Optimizing reasonably secure Long Distance Data Transfer. How to transfer Data while being poor

Size: px
Start display at page:

Download "Optimizing reasonably secure Long Distance Data Transfer. How to transfer Data while being poor"

Transcription

1 Manfred Stolle Zuse Institute Berlin Optimizing reasonably secure Long Distance Data Transfer Or How to transfer Data while being poor 1

2 The situation A scientific team gains on a daily basis 250 GB of observation data. In order to be processed and stored the data has to be transmitted over a long distance. Transmission with ftp performance is not faster than 160 GB per day. No influence on the network no root permission no privileges at all! 2

3 Keep it small if you are poor! BIG solutions (probably) exist. Big solutions require big ressources (manpower,hardware, $). I mproposing a small (inexpensive) solution 3

4 Steps Separate the (session and task) control flow from the data flow Secure the control flow Optimize the data flow Keep it simple 4

5 dmscp(2) control and data flow This was done in dmscp(1) See San Diego MSS Conf Client Access by a (dynamic) passphrase Server dmscp2 Data transfer (send or receive) (unprivileged) data port dmscp2 ssh Session control Access passphrase Negotiating transfer parameters Success check sshd port sshd This runs with ftp performance too slow! 5

6 Optimizing the data flow and data objects network streams via 1+ subnets *) Client network buffer Server Switch buffer Switch buffer File Pipe to (from) process HSM disk buffer *) more than 1 subnet not (yet) released HSM File File fragments Pipe to (from) process 6

7 Tuning parameters Number of network streams (-streams s) Sizeof network buffer (-maxbuf m) The total buffer is 2*m*s TCP-Windowsize (-wsz w) 7

8 HSM related features of dmscp2 (user exits = perl or sh scripts ) at certain events e.g. disk full error Examples (in perl) come with the source 8

9 More goodies Optional reading/writing from/to pipes at client and server instead of files, Recursive Copy of a file tree (Metadata via the secure line) Network tuning option (copy from core to core) 9

10 Success check Amount of data on server/client is compared Optional checksumming 10

11 Performance Comparing dmscp2 with dmscp(1)/ftp (1.9 MB/s) and scp (0.6 MB/s) Distance 200 Miles Latency 5.7 ms The line contains 100 Mbit components. 3.5 x faster than dmscp(1)/ftp 11.3 x faster than scp streams MB/sec

12 Performance (HPC involved) Local network (1 Gbit/s): Latency < 1ms hpscp 31 MByte/sec (hpscp is a tuned scp *) ) ~340 km (200 Miles) Bandwidth 1 Gbit/s Latency 3 ms hpscp: 28 MByte/sec streams MByte/sec in 2 subnets 201 **) 226 **) streams MByte/sec (101.1 **) *) **) core to core **) feature going to be released next week 12

13 dmscp2 needs No root permission for the installation Install it simply in your ~/bin directory! No daemon under root (except sshd) At least one unprivileged IP port on the server that is accessible to the client By default a free port is searched on the server in the range The user can define a specific port. 13

14 dmscp2 is free and easy to install! contains This presentation (long version) a dmscp2 users guide The sources 14

15 dmscp2 is meant to bea back end to solve routine big data transfer problems, build user front ends for typical data transfer tasks. It is not really easy to use (too many features), an all purpose user front end for anybody (scp/sftp has its advantages!) 15

16 Don t you mess with my data! 16

17 Manfred Stolle Zuse Institute Berlin How to transfer Data while beeing poor Reasonably secure fast data transfer via the Internet

18 Do you know the latest Computer virus? It s called Caperucita Roja It sawfull! 2

19 Actually it doesn t exist, but I can sell you a very performant toolbox against it 3

20 This is Caperucita Roja And this is the remedy 4

21 The most effective (profitable) computer virus is the human fear. 5

22 It s not funny! The bad guys really exist, but it is not sensible that we stop working just out of fear. Security measures have to leave us a chance to get our data over the Internet. 6

23 Scientific data is very valuable. It must not be damaged. But in most cases it is not very secret. We need effective means to transfer big amounts of scientific data over The Net without compromizing our computers. 7

24 The situation A scientific team gains on a daily basis 250 GB of observation data. In order to be processed and stored the data has to be transmitted over a long distance. Sometimes the destination (HSM) file system runs out of space 8

25 The situation (2) No network is totally reliable! The transmitted data can be changed in the network (very unlikely but not impossible) More catastrophes New day new data 9

26 Keep it small if you are poor! BIG solutions (probably) exist. Big solutions require big ressources (manpower,hardware, $). I m going to propose a small solution (although there is no fame in it). 10

27 Steps Separate the (session and task) control flow from the data flow Secure the control flow Optimize the data flow Keep it simple 11

28 dmscp(2) control and data flow This was done in dmscp(1) Client Access by a (dynamic) passphrase Server dmscp2 Data transfer (send or receive) (unprivileged) data port dmscp2 ssh Session control Access passphrase Negotiating transfer parameters Success check sshd port sshd 12

29 The Trick When using networks with high bandwidth (good) and high latency (poor) or very busy networks splitting the network transfer into parallel streams gets you a remarkable speedup. This is done by other solutions too. (I m not the inventor of the method but it is very good!) 13

30 Optimizing the data flow and data objects Client network streams via 1 or more subnets network buffer Server Switch buffer Switch buffer File Pipe to (from) process HSM disk buffer HSM File File fragments Pipe to (from) process 14

31 Tuning parameters Number of network streams (-streams s) Number of network connections (-srvaddrs <addr1> <addr2>..) Sizeof network buffer (-maxbuf m) The total buffer size is 2*m*s TCP-Windowsize (-wsz w) 15

32 HSM related features of dmscp2 (user exits = perl/sh/ scripts ) Called in case of the following events: disk full error Open fragment (premigration of next fragment) Close file/fragment (trigger migration) Successfull completion (postprocessing on the server) Examples (in perl) come with the source 16

33 More goodies Optional reading/writing from/to pipes at client and server instead of files, Recursive Copy of a file tree (Metadata via the secure line) Network tuning option (copy from core to core) 17

34 Success check Amount of data on server/client is compared Optional checksumming 18

35 Performance Comparing dmscp2 with dmscp(1)/ftp (1.9 MB/s) and scp (0.6 MB/s) Distance 200 Miles Latency 5.7 ms The line contains 100 Mbit components. 3.5 x faster than dmscp(1)/ftp 11.3 x faster than scp streams MB/sec

36 Performance (HPC involved) Local network (1 Gbit/s): Latency < 1ms hpscp 31 MByte/sec (hpscp is a tuned scp *) streams MByte/sec in 2 subnets 232 *) 20

37 Performance (HPC involved) - 2 ~340 km (200 Miles) Bandwidth 1 Gbit/s Latency 3 ms hpscp: 28 MByte/sec streams MByte/sec (101.1 **) **) core to core 21

38 Performance very long distance Comparing Transfer between Berlin and San Diego (ZIB and SDSC) 2 IBM Regattas Distance 4200 Miles Latency 177ms scp: 0.2 MByte/sec streams MByte/sec 1 (like ftp/dmscp1) speedup=40 dmscp2 ist 60 times faster than scp 22

39 dmscp2 needs No root permission for the installation Install it simply in your ~/bin directory! No daemon under root (except sshd) At least one unprivileged IP port on the server that is accessible to the client By default a free port is searched on the server in the range The user can define a specific port. 23

40 Problem Sometimes a network I/O process on the server exits (before or during the data transmission I guess before) This causes (like it should) a panic of dmscp2 In this case the dmscp2 run has to be repeated Searching the reason in the shared memory management 24

41 Work in progress The latest version of dmscp2 has an interface to a GUI When using the xmode parameter dmscp2 creates 2 named pipes One to read commands from the GUI One to write the receipts to the GUI dmscp2 calls xdmscp or the binary defined byte xdmscp parameter. 25

42 The GUI protocol (examples) Task Command Receipt Set local directory LCHDIR <path> LWDIR <current localdirectory> List current remote directory (in ls l format) Delete remote file LISTRDIR RERASE <filename> RDIRLIST <entry> RDIRLIST <entry> END_OF_LIST ERASE_DONE Upload file PUT <filename> ACCEPTING_NEW_COMMAND Download directory GETDIR <dirname> dmscp2: ESTIMATED_SIZE <size> xdmscp: CANCEL DOIT dmscp2:accepting_new_command 26

43 My GUI looks like this called by: dmscp2 -xmode -xdmscp -s dslogin.sdsc.edu -u bzbstoll -streams 25 27

44 Total security. 28

45 comes with a price 29

46 dmscp2 is free and easy to install! contains This presentation a dmscp2 users guide The sources Client and server are the same code (~ 8,100 lines C code) gunzip,tar,configure, make, make install that sall Usually it takes not much more than a minute. A quickinstall script is provided 30

47 dmscp2 is meant to bea back end to solve routine big data transfer problems, build user front ends for typical data transfer tasks. It is not really easy to use (too many features), an all purpose user front end for anybody (scp/sftp has its advantages!) 31

48 Examples (HPC involved!) reading a file from the server bemstoll@berni1-en0 (~/dmscp ):./dmscp2 -r -s bdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g -l /fastfs/work/bemstoll/destfile \ -rdmscp dmscp /dmscp2 Using command: ssh -p 22 bdata.hlrn.de 'true;dmscp /dmscp2 - server' > /tmp/dmscp.pipe bemstoll@bdata.hlrn.de's password: Using the port 1031 Number of network data streams=4 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time secs --> KB/sec MB/sec State: Success bemstoll@berni1-en0 (~/dmscp ): 32

49 writing 1 stream - local network bemstoll@berni1-en0 (~/dmscp ):./dmscp2 -w -s bdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g \ -l /fastfs/work/bemstoll/destfile -streams 1 Using command: ssh -p 22 bdata.hlrn.de 'true;dmscp2 -server' > /tmp/dmscp.pipe bemstoll@bdata.hlrn.de's password: Using the port 1031 Number of network data streams=1 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time secs --> KB/sec MB/sec State: Success 33

50 writing 6 streams - local network bemstoll@berni1-en0 (~/dmscp ):./dmscp2 w s bdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g -l /fastfs/work/bemstoll/destfile -streams 4 Using command: ssh -p 22 bdata.hlrn.de 'true;dmscp2 -server' > /tmp/dmscp.pipe bemstoll@bdata.hlrn.de's password: Using the port 1031 Number of network data streams=4 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time 92.2 secs --> KB/sec MB/sec State: Success 34

51 writing 40 streams distance 300 km (HLRN link) 1 Gbit/sec - latency 3 ms bemstoll@berni1-en0 (~/dmscp ):./dmscp2 -w -s hdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g -l /fastfs/work/bemstoll/destfile\ -rdmscp dmscp /dmscp2 -streams 16 Using command: ssh -p 22 hdata.hlrn.de 'true;dmscp /dmscp2 - server' > /tmp/dmscp.pipe bemstoll@hdata.hlrn.de's password: Using the port 1030 Number of network data streams=6 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time secs --> KB/sec MB/sec State: Success 35

52 writing 1 stream (ftp performance) distance 300 km latency 3 ms bemstoll@berni1-en0 (~/dmscp ):./dmscp2 -w -s hdata.hlrn.de\ -f /fastfs/work/bemstoll/f10g -l /fastfs/work/bemstoll/destfile\ -rdmscp dmscp /dmscp2 -streams 1 Using command: ssh -p 22 hdata.hlrn.de 'true;dmscp /dmscp2 - server' > /tmp/dmscp.pipe bemstoll@hdata.hlrn.de's password: Using the port 1030 Number of network data streams=1 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time secs --> KB/sec MB/sec State: Success 36

53 Recursive copy 4 streams - local bemstoll@berni1-en0 (~): dmscp2 -w -s bdata.hlrn.de \ -recursive -src. -dest /fastfs/work/bemstoll/destdir Using command: ssh -p 22 bdata.hlrn.de 'true;dmscp2 -server' > /tmp/dmscp.pipe bemstoll@bdata.hlrn.de's password: Using the port 1031 Number of network data streams=4 Size of buffers : filebuffer= netbuffer= buffer total= tcp window size is Elapsed time 12.5 secs --> KB/sec MB/sec State: Success 37

54 Don t you mess with my data! 38

VREDPro HPC Raytracing Cluster

VREDPro HPC Raytracing Cluster 1 HPC Raytracing Cluster... 1 1.1 Introduction... 1 1.2 Configuration... 2 1.2.1 Cluster Options... 4 1.2.2 Network Options... 5 1.2.3 Render Node Options... 6 1.2.4 Preferences... 6 1.2.5 Starting the

More information

Data Staging: Moving large amounts of data around, and moving it close to compute resources

Data Staging: Moving large amounts of data around, and moving it close to compute resources Data Staging: Moving large amounts of data around, and moving it close to compute resources PRACE advanced training course on Data Staging and Data Movement Helsinki, September 10 th 2013 Claudio Cacciari

More information

Data Staging: Moving large amounts of data around, and moving it close to compute resources

Data Staging: Moving large amounts of data around, and moving it close to compute resources Data Staging: Moving large amounts of data around, and moving it close to compute resources Digital Preserva-on Advanced Prac--oner Course Glasgow, July 19 th 2013 c.cacciari@cineca.it Definition Starting

More information

CS 326: Operating Systems. Networking. Lecture 17

CS 326: Operating Systems. Networking. Lecture 17 CS 326: Operating Systems Networking Lecture 17 Today s Schedule Project 3 Overview, Q&A Networking Basics Messaging 4/23/18 CS 326: Operating Systems 2 Today s Schedule Project 3 Overview, Q&A Networking

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to

More information

IT 341: Introduction to System Administration. Notes for Project #8: Backing Up Files with rsync

IT 341: Introduction to System Administration. Notes for Project #8: Backing Up Files with rsync IT 341: Introduction to System Administration Notes for Project #8: Backing Up Files with rsync These notes explain some of the concepts you will encounter in Project #08: Backing Up Files with rsync Topics

More information

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1 Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Storage Subsystem in Linux OS Inode cache User Applications System call Interface Virtual File System (VFS) Filesystem

More information

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Recap Directory A special file contains (inode, filename) mappings Caching Directory cache Accelerate to find inode

More information

Open Network Laboratory

Open Network Laboratory Open Network Laboratory Raj Jain Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@wustl.edu Audio/Video recordings of this lecture are available on-line at: http://www.cse.wustl.edu/~jain/cse473-11/

More information

Name: 1. CS372H: Spring 2009 Final Exam

Name: 1. CS372H: Spring 2009 Final Exam Name: 1 Instructions CS372H: Spring 2009 Final Exam This exam is closed book and notes with one exception: you may bring and refer to a 1-sided 8.5x11- inch piece of paper printed with a 10-point or larger

More information

UNICORE UFTP server UNICORE UFTP SERVER. UNICORE Team

UNICORE UFTP server UNICORE UFTP SERVER. UNICORE Team UNICORE UFTP server UNICORE UFTP SERVER UNICORE Team Document Version: 1.0.0 Component Version: 2.0.0 Date: 10 12 2013 UNICORE UFTP server Contents 1 UNICORE UFTP 1 2 Installation and use 2 2.1 Prerequisites....................................

More information

File Transfers. Contents

File Transfers. Contents A File Transfers Contents Overview.................................................... A-3................................ A-3 General Software Download Rules............................ A-4 Using TFTP

More information

TELE301 Lab16 - The Secure Shell

TELE301 Lab16 - The Secure Shell TELE301 Lab16 - The Secure Shell Department of Telecommunications May 7, 2002 Contents 1 Introduction 2 2 OpenSSH 2 3 Replacing Telnet 2 4 Logging in without a password 2 5 SSH Agent 3 5.1 SSH Add..............................

More information

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!!  Garcia UCB! cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices

More information

Uploaded files are stored for 6 months, after which time we remove them. Please note the SIFT Server is for the transfer of Chorus information only.

Uploaded files are stored for 6 months, after which time we remove them. Please note the SIFT Server is for the transfer of Chorus information only. SIFT User guide Our secure internet file transfer (SIFT) server is a secure mechanism that allows you to receive e-bills, invoices, CDRs, price books, NGA schedule availability and other sensitive information

More information

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17

NET ID. CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 CS519, Prelim (March 17, 2004) NAME: You have 50 minutes to complete the test. 1/17 Q1. 2 points Write your NET ID at the top of every page of this test. Q2. X points Name 3 advantages of a circuit network

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

Lab - Using Wireshark to Examine TCP and UDP Captures

Lab - Using Wireshark to Examine TCP and UDP Captures Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

[537] Fast File System. Tyler Harter

[537] Fast File System. Tyler Harter [537] Fast File System Tyler Harter File-System Case Studies Local - FFS: Fast File System - LFS: Log-Structured File System Network - NFS: Network File System - AFS: Andrew File System File-System Case

More information

Product Overview. Technical Summary, Samples, and Specifications

Product Overview. Technical Summary, Samples, and Specifications Product Overview Technical Summary, Samples, and Specifications Introduction IRI FACT (Fast Extract) is a high-performance unload utility for very large database (VLDB) systems. It s primarily for data

More information

The Berkeley File System. The Original File System. Background. Why is the bandwidth low?

The Berkeley File System. The Original File System. Background. Why is the bandwidth low? The Berkeley File System The Original File System Background The original UNIX file system was implemented on a PDP-11. All data transports used 512 byte blocks. File system I/O was buffered by the kernel.

More information

Cisco WAAS Software Command Summary

Cisco WAAS Software Command Summary 2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are

More information

Cache introduction. April 16, Howard Huang 1

Cache introduction. April 16, Howard Huang 1 Cache introduction We ve already seen how to make a fast processor. How can we supply the CPU with enough data to keep it busy? The rest of CS232 focuses on memory and input/output issues, which are frequently

More information

LECTURE WK4 NETWORKING

LECTURE WK4 NETWORKING LECTURE WK4 NETWORKING Workbook and Quiz Workbook o Due in WK5 o Must hand in a hard copy to the tutor as well as an online submission Quiz o In the practical class o 30mins to complete the quiz o Short,

More information

Main Points. File systems. Storage hardware characteristics. File system usage patterns. Useful abstractions on top of physical devices

Main Points. File systems. Storage hardware characteristics. File system usage patterns. Useful abstractions on top of physical devices Storage Systems Main Points File systems Useful abstractions on top of physical devices Storage hardware characteristics Disks and flash memory File system usage patterns File Systems Abstraction on top

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Insiders View: Network Security Devices. Dennis Cox BreakingPoint Systems

Insiders View: Network Security Devices. Dennis Cox BreakingPoint Systems Insiders View: Network Security Devices Dennis Cox CTO @ BreakingPoint Systems Who am I? Chief Technology Officer - BreakingPoint Systems Director of Engineering - TippingPoint Engineering - Cisco Systems

More information

Layer 4 TCP Performance in carrier transport networks Throughput is not always equal to bandwidth

Layer 4 TCP Performance in carrier transport networks Throughput is not always equal to bandwidth Layer 4 TCP Performance in carrier transport networks Throughput is not always equal to bandwidth Roland Stooss JDSU Deutschland GmbH Senior Consultant Data/IP Analysis Solutions Mühleweg 5, D-72800 Eningen

More information

Creating Core Dumps. Contents. Prerequisites. Document ID: Requirements. Components Used

Creating Core Dumps. Contents. Prerequisites. Document ID: Requirements. Components Used Creating Core Dumps Document ID: 12687 Contents Introduction Prerequisites Requirements Components Used Conventions How to Create Core Dumps Basic Setup Use File Transfer Protocol Use Remote Copy Protocol

More information

Program Structure. Steven M. Bellovin April 3,

Program Structure. Steven M. Bellovin April 3, Program Structure We ve seen that program bugs are a major contributor to security problems We can t build bug-free software Can we build bug-resistant software? Let s look at a few examples, good and

More information

Ftp Command Line Commands Linux Example Windows Put

Ftp Command Line Commands Linux Example Windows Put Ftp Command Line Commands Linux Example Windows Put Examples of typical uses of the command ftp. This lists the commands that you can use to show the directory contents, transfer files, and delete files.

More information

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23

FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23 FILE SYSTEMS CS124 Operating Systems Winter 2015-2016, Lecture 23 2 Persistent Storage All programs require some form of persistent storage that lasts beyond the lifetime of an individual process Most

More information

CHAPTER 2. Troubleshooting CGI Scripts

CHAPTER 2. Troubleshooting CGI Scripts CHAPTER 2 Troubleshooting CGI Scripts OVERVIEW Web servers and their CGI environment can be set up in a variety of ways. Chapter 1 covered the basics of the installation and configuration of scripts. However,

More information

Configuring IP Logging

Configuring IP Logging CHAPTER 8 This chapter describes how to configure IP logging on the sensor. It contains the following sections: Understanding IP Logging, page 8-1 Configuring Automatic IP Logging, page 8-2 Configuring

More information

Storage and File System

Storage and File System COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File

More information

CS162 Operating Systems and Systems Programming Lecture 21. Networking. Page 1

CS162 Operating Systems and Systems Programming Lecture 21. Networking. Page 1 CS162 Operating Systems and Systems Programming Lecture 21 Networking April 21, 2008 Prof. Anthony D. Joseph http://inst.eecs.berkeley.edu/~cs162 Review: The Internet Protocol: IP The Internet is a large

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

COS 318: Operating Systems. NSF, Snapshot, Dedup and Review

COS 318: Operating Systems. NSF, Snapshot, Dedup and Review COS 318: Operating Systems NSF, Snapshot, Dedup and Review Topics! NFS! Case Study: NetApp File System! Deduplication storage system! Course review 2 Network File System! Sun introduced NFS v2 in early

More information

ch02 True/False Indicate whether the statement is true or false.

ch02 True/False Indicate whether the statement is true or false. ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

CS519: Computer Networks. Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing

CS519: Computer Networks. Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing : Computer Networks Lecture 5, Part 1: Mar 3, 2004 Transport: UDP/TCP demux and flow control / sequencing Recall our protocol layers... ... and our protocol graph IP gets the packet to the host Really

More information

Program Structure I. Steven M. Bellovin November 14,

Program Structure I. Steven M. Bellovin November 14, Program Structure I Steven M. Bellovin November 14, 2010 1 Program Structure We ve seen that program bugs are a major contributor to security problems We can t build bug-free software Can we build bug-resistant

More information

Lecture 16. Today: Start looking into memory hierarchy Cache$! Yay!

Lecture 16. Today: Start looking into memory hierarchy Cache$! Yay! Lecture 16 Today: Start looking into memory hierarchy Cache$! Yay! Note: There are no slides labeled Lecture 15. Nothing omitted, just that the numbering got out of sequence somewhere along the way. 1

More information

Computer Networks Principles

Computer Networks Principles Computer Networks Principles Introduction Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Contents Introduction protocols and layered architecture encapsulation interconnection structures performance

More information

ECE 598 Advanced Operating Systems Lecture 22

ECE 598 Advanced Operating Systems Lecture 22 ECE 598 Advanced Operating Systems Lecture 22 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 19 April 2016 Announcements Project update HW#9 posted, a bit late Midterm next Thursday

More information

Introduction to the shell Part II

Introduction to the shell Part II Introduction to the shell Part II Graham Markall http://www.doc.ic.ac.uk/~grm08 grm08@doc.ic.ac.uk Civil Engineering Tech Talks 16 th November, 1pm Last week Covered applications and Windows compatibility

More information

Contents. Configuring SSH 1

Contents. Configuring SSH 1 Contents Configuring SSH 1 Overview 1 How SSH works 1 SSH authentication methods 2 SSH support for Suite B 3 FIPS compliance 3 Configuring the device as an SSH server 4 SSH server configuration task list

More information

EVO checklist Minimum PC hardware requirements Ensuring sufficient network bandwidth Important note:

EVO checklist Minimum PC hardware requirements Ensuring sufficient network bandwidth Important note: EVO checklist Before participating in an EVO session, we strongly urge you to complete this checklist to set up EVO on your system and environment. Following this checklist will eliminate the most common

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission 1 Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Recap Blocking, non-blocking, asynchronous I/O Data transfer methods Programmed I/O: CPU is doing the IO Pros Cons

More information

Chapter 1 - Introduction. September 8, 2016

Chapter 1 - Introduction. September 8, 2016 Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help

More information

File Organization Sheet

File Organization Sheet File Organization Sheet 1. What are File Structures? A File Structure is a combination of representations for data in files and of operations for accessing the data. A File Structure allows applications

More information

BusinessObjects Enterprise / Crystal Reports Server XI R1 and R2

BusinessObjects Enterprise / Crystal Reports Server XI R1 and R2 BusinessObjects Enterprise / Crystal Reports Server XI R1 and R2 Overview Contents BusinessObjects Enterprise and Crystal Reports Server XI R1 and R2 do not currently have the capability to send objects

More information

What is a file system

What is a file system COSC 6397 Big Data Analytics Distributed File Systems Edgar Gabriel Spring 2017 What is a file system A clearly defined method that the OS uses to store, catalog and retrieve files Manage the bits that

More information

Plot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0;

Plot SIZE. How will execution time grow with SIZE? Actual Data. int array[size]; int A = 0; How will execution time grow with SIZE? int array[size]; int A = ; for (int i = ; i < ; i++) { for (int j = ; j < SIZE ; j++) { A += array[j]; } TIME } Plot SIZE Actual Data 45 4 5 5 Series 5 5 4 6 8 Memory

More information

SSH Product Overview

SSH Product Overview SSH Product Overview SSH Product Overview Understanding SSH SSH Discovery and Remediation Agentless SSH Agent Based SSH 2018 Venafi. All Rights Reserved. 2 Where is SSH used? File Transfer & Remote Script

More information

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011)

UoW HPC Quick Start. Information Technology Services University of Wollongong. ( Last updated on October 10, 2011) UoW HPC Quick Start Information Technology Services University of Wollongong ( Last updated on October 10, 2011) 1 Contents 1 Logging into the HPC Cluster 3 1.1 From within the UoW campus.......................

More information

Infrastructure Underpinnings of the GFDL Workflow

Infrastructure Underpinnings of the GFDL Workflow Infrastructure Underpinnings of the GFDL Workflow A Trio Of Lightning Talks For ISENES2 Chandin Wilson, Engility Amy Langenhorst, NOAA Karen Paffendorf, Princeton University Erik Mason, Engility Jeffrey

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Triton file systems - an introduction. slide 1 of 28

Triton file systems - an introduction. slide 1 of 28 Triton file systems - an introduction slide 1 of 28 File systems Motivation & basic concepts Storage locations Basic flow of IO Do's and Don'ts Exercises slide 2 of 28 File systems: Motivation Case #1:

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

Host Solutions Group Technical Bulletin August 30, 2007

Host Solutions Group Technical Bulletin August 30, 2007 Summary ISCSI PERFORMANCE CONSIDERATIONS Host Solutions Group Technical Bulletin August 30, 2007 Meeting throughput and response time requirements in iscsi SANs requires considering both component and

More information

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc.

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc. Appendix A GLOSSARY SYS-ED/ Computer Education Techniques, Inc. $# Number of arguments passed to a script. $@ Holds the arguments; unlike $* it has the capability for separating the arguments. $* Holds

More information

CS 318 Principles of Operating Systems

CS 318 Principles of Operating Systems CS 318 Principles of Operating Systems Fall 2017 Lecture 16: File Systems Examples Ryan Huang File Systems Examples BSD Fast File System (FFS) - What were the problems with the original Unix FS? - How

More information

Secure Shell Commands

Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure

More information

SUREedge MIGRATOR INSTALLATION GUIDE FOR VMWARE

SUREedge MIGRATOR INSTALLATION GUIDE FOR VMWARE SUREedge MIGRATOR INSTALLATION GUIDE 5.0.1 FOR VMWARE 2025 Gateway Place, Suite #480, San Jose, CA, 95110 Important Notice This document is provided "as is" without any representations or warranties, express

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

IBM Virtual Machine Manager 2.0

IBM Virtual Machine Manager 2.0 IBM Virtual Machine Manager 2.0 Release Notes Note Before using this information and the product it supports, read the general information in Notices on page 13. First Edition (July 2005) Copyright International

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Viewtier Parabuild 4.3. Installation Guide

Viewtier Parabuild 4.3. Installation Guide Viewtier Parabuild 4.3 Installation Guide Viewtier Parabuild 4.3: Installation Guide Copyright 2004-2016 Viewtier Systems Table of Contents Preface... vi About This Manual... vi Audience... vi Technical

More information

Configuring IP Logging

Configuring IP Logging CHAPTER 12 This chapter describes how to configure IP logging on the sensor. It contains the following sections: Understanding IP Logging, page 12-1 Configuring Automatic IP Logging, page 12-2 Configuring

More information

Introduction. SSH Secure Shell Client 1

Introduction. SSH Secure Shell Client 1 SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,

More information

IT341 Introduction to System Administration. Project 4 - Backup Strategies with rsync and crontab

IT341 Introduction to System Administration. Project 4 - Backup Strategies with rsync and crontab IT341 Introduction to System Administration Project 4 - Backup Strategies with rsync and crontab Backup is one of the most important things a system administrator does. It is important to decide what data

More information

Program Structure I. Steven M. Bellovin November 8,

Program Structure I. Steven M. Bellovin November 8, Program Structure I Steven M. Bellovin November 8, 2016 1 Program Structure We ve seen that program bugs are a major contributor to security problems We can t build bug-free software Can we build bug-resistant

More information

Main Memory and the CPU Cache

Main Memory and the CPU Cache Main Memory and the CPU Cache CPU cache Unrolled linked lists B Trees Our model of main memory and the cost of CPU operations has been intentionally simplistic The major focus has been on determining

More information

Beyond Petascale. Roger Haskin Manager, Parallel File Systems IBM Almaden Research Center

Beyond Petascale. Roger Haskin Manager, Parallel File Systems IBM Almaden Research Center Beyond Petascale Roger Haskin Manager, Parallel File Systems IBM Almaden Research Center GPFS Research and Development! GPFS product originated at IBM Almaden Research Laboratory! Research continues to

More information

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) Protocols precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level) all packets shipped from network to network as IP packets

More information

Secure Shell Commands

Secure Shell Commands Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see

More information

RH033 Red Hat Linux Essentials

RH033 Red Hat Linux Essentials RH033 Red Hat Linux Essentials Version 3.5 QUESTION NO: 1 You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to

More information

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang

CS155b: E-Commerce. Lecture 3: Jan 16, How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang CS155b: E-Commerce Lecture 3: Jan 16, 2001 How Does the Internet Work? Acknowledgements: S. Bradner and R. Wang Internet Protocols Design Philosophy ordered set of goals 1. multiplexed utilization of existing

More information

IP : Internet Protocol

IP : Internet Protocol 1/20 IP : Internet Protocol Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: July 30, 1999 Agenda 2/20 IP functions IP header format Routing architecture IP layer 3/20 defines

More information

Computer Communication Networks Midterm Review

Computer Communication Networks Midterm Review Computer Communication Networks Midterm Review ICEN/ICSI 416 Fall 2018 Prof. Aveek Dutta 1 Instructions The exam is closed book, notes, computers, phones. You can use calculator, but not one from your

More information

SyncBreeze FILE SYNCHRONIZATION. User Manual. Version Dec Flexense Ltd.

SyncBreeze FILE SYNCHRONIZATION. User Manual. Version Dec Flexense Ltd. SyncBreeze FILE SYNCHRONIZATION User Manual Version 10.3 Dec 2017 www.syncbreeze.com info@flexense.com 1 1 SyncBreeze Overview...3 2 SyncBreeze Product Versions...5 3 Product Installation Procedure...6

More information

Scalability, Performance & Caching

Scalability, Performance & Caching COMP 150-IDS: Internet Scale Distributed Systems (Spring 2015) Scalability, Performance & Caching Noah Mendelsohn Tufts University Email: noah@cs.tufts.edu Web: http://www.cs.tufts.edu/~noah Copyright

More information

UMSSIA INTRUSION DETECTION

UMSSIA INTRUSION DETECTION UMSSIA INTRUSION DETECTION INTRUSION DETECTION Sensor1 Event1, Event2 Monitor No intrusion M SensorN Event1, Event2 Alarm! IDS CHARACTERISTICS Characteristics an IDS can be classified/evaluated by: Type

More information

Using the Backup module

Using the Backup module Using the Backup module THIS WIKI HAS BEEN UPDATED FOR VERSION 13 OF YOUR PBX GUI. Overview Logging In Menu Items Backups Restores Servers Templates Backup Settings Backup Name Description Status Email

More information

Introduction to High Performance Parallel I/O

Introduction to High Performance Parallel I/O Introduction to High Performance Parallel I/O Richard Gerber Deputy Group Lead NERSC User Services August 30, 2013-1- Some slides from Katie Antypas I/O Needs Getting Bigger All the Time I/O needs growing

More information

Managing Caching Performance and Differentiated Services

Managing Caching Performance and Differentiated Services CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service

More information

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February

Practical Magic with SSH. By David F. Skoll Roaring Penguin Software Inc. 1 February Practical Magic with SSH By David F. Skoll Roaring Penguin Software Inc. 1 February 2001 http://www.roaringpenguin.com dfs@roaringpenguin.com Overview of Presentation Why SSH? Problems with Telnet & Friends

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

Internet Protocol and Transmission Control Protocol

Internet Protocol and Transmission Control Protocol Internet Protocol and Transmission Control Protocol CMSC 414 November 13, 2017 Internet Protcol Recall: 4-bit version 4-bit hdr len 8-bit type of service 16-bit total length (bytes) 8-bit TTL 16-bit identification

More information

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows

More information

Ftp Get Command Line Windows 7 Boot Into >>>CLICK HERE<<<

Ftp Get Command Line Windows 7 Boot Into >>>CLICK HERE<<< Ftp Get Command Line Windows 7 Boot Into ftp_ put FileToUpload.zip 200 PORT command successful. 150 Opening BINARY mode data connection for FileToUpload.zip 226 Transfer complete. ftp: 106. In DOS or command

More information

TCP/IP Transport Layer Protocols, TCP and UDP

TCP/IP Transport Layer Protocols, TCP and UDP TCP/IP Transport Layer Protocols, TCP and UDP Learning Objectives Identify TCP header fields and operation using a Wireshark FTP session capture. Identify UDP header fields and operation using a Wireshark

More information

File Systems. Before We Begin. So Far, We Have Considered. Motivation for File Systems. CSE 120: Principles of Operating Systems.

File Systems. Before We Begin. So Far, We Have Considered. Motivation for File Systems. CSE 120: Principles of Operating Systems. CSE : Principles of Operating Systems Lecture File Systems February, 6 Before We Begin Read Chapters and (File Systems) Prof. Joe Pasquale Department of Computer Science and Engineering University of California,

More information

LECTURE 7. Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH. Marco Spaziani Brunella, Manuel Campo

LECTURE 7. Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH. Marco Spaziani Brunella, Manuel Campo LECTURE 7 Readings: - SSH: The Definitive Guide; D.J. Barret et al.; O Reilly Lecture outline: - SSH Remote Managing In real life, physical access to network nodes is not always an option. Often, we need

More information