A Critical Comparison Of NTFS And EXT4 File Systems

Common features of NTFS and EXT4

A file system refers to the different methods as well as the structures of data that are used by the operating system in order to monitor the files and keep a track of the data on a disk partition. It defines the way in which the data and the files a restored on a disk partition[1]. A file system can also be defined as the partition or a disk that is required to store the files of a particular file system. In every organizations, the system administrators make use of a proper file system in order to store the important organizational data and files[2], which are properly categorized and stored in folders within the servers and the workstations. Using a proper file system just not stores the file sin a systematic manner but also ensures data security within the organizations. New files can also be as as well as deleted from the databases based on the requirements.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

There are different kinds of file systems that exist in computer engineering. The two most widely used technologies are NTFS and EXT 4, which are mainly used in the organizations. The following report will highlight the different features of these two technologies and will compare and contrast between the two. The different aspects such as the advantages, disadvantages, compatibility as well as the efficiency will be discussed in the following paragraphs. The different network protocols will also be discussed which are compatible with these two technologies. By the end of the report, the reader will have a clear understanding of the features of these two technologies and will clearly able to define technologies in details.

There are many common features of both the technologies. Some of the common features are explained below in the below mentioned points:

  • Disk Quota: This feature is supported by both the technologies.
  • Both the technologies perform complex file tasks such as file operations such as read and write, file search as well as recovery if the files have been accidentally deleted from the system.
  • File defragmentation as well as encryption is also performed in both the file systems to ensure optimum data security within the organizations[3].
  • Both the systems have comparable performance since features like multiblock allocation are supported by both wherein multiple blocks of data can be assigned on a single call in the folders.

This section will provide a comparative study of the two technologies and explain the features supported by them. The advantages as well as the disadvantages can be understood and a recommendation will be provided regarding the preference of one technology over the other for any given scenario[4].

In the NTFS or new technology file system, standard tasks related to file operation such as file read and write, as well as advanced search operation using sorting techniques that run in the background, file recovery once they have been accidentally deleted form hard drives etc. are performed. NTFS partitioning can help in the creation of different kinds of system files that are extremely important for the proper storage and file related tasks to be performed properly. Some of the system files that are generated are listed below:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • $MFT
  • Master File Table
  • The $Bitmap
  • The $LogFile file

The Boot Sector Partition which is the $Boot metadata file is the primary information that is stored on the NTFS volume in the disk drive that starts at the sector 0. It can have a length of 16 sectors. The File System in the encrypted format or the EFS provideed technology for encryption of the core file that the NTFS volumes use to store the different files. Disk quotas are supported by Windows 2000 for the NTFS volumes[5].

Comparison between the two technologies

NTFS uses a framework known as the Distributed Link Tracking that helps in provides a service for link tracking that helps in maintaining the file shortcuts integrity including the OLE links within documents of different types. The NTFS file system is compatible with all the versions of windows as well as the modern MAC operating system versions. However, for Linux platforms it may need additional software’s in order to work properly[7].

New objects of file system within the NTFS partition can be applied to NTFS files as well as folders, which are known as reparse points. According to the reparse points, the volume mount point (VMP) allows the concerned authorities to allow access to a local file volume root onto the structure of the folder in another volume, making it quite efficient. Sparse Files can help in creating files of large size but only the required disk space is consumed. [6].

  • For single workstations, NTFS is a good choice of file system since it is capable of doing the advanced file operations such as reading of new data much quickly and efficiently to the databases. However, in networked architectures, which involve more number of computers that are shared in the network, sometimes it can be a problem since it can cause the data to be transmitted slowly. It can also cause lagging issues within the network. This is because NTFS is an old type of data files wherein the system files that are created such as $MFT and Master File Table are not compatible with the newer network technologies[8].

The most widely used Linux file system which is EXT3 has been further developed and EXT4 is its improved version. It has much better and reliable features and more efficieny in the important task operations that can be done[9].

The EXT4 file system uses addressing in 48-bit block, so it will be able to achieve the maximum size of file system of  16 TB which is remarkable. 1 EB is equal to 1,048,576 TB. The EXT4 is not compatible with 64-bit operating systems and it has some limitations in this regards that has to be fixed before fully incorporating this file system. 64-bit operating systems will also be supported in the future and this file system has that provision. Sub directory limits of scalability has also been extended in a file system wherein unlimited number of directories can be added in order to ensure a better performance[11].

Ext4 allows an infinite number of divided directories to be added in the future thereby expanding its scalability to a very large extent[10]. Extents are also used in the file operations, which are, bunches of physical blocks that are contiguous in nature. For instance, a file that has around 100 MB size can be assigned to an extent instead of having to create an indirect mapping to 25600 separate blocks (1 block is equal to 4 KB).

Huge files are split in several extents are used in order to split files of large sizes. Performance improvements are achieved by extents, which in turn helps to reduce the fragmentation, since it allows continuous layouts on the disk. This file system is considered very efficient since it has an advantage of having different ways of allocation of the blocks. They are explained below:

  • Multiblock allocation: A “multiblock allocator” or mballoc is used which helps in allocating multiple blocks in one single call. It eliminates the need to allocate one block per call individually thereby helping to avoid the excessive overload. It ensures improved efficiency instead of allowing a single block per individual call [12].
  • Delayed allocation: Unlike the traditional file systems [13] it does block allocation as soon as possible. For instance the meaning of write()s in a process means immediate block allocation for data placement even if presently no data is being written on the disk. It stores that data temporarily on the cache memory for some time before deleing to completely.
  • Fast fsck: Again, this is a slow of the EXT4 operation in which all inodes of the file system are properly checked and at each group’s end the inode table stores the names of the unused inodes which is for the check some or the safety of the data in the table[14]. However, fsck will not be checking the unused inodes in the table. The resulting fsck time improves around 20 times than its original value depending on the number of inodes that were actually used in the system.

Journal checksumming is a process, which makes use of the journal which is the most used parameter in this process, thereby causing the blocks to be more prone to different kinds of hardware failures. Recovering corrupted journals can cause massive corruption of data making the blocks that form part of it more prone to hardware failure. EXT4 can help to determine if the files are failing or they are being corrupted[15]. Tis is turn causes it to be compatible with the different operating systems such as Windows as well as the modern MAC operating systems which supports the different system files that are generated in the process. Online defragmentation is again another important function of this file process in which there are different advantages such as delayed allocation, allocation of extents as well as multiblocks that helps in reducing fragmentation. A tool called the e4defrag tool is used for online defragmentation for individual files or even the whole system can be defragmented. This again helps in a better compatibility of the files in the file system.

NTFS

Inode-related features: Larger sized inodes that are timestamps in the frame of nanosecond, faster and extended parameters, inodes reservation. The default size of EXT$ is 256 bytes[16]. In this some extra fields need to be accommodated, while the remaining inode space stores extended attributes to fit in the remaining space. Inode reservation consists in reserving several inodes when a directory is created, expecting that they will be used in the future [17].

Persistent pre allocation In the latest versions of kernel, emulated by the for file systems that do not support it, allows disk space pre allocation: Spaces are pre allocated by the different applications in which necessary blocks are pre allocated but no data is available for use until an application really needs it [18].

Barriers on by default: The file system integrity is improved by the application of different kinds of performance costs as it can be disabled from mount -o to barrier = 0, and it is recommended to improve the overall efficiency as well as the performance of the system. This will improve an overall improvement of the systems.

The local file supporting system of ETX4 primarily improves the storage capacity, the overall performance and capacity. In ETX4, data allocation is changed to extents from the fixed blocks.  An extent is described as a long file that is contagious in a single in code pointer entry; this will help in reducing of the number of pointers that is used to describe the location of the data in larger files. The allocation methods as well as strategies have been implemented to reduce any further fragmentation in the system. It reduces the scattering of the files that are recently created.  The file algorithms of the file allocation try to spread the files among the cylinder groups to reduce latency of the files as much as possible. The file that has been used in the ext4 are kernel version 2.6.28. The ext4 as a stopgap technology, which help in the organization of the files. It uses 48 bit internal addressing that could allocate the 16-tb file system.

The network has unlimited subdirectories to store information. The ext4 uses Tree indices to mitigate performance loss. The enterprise network of ext4 had a reluctant superblocks and check sum of the data that figure out for the whether superblock of the file system is corrupt and do they have an alternative. The enterprise file system figure out whether a file system using an   alternate system. The enterprise network have large allocation and it increase the slack space of the networks. Etx4 is a stable file system that always provide an alternative for the kernel modules, grub config and Dkms from a chroot, the file systems provide enough data bits extending the better time stamps to nanoseconds. The etx4 uses e4defrag an online kernel mode, file system aware and extent level defragmentation utility[19].

  • SMB Protocol: The SMB protocol or the Server Message Block is a protocol of the Microsoft Windows which is used for the folder sharing, serial ports and printer sharing purpose. The present version of the Server Message Block is the SMBv2. This version of the Server Message Block was introduced with the Windows Vista. After launching with the Windows Vista it has gone through lots of changes and under the operating system of Windows 7.

The Server Message Block is a type network file sharing protocol. Though this is now under the Microsoft Windows but it was originally developed by the IBM. Microsoft helped to improve this protocol in the year of 1990. After that it becomes a Windows based network protocol which is now used for modifying and deleting shared file and folders over the network. The SMB works in the application layer protocol[20]. On the successful deployment of the SMB it works on the via the TCP port. In the TCP port the SMB uses the port no 445 to communicate with the other devices. The SMB gathered much popularity in the field of the file sharing over the network because it was providing much more flexibility when it was compared with the file transfer protocol or the FTP. In the case of the Linux environment system the Server Message Block uses a program named Samba which allows this Linux system to communicate via the Server Message Block[22].

  • CIFS Protocol: The CIFS Protocol is also known as the Common Internet File System which is also a type of file sharing protocol. This Common Internet File System protocol is able to provide a cross and open platform mechanism which is used for the requesting services and files over the network environment. The CIFS or the Common Internet File System is an improved version of the Server Message Block of the Microsoft which is also used for intranet and internet file sharing purposes[23].

Performance

The Common Internet File System protocol is much more advanced from its previous predecessor because it is able to provide broad range of features, which includes the internet authoring and the file sharing methods. As this is an advanced file sharing method this method is used in the server OS and in the heavy operating system. The CIFS has also an embedded application system into it which assists the CIFS in the network file sharing. The popular storage products like the NAS and SAN are based on the CIFS. The CIFS protocol also features the file access, file change modification, protocol version negotiation, batched requests, file and record locking and some extended attributes. In the extended attributes it supports various types addition of the non-file system attributes which includes the content and the description of the file. By providing the file and record locking this CIFS protocol can lock the files from the unauthorised access. The file change notification can help to notify the administrator when changes in the file occurs in the server.

The new technology file system (NTFS) uses various types mechanisms to store the files in hard drive using the Common Internet File System protocol. This NTFS file system has major improvements when considering with the FAT and HPFS for data security and in the file saving process[24]. While saving data from an EXT4 file system this NTFS file system uses the b-tree dictionary. This b-tree dictionary helps in the case of file saving by keeping the track of the file clusters. When the file is saved from an EXT4 extension to the NTFS extension this information about all of the data is stored in the file’s cluster and the other types of data are stored on the each of the clusters. Therefore an ACL or the access control list is developed. This ACL or the access control list is used in the case of the administrator control over some specific files which are required while saving the file. While saving the data from an EXT4 file system, the optimization of the files is very much required. For optimizing the files, integrated file compression method is used while saving the files. The cluster of the NTFS file system has a big role while saving the file from an EXT4 storage, which is kind of a remote file system [25]. The cluster size is the trade-off, which is required to efficiently use the disk space while using the file system for data saving purpose. It is very much important to keep record each of every file when a file is saved in any type of file system. For this reason while the data is saved from a remote machine, which uses the EXT4 storage a special file, is created. This file is known as the Master File Table. This is a type of record file which is used for the tacking the record used to locate the files which are possibly in the scattered clusters. The NTFS file system find contagious storage space for the file saving purpose, which can hold the entire file.

Compatibility

The integration of the CIFS is required for saving the files remotely from an EXT4 file system to a NTFS file system. This is the primary protocol used for remote file sharing. For saving the file in a NTFS file system remotely, the CIFS or the Common Internet File Service uses the TCP and the UDP ports to communicate. In the case of the TCP ports, this uses the port no of 139 and the port no 445[26]. The UDP ports uses the port no of 137 and the 138 for remotely communicating and saving the file to a NTFS file system from a EXT4 file system remotely. The NTFS file system receives and sends data using these mentioned ports to save the files. The NTFS file system also makes some outbound connections, which are for the Kerberos and DNS to save the files successfully.

References

[1] Chajed, Tej, et al. “Certifying a file system using crash hoare logic: correctness in the presence of crashes.” Communications of the ACM 60.4 (2017): 75-84.

[2]Bornholt, James, et al. “Specifying and checking file system crash-consistency models.” ACM SIGARCH Computer Architecture News. Vol. 44. No. 2. ACM, 2016.

[3]Lu, Lanyue, et al. “A study of Linux file system evolution.” ACM Transactions on Storage (TOS) 10.1 (2014): 3.

[4]Amani, Sidney, and Toby Murray. “Specifying a realistic file system.” arXiv preprint arXiv:1511.04169 (2015).

[5]Kao, Da-Yu, and Yuan-Pei Chan. “Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics.” International Conference on Security with Intelligent Computing and Big-data Services. Springer, Cham, 2017.

][6]Cho, Gyu-Sang. “NTFS Directory Index Analysis for Computer Forensics.” Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on. IEEE, 2015.

[7] Cho, Gyu-Sang. “NTFS Directory Index Analysis for Computer Forensics.” Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2015 9th International Conference on. IEEE, 2015.

[8] Kantert, Jan, et al. “Combining trust and ETX to provide robust wireless sensor networks.” ARCS 2016; 29th International Conference on Architecture of Computing Systems; Proceedings of. VDE, 2016.

[9] Kantert, Jan, et al. “Combining trust and ETX to provide robust wireless sensor networks.” ARCS 2016; 29th International Conference on Architecture of Computing Systems; Proceedings of. VDE, 2016.

[10] Sanmartin, Paul, et al. “Sigma Routing Metric for RPL Protocol.” Sensors 18.4 (2018): 1277.

[11] Rezaee, Morteza, and Amir Reza Attari. “A Compact Substrate Integrated Waveguide Diplexer Using Dual Mode Resonator as a Junction for System in Package Applications.” Electromagnetics 37.2 (2017): 92-105.

[12] Chen, Wei-Peng, and Chuan-Ming Liu. “Performance Comparison on the Heterogeneous File System in Cloud Storage Systems.” Computer and Information Technology (CIT), 2016 IEEE International Conference on. IEEE, 2016.

[13]Dewald, Andreas, and Sabine Seufert. “AFEIC: Advanced forensic Ext4 inode carving.” Digital Investigation 20 (2017): S83-S91.

[14] Aghayev, Abutalib, et al. “Evolving Ext4 for Shingled Disks.” FAST. 2017.

[15]Pesic, Dj, B. Djordjevic, and V. Timcenko. “Competition of virtualized ext4, xfs and btrfs filesystems under type-2 hypervisor.” Telecommunications Forum (TELFOR), 2016 24th. IEEE, 2016.

[16] Sha, Edwin H-M., et al. “The Design and Implementation of a High-Performance Hybrid Memory File System.” Advanced Cloud and Big Data (CBD), 2016 International Conference on. IEEE, 2016.

[17] Gao, Yuanzhao, and Binglong Li. “A forensic method for efficient file extraction in HDFS based on three-level mapping.” Wuhan University Journal of Natural Sciences 22.2 (2017): 114-126.

[18] Boie, Andrew. “Android* Software Updates.” Embedded Linux Conference. 2015.

[19] Joyce, Russell Andrew, and Neil Cameron Audsley. “Improving efficiency of persistent storage access in embedded Linux.” 10th York Doctoral Symposium on Computer Science and Electronic Engineering. York, 2017.

[20] Roch, Loïc M., et al. “Performance analysis of open?source distributed file systems for practical large?scale molecular ab initio, density functional theory, and GW+ BSE calculations.” International Journal of Quantum Chemistry 118.1 (2018): e25392.

[21] Tierney, Brian, et al. “The NetLogger methodology for high performance distributed systems performance analysis.” High Performance Distributed Computing, 1998. Proceedings. The Seventh International Symposium on. IEEE, 1998.

[22] Djordjevic, Borislav, and Valentina Timcenko. “Ext4 file system in linux environment: Features and performance analysis.” International Journal of Computers 1.6 (2012): 2012.

[23] Lastovetsky, Alexey, and Ravi Reddy. “On performance analysis of heterogeneous parallel algorithms.” Parallel Computing 30.11 (2004): 1195-1216.

[24] Cohen, Ira, et al. “Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control.” OSDI. Vol. 4. 2004.

[25] Gelberger, Alexander, Niv Yemini, and Ran Giladi. “Performance analysis of software-defined networking (SDN).” Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2013 IEEE 21st International Symposium on. IEEE, 2013.

[26] Gelberger, Alexander, Niv Yemini, and Ran Giladi. “Performance analysis of software-defined networking (SDN).” Modeling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS), 2013 IEEE 21st International Symposium on. IEEE, 2013.