Distributed File System
|
|
- Chastity Hall
- 6 years ago
- Views:
Transcription
1 Rochester Institute of Technology Distributed File System MS Project Proposal By: Swarup Datta Chairman: Dr. Hans-Peter Bischof Reader: Dr. James E. Heliotis 1 of 16
2 Abstract Ad hoc networks provide capability for devices to participate in a wireless network without the presence of a system that function as a central authority. They can be deployed without any fixed infrastructure making it attractive for devices with wireless capabilities. One issue for devices in an ad hoc network is accessing file systems on other devices within the same network. To solve this problem distributed file system a middleware can be developed with concepts borrowed from the Plan 9 system. The proposed middleware will allow devices to easily navigate and access directories and files on a file system residing on a remote device. 2 of 16
3 Table of Contents 1 INTRODUCTION M2MI Architecture Overview Terms DESIGN Exporting Importing and Name resolution Operations on file system Maintenance DELIVERABLES REFERENCES of 16
4 1 Introduction 1.1 M2MI Architecture Many-to-Many Invocation (M2MI) is a new paradigm to facilitate development of collaborative systems such as middleware and applications [1]. Target devices for M2MI are mobile hosts that can participate in proximal ad hoc networks. Traditional distributed system support one-to-one and one-to-many communication patterns. One of the main contributions of M2MI is that it supports many-to-many communication pattern demonstrated by applications such as chat programs. In proximal ad hoc networks, M2MI can use broadcasting to send messages to other devices. Utilization of broadcasting reduces the need for routing mechanism, such as routing table and protocol, in the devices making it ideal for small battery powered hosts. The objective of this project is to develop a distributed file system for ad hoc networks. Section 1.2 provides an overview of the distributed file system. Section 2 offer design details on the distributed file system. Section 3 details deliverables of the project. Section 4 includes references. 1.2 Overview An essential feature for systems participating in a network is the ability to share data. Current distributed file systems such as NFS from Sun Microsystem, DFS from Microsoft, and GFS from Google allow systems on traditional networks with fixed infrastructure to access data remotely. A new distributed file system can be developed using M2MI to provide hosts in an ad hoc network the ability to share and access data on remote devices. Ad hoc networks differ from traditional networks as they can be deployed without presence of a dedicated central authority. Also, ad hoc networks tend to be highly dynamic as they experience frequent changes in the network topology. These characteristics add new challenges to designing a distributed file system. The proposed file system in this document, which will be implemented as a middleware, will allow a device to function both as server by providing others to access its files. The same device will also be able to act as a client by accessing files on other hosts. The middleware will also include mechanism to adapt to any changes to the network topology as hosts join or leave a network. For the proposed middleware, features such as bind operation and union directory will be borrowed from Plan 9. Plan 9 is a distributed system where resources, including processes, memory, and network interface card, are treated as files [2]. Another feature of Plan 9 is all 4 of 16
5 resources, including files, are represented in a single hierarchical view called name space. Each system has a local copy of name space and can be modify it by executing a bind operation. Result of a bind operation is a union directory, which joins contents of two directories, or a directory and a file defined as arguments in bind operation. Order of joining the arguments is specified as a parameter with BEFORE, AFTER, and REPLACE as possible values. For example, using REPLACE flag a device can bind a /bin directory from a remote device to its local name space replacing its own local /bin directory. Entities in the resulting union directory can be accessed using path /bin. This can be useful when a user desires to execute binaries residing on a remote system. The remote /bin directory can also be attached in front of the local /bin directory using bind flag BEFORE. In this case, a file access in /bin will search the local /bin directory and any remote directories attached to local /bin. Use of BEFORE flag will require search of the remote directory prior to local /bin. To attach the remote /bin behind a local directory, bind flag AFTER can be used. In Plan 9 binding is not only restricted to remote directories, binding can also be performed on local directories and files. Another advantage of union directory is evident when copying or creating files. During file creation in a union directory, the file would be created on the first directory with write permission. File will not be created if create system call fails on the first directory encountered with write permission. Using the previous example, if the remote /bin has only read permission, a file create system call will create the file in the local /bin directory, assuming the local /bin has write permission. In the proposed distributed file system, bind operation and union directory will be used to import and manage access to remote file system. Bind operation will allow for integration of remote directories in a device and union directories will be generated to provide access to contents of local and remote directories. The middleware for the distributed file system (MDFS) will represent local and remote file system as n-ary tree structure. Devices running M2MI and the MDFS will be able to share local file system, and access and modify remote file systems. 1.3 Terms File System Local File System Physical File System - Hierarchical view of directories and files provided by an operating system, where a directory and file is treated as an entity. - File system constituted by MDFS middleware. - A device s physical file system managed by operating system. 5 of 16
6 2 Design In this section, design of the distributed file system will be discussed in details. The discussion will be divided into the following parts, exporting, importing of file system and name resolution, maintenance, and operations on the distributed file system. 2.1 Exporting When a device running MDFS wants to start sharing a file or directory, it will first use a method called exporting. Exporting will accomplish two tasks. First, it will let a device register with MDFS the file structure that is being shared. Second, exporting will publish a message notifying others information required for accessing the exported file structure. The message will include four pieces of information. An Exported Object ID (EOID) associated with an exported object to M2MI; uniquely identify the device generating the message. A tree representing the exported file structure and its associated permissions, a handle, and a flag indicating if the file structure is being exported or un-exported. Un-export undoes what exporting process performs. Handle present in the message will be required for importing, as discussed later. In the case where a new device joins a network, the device will be able to request information regarding shared file system from others. Devices that have exported directory structures, upon receiving a request, will respond with an export message. Devices will be limited to exporting file structure that is physically resident on the device. A device will not be able to export directories imported from another device. This limitation will simplify the import process. In a device, an entity known as ExportManager, placed on top of M2MI layer, will be responsible for publishing and responding to request messages. Applications will register with export manager the directory structure to be shared by the device. The smallest file structure allowable for export will be a file. Another responsibility of the ExportManager will be to generate export messages when a file structure is un-exported or the distributed file system middleware is shutdown. Figure 1 shows local file system from two devices, A and B. Directory is exported by device A. Directories, b32, b41 and are exported from device B. 6 of 16
7 Device A Device B b11 b21 b22 b32 Exported file system b41 Exported file system Figure 1: Exported file structures by devices A and B. 2.2 Importing and Name resolution Devices interested in accessing shared file structures will be required to perform a bind operation. A successful bind will result in integration of a remote file structure into the local file structure by creating a union directory. Contents of multiple directories merged together forms a union directory. Figure 2 shows union directory formed after device A imports b41. Contents of b41 can be accessed through directory on device A. Device A b41 Union directory Figure 2: Union directory in device A b41. During importing, a device will specify four pieces of information. The entity to be modified in the local device called the bind point, which can only be a directory. The bind point could be a directory on the physical file system or it can be a foreign directory attached to the local file system. The entity being imported from a foreign device called the binding point can be a directory or file. The other two parameters will be a handle associated with imported file system and a bind parameter. 7 of 16
8 The bind parameter values, REPLACE, BEFORE or AFTER same as Plan 9, will define how the imported entities are attached to the local file system. REPLACE will attach the imported file structure by replacing the specified bind point. Replace option will only temporarily remove bind point from the local file system. In figure 3, directory is attached with REPLACE bind flag. In this case is a union directory consisting on one directory. When is unmounted by device A, the local directory will be accessible to the device again. BEFORE flag will attach the imported directory structure before the specified bind point. Bind parameter AFTER will form a union directory where the imported file system is attached after the bind point. Figure 3 shows modifications to device A s local file system after importing shared directories from device B. Device A a) Device A s original file system. b41 b) Bind operation with REPLACE parameter. Directory is imported to device A s local file system. A32 is replaced in A s local file system by. 8 of 16
9 b41 c) Bind with AFTER parameter. b41 d) Bind operation with BEFORE parameter. Figure 3: Binding foreign file systems. The unmount operation will be implemented in the middleware to undo changes made to a file system by a bind operation. This operation will be primarily used if a device decides to stop using a shared file system. The bind flag value specified during creation of union directory will play an important role during operations on union directories. Using Figure 3(c), a listing of union directory a32 will display the contents of preceded by contents of directory a32. Same principle will apply to operations such as opening a file. Consider the file system in Figure 3(b). If a file open system call was performed with / as the path and foo as the file name, subdirectory under will be searched first. If foo exist in / directory then the file //foo will be opened by the system call. If foo is not encountered in / then / will be searched. During file copy or file open system call in a union directory, the system call will be executed in the first directory with write permission. In the case the system call fails on the first directory 9 of 16
10 encountered with write permission, it will not continue to the next directory. For example, assuming both and from Figure 3(b) has write permission, a file copy command to union directory will only attempt to copy the file in. If the file cannot be copied to successfully, the system call will not continue to the next directory with write permission, in this case. 2.3 Operations on file system Basic file operations that will be supported by DFS middleware are listed below in the Table 1. Modifications to an imported file system resulting from any of basic operation will be reflected in the devices exporting the respective file system. Operations Description Create Create a file or directory Open Open a file Close Close a file Read Read from a file Write Write to a file Link Create a symbolic link to a file. Remove Remove a directory or file Move Move a file or directory Ls List directory content Table 1: File system operations supported by DFS middleware. In a device, operations invoked on a file system will be first handled by a virtual file system (VFS), resident in the middleware. The VFS will function as a filter, forwarding the system calls to either the underlying local file system or to a foreign device. Once the VFS receives an operation and determines the operation was executed in an imported directory, the operation will be redirected to a separate entity in the middleware. The module responsible for handling request from VFS will be DFSManager. A request arriving at the DFSManager will be delegated to DFSManager of the appropriate device in the network. Once a device receives a system call request, the request will be placed in FIFO queue. Each request will be removed from the queue and serviced. Result of the system call will be returned to the appropriate device once completed. 10 of 16
11 A major issue faced while developing a distributed file system is concurrent access to files. Current distributed file systems address this problem by providing a locking mechanism. In MDFS two types of locks, rlock and wlock, will be implemented for parallel access to regular files. Rlock will be designed as shared lock and wlock will be designed as exclusive lock. Table 2 shows locks granted for different types of access. Requested lock Current lock status None rlock wlock rlock Granted Granted Denied wlock Granted Denied Denied Table 2 Locks will be granted by MDFS for a specific amount of time, determined by the device granting the lock. A device acquiring a lock will have to renew the lock before it expires. If a lock expires, the lock granter will release the expired lock. This will allow a device to remove a lock on a file when the device holding the lock leaves the network without releasing it or suffers from a failure. In the case where a device that had granted locks suffers from a failure, the device will not undertake the task of re-granting the locks that existed prior to its failure. Devices that held locks on files resident of the failed devices will have to reapply for the lock. 2.4 Maintenance Maintenance mechanisms of the DFS middleware will include detection of devices leaving a network and modifying imported file structures to reflect changes in network topology. Aside from importing and file operations, a device s local file system would need modification when a device un-mounts an imported directory or file, and when an exported file system becomes unavailable. An exported file system can become unavailable if a device un-exports its shared directory, or device suffers from a failure. Modification to a device s local file system fall under two cases. If an imported directory is a leaf node in a local file system, when the directory becomes unavailable, the local file structure can be updated by just removing the node. Figure 4 demonstrates this concept. In Figure 4(a) when directory b41 becomes unavailable, b41 is removed from the local file system resulting in the file structure in figure 4(b). In the case where directory became unavailable, the same file system, Figure 4(a), would be updated by removing directory and its subdirectories, as in Figure 4(c). 11 of 16
12 Device A b41 Figure 4(a): Device A s local file system from figure 3(b) Figure 4(b): File structure from Figure 3(b). Directory b41 becomes unavailable. (c) B31 becomes unavailable File system modification becomes more complicated when an imported file structure, which are represented by internal nodes in the local file structure, becomes unavailable. Figure 5 displays this condition where imported directory forms internal node in the local file structure. Device A b41 c11 c33 Figure 5. Local file system on device A. Directories c11 and c33 are imported from device C. 12 of 16
13 In figure 5, if directory and its subdirectories b41 and become unavailable then c11 and c33 will be inaccessible in device A. To solve the dangling file structure issue, a shadow or pseudo-file structure can be employed. Using the same example as Figure 5, when device A detects that directory is unavailable, pseudo-file system nodes will be placed in the local file structure to allow access to c11 and c33. Figure 6 shows the updated file system from Figure 5 with pseudo-file structure in place after became unavailable. Once c11 and c33 directories are un-mounted or become unavailable, the pseudo-file structure can be removed from device A s local file system. Device A b41 c11 c33 Figure 6. Directories and its subdirectories b41 and form the pseudo-file system. C11 and c33 are not part of the pseudo-file system. Note: Directories with dashed border depicts pseudo-file system. The above-mentioned schemas will also be applicable when a change in a device s physical file system requires modification to its local file system. For example, figure 7 depicts directories c11 and c12 attached to and / respectively. In the case, and / was removed from Device A s physical file system, a pseudo-file structure will be situated to provide access to c11 and c of 16
14 Device A b41 c11 c33 Figure 7(a). Device A s local file system. b41 c11 c33 Figure 7(b). Directories and / are represented by a pseudo-file structure. To implement the proposed mechanism of pseudo-file structure, a locking mechanism will be required. The sole purpose of this locking mechanism will be to prevent a process or application using MDFS middleware from accessing the affected segment in the local file system. Affected segment is any part a local file system that becomes unavailable and has to be represented by a pseudo-file structure. For example in Figure 6(b), directories and its sub-directories b41 and are the affected segment of device A s local file system. The locking mechanism will lock the affected segment s parent node, denying access to its subdirectories. In Figure 8, c2 is an imported directory that becomes unavailable and has to be represented by a pseudo-file structure. The proposed locking mechanism would lock c2 s parent denying access to the whole sub tree 14 of 16
15 rooted by the node b3. Once the pseudo-file structure is placed in the local file system, the lock on b3 will be removed. a b1 b2 b3 b4 b5 c1 c2 c3 c4 d1 d2 d3 d4 Figure 8: A device s local file system. 3 Deliverables The distributed File system middleware, two applications design to utilize the DFS middleware, and a technical report are going to be delivered at the end of the project. One of the applications will be shell program and both applications will use the same middleware API. 15 of 16
16 4 References [1] Alan Kaminsky and Hans-Peter Bischof. Many-to-Many Invocation: A new framework for building collaborative applications in ad hoc networks. CSCW 2002 Workshop on Ad Hoc Communication and Collaboration in Ubiquitous Computing Environments, New Orleans, Louisiana, USA, November [2] Rob Pike, Dave Presotto, Ken Thompson, Howard, Trickey, and PhilWinterbottom. The Use of Name Spaces in Plan 9. Bell Laboratories, Murray Hill, New Jersey of 16
Thesis/Dissertation Collections
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2006 Ad hoc file system Swarup Datta Follow this and additional works at: http://scholarworks.rit.edu/theses Recommended
More informationRochester Institute of Technology. MS Project Proposal GROUP DATA COMMUNICATION OF M2MI VIA LAN. By Kai Cheng
Rochester Institute of Technology MS Project Proposal GROUP DATA COMMUNICATION OF M2MI VIA LAN -- M2MI-Based Collaborative Groupware By Kai Cheng kxc8217@cs.rit.edu Committee: Version 8.0 Chairman: Prof.
More informationMS Project Proposal. Tuple Board
MS Project Proposal Tuple Board A New Distributed Computing Paradigm for Mobile Ad Hoc Networks Chaithanya Bondada cxb3178 @ cs.rit.edu Department of Computer Science Rochester Institute of Technology
More informationChapter 11: File-System Interface
Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013 Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection
More informationChapter 7: File-System
Chapter 7: File-System Interface and Implementation Chapter 7: File-System Interface and Implementation File Concept File-System Structure Access Methods File-System Implementation Directory Structure
More informationChapter 10: File System. Operating System Concepts 9 th Edition
Chapter 10: File System Silberschatz, Galvin and Gagne 2013 Chapter 10: File System File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection 10.2 Silberschatz,
More informationDistributed Application Development with Inferno
_ Distributed Application Development with Inferno Ravi Sharma Inferno Network Software Solutions Bell Laboratories, Lucent Technologies Suite 400, 2 Paragon Way Freehold, NJ 07728 +1 732 577-2705 sharma@lucent.com
More informationChapter 11: File-System Interface
Chapter 11: File-System Interface Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection Objectives To explain the function
More informationGlossary. The target of keyboard input in a
Glossary absolute search A search that begins at the root directory of the file system hierarchy and always descends the hierarchy. See also relative search. access modes A set of file permissions that
More informationFile Concept Access Methods Directory and Disk Structure File-System Mounting File Sharing Protection
File Concept Access Methods Directory and Disk Structure File-System Mounting File Sharing Protection File Concepts File Attributes File Operations File Types Internal File Structure A uniform logical
More informationAppendix A - Glossary(of OO software term s)
Appendix A - Glossary(of OO software term s) Abstract Class A class that does not supply an implementation for its entire interface, and so consequently, cannot be instantiated. ActiveX Microsoft s component
More informationChapter 11: File-System Interface. Operating System Concepts 9 th Edition
Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013 Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection
More informationFile Systems: Interface and Implementation
File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science File System Topics File Concept Access Methods Directory Structure File System Mounting File
More informationFile Systems: Interface and Implementation
File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science Notice: The slides for this lecture have been largely based on those from an earlier edition
More informationChapter 10: File-System Interface
Chapter 10: File-System Interface Objectives: To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file
More informationChapter 10: File-System Interface. File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection
Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection Objectives To explain the function of file systems To describe the interfaces
More informationA Federated Grid Environment with Replication Services
A Federated Grid Environment with Replication Services Vivek Khurana, Max Berger & Michael Sobolewski SORCER Research Group, Texas Tech University Grids can be classified as computational grids, access
More informationChapter 10: File-System Interface
Chapter 10: File-System Interface Objectives: To explain the function of file systems To describe the interfaces to file systems To discuss file-system design tradeoffs, including access methods, file
More informationEI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)
EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:
More informationChapter 11: File-System Interface
Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013! Chapter 11: File-System Interface File Concept" Access Methods" Directory Structure" File-System Mounting" File Sharing" Protection"
More informationChapter 10: File-System Interface. Operating System Concepts 8 th Edition
Chapter 10: File-System Interface Silberschatz, Galvin and Gagne 2009 Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection 10.2
More informationDistributed File System
Distributed File System Project Report Surabhi Ghaisas (07305005) Rakhi Agrawal (07305024) Election Reddy (07305054) Mugdha Bapat (07305916) Mahendra Chavan(08305043) Mathew Kuriakose (08305062) 1 Introduction
More informationChapter 10: File System
Chapter 10: File System Chapter 10: File-System File Concept File attributes, File operations, File types, File structures Access Methods Directory Structure File-System Mounting File Sharing Protection
More informationRouting in Anhinga. Aakash Chauhan October 20th, Chair: Hans-Peter Bischof Reader: Alan Kaminsky Observer: Sidney Marshall
Routing in Anhinga Aakash Chauhan October 20th, 2006 Chair: Hans-Peter Bischof Reader: Alan Kaminsky Observer: Sidney Marshall Agenda Introduction & Background Dynamic Source Routing Project Architecture
More informationDATA STRUCTURES USING C
DATA STRUCTURES USING C File Management Chapter 9 2 File Concept Contiguous logical address space Types: Data numeric character binary Program 3 File Attributes Name the only information kept in human-readable
More informationService Discovery in Pervasive Computing Environments
Service Discovery in Pervasive Computing Environments Presented by Jamal Lewis and Shruti Pathak CS 570 Computer Networks Instructor Dr. Feng Zhu Introduction What is it? Pervasive Computing Environments
More informationFigure 1. A union consists of several underlying branches, which can be of any filesystem type.
1 of 6 6/18/2006 7:16 PM Kernel Korner Unionfs: Bringing Filesystems Together Charles P. Wright Erez Zadok Abstract Unionfs merges several directories into a single unified view. We describe applications
More informationMiddleware. Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004
Middleware Adapted from Alonso, Casati, Kuno, Machiraju Web Services Springer 2004 Outline Web Services Goals Where do they come from? Understanding middleware Middleware as infrastructure Communication
More information5/8/2012. Creating and Changing Directories Chapter 7
Creating and Changing Directories Chapter 7 Types of files File systems concepts Using directories to create order. Managing files in directories. Using pathnames to manage files in directories. Managing
More informationFile Control System 1.0 Product Requirements Document (PRD)
File Control System 1.0 Product Requirements Document (PRD) Author: Ken Rodham Date: January 10, 2005 Revision: 2 Overview This document specifies the requirements for the File Control System 1.0 (FCS).
More informationLecture 10 File Systems - Interface (chapter 10)
Bilkent University Department of Computer Engineering CS342 Operating Systems Lecture 10 File Systems - Interface (chapter 10) Dr. İbrahim Körpeoğlu http://www.cs.bilkent.edu.tr/~korpe 1 References The
More informationA Deadlock-free Multi-granular, Hierarchical Locking Scheme for Real-time Collaborative Editing. Jon A. Preston Sushil K. Prasad
A Deadlock-free Multi-granular, Hierarchical Locking Scheme for Real-time Collaborative Editing Jon A. Preston Sushil K. Prasad Agenda Motivation Related Work in Collaborative Editing Systems The Tree
More informationFile Management. Chapter 12
File Management Chapter 12 Files Used for: input to a program Program output saved for long-term storage Terms Used with Files Field basic element of data contains a single value characterized by its length
More informationManaging Concurrent Software Releases in Management and Test
Software Management 2001 San Diego, CA, USA February 12-16, 2001 Managing Concurrent Software Releases in Management and Test David A. Shinberg Government Communications Laboratory Lucent Technologies
More informationChapter 11: File-System Interface. Long-term Information Storage. File Structure. File Structure. File Concept. File Attributes
Chapter 11: File-System Interface File Concept Access Methods Directory Structure File System Mounting File Sharing Protection Long-term Information Storage 1. Must store large amounts of data 2. Information
More informationContents. Error Message Descriptions... 7
2 Contents Error Message Descriptions.................................. 7 3 4 About This Manual This Unify DataServer: Error Messages manual lists the errors that can be produced by the Unify DataServer
More informationJini Architecture Specification
Jini Architecture Specification A Jini system is a Java technology-centered, distributed system designed for simplicity, flexibility, and federation. The Jini architecture provides mechanisms for machines
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationChapter 10: Peer-to-Peer Systems
Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Introduction To enable the sharing of data and resources
More informationIBM. Security Digital Certificate Manager. IBM i 7.1
IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in
More informationCSC 553 Operating Systems
CSC 553 Operating Systems Lecture 12 - File Management Files Data collections created by users The File System is one of the most important parts of the OS to a user Desirable properties of files: Long-term
More informationOperation Manual DHCP. Table of Contents
Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-2 1.2.1 IP Address Assignment Policy... 1-2 1.2.2 Obtaining IP Addresses
More informationChapter 11: File-System Interface. File Concept. File Structure
Chapter 11: File-System Interface File Concept Access Methods Directory Structure File System Mounting File Sharing Protection ch11_file_sys.ppt [John Copeland s notes added] 11.1 Silberschatz, Galvin
More informationChapter 10: File-System Interface
Chapter 10: File-System Interface Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection 10.2 Silberschatz, Galvin and Gagne 2005
More informationDistributed Computing Environment (DCE)
Distributed Computing Environment (DCE) Distributed Computing means computing that involves the cooperation of two or more machines communicating over a network as depicted in Fig-1. The machines participating
More informationNaming. Naming. Naming versus Locating Entities. Flat Name-to-Address in a LAN
Naming Naming Tanenbaum Ch. 5 Distributed Software Systems CS 707 A name in a distributed system is a string of bits or characters that is used to refer to an entity Types of names: Address: an access
More informationFile-System Interface. File Structure. File Concept. File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection
TDIU11 Operating Systems File-System Interface File-System Interface [SGG7/8/9] Chapter 10 File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection How the file system
More informationPRIMIX SOLUTIONS. Core Labs. Tapestry : Java Web Components Whitepaper
PRIMIX SOLUTIONS Core Labs Tapestry : Java Web s Whitepaper CORE LABS Tapestry: Java Web s Whitepaper Primix Solutions One Arsenal Marketplace Phone (617) 923-6639 Fax (617) 923-5139 Tapestry contact information:
More informationCS454/654 Midterm Exam Fall 2004
CS454/654 Midterm Exam Fall 2004 (3 November 2004) Question 1: Distributed System Models (18 pts) (a) [4 pts] Explain two benefits of middleware to distributed system programmers, providing an example
More informationUNIX Kernel. UNIX History
UNIX History UNIX Kernel 1965-1969 Bell Labs participates in the Multics project. 1969 Ken Thomson develops the first UNIX version in assembly for an DEC PDP-7 1973 Dennis Ritchie helps to rewrite UNIX
More informationChapter 5 Naming. Names, Identifiers, and Addresses
Chapter 5 Naming 1 Names, Identifiers, and Addresses In a distributed system, a name is used to refer to an entity (e.g., computer, service, remote object, file, user) An address is a name that refers
More informationOutline. INF3190:Distributed Systems - Examples. Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles
INF3190:Distributed Systems - Examples Thomas Plagemann & Roman Vitenberg Outline Last week: Definitions Transparencies Challenges&pitfalls Architecturalstyles Today: Examples Googel File System (Thomas)
More informationMany-to-Many Invocation: A New Framework for Building Collaborative Applications in Ad Hoc Networks
Rochester Institute of Technology RIT Scholar Works Articles 11-2002 Many-to-Many Invocation: A New Framework for Building Collaborative Applications in Ad Hoc Networks Hans-Peter Bischof Rochester Institute
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationJavaStat: A Distributed Statistical Computing Environment
New URL: http://www.r-project.org/conferences/dsc-2001/ DSC 2001 Proceedings of the 2nd International Workshop on Distributed Statistical Computing March 15-17, Vienna, Austria http://www.ci.tuwien.ac.at/conferences/dsc-2001
More informationI.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 10: FILE SYSTEM
I.-C. Lin, Assistant Professor. Textbook: Operating System Concepts 8ed CHAPTER 10: FILE SYSTEM Chapter 10: File System File Concept Access Methods Directory Structure File-System Mounting File Sharing
More informationFILE SYSTEMS. CS124 Operating Systems Winter , Lecture 23
FILE SYSTEMS CS124 Operating Systems Winter 2015-2016, Lecture 23 2 Persistent Storage All programs require some form of persistent storage that lasts beyond the lifetime of an individual process Most
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung December 2003 ACM symposium on Operating systems principles Publisher: ACM Nov. 26, 2008 OUTLINE INTRODUCTION DESIGN OVERVIEW
More informationChapter 10: File-System Interface. Operating System Concepts with Java 8 th Edition
Chapter 10: File-System Interface 10.1 Silberschatz, Galvin and Gagne 2009 File Concept A file is a named collection of information that is recorded on secondary storage. Types: Data numeric character
More informationChapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories
Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the
More informationInstalling and Configuring Oracle HTTP Server 12c (12.1.3)
[1]Oracle Fusion Middleware Installing and Configuring Oracle HTTP Server 12c (12.1.3) E48247-03 January 2015 Documentation for installers and system administrators that describes how to install and configure
More informationOperation Manual DHCP H3C S3600 Series Ethernet Switches-Release Table of Contents
Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-1 1.2.1 IP Address Assignment Policy... 1-1 1.2.2 Obtaining IP Addresses
More informationAdvanced Database Applications. Object Oriented Database Management Chapter 13 10/29/2016. Object DBMSs
Object Oriented Database Chapter 13 1 Object DBMSs Underlying concepts: Freely sharing data across processing routines creates unacceptable data dependencies All software should be constructed out of standard,
More informationFile System Interface: Overview. Objective. File Concept UNIT-IV FILE SYSTEMS
UNIT-IV FILE SYSTEMS File System Interface: File Concept Access Methods Directory Structure File System Mounting Protection Overview For most users, the file system is the most visible aspect of an operating
More informationFile-System Interface
File-System Interface Chapter 10: File-System Interface File Concept Access Methods Directory Structure File-System Mounting File Sharing Protection Objectives To explain the function of file systems To
More informationChapter 11: File-System Interface
Chapter 11: File-System Interface Silberschatz, Galvin and Gagne 2013 Chapter 11: File-System Interface File Concept Access Methods Disk and Directory Structure 11.2 Silberschatz, Galvin and Gagne 2013
More informationFile-System Structure
Chapter 12: File System Implementation File System Structure File System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery Log-Structured
More informationFile Management. COMP3231 Operating Systems
File Management COMP3231 Operating Systems 1 References Textbook Tanenbaum, Chapter 6 2 Files Named repository for data Potentially large amount of data Beyond that available via virtual memory (Except
More informationW H I T E P A P E R : T E C H N I C AL. Symantec High Availability Solution for Oracle Enterprise Manager Grid Control 11g and Cloud Control 12c
W H I T E P A P E R : T E C H N I C AL Symantec High Availability Solution for Oracle Enterprise Manager Grid Control 11g and Cloud Control 12c Table of Contents Symantec s solution for ensuring high availability
More informationNaming. Distributed Systems IT332
Naming Distributed Systems IT332 2 Outline Names, Identifier, and Addresses Flat Naming Structured Naming 3 Names, Addresses and Identifiers A name is used to refer to an entity An address is a name that
More informationHow to Use Session Policies
How to Use Session Policies 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More informationA Tutorial on The Jini Technology
A tutorial report for SENG 609.22 Agent Based Software Engineering Course Instructor: Dr. Behrouz H. Far A Tutorial on The Jini Technology Lian Chen Introduction Jini network technology provides a simple
More informationRemote Support. User Guide 7.23
Remote Support User Guide 7.23 Copyright 1997 2011 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco WebEx logo are trademarks or registered trademarks
More informationThis version has been archived. Find the current version at on the Current Documents page. Archived Version. Capture of Live Systems
Scientific Working Group on Digital Evidence Capture of Live Systems Disclaimer: As a condition to the use of this document and the information contained therein, the SWGDE requests notification by e-mail
More informationOutline. Cgroup hierarchies
Outline 4 Cgroups 4-1 4.1 Introduction 4-3 4.2 Cgroups v1: hierarchies and controllers 4-16 4.3 Cgroups v1: populating a cgroup 4-24 4.4 Cgroups v1: a survey of the controllers 4-38 4.5 Cgroups /proc files
More informationChapter 14 Operating Systems
Chapter 14 Operating Systems Ref Page Slide 1/54 Learning Objectives In this chapter you will learn about: Definition and need for operating system Main functions of an operating system Commonly used mechanisms
More informationModeling, Simulation, and Practice of Floor Control for Synchronous and Ubiquitous Collaboration
Modeling, Simulation, and Practice of Floor Control for Synchronous and Ubiquitous Collaboration Kangseok Kim Community Grids Laboratory, Indiana University, Bloomington, IN, USA Department of Computer
More informationBull. HACMP 4.4 Programming Locking Applications AIX ORDER REFERENCE 86 A2 59KX 02
Bull HACMP 4.4 Programming Locking Applications AIX ORDER REFERENCE 86 A2 59KX 02 Bull HACMP 4.4 Programming Locking Applications AIX Software August 2000 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008
More informationProduct Overview. Benefits CHAPTER
CHAPTER 1 Revised July 3, 2012 The Cisco TelePresence Exchange System is an integrated video service-creation platform that enables service providers and strategic partners to offer secure cloud-based
More informationInteraction Center Business Manager Supervisor Functions
Interaction Center Business Manager Supervisor Functions CIC 2016 RX 1 Contents Interaction Supervisor... 10 Introduction... 10 Views... 10 Access to Views is controlled by License Assignment... 11 Alerts...
More informationFiles and the Filesystems. Linux Files
Files and the Filesystems Linux Files The file is the most basic and fundamental abstraction in Linux. Linux follows the everything-is-a-file philosophy. Consequently, much interaction occurs via reading
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 10: File System Interface Prof. Alan Mislove (amislove@ccs.neu.edu) Contiguous logical address space File Concept Types: Data numeric character
More informationExam 2 Review. Fall 2011
Exam 2 Review Fall 2011 Question 1 What is a drawback of the token ring election algorithm? Bad question! Token ring mutex vs. Ring election! Ring election: multiple concurrent elections message size grows
More informationUnderlying computer system = hardware + software
Underlying computer system = hardware + software Thanks to Chandra Krintz and Kevin Sanft, for this figure and some other parts of these lecture notes. Processing data & instructions Program instructions
More informationCS 3110 Fall 2014 Due at 11:59 PM, 11/13/14 Problem Set 5 Version 1 (last modified October 24, 2014)
CS 3110 Fall 2014 Due at 11:59 PM, 11/13/14 Problem Set 5 Version 1 (last modified October 24, 2014) Objectives Write asynchronous programs in an event-driven style. Learn about the MapReduce paradigm.
More informationCongestion Avoidance Overview
Congestion avoidance techniques monitor network traffic loads in an effort to anticipate and avoid congestion at common network bottlenecks. Congestion avoidance is achieved through packet dropping. Among
More informationDistributed File Systems. CS 537 Lecture 15. Distributed File Systems. Transfer Model. Naming transparency 3/27/09
Distributed File Systems CS 537 Lecture 15 Distributed File Systems Michael Swift Goal: view a distributed system as a file system Storage is distributed Web tries to make world a collection of hyperlinked
More informationIntroduction to Operating Systems. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University
Introduction to Operating Systems Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Why OS? 2 What is an OS? Software that converts hardware into
More informationTest On Line: reusing SAS code in WEB applications Author: Carlo Ramella TXT e-solutions
Test On Line: reusing SAS code in WEB applications Author: Carlo Ramella TXT e-solutions Chapter 1: Abstract The Proway System is a powerful complete system for Process and Testing Data Analysis in IC
More informationChapter 2 CommVault Data Management Concepts
Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and
More informationFederated Namespace BOF: Applications and Protocols
Federated Namespace BOF: Applications and Protocols James Lentini Advanced Technology Group NetApp, Inc. jlentini@netapp.com USENIX FAST 2010 OVERVIEW USENIX FAST 2010 2 What is FedFS? FedFS is a set of
More informationFile Management. COMP3231 Operating Systems
File Management COMP3231 Operating Systems 1 References Textbook Tanenbaum, Chapter 6 2 Files Named repository for data Potentially large amount of data Beyond that available via virtual memory (Except
More informationPart Four - Storage Management. Chapter 10: File-System Interface
Part Four - Storage Management Chapter 10: File-System Interface Chapter 10: File-System Interface 10.1 File Concept 10.2 Access Methods 10.3 Directory and Disk Structure 10.4 File-System Mounting 10.5
More informationFiles. File Structure. File Systems. Structure Terms. File Management System. Chapter 12 File Management 12/6/2018
Operating Systems: Internals and Design Principles Chapter 2 Management Ninth Edition By William Stallings s collections created by users The System is one of the most important parts of the OS to a user
More informationCS2028 -UNIX INTERNALS
DHANALAKSHMI SRINIVASAN INSTITUTE OF RESEARCH AND TECHNOLOGY,SIRUVACHUR-621113. CS2028 -UNIX INTERNALS PART B UNIT 1 1. Explain briefly details about History of UNIX operating system? In 1965, Bell Telephone
More informationMulti-way Search Trees. (Multi-way Search Trees) Data Structures and Programming Spring / 25
Multi-way Search Trees (Multi-way Search Trees) Data Structures and Programming Spring 2017 1 / 25 Multi-way Search Trees Each internal node of a multi-way search tree T: has at least two children contains
More information[MS-RDPECLIP]: Remote Desktop Protocol: Clipboard Virtual Channel Extension
[MS-RDPECLIP]: Remote Desktop Protocol: Clipboard Virtual Channel Extension Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
More informationProcess. Program Vs. process. During execution, the process may be in one of the following states
What is a process? What is process scheduling? What are the common operations on processes? How to conduct process-level communication? How to conduct client-server communication? Process is a program
More information18.3 Deleting a key from a B-tree
18.3 Deleting a key from a B-tree B-TREE-DELETE deletes the key from the subtree rooted at We design it to guarantee that whenever it calls itself recursively on a node, the number of keys in is at least
More informationIntroduction to Operating Systems
Introduction to Operating Systems Jinkyu Jeong (jinkyu@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu EEE3052: Introduction to Operating Systems, Fall 2017, Jinkyu Jeong
More information