Question

In: Computer Science

1)Consider a file system in which a file can be deleted and its disk space reclaimed...

1)Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?

2)Consider a file systemthat uses a modified contiguous-allocation scheme with support for extents.A file is a collection of extents, with each extent corresponding to a contiguous set of blocks. A key issue in such systems is the degree of variability in the size of the extents. What are the advantages and disadvantages of the following schemes? a. All extents are of the same size, and the size is predetermined. b. Extents can be of any size and are allocated dynamically. c. Extents can be of a few fixed sizes, and these sizes are predetermined.

3)If all the access rights to an object are deleted, the object can no longer be accessed. At this point the object should also be deleted, and the space it occupies should be returned to the system. Suggest an efficient implementation of this scheme

4)What commonly used computer programs are prone to man-in-the-middle attacks? Discuss solutions for preventing this form of attack.

5)Discuss the following with neat diagrama.

Virtualization and its types

b.Hypervisor

(Operating system ,Computer Science)

Solutions

Expert Solution

1)This is a good question, which addresses some corner cases that are - luckily - handled by all filesystems I’m aware of. As I saw it, you described two related but separated.

1. A file is deleted but it kept open and another file is created in the same storage area, i.e. occupying the same blocks on the disk at a same time.

This scenario can’t happen, since as long as the file is open, its inode “has a reference” to it. As long as there are references to the inode, its blocks are marked as “used”, and will not be allocated to another file.

Once the file is closed and there are no more references to the inode, the blocks are marked as “free” and can be allocated to another file.
BTW, this is how different “undelete” utilities work - as long as the blocks haven’t been allocated to another file, the original file’s contents can be recovered.

2. A file is deleted and another file is created with the same name in the same directory.

This is an acceptable scenario, since as soon as the file is deleted (even if it’s still kept open), its directory entry is removed - which allows another file to be created with the same name under the same directory.

Note that this new file will be a separate file with a different index node and will occupy different blocks (once those are allocated to it) - the only similarity will be the file name, which will not be in use at the time of the new file’s creation

4)A man in the middle (MITM) attack is a general term for when an attacker positions himself in a conversation between a victim either to eavesdrop or to impersonate one of the victims, making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal data, such as login credentials, account details and credit card numbers. Targets are typically the victims of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.

Data obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.

Blocking MITM attacks requires some practical steps on the part of victims or users, as well as a combination of encryption and verification methods for applications.

For users, this means:

Avoiding open WiFi connections that are not password protected.
Paying attention to browser notifications visiting a website as being unsecured.
Instantly logging out of a secure application when it’s not in use.
Not using public networks (e.g., coffee shops, hotels) when conducting sensitive or important transactions.

5) Virtulization and its Type

Hypervisor

Due To the limitation of text, I unable to answer all question


Related Solutions

(Operating System CSE) Consider a file system in which a file can be deleted and its...
(Operating System CSE) Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?2)Consider a file systemthat uses a modifiedcontiguous-allocation scheme with support for extents.A file is a collection of extents, with each extent corresponding to a contiguous set of...
Assume that the maximum capacity of a file system space is 8TB (1TB = 240 bytes),...
Assume that the maximum capacity of a file system space is 8TB (1TB = 240 bytes), and the disk block size is 2KB. The file control block (FCB) contains an index table of 512 bytes. Answer the following questions: (2) [4 MARKS] Suppose that the index table area adopts the following structure: the first 8 bytes (0 ~ 7 ) use <start block number, number of blocks> to represent the pre-allocated continuous storage space during file creation, in which the...
Assume that the maximum capacity of a file system space is 8TB (1TB = 240 bytes),...
Assume that the maximum capacity of a file system space is 8TB (1TB = 240 bytes), and the disk block size is 2KB. The file control block (FCB) contains an index table of 512 bytes. Answer the following questions: (1) [4 MARKS] Suppose that the index table only adopts the direct index structure, and stores the disk block numbers occupied by the file. How many bytes are required for each index table entry to represent a disk block number? What...
1) Low level formatting divides a disk into sections that the disk controller can read and...
1) Low level formatting divides a disk into sections that the disk controller can read and write. is usually performed by the purchaser of the disk device is different from physical formatting does not usually provide an error-correcting code 2) Find the match up from the first column - the type of system calls to the second column - the categories normally supplied by the Operating System .     Attach or detach remote devices Open file, close file Get/set Device...
Assume there is a file which consists of 20 blocks. Consider that the file-control block is...
Assume there is a file which consists of 20 blocks. Consider that the file-control block is already stored in the memory. Calculate the number of disk I/O operations are required for contiguous and linked allocation strategies, if, for one block, the following conditions hold. Also assume that the block information to be added is stored in memory. a. The block is added at the beginning. b. The block is added in the middle. c. The block is added at the...
Consider a charged disk of radius R on the x-z plane with its centre at the...
Consider a charged disk of radius R on the x-z plane with its centre at the origin. The disk has a positive charge density σ. (a) Find, from first principles, an expression for the electric field of this disk at point P (0,yP,0) on the axis of the disk. (b) A second identical charged disk is now placed at a distance d parallel to the first, with its center at (0,d,0). Find the net electric field due to both disks...
A retrofitted space-heating system is being considered for a small office building. The system can be...
A retrofitted space-heating system is being considered for a small office building. The system can be purchased and installed for $110,000, and it will save an estimated 300,000 kilowatt-hours (kWh) of electric power each year over a six-year period. A kilowatt-hour of electricity costs $0.10, and the company uses a MARR of 15% per year in its economic evaluations of refurbished systems. The market value of the system will be $8,000 at the end of six years, and additional annual...
. Suppose a PC manufacturer wants to evaluate the performance of its hard disk memory system....
. Suppose a PC manufacturer wants to evaluate the performance of its hard disk memory system. One measure of performance is the average time between failures of the disk drive. To estimate this value, a quality control engineer recorded the time between failures for a random sample of 49 disk-drive failures. A summary of the sample statistics was that x-bar = 5,790.36 hours and with sample standard deviation s = 224 hours. Estimate the true mean time between failures with...
Is it possible that space has density, i.e., can a given space of 1 cm have...
Is it possible that space has density, i.e., can a given space of 1 cm have multiple 1 cm compressed into its 1 cm self? TO GIVE AN INSIGHT INTO THIS QUESTION LET ME EXPLAIN WHAT I REALLY MEAN. So we all know the displacement route between 2 points in 2-D space is the straight line between the 2 points. Now in case of its 3-D self, the line joining the 2 points isn't the shortest route between them. So...
1.Storing all blocks of a large file on consecutive disk blocks would minimize seeks during sequential...
1.Storing all blocks of a large file on consecutive disk blocks would minimize seeks during sequential file reads. Why is it impractical to do so? What do operating systems do instead, to minimize the number of seeks during sequential reads? 2. Some databases use magnetic disks in a way that only sectors in outer tracks are used, while sectors in inner tracks are left unused. What might be the benefits of doing so? 3. A database administrator can choose how...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT