SlideShare une entreprise Scribd logo
1  sur  6
Video Lecture and E-Content Created by
R.D.SIVAKUMAR,M.Sc.,M.Phil.,M.Tech.,
Assistant Professor of Computer Science &
Assistant Professor and Head, Department of M.Com.(CA),
Ayya Nadar Janaki Ammal College,
Sivakasi – 626 124.
Mobile: 099440-42243
e-mail : sivamsccsit@gmail.com website:
www.rdsivakumar.blogspot.in
IMPLEMENTING FILE SYSTEMS
In computing, a file system (or file system) is used to control how
information is stored and retrieved. Without a file system,
information placed in a storage area would be one large body of
information with no way to tell where one piece of information
stops and the next begins.
DEFINITION OF FILE SYSTEM
Hard disks have two important properties that make them suitable for
secondary storage of files in file systems
Blocks of data can be rewritten in place,
They are direct access, allowing any block of data to be accessed with
only (relatively) minor movements of the disk heads and rotational
latency.
FILE SYSTEM STRUCTURE
At the lowest layer are the physical devices, consisting of the
magnetic media, motors & controls, and the electronics connected
to them and controlling them.
I/O Control consists of device drivers, special software programs (
often written in assembly ) which communicate with the devices
by reading and writing special codes directly to and from memory
addresses corresponding to the controller card's registers
LAYERED DESIGN
The basic file system level works directly with the device drivers in terms of
retrieving and storing raw blocks of data, without any consideration for what is
in each block.
The file organization module knows about files and their logical blocks, and
how they map to physical blocks on the disk.
The logical file system deals with all of the meta data associated with a file (
UID, GID, mode, dates, etc ), i.e. everything about the file except the data itself.
LAYERED DESIGN (Conti..)
Implementing File Systems-R.D.Sivakumar

Contenu connexe

En vedette

Building File Systems with FUSE
Building File Systems with FUSEBuilding File Systems with FUSE
Building File Systems with FUSEelliando dias
 
FUSE Developing Fillesystems in userspace
FUSE Developing Fillesystems in userspaceFUSE Developing Fillesystems in userspace
FUSE Developing Fillesystems in userspaceelliando dias
 
Fuse- Filesystem in User space
Fuse- Filesystem in User space Fuse- Filesystem in User space
Fuse- Filesystem in User space Danny Tseng
 
Alternatives to layer-based image distribution: using CERN filesystem for images
Alternatives to layer-based image distribution: using CERN filesystem for imagesAlternatives to layer-based image distribution: using CERN filesystem for images
Alternatives to layer-based image distribution: using CERN filesystem for imagesGeorge Lestaris
 
The evolution of storage on Linux
The evolution of storage on Linux The evolution of storage on Linux
The evolution of storage on Linux it-novum
 
KubeFuse - A File-System for Kubernetes
KubeFuse - A File-System for KubernetesKubeFuse - A File-System for Kubernetes
KubeFuse - A File-System for KubernetesBart Spaans
 
Scale out backups-with_bareos_and_gluster
Scale out backups-with_bareos_and_glusterScale out backups-with_bareos_and_gluster
Scale out backups-with_bareos_and_glusterGluster.org
 

En vedette (8)

Building File Systems with FUSE
Building File Systems with FUSEBuilding File Systems with FUSE
Building File Systems with FUSE
 
FUSE Developing Fillesystems in userspace
FUSE Developing Fillesystems in userspaceFUSE Developing Fillesystems in userspace
FUSE Developing Fillesystems in userspace
 
Fuse- Filesystem in User space
Fuse- Filesystem in User space Fuse- Filesystem in User space
Fuse- Filesystem in User space
 
Alternatives to layer-based image distribution: using CERN filesystem for images
Alternatives to layer-based image distribution: using CERN filesystem for imagesAlternatives to layer-based image distribution: using CERN filesystem for images
Alternatives to layer-based image distribution: using CERN filesystem for images
 
The evolution of storage on Linux
The evolution of storage on Linux The evolution of storage on Linux
The evolution of storage on Linux
 
KubeFuse - A File-System for Kubernetes
KubeFuse - A File-System for KubernetesKubeFuse - A File-System for Kubernetes
KubeFuse - A File-System for Kubernetes
 
Fuse technology-2015
Fuse technology-2015Fuse technology-2015
Fuse technology-2015
 
Scale out backups-with_bareos_and_gluster
Scale out backups-with_bareos_and_glusterScale out backups-with_bareos_and_gluster
Scale out backups-with_bareos_and_gluster
 

Similaire à Implementing File Systems-R.D.Sivakumar

Bs it itc questions{imtiaz hussain}
Bs it itc questions{imtiaz hussain}Bs it itc questions{imtiaz hussain}
Bs it itc questions{imtiaz hussain}Imtiaz Husssain
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case studyLavanya G
 
Operating System-R.D.Sivakumar
Operating System-R.D.SivakumarOperating System-R.D.Sivakumar
Operating System-R.D.SivakumarSivakumar R D .
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Ahmed Hashad
 
Distributed virtual disk storage system
Distributed virtual disk storage systemDistributed virtual disk storage system
Distributed virtual disk storage systemAlexander Decker
 
11.distributed virtual disk storage system
11.distributed virtual disk storage system11.distributed virtual disk storage system
11.distributed virtual disk storage systemAlexander Decker
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating systemDeepikaT13
 
what are the five major activities of an operating system in regard .pdf
what are the five major activities of an operating system in regard .pdfwhat are the five major activities of an operating system in regard .pdf
what are the five major activities of an operating system in regard .pdfamritashinfosalys
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic InvestigatorAgape Inc
 
operating system structure
operating system structureoperating system structure
operating system structureHAMZA AHMED
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computerNoor Zada
 
Model of file system
Model of file systemModel of file system
Model of file systemIshucs
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 

Similaire à Implementing File Systems-R.D.Sivakumar (20)

Bs it itc questions{imtiaz hussain}
Bs it itc questions{imtiaz hussain}Bs it itc questions{imtiaz hussain}
Bs it itc questions{imtiaz hussain}
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Operating System-R.D.Sivakumar
Operating System-R.D.SivakumarOperating System-R.D.Sivakumar
Operating System-R.D.Sivakumar
 
Data recovery with a view of digital forensics
Data recovery with a view of digital forensics Data recovery with a view of digital forensics
Data recovery with a view of digital forensics
 
Distributed virtual disk storage system
Distributed virtual disk storage systemDistributed virtual disk storage system
Distributed virtual disk storage system
 
11.distributed virtual disk storage system
11.distributed virtual disk storage system11.distributed virtual disk storage system
11.distributed virtual disk storage system
 
Fs Ch 18
Fs Ch 18Fs Ch 18
Fs Ch 18
 
Chap05
Chap05Chap05
Chap05
 
Database ms priyanka
Database ms priyankaDatabase ms priyanka
Database ms priyanka
 
Storage management in operating system
Storage management in operating systemStorage management in operating system
Storage management in operating system
 
what are the five major activities of an operating system in regard .pdf
what are the five major activities of an operating system in regard .pdfwhat are the five major activities of an operating system in regard .pdf
what are the five major activities of an operating system in regard .pdf
 
Data recovery
Data recoveryData recovery
Data recovery
 
Role of a Forensic Investigator
Role of a Forensic InvestigatorRole of a Forensic Investigator
Role of a Forensic Investigator
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Introduction to computer
Introduction to computerIntroduction to computer
Introduction to computer
 
Basics of i.t
Basics of i.tBasics of i.t
Basics of i.t
 
CSE4004_Module4_1.pptx
CSE4004_Module4_1.pptxCSE4004_Module4_1.pptx
CSE4004_Module4_1.pptx
 
Model of file system
Model of file systemModel of file system
Model of file system
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 

Plus de Sivakumar R D .

Internet Connections and Its Protocols - R D Sivakumar
Internet Connections and Its Protocols - R D SivakumarInternet Connections and Its Protocols - R D Sivakumar
Internet Connections and Its Protocols - R D SivakumarSivakumar R D .
 
Internet - R D Sivakumar.
Internet - R D Sivakumar.Internet - R D Sivakumar.
Internet - R D Sivakumar.Sivakumar R D .
 
Data Communication - R D Sivakumar
Data Communication - R D SivakumarData Communication - R D Sivakumar
Data Communication - R D SivakumarSivakumar R D .
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarSivakumar R D .
 
Computer Communications - R D Sivakumar
Computer Communications - R D SivakumarComputer Communications - R D Sivakumar
Computer Communications - R D SivakumarSivakumar R D .
 
Online Data Protection - R D Sivakumar
Online Data Protection - R D SivakumarOnline Data Protection - R D Sivakumar
Online Data Protection - R D SivakumarSivakumar R D .
 
Software Engineering - R.D.Sivakumar
Software Engineering - R.D.SivakumarSoftware Engineering - R.D.Sivakumar
Software Engineering - R.D.SivakumarSivakumar R D .
 
Different Kinds of Internet Protocols - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.SivakumarDifferent Kinds of Internet Protocols - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.SivakumarSivakumar R D .
 
Internet - R.D.Sivakumar
Internet - R.D.SivakumarInternet - R.D.Sivakumar
Internet - R.D.SivakumarSivakumar R D .
 
Electronic Publishing Tools for E-Learning - R.D.Sivakumar
Electronic Publishing Tools for E-Learning - R.D.SivakumarElectronic Publishing Tools for E-Learning - R.D.Sivakumar
Electronic Publishing Tools for E-Learning - R.D.SivakumarSivakumar R D .
 
E-learning Packages - R.D.Sivakumar
E-learning Packages - R.D.SivakumarE-learning Packages - R.D.Sivakumar
E-learning Packages - R.D.SivakumarSivakumar R D .
 
Digital Communication - R.D.Sivakumar
Digital Communication - R.D.SivakumarDigital Communication - R.D.Sivakumar
Digital Communication - R.D.SivakumarSivakumar R D .
 
Digigogy in Teaching - R.D.Sivakumar
Digigogy in Teaching - R.D.SivakumarDigigogy in Teaching - R.D.Sivakumar
Digigogy in Teaching - R.D.SivakumarSivakumar R D .
 
Cyber Commerce Technology - R.D.Sivakumar
Cyber Commerce Technology - R.D.SivakumarCyber Commerce Technology - R.D.Sivakumar
Cyber Commerce Technology - R.D.SivakumarSivakumar R D .
 
Video Lesson Creation - R.D.Sivakumar
Video Lesson Creation - R.D.SivakumarVideo Lesson Creation - R.D.Sivakumar
Video Lesson Creation - R.D.SivakumarSivakumar R D .
 
Cognitive and Personal Dimensions of Cyber Learning - R.D.Sivakumar
Cognitive and Personal Dimensions of Cyber Learning - R.D.SivakumarCognitive and Personal Dimensions of Cyber Learning - R.D.Sivakumar
Cognitive and Personal Dimensions of Cyber Learning - R.D.SivakumarSivakumar R D .
 
Innovative Presentation - R.D.Sivakumar
Innovative Presentation - R.D.SivakumarInnovative Presentation - R.D.Sivakumar
Innovative Presentation - R.D.SivakumarSivakumar R D .
 
Open Source in E-Learning - R.D.Sivakumar
Open Source in E-Learning - R.D.SivakumarOpen Source in E-Learning - R.D.Sivakumar
Open Source in E-Learning - R.D.SivakumarSivakumar R D .
 
Tuxpaint - R.D.Sivakumar
Tuxpaint - R.D.SivakumarTuxpaint - R.D.Sivakumar
Tuxpaint - R.D.SivakumarSivakumar R D .
 
Academic Blog Design - R.D.Sivakumar
Academic Blog Design - R.D.SivakumarAcademic Blog Design - R.D.Sivakumar
Academic Blog Design - R.D.SivakumarSivakumar R D .
 

Plus de Sivakumar R D . (20)

Internet Connections and Its Protocols - R D Sivakumar
Internet Connections and Its Protocols - R D SivakumarInternet Connections and Its Protocols - R D Sivakumar
Internet Connections and Its Protocols - R D Sivakumar
 
Internet - R D Sivakumar.
Internet - R D Sivakumar.Internet - R D Sivakumar.
Internet - R D Sivakumar.
 
Data Communication - R D Sivakumar
Data Communication - R D SivakumarData Communication - R D Sivakumar
Data Communication - R D Sivakumar
 
NETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D SivakumarNETWORK SERVICES - R D Sivakumar
NETWORK SERVICES - R D Sivakumar
 
Computer Communications - R D Sivakumar
Computer Communications - R D SivakumarComputer Communications - R D Sivakumar
Computer Communications - R D Sivakumar
 
Online Data Protection - R D Sivakumar
Online Data Protection - R D SivakumarOnline Data Protection - R D Sivakumar
Online Data Protection - R D Sivakumar
 
Software Engineering - R.D.Sivakumar
Software Engineering - R.D.SivakumarSoftware Engineering - R.D.Sivakumar
Software Engineering - R.D.Sivakumar
 
Different Kinds of Internet Protocols - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.SivakumarDifferent Kinds of Internet Protocols - R.D.Sivakumar
Different Kinds of Internet Protocols - R.D.Sivakumar
 
Internet - R.D.Sivakumar
Internet - R.D.SivakumarInternet - R.D.Sivakumar
Internet - R.D.Sivakumar
 
Electronic Publishing Tools for E-Learning - R.D.Sivakumar
Electronic Publishing Tools for E-Learning - R.D.SivakumarElectronic Publishing Tools for E-Learning - R.D.Sivakumar
Electronic Publishing Tools for E-Learning - R.D.Sivakumar
 
E-learning Packages - R.D.Sivakumar
E-learning Packages - R.D.SivakumarE-learning Packages - R.D.Sivakumar
E-learning Packages - R.D.Sivakumar
 
Digital Communication - R.D.Sivakumar
Digital Communication - R.D.SivakumarDigital Communication - R.D.Sivakumar
Digital Communication - R.D.Sivakumar
 
Digigogy in Teaching - R.D.Sivakumar
Digigogy in Teaching - R.D.SivakumarDigigogy in Teaching - R.D.Sivakumar
Digigogy in Teaching - R.D.Sivakumar
 
Cyber Commerce Technology - R.D.Sivakumar
Cyber Commerce Technology - R.D.SivakumarCyber Commerce Technology - R.D.Sivakumar
Cyber Commerce Technology - R.D.Sivakumar
 
Video Lesson Creation - R.D.Sivakumar
Video Lesson Creation - R.D.SivakumarVideo Lesson Creation - R.D.Sivakumar
Video Lesson Creation - R.D.Sivakumar
 
Cognitive and Personal Dimensions of Cyber Learning - R.D.Sivakumar
Cognitive and Personal Dimensions of Cyber Learning - R.D.SivakumarCognitive and Personal Dimensions of Cyber Learning - R.D.Sivakumar
Cognitive and Personal Dimensions of Cyber Learning - R.D.Sivakumar
 
Innovative Presentation - R.D.Sivakumar
Innovative Presentation - R.D.SivakumarInnovative Presentation - R.D.Sivakumar
Innovative Presentation - R.D.Sivakumar
 
Open Source in E-Learning - R.D.Sivakumar
Open Source in E-Learning - R.D.SivakumarOpen Source in E-Learning - R.D.Sivakumar
Open Source in E-Learning - R.D.Sivakumar
 
Tuxpaint - R.D.Sivakumar
Tuxpaint - R.D.SivakumarTuxpaint - R.D.Sivakumar
Tuxpaint - R.D.Sivakumar
 
Academic Blog Design - R.D.Sivakumar
Academic Blog Design - R.D.SivakumarAcademic Blog Design - R.D.Sivakumar
Academic Blog Design - R.D.Sivakumar
 

Dernier

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Implementing File Systems-R.D.Sivakumar

  • 1. Video Lecture and E-Content Created by R.D.SIVAKUMAR,M.Sc.,M.Phil.,M.Tech., Assistant Professor of Computer Science & Assistant Professor and Head, Department of M.Com.(CA), Ayya Nadar Janaki Ammal College, Sivakasi – 626 124. Mobile: 099440-42243 e-mail : sivamsccsit@gmail.com website: www.rdsivakumar.blogspot.in IMPLEMENTING FILE SYSTEMS
  • 2. In computing, a file system (or file system) is used to control how information is stored and retrieved. Without a file system, information placed in a storage area would be one large body of information with no way to tell where one piece of information stops and the next begins. DEFINITION OF FILE SYSTEM
  • 3. Hard disks have two important properties that make them suitable for secondary storage of files in file systems Blocks of data can be rewritten in place, They are direct access, allowing any block of data to be accessed with only (relatively) minor movements of the disk heads and rotational latency. FILE SYSTEM STRUCTURE
  • 4. At the lowest layer are the physical devices, consisting of the magnetic media, motors & controls, and the electronics connected to them and controlling them. I/O Control consists of device drivers, special software programs ( often written in assembly ) which communicate with the devices by reading and writing special codes directly to and from memory addresses corresponding to the controller card's registers LAYERED DESIGN
  • 5. The basic file system level works directly with the device drivers in terms of retrieving and storing raw blocks of data, without any consideration for what is in each block. The file organization module knows about files and their logical blocks, and how they map to physical blocks on the disk. The logical file system deals with all of the meta data associated with a file ( UID, GID, mode, dates, etc ), i.e. everything about the file except the data itself. LAYERED DESIGN (Conti..)