7 Distributed File Systems
|
|
- Nathaniel Patterson
- 5 years ago
- Views:
Transcription
1 Single tree /etc Global File system /progs Drives mounted over the network to create a single tree /user /sys Network Forest of drives 7 Distributed File Systems C: D: E: F: Drives mounted over the network to a forest of drives
2 7.1 Advantages of distributing files Many users can have access to a single source of information. Several copies of the same information can be stored, and when any one of them is updated they are synchronized to keep each of them up-to-date. Users can have access to a local copy of data, rather than accessing a remote copy of it. Large file systems can be built from a network of connected disk drives. Administrators can easily view the complete file system. Interlinking of databases to create large databases, which can be configured for a given application.
3 7.2 Distributed File Systems Administration services Mounted as a local drive Localized File storage (rather than accessing a remote file) Networked file system (NFS) Network Distributed databases Centralized Configuration (passwords, user IDs, and so on)
4 7.3 Tree or Forest Single tree /etc Global File system /progs Drives mounted over the network to create a single tree /user /sys Forest of drives C: D: E: F: Network Drives mounted over the network to a forest of drives
5 7.4 Advantages of global file system The structure of the file system, and the drives that are mounted are transparent to the user. As far as the user is concerned the complete file system is viewable. Every user can view the complete file system, if required. The file system is consistent around the network, and can be setup on a per computer basis.
6 7.5 Advantages of forest of disks It is easier to determine if the remote drive is mounted, as it will appear as a mounted resource. With a single tree it is often difficult to determine if a drive is loaded onto the global file system as the basic structure still exists. Less complex than a global file, and easier to mount drives, but can become complex to setup if there are many remote drives to be mounted.
7 7.6 Data representation (XDR format) Problems with data representation: different number of bits used to store data type and different methods of storing (Little-endian where least-significant byte is stored last - Intel architecture, and big-endian where the leastsignificant byte is store first - Motorola architecture). Four standard formats: Unsigned and signed integer, single-precision floating point, double-precision floating point and strings. Signed format uses 2 s complement, floating point uses IEEE format (1 sign bit, eight bits for the exponent and 23 bits of the base-2 fractional part).
8 7.7 NDS and OSI model GetAttr() SetAttr() Application NIS NFS Presentation Session Transport Network Data link Physical XDR RPC TCP IP Ethernet/ Token ring String integer floating-point Nfs (100003) Read() Write() Create() Remove() Rename() Link() SymLink() MkDir() RmDir() ReadDir()
9 NFS server Remotely accessed file system RPC procedures getattr, setattr, read, write, create, remove, rename, link, symlink, mkdir, rmdir, readdir File system either mounted onto a single tree or as a forest of drives Network RPC response Requested data, parameters or status flag (such as: NFS_OK and NFSERR_PERM) NFS client
10 7.9 NIS (Network Information Services) Allows for centralized configuration of system configuration files. Supports a client-server architecture, with the use of primary and secondary NIS severs. Keeps centralized copies of important files, such as: password file (for storing passwords). groups file (for group information). hosts file (for DNS information) and so on. rpc file. services file.
11 7.10 NIS Clients #/etc/protocols #/etc/protocols ip 0 IP ip 0 IP icmp 1 ICMP icmp 1 ICMP ggp 3 GGP ggp 3 GGP tcp 6 TCP tcp 6 TCP Server NIS Domain Master NIS server maintains: /etc/passwd Domain passwords /etc/groups Domain groups /etc/hosts IP addresses and host names /etc/rpc RPC processes /etc/network Used to map IP address to networks /etc/protocols Known network layer protocols /etc/services Known transport layer protocols #/etc/hosts #/etc/groups #/etc/hosts #/etc/groups bath root::0:root bath root::0:root compuserve other::1:root,hpdb compuserve other::1:root,hpdb niss bin::2:root,bin niss bin::2:root,bin hensa sys::3:root,uucp hensa sys::3:root,uucp janet freds_grp::4:fred,fred2,fred janet freds_grp::4:fred,fred2,fred3 #/etc/passwd #/etc/passwd root:fdec6.32:1:0:super unser:/user:/bin/csh root:fdec6.32:1:0:super unser:/user:/bin/csh fred:jt.06hldisdaa:2:4:fred Blogs:/user/fred:/bin/csh fred:jt.06hldisdaa:2:4:fred Blogs:/user/fred:/bin/csh fred2:jty067sdisfaa:3:4:fred Smith:/user/fred2:/bin/csh fred2:jty067sdisfaa:3:4:fred Smith:/user/fred2:/bin/csh #/etc/services #/etc/services #/etc/networks ftp 21/tcp #/etc/networks #/etc/rpc ftp 21/tcp loopback #/etc/rpc telnet 23/tcp loopback portmapper portmap sunrpc telnet 23/tcp localnet portmapper portmap sunrpc smtp 25/tcp localnet rstatd rstat rstat_svc smtp 25/tcp Production rstatd rstat rstat_svc pop3 110/tcp Production rusersd rusers pop3 110/tcp rusersd rusers nfs nfsprog nfs nfsprog ypserv ypprog ypserv ypprog
12 Master NIS Server maintains: /etc/passwd /etc/groups /etc/hosts /etc/rpc /etc/network /etc/protocols /etc/services and so on. Master sends updates to NIS slaves Slave NIS server
13 The superuser then logs into the client and creates a mount point /win (empty directory). % mkdir /mnt The remote directory can then be mounted with: % mount miranda:/user /win NFS maintains the file /etc/mnttab which contains a record of the mounted file systems. The general format is: special_file_name dir type opts freq passno mount_time cnode_id where mount_time contains the time the file system was mounted using mount. Sample contents of /etc/mnttab could be: /dev/dsk/c201d6s0 / hfs defaults /dev/dsk/c201d5s0 /win hfs defaults castor:/win /net/castor_win nfs rw,suid miranda:/win /net/miranda_win nfs rw,suid spica:/usr/opt /opt nfs rw,suid triton:/win /net/triton_win nfs rw,suid In this case there are two local drivers (/dev/dsk/c201d6s0 is mounted as the root directory and /dev/dsk/c201d5s0 is mounted locally as /win). There are also four remote directories which are mounted from remote servers (castor, miranda, spica and triton). The directory mounted from castor is the /win directory and it is mounted locally as /net/castor_win. hfs defines a UNIX format disk and nfs defines that the disk is mounted over NFS.
14 7.13 Daemons biod which is asynchronous block I/O daemons for NFS clients. inetd which is an Internet daemon that listens to service ports. It listens for service requests and calls the appropriate server. The server it calls depends on the contents of the /etc/inetd.conf file. nfsd which is the NFS server daemon. It is used by the client for reading and writing to a remote directory and it sends a request to the remote server nfsd process. pcnfsd which is a PC user authentication daemon. portmap which is an RPC program to port number conversion daemon. When a client makes an RPC call to a given program number, it first contacts portmap on the server node to determine the port number where RPC requests should be sent.
15 Inetd.conf # <service_name> <sock_type> <proto> <flags> <user> <server_path> <args> # # Echo, discard and daytime are used primarily for testing. echo stream tcp nowait root internal echo dgram udp wait root internal discard stream tcp nowait root internal discard dgram udp wait root internal daytime stream tcp nowait root internal daytime dgram udp wait root internal time dgram udp wait root internal # # These are standard services. ftp stream tcp nowait root /usr/sbin/tcpd /usr/sbin/wu.ftpd telnet stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.telnetd # # Shell, login, exec and talk are BSD protocols. shell stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.rshd login stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.rlogind #exec stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.rexecd talk dgram udp wait root /usr/sbin/tcpd /usr/sbin/in.ntalkd ntalk dgram udp wait root /usr/sbin/tcpd /usr/sbin/in.ntalkd # # Pop mail servers pop3 stream tcp nowait root /usr/sbin/tcpd /usr/sbin/in.pop3d
Networking Operating Systems (CO32010)
Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling Objectives: To discuss the advantages of a distributed file system. To outline the different methods of mounting
More informationPreface to the First Edition Preface to the Second Edition Acknowledgments UNIX Operating System Environment p. 1 UNIX: Past and Present p.
Preface to the First Edition p. xv Preface to the Second Edition p. xvii Acknowledgments p. xix UNIX Operating System Environment p. 1 UNIX: Past and Present p. 2 History and Growth of UNIX p. 2 Flavors
More informationLINUX ADMINISTRATION TYBSC-IT SEM V
1 LINUX ADMINISTRATION TYBSC-IT SEM V 2 UNIT 4 CHAPTER 1 : INTERNET SERVICES WHAT IS AN INTERNET SERVICE? Internet Service can be defined as any service that can be accessed through TCP/IP based networks,
More informationChapter 3: Client-Server Paradigm and Middleware
1 Chapter 3: Client-Server Paradigm and Middleware In order to overcome the heterogeneity of hardware and software in distributed systems, we need a software layer on top of them, so that heterogeneity
More informationRFC RFC. Configuring FTP Server. FTP Clients
RFC slide 1 RFC slide 2 as a network manager it is important to understand some of the subtle issues within networking within the TCP/IP suite of protocols including: TCP, UDP, IP, SNMP, ICMP, SMTP, FTP,
More informationTELE 301 Lecture 8: Post
Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the
More informationSRT210. The Pragmetic art of Administration. NIS Server. Raymond Chan
1 SRT210 The Pragmetic art of Administration NIS Server Raymond Chan Seneca College of Applied Technology School of Information & Communications Technology 2 What is NIS? A Name Service developed by Sun
More informationNetworking Operating Systems (CO32010)
Networking Operating Systems (CO32010) 3.1 Introduction 3.2 Interprocess communication 3.3 Flags and semaphores 3.4 RPC 3.5 Multi-processor systems 1. Operating Systems 3.6 Exercises 6. Routers 7. Encryption
More informationRPC Paradigm. Lenuta Alboaie Andrei Panu
RPC Paradigm Lenuta Alboaie (adria@info.uaic.ro) Andrei Panu (andrei.panu@info.uaic.ro) 1 Content Remote Procedure Call (RPC) Preliminaries Characteristics XDR (External Data Representation) Functioning
More informationSMB. / / 80-. /,,,, /scalability/ mainframe. / . ",,!. # $ " fail sharing,,. % ,,. " 90-, 12, /.! database.! /DBMS/.
/ 1980 / 80- / /scalability/ mainframe /! "! # $ " fail sharing %! " 90-!! 12! /! database! /DBMS/ /!! RPC SQL "!/file sharing/!-!- "!! - / SMB SMB Server Message Block!! named pipes /& ! / mailslots /
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration Daemons init cron and atd inetd and xinetd Kernel daemons File service daemons Internet daemons Time synchronization daemons Booting and configuration daemons
More informationXinted. 1.1 Brief introduction. 1.2 Configuration of Xinetd
Xinted 1.1 Brief introduction Xinetd provides visiting control, improved log function and resource management. It is standard super guardian process of Internet in Asianux 2.0 system. Inetd is called super
More informationRemote Procedure Calls, TLI, STREAMS
Remote Procedure Calls, TLI, STREAMS 13 RPC, TLI, STREAMS Hannes Lubich, 2003 2005 Page 1 Goals of this Lecture Understand the design of remote procedure calls in general and the design and programming
More information14. Configuring Telnet in Knoppix
14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix
More informationProcesses and Daemons
Processes and Daemons Fundamentally, kernels provide a few logical constructs that mediate access to either real or virtual resources. The two most important in Unix are processes and filesystems. You
More informationCCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal
More informationBOOTP. 1. Verify that the bootpd and bootptab files are in the correct. 2. Edit the hosts file to add the printer internet addresses and names:
BOOTP Bootstrap protocol, BOOTP, is the recommended way to establish communications from the host to the printer in an internet protocol environment. BOOTP obtains booting data from the bootptab file.
More informationSystem Programming. Introduction to computer networks
Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer
More informationHP HP-UX Networking and Security. Download Full Version :
HP HP0-094 HP-UX Networking and Security Download Full Version : https://killexams.com/pass4sure/exam-detail/hp0-094 QUESTION: 168 In order to restrict the access to the /etc/passwd file through ftp, which
More informationIntroduction to the Network File System (NFS)
Introduction to the Network File System (NFS) What was life like before NFS? Introduction to the Network File System (NFS) NFS is built on top of: UDP - User Datagram Protocol (unreliable delivery) Introduction
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationNetwork: infrastructure (hard/software) that enables endpoints (hosts) to communicate
221 7 (Inter)Networking Network: infrastructure (hard/software) that enables endpoints (hosts) to communicate Internetwork: system of two or more networks (segments), connected via gateways, which enables
More informationNFS Design Goals. Network File System - NFS
Network File System - NFS NFS Design Goals NFS is a distributed file system (DFS) originally implemented by Sun Microsystems. NFS is intended for file sharing in a local network with a rather small number
More informationDistributed File Systems: Design Comparisons
Distributed File Systems: Design Comparisons David Eckhardt, Bruce Maggs slides used and modified with permission from Pei Cao s lectures in Stanford Class CS-244B 1 Other Materials Used 15-410 Lecture
More informationITEM Y N N/A 1. ACCOUNT ADMINISTRATION 2. SYSTEM ADMINISTRATION
1. ACCOUNT ADMINISTRATION All users have strong, non-obvious passwords) Every user has a unique account No users have the same user ID Every default account s password has been changed All guest accounts
More informationProcesses and Daemons
Processes and Daemons Fundamentally, kernels provide a few logical constructs that mediate access to either real or virtual resources. The two most important in Unix are processes and filesystems. You
More informationTCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER
CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a
More informationUnix Security Guidelines This document is a general overview of the security considerations for a Unix based server implementation.
Unix Security Guidelines This document is a general overview of the security considerations for a Unix based server implementation. Table of Contents Password Security...1 Account Security...1 Software
More informationSymbolics Network File System (NFS) User s Guide. Introduction to Symbolics Network File System (NFS)
Symbolics Network File System (NFS) User s Guide Introduction to Symbolics Network File System (NFS) Symbolics NFS is a user-transparent remote file access protocol. Symbolics NFS is a fully symmetrical
More informationRemote Procedure Call
Remote Procedure Call Outline Concept of RPC SunRPC Spring 2009 CSE30264 1 RPC Timeline Server Request Blocked Blocked Reply Computing Blocked Spring 2009 CSE30264 2 RPC There exists a way for processes
More informationLecture 12 RPC RPC RPC. Writing an RPC Program. Sun RPC RPC. February 9+11, 2005
RPC Lecture 12 RPC February 9+11, 2005 Remote Procedure Call Follows application-oriented approach (emphasizes problem over communication) Design program and then divide it. RPC RPC There exists a way
More informationOPERATING SYSTEMS LINUX
OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code
More informationINSE 6130 Operating System Security
INSE 6130 Operating System Security Secure Booting Prof. Lingyu Wang 1 Overview AEGIS: Secure Bootstrap Architecture TPM: Trusted Platform Module 2 1 The Problem All security controls are initiated by...
More informationAddresses, Protocols, and Ports Reference
APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types
More informationDistributed Systems 8. Remote Procedure Calls
Distributed Systems 8. Remote Procedure Calls Paul Krzyzanowski pxk@cs.rutgers.edu 10/1/2012 1 Problems with the sockets API The sockets interface forces a read/write mechanism Programming is often easier
More informationOPERATING SYSTEMS. Božo Krstajić, PhD, University of Montenegro Podgorica.
OPERATING SYSTEMS Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu 1 The /etc/rc.d directory The system initialization files are stored in the /etc/rc.d directory. Each task or runlevel
More informationToday: Distributed File Systems. File System Basics
Today: Distributed File Systems Overview of stand-alone (UNIX) file systems Issues in distributed file systems Next two classes: case studies of distributed file systems NFS Coda xfs Log-structured file
More informationNetwork File System (NFS)
Network File System (NFS) slide 1 References: Douglas Comer, Internetworking with TCP/IP, p430-432 Simson Garfinkel and Gene Spafford, Practical UNIX and Internet Security, p605-631 NFS is used by GNU/Linux
More informationToday: Distributed File Systems
Today: Distributed File Systems Overview of stand-alone (UNIX) file systems Issues in distributed file systems Next two classes: case studies of distributed file systems NFS Coda xfs Log-structured file
More informationServices and Security
Services and Security Find out what's listening to the net Find out what services are running Find out what they do Disable or remove any that you don't need References http://techrepublic.com.com/5100-6270-1053043.html
More informationNetwork File System. Network File System (NFS) NFS Advantages. Network File System Disadvantages
Network File System (NFS) slide 1 Network File System slide 2 References: Douglas Comer, Internetworking with TCP/IP, p430-432 Simson Garfinkel and Gene Spafford, Practical UNIX and Internet Security,
More informationNetworking Operating Systems (CO32010)
Networking Operating Systems (CO32010) 1. Operating Systems Objectives: 2. Processes To To outline outline the the usage usage of of the the three three main main NOS s: NOS s: NT/2000, UNIX UNIX and and
More informationCL030 is a csage Certification Preparatory Course!
Corder Enterprises International Building World Class MIS Teams, for you! CL030 is a csage Certification Preparatory Course! CL030 - LINUX System Administration Course Description: Learn and practice essential
More informationIntroduction to the Network File System (NFS)
Introduction to the Network File System (NFS) What was life like before NFS? Introduction to the Network File System (NFS) NFS is built on top of: UDP - User Datagram Protocol (unreliable delivery) XDR
More informationInterconnecting Networks with TCP/IP
Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol
More informationInternet Systems Programming
Internet Systems Programming NFS: Protocols, Programming, and Implementation Erez Zadok ezk@cs.columbia.edu October 25, 1999 The BIG Picture portmap biod mountd lockd nfsd /etc/exports /etc/rmtab nfsd_read()
More informationLecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.
Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1
More informationTCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1
TCP/IP Overview Basic Networking Concepts 09/14/11 Basic TCP/IP Networking 1 What is TCP/IP? TCP/IP is a name refers to an entire collection of data communication protocols: TCP: Transmission Control Protocol
More informationProcesses are subjects.
Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions
More informationTCP, UDP Ports, and ICMP Message Types1
Appendix A APPENDIX A TCP, UDP Ports, and ICMP Message Types1 I list useful TCP, UDP ports, and ICMP message types in this appendix. A comprehensive list of registered TCP and UDP services may be found
More informationCS 716: Introduction to communication networks th class; 11 th Nov Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 24 th class; 11 th Nov 2011 Instructor: Sridhar Iyer IIT Bombay Layering: physical communication data application transport network link physical application
More informationThe Internet: what it looks like, how it works, and how it is abused
The Internet: what it looks like, how it works, and how it is abused Bill Cheswick ches@cheswick.com Visiting Scholar, University of Pennsylvania 1 What Does the Internet Look Like? 2 Science Seminar 3
More informationEXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!
EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : 3X0-103 Title : Linux Networking (Level 1) Version
More informationLayer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers
Layer 4: UDP, TCP, and others based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers Concepts application set transport set High-level, "Application Set" protocols deal only with how handled
More informationLayering in Networked computing. OSI Model TCP/IP Model Protocols at each layer
Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand
More informationCluster Computing Spring 2004 Paul A. Farrell 4/25/2006. Dept of Computer Science Kent State University 1. Configuring & Tuning Cluster Networks
Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Network Designs Impact of Network Design Security from outside attack Usability
More informationSun RPC ALG Support for Firewalls and NAT
The feature adds support for the Sun Microsystems remote-procedure call (RPC) application-level gateway (ALG) on the firewall and Network Address Translation (NAT). Sun RPC is an application layer protocol
More informationSun RPC ALG Support for Firewalls and NAT
The feature adds support for the Sun Microsystems remote-procedure call (RPC) application-level gateway (ALG) on the firewall and Network Address Translation (NAT). Sun RPC is an application layer protocol
More informationTcpdump. For this exercise you must again be root. Login and obtain root privileges: Note that we use three computers for this exercise.
1 For this exercise you must again be root. Login and obtain root privileges: sudo su Note that we use three computers for this exercise. C S H 2 Create an account on the server that can be used from the
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationTCP Wrapper. Provides host-based access control to network services
1 TCP Wrapper Provides host-based access control to network services It has the following features: Logging Access Control Host Name Verification User Name Verification Spoofing Protection 2 TCP Wrapper
More informationUnit 17 Networking overview
Unit 17 Networking overview Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 5.1 Unit objectives After completing this unit, you should be able to:
More informationDistributed File Systems
Distributed File Systems Sun Network File System Overview Communication Processes Naming Synchronization Caching and replication Fault tolerance Security 1 Sun NFS Widely used Mostly among Unix systems
More informationNetwork Review TEJ4M. SBrace
Network Review TEJ4M SBrace Example of how the OSI Layers work using an e-mail sent from the computer on the left. Email sent from John: Meet me at Carl s 1:30 John Identify sender and intended receiver;
More informationContext Based Access Control (CBAC): Introduction and Configuration
Context Based Access Control (CBAC): Introduction and Configuration Document ID: 13814 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information What Traffic Do
More informationECE4110 Internetwork Programming. Introduction and Overview
ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?
More informationnetcat Johannes Franken
netcat Johannes Franken On this page I show example uses of netcat - a command line tool to create network connections over tcp or udp. Contents 1. Intended purpose 2. Usage as client
More informationConfiguration Examples
CHAPTER 4 Before using this chapter, be sure that you have planned your site s security policy, as described in Chapter 1, Introduction, and configured the PIX Firewall, as described in Chapter 2, Configuring
More informationTroubleshooting TFTP Problems on Resource Manager Essentials
Troubleshooting TFTP Problems on Resource Manager Essentials Document ID: 18246 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring Configuration Archive for TFTP as
More informationStatus of the Linux NFS client
Status of the Linux NFS client Introduction - aims of the Linux NFS client General description of the current status NFS meets the Linux VFS Peculiarities of the Linux VFS vs. requirements of NFS Linux
More informationOSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK
OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards
More informationNetwork-based File Sharing (1)
Samba Let s Dance! Network-based File Sharing (1) NFS (UNIX-based) mountd is responsible for mount request nfsd and nfsiod Based on RPC CIFS (Microsoft) Common Internet File System 網路芳鄰 SMB (Server Message
More informationToday CSCI Communication. Communication in Distributed Systems. Communication in Distributed Systems. Remote Procedure Calls (RPC)
Today CSCI 5105 Communication in Distributed Systems Overview Types Remote Procedure Calls (RPC) Instructor: Abhishek Chandra 2 Communication How do program modules/processes communicate on a single machine?
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationLinux Kung Fu. Stephen James UBNetDef, Spring 2017
Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and
More informationComputer Network Programming. The Transport Layer. Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University
Computer Network Programming The Transport Layer Dr. Sam Hsu Computer Science & Engineering Florida Atlantic University The Transport Layer The Big Picture Overview of TCP/IP protocols TCP Packet Exchanges
More informationPart Four - Storage Management. Chapter 10: File-System Interface
Part Four - Storage Management Chapter 10: File-System Interface Chapter 10: File-System Interface 10.1 File Concept 10.2 Access Methods 10.3 Directory and Disk Structure 10.4 File-System Mounting 10.5
More informationChapter 11: File-System Interface
Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013 Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection
More informationVB Socket Visual Basic socket implementation
10 VB Socket. 10.1 Visual Basic socket implementation Visual Basic support a WinSock control which allows the connection of hosts over a network. It supports both UDP and TCP. Figure 10. shows a sample
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationDefining Networks with the OSI Model. Module 2
Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the
More informationFoundations of Python
Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the
More informationLinux Networking: network services
Linux Networking: network services David Morgan Client and server: matched pairs Client process inter-process communication Server process 1 OK as long as there s a way to talk Client process Server process
More informationOSI Model with Protocols. Layer Name PDU Address Protocols Device
NetEss Name: Networking Essentials Prof. CHIN OSI Model with Protocols Layer Name PDU Address Protocols Device 7 Application Data FTP, SSH, Telnet, SMTP, DNS TFTP,HTTP, POP3, IMAP, HTTPS 6 Presentation
More informationChapter -4 OSI Reference Model
Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces
More information1 of 5 5/19/05 9:48 AM
1 of 5 5/19/05 9:48 AM "Well Known" TCP and UDP Ports Used By Apple Software Products This document lists TCP and UDP ports used by Apple software products, such as Mac OS 9, Mac OS X, Mac OS X Server,
More informationCluster Computing Spring 2004 Paul A. Farrell
Configuring & Tuning Cluster Networks Node connectivity Node visibility Networking Services Security Performance Enhancement Internet Protocol Stack and Parameters NIC/OS Driver Maximum Amount of Data
More information10 Defense Mechanisms
SE 4C03 Winter 2006 10 Defense Mechanisms Instructor: W. M. Farmer Revised: 23 March 2006 1 Defensive Services Authentication (subject, source) Access control (network, host, file) Data protection (privacy
More informationITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!
ITCertMaster Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! Exam : HP0-A02 Title : HP-UX 11i v3 Advanced System Administration Vendors : HP Version : DEMO Get Latest
More informationOutline. EEC-681/781 Distributed Computing Systems. The OSI Network Architecture. Inter-Process Communications (IPC) Lecture 4
EEC-681/781 Distributed Computing Systems Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Inter-process communications Computer networks
More informationThe Client Server Model and Software Design
The Client Server Model and Software Design Prof. Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Taipei, TAIWAN MCSE Lab, NTUT, TAIWAN 1 Introduction
More informationTransport Layer (TCP/UDP)
Transport Layer (TCP/UDP) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Recall Transport layer provides
More informationAdvanced Network and System Administration
Advanced Network and System Administration NFS Copyright@2009, HaiVDC 1 Topics 1. NFS Versions 2. Using NFS 3. NFS Services 4. Server and Client Configuration 5. Automounter 6. Security 7. Performance
More informationSoftware Engineering 4C03 Answer Key
Software Engineering 4C03 Answer Key DAY CLASS Dr. William M. Farmer DURATION OF EXAMINATION: 2 Hours MCMASTER UNIVERSITY FINAL EXAMINATION April 2002 (1) [2 pts.] Conventional encryption cannot be used
More informationThe Network File System
The Network File System NFS Share filesystem to other hosts via network NFS History Introduced by Sun Microsystems in 1985 Originally designed for diskless client-server architecture 2 Components of NFS
More informationMailman. Fetchmail and NT (ems3) Mailman. Fetchmail script. handles mailing lists web based and based
Fetchmail and NT (ems3) slide 1 Mailman slide 2 University mail server isems3 auser joe has an account jbloggs on corporate also maintains a film mailing list requires three accounts film@glam.ac.uk: post
More informationProject #4: Implementing NFS
Project #4: Implementing NFS Distributed File Systems NFS Ports and Network Conversations Destination and Return Ports RPC-based Services Configuring Server Daemons /etc/exports autofs Sharing home directories
More informationInterconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1
Interconnecting Networks with TCP/IP 2000, Cisco Systems, Inc. 8-1 Objectives Upon completion of this chapter you will be able to perform the following tasks: Identify the IP protocol stack, its protocol
More informationLecture 08: Networking services: there s no place like
Lecture 08: services: there s no place like 127.0.0.1 Hands-on Unix system administration DeCal 2012-10-15 1 / 22 About Common records Other records 2 / 22 About About Common records Other records Domain
More informationLast Class: RPCs. Today:
Last Class: RPCs RPCs make distributed computations look like local computations Issues: Parameter passing Binding Failure handling Lecture 4, page 1 Today: Case Study: Sun RPC Lightweight RPCs Remote
More information