This document discusses file systems and how they are implemented in operating systems. It introduces the need for file systems due to limitations in process address spaces. There are three main requirements for long-term information storage: storing large amounts of data, persistence of data, and concurrent access. Files fulfill these requirements through hierarchical directory structures and various allocation methods like contiguous, linked lists, and inode-based systems. The document provides examples of these allocation techniques and how they map files to disk blocks.
Useful documents for engineering students of CSE, and specially for students of aryabhatta knowledge university, Bihar (A.K.U. Bihar). It covers following topics, File concept, access methods, directory structure
Useful documents for engineering students of CSE, and specially for students of aryabhatta knowledge university, Bihar (A.K.U. Bihar). It covers following topics, File concept, access methods, directory structure
It is the File system that is contained on the same partition on which the "Root directory" is located. It is the File system on which all the other file systems are mounted
This is a self made slide covering topics related to storage systems available in the market with certain information of file systems to understand the fundamentals.
There are also some information is available related to how the whole stuff works.
Can be built on top of base methods
General involve creation of an index for the file
Keep index in memory for fast determination of location of data to be operated on (consider UPC code plus record of data about that item)
If too large, index (in memory) of the index (on disk)
IBM indexed sequential-access method (ISAM)
Small master index, points to disk blocks of secondary index
File kept sorted on a defined key
All done by the OS
VMS operating system provides index and relative files as another example .
A file system is used to control how data is stored and retrieved.
A filesystem is the methods and data structures that an operating system uses to keep track of files on a disk or partition; that is, the way the files are organized on the disk.
A file allocation table (FAT) is a table that an operating system maintains on a hard disk that provides a map of the clusters (the basic units of logical storage on a hard disk) that a file has been stored in.
File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a legacy file system which is simple and robust.
Today, FAT file systems are still commonly found on floppy disks, USB sticks, flash and other solid-state memory cards and modules, and many portable and embedded devices.
A File Structure should be according to a required format that the operating system can understand.
A file has a certain defined structure according to its type.
A text file is a sequence of characters organized into lines.
A source file is a sequence of procedures and functions.
An object file is a sequence of bytes organized into blocks that are understandable by the machine.
File Type
File type refers to the ability of the operating system to distinguish different types of file such as text files source files and binary files etc. Many operating systems support many types of files. Operating system like MS-DOS and UNIX have the following types of files −
Ordinary files
These are the files that contain user information.
These may have text, databases or executable program.
The user can apply various operations on such files like add, modify, delete or even remove the entire file.
Directory files
These files contain list of file names and other information related to these files.
Special files
These files are also known as device files.
These files represent physical device like disks, terminals, printers, networks, tape drive etc.
This lecture talks about parsing. Briefly gives overview on lexicon, categorization, grammar rules, syntactic tree, word senses and various challenges of natural language processing
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Lecture 14,15 and 16 file systems
1. Rushdi Shams, Dept of CSE, KUET 1
Operating SystemsOperating Systems
File SystemsFile Systems
Version 1.0
2. Rushdi Shams, Dept of CSE, KUET 2
Introduction
• Processes can store a limited amount of information
within its own address space.
• For some applications this size is adequate but for
others (airline reservations, banking), the space is
too small
3. Rushdi Shams, Dept of CSE, KUET 3
Introduction
• Information stored must survive the termination of
the process using it. Typically, processes were
designed in a way such that after their usage on
variables, the values are lost when processes release
them.
• Inappropriate for applications like database systems
4. Rushdi Shams, Dept of CSE, KUET 4
Introduction
• Multiple processes must be able to access the
information concurrently. Truly speaking, while a
process operates on an information, it was not
accessible for others
5. Rushdi Shams, Dept of CSE, KUET 5
Introduction
• So, we have three essential requirements for long-
term information storage-
1. Store a large amount of information
2. The information must be stored for a long time
3. Multiple processes must be able to access the
information concurrently
• These requirements led us towards keeping the
information in files
6. Rushdi Shams, Dept of CSE, KUET 6
Introduction
• Information in files must be persistent- process
termination and creation must not affect them
• Only the owner can modify/delete the information if
she likes.
7. Rushdi Shams, Dept of CSE, KUET 7
File Naming
When a process creates a file, it gives a file name
When the process terminates, the file continues to
exist and can be accessed by other processes using its
name.
Some file systems distinguish between upper and
lower case letters, whereas others do not.
Are the file names cat.doc, cAt.doc, caT.doc and
CAT.doc same in windows? What about in UNIX?
8. Rushdi Shams, Dept of CSE, KUET 8
File Naming
Many OS support two-part file names- two parts
separated with a period (.).
The part after the period is called file extension.
Filename extensions can be considered a type of
metadata.
They are commonly used to infer information about
the way data might be stored in the file.
9. Rushdi Shams, Dept of CSE, KUET 9
File Structure
Generally, there are three kinds of files-
1. Byte Sequence
2. Record Sequence
3. Tree Sequence
10. Rushdi Shams, Dept of CSE, KUET 10
File Types
Generally, there are two
types of files-
1. ASCII files
2. Binary files
ASCII files are easy to
understand if you use a text
editor whereas binary files
are completely glibberish if
you print them
11. Rushdi Shams, Dept of CSE, KUET 11
File Access Strategies
Sequential access
read all bytes/records from the beginning
cannot jump around, could rewind or back up
Random access
bytes/records read in any order
essential for data base systems
read can be …
move file marker (seek), then read or …
read and then move file marker
12. Rushdi Shams, Dept of CSE, KUET 12
File Access Strategies
There are also several file usage patterns.
Most files are small (e.g., .login and .c files), and most
file references are too small files.
Large files use up most of the disk space (e.g., mp3
files).
Large files account for most of the bytes transferred
between memory and disk.
13. Rushdi Shams, Dept of CSE, KUET 13
File Access Strategies
These usage patterns are bad news for file system
designers.
To achieve high performance, a designer needs to
make sure that small files are accessed efficiently,
since there are many of them, and they are used
frequently.
A designer also needs to make sure that large files are
accessed efficiently, since they consume most of the
disk space, and account for most of the data
movement.
14. Rushdi Shams, Dept of CSE, KUET 14
Directories
To keep track of files, file systems normally have
directories or folders
In many systems directories themselves are files!
Simply put, there are three types of directory
systems-
1. Single-level directory systems
2. Two-level directory systems
3. Hierarchical directory systems
15. Rushdi Shams, Dept of CSE, KUET 15
Single-level directory system
Simplest form of directory
system
One directory contains all the
files
Sometimes called root directory
Good choice when number of
user is only one
The directory in figure has two
owners- A and B having four
files
Problem- different users may
accidentally use same names for
their files
16. Rushdi Shams, Dept of CSE, KUET 16
Two-level directory system
Each user will have
separate directories
containing their owned
files
The problem with
naming is resolved.
Log in procedure is
required
May allow one user to
access others’ files
17. Rushdi Shams, Dept of CSE, KUET 17
Hierarchical Directory Systems
The problem of two-level
directory system is the
absence of grouping facility
You may group your works
like- games in one place,
movies in the other.
Hierarchical directory
systems have the facility of
two-level directory systems
plus the organization facility
18. Rushdi Shams, Dept of CSE, KUET 18
File System Layout
File systems are stored on disks
Disks are divided up into one or more partitions
Each partition has independent file systems
Sector 0 of the disk is called Master Boot Record
(MBR)
Computer uses MBR to boot itself
The end of MBR contains the partition table- that has
the start and end address of each partition
19. Rushdi Shams, Dept of CSE, KUET 19
File System Layout
One of the partitions in the partition table is marked
as active
When computer is booted, the BIOS reads in and
executes MBR
The first thing MBR program does is to locate the
active partition
The first block of this active partition is Boot Block.
MBR reads and executes it.
The program in Boot Block loads the OS contained in
that partition
20. Rushdi Shams, Dept of CSE, KUET 20
File System Layout
Every partition starts with a Boot Block
But only the partition having the OS will be marked
as active
Other partitions hold the Boot Block as you can
change your mind and copy another version of the OS
into one of them
22. Rushdi Shams, Dept of CSE, KUET 22
File System Layout
Super Block contains all the key parameters about the file
system
It is read into memory when the computer is booted or the file
system is first touched
Typically holds a Magic Number to identify the file system type
(.exe or .bmp?), number of blocks, etc
23. Rushdi Shams, Dept of CSE, KUET 23
File System Layout
Free space management reveals the free blocks in the file
system
i-nodes is an array of data structures, one per file, simply telling
about the file
Root directory contains the top of the file system tree
Remainder of the disk contains all other directory and files for
that partition
24. Rushdi Shams, Dept of CSE, KUET 24
Implementing Files:
Contiguous Allocation
Simplest allocation scheme to store each file as a
contiguous run of disk blocks
Disk with 1 KB blocks, a 50 KB file would need 50
consecutive blocks; Disk with 2 KB blocks would
make it okay with 25 consecutive blocks
26. Rushdi Shams, Dept of CSE, KUET 26
Implementing Files:
Contiguous Allocation
Advantages
Simple to implement
You only need to know the disk address of the first
block and the distance of the file block from it
Read performance is excellent, as you need only two
seek operations (boot block and file block) and one
read operation (one contiguous stream of bytes)
Disadvantages
Disks become fragmented
Wastage of storage is possible
27. Rushdi Shams, Dept of CSE, KUET 27
Implementing Files:
Linked List Allocation
Every block will have two sections- a pointer to next
one (the first word of the block) and data (the rest of
the words)
Unlike contiguous allocation, every disk block can be
used in this method
No space is lost due to disk fragmentation
28. Rushdi Shams, Dept of CSE, KUET 28
Implementing Files:
Linked List Allocation
Reading a file sequentially is straight forward but
random access is slow.
To get block n, the OS has to start at the beginning
and read the n-1 blocks prior to it
Overhead due to pointer information
29. Rushdi Shams, Dept of CSE, KUET 29
Implementing Files:
Linked List Allocation
30. Rushdi Shams, Dept of CSE, KUET 30
Linked List Allocation:
using Table in Memory
The disadvantages are eliminated by taking the
pointer word from each block and putting it into a
table in memory
Such a table in main memory is called FAT (File
Allocation Table)
31. Rushdi Shams, Dept of CSE, KUET 31
Linked List Allocation:
using Table in Memory
32. Rushdi Shams, Dept of CSE, KUET 32
Linked List Allocation:
using Table in Memory
Entire block is available for data (no pointer
information)
Faster random access
The primary disadvantage-
the table must be in memory all the time to make it work
a 20 GB disk and with 1 KB block size, the table needs 20
million entries one for each of 20 million blocks
each entry is 4 bytes long
so, FAT will occupy 80 MB space in memory all the time
33. Rushdi Shams, Dept of CSE, KUET 33
i-nodes
It is a data structure that lists the attributes and disk
addresses of the file’s blocks
With i-nodes, it is possible to find all the blocks of a
file
i-nodes need only be in memory when the
corresponding file is open
If each i-node contains n-bytes and there are k-files
are opened at a time, that instant, kn-bytes are
reserved in memory
35. Rushdi Shams, Dept of CSE, KUET 35
i-nodes
This array is usually far smaller than the space
occupied by the FAT
Table for holding the linked list is proportional to
disk itself.
If the disk has n blocks, the table needs n-entries
As the disks grow, the table grows linearly with them
i-node requires an array whose size is proportional to
the maximum number of files that may be open at
once (it does not matter if you have 1 petabyte HDD
)
36. Rushdi Shams, Dept of CSE, KUET 36
i-nodes
The disadvantage is if you fix the size of i-node and
your files have a tendency to grow larger (obviously
you cannot say your file will be always 6MB in size )