The Design of an Embedded File System Based on the Flash

Article Preview

Abstract:

Analyzed the unique characteristics of reading and writing the flash memory, and researched the ways of designing a file system. The target embedded file system has the advantages of the traditional file system and the sequential file system. It is able to adapt to the unique characteristics of reading and writing the flash memory. It can solve the inconsistent data problem in the embedded device when power down. And it can solve the bad blocks of the flash which are generated by erase operations also.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 791-793)

Pages:

1872-1875

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] He Ying. The design and implement of an embedded file system [D] . Chengdu University of Electronic Science and technology, (2001).

Google Scholar

[2] Zhang Lei. The research and implement base on the flash[D] . Chengdu University of Electronic Science and technology, (2004).

Google Scholar

[3] Yang Zhou, Shao Shi. The analysis and test of FLASH file system[J] . Microcomputer Information, 2010, 26(7) : 154-156.

Google Scholar

[4] Liu Zhouzhou, Zhang Jie. The bad blocks handling and FMM implement of an embedded system based on NAND Flash[J] . Computer Technology and Applications, 2006, 26(6) : 42-43.

Google Scholar

[5] Randal C. Burns, Robert M. Rees, Larry J. Stockmeyer, et al. Scalable Session Locking for a Distributed File System[J]. Cluster Computing, 2001, 4(4) : 7-60.

Google Scholar

[6] Guo Yi. The implement of FAT file system based on the NOR Flash [J]. Computer Learning, 2009, 8(4) : 13-14.

Google Scholar

[7] Ren Yazhou. The research of The FAT32 file system[J] . Computer Knowledge and Technology, 2008-8: 1320-1322.

Google Scholar

[8] Li Liang, Wang Shaoguo. The research of FAT Storage Structure Theory[J]. Computer Knowledge and Technology, 2009-7: 6048-6049.

Google Scholar