Explain logical file system architecture, Operating System

Assignment Help:

 Logical File System

Responsible for providing the before discussed interface to the user including:

  • File access.
  • Directory operations.
  • Security and protection.

At the initial level device drivers communicate directly with the peripherals or their controllers or channels. A device driver is accountable for starting I/O operations on a device and processing the completion of an I/O request. For file operations the usual devices controlled are disk and tape drives. Device drivers are generally considered to be part of the operating system.

The next to initial level is referred to as the basic file system or the physical I/O level. This is the foremost interface with the environment outside of the computer system. The-basic I/O administrator is responsible for all file I/O initiation and termination. At this level control structures are sustain that deal with device I/O scheduling, and file status. The basic I/O administrator is apprehension with the selection of the device on which file I/O is to be performed on the basis of which file has been selected. It is as well concerned with scheduling disk and tape accesses to optimize performance.

Logical I/O makes possible users and applications to access records. Therefore whereas the basic file system deals with blocks of data the logical I/O module deals with file records. Logical I/O supplies a general-purpose record I/O capability and maintains basic data about files.

The level of the file system contiguous to the user is often termed the access method it provides a standard interface between applications and the file systems and devices that hold the data. Different access methods replicate different file structures and different ways of accessing and processing the data.


Related Discussions:- Explain logical file system architecture

Explain formal language grammar, Explain Formal Language Grammar A form...

Explain Formal Language Grammar A formal language grammar is a set of formation rules which explain which strings formed from the alphabet of a formal language are syntacticall

Dynamic memory management, Usually memory is allocated from a large pool of...

Usually memory is allocated from a large pool of unused memory area called the heap. In C++, dynamic allocation/deallocation must be manually performed using commands like malloc,

What is a file, Question 1 What is a file? Write down the operations on fi...

Question 1 What is a file? Write down the operations on files Question 2 What do you mean virtual machine? Write down the application of virtual machine Question 3 What

Kernel to context switch between kernel level threads, Q. Explain the actio...

Q. Explain the actions taken by a kernel to context switch between kernel level threads. Answer: Context switching among kernel threads classically requires saving the value

Benefits and drawbacks of batch system, Q. Benefits and Drawbacks of Batch ...

Q. Benefits and Drawbacks of Batch System? Benefits of Batch System: Move much of the work of operator to computer. Increased performance as it was possible for j

Financial objective of corporation, The primary financial objective of corp...

The primary financial objective of corporation is usually taken to be the maximization of shareholder wealth. Discuss:- i. Ways in which the shareholder of a company can encour

Explain the tlsalloc (void) - tls function call, Explain the TlsAlloc (VOID...

Explain the TlsAlloc (VOID) This function is used to allocate a TLS index.Any subsequent TLS function calls will require  the handle returned  from TlsAlloc to be passed. The i

Virtual addresses, Virtual addresses are made up of two parts: the ?rst par...

Virtual addresses are made up of two parts: the ?rst part is the page number, and the second part is an offset inside that page. Suppose our pages are 4kb (4096 = 212 bytes) long,

Processes, draw a state diagram showing the transissions of a process from ...

draw a state diagram showing the transissions of a process from creation to termination

Why is it complicated to protect a system, Q. Why is it complicated to prot...

Q. Why is it complicated to protect a system in which users are allowed to do their own I/O? Answer: In earlier chapters we identified a distinction among kernel and user mod

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd