0% found this document useful (0 votes)
21 views30 pages

File Organization and Management Theory Pages 4

The document discusses various types of storage technologies, including Direct-attached storage (DAS), Network-attached storage (NAS), and Storage area network (SAN), highlighting their characteristics and differences. It also covers robotic storage systems, file storage types, and the mechanics of data storage and retrieval, detailing the functions of different storage media such as floppy disks, hard drives, CD-ROMs, magnetic tapes, and flash memory. Additionally, it addresses disk management issues and concepts related to file access types, seek time, and buffer requirements.

Uploaded by

amehh270
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views30 pages

File Organization and Management Theory Pages 4

The document discusses various types of storage technologies, including Direct-attached storage (DAS), Network-attached storage (NAS), and Storage area network (SAN), highlighting their characteristics and differences. It also covers robotic storage systems, file storage types, and the mechanics of data storage and retrieval, detailing the functions of different storage media such as floppy disks, hard drives, CD-ROMs, magnetic tapes, and flash memory. Additionally, it addresses disk management issues and concepts related to file access types, seek time, and buffer requirements.

Uploaded by

amehh270
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

91

Related technologies

Network connectivity

A secondary or tertiary storage may connect to a computer utilizing computer


networks. This concept does not pertain to the primary storage, which is shared
between multiple processors in a much lesser degree.

• Direct-attached storage (DAS) is a traditional mass storage, that does


not use any network. This is still a most popular approach. This term was
coined lately, together with NAS and SAN.
• Network-attached storage (NAS) is mass storage attached to a computer
which another computer can access at file level over a local-area network,
a private wide-area network, or in the case of online file storage, over the
Internet. NAS is commonly associated with the NFS and CIFS/SMB
protocols.
• Storage area network (SAN) is a specialized network, that provides other
computers with storage capacity. The crucial difference between NAS and
SAN is the former presents and manages file systems to client computers,
whilst a latter provides access at block-addressing (raw) level, leaving it to
attaching systems to manage data or file systems within the provided
capacity. SAN is commonly associated with Fibre Channel networks.

Robotic storage

Large quantities of individual magnetic tapes, and optical or magneto-optical


discs may be stored in robotic tertiary storage devices. In tape storage field they
are known as tape libraries, and in optical storage field optical jukeboxes, or
optical disk libraries per analogy. Smallest forms of either technology containing
just one drive device are referred to as autoloaders or autochangers.

91
92

Robotic-access storage devices may have a number of slots, each holding


individual media, and usually one or more picking robots that traverse the slots
and load media to built-in drives. The arrangement of the slots and picking
devices affects performance. Important characteristics of such storage are
possible expansion options: adding slots, modules, drives, robots. Tape libraries
may have from 10 to more than 100,000 slots, and provide terabytes or
petabytes of near-line information. Optical jukeboxes are somewhat smaller
solutions, up to 1,000 slots.

Robotic storage is used for backups, and for high-capacity archives in imaging,
medical, and video industries. Hierarchical storage management is a most known
archiving strategy of automatically migrating long-unused files from fast hard disk
storage to libraries or jukeboxes. If the files are needed, they are retrieved back
to disk.

92
93

WEEK 8

THIS WEEK SPECIFIC LEARNING OUTCOMES

To understand:

 Types of storage devices and media


 The characteristics of magnetic storage media, tape, disk, cartridge, bubble,
hard disk, CD-ROM, floppy disks, zip disk, tape streamer, flash memory,
optical disk.

93
94

Storage media/devices

A device that can receive data and retain for subsequent retrieval is called
storage medium. The file storage and retrieval describe the organization,
storage, location and retrieval of coded information in computer system.
Important factors in storing and retrieving information are the type of media or
storage device used to store information, the media’s storage capacity, the speed
of access and information transfer to and from the storage media, the number of
times new information can be written to the media and how the media interacts
with the computer.

Types of file storage


File storage can be classified as permanent storage and temporal storage. File
can also be classified and having been stored to or retrieved from primary or
secondary memory. The primary memory is also known as main memory is the
computer’s main random access memory (RAM). All information that is
processed by the computer must first pass through main memory. Secondary is
any form of memory/storage other than the main computer memory. Such
memories (devices) cover a wide range of capacities and speed of access. The
examples are; magnetic disk storage which include floppies, hard-disks,
cartridge, exchangeable multi-platter, CD-ROMs, fixed disks, flash disk and
magnetic tape.

a. Permanent storage
Information is stored permanently on storage that is written to only once, such
ROM (read only memory) chips and CD-ROM (compact disk read only memory).
Permanent storage media is used for archiving files or in case of ROM chips, for
storing basic information that the computer needs to function that cannot be
overwritten.

94
95

b. Temporary storage
Temporary information storage is used as intermediate storage between
permanent or semi-permanent storage and computer’s central processing unit
(CPU). The temporary storage is the form of memory chip called random access
memory (RAM). Information is stored in RAM while the CPU is using it. It is then
returned to a more permanent form of memory. RAM chips are known as volatile
memory because they must have power supplied to them continuously otherwise
they lose the content of their memory.

How information storage and retrieval work

All information possessed can be expressed as numbers in binary notation.


These binary numbers are strings of bits, 1s and os, that are grouped together in
sequences of eight called byte. The two value bits are physically stored in
storage media in variety of ways. For instance, they can be represented by the
presence and absence of electrical charge on a pair of closely spaced
conductors called a capacitor.

In computer system, the CPU processes information and maintains it temporarily


in RAM in the form of strings of bits called files. When this temporary information
needs to be stored permanently, the CPU finds unused space in the storage
media, generally a hard disk, floppy disk or magnetic tape. It then instructs a
device capable of making change to the media (called a read/write head) to start
transferring bits. The read/write head and its associated electronics convert each
bit to the equivalent physical value on the media. The recording/writing
mechanism then continues to the next location on the media capable of storing
bits.

When the CPU needs to access some piece of stored information, the process is
reversed. The CPU determines where on the physical media the appropriate file

95
96

is stored, then directs the read/write head to position itself at that location on the
media, and then directs it to read the information stored there.

Storage media:

Information is stored on many different types of media, the most common being
floppy disks, hard drives, CD-ROMs, magnetic tapes and flash disks.

Floppy disks

Floppy disks are most often used to store information, such as application
programs that are frequently accessed by the users. A floppy disk is a thin piece
of magnetic material inside a protective envelop. The size of the disk is usually
given as a diameter of the magnetic media. The two most common sizes are; 2.5
inch and 5.25 inch. Both sizes of floppies are removable disk – that is, they must
be inserted into a compatible disk drive to read from or written to. This drive is
usually internal to, or part of a computer. Most floppy drives today are double
sided, with one head on each side of the disk. This doubles the storage capacity
of the disk, allowing it to be written to on both sides. Information is organized on
the disk by dividing the disk into tracks and sectors. Tracks are concentric
circular regions on the surface of the disk. Before a floppy can be used, the
computer has to format it by placing special information on the disk that enables
the computer to find each track and sector.

Hard drive

Hard drives consist of grid circular platters


of magnetizable material sealed in a metal
box with associated read/writ heads. They
are usually internal to a computer. Most

96
97

hard drives have multiple platters stacked on top of one another, each with it’s
own read/write head. The media in a hard drive is generally not removable from
the drive assembly, although external hard drive do exist with removable hard
disks. The read/write heads in a hard drive are precisely aligned with the
surfaces of the hard disks, allowing thousands of tracks and dozens of sectors
per track. The combination of more heads and more tracks allows hard drives to
store more data and to transfer data at a higher rate than floppy disks.

Accessing information on a hard disk involves moving the heads to the right track
and then waits for the correct sector to revolve underneath the head. Seek time
is the average time needed/required to move the heads from one track to some
other desired track on the disk. The time needed to move from one track to a
neighbouring track is often in the 1 millisecond (i.e one thousand per second)
range, and the average seek time to reach arbitrary track anywhere on the disk is
in the 6 to 15 millisecond range.

Rational latency is the average time required for the correct sector to come under
the head once they are positioned on the correct track. This time depends on
how fast the disk is revolving. Today, many drives run 120 to 180 (or more)
revolutions per second or faster, yielding average rotational latencies of a few
milliseconds.

If a file required more than one sector for storage, the positions of the sectors on
the individual tracks can greatly affect the average access time. Typically, it takes
the disk controller a small amount of time to finish reading a sector. If the next
sector to be read is the neighbouring sector on the track, the electronic may not
have enough time to get ready to read it before it rotates under the read/write
head. If this is the case, the drive must wait until the sector comes all the way
round again. This access time can be reduced by interleaving, or alternatively
placing the sectors on the tracks so that sequential sectors for the same file are

97
98

separated from each other by one or two sectors. When information is distributed
optimally, the device controller is ready to start reading just as the appropriate
sector comes under the read/write head.

After many files have been written to and erased from a disk, fragmentation can
occur. Fragmentation happens when pieces of single files are inefficiently
distributed in many locations on a disk. The result is an increase in average file
access time. This problem can be fixed by running a defragmentation program,
which goes through the drive track by track and rearranges the sectors for each
file so that they can be accessed more quickly.

Disk structure

Unlike floppy drives, in which the read/write heads actually touch the surface of
the material, the heads in most hard disks float slightly of the surface. When the
heads accidentally touch the media, either because the drive is dropped or
bumped hard or because of an electrical malfunction, the surface becomes
scratched. Any data stored where the head has touched the disk is lost. This is
called head crash. To help reduce the possibility of head crash, most disk
controllers park the heads over an unused track on the disk when the drive is not
being used by the CPU.

98
99

It is important to have a large hard disk drive to undertake some tasks like video
and sound editing, however the latest desktop computers come with a Minimum
of 60Gbyte of capacity which is enough for most standard tasks. Currently, hard
disk drives have capacities up to 120Gbytes and data transfer rates of 160Mbits
per second.

CD-ROMs

While magnetic material is thee dominant media for read/write information


storage (that’s files that are read from and written to frequently), other media
have become popular for more permanent
storage applications. One of the most
common alternatives information storage
mediums is the CD-ROM. CD-ROMs are
plastic disks on which individual bits are
stored as pits burned onto the surface of the
disk by high-powered lasers. The surface of
the disk is then covered with a layer of reflecting material such as aluminum.

The computer uses a CD-ROM drive to access information on the CD-ROM. The
drive be external to, or part of, the computer. A light-sensitive instrument in the
drive reads the disk by watching the amount of light reflected back from a smaller
laser positioned over the spinning disk. Such disks can hold large amounts of
information, but can only be written to once. The drives capable of writing to CD-
ROMs are called write once, read many (WORM) drives. Due to their
inexpensive production costs, CD-ROMs are widely used today for storing music,
video, and application programs.

99
100

Magnetic tape

Magnetic tape has served as efficient and reliable information storage media
since 1950s. Most magnetic tapes are made of mylar, a type of strong plastic, in
which metallic particles have been embedded. A read/write head is identical to
those used for audio tape reads and writes binary information to the tape. Reel –
to-reel magnetic tape is commonly used to store information for large mainframe
or supercomputers. High-density cassette tapes, resembling audio cassette
tapes are used to store information for personal computers and mainframes.

Magnetic tape storage has advantage of being able to hold enormous amounts of
data. For this reason, it is used to store information on the largest computer
system. Magnetic tape has two major shortcomings; it has a very slow data
access time when compared to other form of storage media and access to
information on magnetic tape is sequential. In sequential data storage, data are
stored with the first bit at the beginning of the tape and the last bit at the end of
the tape, in a linear fashion. To access a random bit of information, the tape drive
has to forward or reverse through the tape until it finds the location of the bit. The
bit closest to the location of the read/write head can be accessed relatively faster,
but bits far away take a considerable time to access. RAM on the other hand, is
random access, meaning that it can locate any one bit as easily as any other.

Flash memory

Another type of storage device, called Flash


memory, traps small amounts of electric
charge in ‘wells’ on the surface of a chip.
Side effects of this trapped charge, such as

100
101

the electric field it creates are late used to read the stored value. To rewrite to
flash memory, the charges in the wells must be first drained. Such drives are
useful for storing information that changes infrequently. Most flash memories are
of large capacity and hence are used to store large volume of data.

Future technology

Although magnetic and CD-ROM technologies continue to increase in storage


density, a varieties of new technologies are emerging. Redundant Arrays of
Independent Disks (RAIDs) are storage systems that look like one device but are
actually composed of multiple hard disks. These systems provide more storage
and also read data simultaneously from many drives. The result is a faster rate of
data transfer to the CPU, which is important for many very high speed computer
applications, especially those involving large databases of information.

Disk management issues


• Formatting
– Physical: divide the blank slate into sectors identified by headers containing
such information as sector number; sector interleaving.
– Logical: marking bad blocks; partitioning (optional) and writing a blank directory
on disk; installing file allocation tables, and other relevant information (file system
initialization)

• Reliability
– disk interleaving or striping
– RAIDs (Redundant Array of Inexpensive Disks): various levels, e.g., level 0 is
disk mirroring or shadowing, consists of keeping a duplicate of each disk)
• Controller caches
– newer disks have on-disk caches (128KB—512KB)

101
102

WEEK 9

THIS WEEK SPECIFIC LEARNING OUTCOMES

To understand:

 Different file access types:- random access and direct access storage methods.
 Seek time and rotational delay
 The concept of a buffer and its functions
 The calculation of buffer requirement of a file.

102
103

Random access method: Random access is a type of memory access in which


storage location can be accessed in any order. This means that a file is said to
be randomly accessed if the sequence of transactions submit to it does not
match any sequence in which records may be organized.

Direct access: The direct access of the index sequential makes full use of the
index to access the records using the record address associated with the index.
The records are accessed without any defined sequence of sorting. The method
is used when the transaction is to be processed immediately without waiting for
sorting and its widely used in commercial data processing because it can be
allow both sequential and random methods of access.

Seek Time

Seek time is one of the three delays associated with reading or writing data on a
computer’s drive and somewhat similar for CD or DVD drives. The others are
rotational delay and transfer time and their sum is the access time. In order to
read or write data in a particular place on the disk, the read/write head of the disk
needs to be physically moved to the correct place. This process is known as
seeking and the time it takes for the head to move to the right place is the seek
time. Seek time for a given disk varies depending on how far the head
destination is from its origin at the time of each read/write instruction.

Rotational Delay

The rotational delay is the time required for the address area of the disk to rotate
into a position where it is accessible by the read/write head.

Transfer Time

Transfer Time is the number of bits that are transferred per unit of time. The unit
therefore is in bit per second (bps).

103
104

Concept of buffer

Buffer is a temporary memory for data, normally used to accommodate the


difference in the rate at which two devices can handle data during transfer. The
buffer may be built into a peripherals device such as printer or disk drive or may
be part of the system’s main memory.

Buffering technique is used to compensate for the slow and possible erratic rate
at which a peripheral device produces or consume data. If the device
communicates directly with the program, the program is constraint to run in
synchronism with the device to operate independently.

Consider a program sending output to a slow device, a memory area (the buffer)
is set aside for communication. The program places data in the buffer at its own
rate. Although the device may be slow, the program does not have to stop unless
the buffer fills up, at the same time the device runs at full speed unless the buffer
is empty. This buffering technique is applicable to input device.

By providing a data buffer in the device or control unit, devices that would
ordinarily require the channel for a long period can be made to perform
independently of the channel. For instance, a card reader may physically require
about 60 ms to read a card and transfer the data to memory through the channel.
However, a buffered card reader always reads one card before it is needed and
save the 80 bytes in a buffer in the card reader or control unit. When the channel
requests that a card be read, the contents of the 80-bytes buffered are
transferred to memory at high speed (e.g 100 µs) and the channel is released.
The device then proceeds to read the next card and buffer it independently. Card
readers, card punches and printers are frequently buffered.

104
105

Functions of Buffer

Buffer synchronizes the speed of data transfer among the systems/devices that
are under the control of the CPU. It makes individual devices (that is, input and
output devices) to perform their functions independently. This is because, the
rate at which the CPU performs/sends or receive it data is very high compare to
the rate at which the I/O devices receive or send data. Buffer is equally used to
accommodate the differences in the rate at which two devices can handle data
during data communication/transfer.

105
106

WEEK 10

THIS WEEK SPECIFIC LEARNING OUTCOMES

To understand:

 What is file organizational structure


 File processing
 Acoustical data structure

106
107

File Processing

File is a body of stored data or information in an electronic format. Almost all information stored
on computers is in the form of files. Files reside on mass storage devices such as hard drives,
CD-ROMs, magnetic tape, and floppy disks. When the central processing unit (CPU) of a
computer needs data from a file, or needs to write data to a file, it temporarily stores the file in its
main memory, or Random Access Memory (RAM), while it works on the data.

Information in computers is usually classified into two different types of files: data files (those
containing data) and program files (those that manipulate data). Within each of these categories,
many different types of files exist that store various kinds of information.

Different computer operating systems have unique rules for the naming of files. Windows 95
(Win95) and disk operating systems (DOS), for instance, make use of an extension attached to
the end of each filename in order to indicate the type of file. Extensions begin with a period (.),
and then have one or more letters. An example of a file extension used in Win95 and DOS is
.bak, which indicates that the file is a backup file.

When saving a file, a user can give it any name within the rules of the operating system. In
addition, the name must be unique. Two files in the same directory may not have the same name,
but some operating systems allow the same name for one file to be placed in more than one
location. These additional names are called aliases.

Directory files contain information used to organize other files into a hierarchical structure. In
the Macintosh operating system, directory files are called folders. The topmost directory in any
file system is the root directory. A directory contained within another directory is called a
subdirectory. Directories containing one or more subdirectories are called parent directories.
Directory files contain programs or commands that are executable by the computer.

Executable files have a .exe suffix at the end of their names and are often called EXE
(pronounced EX-ee) files. Text files contain characters represented by their ASCII (American
Standard Code for Information Interchange) codes. These files are often called ASCII
(pronounced ASK-ee) files. Files that contain words, sentences, and bodies of paragraphs are

107
108

frequently referred to as text files. The diagram below shows the root directory, sub director and
file

Root directory
Sub directory (sub folder) Files

File Processing Activities

The file processing operations deal with the various activities which are performed on
the file. These operations are briefly described as shown below;

 File creation: The process of bringing file into existence is called file creation.

 Searching: Searching is locating data in a file by reference to a special field of


each record/data called the key. The key is a unique filed used to identify certain

108
109

record in a file. If a record is to be inserted into a file, it must be given a unique


key value.

 Retrieving/reading: This involves reading an existing data from a form of storage


or input medium.

 Writing: Writing is the act of recording data onto some form of storage.

 Deleting: This means removing a record or item of data from a storage medium
such as disk/tape.

 File updating: This is an act of changing values in one or more records of a file
without changing the organization of the file. That is making the file modern by
adding most recent data to the file.

 Sorting: Sorting means rearranging data in either ascending or descending order.


It involves the arrangement of grouped data elements into a predetermined
sequence to facilitate file processing.

 Calculating: The arithmetic or logical manipulation of data in a file is referred to


as calculation.

 File querying/interrogating: This is retrieving specific data from a file according to


the set of retrieval criteria.

 File merging: Combining multiple sets of data files or records to produce only one
set, usually in an ordered sequence is referred to as file merging.

 Reporting: Reporting is a file processing operation that deals with the production
(printing) of report from the file in a specified format.

 File display: The contents of a data file can be displayed either on the computer
screen as soft copy or printed on the paper as hard copy.

 File storage: When a file is created, it is stored in the appropriate storage


medium such as disk, flash disk, tape, drum, etc.

109
110

WEEK 11

THIS WEEK SPECIFIC LEARNING OUTCOMES

To understand:

 What is a table
 What is an array
 What is a list

110
111

Table
Table is a collection of records. Each record stores information associated with a
key by which specific records are found or the records may be arranged in an
array so that the index is the key. In commercial applications the word table is
often used as a synonym for matrix or array.

Array

Array is an ordered collection of a number of elements of the same type, the


number being fixed unless the array is flexible. The elements of one array may
be of type integer, those of another array may be of type real, while the elements
of a third array ma be of type character string. Each element has a unique list of
index values that determine its position in the ordered collection. Each index is of
a discrete type and the number of dimension in the ordering is fixed.

One dimensional array called vector consists of a list of elements distinguished y


a single index. For instance, if v is a one-dimensional array and I is an index
value, the vi refer to the ith element of v. If the index ranges from L through U
then the L is called the lower bound of v and U id the upper bound. Usually, in
mathematics and often in mathematical computing the index type is taken as
integer and the lower bound is taken as one.

In a two-dimensional array, or matrix, the elements are ordered in the form of a


table comprising a fixed number of rows and a fixed number of columns. Each
element in such an array is distinguished by a pair of indexes. The first index
gives the row and the second index gives the column of the array in which the
elements is located. The element in the ith row and jth column is called i,jth
element of the array. If i ranges from L1 through U1 and j ranges from L2 through

111
112

U2 then L1 is the first lower bound of the array, U1 is the first upper bound, L2 is
the second lower bound and U2 is the second upper bound.

Again it is common practice to take the indexes as integers and to set both L1
and L2 equal to one. An example of two-dimensional array with U1 = m, U2 = n
is give in the diagram below;

a11 a12 ... a1n

a21 a22 ... a2n

: : … :

am1 am2 ... amn

Two-dimensional array here


List
List is a finite ordered sequence of items (x1, x2, …, xn), where n ≥ 0. If n = 0,
the list has no elements and is called null list (or empty list). If n > 0, the list
has at least one element, x1, which is called the head of the list. The list
consisting of the remaining items is called the tail of the original list. The tail of
the null list is the null list, as the tail of a list containing only one element.

The items in a list can be arbitrary in nature, unless stated otherwise. In


particular it is possible for an item to be in another list, in this case it is known
as a sublist. For example, let L be the lists (A, B, (C, D), E), then the third list
of L is the list (C, D), which is a sublist of L. If a list has one or more sublist it
is called a list structure. If it has no sublist it is a linear list. The two basic
representation forms for lists are sequentially allocated lists and linked lists,
the latter being more flexible.

112
113

WEEK 12

THIS WEEK SPECIFIC LEARNING OUTCOMES

To understand:

 What is a stack
 What is queue
 Compare stack and queue
 Examples of file processing techniques
o Batch
o Real-time
o On-line
o Serial
o Sequential
o Indexed sequential
o random

113
114

Stack

A stack is a linear list that can be accessed for either input or output at just one of its
two ends. In stack operations, all accesses involving insertions and removals are made
at one end of the list, called top. This implies access on a last in first out (LIFO) basis
where the most recently inserted item on the list is the first to be removed.

The operations push and pop refer respectively to the insertion and removal of items at
the top of the stack. Stacks occur frequently in computing and in particular are closely
associated with recursion.

One example of this model of access can be found in a stack of plates on a kitchen
shelf or in a spring-loaded dispenser in a cafeteria. In both cases, the only two logical
possibilities are to add a plate to the top of the stack. A stack is also exemplified by a
railroad spur. In this model, we can insert a boxcar from the input to the open end of the
spur, and we can remove a boxcar from the open end of the spur to the output, missing
insertion and deletion as wish. The essence of these examples is that the next object to
be removed will always be the last one that was added, hence the acronym LIFO or
Last-in First-out. Stacks illustrated by railroad spur as in diagrams below;

Output Input

A B C D B C D

Stack

(a) Initial (b) Push A

114
115

C D C D
B

A A

(c) Push B (d) Pop B

B D B C D

A A

(e) Push C (f) Pop C

Figures showing: A Railroad Model of a

QUEUE

Queue is concerned with the most useful handling of various waiting-


line situations, from airplanes waiting to land to computer programs
filed for processing. The field arose from telephone networking studies
in the early 20th century, and deals with such factors as the pattern of
arrivals in a queue, the varying needs of each arrival, and the resulting
probabilities and statistical patterns of processing times.

115
116

The basic process assumed by most queuing models is that


processes requiring service are generated over a period of time
by a queue. At certain times, a number of queues are selected
for service by some rules known as “service discipline”. The
required service is then performed for the process by the service
mechanism, after which the process leaves the system. This
queue process is illustrated in the diagram below;

Service
Input source Queue mechanism Served

Process

Queuing System

COMPARE STACK AND QUEUE

File Processing Techniques

Batch: Batch Processing is referred to as running of a batch file - a stored


“batch” of operating-system commands carried out one after the other without
user intervention; on larger computers, the process of acquiring programs and
data sets from users, running them one or a few at a time, and then providing the
results to the users. Batch processing can also refer to the process of storing
transactions for a period of time before they are posted to a master file, typically
in a separate operation undertaken at night.

116
117

Real-Time: This is a file processing technique whereby transactions’ data are


immediately processed as the events to which they relate occur. The need for
real-time processing arises when the effective operation of some business can
only be attained by the provision of up-to-date information on request without
delay. In a real-time system, there is immediate response to the users’ requests.

Real-time is suitable when it is necessary to have the latest possible information


on;
- Airline seat availability and reservation
- Status of production orders in manufacturing industries
- Wholesale suppliers and manufacturers availability of stock
- Industrial process control
It’s worth to mention that every real-time system is communication oriented and
provide for random enquiries from remote locations with instantaneous response,
because of the characteristics, real-time operation is also on-line or
conversational processing.

Online: In computer science when file is activated and ready for operation;
capable of communicating with or being controlled by a computer. For example,
a printer is online when it can be used for printing; a database is online when it
can be used by a person who connects with the computer on which it is stored.
See also Offline.

Serial: In computer science, is reference to data transfer, serial transmission is


the sending of information one bit at a time over a single wire, as through a serial
port. In other aspects of computing, serial (or sequential) access refers to finding
information based on the location of the last item found; a serial computer is one
with a single arithmetic logic unit; serial addition is digit-by-digit addition of the
sort people usually perform (as opposed to parallel addition, in which all digits
are added at the same time).
117
118

Sequential access:

The accessing of pieces of information will be in a serial order, one after the
other; therefore the time to access a particular piece of information depends
upon which piece of information was last accessed. Such characteristic is typical
of off-line storage.

Indexed sequential:
Indexed sequential access: This is an access method for a sequentially
organized file whose records are indexed with their corresponding address. This
access method supports both sequential access and indexed access and the two
types of access that can be comfortably done in this method are sequential
access and random access. Note that this method is only possible with disk files.
i. Sequential access: The access of the index sequential file
makes minimal use of the index. The records can be accessed
serially as they are ordered one after another and from the first to
the last record in the file.
ii. Random access: The random access of the index sequential
makes full use of the index to access the records using the record
address associated with the index. The records are accessed
without any defined sequence of sorting. The method is used
when the transaction is to be processed immediately without
waiting for sorting and its widely used in commercial data
processing because it can be allow both sequential and random
methods of access.

Random access: Random access is a type of memory access in which storage


location can be accessed in any order. This means that a file is said to be

118
119

randomly accessed if the sequence of transactions submit to it does not match


any sequence in which records may be organized.

119
120

WEEK 13

THIS WEEK SPECIFIC LEARNING OUTCOMES

To understand:

 File security techniques


o Backup
o Encryption
o Approved users
o Passwords
o Firewalls
o Intrusion detection systems
o Application safeguards
o Disaster recovery plans

120

You might also like