SlideShare une entreprise Scribd logo
1  sur  94
Disks and File Systems Chapter 8
Chapter Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Drives 101 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Drives 101 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Partitions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Partitions ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Interfaces ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
SCSI
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
SCSI ,[object Object],[object Object],[object Object],[object Object],[object Object]
IDE ,[object Object],[object Object],[object Object],[object Object],[object Object]
IDE ,[object Object],[object Object]
Fibre Channel ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fibre Channel ,[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object]
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object]
Disk Subsystems
Disk Subsystem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General Checklist for Adding a Disk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adding an SCSI Disk to the System ,[object Object],[object Object],[object Object],[object Object]
Adding an IDE Disk to the System ,[object Object],[object Object],[object Object]
NAS AND SAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NAS AND SAN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Utilities ,[object Object],[object Object],[object Object],[object Object]
Utilities ,[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windows File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
UNIX File systems ,[object Object],[object Object]
UNIX File systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Linux File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
Linux File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating UNIX File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working with the newfs Command ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Working with the newfs Command ,[object Object],[object Object],[object Object],[object Object],[object Object]
How newfs   Connects to mkfs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mounting File Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Mounting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Tendances (20)

Hard drive
Hard driveHard drive
Hard drive
 
Hard Disk
Hard Disk Hard Disk
Hard Disk
 
HARD DISK PARTITIONING,FORMATING
HARD DISK PARTITIONING,FORMATINGHARD DISK PARTITIONING,FORMATING
HARD DISK PARTITIONING,FORMATING
 
Chap2 hdd1
Chap2 hdd1Chap2 hdd1
Chap2 hdd1
 
Hard Disk
Hard DiskHard Disk
Hard Disk
 
Hard Disk Drive
Hard Disk Drive Hard Disk Drive
Hard Disk Drive
 
Storage (Hard disk drive)
Storage (Hard disk drive)Storage (Hard disk drive)
Storage (Hard disk drive)
 
Advanced format for hard disk drives
Advanced format for hard disk drivesAdvanced format for hard disk drives
Advanced format for hard disk drives
 
Hard disk drive
Hard disk driveHard disk drive
Hard disk drive
 
Hard Disk Drive
Hard Disk DriveHard Disk Drive
Hard Disk Drive
 
How hard drive works ?
How hard drive works ?How hard drive works ?
How hard drive works ?
 
Hard disk
Hard diskHard disk
Hard disk
 
PPT hard disk Drive
PPT  hard disk Drive PPT  hard disk Drive
PPT hard disk Drive
 
HARD DISK DRIVE
HARD DISK DRIVE HARD DISK DRIVE
HARD DISK DRIVE
 
Hard Drives
Hard DrivesHard Drives
Hard Drives
 
Hard Disk Componets
Hard Disk ComponetsHard Disk Componets
Hard Disk Componets
 
Storage System and Backup Media
Storage System and Backup MediaStorage System and Backup Media
Storage System and Backup Media
 
Hard Disk Drive
Hard Disk DriveHard Disk Drive
Hard Disk Drive
 
Unit3 ppt3 hard drive
Unit3 ppt3 hard driveUnit3 ppt3 hard drive
Unit3 ppt3 hard drive
 
Hard disk
Hard diskHard disk
Hard disk
 

En vedette

Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12     Managing And Implementing Backups And Disaster RecoveryChapter12     Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster Recovery
Raja Waseem Akhtar
 

En vedette (20)

Chapter12 Managing And Implementing Backups And Disaster Recovery
Chapter12     Managing And Implementing Backups And Disaster RecoveryChapter12     Managing And Implementing Backups And Disaster Recovery
Chapter12 Managing And Implementing Backups And Disaster Recovery
 
Ch13 system administration
Ch13 system administration Ch13 system administration
Ch13 system administration
 
Ch06
Ch06Ch06
Ch06
 
Ch01
Ch01Ch01
Ch01
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Ch04 system administration
Ch04 system administration Ch04 system administration
Ch04 system administration
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
Ch20 system administration
Ch20 system administration Ch20 system administration
Ch20 system administration
 
Ch06 system administration
Ch06 system administration Ch06 system administration
Ch06 system administration
 
Ch10
Ch10Ch10
Ch10
 
Ch14 system administration
Ch14 system administration Ch14 system administration
Ch14 system administration
 
Excel 2007 Unit C
Excel 2007 Unit CExcel 2007 Unit C
Excel 2007 Unit C
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
 
Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Ramadan 2008
Ramadan 2008Ramadan 2008
Ramadan 2008
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Beat Anger
Beat AngerBeat Anger
Beat Anger
 
Ch21 system administration
Ch21 system administration Ch21 system administration
Ch21 system administration
 

Similaire à Ch08

Storage devices
Storage devicesStorage devices
Storage devices
Tinku12345
 
Asif Jamal disk (it)
Asif Jamal disk (it)Asif Jamal disk (it)
Asif Jamal disk (it)
Asif Jamal
 
Ch14 OS
Ch14 OSCh14 OS
Ch14 OS
C.U
 

Similaire à Ch08 (20)

Storage devices
Storage devicesStorage devices
Storage devices
 
Disk structure
Disk structureDisk structure
Disk structure
 
Disk Management
Disk ManagementDisk Management
Disk Management
 
Disk Management.pdf
Disk Management.pdfDisk Management.pdf
Disk Management.pdf
 
Hard Disk Data Recovery Basics -Raminfotech
Hard Disk Data Recovery Basics -RaminfotechHard Disk Data Recovery Basics -Raminfotech
Hard Disk Data Recovery Basics -Raminfotech
 
Asif Jamal disk (it)
Asif Jamal disk (it)Asif Jamal disk (it)
Asif Jamal disk (it)
 
Ch14 OS
Ch14 OSCh14 OS
Ch14 OS
 
OSCh14
OSCh14OSCh14
OSCh14
 
OS_Ch14
OS_Ch14OS_Ch14
OS_Ch14
 
1.1 storage device
1.1  storage device1.1  storage device
1.1 storage device
 
Computer with terms
Computer with termsComputer with terms
Computer with terms
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
 
Chapter 12 - Mass Storage Systems
Chapter 12 - Mass Storage SystemsChapter 12 - Mass Storage Systems
Chapter 12 - Mass Storage Systems
 
Operation System
Operation SystemOperation System
Operation System
 
Ch12
Ch12Ch12
Ch12
 
Hard Disk Drive.pptx
Hard Disk Drive.pptxHard Disk Drive.pptx
Hard Disk Drive.pptx
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Operation System
Operation SystemOperation System
Operation System
 
PC Hardware Servicing Hand Out 2
PC Hardware Servicing Hand Out 2PC Hardware Servicing Hand Out 2
PC Hardware Servicing Hand Out 2
 
Secondary storage structure-Operating System Concepts
Secondary storage structure-Operating System ConceptsSecondary storage structure-Operating System Concepts
Secondary storage structure-Operating System Concepts
 

Plus de Raja Waseem Akhtar

Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
Raja Waseem Akhtar
 

Plus de Raja Waseem Akhtar (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
God is Great
God is GreatGod is Great
God is Great
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Ch08

  • 1. Disks and File Systems Chapter 8
  • 2.
  • 3.  
  • 4.
  • 5.
  • 6.  
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.  
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. SCSI
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. SCSI
  • 33.
  • 34.  
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.  
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.  
  • 66.
  • 67.
  • 68.  
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.

Notes de l'éditeur

  1. Need pictures here!!!
  2. If the bad spot is located on a cylinder which contains a “free” alternate sector, this is the preferred location to map the bad block. The drive electronics do not have to move the heads in this case. The only “penalty” is the delay caused by the rotational latency of the platter. On the other hand, if there is no free alternate sector on the same cylinder as the bad spot, there are penalties to be paid. The drive electronics have to move the heads to an alternate cylinder, and then write the data into the alternate location. The original bad spot has to be marked bad, and a table has to be updated to point to the new “alternate” location for the data from that sector. Every time the file is accessed, this penalty is paid.
  3. UPDATE THIS
  4. Pictures of the different raid levels!
  5. Add windows stuff here
  6. The entries in the table are created on a first-come, first-serve basis; there is no overlying structure to the table! The default size of the disk clusters is determined by the size of the partition. The minimum cluster size is 1 sector/cluster (512 bytes) for small (32 MB or smaller) partitions. The largest cluster size is 128 sectors (64 Kbytes) for large (2,048 to 4,096 MB) partitions. The operator can tune the cluster size using the format command with the /a:size switch when invoking format.
  7. Some UNIX variants also provide ufs logging. A file system that employs ufs logging is more fault tolerant than a standard ufs file system. The ufs logging feature allocates 1 megabyte of file system space per gigabyte of file system for use as a transaction log. The system disk driver writes all transactions to the log. Once the ufs log has been written, the driver considers the transaction complete. The information in the ufs log is written to the file system at a later time. Consult the manual page for mount_ufs for more information on ufs logging, and how to configure/enable it for specific versions of UNIX.
  8. Some UNIX variants also provide ufs logging. A file system that employs ufs logging is more fault tolerant than a standard ufs file system. The ufs logging feature allocates 1 megabyte of file system space per gigabyte of file system for use as a transaction log. The system disk driver writes all transactions to the log. Once the ufs log has been written, the driver considers the transaction complete. The information in the ufs log is written to the file system at a later time. Consult the manual page for mount_ufs for more information on ufs logging, and how to configure/enable it for specific versions of UNIX.
  9. Some UNIX variants also provide ufs logging. A file system that employs ufs logging is more fault tolerant than a standard ufs file system. The ufs logging feature allocates 1 megabyte of file system space per gigabyte of file system for use as a transaction log. The system disk driver writes all transactions to the log. Once the ufs log has been written, the driver considers the transaction complete. The information in the ufs log is written to the file system at a later time. Consult the manual page for mount_ufs for more information on ufs logging, and how to configure/enable it for specific versions of UNIX.
  10. Some UNIX variants also provide ufs logging. A file system that employs ufs logging is more fault tolerant than a standard ufs file system. The ufs logging feature allocates 1 megabyte of file system space per gigabyte of file system for use as a transaction log. The system disk driver writes all transactions to the log. Once the ufs log has been written, the driver considers the transaction complete. The information in the ufs log is written to the file system at a later time. Consult the manual page for mount_ufs for more information on ufs logging, and how to configure/enable it for specific versions of UNIX.
  11. Minix: the original Linux file system.     Ext: The Extended file system ( ext ) was the replacement for the Minix file system on Linux. The ext file system came with a new concept: the virtual file system ( vfs ) driver. The vfs code allows the real file systems to interface with the kernel via an application-programming interface. This greatly simplified the task of porting new file systems to the Linux environment.     Ext2: The Second Extended file system ( ext2 ) eventually replaced the ext file system on Linux. The ext2 file system continues to be the mainstay file system for Linux systems. Although it is similar to the ufs file system, it contains several modifications that improve performance and reliability of the overall file system.     Ext3: The most recent version of the ext file system under Linux. Ext3 adds a configurable level of journaling to the features of the ext2 file system.     Xia: The successor to the Minix file system. The Linux implementation allows Linux and Minim [Author: Minix?]to share files.     Umsdos: A Linux version of the DOS file system. This file system provides additional structures for supporting file ownership, and security information for DOS file systems.     Msdos: An implementation of the Microsoft DOS file system without the Linux extensions.     Vfat: A Linux implementation of the Windows FAT file system.     Proc: Refer to the UNIX file system section for information on the proc file system.     Smb: The Microsoft Server Message Block file system for Linux. This file system allows Linux to mount Microsoft SMB file systems.     Ncp: A Linux implementation of the Novel Client Protocol that allows Linux to mount Novel Netware file systems.     Iso9660: The Linux implementation of the ISO9660 file system used by most CDs.     Sysv: The Linux implementation of the original System V UNIX file system. Not used often.     Hpfs: The Linux implementation of the High Performance File System, allowing Linux to mount OS/2 hpfs partitions.     Affs: The Linux implementation of the Amiga fast file system that allows Linux and Amiga systems to share files.     Ufs: Refer to the UNIX file systems section for information on the ufs file system.
  12. Minix: the original Linux file system.     Ext: The Extended file system ( ext ) was the replacement for the Minix file system on Linux. The ext file system came with a new concept: the virtual file system ( vfs ) driver. The vfs code allows the real file systems to interface with the kernel via an application-programming interface. This greatly simplified the task of porting new file systems to the Linux environment.     Ext2: The Second Extended file system ( ext2 ) eventually replaced the ext file system on Linux. The ext2 file system continues to be the mainstay file system for Linux systems. Although it is similar to the ufs file system, it contains several modifications that improve performance and reliability of the overall file system.     Ext3: The most recent version of the ext file system under Linux. Ext3 adds a configurable level of journaling to the features of the ext2 file system.     Xia: The successor to the Minix file system. The Linux implementation allows Linux and Minim [Author: Minix?]to share files.     Umsdos: A Linux version of the DOS file system. This file system provides additional structures for supporting file ownership, and security information for DOS file systems.     Msdos: An implementation of the Microsoft DOS file system without the Linux extensions.     Vfat: A Linux implementation of the Windows FAT file system.     Proc: Refer to the UNIX file system section for information on the proc file system.     Smb: The Microsoft Server Message Block file system for Linux. This file system allows Linux to mount Microsoft SMB file systems.     Ncp: A Linux implementation of the Novel Client Protocol that allows Linux to mount Novel Netware file systems.     Iso9660: The Linux implementation of the ISO9660 file system used by most CDs.     Sysv: The Linux implementation of the original System V UNIX file system. Not used often.     Hpfs: The Linux implementation of the High Performance File System, allowing Linux to mount OS/2 hpfs partitions.     Affs: The Linux implementation of the Amiga fast file system that allows Linux and Amiga systems to share files.     Ufs: Refer to the UNIX file systems section for information on the ufs file system.
  13. The lines beginning with a pound sign (#) are considered comments and are used here to help delineate the various sections of the configuration information. The first two sections, beginning with the comments Database and Labels , describe the database routines and disk label types Volume Manager recognizes. These two sec­tions should not be modified. “ Devices to use” Section The third section, marked by the comment Devices to use , lists the names and types of the removable media devices Volume Manager should monitor. Each line in this section starts with the keyword use , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 The use keyword is followed by the type of device, either CD-ROM or floppy, and the keyword drive , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the device type is the OS name for the device. Note that the CD-ROM device name specifies only the first five characters of the full special device name. Because Volume Manager will monitor and mount all available slices it finds on a CD-ROM disk, the only information items needed are the specific controller and target portions of the device name. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the special device name is the name of the shared object used to manage the device. This must match the device type specified (e.g., if the device type is cdrom , the shared object must be dev_cdrom.so ). Finally, the symbolic name used in the /device directory is listed. The first device of a given type has a 0 (zero) appended to its name, whereas the second is appended with a 1, and so on. For instance, a second CD-ROM drive located at target 5 on the built-in SCSI con­troller would be placed under Volume Manager control by adding the following line to the devices section of the vold.conf file. use cdrom drive /dev/dsk/c0t5 dev_cdrom.so cdrom1 Actions Section The next section, which begins with the comment Actions , specifies the actions to be taken when certain events occur. The basic events are the insertion of media into a drive ( insert ), removal of media from a drive ( eject ), and notification of problems ( notify ). An example entry in the actions section follows. eject /vol*/dev/diskette[0-9]/* user=root /usr/sbin/rmmount Entry Content Each line lists an event followed by a regular expression. When an event occurs, each line that begins with the name of the event ( insert , eject , or notify ) is checked. If the volume on which the event occurs matches the regu­lar expression, the remainder of the action line comes into play. The remainder of this line includes the name of the user or group identification to be used to run the listed command with the listed arguments. In the previous example line, when the eject event occurs and the volume matches the regular expression /vol*/dev/dis­kette[0-9]/* , the command /usr/sbin/rmmount would be run with the root user permissions.
  14. The lines beginning with a pound sign (#) are considered comments and are used here to help delineate the various sections of the configuration information. The first two sections, beginning with the comments Database and Labels , describe the database routines and disk label types Volume Manager recognizes. These two sec­tions should not be modified. “ Devices to use” Section The third section, marked by the comment Devices to use , lists the names and types of the removable media devices Volume Manager should monitor. Each line in this section starts with the keyword use , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 The use keyword is followed by the type of device, either CD-ROM or floppy, and the keyword drive , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the device type is the OS name for the device. Note that the CD-ROM device name specifies only the first five characters of the full special device name. Because Volume Manager will monitor and mount all available slices it finds on a CD-ROM disk, the only information items needed are the specific controller and target portions of the device name. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the special device name is the name of the shared object used to manage the device. This must match the device type specified (e.g., if the device type is cdrom , the shared object must be dev_cdrom.so ). Finally, the symbolic name used in the /device directory is listed. The first device of a given type has a 0 (zero) appended to its name, whereas the second is appended with a 1, and so on. For instance, a second CD-ROM drive located at target 5 on the built-in SCSI con­troller would be placed under Volume Manager control by adding the following line to the devices section of the vold.conf file. use cdrom drive /dev/dsk/c0t5 dev_cdrom.so cdrom1 Actions Section The next section, which begins with the comment Actions , specifies the actions to be taken when certain events occur. The basic events are the insertion of media into a drive ( insert ), removal of media from a drive ( eject ), and notification of problems ( notify ). An example entry in the actions section follows. eject /vol*/dev/diskette[0-9]/* user=root /usr/sbin/rmmount Entry Content Each line lists an event followed by a regular expression. When an event occurs, each line that begins with the name of the event ( insert , eject , or notify ) is checked. If the volume on which the event occurs matches the regu­lar expression, the remainder of the action line comes into play. The remainder of this line includes the name of the user or group identification to be used to run the listed command with the listed arguments. In the previous example line, when the eject event occurs and the volume matches the regular expression /vol*/dev/dis­kette[0-9]/* , the command /usr/sbin/rmmount would be run with the root user permissions.
  15. The lines beginning with a pound sign (#) are considered comments and are used here to help delineate the various sections of the configuration information. The first two sections, beginning with the comments Database and Labels , describe the database routines and disk label types Volume Manager recognizes. These two sec­tions should not be modified. “ Devices to use” Section The third section, marked by the comment Devices to use , lists the names and types of the removable media devices Volume Manager should monitor. Each line in this section starts with the keyword use , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 The use keyword is followed by the type of device, either CD-ROM or floppy, and the keyword drive , as follows. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the device type is the OS name for the device. Note that the CD-ROM device name specifies only the first five characters of the full special device name. Because Volume Manager will monitor and mount all available slices it finds on a CD-ROM disk, the only information items needed are the specific controller and target portions of the device name. use cdrom drive /dev/dsk/c0t6 dev_cdrom.so cdrom0 Following the special device name is the name of the shared object used to manage the device. This must match the device type specified (e.g., if the device type is cdrom , the shared object must be dev_cdrom.so ). Finally, the symbolic name used in the /device directory is listed. The first device of a given type has a 0 (zero) appended to its name, whereas the second is appended with a 1, and so on. For instance, a second CD-ROM drive located at target 5 on the built-in SCSI con­troller would be placed under Volume Manager control by adding the following line to the devices section of the vold.conf file. use cdrom drive /dev/dsk/c0t5 dev_cdrom.so cdrom1 Actions Section The next section, which begins with the comment Actions , specifies the actions to be taken when certain events occur. The basic events are the insertion of media into a drive ( insert ), removal of media from a drive ( eject ), and notification of problems ( notify ). An example entry in the actions section follows. eject /vol*/dev/diskette[0-9]/* user=root /usr/sbin/rmmount Entry Content Each line lists an event followed by a regular expression. When an event occurs, each line that begins with the name of the event ( insert , eject , or notify ) is checked. If the volume on which the event occurs matches the regu­lar expression, the remainder of the action line comes into play. The remainder of this line includes the name of the user or group identification to be used to run the listed command with the listed arguments. In the previous example line, when the eject event occurs and the volume matches the regular expression /vol*/dev/dis­kette[0-9]/* , the command /usr/sbin/rmmount would be run with the root user permissions.