Chapter 5 Naming. Names, Identifiers, and Addresses
|
|
- Winfred Boone
- 5 years ago
- Views:
Transcription
1 Chapter 5 Naming 1 Names, Identifiers, and Addresses In a distributed system, a name is used to refer to an entity (e.g., computer, service, remote object, file, user) An address is a name that refers to an access point of an entity E.g. a server s address consists of an IP address and a port number An entity may have multiple access points and addresses E.g., a person has several phone numbers (e.g. work, home, mobile) An entity may change its access points E.g., a service is moved to a different host, a person changes its address after changing his job Identifiers are used to uniquely identify an entity; an identifier is a name with the following properties An identifier refers to at most one entity Each entity is referred to by at most one identifier An identifier always refers to the same entity (i.e., it is never reused) 2 1
2 Naming Systems A naming system maintains a name toaddress binding to resolve names to addresses In a distributed system, the implementation of a naming system is often distributed across multiple machines We will study two classes of naming systems Flat Naming: resolving identifiers to addresses Structured Naming: resolving human friendly names to addresses 3 Flat Naming Each entity is assigned an identifier that uniquely identifies the entity Identifiers are fixed length bit strings, which we refer to as flat names (or unstructured names) Flat names can be efficiently handled by machines E.g., IP addresses, Ethernet addresses How to resolve an identifier to the address of the associated entity? We will study how identifiers are resolved in Chord 4 2
3 Name Resolution in Chord Every node is assigned a random m bit identifier Every data item is assigned a unique m bit key Data item with key k is managed by the node with the smallest identifier id k, denoted as succ(k) Each node p maintains a finger table with m entries, value of the i th entry is FT p [i]=succ(p+2 i 1 ) To look up a key k, a node p performs the following If p is responsible for k, then return the address of node p If p < k < FT p [1], then forward the request to FT p [1] If FT p [j] k < FT p [j+1], then forward the request to node q = FT p [j] A lookup requires O(logN) steps, where N is the number of nodes in the system 5 m=5 Resolving key 26 from node 1 and key 12 from node 28 in a Chord system. 6 3
4 Structured Naming Flat names are difficult for humans to remember Structured names are composed of several parts; these names are human friendly Example: file names, Internet host names How to locate an entity given its structured name? We will study two examples: file name resolution and host name resolution in the Internet (DNS) 7 Name Spaces for File Names File names are organized into a name space, which is represented by a labeled directed graph with two types of nodes A leaf node represents a file and stores information about the file (e.g., owner, last modification time, location of data blocks, etc.) A directory node represents a file directory and stores a directory table of (edge label, node ID) pairs A naming graph with a single root node. 8 4
5 Path Names A path name is used to refer to a node in the naming graph A path name is represented by a sequence of edge labels separated by a slash An absolute path name starts from the root node and begins with a slash (e.g., /home/steen/mbox) A relative path name starts from the current working directory and does not begin with a slash (e.g., steen/mbox) 9 Name Resolution Name resolution is the process of locating the node referred to by a given path name Name resolution is performed by traversing the naming graph Resolution of absolute path names starts from the root node Resolution of relative path names starts from the current directory node (e.g., resolution of steen/mbox starts from /home) 10 5
6 Hard Links Some file systems allow multiple absolute path names to refer to the same leaf node, these absolute path names are called hard links to the node E.g., the path names /keys and /home/steen/keys are hard links to node n5 This has the effect of creating multiple names for the same file If the file is opened by one of its names, and changes are made to its content, then the changes will be visible when the file is opened by an alternative name. 11 Symbolic Links A symbolic link is a special type of file that contains a reference to another file or directory in the form of an absolute path name E.g., /home/steen/keys is a symbolic link to node n5 When resolving /home/steen/keys, the path name stored in n6 (i.e., /keys) will be returned, and name resolution continues with resolving that path name 12 6
7 Merging Name Spaces (1) Two names spaces can be merged by mounting one name space into another name space To mount a foreign name space NS2 into a name space NS1, we let a directory node in NS1 (called a mount point) store the identifier of a directory node in NS2 (called a mounting point) During name resolution, the mounting point is looked up and resolution proceeds by accessing its directory table mount point mounting point 13 Merging Name Spaces (2) If the foreign name space is located on a different machine, the mount point must store the following information The name of the access protocol used to communicate with the server of the foreign name space The name of the server of the foreign name space The name of the mounting point in the foreign name space (to be resolved by the server of the foreign name space) 14 7
8 Mounting Remote Name Space in NFS Sun s Network File System (NFS) is a distributed file system that enables clients to access files stored on remote file servers The client can use the name /remote/vu/mbox to access the file /home/steen/mbox on the remote file server 15 8
Naming. Distributed Systems IT332
Naming Distributed Systems IT332 2 Outline Names, Identifier, and Addresses Flat Naming Structured Naming 3 Names, Addresses and Identifiers A name is used to refer to an entity An address is a name that
More informationCSE 5306 Distributed Systems. Naming
CSE 5306 Distributed Systems Naming 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations To access an entity, you have resolve
More informationCSE 5306 Distributed Systems
CSE 5306 Distributed Systems Naming Jia Rao http://ranger.uta.edu/~jrao/ 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations
More informationNaming. Naming. Naming versus Locating Entities. Flat Name-to-Address in a LAN
Naming Naming Tanenbaum Ch. 5 Distributed Software Systems CS 707 A name in a distributed system is a string of bits or characters that is used to refer to an entity Types of names: Address: an access
More information殷亚凤. Naming. Distributed Systems [5]
Naming Distributed Systems [5] 殷亚凤 Email: yafeng@nju.edu.cn Homepage: http://cs.nju.edu.cn/yafeng/ Room 301, Building of Computer Science and Technology Review Concepts about faults How to improve dependability
More informationLecture 4 Naming. Prof. Wilson Rivera. University of Puerto Rico at Mayaguez Electrical and Computer Engineering Department
Lecture 4 Naming Prof. Wilson Rivera University of Puerto Rico at Mayaguez Electrical and Computer Engineering Department Outline Names, identifiers, addresses Flat naming Structured naming Attribute based
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 5 Naming
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 5 Naming Naming Naming and name resolution mechanisms Names, Identifiers, and Addresses Flat Naming
More informationJune Gerd Liefländer System Architecture Group Universität Karlsruhe (TH), System Architecture Group
Distributed Systems 9 Naming June-08-2009 Gerd Liefländer System Architecture Group 1 Overview Schedule of the Week Motivation & Introduction Basic Terms Naming System Flat Naming Hierarchical Location
More informationNaming in Distributed Systems
Naming in Distributed Systems Dr. Yong Guan Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University Outline for Today s Talk Overview: Names, Identifiers,
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Naming WHAT IS NAMING? Name: Entity: Slide 3. Slide 1. Address: Identifier:
BASIC CONCEPTS DISTRIBUTED SYSTEMS [COMP9243] Name: String of bits or characters Refers to an entity Slide 1 Lecture 9a: Naming ➀ Basic Concepts ➁ Naming Services ➂ Attribute-based Naming (aka Directory
More informationToday: Naming. Example: File Names
Today: Naming Names are used to share resources, uniquely identify entities and refer to locations Need to map from name to the entity it refers to E.g., Browser access to www.cnn.com Use name resolution
More informationNew Topic: Naming. Differences in naming in distributed and non-distributed systems. How to name mobile entities?
New Topic: Naming Names are used to share resources, uniquely identify entities and refer to locations Need to map from name to the entity it refers to E.g., Browser access to www.cnn.com Use name resolution
More informationComputing Parable. New Topic: Naming
Computing Parable The Cow Courtesy: S. Keshav Lecture 10, page 1 New Topic: Naming Names are used to share resources, uniquely identify entities and refer to locations Need to map from name to the entity
More informationNew Topic: Naming. Approaches
New Topic: Naming Names are used to share resources, uniquely identify entities and refer to locations Need to map from name to the entity it refers to E.g., Browser access to www.cnn.com Use name resolution
More informationNaming in Distributed Systems
Distributed Systems, WS 2014 Naming in Distributed Systems Hong-Linh Truong Distributed Systems Group, Vienna University of Technology truong@dsg.tuwien.ac.at dsg.tuwien.ac.at/staff/truong DS WS 2014 1
More informationNaming. Naming entities
Naming Naming entities Locating mobile entities Removing unreferenced entities 1 Name: Just a string Naming entities used to denote entity in a system Identifier: Uniquely refers to an entity Each entity
More informationNaming in Distributed Systems
Naming in Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Ingegneria Due Alma Mater Studiorum Università di Bologna a Cesena Academic Year 2010/2011 Andrea
More informationPart Four - Storage Management. Chapter 10: File-System Interface
Part Four - Storage Management Chapter 10: File-System Interface Chapter 10: File-System Interface 10.1 File Concept 10.2 Access Methods 10.3 Directory and Disk Structure 10.4 File-System Mounting 10.5
More informationLecture 11: February 29
CMPSCI 677 Operating Systems Spring 2016 Lecture 11: February 29 Lecturer: Prashant Shenoy Scribe: Lurdh Pradeep Reddy Ambati 11.1 Naming System Names are used to share resources, uniquely identify entities
More informationLast Class: RPCs and RMI. Today: Communication Issues
Last Class: RPCs and RMI Case Study: Sun RPC Lightweight RPCs Remote Method Invocation (RMI) Design issues Lecture 9, page 1 Today: Communication Issues Message-oriented communication Persistence and synchronicity
More informationNaming. Chapter 4. Naming (1) Name resolution allows a process to access a named entity. A naming system is necessary.
Naming Chapter 4 Naming (1) Name resolution allows a process to access a named entity. A naming system is necessary. In a distributed system the naming system is distributed. Naming (2) In a distributed
More informationSystèmes Distribués. Master MIAGE 1. Andrea G. B. Tettamanzi. Université de Nice Sophia Antipolis Département Informatique
Systèmes Distribués Master MIAGE 1 Andrea G. B. Tettamanzi Université de Nice Sophia Antipolis Département Informatique andrea.tettamanzi@unice.fr Andrea G. B. Tettamanzi, 2017 1 CM - Séance 4 Naming (chapitre
More informationChapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories
Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the
More informationNaming. To do. q What s in a name q Flat naming q Structured naming q Attribute-based naming q Next: Content distribution networks
Naming To do q What s in a name q Flat naming q Structured naming q Attribute-based naming q Next: Content distribution networks What's in a name? That which we call a rose By any other name would smell
More informationParallelism. Master 1 International. Andrea G. B. Tettamanzi. Université de Nice Sophia Antipolis Département Informatique
Parallelism Master 1 International Andrea G. B. Tettamanzi Université de Nice Sophia Antipolis Département Informatique andrea.tettamanzi@unice.fr Andrea G. B. Tettamanzi, 2014 1 Lecture 3 Part a Naming
More informationChapter 10: File-System Interface. Operating System Concepts with Java 8 th Edition
Chapter 10: File-System Interface 10.1 Silberschatz, Galvin and Gagne 2009 File Concept A file is a named collection of information that is recorded on secondary storage. Types: Data numeric character
More informationName Services and DNS
In Academic Affiliation with Name Services and DNS Distributed Computer Systems Lecture 3 Module Leader: Mrs. Bobby Rishikesh 1 Contents What is a name service? SNS: A Simple Name Service DNS: Domain Name
More informationPeer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today
Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become
More informationIntroduction to Peer-to-Peer Systems
Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed
More informationGridNFS: Scaling to Petabyte Grid File Systems. Andy Adamson Center For Information Technology Integration University of Michigan
GridNFS: Scaling to Petabyte Grid File Systems Andy Adamson Center For Information Technology Integration University of Michigan What is GridNFS? GridNFS is a collection of NFS version 4 features and minor
More informationDistributed File Systems. Distributed Systems IT332
Distributed File Systems Distributed Systems IT332 2 Outline Introduction Network File System (NFS) 3 File System Basics A file is a named collection of logically related data A file system Provides a
More information9.1 Introduction 9.2 Name services and the DNS 9.3 Discovery services 9.6 Summary
Teaching material based on Distributed Systems: Concepts and Design, Edition 3, Addison-Wesley 2001. Distributed Systems Course Name Services Copyright George Coulouris, Jean Dollimore, Tim Kindberg 2001
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 10: File System Interface Prof. Alan Mislove (amislove@ccs.neu.edu) Contiguous logical address space File Concept Types: Data numeric character
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on
More informationCS6601 DISTRIBUTED SYSTEM / 2 MARK
UNIT III PEER TO PEER SERVICE AND FILE SYSTEM 1. Define Peer-Peer System. Part A - Questions Peer-to-peer system is a paradigm for the construction of distributed system and application in which data and
More informationDistributed File System
Rochester Institute of Technology Distributed File System MS Project Proposal By: Swarup Datta sxd2009@cs.rit.edu Chairman: Dr. Hans-Peter Bischof Reader: Dr. James E. Heliotis 1 of 16 Abstract Ad hoc
More informationCSE325 Principles of Operating Systems. File Systems. David P. Duggan. March 21, 2013
CSE325 Principles of Operating Systems File Systems David P. Duggan dduggan@sandia.gov March 21, 2013 External View of File Manager Application Program mount() write() close() open() lseek() read() WriteFile()
More informationChapter 10: File-System Interface
Chapter 10: File-System Interface Objectives: To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file
More informationChapter 6 Storage Management File-System Interface 11.1
Chapter 6 Storage Management File-System Interface 11.1 Chapter 6: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection 11.2 Objectives
More informationChapter 10: File-System Interface
Chapter 10: File-System Interface Objectives: To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file
More informationChapter 10: File System
Chapter 10: File System Chapter 10: File-System File Concept File attributes, File operations, File types, File structures Access Methods Directory Structure File-System Mounting File Sharing Protection
More informationChord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications
: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide
More informationIMPLEMENTING THE CHORD PEER TO PEER NETWORK
PROGRAMMING ASSIGNMENT 2 IMPLEMENTING THE CHORD PEER TO PEER NETWORK Version 1.0 DUE DATE: Wednesday, September 27 th, 2017 @ 5:00 pm OBJECTIVE The objective of this assignment is to build a simple peer
More informationChapter 11: File-System Interface
Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013 Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection
More informationLecture 10 File Systems - Interface (chapter 10)
Bilkent University Department of Computer Engineering CS342 Operating Systems Lecture 10 File Systems - Interface (chapter 10) Dr. İbrahim Körpeoğlu http://www.cs.bilkent.edu.tr/~korpe 1 References The
More informationAn efficient method to avoid path lookup in file access auditing in IO path to improve file system IO performance
Technical Disclosure Commons Defensive Publications Series March 21, 2017 An efficient method to avoid path lookup in file access auditing in IO path to improve file system IO performance Arun Vishnu P
More informationChapter 5 Naming (2)
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 5 Naming (2) Plan! Definitions and uses! Types of naming!flat (hierarchical) naming!structured
More informationMCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008 Objectives Discuss the basics of the Domain Name System (DNS) and its
More informationTrees. (Trees) Data Structures and Programming Spring / 28
Trees (Trees) Data Structures and Programming Spring 2018 1 / 28 Trees A tree is a collection of nodes, which can be empty (recursive definition) If not empty, a tree consists of a distinguished node r
More informationPersistent key, value storage
Persistent key, value storage In programs, often use hash tables - E.g., Buckets are an array of pointers, collision chaining For persistant data, minimize # disk accesses - Traversing linked lists is
More informationFile System Interface: Overview. Objective. File Concept UNIT-IV FILE SYSTEMS
UNIT-IV FILE SYSTEMS File System Interface: File Concept Access Methods Directory Structure File System Mounting Protection Overview For most users, the file system is the most visible aspect of an operating
More informationChapter 10: File-System Interface. File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection
Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection Objectives To explain the function of file systems To describe the interfaces
More informationConfiguration Export and Import
This chapter includes the following sections:, page 1 From the Export & Import, you can schedule configuration backup for Cisco UCS Central and the registered Cisco UCS Domains. You can schedule export
More informationF 4. Both the directory structure and the files reside on disk Backups of these two structures are kept on tapes
Directory Structure A collection of nodes containing information about all files Directory Files F 1 F 2 F 3 F 4 F n Both the directory structure and the files reside on disk Backups of these two structures
More informationEI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)
EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:
More informationDistributed Naming. EECS 591 Farnam Jahanian University of Michigan. Reading List
Distributed Naming EECS 591 Farnam Jahanian University of Michigan Reading List Tanenbaum Chapter 4.1-4.2, 4.3(optional) Any problem in computer science can be solved with another layer of indirection
More informationChapter 11: File-System Interface
Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013! Chapter 11: File-System Interface File Concept" Access Methods" Directory Structure" File-System Mounting" File Sharing" Protection"
More informationChapter 7: File-System
Chapter 7: File-System Interface and Implementation Chapter 7: File-System Interface and Implementation File Concept File-System Structure Access Methods File-System Implementation Directory Structure
More informationTECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica
TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10), on Thursday, January 25, 2018, from 18.00 to 21.00 hours. Before you start,
More information2-3 Tree. Outline B-TREE. catch(...){ printf( "Assignment::SolveProblem() AAAA!"); } ADD SLIDES ON DISJOINT SETS
Outline catch(...){ printf( "Assignment::SolveProblem() AAAA!"); } Balanced Search Trees 2-3 Trees 2-3-4 Trees Slide 4 Why care about advanced implementations? Same entries, different insertion sequence:
More informationChapter 10: File-System Interface. Operating System Concepts 8 th Edition
Chapter 10: File-System Interface Silberschatz, Galvin and Gagne 2009 Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection 10.2
More informationJob Aid: Creating and Editing a Vendor
Purpose: The purpose of this job aid is to help you create a Vendor in order to process new and recurring Disbursement Vouchers. In this job aid, you will learn about: Timing of Vendor Creation... 1 Creating
More informationDNS Session 2: DNS cache operation and DNS debugging. Joe Abley AfNOG 2006 workshop
DNS Session 2: DNS cache operation and DNS debugging Joe Abley AfNOG 2006 workshop How caching NS works (1) If we've dealt with this query before recently, answer is already in the cache easy! Resolver
More informationAVL Trees. (AVL Trees) Data Structures and Programming Spring / 17
AVL Trees (AVL Trees) Data Structures and Programming Spring 2017 1 / 17 Balanced Binary Tree The disadvantage of a binary search tree is that its height can be as large as N-1 This means that the time
More informationMemory Management. Memory Management
Memory Management Most demanding di aspect of an operating system Cost has dropped. Consequently size of main memory has expanded enormously. Can we say that we have enough still. Swapping in/out. Memory
More informationMarch 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE
for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized
More informationDistributed Systems - III
CSE 421/521 - Operating Systems Fall 2012 Lecture - XXIV Distributed Systems - III Tevfik Koşar University at Buffalo November 29th, 2012 1 Distributed File Systems Distributed file system (DFS) a distributed
More informationChapter 10: File System. Operating System Concepts 9 th Edition
Chapter 10: File System Silberschatz, Galvin and Gagne 2013 Chapter 10: File System File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection 10.2 Silberschatz,
More informationCloud Computing CS
Cloud Computing CS 15-319 Distributed File Systems and Cloud Storage Part II Lecture 13, Feb 27, 2012 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Distributed File Systems and
More informationCS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS
: Computer Networks Lecture 6: Apr 5, 2004 Naming and DNS Any problem in computer science can be solved with another layer of indirection David Wheeler Naming is a layer of indirection What problems does
More informationDistributed System: Definition
2 / 25 Introduction Distributed System: Definition Definition A distributed system is a piece of software that ensures that: a collection of independent computers appears to its users as a single coherent
More informationExpense: Lodge Card Setup Guide
Expense: Lodge Card Setup Guide Setup Guide Applies to these SAP Concur solutions: Expense Professional/Premium edition Standard edition Travel Professional/Premium edition Standard edition Invoice Professional/Premium
More informationFile Systems: Allocation Issues, Naming, and Performance CS 111. Operating Systems Peter Reiher
File Systems: Allocation Issues, Naming, and Performance Operating Systems Peter Reiher Page 1 Outline Allocating and managing file system free space File naming and directories File volumes File system
More informationDistributed Systems Homework 1 (6 problems)
15-440 Distributed Systems Homework 1 (6 problems) Due: November 30, 11:59 PM via electronic handin Hand in to Autolab in PDF format November 29, 2011 1. You have set up a fault-tolerant banking service.
More informationLab 3: Configuration of OIM to manage user accounts lifecycle in DSEE application
OIM 11g Workshop Lab 3 Lab 3: Configuration of OIM to manage user accounts lifecycle in DSEE application Contents Lab 3: Configuration of OIM to manage user accounts lifecycle in DSEE application... 1
More informationCOT 4600 Operating Systems Fall Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM
COT 4600 Operating Systems Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM Lecture 9 Last time: Case study: the Unix file system Today: Modular sharing Metadata and Name Overloading
More informationUNIT III. cache/replicas maintenance Main memory No No No 1 RAM File system n No Yes No 1 UNIX file system Distributed file
UNIT III 1. Enumerate the properties of storage system? Sharing Persistent Distributed Consistency Example cache/replicas maintenance Main memory No No No 1 RAM File system n No Yes No 1 UNIX file system
More informationI.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 10: FILE SYSTEM
I.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 10: FILE SYSTEM Chapter 10: File System File Concept Access Methods Directory Structure File-System Mounting File Sharing
More informationChapter 9 Memory Management
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
More informationLecture 1. Abstraction
Lecture 1 Abstraction 1 Programming Techniques Unstructured Programming Procedural Programming Modular & Structural Programming Abstract Data Type Object-Oriented Programming 2 Unstructured Programming
More informationChapter 13 XML: Extensible Markup Language
Chapter 13 XML: Extensible Markup Language - Internet applications provide Web interfaces to databases (data sources) - Three-tier architecture Client V Application Programs Webserver V Database Server
More informationFile Concept Access Methods Directory and Disk Structure File-System Mounting File Sharing Protection
File Concept Access Methods Directory and Disk Structure File-System Mounting File Sharing Protection File Concepts File Attributes File Operations File Types Internal File Structure A uniform logical
More informationCompilers Project 3: Semantic Analyzer
Compilers Project 3: Semantic Analyzer CSE 40243 Due April 11, 2006 Updated March 14, 2006 Overview Your compiler is halfway done. It now can both recognize individual elements of the language (scan) and
More informationFaculty of Computer Science Institute for System Architecture, Operating Systems Group. Naming. Stefan Kalkowski. Dresden,
Faculty of Computer Science Institute for System Architecture, Operating Systems Group Naming Stefan Kalkowski Dresden, 2007-11-27 So far... Basics: Tasks and Threads Synchronization Memory Communication
More informationFile Systems. File system interface (logical view) File system implementation (physical view)
File Systems File systems provide long-term information storage Must store large amounts of data Information stored must survive the termination of the process using it Multiple processes must be able
More informationRicardo Rocha. Department of Computer Science Faculty of Sciences University of Porto
Ricardo Rocha Department of Computer Science Faculty of Sciences University of Porto Slides based on the book Operating System Concepts, 9th Edition, Abraham Silberschatz, Peter B. Galvin and Greg Gagne,
More informationApplication-layer Protocols
Application-layer Protocols Kai Shen application transport data link physical Network Applications and Application-Layer Protocols application transport data link physical application transport data link
More information1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1
Asymptotics, Recurrence and Basic Algorithms 1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 2. O(n) 2. [1 pt] What is the solution to the recurrence T(n) = T(n/2) + n, T(1)
More informationDomain Name System (DNS) Session 2: Resolver Operation and debugging. Joe Abley AfNOG Workshop, AIS 2017, Nairobi
Domain Name System (DNS) Session 2: Resolver Operation and debugging Joe Abley AfNOG Workshop, AIS 2017, Nairobi DNS Resolver Operation How Resolvers Work (1)! If we've dealt with this query before recently,
More informationCS /15/16. Paul Krzyzanowski 1. Question 1. Distributed Systems 2016 Exam 2 Review. Question 3. Question 2. Question 5.
Question 1 What makes a message unstable? How does an unstable message become stable? Distributed Systems 2016 Exam 2 Review Paul Krzyzanowski Rutgers University Fall 2016 In virtual sychrony, a message
More informationSIOS Protection Suite for Linux v Network Attached Storage Recovery Kit Administration Guide
SIOS Protection Suite for Linux v8.3.2 Network Attached Storage Recovery Kit Administration Guide Nov 2014 This document and the information herein is the property of SIOS Technology Corp. (previously
More informationChapter 11: File-System Interface. File Concept. File Structure
Chapter 11: File-System Interface File Concept Access Methods Directory Structure File System Mounting File Sharing Protection 11.1 File Concept Contiguous logical address space Types: Data numeric character
More informationSurveillance Dell EMC Isilon Storage with Video Management Systems
Surveillance Dell EMC Isilon Storage with Video Management Systems Configuration Guide H14823 REV 1.1 Copyright 2016-2017 EMC Corporation All rights reserved. Published April 2017 Dell believes the information
More informationChapter 10: File-System Interface
Chapter 10: File-System Interface Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection 10.2 Silberschatz, Galvin and Gagne 2005
More informationCompleteView Video Proxy User Manual. CompleteView Version 4.6.1
CompleteView Video Proxy User Manual CompleteView Version 4.6.1 Table of Contents Minimum System Requirements... 4 Installation... 5 Configuring the Video Proxy... 8 Add an Administrator Account... 10
More informationProgramming II (CS300)
1 Programming II (CS300) Chapter 12: Sorting Algorithms MOUNA KACEM mouna@cs.wisc.edu Spring 2018 Outline 2 Last week Implementation of the three tree depth-traversal algorithms Implementation of the BinarySearchTree
More informationOregon State University Practice problems 2 Winster Figure 1: The original B+ tree. Figure 2: The B+ tree after the changes in (1).
Figure 1: The original B+ tree. Figure 2: The B+ tree after the changes in (1). 1: Indexing Consider the B+ tree index of degree d = 2 shown in Figure 1. Instead of pointers to the data records in data
More informationRHCE BOOT CAMP BIND. Wednesday, November 28, 12
RHCE BOOT CAMP BIND CONFIG FILES BIND basically has two types of configuration files: BIND configuration file, specific to BIND and it s features Database files, or zone files, which contain DNS resource
More informationLinux Network Administration
Linux Network Administration Objective Describe the organization of the namespace Define the top-level subdomains of the Describe the process of converting IP addresses into names Define the concept of
More informationChapter 11: File-System Interface
Chapter 11: File-System Interface Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection Objectives To explain the function
More information