SlideShare a Scribd company logo
1 of 45
Disks and File Systems II Chapter 12
Chapter Goals ,[object Object],[object Object],[object Object],[object Object],[object Object]
Working with the newfs Command ,[object Object],[object Object],[object Object],[object Object],[object Object]
How newfs   Connects to mkfs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
File System Check ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
File System Repair ,[object Object],[object Object],[object Object],[object Object]
File System Repair ,[object Object],[object Object],[object Object],[object Object]
File System Repair ,[object Object],[object Object]
File System Repair ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
File System Repair ,[object Object],[object Object],[object Object],[object Object]
File System Repair ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
File System Repair ,[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File System Check ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File System Check ,[object Object],[object Object],[object Object],[object Object]
Recognizing Failing Disks ,[object Object],[object Object],[object Object]
Recognizing Failing Disks ,[object Object],[object Object],[object Object]
Recognizing Failing Disks ,[object Object],[object Object],[object Object]
Repairing Disk Errors ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Improving Disk Subsystem Performance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Improving Disk Subsystem Performance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Improving Disk Subsystem Performance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Improving Disk Subsystem Performance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Improving Disk Subsystem Performance ,[object Object],[object Object],[object Object],[object Object]
 
Improving Disk Subsystem Performance ,[object Object],[object Object],[object Object],[object Object]
 
Summary ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating Systemsubhsikha
 
Unix
UnixUnix
UnixErm78
 
Structure of operating system
Structure of operating systemStructure of operating system
Structure of operating systemRafi Dar
 
Unix operating system
Unix operating systemUnix operating system
Unix operating systemABhay Panchal
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in LinuxHenry Osborne
 
Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems senthilamul
 
101 2.2 install boot manager
101 2.2 install boot manager101 2.2 install boot manager
101 2.2 install boot managerAcácio Oliveira
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiSowmya Jyothi
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating SystemMahakKasliwal
 
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksUnix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksLOKESH KUMAR
 

What's hot (20)

Unix Administration
Unix AdministrationUnix Administration
Unix Administration
 
Ch02
Ch02Ch02
Ch02
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
Aties Presentation
Aties PresentationAties Presentation
Aties Presentation
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Linux lecture5
Linux lecture5Linux lecture5
Linux lecture5
 
Input output in linux
Input output in linuxInput output in linux
Input output in linux
 
Linux io
Linux ioLinux io
Linux io
 
Unix
UnixUnix
Unix
 
Structure of operating system
Structure of operating systemStructure of operating system
Structure of operating system
 
Unix operating system
Unix operating systemUnix operating system
Unix operating system
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
File Systems
File SystemsFile Systems
File Systems
 
Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems Unix file systems 2 in unix internal systems
Unix file systems 2 in unix internal systems
 
101 2.2 install boot manager
101 2.2 install boot manager101 2.2 install boot manager
101 2.2 install boot manager
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
Operating System lab
Operating System labOperating System lab
Operating System lab
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksUnix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | Blocks
 

Viewers also liked

SharePoint 2013 overview jeremy thake
SharePoint 2013 overview   jeremy thakeSharePoint 2013 overview   jeremy thake
SharePoint 2013 overview jeremy thakeJeremy Thake
 
Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Tũi Wichets
 
Windows Server 2012 Remote Desktop Service Yenilikleri
Windows Server 2012 Remote Desktop Service YenilikleriWindows Server 2012 Remote Desktop Service Yenilikleri
Windows Server 2012 Remote Desktop Service YenilikleriMSHOWTO Bilisim Toplulugu
 
Remote Desktop Services Component Architecture
Remote Desktop Services Component ArchitectureRemote Desktop Services Component Architecture
Remote Desktop Services Component ArchitecturePaulo Freitas
 
Windows Server 2012 R2: Your Path to the Modern Business
Windows Server 2012 R2: Your Path to the Modern BusinessWindows Server 2012 R2: Your Path to the Modern Business
Windows Server 2012 R2: Your Path to the Modern BusinessUnited Technology Group (UTG)
 
What’s new in windows server 2012
What’s new in windows server 2012What’s new in windows server 2012
What’s new in windows server 2012Alex de Jong
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking securityRaja Waseem Akhtar
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availabilityRaja Waseem Akhtar
 

Viewers also liked (20)

Ch03 system administration
Ch03 system administration Ch03 system administration
Ch03 system administration
 
SharePoint 2013 overview jeremy thake
SharePoint 2013 overview   jeremy thakeSharePoint 2013 overview   jeremy thake
SharePoint 2013 overview jeremy thake
 
Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture Windows server 2012 r2 Hyper-v Component architecture
Windows server 2012 r2 Hyper-v Component architecture
 
Windows Server 2012 Remote Desktop Service Yenilikleri
Windows Server 2012 Remote Desktop Service YenilikleriWindows Server 2012 Remote Desktop Service Yenilikleri
Windows Server 2012 Remote Desktop Service Yenilikleri
 
Remote Desktop Services Component Architecture
Remote Desktop Services Component ArchitectureRemote Desktop Services Component Architecture
Remote Desktop Services Component Architecture
 
Windows Server 2012 R2: Your Path to the Modern Business
Windows Server 2012 R2: Your Path to the Modern BusinessWindows Server 2012 R2: Your Path to the Modern Business
Windows Server 2012 R2: Your Path to the Modern Business
 
What’s new in windows server 2012
What’s new in windows server 2012What’s new in windows server 2012
What’s new in windows server 2012
 
Ch06 system administration
Ch06 system administration Ch06 system administration
Ch06 system administration
 
Ch21 system administration
Ch21 system administration Ch21 system administration
Ch21 system administration
 
Ch24 system administration
Ch24 system administration Ch24 system administration
Ch24 system administration
 
Excel 2007 Unit P
Excel 2007 Unit PExcel 2007 Unit P
Excel 2007 Unit P
 
Ch03
Ch03Ch03
Ch03
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
Ch06
Ch06Ch06
Ch06
 
Beat Anger
Beat AngerBeat Anger
Beat Anger
 
Ch24
Ch24Ch24
Ch24
 
Ch20 system administration
Ch20 system administration Ch20 system administration
Ch20 system administration
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Ch13 system administration
Ch13 system administration Ch13 system administration
Ch13 system administration
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 

Similar to Ch12 system administration

How to mount and unmount filesystem
How to mount and unmount filesystemHow to mount and unmount filesystem
How to mount and unmount filesystemCOMSATS
 
101 4.3 control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystems101 4.3 control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystemsAcácio Oliveira
 
101 2.1 design hard disk layout
101 2.1 design hard disk layout101 2.1 design hard disk layout
101 2.1 design hard disk layoutAcácio Oliveira
 
Forcefully unmount a linux disk partition
Forcefully unmount a linux disk partitionForcefully unmount a linux disk partition
Forcefully unmount a linux disk partitionMuqthiyar Pasha
 
UNIX(Essential needs of administration)
UNIX(Essential needs of administration)UNIX(Essential needs of administration)
UNIX(Essential needs of administration)Papu Kumar
 
2.1 design hard disk layout v2
2.1 design hard disk layout v22.1 design hard disk layout v2
2.1 design hard disk layout v2Acácio Oliveira
 
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystemsAcácio Oliveira
 
How to mount ntfs in linux
How to mount ntfs in linuxHow to mount ntfs in linux
How to mount ntfs in linuxsiraza5
 
101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2Acácio Oliveira
 
Cd rom how solaris manages cd-rom and diskette devices
Cd rom how solaris manages cd-rom and diskette devicesCd rom how solaris manages cd-rom and diskette devices
Cd rom how solaris manages cd-rom and diskette devicesBui Van Cuong
 
11 linux filesystem copy
11 linux filesystem copy11 linux filesystem copy
11 linux filesystem copyShay Cohen
 
101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystemsAcácio Oliveira
 

Similar to Ch12 system administration (20)

Ch12
Ch12Ch12
Ch12
 
How to mount and unmount filesystem
How to mount and unmount filesystemHow to mount and unmount filesystem
How to mount and unmount filesystem
 
Linux filesystemhierarchy
Linux filesystemhierarchyLinux filesystemhierarchy
Linux filesystemhierarchy
 
Unix Administration 4
Unix Administration 4Unix Administration 4
Unix Administration 4
 
101 4.3 control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystems101 4.3 control mounting and unmounting of filesystems
101 4.3 control mounting and unmounting of filesystems
 
101 2.1 design hard disk layout
101 2.1 design hard disk layout101 2.1 design hard disk layout
101 2.1 design hard disk layout
 
Forcefully unmount a linux disk partition
Forcefully unmount a linux disk partitionForcefully unmount a linux disk partition
Forcefully unmount a linux disk partition
 
UNIX(Essential needs of administration)
UNIX(Essential needs of administration)UNIX(Essential needs of administration)
UNIX(Essential needs of administration)
 
2.1 design hard disk layout v2
2.1 design hard disk layout v22.1 design hard disk layout v2
2.1 design hard disk layout v2
 
101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems101 4.2 maintain the integrity of filesystems
101 4.2 maintain the integrity of filesystems
 
pptdisk
pptdiskpptdisk
pptdisk
 
How to mount ntfs in linux
How to mount ntfs in linuxHow to mount ntfs in linux
How to mount ntfs in linux
 
101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2101 2.1 design hard disk layout v2
101 2.1 design hard disk layout v2
 
Cd rom how solaris manages cd-rom and diskette devices
Cd rom how solaris manages cd-rom and diskette devicesCd rom how solaris manages cd-rom and diskette devices
Cd rom how solaris manages cd-rom and diskette devices
 
11 linux filesystem copy
11 linux filesystem copy11 linux filesystem copy
11 linux filesystem copy
 
101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems101 4.1 create partitions and filesystems
101 4.1 create partitions and filesystems
 
Sahul
SahulSahul
Sahul
 
Sahul
SahulSahul
Sahul
 
Divya
DivyaDivya
Divya
 
Divya
DivyaDivya
Divya
 

More from Raja Waseem Akhtar

Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its toolsRaja Waseem Akhtar
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networksRaja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problemsRaja Waseem Akhtar
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internetRaja Waseem Akhtar
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networkingRaja Waseem Akhtar
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linuxRaja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivityRaja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methodsRaja Waseem Akhtar
 

More from Raja Waseem Akhtar (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
God is Great
God is GreatGod is Great
God is Great
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Ch12 system administration

  • 1. Disks and File Systems II Chapter 12
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.  
  • 23.
  • 24.
  • 25.  
  • 26.  
  • 27.  
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.  
  • 36.  
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.  
  • 43.
  • 44.  
  • 45.

Editor's Notes

  1. The newfs command will display information about the new file system as it operates. The first line printed by newfs describes the basic disk geometry. The second line of output from newfs describes the ufs file system created in this partition. Cylinder groups are a concept introduced in the Berkeley UNIX Fast File system. Cylinder groups provide a method by which file blocks are allocated close together on the disk to improve performance. TIP: Varying the size of the cylinder groups is one way to tune the performance of a ufs file system. The final two lines of newfs output list the locations of the superblock backups. The superblock is the head of the file index node or inode information used by the ufs file system. The inodes are “used” by routines in the Solaris kernel to allocate, read, write, and delete files. Backup copies of these superblocks are created in the event a system crash, power failure, or other problem leaves the main copy of the superblock damaged.
  2. For most applications, a detailed knowledge of the mkfs parameters is unnecessary; newfs makes proper choices for the parameters it passes to mkfs . It is possible to build a file system tuned to store a large quantity of small, frequently changing files, such as those found in the Usenet net-news system. Such a file system would require more index nodes or inodes than are provided by the default options used by newfs .
  3. Device to mount - Name of device to be mounted. Device to fsck - Raw device to be checked by the fsck utility. Mount point - Directory where the device should be added to the UNIX file tree. FS type - File system type. fsck pass - Number indicates the order which the file system will be checked. Mount at boot - Yes to cause file system to mount at boot. Mount options - Options to be passed to the mount command. Options are given as a comma-separated list following the -o flag (e.g., mount -o rw,quota ). Some of the more common options for the mount command are. Quota - Activates the user disk quota system when the file system is mounted Ro - Mounts the file system read-only -F fstype - Mounts a file system of fstype -a - Mounts all file systems with “mount at boot” (in the vfstab file) set to yes -o - Uses specific fstype options when mounting file system -p - Provides a list of mounted file systems in vfstab format -v - Provides verbose output when mounting file system(s) -O - Overlays the file system on an existing mount point -m - Mounts file system without making an entry in /etc/mnttab Nosuid - Disallows setUID execution for files in this file system
  4. When df is invoked with a directory argument, the output format changes, as shown in the following. glenn% df / File system kbytes used avail capacity Mounted on /dev/dsk/c0t3d0s0 20664 14819 3785 80% / The most complete df listing is obtained by using the -g option glenn% df -g / / (/dev/dsk/c0t3d0s0): 8192 block size 1024 frag size 41328 total blocks 11690 free blocks 7570 available 11520 total files 9292 free files 8388632 filesys id ufs fstype 0x00000004 flag 255 file name length NOTE: It is important to remember the differences among the three block sizes discussed in this chapter. A disk block is the basic unit of storage on the physical medium. This unit is often 512 bytes long, but not always. An allocation block is the basic unit of space in a file system. It is either 8,192 or 4,096 bytes in length. A fragment, often 1,024 bytes in length, is a portion of an allocation block.
  5. The first form of the umount command unmounts the file system referred to by “mount point.” For example, umount /scratch would unmount the /scratch file system. The second form of the umount command unmounts the file system on the referenced disk partition. For example, if the /scratch file system is on the c0t2d0s1 disk partition, the operator could unmount it with umount /dev/dsk/c0t2d0s1 . If you are uncertain about the effect unmounting a file system may have on the system, it is best to bring the system to the single-user state before invoking the umount command. In the case of a file server, unmounting a file system may also have an effect on nfs client machines on which the file system is mounted.
  6. Other OSs handle this situation by providing utilities under the desktop manager toolkit (such as KDE under Linux), mediad under Irix, and autodiskmount under MacOS X. Under Solaris, automatic detection of the media is limited to the CD-ROM device. The Solaris File Manager accomplishes this with a combination of a daemon ( vold ) and a configuration file ( /etc/vold.conf ), which specifies the actions to be taken for various removable devices and file system types. For floppy disks, Volume Manager is unable to detect the presence of new disks and must be informed that a new disk is present. This is accomplished by invoking the /bin/volcheck command. Volume Manager always mounts floppy disks under the /floppy directory it controls. CD-ROMs are likewise mounted under the /cdrom directory.
  7. The lines beginning with a pound sign (#) are considered comments and are used here to help delineate the various sections of the configuration information. The first two sections, beginning with the comments Database and Labels , describe the database routines and disk label types Volume Manager recognizes. These two sec­tions should not be modified. “ Devices to use” Section The third section, marked by the comment Devices to use , lists the names and types of the removable media devices Volume Manager should monitor. Each line in this section starts with the keyword use , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 The use keyword is followed by the type of device, either CD-ROM or floppy, and the keyword drive , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the device type is the OS name for the device. Note that the CD-ROM device name specifies only the first five characters of the full special device name. Because Volume Manager will monitor and mount all available slices it finds on a CD-ROM disk, the only information items needed are the specific controller and target portions of the device name. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the special device name is the name of the shared object used to manage the device. This must match the device type specified (e.g., if the device type is cdrom , the shared object must be dev_cdrom.so ). Finally, the symbolic name used in the /device directory is listed. The first device of a given type has a 0 (zero) appended to its name, whereas the second is appended with a 1, and so on. For instance, a second CD-ROM drive located at target 5 on the built-in SCSI con­troller would be placed under Volume Manager control by adding the following line to the devices section of the vold.conf file. use cdrom drive /dev/dsk/c0t5 dev_cdrom.so cdrom1 Actions Section The next section, which begins with the comment Actions , specifies the actions to be taken when certain events occur. The basic events are the insertion of media into a drive ( insert ), removal of media from a drive ( eject ), and notification of problems ( notify ). An example entry in the actions section follows. eject /vol*/dev/diskette[0-9]/* user=root /usr/sbin/rmmount Entry Content Each line lists an event followed by a regular expression. When an event occurs, each line that begins with the name of the event ( insert , eject , or notify ) is checked. If the volume on which the event occurs matches the regu­lar expression, the remainder of the action line comes into play. The remainder of this line includes the name of the user or group identification to be used to run the listed command with the listed arguments. In the previous example line, when the eject event occurs and the volume matches the regular expression /vol*/dev/dis­kette[0-9]/* , the command /usr/sbin/rmmount would be run with the root user permissions.
  8. Fsck is a multi-phase file system checker. Phase 1 checks that all of the right blocks are used (or unused) within the file system. This phase also checks that the size of the file (as recorded in the inode) agrees with the size of the data stored in the “used” blocks. Phase 2 of fsck checks to ensure that the directory and file name structure is coherent. Phase 3 of fsck checks to ensure that the directories are connected to the file system tree in the proper places, and that all links are properly referenced in the inode structure. Phase 4 checks to ensure that the link counts and reference counts are correct. Phase 5 checks individual cylinder group utilization, and reports file system statistics.
  9. TIP: It is often faster (and easier) not to reconnect zero-length files. Zero-length files may occur if a program creates a temporary file, opens it, and then removes it while the file is still open. The result is a file that does not belong to any directory but is still available to be written and read by the program. Under normal operations the file is cleaned up when the program exits.
  10. Linux provides support for the following journaling file systems: BeFS (BeOS File System), HTFS (SCO High Throughput file system), JFS (IBM journaling file system), NSS (Novel Storage Services), VxFS (Veritas File System), XFS (IRIX Extended File system), and the EXT3 file system. These are the most popular journaling file systems under Linux. The ext3 file system has become the standard on newer releases of Linux. The ext3 file system introduces several options for journaling that were not available under ext2. These options allow the sysadmin to tune the journal. The sysadmin can make the decision to tune the file system for performance (speed), or to tune the file system for reliability (data integrity). When tuning ext3 file systems for speed, the administrator can choose among the following modes.
  11. A file fragment exists because the file did not contain enough information to completely fill a multiple of disk sectors. When this occurs, only a portion of at least one disk sector is filled by the file. Over time, the file may be altered, and the space consumed by these fragmented sectors begins to add up. Another cause of file system fragmentation is the removal of files. This operation leaves clusters of data sectors empty in a field of sectors in use for other files. The defragmentation operation cleans these fragmented sectors, and causes the files to occupy contiguous sectors (if possible).
  12. NOTE: The repair option does not work with IDE disk drives. The IDE subsystem should handle bad-block mapping on its own.
  13. TIP: Due to the performance characteristics of SCSI and IDE disk subsystems, it would be advisable to incorporate SCSI-based disk drives in any high-performance disk subsystems. The high-end SCSI drives typically outperform their IDE counterparts in such applications. NOTE: A growing number of modern SCSI disks are “smart” in that they have a sophisticated internal controller and memory buffer that hide certain performance characteristics. These disks provide high performance, but are not readily tunable. The internal controller and memory buffer mask the effects of selected adjustments such as rotational delay factors. TIP: It is always a good idea to verify that the file system has been backed up to tape before making changes. If something goes wrong, the backup medium could be used to reload the files once a new file system is created with the desired parameters.
  14. NOTE: The space-versus-time storage strategy routines are automatically set by newfs, depending on the allocated minimum free space. The defaults are to use space optimization when the minimum free space is less than 10% of the disk blocks, and to use time optimization when the minimum free space is 10% or more of the disk blocks.