Page 224 - DCAP103_Principle of operating system
P. 224

Unit 6: File Management



            is associated with all of the user’s processes and threads. When they need to be user readable,   Notes
            they are translated back to the user name via the user name list. Likewise, group functionality
            can be implemented as a system-wide list of group names and group identifiers. Every user
            can be in one or more groups, depending upon operating system design decisions. The user’s
            group IDS are also included in every associated process and thread. The owner and group
            IDS of a given file or directory are stored with the other file attributes. When a user requests
            an operation on a file, the user ID can be compared to the owner attribute to determine if the
            requesting user is the owner of the file. Likewise, the group IDS can be compared. The result
            indicates which permissions are applicable. The system then applies those permissions to the
            requested operation, and allows or denies it. The user information within a process can be used
            for other purposes as well. One process may attempt to interact with another process, and user
            information can dictate the result, based on the design of the operating system. For example, a
            process may attempt to terminate, background, or lower the priority of another process. If the
            owner of each process is the same, then the command may succeed, or else it may be denied.
            It may also be allowed to succeed if it is owned by the privileged user. Many systems have
            multiple local file systems, including partitions of a single disk or multiple partitions on multiple
            attached disks. In these cases, the ID checking and permission matching are straightforward,
            once the file systems are mounted.
                          The user information within  a process can be  used for other purposes as
                          well. One process may attempt to interact with another process, and user
                          information can dictate the result, based on the design of the operating system.
                          For example, a process may attempt to terminate, background, or lower the
                          priority of another process. If the owner of each process is the same, then
                          the command may succeed, or else it may be denied.
            6.7.2 Remote File Systems

            The advent of networks allowed communication between remote computers. Networking allows
            the sharing of resources spread within a campus or even around the world. One obvious resource
            to share is data, in the form of files. Through the evolution of network and file technology, file-
            sharing methods have changed. In the first implemented method, users manually transfer files
            between machines via programs like ftp. The second major method is a distributed file system
            (DFS) in which remote directories are visible from the local machine. In some ways, the third
            method, the World Wide Web, is a reversion to the first. A browser is needed to gain access
            to the remote files, and separate operations (essentially a wrapper for ftp) are used to transfer
            files. ftp is used for both anonymous and authenticated access. Anonymous access allows a user
            to transfer files without having an account on the remote system. The World Wide Web uses
            anonymous file exchange almost exclusively. DFS involve a much tighter integration between the
            machine that is accessing the remote files and the machine providing the files. This integration
            adds complexity, which we describe in this section.



                      How to use operating system concept of Remote File Systems?


            6.7.3 The Client-Server Model
            Remote file systems allow a computer to mount one or more file systems from one or more
            remote machines. In this case, the machine containing the files is the server, and the machine
            wanting access to the files is the client. The client-server relationship is common with networked
            machines.  Generally,  the  server  declares  that  a  resource  is  available  to  clients  and  specifies
            exactly which resource and exactly which clients. Files are usually specified on a partition or
            subdirectory level. A server can serve multiple clients, and a client can use multiple servers,


                                             LOVELY PROFESSIONAL UNIVERSITY                                   217
   219   220   221   222   223   224   225   226   227   228   229