BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows a logical volume.
FIGS. 2
a, 2b and 2c show exemplary diagrams of various types of volumes, viz. Slice, Concat and Mirror Volumes, respectively.
FIG. 3 shows a Hierarchical Volume Graph.
FIG. 4 shows Volume Permissions applied on a Logical block address (LBA) range within a volume.
FIG. 5 shows a Sample Volume Permission Map.
FIGS. 6
a and 6b show exemplary diagrams illustrating the map RegionInChild technique for a Slice Volume and Concat Volume, respectively.
FIGS. 7
a and 7b show exemplary diagrams illustrating the mapChildRegion technique for a Slice Volume and Concat Volume, respectively.
FIG. 8 shows the technique of calculating Top Level Volume Permissions, according to the present invention.
FIG. 9 shows the effective Top Level Volume Permissions, achieved by implementing the technique, according to the present invention.
FIG. 10 shows how local volume permission maps get modified, according to the present invention.
FIG. 11 shows the technique of Merging adjacent regions of a Volume Permission Map, according to the present invention.
FIG. 12 shows Class Diagram of Volume in accordance with the present invention.
FIG. 13
a and FIG. 13b show diagrammatic flow-chart illustrations of the mechanism of mapping hierarchical volume permissions to top level permissions, according to the present invention.
FIG. 14 shows an exemplary diagram of a system for implementing the present invention.
FIG. 15 shows how the I/O issued by a host is split into Fast Path and Slow Path, according to the present invention.