Professional Documents
Culture Documents
ACTIVITY - 02
RB
Operating System Virtualization
instance to exist. These instances are called software containers, which are
virtualization engines.
Uses
Virtual Machine
Various physical machines that are equipped with any hypervisor like KVM
RB
(Kernel-based Virtual Machine) are known as a host computer, host operating
system, host machine, or simply host. Many virtual machines that are using
the resources are called a guest operating system, guest computers, guest
machines, or simple guests.
Container
AM
RB
Applications running on VM systems
2. container environment share a
can run different OS.
single OS.
Hypervisors and Linux containers are both technologies used for virtualization,
but they have some fundamental differences. Here are a few of the key
differences between the two:
Operating System
RB
multiple isolated user-space instances to run on a single host operating
system.
Resource Allocation:
Overhead
because they share the same kernel and operating system resources.
Isolation
1. Cheap
RB
an on-site resource is no longer required. We need a licence or access from a
third-party vendor to begin using the hardware, just as if it were locally
produced.
2. Efficient
TH
By downloading the new versions of the software and hardware from a
third-party supplier, efficient virtualization also enables automatic upgrades of
both. By handling the problem themselves and saving money, IT specialists
are able to avoid having to hire specialists. Virtualization also lessens the
difficulty of managing resources to increase the effectiveness of virtual
RU
environments.
3. Disaster recovery
4. Deployment
6. Saves energy
Both individuals and businesses can save energy by using virtualization. The
RB
rate of energy consumption can be reduced because no local hardware or
software alternatives are being employed. To boost the total ROI of
virtualization, monies can be used over time for other operational expenses
rather than paying for a data centre's cooling costs and equipment operation
costs.
7. improved uptime
TH
Virtualization technologies have increased uptime dramatically. An uptime of
99.9999% is offered by some providers. Even low-cost carriers now offer
uptime at a rate of 99.99%.
RU
8. Consistent cost
9. Improved security
ACTIVITY - 03
RB
The Linux File System is a structured collection of files on a disk drive or a
partition. It is used for data management, and the partition contains specific
data. The purpose behind systematic data storage is that it can quickly access
files. It manages all the information, including file size, creation date, file
name, etc.
Ext2
RU
The individual file size that Ext2 supports is 2TB and can be from 4TB to 32
TB depending upon block size.
Pros
● It supports a maximum file size of 4TB
● The maximum file name length is 255 bytes characters.
● It can track the state of the file system.
Cons
● Includes a waste block size
● No file journaling
Ext3
Ext3 refers to the third extended file system. This file journaling system is
used on multiple Linux distributions.
It can track all the changes made with Ext3 to improve reliability and reduce
possible file system corruption.
In addition, it allows you to upgrade from Ext2 without the need to back up
and restore data.
RB
Ext2 and Ext3 use e2fsprogs as a standard utility. It makes the conversation
between both the file systems easier and smooth.
Ext3 is designed with new features such as journal, online file system growth,
and HTree indexing large directories.
Ext3 used less CPU power as compared to other Linux file systems. It is
TH
relatively safer and can easily recover data.
Pros
● The filename supports all characters except NULL and '/.'
RU
atomic
Cons
● Lacks basic features to extend, dynamic, allocation, inode, and block
sub-allocation
● Hard to recover deleted files
● Write a journal on a storage device with an extra cache.
● Gives no snapshot support
What's the Difference Between Ext 2 and Ext 3
RB
Default inode size 128 bytes 128 bytes
Defragmentation No No
TH
Directory Indexing Disabled Disabled
In-core
Preallocation No
reservation
Delayed Allocation No No
AM
2. Discuss the file- mount and unmount system calls
In an operating system, mount and unmount system calls are used to attach
and detach file systems respectively.
Mount
RB
system to a specific directory in the file hierarchy.
For example, if a user wants to mount a USB flash drive to the /mnt directory,
they would use the following command:
bash
TH
mount /dev/sdb1 /mnt
In this command, /dev/sdb1 is the device file for the USB flash drive and /mnt
is the directory where the file system will be mounted. Once the file system is
mounted, the user can access its files and directories using the /mnt directory.
RU
Unmount
Unmounting a file system is the process of detaching it from the file hierarchy
and making it inaccessible to the operating system and applications. This is an
AM
important step before removing the storage device, as it ensures that all
changes to the file system have been saved and that there are no open files
or processes accessing it.
For example, if a user wants to unmount the USB flash drive mounted on the
/mnt directory, they would use the following command:
bash
umount /mnt
In this command, /mnt is the directory where the file system is mounted. Once
the file system is unmounted, the user can safely remove the USB flash drive
from the system.