Discuss each of the tasks of encapsulation, concurrent processing, protection, name resolution, communication of parameters and results, and scheduling in the case of the UNIX file service (or that of another kernel that is familiar to you).
What will be an ideal response?
We discuss the case of a single computer running Unix.
Encapsulation: a process may only access file data and attributes through the system call interface. Concurrent processing: several processes may access the same or different files concurrently; a process that has made a system call executes in supervisor mode in the kernel; processes share all file-system-related data, including the block cache.
Protection: users set access permissions using the familiar user/group/other, rwx format. Address space protection and processor privilege settings are used to restrict access to file data and file system data in memory and prevent direct access to storage devices. Processes bear user and group identifiers in protected kernel tables, so the problem of authentication does not arise.
Name resolution: pathnames (for example, /usr/fred) are resolved by looking up each component in turn. Each component is looked up in a directory, which is a table containing path name components and the corresponding inodes. If the inode is that of a directory then this is retrieved; and the process continues until the final component has been resolved or an error has occurred. Special cases occur when a symbolic link or mount point is encountered.
Parameter and result communication: parameters and results can be communicated by a) passing them in machine registers, b) copying them between the user and kernel address spaces, or c) by mapping data blocks simultaneously in the two address spaces.
Scheduling: there are no separate file system threads; when a user process makes a file system call, it continues execution in the kernel.
You might also like to view...
Use the ________ Wizard with Access to create a direct link between the table or query and the Word document
Fill in the blank(s) with correct word
A teacher calls the help desk, "Hi, my name is Cheryl Schmidt and I called in a problem yesterday that my IP phone won't work in my office. I just got a note through my email that states the problem was closed, but when I came in to work today, my office phone still does not have a phone number, and it does not work." Which statement would be the most appropriate from the help desk technician?
A) "That Jack. He is always closing help-desk problems before he actually gets around to doing the repair. This has happened before and I am sure he will fix that today." B) "Let me try and solve the problem with you right now." C) "Let me give you the phone number of my supervisor so you can report this." D) "Stay on the line and I will get Jack on the call with us to find out why he didn't solve the problem."
Which of the following is not an example of good FTP server security?
A. Disable the anonymous FTP account. B. Use port 21. C. Change passwords regularly. D. Scan PHP files.
The ____ statement is useful when you need to test a single variable against a series of exact integer, character, or string values.
A. switch B. if C. else D. break