Chapter 5 Naming. Names, Identifiers, and Addresses

Size: px
Start display at page:

Download "Chapter 5 Naming. Names, Identifiers, and Addresses"

Transcription

1 Chapter 5 Naming 1 Names, Identifiers, and Addresses In a distributed system, a name is used to refer to an entity (e.g., computer, service, remote object, file, user) An address is a name that refers to an access point of an entity E.g. a server s address consists of an IP address and a port number An entity may have multiple access points and addresses E.g., a person has several phone numbers (e.g. work, home, mobile) An entity may change its access points E.g., a service is moved to a different host, a person changes its address after changing his job Identifiers are used to uniquely identify an entity; an identifier is a name with the following properties An identifier refers to at most one entity Each entity is referred to by at most one identifier An identifier always refers to the same entity (i.e., it is never reused) 2 1

2 Naming Systems A naming system maintains a name toaddress binding to resolve names to addresses In a distributed system, the implementation of a naming system is often distributed across multiple machines We will study two classes of naming systems Flat Naming: resolving identifiers to addresses Structured Naming: resolving human friendly names to addresses 3 Flat Naming Each entity is assigned an identifier that uniquely identifies the entity Identifiers are fixed length bit strings, which we refer to as flat names (or unstructured names) Flat names can be efficiently handled by machines E.g., IP addresses, Ethernet addresses How to resolve an identifier to the address of the associated entity? We will study how identifiers are resolved in Chord 4 2

3 Name Resolution in Chord Every node is assigned a random m bit identifier Every data item is assigned a unique m bit key Data item with key k is managed by the node with the smallest identifier id k, denoted as succ(k) Each node p maintains a finger table with m entries, value of the i th entry is FT p [i]=succ(p+2 i 1 ) To look up a key k, a node p performs the following If p is responsible for k, then return the address of node p If p < k < FT p [1], then forward the request to FT p [1] If FT p [j] k < FT p [j+1], then forward the request to node q = FT p [j] A lookup requires O(logN) steps, where N is the number of nodes in the system 5 m=5 Resolving key 26 from node 1 and key 12 from node 28 in a Chord system. 6 3

4 Structured Naming Flat names are difficult for humans to remember Structured names are composed of several parts; these names are human friendly Example: file names, Internet host names How to locate an entity given its structured name? We will study two examples: file name resolution and host name resolution in the Internet (DNS) 7 Name Spaces for File Names File names are organized into a name space, which is represented by a labeled directed graph with two types of nodes A leaf node represents a file and stores information about the file (e.g., owner, last modification time, location of data blocks, etc.) A directory node represents a file directory and stores a directory table of (edge label, node ID) pairs A naming graph with a single root node. 8 4

5 Path Names A path name is used to refer to a node in the naming graph A path name is represented by a sequence of edge labels separated by a slash An absolute path name starts from the root node and begins with a slash (e.g., /home/steen/mbox) A relative path name starts from the current working directory and does not begin with a slash (e.g., steen/mbox) 9 Name Resolution Name resolution is the process of locating the node referred to by a given path name Name resolution is performed by traversing the naming graph Resolution of absolute path names starts from the root node Resolution of relative path names starts from the current directory node (e.g., resolution of steen/mbox starts from /home) 10 5

6 Hard Links Some file systems allow multiple absolute path names to refer to the same leaf node, these absolute path names are called hard links to the node E.g., the path names /keys and /home/steen/keys are hard links to node n5 This has the effect of creating multiple names for the same file If the file is opened by one of its names, and changes are made to its content, then the changes will be visible when the file is opened by an alternative name. 11 Symbolic Links A symbolic link is a special type of file that contains a reference to another file or directory in the form of an absolute path name E.g., /home/steen/keys is a symbolic link to node n5 When resolving /home/steen/keys, the path name stored in n6 (i.e., /keys) will be returned, and name resolution continues with resolving that path name 12 6

7 Merging Name Spaces (1) Two names spaces can be merged by mounting one name space into another name space To mount a foreign name space NS2 into a name space NS1, we let a directory node in NS1 (called a mount point) store the identifier of a directory node in NS2 (called a mounting point) During name resolution, the mounting point is looked up and resolution proceeds by accessing its directory table mount point mounting point 13 Merging Name Spaces (2) If the foreign name space is located on a different machine, the mount point must store the following information The name of the access protocol used to communicate with the server of the foreign name space The name of the server of the foreign name space The name of the mounting point in the foreign name space (to be resolved by the server of the foreign name space) 14 7

8 Mounting Remote Name Space in NFS Sun s Network File System (NFS) is a distributed file system that enables clients to access files stored on remote file servers The client can use the name /remote/vu/mbox to access the file /home/steen/mbox on the remote file server 15 8

Naming. Distributed Systems IT332

Naming. Distributed Systems IT332 Naming Distributed Systems IT332 2 Outline Names, Identifier, and Addresses Flat Naming Structured Naming 3 Names, Addresses and Identifiers A name is used to refer to an entity An address is a name that

More information

CSE 5306 Distributed Systems. Naming

CSE 5306 Distributed Systems. Naming CSE 5306 Distributed Systems Naming 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations To access an entity, you have resolve

More information

CSE 5306 Distributed Systems

CSE 5306 Distributed Systems CSE 5306 Distributed Systems Naming Jia Rao http://ranger.uta.edu/~jrao/ 1 Naming Names play a critical role in all computer systems To access resources, uniquely identify entities, or refer to locations

More information

Naming. Naming. Naming versus Locating Entities. Flat Name-to-Address in a LAN

Naming. Naming. Naming versus Locating Entities. Flat Name-to-Address in a LAN Naming Naming Tanenbaum Ch. 5 Distributed Software Systems CS 707 A name in a distributed system is a string of bits or characters that is used to refer to an entity Types of names: Address: an access

More information

殷亚凤. Naming. Distributed Systems [5]

殷亚凤. Naming. Distributed Systems [5] Naming Distributed Systems [5] 殷亚凤 Email: yafeng@nju.edu.cn Homepage: http://cs.nju.edu.cn/yafeng/ Room 301, Building of Computer Science and Technology Review Concepts about faults How to improve dependability

More information

Lecture 4 Naming. Prof. Wilson Rivera. University of Puerto Rico at Mayaguez Electrical and Computer Engineering Department

Lecture 4 Naming. Prof. Wilson Rivera. University of Puerto Rico at Mayaguez Electrical and Computer Engineering Department Lecture 4 Naming Prof. Wilson Rivera University of Puerto Rico at Mayaguez Electrical and Computer Engineering Department Outline Names, identifiers, addresses Flat naming Structured naming Attribute based

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 5 Naming

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 5 Naming DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 5 Naming Naming Naming and name resolution mechanisms Names, Identifiers, and Addresses Flat Naming

More information

June Gerd Liefländer System Architecture Group Universität Karlsruhe (TH), System Architecture Group

June Gerd Liefländer System Architecture Group Universität Karlsruhe (TH), System Architecture Group Distributed Systems 9 Naming June-08-2009 Gerd Liefländer System Architecture Group 1 Overview Schedule of the Week Motivation & Introduction Basic Terms Naming System Flat Naming Hierarchical Location

More information

Naming in Distributed Systems

Naming in Distributed Systems Naming in Distributed Systems Dr. Yong Guan Department of Electrical and Computer Engineering & Information Assurance Center Iowa State University Outline for Today s Talk Overview: Names, Identifiers,

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Naming WHAT IS NAMING? Name: Entity: Slide 3. Slide 1. Address: Identifier:

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Naming WHAT IS NAMING? Name: Entity: Slide 3. Slide 1. Address: Identifier: BASIC CONCEPTS DISTRIBUTED SYSTEMS [COMP9243] Name: String of bits or characters Refers to an entity Slide 1 Lecture 9a: Naming ➀ Basic Concepts ➁ Naming Services ➂ Attribute-based Naming (aka Directory

More information

Today: Naming. Example: File Names

Today: Naming. Example: File Names Today: Naming Names are used to share resources, uniquely identify entities and refer to locations Need to map from name to the entity it refers to E.g., Browser access to www.cnn.com Use name resolution

More information

New Topic: Naming. Differences in naming in distributed and non-distributed systems. How to name mobile entities?

New Topic: Naming. Differences in naming in distributed and non-distributed systems. How to name mobile entities? New Topic: Naming Names are used to share resources, uniquely identify entities and refer to locations Need to map from name to the entity it refers to E.g., Browser access to www.cnn.com Use name resolution

More information

Computing Parable. New Topic: Naming

Computing Parable. New Topic: Naming Computing Parable The Cow Courtesy: S. Keshav Lecture 10, page 1 New Topic: Naming Names are used to share resources, uniquely identify entities and refer to locations Need to map from name to the entity

More information

New Topic: Naming. Approaches

New Topic: Naming. Approaches New Topic: Naming Names are used to share resources, uniquely identify entities and refer to locations Need to map from name to the entity it refers to E.g., Browser access to www.cnn.com Use name resolution

More information

Naming in Distributed Systems

Naming in Distributed Systems Distributed Systems, WS 2014 Naming in Distributed Systems Hong-Linh Truong Distributed Systems Group, Vienna University of Technology truong@dsg.tuwien.ac.at dsg.tuwien.ac.at/staff/truong DS WS 2014 1

More information

Naming. Naming entities

Naming. Naming entities Naming Naming entities Locating mobile entities Removing unreferenced entities 1 Name: Just a string Naming entities used to denote entity in a system Identifier: Uniquely refers to an entity Each entity

More information

Naming in Distributed Systems

Naming in Distributed Systems Naming in Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Ingegneria Due Alma Mater Studiorum Università di Bologna a Cesena Academic Year 2010/2011 Andrea

More information

Part Four - Storage Management. Chapter 10: File-System Interface

Part Four - Storage Management. Chapter 10: File-System Interface Part Four - Storage Management Chapter 10: File-System Interface Chapter 10: File-System Interface 10.1 File Concept 10.2 Access Methods 10.3 Directory and Disk Structure 10.4 File-System Mounting 10.5

More information

Lecture 11: February 29

Lecture 11: February 29 CMPSCI 677 Operating Systems Spring 2016 Lecture 11: February 29 Lecturer: Prashant Shenoy Scribe: Lurdh Pradeep Reddy Ambati 11.1 Naming System Names are used to share resources, uniquely identify entities

More information

Last Class: RPCs and RMI. Today: Communication Issues

Last Class: RPCs and RMI. Today: Communication Issues Last Class: RPCs and RMI Case Study: Sun RPC Lightweight RPCs Remote Method Invocation (RMI) Design issues Lecture 9, page 1 Today: Communication Issues Message-oriented communication Persistence and synchronicity

More information

Naming. Chapter 4. Naming (1) Name resolution allows a process to access a named entity. A naming system is necessary.

Naming. Chapter 4. Naming (1) Name resolution allows a process to access a named entity. A naming system is necessary. Naming Chapter 4 Naming (1) Name resolution allows a process to access a named entity. A naming system is necessary. In a distributed system the naming system is distributed. Naming (2) In a distributed

More information

Systèmes Distribués. Master MIAGE 1. Andrea G. B. Tettamanzi. Université de Nice Sophia Antipolis Département Informatique

Systèmes Distribués. Master MIAGE 1. Andrea G. B. Tettamanzi. Université de Nice Sophia Antipolis Département Informatique Systèmes Distribués Master MIAGE 1 Andrea G. B. Tettamanzi Université de Nice Sophia Antipolis Département Informatique andrea.tettamanzi@unice.fr Andrea G. B. Tettamanzi, 2017 1 CM - Séance 4 Naming (chapitre

More information

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the

More information

Naming. To do. q What s in a name q Flat naming q Structured naming q Attribute-based naming q Next: Content distribution networks

Naming. To do. q What s in a name q Flat naming q Structured naming q Attribute-based naming q Next: Content distribution networks Naming To do q What s in a name q Flat naming q Structured naming q Attribute-based naming q Next: Content distribution networks What's in a name? That which we call a rose By any other name would smell

More information

Parallelism. Master 1 International. Andrea G. B. Tettamanzi. Université de Nice Sophia Antipolis Département Informatique

Parallelism. Master 1 International. Andrea G. B. Tettamanzi. Université de Nice Sophia Antipolis Département Informatique Parallelism Master 1 International Andrea G. B. Tettamanzi Université de Nice Sophia Antipolis Département Informatique andrea.tettamanzi@unice.fr Andrea G. B. Tettamanzi, 2014 1 Lecture 3 Part a Naming

More information

Chapter 10: File-System Interface. Operating System Concepts with Java 8 th Edition

Chapter 10: File-System Interface. Operating System Concepts with Java 8 th Edition Chapter 10: File-System Interface 10.1 Silberschatz, Galvin and Gagne 2009 File Concept A file is a named collection of information that is recorded on secondary storage. Types: Data numeric character

More information

Name Services and DNS

Name Services and DNS In Academic Affiliation with Name Services and DNS Distributed Computer Systems Lecture 3 Module Leader: Mrs. Bobby Rishikesh 1 Contents What is a name service? SNS: A Simple Name Service DNS: Domain Name

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

GridNFS: Scaling to Petabyte Grid File Systems. Andy Adamson Center For Information Technology Integration University of Michigan

GridNFS: Scaling to Petabyte Grid File Systems. Andy Adamson Center For Information Technology Integration University of Michigan GridNFS: Scaling to Petabyte Grid File Systems Andy Adamson Center For Information Technology Integration University of Michigan What is GridNFS? GridNFS is a collection of NFS version 4 features and minor

More information

Distributed File Systems. Distributed Systems IT332

Distributed File Systems. Distributed Systems IT332 Distributed File Systems Distributed Systems IT332 2 Outline Introduction Network File System (NFS) 3 File System Basics A file is a named collection of logically related data A file system Provides a

More information

9.1 Introduction 9.2 Name services and the DNS 9.3 Discovery services 9.6 Summary

9.1 Introduction 9.2 Name services and the DNS 9.3 Discovery services 9.6 Summary Teaching material based on Distributed Systems: Concepts and Design, Edition 3, Addison-Wesley 2001. Distributed Systems Course Name Services Copyright George Coulouris, Jean Dollimore, Tim Kindberg 2001

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 10: File System Interface Prof. Alan Mislove (amislove@ccs.neu.edu) Contiguous logical address space File Concept Types: Data numeric character

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10 / 2II45), on Monday November 2, 2015, from 13.30 to 16.30 hours. Indicate on

More information

CS6601 DISTRIBUTED SYSTEM / 2 MARK

CS6601 DISTRIBUTED SYSTEM / 2 MARK UNIT III PEER TO PEER SERVICE AND FILE SYSTEM 1. Define Peer-Peer System. Part A - Questions Peer-to-peer system is a paradigm for the construction of distributed system and application in which data and

More information

Distributed File System

Distributed File System Rochester Institute of Technology Distributed File System MS Project Proposal By: Swarup Datta sxd2009@cs.rit.edu Chairman: Dr. Hans-Peter Bischof Reader: Dr. James E. Heliotis 1 of 16 Abstract Ad hoc

More information

CSE325 Principles of Operating Systems. File Systems. David P. Duggan. March 21, 2013

CSE325 Principles of Operating Systems. File Systems. David P. Duggan. March 21, 2013 CSE325 Principles of Operating Systems File Systems David P. Duggan dduggan@sandia.gov March 21, 2013 External View of File Manager Application Program mount() write() close() open() lseek() read() WriteFile()

More information

Chapter 10: File-System Interface

Chapter 10: File-System Interface Chapter 10: File-System Interface Objectives: To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file

More information

Chapter 6 Storage Management File-System Interface 11.1

Chapter 6 Storage Management File-System Interface 11.1 Chapter 6 Storage Management File-System Interface 11.1 Chapter 6: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection 11.2 Objectives

More information

Chapter 10: File-System Interface

Chapter 10: File-System Interface Chapter 10: File-System Interface Objectives: To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file

More information

Chapter 10: File System

Chapter 10: File System Chapter 10: File System Chapter 10: File-System File Concept File attributes, File operations, File types, File structures Access Methods Directory Structure File-System Mounting File Sharing Protection

More information

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide

More information

IMPLEMENTING THE CHORD PEER TO PEER NETWORK

IMPLEMENTING THE CHORD PEER TO PEER NETWORK PROGRAMMING ASSIGNMENT 2 IMPLEMENTING THE CHORD PEER TO PEER NETWORK Version 1.0 DUE DATE: Wednesday, September 27 th, 2017 @ 5:00 pm OBJECTIVE The objective of this assignment is to build a simple peer

More information

Chapter 11: File-System Interface

Chapter 11: File-System Interface Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013 Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection

More information

Lecture 10 File Systems - Interface (chapter 10)

Lecture 10 File Systems - Interface (chapter 10) Bilkent University Department of Computer Engineering CS342 Operating Systems Lecture 10 File Systems - Interface (chapter 10) Dr. İbrahim Körpeoğlu http://www.cs.bilkent.edu.tr/~korpe 1 References The

More information

An efficient method to avoid path lookup in file access auditing in IO path to improve file system IO performance

An efficient method to avoid path lookup in file access auditing in IO path to improve file system IO performance Technical Disclosure Commons Defensive Publications Series March 21, 2017 An efficient method to avoid path lookup in file access auditing in IO path to improve file system IO performance Arun Vishnu P

More information

Chapter 5 Naming (2)

Chapter 5 Naming (2) DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 5 Naming (2) Plan! Definitions and uses! Types of naming!flat (hierarchical) naming!structured

More information

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008 Objectives Discuss the basics of the Domain Name System (DNS) and its

More information

Trees. (Trees) Data Structures and Programming Spring / 28

Trees. (Trees) Data Structures and Programming Spring / 28 Trees (Trees) Data Structures and Programming Spring 2018 1 / 28 Trees A tree is a collection of nodes, which can be empty (recursive definition) If not empty, a tree consists of a distinguished node r

More information

Persistent key, value storage

Persistent key, value storage Persistent key, value storage In programs, often use hash tables - E.g., Buckets are an array of pointers, collision chaining For persistant data, minimize # disk accesses - Traversing linked lists is

More information

File System Interface: Overview. Objective. File Concept UNIT-IV FILE SYSTEMS

File System Interface: Overview. Objective. File Concept UNIT-IV FILE SYSTEMS UNIT-IV FILE SYSTEMS File System Interface: File Concept Access Methods Directory Structure File System Mounting Protection Overview For most users, the file system is the most visible aspect of an operating

More information

Chapter 10: File-System Interface. File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection

Chapter 10: File-System Interface. File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection Objectives To explain the function of file systems To describe the interfaces

More information

Configuration Export and Import

Configuration Export and Import This chapter includes the following sections:, page 1 From the Export & Import, you can schedule configuration backup for Cisco UCS Central and the registered Cisco UCS Domains. You can schedule export

More information

F 4. Both the directory structure and the files reside on disk Backups of these two structures are kept on tapes

F 4. Both the directory structure and the files reside on disk Backups of these two structures are kept on tapes Directory Structure A collection of nodes containing information about all files Directory Files F 1 F 2 F 3 F 4 F n Both the directory structure and the files reside on disk Backups of these two structures

More information

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:

More information

Distributed Naming. EECS 591 Farnam Jahanian University of Michigan. Reading List

Distributed Naming. EECS 591 Farnam Jahanian University of Michigan. Reading List Distributed Naming EECS 591 Farnam Jahanian University of Michigan Reading List Tanenbaum Chapter 4.1-4.2, 4.3(optional) Any problem in computer science can be solved with another layer of indirection

More information

Chapter 11: File-System Interface

Chapter 11: File-System Interface Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013! Chapter 11: File-System Interface File Concept" Access Methods" Directory Structure" File-System Mounting" File Sharing" Protection"

More information

Chapter 7: File-System

Chapter 7: File-System Chapter 7: File-System Interface and Implementation Chapter 7: File-System Interface and Implementation File Concept File-System Structure Access Methods File-System Implementation Directory Structure

More information

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica

TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica TECHNISCHE UNIVERSITEIT EINDHOVEN Faculteit Wiskunde en Informatica Examination Architecture of Distributed Systems (2IMN10), on Thursday, January 25, 2018, from 18.00 to 21.00 hours. Before you start,

More information

2-3 Tree. Outline B-TREE. catch(...){ printf( "Assignment::SolveProblem() AAAA!"); } ADD SLIDES ON DISJOINT SETS

2-3 Tree. Outline B-TREE. catch(...){ printf( Assignment::SolveProblem() AAAA!); } ADD SLIDES ON DISJOINT SETS Outline catch(...){ printf( "Assignment::SolveProblem() AAAA!"); } Balanced Search Trees 2-3 Trees 2-3-4 Trees Slide 4 Why care about advanced implementations? Same entries, different insertion sequence:

More information

Chapter 10: File-System Interface. Operating System Concepts 8 th Edition

Chapter 10: File-System Interface. Operating System Concepts 8 th Edition Chapter 10: File-System Interface Silberschatz, Galvin and Gagne 2009 Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection 10.2

More information

Job Aid: Creating and Editing a Vendor

Job Aid: Creating and Editing a Vendor Purpose: The purpose of this job aid is to help you create a Vendor in order to process new and recurring Disbursement Vouchers. In this job aid, you will learn about: Timing of Vendor Creation... 1 Creating

More information

DNS Session 2: DNS cache operation and DNS debugging. Joe Abley AfNOG 2006 workshop

DNS Session 2: DNS cache operation and DNS debugging. Joe Abley AfNOG 2006 workshop DNS Session 2: DNS cache operation and DNS debugging Joe Abley AfNOG 2006 workshop How caching NS works (1) If we've dealt with this query before recently, answer is already in the cache easy! Resolver

More information

AVL Trees. (AVL Trees) Data Structures and Programming Spring / 17

AVL Trees. (AVL Trees) Data Structures and Programming Spring / 17 AVL Trees (AVL Trees) Data Structures and Programming Spring 2017 1 / 17 Balanced Binary Tree The disadvantage of a binary search tree is that its height can be as large as N-1 This means that the time

More information

Memory Management. Memory Management

Memory Management. Memory Management Memory Management Most demanding di aspect of an operating system Cost has dropped. Consequently size of main memory has expanded enormously. Can we say that we have enough still. Swapping in/out. Memory

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Distributed Systems - III

Distributed Systems - III CSE 421/521 - Operating Systems Fall 2012 Lecture - XXIV Distributed Systems - III Tevfik Koşar University at Buffalo November 29th, 2012 1 Distributed File Systems Distributed file system (DFS) a distributed

More information

Chapter 10: File System. Operating System Concepts 9 th Edition

Chapter 10: File System. Operating System Concepts 9 th Edition Chapter 10: File System Silberschatz, Galvin and Gagne 2013 Chapter 10: File System File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection 10.2 Silberschatz,

More information

Cloud Computing CS

Cloud Computing CS Cloud Computing CS 15-319 Distributed File Systems and Cloud Storage Part II Lecture 13, Feb 27, 2012 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last session Distributed File Systems and

More information

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS : Computer Networks Lecture 6: Apr 5, 2004 Naming and DNS Any problem in computer science can be solved with another layer of indirection David Wheeler Naming is a layer of indirection What problems does

More information

Distributed System: Definition

Distributed System: Definition 2 / 25 Introduction Distributed System: Definition Definition A distributed system is a piece of software that ensures that: a collection of independent computers appears to its users as a single coherent

More information

Expense: Lodge Card Setup Guide

Expense: Lodge Card Setup Guide Expense: Lodge Card Setup Guide Setup Guide Applies to these SAP Concur solutions: Expense Professional/Premium edition Standard edition Travel Professional/Premium edition Standard edition Invoice Professional/Premium

More information

File Systems: Allocation Issues, Naming, and Performance CS 111. Operating Systems Peter Reiher

File Systems: Allocation Issues, Naming, and Performance CS 111. Operating Systems Peter Reiher File Systems: Allocation Issues, Naming, and Performance Operating Systems Peter Reiher Page 1 Outline Allocating and managing file system free space File naming and directories File volumes File system

More information

Distributed Systems Homework 1 (6 problems)

Distributed Systems Homework 1 (6 problems) 15-440 Distributed Systems Homework 1 (6 problems) Due: November 30, 11:59 PM via electronic handin Hand in to Autolab in PDF format November 29, 2011 1. You have set up a fault-tolerant banking service.

More information

Lab 3: Configuration of OIM to manage user accounts lifecycle in DSEE application

Lab 3: Configuration of OIM to manage user accounts lifecycle in DSEE application OIM 11g Workshop Lab 3 Lab 3: Configuration of OIM to manage user accounts lifecycle in DSEE application Contents Lab 3: Configuration of OIM to manage user accounts lifecycle in DSEE application... 1

More information

COT 4600 Operating Systems Fall Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM

COT 4600 Operating Systems Fall Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM COT 4600 Operating Systems Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: Tu-Th 3:00-4:00 PM Lecture 9 Last time: Case study: the Unix file system Today: Modular sharing Metadata and Name Overloading

More information

UNIT III. cache/replicas maintenance Main memory No No No 1 RAM File system n No Yes No 1 UNIX file system Distributed file

UNIT III. cache/replicas maintenance Main memory No No No 1 RAM File system n No Yes No 1 UNIX file system Distributed file UNIT III 1. Enumerate the properties of storage system? Sharing Persistent Distributed Consistency Example cache/replicas maintenance Main memory No No No 1 RAM File system n No Yes No 1 UNIX file system

More information

I.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 10: FILE SYSTEM

I.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 10: FILE SYSTEM I.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 10: FILE SYSTEM Chapter 10: File System File Concept Access Methods Directory Structure File-System Mounting File Sharing

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual

More information

Lecture 1. Abstraction

Lecture 1. Abstraction Lecture 1 Abstraction 1 Programming Techniques Unstructured Programming Procedural Programming Modular & Structural Programming Abstract Data Type Object-Oriented Programming 2 Unstructured Programming

More information

Chapter 13 XML: Extensible Markup Language

Chapter 13 XML: Extensible Markup Language Chapter 13 XML: Extensible Markup Language - Internet applications provide Web interfaces to databases (data sources) - Three-tier architecture Client V Application Programs Webserver V Database Server

More information

File Concept Access Methods Directory and Disk Structure File-System Mounting File Sharing Protection

File Concept Access Methods Directory and Disk Structure File-System Mounting File Sharing Protection File Concept Access Methods Directory and Disk Structure File-System Mounting File Sharing Protection File Concepts File Attributes File Operations File Types Internal File Structure A uniform logical

More information

Compilers Project 3: Semantic Analyzer

Compilers Project 3: Semantic Analyzer Compilers Project 3: Semantic Analyzer CSE 40243 Due April 11, 2006 Updated March 14, 2006 Overview Your compiler is halfway done. It now can both recognize individual elements of the language (scan) and

More information

Faculty of Computer Science Institute for System Architecture, Operating Systems Group. Naming. Stefan Kalkowski. Dresden,

Faculty of Computer Science Institute for System Architecture, Operating Systems Group. Naming. Stefan Kalkowski. Dresden, Faculty of Computer Science Institute for System Architecture, Operating Systems Group Naming Stefan Kalkowski Dresden, 2007-11-27 So far... Basics: Tasks and Threads Synchronization Memory Communication

More information

File Systems. File system interface (logical view) File system implementation (physical view)

File Systems. File system interface (logical view) File system implementation (physical view) File Systems File systems provide long-term information storage Must store large amounts of data Information stored must survive the termination of the process using it Multiple processes must be able

More information

Ricardo Rocha. Department of Computer Science Faculty of Sciences University of Porto

Ricardo Rocha. Department of Computer Science Faculty of Sciences University of Porto Ricardo Rocha Department of Computer Science Faculty of Sciences University of Porto Slides based on the book Operating System Concepts, 9th Edition, Abraham Silberschatz, Peter B. Galvin and Greg Gagne,

More information

Application-layer Protocols

Application-layer Protocols Application-layer Protocols Kai Shen application transport data link physical Network Applications and Application-Layer Protocols application transport data link physical application transport data link

More information

1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1

1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 Asymptotics, Recurrence and Basic Algorithms 1. [1 pt] What is the solution to the recurrence T(n) = 2T(n-1) + 1, T(1) = 1 2. O(n) 2. [1 pt] What is the solution to the recurrence T(n) = T(n/2) + n, T(1)

More information

Domain Name System (DNS) Session 2: Resolver Operation and debugging. Joe Abley AfNOG Workshop, AIS 2017, Nairobi

Domain Name System (DNS) Session 2: Resolver Operation and debugging. Joe Abley AfNOG Workshop, AIS 2017, Nairobi Domain Name System (DNS) Session 2: Resolver Operation and debugging Joe Abley AfNOG Workshop, AIS 2017, Nairobi DNS Resolver Operation How Resolvers Work (1)! If we've dealt with this query before recently,

More information

CS /15/16. Paul Krzyzanowski 1. Question 1. Distributed Systems 2016 Exam 2 Review. Question 3. Question 2. Question 5.

CS /15/16. Paul Krzyzanowski 1. Question 1. Distributed Systems 2016 Exam 2 Review. Question 3. Question 2. Question 5. Question 1 What makes a message unstable? How does an unstable message become stable? Distributed Systems 2016 Exam 2 Review Paul Krzyzanowski Rutgers University Fall 2016 In virtual sychrony, a message

More information

SIOS Protection Suite for Linux v Network Attached Storage Recovery Kit Administration Guide

SIOS Protection Suite for Linux v Network Attached Storage Recovery Kit Administration Guide SIOS Protection Suite for Linux v8.3.2 Network Attached Storage Recovery Kit Administration Guide Nov 2014 This document and the information herein is the property of SIOS Technology Corp. (previously

More information

Chapter 11: File-System Interface. File Concept. File Structure

Chapter 11: File-System Interface. File Concept. File Structure Chapter 11: File-System Interface File Concept Access Methods Directory Structure File System Mounting File Sharing Protection 11.1 File Concept Contiguous logical address space Types: Data numeric character

More information

Surveillance Dell EMC Isilon Storage with Video Management Systems

Surveillance Dell EMC Isilon Storage with Video Management Systems Surveillance Dell EMC Isilon Storage with Video Management Systems Configuration Guide H14823 REV 1.1 Copyright 2016-2017 EMC Corporation All rights reserved. Published April 2017 Dell believes the information

More information

Chapter 10: File-System Interface

Chapter 10: File-System Interface Chapter 10: File-System Interface Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection 10.2 Silberschatz, Galvin and Gagne 2005

More information

CompleteView Video Proxy User Manual. CompleteView Version 4.6.1

CompleteView Video Proxy User Manual. CompleteView Version 4.6.1 CompleteView Video Proxy User Manual CompleteView Version 4.6.1 Table of Contents Minimum System Requirements... 4 Installation... 5 Configuring the Video Proxy... 8 Add an Administrator Account... 10

More information

Programming II (CS300)

Programming II (CS300) 1 Programming II (CS300) Chapter 12: Sorting Algorithms MOUNA KACEM mouna@cs.wisc.edu Spring 2018 Outline 2 Last week Implementation of the three tree depth-traversal algorithms Implementation of the BinarySearchTree

More information

Oregon State University Practice problems 2 Winster Figure 1: The original B+ tree. Figure 2: The B+ tree after the changes in (1).

Oregon State University Practice problems 2 Winster Figure 1: The original B+ tree. Figure 2: The B+ tree after the changes in (1). Figure 1: The original B+ tree. Figure 2: The B+ tree after the changes in (1). 1: Indexing Consider the B+ tree index of degree d = 2 shown in Figure 1. Instead of pointers to the data records in data

More information

RHCE BOOT CAMP BIND. Wednesday, November 28, 12

RHCE BOOT CAMP BIND. Wednesday, November 28, 12 RHCE BOOT CAMP BIND CONFIG FILES BIND basically has two types of configuration files: BIND configuration file, specific to BIND and it s features Database files, or zone files, which contain DNS resource

More information

Linux Network Administration

Linux Network Administration Linux Network Administration Objective Describe the organization of the namespace Define the top-level subdomains of the Describe the process of converting IP addresses into names Define the concept of

More information

Chapter 11: File-System Interface

Chapter 11: File-System Interface Chapter 11: File-System Interface Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection Objectives To explain the function

More information