{"title":"Hiding mass storage under Unix: NASA's MSS-II architecture","authors":"D. Tweten","doi":"10.1109/MASS.1990.113585","DOIUrl":null,"url":null,"abstract":"A second-generation mass storage system, MSS-II, is described. It achieves a 10-MB transfer rate into and out of the central-network mass-storage node, while preserving the illusion to users that it is simply an ordinary Unix system with an infinite supply of very fast disk space. It does so by implementing a Berkeley RAID-style file system in kernel software, by instituting striping network access, by implementing a transparent hierarchical storage manager, and by extending the concepts of file ownership and permission to removable volumes. The major software components (i.e. the high-performance file system, rapid-access storage hierarchy, volume manager, and striping network access) and file integrity are discussed. >","PeriodicalId":282025,"journal":{"name":"[1990] Digest of papers. Tenth IEEE Symposium on Mass Storage Systems@m_Crisis in Mass Storage","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1990] Digest of papers. Tenth IEEE Symposium on Mass Storage Systems@m_Crisis in Mass Storage","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MASS.1990.113585","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24
Abstract
A second-generation mass storage system, MSS-II, is described. It achieves a 10-MB transfer rate into and out of the central-network mass-storage node, while preserving the illusion to users that it is simply an ordinary Unix system with an infinite supply of very fast disk space. It does so by implementing a Berkeley RAID-style file system in kernel software, by instituting striping network access, by implementing a transparent hierarchical storage manager, and by extending the concepts of file ownership and permission to removable volumes. The major software components (i.e. the high-performance file system, rapid-access storage hierarchy, volume manager, and striping network access) and file integrity are discussed. >