An Analysis of the File System for Linux

Article Preview

Abstract:

This paper discusses about types of file structures in Linux, points out that EXT2 is the most commonly used file system in Linux, analyzes the disk layout, index point and directory structure of EXT2, and studies the method to access files in EXT2 by name, which makes the access faster and more efficient.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2195-2199

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chenxiangyang, Method. Linux Practices of Mexican(version 2)[M]. Beijing: The science press, (1998).

Google Scholar

[2] Wang Hong, Hou Gang and so on, operating system Discipline (Linux) - - exercise explanation, sample question analysis, experimental instruction (the second edition). Beijing: Water conservancy and Hydroelectric Power Press, August, 2008. 214-284.

Google Scholar

[3] Zhang Heng, Zhang Yusen, Lu Weidong, Implementation and Assessment on the Capability Mechanism of Linux Security Enhancement System, [J], Journal of System Simulation., 2004, 16 (1) : 79 - 81.

Google Scholar

[4] Feng HongWei, Wang Peng. Operating system teaching and experimental design research. Laboratory research and exploration, in 2007, the 26th volume (12 issues): 251-253.

Google Scholar

[5] WangHong. Research on the structure design of operating systems, [C]. AMMASS 2012, Guangzhou, China. P474-479.

Google Scholar

[6] Yang Yanhang, Sun Bingxin. A Security Policy for Operating System, Journal of North-East Forestry[J]. , 01/25/(2003).

Google Scholar

[7] Wang Hong, Hou Gang and so on, operating system Discipline (Linux) - - exercise explanation, sample question analysis, experimental instruction (the second edition). Beijing: Water conservancy and Hydroelectric Power Press, August, 2008. 214-284.

Google Scholar

[8] Wang Yahui, Zhong Keding, Yuying. An Idea of Security Enhancement based on Linux Operating System, Computer Applications and Software [J], Computer Applications and Software. , . 04/12/(2005).

Google Scholar

[9] Zhang Heng, Zhang Yusen, Lu Weidong, Implementation and Assessment on the Capability Mechanism of Linux Security Enhancement System, Journal of System Simulation [J], Journal of System Simulation., 2004, 16 (1) : 79 - 81.

Google Scholar

[10] WangHong. Architecture-Centric Software Process for Pattern Based Software Reuse, [C]. WCSE 2009. P95-99.

Google Scholar