SlideShare a Scribd company logo
SUJITHA.M
I-M.SC(CS&IT)
NADAR SARASWATHI COLLEGE OF ARTS
AND SCIENCE,THENI.
FILE SHARING, SECONDARY STORAGE MANAGEMENT
FILE ALLOCATION
FILE SHARING
 In a multiuser system, there is a requirement for
allowing files to be shared among a number of
users.
 There two issues may arise.
 They are:
Access Rights
Management of simultaneous Access
ACCESS RIGHTS
 The file system provides a flexible tool for allowing file
sharing among the users.
 It provides a number of options, so that the files can be
accessed and controlled easily by the users.
 So that the user has rights to access the file which
provides at a wide range.
 There are certain lists that access rights which is
assigned to a particular user for a particular file.
 NONE:
If the user does not know the existence of the file,
he would not be allowed to read the user directory that
is included in this file.
 KNOWLEDGE:
The user can determine the exist file and the owner
of the existing file.
 EXECUTION:
The user can load and execute the file but that file
cannot be copied .
 READING:
The user can read , copy and execute for any purpose.
 APPENDING:
The user can insert data to the file, but the process
of modification and deletion is restricted.
 UPDATING:
The user can modify, delete and add data to the file.
 CHANGING PROTECTION:
The user can change the access rights which is
granted to the other user.
 DELETION:
The user can delete the file from the file system.
ACCESS THAT ARE PROVIDED IN
DIFFERENT CLASSES
 SPECIFIC USER:
The individual users who are assigned by the
user ID.
 USERGROUPS:
A set of users who are not defined individually.
 ALL:
These are the public files which is assigned by
all users.
SIMULTANEOUS ACCESS
 When access allowed to append or update a file
more than one user, the operating system must
enforce discipline.
 A brute force approach is to allow a user to lock the
entire file when it is to be updated.
 Issues of mutual exclusion and deadlock must be
addressed in designing the shared access capability.
SECONDARY STORAGE MANAGEMENT
 On Secondary storage ,a file consists of a collection of
blocks .
 The Operating system or file management system is
responsible for allocating blocks to the files .
 There are two management issues:
 Secondary storage must be allocated to the files.
 It is necessary to keep track of the space which is
available for the allocation.
FILE ALLOCATION
 The file allocation can be done using a single disk.
 The several issues are:
 When a new file is created, it requires the maximum
space.
 The space is allocated to a file as one or more
contiguous units.
 When a sort of data structure or table is used to keep
the portions which is assigned to a file.
 Such table is called as “File Allocation Table”.
PORTION SIZE
 The major issue is the size of the portion which is
allocated to a file.
 It is used to hold the entire file which is allocated.
 The major alternatives are:
VARIABLE,LARGE CONTIGUOUS PORTION:
The variable size avoids waste and the file
allocation tables are small.
BLOCKS:
 The small fixed portion provides greater flexibility.
 They may require large tables or complex structures for
allocation, so blocks are created when they are needed.
FILE ALLOCATION METHODS
 The specific allocation methods are:
 Contiguous Allocation
 Chained Allocation
 Indexed Allocation
 A single contiguous set of blocks is allocated to a file at
the time of file creation is called as “ Contiguous
Allocation”.
 The opposite extreme from contiguous allocation is
called as “Chained Allocation”.
 “Indexed Allocation” is used to address many problems
of contiguous and chained allocation.
File Allocation Methods
Contiguous Chained Indexed
Preallocation ? Necessary Possible Possible
Fixed or variable
size portions ?
Variable Fixed blocks Fixed Variable
blocks
Portion size Large Small Small Medium
Allocation
frequency
Once Low to high High Low
Time to allocate Medium Long Short Medium
File allocation
table size
One entry One entry Large Medium
FREE SPACE MANAGEMENT
 The space should be managed when the files are
allocated.
 The “Disk Allocation Table” is used to know what
blocks are available in the disk.
 The techniques that are implemented are:
BIT TABLES:
 This method is uses vector containing one bit for each
block on the disk.
 Each entry of 0 corresponds to a free block and 1
corresponds to a block in use.
CHAINED FREE PORTIONS:
Each free portion may be chained together using a
pointer and length value.
INDEXING:
The indexing approach treats free space as a file.
FREE BLOCK LIST:
 Each block is assigned as a number sequentially.
 The list of numbers of all free blocks is maintained in a
reserved portion of the disk.
 24 or 32 bits are needed to store a single block of
number.
THANKYOU!!!

More Related Content

What's hot

File system
File systemFile system
File system
Harleen Johal
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
Adeel Rasheed
 
Disk management
Disk managementDisk management
Disk management
Agnas Jasmine
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsKuber Chandra
 
Distributed System ppt
Distributed System pptDistributed System ppt
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
Kumar Pritam
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
Johan Granados Montero
 
Directory implementation and allocation methods
Directory implementation and allocation methodsDirectory implementation and allocation methods
Directory implementation and allocation methods
sangrampatil81
 
contiguous memory allocation.pptx
contiguous memory allocation.pptxcontiguous memory allocation.pptx
contiguous memory allocation.pptx
Rajapriya82
 
File Organization
File OrganizationFile Organization
File OrganizationManyi Man
 
Chapter 13 - I/O Systems
Chapter 13 - I/O SystemsChapter 13 - I/O Systems
Chapter 13 - I/O Systems
Wayne Jones Jnr
 
INTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptxINTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptx
LECO9
 
Cache coherence
Cache coherenceCache coherence
Cache coherenceEmployee
 
Structure of the page table
Structure of the page tableStructure of the page table
Structure of the page table
duvvuru madhuri
 
Data link layer
Data link layer Data link layer
Data link layer
Mukesh Chinta
 
Disk scheduling
Disk schedulingDisk scheduling
Disk scheduling
NEERAJ BAGHEL
 
Demand paging
Demand pagingDemand paging
Demand paging
Trinity Dwarka
 

What's hot (20)

File system
File systemFile system
File system
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 
Disk management
Disk managementDisk management
Disk management
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) Basics
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
 
Directory implementation and allocation methods
Directory implementation and allocation methodsDirectory implementation and allocation methods
Directory implementation and allocation methods
 
contiguous memory allocation.pptx
contiguous memory allocation.pptxcontiguous memory allocation.pptx
contiguous memory allocation.pptx
 
File Organization
File OrganizationFile Organization
File Organization
 
Chapter 13 - I/O Systems
Chapter 13 - I/O SystemsChapter 13 - I/O Systems
Chapter 13 - I/O Systems
 
INTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptxINTER PROCESS COMMUNICATION (IPC).pptx
INTER PROCESS COMMUNICATION (IPC).pptx
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Cache coherence
Cache coherenceCache coherence
Cache coherence
 
Structure of the page table
Structure of the page tableStructure of the page table
Structure of the page table
 
Data link layer
Data link layer Data link layer
Data link layer
 
Disk scheduling
Disk schedulingDisk scheduling
Disk scheduling
 
RAID Review
RAID ReviewRAID Review
RAID Review
 
Demand paging
Demand pagingDemand paging
Demand paging
 
File system
File systemFile system
File system
 

Similar to File sharing

Files
FilesFiles
File Allocation Methods.ppt
File Allocation Methods.pptFile Allocation Methods.ppt
File Allocation Methods.ppt
BharathiLakshmiAAssi
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
Ethiopia Satlliet television
 
file management
 file management file management
file management
Sweta Kumari Barnwal
 
File structure
File structureFile structure
File structure
A. S. M. Shafi
 
Allocation method - Operating System.pptx
Allocation method - Operating System.pptxAllocation method - Operating System.pptx
Allocation method - Operating System.pptx
Indhu Periys
 
Model of file system
Model of file systemModel of file system
Model of file system
Ishucs
 
Ch12_OS_Lecture 5.pdf
Ch12_OS_Lecture 5.pdfCh12_OS_Lecture 5.pdf
Ch12_OS_Lecture 5.pdf
AllinOne746595
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
Lavanya Sharma
 
Ch12_OS_Lecture 4.pdf
Ch12_OS_Lecture 4.pdfCh12_OS_Lecture 4.pdf
Ch12_OS_Lecture 4.pdf
AllinOne746595
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
AsmaaFaried1
 
OS Unit 4.pptx
OS Unit 4.pptxOS Unit 4.pptx
OS Unit 4.pptx
GautamBorana
 
Dude.pptx
Dude.pptxDude.pptx
Secondary Storage Management
Secondary Storage ManagementSecondary Storage Management
Secondary Storage Management
PriyanshuGandhi3
 
Chapter12
Chapter12Chapter12
Chapter12
Loyd Morales
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
Mohamed Gad
 
File Systems
File SystemsFile Systems
File Systems
Shipra Swati
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
Soushilove
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
Soushilove
 

Similar to File sharing (20)

Files
FilesFiles
Files
 
File Allocation Methods.ppt
File Allocation Methods.pptFile Allocation Methods.ppt
File Allocation Methods.ppt
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
file management
 file management file management
file management
 
File structure
File structureFile structure
File structure
 
Allocation method - Operating System.pptx
Allocation method - Operating System.pptxAllocation method - Operating System.pptx
Allocation method - Operating System.pptx
 
Model of file system
Model of file systemModel of file system
Model of file system
 
Ch12_OS_Lecture 5.pdf
Ch12_OS_Lecture 5.pdfCh12_OS_Lecture 5.pdf
Ch12_OS_Lecture 5.pdf
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
 
Ch12_OS_Lecture 4.pdf
Ch12_OS_Lecture 4.pdfCh12_OS_Lecture 4.pdf
Ch12_OS_Lecture 4.pdf
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
OS Unit 4.pptx
OS Unit 4.pptxOS Unit 4.pptx
OS Unit 4.pptx
 
Dude.pptx
Dude.pptxDude.pptx
Dude.pptx
 
Secondary Storage Management
Secondary Storage ManagementSecondary Storage Management
Secondary Storage Management
 
Chapter12
Chapter12Chapter12
Chapter12
 
Linux security introduction
Linux security introduction Linux security introduction
Linux security introduction
 
File Systems
File SystemsFile Systems
File Systems
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
 
Unit 4 File and Data Management
Unit 4 File and Data ManagementUnit 4 File and Data Management
Unit 4 File and Data Management
 

More from janani thirupathi

Networks
NetworksNetworks
Multimedia
MultimediaMultimedia
Multimedia
janani thirupathi
 
Data structure
Data structureData structure
Data structure
janani thirupathi
 
Java
JavaJava
Dip
Dip Dip
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
janani thirupathi
 
data generalization and summarization
data generalization and summarization data generalization and summarization
data generalization and summarization
janani thirupathi
 
Data warehouse architecture
Data warehouse architecture Data warehouse architecture
Data warehouse architecture
janani thirupathi
 
Evolution of os
Evolution of osEvolution of os
Evolution of os
janani thirupathi
 
B tree
B  treeB  tree
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
janani thirupathi
 
Arithmetic Logic
Arithmetic LogicArithmetic Logic
Arithmetic Logic
janani thirupathi
 
Transaction management
Transaction managementTransaction management
Transaction management
janani thirupathi
 
Programming in c Arrays
Programming in c ArraysProgramming in c Arrays
Programming in c Arrays
janani thirupathi
 
Memory System
Memory SystemMemory System
Memory System
janani thirupathi
 
Cn assignment
Cn assignmentCn assignment
Cn assignment
janani thirupathi
 
Narrowband ISDN
Narrowband ISDNNarrowband ISDN
Narrowband ISDN
janani thirupathi
 

More from janani thirupathi (17)

Networks
NetworksNetworks
Networks
 
Multimedia
MultimediaMultimedia
Multimedia
 
Data structure
Data structureData structure
Data structure
 
Java
JavaJava
Java
 
Dip
Dip Dip
Dip
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
data generalization and summarization
data generalization and summarization data generalization and summarization
data generalization and summarization
 
Data warehouse architecture
Data warehouse architecture Data warehouse architecture
Data warehouse architecture
 
Evolution of os
Evolution of osEvolution of os
Evolution of os
 
B tree
B  treeB  tree
B tree
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
 
Arithmetic Logic
Arithmetic LogicArithmetic Logic
Arithmetic Logic
 
Transaction management
Transaction managementTransaction management
Transaction management
 
Programming in c Arrays
Programming in c ArraysProgramming in c Arrays
Programming in c Arrays
 
Memory System
Memory SystemMemory System
Memory System
 
Cn assignment
Cn assignmentCn assignment
Cn assignment
 
Narrowband ISDN
Narrowband ISDNNarrowband ISDN
Narrowband ISDN
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 

File sharing

  • 1. SUJITHA.M I-M.SC(CS&IT) NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE,THENI. FILE SHARING, SECONDARY STORAGE MANAGEMENT FILE ALLOCATION
  • 2. FILE SHARING  In a multiuser system, there is a requirement for allowing files to be shared among a number of users.  There two issues may arise.  They are: Access Rights Management of simultaneous Access
  • 3. ACCESS RIGHTS  The file system provides a flexible tool for allowing file sharing among the users.  It provides a number of options, so that the files can be accessed and controlled easily by the users.  So that the user has rights to access the file which provides at a wide range.  There are certain lists that access rights which is assigned to a particular user for a particular file.
  • 4.  NONE: If the user does not know the existence of the file, he would not be allowed to read the user directory that is included in this file.  KNOWLEDGE: The user can determine the exist file and the owner of the existing file.  EXECUTION: The user can load and execute the file but that file cannot be copied .  READING: The user can read , copy and execute for any purpose.
  • 5.  APPENDING: The user can insert data to the file, but the process of modification and deletion is restricted.  UPDATING: The user can modify, delete and add data to the file.  CHANGING PROTECTION: The user can change the access rights which is granted to the other user.  DELETION: The user can delete the file from the file system.
  • 6. ACCESS THAT ARE PROVIDED IN DIFFERENT CLASSES  SPECIFIC USER: The individual users who are assigned by the user ID.  USERGROUPS: A set of users who are not defined individually.  ALL: These are the public files which is assigned by all users.
  • 7. SIMULTANEOUS ACCESS  When access allowed to append or update a file more than one user, the operating system must enforce discipline.  A brute force approach is to allow a user to lock the entire file when it is to be updated.  Issues of mutual exclusion and deadlock must be addressed in designing the shared access capability.
  • 8. SECONDARY STORAGE MANAGEMENT  On Secondary storage ,a file consists of a collection of blocks .  The Operating system or file management system is responsible for allocating blocks to the files .  There are two management issues:  Secondary storage must be allocated to the files.  It is necessary to keep track of the space which is available for the allocation.
  • 9. FILE ALLOCATION  The file allocation can be done using a single disk.  The several issues are:  When a new file is created, it requires the maximum space.  The space is allocated to a file as one or more contiguous units.  When a sort of data structure or table is used to keep the portions which is assigned to a file.  Such table is called as “File Allocation Table”.
  • 10. PORTION SIZE  The major issue is the size of the portion which is allocated to a file.  It is used to hold the entire file which is allocated.  The major alternatives are: VARIABLE,LARGE CONTIGUOUS PORTION: The variable size avoids waste and the file allocation tables are small. BLOCKS:  The small fixed portion provides greater flexibility.  They may require large tables or complex structures for allocation, so blocks are created when they are needed.
  • 11. FILE ALLOCATION METHODS  The specific allocation methods are:  Contiguous Allocation  Chained Allocation  Indexed Allocation  A single contiguous set of blocks is allocated to a file at the time of file creation is called as “ Contiguous Allocation”.  The opposite extreme from contiguous allocation is called as “Chained Allocation”.  “Indexed Allocation” is used to address many problems of contiguous and chained allocation.
  • 12. File Allocation Methods Contiguous Chained Indexed Preallocation ? Necessary Possible Possible Fixed or variable size portions ? Variable Fixed blocks Fixed Variable blocks Portion size Large Small Small Medium Allocation frequency Once Low to high High Low Time to allocate Medium Long Short Medium File allocation table size One entry One entry Large Medium
  • 13. FREE SPACE MANAGEMENT  The space should be managed when the files are allocated.  The “Disk Allocation Table” is used to know what blocks are available in the disk.  The techniques that are implemented are: BIT TABLES:  This method is uses vector containing one bit for each block on the disk.  Each entry of 0 corresponds to a free block and 1 corresponds to a block in use.
  • 14. CHAINED FREE PORTIONS: Each free portion may be chained together using a pointer and length value. INDEXING: The indexing approach treats free space as a file. FREE BLOCK LIST:  Each block is assigned as a number sequentially.  The list of numbers of all free blocks is maintained in a reserved portion of the disk.  24 or 32 bits are needed to store a single block of number.