Abstract:
Management of files in a memory, such as a flash memory, includes storing in the memory a first node including a first type of metadata of the file, a second node including data of the file and a third node including a second type of metadata of the file including file status and memory location information for the first and second nodes. The third node may include a node including memory location information for the second node and a node including an index table that cross-references a memory location for the memory location information for the second node to a memory location of the first node. Methods and devices may be provided.
Abstract:
Management of files in a memory, such as a flash memory, includes storing in the memory a first node including a first type of metadata of the file, a second node including data of the file and a third node including a second type of metadata of the file including file status and memory location information for the first and second nodes. The third node may include a node including memory location information for the second node and a node including an index table that cross-references a memory location for the memory location information for the second node to a memory location of the first node. Methods and devices may be provided.
Abstract:
A method and apparatus exclusively control a device in a home network. A control point requests exclusive control authority from the device. In response to the request the control point receives an identifier (RID) used to successfully authenticate the exclusive control authority. The control point then acquires the exclusive control authority and controls the device. Accordingly, it is possible to prevent other control points from interfering with the device so as not to perform an operation which is not desirable for the control point that acquires the exclusive control authority over the device.
Abstract:
A method and apparatus exclusively control a device in a home network. A control point requests exclusive control authority from the device. In response to the request the control point receives an identifier (RID) used to successfully authenticate the exclusive control authority. The control point then acquires the exclusive control authority and controls the device. Accordingly, it is possible to prevent other control points from interfering with the device so as not to perform an operation which is not desirable for the control point that acquires the exclusive control authority over the device.