Creates that many files named after your first name

Assignment Help Operating System
Reference no: EM131220953

Operating Systems- Homework

Purpose

The purpose of this exercise is to understand how creating files affects the available disk space and the available i-nodes on a disk partition on Linux/UNIX.

Assignment

Create and leave a copy of your C program for this assignment on Pond under cs351/hw4.

1) Write a C program on Pond that:

a. Accepts 2 command line inputs: number of files to create, size of each file (in bytes). For example run your program as ./hw4 10 20 will create 10 files of size 20 bytes each. Your program should check and report not only incorrect # of arguments, but also invalid argument values, such as zero or negative.

b. Creates that many files named after your first name (yourname0, yourname1, yourname2... ) and writes the required number of bytes to each file. One simple strategy is to write that many number of characters since each character is one byte. The content of the files isn't important, just the size. Use ls -l to see the result and verify files of correct size were created.

c. After your program is debugged, delete all files created by your program on Pond before moving to next steps. Use command rm command to delete all files. For example rm crystal* will delete all fines whose name start with crystal.

If you think step 1 is too hard, request a copy of the C code from instructor and directly start from step 2 for this assignment. Of course you will receive 0 pts for the C code part of this assignment.

Before moving on to the next steps, do some research on the UNIX/Linux command df. Understand what df does, its usage, and what it outputs.

2) Run the commands
df .; df -i .

to find out how many disk blocks and i-nodes are in use. Save the results (and future results) to document your answers. Be aware that that 1K-blocks is for display purpose only and is not the real block size of Pond file system. The actual block size is bigger.

1110_Screen_Shot.jpg

Read question (a) in step 12 before proceeding to step 3.

3) Run your program and create 10 files, each with 7 characters. Repeat step 2.

4) Run your program again and create 10 files, each with 13 characters. These 10 files will overwrite the 10 files you created in last step as they have the same names. So you still get 10 files under your working directory. Repeat step 2.

5) Run your program again and create 10 file, each with 25 characters. Repeat step 2.

6) You should be able to answer question (a) below now.

7) Delete the 10 files you just created. Repeat step 2.

8) Run your program and create 10 files, each with 8,192 characters.

9) Repeat step 7.

10) Run your program and create 10 files, each with 8,193 characters.

11) Repeat step 7.

12) Using your results, write a few paragraphs explaining each question below. Be specific. For example if list the numbers in comparison or examples involved to support any statement you make.

a. How creating the same files over and over (steps 3-5) affects disk block usage. Do you think the directory entry is reused when a new file overwrites an existing file of the same name? What about i-nodes? What about data blocks? How can you tell?

b. What difference you see when creating 8,192 byte files vs. 25 byte files. Be specific.

c. What difference you see when creating 8,193 byte files vs. 25 byte files. Be specific.

d. How creating any new file affects i-node usage. How can you tell?

e. What is the block size for this disk partition? How can you tell? If necessary try creating more files of different sizes.

f. How is it possible for a program to fail to create a new file on a file system using i-node, even though there are many free blocks still available? Hint, if your answer doesn't include the word i-node, it's not getting full credit

Reference no: EM131220953

Questions Cloud

Fact receive smallville acceptance : Despite these defects, ACME did in fact receive Smallville's acceptance of the ACME offer on May 17th. Please respond to the following questions in your posts and respond to other students' original posts.
Employees working on long-range projects : "Why do you think making progress ranks as the most important factor contributing to motivation according to a recent study? How can managers provide a sense of progress for employees working on long-range projects that might not show results for ..
Find out whether payday lending is legal in your state : Find out whether payday lending is legal in your state and, if so, what restrictions exist. - How stringent are these restrictions compared to those in other states?
Evaluate the impact of unemployment on work motivation : If many unemployed are spending around 2 hours/day looking for work as some research indicates, how would you evaluate the impact of unemployment on work motivation?
Creates that many files named after your first name : Creates that many files named after your first name and writes the required number of bytes to each file. One simple strategy is to write that many number of characters since each character is one byte.
Unemployment on work motivation : If many unemployed are spending around 2 hours/day looking for work as some research indicates, how would you evaluate the impact of unemployment on work motivation?
Restaurant and service as the marketplace : Establishes a system to evaluate the ongoing success of a winery that a operates a restaurant  and service as the marketplace and company dynamics evolve.
Do you expect skew to be significant : Suppose we execute the word-count Map Reduce program described in this section on a large repository such as a copy of the Web. We shall use 100 Map tasks and some number of Reduce tasks.
Whats a myth and whats reality : The Web site of Community Financial Services Association, the payday lenders' organization, has a page on "Myths and Realities" about payday lending. Do you agree with the CFSA about what's a myth and what's reality?

Reviews

Write a Review

Operating System Questions & Answers

  Question about network security

Suppose that you are the network security officer of one corporation, what will be your plan to enhance your network security firewall? VPN, Content level protection or combination of them?

  Task 1nbspon a fictitious computer of 32 bits paging memory

task 1nbspon a fictitious computer of 32 bits paging memory management system is used to manage its main memory

  Discuss the benefits and drawbacks of using hibernate

Consider issues such as complexity of the application code with and without Hibernate. Explain in what ways you would consider changing the Hibernate framework.

  Investigation of identity theft or fraud

Investigation of Identity Theft or Fraud

  Program to calculate numeric grades for a course

Create a program to calculate numeric grades for a course. The course records are in a document that will serve as the input document.

  How would you solve problem by altering the file structure

What data redundancies do you detect, and how could these redundancies lead to anomalies?

  Explain the difference between the chkdsk and scandisk cmnds

Explain the difference between the Copy command and the Xcopy command

  Explain type of damage the computer infections can do

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Virtual machine design

In a virtual machine design where guest operating systems are independent virtual machines supported by a host operating system, what factors are involved in choosing the host operating system?

  Efficient way of transferring files over the internet

What is an efficient way of transferring files over the Internet? What is the default shell that is used by most versions of Linux called? What is the command that will move the file /cust/newdata to /archive/olddata

  Six of the best practices should be general practices

The management team for MWS has asked for a simple but thorough checklist describing best practices for securing the operating systems used in the company. Six of the best practices should be general practices

  Elements of computer system

It's all about elements of computer system and there are six elements of computer system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd