SlideShare a Scribd company logo
1 of 15
Presentation By: Shehrevar Davierwala
 What is File System?
› The abstraction used by kernel to represent
and organize the storage resources.
 UNIX File System in general
› File system is organized in tree structure.
› File tree can be arbitrarily deep.
› File name must NOT LONGER than 256 chars.
› Single path name must NOT LONGER than
1023 chars.
Presentation By: Shehrevar Davierwala
 Mounting File System
› File tree is composed of File System
› Use mount command to map a directory
within the existing file tree (mount point) to
the root of the new file system.
 mount /dev/hda2 /usr
› Use umount command to detach the file
system.
 Detaching will fail if the file system is busy.
Presentation By: Shehrevar Davierwala
 “The UNIX file system has never been
very well organized.” -- Page 58
› incompatible naming convention
 e.g. ATT & BSD startup script naming
 e.g. log file naming
Presentation By: Shehrevar Davierwala
/ The root directory
/bin or /sbin Commands for basic
system operation
/dev Device entries
/etc Critical startup and
configuration files.
/lib Library for the C
compiler
/tmp Temporary files
/var/adm or /var/log Accounting file, log
files
Presentation By: Shehrevar Davierwala
 Regular Files
› binary
 GIF, JPEG, Executable etc.
› text
 scripts, program source code, documentation
› Supports sequential and random access
Presentation By: Shehrevar Davierwala
 Directory
› Can contain ANY kind of files
› what is “.” and “..”??
 Device File
› Allows programs to communicate with
hardware.
› Kernel modules handles device
management.
Presentation By: Shehrevar Davierwala
 Device Files (cont.)
› Character Device
 Accepts a stream of characters, without
regard to any block structure.
 It is not addressable, therefore no seek
operation
› Block Device
 Information stored in fixed-sized block
 It is addressable, therefore seek operation is
possible.
Presentation By: Shehrevar Davierwala
 UNIX Domain Sockets (BSD)
› sockets that are local to a particular host
and are referenced through a file system
object rather than a network port.
› X windows
 Named Pipe
› Allow processes to communicate with each
other.
Presentation By: Shehrevar Davierwala
 Hard links
› Linking files by reference
› System maintains a count of the number of
links
› Does not work across file systems.
 Soft links
› Linking files by name
› No counter is maintained
› Work across file system
Presentation By: Shehrevar Davierwala
 The Setuid and Setgid bits
› Setuid with octal value 4000
› Setgid with octal value 2000
› These bits allow programs to access files that
processes that would otherwise off limits to
the user that runs them.
Presentation By: Shehrevar Davierwala
 Sticky Bit
› Not very popular in today’s system
› If a directory has sticky bit set, then only the
owner can remove file from the directory.
› /tmp is a good example.
Presentation By: Shehrevar Davierwala
 The Permission Bit
› 9 permission bits used to determine 3 types of
accesses, READ, WRITE, EXECUTE.
› Permission can be set based on GROUP,
OWNER, ANYONE ELSE.
› Use chmod command to change permission
 Binary 001 for EXECUTE
 Binary 010 for WRITE
 Binary 100 for READ
Presentation By: Shehrevar Davierwala
 INODES
› Kernel maintains file information in a structure
called inode.
 Creation, modification time stamps
 Ownership, file size etc.
› Commonly used INODE information can be
found by using ls command
› Group information and be modified by using
chgrp command.
Presentation By: Shehrevar Davierwala
 All UNIX file system are very similar.
 All file system have this concept of file
tree.
› Transparent to user even mount point is
mapped to a remote file system.
 To communicate with devices, special
device files are used.
 More information check out the man
pages.
Presentation By: Shehrevar Davierwala

More Related Content

What's hot

Introduction to-linux
Introduction to-linuxIntroduction to-linux
Introduction to-linuxrowiebornia
 
Linux day 2.ppt
Linux day  2.pptLinux day  2.ppt
Linux day 2.pptKalkey
 
Unix & Linux File System in Operating System
Unix & Linux File System in Operating SystemUnix & Linux File System in Operating System
Unix & Linux File System in Operating SystemMeghaj Mallick
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linuxGourav Varma
 
DSpace Installation
DSpace InstallationDSpace Installation
DSpace InstallationNur Ahammad
 
Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems senthilamul
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentalsDima Gomaa
 
Linux permissions
Linux permissionsLinux permissions
Linux permissionsCelsius A T
 
Linux Getting Started
Linux Getting StartedLinux Getting Started
Linux Getting StartedAngus Li
 
17 Linux Basics #burningkeyboards
17 Linux Basics #burningkeyboards17 Linux Basics #burningkeyboards
17 Linux Basics #burningkeyboardsDenis Ristic
 

What's hot (20)

Introduction to-linux
Introduction to-linuxIntroduction to-linux
Introduction to-linux
 
Linux day 2.ppt
Linux day  2.pptLinux day  2.ppt
Linux day 2.ppt
 
Unix & Linux File System in Operating System
Unix & Linux File System in Operating SystemUnix & Linux File System in Operating System
Unix & Linux File System in Operating System
 
Linux test paper2
Linux test paper2Linux test paper2
Linux test paper2
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
Linux basic
Linux basicLinux basic
Linux basic
 
March 2011 HUG: HDFS Federation
March 2011 HUG: HDFS FederationMarch 2011 HUG: HDFS Federation
March 2011 HUG: HDFS Federation
 
When ACLs Attack
When ACLs AttackWhen ACLs Attack
When ACLs Attack
 
Unix for Librarians
Unix for LibrariansUnix for Librarians
Unix for Librarians
 
Basic Unix
Basic UnixBasic Unix
Basic Unix
 
DSpace Installation
DSpace InstallationDSpace Installation
DSpace Installation
 
Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems
 
Hdfs
HdfsHdfs
Hdfs
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
 
Hadoop Introduction
Hadoop IntroductionHadoop Introduction
Hadoop Introduction
 
Linux permissions
Linux permissionsLinux permissions
Linux permissions
 
Linux Getting Started
Linux Getting StartedLinux Getting Started
Linux Getting Started
 
Linuxppt
LinuxpptLinuxppt
Linuxppt
 
Basics of Linux
Basics of LinuxBasics of Linux
Basics of Linux
 
17 Linux Basics #burningkeyboards
17 Linux Basics #burningkeyboards17 Linux Basics #burningkeyboards
17 Linux Basics #burningkeyboards
 

Viewers also liked

Op Sy 03 Ch 41
Op Sy 03 Ch 41Op Sy 03 Ch 41
Op Sy 03 Ch 41 Google
 
Consistency Without Ordering
Consistency Without OrderingConsistency Without Ordering
Consistency Without Orderingvchidambaram
 
CSC Predicts the Internet
CSC Predicts the InternetCSC Predicts the Internet
CSC Predicts the InternetKathy Lang
 
Unix structure organization
Unix structure organizationUnix structure organization
Unix structure organizationkishan alagiya
 
A fast file system for unix presentation by parang saraf (cs5204 VT)
A fast file system for unix presentation by parang saraf (cs5204 VT)A fast file system for unix presentation by parang saraf (cs5204 VT)
A fast file system for unix presentation by parang saraf (cs5204 VT)Parang Saraf
 

Viewers also liked (8)

Op Sy 03 Ch 41
Op Sy 03 Ch 41Op Sy 03 Ch 41
Op Sy 03 Ch 41
 
Consistency Without Ordering
Consistency Without OrderingConsistency Without Ordering
Consistency Without Ordering
 
Computer
ComputerComputer
Computer
 
CSC Predicts the Internet
CSC Predicts the InternetCSC Predicts the Internet
CSC Predicts the Internet
 
Unix structure organization
Unix structure organizationUnix structure organization
Unix structure organization
 
Fast File System
Fast File SystemFast File System
Fast File System
 
A fast file system for unix presentation by parang saraf (cs5204 VT)
A fast file system for unix presentation by parang saraf (cs5204 VT)A fast file system for unix presentation by parang saraf (cs5204 VT)
A fast file system for unix presentation by parang saraf (cs5204 VT)
 
Unix File System
Unix File SystemUnix File System
Unix File System
 

Similar to Unix intro

Hadoop training institute in bangalore
Hadoop training institute in bangaloreHadoop training institute in bangalore
Hadoop training institute in bangaloreKelly Technologies
 
Hadoop training institute in hyderabad
Hadoop training institute in hyderabadHadoop training institute in hyderabad
Hadoop training institute in hyderabadKelly Technologies
 
DNS Exfiltration and Out-of-bound attacks
DNS Exfiltration and Out-of-bound attacksDNS Exfiltration and Out-of-bound attacks
DNS Exfiltration and Out-of-bound attacksNitesh Shilpkar
 
Distributed File System
Distributed File SystemDistributed File System
Distributed File SystemNtu
 
Hadoop HDFS Architeture and Design
Hadoop HDFS Architeture and DesignHadoop HDFS Architeture and Design
Hadoop HDFS Architeture and Designsudhakara st
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1Lilesh Pathe
 
Dfs (Distributed computing)
Dfs (Distributed computing)Dfs (Distributed computing)
Dfs (Distributed computing)Sri Prasanna
 
Big data with HDFS and Mapreduce
Big data  with HDFS and MapreduceBig data  with HDFS and Mapreduce
Big data with HDFS and Mapreducesenthil0809
 
Network and System Administration Power Point
Network and System Administration Power PointNetwork and System Administration Power Point
Network and System Administration Power Pointkemal678348
 

Similar to Unix intro (20)

Tutorial 2
Tutorial 2Tutorial 2
Tutorial 2
 
Hadoop training institute in bangalore
Hadoop training institute in bangaloreHadoop training institute in bangalore
Hadoop training institute in bangalore
 
Hadoop training institute in hyderabad
Hadoop training institute in hyderabadHadoop training institute in hyderabad
Hadoop training institute in hyderabad
 
prateekporwal
prateekporwalprateekporwal
prateekporwal
 
DNS Exfiltration and Out-of-bound attacks
DNS Exfiltration and Out-of-bound attacksDNS Exfiltration and Out-of-bound attacks
DNS Exfiltration and Out-of-bound attacks
 
Distributed File System
Distributed File SystemDistributed File System
Distributed File System
 
Hadoop HDFS Architeture and Design
Hadoop HDFS Architeture and DesignHadoop HDFS Architeture and Design
Hadoop HDFS Architeture and Design
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Dfs (Distributed computing)
Dfs (Distributed computing)Dfs (Distributed computing)
Dfs (Distributed computing)
 
Big data with HDFS and Mapreduce
Big data  with HDFS and MapreduceBig data  with HDFS and Mapreduce
Big data with HDFS and Mapreduce
 
Hdfs architecture
Hdfs architectureHdfs architecture
Hdfs architecture
 
Linux remote
Linux remoteLinux remote
Linux remote
 
Bootcamp linux commands
Bootcamp linux commandsBootcamp linux commands
Bootcamp linux commands
 
Linux.pdf
Linux.pdfLinux.pdf
Linux.pdf
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Network and System Administration Power Point
Network and System Administration Power PointNetwork and System Administration Power Point
Network and System Administration Power Point
 

More from Shehrevar Davierwala

More from Shehrevar Davierwala (20)

Introduction_Swift
Introduction_SwiftIntroduction_Swift
Introduction_Swift
 
PsudoCode.pptx
PsudoCode.pptxPsudoCode.pptx
PsudoCode.pptx
 
Number System.pptx
Number System.pptxNumber System.pptx
Number System.pptx
 
Java Script (Module 1).pptx
Java Script (Module 1).pptxJava Script (Module 1).pptx
Java Script (Module 1).pptx
 
Website in Clicks Day 2
Website in Clicks Day 2Website in Clicks Day 2
Website in Clicks Day 2
 
Develop Website in Clicks
Develop Website in ClicksDevelop Website in Clicks
Develop Website in Clicks
 
Build Virtual Assistant Using AI
Build Virtual Assistant Using AI Build Virtual Assistant Using AI
Build Virtual Assistant Using AI
 
Build brand reputation using facebook
Build brand reputation using facebookBuild brand reputation using facebook
Build brand reputation using facebook
 
Digital Marketing Session 2
Digital Marketing Session 2Digital Marketing Session 2
Digital Marketing Session 2
 
Learn Digital Marketing : 0 to Hero Day 1
Learn Digital Marketing :  0 to Hero Day 1 Learn Digital Marketing :  0 to Hero Day 1
Learn Digital Marketing : 0 to Hero Day 1
 
Standard template
Standard templateStandard template
Standard template
 
Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective  Digital Marketing for Sustainable Business - Afghan Perspective
Digital Marketing for Sustainable Business - Afghan Perspective
 
Developing stunning website in clicks - 2
Developing stunning website in clicks - 2Developing stunning website in clicks - 2
Developing stunning website in clicks - 2
 
Developing stunning website in clicks
Developing stunning website in clicksDeveloping stunning website in clicks
Developing stunning website in clicks
 
Google forms for data analysis
Google forms for data analysisGoogle forms for data analysis
Google forms for data analysis
 
Webdesign session1
Webdesign session1Webdesign session1
Webdesign session1
 
Tech talk webtech
Tech talk webtechTech talk webtech
Tech talk webtech
 
Tech talk php_cms
Tech talk php_cmsTech talk php_cms
Tech talk php_cms
 
Ph pbasics
Ph pbasicsPh pbasics
Ph pbasics
 
Php mysql
Php mysqlPhp mysql
Php mysql
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Unix intro

  • 2.  What is File System? › The abstraction used by kernel to represent and organize the storage resources.  UNIX File System in general › File system is organized in tree structure. › File tree can be arbitrarily deep. › File name must NOT LONGER than 256 chars. › Single path name must NOT LONGER than 1023 chars. Presentation By: Shehrevar Davierwala
  • 3.  Mounting File System › File tree is composed of File System › Use mount command to map a directory within the existing file tree (mount point) to the root of the new file system.  mount /dev/hda2 /usr › Use umount command to detach the file system.  Detaching will fail if the file system is busy. Presentation By: Shehrevar Davierwala
  • 4.  “The UNIX file system has never been very well organized.” -- Page 58 › incompatible naming convention  e.g. ATT & BSD startup script naming  e.g. log file naming Presentation By: Shehrevar Davierwala
  • 5. / The root directory /bin or /sbin Commands for basic system operation /dev Device entries /etc Critical startup and configuration files. /lib Library for the C compiler /tmp Temporary files /var/adm or /var/log Accounting file, log files Presentation By: Shehrevar Davierwala
  • 6.  Regular Files › binary  GIF, JPEG, Executable etc. › text  scripts, program source code, documentation › Supports sequential and random access Presentation By: Shehrevar Davierwala
  • 7.  Directory › Can contain ANY kind of files › what is “.” and “..”??  Device File › Allows programs to communicate with hardware. › Kernel modules handles device management. Presentation By: Shehrevar Davierwala
  • 8.  Device Files (cont.) › Character Device  Accepts a stream of characters, without regard to any block structure.  It is not addressable, therefore no seek operation › Block Device  Information stored in fixed-sized block  It is addressable, therefore seek operation is possible. Presentation By: Shehrevar Davierwala
  • 9.  UNIX Domain Sockets (BSD) › sockets that are local to a particular host and are referenced through a file system object rather than a network port. › X windows  Named Pipe › Allow processes to communicate with each other. Presentation By: Shehrevar Davierwala
  • 10.  Hard links › Linking files by reference › System maintains a count of the number of links › Does not work across file systems.  Soft links › Linking files by name › No counter is maintained › Work across file system Presentation By: Shehrevar Davierwala
  • 11.  The Setuid and Setgid bits › Setuid with octal value 4000 › Setgid with octal value 2000 › These bits allow programs to access files that processes that would otherwise off limits to the user that runs them. Presentation By: Shehrevar Davierwala
  • 12.  Sticky Bit › Not very popular in today’s system › If a directory has sticky bit set, then only the owner can remove file from the directory. › /tmp is a good example. Presentation By: Shehrevar Davierwala
  • 13.  The Permission Bit › 9 permission bits used to determine 3 types of accesses, READ, WRITE, EXECUTE. › Permission can be set based on GROUP, OWNER, ANYONE ELSE. › Use chmod command to change permission  Binary 001 for EXECUTE  Binary 010 for WRITE  Binary 100 for READ Presentation By: Shehrevar Davierwala
  • 14.  INODES › Kernel maintains file information in a structure called inode.  Creation, modification time stamps  Ownership, file size etc. › Commonly used INODE information can be found by using ls command › Group information and be modified by using chgrp command. Presentation By: Shehrevar Davierwala
  • 15.  All UNIX file system are very similar.  All file system have this concept of file tree. › Transparent to user even mount point is mapped to a remote file system.  To communicate with devices, special device files are used.  More information check out the man pages. Presentation By: Shehrevar Davierwala