Saturday, January 25, 2020

Objectives Of File Management Systems Information Technology Essay

Objectives Of File Management Systems Information Technology Essay In linux everything is treated as a file. A user frequently interacts with files directly or indirectly. They need perform various operations such as create, edit, delete etc on the files. To perform these activities, operating systems provide file management systems. The services required by file management system are provided by operating system. File management system is a collection of software that provides services to application and users. It facilitates the communication between user application and files. This relieves user from developing the software for each application. Objectives of File Management systems: Guarantees data in the file is valid Optimizes performance in terms of throughput response time Provide I/O support for storage device type Provide I/O support for multiple users Meet user requirements for data operations [1] FILE System architecture: Figure 1: File System Architecture. [1] As depicted in the figure the device drivers interacts with the peripherals. The function of device driver is to start the I/O operation complete the request. These device drivers are considered as a part of operating system. Above the device drivers there which is also called as physical I/O. Main function of file system is to deal with the is basic file system data from disk systems place them on secondary storage. Also it manages buffering of these blocks on to the main memory. It doesnt care about data inside the file. The next level is Basic I/O supervisor. The function of this layer is I/O initiation termination. At this level control structures deals with file status, scheduling, I/O. The device on which file I/O is to be performed selected by I/O supervisor based on particular file selected. Logical I/O enables users application to accept records. The logical I/O module deals with file Records. Logical I/O maintains basic data about the files. Access system is the file system closest to the user. The main function is to provide interface between file system applications. File Management Functions: Figure 2: File Management Functions [1] Application programs Users interact with the file system to create and delete files and for performing operations on files. File system first identify and locate the selected file before performing any operation. Directories are used to describe location of all files their attributes. Most shared systems implements access control policies. Only authorized users can have access to particular files. The basic operations that a user or application may perform on a file are performed at the record level. The file is viewed by user as structure of records. Access methods are used to map user commands into specific file manipulation commands. I/O operation is done on block basis. The records are organized as a blocks of output. In order to perform the operation files must be allocated to free blocks on the secondary storage. Also free storage must be managed so as to know what blocks are available for new files and growth in existing files. File Organization: Several criteria affect the selection of file organization. Some of these factors can be listed as follows. The suitability depends on the application which will be using the file. Economy of Storage Short Access time Reliability Simple maintenance [1] Original file system: Physical disk in Linux is divided into logical disks. It is called as partitions. Each partition is treated as a standalone file system. Each device is assigned with major device number and the partitions are assigned with minor device number. The device driver refers to these numbers to access raw file system. Major number acts like a index to switch table minor number will recognize specific instance of device. [3] Physical location of file data block: Placing the data blocks in a contiguous manner will improve the performance but will lead to inefficiencies in allocating space. User may need to specify the file of size at the time of creation. Linux file system allocates block one at a time from pool of free blocks[3]. File blocks are scattered randomly on physical disk. Inodes: inode contains key information related to files required by the OS. A single inode may point to several file names but the active inode is associated only with one file. Inode stores attributes, permissions other control information related to the file. The information contained in the inode is  ¬Ã‚ le ownership indication à ¢Ã¢â€š ¬Ã‚ ¢ File type à ¢Ã¢â€š ¬Ã‚ ¢ File access permissions. à ¢Ã¢â€š ¬Ã‚ ¢ Time of last access, and modi ¬Ã‚ cation à ¢Ã¢â€š ¬Ã‚ ¢ Number of links (aliases) to the  ¬Ã‚ le à ¢Ã¢â€š ¬Ã‚ ¢ Pointers to the data blocks for the  ¬Ã‚ le à ¢Ã¢â€š ¬Ã‚ ¢ Size of the  ¬Ã‚ le in bytes (for regular  ¬Ã‚ les), major and minor device numbers for special Device [3] Figure 3: Inode structure [4] Inodes has pointers to data block. Each inodes contain 15 pointers. First 12 pointers will point directly to data blocks. 13th pointer will point to indirect data block.14th pointer points to doubly indirect data block. Similarly, 15th pointer will point to triply indirect block. Advantages: 1] Very little space wasted. A disk can be filled completely. 2] Indirect block points many data blocks so larger files can be efficiently accessed. 3] Simultaneous operations can be performed. One read operation fetches the inode another will fetch first data block. Disadvantages: 1] may lead to poor performance Directories: Directory provides information about file location, file ownership its attributes. A directory is itself a file which is accessible to file management routines. The Directory structure can be shown as below Figure 4: Linux Directory Structure [5] As shown in the figure linux organizes directories in hierarchical fashion. The root lies at the top of the tree and it is denoted by /.Every directory in the linux system is under root directory. The various directories under root directory are Boot : The information required for booting is stored in this directory. This may consist of files used by LILO, Bootstrap loader. This is the place for kernel image. etc: configuration files of machine installed software are stored here dev: device files for devices such as disk drives, serial ports are stored here. Usr : it consists of all man pages, games, commands, static files for normal operations. Sbin :It consists of system admin commands. Home: This is the place where user will keep his own files. It contains users home directory for each user on the system. Root: This is the home directory for root user. File sharing: To share files a special group is created for the set of users who intend to use that files. Directory is created with ownership of that group. The permissions are set such that all users within the group can create files. We can also set group ID so that all the files created in it will automatically have group ownership its parent directory has. Access control in linux: Terms related to ACL A] User class: There are mainly three user classes owner, owning group other users. To allow permission three bits read(r), write (w) and execute (x) can be set. B] Access ACL: It determines group user access permissions for file objects. C] Default ACL: These can be only applied to directories. It decides permissions for file object when it is created. D] ACL entry: ACL is a set of ACL entries. An ACL entry contains a type (see Table B.1 on the following page), a qualifier for the user or group to which the entry refers, and a set of permissions There are 3 basic sets associated with linux file object. These sets are used to grant permissions read(r), write(w), execute(x) for 3 user groups, file owner others. We can also set group id, user set id for special cases. Access control list (ACL) allow the assignment of permissions to individual users or groups even if these do not correspond to the owner or the owning group [6] There are mainly two categories of ACL namely minimum ACL extended ACL. Minimum ACL only consists of entries for owning group, owner other which are associated with conventional permission bits for files directories. Extended ACL has mask entry entries for named group named user types. ADD NFS, VFS. Linux virtual file system: Figure 5: Virtual file system Figure 6: Linux virtual file system concept [1] In linux file management is done with the help of Virtual file system (VFS).T o user process it appears as a single, uniform file system interface.VFS treats files as a objects stored in mass storage area. Files can be identified by their symbolic names. A file has a attribute such as access protection, ownership etc. A mapping is required by file system to map real file system characteristics into Virtual file system characteristics. User process issues a file system call using VFS.VFS converts this call into kernel file system call which is then passed to mapping function for particular file system. Sometimes mapping function may result into complex operations. In many cases directories are not files, VFS may need to convert file corresponding to some directories. The original user file system call is translated into native call to the target file system. The requested function on a file or directory is performed by invoked file system software. The results of the operation are routed back to the user in a similar manner. As VFS is object oriented they are imlemented as a data structures using C,C++.Object consists of pointers which points to the file system functions.These funtions will operate on data. The four objects are Superblock object: Represents a specific mounted file system Inode object: Represents a specific file Dentry object: Represents a specific directory entry File object: Represents an open file associated with a process Third Extended (EXT3) File System: Journaling: EXT3 is third extended file system. It is journaling extension to EXT2.It is 100% compatible with all utilities designed for ext2 file system.Ext3 shares ext2s well-known robustness, but also adds extra features such as extended attributes, H tree.[7] The journaling approach used in EXT3 will greatly reduce the time spent for recovering file system after system crash. This will help to minimize system restart time file system inconsistencies after unclean shutdown. After rebooting a system mount program first checks the Journal. If it finds ay unchecked changes, it applies the changes to the file system. Thus we can say mount program provides consistency to the system. The mount program takes care of all the consistency the system doesnt need to check the consistency hence the computers using journaling are available within short duration after reboot.[8]. Ext3 allocated area called as journal in which it records the changes made to files directories ahead of time. If the system is crashed the recovery simply involves reading the journal from file system replaying the changes. [9] Journaling modes in EXT3 : The classification is made based on the fact that whether journaling makes log changes only to metadata or to all file system. There are three journaling modes Journal: It will record both metadata file system data changes. In this mode there is lowest chance of risk. This journaling mode minimizes the chance of losing the changes that have been made to any file in an ext3 file system. [10]It is the slowest mode. The risk associated with it is lowest. Ordered: It will record the metadata but not the file contents. It is the default ext3 journaling mode. In this mode there is possibility that one may end up with the file in the intermediate stage. The risk associated with this mode is at medium level. Writeback: In this mode only metadata is journaled file contents are not[11]. It allows showing up old data into the file after a crash. It ensures that on reboot all garbage due to unwritten data be zeroed out. Major Advantages of ext3: Data Integrity: If there is any unclean, improper system shutdown ext3 guarantees data integrity. We can set the level of protection. It prevents the writing of garbage data to the disk after a crash. Generally we keep the data consistent with state of file system.[10] Availability: The amount of time system will take to check the consistency after unclean shutdown depends on the size of file system. Larger the file system larger the time. Ext3 will not require such consistency check .recovery time in ext3 does not depend on the file system size or the number of files. It depends on size of journal. So there is faster availability. It only takes few seconds to recover Easy Transition: we can easily make transformation from ext2 to ext3 without reformatting. We can add journal to ext2 with the help of tune2fs program. Speed: though ext3 writes data more than once its faster than ext2. This is because journaling increases speed of head motion of hard drive. Because of its broad cross-platform compatibility it can be used on both 32 bit 64 bit architecture. As there is no need of any core kernel changes ext3 requires no new system calls.

Friday, January 17, 2020

Balanced Scorecard Essay

1. State your organization’s supply chain strategy, e.g., â€Å"to provide customerwith high level of service while contributing to corporate profitability.† The company’s supply chain strategy is â€Å"to meet customer needs and advance our technology leadership while creating value for our customers at large. â€Å" 2. Provide one or two goals for each of the four balanced scorecard categories (customer, financial, internal, learning and growth.) 3. Provide at least one performance measure to match each of your goals Please refer to the following 2 pages. Operate IFS(Integrated Finance System) in efficient and effective way to conduct serial training and guarantee most of staff members trained and aware how to use it and benefit from it. Percentage of training records 95% yearly Financial & HR to contact an IFS user survey quarterly and increase the users satisfaction survey rating Percentage of increasing comparing with last quarter 5% quarterly Financial & HR Learning & Growth Recruit, develop and retain valuable staff to hunt abundant qualified candidates for interview and recruitment in order to meet the needs of functional departments. Percentage of completing recruitment 95% quarterly HR to review most of staff’s performance and compare their salaries to benchmark in the market and make a adjustment or explanation Percentage of completing adjustment/explanation 98% yearly HR Transfer knowledge of network security to conduct serial training and guarantee most of staff members aware it. Percentage of new employees completing security awareness training 95% yearly Security & HR to conduct an exam related to the concerning issues to network security. Percentage of employees who pass the exam. 95% yearly Security & HR

Thursday, January 9, 2020

The Challenges of Managing Communication, Leadership and Decision Making Free Essay Example, 1500 words

It is quite essential to state that according to Manz and Neck (1997) the self-managing teams threatens effective group decision making (18). Policies reflect management thinking on basic matters and inform those interested in the activities of the company about the company's intentions regarding them. The role of managers is to level possible disagreements and create a positive climate and atmosphere. In the hospitality sector, cohesive groups and self-managing teams create tension and pressure which has a negative impact on critical analysis and decision-making process. The challenge of management is to restructure (if necessary) self-managing teams and introduce new methods and forms of communication between teams members. Cohesiveness is more likely when members of a team are to gather for a reasonable length of time, and changes occur only slowly. Strict guidelines and rules established by a manager will help to avoid conflict situations and the turnover of members (Bardi 2002 .). Low morale and a negative attitude are often associated with a large number of team members undertaking similar work. This requires realistic planning by which the degree and quality of goal achievement can be determined (Davidson 2003). We will write a custom essay sample on The Challenges of Managing Communication, Leadership and Decision Making or any topic specifically for you Only $17.96 $11.86/page In this case, communication and leadership are the main tools used by management to eliminate cultural differences and tension (Beardwell et al 2001).

Wednesday, January 1, 2020

Homosexuality Is An Unnatural Phenomenon Essay - 3087 Words

When God created the universe, He didn’t create half things. He created everything of two species working and nating in harmony to produce for the purpose of continuity. The flowers should be heterogeneous as well as the trees. The animals wouldn’t exist if there is no heterogeneity and the same rules are applied on us as men and women. To God’s rules no half should exist. There is a day and night but nothing in between; there is existence or no existence but nothing in between. There should be warm cloud and cold cloud to produce rain but nothing in between. Anything that is in between is violating God’s rules, the law of nature. Homosexuality is an unnatural phenomenon that doesn’t guarantee the universe existence. It’s a virus that threatens the future generations. Homosexuality is threat to the humanity, it is a way to deliver diseases, mental health problems and not a way to deliver and raise healthy children. Okay, so now that we have something to work with, let s take a look at homosexuality act and discover the different negative impact that have on human’s life and the continuity of his life. First of all, Sexual relationships between members of the same sex however, expose gays, lesbians, and bisexuals to extreme risks of sexually transmitted disease such as human Papillomavirus (HPV). HPV is a collection of more than seventy types of viruses that can cause warts, or papilloma, on various parts of the body. More than twenty types of HPV are incurableShow MoreRelatedHomosexuality Is A Form Of Emotional, Romantic, And Sexual Attraction858 Words   |  4 PagesAs one of the many sexual orientations, homosexuality is a form of emotional, romantic, and sexual attraction that is primarily or exclusively to people of the same sex. Homosexuality is a fairly recent phenomenon in the twenty-first century; in fact, this sexual orientation has significantly increased but there is no precise way to estimate the exact numbers due to people not openly identifying as such due to homophobia (which, in everyday use, is the fear of homosexuals) and homobigotry (intoleranceRead MoreWhy Na tural Law Theory Is an Inadequate Criticism of Homosexuality1147 Words   |  5 PagesNatural Law on these grounds, as well as proving that it is inapplicable when judging the ethical value of homosexuality, and discrediting homosexuality as a perversion. Act utilitarianism depicts the argument more clearly, because there are certain semantic inconsistencies with Kantian ethical Theory that will be discussed further on. Let us first consider the premise that homosexuality is contrary to Natural Law, because the Natural Law dictates that sexual relationships must be heterosexualRead MoreThe Doctrine Of The Existence Of God1470 Words   |  6 PagesFor many years homosexuality has been a debate over acceptance but has been for the most part considered an immoral act based on religious beliefs and the obligation to obey God’s commandments. These views on homosexuality can relate to the Divine Command Theory because morality is dependent upon the actions God commands us to do. There is however controversy with the Divine Command Theory that argues that morality may not be what God says it is therefore, the basis of homosexuality being immoralRead MorePrejudice And Homosexuality And Sexual Love And Moral Experience1161 Words   |  5 PagesIsaiah Hines Phil. 2306-43430 05/14/2015 Prejudice and Homosexuality Sexual Love and Moral Experience For many years homosexuality and sex with out marriage has been condemned and debated most with in America . In all standards, homosexual men and women have been denied many rights within the land of the free and home of the brave. And if they have a(n) desire to want to be in the military then they are supposed to withhold their sexual orientation and preference, since this particularRead MoreGeek Masculinity And Its Effects On Society836 Words   |  4 Pagestheir masculinity where they can have access to power, status, and prestige. As a result, subcultures glorify traits associated with males such as toughness, delinquency and bravery all the while demeaning traits associated with femininity. This phenomenon is known as the cult of masculinity, which puts females into a â€Å"structured secondariness†. There is a male privilege among subculturists because of this cult of masculinity. Nerd masculinity in online gaming encompasses both a critique and reinforcementRead More Homosexuality And Its Psychological Behavior1575 Words   |  7 PagesHomosexuality: The attraction to same sex: sexual attraction to or sexual relations with somebody of the same sex. Since the beginning of time, homosexuality has always been shunned, taboo, and misunderstood. Homosexuality and its psychological behavior is a phenomenon with a long history, to which there have been various cultural and moral responses. Theories on sexual development claim that homosexuality is developed after birth as a result of a person’s environment (nature). Environmental factorsRead MoreEssay on Homosexuality: A Pesky Problem1272 Words   |  6 PagesIt is a sad sight indeed to walk throughout our magnificent towns and cities and find our eyes settle upon blights of the landscape. These childless, unnatural, and frightening â€Å"people†, who turn a keen eye upon those of the same sex, are a smudge upon our otherwise immaculate canvas. Many of those who count their profession amongst science have shined a privy light upon this queer behavior, and their findings are quite consistent, specifically that there is something not quite â€Å"right† with suchRea d MoreHomosexuality in Eighteenth Century England1079 Words   |  5 Pagestaboo surrounding the phenomenon in the Western world. From the Fourteenth Century on, Western Europe was gripped by a rabid and obsessive negative preoccupation with homosexuality as the most horrible of sins (Boswell 262). The majority of people did not understand or accept the idea, and consequentially did not have an appropriate way of talking about it. Over the years, as various cultures identified and even implemented practices currently associated with homosexuality, there arose a need forRead MoreLessexuality And Homosexuality933 Words   |  4 Pagesdifferent but however conforming to the idea of being different as homosexual is still be affirmed to the standard that heterosexuality is normal. This idea of the creation story from Aristophanes speech during the Symposium, I interpret that both homosexuality and heterosexuality is the norm instead of one without the one. According to the myth two hal ves are craving the other not just man and women craving each other. However in modern times we have developed a patrichal society that has forced heterosexualityRead MoreArgument Against Homosexual Marriage2189 Words   |  9 Pageslegal marriage is concerned, it is very not a civilized action under any circumstances. Anything against natural phenomenon is hazardous physically and mentally. Giving them lawful support can be a hazard for the upcoming generations and a hindrance in conceiving babies to continue a family chain. The society and government should not allow homosexuals marriage as it is an unnatural process and ethically unsound causing damage to the family life. MAIN BODY: Heterosexual marriage brings together