Review 2 Summer 2013 Cornell University 1 Today File System - - PowerPoint PPT Presentation

review 2
SMART_READER_LITE
LIVE PREVIEW

Review 2 Summer 2013 Cornell University 1 Today File System - - PowerPoint PPT Presentation

CS 4410 Operating Systems Review 2 Summer 2013 Cornell University 1 Today File System Storage Networking Security 2 File-System Interface Files Logical storage unit Independent entity Attributes


slide-1
SLIDE 1

1

CS 4410 Operating Systems

Review 2

Summer 2013 Cornell University

slide-2
SLIDE 2

2

Today

  • File System
  • Storage
  • Networking
  • Security
slide-3
SLIDE 3

3

File-System Interface

  • Files
  • Logical storage unit
  • Independent entity
  • Attributes
  • Operations
  • Per-process table VS System-wide table
  • Directories
  • Organize files
  • Logical Structure

Single-level

Two-level

Tree-structured

Acyclic graph

slide-4
SLIDE 4

4

File-System Implementation

  • File Control Block (FCB)
  • Directory:
  • The main function of the directory system is to map the ASCII name of the file
  • nto the information needed to locate the data.
  • Implementation:

Linear List

Hash Table

  • Allocation
  • Data is saved as blocks in the hard disk.
  • Contiguous
  • Linked
  • Indexed

Unix i-node

  • Free-space management
slide-5
SLIDE 5

5

Mass-Storage Structure

  • Magnetic Disk
  • Platter, Cylinder, Track, Sector
  • Disk Speed
  • Transfer rate, positioning time
  • Disk Scheduling
  • The OS decides which request (read, write blocks) to service.
  • Target: Least head movements.
  • FCFS
  • SSTF
  • SCAN, C-SCAN
  • LOOK, C-LOOK
  • RAID
  • Performance → Stripping
  • Reliability → Redundant data (mirroring).
slide-6
SLIDE 6

6

RAID

Stripe 0 Stripe 4 Stripe 3 Stripe 1 Stripe 2 Stripe 8 Stripe 10 Stripe 11 Stripe 7 Stripe 6 Stripe 5 Stripe 9

data disks data disks mirror copies

Stripe 0 Stripe 4 Stripe 3 Stripe 1 Stripe 2 Stripe 8 Stripe 10Stripe 11 Stripe 7 Stripe 6 Stripe 5 Stripe 9 Stripe 0 Stripe 4 Stripe 3 Stripe 1 Stripe 2 Stripe 8 Stripe 10Stripe 11 Stripe 7 Stripe 6 Stripe 5 Stripe 9

data disks

Bit 0 Bit 3 Bit 1 Bit 2 Bit 4 Bit 5 Bit 6

ECC disks

slide-7
SLIDE 7

7

RAID

data disks Parity disk

Stripe 0 Stripe 3 Stripe 1 Stripe 2 P0-3 Stripe 4 Stripe 8 Stripe 10 Stripe 11 Stripe 7 Stripe 6 Stripe 5 Stripe 9 P4-7 P8-11

data and parity disks

Stripe 0 Stripe 3 Stripe 1 Stripe 2 P0-3 Stripe 4 Stripe 8 P8-11 Stripe 10 P4-7 Stripe 6 Stripe 5 Stripe 9 Stripe 7 Stripe 11

data disks Parity disk

Bit 0 Bit 3 Bit 1 Bit 2 Parity

slide-8
SLIDE 8

8

Networking

  • Processes that belong to remote computers

need to exchange data.

  • Layered Protocols

Application Link Physical Application Link Physical Computer A Computer B Transport Transport Network Network M M Ht M Ht Hn M Ht Hn Hl Message Segment Datagram Frame

slide-9
SLIDE 9

9

Networking

  • Each protocol offers services to the above protocols.
  • A transport protocol “transfers” data from one process to a remote process.
  • It takes care of losses or reordering.
  • Needed identification: port number.
  • A network protocol “transfers” datagrams from one computer to another computer.
  • It takes care of the efficient routing of packets.
  • Needed identification: ip address
  • Device that operates at this level: Router
  • A link protocol “transfers” frames from one network node to another physically

connected node.

  • It takes care of how the nodes share the access of the common communication

media.

  • Needed identification: MAC address
  • Device that operates at this level: Switch
slide-10
SLIDE 10

10

DNS

  • Domain Name Service
  • Translates Domains Names into IP addresses.
  • DNS resolvers are responsible for a subset of

the Domain Name Space.

slide-11
SLIDE 11

11

Security

  • Four-level protection:
  • Physical, Human, Operating System, Network
  • Threats:
  • Trojan Horse, Stack and Buffer Overflow, Viruses, Worms, Denial of Service
  • User-Authentication
  • Passwords, One-time Passwords, Biometrics
  • Protection
  • OS: Principle of least privilege
  • Protection Domain: collection of access rights.
  • Access matrix

Global Table, Access Lists for Objects, Capability Lists for Domains

slide-12
SLIDE 12

12

Thank you!!!