SlideShare a Scribd company logo
1 of 51
Guide to Operating Systems,
4th
ed.
Chapter 11: Standard Operating and
Maintenance Procedures
Guide to Operating Systems, 4th ed. 2
Objectives
2
• Explain file system maintenance techniques for different
operating systems
• Perform regular file system maintenance by finding and
deleting unused files and directories
• Perform disk maintenance that includes defragmenting,
relocating files and folders, running disk and file repair
utilities, and selecting RAID options
• Explain the types of backups and develop a backup
plan
• Explain how to install software for best performance
• Tune operating systems for optimal performance
Guide to Operating Systems, 4th ed. 3
File System Maintenance
• A well-planned file structure makes it easy to locate
files, update files, share folders and files, back up
and archive files, and delete unwanted files
• Basic rules for creating a file structure:
– Keep a manageable number of directories in the root directory
– Keep OS files in the default directories
– Keep different versions of software in their own directories
– Keep data files in directories on the basis of their functions
– Design home directories to match the functions of users in an
organization
– Group files with similar security needs within the same
directories
Guide to Operating Systems, 4th ed. 4
File System Maintenance
Example directories in the root directory for Windows 7
Guide to Operating Systems, 4th ed. 5
File System Maintenance
• Example root directory structure in UNIX/Linux
includes the following directories:
– bin for files to start the OS
– lib for libraries including settings used by the OS
– usr for users’ files and user programs
– var for files in which the content varies or are used temporarily
– tmp for files used only temporarily
– dev for devices such as keyboard and mouse
– mnt for DVD/CD-ROM drives, and other removable media
– etc for system and config files
– sbin for user programs and utilities (system binary files)
– home for users’s home directories
– proc for system resource tracking
Guide to Operating Systems, 4th ed. 6
File System Maintenance
• Some examples of folders in the root of a Mac OS
X Leopard/Snow Leopard (many same as UNIX):
– Applications – software applications
– bin – same use as in UNIX
– dev – same use as in UNIX
– etc – same use as in UNIX
– home for users’ home directories
– Library for shared library files
– network for network devices, files for servers
– System for system files
– Users for user accounts (containing a subfolder for each account)
– Volumes for mounted volumes including hard disks
Guide to Operating Systems, 4th ed. 7
File System Maintenance
• OS directories are typically placed in the root
directory and have appropriate subdirectories
under a main directory
Guide to Operating Systems, 4th ed. 8
File System Maintenance
• Advantages to installing and leaving OS files in
default directories:
– Easier for others to help with computer problems
– Many software installations expect OS files to be in the default
locations
– Files are more easily found by uninstall programs if it becomes
necessary to uninstall software
• If different versions of software are still used:
– Put different versions in different subdirectories under a main
applications directory
– Example: If Microsoft Word 2007 and 2010 are being used,
create Word2007 and Word2010 subdirectories under the
Program Files directory
Guide to Operating Systems, 4th ed. 9
File System Maintenance
• Some directory structures offer special locations for
data files
• Example:
– Word processing, spreadsheet and database files should be
stored as subdirectories under a root directory called Data
• On a file server, files might be stored on the basis
of directories set up for departments
• Home directories on a server help organize data
based on users
Guide to Operating Systems, 4th ed. 10
Finding and Deleting Files
• A solid file structure makes it easier to find and
delete unneeded files
– Example: temporary files are often created when running some
applications and are sometimes not deleted automatically
• Most temp files are kept in a folder called temp
• Temporary Internet files (cookies) are often not deleted
automatically
• It is good practice to implement a regular schedule
for finding and deleting temporary files
Guide to Operating Systems, 4th ed. 11
Deleting Temporary Files in Windows
• Windows XP/Vista/7, Server 2003/R2, and Server
2008/R2:
– Use the Disk Cleanup Tool to select which files to delete (some
examples are listed below):
• Downloaded program files
• Temporary Internet files
• Recycle Bin
• Setup log files
• System error memory dump files
• Temporary files
– Use search tool to search for and delete all files with .tmp file
extension
– Right-click Recycle Bin on desktop and select Empty Recycle Bin
Guide to Operating Systems, 4th ed. 12
Deleting Temporary Files in Windows
Starting Disk Cleanup in Windows 7
UNIX/Linux
• View UNIX/Linux files by using the ls command
– Some of the options that can be used with this command:
• -a lists all files including hidden files
• -C formats the listing in columns for easier reading
• -d lists directories
• -f displays files in an unsorted list
• -l presents detailed information including permissions and file size
• -r sorts files in reverse alphabetical order
• -s displays the size of files (in blocks)
• -S sorts files and directories on the basis of size
• -t sorts files and directories on the basis of time they were last
modified
– Example: ls –a lists all files including hidden files
Guide to Operating Systems, 4th ed. 13
Guide to Operating Systems, 4th ed. 14
UNIX/Linux
• Linux with GNOME desktop allows you to view files
through a graphical interface
Guide to Operating Systems, 4th ed. 15
UNIX/Linux
• Files and folders are deleted by using the remove
(rm) command
– Options for this command:
• -I for interactive option (asks if you are sure you want to delete)
• -r for recursive (used to delete the entire directory contents)
– Example: rm /home/mjackson/docs *.txt
• This command will delete all files with a .txt extension in the
mjackson directory
• In the Linux GNOME Nautilus tool, you delete a file
by finding the file, click on it and press the delete
key on your keyboard
Guide to Operating Systems, 4th ed. 16
UNIX/Linux
• A file can be found by using the find command
– Options that can be used with this command:
• -atime for last access time
• -ctime for last changed time
• -mtime for last modification time
• -name for the filename, including the use of wildcard searches
• -print to print the results of the find
• -size for file size (in blocks or bytes; with bytes specified by a “c”)
• -user to find files by ownership
• Example: to find a all files in directory/usr that are
owned by the user lpadron:
– find /usr –user lpadron
Guide to Operating Systems, 4th ed. 17
UNIX/Linux
• UNIX/Linux provides commands to help you
assess the allocation of disk space:
– df – enables you to view information on the basis of the file
system
– du – used to display statistics for a given directory and its
subdirectories
• An administrator can set up disk quotas to ensure
users to not occupy all of the disk space
– A disk quota is set by using the edquota command (opens the
quota file for editing)
• The quota file must first be created by the administrator, or in
some versions it is created automatically when you first use
edquota
UNIX/Linux
UNIX/Linux disk quotas for server users
Guide to Operating Systems, 4th ed. 18
Guide to Operating Systems, 4th ed. 19
Mac OS X
• Mac OS X Leopard and Snow Leopard are
generally effective in automatically cleaning out
temporary files
– However, still important to periodically find and delete
unneeded files
Mac OS X
Guide to Operating Systems, 4th ed. 20
Displaying file sizes in Mac OS X Snow
Leopard
Maintaining Disks
• It is important to perform disk maintenance in order
to maintain the integrity of files and ensure disk
performance
• Important disk maintenance tasks include:
– Defragmenting disks
– Moving files to spread the load between multiple disks
– Using disk utilities to find and repair damaged files
– Deploying RAID techniques that extend the life of disks and
provide disk redundancy
Guide to Operating Systems, 4th ed. 21
Guide to Operating Systems, 4th ed. 22
Defragmenting Disks
• Fragmentation – means that unused space
develops between files and other information written
on a disk
• When an OS is first installed, files are placed
contiguously on a disk (little or no unused space
between files)
• As the OS deletes files, creates new files, and
modifies files, the unused space between them grows
and becomes scattered
• The greater the fragmentation, the more space is
wasted
Guide to Operating Systems, 4th ed. 23
Defragmenting Disks
Files located contiguously on a disk
Guide to Operating Systems, 4th ed. 24
Defragmenting Disks
A fragmented disk
Guide to Operating Systems, 4th ed. 25
Defragmenting Disks
• Defragmentation – process of removing empty
pockets between files and other information on a
hard drive
• Two ways to defragment:
– Older method is to take a complete backup of a disk’s contents
and perform a full restore
• Some administrators run a surface analysis of a disk before the
restore to find damaged disk sectors and tracks
– Another option is to run a disk defragmentation tool
• Many OSs come with a built-in defrag tool
• Some can run in the background as you use your computer
• Some perform a quick analysis to see if defrag is even needed
– If disk fragmentation is 20% or less, defrag is not needed
Guide to Operating Systems, 4th ed. 26
Defragmenting Disks
• In UNIX/Linux and Mac OS X, file systems are
designed to reduce the need for defragmenting a
disk
– These OSs first write to a hidden journal, which is loaded to
memory and then contents are written to disk in a linear fashion
• Linear – data is temporarily stored and written all at one time in
more contiguous fashion
• Sequential – data is not stored but written as soon as it is created
and therefore written to whatever disk areas are immediately open
– Defragmentation tools are usually not included with these OSs
– Earlier version of Mac OS had problems with memory
fragmentation
Moving Disk Files to Spread the Load
• A technique that can help extend the life of disk
drives is to spread files evenly across disks
– Usually used in servers
– Before files are moved, administrators examine disk and file
activity to determine how to spread files to achieve even
loading
– Disk activity is monitored in Windows using Performance
Monitor
– Resources in use can be viewed with the Computer
Management tool in Windows
Guide to Operating Systems, 4th ed. 27
Guide to Operating Systems, 4th ed. 28
Moving Disk Files to Spread the Load
Studying resource use in Windows 7 using
the Computer Management Tool
Using Disk Utilities to Repair Damaged
Files
• The following utilities enable you to repair damaged
files and file links:
– Disk First Aid in the Mac OS X Disk Utility
– fsck and p_fsck in UNIX/Linux
– chkdsk in Windows
• Disk First Aid – verifies files, folders, and mounted
disks
– Will also repair a disk and disk permissions
– Disk First Aid is combine with the Disk Utility
Guide to Operating Systems, 4th ed. 29
Guide to Operating Systems, 4th ed. 30
Using Disk Utilities to Repair Damaged
Files
• fsck utility – used to check one or more file systems
– Looks for orphaned files without names, bad directory pointers,
inode problems, directories that do not exist, bad links, bad
blocks, duplicated blocks, and pathname problems
– If it finds problems – give the opportunity to fix or disregard
• p_fsck utility – checks two or more file systems
simultaneously (instead of one at a time)
– Should not be applied to the root file system
Guide to Operating Systems, 4th ed. 31
Using Disk Utilities to Repair Damaged
Files
• chkdsk utility runs in the Command Prompt window
in Windows
– chkdsk can find and fix the following (see page 572 for
complete list):
• Damage to the root directory or other directory
• Unallocated disk space
• Files that share the same allocation units
• Directories without entries
• Damaged directories that cannot be repaired
• Unreadable disk sectors
• Damaged subdirectory entries
• Allocation units that contain partial information
• Bad file attributes
Using Disk Utilities to Repair Damaged
Files
• chkdsk utility verifies the NTFS file system journal
• /f switch instructs chkdsk to repair errors without a
yes or no interactive query
• You can have chkdsk to check a specific drive by
using the drive letter or path after the command
– For example: chkdsk D: /f checks drive D and automatically
fixes errors
• Two additional switches:
– /r – instructs chkdsk to look for bad sectors and attempt to
relocate information that it is able to read
– /l:size – used to change the size of the log file in NTFS
Guide to Operating Systems, 4th ed. 32
Deploying RAID Techniques
• RAID - used by server operating systems for three
purposes:
– Increased reliability (providing data recovery when a disk drive
fails and extending the useful life of disks)
– Increased storage capacity
– Increased speed
• This section focuses on how RAID is used to
extend the life of a set of disks
– RAID does this using disk striping – technique for spreading
data over multiple disk volumes
Guide to Operating Systems, 4th ed. 33
Deploying RAID Techniques
• Basic RAID levels:
– RAID level 0 – provides disk striping only and requires the use
of two or more disks
– RAID level 1 – uses two disks that are mirror images of one
another so that if one fails, the other one takes over
– RAID level 2 – provides disk striping, and all disks contain
information to help recover data in case one fails
– RAID level 3 – same as RAID level 2, but error recovery
information is on one disk only
– RAID level 4 – Provides disk striping, as in RAID level 2, and
adds checksum verification information that is stored on one
disk in the array
Guide to Operating Systems, 4th ed. 34
Deploying RAID Techniques
• Basic RAID levels (continued):
– RAID level 5 – same as RAID level 4, except that checksum
verification information is stored on all disks in the array
• Level 5 includes the ability to replace a failed drive and rebuild it
without shutting down the drive array or server
– RAID level 10 (or RAID 1+0) – considered the most effective
form of RAID – combines RAID levels 0 and 1 so that drives
are striped and then mirrored
• RAID levels 2,3, and 4 are rarely used because
RAID 1, 5 and 10 provide better fault tolerance
• Two ways to deploy RAID: hardware and software
Guide to Operating Systems, 4th ed. 35
Making Backups
• Several types of backups:
– Binary backup – backs up the disk contents in binary format to
create an exact image of the disk contents
• Simple to perform and includes everything on the disk
• Disadvantage – cannot restore individual files or directories
– Full file-by-file backup – all of the disk contents are back up,
but as individual directories and files
• Enables you to restore a single directory or a set of files without
restoring the entire disk
– Differential backup – backs up all files that have an archive
attribute (indicates that the file needs to be backed up)
– Incremental backup – backs up all files that have the archive
attribute, and removes the attribute from each file after backup
Guide to Operating Systems, 4th ed. 36
Making Backups
• Basic backup scheme might include:
– Full file-by-file backup to tape each Saturday evening and
differential backups to tape Monday through Friday
– The business might also have four sets of tapes that are
rotated each week
• First tape set would be used in week 1
• Second tape set would be used in week 2, and so on
• If one tape set goes bad, there is an option to use one of the tape
sets from a previous week to restore, if needed
– If there was a catastrophic disk failure on Thursday:
• The business would restore the full backup from the previous
Saturday and restore the differential backup from Wednesday
night
Guide to Operating Systems, 4th ed. 37
Making Backups
• When creating a backup strategy:
– Determine what information needs to be backed up and how
often
– Use scheduling software – so you don’t inadvertently miss a
backup
– Choose the right backup media – if you need to back up large
amounts of data and store it for years or decades, consider
high-quality tapes
– Rotate backup media – have one or more full sets of media
– Store a set of backups in an off-site location
– Regularly use file repair tools and a virus checker
– Investigate third-party backup software
Guide to Operating Systems, 4th ed. 38
Optimizing Software Installation
• Guidelines checklist for software installation:
– Make sure that the software is compatible with your OS
– Check the CPU, RAM, disk storage, audio, video, and other
requirements to make sure you meet minimum requirements
– Find out if there are different installation options
– Use the utilities provided by the OS for installing or uninstalling
applications
• In Windows, there is likely to be a Windows-compatible setup
program that comes with the software
– Look in the documentation, or ask your vendor, for software
that is written to take advantage of your OS’s development
environment
– Check the vendor’s “bug” list to make sure there are no bugs
that will impact the way you will use the software
Guide to Operating Systems, 4th ed. 39
Optimizing Software Installation
• Guidelines checklist for software installation (cont):
– Make sure the software is well documented and supported by
the vendor
– Determine, in advance, how to back up important files
associated with the software
– Determine if running the program requires adjustments to page
or swap files used by the OS (page/swap files are covered in
the next section)
– Find out what temporary files are created by the program
– Always install the latest versions of components (drivers)
– Do not mix .inf and driver files between different versions of
Windows
– Always keep service packs and program patches up to date for
all software
Guide to Operating Systems, 4th ed. 40
Optimizing Software Installation
• Consider the following when installing network server
software:
– Make sure there are enough licenses to match the number of users
– Determine the network load created by software
– Consider purchasing management software that can automatically
update system-wide software when there is a new release
– Determine if the software will be used in a cloud, client/server, terminal
server/remote desktop services environment or if it will be loaded
directly onto server clients
– Consider publishing or assigning software offered from Windows
Server 2003/R2 or Server 2008/R2
– Determine if the server or client workstations must be tuned for the
software in a particular way
– For OSs that support two or more file systems, make sure that the
software is compatible with the file system used by the OS
Guide to Operating Systems, 4th ed. 41
Tuning the Operating System
• After an OS is installed, periodic tuning is a must
– Slow workstations and servers have a cumulative impact on a
network
• Sometimes poor network performance is not a
result of network problems or too little bandwidth
– Could be that workstations and servers cannot keep up with
the network
• Many ways to tune OSs:
– Tuning virtual memory
– Installing OS updates and patches
– Tuning for optimal network communications
Guide to Operating Systems, 4th ed. 42
Tuning Virtual Memory
• Virtual memory – disk storage that is used when
there is not enough RAM for a particular operation,
or for all processes currently in use
– CPU and OS swap to disk (VM) the processes and data in
RAM that temporarily have a low priority
– When the CPU and OS need to access information on disk,
they swap something else to disk – this process is called
paging
– Page file or swap file – specially allocated disk area where
information is swapped back and forth from RAM to disk
• Called swap file system in UNIX/Linux
Guide to Operating Systems, 4th ed. 43
Tuning Virtual Memory
• Virtual memory (in Windows) is adjusted to set an
initial starting size and a maximum size to which it
can grow
– The general rule for sizing the page file is to set the initial size
to equal 1.5 times the amount of RAM
– Hands-On Project 11-10 shows you how to configure virtual
memory
• In UNIX/Linux – use the vmstat command-lind
utility to monitor paging
• In Mac OS X there is not option for turning on or
configuring virtual memory because it is always
enabled and monitored by the OS
Guide to Operating Systems, 4th ed. 44
Installing Operating System Updates
and Patches
• Installing updates and patches is one of the most
important ways to keep your OS tuned
• You can obtain updates by using the Windows
Update utility in all Windows OSs
– You can configure Windows update to automatically download
the updates as they are released
• Many Linux distributions with GNOME have a
software update tool that allows you to
automatically obtain updates
• Mac OS X Leopard and Snow Leopard offer a
Software Update tool
Guide to Operating Systems, 4th ed. 45
Installing Operating System Updates
and Patches
Windows Update Change settings window
Guide to Operating Systems, 4th ed. 46
Tuning for Network Communications
• You should occasionally check for updated NIC
drivers for your network interface card
• NICs can sometimes saturate the network with
repeated packet broadcasts – called a broadcast
storm
• Network traffic should be regularly monitored to
make sure no node is creating excessive traffic
Guide to Operating Systems, 4th ed. 47
Testing Network Connectivity
• ping utility – used to poll another network device
• ping displays statistics that include the number of
packets sent, received, and lost
– Also provides the round trip time in milliseconds
• Use the utility from the command line:
– Ping 198.85.216.5 (use the IP address of the device you would
like to poll)
– Some OSs allow you to poll by using the computer name or
computer and domain name
• If you receive a reply back from the device then
you know that your computer’s connection is
working
Guide to Operating Systems, 4th ed. 48
Chapter Summary
• Maintaining an OS is as important as setting it up. There are
procedures you can follow on a regular schedule to ensure
that your OS is at its best.
• The file structure established on a computer is related to
how easy it is to maintain that computer over the long term.
Keeping files in a logical structure means that it is easier to
identify files that don’t belong, that are out of date, or that
may be causing problems.
• One important technique for maintaining an OS is to
regularly find and delete unused files. Tools that can be used
to assist in finding and deleting unused files are Disk
Cleanup in Windows, the find, ls, and rm commands in
Linux, and the Find tool in Mac OS X.
Guide to Operating Systems, 4th ed. 49
Chapter Summary
• Other ways to maintain disks include defragmenting disks,
moving files to relatively unused disks, finding and repairing
disk problems, and setting up RAID. Some OSs have built-in
utilities that can determine if disks are fragmented, and then
defragment them.
• An important part of maintaining a system is to make regular
backups. Backups are vital at times when a hard disk fails, or
after you delete and purge files that you later wish you had
retained. Backups can be used to restore drivers or other OS
files that were damaged or overwritten.
• There are many considerations when installing and uninstalling
software. Before installing new software, make sure that the
software is compatible with hardware and the OS. When
uninstalling, use the built-in uninstall options.
Guide to Operating Systems, 4th ed. 50
Chapter Summary
• Finally, all operating systems should be tuned
periodically. Adjusting paging is one way to tune for
better performance. Another way is to make sure
you keep current with OS patches and updates.
Networked systems should be tuned so that NIC
drivers are kept current and check to ensure no
NIC is causing excessive network traffic. Also, use
the ping utility for testing a network connection.
Guide to Operating Systems, 4th ed. 51

More Related Content

What's hot

Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...
Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...
Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...ijesajournal
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating SystemAmir Villas
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systemsVandana Salve
 
Driver development – memory management
Driver development – memory managementDriver development – memory management
Driver development – memory managementVandana Salve
 
Dheeraj chugh -_presentation_on_ms-dos
Dheeraj chugh -_presentation_on_ms-dosDheeraj chugh -_presentation_on_ms-dos
Dheeraj chugh -_presentation_on_ms-dosREXY J
 
Unix operating system
Unix operating systemUnix operating system
Unix operating systemABhay Panchal
 
Windows OS Architecture in Summery
Windows OS Architecture in SummeryWindows OS Architecture in Summery
Windows OS Architecture in SummeryAsanka Dilruk
 
DOS Operating System
DOS Operating SystemDOS Operating System
DOS Operating SystemAnjan Mahanta
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Afaq Siddiqui
 
Case study operating systems
Case study operating systemsCase study operating systems
Case study operating systemsAkhil Bevara
 
Operating Systems 1 (4/12) - Architectures (Windows)
Operating Systems 1 (4/12) - Architectures (Windows)Operating Systems 1 (4/12) - Architectures (Windows)
Operating Systems 1 (4/12) - Architectures (Windows)Peter Tröger
 

What's hot (20)

9781111306366 ppt ch9
9781111306366 ppt ch99781111306366 ppt ch9
9781111306366 ppt ch9
 
Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...
Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...
Enhanced Embedded Linux Board Support Package Field Upgrade – A Cost Effectiv...
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
 
9781111306366 ppt ch8
9781111306366 ppt ch89781111306366 ppt ch8
9781111306366 ppt ch8
 
Linux for embedded_systems
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systems
 
Driver development – memory management
Driver development – memory managementDriver development – memory management
Driver development – memory management
 
file management
 file management file management
file management
 
Dheeraj chugh -_presentation_on_ms-dos
Dheeraj chugh -_presentation_on_ms-dosDheeraj chugh -_presentation_on_ms-dos
Dheeraj chugh -_presentation_on_ms-dos
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
Unix operating system
Unix operating systemUnix operating system
Unix operating system
 
SSD HSD storage drives
SSD HSD storage drives SSD HSD storage drives
SSD HSD storage drives
 
Os
OsOs
Os
 
Windows OS Architecture in Summery
Windows OS Architecture in SummeryWindows OS Architecture in Summery
Windows OS Architecture in Summery
 
DOS Operating System
DOS Operating SystemDOS Operating System
DOS Operating System
 
Window architecture
Window architecture Window architecture
Window architecture
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
 
Case study windows
Case study windowsCase study windows
Case study windows
 
Oct2009
Oct2009Oct2009
Oct2009
 
Case study operating systems
Case study operating systemsCase study operating systems
Case study operating systems
 
Operating Systems 1 (4/12) - Architectures (Windows)
Operating Systems 1 (4/12) - Architectures (Windows)Operating Systems 1 (4/12) - Architectures (Windows)
Operating Systems 1 (4/12) - Architectures (Windows)
 

Similar to 9781111306366 ppt ch11

File system discovery
File system discovery File system discovery
File system discovery DevMix
 
12-introductiontolinuxos-190907073928
12-introductiontolinuxos-19090707392812-introductiontolinuxos-190907073928
12-introductiontolinuxos-190907073928SahilNegi60
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OSHameda Hurmat
 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxLeahRachael
 
Operating Systems.pptx
Operating Systems.pptxOperating Systems.pptx
Operating Systems.pptxjguuhxxxfp
 
File Management & Access Control
File Management & Access Control File Management & Access Control
File Management & Access Control YuvrajWadavale
 
File system and Deadlocks
File system and DeadlocksFile system and Deadlocks
File system and DeadlocksRohit Jain
 
KMSUnix and Linux.pptx
KMSUnix and Linux.pptxKMSUnix and Linux.pptx
KMSUnix and Linux.pptxGanesh Bhosale
 
LinuxTraining_26_Sept_2021.ppt
LinuxTraining_26_Sept_2021.pptLinuxTraining_26_Sept_2021.ppt
LinuxTraining_26_Sept_2021.pptmuraridesai2
 
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1) Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1) Ahmed El-Arabawy
 
Linux standard file system
Linux standard file systemLinux standard file system
Linux standard file systemTaaanu01
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsSam Bowne
 
Linux fs structure (1)
Linux fs structure (1)Linux fs structure (1)
Linux fs structure (1)E. Rahul Naidu
 

Similar to 9781111306366 ppt ch11 (20)

File systems for Embedded Linux
File systems for Embedded LinuxFile systems for Embedded Linux
File systems for Embedded Linux
 
File system discovery
File system discovery File system discovery
File system discovery
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
12-introductiontolinuxos-190907073928
12-introductiontolinuxos-19090707392812-introductiontolinuxos-190907073928
12-introductiontolinuxos-190907073928
 
Operating systems
Operating systemsOperating systems
Operating systems
 
12 introduction to Linux OS
12 introduction to Linux OS12 introduction to Linux OS
12 introduction to Linux OS
 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
 
Operating Systems.pptx
Operating Systems.pptxOperating Systems.pptx
Operating Systems.pptx
 
Ch10 file system interface
Ch10   file system interfaceCh10   file system interface
Ch10 file system interface
 
File Management & Access Control
File Management & Access Control File Management & Access Control
File Management & Access Control
 
File system and Deadlocks
File system and DeadlocksFile system and Deadlocks
File system and Deadlocks
 
KMSUnix and Linux.pptx
KMSUnix and Linux.pptxKMSUnix and Linux.pptx
KMSUnix and Linux.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
LinuxTraining_26_Sept_2021.ppt
LinuxTraining_26_Sept_2021.pptLinuxTraining_26_Sept_2021.ppt
LinuxTraining_26_Sept_2021.ppt
 
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1) Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1)
 
CSA-lecture 6.pptx
CSA-lecture 6.pptxCSA-lecture 6.pptx
CSA-lecture 6.pptx
 
Linux standard file system
Linux standard file systemLinux standard file system
Linux standard file system
 
Linux: Basics OF Linux
Linux: Basics OF LinuxLinux: Basics OF Linux
Linux: Basics OF Linux
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X Systems
 
Linux fs structure (1)
Linux fs structure (1)Linux fs structure (1)
Linux fs structure (1)
 

More from Dr. Ahmed Al Zaidy

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingDr. Ahmed Al Zaidy
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web formsDr. Ahmed Al Zaidy
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsDr. Ahmed Al Zaidy
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesDr. Ahmed Al Zaidy
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsDr. Ahmed Al Zaidy
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptDr. Ahmed Al Zaidy
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaDr. Ahmed Al Zaidy
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web formDr. Ahmed Al Zaidy
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsDr. Ahmed Al Zaidy
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webDr. Ahmed Al Zaidy
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSDr. Ahmed Al Zaidy
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutDr. Ahmed Al Zaidy
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSDr. Ahmed Al Zaidy
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Dr. Ahmed Al Zaidy
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2Dr. Ahmed Al Zaidy
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business ContinuityDr. Ahmed Al Zaidy
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityDr. Ahmed Al Zaidy
 

More from Dr. Ahmed Al Zaidy (20)

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business Continuity
 
Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
 

Recently uploaded

IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

9781111306366 ppt ch11

  • 1. Guide to Operating Systems, 4th ed. Chapter 11: Standard Operating and Maintenance Procedures
  • 2. Guide to Operating Systems, 4th ed. 2 Objectives 2 • Explain file system maintenance techniques for different operating systems • Perform regular file system maintenance by finding and deleting unused files and directories • Perform disk maintenance that includes defragmenting, relocating files and folders, running disk and file repair utilities, and selecting RAID options • Explain the types of backups and develop a backup plan • Explain how to install software for best performance • Tune operating systems for optimal performance
  • 3. Guide to Operating Systems, 4th ed. 3 File System Maintenance • A well-planned file structure makes it easy to locate files, update files, share folders and files, back up and archive files, and delete unwanted files • Basic rules for creating a file structure: – Keep a manageable number of directories in the root directory – Keep OS files in the default directories – Keep different versions of software in their own directories – Keep data files in directories on the basis of their functions – Design home directories to match the functions of users in an organization – Group files with similar security needs within the same directories
  • 4. Guide to Operating Systems, 4th ed. 4 File System Maintenance Example directories in the root directory for Windows 7
  • 5. Guide to Operating Systems, 4th ed. 5 File System Maintenance • Example root directory structure in UNIX/Linux includes the following directories: – bin for files to start the OS – lib for libraries including settings used by the OS – usr for users’ files and user programs – var for files in which the content varies or are used temporarily – tmp for files used only temporarily – dev for devices such as keyboard and mouse – mnt for DVD/CD-ROM drives, and other removable media – etc for system and config files – sbin for user programs and utilities (system binary files) – home for users’s home directories – proc for system resource tracking
  • 6. Guide to Operating Systems, 4th ed. 6 File System Maintenance • Some examples of folders in the root of a Mac OS X Leopard/Snow Leopard (many same as UNIX): – Applications – software applications – bin – same use as in UNIX – dev – same use as in UNIX – etc – same use as in UNIX – home for users’ home directories – Library for shared library files – network for network devices, files for servers – System for system files – Users for user accounts (containing a subfolder for each account) – Volumes for mounted volumes including hard disks
  • 7. Guide to Operating Systems, 4th ed. 7 File System Maintenance • OS directories are typically placed in the root directory and have appropriate subdirectories under a main directory
  • 8. Guide to Operating Systems, 4th ed. 8 File System Maintenance • Advantages to installing and leaving OS files in default directories: – Easier for others to help with computer problems – Many software installations expect OS files to be in the default locations – Files are more easily found by uninstall programs if it becomes necessary to uninstall software • If different versions of software are still used: – Put different versions in different subdirectories under a main applications directory – Example: If Microsoft Word 2007 and 2010 are being used, create Word2007 and Word2010 subdirectories under the Program Files directory
  • 9. Guide to Operating Systems, 4th ed. 9 File System Maintenance • Some directory structures offer special locations for data files • Example: – Word processing, spreadsheet and database files should be stored as subdirectories under a root directory called Data • On a file server, files might be stored on the basis of directories set up for departments • Home directories on a server help organize data based on users
  • 10. Guide to Operating Systems, 4th ed. 10 Finding and Deleting Files • A solid file structure makes it easier to find and delete unneeded files – Example: temporary files are often created when running some applications and are sometimes not deleted automatically • Most temp files are kept in a folder called temp • Temporary Internet files (cookies) are often not deleted automatically • It is good practice to implement a regular schedule for finding and deleting temporary files
  • 11. Guide to Operating Systems, 4th ed. 11 Deleting Temporary Files in Windows • Windows XP/Vista/7, Server 2003/R2, and Server 2008/R2: – Use the Disk Cleanup Tool to select which files to delete (some examples are listed below): • Downloaded program files • Temporary Internet files • Recycle Bin • Setup log files • System error memory dump files • Temporary files – Use search tool to search for and delete all files with .tmp file extension – Right-click Recycle Bin on desktop and select Empty Recycle Bin
  • 12. Guide to Operating Systems, 4th ed. 12 Deleting Temporary Files in Windows Starting Disk Cleanup in Windows 7
  • 13. UNIX/Linux • View UNIX/Linux files by using the ls command – Some of the options that can be used with this command: • -a lists all files including hidden files • -C formats the listing in columns for easier reading • -d lists directories • -f displays files in an unsorted list • -l presents detailed information including permissions and file size • -r sorts files in reverse alphabetical order • -s displays the size of files (in blocks) • -S sorts files and directories on the basis of size • -t sorts files and directories on the basis of time they were last modified – Example: ls –a lists all files including hidden files Guide to Operating Systems, 4th ed. 13
  • 14. Guide to Operating Systems, 4th ed. 14 UNIX/Linux • Linux with GNOME desktop allows you to view files through a graphical interface
  • 15. Guide to Operating Systems, 4th ed. 15 UNIX/Linux • Files and folders are deleted by using the remove (rm) command – Options for this command: • -I for interactive option (asks if you are sure you want to delete) • -r for recursive (used to delete the entire directory contents) – Example: rm /home/mjackson/docs *.txt • This command will delete all files with a .txt extension in the mjackson directory • In the Linux GNOME Nautilus tool, you delete a file by finding the file, click on it and press the delete key on your keyboard
  • 16. Guide to Operating Systems, 4th ed. 16 UNIX/Linux • A file can be found by using the find command – Options that can be used with this command: • -atime for last access time • -ctime for last changed time • -mtime for last modification time • -name for the filename, including the use of wildcard searches • -print to print the results of the find • -size for file size (in blocks or bytes; with bytes specified by a “c”) • -user to find files by ownership • Example: to find a all files in directory/usr that are owned by the user lpadron: – find /usr –user lpadron
  • 17. Guide to Operating Systems, 4th ed. 17 UNIX/Linux • UNIX/Linux provides commands to help you assess the allocation of disk space: – df – enables you to view information on the basis of the file system – du – used to display statistics for a given directory and its subdirectories • An administrator can set up disk quotas to ensure users to not occupy all of the disk space – A disk quota is set by using the edquota command (opens the quota file for editing) • The quota file must first be created by the administrator, or in some versions it is created automatically when you first use edquota
  • 18. UNIX/Linux UNIX/Linux disk quotas for server users Guide to Operating Systems, 4th ed. 18
  • 19. Guide to Operating Systems, 4th ed. 19 Mac OS X • Mac OS X Leopard and Snow Leopard are generally effective in automatically cleaning out temporary files – However, still important to periodically find and delete unneeded files
  • 20. Mac OS X Guide to Operating Systems, 4th ed. 20 Displaying file sizes in Mac OS X Snow Leopard
  • 21. Maintaining Disks • It is important to perform disk maintenance in order to maintain the integrity of files and ensure disk performance • Important disk maintenance tasks include: – Defragmenting disks – Moving files to spread the load between multiple disks – Using disk utilities to find and repair damaged files – Deploying RAID techniques that extend the life of disks and provide disk redundancy Guide to Operating Systems, 4th ed. 21
  • 22. Guide to Operating Systems, 4th ed. 22 Defragmenting Disks • Fragmentation – means that unused space develops between files and other information written on a disk • When an OS is first installed, files are placed contiguously on a disk (little or no unused space between files) • As the OS deletes files, creates new files, and modifies files, the unused space between them grows and becomes scattered • The greater the fragmentation, the more space is wasted
  • 23. Guide to Operating Systems, 4th ed. 23 Defragmenting Disks Files located contiguously on a disk
  • 24. Guide to Operating Systems, 4th ed. 24 Defragmenting Disks A fragmented disk
  • 25. Guide to Operating Systems, 4th ed. 25 Defragmenting Disks • Defragmentation – process of removing empty pockets between files and other information on a hard drive • Two ways to defragment: – Older method is to take a complete backup of a disk’s contents and perform a full restore • Some administrators run a surface analysis of a disk before the restore to find damaged disk sectors and tracks – Another option is to run a disk defragmentation tool • Many OSs come with a built-in defrag tool • Some can run in the background as you use your computer • Some perform a quick analysis to see if defrag is even needed – If disk fragmentation is 20% or less, defrag is not needed
  • 26. Guide to Operating Systems, 4th ed. 26 Defragmenting Disks • In UNIX/Linux and Mac OS X, file systems are designed to reduce the need for defragmenting a disk – These OSs first write to a hidden journal, which is loaded to memory and then contents are written to disk in a linear fashion • Linear – data is temporarily stored and written all at one time in more contiguous fashion • Sequential – data is not stored but written as soon as it is created and therefore written to whatever disk areas are immediately open – Defragmentation tools are usually not included with these OSs – Earlier version of Mac OS had problems with memory fragmentation
  • 27. Moving Disk Files to Spread the Load • A technique that can help extend the life of disk drives is to spread files evenly across disks – Usually used in servers – Before files are moved, administrators examine disk and file activity to determine how to spread files to achieve even loading – Disk activity is monitored in Windows using Performance Monitor – Resources in use can be viewed with the Computer Management tool in Windows Guide to Operating Systems, 4th ed. 27
  • 28. Guide to Operating Systems, 4th ed. 28 Moving Disk Files to Spread the Load Studying resource use in Windows 7 using the Computer Management Tool
  • 29. Using Disk Utilities to Repair Damaged Files • The following utilities enable you to repair damaged files and file links: – Disk First Aid in the Mac OS X Disk Utility – fsck and p_fsck in UNIX/Linux – chkdsk in Windows • Disk First Aid – verifies files, folders, and mounted disks – Will also repair a disk and disk permissions – Disk First Aid is combine with the Disk Utility Guide to Operating Systems, 4th ed. 29
  • 30. Guide to Operating Systems, 4th ed. 30 Using Disk Utilities to Repair Damaged Files • fsck utility – used to check one or more file systems – Looks for orphaned files without names, bad directory pointers, inode problems, directories that do not exist, bad links, bad blocks, duplicated blocks, and pathname problems – If it finds problems – give the opportunity to fix or disregard • p_fsck utility – checks two or more file systems simultaneously (instead of one at a time) – Should not be applied to the root file system
  • 31. Guide to Operating Systems, 4th ed. 31 Using Disk Utilities to Repair Damaged Files • chkdsk utility runs in the Command Prompt window in Windows – chkdsk can find and fix the following (see page 572 for complete list): • Damage to the root directory or other directory • Unallocated disk space • Files that share the same allocation units • Directories without entries • Damaged directories that cannot be repaired • Unreadable disk sectors • Damaged subdirectory entries • Allocation units that contain partial information • Bad file attributes
  • 32. Using Disk Utilities to Repair Damaged Files • chkdsk utility verifies the NTFS file system journal • /f switch instructs chkdsk to repair errors without a yes or no interactive query • You can have chkdsk to check a specific drive by using the drive letter or path after the command – For example: chkdsk D: /f checks drive D and automatically fixes errors • Two additional switches: – /r – instructs chkdsk to look for bad sectors and attempt to relocate information that it is able to read – /l:size – used to change the size of the log file in NTFS Guide to Operating Systems, 4th ed. 32
  • 33. Deploying RAID Techniques • RAID - used by server operating systems for three purposes: – Increased reliability (providing data recovery when a disk drive fails and extending the useful life of disks) – Increased storage capacity – Increased speed • This section focuses on how RAID is used to extend the life of a set of disks – RAID does this using disk striping – technique for spreading data over multiple disk volumes Guide to Operating Systems, 4th ed. 33
  • 34. Deploying RAID Techniques • Basic RAID levels: – RAID level 0 – provides disk striping only and requires the use of two or more disks – RAID level 1 – uses two disks that are mirror images of one another so that if one fails, the other one takes over – RAID level 2 – provides disk striping, and all disks contain information to help recover data in case one fails – RAID level 3 – same as RAID level 2, but error recovery information is on one disk only – RAID level 4 – Provides disk striping, as in RAID level 2, and adds checksum verification information that is stored on one disk in the array Guide to Operating Systems, 4th ed. 34
  • 35. Deploying RAID Techniques • Basic RAID levels (continued): – RAID level 5 – same as RAID level 4, except that checksum verification information is stored on all disks in the array • Level 5 includes the ability to replace a failed drive and rebuild it without shutting down the drive array or server – RAID level 10 (or RAID 1+0) – considered the most effective form of RAID – combines RAID levels 0 and 1 so that drives are striped and then mirrored • RAID levels 2,3, and 4 are rarely used because RAID 1, 5 and 10 provide better fault tolerance • Two ways to deploy RAID: hardware and software Guide to Operating Systems, 4th ed. 35
  • 36. Making Backups • Several types of backups: – Binary backup – backs up the disk contents in binary format to create an exact image of the disk contents • Simple to perform and includes everything on the disk • Disadvantage – cannot restore individual files or directories – Full file-by-file backup – all of the disk contents are back up, but as individual directories and files • Enables you to restore a single directory or a set of files without restoring the entire disk – Differential backup – backs up all files that have an archive attribute (indicates that the file needs to be backed up) – Incremental backup – backs up all files that have the archive attribute, and removes the attribute from each file after backup Guide to Operating Systems, 4th ed. 36
  • 37. Making Backups • Basic backup scheme might include: – Full file-by-file backup to tape each Saturday evening and differential backups to tape Monday through Friday – The business might also have four sets of tapes that are rotated each week • First tape set would be used in week 1 • Second tape set would be used in week 2, and so on • If one tape set goes bad, there is an option to use one of the tape sets from a previous week to restore, if needed – If there was a catastrophic disk failure on Thursday: • The business would restore the full backup from the previous Saturday and restore the differential backup from Wednesday night Guide to Operating Systems, 4th ed. 37
  • 38. Making Backups • When creating a backup strategy: – Determine what information needs to be backed up and how often – Use scheduling software – so you don’t inadvertently miss a backup – Choose the right backup media – if you need to back up large amounts of data and store it for years or decades, consider high-quality tapes – Rotate backup media – have one or more full sets of media – Store a set of backups in an off-site location – Regularly use file repair tools and a virus checker – Investigate third-party backup software Guide to Operating Systems, 4th ed. 38
  • 39. Optimizing Software Installation • Guidelines checklist for software installation: – Make sure that the software is compatible with your OS – Check the CPU, RAM, disk storage, audio, video, and other requirements to make sure you meet minimum requirements – Find out if there are different installation options – Use the utilities provided by the OS for installing or uninstalling applications • In Windows, there is likely to be a Windows-compatible setup program that comes with the software – Look in the documentation, or ask your vendor, for software that is written to take advantage of your OS’s development environment – Check the vendor’s “bug” list to make sure there are no bugs that will impact the way you will use the software Guide to Operating Systems, 4th ed. 39
  • 40. Optimizing Software Installation • Guidelines checklist for software installation (cont): – Make sure the software is well documented and supported by the vendor – Determine, in advance, how to back up important files associated with the software – Determine if running the program requires adjustments to page or swap files used by the OS (page/swap files are covered in the next section) – Find out what temporary files are created by the program – Always install the latest versions of components (drivers) – Do not mix .inf and driver files between different versions of Windows – Always keep service packs and program patches up to date for all software Guide to Operating Systems, 4th ed. 40
  • 41. Optimizing Software Installation • Consider the following when installing network server software: – Make sure there are enough licenses to match the number of users – Determine the network load created by software – Consider purchasing management software that can automatically update system-wide software when there is a new release – Determine if the software will be used in a cloud, client/server, terminal server/remote desktop services environment or if it will be loaded directly onto server clients – Consider publishing or assigning software offered from Windows Server 2003/R2 or Server 2008/R2 – Determine if the server or client workstations must be tuned for the software in a particular way – For OSs that support two or more file systems, make sure that the software is compatible with the file system used by the OS Guide to Operating Systems, 4th ed. 41
  • 42. Tuning the Operating System • After an OS is installed, periodic tuning is a must – Slow workstations and servers have a cumulative impact on a network • Sometimes poor network performance is not a result of network problems or too little bandwidth – Could be that workstations and servers cannot keep up with the network • Many ways to tune OSs: – Tuning virtual memory – Installing OS updates and patches – Tuning for optimal network communications Guide to Operating Systems, 4th ed. 42
  • 43. Tuning Virtual Memory • Virtual memory – disk storage that is used when there is not enough RAM for a particular operation, or for all processes currently in use – CPU and OS swap to disk (VM) the processes and data in RAM that temporarily have a low priority – When the CPU and OS need to access information on disk, they swap something else to disk – this process is called paging – Page file or swap file – specially allocated disk area where information is swapped back and forth from RAM to disk • Called swap file system in UNIX/Linux Guide to Operating Systems, 4th ed. 43
  • 44. Tuning Virtual Memory • Virtual memory (in Windows) is adjusted to set an initial starting size and a maximum size to which it can grow – The general rule for sizing the page file is to set the initial size to equal 1.5 times the amount of RAM – Hands-On Project 11-10 shows you how to configure virtual memory • In UNIX/Linux – use the vmstat command-lind utility to monitor paging • In Mac OS X there is not option for turning on or configuring virtual memory because it is always enabled and monitored by the OS Guide to Operating Systems, 4th ed. 44
  • 45. Installing Operating System Updates and Patches • Installing updates and patches is one of the most important ways to keep your OS tuned • You can obtain updates by using the Windows Update utility in all Windows OSs – You can configure Windows update to automatically download the updates as they are released • Many Linux distributions with GNOME have a software update tool that allows you to automatically obtain updates • Mac OS X Leopard and Snow Leopard offer a Software Update tool Guide to Operating Systems, 4th ed. 45
  • 46. Installing Operating System Updates and Patches Windows Update Change settings window Guide to Operating Systems, 4th ed. 46
  • 47. Tuning for Network Communications • You should occasionally check for updated NIC drivers for your network interface card • NICs can sometimes saturate the network with repeated packet broadcasts – called a broadcast storm • Network traffic should be regularly monitored to make sure no node is creating excessive traffic Guide to Operating Systems, 4th ed. 47
  • 48. Testing Network Connectivity • ping utility – used to poll another network device • ping displays statistics that include the number of packets sent, received, and lost – Also provides the round trip time in milliseconds • Use the utility from the command line: – Ping 198.85.216.5 (use the IP address of the device you would like to poll) – Some OSs allow you to poll by using the computer name or computer and domain name • If you receive a reply back from the device then you know that your computer’s connection is working Guide to Operating Systems, 4th ed. 48
  • 49. Chapter Summary • Maintaining an OS is as important as setting it up. There are procedures you can follow on a regular schedule to ensure that your OS is at its best. • The file structure established on a computer is related to how easy it is to maintain that computer over the long term. Keeping files in a logical structure means that it is easier to identify files that don’t belong, that are out of date, or that may be causing problems. • One important technique for maintaining an OS is to regularly find and delete unused files. Tools that can be used to assist in finding and deleting unused files are Disk Cleanup in Windows, the find, ls, and rm commands in Linux, and the Find tool in Mac OS X. Guide to Operating Systems, 4th ed. 49
  • 50. Chapter Summary • Other ways to maintain disks include defragmenting disks, moving files to relatively unused disks, finding and repairing disk problems, and setting up RAID. Some OSs have built-in utilities that can determine if disks are fragmented, and then defragment them. • An important part of maintaining a system is to make regular backups. Backups are vital at times when a hard disk fails, or after you delete and purge files that you later wish you had retained. Backups can be used to restore drivers or other OS files that were damaged or overwritten. • There are many considerations when installing and uninstalling software. Before installing new software, make sure that the software is compatible with hardware and the OS. When uninstalling, use the built-in uninstall options. Guide to Operating Systems, 4th ed. 50
  • 51. Chapter Summary • Finally, all operating systems should be tuned periodically. Adjusting paging is one way to tune for better performance. Another way is to make sure you keep current with OS patches and updates. Networked systems should be tuned so that NIC drivers are kept current and check to ensure no NIC is causing excessive network traffic. Also, use the ping utility for testing a network connection. Guide to Operating Systems, 4th ed. 51