SlideShare a Scribd company logo
1 of 48
File-System Implementation
| (OS: Operating Systems) | (File-System Implementation) | 2
Chapter 12: File System Implementation
File System Structure
File System Implementation
Directory Implementation
Allocation Methods
Free-Space Management
Efficiency and Performance
Recovery
Log-Structured File Systems
NFS
| (OS: Operating Systems) | (File-System Implementation) | 3
File-System Structure
File structure
 (Logical storage unit)

-(secondary storage-disks)
File control block –
| (OS: Operating Systems) | (File-System Implementation) | 4
Layered File System
| (OS: Operating Systems) | (File-System Implementation) | 5
A Typical File Control Block
| (OS: Operating Systems) | (File-System Implementation) | 6
In-Memory File System Structures
OS
Figure 12-3(a)
Figure 12-3(b)
| (OS: Operating Systems) | (File-System Implementation) | 7
In-Memory File System Structures
| (OS: Operating Systems) | (File-System Implementation) | 8
Virtual File Systems
Virtual File Systems (VFS)
VFS (Application Program Interface-API)
API (VFS interface),
| (OS: Operating Systems) | (File-System Implementation) | 9
Schematic View of Virtual File
System
| (OS: Operating Systems) | (File-System Implementation) | 10
Directory Implementation
(Linear list) (data blocks)

 execute
(Hash Table) – (hash data structure)
 directory
 (collisions) – 2
 (fixed size)
| (OS: Operating Systems) | (File-System Implementation) | 11
Allocation Methods
(Contiguous allocation)
(Linked allocation)
(Indexed allocation)
| (OS: Operating Systems) | (File-System Implementation) | 12
Contiguous Allocation
– (block #) (number of blocks)
(Random access)
(dynamic storage-allocation problem)
(Files cannot grow)
| (OS: Operating Systems) | (File-System Implementation) | 13
Contiguous Allocation of Disk
Space
| (OS: Operating Systems) | (File-System Implementation) | 14
Extent-Based Systems
(I.e. Veritas File System)
Extent-based file systems (extents)
(extent) (extents)
| (OS: Operating Systems) | (File-System Implementation) | 15
Linked Allocation
(linked list)
pointerblock =
| (OS: Operating Systems) | (File-System Implementation) | 16
Linked Allocation (Cont.)
– (starting address)
(Free-space management system) –
(random access)
(Mapping)
Qth block
Displacement into block = R + 1
File-allocation table (FAT) – (disk-space allocation) MS-DOS
OS/2.
LA/511
Q
R
| (OS: Operating Systems) | (File-System Implementation) | 17
Linked Allocation
| (OS: Operating Systems) | (File-System Implementation) | 18
File-Allocation Table
| (OS: Operating Systems) | (File-System Implementation) | 19
Indexed Allocation
pointers index block.
(Logical view)
index table
| (OS: Operating Systems) | (File-System Implementation) | 20
Example of Indexed Allocation
| (OS: Operating Systems) | (File-System Implementation) | 21
Indexed Allocation (Cont.)
(index table)
(Random access)
(Dynamic access) (external fragmentation), overhead
index block
Mapping 256K words block size of 512 words 1 block
index table
LA/512
Q
R
Q = displacement into index table
R = displacement into block
| (OS: Operating Systems) | (File-System Implementation) | 22
Indexed Allocation – Mapping
(Cont.)
Mapping (block size of 512 words)
(Linked scheme) – Link blocks index table ()
LA / (512 x 511)
Q1
R1
Q1 = block of index table
R1 is used as follows:
R1 / 512
Q2
R2
Q2 = displacement into block of index table
R2 displacement into block of file:
| (OS: Operating Systems) | (File-System Implementation) | 23
Indexed Allocation – Mapping
(Cont.)
2 (Two-level index) 5123
LA / (512 x 512)
Q1
R1
Q1 = displacement into outer-index
R1 is used as follows:
R1 / 512
Q2
R2
Q2 = displacement into block of index table
R2 displacement into block of file:
| (OS: Operating Systems) | (File-System Implementation) | 24
Indexed Allocation – Mapping
(Cont.)

outer-index
index table file
| (OS: Operating Systems) | (File-System Implementation) | 25
Combined Scheme: UNIX (4K bytes per
block)
| (OS: Operating Systems) | (File-System Implementation) | 26
Free-Space Management
Bit vector (n blocks)
…
0 1 2 n-1
bit[i] =

0 ⇒ block[i] free
1 ⇒ block[i] occupied
Block number calculation
(number of bits per word) *
(number of 0-value words) +
offset of first 1 bit
| (OS: Operating Systems) | (File-System Implementation) | 27
Free-Space Management (Cont.)
Bit map Example:
block size = 212
bytes
disk size = 230
bytes (1 gigabyte)
n = 230
/212
= 218
bits (or 32K bytes)
Linked list (free list)


Grouping
Counting
| (OS: Operating Systems) | (File-System Implementation) | 28
Free-Space Management (Cont.)
(protect)
 Pointer (free list)
 Bit map


 block[i] bit[i] = 1 bit[i] = 0
 Solution:
 Set bit[i] = 1 in disk.
 Allocate block[i]
 Set bit[i] = 1 in memory
| (OS: Operating Systems) | (File-System Implementation) | 29
Linked Free Space List on Disk
| (OS: Operating Systems) | (File-System Implementation) | 30
Efficiency and Performance
(Efficiency) :

 (file’s directory entry)
(Performance)
 (disk cache) –
 free-behind and read-ahead – (optimize sequential access)
 dedicating section (virtual disk, or RAM disk)
| (OS: Operating Systems) | (File-System Implementation) | 31
Various Disk-Caching Locations
| (OS: Operating Systems) | (File-System Implementation) | 32
Page Cache
(page cache) virtual memory
Memory-mapped I/O page cache
Routine I/O file system buffer (disk) cache
| (OS: Operating Systems) | (File-System Implementation) | 33
I/O Without a Unified Buffer Cache
| (OS: Operating Systems) | (File-System Implementation) | 34
Unified Buffer Cache
A unified buffer cache memory-mapped pages ordinary
file system I/O
| (OS: Operating Systems) | (File-System Implementation) | 35
I/O Using a Unified Buffer Cache
| (OS: Operating Systems) | (File-System Implementation) | 36
Recovery
(Consistency checking) –
system programs back up (floppy disk, magnetic tape).
restoring
| (OS: Operating Systems) | (File-System Implementation) | 37
Log Structured File Systems
Log structured ( journaling) (transaction)
log (committed) log file system
log (asynchronously written) file system file system log
(crashes) log
| (OS: Operating Systems) | (File-System Implementation) | 38
The Sun Network File System
(NFS)
An implementation and a specification of a software
system for accessing remote files across LANs (or
WANs).
The implementation is part of the Solaris and SunOS
operating systems running on Sun workstations using an
unreliable datagram protocol (UDP/IP protocol and
Ethernet.
| (OS: Operating Systems) | (File-System Implementation) | 39
NFS (Cont.)
Interconnected workstations viewed as a set of
independent machines with independent file systems,
which allows sharing among these file systems in a
transparent manner.
 A remote directory is mounted over a local file system
directory. The mounted directory looks like an integral
subtree of the local file system, replacing the subtree
descending from the local directory.
 Specification of the remote directory for the mount operation
is nontransparent; the host name of the remote directory
has to be provided. Files in the remote directory can then
be accessed in a transparent manner.
 Subject to access-rights accreditation, potentially any file
system (or directory within a file system), can be mounted
remotely on top of any local directory.
| (OS: Operating Systems) | (File-System Implementation) | 40
NFS (Cont.)
NFS is designed to operate in a heterogeneous
environment of different machines, operating systems,
and network architectures; the NFS specifications
independent of these media.
This independence is achieved through the use of RPC
primitives built on top of an External Data Representation
(XDR) protocol used between two implementation-
independent interfaces.
The NFS specification distinguishes between the services
provided by a mount mechanism and the actual remote-
file-access services.
| (OS: Operating Systems) | (File-System Implementation) | 41
Three Independent File Systems
| (OS: Operating Systems) | (File-System Implementation) | 42
Mounting in NFS
Mounts Cascading mounts
| (OS: Operating Systems) | (File-System Implementation) | 43
NFS Mount Protocol
Establishes initial logical connection between server and
client.
Mount operation includes name of remote directory to be
mounted and name of server machine storing it.
 Mount request is mapped to corresponding RPC and forwarded
to mount server running on server machine.
 Export list – specifies local file systems that server exports for
mounting, along with names of machines that are permitted to
mount them.
Following a mount request that conforms to its export list,
the server returns a file handle—a key for further accesses.
File handle – a file-system identifier, and an inode number to
identify the mounted directory within the exported file
system.
The mount operation changes only the user’s view and does
not affect the server side.
| (OS: Operating Systems) | (File-System Implementation) | 44
NFS Protocol
Provides a set of remote procedure calls for remote file
operations. The procedures support the following operations:
 searching for a file within a directory
 reading a set of directory entries
 manipulating links and directories
 accessing file attributes
 reading and writing files
NFS servers are stateless; each request has to provide a full set
of arguments.
Modified data must be committed to the server’s disk before
results are returned to the client (lose advantages of caching).
The NFS protocol does not provide concurrency-control
mechanisms.
| (OS: Operating Systems) | (File-System Implementation) | 45
Three Major Layers of NFS
Architecture
UNIX file-system interface (based on the open, read,
write, and close calls, and file descriptors).
Virtual File System (VFS) layer – distinguishes local files
from remote ones, and local files are further distinguished
according to their file-system types.
 The VFS activates file-system-specific operations to handle
local requests according to their file-system types.
 Calls the NFS protocol procedures for remote requests.
NFS service layer – bottom layer of the architecture;
implements the NFS protocol.
| (OS: Operating Systems) | (File-System Implementation) | 46
Schematic View of NFS
Architecture
| (OS: Operating Systems) | (File-System Implementation) | 47
NFS Path-Name Translation
Performed by breaking the path into component names
and performing a separate NFS lookup call for every pair
of component name and directory vnode.
To make lookup faster, a directory name lookup cache on
the client’s side holds the vnodes for remote directory
names.
| (OS: Operating Systems) | (File-System Implementation) | 48
NFS Remote Operations
Nearly one-to-one correspondence between regular UNIX
system calls and the NFS protocol RPCs (except opening and
closing files).
NFS adheres to the remote-service paradigm, but employs
buffering and caching techniques for the sake of performance.
File-blocks cache – when a file is opened, the kernel checks
with the remote server whether to fetch or revalidate the cached
attributes. Cached file blocks are used only if the corresponding
cached attributes are up to date.
File-attribute cache – the attribute cache is updated whenever
new attributes arrive from the server.
Clients do not free delayed-write blocks until the server confirms
that the data have been written to disk.

More Related Content

What's hot

Operating Systems - Implementing File Systems
Operating Systems - Implementing File SystemsOperating Systems - Implementing File Systems
Operating Systems - Implementing File SystemsMukesh Chinta
 
File implementation
File implementationFile implementation
File implementationMohd Arif
 
Xfs file system for linux
Xfs file system for linuxXfs file system for linux
Xfs file system for linuxAjay Sood
 
ITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemSneh Prabha
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System InterfaceWayne Jones Jnr
 
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System ImplementationWayne Jones Jnr
 
File System Implementation - Part1
File System Implementation - Part1File System Implementation - Part1
File System Implementation - Part1Amir Payberah
 
File management
File managementFile management
File managementMohd Arif
 
Desktop Forensics: Windows
Desktop Forensics: WindowsDesktop Forensics: Windows
Desktop Forensics: WindowsGol D Roger
 
File System Interface
File System InterfaceFile System Interface
File System Interfacechandinisanz
 
File systemimplementationfinal
File systemimplementationfinalFile systemimplementationfinal
File systemimplementationfinalmarangburu42
 
Ch11 file system implementation
Ch11   file system implementationCh11   file system implementation
Ch11 file system implementationWelly Dian Astika
 
Filesystemimplementationpre final-160919095849
Filesystemimplementationpre final-160919095849Filesystemimplementationpre final-160919095849
Filesystemimplementationpre final-160919095849marangburu42
 

What's hot (19)

Operating Systems - Implementing File Systems
Operating Systems - Implementing File SystemsOperating Systems - Implementing File Systems
Operating Systems - Implementing File Systems
 
File implementation
File implementationFile implementation
File implementation
 
Xfs file system for linux
Xfs file system for linuxXfs file system for linux
Xfs file system for linux
 
ITFT_File system interface in Operating System
ITFT_File system interface in Operating SystemITFT_File system interface in Operating System
ITFT_File system interface in Operating System
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System Implementation
 
File Systems
File SystemsFile Systems
File Systems
 
File
FileFile
File
 
OSCh11
OSCh11OSCh11
OSCh11
 
Ch11
Ch11Ch11
Ch11
 
File System Implementation - Part1
File System Implementation - Part1File System Implementation - Part1
File System Implementation - Part1
 
File management
File managementFile management
File management
 
Desktop Forensics: Windows
Desktop Forensics: WindowsDesktop Forensics: Windows
Desktop Forensics: Windows
 
File System Interface
File System InterfaceFile System Interface
File System Interface
 
File System Implementation
File System ImplementationFile System Implementation
File System Implementation
 
File systemimplementationfinal
File systemimplementationfinalFile systemimplementationfinal
File systemimplementationfinal
 
Ch11 file system implementation
Ch11   file system implementationCh11   file system implementation
Ch11 file system implementation
 
Filesystemimplementationpre final-160919095849
Filesystemimplementationpre final-160919095849Filesystemimplementationpre final-160919095849
Filesystemimplementationpre final-160919095849
 
10 File System
10 File System10 File System
10 File System
 

Similar to 8 1-os file system implementation

Linux architecture
Linux architectureLinux architecture
Linux architecturemcganesh
 
Linux architecture
Linux architectureLinux architecture
Linux architecturemcganesh
 
Linux internal
Linux internalLinux internal
Linux internalmcganesh
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case studyLavanya G
 
file management_part2_os_notes.ppt
file management_part2_os_notes.pptfile management_part2_os_notes.ppt
file management_part2_os_notes.pptHelalMirzad
 
Visual comparison of Unix-like systems & Virtualisation
Visual comparison of Unix-like systems & VirtualisationVisual comparison of Unix-like systems & Virtualisation
Visual comparison of Unix-like systems & Virtualisationwangyuanyi
 
Understanding operating systems 5th ed ch16
Understanding operating systems 5th ed ch16Understanding operating systems 5th ed ch16
Understanding operating systems 5th ed ch16BarrBoy
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linuxRaja Waseem Akhtar
 
Operating system concepts
Operating system conceptsOperating system concepts
Operating system conceptsGreen Ecosystem
 
Module 13 - Troubleshooting
Module 13 - TroubleshootingModule 13 - Troubleshooting
Module 13 - TroubleshootingT. J. Saotome
 
AliEnFS - A Linux File System For The AliEn Grid Services
AliEnFS - A Linux File System For The AliEn Grid ServicesAliEnFS - A Linux File System For The AliEn Grid Services
AliEnFS - A Linux File System For The AliEn Grid ServicesNathan Mathis
 
OS - Ch2
OS - Ch2OS - Ch2
OS - Ch2sphs
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresWayne Jones Jnr
 
Lamp ppt
Lamp pptLamp ppt
Lamp pptReka
 
Chapter 14 Computer Architecture
Chapter 14 Computer ArchitectureChapter 14 Computer Architecture
Chapter 14 Computer ArchitectureGiulianoRanauro
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tablesshashikant pabari
 
File systeminterface-pre-final-formatting
File systeminterface-pre-final-formattingFile systeminterface-pre-final-formatting
File systeminterface-pre-final-formattingmarangburu42
 

Similar to 8 1-os file system implementation (20)

OS_Ch12
OS_Ch12OS_Ch12
OS_Ch12
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Linux internal
Linux internalLinux internal
Linux internal
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
file management_part2_os_notes.ppt
file management_part2_os_notes.pptfile management_part2_os_notes.ppt
file management_part2_os_notes.ppt
 
Visual comparison of Unix-like systems & Virtualisation
Visual comparison of Unix-like systems & VirtualisationVisual comparison of Unix-like systems & Virtualisation
Visual comparison of Unix-like systems & Virtualisation
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
Understanding operating systems 5th ed ch16
Understanding operating systems 5th ed ch16Understanding operating systems 5th ed ch16
Understanding operating systems 5th ed ch16
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Operating system concepts
Operating system conceptsOperating system concepts
Operating system concepts
 
Module 13 - Troubleshooting
Module 13 - TroubleshootingModule 13 - Troubleshooting
Module 13 - Troubleshooting
 
AliEnFS - A Linux File System For The AliEn Grid Services
AliEnFS - A Linux File System For The AliEn Grid ServicesAliEnFS - A Linux File System For The AliEn Grid Services
AliEnFS - A Linux File System For The AliEn Grid Services
 
OS - Ch2
OS - Ch2OS - Ch2
OS - Ch2
 
Chapter 2 - Operating System Structures
Chapter 2 - Operating System StructuresChapter 2 - Operating System Structures
Chapter 2 - Operating System Structures
 
Lamp ppt
Lamp pptLamp ppt
Lamp ppt
 
Chapter 14 Computer Architecture
Chapter 14 Computer ArchitectureChapter 14 Computer Architecture
Chapter 14 Computer Architecture
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tables
 
File systeminterface-pre-final-formatting
File systeminterface-pre-final-formattingFile systeminterface-pre-final-formatting
File systeminterface-pre-final-formatting
 

More from Gol D Roger

Seizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceSeizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceGol D Roger
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Windows logon password – get windows logon password using wdigest in memory d...
Windows logon password – get windows logon password using wdigest in memory d...Windows logon password – get windows logon password using wdigest in memory d...
Windows logon password – get windows logon password using wdigest in memory d...Gol D Roger
 
HTTPs Strict Transport Security
HTTPs    Strict Transport Security HTTPs    Strict Transport Security
HTTPs Strict Transport Security Gol D Roger
 
IT Passport Examination.
IT Passport Examination.IT Passport Examination.
IT Passport Examination.Gol D Roger
 
Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Gol D Roger
 
windows server 2012 R2
windows server 2012 R2windows server 2012 R2
windows server 2012 R2Gol D Roger
 
Users guide-to-winfe
Users guide-to-winfeUsers guide-to-winfe
Users guide-to-winfeGol D Roger
 
10 things group policy preferences does better
10 things group policy preferences does better10 things group policy preferences does better
10 things group policy preferences does betterGol D Roger
 

More from Gol D Roger (11)

Seizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret ServiceSeizing Electronic Evidence & Best Practices – Secret Service
Seizing Electronic Evidence & Best Practices – Secret Service
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Deep Web
Deep WebDeep Web
Deep Web
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Windows logon password – get windows logon password using wdigest in memory d...
Windows logon password – get windows logon password using wdigest in memory d...Windows logon password – get windows logon password using wdigest in memory d...
Windows logon password – get windows logon password using wdigest in memory d...
 
HTTPs Strict Transport Security
HTTPs    Strict Transport Security HTTPs    Strict Transport Security
HTTPs Strict Transport Security
 
IT Passport Examination.
IT Passport Examination.IT Passport Examination.
IT Passport Examination.
 
Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2
 
windows server 2012 R2
windows server 2012 R2windows server 2012 R2
windows server 2012 R2
 
Users guide-to-winfe
Users guide-to-winfeUsers guide-to-winfe
Users guide-to-winfe
 
10 things group policy preferences does better
10 things group policy preferences does better10 things group policy preferences does better
10 things group policy preferences does better
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

8 1-os file system implementation

  • 2. | (OS: Operating Systems) | (File-System Implementation) | 2 Chapter 12: File System Implementation File System Structure File System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery Log-Structured File Systems NFS
  • 3. | (OS: Operating Systems) | (File-System Implementation) | 3 File-System Structure File structure  (Logical storage unit)  -(secondary storage-disks) File control block –
  • 4. | (OS: Operating Systems) | (File-System Implementation) | 4 Layered File System
  • 5. | (OS: Operating Systems) | (File-System Implementation) | 5 A Typical File Control Block
  • 6. | (OS: Operating Systems) | (File-System Implementation) | 6 In-Memory File System Structures OS Figure 12-3(a) Figure 12-3(b)
  • 7. | (OS: Operating Systems) | (File-System Implementation) | 7 In-Memory File System Structures
  • 8. | (OS: Operating Systems) | (File-System Implementation) | 8 Virtual File Systems Virtual File Systems (VFS) VFS (Application Program Interface-API) API (VFS interface),
  • 9. | (OS: Operating Systems) | (File-System Implementation) | 9 Schematic View of Virtual File System
  • 10. | (OS: Operating Systems) | (File-System Implementation) | 10 Directory Implementation (Linear list) (data blocks)   execute (Hash Table) – (hash data structure)  directory  (collisions) – 2  (fixed size)
  • 11. | (OS: Operating Systems) | (File-System Implementation) | 11 Allocation Methods (Contiguous allocation) (Linked allocation) (Indexed allocation)
  • 12. | (OS: Operating Systems) | (File-System Implementation) | 12 Contiguous Allocation – (block #) (number of blocks) (Random access) (dynamic storage-allocation problem) (Files cannot grow)
  • 13. | (OS: Operating Systems) | (File-System Implementation) | 13 Contiguous Allocation of Disk Space
  • 14. | (OS: Operating Systems) | (File-System Implementation) | 14 Extent-Based Systems (I.e. Veritas File System) Extent-based file systems (extents) (extent) (extents)
  • 15. | (OS: Operating Systems) | (File-System Implementation) | 15 Linked Allocation (linked list) pointerblock =
  • 16. | (OS: Operating Systems) | (File-System Implementation) | 16 Linked Allocation (Cont.) – (starting address) (Free-space management system) – (random access) (Mapping) Qth block Displacement into block = R + 1 File-allocation table (FAT) – (disk-space allocation) MS-DOS OS/2. LA/511 Q R
  • 17. | (OS: Operating Systems) | (File-System Implementation) | 17 Linked Allocation
  • 18. | (OS: Operating Systems) | (File-System Implementation) | 18 File-Allocation Table
  • 19. | (OS: Operating Systems) | (File-System Implementation) | 19 Indexed Allocation pointers index block. (Logical view) index table
  • 20. | (OS: Operating Systems) | (File-System Implementation) | 20 Example of Indexed Allocation
  • 21. | (OS: Operating Systems) | (File-System Implementation) | 21 Indexed Allocation (Cont.) (index table) (Random access) (Dynamic access) (external fragmentation), overhead index block Mapping 256K words block size of 512 words 1 block index table LA/512 Q R Q = displacement into index table R = displacement into block
  • 22. | (OS: Operating Systems) | (File-System Implementation) | 22 Indexed Allocation – Mapping (Cont.) Mapping (block size of 512 words) (Linked scheme) – Link blocks index table () LA / (512 x 511) Q1 R1 Q1 = block of index table R1 is used as follows: R1 / 512 Q2 R2 Q2 = displacement into block of index table R2 displacement into block of file:
  • 23. | (OS: Operating Systems) | (File-System Implementation) | 23 Indexed Allocation – Mapping (Cont.) 2 (Two-level index) 5123 LA / (512 x 512) Q1 R1 Q1 = displacement into outer-index R1 is used as follows: R1 / 512 Q2 R2 Q2 = displacement into block of index table R2 displacement into block of file:
  • 24. | (OS: Operating Systems) | (File-System Implementation) | 24 Indexed Allocation – Mapping (Cont.)  outer-index index table file
  • 25. | (OS: Operating Systems) | (File-System Implementation) | 25 Combined Scheme: UNIX (4K bytes per block)
  • 26. | (OS: Operating Systems) | (File-System Implementation) | 26 Free-Space Management Bit vector (n blocks) … 0 1 2 n-1 bit[i] =  0 ⇒ block[i] free 1 ⇒ block[i] occupied Block number calculation (number of bits per word) * (number of 0-value words) + offset of first 1 bit
  • 27. | (OS: Operating Systems) | (File-System Implementation) | 27 Free-Space Management (Cont.) Bit map Example: block size = 212 bytes disk size = 230 bytes (1 gigabyte) n = 230 /212 = 218 bits (or 32K bytes) Linked list (free list)   Grouping Counting
  • 28. | (OS: Operating Systems) | (File-System Implementation) | 28 Free-Space Management (Cont.) (protect)  Pointer (free list)  Bit map    block[i] bit[i] = 1 bit[i] = 0  Solution:  Set bit[i] = 1 in disk.  Allocate block[i]  Set bit[i] = 1 in memory
  • 29. | (OS: Operating Systems) | (File-System Implementation) | 29 Linked Free Space List on Disk
  • 30. | (OS: Operating Systems) | (File-System Implementation) | 30 Efficiency and Performance (Efficiency) :   (file’s directory entry) (Performance)  (disk cache) –  free-behind and read-ahead – (optimize sequential access)  dedicating section (virtual disk, or RAM disk)
  • 31. | (OS: Operating Systems) | (File-System Implementation) | 31 Various Disk-Caching Locations
  • 32. | (OS: Operating Systems) | (File-System Implementation) | 32 Page Cache (page cache) virtual memory Memory-mapped I/O page cache Routine I/O file system buffer (disk) cache
  • 33. | (OS: Operating Systems) | (File-System Implementation) | 33 I/O Without a Unified Buffer Cache
  • 34. | (OS: Operating Systems) | (File-System Implementation) | 34 Unified Buffer Cache A unified buffer cache memory-mapped pages ordinary file system I/O
  • 35. | (OS: Operating Systems) | (File-System Implementation) | 35 I/O Using a Unified Buffer Cache
  • 36. | (OS: Operating Systems) | (File-System Implementation) | 36 Recovery (Consistency checking) – system programs back up (floppy disk, magnetic tape). restoring
  • 37. | (OS: Operating Systems) | (File-System Implementation) | 37 Log Structured File Systems Log structured ( journaling) (transaction) log (committed) log file system log (asynchronously written) file system file system log (crashes) log
  • 38. | (OS: Operating Systems) | (File-System Implementation) | 38 The Sun Network File System (NFS) An implementation and a specification of a software system for accessing remote files across LANs (or WANs). The implementation is part of the Solaris and SunOS operating systems running on Sun workstations using an unreliable datagram protocol (UDP/IP protocol and Ethernet.
  • 39. | (OS: Operating Systems) | (File-System Implementation) | 39 NFS (Cont.) Interconnected workstations viewed as a set of independent machines with independent file systems, which allows sharing among these file systems in a transparent manner.  A remote directory is mounted over a local file system directory. The mounted directory looks like an integral subtree of the local file system, replacing the subtree descending from the local directory.  Specification of the remote directory for the mount operation is nontransparent; the host name of the remote directory has to be provided. Files in the remote directory can then be accessed in a transparent manner.  Subject to access-rights accreditation, potentially any file system (or directory within a file system), can be mounted remotely on top of any local directory.
  • 40. | (OS: Operating Systems) | (File-System Implementation) | 40 NFS (Cont.) NFS is designed to operate in a heterogeneous environment of different machines, operating systems, and network architectures; the NFS specifications independent of these media. This independence is achieved through the use of RPC primitives built on top of an External Data Representation (XDR) protocol used between two implementation- independent interfaces. The NFS specification distinguishes between the services provided by a mount mechanism and the actual remote- file-access services.
  • 41. | (OS: Operating Systems) | (File-System Implementation) | 41 Three Independent File Systems
  • 42. | (OS: Operating Systems) | (File-System Implementation) | 42 Mounting in NFS Mounts Cascading mounts
  • 43. | (OS: Operating Systems) | (File-System Implementation) | 43 NFS Mount Protocol Establishes initial logical connection between server and client. Mount operation includes name of remote directory to be mounted and name of server machine storing it.  Mount request is mapped to corresponding RPC and forwarded to mount server running on server machine.  Export list – specifies local file systems that server exports for mounting, along with names of machines that are permitted to mount them. Following a mount request that conforms to its export list, the server returns a file handle—a key for further accesses. File handle – a file-system identifier, and an inode number to identify the mounted directory within the exported file system. The mount operation changes only the user’s view and does not affect the server side.
  • 44. | (OS: Operating Systems) | (File-System Implementation) | 44 NFS Protocol Provides a set of remote procedure calls for remote file operations. The procedures support the following operations:  searching for a file within a directory  reading a set of directory entries  manipulating links and directories  accessing file attributes  reading and writing files NFS servers are stateless; each request has to provide a full set of arguments. Modified data must be committed to the server’s disk before results are returned to the client (lose advantages of caching). The NFS protocol does not provide concurrency-control mechanisms.
  • 45. | (OS: Operating Systems) | (File-System Implementation) | 45 Three Major Layers of NFS Architecture UNIX file-system interface (based on the open, read, write, and close calls, and file descriptors). Virtual File System (VFS) layer – distinguishes local files from remote ones, and local files are further distinguished according to their file-system types.  The VFS activates file-system-specific operations to handle local requests according to their file-system types.  Calls the NFS protocol procedures for remote requests. NFS service layer – bottom layer of the architecture; implements the NFS protocol.
  • 46. | (OS: Operating Systems) | (File-System Implementation) | 46 Schematic View of NFS Architecture
  • 47. | (OS: Operating Systems) | (File-System Implementation) | 47 NFS Path-Name Translation Performed by breaking the path into component names and performing a separate NFS lookup call for every pair of component name and directory vnode. To make lookup faster, a directory name lookup cache on the client’s side holds the vnodes for remote directory names.
  • 48. | (OS: Operating Systems) | (File-System Implementation) | 48 NFS Remote Operations Nearly one-to-one correspondence between regular UNIX system calls and the NFS protocol RPCs (except opening and closing files). NFS adheres to the remote-service paradigm, but employs buffering and caching techniques for the sake of performance. File-blocks cache – when a file is opened, the kernel checks with the remote server whether to fetch or revalidate the cached attributes. Cached file blocks are used only if the corresponding cached attributes are up to date. File-attribute cache – the attribute cache is updated whenever new attributes arrive from the server. Clients do not free delayed-write blocks until the server confirms that the data have been written to disk.