Module 6.1 Operating Systems

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

File Concept

Contiguous logical address space

2
New cards
  • Data

    • Numeric

    • Character

    • Binary

  • Program

Enumerate the types of File Concept

3
New cards

Name

only information kept in human-readable form

4
New cards

Identifier

unique tag (number) identifies the file within the file system

5
New cards

Type

needed for systems that support different types

6
New cards

Location

pointer to file location on the device

7
New cards

Size

current file size

8
New cards

Protection

controls who can do the reading, writing, executing

9
New cards

Time, date, and user identification

data for protection, security, and usage monitoring

10
New cards

Directory Structure

Information about files are kept in the ____

11
New cards

Directory Structure

A collection of nodes containing information about all files

12
New cards

DISK

Both the directory structure and the files reside on

13
New cards
  • Create

  • Write

  • Read

  • Reposition within file

  • Delete

  • Truncate

  • Open (Fi)

  • Close (Fi)

Enumerate File Operations

14
New cards

Open Files

Several pieces of data are needed to manage open files:

15
New cards

Open-file table

tracks open files

16
New cards

File pointer

pointer to last read/write location, per process that has the file open

17
New cards

File-open count

counter of number of times a file is open – to allow removal of data from open-file table when last processes closes it

18
New cards

Disk location of the file

cache of data access information

19
New cards

Access rights

per-process access mode information

20
New cards

Open File Locking

Provided by some operating systems and file systems

21
New cards

Shared lock

It is similar to reader lock

22
New cards

Shared lock

several processes can acquire concurrently

23
New cards

Mandatory

access is denied depending on locks held and requested

24
New cards

Advisory

processes can find status of locks and decide what to do

25
New cards

Executable Files - ex, co, bin`

Ready-to-run machine-language program.

26
New cards

Object Files - obj

Compiled, machine language, not linked

27
New cards

Source Code Files

ource code in various languages

28
New cards

Batch Files

Commands to the command interpreter

29
New cards

Text Files

Textual data, documents.

30
New cards

Word Processor Files

Various word-processor formats

31
New cards

Library Files

Libraries of routines for programmers

32
New cards

Print or View Files

ASCII or binary file in a format for printing or viewing.

33
New cards

Archive Files

Related files grouped into one file, sometimes compressed, for archiving or storage

34
New cards

Multimedia Files

Binary file containing audio or A/V information.

35
New cards

None

sequence of words, bytes

36
New cards
  • Lines

  • Fixed length

  • Variable length

Enumerate Simple record structure

37
New cards
  • Formatted document

  • Relocatable load file

Enumerate Complex Structures

38
New cards
  • Sequential Access

  • Direct Access

Types of Access Methods

39
New cards
  • read next

  • write next

  • Reset

  • no read after last write (rewrite)

Enumerate the Operations of Sequential Access

40
New cards

Direct Access

A file is fixed length logical records

41
New cards
  • read n

  • write n

  • position to n

    • read next

    • write next

    • rewrite n

Enumerate operation of Direct Access

42
New cards

Relative block numbers

allow OS to decide where file should be placed

43
New cards

Partitions

Disk can be subdivided into ___

44
New cards

RAID

Disks or partitions can be ____ protected against failure

45
New cards

raw and formatted

Disk or partition can be used _____ without a file system, or _____ with a file system

46
New cards

minidisks, slices

Partitions also known as

47
New cards

volume

Entity containing file system

48
New cards

device directory or volume table of contents

volume containing a file system also tracks that file system’s info

49
New cards

tmpfs

memory-based volatile FS for fast, temporary I/O

50
New cards

objfs

interface into kernel memory to get kernel symbols for debugging

51
New cards

ctfs

contract file system for managing daemons

52
New cards

lofs

loopback file system allows one FS to be accessed in place of another

53
New cards

procfs

kernel interface to process structures

54
New cards

ufs, zfs

general purpose file systems

55
New cards
  • Efficiency

  • Naming

  • Grouping

The directory is organized logically to obtain?

56
New cards

Acyclic-Graph Directories

have shared subdirectories and files

57
New cards

Link

another name (pointer) to an existing file

58
New cards

Resolve the link

follow pointer to locate the file

59
New cards

Garbage collection

How do we guarantee no cycles

60
New cards

True

True or False

A file system must be mounted before it can be accessed

61
New cards

File Sharing

  • Sharing of files on multi-user systems is desirable

  • Sharing may be done through a protection scheme

  • On distributed systems, files may be shared across a network

62
New cards

Network File System (NFS)

common distributed file-sharing method

63
New cards

User IDs

identify users, allowing permissions and protections to be per-user

64
New cards

Group IDs

allow users to be in groups, permitting group access rights

65
New cards

File Sharing – Remote File Systems

Uses networking to allow file system access between systems

66
New cards

Client-server model

allows clients to mount remote file systems from servers

67
New cards

NFS

standard UNIX client-server file sharing protocol

68
New cards

CIFS

standard Windows protocol

69
New cards

True

True or false:

All file systems have failure modes

70
New cards

metadata

corruption of directory structures or other non-user data,

71
New cards

state information

Recovery from failure can involve _______ about status of each remote request

72
New cards

Stateless protocols (NFS v3)

include all information in each request, allowing easy recovery but less security

73
New cards

File Sharing – Consistency Semantics

Specify how multiple users are to access a shared file simultaneously

74
New cards

Andrew File System (AFS)

implemented complex remote file sharing semantics

75
New cards

Unix file system (UFS)

Writes to an open file visible immediately to other users of the same open file and shares file pointer to allow multiple users to read and write concurrently