SlideShare una empresa de Scribd logo
1 de 130
Damian Gordon
 BELIEVE IT OR NOT…
 From the computer’s point of view, there is
no such thing as a file.
 It is only because the operating system is
creating the illusion of a file that they exist
 From the computer’s point of view, there is
only blocks of memory, either allocated or
unallocated.
Damian’s
 The File Manager (or File Management
System) is the manager in the Operating
System that creates the illusion that there are
files and folders being stored in computer
memory.
Operating System Files and
Folders
Memory
LocationsHardware
 The File Manager
◦ Keeps track of where files are stored
◦ Determines how the files are stored
◦ Follows operating system file allocation policies
◦ Uses available storage space efficiently for files
◦ Creates a record/log of all file usage
◦ Allocates a file to a user if is free, and if they are
permitted access to it.
◦ De-allocates file when user finished with it.
 The file manager ALLOCATES a file by reading
it from the hard disk and loading it into
memory while updating its record of who is
using what file.
 The file manager DEALLOCATES a file by
updating the file tables and rewriting the file
(if changed) to the hard disk. Any processes
waiting to access the file will be notified.
 Some definitions:
◦ A FIELD is a collection of bytes that can be
identified by a user, and has a type and size.
◦ A RECORD is a collection of related FIELDS.
◦ A FILE is a collection of records.
◦ A DIRECTORY (or FOLDER) is a special type of file
that which has lists of files and their attributes.
 Typical things you can do with a file are:
◦ CREATE
◦ OPEN
◦ DELETE
◦ RENAME
◦ COPY
◦ etc.
 The name of a file is usually in two parts:
 The name of a file is usually in two parts:
◦ MakeABackup.bat
 The name of a file is usually in two parts:
◦ MakeABackup.bat
Filename
 The name of a file is usually in two parts:
◦ MakeABackup.bat
Filename extension
.avi Microsoft Video for Windows movie
.dbf dbase II, III, IV data file
.doc(x) Microsoft Word for Windows
.gif Graphics Interchange Format
.htm Hypertext Markup Language (common web page file)
.html Hypertext Markup Language (common web page file)
.jpg JPEG graphic file
.mpg MPEG Video file
.mid MIDI music file
.mov QuickTime movie
.pdf Adobe Portable Document Format file
.ppt(x) PowerPoint file
.psd Photoshop file
.qxd QuarkXPress file
.rm Real Audio/Video streaming file
.rtf Rich Text Format
.tif TIFF graphic file
.txt ASCII text file
.wav Sound file
.xls(x) Excel spreadsheet
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extension
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extensionpath
 The full filename includes path information:
 C:WINDOWSsystem32MakeABackup.bat
Filename extensionpath
 If I am in the following folder:
 C:WINDOWSsystem32BackupFolder
 Then the address of the file is:
 ..MakeABackup.bat
 If I am in the following folder:
 C:WINDOWSsystem32BackupFolder
 Then the address of the file is:
 ..MakeABackup.bat
 The Operating System store files as records in
memory, where many records make up a
single file.
 There are three main ways a file is physically
stored in memory:
◦ Contiguous Storage
◦ Non-contiguous Storage
◦ Indexed Storage
 Contiguous Storage means that records of a
file are stored one after another.
 It is a very simple policy to implement, and
once you have found the start of the file, it’s
very easy to find the rest of it.
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
 The problem with is that if you have expand
the file, you either need to have free space
allocated at the end, or copy the whole file to
a different location on the disk that has
enough space.
 Non-contiguous Storage means that records
of a file are stored where ever there is free
space.
 The file manager will try to put as much of it
together as possible, but there will be other
part spread out over the disk.
 These extra bits are sometimes called extents
and these are linked together with pointers.
 This means there is no easy way to determine
the exact location of a record in a file.
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
a b c d e f g h
 Indexed Storage means that as well as the
records in the file, an index block is created,
with pointers to each individual file.
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
Without an INDEX BLOCK,
how do I find file 2?
v w x y za b c d e f g h
Without an INDEX BLOCK,
how do I find file 2?
We do a sequential search.
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
v w x y za b c d e f g h
So how does it work with
an INDEX BLOCK?
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
v w x y za b c d e f g h
File Address Size Next
File 1 1 4 9
File 1 9 4 -
File 2 15 5 -
INDEX BLOCK:
 This support both sequential and direct
access to records, and for larger files there
can be multiple indexes.
 The Access Control Matrix shows the access
that each user has for each file on the
system. The possible accesses are:
◦ R: Read
◦ W: Write
◦ E: Execute
◦ D:Delete
User
1
User
2
User
3
User
4
User
5
File 1 RWED --E- --E- RWED R---
File 2 ---- R-E- R-E- R--- RWE-
File 3 R-E- RW-- R-E- R-E- R--D
File 4 R--- RWE- R--- RWED --E-
Mary Anne Tom Bob Lyn
Word.
exe
RWED --E- --E- RWED R-E-
Lect1.
ppt
---- R-E- R-E- R--- RWE-
Scan.
Exe
R-E- RW-- R-E- R-E- R-ED
Chrome.
exe
R-E- RWE- R-E- RWED --E-
 In DOS the Access Controls are:
◦ R: Read
◦ W: Write
◦ C: Change
◦ F: Full Control
 In DOS access to a file can assigned to one of
two groups:
 User
 User Group
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls filename arguments
 In DOS if we want to grant permissions to
file, e.g. MakeABackup.bat, we do:
 cacls filename [/T] [/M] [/L] [/S[:SDDL]] [/E]
[/C] [/G user:?] [/R user [...]] [/P user:? [...]]
[/D user [...]]
 In DOS cacls works as follows:
Argument Description
filename Display access control lists (ACLs) of file
/T Changes ACLs of specified files in the
current directory and all subdirectories.
/M Changes ACLs of volumes mounted to a
directory.
/L Work on the Symbolic Link itself versus the
target.
/S Displays the SDDL string for the DACL.
/S:SDDL Replaces the ACLs with those specified in
the SDDL string (not valid with /E, /G, /R,
/P, or /D).
 In DOS cacls works as follows:
Argument Description
/E Edit ACL instead of replacing it.
/C Continue on access denied errors.
/G user:? Grant specified user access rights.
? can be: R, W, C, or F
/R user Revoke specified user's access rights (only
valid with /E).
/P user:? Replace specified user's access rights.
? can be: R, W, C, or F
/D user Deny specified user access.
 Add Read-Only permission to a single file
CACLS MakeABackup.bat /E /G "Power Users":R
 Add Full Control permission to a second group of users
CACLS MakeABackup.bat /E /G "FinanceUsers":F
 Now revoke the Read permissions from the first group
CACLS MakeABackup.bat /E /R "Power Users"
 Now give the first group Full Control
CACLS MakeABackup.bat /E /G "Power Users":F
 Give Finance group Full Control of folder and all sub-folders
CACLS c:docswork /E /T /C /G "FinanceUsers":F
 In Linux/Unix the Access Controls are:
◦ R: Read
◦ W: Write
◦ X: Execute
 In Linux/Unix access to a file can assigned to
one of three groups:
 User
 User Group
 World
 In Linux/Unix access to a file can assigned to
one of three groups:
 User -you
 User Group – everyone in your group
 World – everyone with a login to the system
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
 User User Group World
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
-111111111
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxr-xr-x
-111101101
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwx--x--x
-101001001
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxrwxrwx
-111111111
- 7 7 7
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwxr-xr-x
-111101101
- 7 5 5
 In Linux/Unix access to a file can assigned to
one of three groups:
 -rwx--x--x
-111001001
- 7 1 1
 If we want to grant permissions to file, e.g.
MakeABackup.bat, we do:
 chmod 755 MakeABackup.sh
 chmod 777 MakeABackup.sh
 chmod 700 MakeABackup.sh
 In Linux/Unix, access to a file can assigned to
one of three groups:
 -rwxrwxrwx
 User User Group World
 In Linux/Unix, access to a folder/directory
can assigned to one of three groups:
 drwxrwxrwx
 User User Group World
Operating Systems -  File Management

Más contenido relacionado

La actualidad más candente

File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systemsvampugani
 
File system Os
File system OsFile system Os
File system OsNehal Naik
 
File system.
File system.File system.
File system.elyza12
 
file system in operating system
file system in operating systemfile system in operating system
file system in operating systemtittuajay
 
File management
File managementFile management
File managementMohd Arif
 
Storage devices and media
Storage devices and mediaStorage devices and media
Storage devices and mediaAnjan Mahanta
 
Defragmentation.46
Defragmentation.46Defragmentation.46
Defragmentation.46myrajendra
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recoverydhawal mehta
 

La actualidad más candente (20)

File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
File system Os
File system OsFile system Os
File system Os
 
Opetating System Memory management
Opetating System Memory managementOpetating System Memory management
Opetating System Memory management
 
File system.
File system.File system.
File system.
 
file system in operating system
file system in operating systemfile system in operating system
file system in operating system
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Hard drive partitions
Hard drive partitionsHard drive partitions
Hard drive partitions
 
File management
File managementFile management
File management
 
Disk Management
Disk ManagementDisk Management
Disk Management
 
Disk formatting
Disk formattingDisk formatting
Disk formatting
 
Storage devices and media
Storage devices and mediaStorage devices and media
Storage devices and media
 
File system structure
File system structureFile system structure
File system structure
 
Defragmentation.46
Defragmentation.46Defragmentation.46
Defragmentation.46
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
Disk management
Disk managementDisk management
Disk management
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
File management
File managementFile management
File management
 
operating system structure
operating system structureoperating system structure
operating system structure
 

Destacado

Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformBasis Technology
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Shuvo Sarker
 
July132000
July132000July132000
July132000CTIN
 
G Infomgnt
G InfomgntG Infomgnt
G InfomgntCTIN
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7RIAH ENCARNACION
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations ToolsMandy Jenkins
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolBrent Muir
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Mark Matienzo
 

Destacado (20)

IO Management
IO ManagementIO Management
IO Management
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
 
July132000
July132000July132000
July132000
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
Windows 7-cheat-sheet
Windows 7-cheat-sheetWindows 7-cheat-sheet
Windows 7-cheat-sheet
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
NTFS Forensics
NTFS Forensics NTFS Forensics
NTFS Forensics
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
 
Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Citrix
CitrixCitrix
Citrix
 

Similar a Operating Systems - File Management

Managing your data - Introduction to Linux for bioinformatics
Managing your data - Introduction to Linux for bioinformaticsManaging your data - Introduction to Linux for bioinformatics
Managing your data - Introduction to Linux for bioinformaticsBITS
 
Management file and directory in linux
Management file and directory in linuxManagement file and directory in linux
Management file and directory in linuxZkre Saleh
 
Devops for beginners
Devops for beginnersDevops for beginners
Devops for beginnersVivek Parihar
 
Command Line Tools
Command Line ToolsCommand Line Tools
Command Line ToolsDavid Harris
 
Unix Basics 04sp
Unix Basics 04spUnix Basics 04sp
Unix Basics 04spDr.Ravi
 
BITS: Introduction to Linux - Software installation the graphical and the co...
BITS: Introduction to Linux -  Software installation the graphical and the co...BITS: Introduction to Linux -  Software installation the graphical and the co...
BITS: Introduction to Linux - Software installation the graphical and the co...BITS
 
Root file system for embedded systems
Root file system for embedded systemsRoot file system for embedded systems
Root file system for embedded systemsalok pal
 
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application SoftwareLove Steven
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 

Similar a Operating Systems - File Management (20)

File Management System in Shell Script.pptx
File Management System in Shell Script.pptxFile Management System in Shell Script.pptx
File Management System in Shell Script.pptx
 
00-Review of Linux Basics
00-Review of Linux Basics00-Review of Linux Basics
00-Review of Linux Basics
 
Managing your data - Introduction to Linux for bioinformatics
Managing your data - Introduction to Linux for bioinformaticsManaging your data - Introduction to Linux for bioinformatics
Managing your data - Introduction to Linux for bioinformatics
 
Divya
DivyaDivya
Divya
 
Divya
DivyaDivya
Divya
 
Edubooktraining
EdubooktrainingEdubooktraining
Edubooktraining
 
Unix Administration
Unix AdministrationUnix Administration
Unix Administration
 
Management file and directory in linux
Management file and directory in linuxManagement file and directory in linux
Management file and directory in linux
 
Devops for beginners
Devops for beginnersDevops for beginners
Devops for beginners
 
Command Line Tools
Command Line ToolsCommand Line Tools
Command Line Tools
 
Unix Basics 04sp
Unix Basics 04spUnix Basics 04sp
Unix Basics 04sp
 
BITS: Introduction to Linux - Software installation the graphical and the co...
BITS: Introduction to Linux -  Software installation the graphical and the co...BITS: Introduction to Linux -  Software installation the graphical and the co...
BITS: Introduction to Linux - Software installation the graphical and the co...
 
Root file system for embedded systems
Root file system for embedded systemsRoot file system for embedded systems
Root file system for embedded systems
 
File system discovery
File system discovery File system discovery
File system discovery
 
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
 
Information and Communications Technology (ICT) General Application Software
 Information and Communications Technology (ICT)  General Application Software Information and Communications Technology (ICT)  General Application Software
Information and Communications Technology (ICT) General Application Software
 
Sahul
SahulSahul
Sahul
 
Sahul
SahulSahul
Sahul
 
Unix Administration 4
Unix Administration 4Unix Administration 4
Unix Administration 4
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 

Más de Damian T. Gordon

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Damian T. Gordon
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to MicroservicesDamian T. Gordon
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud ComputingDamian T. Gordon
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSDamian T. Gordon
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOTDamian T. Gordon
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricDamian T. Gordon
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDamian T. Gordon
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSUREDamian T. Gordon
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDamian T. Gordon
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDamian T. Gordon
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDamian T. Gordon
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsDamian T. Gordon
 

Más de Damian T. Gordon (20)

Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.Universal Design for Learning, Co-Designing with Students.
Universal Design for Learning, Co-Designing with Students.
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
REST and RESTful Services
REST and RESTful ServicesREST and RESTful Services
REST and RESTful Services
 
Serverless Computing
Serverless ComputingServerless Computing
Serverless Computing
 
Cloud Identity Management
Cloud Identity ManagementCloud Identity Management
Cloud Identity Management
 
Containers and Docker
Containers and DockerContainers and Docker
Containers and Docker
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Introduction to ChatGPT
Introduction to ChatGPTIntroduction to ChatGPT
Introduction to ChatGPT
 
How to Argue Logically
How to Argue LogicallyHow to Argue Logically
How to Argue Logically
 
Evaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONSEvaluating Teaching: SECTIONS
Evaluating Teaching: SECTIONS
 
Evaluating Teaching: MERLOT
Evaluating Teaching: MERLOTEvaluating Teaching: MERLOT
Evaluating Teaching: MERLOT
 
Evaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson RubricEvaluating Teaching: Anstey and Watson Rubric
Evaluating Teaching: Anstey and Watson Rubric
 
Evaluating Teaching: LORI
Evaluating Teaching: LORIEvaluating Teaching: LORI
Evaluating Teaching: LORI
 
Designing Teaching: Pause Procedure
Designing Teaching: Pause ProcedureDesigning Teaching: Pause Procedure
Designing Teaching: Pause Procedure
 
Designing Teaching: ADDIE
Designing Teaching: ADDIEDesigning Teaching: ADDIE
Designing Teaching: ADDIE
 
Designing Teaching: ASSURE
Designing Teaching: ASSUREDesigning Teaching: ASSURE
Designing Teaching: ASSURE
 
Designing Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning TypesDesigning Teaching: Laurilliard's Learning Types
Designing Teaching: Laurilliard's Learning Types
 
Designing Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of InstructionDesigning Teaching: Gagne's Nine Events of Instruction
Designing Teaching: Gagne's Nine Events of Instruction
 
Designing Teaching: Elaboration Theory
Designing Teaching: Elaboration TheoryDesigning Teaching: Elaboration Theory
Designing Teaching: Elaboration Theory
 
Universally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some ConsiderationsUniversally Designed Learning Spaces: Some Considerations
Universally Designed Learning Spaces: Some Considerations
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 

Operating Systems - File Management

  • 2.
  • 3.  BELIEVE IT OR NOT…  From the computer’s point of view, there is no such thing as a file.  It is only because the operating system is creating the illusion of a file that they exist  From the computer’s point of view, there is only blocks of memory, either allocated or unallocated. Damian’s
  • 4.  The File Manager (or File Management System) is the manager in the Operating System that creates the illusion that there are files and folders being stored in computer memory. Operating System Files and Folders Memory LocationsHardware
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.  The File Manager ◦ Keeps track of where files are stored ◦ Determines how the files are stored ◦ Follows operating system file allocation policies ◦ Uses available storage space efficiently for files ◦ Creates a record/log of all file usage ◦ Allocates a file to a user if is free, and if they are permitted access to it. ◦ De-allocates file when user finished with it.
  • 17.  The file manager ALLOCATES a file by reading it from the hard disk and loading it into memory while updating its record of who is using what file.  The file manager DEALLOCATES a file by updating the file tables and rewriting the file (if changed) to the hard disk. Any processes waiting to access the file will be notified.
  • 18.  Some definitions: ◦ A FIELD is a collection of bytes that can be identified by a user, and has a type and size. ◦ A RECORD is a collection of related FIELDS. ◦ A FILE is a collection of records. ◦ A DIRECTORY (or FOLDER) is a special type of file that which has lists of files and their attributes.
  • 19.  Typical things you can do with a file are: ◦ CREATE ◦ OPEN ◦ DELETE ◦ RENAME ◦ COPY ◦ etc.
  • 20.  The name of a file is usually in two parts:
  • 21.  The name of a file is usually in two parts: ◦ MakeABackup.bat
  • 22.  The name of a file is usually in two parts: ◦ MakeABackup.bat Filename
  • 23.  The name of a file is usually in two parts: ◦ MakeABackup.bat Filename extension
  • 24. .avi Microsoft Video for Windows movie .dbf dbase II, III, IV data file .doc(x) Microsoft Word for Windows .gif Graphics Interchange Format .htm Hypertext Markup Language (common web page file) .html Hypertext Markup Language (common web page file) .jpg JPEG graphic file .mpg MPEG Video file .mid MIDI music file .mov QuickTime movie
  • 25. .pdf Adobe Portable Document Format file .ppt(x) PowerPoint file .psd Photoshop file .qxd QuarkXPress file .rm Real Audio/Video streaming file .rtf Rich Text Format .tif TIFF graphic file .txt ASCII text file .wav Sound file .xls(x) Excel spreadsheet
  • 26.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extension
  • 27.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extensionpath
  • 28.  The full filename includes path information:  C:WINDOWSsystem32MakeABackup.bat Filename extensionpath
  • 29.  If I am in the following folder:  C:WINDOWSsystem32BackupFolder  Then the address of the file is:  ..MakeABackup.bat
  • 30.  If I am in the following folder:  C:WINDOWSsystem32BackupFolder  Then the address of the file is:  ..MakeABackup.bat
  • 31.  The Operating System store files as records in memory, where many records make up a single file.  There are three main ways a file is physically stored in memory: ◦ Contiguous Storage ◦ Non-contiguous Storage ◦ Indexed Storage
  • 32.
  • 33.  Contiguous Storage means that records of a file are stored one after another.  It is a very simple policy to implement, and once you have found the start of the file, it’s very easy to find the rest of it.
  • 34.
  • 35. a b c d e f g h
  • 36. a b c d e f g h
  • 37. a b c d e f g h
  • 38. a b c d e f g h
  • 39. a b c d e f g h
  • 40. a b c d e f g h
  • 41. a b c d e f g h
  • 42. a b c d e f g h
  • 43. a b c d e f g h
  • 44. a b c d e f g h
  • 45. a b c d e f g h
  • 46. a b c d e f g h
  • 47.  The problem with is that if you have expand the file, you either need to have free space allocated at the end, or copy the whole file to a different location on the disk that has enough space.
  • 48.  Non-contiguous Storage means that records of a file are stored where ever there is free space.  The file manager will try to put as much of it together as possible, but there will be other part spread out over the disk.  These extra bits are sometimes called extents and these are linked together with pointers.  This means there is no easy way to determine the exact location of a record in a file.
  • 49. a b c d e f g h
  • 50. a b c d e f g h
  • 51. a b c d e f g h
  • 52. a b c d e f g h
  • 53. a b c d e f g h
  • 54. a b c d e f g h
  • 55. a b c d e f g h
  • 56. a b c d e f g h
  • 57. a b c d e f g h
  • 58.  Indexed Storage means that as well as the records in the file, an index block is created, with pointers to each individual file.
  • 59. v w x y za b c d e f g h
  • 60. v w x y za b c d e f g h
  • 61. v w x y za b c d e f g h
  • 62. v w x y za b c d e f g h
  • 63. v w x y za b c d e f g h Without an INDEX BLOCK, how do I find file 2?
  • 64. v w x y za b c d e f g h Without an INDEX BLOCK, how do I find file 2? We do a sequential search.
  • 65. v w x y za b c d e f g h
  • 66. v w x y za b c d e f g h
  • 67. v w x y za b c d e f g h
  • 68. v w x y za b c d e f g h
  • 69. v w x y za b c d e f g h
  • 70. v w x y za b c d e f g h
  • 71. v w x y za b c d e f g h
  • 72. v w x y za b c d e f g h
  • 73. v w x y za b c d e f g h
  • 74. v w x y za b c d e f g h
  • 75. v w x y za b c d e f g h
  • 76. v w x y za b c d e f g h
  • 77. v w x y za b c d e f g h
  • 78. v w x y za b c d e f g h
  • 79. v w x y za b c d e f g h
  • 80. v w x y za b c d e f g h
  • 81. v w x y za b c d e f g h
  • 82. v w x y za b c d e f g h
  • 83. v w x y za b c d e f g h
  • 84. v w x y za b c d e f g h
  • 85. v w x y za b c d e f g h
  • 86. v w x y za b c d e f g h
  • 87. v w x y za b c d e f g h
  • 88. v w x y za b c d e f g h
  • 89. v w x y za b c d e f g h
  • 90. v w x y za b c d e f g h
  • 91. v w x y za b c d e f g h
  • 92. v w x y za b c d e f g h
  • 93. v w x y za b c d e f g h
  • 94. v w x y za b c d e f g h
  • 95. v w x y za b c d e f g h
  • 96. v w x y za b c d e f g h
  • 97. v w x y za b c d e f g h
  • 98. v w x y za b c d e f g h So how does it work with an INDEX BLOCK?
  • 99. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 100. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 101. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 102. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 103. v w x y za b c d e f g h File Address Size Next File 1 1 4 9 File 1 9 4 - File 2 15 5 - INDEX BLOCK:
  • 104.  This support both sequential and direct access to records, and for larger files there can be multiple indexes.
  • 105.  The Access Control Matrix shows the access that each user has for each file on the system. The possible accesses are: ◦ R: Read ◦ W: Write ◦ E: Execute ◦ D:Delete
  • 106. User 1 User 2 User 3 User 4 User 5 File 1 RWED --E- --E- RWED R--- File 2 ---- R-E- R-E- R--- RWE- File 3 R-E- RW-- R-E- R-E- R--D File 4 R--- RWE- R--- RWED --E-
  • 107. Mary Anne Tom Bob Lyn Word. exe RWED --E- --E- RWED R-E- Lect1. ppt ---- R-E- R-E- R--- RWE- Scan. Exe R-E- RW-- R-E- R-E- R-ED Chrome. exe R-E- RWE- R-E- RWED --E-
  • 108.  In DOS the Access Controls are: ◦ R: Read ◦ W: Write ◦ C: Change ◦ F: Full Control
  • 109.  In DOS access to a file can assigned to one of two groups:  User  User Group
  • 110.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls
  • 111.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls filename arguments
  • 112.  In DOS if we want to grant permissions to file, e.g. MakeABackup.bat, we do:  cacls filename [/T] [/M] [/L] [/S[:SDDL]] [/E] [/C] [/G user:?] [/R user [...]] [/P user:? [...]] [/D user [...]]
  • 113.  In DOS cacls works as follows: Argument Description filename Display access control lists (ACLs) of file /T Changes ACLs of specified files in the current directory and all subdirectories. /M Changes ACLs of volumes mounted to a directory. /L Work on the Symbolic Link itself versus the target. /S Displays the SDDL string for the DACL. /S:SDDL Replaces the ACLs with those specified in the SDDL string (not valid with /E, /G, /R, /P, or /D).
  • 114.  In DOS cacls works as follows: Argument Description /E Edit ACL instead of replacing it. /C Continue on access denied errors. /G user:? Grant specified user access rights. ? can be: R, W, C, or F /R user Revoke specified user's access rights (only valid with /E). /P user:? Replace specified user's access rights. ? can be: R, W, C, or F /D user Deny specified user access.
  • 115.  Add Read-Only permission to a single file CACLS MakeABackup.bat /E /G "Power Users":R  Add Full Control permission to a second group of users CACLS MakeABackup.bat /E /G "FinanceUsers":F  Now revoke the Read permissions from the first group CACLS MakeABackup.bat /E /R "Power Users"
  • 116.  Now give the first group Full Control CACLS MakeABackup.bat /E /G "Power Users":F  Give Finance group Full Control of folder and all sub-folders CACLS c:docswork /E /T /C /G "FinanceUsers":F
  • 117.  In Linux/Unix the Access Controls are: ◦ R: Read ◦ W: Write ◦ X: Execute
  • 118.  In Linux/Unix access to a file can assigned to one of three groups:  User  User Group  World
  • 119.  In Linux/Unix access to a file can assigned to one of three groups:  User -you  User Group – everyone in your group  World – everyone with a login to the system
  • 120.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx  User User Group World
  • 121.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx -111111111
  • 122.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxr-xr-x -111101101
  • 123.  In Linux/Unix access to a file can assigned to one of three groups:  -rwx--x--x -101001001
  • 124.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxrwxrwx -111111111 - 7 7 7
  • 125.  In Linux/Unix access to a file can assigned to one of three groups:  -rwxr-xr-x -111101101 - 7 5 5
  • 126.  In Linux/Unix access to a file can assigned to one of three groups:  -rwx--x--x -111001001 - 7 1 1
  • 127.  If we want to grant permissions to file, e.g. MakeABackup.bat, we do:  chmod 755 MakeABackup.sh  chmod 777 MakeABackup.sh  chmod 700 MakeABackup.sh
  • 128.  In Linux/Unix, access to a file can assigned to one of three groups:  -rwxrwxrwx  User User Group World
  • 129.  In Linux/Unix, access to a folder/directory can assigned to one of three groups:  drwxrwxrwx  User User Group World