Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

PROTECTION

FILE SYSTEM STRUCTURE


--VIDHYASREE.M
OTHER PROTECTION APPROCHES:

 The access to any system is also controlled by


the password.
 If the use of password is random and it is
changed often, this may be result in limit the
effective access to a file
The use of password has a Few
disadvantages:

> The number of passwords are very large


so it is difficult to remember the large
passwords.
> If one password is used for all the files,
then once it is discovered, all files are
accessible.
FILE SYSTEM STRUCTURE:

 File system provide efficient access to the disk by allowing data


to stored and located and retrieved in a convenient way
 File system must be able to store the file, locate the file and
retrieve the
file.
 Most of the operating system use layering approach for every task
including file system. *
 Each layer of the file system is responsible for some activities.
Layered file system:
APPLICATION PROGRAM:

 user written program is a application


program .
 For e.g. C program
 . It gives a file name as input to the
logical system
LOGIC FILE SYSTEM:

 It take file name as input and check in


the directory whether the particular file is
present or not.
 If it is present then it will find the logical
block number
FILE –ORGANISATION MODULE:

 Logical block number will be gives input to the


file - organisation module.
 It will find the physical block number of the
particular file
 Physical block number means exact location of
that file
BASIC FILE SYSTEM:

 Basic file system will receive physical block


number as a input and it will give a commend
to the I/o Devices using block number
I/O DEVICES:

 I/o Devices accept the commend which is send by the


basic file system
 Every I/o devices have a device drives they interact
with the hardware device
 One layer is linked with another layer so it is called as
layered structure

You might also like