Skip to main content

File System And Features Of UNIX Operating System

FILE SYSTEM

A file is an object on a computer that stores data, information, settings, or commands that are used with a computer program. All of the files in the UNIX file system are organized into a multi-leveled hierarchy called a directory tree.

UNIX File System is organized in tree structure.

File tree can be arbitrarily deep. 

File name must not longer than 256 characters.

Single path name must not longer than 1023 characters.

  • ORDINARY OR REGULAR FILES
    A large majority of the files found on UNIX and Linux systems are ordinary files. Ordinary files contain ASCII (human-readable) text, executable program binaries, program data, and more.

  • DIRECTORIES
    A directory is a binary file used to track and locate other files and directories. The binary format is used so that directories containing large numbers of filenames can be search quickly.

  • DEVICE (SPECIAL) FILES
    Device or special files are used for device I/O on UNIX and Linux systems. They appear in a file system just like an ordinary file or a directory. On UNIX systems there are two flavors of special files for each device, character special files and block special files. Linux systems only provide one special file for each device. When a character special file is used for device I/O, data is transferred one character at a time. This type of access is called raw device access. When a block special file is used for device I/O, data is transferred in large fixed-size blocks. This type of access is called block device access. 

FEATURES OF UNIX

  • MULTI USER CAPABILITY
    In multi user system all users share various computer resources (hard disk, printer, and memory).

  • MULTI TASKING CAPABILITY
    It is capable of carrying out more than one job at the same time. It allows user to type in a program in its editor while it simultaneously executes some other commands like sort, copy a huge file. The later job is performed in the background while in the foreground uses the editor or takes a directory listing or anything else. This is managed by dividing  the  CPU  time  intelligently between all process being carried out. Depending on the  priority of the task, the OS approximately allots small time slots (of  the order of milliseconds or microseconds) to each foreground and background task.

  • COMMUNICATION
    The communication may be within the network of a single main computer or between two or more such computer networks. The users can easily exchange mail, data programs    through   such networks. Distance posses no barrier to passing information or messages to and from.

  • SECURITY
    Unix has 3 inherent provisions for protecting data.
    i) Assign passwords and login name to users area.
    ii) Provide read, write and execute permission to each file.
    iii) Encrypt files into an unreadable format, and decrypting the file is also possible.

  • PORTABILITY
    Unix is a highly portable OS. It can be ported to a variety of hardware platforms. It is the only system which has been ported across various hardware platforms of major vendors such as IBM, DEC, HP and SUN. Most OS is written for one specific machine or platform only.

If you are interested to know more on any other subject in which you are interested or if you have any doubts then tell us in comment about it.  

Comments

Popular posts from this blog

8085 Microprocessor: De-multiplexing of AD0-AD7 Address and Data Lines

  De-multiplexing of AD0-AD7 of 8085 Microprocessor THE ADDRESS AND DATA BUSES: • 8085 Microprocessor have total 16 address lines and 8 data lines. • 8 signal lines A8 – A15 which are unidirectional. • The other 8 address bits are multiplexed with the 8 data bits. So, the bits AD0 – AD7 are bi-directional and serve as A0 – A7 (address bus) and D0 – D7 (data bus) at the same time. • During the execution of the instruction, these lines carry the address bits during the early part, then during the late parts of the execution, they carry the 8 data bits. In order to separate the address from the data, we can use a latch to save the value before the function of the bits changes. THE CONTROL AND STATUS SIGNALS: • There are 4 main control and status signals. 1. ALE (Address Latch Enable): This signal is a pulse that become 1 when the AD0 –AD7 lines have an address on them. It becomes 0 after that. This signal can be used to enable a latch to save the address bits from the AD lines. 2. RD ...

Farmer's Protest in India-2020

The  Indian farmers' protes t of 2020  is an ongoing protest against the three farm acts  passed by the Indian  Parliament  in 2020.This protest is mainly going on  by farmers of Punjab , Rajasthan and Haryana. Firstly the local protests began in states of Punjab and Haryana.  After two months of protests, farmers from these two states began a movement named ' Dilli Chalo ' , in which tens of thousands of farmers marched towards the national capital. Police and law enforcement used water cannons and tear gas to prevent the farmers from entering Delhi . On 26 November, a nationwide general strike  that reportedly involved approximately 250 million people  took place in support of the farmers. This protest is going on because of three bills which were passed  by the Rajya   Sabha  passed the three bills by 22 September.  The President of India  gave his assent by signing the bills on 28 September, thus co...

System development And Life Cycle-Implementation and Post Implementation & Maintenance

  Implementation   Stage: User training, File / System conversion Key Question: What is actual operation? Are user manuals ready? Are there delays in loading files? Results: Training programs, user friendly documentation  • It is concerned with user training, site preparation and file conversion. • When system is linked to terminal or remote sites it also includes telecommunication network and network testing along with system. • During final testing user acceptance is tested followed by user training, • System testing checks the readiness and accuracy of system to access, update and retrieve  data from new files. • If testing is successful program is run with live data or else a diagnostic procedure is use to locate and correct errors. Post-Implementation and Maintenance Stage: Evaluation, maintenance and enhancements. Key Questions: is system running? Should system be modified? Results: User requirements need, satisfied user. • There is an aging process requi...