VERITAS Software Corporation

ثبت نشده
چکیده

VERITAS, t h e VERITAS logo , VxFS, VxVM, Fi rstWat ch and VERITAS Fi rstWat ch are regi s t e re d trademark s o f VERITAS Softwa re Corporat i o n. VxServerSuite and VxSmartSync are t rademarks of VERITAS Softwa re Corporation. Other product names mentioned herein may be trademarks and/or regi s t e re d trademarks of their respective companies. Overview The VERITAS storage management product line has been designed in response to the needs of commercial computing environments. These are the systems that are now supporting mission critical applications and playing a major role in corporate computing services. Typical environments include online transaction processing systems, networked database servers, and high performance file services. VERITAS specializes in on-line systems storage management technology which encompasses a product line that offers high performance, availability, data integrity, and integrated, online administration. VERITAS provides three complementary products: VERITAS FirstWatch® , VERITAS Volume Manager™, and the VERITAS File System™. The VERITAS File System is a high availability, high performance, commercial grade file system providing features such as transaction based journaling, fast recovery, extent-based allocation, and online administrative operations such as backup, resizing, and defragmentation of the file system. This is the second part in a series of VERITAS White Papers that discuss computer file systems. This second paper provides a discussion of the internals and mechanics of file system performance. General file system performance bottlenecks as well as some industry improvements will be discussed. In this paper we will use a general UNIX file system model for discussion and introduce some general file system performance improvement techniques that exist both in the UNIX marketplace as well as across the entire file system industry. Where applicable we will discuss certain features of the VERITAS File System as they apply to file system performance. Note: The audience for this paper includes systems engineers, administrators and integrators desire a breakdown and explanation of the general internals and mechanics of computer file system performance. For further reading on this subject, consult other VERITAS White Papers, including the File System and VERITAS File System Performance White Papers. These papers discuss general file system mechanics as well as the performance related internals, mechanics, benchmark test results and analysis, of the VERITAS File System.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

VERITAS Software Corporation

VERITAS, t h e VERITAS logo , VxFS, VxVM, Fi rstWat ch and VERITAS Fi rstWat ch are regi s t e re d trademark s o f VERITAS Softwa re Corporat i o n. VxServerSuite and VxSmartSync are t rademarks of VERITAS Softwa re Corporation. Other product names mentioned herein may be trademarks and/or regi s t e re d trademarks of their respective companies. Overview The VERITAS storage management product...

متن کامل

An Informal Publication from Academia’s Premiere Storage Systems Research Center Devoted to Advancing the State of the Art in Storage Systems and Information

EMC Corporation Engenio Information Technologies, Inc. Hewlett-Packard Labs Hitachi, Ltd. Hitachi Global Storage Technologies IBM Corporation Intel Corporation Microsoft Corporation Network Appliance Oracle Corporation Panasas, Inc. Seagate Technology Sun Microsystems Veritas Software Corporation Ursa Major ........................................... 1 Director’s Letter ...........................

متن کامل

Design and implementation of a self-securing storage device

Self-securing storage prevents intruders from undetectably tampering with or permanently deleting stored data. To accomplish this, self-securing storage devices internally audit all requests and keep all versions of all data for a window of time, regardless of the commands received from potentially compromised host operating systems. Within the window, system administrators are guaranteed to ha...

متن کامل

Authentication Confidences

“Over the Internet, no one knows you're a dog,” goes the joke. Yet, in most systems, a password submitted over the Internet gives one the same access rights as one typed at the physical console. We promote an alternate approach to authentication, in which a system fuses observations about a user into a probability (an authentication confidence) that the user is who they claim to be. Relevant ob...

متن کامل

Authentication Confidences (CMU-CS-01-123)

“Over the Internet, no one knows you're a dog,” goes the joke. Yet, in most systems, a password submitted over the Internet gives one the same access rights as one typed at the physical console. We promote an alternate approach to authentication, in which a system fuses observations about a user into a probability (an authentication confidence) that the user is who they claim to be. Relevant ob...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997