A Cached WORM File System
نویسنده
چکیده
This paper describes a general-purpose file system that uses a writeonce-read-many (WORM) optical disk accessed via a magnetic disk cache. The cache enables blocks to be modified multiple times before they are written to the WORM and increases performance. Snapshots of the file system can be made at any time without limiting the users’ access to files. These snapshots reside entirely on the WORM, are accessible to the user via a second read-only file system, do not contain multiple copies of unchanged data, and can be used to rebuild the file system in the event that the disk cache is destroyed. The file system has been implemented as part of Plan 9, an experimental operating system under development at AT&T Bell Laboratories.
منابع مشابه
A Fast File System for Caching Web Objects
Given the increasing performance of network connections and the slow nature of disk drives, the authors propose a new file system for web proxy servers that cache files on a local disk. This file system, referred to as the cache file system (CFS), utilizes the facts that cached web pages do not change in size once they are cached, do not have changing permissions, and do have a back-up version ...
متن کاملNovel Approach for the propagation and detection of active worm in a Virtual System
Active worms are one of the major security threats to the Internet. This is because of their ability to propagate in an automated fashion as they continuously compromise computers on the Internet. Camouflaging Worm (C-Worm in short) is one of the active worms. The C-Worm is different from traditional worms because they can camouflage (hide) itself from the detection schemes by manipulating thei...
متن کاملA Case study in Model Checking Software Systems
Model checking is a proven successful technology for verifying hardware. It works, however, on only finite state machines, and most software systems have infinitely many states. Our approach to applying model checking to software hinges on identifying appropriate abstractions that exploit the nature of both the system, S, and the property, 4, to be verified. We check on an abstracted, but finit...
متن کاملFile System-Based Data Protection Approach
As data to be stored in storage subsystems tremendously increases, data protection techniques have become more important than ever, to provide data availability and reliability. In this paper, we present the file system-based data protection (WOWSnap) that has been implemented using WORM (Write-Once-Read-Many) scheme. In the WOWSnap, once WORM files have been created, only the privileged read r...
متن کاملFile System-Based Data Protection Approach
As data to be stored in storage subsystems tremendously increases, data protection techniques have become more important than ever, to provide data availability and reliability. In this paper, we present the file system-based data protection (WOWSnap) that has been implemented using WORM (Write-Once-Read-Many) scheme. In the WOWSnap, once WORM files have been created, only the privileged read r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Softw., Pract. Exper.
دوره 21 شماره
صفحات -
تاریخ انتشار 1991