COP4610 FINAL

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/135

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

136 Terms

1
New cards

file

a named collection of blocks

2
New cards

file header

associates the file with its disk sectors

3
New cards

what are the four file system components?

storage (disk) management, naming, protection, reliability

4
New cards

storage (disk) management

organizes storage blocks into files

5
New cards

naming

provides file names and directories to users, instead of tracks and sector numbers

6
New cards

protection

keeps information secure from users

7
New cards

reliability

protects information loss due to system crashes

8
New cards

what are the three ways to access a file?

sequential access, random access (direct access), and content based access

9
New cards

sequential access

bytes are accessed in order

10
New cards

random access (direct access)

bytes are accessed in any order

11
New cards

content based access

bytes are accessed according to restraints on byte contents

12
New cards

give example: most files are small, and most references are to small files

e.g. .login and .c files

13
New cards

give example: large files use up most disk space

e.g. mp4 files

14
New cards

bad news for file system designers

large files account for most of the bytes transferred between memory and disk

15
New cards

what are the 6 disk allocation policies?

contiguous, link-list, segment-based, indexed, multilevel indexed, hashed

16
New cards

contiguous allocation

files are stored contigously on disk

17
New cards

what is the process for contiguous allocation?

a) specify the file size

b) search the disk allocation bitmap for consecutive free blocks

18
New cards

what are the pros to contiguous allocation?

  • fast sequential access

  • ease of computing random file locations

19
New cards

what are the cons in contiguous allocation?

  • external fragmentation

  • difficulty in growing files

20
New cards

linked-list allocation

each file contains a pointer to the next block, with a special marker indicating the file’s end

21
New cards

what is linked-list allocation used in?

used in MS-DOS file systems, File Attribute System (FAT)

22
New cards

what is a pro of linked-list allocation?

files can grow dynamically with incremental block allocation

23
New cards

what are 3 cons of linked-list allocation?

  • sequential access may suffer

  • horrible random access performance

  • unreliable due to broken pointers

24
New cards

indexed allocation

uses a preallocated index to directly track file block locations

25
New cards

what is a pro of indexed allocation?

files can grow dynamically with incremental block allocation

26
New cards

what are 3 cons in indexed allocation?

  • sequential access may suffer

  • horrible random access performance

  • unreliable to due broken pointers

27
New cards

segment-based allocation

uses a segment table to allocate multiple contiguous regions of blocks

28
New cards

what is a pro to segment-based allocation?

relaxes the requirement of large contiguous disk regions

29
New cards

what are 2 cons to segment-based allocation?

  • fragmentation is greater than 100%

  • random access is slower compared to pure contiguous allocation

30
New cards

multi-level indexed allocation

some index entries point to index blocks instead of data blocks

31
New cards

single indirect block

contains pointers to data blocks

32
New cards

double indirect block

contains pointers to single indirect blocks

33
New cards

triple indrect block

contains pointers to double indirect blocks

34
New cards

what is a pro to multi-level indexed allocation?

optimized for both small and large files

35
New cards

what are 3 cons to multi-level indexed allocation?

  • requires multiple disk accesses for triple indirect blocks

  • file size is capped by the number of pointers

  • arbitrary file size boundaries between levels

36
New cards

hashed allocation

allocates disk blocks based on a hash of the block content

37
New cards

what are 2 pros to hashed allocation?

  • file blocks with the same content can share the same disk block, saving storage

  • good for backups and archival storage

38
New cards

what is a con to hased allocation?

poor disk performance

39
New cards

i_node

under UNIX, a file header is stored in a data structure

40
New cards

directory

stores a collection of file and/or directories

41
New cards

name collisions

multiple files with the same names

42
New cards

absolute path name

consisting the path from the root directory ‘/’ to the file

43
New cards

path resolution

many levels of directory lookups

44
New cards

what are the 5 different ways to organize a name space?

flat name space, hierarchical name space, relational name space, contextual name space, content-based name space

45
New cards

flat name space

each URL provides a unique name

46
New cards

hierarchical name space

within individual websites

47
New cards

relational name space

can search the internet via search engines

48
New cards

contextual name space

page ranked according to relevance

49
New cards

content-based name space

you can find your information without knowing the exact file names

50
New cards

metadata

data about data
free blocks, directories, file headers, indirect blocks

51
New cards

fsck

file system consistency check and repair when crash occurs

52
New cards

log

a journal that is never erased

53
New cards

what is the two-phase locking process?

  1. acquire all locks

  2. perform updates and release all locks

54
New cards

striping

writes data across multiple drives

i.e. 1st block stored on disk 1, 2nd block stored on disk 2

55
New cards

what are the three characteristics of a transaction?

atomic, serializable, durable

56
New cards

atomic

all operations either happen or they do not (no partial operations)

57
New cards

serialiable

transactions appear to happen one after the other

58
New cards

durable

once a transaction happens, it is recoverable and can survive crashes

59
New cards

how many level of RAID (redundant array of independent disks)?

0-5

60
New cards

raid level 0

striping, no redundancy

61
New cards

striping, no redundancy

uses block-level striping across multiple disks

62
New cards

raid level 0 striping, no redundancy pro and cons

pros: high performance

cons: no redundancy—disk failure results in total data loss

63
New cards

raid level 1

mirrored disks

64
New cards

mirrored disks

each disk has a mirror (duplicate copy)

65
New cards

raid level 1 mirrored disks pros and cons

pros:

  • reliability is doubled (can survive a single disk failure)

  • faster rea access (can read from either copy)

cons:

  • slower write (must write to both disks)

  • expensive and inefficient (requires double the storage)

66
New cards

raid level 2

memory-style ECC - Error Correction Code

67
New cards

memory-style ECC - Error Correction Code

some disks store ECC (error correction code) instead of data

68
New cards

raid level 2 ECC pros and cons

pros:

  • more efficient thatn full mirroring

  • can correct errors, not just detect them

cons:

  • still fairly inefficient compared to other RAID levels

69
New cards

raid level 3

bit-interleaved parity

70
New cards

bit-interleaved parity

used bit-level striping across disks, with one parity disk storing error correction data

71
New cards

raid level 3 bit-interleaved parity pros and cons

pros:

  • more efficient than RAID 1 and 2

cons:

  • the parity disk does not contribute to bandwidth, limiting performance

72
New cards

raid level 4

block-interleaved parity

73
New cards

block-interleaved parity

similar to RAID 3, but data is interleaved in blocks instead of bits

74
New cards

raid level 4 block-interleaved parity pros and cons

pros:

  • more efficient data access than RAID 3

cons:

  • the parity disk can become a bottleneck

  • small writes are inefficient

75
New cards

raid level 5

block-interleaved distributed-parity

76
New cards

block-interleaved distributed-parity

spreads parity data evenly across all disks instead of a single parity disk

77
New cards

raid level 5 block-interleaved distributed-parity

pros:

  • no single parity disk bottleneck

  • all disks contribute to read performance

cons:

  • small writes require 4 I/Os, reducing efficiency

78
New cards

security

policy of authorizing accesses

79
New cards

protection

the actual mechanisms implemented to enforce the specialized policy

80
New cards

access matrix

describes who can do what

81
New cards

access control list (ACL)

security mechanism that stores all permissions for all users with each object

82
New cards

what is the analogy used for access control list (ACL)?

ACLs are like a guard at a door checking a list of people allowed to enter

83
New cards

how does an AC: control access?`

checks if a user’s permission match those stored for an object before granting access

84
New cards

how does UNIX implement access control?

UNIX specifies file permissions based on three categories:

  1. owner (user)

  2. group

  3. world (everyone else)

85
New cards

capability list

stores all the objects that a process can access, defining its permissions

86
New cards

what is a common analogy for a capability list?

keys — having a key means you have the right to access the corresponding object.

87
New cards

In the key analogy for capability lists, what does owning a key represent?

Having the right to access a resource (like an object or memory page).

88
New cards

What is an example of a capability list in operating systems?

Page tables

89
New cards

How do page tables represent a capability list?

Each process has a list of memory pages it is allowed to access.

90
New cards

What are the three main goals of security?

Data confidentiality, data integrity, and system availability.

91
New cards

What is the goal of data confidentiality in security?

Ensuring that secret data remains secret and is not accessed by unauthorized users.

92
New cards

What is the goal of data integrity in security?

Preventing unauthorized users from modifying data.

93
New cards

What does system availability mean in terms of security?

Ensuring that no one can make the system unusable or deny access to legitimate users.

94
New cards

What are the three main components of security?

Authentication, Authorization, and Enforcement.

95
New cards

What is the purpose of authentication in security?

To determine who the user is.

96
New cards

What does authorization do in a security system?

It determines who is allowed to do what.

97
New cards

What is the role of enforcement in security?

It ensures users can only do what they are allowed to do.

98
New cards

In the Kerberos protocol, what does Key(xy) represent?

A shared secret key needed for secure communication between entities x and y.

99
New cards

What is the main benefit of public key encryption?

It separates authentication from secrecy.

100
New cards

What two keys are used in public key encryption?

A public key and a private key.