Atria Institute of Technology: File System Mounting and File Sharing
Atria Institute of Technology: File System Mounting and File Sharing
AGENDA
Introduction
File System Mounting
File Sharing Mechanisms
Remote File Systems
Failure Modes in File Systems
Consistency Semantics
INTRODUCTION
5
INTRODUCTION TO FILE
SYSTEMS
Overview:
• A file system organizes and stores files on a storage device.
File Access:
• Files need to be opened to be read or written by programs.
Mounting Requirement:
• For files to be accessible on a system, the file system itself
must be mounted.
Purpose of Mounting:
• Mounting integrates a new file system into the system's
directory structure, making it available for user access and
FILE SYSTEM
MOUNTING
Mount Point and Mounting
Procedure
7
Benefits:
• Collaborative work and resource sharing.
• Essential for distributed systems and organizational file
management.
Control Mechanisms:
• Access may be restricted by permissions or access rights.
• Allows file owners to define sharing rules for different users
and groups.
10
PROTECTION SCHEMES IN
FILE SHARING
Need for Protection:
• Prevents unauthorized access, maintains data security.
Group:
•Defines a subset of users who can share access to a file.
•Groups have controlled access based on system-wide group
settings.
•Owner manages which group members have permissions,
defining read, write, and execute rights.
REMOTE FILE
SYSTEMS
Access Methods and Client-
Server Model
13
CLIENT-SERVER MODEL IN
REMOTE FILE SYSTEMS
Model Explanation:
• Server: Hosts and manages files, provides access to clients.
• Client: Requests access to remote files, typically identified by
IP or network name.
Flexibility:
• Servers can serve multiple clients, and clients can connect to
multiple servers.
Authentication Challenges:
• Ensuring secure access; UNIX and NFS systems often rely on
client IP addresses for authentication.
Operation:
• Once a file system is mounted, client requests are sent to the
server using DFS protocol.
15
DISTRIBUTED INFORMATION
SYSTEMS
Purpose:
• Provide unified access to data across multiple systems and networks.
Examples:
• DNS (Domain Name System): Resolves hostnames to IP
addresses, essential for network navigation.
• Distributed Username/Password Management: Provides a
unified login experience across systems in a networked environment.
Impact:
• Simplifies user management, supports secure and efficient resource
sharing across networks.
FAILURE MODES IN
FILE SYSTEMS
Local vs. Remote Failures and
Recovery Techniques
17
CONSISTENCY SEMANTICS IN
FILE SYSTEMS
Definition:
• Rules that define how multiple users access and modify a
shared file simultaneously.
Importance:
• Prevents conflicts and ensures data accuracy.
UNIX CONSISTENCY
SEMANTICS
Characteristics:
• Changes to files are immediately visible to all users with
access.
• Allows sharing of file pointers, so position changes by one
user affect all others.
Single Physical Image:
• File treated as a single, exclusive resource.
• Causes process delays when multiple users access the file
simultaneously due to contention.
21
Characteristics:
• Changes to a file by one user aren’t visible to others until the
file is closed.
• New sessions observe the changes, while existing sessions
remain unaffected.
Benefits:
• Allows multiple users to have concurrent read and write access
without immediate conflict.
• Reduces contention, allowing smoother operation in a
distributed environment.
22
Key Properties:
1. File-Name Immutability: Once set, the name
cannot be reused.
2. Content Immutability: File contents are fixed;
changes aren’t permitted.