SlideShare uma empresa Scribd logo
1 de 16
DIRECTORY STRUCTURE AND FILE
SYSTEM MOUNTING IN OS
M.Raj shree
M.SC(IT)
Nadar saraswathi college of arts&science
Directory Structure
 Directory structure provides both the above-
discussed features. A directory always has
information about the group of related
files. Whenever a user or a process request for
a file, the file system search for the file’s entry
in the directory and when the match is found, it
obtains the file’s location from there.
 A directory is a container that is used to
contain folders and file. It organizes files and
folders into a hierarchical manner.
Types of Directory Structures
Single-level directory structure
 Single level directory structure has only one
directory which is called the root directory. The
users are not allowed to create subdirectories
under the root directory. All the files created by
the several users are present in the root
directory only.
 Single level directory is simplest directory
structure.In it all files are contained in same
directory which make it easy to support and
understand.
Advantages
 Since it is a single directory, so its
implementation is very easy.
 If the files are smaller in size, searching
will become faster.
 The operations like file creation, searching,
deletion, updating are very easy in such a
directory structure.
Two-level directory structure
 In Two-level directory structure, the users
create directory directly inside the root
directory. But once a user creates such
directory, further he cannot create any
subdirectory inside that directory
 4 users have created their separate directory
inside the root directory. But further, no
subdirectory is created by the users.
 This two-level structure allows each user to
keep their files separately inside their own
directory. This structure allows to use the same
name for the files but under different user
Hierarchical Directory Structure
 In Hierarchical directory structure, the users
can create directories under the root directory
and can also create sub-directories under this
structure. As the user is free to create many
sub-directories, it can create different sub-
directories for different file types.
 Here, the files are accessed by their location
using the path. There are two types of paths to
locate the file in this directory structure
Tree Directory Structure
 In a tree directory structure, except root
directory, every directory or file has only one
parent directory. So, there is a total
separation between the users which provide
complete naming freedom. Here, if a user
wishes to access another users file, it has to go
through two or more directories.
 The tree directory structure provides an
asymmetric way for the user to access the
shared files of a different user. For example, a
user can access a file of its own user directory
with a shorter path than the other user.
Acyclic-Graph Directory
Structure
 An acyclic graph is a graph with no cycle and
allows to share subdirectories and files. The
same file or subdirectories may be in two
different directories. It is a natural
generalization of the tree-structured directory.
 directory structure allows a directory or a file to
have many parent directories. So, a shared file
in a directory can be pointed by the other user
directories who have access to that shared file
using the links.
File system mounting
 Mounting is a process by which the operating
system makes files and directories on a storage
device (such as hard drive, CD-ROM, or network
share) available for users to access via the
computer's file system.
 An opposite process of mounting is
called unmounting, in which the operating system
cuts off all user access to files and directories on
the mount point, writes the remaining queue of
user data to the storage device, refreshes file
system metadata, then relinquishes access to the
device; making the storage device safe for
removal.
 A mount point is a location in the
partition used as a root filesystem
 Many different types of storage exist, including
magnetic, magneto-optical, optical, and
semiconductor (solid-state) drives.
 Each different filesystem provides the host
operating system with metadata so that it
knows how to read and write data.
 When the medium (or media, when the
filesystem is a volume filesystem as in
RAID arrays) is mounted, these metadata are
read by the operating system so that it can use
 In order to access a filesystem in Linux you
first need to mount it. Mounting a filesystem
simply means making the particular filesystem
accessible at a certain point in the Linux
directory tree.
 When mounting a filesystem it does not matter
if the filesystem is a hard disk partition, CD-
ROM, floppy, or USB storage device
 Mounting is the attaching of an additional file
system to the currently accessible file
system of a computer.
directory structure and file system mounting
directory structure and file system mounting

Mais conteúdo relacionado

Mais procurados

SQL, Embedded SQL, Dynamic SQL and SQLJ
SQL, Embedded SQL, Dynamic SQL and SQLJSQL, Embedded SQL, Dynamic SQL and SQLJ
SQL, Embedded SQL, Dynamic SQL and SQLJDharita Chokshi
 
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System ImplementationWayne Jones Jnr
 
Distributed concurrency control
Distributed concurrency controlDistributed concurrency control
Distributed concurrency controlBinte fatima
 
Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 
File system Os
File system OsFile system Os
File system OsNehal Naik
 
file system in operating system
file system in operating systemfile system in operating system
file system in operating systemtittuajay
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systemsvampugani
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemPrankit Mishra
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithmsPiyush Rochwani
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process CommunicationAdeel Rasheed
 
Structure of dbms
Structure of dbmsStructure of dbms
Structure of dbmsMegha yadav
 

Mais procurados (20)

SQL, Embedded SQL, Dynamic SQL and SQLJ
SQL, Embedded SQL, Dynamic SQL and SQLJSQL, Embedded SQL, Dynamic SQL and SQLJ
SQL, Embedded SQL, Dynamic SQL and SQLJ
 
Disk structure
Disk structureDisk structure
Disk structure
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System Implementation
 
Distributed concurrency control
Distributed concurrency controlDistributed concurrency control
Distributed concurrency control
 
File organisation
File organisationFile organisation
File organisation
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
File system Os
File system OsFile system Os
File system Os
 
file system in operating system
file system in operating systemfile system in operating system
file system in operating system
 
Disk scheduling
Disk schedulingDisk scheduling
Disk scheduling
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
System calls
System callsSystem calls
System calls
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 
Inter Process Communication
Inter Process CommunicationInter Process Communication
Inter Process Communication
 
Distributed Operating System_4
Distributed Operating System_4Distributed Operating System_4
Distributed Operating System_4
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Structure of dbms
Structure of dbmsStructure of dbms
Structure of dbms
 
Linux file system
Linux file systemLinux file system
Linux file system
 

Semelhante a directory structure and file system mounting

Semelhante a directory structure and file system mounting (20)

File Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.SivakumarFile Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.Sivakumar
 
File structure
File structureFile structure
File structure
 
File System in Operating System
File System in Operating SystemFile System in Operating System
File System in Operating System
 
file management
 file management file management
file management
 
File system interfacefinal
File system interfacefinalFile system interfacefinal
File system interfacefinal
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file management
 
File Systems
File SystemsFile Systems
File Systems
 
file management_osnotes.ppt
file management_osnotes.pptfile management_osnotes.ppt
file management_osnotes.ppt
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
File system.
File system.File system.
File system.
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
Model of file system
Model of file systemModel of file system
Model of file system
 
CH11.pdf
CH11.pdfCH11.pdf
CH11.pdf
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 
File system
File systemFile system
File system
 
Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file management
 
File sharing
File sharingFile sharing
File sharing
 
Filesharing 180214044607
Filesharing 180214044607Filesharing 180214044607
Filesharing 180214044607
 
Files
FilesFiles
Files
 

Mais de rajshreemuthiah (20)

oracle
oracleoracle
oracle
 
quality
qualityquality
quality
 
bigdata
bigdatabigdata
bigdata
 
polymorphism
polymorphismpolymorphism
polymorphism
 
solutions and understanding text analytics
solutions and understanding text analyticssolutions and understanding text analytics
solutions and understanding text analytics
 
interface
interfaceinterface
interface
 
Testing &ampdebugging
Testing &ampdebuggingTesting &ampdebugging
Testing &ampdebugging
 
concurrency control
concurrency controlconcurrency control
concurrency control
 
Education
EducationEducation
Education
 
Formal verification
Formal verificationFormal verification
Formal verification
 
Transaction management
Transaction management Transaction management
Transaction management
 
Multi thread
Multi threadMulti thread
Multi thread
 
System testing
System testingSystem testing
System testing
 
software maintenance
software maintenancesoftware maintenance
software maintenance
 
exception handling
exception handlingexception handling
exception handling
 
e governance
e governancee governance
e governance
 
recovery management
recovery managementrecovery management
recovery management
 
Implementing polymorphism
Implementing polymorphismImplementing polymorphism
Implementing polymorphism
 
Buffer managements
Buffer managementsBuffer managements
Buffer managements
 
os linux
os linuxos linux
os linux
 

Último

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

directory structure and file system mounting

  • 1. DIRECTORY STRUCTURE AND FILE SYSTEM MOUNTING IN OS M.Raj shree M.SC(IT) Nadar saraswathi college of arts&science
  • 2. Directory Structure  Directory structure provides both the above- discussed features. A directory always has information about the group of related files. Whenever a user or a process request for a file, the file system search for the file’s entry in the directory and when the match is found, it obtains the file’s location from there.  A directory is a container that is used to contain folders and file. It organizes files and folders into a hierarchical manner.
  • 3. Types of Directory Structures Single-level directory structure  Single level directory structure has only one directory which is called the root directory. The users are not allowed to create subdirectories under the root directory. All the files created by the several users are present in the root directory only.  Single level directory is simplest directory structure.In it all files are contained in same directory which make it easy to support and understand.
  • 4. Advantages  Since it is a single directory, so its implementation is very easy.  If the files are smaller in size, searching will become faster.  The operations like file creation, searching, deletion, updating are very easy in such a directory structure.
  • 5.
  • 6. Two-level directory structure  In Two-level directory structure, the users create directory directly inside the root directory. But once a user creates such directory, further he cannot create any subdirectory inside that directory  4 users have created their separate directory inside the root directory. But further, no subdirectory is created by the users.  This two-level structure allows each user to keep their files separately inside their own directory. This structure allows to use the same name for the files but under different user
  • 7.
  • 8. Hierarchical Directory Structure  In Hierarchical directory structure, the users can create directories under the root directory and can also create sub-directories under this structure. As the user is free to create many sub-directories, it can create different sub- directories for different file types.  Here, the files are accessed by their location using the path. There are two types of paths to locate the file in this directory structure
  • 9. Tree Directory Structure  In a tree directory structure, except root directory, every directory or file has only one parent directory. So, there is a total separation between the users which provide complete naming freedom. Here, if a user wishes to access another users file, it has to go through two or more directories.  The tree directory structure provides an asymmetric way for the user to access the shared files of a different user. For example, a user can access a file of its own user directory with a shorter path than the other user.
  • 10.
  • 11. Acyclic-Graph Directory Structure  An acyclic graph is a graph with no cycle and allows to share subdirectories and files. The same file or subdirectories may be in two different directories. It is a natural generalization of the tree-structured directory.  directory structure allows a directory or a file to have many parent directories. So, a shared file in a directory can be pointed by the other user directories who have access to that shared file using the links.
  • 12. File system mounting  Mounting is a process by which the operating system makes files and directories on a storage device (such as hard drive, CD-ROM, or network share) available for users to access via the computer's file system.  An opposite process of mounting is called unmounting, in which the operating system cuts off all user access to files and directories on the mount point, writes the remaining queue of user data to the storage device, refreshes file system metadata, then relinquishes access to the device; making the storage device safe for removal.
  • 13.  A mount point is a location in the partition used as a root filesystem  Many different types of storage exist, including magnetic, magneto-optical, optical, and semiconductor (solid-state) drives.  Each different filesystem provides the host operating system with metadata so that it knows how to read and write data.  When the medium (or media, when the filesystem is a volume filesystem as in RAID arrays) is mounted, these metadata are read by the operating system so that it can use
  • 14.  In order to access a filesystem in Linux you first need to mount it. Mounting a filesystem simply means making the particular filesystem accessible at a certain point in the Linux directory tree.  When mounting a filesystem it does not matter if the filesystem is a hard disk partition, CD- ROM, floppy, or USB storage device  Mounting is the attaching of an additional file system to the currently accessible file system of a computer.