filmov
tv
File System in OS II - Data Allocation | File System | Data allocation methods | system requirements
![preview_player](https://i.ytimg.com/vi/pfz3zZ8RfoM/sddefault.jpg)
Показать описание
This video talks at length about data allocation methods used by file systems to store files on hard drive. File system provides the user various features to store and manipulate their data. File systems have various requirements and one should learn the advantages and disadvantages of various data memory allocation methods in the operating system.
This is the 2nd of the 3 video series on File Systems. This video talks about the requirements of a file system while translating from user to system view. This requires that we know about user access and usage patterns that are captured from years of analysis and experience. This is very important because while designing a file system we want to accommodate the user in how they want to access and control their files.
As the prime responsibility of the File system is to map the user files onto the physical sectors of a disk drive in a way that is efficient so that the user could access their files with ease. The video talks in detail about the data allocation techniques that are evaluated against the most important operations and usage patterns such as sequential and random accesses.
This is the 2nd of the 3 video series on File Systems. This video talks about the requirements of a file system while translating from user to system view. This requires that we know about user access and usage patterns that are captured from years of analysis and experience. This is very important because while designing a file system we want to accommodate the user in how they want to access and control their files.
As the prime responsibility of the File system is to map the user files onto the physical sectors of a disk drive in a way that is efficient so that the user could access their files with ease. The video talks in detail about the data allocation techniques that are evaluated against the most important operations and usage patterns such as sequential and random accesses.
Комментарии