SlideShare a Scribd company logo
1 of 28
JAYA
Introduction
 All computer applications need to store and retrieve
information.
 Things to be consider
 Store a very large amount of information.
 Information must survive after the termination of
process.
 Multiple processes must be able to access the
information concurrently.
solution
 Need to store the information on disks and other
external media in units called files.
 Process can read and write whenever needed.
 Information stored in units is persistent.
 information disappear when its owner explicitly
removes it.
File
 It is a uniform logical storage unit.
 Its a abstract mechanism.
 Named collection of related information, which is
stored on secondary storage.
 Managed by operating system.
File Naming
 It provides a way to store and retrieve the information
later.
 Used to shield the user from details of information
storage and disk working.
 Rules for file naming
 String of 1 to 8 letters
 Digits and special characters
 Some allow string from 1 to 255 characters
 Case sensitivity
 Extensions
File Naming
 Rules for UNIX Operating System
 Allows string from 1 to 255 characters
 Name String is case sensitive
 Varying size Extensions to separate file names
 Example
PROGRAM1, Program1, program1
program1.java.bz2 , program1.c
File Naming
 Rules for MS-DOS Operating System and Windows
 Allows string from 1 to 255 characters
 Name String is non -case sensitive
 1 to 3 character Extensions to separate file names
 Example
PROGRAM1, Program1, program1 {same}
program1.java
File Extensions
Extensions Meaning
File.bak Backup File
File.c C source program
File.gif Graphical Interchange Format Image
File.html Web document
File.iso ISO image of a CD-ROM
File.jpg Joint Photographic Expert Group encoded still pictures
File.mp3 Music encoded in MPEG layer3
File.mpg Movie encoded with MPEG standard
File.o Object file
File.pdf Portable Document Format File
File.txt General Text File
File.zip Compressed File
File Structure
 Ways of File Structure
 Unstructured Sequence of Bytes
 Collection of bytes
 Operating System does not know or care what is in the
File
 Handled by user
 Used in UNIX and WIN 98
 Advantages:
 Provides maximum flexibility.
 User can save anything in it.
 Disadvantage:
 No simultaneous read and write operation .
File Structure
 Unstructured Sequence of Bytes
1 Byte
File
File Structure
 Ways of File Structure
 Sequence of Fixed length Records
 Collection of fixed length records.
 Used in older systems.
 Advantages:
 Read and write operation on different record done
simultaneously.
 Disadvantage:
 Sequential search so time consuming
File Structure
 Sequence of Fixed length Records
Record
File
File Structure
 Ways of File Structure
 Tree Structure
 File consists of a tree of records with varying size.
 Each record contains a key Field.
 Tree is sorted based on key fields.
 Used in large mainframe systems
 Advantages:
 Less time to search a record.
File Structure
 Tree Structure
Ant Fox Pig
Cat Cow Dog Goat Lion Owl Pony Rat Worm
Hen Horse Lamb
File Structure
 Four Terms
 Fields
 Records
 Files
 Database
File Structure
 Four Terms
 Fields
 Basic elements of data
 Has 3 sub fields
 Example emp_name
 Records
 Collection of related fields.
 Has sub fields like name and length
 Example emp_record
File Structure
 Four Terms
 File
 Collection of similar records.
 Treated as a single entity by user.
 Has sub fields like name, creation date ,length.
 Example : payroll system.
 Database
 Collection of related data ( one or more files).
 Has sub fields like name and length
 Example: organizations data or project
File Types
 Operating system supports several types of files
 Regular File
 Character special File
 Block Special File
 Metadata File
 Directories
File Types
 Regular Files: Two types
 ASCII Files
 Consists lines of text
 Uses carriage return or line feed character
 Display or print as it is
 Edited by any editor
 Easy to link
 Binary Files
 Consists of bytes
 Difficult to link
File Types
 UNIX executable binary file
Magic Number
Text Size
Data Size
BSS Size
Symbol Table Size
Entry Point
Flag
text
Data
Relocation Bit
Symbol Table
Header
File Type
 Unix Binary archive File
Header
Object module
Header
Object module
Header
Object module
Header
Object module
Module name
Date
Owner
Protection
Size
File Attribute
 Every file has a name and additional information
 List of Attributes
 Name
 Protection
 password
 Identifier
 Type
 Location
 Creator
 owner
 Size
 Time and Date of creation
 Hidden flag
 Read-only flag
 Binary or ASCII file
 Lock flag
 System flag
File Access Methods
 Types of File Access Methods
 Sequential Access Method
 Random or Direct Access Method
 Other Access Methods
File Access Methods
 Sequential access method
 Simple access method.
 Information of the file is processed in order.
 Supports following operations
 read_next()
 write_next()
 rewind()
 Skip(n) records Current position
 Rewind read/write 
start end
File Access Methods
 Random or Direct access method
 It is based on disk model.
 Allows random access.
 File is viewed as a numbered sequence of records.
 Used to access large amount of data.
 Supports following operations
 read(n)
 write(n)
 jump to record n
 Query current record
File Access Methods
 Other Access method(Indexed)
 Build on top of direct access method
 To search the record
 Search index for file pointer
 Search file in directory
 Search a required record
Key Field Pointer
radha ----
raj -----
Radha Social-security age --
Index Relative File
File Operations
 Operations required to define a file properly.
 Operations are nothing but OS system calls.
 List of operations
 Creating a file
 Writing a file
 Reading a file
 Append a file
 Seek operation / repositioning within a file
 Deleting a file
 Get attribute
 Set attribute
 Rename
 Truncating a File
File System Implementation
 Why to use disk
 Deals with
 How the files and directories are stored
 How they are managed
 How it work efficiently
 File system layout
MBR pt partition1 partition2 partition3 -----
Entire disk space
Boot
block
Super
block
Free space
mgmt
I-nodes Root dir Files &
directory
Unix file system

More Related Content

Similar to Understanding File Systems and Their Components

Similar to Understanding File Systems and Their Components (20)

File concept and access method
File concept and access methodFile concept and access method
File concept and access method
 
file management_osnotes.ppt
file management_osnotes.pptfile management_osnotes.ppt
file management_osnotes.ppt
 
Files
FilesFiles
Files
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file management
 
OSCh11
OSCh11OSCh11
OSCh11
 
OS_Ch11
OS_Ch11OS_Ch11
OS_Ch11
 
Ch11 OS
Ch11 OSCh11 OS
Ch11 OS
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 
Degonto, File management system in fisheries science
Degonto, File management  system in fisheries scienceDegonto, File management  system in fisheries science
Degonto, File management system in fisheries science
 
File management
File managementFile management
File management
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
Ch12-OS9e-modified (1).pptx
Ch12-OS9e-modified (1).pptxCh12-OS9e-modified (1).pptx
Ch12-OS9e-modified (1).pptx
 
File Systems
File SystemsFile Systems
File Systems
 
FILE SYSTEMS IN WINDOWS OPERATING SYSTEMS
FILE SYSTEMS IN WINDOWS OPERATING SYSTEMSFILE SYSTEMS IN WINDOWS OPERATING SYSTEMS
FILE SYSTEMS IN WINDOWS OPERATING SYSTEMS
 
Unit ivos - file systems
Unit ivos - file systemsUnit ivos - file systems
Unit ivos - file systems
 
CH11.pdf
CH11.pdfCH11.pdf
CH11.pdf
 
File system
File systemFile system
File system
 
Switching & Multiplexing
Switching & MultiplexingSwitching & Multiplexing
Switching & Multiplexing
 
File
FileFile
File
 

More from jayashri kolekar

More from jayashri kolekar (13)

Architectural modeling chapter 5 of omd
Architectural modeling chapter 5 of omdArchitectural modeling chapter 5 of omd
Architectural modeling chapter 5 of omd
 
Advanced behavioral modeling chapter 4 of omd
Advanced behavioral modeling chapter 4 of omdAdvanced behavioral modeling chapter 4 of omd
Advanced behavioral modeling chapter 4 of omd
 
Basic behavioral modeling chapter 3 of OMD
Basic behavioral modeling chapter 3 of OMDBasic behavioral modeling chapter 3 of OMD
Basic behavioral modeling chapter 3 of OMD
 
Object oriented modeling and design
Object oriented modeling and designObject oriented modeling and design
Object oriented modeling and design
 
OMD chapter 2 Class modelling
 OMD  chapter 2 Class modelling OMD  chapter 2 Class modelling
OMD chapter 2 Class modelling
 
Macro
MacroMacro
Macro
 
Parsing
ParsingParsing
Parsing
 
Loader
LoaderLoader
Loader
 
Assembler1
Assembler1Assembler1
Assembler1
 
Cryptography
CryptographyCryptography
Cryptography
 
System programming
System programmingSystem programming
System programming
 
Compilers
CompilersCompilers
Compilers
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 

Understanding File Systems and Their Components

  • 2. Introduction  All computer applications need to store and retrieve information.  Things to be consider  Store a very large amount of information.  Information must survive after the termination of process.  Multiple processes must be able to access the information concurrently.
  • 3. solution  Need to store the information on disks and other external media in units called files.  Process can read and write whenever needed.  Information stored in units is persistent.  information disappear when its owner explicitly removes it.
  • 4. File  It is a uniform logical storage unit.  Its a abstract mechanism.  Named collection of related information, which is stored on secondary storage.  Managed by operating system.
  • 5. File Naming  It provides a way to store and retrieve the information later.  Used to shield the user from details of information storage and disk working.  Rules for file naming  String of 1 to 8 letters  Digits and special characters  Some allow string from 1 to 255 characters  Case sensitivity  Extensions
  • 6. File Naming  Rules for UNIX Operating System  Allows string from 1 to 255 characters  Name String is case sensitive  Varying size Extensions to separate file names  Example PROGRAM1, Program1, program1 program1.java.bz2 , program1.c
  • 7. File Naming  Rules for MS-DOS Operating System and Windows  Allows string from 1 to 255 characters  Name String is non -case sensitive  1 to 3 character Extensions to separate file names  Example PROGRAM1, Program1, program1 {same} program1.java
  • 8. File Extensions Extensions Meaning File.bak Backup File File.c C source program File.gif Graphical Interchange Format Image File.html Web document File.iso ISO image of a CD-ROM File.jpg Joint Photographic Expert Group encoded still pictures File.mp3 Music encoded in MPEG layer3 File.mpg Movie encoded with MPEG standard File.o Object file File.pdf Portable Document Format File File.txt General Text File File.zip Compressed File
  • 9. File Structure  Ways of File Structure  Unstructured Sequence of Bytes  Collection of bytes  Operating System does not know or care what is in the File  Handled by user  Used in UNIX and WIN 98  Advantages:  Provides maximum flexibility.  User can save anything in it.  Disadvantage:  No simultaneous read and write operation .
  • 10. File Structure  Unstructured Sequence of Bytes 1 Byte File
  • 11. File Structure  Ways of File Structure  Sequence of Fixed length Records  Collection of fixed length records.  Used in older systems.  Advantages:  Read and write operation on different record done simultaneously.  Disadvantage:  Sequential search so time consuming
  • 12. File Structure  Sequence of Fixed length Records Record File
  • 13. File Structure  Ways of File Structure  Tree Structure  File consists of a tree of records with varying size.  Each record contains a key Field.  Tree is sorted based on key fields.  Used in large mainframe systems  Advantages:  Less time to search a record.
  • 14. File Structure  Tree Structure Ant Fox Pig Cat Cow Dog Goat Lion Owl Pony Rat Worm Hen Horse Lamb
  • 15. File Structure  Four Terms  Fields  Records  Files  Database
  • 16. File Structure  Four Terms  Fields  Basic elements of data  Has 3 sub fields  Example emp_name  Records  Collection of related fields.  Has sub fields like name and length  Example emp_record
  • 17. File Structure  Four Terms  File  Collection of similar records.  Treated as a single entity by user.  Has sub fields like name, creation date ,length.  Example : payroll system.  Database  Collection of related data ( one or more files).  Has sub fields like name and length  Example: organizations data or project
  • 18. File Types  Operating system supports several types of files  Regular File  Character special File  Block Special File  Metadata File  Directories
  • 19. File Types  Regular Files: Two types  ASCII Files  Consists lines of text  Uses carriage return or line feed character  Display or print as it is  Edited by any editor  Easy to link  Binary Files  Consists of bytes  Difficult to link
  • 20. File Types  UNIX executable binary file Magic Number Text Size Data Size BSS Size Symbol Table Size Entry Point Flag text Data Relocation Bit Symbol Table Header
  • 21. File Type  Unix Binary archive File Header Object module Header Object module Header Object module Header Object module Module name Date Owner Protection Size
  • 22. File Attribute  Every file has a name and additional information  List of Attributes  Name  Protection  password  Identifier  Type  Location  Creator  owner  Size  Time and Date of creation  Hidden flag  Read-only flag  Binary or ASCII file  Lock flag  System flag
  • 23. File Access Methods  Types of File Access Methods  Sequential Access Method  Random or Direct Access Method  Other Access Methods
  • 24. File Access Methods  Sequential access method  Simple access method.  Information of the file is processed in order.  Supports following operations  read_next()  write_next()  rewind()  Skip(n) records Current position  Rewind read/write  start end
  • 25. File Access Methods  Random or Direct access method  It is based on disk model.  Allows random access.  File is viewed as a numbered sequence of records.  Used to access large amount of data.  Supports following operations  read(n)  write(n)  jump to record n  Query current record
  • 26. File Access Methods  Other Access method(Indexed)  Build on top of direct access method  To search the record  Search index for file pointer  Search file in directory  Search a required record Key Field Pointer radha ---- raj ----- Radha Social-security age -- Index Relative File
  • 27. File Operations  Operations required to define a file properly.  Operations are nothing but OS system calls.  List of operations  Creating a file  Writing a file  Reading a file  Append a file  Seek operation / repositioning within a file  Deleting a file  Get attribute  Set attribute  Rename  Truncating a File
  • 28. File System Implementation  Why to use disk  Deals with  How the files and directories are stored  How they are managed  How it work efficiently  File system layout MBR pt partition1 partition2 partition3 ----- Entire disk space Boot block Super block Free space mgmt I-nodes Root dir Files & directory Unix file system

Editor's Notes

  1. Query current record – used to return back to this record later
  2. Query current record – used to return back to this record later