a Scribd company logo
1 of 6
Name Syed Abdul Hafeez Shah
Roll # Mcf2000659
Assignment SNAW
Question# 1:
How ReFS is different from other File system and how it is organized in B+ -tree
format?
Answer:
File System:
A file system is a process of managing how and where data on a storage disk, which is
also referred to as file management or FS. It is a logical disk component that compresses files
separated into groups, which is known as directories. It is abstract to a human user and related to
a computer; hence, it manages a disk's internal operations. Files and additional directories can be
in the directories. Although there are various file systems with Windows, NTFS is the most
common in modern times. It would be impossible for a file with the same name to exist and also
impossible to remove installed programs and recover specific files without file management, as
well as files would have no organization without a file structure. The file system enables you to
view a file in the current directory as files are often managed in a hierarchy.
ReFS:
ReFS is derived from Resilient File System, is a file system created by Microsoft for
Windows OS. It is designed to overcome some of the limitations of the New Technology File
System (NTFS). ReFS is designed to be more resilient against data corruption, perform better for
certain workloads, and scale better for very large file systems.
ReFS is different from FS:
In addition to the functionality related to a data integrity maintainance on media,
ReFS has the following main differences from the NTFS:
1. Usually higher performance, especially when using it with virtual machines.
2. The theoretical volume size is 262144 exabytes (vs 16 for NTFS!).
3. The absence of a file path limit of 255 characters (32768 characters in ReFS).
4. "DOS file names" are not supported in ReFS (i.e., accessing the C:Program Files
folder on the C:progra~ 1 path will fail).
5. In NTFS, this feature was retained for compatibility with older software.
6. ReFS does not support compression, additional attributes and file system encryption
opposite to NTFS.
7. For ReFS the Bitlocker encryption is used.
8. ReFS is notable for its use of checksums for both metadata
and file data. Another notable feature of ReFS is the “copy-on-write” function.
ReFS is organized in B+ -tree format:
ReFS uses a B+ tree structure to manage data through metadata indexing. The tree
consists of the root, internal nodes and leaves. A B+ tree stores data in a branching pattern,
where each node in the tree has an ordered list of keys and pointers to lower-level nodes, or
leaves. Records are stored at the leaf level, which allows for more branches. This process lowers
disk I/O and provides better performance.
Question # 2:
How to apply permissions on nested folder and files?
Answer:
Follow these steps to apply permissions to the nestedfolder:
1. Open the properties dialog box for the top-level folder you want to adjust and click the
Security tab.
2. In the Select Users or Groups dialog box, enter Administrators and click OK.
3. Choose Administrators from the Group or User Names List at the top of the properties
dialog box, and then select the Allow box to the right of the Full Control entry in the
Permissions list. Click Add again.
4. This time, enter everyone in the Select Users or Groups dialog box and click OK.
5. Choose everyone from the Group or User Names List, and then select the Allow box to
the right of the Read & Execute entry in the Permissions list.
6. Click the Advanced button to open the Advanced Security Settings dialog box.
7. If necessary, clear the Inherit from Parent the Permission Entries That Apply to Child
Objects check box (and then select Copy when the security warning appears).
8. In the Select User Or Group dialog box, allow full control and click OK
9. In the Permission Entry dialog box, check the Full Control box, choose Subfolders only
from the Apply Onto list, and then click OK.

More Related Content

Similar to SNAW-Assignment.docx

File system security
File system securityFile system security
File system securityAmmAr mobark
 
Resilient file system
Resilient file systemResilient file system
Resilient file systemAyush Gupta
 
Microsoft Windows File System in Operating System
Microsoft Windows File System in Operating SystemMicrosoft Windows File System in Operating System
Microsoft Windows File System in Operating SystemMeghaj Mallick
 
The Storage Systems
The Storage Systems The Storage Systems
The Storage Systems Dhaivat Zala
 
Operating Systems - Implementing File Systems
Operating Systems - Implementing File SystemsOperating Systems - Implementing File Systems
Operating Systems - Implementing File SystemsMukesh Chinta
 
Linux File System.docx
Linux File System.docxLinux File System.docx
Linux File System.docxBhuvanaR13
 
UserGuideHDFS_FinalDocument
UserGuideHDFS_FinalDocumentUserGuideHDFS_FinalDocument
UserGuideHDFS_FinalDocumentAnna Ellis
 
Cloud File System with GFS and HDFS
Cloud File System with GFS and HDFS  Cloud File System with GFS and HDFS
Cloud File System with GFS and HDFS Dr Neelesh Jain
 
Learn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptLearn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptgeethasenthil2706
 
File system Os
File system OsFile system Os
File system OsNehal Naik
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGene Carboni
 

Similar to SNAW-Assignment.docx (20)

File system security
File system securityFile system security
File system security
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
file management
 file management file management
file management
 
Resilient file system
Resilient file systemResilient file system
Resilient file system
 
Microsoft Windows File System in Operating System
Microsoft Windows File System in Operating SystemMicrosoft Windows File System in Operating System
Microsoft Windows File System in Operating System
 
The Storage Systems
The Storage Systems The Storage Systems
The Storage Systems
 
06 File System
06 File System06 File System
06 File System
 
Operating Systems - Implementing File Systems
Operating Systems - Implementing File SystemsOperating Systems - Implementing File Systems
Operating Systems - Implementing File Systems
 
Linux File System.docx
Linux File System.docxLinux File System.docx
Linux File System.docx
 
UserGuideHDFS_FinalDocument
UserGuideHDFS_FinalDocumentUserGuideHDFS_FinalDocument
UserGuideHDFS_FinalDocument
 
File and fat
File and fatFile and fat
File and fat
 
Linux
LinuxLinux
Linux
 
Cloud File System with GFS and HDFS
Cloud File System with GFS and HDFS  Cloud File System with GFS and HDFS
Cloud File System with GFS and HDFS
 
Learn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptLearn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems ppt
 
File and fat 2
File and fat 2File and fat 2
File and fat 2
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
File system Os
File system OsFile system Os
File system Os
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

SNAW-Assignment.docx

  • 1. Name Syed Abdul Hafeez Shah Roll # Mcf2000659 Assignment SNAW Question# 1: How ReFS is different from other File system and how it is organized in B+ -tree format? Answer: File System: A file system is a process of managing how and where data on a storage disk, which is also referred to as file management or FS. It is a logical disk component that compresses files separated into groups, which is known as directories. It is abstract to a human user and related to a computer; hence, it manages a disk's internal operations. Files and additional directories can be in the directories. Although there are various file systems with Windows, NTFS is the most common in modern times. It would be impossible for a file with the same name to exist and also impossible to remove installed programs and recover specific files without file management, as well as files would have no organization without a file structure. The file system enables you to view a file in the current directory as files are often managed in a hierarchy.
  • 2. ReFS: ReFS is derived from Resilient File System, is a file system created by Microsoft for Windows OS. It is designed to overcome some of the limitations of the New Technology File System (NTFS). ReFS is designed to be more resilient against data corruption, perform better for certain workloads, and scale better for very large file systems. ReFS is different from FS: In addition to the functionality related to a data integrity maintainance on media, ReFS has the following main differences from the NTFS: 1. Usually higher performance, especially when using it with virtual machines.
  • 3. 2. The theoretical volume size is 262144 exabytes (vs 16 for NTFS!). 3. The absence of a file path limit of 255 characters (32768 characters in ReFS). 4. "DOS file names" are not supported in ReFS (i.e., accessing the C:Program Files folder on the C:progra~ 1 path will fail). 5. In NTFS, this feature was retained for compatibility with older software. 6. ReFS does not support compression, additional attributes and file system encryption opposite to NTFS. 7. For ReFS the Bitlocker encryption is used. 8. ReFS is notable for its use of checksums for both metadata and file data. Another notable feature of ReFS is the “copy-on-write” function. ReFS is organized in B+ -tree format: ReFS uses a B+ tree structure to manage data through metadata indexing. The tree consists of the root, internal nodes and leaves. A B+ tree stores data in a branching pattern, where each node in the tree has an ordered list of keys and pointers to lower-level nodes, or leaves. Records are stored at the leaf level, which allows for more branches. This process lowers disk I/O and provides better performance.
  • 4. Question # 2: How to apply permissions on nested folder and files? Answer: Follow these steps to apply permissions to the nestedfolder: 1. Open the properties dialog box for the top-level folder you want to adjust and click the Security tab. 2. In the Select Users or Groups dialog box, enter Administrators and click OK. 3. Choose Administrators from the Group or User Names List at the top of the properties dialog box, and then select the Allow box to the right of the Full Control entry in the Permissions list. Click Add again. 4. This time, enter everyone in the Select Users or Groups dialog box and click OK. 5. Choose everyone from the Group or User Names List, and then select the Allow box to the right of the Read & Execute entry in the Permissions list.
  • 5. 6. Click the Advanced button to open the Advanced Security Settings dialog box.
  • 6. 7. If necessary, clear the Inherit from Parent the Permission Entries That Apply to Child Objects check box (and then select Copy when the security warning appears). 8. In the Select User Or Group dialog box, allow full control and click OK 9. In the Permission Entry dialog box, check the Full Control box, choose Subfolders only from the Apply Onto list, and then click OK.