0% found this document useful (0 votes)
18 views24 pages

Atria Institute of Technology: File System Mounting and File Sharing

Uploaded by

ASWIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views24 pages

Atria Institute of Technology: File System Mounting and File Sharing

Uploaded by

ASWIN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“Jnana Sangama”, Belagavi– 590018 1

Operating Systems(BCS303) Seminar on


“File System Mounting and File Sharing”

PRESENTED BY UNDER THE GUIDANCE OF


Aswin(1AT23IS027) Mrs. Shruthi B
Ayush Gupta(1AT23IS029) Assistant Professor
Gunraj Gurjar(1AT23IS055) Dept. of ISE, Atria IT
MohammadSami Mali (Lateral Entry)

ATRIA INSTITUTE OF TECHNOLOGY


BANGALORE-54, Karnataka
DEPARTMENT OF INFORMATION SCIENCE AND ENGINEERING
FILE SYSTEM
MOUNTING
&
FILE SHARING
3

AGENDA
Introduction
File System Mounting
File Sharing Mechanisms
Remote File Systems
Failure Modes in File Systems
Consistency Semantics
INTRODUCTION
5

INTRODUCTION TO FILE
SYSTEMS
Overview:
• A file system organizes and stores files on a storage device.
File Access:
• Files need to be opened to be read or written by programs.
Mounting Requirement:
• For files to be accessible on a system, the file system itself
must be mounted.
Purpose of Mounting:
• Mounting integrates a new file system into the system's
directory structure, making it available for user access and
FILE SYSTEM
MOUNTING
Mount Point and Mounting
Procedure
7

FILE SYSTEM MOUNTING


• Mount Point: Defined as the location within the directory structure
where a file system is attached.
• Steps in the Mounting Process:
• Identify Device & Mount Point: The OS is given the device name
(e.g., a hard disk or USB) and the directory where it will attach the
file system.
• Verify File System: OS checks if the device has a valid file system,
using the device driver to read and confirm directory structure.
• Update Directory Structure: OS notes the new file system at the
mount point for access.
• Importance:
• Ensures organized access, integrates storage devices into the main
file tree.
FILE SHARING
MECHANISMS
Multi-user Access and Protection
Schemes
9

FILE SHARING OVERVIEW


Definition: File sharing enables multiple users to access files
on a multi-user system or network.

Benefits:
• Collaborative work and resource sharing.
• Essential for distributed systems and organizational file
management.

Control Mechanisms:
• Access may be restricted by permissions or access rights.
• Allows file owners to define sharing rules for different users
and groups.
10

PROTECTION SCHEMES IN
FILE SHARING
Need for Protection:
• Prevents unauthorized access, maintains data security.

Methods of File Sharing:


• Default Access: Allows users to access others' files unless
restricted.
• Permission-Based Access: Requires specific permission
granted by the file owner.

File and Directory Attributes:


Multi-user systems keep additional attributes to manage access,
such as file owner and group information.
11

OWNERSHIP AND GROUP-BASED


ACCESS CONTROL
Owner:
•User with maximum control over file or directory.
•Can modify attributes, set permissions, and assign access
rights.

Group:
•Defines a subset of users who can share access to a file.
•Groups have controlled access based on system-wide group
settings.
•Owner manages which group members have permissions,
defining read, write, and execute rights.
REMOTE FILE
SYSTEMS
Access Methods and Client-
Server Model
13

REMOTE FILE SYSTEMS AND


ACCESS METHODS
Definition:
• Remote file systems allow files on one machine to be accessed by
another.
Access Methods:
1. Manual Transfers: Using protocols like FTP (File Transfer Protocol).
2. Automatic Distributed File System (DFS): Remote directories
are integrated and accessible on a local machine.
3. Semi-Automatic Access (e.g., WWW): Files accessed via a
browser, with FTP support for file transfer.
Anonymous Access:
• FTP supports anonymous access for files without requiring a user
account on the remote system.
14

CLIENT-SERVER MODEL IN
REMOTE FILE SYSTEMS
Model Explanation:
• Server: Hosts and manages files, provides access to clients.
• Client: Requests access to remote files, typically identified by
IP or network name.
Flexibility:
• Servers can serve multiple clients, and clients can connect to
multiple servers.
Authentication Challenges:
• Ensuring secure access; UNIX and NFS systems often rely on
client IP addresses for authentication.
Operation:
• Once a file system is mounted, client requests are sent to the
server using DFS protocol.
15

DISTRIBUTED INFORMATION
SYSTEMS

Purpose:
• Provide unified access to data across multiple systems and networks.
Examples:
• DNS (Domain Name System): Resolves hostnames to IP
addresses, essential for network navigation.
• Distributed Username/Password Management: Provides a
unified login experience across systems in a networked environment.
Impact:
• Simplifies user management, supports secure and efficient resource
sharing across networks.
FAILURE MODES IN
FILE SYSTEMS
Local vs. Remote Failures and
Recovery Techniques
17

FAILURE MODES IN FILE


SYSTEMS
Local File System Failures:
• Caused by hardware issues (disk failure), corruption
(directory structure), or physical issues (cable damage).
Remote File System Failures:
• More complex due to network dependencies.
• Failures include network interruptions, hardware faults,
or software configuration errors.
DFS Protocol Resilience:
• DFS allows delayed file operations until the remote
server becomes available again.
• Failure-recovery often requires state information to be
maintained on both client and server.
CONSISTENCY
SEMANTICS
Models: UNIX, Session, and
Immutable File Semantics
19

CONSISTENCY SEMANTICS IN
FILE SYSTEMS
Definition:
• Rules that define how multiple users access and modify a
shared file simultaneously.

Importance:
• Prevents conflicts and ensures data accuracy.

Key Consistency Models:


• UNIX Semantics: Immediate visibility of changes to all users.
• Session Semantics (AFS): Delayed visibility, only shows
updates in new sessions.
• Immutable Shared Files: Files are fixed once shared;
content cannot be altered.
20

UNIX CONSISTENCY
SEMANTICS
Characteristics:
• Changes to files are immediately visible to all users with
access.
• Allows sharing of file pointers, so position changes by one
user affect all others.
Single Physical Image:
• File treated as a single, exclusive resource.
• Causes process delays when multiple users access the file
simultaneously due to contention.
21

SESSION SEMANTICS (USED IN AFS)

Characteristics:
• Changes to a file by one user aren’t visible to others until the
file is closed.
• New sessions observe the changes, while existing sessions
remain unaffected.
Benefits:
• Allows multiple users to have concurrent read and write access
without immediate conflict.
• Reduces contention, allowing smoother operation in a
distributed environment.
22

IMMUTABLE SHARED FILES


SEMANTICS
Definition:
• A file declared immutable cannot be altered.

Key Properties:
1. File-Name Immutability: Once set, the name
cannot be reused.
2. Content Immutability: File contents are fixed;
changes aren’t permitted.

Advantages in Distributed Systems:


• Simplifies management, reduces need for complex
access control.
• Ensures data stability and consistency in collaborative
environments.
SUMMARY AND KEY
TAKEAWAYS
• File System Mounting: Essential for
integrating devices into the file structure.
• File Sharing: Enables multi-user access, with
control via owners and groups.
• Remote File Systems: Allows access to files
across networks with client-server models.
• Consistency Semantics: Defines access and
modification rules in multi-user systems.
• Failure and Recovery: Robust systems handle
failures through DFS protocols and distributed
info systems.
THANK YOU

You might also like