Persistent 9P Sessions for Plan 9
|
|
|
- Tyrone Evans
- 10 years ago
- Views:
Transcription
1 Persistent 9P Sessions for Plan 9 Gorka Guardiola, [email protected] Russ Cox, [email protected] Eric Van Hensbergen, [email protected] ABSTRACT Traditionally, Plan 9 [5] runs mainly on local networks, where lost connections are rare. As a result, most programs, including the kernel, do not bother to plan for their file server connections to fail. These programs must be restarted when a connection does fail. If the kernel s connection to the root file server fails, the machine must be rebooted. This approach suffices only because lost connections are rare. Across long distance networks, where connection failures are more common, it becomes woefully inadequate. To address this problem, we wrote a program called recover, which proxies a 9P session on behalf of a client and takes care of redialing the remote server and reestablishing connection state as necessary, hiding network failures from the client. This paper presents the design and implementation of recover, along with performance benchmarks on Plan 9 and on Linux. 1. Introduction Plan 9 is a distributed system developed at Bell Labs [5]. Resources in Plan 9 are presented as synthetic file systems served to clients via 9P, a simple file protocol. Unlike file protocols such as NFS, 9P is stateful: per-connection state such as which files are opened by which clients is maintained by servers. Maintaining per-connection state allows 9P to be used for resources with sophisticated access control policies, such as exclusive-use lock files and chat session multiplexers. It also makes servers easier to implement, since they can forget about file ids once a connection is lost. The benefits of having a stateful protocol come with one important drawback: when the network connection is lost, reestablishing that state is not a completely trivial operation. Most 9P clients, including the Plan 9 kernel, do not plan for the loss of a file server connection. If a program loses a connection to its file server, the connection can be remounted and the program restarted. If the kernel loses the connection to its root file server, the machine can be rebooted. These heavy-handed solutions are only appropriate when connections fail infrequently. In a large system with many connections, or in a system with wide-area network connections, it becomes necessary to handle connection failures in a more graceful manner than restarting the server, especially since restarting the server might cause other connections to break. One approach would be to modify individual programs to handle the loss of their file servers. In cases where the resources have special semantics, such as exclusive-use lock files, this may be necessary to ensure that application-specific semantics and invariants are maintained. In general, however, most remote file servers serve traditional on-disk file systems. For these connections, it makes more sense to delegate the handling of connection failure to a single program, rather than need to change every client (including cat and ls). We wrote a 9P proxy called recover to handle network connection failures and to hide them from clients, so that the many programs written assuming connections never fail can continue to be used without modification. Keeping the recovery logic in a single program makes it easier to debug, modify, and even to extend. For example, in some cases it might make sense to try dialing a different file system when one fails. This paper presents the design and implementation of recover, along with performance
2 measurements. 2. Design Recover proxies 9P messages between a local client and a remote server. It posts a 9P service pipe in /srv or mounts itself directly into a name space, and then connects to the remote server on demand, either by dialing a particular network address or by running a command (as in sshsrv). Recover keeps track of every active request and fid in the local 9P session. When the connection to the remote server is lost, the remote tags and fids are lost, but the local ones are simply marked not y. When recover later receives a new request over the local connection, it first redials the remote connection, if necessary, and then reestablishes any fids that are not y. To do this, recover must record the path and open mode associated with each fid, so that the fid can be rewalked and reopened after reconnecting. Reestablishment of remote state is demand-driven: recover will not waste network bandwidth or server resources establishing connections or fids that are not needed. The details of what state needs to be reestablished vary depending on the 9P message. The rest of this section discusses the handling of each message and then some special cases. We assume knowledge of the 9P protocol; for details, see section 5 of the Plan 9 manual [9]. Version. Not directly proxied. Recover assumes the 9P2000 version of the protocol. It is considered an error if the remote server lowers its chosen maximum message size from one connection to the next. Auth. Not directly proxied. Recover requires no authentication from its local client, and uses the local factotum [2] to authenticate to the remote server. 9P2000 has no mechanism to reinitiate authentication in the middle of a 9P conversation, so using the local factotum is really the only choice. A recover running on a shared server could use the host owner s factotum to authenticate on behalf of other users, allowing multiple users to share the connection. This connection sharing behavior, which would need to trust the uname in the Tattach message, is not implemented. Attach. Not directly proxied. Recover keeps a single root fid per named remote attachment and treats Tattach as a clone (zero-element walk) of that root fid. Walk. Recover reestablishes the fid if necessary and then issues the walk request. On success, recover records the path associated with newfid in order to re newfid if needed in the future. Open. Recover reestablishes fid if necessary and then forwards the request. On success, recover records the open mode associated with fid so that it can be reopened in the future. Create. Handled similarly to open, except that recover must also update fid s path on success. Read, Write, Stat, Wstat. Recover reestablishes fid if necessary, and then forwards the request. Clunk. If fid is y, recover forwards the request. If fid is not y, recover simply s the state it is keeping for fid and sends a successful Rclunk. There is one special case: if fid was opened remove-on-close, the fid must be reestablished if it is not y, and recover rewrites the Tclunk into a Tremove when forwarding the request. Flush. If the request named by oldtag has been sent to the remote server on the current connection, the Tflush request must be forwarded. Otherwise, if the connection has been lost since the corresponding request was sent, the request is no longer active: recover frees its internal state and responds with a Rflush. Special cases Remove on close. Before forwarding a Topen or T request, recover removes the remove-on-close (ORCLOSE) bit from the open mode, so that the file will not be removed on connection failure. When forwarding a Tclunk of such a fid, recover rewrites the message into a Tremove to implement the remove-on-close. Exclusive-use files. Recover does not allow opening of exclusive-use files (those with the QTEXCL qid type bit), to avoid breaking the exclusive-use semantics on such files. This prohibition could be relaxed to simply disallowing reestablishment of exclusive-use fids, but disallowing all access seemed
3 safer, especially in cases such as the mail system where the exclusive-use files are used as locks that protect other, non-exclusive-use files. Directory s. 9P imposes restrictions on the offset used in a directory : it must be zero, to start ing at the beginning of the directory, or it must be the sum of the offset of the last and the number of bytes returned by that. Internally, most 9P servers keep an internal representation of where the last on a fid left off and treat a zero offset as meaning start over and non-zero offsets as meaning continue from last. It is not possible to start a directory in the middle if the connection is lost and the must be restarted. Recover handles a failed mid-directory by causing it to start over at the beginning of the directory, duplicating entries that were returned on the previous connection. This behavior is not ideal, but is not worse than the other stateless approaches. Perhaps the best approach would be to the entire directory to implement a zero-offset and then serve subsequent s from a saved copy, but this issue does not arise frequently enough to bother us. 3. Implementation Recover is implemented as two shared-memory procs, one ing local 9P requests (listensrv) and one ing remote 9P responses (listennet). Both procs can manipulate the perfid and per-request state and can issue new messages to the remote server; they use a single lock to avoid both running at the same time. Errors writing to the remote server connection are ignored: connection failures are noticed as failed s in listennet. The difficult part of writing a program like recover is testing it. One of the authors wrote recover in 1999 for the second edition of Plan 9. It worked well for day-to-day use mounting file servers across wide-area internet connections, and was used until 9P2000, the current version of 9P, was introduced in Even so, it occasionally failed in mysterious ways and was never fully debugged. To test recover after convering it for use in 9P2000, we added a testing flag giving a sequence of deterministic failures to introduce (for example, 3,5 means that the third should fail, and then the fifth after that should fail). These failures are interpreted by listennet as connection failures, causing it to hang up and redial. We tested recover using a small workload that exercised each message, running the workload with all possible combinations of one and two simulated failures. This testing turned up some bugs, but the deterministic framework made them easy to isolate and correct. 4. Performance Recover runs on Plan 9 and also on Linux using the Plan 9 from User Space [3] libraries. We measured recover s performance using the Postmark benchmark. All measurements are shown as the average of 16,384 transactions. Figure 1 compares the performance of direct file server connections against connections proxied by recover, in three different configurations running on Plan 9: a local user-level file server running on the same machine, a file server connected via a 1Gbit/s ethernet, and a file server connected via a 100Mbit/s ethernet. The local connection is bottlenecked mainly by context switching overhead, so introducing a second user level process essentially halves the throughput. The overhead of recover is far less noticeable on the ethernets, where local processing is no longer the bottleneck. Figure 2 shows a similar comparison for Linux, using a local connection and a 1Gbit/s network connection. In this case there are three configurations in each comparison. The first is the Linux kernel mounting a user-level 9P file server directly. The second is the Linux kernel mounting a user-level 9P file server via the Plan 9 from User Space program srv, which multiplexes multiple clients onto a single service connection. The third is the Linux kernel mounting the user-level 9P file server via recover. On Linux, recover posts its 9P service using the srv program, so the comparison between the last two configurations isolates the slowdown due to recover. The relatively large difference between srv and recover on the 1Gbit/s connection, especially in light of the relatively small difference on the local connection, is unexplained. Profiling using oprofile [8] indicated that most of the time was spent in locking routines, suggesting a performance problem in either the Plan 9 from User Space th library, but we did not investigate deeply. We did not measure Linux on a 100Mbit/s ethernet connection, nor did we measure recover posting a service without srv.
4 300 direct connection recover operations per second loopback 1000Mbit/s 100Mbit/s Figure 1: Performance of recover compared to direct connection on Plan 9. operations per second loopback 1000Mbit/s direct connection srv recover Figure 2: Performance of recover compared to srv and direct connection on Linux. Overall, the performance of recover seems entirely reasonable in the configurations where it is expected to be used. On Plan 9, using recover on a fast network connection incurs approximately a 10% performance penalty. On Linux the penalty is higher, but we suspect performance bugs in other software. Over slower long-distance connections, the performance penalty is hardly noticeable. 5. Discussion Recover is not the first attempt to bring persistent 9P connections to Plan 9. In the mid to late 1990s, Phil Winterbottom added this capability to a development version of the Plan 9 kernel, but it was never robust enough to be relied upon. Writing recover in user space made testing and debugging considerably simpler. Use in high-performance situations might require moving recover back into the kernel, but doing so would require finding some way to conduct exhaustive failure testing in order to be robust. Peter Bosch s aan [9] protocol is also used to provide persistent 9P connections. It serves as a lower-level transport protocol just above TCP, using a custom protocol to provide the view of a persistent network connection across multiple TCP sessions. Aan is protocol-agnostic but relies on having custom software and persistent state at both sides of the connection. Recover depends only on custom software and persistent state on the client side. As a result, recover is slightly easier to deploy and is robust even against server failures or restarts. Vic Zandy s TCP racks and rocks [7] also provide persistent network connections, and although they are implemented differently, for the purposes of this discussion they are logically equivalent to aan. Finally, note that recover is targeted mainly at traditional disk-based file systems and is not appropriate in all contexts. Synthetic file systems such as /net [6] often assign meanings to individual file operations and destroy state when files are closed. On such systems, simply reconnecting and replaying a sequence of opens and walks does not re the state at the time of the connection failure. Handling these situations requires failure-aware applications or infrastructure such as Plan B s /net [1].
5 References [1] Francisco J. Ballesteros, Eva M. Castro, Gorka Guardiola Muzquiz, Katia Leal Algara, and Pedro de las Heras Quiros. /net: A Network Abstraction for Mobile and Ubiquitous Computing Environments in the Plan B Operating System. 6th IEEE Workshop on Mobile Computing Systems and Applications, [2] Russ Cox, Eric Grosse, Rob Pike, David L. Presotto, and Sean Quinlan. Security in Plan 9. USENIX Security Symposium, [3] Russ Cox. Plan 9 from User Space. [4] Jeffrey Katcher. Postmark: a New File System Benchmark. Network Appliance Technical Report TR3022, October [5] Rob Pike, Dave Presotto, Sean Dorward, Bob Flandrena, Ken Thompson, Howard Trickey, and Phil Winterbottom. Plan 9 from Bell Labs. Computing Systems, 8, 3, Summer 1995, pp [6] Dave Presotto and Phil Winterbottom. The Organization of Networks in Plan 9. Proceedings of the 1993 USENIX Winter Conference, pp [7] Victor C. Zandy and Barton P. Miller. Reliable network connections. Proceedings of the 8th annual International Conference on Mobile Computing and Networking, 2002, pp [8] OProfile a System Profiler for Linux. [9] Plan 9 manual.
Implementing Union Filesystem as a 9P2000 File Server
Implementing Union Filesystem as a 9P2000 File Server Latchesar Ionkov Los Alamos National Laboratory [email protected] ABSTRACT This paper describes the design and implementation of a 9P2000 file server
NFS File Sharing. Peter Lo. CP582 Peter Lo 2003 1
NFS File Sharing Peter Lo CP582 Peter Lo 2003 1 NFS File Sharing Summary Distinguish between: File transfer Entire file is copied to new location FTP Copy command File sharing Multiple users can access
Plan 9 Authentication in Linux
Plan 9 Authentication in Linux Ashwin Ganti University of Illinois at Chicago [email protected] ABSTRACT This paper talks about the implementation of the Plan 9 authentication mechanisms for Linux. As
Lab 2 : Basic File Server. Introduction
Lab 2 : Basic File Server Introduction In this lab, you will start your file system implementation by getting the following FUSE operations to work: CREATE/MKNOD, LOOKUP, and READDIR SETATTR, WRITE and
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
Chapter 11 Distributed File Systems. Distributed File Systems
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
Distributed File Systems
Distributed File Systems File Characteristics From Andrew File System work: most files are small transfer files rather than disk blocks? reading more common than writing most access is sequential most
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Distributed File Systems. NFS Architecture (1)
COP 6611 Advanced Operating System Distributed File Systems Chi Zhang [email protected] NFS Architecture (1) a) The remote access model. (like NFS) b) The upload/download model (like FTP) 2 1 NFS Architecture
Using HP StoreOnce Backup systems for Oracle database backups
Technical white paper Using HP StoreOnce Backup systems for Oracle database backups Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key features and benefits 2 HP StoreOnce
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework)
Enabling Practical SDN Security Applications with OFX (The OpenFlow extension Framework) John Sonchack, Adam J. Aviv, Eric Keller, and Jonathan M. Smith Outline Introduction Overview of OFX Using OFX Benchmarks
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
June 2009. Blade.org 2009 ALL RIGHTS RESERVED
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
Highly Available AMPS Client Programming
Highly Available AMPS Client Programming 60East Technologies Copyright 2013 All rights reserved. 60East, AMPS, and Advanced Message Processing System are trademarks of 60East Technologies, Inc. All other
Continuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
Fossil an archival file server
Fossil an archival file server Russ Cox [email protected] PDOS Group Meeting January 7, 2003 http://pdos/~rsc/talks History... Cached WORM file server (Quinlan and Thompson): active file system on magnetic disk
Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.2
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.2 June 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
Automated Cloud Migration
Automated Cloud Migration Now you can quickly and safely deploy multi-tier production apps into the cloud without virtualization and/or modification for use cases that include DevTest and Disaster Recovery.
Engineering a NAS box
Engineering a NAS box One common use for Linux these days is as a Network Attached Storage server. In this talk I will discuss some of the challenges facing NAS server design and how these can be met within
How To Make A Backup System More Efficient
Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem October, 2006 Introduction Data de-duplication has recently gained significant industry attention,
Assignment 6: Internetworking Due October 17/18, 2012
Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements. Marcia Zangrilli and Bruce Lowekamp
Transparent Optimization of Grid Server Selection with Real-Time Passive Network Measurements Marcia Zangrilli and Bruce Lowekamp Overview Grid Services Grid resources modeled as services Define interface
PARALLELS CLOUD STORAGE
PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...
Recovery Protocols For Flash File Systems
Recovery Protocols For Flash File Systems Ravi Tandon and Gautam Barua Indian Institute of Technology Guwahati, Department of Computer Science and Engineering, Guwahati - 781039, Assam, India {r.tandon}@alumni.iitg.ernet.in
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Chapter 7: Distributed Systems: Warehouse-Scale Computing. Fall 2011 Jussi Kangasharju
Chapter 7: Distributed Systems: Warehouse-Scale Computing Fall 2011 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note:
Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle
Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle Agenda Introduction Database Architecture Direct NFS Client NFS Server
Globus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective
ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective Part II: Data Center Software Architecture: Topic 1: Distributed File Systems Finding a needle in Haystack: Facebook
Stateless Compute Cluster
5th Black Forest Grid Workshop 23rd April 2009 Stateless Compute Cluster Fast Deployment and Switching of Cluster Computing Nodes for easier Administration and better Fulfilment of Different Demands Dirk
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
1 Storage Devices Summary
Chapter 1 Storage Devices Summary Dependability is vital Suitable measures Latency how long to the first bit arrives Bandwidth/throughput how fast does stuff come through after the latency period Obvious
Demystifying Virtualization for Small Businesses Executive Brief
Demystifying Virtualization for Small Businesses White Paper: Demystifying Virtualization for Small Businesses Demystifying Virtualization for Small Businesses Contents Introduction............................................................................................
Performance Oriented Management System for Reconfigurable Network Appliances
Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate
Last class: Distributed File Systems. Today: NFS, Coda
Last class: Distributed File Systems Issues in distributed file systems Sun s Network File System case study Lecture 19, page 1 Today: NFS, Coda Case Study: NFS (continued) Case Study: Coda File System
Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
Datacenter Operating Systems
Datacenter Operating Systems CSE451 Simon Peter With thanks to Timothy Roscoe (ETH Zurich) Autumn 2015 This Lecture What s a datacenter Why datacenters Types of datacenters Hyperscale datacenters Major
09'Linux Plumbers Conference
09'Linux Plumbers Conference Data de duplication Mingming Cao IBM Linux Technology Center [email protected] 2009 09 25 Current storage challenges Our world is facing data explosion. Data is growing in a amazing
TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
File System Design for and NSF File Server Appliance
File System Design for and NSF File Server Appliance Dave Hitz, James Lau, and Michael Malcolm Technical Report TR3002 NetApp 2002 http://www.netapp.com/tech_library/3002.html (At WPI: http://www.wpi.edu/academics/ccc/help/unix/snapshots.html)
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.
1. UNISOL SysAdmin Overview SysAdmin helps systems administrators manage their UNIX systems and networks more effectively. SysAdmin is a comprehensive system administration package which provides a secure
CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds
- The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations
Chapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
Using HP StoreOnce D2D systems for Microsoft SQL Server backups
Technical white paper Using HP StoreOnce D2D systems for Microsoft SQL Server backups Table of contents Executive summary 2 Introduction 2 Technology overview 2 HP StoreOnce D2D systems key features and
Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas
3. Replication Replication Goal: Avoid a single point of failure by replicating the server Increase scalability by sharing the load among replicas Problems: Partial failures of replicas and messages No
Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade
Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
Security Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
Building High-Performance iscsi SAN Configurations. An Alacritech and McDATA Technical Note
Building High-Performance iscsi SAN Configurations An Alacritech and McDATA Technical Note Building High-Performance iscsi SAN Configurations An Alacritech and McDATA Technical Note Internet SCSI (iscsi)
Web Service Robust GridFTP
Web Service Robust GridFTP Sang Lim, Geoffrey Fox, Shrideep Pallickara and Marlon Pierce Community Grid Labs, Indiana University 501 N. Morton St. Suite 224 Bloomington, IN 47404 {sblim, gcf, spallick,
Protect Microsoft Exchange databases, achieve long-term data retention
Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...
COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel I/O (I) I/O basics Fall 2012 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network card 1 Network card
83-10-41 Types of Firewalls E. Eugene Schultz Payoff
83-10-41 Types of Firewalls E. Eugene Schultz Payoff Firewalls are an excellent security mechanism to protect networks from intruders, and they can establish a relatively secure barrier between a system
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02
EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N 300-002-826 REV A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2003-2005
The Design of the Inferno Virtual Machine. Introduction
The Design of the Inferno Virtual Machine Phil Winterbottom Rob Pike Bell Labs, Lucent Technologies {philw, rob}@plan9.bell-labs.com http://www.lucent.com/inferno Introduction Virtual Machine are topical
COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network
$ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@";
NAME Net::FTP - FTP Client class SYNOPSIS use Net::FTP; $ftp = Net::FTP->new("some.host.name", Debug => 0) or die "Cannot connect to some.host.name: $@"; $ftp->login("anonymous",'-anonymous@') or die "Cannot
Protecting enterprise servers with StoreOnce and CommVault Simpana
Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
Enterprise Backup and Restore technology and solutions
Enterprise Backup and Restore technology and solutions LESSON VII Veselin Petrunov Backup and Restore team / Deep Technical Support HP Bulgaria Global Delivery Hub Global Operations Center November, 2013
Overview of Luna High Availability and Load Balancing
SafeNet HSM TECHNICAL NOTE Overview of Luna High Availability and Load Balancing Contents Introduction... 2 Overview... 2 High Availability... 3 Load Balancing... 4 Failover... 5 Recovery... 5 Standby
Network File System (NFS) Pradipta De [email protected]
Network File System (NFS) Pradipta De [email protected] Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
an introduction to networked storage
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
A Comparison on Current Distributed File Systems for Beowulf Clusters
A Comparison on Current Distributed File Systems for Beowulf Clusters Rafael Bohrer Ávila 1 Philippe Olivier Alexandre Navaux 2 Yves Denneulin 3 Abstract This paper presents a comparison on current file
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky
Deploying Red Hat Enterprise Virtualization On Tintri VMstore Systems Best Practices Guide
TECHNICAL WHITE PAPER Deploying Red Hat Enterprise Virtualization On Tintri VMstore Systems Best Practices Guide www.tintri.com Contents Intended Audience... 4 Introduction... 4 Consolidated List of Practices...
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
UserLock advanced documentation
UserLock advanced documentation 1. Agent deployment with msi package or with the UserLock deployment module The UserLock deployment module doesn t deploy the msi package. It just transfers the agent file
Oracle EXAM - 1Z0-102. Oracle Weblogic Server 11g: System Administration I. Buy Full Product. http://www.examskey.com/1z0-102.html
Oracle EXAM - 1Z0-102 Oracle Weblogic Server 11g: System Administration I Buy Full Product http://www.examskey.com/1z0-102.html Examskey Oracle 1Z0-102 exam demo product is here for you to test the quality
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
EVault Software. Course 361 Protecting Linux and UNIX with EVault
EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in
Taking Linux File and Storage Systems into the Future. Ric Wheeler Director Kernel File and Storage Team Red Hat, Incorporated
Taking Linux File and Storage Systems into the Future Ric Wheeler Director Kernel File and Storage Team Red Hat, Incorporated 1 Overview Going Bigger Going Faster Support for New Hardware Current Areas
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
Distributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
Fundamental Approaches to WAN Optimization. Josh Tseng, Riverbed
Fundamental Approaches to WAN Optimization Josh Tseng, Riverbed SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this
Red Hat Enterprise Linux as a
Red Hat Enterprise Linux as a file server You re familiar with Red Hat products that provide general-purpose environments for server-based software applications or desktop/workstation users. But did you
AIX NFS Client Performance Improvements for Databases on NAS
AIX NFS Client Performance Improvements for Databases on NAS October 20, 2005 Sanjay Gulabani Sr. Performance Engineer Network Appliance, Inc. [email protected] Diane Flemming Advisory Software Engineer
PARALLELS CLOUD SERVER
PARALLELS CLOUD SERVER An Introduction to Operating System Virtualization and Parallels Cloud Server 1 Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating System Virtualization...
WebArrow: System Overview and Architecture Namzak Labs White Paper, 2003-02
WebArrow: System Overview and Architecture Namzak Labs White Paper, 2003-02 Overview This white paper presents an introduction to, and architectural overview of Namzak Labs WebArrow a system for web-based
Load Balancing & High Availability
Load Balancing & High Availability 0 Optimizing System Resources through Effective Load Balancing An IceWarp White Paper October 2008 www.icewarp.com 1 Background Every server is finite. Regardless of
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Virtualization. Michael Tsai 2015/06/08
Virtualization Michael Tsai 2015/06/08 What is virtualization? Let s first look at a video from VMware http://bcove.me/x9zhalcl Problems? Low utilization Different needs DNS DHCP Web mail 5% 5% 15% 8%
Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition
Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation
