Browse Prior Art Database

Save Disk I/O Time When Migrating Access Control Profiles From LAN Server 1.0 to LAN Server 1.2 and Higher

IP.com Disclosure Number: IPCOM000107388D
Original Publication Date: 1992-Feb-01
Included in the Prior Art Database: 2005-Mar-21
Document File: 2 page(s) / 53K

Publishing Venue

IBM

Related People

Lin, S: AUTHOR [+2]

Abstract

When migrating Access Control Profiles (ACLs) from LAN Server 1.0 to LAN Server 1.2 and higher, there are three types of disk resources for which ACLs need to be migrated. They are: Type 1: Generic ending in '\'; e.g., C:\TEST\DIR\ Type 2: Generic ending in '*'; e.g., C:\TEST\DIR\* Type 3: Discrete; e.g., C:\TEST\DIR The migration of ACLs is done in four steps. (Image Omitted) Step 1: Add Access Control Profile for all the type 1 resources. Step 2: For each type 1 generic resource, apply the ACL of that resource to every path below it that does not already have an ACL defined for it. Step 3: Add Access Control Profile for the type 2 resources. Step 4: Add access control profile for the discrete resources.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 71% of the total text.

Save Disk I/O Time When Migrating Access Control Profiles From LAN Server 1.0 to LAN Server 1.2 and Higher

       When migrating Access Control Profiles (ACLs) from LAN
Server 1.0 to LAN Server 1.2 and higher, there are three types of
disk resources for which ACLs need to be migrated. They are:
      Type 1:  Generic ending in '\';  e.g., C:\TEST\DIR\
      Type 2:  Generic ending in '*';  e.g., C:\TEST\DIR\*
      Type 3:  Discrete; e.g., C:\TEST\DIR
The migration of ACLs is done in four steps.

                            (Image Omitted)

      Step 1:  Add Access Control Profile for all the type 1
resources.
      Step 2:  For each type 1 generic resource, apply the ACL of
that resource to every path below it that does not already have an
ACL defined for it.
      Step 3:  Add Access Control Profile for the type 2 resources.
      Step 4:  Add access control profile for the discrete resources.

      In the original design, the input file was being read and
processed four times for the above four steps.  In the new design,
the input file is read only once and three arrays are created, one
each for the three types of resources.  Each array contains the
locations of the profile records in the input file as long integers.
The '\' type array is processed two times, first for step 1 and then
for step 2.  The '*' and the discrete arrays are processed once. For
each element in an array, the file po...