Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Data integrity
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== File systems == Various research results show that neither widespread [[filesystem]]s (including [[Unix File System|UFS]], [[Extended file system|Ext]], [[XFS]], [[JFS (file system)|JFS]] and [[NTFS]]) nor [[RAID#Weaknesses|hardware RAID]] solutions provide sufficient protection against data integrity problems.<ref> {{cite web |title=IRON FILE SYSTEMS |url=http://pages.cs.wisc.edu/~vijayan/vijayan-thesis.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://pages.cs.wisc.edu/~vijayan/vijayan-thesis.pdf |archive-date=2022-10-09 |url-status=live|work=Doctor of Philosophy in Computer Sciences |publisher=University of Wisconsin-Madison |access-date=9 June 2012 |author=Vijayan Prabhakaran |year=2006 }}</ref><ref>{{cite web |title=Parity Lost and Parity Regained |url=http://www.cs.wisc.edu/adsl/Publications/parity-fast08.html}}</ref><ref> {{cite web |title=An Analysis of Data Corruption in the Storage Stack |url=http://www.cs.wisc.edu/adsl/Publications/corruption-fast08.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://www.cs.wisc.edu/adsl/Publications/corruption-fast08.pdf |archive-date=2022-10-09 |url-status=live}}</ref><ref> {{cite web |title=Impact of Disk Corruption on Open-Source DBMS |url=http://www.cs.wisc.edu/adsl/Publications/corrupt-mysql-icde10.pdf |archive-url=https://ghostarchive.org/archive/20221009/http://www.cs.wisc.edu/adsl/Publications/corrupt-mysql-icde10.pdf |archive-date=2022-10-09 |url-status=live}}</ref><ref> {{cite web |url=http://www.baarf.com/ |title=Baarf.com |publisher=Baarf.com |access-date=4 November 2011}}</ref> Some filesystems (including [[Btrfs]] and [[ZFS]]) provide internal data and [[metadata]] checksumming that is used for detecting [[silent data corruption]] and improving data integrity. If a corruption is detected that way and internal RAID mechanisms provided by those filesystems are also used, such filesystems can additionally reconstruct corrupted data in a transparent way.<ref>{{cite web | url = http://www.oracle.com/technetwork/articles/servers-storage-admin/advanced-btrfs-1734952.html | title = How I Use the Advanced Capabilities of Btrfs | date = August 2012 | access-date = 2014-01-02 | first1 = Margaret | last1 = Bierman | first2 = Lenz | last2 = Grimmer}}</ref> This approach allows improved data integrity protection covering the entire data paths, which is usually known as [[end-to-end data protection]].<ref name= "Zhang2010">{{cite q | Q111972797 | access-date = 2014-01-02}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)