TOC |
|
This Internet-Draft describes a means to add awareness of de-duplication storage to NFS in order to save resources on NFS client and to reduce bandwidth for servicing READ and WRITE operations. The means presented leads to a second benefit of providing sub-file, block-granular caching.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119 (Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” March 1997.) [1].
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
This Internet-Draft will expire on April 21, 2011.
Copyright (c) 2010 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
1.
Introduction and Motivation
2.
Terminology
3.
De-Duplication
3.1.
Scope of De-Duplication
3.2.
READ Optimization via De-Duplication and pNFS
3.2.1.
The Definition of De-Duplication Layouts
3.2.2.
Negotiation
3.2.3.
Operational Recommendation for Deployment
3.3.
WRITE Optimization When De-Duplication Is Present
4.
Sub-File Caching
4.1.
Value of the Sub-File Caching Layout Type
4.2.
Sub-File Caching Indirect Layouts
4.3.
Sub-File Caching Leaf Layouts
5.
Acknowledgements
6.
Security Considerations
7.
IANA Considerations
8.
Normative References
§
Author's Address
TOC |
De-duplication is an emerging trend in the data storage. De-duplication means that two files that have common content derive that content from a common location on the same storage device. As a result, the total storage used is less than the total length of each file. De-duplication is also called folding.
Some file systems have the capability to avoid allocation of storage space when the value of each byte in a contiguous range is zero. Such a range of a file in such a file system is called a "hole", and a file with one or more holes is called a "sparse" file. Sparse files represent a trivial form of de-duplication since the value of every hole of X bytes in length is the common.
De-duplication is accomplished in several ways including,
The use of de-duplicated storage does not require changes to the NFS protocol. However if the NFS client is caching content from an NFS server that provides access to de-duplicated files, without changes to the protocol, inefficient use of the resources like memory and network bandwidth will result. E.g., two files of length 1024 bytes are exactly the same and are de-duplicated. The client reads, and caches the first file. A process on the client requests to read the second file. If the client were aware the second file was a duplicate of the first, it would not have read the second file, nor would it have to cache the second file. A classic use case is hypervisors, which switch between multiple guest operating systems on a single physical computer. If each of these guest operating systems were cloned from a single source, or if each guest was installed from the same operating system installation image, then much of the data of each guest might be highly de-duplicated. De-duplication awareness is consistent with the typical reasons for deploying a hypervisor: reducing costs by reducing utilization of memory, computer cycles, and network.
Sub-file caching is most useful when two conditions are met:
Under these two conditions many situations can occur where whole file caching, as enabled by NFSv4 delegations, at best provides no benefit and at worst presents a drawback. Examples include:
This document describes a method by which NFSv4.1 clients can be aware of de-duplicated storage for optimizing READ requests. As proposed, optimization of READ requests not require a new minor version of NFSv4. Instead, it requires several new layout types, and thus uses the pNFS protocol [2] (Shepler, S., Eisler, M., and D. Noveck, “NFS Version 4 Minor Version 1,” Jan 2010.). The approach presented here for de-duplication awareness is easily extended to support sub-file caching at arbitrary granularities and for abitrary sets of byte ranges of a file.
This document also describes a method by which NFSv4.x clients can optimize WRITE requests. The method does require a minor version of NFS.
The XDR description is provided in this document in a way that makes it simple for the reader to extract into a ready to compile form. The reader can feed this document into the following shell script to produce the machine readable XDR description of the de-duplication layout:
#!/bin/sh grep "^ *///" | sed 's?^ */// ??' | sed 's?^.*///??'
I.e. if the above script is stored in a file called "extract.sh", and this document is in a file called "spec.txt", then the reader can do:
sh extract.sh < spec.txt > dd.x
The effect of the script is to remove leading white space from each line of the specification, plus a sentinel sequence of "///".
TOC |
TOC |
TOC |
This document only de-duplicates the data contents of regular files. Everything else is considered metadata, and de-duplication of metadata is not considered in this document. [Comment.1] (Some metadata, including the contents of directories and symbolic links, as well as attributes (e.g. ACLs) are practical to de-duplicate, but not at the granularity of fixed sized blocks. A future revision of this document might address de-duplication of metadata.)
De-duplication awareness of regular file content in NFS has two aspects:
TOC |
Providing awareness of de-duplication to clients needs to be practical. If the data structures the server provides to the client are not compact, or require expensive processing and/or network bandwidth, then de-duplication awareness is not practical. The approach presented in this document uses leaf bitmaps to indicate whether a byte range of a file has been de-duplicated, and if so from what offset of what file. Since the granularity of de-duplication will vary by implementation, and by file, the NFS server has the option of providing indirect bitmaps that refer to bitmaps of finer grained byte ranges. An indirect bitmap can refer to another indirect bitmap or a leaf bitmap.
As noted in Section 1 (Introduction and Motivation), de-duplication can be the result of hierarchical, inline, or background processes. This document presents an approach to providing awareness of de-duplication allows servers to optimize for any approach.
NFSv4.1 introduces pNFS, which allows clients to access data from multiple storage devices. This means that the NFS server is distributed across a set of nodes on a network. Such a server might be capable of de-duplication among the server's nodes. The de-duplication awareness feature will allow servers to present awareness of cross-node de-duplication to NFS clients.
TOC |
TOC |
There are multiple de-duplication layout types, in order to support multiple levels of indirection plus a leaf level. Since the maximum sized file in pNFS is 2^64 - 1 bytes, a total of 63 levels of indirection are provided.
There are two sets of de-duplication layout types.
TOC |
See Section 7 (IANA Considerations).
TOC |
/// %#include "nfs4_prot.h" /// /// %/* Encoded in the da_addr_body field. */ /// /// union dd_layout_addr switch (bool ddla_simple) { /// case TRUE: /// multipath_list4 ddla_simple_addr; /// case FALSE: /// layouttype4 ddla_complex_addr; /// };
Figure 1 |
The device address is only used in leaf layouts, and even then, only when cross server-node de-duplication is in effect. There are two types of device addresses, a simple network address, with zero or more alternate addresses for multipathing, or a complex address which is the value of another layout type. The value of ddla_complex_addr.ddldp_ltype MUST NOT be LAYOUT4_DEDUP_TOP or any of LAYOUT4_DEDUP_LEVEL_<xx>.
TOC |
/// enum dd_layout_hint_care4 { /// /// DD4_CARE_STRIPE_UNIT_SIZE = 0x040, /// DD4_CARE_STRIPE_UNIT_ALIGN = 0x100 /// }; /// % /// %/* Encoded in the loh_body field of type layouthint4: */ /// % /// struct dd_layouthint4 { /// uint32_t ddlh_care; /// length4 ddlh_stripe_unit_size; /// length4 ddlh_stripe_unit_align; /// };
Figure 2 |
The layout-type specific content for the LAYOUT4_DEDUP_TOP layout type is composed of three fields. The first field, ddlh_care, is a set of flags indicating which values of the hint the client cares about. If DD4_CARE_STRIPE_UNIT_SIZE is set, then the client indicates in the second field, preferred unit of granularity for de-duplication in bytes. If DD4_CARE_STRIPE_UNIT_ALIGN is set, then the client indicates in the third field, the preferred minimum alignment de-duplicated units. For example, if the client specifies ddlh_stripe_unit_size as 1024, and ddlh_stripe_unit_align as 128, then if two files have in common content a string of bytes that is 1024 bytes long, and the string is at offset zero in the first file, and offset 1024 + 128 = 1152 in the second file, then the client would like the server to de-duplicate the common 1024 byte string. Note that the leaf layouts returned by the server are unable to indicate byte ranges that are not whole multiples of the unit size the server uses, so if the server accepts a layout hint with ddlh_stripe_unit_align less than ddlh_stripe_unit_size, it will report units that are equal to ddlh_stripe_unit_align. If the client specifies a value in ddlh_stripe_unit_align that is greater than the value of ddlh_stripe_unit_size, the server will ignore the ddlh_stripe_unit_align hint.
TOC |
/// %/* /// %/* How the bits of each element /// % * of ddll_blockmap are split up /// % */ /// const DDLL4_BLKMAP_MASK_ACTIVE = 0x8000000000000000; /// /// %/* The remain bits follow DDLL4_BITS_* */ /// const DDLL4_BLKMAP_MASK_PARTITIONED = 0x7FFFFFFFFFFFFFFF; /// /// %/* These constants index into ddll_bmap_partition */ /// const DDLL4_BITS_FOR_DEVID_IDX = 0; /// const DDLL4_BITS_FOR_FH_IDX = 1; /// const DDLL4_BITS_FOR_BLK_NUM_IDX = 2; /// /// struct dd_layout_leaf4 { /// length4 ddll_block_size; /// /// % /* ddll_blockmap_partition[0-2] MUST add up to 63 */ /// /// opaque ddll_blockmap_partition[4]; /// verifier4 ddll_fhsuffix; /// nfs_fh4 ddll_fhlist<>; /// uint64_t ddll_change_attr<>; /// deviceid4 ddll_devlist<>; /// uint64_t ddll_blockmap<>; /// }; /// /// struct dd_layout_indirect4 { /// length4 ddli_slab_size; /// layouttype4 ddli_next_level; /// bitmap4 ddli_bitmap; /// }; /// /// union dd_layout4_u switch (bool ddl_is_leaf) { /// case TRUE: /// dd_layout_leaf4 ddl_leaf; /// case FALSE: /// dd_layout_indirect4 ddl_indirect; /// }; /// struct dd_layout4 { /// offset4 ddl_firstoff; /// offset4 ddl_lastoff; /// dd_layout4_u ddl_u; /// };
Figure 3 |
The first fields further bound the layout.
The remainder of the de-duplication layout is either a leaf layout or an indirect layout.
An indirect layout consists of,
A leaf layout consists of,
An outline for an algorithm for processing a read() system call when the potential for de-duplicated data exists follows. This algorithm illustrates how the layout is interpreted. In this algorithm, we assume that the client always starts with a layout that spans the entire file.
/* * Returns a vector call "result" of elements * containing key / value pairs of ((offset, * length), (status, source_mds, source_fh, * source_offset)). */ dedupe_read(read_offset, read_length, target_fh, layout4 logr_layout[]) { if (number of elements in logr_layout == zero) { result[(read_offset, read_length)] = NO_DEDUP_AVAILABLE; return result; } for i from the end of logr_layout to start { if (logr_layout[i].lo_offset > read_offset) { continue; } /* check for range split across segments */ if (logr_layout[i].lo_length < read_length) { read_offset_A = read_offset; read_length_A = logr_layout[i].lo_length; read_offset_B = logr_layout[i+1].lo_offset; read_length_B = read_length - read_length_A; result[(read_offset_A, read_length_A)] = dedupe_read(read_offset_A, read_length_A, target_fh, logr_layout); result[(read_offset_B, read_length_B)] = dedupe_read(read_offset_B, read_length_B, target_fh, logr_layout); return result; } /* * If requested offset exceeds last offset of this layout * segment, then we have no de-dupe opportunity. */ if (read_offset > ddl_lastoff) { result[(read_offset, read_length)] = NO_DEDUP_AVAILABLE; return result; } last_offset = read_offset + read_length - 1; if (last_offset > ddl_lastoff) { /* we cannot de-dupe the entire range */ result[(ddl_lastoff + 1, last_offset - ddl_lastoff)] = NO_DEDUP_AVAILABLE; last_offset = ddl_lastoff; } if (read_offset < ddl_firstoff) { /* we cannot de-dupe the entire range */ result[(read_offset, ddl_firstoff - read_offset)] = NO_DEDUP_AVAILABLE; read_offset = ddl_firstoff; } if (ddl_is_leaf == FALSE) { /* * Indirect layout. See if the slabs that correspond * to the affected range are de-duplicated. */ let trunc_read_off = read_offset truncated to next lowest multiple of ddli_slab_size; let round_last_off = (last_offset rounded to next highest multiple of ddli_slab_size) - 1; first_bit = trunc_read_off / ddli_slab_size; last_bit = (round_last_off + 1) / ddli_slab_size; for (j = first_bit; j++; j <= last_bit) { k = j / 32; l = j mod 32; bit = l << 1; if (j == first_bit) { read_offset_A = read_offset; read_length_A = trunc_read_off + ddli_slab_size - read_offset; } else { read_offset_A = ddl_firstoff + (j * ddli_slab_size); read_length_A = ddli_slab_size; } if ((ddli_bitmap[k] & bit) == 1) { next_layout_off = j * ddli_slab_size + trunc_read_off; next_layout_length = ddli_slab_size; next_layout_type = ddli_next_level; if (client does not have layout for (next_layout_off, next_layout_length, and ddli_next_level) { send a LAYOUTGET request; } let logr_layout_A = logr_layout array of layout for (next_layout_off, next_layout_length, next_layout_type); result[(read_offset_A, read_length_A)] = dedupe_read(read_offset_A, read_length_A, target_fh, logr_layout_A); } else { result[(read_offset_A, read_length_A)] = NO_DEDUP_AVAILABLE; } } } else { /* process a leaf layout */ /* * determine the masks for block number, filehandle index, and * device ID index. */ let trunc_read_off = read_offset truncated to next lowest multiple of ddll_block_size; let round_last_off = (last_offset rounded to next highest multiple of ddll_block_size) - 1; bits_for_blknum = ddll_blockmap_partition [DDLL4_BITS_FOR_BLK_NUM_IDX]; mask_for_blknum = 0; for (j = 0; j < bits_for_blknum; j++) { mask_for_blknum = (mask_for_blknum << 1) | 1; } bits_for_fh = ddll_blockmap_partition [DDLL4_BITS_FOR_FH_IDX]; mask_for_fh = 0; for (j = 0; j < bits_for_fh; j++) { mask_for_fh = (mask_for_blknum << 1) | 1; } mask_for_fh = mask_for_fh << bits_for_blknum; bits_for_dev = ddll_blockmap_partition [DDLL4_BITS_FOR_DEVID_IDX]; mask_for_dev = 0; for (j = 0; j < bits_for_dev; j++) { mask_for_dev = (mask_for_dev << 1) | 1; } mask_for_dev = mask_for_dev << (bits_for_blknum + mask_for_fh); if ((bits_for_blknum + bits_for_fh + bits_for_dev) != 63) { result[(read_offset, read_length)] = CORRUPT_LAYOUT; return result; } first_block = trunc_read_off / ddll_block_size; last_block = (round_last_off + 1) / ddll_block_size; slopoff = read_offset - trunc_read_off; sloplen = round_last_off - last_offset; read_offset_A = trunc_read_off; for (j = first_block; j++, read_offset_A += ddll_block_size; j <= last_block) { if (ddll_blockmap[j] & DDLL4_BLKMAP_MASK_ACTIVE) { blockmap = ddll_blockmap[j] & DDLL4_BLKMAP_MASK_PARTITIONED; source_length = ddll_block_size; source_change = 0; source_dev = 0; if (mask_for_blknum == 0) { source_offset = ddl_firstoff + j * ddll_block_size; } else { source_offset = (blockmap & mask_for_blknum) * ddll_block_size; } if (j == first_block) { source_offset += slopoff; read_offset_B = read_offset; } else { read_offset_B = read_offset_A; } if (j == last_block) { source_length -= sloplen; } if (mask_for_fh == 0) { source_fh = target_fh; if (number of elements in ddll_change_attr > 0) { source_change = ddll_change_attr[0]; } } else { fhidx = (blockmap & mask_for_fh) >> bits_for_blknum; source_fh = ddll_fhlist[fhidx]; if (number of elements in ddll_change_attr > 0) { source_change = ddll_change_attr[fhidx]; } } read_source_fh = source_fh concatenated with ddll_fhsuffix; source_ltype = 0; source_mds = MDS of target_fh; if (mask_for_dev != 0) { devidx = (blockmap & mask_for_dev) >> bits_for_blknum; source_dev = ddll_devlist[devidx]; if (client does not have device address for source_dev) { send a GETDEVICEINFO (LAYOUT4_DEDUP_TOP, source_dev); } if (ddla_simple from GETDEVICEINFO is TRUE) { let source_mds be an element of ddla_simple_addr; } else { source_ltype = ddldp_ltype; if (client does not have layout for (source_mds, source_fh, source_ltype, source_offset, source_length)) { send a LAYOUTGET request for (read_source_fh, source_ltype, source_dev, source_offset, source_length) to target_fh's MDS; cache LAYOUTGET result; } if (client still does not have layout for (source_mds, source_fh, source_ltype, source_offset, source_length)) { source_ltype = 0; } else { let source_layout = the layout from cache; } } } if (source_change == 0 || client has delegation on source_fh) { if ({source_fh, source_mds, source_offset, source_length} in cache) { result[(read_offset_B, source_length)] = (SATISFY_READ_FROM_CACHE, source_mds, source_fh, source_offset;) } else { if (source_ltype == 0) { if (read_source_fh not yet open) { send an OPEN request for read_source_fh; } send a { PUTFH read_source_fh, READ source_offset, source_length } request to source_mds; enter results in cache; } else { read from read_source_fh, source_offset, source_length according to source_layout; enter results in cache; } result[(read_offset_B, source_length)] = (SATISFY_READ_FROM_CACHE, source_mds, source_fh, source_offset); } } else { if ({source_mds, source_fh, source_offset, source_length} in cache) { send a { PUTFH source_fh, GETATTR change } request to source_mds; if (change attribute == source_change) { result[(read_offset_B, source_length)] = (SATISFY_READ_FROM_CACHE, source_mds, source_fh, source_offset); } else { result[(read_offset_B, source_length)] = (STALE_DEDUP_LAYOUT, source_mds, source_fh, source_offset); } } } } } } return result; } /* should never get here */ result[(read_offset, read_length)] = CORRUPT_LAYOUT; return result; }
Figure 4 |
There is a trade off between resources (space and time) used for providing de-duplication layouts (especially leaf layouts) and resources for redundant caching of de-duplicated storage. E.g., if a client has to descend through 52 levels of caching to avoid caching a single 4096 byte block twice, then it is not cost effective for the server to return a layout. On the other hand, if 99% of a file is using de-duplicated storage, then having a complete block map for a one gigabyte file, or at least the parts of the file the client wants to cache, is more effective than redundantly caching nearly one gigabyte of storage.
TOC |
/// %/* /// % * LAYOUT4_DEDUP_TOP or any of LAYOUT4_DEDUP_LEVEL_<xx>. /// % * Encoded in the lou_body field of type layoutupdate4: /// % * Nothing. lou_body is a zero length array of octets. /// % */ /// %
Figure 5 |
The LAYOUT4_DEDUP_TOP and LAYOUT4_DEDUP_LEVEL_<xx> layout types have no content for lou_body filed of the layoutupdate4 data type.
TOC |
The LAYOUT4_DEDUP_TOP and LAYOUT4_DEDUP_LEVEL_<xx> layout types use NFSv4.1 operations (and potentially, operations of higher minor versions of NFSv4, subject to the definition of a minor version of NFSv4) to access de-duplicated data. The de-duplication layout types do not affect access to storage devices. Thus a client might be able to obtain both a de-duplication layout type and a non-de-duplication layout type (e.g., LAYOUT4_NFSV4_1_FILES, LAYOUT4_OSD2_OBJECTS, or LAYOUT4_BLOCK_VOLUME) on the same regular file.
TOC |
Servers MAY revoke de-duplication layouts. A client using a de-duplication layout SHOULD check if the change attribute of the source file has changed. The use of the ddll_fhsuffix will prevent clients using revoked de-duplication layouts from using potentially stale information. Attempts to use filehandles with the value of ddll_fhsuffix appended, will result in NFS4ERR_STALE.
TOC |
[Comment.2] (it is likely this section will follow that of the files layout type specified in the NFSv4.1 specification.)
TOC |
TBD
TOC |
TBD
TOC |
TBD
TOC |
A pNFS client sends a GETATTR request for the fs_layout_type attribute to see if the LAYOUT4_DEDUP_TOP layout type is supported.
TOC |
Deploy the de-duplication layouts when it a significant fraction of data storage is de-duplicated.
TOC |
There are two goals
Accomplishing the former merely requires an operation that refers the server to a byte of a file it has stored. One way to is to leverage the proposed COPY operation [3] (Lentini, J., Eisler, M., and D. Kenchammana, “NFS Version 4 Minor Version 1,” Jul 2010.). Accomplishing the latter can be done by the client providing checksums of byte range it would like to avoid writing. However, to do so would require that client and server agree on checksum algorithm, which has the practical problem that clients and servers with pre-existing de-duplication features are likely to not agree on the checksum algorithm. For this reason, this version of the document does not pursue the second goal.
One caveat using COPY to achieve the first goal
(avoiding a WRITE when the client knows
the server has stored the pattern elsewhere)
is that there is a window between the time the client has cached
a byte range of the source file and the time the server
receives the COPY request. The use of a de-duplication layout
that guarantees a recall before the relevant byte range of
the source file is changed. Note that this guarantee is only present
if ddll_change_attr is of zero length. The client requires a way
to force the server to return such de-duplication layouts. When
the client requests the top level de-duplication layout with a type
equal to LAYOUT4_DEDUP_TOP | LAYOUT4_DEDUP_RECALL_ON_CHANGE. The value of LAYOUT4_DEDUP_RECALL_ON_CHANGE is mask with one bit set:
/// const LAYOUT4_DEDUP_RECALL_ON_CHANGE = 0x40;
Figure 6 |
TOC |
Sub-file caching is built using the concepts and data structures defined in Section 3.2 (READ Optimization via De-Duplication and pNFS), which introduces a set of layout types that allow customers to optimize READ operations when the NFS client and server support de-duplication. Sub-file caching provides a subset of the functionality defined by the LAYOUT4_DEDUP_ROC_TOP layout type (and layout types LAYOUT4_DEDUP_ROC_LEVEL_02 through LAYOUT4_DEDUP4_ROC_LEVEL_64 inclusive). The primary similarity is that a sub-file cache leaf layout provides a guarantee that if a block is mapped in the bitmap, then the server will recall a layout covering that block before allowing the block to be modified. The primary difference is that sub-file cache leaf layout does not have de-duplication references.
TOC |
See Section 7 (IANA Considerations).
TOC |
Indirect layouts for sub-file caching have the same format and data types as indirect layouts for de-duplication.
TOC |
Leaf layouts for sub-file caching have the same format and data types as indirect layouts for de-duplication. However, there are the following restrictions:
The effect of the length of ddll_change_attr being of zero length is that server will recall the layout of a block before allowing that block to be modified. Except for the restriction that ddll_change_attr is of zero length, the effect of the above restrictions is to disable de-duplication when using the sub-file caching layout types. If client wants both sub-file caching and de-duplication awareness, it can request the LAYOUT4_DEDUP_ROC_TOP layout type.
Note that the client can safely cache a block of file only if block's corresponding element in the ddll_blockmap array has the DDLL4_BLKMAP_MASK_ACTIVE bit set. The rest of the bits of the element of ddll_blockmap MUST be equal to the array index of the element.
TOC |
Thanks to Pranoop Erasani, Arthur Lent, and Dave Noveck for validating the strategy described in this document.
TOC |
If an ACCESS operation by the principal on the source file would fail, then the server has take care when processing requests for de-duplication layouts of the target file. If the server is unable to perform access control at the granularity of the a byte-range, then the server MUST NOT allow the principal to read the source file. A related concern is that if the server can provide per-byte-range access, then the server will need to allow an OPEN operation of the source file by the principal. The server will need to reject READ operations for the non-de-duplicated data. The reader should adjust the algorithm in Figure 4 accordingly.
TOC |
This specification requires 196 additions to the Layout Types registry described in Section 22.4 of [2] (Shepler, S., Eisler, M., and D. Noveck, “NFS Version 4 Minor Version 1,” Jan 2010.). Each added entry has five fields. The first entry is:
The second through 64th additions to the Layout Types registry each have the following form, where <xx> is a decimal number between 02 and 64, inclusive:
The 65th entry is:
The 66th through 128th additions to the Layout Types registry each have the following form, where <xx> is a decimal number between 2 and 64, inclusive:
The 129th entry is:
The 130th through 192nd additions to the Layout Types registry each have the following form, where <xx> is a decimal number between 2 and 64, inclusive:
TOC |
[1] | Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels,” RFC 2119, March 1997 (TXT). |
[2] | Shepler, S., Eisler, M., and D. Noveck, “NFS Version 4 Minor Version 1,” RFC RFC5661, Jan 2010 (TXT). |
[3] | Lentini, J., Eisler, M., and D. Kenchammana, “NFS Version 4 Minor Version 1,” draft-lentini-nfsv4-server-side-copy-05.txt (work in progress), Jul 2010 (TXT). |
TOC |
Mike Eisler | |
NetApp | |
5765 Chase Point Circle | |
Colorado Springs, CO 80919 | |
US | |
Phone: | +1-719-599-9026 |
Email: | mike@eisler.com |