The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the era of Big Data, one single directory can contain tens of thousands or even millions of files. Directory update methods employed by traditional POSIX-compliant file systems do not adapt well to wide-area network and could lead to large amount of unnecessary bandwidth consumption due to their full cache invalidation approaches. In traditional file systems, if there is a small fraction of changes...
This paper introduces method for implementing NFS protocol for larger block/network packets transfer over to NAS [Network Attached Storage] from Highly Available clients. NAS storage scalability is habitually inadequate to the volume of the appliance. Addition of an appliance is reasonably easy, but access to the pooled contents as a mono entity is not. In this approach, NAS supports file sharing...
A platform including a set of evaluation tools is designed in this paper aimed at the research of fault tolerance and availability in multi-levels Massive Storage. The platform implements faults injection on network drive level and distribution file system level. Then the evaluation results can be obtained from the analysis results after fault injected. On the network drive level, I/O faults pattern...
Typical NFS clients write in a lazy fashion: they leave dirty pages in the page cache and defer writing to the server until later. This reduces network traffic when applications repeatedly modify the same set of pages. However, this approach can lead to memory pressure, when the number of available pages on the client system is so low that the system must work harder to reclaim dirty pages. System...
Recently the study of network backup server has developed rapidly and its achievements have become a center of attraction. In this paper we focus on I/O subsystem performance analysis for network backup server. The key issue is to analyse the trade-off between direct I/O and buffered I/O mechanism. We investigate how the two mechanisms affect overall performance of network backup server. We designed...
In information society, data is become one of the most important part to company or individual. At the same time, data protection has become urgent. Traditional file protection system-based on data encryption has the inherent defects. It can't prevent man-made data destruction and falsification of data. In this paper, using user space file system and authentication server combined with encryption...
Existing computer systems do not allow the user to access the system when turning off the disk containing the OS for saving energy. Thus existing studies have focused on devising effective disk spin up/down schemes. This paper proposes the scheme to keep on providing limited services as well as to improve the energy consumption in computer system. To do so, we employ the method that moves the root...
Abstract-In order to meet the challenges of significant storage and application growth, as well as shortened backup windows and limited IT resources, more and more organizations embrace Hierarchical Storage Management (HSM). Parts of SAN file systems provide the ability to support HSM, but they didn't provide more details in design considerations and how to implement. In this paper, we present design...
Based on the deep analysis of the VFS mechanism, a hierarchical file system based on embedded Linux is designed and implemented by combining the kernel module and user service application. It provides both the convenient update of the system and the better protection of the read-only system files, which is obviously of great value in commercial purposes.
Engineering and scientific applications usually require to manage large quantities of data with different programs. The I/O demands of these applications get higher as they get larger because processor and memory speed increase. In order to improve performance and make programming much easier these applications can use parallel file systems. The relation between performance and easiness of programming...
Server virtualization is the key technology for data center. It can be used to integrate servers, reduce hardware cost, reduce space and power consumption in data center. Dynamic migration is an important feature of server virtualization technology that makes it possible for a virtual server to migrate from one PC to another at run-time. By using dynamic migration, service interruptions caused by...
The CBSE (Component-Based Software Engineering) promise to provide reusability, maintainability and productivity to embedded systems. Since microkernel architecture guarantee reliable and efficient basis, various systems use microkernel architecture. The combination of CBSE and microkernel can provide more attractive features such like modularity and ease maintainability. However, the use of CBSE...
We have designed and implemented the blue whale file system (BWFS), a scalable distributed file system for large distributed data-intensive applications. With many of the features as previous distributed file systems, BWFS has successfully met our storage needs and is widely deployed within many fields. Although excellent for high-bandwidth access to large files, BWFS's out-of-band data transfer mode...
During the past few years, large, reliable and efficient storage systems have become increasingly important in enterprise environments. Additional requirements for these environments include low installation, maintenance and administration costs. In this paper we propose a hash-based storage approach, combined with block-level operating system semantics. The experimental evaluation confirms that the...
This article gives you a detailed guide for the construction of a Diskless HPC Cluster using Fedora as Operative System. The final purpose of the Cluster is to run both RAMS (Regional Atmospheric Modelling System) and CAMx (Comprehensive Air quality Model with extensions) Numerical Models in a Parallel and/or Grid manner. Themes ranging from CPU Architecture Selection, passing by Operative System...
This paper describes a compact display system with a network interface to receive video signals from a server. This system has been built on a small digital circuit board with an integrated DSP&CPU chip and embedded in our prototype portable projector. The network interface is made detachable by using a network adaptor on a USB port. This architecture makes it highly configurable and easy to change...
By using DTrace tools in Solaris operating system. The behavior of doors IPC which is developed by Sun Microsystems is traced. Discussing with various kinds of Solaris IPCs, this paper mainly tests the Solaris doors in IPC programming. The test results illustrates that the door IPC in OS is thread safety by using core mutual exclusive in system.
The popularity of large scale systems such as Blue Gene has extended their reach beyond HPC into the realm of commercial computing. There is a desire in both communities to broaden the scope of these machines from tightly-coupled scientific applications running on MPI frameworks to more general-purpose workloads. Our approach deals with issues of scale by leveraging the huge number of nodes to distribute...
Computer forensics aimed at determining the relevant causes and effects between the present state of computer system and malicious operation through the measures which could be adopted on the court. This paper proposes an intrusion forensics worked on a WEB server. The forensics system monitor the access to the log files and combine it with the timestamp and other clues in the log file, thus comprehensive...
Distributed file systems that use multiple servers to store data in parallel are becoming commonplace. Much work has already gone into such systems to maximize data throughput. However, metadata management has historically been treated as an afterthought. In previous work we focused on improving metadata management techniques by placing file metadata along with data on object-based storage devices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.