...File Management The File System Manager (also called the File Manager or File Management System) is the software responsible for creating, deleting, modifying, and controlling access to files – as well as for managing the resources used by the files. The File Manager provides support for the libraries of programs and data to online users, for spooling operations, and for interactive computing. These functions are performed in collaboration with the I/O Manager or Device Manager. ➢ Responsibilities of the File System Manager: The File System Manager has a complete job. It’s in charge of the system’s physical components, its information resources, and the policies used to store and distribute the files. To carry out its responsibilities, it must perform these four tasks: 1. Keep track of where each file is stored. 2. Use a policy that will determine where and how the files will be stored, making sure to efficiently use the available storage space and provide efficient access to the files. 3. Allocate each file when a user has been cleared for access to it, then record its use. 4. Deallocate the file when the file is to be returned to storage, and communicate its availability to others who may be waiting for it. The File System Manager’s policy determines where each file is stored and how the system, and its users, will be able to access them simply – via commands that are independent from device details. In addition, the policy must...
Words: 2584 - Pages: 11
...File Management Nina N. Rountree POS 355 Terrence Carlson June 10, 2013 Operating systems that have numerous users with various security level clearances will require file protection. A UNIX operating system with 5,000 users could implement conventional UNIX file access controls if 4,990 of those users share the same level of security clearance. By means of a file access control structure on the UNIX operating system, each individual user is given a user ID (special user identification number). Users on a UNIX operating system will be allocated to a main class and possibly a variety of classes that will be associated with a unique class ID. Whenever a user creates a file, it is indicated by the individual’s unique user ID along with the user’s main class ID. Each individual user's accessibility is managed by the administrator with a file access control security type structure. The administrator can manage the permissions of all three main classes; read, write, and execute. Access is permitted to three types of users: the creator or owner of the file, the class the file belongs to, and various users with access to the system despite their class. The access control policy affects the level of access that is permitted by whom and under what conditions. Discretionary Access Control (DAC) manages permissions based on the requester’s identity and the regulations linked to access and permissions. Mandatory Access Control (MAC) manages permissions based on assessing protection...
Words: 526 - Pages: 3
...Stephen Sylvester File Management POS:335 John Demory May 26th 2014 In this paper on file access I will be covering two different ways that a system that can support 5,000 users, specifically a protection scheme in UNIX. Please note that out of these 5,000 users, only 4,990 of those users will have access to a specific file. I will first begin with the explanation of one of the ways that a system can support 5,000 users and then move on to the second way that a system can support 5,000 users. The first way that a system can support 5,000 users is for the administrator or facilitator to set up an access control list of all 4,990 users that he or she wants to have access to the specific file. A great real world example of controlled access would be at my current place of employment at the Department of Veteran’s Affairs. Every employee within the company is assigned user roles. These user roles reflect their job position within the company. Every employee has access to our shared drive folder on our network based on the employee’s credentials and need to know privileges (based on their specific duties and user role). Based on their credentials it will grant that employee access to specific folders. I personally deal with medical records and often, at times the doctors use our network shared drive to upload patient information to be indexed into our system. The doctors must be on the access control list in order to access our shared network drive. Being that I...
Words: 654 - Pages: 3
...File Management By: Amy Gonzales POS/355 File Management The data we work with on a computer is kept in a hierarchical file system, the way an operating system has there file management set up effects the user’s ability in accessing and using those folders. According to "Webopedia" (2015), "File management system is the system that an operating system or program uses to organize and keep track of files. For example, a hierarchical file system is one that uses directories to organize files into a tree structure.” If you have ever downloaded a software on your computer you may have noticed how you can find it in the C drive under Program files. The root of this file is the C:\ portion which then stems off into one folder after another to form a tree like structure. For businesses this can be a huge impact on them; without even realizing it they are impacted by the operating system file management they use from storage to security to network. The following paragraphs will say how UNIX file management is set up, along with how it would work in a large company, and also an alternative to the UNIX file management for a large company. First we will start off with how UNIX uses their file management system with another operating system such as Windows. Unlike Windows UNIX has a unique directory structure. In Windows the user will be seeing common file names such as Program File or Users, but in UNIX stuff like a particular application would be scattered into multiple folders....
Words: 836 - Pages: 4
...File Management POS/355 Brandon Elizaldi Steven Kernan File Management File management and file systems are a core part of the user experience for most users. They provide many essential and necessary functions for the user as well as almost anyone else working with a computer system. They provide anything from long term existence to the ability to create and delete stored data. Some of the benefits to the user are long term existence, the ability to be shared between processes and structure. Long term existence is an important aspect because it can be stored and recalled in the future. Imagine being stuck in the days the original Nintendo for example. You could play a game and get deep into game play but if you didn’t have time to finish the game you had to start all over again. This was due to the fact that there was no file system built in due to the fact a storage device was not available for the system. This is one of the great things about current game systems that have file systems and storage capacity. Another benefit is the ability to share files between processes. This has streamlined new software creation because the program doesn’t have to be built as a standalone. This keeps programmers from having to reinvent the wheel every time they write a program making them cheaper and easier to write. This also saves disk space on the users system. The next benefit is structure which provides a hierarchy within a file system allowing for more complex structures...
Words: 705 - Pages: 3
...File Management Paper When dealing with the file management concept of computers and operating systems there are always multiple options and preferences that are available. One method of file storing is when an operating system detects the type of file; the type of program used to access it and saves it as such with pathways and locations filled out. A second method is to allow the pathways and file types to be set by the user, allowing for any program or file extension that is available to be used. A third method is for the operating system to not allow the saving of file type or file extensions, but to assign a specific code related to that operating system that allows it to determine the file type. These three methods all have their benefits and drawbacks referring to ease of access, ease of storage, and the structure of the file system. As each of these methods provides a specific purpose the use of one method over another will depend on how a computer filing system is designed and also how it is utilized by frequent and authorized users. In an operating system that detects the file type when it is being stored the system is recognizing what application is being used to access that file and saving it in storage under a file directory that will open the file with that type or certain program. For example if a user is accessing a text document and saves it, the operating system will detect the word processing application and save the file in a directory or pathway that will...
Words: 885 - Pages: 4
...File Management File management systems have come a long way since the gigantic filing cabinets. Society has come a long way in an effort to save paper, space, and time. With modern technology and computers in most homes and workplaces file management systems are standard among operating systems. This capability gives businesses and individuals the ability to be organized and successfully archive important documents, images, and videos essential to a company a family or an individual. In the next couple of paragraphs one will read about file management systems the functions of file management systems and how it has made our society more efficient. When talking about file management it used to mean huge filing cabinets loaded with folders marked and organize so that one can easily find documents stuffed in said folders. In today’s world when talking about file management one is referring to electronic file management systems. File management systems are one of the most important aspects of a computer. File management systems have enabled the common person to organize documents images or videos however they see fit. File management systems use hardware components of a computer to save and store data. The hardware components that may be used are hard disk, CD-ROM, external hard drives and so forth. No matter what operating system used whether it’s Linux, Windows, or Mac file management system performs certain duties. One of the duties of a file management system is creating...
Words: 870 - Pages: 4
...File Management Paper There are issues that arise concerning file sharing in a multiuser system, and that is access rights and the management of simultaneous access. Access rights to a file is granted unique users whether singular or grouped. A flexible tool is provided to allow extensive file sharing among the users while providing a number of options so that certain access can be harnessed or controlled (Stallings , 2012). Although a wide range of access is being used, there is still a list of representatives with access rights that can be designated to a certain user for a unique file. One way is masking the existence of the file, leaving the user oblivious to its existence. If by chance the user gain knowledge of the files existence and owner identification, a petition to the owner can be put in place to gain additional access rights. There are ways where the user can load and execute a program with copy restrictions. Propriety programs are an example of this because they are made accessible to users with this restriction (Stallings, 2012). The only user with full access rights and the power to grant rights to others is the owner of the file created. There are also three classes of users provided said access by the owner. One- third of the class is a specific user, which are individual users who are assigned by a user id. User groups is the another class with a set of users that are not defined individually. The final class is granted to all users because the files are...
Words: 793 - Pages: 4
...File-management It used to be when someone said anything about file management; the first thing that would come to mind is a metal container with four or five drawers in it. Now when someone mentions file management, they're most likely talking about any kind of electronic system that is used to put the files in order. Most people have used some form a file management system but don't even realize it. If you have save any kind of document on your computer whether you use a Microsoft Windows system or a UNIX/Linux Mac system, they both have file management systems available. Microsoft's file management system turned out to be a lot better for the end user than the older DOS command line interface. The Microsoft's file manager allows for end users to print, move, delete, copy or rename files and folders on the computer. The end users can also add permissions to any file or folder that they create. That means that they can allow certain users to read, write or modify on the file or folders. File and folder management tasks are provided with every Windows folder. Hyperlinked tasks list will be displayed by the folders contents if you open it up. Once you pick a folder, you can click the task to allow you to do a number of things like delete it, copy, move or rename it. Files can also be sent out in an email or published on the web. The file protection system for a UNIX is simple and to the point. User of the UNIX system has a unique ID and will be in at least one...
Words: 751 - Pages: 4
...File Management UNIX systems are based on the access control of files scheme which was introduced in the very early versions of UNIX. The way this works is that each UNIX user has an assigned unique user identification number which also puts this user ID into a primary group as well as other groups if the user ID needs it. These groups are identified, like the user’s ID, with a group ID. When a user creates a file, it is designated as owned solely by that user and marked with that user’s ID. This file can also be associated with a group with a unique group ID. This file is protected by a set of 12 protection bits. These bits along with the group and owner ID are part of the file’s index node or inode. This inode is a data structure that houses all the information about a file system object except the data content and name. Nine of these protection bits specify execute, write and read permissions for the owner of the file, the other members of the group and all other users. The remaining three outline special behavior for files and directories. A particular user ID is the superuser. This superuser ID is freed from the normal file access control constraints and also has system wide access. Whenever a file or program is set as owned by the superuser, the superuser potentially has unrestricted access to the system and to the users that are using the program. This scheme is acceptable when file access requirements are the same with users and a large number of groups of...
Words: 550 - Pages: 3
...File Management Paper {Your Name} {Your Class} {Date} {Instructor} File Management Paper Before we discuss how I would specify a protection scheme in UNIX® for 4990 users out of 5000 to access one file I think we need to first discuss what file management is in UNIX® and how security is implemented for this type of request. File management is a lot like file management in the DOS days of computers operating systems. Even with the early days of Windows up to Windows 3.11 file management and security were perfumed much the same way UNIX® still does it. Why? Because it works. In DOS and still in the most current version of Windows, Windows 8.1, security to files and directories is performed the same way. You have an attributed command with switches for specific action: R- Read Only, A- Archive, S- System Files, H- Hidden Using the + and – symbols before each instructs the system whether to add or remove the attribute. Example: Attrib –R Text.doc. This command will allow the file text.doc to be editable. Where in DOS and Windows upper and lowercase mean the same thing. I file called. TEXT.DOC is the same as a file named text.doc. Not so in UNIX®. A file with uppercase, DOCUMENT.TXT, or lowercase, document.txt, are two totally different files. UNIX® already provides a way for a system administrator to grant access to files and directories for other users. There are three classes of users who may have access to files and directories...
Words: 754 - Pages: 4
...File Management POS 355 30 September 2013 Paul Rouk File Management According to Stallings (2012), “In most applications, the file is the central element.” A large number of UNIX operating systems are established on file access control. Unfortunately, permissions for both read and write cannot be assigned to only a certain number of users on the access control list (ACL). Suppose a system that must support 5,000 users was needed but only 4,990 are required to access one file, this would result in need for two user groups to be created, one group with read only permissions and another group for read and write permissions. Before implementing this protection scheme, a basic knowledge of file management hierarchy is needed. UNIX operating systems are established on file access control schemes. Every user is given an exclusive user ID along with a password to access the system. The user is also part of a primary group, which are identified with a group ID (GID). Every group has different access permissions, depending on the needs of the users within the group. They can range from read, write, and execute. By defining the permissions of each group, the users within that group can only perform the permissions assigned to them. This establishes file security because a user cannot change permissions assigned to them unless they are the superuser, known as “root”. For security measures, the superuser should be a UNIX administrator because the superuser or root has access...
Words: 687 - Pages: 3
...File Management: File Access in UNIX POS/355 July 7, 2014 File Management: File Access in UNIX The Problem Company X is an organization that utilizes a UNIX operating system supporting approximately 5,000 users. Recently, the IT Department has received a request from the CEO of the company; 4,990 out of its 5,000 users on the network need to be able to access one file. How would the IT Department specify the protection scheme in UNIX where the other ten users would not be able to gain access to that one file? Traditional UNIX File Access Control According to Stallings (2012), “Most UNIX systems depend on, or at least are based on, the file access control scheme introduced with the early versions of UNIX.” Because the 4,990 users only need access to one file versus many different files, the traditional file access control UNIX provides is sufficient. The premise of UNIX file access control is based on file permissions that can assign ownership to three categories of users. The first is the user, who is the file or directory owner, usually the user who created the file. The owner of a file assigns the permissions to the file, such as the right to read the file, to write to the file (make changes to it), or, to execute the file if the file is a command (Oracle, 2012). The second category is a group. A group is “members of a group of users” (Oracle, 2012). In this case the owner of the file would create a group, assign the permissions to the group, and then add...
Words: 727 - Pages: 3
...File Management Duane Borchick POS/355 December 24, 2012 Paul Rouk File Management Considering a system that is to support 5000 users, but is only to allow 4990 of the users to have access to one file can be accomplished in a variety of different ways. There are two different options of how to complete this task that will be discussed in this paper. The first and most popular way to accomplish this task is to have an access control list made up with the names of all 4990 user on it. With this list in place the system can access the list and find if the user is allowed to have access to the file. A second way to accomplish this for the 4990 users is to place all those uses in a specific group and then set a group access to the group and file. This way all those in the group are granted access to the file and there is not a chance of an unauthorized user gaining access. The file is linked to the specific group and only those in the group are allowed to access it. The paper will also look at another way to protect the system. It will identify a protection scheme that can be used efficiently than what is provided by the UNIX. First look at the Access Control Lists, which there are two different types, ACLs and default ACLs. With an access ACL it is a list for a specific file or directory. A default ACL can only be associated with directory. With a file that is in the directory and does not have a access ACL it will use the rule of a default ACL for the directory. There...
Words: 558 - Pages: 3
...File Management In a computer systems protection is needed for data to keep it from unauthorized access. Protection can be accomplished in many ways. For a small single user system, we might provide protection by physically removing the floppy disks and locking them in a desk drawer or file cabinet. In a multiuser system, however, other mechanisms are needed. Utilizing controlled access to limit the type of access to files is one such protection mechanism. Some of the types of controlled access are read, write, list, execute, append, delete, renaming, copying and editing. Protection mechanisms may differ depending on the type of computer system and the environment it is used in. The protection required for a library may need to be less restrictive than a system supporting a health clinic. Access control list (ACL) is a general scheme of associating specific usernames and access types for each user to files and directories. Of major concern with ACL is their length. If you allow four hundred users to read a file, you must list each user. Drawback of creating ACL is the time and effort needed to build it and the variable size of the directory entries. To counter these issues condensed version of the list using three classifications of users is recognized by many systems to associate to each file. The three classifications of users are: * Owner: The user who created the file is the owner * Group: A set of users who are sharing the file and need similar access is a group...
Words: 663 - Pages: 3