SlideShare uma empresa Scribd logo
1 de 14
Directory Structure
Prepared By: Mr. Sangram. A. Patil
Assistant Professor,PVPIT Budhgaon
Directory Structure
 How to store files?
 There are typically thousands, millions, or billions of files within computer storage.
 Files are stored on random access storage devices.
 Storage devices store file system by partitioning disks, each partition is called as
slices or minidisks.
 Entity containing file system usually known as volume.
 Volume may be subset of device, whole device or multiple devices linked together
 Each volume contains a file system must also contain information about files in
system. This information is in device directory or volume table of contents.
 Directory entry contains information about name, location, size, and type for all
files on that volume.
Directory overview
 Directory can be defined as the listing of the related files on the disk. The directory
may store some or the entire file attributes.
 Several operations are performed on directory.
1. Create a file: New files to be created and added to the directory.
2. Search for a file: we can able to search a directory structure to find the entry for
particular file.
3. Delete a file: when file is not needed we will able to remove it from directory.
4. List a directory: list the files in the directory and contents of the directory entry for
each file in the list.
5. Rename a file: changing the name of file according to contents of file.
6. Traverse the file system: Access every directory and every file within directory
structure.
Single level directory
 The simplest method is to have one big list of all the files on the disk.
 The entire system will contain only one directory which is supposed to mention
all the files present in the file system.
 The directory contains one entry per each file present on the file system
 MSDOS, UNIX
 This type of directories can be used for a simple system.
Single level directory
 Advantages
1. Implementation is very simple.
2. If the sizes of the files are very small then the searching becomes faster.
3. File creation, searching, deletion is very simple since we have only one directory.
 Disadvantages
1. We cannot have two files with the same name.
2. The directory may be very big therefore searching for a file may take so much time.
3. Protection cannot be implemented for multiple users.
4. There are no ways to group same kind of files.
5. Choosing the unique name for every file is a bit complex and limits the number of
files in the system because most of the Operating System limits the number of
characters used to construct the file name.
Two level directory
 In two level directory systems, we can create a separate directory for each user.
 There is one master directory which contains separate directories dedicated to each
user.
 For each user, there is a different directory present at the second level, containing
group of user's file.
 The system doesn't let a user to enter in the other user's directory without
permission.
Two level directory (Cont.)
Two level directory (Cont.)
 Characteristics of two level directory system
1. Each files has a path name as /User-name/directory-name/file name
2. Different users can have the same file name.
3. Searching becomes more efficient as only one user's list needs to be traversed.
4. The same kind of files cannot be grouped into a single directory for a particular
user.
5. Every Operating System maintains a variable as PWD which contains the present
directory name (present user name) so that the searching can be done
appropriately.
Tree Structured Directory
 Any directory entry can either be a file or sub directory.
 Tree structured directory system overcomes the drawbacks of two level directory
system. The similar kind of files can now be grouped in one directory.
 Each user has its own directory and it cannot enter in the other user's directory.
However, the user has the permission to read the root's data but he cannot write or
modify this. Only administrator of the system has the complete access of root
directory.
 Searching is more efficient in this directory structure. The concept of current
working directory is used.
 A file can be accessed by two types of path, either relative or absolute.
Tree Structured Directory
 Absolute path is the path of the file with respect to the root directory of the
system
 Relative path is the path with respect to the current working directory of the
system.
Acyclic Graph structured directories
 The tree structured directory system doesn't allow the same file to exist in multiple
directories therefore sharing is major concern in tree structured directory system.
 Sharing can be provided by making the directory an acyclic graph. In this system, two or
more directory entry can point to the same file or sub directory. That file or sub
directory is shared between the two directory entries.
 These kinds of directory graphs can be made using links or aliases. We can have
multiple paths for a same file. Links can either be symbolic (logical) or hard link
(physical).
 If a file gets deleted in acyclic graph structured directory system, then
1. In the case of soft link, the file just gets deleted and we are left with a dangling pointer.
2. In the case of hard link, the actual file will be deleted only if all the references to it gets
deleted.
Acyclic Graph structured directories

Mais conteúdo relacionado

Mais procurados

Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systemsvampugani
 
file system in operating system
file system in operating systemfile system in operating system
file system in operating systemtittuajay
 
File and directory
File and directoryFile and directory
File and directorySunil Kafle
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraintsmadhav bansal
 
File system Os
File system OsFile system Os
File system OsNehal Naik
 
Segmentation in Operating Systems.
Segmentation in Operating Systems.Segmentation in Operating Systems.
Segmentation in Operating Systems.Muhammad SiRaj Munir
 
Memory allocation (4)
Memory allocation (4)Memory allocation (4)
Memory allocation (4)rockymani
 
OS file systems
OS file systemsOS file systems
OS file systemsanand hd
 
File access methods.54
File access methods.54File access methods.54
File access methods.54myrajendra
 
Distributed concurrency control
Distributed concurrency controlDistributed concurrency control
Distributed concurrency controlBinte fatima
 
Unix.system.calls
Unix.system.callsUnix.system.calls
Unix.system.callsGRajendra
 
contiguous memory allocation.pptx
contiguous memory allocation.pptxcontiguous memory allocation.pptx
contiguous memory allocation.pptxRajapriya82
 

Mais procurados (20)

Memory management
Memory managementMemory management
Memory management
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
File system
File systemFile system
File system
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
File allocation methods (1)
File allocation methods (1)File allocation methods (1)
File allocation methods (1)
 
file system in operating system
file system in operating systemfile system in operating system
file system in operating system
 
File and directory
File and directoryFile and directory
File and directory
 
File Protection
File ProtectionFile Protection
File Protection
 
Integrity Constraints
Integrity ConstraintsIntegrity Constraints
Integrity Constraints
 
File system Os
File system OsFile system Os
File system Os
 
Segmentation in Operating Systems.
Segmentation in Operating Systems.Segmentation in Operating Systems.
Segmentation in Operating Systems.
 
Memory allocation (4)
Memory allocation (4)Memory allocation (4)
Memory allocation (4)
 
OS file systems
OS file systemsOS file systems
OS file systems
 
File access methods.54
File access methods.54File access methods.54
File access methods.54
 
Distributed concurrency control
Distributed concurrency controlDistributed concurrency control
Distributed concurrency control
 
Unix.system.calls
Unix.system.callsUnix.system.calls
Unix.system.calls
 
contiguous memory allocation.pptx
contiguous memory allocation.pptxcontiguous memory allocation.pptx
contiguous memory allocation.pptx
 
System calls
System callsSystem calls
System calls
 
Memory management
Memory managementMemory management
Memory management
 
Abstract data types
Abstract data typesAbstract data types
Abstract data types
 

Semelhante a Directory structure

Unit ivos - file systems
Unit ivos - file systemsUnit ivos - file systems
Unit ivos - file systemsdonny101
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file managementKalai Selvi
 
File Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.SivakumarFile Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.SivakumarSivakumar R D .
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learningLavanya Sharma
 
file management_osnotes.ppt
file management_osnotes.pptfile management_osnotes.ppt
file management_osnotes.pptHelalMirzad
 
Directory implementation and allocation methods
Directory implementation and allocation methodsDirectory implementation and allocation methods
Directory implementation and allocation methodssangrampatil81
 
File system interfacefinal
File system interfacefinalFile system interfacefinal
File system interfacefinalmarangburu42
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System InterfaceWayne Jones Jnr
 
Learn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptLearn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptgeethasenthil2706
 
Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file managementKalai Selvi
 
Ch11 OS
Ch11 OSCh11 OS
Ch11 OSC.U
 

Semelhante a Directory structure (20)

File structure
File structureFile structure
File structure
 
File Systems
File SystemsFile Systems
File Systems
 
Unit ivos - file systems
Unit ivos - file systemsUnit ivos - file systems
Unit ivos - file systems
 
Unit 3 file management
Unit 3 file managementUnit 3 file management
Unit 3 file management
 
Files
FilesFiles
Files
 
File Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.SivakumarFile Directory Structure-R.D.Sivakumar
File Directory Structure-R.D.Sivakumar
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
 
File system
File systemFile system
File system
 
File System operating system operating system
File System  operating system operating systemFile System  operating system operating system
File System operating system operating system
 
file management_osnotes.ppt
file management_osnotes.pptfile management_osnotes.ppt
file management_osnotes.ppt
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
Directory implementation and allocation methods
Directory implementation and allocation methodsDirectory implementation and allocation methods
Directory implementation and allocation methods
 
File system interfacefinal
File system interfacefinalFile system interfacefinal
File system interfacefinal
 
Ch10
Ch10Ch10
Ch10
 
Chapter 10 - File System Interface
Chapter 10 - File System InterfaceChapter 10 - File System Interface
Chapter 10 - File System Interface
 
CH11.pdf
CH11.pdfCH11.pdf
CH11.pdf
 
Learn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems pptLearn about the File Concept in operating systems ppt
Learn about the File Concept in operating systems ppt
 
Intake 37 11
Intake 37 11Intake 37 11
Intake 37 11
 
Unit 3 chapter 1-file management
Unit 3 chapter 1-file managementUnit 3 chapter 1-file management
Unit 3 chapter 1-file management
 
Ch11 OS
Ch11 OSCh11 OS
Ch11 OS
 

Mais de sangrampatil81

Mais de sangrampatil81 (20)

Deadlock
DeadlockDeadlock
Deadlock
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
virtual memory
virtual memoryvirtual memory
virtual memory
 
IO hardware
IO hardwareIO hardware
IO hardware
 
File management
File managementFile management
File management
 
Disk structure
Disk structureDisk structure
Disk structure
 
Page replacement algorithms
Page replacement algorithmsPage replacement algorithms
Page replacement algorithms
 
Methods for handling deadlock
Methods for handling deadlockMethods for handling deadlock
Methods for handling deadlock
 
Semaphore
SemaphoreSemaphore
Semaphore
 
Monitors
MonitorsMonitors
Monitors
 
Classical problems of process synchronization
Classical problems of process synchronizationClassical problems of process synchronization
Classical problems of process synchronization
 
System programs
System programsSystem programs
System programs
 
System programs
System programsSystem programs
System programs
 
Services and system calls
Services and system callsServices and system calls
Services and system calls
 
Operating system structure
Operating system structureOperating system structure
Operating system structure
 
Operating system deign and implementation
Operating system deign and implementationOperating system deign and implementation
Operating system deign and implementation
 
Pointer to array and structure
Pointer to array and structurePointer to array and structure
Pointer to array and structure
 
Pointer arithmetic in c
Pointer arithmetic in c Pointer arithmetic in c
Pointer arithmetic in c
 
Pointer in c
Pointer in c Pointer in c
Pointer in c
 
Structure in c language
Structure in c languageStructure in c language
Structure in c language
 

Último

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 

Último (20)

Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 

Directory structure

  • 1. Directory Structure Prepared By: Mr. Sangram. A. Patil Assistant Professor,PVPIT Budhgaon
  • 2. Directory Structure  How to store files?  There are typically thousands, millions, or billions of files within computer storage.  Files are stored on random access storage devices.  Storage devices store file system by partitioning disks, each partition is called as slices or minidisks.  Entity containing file system usually known as volume.  Volume may be subset of device, whole device or multiple devices linked together  Each volume contains a file system must also contain information about files in system. This information is in device directory or volume table of contents.  Directory entry contains information about name, location, size, and type for all files on that volume.
  • 3.
  • 4.
  • 5. Directory overview  Directory can be defined as the listing of the related files on the disk. The directory may store some or the entire file attributes.  Several operations are performed on directory. 1. Create a file: New files to be created and added to the directory. 2. Search for a file: we can able to search a directory structure to find the entry for particular file. 3. Delete a file: when file is not needed we will able to remove it from directory. 4. List a directory: list the files in the directory and contents of the directory entry for each file in the list. 5. Rename a file: changing the name of file according to contents of file. 6. Traverse the file system: Access every directory and every file within directory structure.
  • 6. Single level directory  The simplest method is to have one big list of all the files on the disk.  The entire system will contain only one directory which is supposed to mention all the files present in the file system.  The directory contains one entry per each file present on the file system  MSDOS, UNIX  This type of directories can be used for a simple system.
  • 7. Single level directory  Advantages 1. Implementation is very simple. 2. If the sizes of the files are very small then the searching becomes faster. 3. File creation, searching, deletion is very simple since we have only one directory.  Disadvantages 1. We cannot have two files with the same name. 2. The directory may be very big therefore searching for a file may take so much time. 3. Protection cannot be implemented for multiple users. 4. There are no ways to group same kind of files. 5. Choosing the unique name for every file is a bit complex and limits the number of files in the system because most of the Operating System limits the number of characters used to construct the file name.
  • 8. Two level directory  In two level directory systems, we can create a separate directory for each user.  There is one master directory which contains separate directories dedicated to each user.  For each user, there is a different directory present at the second level, containing group of user's file.  The system doesn't let a user to enter in the other user's directory without permission.
  • 10. Two level directory (Cont.)  Characteristics of two level directory system 1. Each files has a path name as /User-name/directory-name/file name 2. Different users can have the same file name. 3. Searching becomes more efficient as only one user's list needs to be traversed. 4. The same kind of files cannot be grouped into a single directory for a particular user. 5. Every Operating System maintains a variable as PWD which contains the present directory name (present user name) so that the searching can be done appropriately.
  • 11. Tree Structured Directory  Any directory entry can either be a file or sub directory.  Tree structured directory system overcomes the drawbacks of two level directory system. The similar kind of files can now be grouped in one directory.  Each user has its own directory and it cannot enter in the other user's directory. However, the user has the permission to read the root's data but he cannot write or modify this. Only administrator of the system has the complete access of root directory.  Searching is more efficient in this directory structure. The concept of current working directory is used.  A file can be accessed by two types of path, either relative or absolute.
  • 12. Tree Structured Directory  Absolute path is the path of the file with respect to the root directory of the system  Relative path is the path with respect to the current working directory of the system.
  • 13. Acyclic Graph structured directories  The tree structured directory system doesn't allow the same file to exist in multiple directories therefore sharing is major concern in tree structured directory system.  Sharing can be provided by making the directory an acyclic graph. In this system, two or more directory entry can point to the same file or sub directory. That file or sub directory is shared between the two directory entries.  These kinds of directory graphs can be made using links or aliases. We can have multiple paths for a same file. Links can either be symbolic (logical) or hard link (physical).  If a file gets deleted in acyclic graph structured directory system, then 1. In the case of soft link, the file just gets deleted and we are left with a dangling pointer. 2. In the case of hard link, the actual file will be deleted only if all the references to it gets deleted.