Betriebssysteme 13/14



Ähnliche Dokumente
Betriebssysteme 11/12

TSM 5.2 Experiences Lothar Wollschläger Zentralinstitut für Angewandte Mathematik Forschungszentrum Jülich

p^db=`oj===pìééçêíáåñçêã~íáçå=

Magic Figures. We note that in the example magic square the numbers 1 9 are used. All three rows (columns) have equal sum, called the magic number.

NEWSLETTER. FileDirector Version 2.5 Novelties. Filing system designer. Filing system in WinClient

1. General information Login Home Current applications... 3

Ressourcenmanagement in Netzwerken SS06 Vorl. 12,

Ingenics Project Portal

Creating OpenSocial Gadgets. Bastian Hofmann

VGM. VGM information. HAMBURG SÜD VGM WEB PORTAL USER GUIDE June 2016

p^db=`oj===pìééçêíáåñçêã~íáçå=

VGM. VGM information. HAMBURG SÜD VGM WEB PORTAL - USER GUIDE June 2016

Order Ansicht Inhalt

H o c h s c h u l e D e g g e n d o r f H o c h s c h u l e f ü r a n g e w a n d t e W i s s e n s c h a f t e n

Zu + Infinitiv Constructions

Weather forecast in Accra

Electrical tests on Bosch unit injectors

Where are we now? The administration building M 3. Voransicht

Newest Generation of the BS2 Corrosion/Warning and Measurement System

Can I use an older device with a new GSD file? It is always the best to use the latest GSD file since this is downward compatible to older versions.

Cameraserver mini. commissioning. Ihre Vision ist unsere Aufgabe

Ein Stern in dunkler Nacht Die schoensten Weihnachtsgeschichten. Click here if your download doesn"t start automatically

PONS DIE DREI??? FRAGEZEICHEN, ARCTIC ADVENTURE: ENGLISCH LERNEN MIT JUSTUS, PETER UND BOB

Algorithms for graph visualization

CNC ZUR STEUERUNG VON WERKZEUGMASCHINEN (GERMAN EDITION) BY TIM ROHR

Hazards and measures against hazards by implementation of safe pneumatic circuits

Tube Analyzer LogViewer 2.3

prorm Budget Planning promx GmbH Nordring Nuremberg

Accelerating Information Technology Innovation

Oracle Integration Cloud Service

Industrie-PC SIMATIC IPC547G - Windows 7 Ultimate, 32 Bit, MUI Produktinformation

Big Data Analytics. Fifth Munich Data Protection Day, March 23, Dr. Stefan Krätschmer, Data Privacy Officer, Europe, IBM

Word-CRM-Upload-Button. User manual

Linux System Administration Inhouse Training

Mercedes OM 636: Handbuch und Ersatzteilkatalog (German Edition)

ONLINE LICENCE GENERATOR

GridMate The Grid Matlab Extension

Routing in WSN Exercise

Lukas Hydraulik GmbH Weinstraße 39 D Erlangen. Mr. Sauerbier. Lukas Hydraulik GmbH Weinstraße 39 D Erlangen. edraulic rescue equipment

FACHKUNDE FüR KAUFLEUTE IM GESUNDHEITSWESEN FROM THIEME GEORG VERLAG

auf differentiellen Leitungen

IDS Lizenzierung für IDS und HDR. Primärserver IDS Lizenz HDR Lizenz

Taxation in Austria - Keypoints. CONFIDA Klagenfurt Steuerberatungsgesellschaft m.b.h

Concept. Chapter. Locking daemon over CIFS for OpenOffice.org. Verantwortlich

Materialien zu unseren Lehrwerken

Exercise (Part II) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1

iid software tools QuickStartGuide iid USB base driver installation

Funktion der Mindestreserve im Bezug auf die Schlüsselzinssätze der EZB (German Edition)

MATLAB driver for Spectrum boards

FEBE Die Frontend-Backend-Lösung für Excel

PONS DIE DREI??? FRAGEZEICHEN, ARCTIC ADVENTURE: ENGLISCH LERNEN MIT JUSTUS, PETER UND BOB

Level 1 German, 2014

FEM Isoparametric Concept

Umstellung eines Outlook Kontos von ActiveSync zu IMAP. Changing an Outlook account from ActiveSync to IMAP

Registration of residence at Citizens Office (Bürgerbüro)

MATHEMATIK - MODERNE - IDEOLOGIE. EINE KRITISCHE STUDIE ZUR LEGITIMITAT UND PRAXIS DER MODERNEN MATHEMATIK (THEORIE UND METHODE) FROM UVK

Martin Luther. Click here if your download doesn"t start automatically

Mixed tenses revision: German

Level 2 German, 2015

Rev. Proc Information

Username and password privileges. Rechteverwaltung. Controlling User Access. Arten von Rechten Vergabe und Entzug von Rechten DBS1 2004

Managing Terabytes of Supercomputer Storage with TSM/HSM

Prediction Market, 28th July 2012 Information and Instructions. Prognosemärkte Lehrstuhl für Betriebswirtschaftslehre insbes.

How-To-Do. Hardware Configuration of the CPU 317NET with external CPs on the SPEED Bus by SIMATIC Manager from Siemens

Der Adapter Z250I / Z270I lässt sich auf folgenden Betriebssystemen installieren:

Die UN-Kinderrechtskonvention. Darstellung der Bedeutung (German Edition)

STRATEGISCHES BETEILIGUNGSCONTROLLING BEI KOMMUNALEN UNTERNEHMEN DER FFENTLICHE ZWECK ALS RICHTSCHNUR FR EIN ZIELGERICHTETE

Die "Badstuben" im Fuggerhaus zu Augsburg

Level 2 German, 2013

HIR Method & Tools for Fit Gap analysis

Konfiguration von eduroam. Configuring eduroam

Im Fluss der Zeit: Gedanken beim Älterwerden (HERDER spektrum) (German Edition)

CALCULATING KPI QUANTITY-INDEPENDENT ROUTE TIME

PONS DIE DREI??? FRAGEZEICHEN, ARCTIC ADVENTURE: ENGLISCH LERNEN MIT JUSTUS, PETER UND BOB

Wie man heute die Liebe fürs Leben findet

Electrical testing of Bosch common rail Injectors

Unit 1. Motivation and Basics of Classical Logic. Fuzzy Logic I 6

Wer bin ich - und wenn ja wie viele?: Eine philosophische Reise. Click here if your download doesn"t start automatically

NTP Synchronisierung NTP Synchronizer

Symbio system requirements. Version 5.1

Corporate Digital Learning, How to Get It Right. Learning Café

Titelbild1 ANSYS. Customer Portal LogIn

RAID, LVM und Co. Was steckt dahinter?

Context-adaptation based on Ontologies and Spreading Activation

yasxtouch Firmware Update

Electrical testing of Bosch common rail piezo injectors

Slide 3: How to translate must not and needn t with two sentences to illustrate this.

Die besten Chuck Norris Witze: Alle Fakten über den härtesten Mann der Welt (German Edition)

Level 2 German, 2016

vcdm im Wandel Vorstellung des neuen User Interfaces und Austausch zur Funktionalität V

Analysis Add-On Data Lineage

Star Trek: die Serien, die Filme, die Darsteller: Interessante Infod, zusammengestellt aus Wikipedia-Seiten (German Edition)

Panic Button Add-on Device Quickstart Guide

Extract of the Annotations used for Econ 5080 at the University of Utah, with study questions, akmk.pdf.

DAS ERSTE MAL UND IMMER WIEDER. ERWEITERTE SONDERAUSGABE BY LISA MOOS

1.1 Software-Update vorbereiten

Lukas Hydraulik GmbH Weinstraße 39 D Erlangen. Mr. Sauerbier. Lukas Hydraulik GmbH Weinstraße 39 D Erlangen

FEM Isoparametric Concept

Eingebettete Taktübertragung auf Speicherbussen

Transkript:

Betriebssysteme 13/14 File systems 11. Dezember 2013 1/50

Motivation RAM is not enough (currently) Solution: Main memory to small to contain all the data Information must be persistent beyond the lifetime of a process multiple processes need to share data store stu on hard disks and similar devices information becomes persistent no longer dependent on processes, disappears only if deleted administration by operating system...we need a le system 2/50

Users view User does not want to see, know and understand where and how data is stored must be able to refer to data we need a naming scheme 3/50

types of les regular les text (ASCII or UTF-data) binary data (usual with an internal structure) directories special les (/dev/..., /proc/...) block special les character special les 4/50

accessing data tape drive model sequential access one byte after the other at the end: wind back introduction of oppy disks: any sequence possible random access seek-system-call added allowing to change access-position within le 5/50

directories helps organizing les directories, folders one or multiple levels 6/50

One Level A,B,C: owners - not names! Common on early PC`s, also CDC 6000 (rst Supercomputer) Simple 7/50

One Level A,B,C: owners - not names! Common on early PC`s, also CDC 6000 (rst Supercomputer) Simple for the system. Name clashes? 7/50

Two Levels one directory per user no (less) name clashing problems still insucient 8/50

hierarchical system 9/50

le structure Internal structure dierent issue for the operating system generally only a byte stream other structures exist, mainly on mainframes 10/50

Implementation Figure: Disk layout, classical example 11/50

Implementation (classical Unix) boot block: Boot Loader, to boot system super block: Infos on le system, e.g. size of partition block size pointer to free block list inode-number of the root directory magic number (identies le system type)... index nodes (inodes) data blocks 1:1-relation between inodes and les 12/50

Implementation (classical Unix) disk organized in block blocks group in cylinder groups one copy of the superblock per group data of one le ideally in one group (performance) free storage administered using bit maps 13/50

inodes 14/50

Inode Attributes: type le, directory, character special le, block special le owner user, group time values size created, last modied, last accessed mode in bytes and blocks permissions (rwx) but NO le name 15/50

Inode 10 (12) direct block pointers sucient for small les 1 indirect block: points to a block containing a list of block numbers 1 double indirect block: points to a block containing a list of block numbers each of these block numbers points to a block containing a list of block numbers 1 triple indirect block: points to a block containing a list of block numbers each of these block numbers points to a block containing a list of block numbers each of these block numbers points to a block containing a list of block numbers 16/50

Inodes les may have multiple names directories contain names and inode-number multiple occurrence possible hard link inode contains link count Inode link-count 0: no more reference within le system exists le can be deleted number of inodes limited le system may be full, because no free inode all blocks used 17/50

ext/ext2/ext3/ext4 linux-based le systems originally cross-development in minix based on the minix le system quite clean implementation but limited disk sizes and le names VFS: virtual le system layer interface allowing to use dierent le systems ext: extended le system (1992) rst implementation supporting VFS 2 GB disk size 255 Byte le names successors: ext2 - ext3 - ext4 18/50

VFS 19/50

ext2 rst successor integrates ideas from the Unix File Systems (UFS) aka Berkeley Fast File System (BSD FFS) design principle: extensibility until Kernel 2.6.17 volume size limited to 2TB uses cylinder-groups, superblock, inodes as described above 20/50

ext2 Attributes (examples): c: compressed le stored in a compressed manner s: secured blocks overwritten with 0 after le is deleted S: synchronized data written to hard disk immediately A: append mode les always opened in append-mode 21/50

ext2 Fast symbolic links symbolic link: indirection - le contains name of another le normally stored on the data blocks of the le fast symlinks: inode contains le name dirty state after OS-crash: fsck recommended/enforced regulars le system checks (fsck), even if clean 22/50

ext2 performance Readaheads more than one block per read requested from disk Block-Groups when accessing les sequentially when reading directories inodes and data blocks close to each other on hard disk reduces head-seek-times Preallocation allocating a block to a le results in allocating up to 8 continuous blocks improves write- and read performance 23/50

ext2 managing free entities inode allocation bitmap data allocation bitmap maximum le size depends on block size b min(( b 4 )3 + ( b 4 )2 + b + 12) b, 4 232 b) b=1kb: 16GB b=4kb: 2 TB 24/50

ext3 based on ext2 journalling le system simple well tested dierences to ext2: Journal le systems can grow dynamically HTree for big directories 25/50

ext3 Journal changes to les stored in a journal in principle a cyclic log rst change noted in journal then executed in le system after crash: allows xing inconsistencies easier 26/50

Journal - typical scenario le system is consistent 27/50

Journal - typical scenario le system is consistent changes are requested 27/50

Journal - typical scenario le system is consistent changes are requested changes noted in journal 27/50

Journal - typical scenario le system is consistent changes are requested changes noted in journal changes executed in le system 27/50

Journal - typical scenario le system is consistent changes are requested changes noted in journal changes executed in le system similar to stable storage concept 27/50

journalling - example delete le may need two steps 1. remove reference from directory 2. delete inode Crash between the two steps: orphaned inode inconsistency Change order? directory references non-existing inode later: inode gets reused: may have fatal consequences 28/50

Journal Without Journal: fsck - le system check at reboot Now: Read entries from journal execute changes if required le system consistent much faster changes become atomic either they have been done completely either they have been completed before the crash or they are executed after the crash from the journal or they are not done at all (not being written into the journal) 29/50

implementing journals storage: regular le (may grow) hidden le that may not be moved special area on disk separate Device (SSD; NV-Ram) journal for the journal must be able to check the integrity of the journal checksum ignore entries with incorrect checksum 30/50

physical journals writes a copy of each block rst into the journal then on the disk Crash: either neither in journal nor on disk: no change only in journal: copy to disk already on disk: nothing to do high overhead acceptable for high correctness requirements 31/50

logical journals only meta-data written to journal trades safety against performance may lead to asynchronicity between meta-data and data example: enlarging a le concerns 1. inode (size) 2. free space bitmap (one further block assigned) 3. new block (data) logical journal does not contain step 3: may lead to correct structure but garbage in le 32/50

writing journals writes to disk optimized by OS consequently the journal may be written after changes to disk is committed requires synchronisation of kernel, le system and drivers journalling-system must enforce ushing the disk-caches 33/50

journals in ext3 three levels 1. Journal (minimum risk taken) data written to journal data written to disk data has to be written twice 2. Ordered (medium risk taken) Only meta-data to journal, data directly written to les Changes to meta-data only declared committed if data actually on disk If only data is involved: nothing done in journal 3. Writeback (highest risk taken): Only meta data covered to journal. Data written to disk eventually (task of sync-process). Risk of data-loss highest. Data-structure safe in all three levels. No checksums on journal. Content safe only in level 1. 34/50

ext4 successor of ext3 volume size up to 1 exbibyte (2 60 ) le size up to 16 tebibytes (2 40 ) uses extents preallocation allocate-on-ush journals with checksum 35/50

extents Area of adjacent blocks in a le system les are extend by multiple blocks reduces fragmentation up to 128 MiB per Extent 4 extents stored in inode additional extents: HTree 36/50

allocation pre-allocation allocate les with known le size in advance will likely be stored on adjacent blocks either: write zeroes to le after creation now: use new syscall fallocate() useful for media streaming and databases dynamic allocation (allocate on ush) traditionally: write requires new block - allocate block immediately now: store data in cache, only allocate blocks when committing to disk improves performance ideal combination with extents and multi-block allocator 37/50

btrfs Features Extent based le storage (2 60 max le size) Space ecient packing of small les Space ecient indexed directories Dynamic inode allocation Writable snapshots Sub-volumes (separate internal le-system roots) Object level mirroring and striping Checksums on data and meta-data transparent compression (gzip and LZO) Integrated multiple device support RAID-0,1,5,6,10 implementations Ecient incremental backup dynamic resizing SSD-awareness 38/50

btrfs lowest level manages pool of storage may be multiple block devices managed in chunks (1 GiB) multiple les in one Chunk one le on multiple chunks RAID (redundant array of independent disks) on chunk-level RAID-1 (mirroring): two chunks belong together RAID-10 (striped mirrors): multiple chunks 39/50

Sub-volumes correspond to a a posix-lesystem-namespace dierent to LVM - not a separate block device you can mount the top level volume - all sub-volumes visible as subdirectories sub-volume only - you will see only the sub-volume can be created at any place within the le system hierarchies may be nested 40/50

COW Copy on Write improvement on journal principle - but no journal used blocks are never overwritten in place when change is made copy to a new location rst then meta data is changed to point to the new copy same principle if meta-data on meta-data exist (e.g. superblock) can be turned of (if fragmentation is an issue, e.g. databases) supports mirroring and RAID congurations by default meta-data mirrored on two devices, duplicated if only one device available checksums to detect errors, CRCs stored separate from the data 41/50

Snapshot Snapshot: Copy of a sub-volume actually clone of a sub-volume almost no additional space (copy on write!) snapshots can be written to and evolve separately 42/50

selected internals based on b-trees root-tree contains everything other trees are objects within root-tree le-system-tree one per sub-volume directories and les inode items extended attributes, access control lists 43/50

selected internals extents contain le data (no meta-data) outside of trees if small enough: stored within tree 4KB default size, size always multiple of 4K snapshots and clones share extents changing part of a extent: up to 3 new extents created small extent with the changed data two extents with unchanged parts of original extent extents managed within extent allocation tree 44/50

Bitlocker Not a le system But an important technology for Windows users data on a lost or stolen computer is vulnerable to unauthorized access 45/50

Bitlocker Not a le system But an important technology for Windows users data on a lost or stolen computer is vulnerable to unauthorized access what helps? 45/50

Bitlocker Not a le system But an important technology for Windows users data on a lost or stolen computer is vulnerable to unauthorized access what helps? Encryption! 45/50

BitLocker encryption encrypts the entire Windows operating system volume all user les and system les including swap and hibernation les available for current Windows system (Vista, W7, W8, Server 2008 and later) 46/50

Integrity Checking the integrity of early boot components boot conguration data requires a Trusted Platform Module (TPM) version 1.2 BitLocker uses the TPM to ensure that data is accessible only if the computer's boot components appear unaltered and the encrypted disk is located in the original computer. 47/50

other drives protects xed and removeable devices encrypts the entire contents of the drive can be congured to require that BitLocker is enabled on a drive before the computer can write data to the drive Unlocking drive: automatic (after password or smart card authentication) password required smart card required keys to unlock stored in Active Directory Can be mixed automatic on home computer password on other computer 48/50

hardware and software requirements Windows 8 or Server 2012 TPM 1.2 or 2.0 TCG-compliant BIOS or UEFI rmware boot order must force booting from hard disk rmware must be able to access USB stick 2 partitions on hard disk: system drive and operating system drive 49/50

TPM stores the decryption key on the chip measures BIOS MBR OS loader Only if these are unchanged the TPM will provide the key to uncrypt the data but no real protection against BIOS or MBR-viruses 50/50