0% found this document useful (0 votes)
24 views

Operating System

The document compares four file systems: NTFS, FAT32, EXT3, and HFS+. It outlines which operating systems each file system supports, maximum volume and file name sizes, character encoding, and key features such as encryption, compression, permissions, and performance characteristics. NTFS supports the most security and management features while FAT32 supports the fewest. The optimal file system depends on the operating system and intended usage.

Uploaded by

David Dave
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Operating System

The document compares four file systems: NTFS, FAT32, EXT3, and HFS+. It outlines which operating systems each file system supports, maximum volume and file name sizes, character encoding, and key features such as encryption, compression, permissions, and performance characteristics. NTFS supports the most security and management features while FAT32 supports the fewest. The optimal file system depends on the operating system and intended usage.

Uploaded by

David Dave
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Operating System

Assignment 2/Part 2 Comparison Table


NTFS
Windows NT

FAT32
Windows 98 Windows ME Windows 2000 Windows XP

EXT3
Linux BSD

Operating system

Windows 2000 Windows XP

Vista,7
Max Volume Size Max File Name 2tb Up to 255

HFS PLUS MAC OS lunix Darwin OS x 8 Exabyte up to 255

Limitation
2tb Up to 255 File System Features

32tb up to 254

Length Unicode character file


System Records

Unicode

Unicode

Unicode character set MFS


sector 0,1

Unicode any character LVM


Sector 0,1

Character Set
MFT Mirror File First and Last Sectors Standard and

Character Set
Second Copy of FAT First Sector

Mirror
Boot Sector location File Attributes Alternate Streams Compression Encryption Object Permissions Disk Quotas Sparse Files Reparse Points Volume Mount Points Built-In Security data Recoverability Volume Performance Disk Space Economy Fault Tolerance

Standard Set No No No No No No No No

Extended
No Yes Provided at block block devices level No supported Yes No Yes

Extended
no Yes No/possible using fileVault No supported yes No Yes

Custom
Yes Yes yes Yes No No No No

Overall Performance
Yes Yes Low on small volumes High on Large Max Max No No High on small volumes Low on large Average Minimal Average Minimal Average yes on recent version Yes No Average Yes yes Average

Part3 Report
The development of encryption file system has been development using the XoR encryption algorisms With the Bloodshed Dev-C++ compiler with has the entire library needed for the development of the Program if using visual C++ 2008,2010 additional library must be include to be able to compile the source code, this program has been developed to use on windows platform; the XoR algorisms use a trivial symmetric cipher. The XoR operator output a 1 when the value for the 1st and the 2nd bit is 1 and the operator returns a 0 when both of the bits is 1 or both are zero. With that method with the combination of a key plain text message can be converted to cipher text.

Comparison Table summary


The file system use for the comparison table are the NTFS, FAT32, EXT3 and HFS+ all of those four system file has different capability and each of them support different operating system, The NTFS and FAT32 support mostly the Microsoft platform which is windows, the EXT3 is mostly use by Linux platform and the last one which is the HFS+ is mostly use on the Mac OS of Apple, all of the for support Unicode character, but not all of them support encryption and compression NTFS support well the encryption features but not Fat32,were as It provide encryption at block device level and it no available on the HFS+. Data recovery is well supported with the NTFS and the HFS+ but not with the FAT32 and the EXT3 depends on what kind of recovery from crash, recovery or data deletion and forensic recovery. In fact the file system you chose will depend on what operating system and usage will be used.

Referencing
Sansurooah, K. (2010) Lecture Note 11: operating system. ECU

Gollmann, D. (2006). Computer security (2nd ed.): wiley.

Bosworth, S. K., Michel E; Whyne, Eric. (2009). Computer security handbook (5nd ed.): John Wiley & Sons.

JW Han, CS Park, DH Ryu, ES Kim (1999).Optical Engineering,Optical image encryption based on XOR operations :link.aip.org

Held, G. (Ed.). (1999). Encryption:Techniques with BASIC and C++ . USA: Wordware Publishing, Inc.

Micali, S. G. a. S. (1984). Probabilistic encryption. 28(2), 270-299.

Joan Daemen, V. R. (2001). The design of Rijndael: AES --the advanced encryption standard :Springer (Ed.)

D Roselli, JR Lorch, TE Anderson (2000). A comparison of file system workloads:portal.acm.org

You might also like