SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Create a directory tree  See page 108, 109, 110
Operations of Adding a New File Store Properties Locate a free inodeas 47 Record the file information in the inode Store Data Locate disk blocks for file content such as 627, 200, and 992. Record Allocation Record the sequence of block numbers in the disk allocation section of the inode Add Filename to Directory Add the new entry (47, userlist) to the directory.
Looking inside a directory Directory is a special kind of file that contains a list of names of files. Ls – 1ia  demodir  //i for inode number Ls –ia /			//root and parent of root 				//point to itself
The file system in practice What will happen when you type: > cat userlist The kernel searches the directory for the filename: userlist, inode number 47 found Locate the real inode 47 in inode table. The inode contains a list of data block numbers. Go to the data block one by one to read the data with read system call. The permission is also checked from inode
STRUCTURE OF A REGULAR FILE The blocks marked "direct” contain the numbers of disk blocks that contain real data. The block marked "single indirect"  refers to a block that contains a list of direct block numbers. To access the data via the indirect block, the kernel must read the indirect block, find the appropriate direct block entry, and then read the direct block to find the data.
STRUCTURE OF A REGULAR FILE The block marked "double indirect" contains a list of indirect block numbers, and  the block marked "triple indirect" contains a list of "double indirect " block  numbers refers to a block that contains a list of direct block numbers. Assume  that a logical block = I K bytes A block number is addressable by a 32 bit (4 byte) integer. Then a block can hold up to 256 block numbers.
A single indirect data block can hold 256 block numbers (1024 bytes/4 bytes)
Chapter 4 1

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 06
Chapter 06Chapter 06
Chapter 06
Google
 
Advances in File Carving
Advances in File CarvingAdvances in File Carving
Advances in File Carving
Rob Zirnstein
 
File Organization
File OrganizationFile Organization
File Organization
Manyi Man
 

Was ist angesagt? (18)

Tool Development 03 - File I/O
Tool Development 03 - File I/OTool Development 03 - File I/O
Tool Development 03 - File I/O
 
CBSE - Class 12 - Ch -5 -File Handling , access mode,CSV , Binary file
CBSE - Class 12 - Ch -5 -File Handling , access mode,CSV , Binary fileCBSE - Class 12 - Ch -5 -File Handling , access mode,CSV , Binary file
CBSE - Class 12 - Ch -5 -File Handling , access mode,CSV , Binary file
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
 
File organization
File organizationFile organization
File organization
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
File structures
File structuresFile structures
File structures
 
Data file operations in C++ Base
Data file operations in C++ BaseData file operations in C++ Base
Data file operations in C++ Base
 
File management
File managementFile management
File management
 
File handling
File handlingFile handling
File handling
 
File organization and indexing
File organization and indexingFile organization and indexing
File organization and indexing
 
File system interface
File system interfaceFile system interface
File system interface
 
First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]First Responders Course- Session 1 - Digital and Other Evidence [2004]
First Responders Course- Session 1 - Digital and Other Evidence [2004]
 
Indexing
IndexingIndexing
Indexing
 
Streams and Files
Streams and FilesStreams and Files
Streams and Files
 
End note comparison
End note comparisonEnd note comparison
End note comparison
 
Advances in File Carving
Advances in File CarvingAdvances in File Carving
Advances in File Carving
 
File organization 1
File organization 1File organization 1
File organization 1
 
File Organization
File OrganizationFile Organization
File Organization
 

Andere mochten auch (10)

Unix files
Unix filesUnix files
Unix files
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Getting started with c++
Getting started with c++Getting started with c++
Getting started with c++
 
CSV File Manipulation
CSV File ManipulationCSV File Manipulation
CSV File Manipulation
 
10 point sukses kls 8
10 point sukses kls 810 point sukses kls 8
10 point sukses kls 8
 
Kernal
KernalKernal
Kernal
 
The unix file system
The unix file systemThe unix file system
The unix file system
 
Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems
 
Unix File System
Unix File SystemUnix File System
Unix File System
 
Kernal
KernalKernal
Kernal
 

Ähnlich wie Chapter 4 1

AOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondAOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyond
Zubair Nabi
 
Please answer all parts of the following question thoroughly.This .pdf
Please answer all parts of the following question thoroughly.This .pdfPlease answer all parts of the following question thoroughly.This .pdf
Please answer all parts of the following question thoroughly.This .pdf
amayagency123
 
There are 4 part for the project and the question may be long to rea.docx
There are 4 part for the project and the question may be long to rea.docxThere are 4 part for the project and the question may be long to rea.docx
There are 4 part for the project and the question may be long to rea.docx
susannr
 
There are 4 parts for the project. The question may be long to read .docx
There are 4 parts for the project. The question may be long to read .docxThere are 4 parts for the project. The question may be long to read .docx
There are 4 parts for the project. The question may be long to read .docx
susannr
 
AOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksAOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocks
Zubair Nabi
 
There are 4 parts for the project. The question may be long to r.docx
There are 4 parts for the project. The question may be long to r.docxThere are 4 parts for the project. The question may be long to r.docx
There are 4 parts for the project. The question may be long to r.docx
susannr
 
DBMS primary index and secondary index questions
DBMS primary index and secondary index questionsDBMS primary index and secondary index questions
DBMS primary index and secondary index questions
vivekyadav02072002
 
File management
File managementFile management
File management
Mohd Arif
 
ASP.NET Session 7
ASP.NET Session 7ASP.NET Session 7
ASP.NET Session 7
Sisir Ghosh
 
Modern Kernel Pool Exploitation: Attacks and Techniques
Modern Kernel Pool Exploitation: Attacks and TechniquesModern Kernel Pool Exploitation: Attacks and Techniques
Modern Kernel Pool Exploitation: Attacks and Techniques
Michael Scovetta
 

Ähnlich wie Chapter 4 1 (20)

Internal representation of files ppt
Internal representation of files pptInternal representation of files ppt
Internal representation of files ppt
 
Internal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiInternal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya Jyothi
 
AOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyondAOS Lab 10: File system -- Inodes and beyond
AOS Lab 10: File system -- Inodes and beyond
 
Please answer all parts of the following question thoroughly.This .pdf
Please answer all parts of the following question thoroughly.This .pdfPlease answer all parts of the following question thoroughly.This .pdf
Please answer all parts of the following question thoroughly.This .pdf
 
Ch 17 disk storage, basic files structure, and hashing
Ch 17 disk storage, basic files structure, and hashingCh 17 disk storage, basic files structure, and hashing
Ch 17 disk storage, basic files structure, and hashing
 
There are 4 part for the project and the question may be long to rea.docx
There are 4 part for the project and the question may be long to rea.docxThere are 4 part for the project and the question may be long to rea.docx
There are 4 part for the project and the question may be long to rea.docx
 
There are 4 parts for the project. The question may be long to read .docx
There are 4 parts for the project. The question may be long to read .docxThere are 4 parts for the project. The question may be long to read .docx
There are 4 parts for the project. The question may be long to read .docx
 
Chap 9 : I/O and Streams (scjp/ocjp)
Chap 9 : I/O and Streams (scjp/ocjp)Chap 9 : I/O and Streams (scjp/ocjp)
Chap 9 : I/O and Streams (scjp/ocjp)
 
Csphtp1 17
Csphtp1 17Csphtp1 17
Csphtp1 17
 
AOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocksAOS Lab 9: File system -- Of buffers, logs, and blocks
AOS Lab 9: File system -- Of buffers, logs, and blocks
 
There are 4 parts for the project. The question may be long to r.docx
There are 4 parts for the project. The question may be long to r.docxThere are 4 parts for the project. The question may be long to r.docx
There are 4 parts for the project. The question may be long to r.docx
 
19 structured files
19 structured files19 structured files
19 structured files
 
DBMS primary index and secondary index questions
DBMS primary index and secondary index questionsDBMS primary index and secondary index questions
DBMS primary index and secondary index questions
 
osd - co1 session7.pptx
osd - co1 session7.pptxosd - co1 session7.pptx
osd - co1 session7.pptx
 
File management
File managementFile management
File management
 
Practical Hadoop using Pig
Practical Hadoop using PigPractical Hadoop using Pig
Practical Hadoop using Pig
 
ASP.NET Session 7
ASP.NET Session 7ASP.NET Session 7
ASP.NET Session 7
 
File handling in qbasic
File handling in qbasicFile handling in qbasic
File handling in qbasic
 
Modern Kernel Pool Exploitation: Attacks and Techniques
Modern Kernel Pool Exploitation: Attacks and TechniquesModern Kernel Pool Exploitation: Attacks and Techniques
Modern Kernel Pool Exploitation: Attacks and Techniques
 
File System Implementation.pptx
File System Implementation.pptxFile System Implementation.pptx
File System Implementation.pptx
 

Mehr von lopjuan

Chapter 3
Chapter 3Chapter 3
Chapter 3
lopjuan
 
Chapter 4 2
Chapter 4 2Chapter 4 2
Chapter 4 2
lopjuan
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
lopjuan
 
Java servlets
Java servletsJava servlets
Java servlets
lopjuan
 
Java applets
Java appletsJava applets
Java applets
lopjuan
 
Chapter10
Chapter10Chapter10
Chapter10
lopjuan
 
Web services
Web servicesWeb services
Web services
lopjuan
 
Chapter7
Chapter7Chapter7
Chapter7
lopjuan
 

Mehr von lopjuan (8)

Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 4 2
Chapter 4 2Chapter 4 2
Chapter 4 2
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Java servlets
Java servletsJava servlets
Java servlets
 
Java applets
Java appletsJava applets
Java applets
 
Chapter10
Chapter10Chapter10
Chapter10
 
Web services
Web servicesWeb services
Web services
 
Chapter7
Chapter7Chapter7
Chapter7
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Chapter 4 1

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Create a directory tree See page 108, 109, 110
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Operations of Adding a New File Store Properties Locate a free inodeas 47 Record the file information in the inode Store Data Locate disk blocks for file content such as 627, 200, and 992. Record Allocation Record the sequence of block numbers in the disk allocation section of the inode Add Filename to Directory Add the new entry (47, userlist) to the directory.
  • 12. Looking inside a directory Directory is a special kind of file that contains a list of names of files. Ls – 1ia demodir //i for inode number Ls –ia / //root and parent of root //point to itself
  • 13. The file system in practice What will happen when you type: > cat userlist The kernel searches the directory for the filename: userlist, inode number 47 found Locate the real inode 47 in inode table. The inode contains a list of data block numbers. Go to the data block one by one to read the data with read system call. The permission is also checked from inode
  • 14.
  • 15. STRUCTURE OF A REGULAR FILE The blocks marked "direct” contain the numbers of disk blocks that contain real data. The block marked "single indirect" refers to a block that contains a list of direct block numbers. To access the data via the indirect block, the kernel must read the indirect block, find the appropriate direct block entry, and then read the direct block to find the data.
  • 16. STRUCTURE OF A REGULAR FILE The block marked "double indirect" contains a list of indirect block numbers, and the block marked "triple indirect" contains a list of "double indirect " block numbers refers to a block that contains a list of direct block numbers. Assume that a logical block = I K bytes A block number is addressable by a 32 bit (4 byte) integer. Then a block can hold up to 256 block numbers.
  • 17. A single indirect data block can hold 256 block numbers (1024 bytes/4 bytes)