A file system stores every file under a i-node

Assignment Help Operating System
Reference no: EM13165820

suppose a file system stores every file under a i-node similar to (but may not be the same as) the Unix V7 File System. The i-node contains 15 addresses, each address has 32 bits (4 bytes).

 

If an i-node contains 12 direct addresses, 1 single-indirect address, 1 double-indirect address, and 1 triple-indirect address. Suppose every disk block is 4KB. What is the largest file size, in GB, that the file system can store? Round your answer to the nearest integer.

(Note: 1GB = 1024MB; 1MB = 1024KB; 1KB = 1024 bytes)

 

Continuing from above. Sam is a sound engineer and requires random accesses to large numbers of audio files ranging from 4MB to 16MB in size. You are designing a variation of the file system with different numbers of single, double and triple indirect addresses to minimize Sam's random file access time, while using the same block size and supporting at least the same largest file size. You would --

  • Change the number of (direct, single-indirect, double-indirect, or triple-indirect) addresses to entries
  • Change the number of (direct, single-indirect, double-indirect, or triple-indirect) addresses to entries

In both cases above, try to make the change amount minimal. For example, if increasing the number of a particular type of addresses by N could minimize the access time, then don't increase it by N+1.

Continuing from above. Using 4KB block size but potentially any number of direct, single-indirect, double-indirect, and triple-indirect addresses (as long as the total is 15) per i-node, what is the largest possible file size, in GB, that the file system can support? Round your answer to the nearest integer.

(Note: 1GB = 1024MB; 1MB = 1024KB; 1KB = 1024 bytes)

 

Reference no: EM13165820

Questions Cloud

Give their telephone numbers using one or more letters : People sometimes give their telephone numbers using one or more letters. write a program that accespts a 10 digit telephone number that may contain one or more letters. display the corresponding number using numerlas. the numbers and letters are a..
The state of the waiting thread to blocked : Which IPC mechanism does not change the state of the waiting thread to blocked?
Function alter with two parms passed by reference : Write a function alter with two parms passed by reference: x and y. alter changes the value of x to x+y and changes the value of y to x*y. Write a main function to read in two integers, print the two integers, call the function alter using the two..
Explores the performance consequences : This problem explores the performance consequences of having only a single level of cache in a modern processor with 40 ns DRAM column access time and a clock period of 400 ps (clock frequency 2.5 GHz). You are given the following data: A particul..
A file system stores every file under a i-node : suppose a file system stores every file under a i-node similar to (but may not be the same as) the Unix V7 File System. The i-node contains 15 addresses, each address has 32 bits (4 bytes).
Value referenced by the pointer. : Add 10 to the value referenced by pointer switch.Add 4 to the address stored in pointer switch.Subtract 5 from the value referenced by the pointer.
Create an application for disney''s cottages : Create an application for Disney's Cottages, a weekend getaway resort that rents cottages and boats to use on the local lake
You assign each int with a particular id : You assign each int with a particular ID.Array (4, 5, 6, 5, 4, 6) ID (1, 2, 3, 4, 5, 6)
A machine has a 32-bit address space and an 4-kb page : A machine has a 32-bit address space and an 4-KB page. Suppose a simple OS just boot up on the machine, running a single process. The process uses 2 memory pages for the text and data memory (combined) near the lowest virtual address, and 1 memory pa..

Reviews

Write a Review

Operating System Questions & Answers

  Discuss technology related ethical issue

Discuss and explain a technology related ethical issue. Determine the issue and its possible outcomes? How can the issue be resolved?

  Use of the ipc facilities provided by unix

The purpose of this program is to change such that it makes use of the IPC facilities provided by UNIX.

  Write down the reference string if page size is given

Consider following sequence of memory references from 460-byte program: 10, 11, 104, 170, 73, 309, 185, 245, 246, 434, 458, 364. Write down the reference string, assuming page size of 100 bytes.

  Regulation of the telecommunications industry

Discuss how has the telephone service changed over the past sixty years also explain how regulation of the telecommunications industry changed and what ar some of the outcomes of that change?

  Limitations of the model view controller principle

Determine the advantages and limitations of the model view controller principle. Recognize one way in which MVC helps software designers create better code, and one way in which it deters them.

  Determine the largest value

A soft real time system has 4-periodic events with periods of 50, 100, 200 and 250 msec each. Assume 4-events need 35, 20, 10 and X msec of CPU time, respectively.

  Create algorithm which prevents deadlock using one semaphore

Using exactly one semaphore, create an algorithm which prevents deadlock. Do not be concerned about starvation and inefficiency.

  Operating system interfaces questions

Select one of the programs that comes with Vista in which you think your classmates would be interested. Determine what does the program do?

  Question about internet usage

Do you think that an workers internet usage at a corporation should be audited and governed through usage policy?

  Standards in the field of wireless networking

Do you consider that standards are beneficial in the field of wireless networking or do you feel they limit new technologies?

  Operating system maps user-level threads to kernel

Suppose an operating system maps user-level threads to the kernel using the many-to-many model and the mapping is done through LWPs.

  Assessing security risks

In your new position at XYZ Company, you have been asked to lead a risk assessment group. As part of your assignment to assess security risks for the computing infrastructure.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd