A Versatile and User-Oriented Versioning File System Kiran-Kumar Muniswamy-Reddy, Charles P

Total Page:16

File Type:pdf, Size:1020Kb

A Versatile and User-Oriented Versioning File System Kiran-Kumar Muniswamy-Reddy, Charles P A Versatile and User-Oriented Versioning File System Kiran-Kumar Muniswamy-Reddy, Charles P. Wright, Andrew Himmer, and Erez Zadok Stony Brook University Appears in the proceedings of the Third USENIX Conference on File and Storage Technologies (FAST 2004) Abstract officially recorded in a CVS repository. However, CVS does not work transparently with all applications. File versioning is a useful technique for recording a Another form of versioning is backup tools such as history of changes. Applications of versioning include Legato’s Networker [15] or Veritas’s Backup Exec [27] backups and disaster recovery, as well as monitoring in- and FlashSnap [28]. Modern backup systems include truders’ activities. Alas, modern systems do not include specialized tools for users to browse a history of file an automatic and easy-to-use file versioning system. Ex- changes and to initiate a recovery of file versions. How- isting backup solutions are slow and inflexible for users. ever, backup systems are cumbersome to use, run slowly, Even worse, they often lack backups for the most recent and they do not integrate transparently with all user ap- day’s activities. Online disk snapshotting systems offer plications. Worse, backup periods are usually set to once more fine-grained versioning, but still do not record the a day, so potentially all file changes within the last 24- most recent changes to files. Moreover, existing systems hour period are not backed up. also do not give individual users the flexibility to control Another approach is to integrate versioning into the versioning policies. file system [4, 17, 24, 25]. Developing a native version- We designed a lightweight user-oriented versioning ing file system from scratch is a daunting task and will file system called Versionfs. Versionfs works with any only work for one file system. Instead, we developed file system and provides a host of user-configurable poli- a stackable file system called Versionfs. A stackable cies: versioning by users, groups, processes, or file file system operates at the highest possible layer inside names and extensions; version retention policies and the OS. Versionfs can easily operate on top of any other version storage policies. Versionfs creates file ver- file system and transparently add versioning functional- sions automatically, transparently, and in a file-system ity without modifying existing file system implementa- portable manner—while maintaining Unix semantics. A tions or native on-media structures. Versionfs monitors set of user-level utilities allow administrators to config- relevant file system operations resulting from user ac- ure and enforce default policies: users can set policies tivity, and creates backup files when users modify files. within configured boundaries, as well as view, control, Version files are automatically hidden from users and are and recover files and their versions. We have imple- handled in a Unix-semantics compliant manner. mented the system on Linux. Our performance evalu- To be flexible for users and administrators, Versionfs ation demonstrates overheads that are not noticeable by supports various retention and storage policies. Reten- users under normal workloads. tion policies determine how many versions to keep per file. Storage policies determine how versions are stored. 1 Introduction We define the term version set to mean a given file and Versioning is a technique for recording a history of all of its versions. A user-level dynamic library wrapper changes to files. This history is useful for restoring allows users to operate on a file or its version set without previous versions of files, collecting a log of important modifying existing applications such as ls, rm, or mv. changes over time, or to trace the file system activities Our library makes version recovery as simple as opening of an intruder. Ever since Unix became popular, users an old version with a text editor. All this functionality have desired a versatile and simple versioning file sys- removes the need to modify user applications and gives tem. Simple mistakes such as accidental removal of files users a lot of flexibility to work with versions. (the infamous “rm *” problem) could be ameliorated We developed our system under Linux. Our perfor- on Unix if users could simply execute a single command mance evaluation shows that the overheads are not no- to undo such accidental file deletion. ticeable by users under normal workloads. CVS is one of the most popular versioning tools [2]. The rest of this paper is organized as follows. Sec- CVS allows a group of users to record changes to files in tion 2 surveys background work. Section 3 describes a repository, navigate branches, and recover any version the design of our system. We discuss interesting im- plementation aspects in Section 4. Section 5 evaluates CVFS was designed with security in mind. Each indi- Versionfs’s features, performance, and space utilization. vidual write or small meta-data change (e.g., atime up- We conclude in Section 6 and suggest future directions. dates) are versioned. Since many versions are created, new data structures were designed so that old versions 2 Background can be stored and accessed efficiently. As CVFS was Versioning was provided by some early file systems like designed for security purposes, it does not have facili- the Cedar File System [7] and 3DFS [13]. The main dis- ties for the user to access or customize versioning. advantage of these systems was that they were not com- NTFS version 5, released with Windows 2000, pro- pletely transparent. Users had to create versions manu- vides reparse points. Reparse points allow applications ally by using special tools or commands. CVS [2] is a to enhance the capabilities of the file system without re- user-land tool that is used for source code management. quiring any changes to the file system itself [23]. Several It is also not transparent as users have to execute com- backup products, such as Storeactive’s LiveBackup [26], mands to create and access versions. are built using this feature. These products are specific Snapshotting or check-pointing is another approach to Windows, whereas Versionfs uses stackable templates for versioning, which is common for backup systems. and can be ported to other OSes easily. Periodically a whole or incremental image of a file sys- Clearly, attempts were made to make versioning a part tem is made. The snapshots are available on-line and of the OS. However, modern operating systems still do users can access old versions. Such a system has several not include versioning support. We believe that these drawbacks, the largest one being that changes made be- past attempts were not very successful as they were not tween snapshots can not be undone. Snapshotting sys- convenient or flexible enough for users. tems treat all files equally. This is a disadvantage be- 3 Design cause not all files have the same usage pattern or storage requirements. When space must be recovered, whole We designed Versionfs with the following four goals: snapshots must be purged. Often, managing such snap- Easy-to-use: We designed our system such that a sin- shot systems requires the intervention of the adminis- gle user could easily use it as a personal backup trator. Snapshotting systems include AFS [12], Plan-9 system. This meant that we chose to use per-file [20], WAFL [8], Petal [14], Episode [3], Venti [21], Spi- granularity for versions, because users are less con- ralog [10], a newer 3DFS [22] system, File-Motel [9], cerned with entire file system versioning or block- and Ext3COW [19]. Finally, programs such as rsync, level versioning. Another requirement was that the rdiff, and diff are also used to make efficient incre- interface would be simple. For common operations, mental backups. Versionfs should be completely transparent. Versioning with copy-on-write is another technique Flexibility: While we wanted our system to be easy to that is used by Tops-20 [4], VMS [16], Elephant File use, we also made it flexible by providing the user System [24], and CVFS [25]. Though Tops-20 and VMS with options. The user can select minimums and had automatic versioning of files, they did not handle all maximums for how many versions to store and ad- operations, such as rename, etc. ditionally how to store the versions. The system Elephant is implemented in the FreeBSD 2.2.8 ker- administrator can also enforce default, minimum, nel. Elephant transparently creates a new version of a and maximum policies. file on the first write to an open file. Elephant also pro- Portability: Versionfs provides portable versioning. vides users with four retention policies: keep one, keep The most common operation is to read or write all, keep safe, and keep landmark. Keep one is no ver- from the current version. We implemented Ver- sioning, keep all retains every version of a file, keep safe sionfs as a kernel-level file system so that applica- keeps versions for a specific period of time but does not tions need not be modified for accessing the current retain the long term history of the file, and keep land- version. For previous version access, we use library mark retains only important versions in a file’s history. wrappers, so that the majority of applications do A user can mark a version as a landmark or the system not require any changes. Additionally, no operat- uses heuristics to mark other versions as landmark ver- ing system changes are required for Versionfs. sions. Elephant also provides users with the ability to Efficiency: There are two ways in which we approach register their own space reclamation policies. However, efficiency. First, we need to maximize current ver- Elephant has its own low-level FFS-like disk format and sion performance. Second, we want to use as little cannot be used with other systems.
Recommended publications
  • Online Layered File System (OLFS): a Layered and Versioned Filesystem and Performance Analysis
    Loyola University Chicago Loyola eCommons Computer Science: Faculty Publications and Other Works Faculty Publications 5-2010 Online Layered File System (OLFS): A Layered and Versioned Filesystem and Performance Analysis Joseph P. Kaylor Konstantin Läufer Loyola University Chicago, [email protected] George K. Thiruvathukal Loyola University Chicago, [email protected] Follow this and additional works at: https://ecommons.luc.edu/cs_facpubs Part of the Computer Sciences Commons Recommended Citation Joe Kaylor, Konstantin Läufer, and George K. Thiruvathukal, Online Layered File System (OLFS): A layered and versioned filesystem and performance analysi, In Proceedings of Electro/Information Technology 2010 (EIT 2010). This Conference Proceeding is brought to you for free and open access by the Faculty Publications at Loyola eCommons. It has been accepted for inclusion in Computer Science: Faculty Publications and Other Works by an authorized administrator of Loyola eCommons. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. Copyright © 2010 Joseph P. Kaylor, Konstantin Läufer, and George K. Thiruvathukal 1 Online Layered File System (OLFS): A Layered and Versioned Filesystem and Performance Analysis Joe Kaylor, Konstantin Läufer, and George K. Thiruvathukal Loyola University Chicago Department of Computer Science Chicago, IL 60640 USA Abstract—We present a novel form of intra-volume directory implement user mode file system frameworks such as FUSE layering with hierarchical, inheritance-like namespace unifica- [16]. tion. While each layer of an OLFS volume constitutes a subvol- Namespace Unification: Unix supports the ability to ume that can be mounted separately in a fan-in configuration, the entire hierarchy is always accessible (online) and fully navigable mount external file systems from external resources or local through any mounted layer.
    [Show full text]
  • Backing up Linux and Other Unix(- Like) Systems
    BACKING UP LINUX AND OTHER UNIX(- LIKE) SYSTEMS There are two kinds of people: those who do regular backups and those who never had a hard drive failure — Unknown. 1. Introduction The topic of doing backups of a (live) Un*x (mostly Linux) system regularly comes up on Linux mailing lists and forums and invariably the advice to simply do tar cvfz backup.tgz /bin /boot /etc ... is given. Unfortunately, a good backup takes more effort than that. In this article I will outline a great deal (but not necessarily all) of the pitfalls and details you will have to be watchful of when making backups. Note that this is not an application how-to, so you should not use the given examples verbatim, nor does it give an exhaustive list of backup programs and examples. It also doesn't give step-by-step instructions. It is meant to create awareness for people who already have a general understanding of Un*x systems. Reading all of the documentation of the tool itself is and remains important, for it may make you think of things you wouldn't otherwise have considered. Also note that this article mostly describes the process of making backups to an external device or location. If data protection is important to you, I also highly recommend using RAID. While RAID offers no protection against fires, earthquakes, data corruption or humans, it does offer protection against failing disks. It has saved me more than once. Additionally, I'd advice you to consider using a UPS. Although my personal experience is limited to Linux, the issues I'll discuss should (could) work as well on all or most Un*x systems.
    [Show full text]
  • Freebsd File Formats Manual Libarchive-Formats (5)
    libarchive-formats (5) FreeBSD File Formats Manual libarchive-formats (5) NAME libarchive-formats —archive formats supported by the libarchive library DESCRIPTION The libarchive(3) library reads and writes a variety of streaming archive formats. Generally speaking, all of these archive formats consist of a series of “entries”. Each entry stores a single file system object, such as a file, directory,orsymbolic link. The following provides a brief description of each format supported by libarchive,with some information about recognized extensions or limitations of the current library support. Note that just because a format is supported by libarchive does not imply that a program that uses libarchive will support that format. Applica- tions that use libarchive specify which formats theywish to support, though manyprograms do use libarchive convenience functions to enable all supported formats. TarFormats The libarchive(3) library can read most tar archives. However, itonly writes POSIX-standard “ustar” and “pax interchange” formats. All tar formats store each entry in one or more 512-byte records. The first record is used for file metadata, including filename, timestamp, and mode information, and the file data is stored in subsequent records. Later variants have extended this by either appropriating undefined areas of the header record, extending the header to multiple records, or by storing special entries that modify the interpretation of subsequent entries. gnutar The libarchive(3) library can read GNU-format tar archives. It currently supports the most popular GNU extensions, including modern long filename and linkname support, as well as atime and ctime data. The libarchive library does not support multi-volume archives, nor the old GNU long filename format.
    [Show full text]
  • TAR(5) BSD File Formats Manual TAR(5)
    TAR(5) BSD File Formats Manual TAR(5) NAME tar —format of tape archive files DESCRIPTION The tar archive format collects anynumber of files, directories, and other file system objects (symbolic links, device nodes, etc.) into a single stream of bytes. The format was originally designed to be used with tape drivesthat operate with fixed-size blocks, but is widely used as a general packaging mechanism. General Format A tar archive consists of a series of 512-byte records. Each file system object requires a header record which stores basic metadata (pathname, owner,permissions, etc.) and zero or more records containing any file data. The end of the archive isindicated by tworecords consisting entirely of zero bytes. Forcompatibility with tape drivesthat use fixed block sizes, programs that read or write tar files always read or write a fixed number of records with each I/O operation. These “blocks” are always a multiple of the record size. The maximum block size supported by early implementations was 10240 bytes or 20 records. This is still the default for most implementations although block sizes of 1MiB (2048 records) or larger are commonly used with modern high-speed tape drives. (Note: the terms “block” and “record” here are not entirely standard; this document follows the convention established by John Gilmore in documenting pdtar.) Old-Style Archive Format The original tar archive format has been extended manytimes to include additional information that various implementors found necessary.This section describes the variant implemented by the tar command included in Version 7 AT&T UNIX,which seems to be the earliest widely-used version of the tar program.
    [Show full text]
  • Enabling Security in Cloud Storage Slas with Cloudproof
    Enabling Security in Cloud Storage SLAs with CloudProof Raluca Ada Popa Jacob R. Lorch David Molnar Helen J. Wang Li Zhuang MIT Microsoft Research [email protected] {lorch,dmolnar,helenw,lizhuang}@microsoft.com ABSTRACT ers [30]. Even worse, LinkUp (MediaMax), a cloud storage Several cloud storage systems exist today, but none of provider, went out of business after losing 45% of client data them provide security guarantees in their Service Level because of administrator error. Agreements (SLAs). This lack of security support has been Despite the promising experiences of early adopters and a major hurdle for the adoption of cloud services, especially benefits of cloud storage, issues of trust pose a significant for enterprises and cautious consumers. To fix this issue, we barrier to wider adoption. None of today's cloud stor- present CloudProof, a secure storage system specifically de- age services|Amazon's S3, Google's BigTable, HP, Mi- signed for the cloud. In CloudProof, customers can not only crosoft's Azure, Nirvanix CloudNAS, or others|provide se- detect violations of integrity, write-serializability, and fresh- curity guarantees in their Service Level Agreements (SLAs). ness, they can also prove the occurrence of these violations For example, S3's SLA [1] and Azure's SLA [10] only guar- to a third party. This proof-based system is critical to en- antee availability: if availability falls below 99:9%, clients abling security guarantees in SLAs, wherein clients pay for are reimbursed a contractual sum of money. As cloud stor- a desired level of security and are assured they will receive age moves towards a commodity business, security will be a certain compensation in the event of cloud misbehavior.
    [Show full text]
  • VERSIONFS a Versatile and User-Oriented Versioning File System
    VERSIONFS A Versatile and User-Oriented Versioning File System A THESIS PRESENTED BY KIRAN-KUMAR MUNISWAMY-REDDY TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE STONY BROOK UNIVERSITY Technical Report FSL-03-03 December 2003 Abstract of the Thesis Versionfs A Versatile and User-Oriented Versioning File System by Kiran-Kumar Muniswamy-Reddy Master of Science in Computer Science Stony Brook University 2003 File versioning is a useful technique for recording a history of changes. Applications of ver- sioning include backups and disaster recovery, as well as monitoring intruders’ activities. Alas, modern systems do not include an automatic and easy-to-use file versioning system. Existing backup systems are slow and inflexible for users. Even worse, they often lack backups for the most recent day’s activities. Online disk snapshotting systems offer more fine-grained versioning, but still do not record the most recent changes to files. Moreover, existing systems also do not give individual users the flexibility to control versioning policies. We designed a lightweight user-oriented versioning file system called Versionfs. Versionfs works with any file system, whether local or remote, and provides a host of user-configurable policies: versioning by users, groups, processes, or file names and extensions; version retention policies by maximum number of versions kept, age, or total space consumed by versions of a file; version storage policies using full copies, compressed copies, or deltas. Versionfs creates file versions automatically, transparently, and in a file-system portable manner—while maintaining Unix semantics. A set of user-level utilities allow administrators to configure and enforce default policies; users are able to set policies within configured boundaries, as well as view, control, and recover files and their versions.
    [Show full text]
  • Metadata Efficiency in Versioning File Systems
    2nd USENIX Conference on File and Storage Technologies, San Francisco, CA, Mar 31 - Apr 2, 2003. Metadata Efficiency in Versioning File Systems Craig A.N. Soules, Garth R. Goodson, John D. Strunk, Gregory R. Ganger Carnegie Mellon University Abstract of time over which comprehensive versioning is possi- ble. To be effective for intrusion diagnosis and recovery, Versioning file systems retain earlier versions of modi- this duration must be greater than the intrusion detection fied files, allowing recovery from user mistakes or sys- latency (i.e., the time from an intrusion to when it is de- tem corruption. Unfortunately, conventional versioning tected). We refer to the desired duration as the detection systems do not efficiently record large numbers of ver- window. In practice, the duration is limited by the rate sions. In particular, versioned metadata can consume of data change and the space efficiency of the version- as much space as versioned data. This paper examines ing system. The rate of data change is an inherent aspect two space-efficient metadata structures for versioning of a given environment, and an analysis of several real file systems and describes their integration into the Com- environments suggests that detection windows of several prehensive Versioning File System (CVFS), which keeps weeks or more can be achieved with only a 20% cost in all versions of all files. Journal-based metadata encodes storage capacity [41]. each metadata version into a single journal entry; CVFS uses this structure for inodes and indirect blocks, reduc- In a previous paper [41], we described a prototype self- ing the associated space requirements by 80%.
    [Show full text]
  • Review NTFS Basics
    Australian Journal of Basic and Applied Sciences, 6(7): 325-338, 2012 ISSN 1991-8178 Review NTFS Basics Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh Bardsir Branch, Islamic Azad University, Bardsir, Iran Abstract: The Windows NT file system (NTFS) provides a combination of performance, reliability, and compatibility not found in the FAT file system. It is designed to quickly perform standard file operations such as read, write, and search - and even advanced operations such as file-system recovery - on very large hard disks. Key words: Format, NTFS, Volume, Fat, Partition INTRODUCTION Formatting a volume with the NTFS file system results in the creation of several system files and the Master File Table (MFT), which contains information about all the files and folders on the NTFS volume. The first information on an NTFS volume is the Partition Boot Sector, which starts at sector 0 and can be up to 16 sectors long. The first file on an NTFS volume is the Master File Table (MFT). The following figure illustrates the layout of an NTFS volume when formatting has finished. Fig. 5-1: Formatted NTFS Volume. This chapter covers information about NTFS. Topics covered are listed below: NTFS Partition Boot Sector NTFS Master File Table (MFT) NTFS File Types NTFS File Attributes NTFS System Files NTFS Multiple Data Streams NTFS Compressed Files NTFS & EFS Encrypted Files . Using EFS . EFS Internals . $EFS Attribute . Issues with EFS NTFS Sparse Files NTFS Data Integrity and Recoverability The NTFS file system includes security features required for file servers and high-end personal computers in a corporate environment.
    [Show full text]
  • Replication, History, and Grafting in the Ori File System
    Replication, History, and Grafting in the Ori File System Ali Jose´ Mashtizadeh, Andrea Bittau, Yifeng Frank Huang, David Mazieres` Stanford University Abstract backup, versioning, access from any device, and multi- user sharing—over storage capacity. But is the cloud re- Ori is a file system that manages user data in a modern ally the best place to implement data management fea- setting where users have multiple devices and wish to tures, or could the file system itself directly implement access files everywhere, synchronize data, recover from them better? disk failure, access old versions, and share data. The In terms of technological changes, disk space has in- key to satisfying these needs is keeping and replicating creased dramatically and has outgrown the increase in file system history across devices, which is now prac- wide-area bandwidth. In 1990, a typical desktop machine tical as storage space has outpaced both wide-area net- had a 60 MB hard disk, whose entire contents could tran- work (WAN) bandwidth and the size of managed data. sit a 9,600 baud modem in under 14 hours [2]. Today, Replication provides access to files from multiple de- $120 can buy a 3 TB disk, which requires 278 days to vices. History provides synchronization and offline ac- transfer over a 1 Mbps broadband connection! Clearly, cess. Replication and history together subsume backup cloud-based storage solutions have a tough time keep- by providing snapshots and avoiding any single point of ing up with disk capacity. But capacity is also outpac- failure. In fact, Ori is fully peer-to-peer, offering oppor- ing the size of managed data—i.e., the documents on tunistic synchronization between user devices in close which users actually work (as opposed to large media proximity and ensuring that the file system is usable so files or virtual machine images that would not be stored long as a single replica remains.
    [Show full text]
  • A Distributed File System for Distributed Conferencing System
    A DISTRIBUTED FILE SYSTEM FOR DISTRIBUTED CONFERENCING SYSTEM By PHILIP S. YEAGER A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE UNIVERSITY OF FLORIDA 2003 Copyright 2003 by Philip S. Yeager ACKNOWLEDGMENTS I would like to thank Dr. Richard Newman for his help and guidance with this project. I would like to express my gratitude to Dr. Jonathan C.L. Liu and Dr. Beverly Sanders for serving on my committee. I would like to thank Dr. Joseph Wilson for serving as a substitute at my defense. I would also like to thank Vijay Manian and the other DCS group members for their advice and contributions. I thank my parents and friends for their encouragement and support. Finally, I would like to thank Candice Williams for everything she has done. Without these people this work would not have been possible. iii TABLE OF CONTENTS Page ACKNOWLEDGMENTS ................................................................................................. iii LIST OF FIGURES ......................................................................................................... viii ABSTRACT....................................................................................................................... ix CHAPTER 1 INTRODUCTION ........................................................................................................1 1.1 Introduction........................................................................................................1
    [Show full text]
  • How to Copy Files
    How to Copy Files Yang Zhan, The University of North Carolina at Chapel Hill and Huawei; Alexander Conway, Rutgers University; Yizheng Jiao and Nirjhar Mukherjee, The University of North Carolina at Chapel Hill; Ian Groombridge, Pace University; Michael A. Bender, Stony Brook University; Martin Farach-Colton, Rutgers University; William Jannen, Williams College; Rob Johnson, VMWare Research; Donald E. Porter, The University of North Carolina at Chapel Hill; Jun Yuan, Pace University https://www.usenix.org/conference/fast20/presentation/zhan This paper is included in the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST ’20) February 25–27, 2020 • Santa Clara, CA, USA 978-1-939133-12-0 Open access to the Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST ’20) is sponsored by How to Copy Files Yang Zhan Alex Conway Yizheng Jiao Nirjhar Mukherjee UNC Chapel Hill and Huawei Rutgers Univ. UNC Chapel Hill UNC Chapel Hill Ian Groombridge Michael A. Bender Martín Farach-Colton William Jannen Pace Univ. Stony Brook Univ. Rutgers Univ. Williams College Rob Johnson Donald E. Porter Jun Yuan VMware Research UNC Chapel Hill Pace Univ. Abstract Docker make heavy use of logical copies to package and deploy applications [34, 35, 37, 44], and new container cre- Making logical copies, or clones, of files and directories ation typically begins by making a logical copy of a reference is critical to many real-world applications and workflows, directory tree. including backups, virtual machines, and containers. An ideal Duplicating large objects is so prevalent that many file sys- clone implementation meets the following performance goals: tems support logical copies of directory trees without making (1) creating the clone has low latency; (2) reads are fast in full physical copies.
    [Show full text]
  • Abréviations De L'informatique Et De L'électronique/Version Imprimable
    Abréviations de l'informatique et de l'électronique/Version imprimable... https://fr.wikibooks.org/w/index.php?title=Abréviations_de_l'informat... Un livre de Wikilivres. Une version à jour et éditable de ce livre est disponible sur Wikilivres, une bibliothèque de livres pédagogiques, à l'URL : http://fr.wikibooks.org/wiki/Abr%C3%A9viations_de_l%27informatique_et_de_l %27%C3%A9lectronique Vous avez la permission de copier, distribuer et/ou modifier ce document selon les termes de la Licence de documentation libre GNU, version 1.2 ou plus récente publiée par la Free Software Foundation ; sans sections inaltérables, sans texte de première page de couverture et sans Texte de dernière page de couverture. Une copie de cette licence est inclue dans l'annexe nommée « Licence de documentation libre GNU ». A AA : Anti-Aliasing (Anticrènelage) AAA : Authentication Authorization Accounting AAC : Advanced Audio Coding AAD : Analogique-Analogique-Digital ABAP : Allgemeiner Berichtsaufbereitungsprozessor, (en anglais : Advanced Business Application Programming) Langage dans SAP Ack : Acknowledge character (Acquittement) AC97 : Audio Codec '97 (Audio Codec 1997) ACE Access Control Entry, voir Access Control List Adaptive Communication Environment, voir anglais Adaptive Communication Environment ACE ACL : Access Control List 1 sur 36 14/07/2015 00:18 Abréviations de l'informatique et de l'électronique/Version imprimable... https://fr.wikibooks.org/w/index.php?title=Abréviations_de_l'informat... ACPI : advanced configuration and power interface ACRONYM
    [Show full text]