CS 3307 Unit 3

docx

School

University of Central Florida *

*We aren’t endorsed by this school

Course

3307

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

10

Uploaded by MegaCrane3665

Report
1 Written Assignment unit 3 University of the People CS 3307 : Operating systems 2 Wednesday, 6 December 2023 Professor Debanjana Chaudhuri
2 1. Overview A file system is a system in which the files are named stored and retrieved from a storage device. Imagine having a lot of paper containing data and documents. Without organization, it would be im- possible to find the wanted file. To create an organization with the documents and the data, file sys- tems are needed. A storage without a file system without an organization would be useless. Through the file system, the data would be organized and it would be easier to access through directories. Then, the prompt is a prompt that is a text or symbol, audio, or text symbol that is used to represent the system’s readiness to perform the next command. The prompt has a different kind of meanings. According to Computer Hope(2023),” a prompt is text or symbols used to represent the system’s readiness to perform the next command, a message or window that appears, alerting the user or ask- ing for a confirmation, and command that enables and disables the FTP prompt in an FTP session”. In other words, a prompt is a command that is a small section that appears on the screen when on a terminal or console.  Lastly, the remote procedure calls. According to Geeks for Geeks(2023),” remote procedure call(RPC) is a powerful technique for constructing distributed, client-server based applications”. In other words, imagine you have two computers which the yours or the client, and the other one is the server. Then, you want to use the function from the other computer or the server. To realize this process, an RPC or remote procedure call is required. RPC is important for distributed computing, modularity, and simplified development. These three kinds of concepts are important in the organi- zation of the files, user interaction, and modularity. 
3 2. File systems 2.1 Purpose File systems are important in the organization of the files. The file system is a system where the files are named, stored, and retrieved. It is used for the customization of the file and the organization of the files and the data. Then, it is being used for the data storage and retrieval of data. Also, it is being used for data integrity and secu- rity. It provides a user-friendly organization of efficient data. 2.2 Process 2.2.1 File creation and deletion In the file systems is being used for file creation and deletion of files. During this process, the operating system creates space on the storage device and assigns an identifier. 2.2.2 directory management The directory is used to organize and group the files. The directory is being managed by the operating system. According to the PCMag en- cyclopedia(n.d.),” Directory management is the organization and the maintenance of a directory database, the organization of folders on a storage medium such as a hard disk”. In other words, it is about the process of organizing and controlling access to files and directories. 2.2.3 File system and navigation The file system is the structure of the operating system to organize and store files on a storage device. On the other hand, the navigation
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 of the file system is being done by two kinds of methods which are the graphical user interface(GUI) or the Command line interface or the CLI. The graphical user interface has no learning curve while the command line interface is based on text commands. 2.2.4 Backup and recovery Backup and recovery are some of the most important parts of the file system to prevent data corruption. The operating system manages the file system so, the operating system decides the files that should be backed up to avoid data corruption. 2.3 role and function The role of the file system is to do data organization, file naming and storage, and directory management. In other words, it is the part of the computer that organizes the content of the files. 2.4 how it relates to memory The file system relates to the retrieval and storage of the memory. The operating system organizes the parts of the external storage, and it manages the retrieval of the memory. Also, it relates to the virtual memory which is the extension of the physical memory. 2.5 Application The application of the file system relates to the data organization the file storage and the retrieval of the data that is stored on the physical memory. It also provides the function of editing the data in the files like reading, writing, deleting, and executing the files.
5 3. prompts 3.1 Purpose The purpose of prompts is the form communication between the user and the system in the form of text, symbol, audio, or text symbols. It has the purpose of giving the interaction of the system and the user using the command-line interface or the CLI. 3.2 Process 3.2.1 How to use prompts Command-line interface (CLI) prompt each of the operating systems had different kinds of CLIs the Mac OS uses the Mac terminal and Windows uses the com- mand prompt. To use CLI, you will start to locate your CLI by typing cmd on the dialog box and entering the commands like mkdir or cd. You could install software packages using Install <name of the package> or run <name of the package> Programming and Scripting You could use the prompts in programming like user input prompts, condition prompts, and password prompts. You could use the prompts in programming using vscode. FTPs and Network protocol In FTP or file transfer protocol, prompts could be used using the li- braries or modules that could provide functions when interacting with the protocol. One of the examples is the use of the ‘ftplib’ module in Python. According to Cybrosys Technologies (2022),”ftplib is used to
6 transfer computer files between a client and a server across a com- puter network”. For example, by using From ftplib import FTP, you could use the functions for the protocol. Then, you could also use Node.js using the FTP module. Interactive applications In interactive applications, some prompts are being used to do differ- ent tasks and interactions with the programs. The interactive applica- tions use prompts to guide users to do different tasks or interactions. It could use user_name = input(“name:”) syntax from Python to inter- act with users. Then, it could do confirmation prompts to ask users for confirmation before operations. 3.3 definitions Prompts are the message and the cues of the system that are displayed by the computer system to ask for responses from users. 3.4 kinds of prompts Command-line interface(CLI) Programming and Scripting FTPs and network protocol Interactive applications 3.5 Application The application of the prompts are Command line interface user input or data collection GUIs User authentication Menu selections
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7 4. remote procedure calls (how do remote proce- dures are done) 4.1 Purpose The purpose of the remote procedure calls is to enable communication with other computers using RPC or a special language to communicate with each other. Ac- cording to Rosencrance & Matturro(n.d.),” RPC is used to call other processes on the remote systems like a local system. A procedure call is also sometimes known as function call  or a subroutine call”. In other words, it is a language to communicate with other computers without understanding the network’s details. 4.2 Process How to use remote procedure calls To use the RPC, the framework called gRPC is used to build systems. According to gRPC(2023),”gRPC is a modern open-source high-per- formance Remote Procedure Call (RPC) framework that can run in any environment”. In other words, the RPC is about the connection of the services across the data and the framework to use it is gRPC. First, define the service and the messages. Then, implementation of the server. Then, implementation of the client. Lastly, the running of the server and the client on each of the terminals. 4.3 Definition According to Rosencrance & Matturro(n.d.),” Remote Procedure Call is a software communication protocol that one program can use to request a service from a pro- gram located in another computer on a network without having to understand the network's details”. In other words, it is used for the communication between the process or the applications within a network. 4.4 Applications The RPCs are for distributed systems and client-server architectures which are about using multiple systems to communicate with each other. One example of the distrib-
8 uted system is the worldwide web system which is about client-server architectures. The client requests the information and the server provides the information. 5. security in a Unix/Linux operating 5.1 Procedure User Authentication one of the most important parts of the security in a Unix/Linux operating sys- tem is User authentication. User authentication is a system in which it identi- fies who the identified person or the user is. According to TechTarget (n.d.),” User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer of credentials during interactions on a network to confirm a user's authentic- ity”. In other words, through the use of passwords, the security of the operat- ing system is being realized. Firewalls and iptables Firewalls and iptables are security tools that are used for network traffic secu- rity. A firewall is a device that filters the incoming and outgoing network traffic that goes into the computer. It is a barrier to protect the computer from untrusted connection or untrusted network. Then, iptables is the interface for the netfilter which is a kernel module for firewalling. According to Kumar(2023),” It is a powerful tool that can be used to secure a server, limit access to specific applications or services, and mitigate the risk of malicious attacks”. secure shell Secure shell or SSH is a network protocol for securely accessing or managing network devices. It is composed of encryption and the authentication process. The process of the secure shell is that the client initiates the connection, the SSH server sends the public key, secures the channel, and the user logs in to the server host operating system.
9 6. Conclusion In conclusion, file systems, prompts, and RPCs are some of the aspects of the computer to create the services that the user needs. The file system is the one that is responsible for the organization of the files and data. Then, prompts are the one which is responsible for inter- action with the user using text or symbols. Lastly, procedure calls are used for distributed computing, data integrity, and organization.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
10 Word count : 1728 words References: Computer Hope(2023). Prompt. Computer Hope. Https://www . Computerhope.com/jargon/p/ prompt.htm Geeks for Geeks(2023). Remote procedure call (RPC) in Operating System. Geeks for geeks. Https://www.geeksforgeeks.org/remote-procedure-call-rps-in-operating-system/ Cybrosys technologies(2022). What is FTP and SFTP in Python. Cybrosys technologies. https:// www.cybrosys.com/blog/what-is-ftp-and-sftp-in-python#:~:text=File%20Transfer %20Protocol(FTP)%20are,server%20across%20a%20computer%20network Rosencrance,L. & Matturro, B. (n.d.). Remote procedure Call(RPC). TechTarget. https:// www.techtarget.com/searchapparchitecture/definition/Remote-Procedure-Call-RPC gRPC(n.d.). Introduction to gRPC. gRPC. https://grpc.io/docs/what-is-grpc/introduction/ TechTarget(n.d.). What is user authentication? Techtarget. https://www.techtarget.com/searchsecu - rity/definition/user-authentication#:~:text=User%20authentication%20verifies%20the %20identity,to%20confirm%20a%20user%27s%20authenticity . Kumar,S.(2023). Introduction to Iptables.tutorials point. https://www.tutorialspoint.com/introduc - tion-to-iptables