Proceedings of the 2001 USENIX Annual Technical Conference

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings of the 2001 USENIX Annual Technical Conference USENIX Association Proceedings of the 2001 USENIX Annual Technical Conference Boston, Massachusetts, USA June 25–30, 2001 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION © 2001 by The USENIX Association All Rights Reserved For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Storage management for web proxies Lan Huang Eran Gabb er Elizab eth Shriver SUNY Stony Brook Bel l Laboratories Bel l Laboratories [email protected] [email protected] [email protected] Christopher A. Stein Harvard University [email protected] Abstract Squid and Apache are two p opular web proxies. Both of these systems use the standard le sys- tem services provided by the host op erating system. On UNIX this is usually UFS, a descendantofthe Today,caching web proxies use general-purp ose le 4.2BSD UNIX Fast File System (FFS) [13]. FFS systems to store web ob jects. Proxies, e.g., Squid or was designed for workstation workloads and is not Apache, when running on a UNIX system, typically optimized for the di erent workload and require- use the standard UNIX le system (UFS) for this ments of a web proxy. It has b een observed that le purp ose. UFS was designed for research and engi- system latency is a key comp onent in the latency neering environments, whichhave di erentcharac- observed byweb clients [21]. teristics from that of a caching web proxy. Some of the di erences are high temp oral lo cality, relaxed Some commercial vendors haveimproved I/O p er- p ersistence requirements, and a di erent read/write formance by rebuilding the entire system stack: ratio. In this pap er, wecharacterize the web proxy a sp ecial op erating system with an application- workload, describ e the design of Hummingbird, a sp eci c le system executing on dedicated hardware light-weight le system for web proxies, and present (e.g., CacheFlow, Network Appliance). Needless to p erformance measurements of Hummingbird. Hum- say, these solutions are exp ensive. We b elieve that mingbird has two distinguishing features: it sepa- a lightweight and p ortable le system can b e built rates ob ject naming and storage lo cality through that will allowproxies to achieve p erformance close direct application-provided hints, and its clients are to that of a sp ecialized system on commo dity hard- compiled with a linked library interface for mem- ware, within a general-purp ose op erating system, ory sharing. When we simulated the Squid proxy, and with minimal changes to their source co de; Gab- Hummingbird achieves do cument request through- b er and Shriver [5] discuss this view in detail. put 2.3{9.4 times larger than with several di erent versions of UFS. Our exp erimental results are veri- We have built a simple, lightweight le system li- ed within the Polygraph proxy b enchmarking en- brary named Hummingbird that runs on top of a vironment. raw disk partition. This system is easily p ortable| wehave run it with minimal changes on FreeBSD, IRIX, Solaris, and Linux. In this pap er we de- 1 Intro duction scrib e the design, interface, and implementation of this system along with some exp erimental results Caching web proxies are computer systems dedi- that compare the p erformance of our system with a cated to caching and delivering web content. Typ- UNIX le system. Our results indicate that Hum- ically, they exist on a corp orate rewall or at the mingbird's throughput is 2.3{4.0 times larger than point where an Internet Service Provider (ISP) asimulated version of Squid running UFS mounted p eers with its network access provider. From a web asynchronously on FreeBSD, 5.4{9.4 times faster p erformance and scalability p oint of view, these sys- than Squid running UFS mounted synchronously tems have three purp oses: improve web client la- on FreeBSD, 5.6{8.4 times larger than a simulated tency, drive down the ISP's network access costs version of Squid running UFS with soft up dates on b ecause of reduced bandwidth requirements, and re- FreeBSD, and 5.4{13 times larger than XFS and duce request load on origin servers. Naming. The web proxy application determines EFS on IRIX (see Section 4). We also p erformed thenameofa letobewritteninto the le system. exp eriments using the Polygraph environment [18] In a traditional UNIX le system, le names are with an Apache proxy; the mean resp onse time for normally selected by a user. hits in the proxy is 14 times smaller with Humming- bird than with UFS (see Section 5). Reference lo cality. Clientweb accesses are char- acterized by a request for an HTML page followed Throughout the rest of this pap er, we use the terms by requests for emb edded images. The set of images proxy or web proxy to mean caching web proxy. Sec- within a cacheable HTML page changes slowly over tion 2 presents the imp ortantcharacteristics of the time. So, if a page is requested by a client, it makes proxy workload considered for our le system. It sense for the proxy to anticipate future requests by also presents some background on le systems and prefetching its historically asso ciated images. proxies that is imp ortant b ecause it motivates much of our design. Section 3 describ es the Humming- We studied one day of the web proxy log for this bird le system. Our exp eriments and results are reference lo cality. The rst time we see an HTML presented in Sections 4 and 5. Section 6 discusses le, we coalesce it with all following non-HTMLs related work in le systems and web proxy caching. from the same client to form the primordial local- ity set,whichdoesnotchange. The next time the HTML le is referenced, we form another lo cality 2 File system limitations set in the same manner and compare its le mem- The web proxy workload is di erentthanthestan- b ers with those of the primordial lo cality set. The dard UNIX workload; these di erences are discussed average hit rate (the ratio between the size of the in Section 2.1. Due to these di erences, the p erfor- latter sets and the size of the primordial set) across mance which can b e attained for a web proxy run- all references is 47%. Thus, on average, a lo cality set ning on UFS is limited by some of the features; these re-reference accesses almost half of the les of the limitations are discussed in Section 2.2. original reference. One of the reasons that this hit rate is small mightbe due to the assumption that 2.1 Web proxy workload characteristics all non-HTML les that follow a HTML le are in the same lo cality set; this is clearly not true if a Web proxy workloads have sp ecial characteristics, user has multiple active browser sessions. Also, we which are di erent from those of a traditional UNIX determined the typ e of le using the le extension, le system workload. This section describ es the sp e- thus possibly placing some HTML les in another cial characteristics of proxy workloads. le's lo cality set. We also studied the size of the lo- cality sets in bytes, and found that 42% are 32 KB We studied a week's worth of web proxy logs from or smaller, 62% are 64 KB or smaller, 73% are 96 a ma jor, national ISP, collected from January 30 to KB or smaller, and 80% are 128 KB or smaller. February 5, 1999. This proxy ran Netscap e Enter- prise server proxy software and the logs were gen- File access. Several older UNIX le system p er- erated in Netscap e-Extended2 format. For the pur- formance studies have shown that les are usually p ose of our analysis we isolated the request stream accessed sequentially [16, 1]. A recent study [19] to those that would a ect the le system underlying has suggested that this is changing, esp ecially for the proxy. Thus we excluded 34% of the GET re- memory-mapp ed and large les. However, UNIX quests which are considered non-cacheable by the le systems have b een designed for the traditional proxy. If we could not nd the le size, we re- sequential workload. Web proxies have an even moved the log event. This prepro cessing results in stronger and more predictable pattern of b ehavior. the removal of ab out 4% of the log records, nearly Web proxies currently always access les sequen- all during the rst few days. We eliminated the tially and in their entirety. (This maychange when rst few days and are left with 4 days of pro cessed range requests are more p opular.) logs containing 4.8 million requests for 14.3 GB of unique cacheable data and 27.6 GB total requested File size. Most cacheable web do cuments are cacheable data. small; the median size of requested les is 1986 B and the average size is 6167 B. Over 90% of the Characteristics of a web proxy and its workload are: references are for les smaller than 8 KB. Idleness. The proxy workload is characterized by Persistence.
Recommended publications
  • Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
    Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3
    [Show full text]
  • 3 Comandos Linux
    Livro Eletrônico Aula 00 Sistemas Operacionais p/ AL-BA (Analista Legislativo - TI) Pós-Edital Professor: Celson Carlos Martins Junior Aula Demonstrativa Celson Carlos Martins Junior Aula 00 ESCLARECIMENTOS INICIAIS .......................................................................................................................................... 3 1 – INTRODUÇÃO .............................................................................................................................................................. 5 1.1 COMMUNITY ENTERPRISE OPERATING SYSTEM ........................................................................................... 6 1.2 RED HAT ENTERPRISE LINUX ......................................................................................................................... 8 1.3 INSTALAÇÃO CENTOS ................................................................................................................................... 10 1.4 GERENCIADOR INICIALIZAÇÃO .................................................................................................................... 17 1.5 SISTEMAS DE ARQUIVOS ................................................................................................................................ 18 1.6 SISTEMAS RAID ............................................................................................................................................. 20 1.7 RESOLUÇÃO DE QUESTÕES ..........................................................................................................................
    [Show full text]
  • Ort Seite 127.0.0.1 --> Loopback 1-To-1 Relation (Relational Database)
    1 2 3 <== Hierarchie Ort Seite # 127.0.0.1 --> loopback 1-to-1 relation (relational database) C7 - Databases 63 1-to-n relation (relational database) C7 - Databases 62 255.255.255.255 --> broadcast address: IPv4, DHCPv4 ff02::1:2 --> broadcast address: DHCPv6 ff:ff:ff:ff:ff:ff --> broadcast address: MAC A abortable locks C4 - Locks 65-67 abortable MCS lock C4 - Locks 67 absorbing states (Markov chains) C11 - Markov Chains & PageRank 97 abstraction (device driver) C9 - I/O Devices / File Systems 7 access method (file system) C9 - I/O Devices / File Systems 62 ACK (acknowledgement) packet C2 - Transport Layer (L3) 23 acknowledgement packet --> ACK additive increase / multiplicative decrease --> AIMD address --> broadcast address --> IPv4 / IPv6 --> MAC address block --> IPv4 address prefix --> IPv4 address resolution protocol --> ARP adjacency list --> graphs AIMD (additive increase / multiplicative decrease) C2 - Transport Layer (L3) 21 allocation structure (vsfs) C9 - I/O Devices / File Systems 63 ALock (Anderson queue lock) --> locks AM (amplitude modulation) --> modulation amplitude modulation (AM) --> modulation anchor text C11 - Markov Chains & PageRank 102 Anderson queue lock (ALock) --> locks anonymous pipe --> (ordinary) pipe aperiodic (Markov chains) C11 - Markov Chains & PageRank 99 distinguish aperiodic states and an aperiodic Markov chain! ARP (address resolution protocol) C10 - Link Layer (L1) 79 arrival probability (Markov chains) C11 - Markov Chains & PageRank 95 AS (autonomous system) C1 - Network Layer (L2) 8 ASN (autonomous
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • Personal System Administration Guide
    Personal System Administration Guide Document Number 007-1366-190 CONTRIBUTORS Written by Amy Smith Updated by Douglas B. O’Morain, Laura Wirth Peters, Julie Boney, and Steven Levine Production by Karen Jacobson Engineering contributions by Betsy Zeller, Roger Chickering, Joe Ruffles, Chris Beekhuis, Jenny Leung, Chandra Pisupati, Ray Niblett, John Relph, Will Rusch, amd Rebecca Underwood. COPYRIGHT © 2000, 2003 Silicon Graphics, Inc. All rights reserved; provided portions may be copyright in third parties, as indicated elsewhere herein. No permission is granted to copy, distribute, or create derivative works from the contents of this electronic documentation in any manner, in whole or in part, without the prior written permission of Silicon Graphics, Inc. LIMITED RIGHTS LEGEND The electronic (software) version of this document was developed at private expense; if acquired under an agreement with the USA government or any contractor thereto, it is acquired as "commercial computer software" subject to the provisions of its applicable license agreement, as specified in (a) 48 CFR 12.212 of the FAR; or, if acquired for Department of Defense units, (b) 48 CFR 227-7202 of the DoD FAR Supplement; or sections succeeding thereto. Contractor/manufacturer is Silicon Graphics, Inc., 1600 Amphitheatre Pkwy 2E, Mountain View, CA 94043-1351. TRADEMARKS AND ATTRIBUTIONS Silicon Graphics, SGI, the SGI logo, IRIS, IRIX , and XFS are registered trademarks, and Extent File System (EFS), Impressario, IRIS InSight, and IRIS Showcase are trademarks, of Silicon Graphics, Inc., in the United States and/or other countries worldwide. Indy is a registered trademark used under license in the U.S. and owned by Silicon Graphics, Inc.
    [Show full text]
  • Linux Kernel Series
    Linux Kernel Series By Devyn Collier Johnson More Linux Related Stuff on: http://www.linux.org Linux Kernel – The Series by Devyn Collier Johnson (DevynCJohnson) [email protected] Introduction In 1991, a Finnish student named Linus Benedict Torvalds made the kernel of a now popular operating system. He released Linux version 0.01 on September 1991, and on February 1992, he licensed the kernel under the GPL license. The GNU General Public License (GPL) allows people to use, own, modify, and distribute the source code legally and free of charge. This permits the kernel to become very popular because anyone may download it for free. Now that anyone can make their own kernel, it may be helpful to know how to obtain, edit, configure, compile, and install the Linux kernel. A kernel is the core of an operating system. The operating system is all of the programs that manages the hardware and allows users to run applications on a computer. The kernel controls the hardware and applications. Applications do not communicate with the hardware directly, instead they go to the kernel. In summary, software runs on the kernel and the kernel operates the hardware. Without a kernel, a computer is a useless object. There are many reasons for a user to want to make their own kernel. Many users may want to make a kernel that only contains the code needed to run on their system. For instance, my kernel contains drivers for FireWire devices, but my computer lacks these ports. When the system boots up, time and RAM space is wasted on drivers for devices that my system does not have installed.
    [Show full text]
  • Esempi Di File System
    Esempi di File System 1 CP/M • Il sistema CP/M pu`oessere considerato l’antenato di MS-DOS • CP/M era un sistema operativo per macchine con processori a 8 bit e 4KB di RAM e un singolo floppy disk di 8 pollici con capacit`adi 180 KB. • CP/M era scarno e molto compatto e rappresenta un interessante esempio di sistema embedded • Quando caricato nella RAM: – Il BIOS contiene una libreria di 17 chiamate di sistema (interfaccia harware) – Il sistema operativo occupa meno di 3584 byte (< 4KB!); la shell occupa 2 KB 2 – Ultimi 256 byte: vettore interruzioni, buffer per la linea di comando Address 0xFFFF BIOS CP/M Shell User program 0x100 Zero page 0 • Comandi vengono copiati nel buffer, poi CP/M cerca il programma da eseguire, lo scrive a partire dall’indirizzo 256 e gli passa il controllo • Il programma pu`oscrivere sopra la shell se necessario File System in CP/M • CP/M ha una sola directory (flat) • Gli utenti si collegavano uno alla volta: i file avevano informazioni sul nome del proprietario • Dopo l’avvio del sistema CP/M legge la directory e calcola una mappa di bit (di 23 byte per un disco da 180KB) per i blocchi liberi • La mappa viene tenuta in RAM e buttata via quando si spegne la macchina 3 Elementi di directory in CP/M Bytes 1 8 3 1 2 16 File name Disk block numbers User code File type Extent Block count (extension) • Lunghezza del nome fissa: 8 caratteri + 3 di estensione • Extent: serve per file con pi`udi 16 blocchii: si possono usare pi`uelementi di directory per lo stesso file, extent mantiene l’ordine con cui leggere i blocchi • Contatore
    [Show full text]
  • IRIX Admin: Disks and Filesystems (This Guide)—Explains Disk, filesystem, and Logical Volume Concepts
    IRIX™ Admin: Disks and Filesystems Document Number 007-2825-002 CONTRIBUTORS Written by Susan Ellis Illustrated by Dany Galgani Production by Ruth Christian St Peter’s Basilica image courtesy of ENEL SpA and InfoByte SpA. Disk Thrower image courtesy of Xavier Berenguer, Animatica. © 1996, Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94043-1389. Silicon Graphics, the Silicon Graphics logo, and IRIS are registered trademarks, and IRIX, XFS, Extent File System, Indy, CHALLENGE, Origin2000, IRIS InSight, and REACT are trademarks of Silicon Graphics, Inc. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. FLEXlm is a trademark of Globetrotter Software, Inc. NFS is a registered trademark of Sun Microsystems. NetWorker is a registered trademark of Legato Systems, Inc. EXABTYE is a trademark of EXABTYE Corporation. IRIX™ Admin: Disks and Filesystems Document Number 007-2825-002 Contents List of Examples xi List of Figures xiii List of Tables xv IRIX Admin Manual Set xvii About This Guide xix What This Guide Contains xix Conventions Used in This Guide xx How to Use This Guide xxii Product Support xxiii Additional Resources xxiii 1.
    [Show full text]
  • Hp Openview Storage Data Protector 5.1 Platform & Integration Support
    hp OpenView storage data protector 5.1 Platform & Integration support matrices Version: 1.0 Edition date: May 15, 2003 supported operating systems Data Protector supported operating systems component Cell Manager • Windows NT 4.06 • Windows XP PRO • Windows 2000 • Windows 2003 (32-bit) • HP-UX 11.03, 11.113,5, 11.20 1,3,5 • Solaris 7, 8 & 9 Installation Server • Windows NT 4.06 • Windows XP PRO • Windows 2000 • Windows 2003 (32-bit) • HP-UX 11.03, 11.113,5, 11.20 1,3,5 • Solaris 7, 8 & 9 2 Graphical User Interface7 • Windows XP HE • Windows XP PRO • Windows XP 64-bit • Windows NT 4.0 • Windows 2000 • Windows 2003 (32-bit) 1,3,5 • HP-UX 11.03, 11.113,5, 11.20 • Solaris 7, 8 • Windows NT 4.0 Managers-of-Managers (MoM) • Windows 2000 • Windows XP PRO • Windows 2003 (32-bit) 1,3,5 • HP-UX 11.03, 11.113,5, 11.20 • Solaris 7, 8 & 9 • Windows NT 4.0, Windows 2000 Backup Device Server (media • Windows XP PRO, XP (64-bit) agent), including robotic • Windows 2003 (32-bit) control • Windows 2003 (64-bit) (For Linux, only 32-bit is • Novell NetWare 4.22, 5.12, 6.02 supported) • HP-UX (PA-RISC) -- 11.03, 11.113,5, • HP-UX (IA64) -- 11.201,3,5, 11.223,5 • Tru64 5.xx • OpenVMS 7.3-1 4 • Sun Solaris 2.6, 7, 8, 9 • MPE/iX 6.02, 6.52, 7.02, 7.52 • Linux Redhat 7.x, 8.x • RedHat Enterprise Linux -- Advanced Server 2.18 • Linux SuSe 7.x, 8.x • Linux Debian 3.0 1 The above list plus the following: Backup Device Server (media agent), without • IBM AIX 4.3.x, 5Lver.5.1, 5.2 • SNI Sinix 5.4.3, 5.4.4 robotic control • SCO OpenServer 5.0.5 • Windows NT 4.0 Backup
    [Show full text]
  • Generating Computer Forensic Supertimelines Under Linux
    Generating computer forensic super- timelines under Linux A comprehensive guide for Windows-based disk images R. Carbone Certified Hacking Forensic Investigator (EC-Council) DRDC Valcartier C. Bean Certified Hacking Forensic Investigator (EC Council) Defence R&D Canada – Valcartier Technical Memorandum DRDC Valcartier TM 2011-216 October 2011 Generating computer forensic super- timelines under Linux A comprehensive guide for Windows-based disk images R. Carbone Certified Hacking Forensic Investigator (EC Council) DRDC Valcartier C. Bean Certified Hacking Forensic Investigator (EC Council) Defence R&D Canada – Valcartier Technical Memorandum DRDC Valcartier TM 2011-216 October 2011 Principal Author Richard Carbone Programmer/Analyst Approved by Guy Turcotte Head/System of Systems Approved for release by Christian Carrier Chief Scientist © Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2011 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2011 Abstract …….. This technical memorandum examines the basics surrounding computer forensic filesystem timelines and provides an enhanced approach to generating superior timelines for improved filesystem analysis and contextual awareness. Timelines are improved by polling multiple sources of information across the filesystem resulting in an approach that is surprisingly flexible and customizable. The timeline is further enhanced by incorporating key time-based metadata found across a disk image which, when taken as a whole, increases the forensic investigator’s understanding. Résumé …..... Ce mémorandum technique examine les bases entourant la création d’un calendrier des événements inforensiques des systèmes de fichier et fournit une approche améliorée pour générer des calendriers supérieurs pour une analyse améliorée des systèmes de fichiers et un meilleur éveil contextuel.
    [Show full text]
  • Einführung in Die Informatik Inf, SAT, Wing, Mi
    Einführung in die Informatik Inf, SAT, Wing, Mi Dipl.-Inf., Dipl.-Ing. (FH) Michael Wilhelm Hochschule Harz FB Automatisierung und Informatik [email protected] http://www.miwilhelm.de Raum 2.202 Tel. 03943 / 659 338 FB Automatisierung und Informatik: Einführung in die Informatik 1 Inhalt 1. Grundlagen der Informatik Zahlensysteme, Nachkommazahlen, Single-Format 2. Rechnerarchitekturen (Hard- und Softwaresysteme) Rechnerarchitekturen, Betriebssysteme, 3. Programmierung Sprachen, Datentypen, Datenstrukturen, Programmiermodelle, Compiler, Programmierparadigmen, Domänenspezifische Sprachen, Algorithmen 4. Verteilte Systeme (Netzwerke) 5. Themenfelder der Informatik Datenbanken, Big Data, Multimediaverarbeitung, Software Engineering, KI, Human Computing Interface, Robotics, VR/AR FB Automatisierung und Informatik: Einführung in die Informatik 2 1 Klassifizierung von Rechnerarchitekturen: . Einprozessorsysteme John v. Neumann – Eine CPU – Ein Bus Havard-Rechnerarchitekturen – Mehrere CPU‘s – Mindestens zwei Bussysteme (North- und SouthBridge) – Aufteilen der Geräte in Bezug auf die Geschwindigkeit FB Automatisierung und Informatik: Einführung in die Informatik 3 Von-Neumann Architektur nach John von Neumann Steuerwerk Befehlszähler Befehl Ein-/ Akumulator Speicher Ausgabe Prozessor = Daten Rechenwerk + Arithmetic-Logical-Unit (ALU) + Daten Steuerwerk Speicher ALU Module FB Automatisierung und Informatik: Einführung in die Informatik 4 2 Rechenwerk: ALU MDU BITP SFT ALU: Arithmetisch-Logische-Einheit MDU: Mupliplikation / Division
    [Show full text]
  • Journal Paper Format
    International Journal of Smart Home Vol. 7, No. 1, January, 2013 XFS File System and File Recovery Tools Sekie Amanuel Majore1, Changhoon Lee2 and Taeshik Shon3 1,3Department of Computer Engineering, Ajou University Woncheon-doing , Yeongton-gu, Suwon, Korea {amanu97, tsshon}@ajou.ac.kr 2Department of Computer Science and Engineering, Seoul National University of Science and Technology (SeoulTech), Korea [email protected] Abstract XFS file system is a designed to suppot very large system and parallelism efficiently. This is feature attracks different organizations which handle big data. Even there consumers electronic devices which use XFS file systems. But there are very few file explorer and recover tools that can work on XFS file system. In this paper we discuss major features of XFS file system and two file explore and recovey tools. Keywords: XFS file system, file explorer, file recovery 1. Introduction File system as one of main component of operating system, it has been evolved to cope with advancement of storage devices capacity and parallel processing. For in-stance ext file system went through much evolution ext2, ext3, ext4 .Some of the reason for these advancement were need to support large file system, large file and short recovery period after crash. Around 1990s, it became clear that EFS (Extent File System) that would not be efficient to support the new application which require high disk capacity, bandwidth capacity and parallelism. As response to these challenges, SGI developed XFS file system from scratch [1]. XFS was ported to Linux in 1999 and today is used by well-known institution such CERN and Fermilab managing petabytes of storage for scientific.
    [Show full text]