Skip to main content

File System And Features Of UNIX Operating System

FILE SYSTEM

A file is an object on a computer that stores data, information, settings, or commands that are used with a computer program. All of the files in the UNIX file system are organized into a multi-leveled hierarchy called a directory tree.

UNIX File System is organized in tree structure.

File tree can be arbitrarily deep. 

File name must not longer than 256 characters.

Single path name must not longer than 1023 characters.

  • ORDINARY OR REGULAR FILES
    A large majority of the files found on UNIX and Linux systems are ordinary files. Ordinary files contain ASCII (human-readable) text, executable program binaries, program data, and more.

  • DIRECTORIES
    A directory is a binary file used to track and locate other files and directories. The binary format is used so that directories containing large numbers of filenames can be search quickly.

  • DEVICE (SPECIAL) FILES
    Device or special files are used for device I/O on UNIX and Linux systems. They appear in a file system just like an ordinary file or a directory. On UNIX systems there are two flavors of special files for each device, character special files and block special files. Linux systems only provide one special file for each device. When a character special file is used for device I/O, data is transferred one character at a time. This type of access is called raw device access. When a block special file is used for device I/O, data is transferred in large fixed-size blocks. This type of access is called block device access. 

FEATURES OF UNIX

  • MULTI USER CAPABILITY
    In multi user system all users share various computer resources (hard disk, printer, and memory).

  • MULTI TASKING CAPABILITY
    It is capable of carrying out more than one job at the same time. It allows user to type in a program in its editor while it simultaneously executes some other commands like sort, copy a huge file. The later job is performed in the background while in the foreground uses the editor or takes a directory listing or anything else. This is managed by dividing  the  CPU  time  intelligently between all process being carried out. Depending on the  priority of the task, the OS approximately allots small time slots (of  the order of milliseconds or microseconds) to each foreground and background task.

  • COMMUNICATION
    The communication may be within the network of a single main computer or between two or more such computer networks. The users can easily exchange mail, data programs    through   such networks. Distance posses no barrier to passing information or messages to and from.

  • SECURITY
    Unix has 3 inherent provisions for protecting data.
    i) Assign passwords and login name to users area.
    ii) Provide read, write and execute permission to each file.
    iii) Encrypt files into an unreadable format, and decrypting the file is also possible.

  • PORTABILITY
    Unix is a highly portable OS. It can be ported to a variety of hardware platforms. It is the only system which has been ported across various hardware platforms of major vendors such as IBM, DEC, HP and SUN. Most OS is written for one specific machine or platform only.

If you are interested to know more on any other subject in which you are interested or if you have any doubts then tell us in comment about it.  

Comments

Popular posts from this blog

8085 Microprocessor: De-multiplexing of AD0-AD7 Address and Data Lines

  De-multiplexing of AD0-AD7 of 8085 Microprocessor THE ADDRESS AND DATA BUSES: • 8085 Microprocessor have total 16 address lines and 8 data lines. • 8 signal lines A8 – A15 which are unidirectional. • The other 8 address bits are multiplexed with the 8 data bits. So, the bits AD0 – AD7 are bi-directional and serve as A0 – A7 (address bus) and D0 – D7 (data bus) at the same time. • During the execution of the instruction, these lines carry the address bits during the early part, then during the late parts of the execution, they carry the 8 data bits. In order to separate the address from the data, we can use a latch to save the value before the function of the bits changes. THE CONTROL AND STATUS SIGNALS: • There are 4 main control and status signals. 1. ALE (Address Latch Enable): This signal is a pulse that become 1 when the AD0 –AD7 lines have an address on them. It becomes 0 after that. This signal can be used to enable a latch to save the address bits from the AD lines. 2. RD (Rea

Interrupts in 8085 Microprocessor: Vectored-Non Vectored Interrupts And Maskable-Non Maskable Interrupts

Vectored Interrupt: In vectored interrupts, the manufacturer fixes the address of the ISR to which the program control is to be transferred. the processor automatically branches to the specific address in response to an interrupt.  • The TRAP, RST 7.5, RST 6.5 and RST 5.5 are vectored interrupts. Non-Vectored Interrupt:   But in non-vectored interrupts the interrupted device should give the address of the interrupt service routine (ISR).    • The INTR is a non-vectored interrupt. Hence when a device interrupts through INTR, it has to supply the address of ISR after receiving interrupt acknowledge signal. Maskable & Non-Maskable Interrupt: The hardware vectored interrupts are classified into maskable and non-maskable interrupts.  • TRAP is non-maskable interrupt.  • RST 7.5, RST 6.5 and RST 5.5 are maskable interrupt. Masking is preventing the interrupt from disturbing the main program. When an interrupt is masked the processor will not accept the interrupt signal. The interrupts ca

Interrupts in 8085 Microprocessor-Hardware Interrupt And Software Interrupt

What is Interrupt and how it is generated? Interrupt is a signal send by an external device to the processor, to the processor to perform a particular task or work. In the microprocessor based system the interrupts are used for data transfer between the peripheral and the microprocessor. When a peripheral is ready for data transfer, it interrupts the processor by sending an appropriate signal to the interrupt pin of the processor. If the processor accepts the interrupt then the processor suspends its current activity and executes an interrupt service subroutine to complete the data transfer between the peripheral and processor. After executing the interrupt service routine the processor resumes its current activity. This type of data transfer scheme is called interrupt driven data transfer scheme. Types Of Interrupt: The interrupts are classified into software interrupts and hardware interrupts. • The software interrupts are program instructions. While running a program, if a software