5.File Management
5.File Management
5 :K File Management
J,~:'i'l~~·Mj•iH~,,L_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ _
Overview, File Organization and Access, File Directories, File Sharing
5.1 Overview
:J Every application needs to access and store the information. During execution, process can keeps th e information
in its address space.
:J This address space to store information is sufficient for some type of applications but not for others, which
requires huge size of information.
:J After finishing the execution, process terminates and information also vanishes.
::i For many applications, it is required that information should be retained forever.
:::i Even though computer crashes or process is killed, still information should remain retained. Most of the time, th e
information is sharable among many processes.
:J If information kept in the address space of one process, other processes will not be able to access it.
::i Following are the necessities for long term information storage.
0 The information should not loss after termination of the process using it.
0 Several processes must be able to access the information simultaneously.
0 In order to fulfill the above requirements, it is necessary to store 1·nformat·10n on d'1s ks an d ot h er secon d ary storage
in units called files.
0 It also can write new information into the file if n d d Aft . h uld
. . ee e · er process termination, information in file 5 0
remam retamed and should not vanish. A file should on) . ating
Y vamsh when its holder clearly removes it. Oper
system manages the files.
J The rules for file namin g are not same for all system
s. It varies from system to system , but all curren t operat ina 0
html
glf Comp uServ e Graph ical Interc hange Forma t image
We b page
___ ___ ___ ___ ___ __
I
:..:.e=-:n:.:..t::____ _ _ _ _ _ _ __ _ _ _ _ _ _
r - -- - +d:..o:.:c=-::u:..:.m 1
r _ _ _ _ _ _ _ _ _ _ _ _ ___!I
_ _ _ _~ O_b_j_ec_
r o_b..:_i':...:o:___ _~ c:::o:m~p~li.:::.e:d_.:.:ma:=.:c:..:.h:..:.in:..:.e_la_n..::.gu:__a=.ge_n_o_t_li _nke_d_ _
= te=-m_a_c_h_in_e_Ia_n_gua __m_ _ _ _r E_x_e_cu_ta_b_l_e_ _ _ _ _ _ _ _ _ _ _ _
__g_e_p_r_ogra
_JI
t- ex_.e..:_, n:, :co:m
b•:.::·
-=- : _~ R:e::a:.:d'!..y.....:to=....:e:x~e:.::cu
Text
txt, doc I Text, docum ent, data
. _:_r~o:u~ti,:.:n.:e:.s..:fo ra m_m
ro...::g::..___
._=._:r_ 'p.....- _ er_s_ _ _ _ _ _ L:--i_ _ _ _ _ _ _ _ _ _ _ _ _ _ _J
b~ra_ry
,_::_lib b~ra~n..'.·=es~o~f
:_::,_:a'.,'._d~l'.'l.__ _l_'.L~i~ 1
Group ed flies togeth e r so me ti me compr essed for Arch ive
Th e Pi~!• 5.2.l shows the three ways in which files can be structured.
3. Tree Structure
o Each record has its internal structu re. r\n~• 1'\'.Jd opcr.1uon on Ole n-tums one record and write operation will
append or overwrite one record.
o When pu11chcd cards wcrr in usr. re-rord sttl' ins of 80 charaners and oi 132 characte rs proposed for line
printers.
o Many operating systems based th eir fi le systems on files rons tsnng or SO-character records when punched cards
were in use.
a Progra ms read input from file in the unit orso characters and wrote in units of 132 chara cters keeping remai ning
52 characters blank.
3. Tree structure
D In this organization, a file consists of the records which are organ ized in rree strucrure.
D All the records not necessarily have same length. Each record has a key field in a fixed position.
0 The records in the tree are arranoed in the sorted O rd f k fi I · -
key. b er o ey e d, to perm it quick searching for a particular
us 11 n,o 11 9
(<) y,._
r""V SU
Disadvantage of supporting multiple file struct\J,.,
a If 11111ltlplc Ille st ruct 111'1'.S .m.· ,uppt1r11'd by 1i1r ol)t'rlttnii ))">tc-m thc-tt 11 ,, \MJ.ld I>\· hugt- 1n s11.-e.
O For supporting th r rl1lkrt•111 file , trurture~ 11, .. ro N\")J)t)lldlng rode ~,()Uld 1ho prt-ll'ot 111 opera ting ,ystcm.
U Atld lt, on:illy, 11 ls rcq111r1'<1 ll1 d1•lin1• t'l'cry fil r 1, oper111ng system ,uppon~ ror one of die Ille cy 1, e.
a If 01wr.111 11i; system docs not support dw srru('(uf'f' ol mtonnauon nt-<:Ot'd b)' apphntton t11en 11 ca n lead to severe
pro bkms.
o Opi'l'.ttln~ systcms like UNIX. MS-DOS enlol"C't' and suppon file strunures wturh are leasl tn numbers .
O UNIX tre:1ts L'.trh i11e :i~ :i scqurn("(' 01 8-bll bytes and operaong s;-st.em does not carry out die understanding of
thr,c bits.
a As a rt'sul t of this appro:irh. m1x1mum flexib1hry but hrde suppon IS offered.
0 In order to interprN an mpu t file to the suitable stn1crure. applicaaon should have tnd uded its own c.ode.
0 On the other hand. all opera ting systems must suppor1 m1mmum one StruCTUre of an executable file.
. support the svstem
a Dlit' to th 1s , will be capable of loadmg aod runrung the programs.
llr,u11l11r hf11·, _J
;, IJlf P.<.i<,llt1• _J
:J ~ 11c.11J r t.(1',<,11JI f,1t,,. J
4 BlrJ(.I\ \, (>'JC.IF/ I trw _J
Fig. S.2.J : FIie typet
l. Regular flies
rd s1-nu1-nce ,3nd tT~ ~tr, <;t..t.r~ ~/..;,✓• - ~ ~-,,,, .
Regular files contain user information, The byte sequ ence, reco .,.., ~ - -
2. Dlrectories
These are system files for maintaining the structure of the file syst.em-
Character sped.al fil es are related to input/output and used to model serial f/0 d.e-lices ._.. r\ ~ ~--:-,: -~ :
pn nters, and networks.
:J All regular files are normally either ASCII files or binary files.
:J ASCII fil es contain li nes of text Each line is terminated by either carriage rerum character o~ •;.,"' :::ec -"-:c-~
MS-DOS uses both types of fi les. Lines can be of different length.
:J The great benefit of ASCII files is that they can be displayed and printed as they are.
:J Any text editor can edit ASCII file. Furthermore, if large numbers of programs use ASO I files for tnp~: ,;,-✓ .:--:-_:
it is easy to connea the output of one program to the input of another, as in shell pipelines. Bi.nzr:,· :._-=$ 2"= :..::
ASCII files.
:J Listing them on the printer gives listing which is beyond the und ersr.anding, le gives the ranrlo~ ga_~? .:
.i~U:d on the printer. Usually, they have some internal scrucrure known co programs that use chem..
-:J l,! '., fX bina ry file Is an arch ive. It rnnsists of a collection of library procedures compiled bm oo: ....::'.~ :-~~
. . ~dulnts~ of flit types can be understood from the T0PS-20 operating system.
:J Ti~t rccompil.acion of sou re<:: file will be carried ouc automatically after its modificaaon.
:; l r.,!; reu.1mp1laoon i5. d<;nt 1( U!tr wan ts to execute rhe object file. It guarantees that th e U5rr all ~c u:::e r-"l>.?..:
JP·", •datJ: vh/t:ct fl it. ft savts the waste of ti me in execun ng the old object fil e.
J Tu i:s~h it ve: ct11~ auwm;ic1c re:wmprlaaon of modified source file, the operaung system musr h_;n•e me e3pa'::: - ~·- ::
malrx a drstincw,n bt:cwte:n !><,urc.e file and ohj ect file.
Y• ,.r~I 'I
5-6 11,·1c Mana/lp (ll:n t
) .
. system (Mu
operating
time and time at whlc:h Ole was lautly modlfi c•d• 1" order v, c:11,1ri •,,:
Id be able to check file creation . .
of the rw urcc rmw,.,r·,,m.
150 OS shoU iler OS must also have a ability to determine the language
CJ A
the right comp ,
utable binary file.
. demonstrates the UNIX version of exec
2
Cl f ,g. 5. .
4 nno t r·x,-c uu·- th'•
a prop er format operating system ca · ·• 1 , 11
, ':.
. file is 1·ust a sequence of bytes, without bol t;J hl c.
!thou gh t I11s cation bi ts, and sym
head er, text, data, relo
Cl A . d' •ded into five segments. These are
The file is 1v1 utable fll c.
It recognizes the type of fil e as an exec
. fi . t field in header is magic number.
Cl Thevery 11 s fo rma t
.. to prevent the unintentional
execution of a fil e which is not in this
J It facilitates e various sect ion size-;, tht
ber the size s of the different sect ions of the file are shown . After thes
. num , .
After mag ic some flag bits are pres ent
J t whic h exec utio n star ts, and
address a memory and relocate d
er are the text and data of the program itself. These are load ed into
. the head
J follo wmg e is used for .debugging.
. the relocation bits. The symbol tabl
using
Magic Number
Text Size
Data Size Header
BSS Size
Symbol Table Size
Entry Point
Flags
Text
Data
Relocation Bits
Sym bol Table
Meaning
Attributes
g, and so on.
who can do reading, writing, executin
Protection Access-control information determines
Size The current size of the file
support different types of files.
Type Information is needed for systems that
·~
v Operating System (MU)
Attributes
Meaning
o;;
--
l'l lc M;,11;1v,,:rr,,.nt
Owner
Password
Current owner of the file
Hidden flag
This unique number whi ch identifi es the fil e within the file system.
Time of last access Date and time the file was last accessed
Time of last change Date and time the file has last changed
□ Files are used to store informatio n which can be used later on. For storage and retrieval purpose,
different types
of systems offer different operations .
::J For the operations like create, write, read, reposition, operating system offer the system calls. The
majority of
common system calls relating to files are listed in Fig. 5.2.5.
Common system calls
relating to files
1. Create
2. Delete
3. Open
4 . Close
5. Read
6. Write
?. Append
8. Seek
11 . Rename
oelett>
when IL Is r1C1 lu11 ger req uir ed,
' th e dis k spa ce t1 ccu pl cd hy Ille
File nr-ed tn be deleted to 1-cleas<
: , . Read
specifies the name of the file.
:i Thes~rstem call that is used for reading a file
in read pointe r at the
from the cur ren t position. The system should mainta
J ~en eraJly, the bytes are fetched
t read is to begin.
aC:cress in the file from where nex
fer to put them in.
st sta te the am oun t of dat a desired and must also offer a buf
J :he call er mu
6. Wri te
and info rmation to be written to the file.
J System caU to write the
data in to file specify file name
the file. In
exi sting file size will increase if writing starts from end of
J in at the current position. The
Writing is aga
:!11s case, the current positio
n is at the end of file.
data will be
ew her e in the middle of the file , the previously existed
J Cin rhe contrary, if writing
is done at som
nently.
'JVerwritten and van ished perma
i. Append
number
of the fil e. Systems offering less
of app end sys tem call ; dat a gets append ed only to the end
Wi th the help
provide app end.
of system calls do not generally
a. Seek
lar loca tion in th e fil e.
The seek sys tem call is use d to place the poin ter at a particu
J
has comple ted, da ta
les to spe cify from wh ere to obta in the data. After this call
:J ft is nee ded for random
access fi
tten to, tha t pos itio n.
can be read from, or wri
9
· Get attributes
•
ir des ignated wo rk Get attributes sys tem call IS
d fi le attr ibutes to com ple te the
Proc esses frequently need to rea
Used for this purpose.
• T1chk110111l1dte
I o II!.
p I.I U I l C ,J t
File Managernent
-4,;;
5-9
V• Operating System (MU )
'bl
10. Set attr ibu tes ••111 tem call mak es that pos s, e.
. f fil e afte r Its crea tio n. I s sys
es 0
Use r can cha nge the som e attr ibut
.
11. Rename , . . II makes that pos sibl e
existing hie. 1 his syst em ca
Use r needs to change th e nam e of an
______ _ _ _ _ _ _ _ _ _ _ __
~S~.3~ ~Fi~le:_O~rg~a~n~iz~a~t~io~n~ an~d~A~c~ce!:s~s'.___ _
1. Sequential access
s for files
Fig. S.3.1 : Different access met hod
-~ Techlu tolllled ft
V l11 i! l dHi
Pu1J
p
5-10
ii l)p,
.,.-1till'' ~\-s~m [ MUJ
I - <- . File Management
rJ 1_.n1. . han ? rea d n and ,-rrite n. where n is the relative block number. Actual a bso 1ute disk
1, W t'
.
address of the block
is difft>1"t.'nt
access metho ds
3_ other
ess method.
J These' access methods can be built on top of a random-acc
7 r, File Organizations
Five fundamental
organizations of file
I 1. The pile
1. Pile
file
::i It is sim plest form of file organ ization. ln chis file
data is stored in the order of arrival. Each record in this
con1 prises one bu rst of data.
• • TecUnowltdtt
V P1..D l lt J l lon,
e...,_. Operating System (MU) 5- 1 I l'llf' Manriv,cnie,i,
u The idoo behind the pile is simply to coll ect th e moss of datn 0 11d save It.
::J Rerords rn nt~ ln difTere11t or sa me type of llcld!- 111 div erse ord ers. 1-:lu..: h Oeld lndw.Jcs a ncld name In adtll t·lon to a
,·alue.
:i The delimiters impli ritJ~, ~how~ ncld lc11ijth, c•r It Is cxplldtly lnducJcd as a suhn eld, o r recognized a 11 tl cfault frJr
that fiel d ty-p e.
:::i A pile file do es not have any stru cture, so exhaustive searc h Is used to access a ny record.
::J To search record with p.~rti cul ar field ,1 11d value, the sea rch Ins pec ts eac h record In the pllc until t he dc •:! rrd
record is located or the complete file has been searched.
:::i Th e complete file must be searched to locate all records of particular fi eld a nd value.
2. Sequential File
::J It is most commonly used structure and records have a fixed format.
::J Each and every record in the file has same length, with equal number of fixed-length fi elds in a partic ul ar ord er.
:i As the length and location of each field are known, simply the values of fields are required to be stored. Th e fi el d
nam e and each field length are attributes of the file structure.
=i The first field in each record is considered as key field and it is used to identify the record.
:::i As a resul t, the val ues of key in each record are always different. The records are stored in the logical order of
key.
:::i For batch applications these files are more suitable. This file can be organized with no trouble on tape as well as
disk.
:J The sequential file physically can be organized as a linked list. Each physical block contains one or more records.
:J If new record is inserted, a pointer needs to be manipulated only and new records would not occupy a particular
ph ysical block position.
- The in dexed sequential file eliminate drawback of sequential file. Similar to sequential file, records a re orga nized
logica l order of a key field .
..J Th<: nd.e>:ed seq uential file contains index to the file to support random access, and an overflow fil e. The index
rJffers a searchi ng abili ty to reach speedily the required record.
" II owmg
Th<= overflow file is used in orde r that a record in the overflow file is searclled by 10 ,
. a pomter f
rom
,·ts
ancestor record.
In a $Ingle level of ind exing, the ind ex is a sim pl e seq uential fil e I th · ct f' l . •
. . . · n c m ex I e, eac h reco rd co ntains two fi elds.
A key fiel d 1dent1cal to th e key fie ld m the main file, and a pointe r into the main file.
To s earch a pa rti cular fi eld, the index Is searched to locate the larges t k .
. , . . . ey va 1ue th a t 1s equal to or precedes th e
key valu e to be sea rched. l he search carries on 111 th e main file at th e lo .. t' ct .
ca ion e noted by the pomter.
The ind exed sequ entia l file really decreases the time needed to acces 5 _ .
. c1 smgle record, without giving up th e
sequential nat ure of the file .
• T1d1Mno111l1dgi
• 1iv1JII Lfl \ lllU ',
:,- 12 1% i Manaw1ment
·;iting System (M U)
f, aper
e nl c, thr
, . IJ
reco rds uf the main. Ill e arc vl ll ll·cd set jUtn t1a Y untl l ;J p!Jlnter to
. 5eq uentially process ing of com plet •
For · _ . • •
ncccss tn g goes on 111 lhc ovprfl ow
fil e 1111111 a 11 ull Jmln lur 1·',, r,.,am c ,acrr r,·i :J I •Nhlch
:I ,crn ow Ill e 1s loca trd, then '
tlH' o, m ed whe re II left oil
. rcessi ng of the mni n fil e is resu
onic a
The lnde~ed File
filt . Apa rt
4-
inde xed sequ enti al fil e co n sea rch the reco rd buse d on a sing le field ,Jt the:
Th? srqurntial fi le and the rd.
J . ti, iPo key fie ld, they ca nnot sea
rch reco rd usin g other attribu te of reco
!nllll · 't' onr: for tadi
ty and acco mpl ish th e flex ibility, a stru ctur e con ta inin g mul tiple lndexe'l,
T,' ,-r:·come this difl kul
0
J
r.-pe l1f field is req uire d.
ugh their indexes.
J inde xed file, reco rds are accessed only thro
111
in as a mi nimum one index refers
placing of records providing a pointer
J As 3 resu lt, there is now no limit on the
records can be used.
r,1 that record. In add ition , vari able-length
y for each reco rd in the main
used. An exhaustive index holds one entr
J ln ti'1is structure, tvvo kinds of indexes are
r..e.
-1
Fig. 5.4.1
~J TechK110111l1dge
· p ll b I IC ii l j o 11 ':.
V Operating System (MU) 5-13 File Managernent
5.4.l(A) Single-Level Directory Systems
D Single-level directory is the simplest directory structure. In this directory st ructure, one directory
contains all
the files.
□ This single directory is also called as a root directory. Since on early personal computers, only one
user was
working, this system was more general.
· 5.4.2 shows .
F1g. . · • g f'1ve filI es, owned by three different users P Q, and R
0 smgle-level directory system contamm • .
User P has two files, User Q has two files and R has one file in the directory.
Advantages
o It is simple to implement.
□ Locating files become faster as there is only one place to look.
Limitations
□ If single user has huge number of files kept in single directory, it becomes difficult to remembe
r the name of each
file.
o If more than one user keeps the files in a single directory, then different users may give
the same names to their
files, violating the rule of uniqueness of names.
□ Two-level Directory System overcomes the limitations of Single-level directory. In this directory
system, a private
directory is given to each user. When a user refers to a particular file, only his own directory is searched.
□ As different users directories are different, the same name given to the files do not interfere
each other. There is
no problem in giving the same name to the files in different directories.
□ Single user directory have a compulsion of having all files unique name. While creating the
file for particular
user, the operating system makes confirmation about whether another file of that name exists in
the same user's
directory or not. To know this existence of file or not, the OS searches the directory of the user for
which file is to
be created. To delete a file, the operating system has to search only local user directory .
+-- Root directory
~"ls,tages
every user has sep arate directory.
• ~- re ilame collisi on problem as
m each other.
- 13 ~e:>e.id
ent user gets isolated fro
umiration s the
es not all ow access ing
rking on com mo n tas k, then some system do
tive, that is, wo
- :: ::-.c users are co-opera
o'.:Jff :.:ser's files. a
er's directory. To name
st ha ve the ab ility to name a file in another us
J .: so::-,f system, if
permitted, one user mu d the file name.
directory , we mu st giv e both the user name an
pa"Jcllar file uni quely in
a two-level
l computer, it is not
nu mb er of file s. Ev en on a single-user persona
J i! s ,wr satisfacto
ry for users with a large
cor. vtr..: ent
•\r T1ehKnowl111ti
P uo l , l .J ! t011
•,
V
• Operating System (MU) 5-15 File Management
s _ user subdirectory
"'User subdirectory
-userfrle
□
•
As user can create random number of subd1rectones, · · ofiers a commanding structuring
it . . tool for users to
organize their work. This is the reason, nearly all modern file systems are organized m this approach.
Advantage
□ ··
· addition
With a hierarchical directory system, m · fil1 es, users can access the files of other users by
to t h e1r
specifying its pathname.
□ When file system is organized as tree of directories, a file is accessed by specifying the path name. Path names
can be of two types. These are :
It consists of the path from the root directory to the file. The meaning of the path /usr/myfolder/myfile is that,
the root directory contains a subdirectory user, which in turn contains a subdirectory my/older, which contains
the file myjile.
It consists of the path from the current working directory to the file. A user can assign one directory as the
current working directory, in which case all path names not beginning at the root directory are taken relative to
the working directory. If the current working directory is /usr/myfolder, then the file whose absolute path
usr/myfolder/myfile can be referenced simply as myjile.
0 In UNIX operating system the elements of the path are separated by/. In Windows the separator is \. The same
path/usr/myfolder/myfile in UNIX, is specified in Windows as \usr\myfolder\myfile.
►
t' g System (MU) 5-16 File Management
if opera in
working, program always needs a
~ f the first character of path is separato r then path is absolute path. If during
CJ particular file, it should use absolute path to access
that file from any current working directory .
Directory Operations
5,4. 3
from system to system with
To manage the directories, different system calls demonstrate more dissimilarity
for directories, consider the
to system calls for files. In order to give an idea of working of system calls
respec t
ioJlowing examples from UNIX.
Directory operations
1. Create
2. Delete
3. Opendir
4. Closedir
5. Readdir
6. Renam e
7. Link
8. Unlink
3. Opendir : Directory can be read to list all the files from it Directory
should be opened before reading just
opening and reading the file.
4 table space.
· Closedir : After reading completes, a directory should be closed to free up inner
5 one entry in a standar d format
· Readdir: It returns the next entry in an open directory. readdir always returns
irrespective of possible directory structures is being used.
6 y.
' Rename: Directories can be renamed just like files. Rename renames the director
7
· Link: Due to linking, a file appears in more than one directory.
the existing file to the name
Link system call specify an existing file and its path name, and creates a link from
ies.
specified by the path. In this fashion, the same file may come into view in several director
one directory then it is deleted
a. Unlink: Unlink removes the directory entry. If the file being unlinked only exist in
fro111 r·11 e system.
File Mana11oenieht
ri -:t 7 ¾
V Operatin g System (MIi)
File Attributes
A attr ibu tes
C attributes
File
A
8
C
D
bute s
Data structure cont ainin g attri
ea h
Fig. 5.4. 7 : A directory In which c entry just refers to an I-node
~
File 2 entry length
:
File 2 attributes Entry for second file
a b 1, · C . ,/
I X
i
Oth er file ent ries
e
__,. I n V
l..---"
0 _V
n t
X
a..,.. b
y
0 X
i
O the r file nam es
• TecltKno11l1d1e
P VII 11 c ,1 t Io II S
FIio Mnnnr,(l'll
r, ' <Jnt
V Operating System (MU)
5-19
The second approach to deal with variable-length names is to allow directory entries of fixed lc ngrlt anct rnalntr1ln
□ 9
the file names jointly in a heap at the end of the directory as shown In Fig. 5.4. .
□ The drawback discussed above is defeated here. When an entry is removed, th e next fil e e nte red wlll always fl t 1
11
freed space. The management of heap will be the burden here and page faults ca nno t be a void ed as In prcvl<Hl!l
method.
□ All the designs discussed, supports searching of directory sequentially from beginning to end for find ing up the
file name. Sequential search would be inefficient if directories are longer.
Solution to this problem is use of hash table in each directory as hash search is efficie nt compa re to sequential
□
search.
It is necessary to share a file among multiple of users in multiuser system. It needs to deal with two iss ues : th at
are access rights and the management of simultaneous access.
Issues related to file
sharing
1. Access Rights
2. Simultaneous Access
□ The file system should offer a flexible facility for permitting widespread fiI es h anng .
· among multiple users.
□ It is also a responsibility
. . of file system to offer a many alternatives in or d er to control the way of file accessing.
2. Knowledge
• T1thKnawled1e
p ll IJ I / C ,I t IO 11 ~
88
w,ite shot1 note Fila TW •
Q.1 explain various t110 att1ibutos In brief,
Q.2 explain various filo operations In brief,
Q.3 Write short note FIie Access (sequential accell and random
Q.4 Explain different types of file organization,
Q. 5
E>,:p!ain ptle file organization.
Q. 6
=.o.E.-Z. s...~~ential file organization.
Q.1
=.o•; in ·c-o:-'(_:d file organization.
Q, S
Q.E
=-0 -~n :-as--~-= f:e organization.
=-0 ~ j;:=;-;.:-:!. ~::-:.-ctory structures.
s~._~ n• ..,=--- -
- ·· ~.:. •• e,7e:;tory operations .
-::.>::i~
_
-.
-._ .6 -:-----+.
- c--~=-'
.
'~ •,-::;. i..auon of directory · d .
Q.1 2
= ·"..- r-- --- . m eta1I.
Q. 13 =>::J~ :,~ rs.£;;d to file sharing.
Q.1 ~ .:::.... • ,_..,-;:~ a...~ss rights to the f10.
I