Designing an NFS-based Mobile Distributed File System for Ephemeral Sharing in Proximity Networks

Size: px
Start display at page:

Download "Designing an NFS-based Mobile Distributed File System for Ephemeral Sharing in Proximity Networks"

Transcription

1 Designing an NFS-based Mobile Distributed File System for Ephemeral Sharing in Proximity Networks Nikolaos Michalakis Computer Science Department New York University, New York, NY Dimitris Kalofonos Pervasive Computing Group (PCG) Nokia Research Center, Boston, MA 1 ASWN 04, August 11, 2004

2 Outline Ephemeral vs. Persistent file sharing Motivation for using NFS as a basis for Ephemeral M-DFS Related Approaches NFS Performance in Proximity Networks Problems with Mobility Experimental and Simulation Setup Performance Results Designing an M-DFS for Ephemeral Sharing M-DFS Design Topics and Suggestions An Implementation Proposal Future Directions 2 ASWN 04, August 11, 2004

3 Ephemeral vs. Persistent File Sharing >> cd /sophia/pictures >>./netscape /tom/cool_page.html >> /sophia/mplayer /mary/music/cool_song.mp3 >> /tom/xview /jack/cool_pic.jpg >>./excel /office/not_so_cool_spreadsheet.xls >> ls /home/my_files/ JOHN HERMES PHONE HOME TOM HERMES HERMES INTERNET PROXIMITY NETWORK Example of persistent sharing OFFICE SOPHIA JACK Example of ephemeral sharing HERMES 3 ASWN 04, August 11, 2004

4 Ephemeral vs. Persistent File Sharing (cont.) Ephemeral file sharing: a remote file system is discovered and mounted to enable short-lived collaboration among users Intended mainly for read-only file sharing Client caching takes place mainly to improve performance (e.g. in low bandwidth-links). It does not guarantee disconnected operation Deals with short disconnections (order of seconds-minutes) due to intermittent connectivity at the link level. No state is expected to survive long (as defined by the user) disconnections If files are to remain accessible in the long-term, user saves local copies Persistent file sharing: enables users to keep a personal distributed file repository among their devices (e.g. phones, PC s) Intended mainly for read-write file sharing Client performs (Coda-like) hoarding when fully connected, can operate on files when disconnected, reintegration-conflict resolution when reconnected Disconnections can be arbitrarily long (order of hours-days) Files are accessible in the long-term without saving local copies 4 ASWN 04, August 11, 2004

5 Why Use NFS as Basis for Ephemeral M-DFS? NFS perhaps the most successful DFS to date. Widely used, well tested Native support for NFS in Linux kernel. Appealing for Linuxbased mobile devices and experimentation NFS interface has made it attractive as a basis to build DFS with additional features. Tools available (e.g. SFS toolkit) for user level implementation. Makes portability across platforms possible Light mounting and unmounting process allows discovering exported files systems and mounting on demand Allows RPC-based access to remote files, without requiring the transfer of whole files Not as complex as other popular DFS for mobility (e.g. CODA). More suitable as a basis to build M-DFS for resourceconstraint devices 5 ASWN 04, August 11, 2004

6 Related Approaches CODA/Intermezzo Supports true disconnected operation Client performs aggressive caching (hoarding) when connected Optimizations available for weak connectivity Intended for Persistent sharing Some design aspects applicable to Ephemeral sharing. However, too complex to be used as is. Removing functionality tricky NFS/M NFS modified to support (CODA-like) disconnected operation Requires Kernel modifications Intended for Persistent sharing. Redundant functionality for us SFS/LBFS User-level DFS on top of NFS to add security, low BW enhancements SFS toolkit available that deals with issues of loopback NFS 6 ASWN 04, August 11, 2004

7 NFS Performance in Proximity Networks: Experimental Setup NFS v3 client and server on two laptops running Linux Mobility: IP address changes by attaching to different AP Intermittent connectivity: disconnections by releasing IP address b measurements Transfers with both client and server on same AP Data rate selection: 1Mbps, 2Mbps, 11Mbps Bluetooth measurements BlueZ stack v2.2 with PAN profile 1.0 Bluetooth v1.1 USB adapters Simple piconet with a Master (NFS Server) and a Slave (NFS Client) Increasing distance increased the RTT because of link-level re-tx Data rate selection: DH1, DH3, DH5 7 ASWN 04, August 11, 2004

8 NFS Performance in Proximity Networks: Simulation Client1 Routing Host Link11 Server1 Hub1 eth0 Link12 Link21 Link22 Hub2 eth1 Client2 Server2 Network simulator using the Click modular router 8 ASWN 04, August 11, 2004

9 NFS Performance in Proximity Networks: Simulation (cont.) Client to server path Delay Module Bandwidth Module Disconnection Module Loss Module eth0 Control Socket eth1 Loss Module Disconnection Module Bandwidth Module Delay Module Server to client path The configurable link 9 ASWN 04, August 11, 2004

10 NFS Problems with Mobility and Disconnections Client has mounted Client not mounted (server already started) Client IP address change: Server IP address change: Client network interface down: Server network interface down: Client disconnects and reconnects with old IP address: Server disconnects and reconnects with old IP address: Client receives a stale filehandle error. The client is using a filehandle that is exported to another client address. Client is trying to contact old address. If hard mounted then it blocks forever. If soft mounted it timeouts and fails (I/O error). Network unreachable error, no matter whether data cached or not at the client. If hard mounted client blocks forever. If soft mounted it timeouts and fails (I/O error). As long as the reassignment does not take longer than the timeout, the client only experiences a delay. As long as the reassignment does not take longer than the timeout, the client only experiences a delay. Client receives an access denied error. The server has already created a list of client addresses that can access the exported file systems. No errors. The mounted directory is empty, i.e. not mounted to anything. Client cannot mount. Mount process gets can't get address for server error. No errors. No errors. 10 ASWN 04, August 11, 2004

11 NFS in Proximity Networks: Performance Results Effect of RTT vs Bandwidth (measurements) BTH WLAN 10K file 50K file 100K file time to read file (s) bandwidth (KB/s) T N ( RTT + rpc ) bw 11 ASWN 04, August 11, 2004

12 FS in Proximity Networks: Performance Results (cont.) 70 Effect of RTT vs Bandwidth (simulation model) Time to read 50K file (s) Bandwidth (KB/s) log scale T N ( RTT + RTT=200ms RTT=100ms RTT=20ms rpc ) bw 12 ASWN 04, August 11, 2004

13 FS in Proximity Networks: Performance Results (cont.) BTH dark zone (measurements) BTH dark zone (measurements) 140 UDP, timeout =10s UDP, timeout =1s 120 TCP 100 UDP, timeout =0.5s UDP, timeout =0.1s timeout =0.1s 40 timeout =0.5s timeout =1s 20 timeout =10s TCP Time (s) time to reply (s) timeout =0.1s timeout =0.5s timeout =1s timeout =10s TCP RPC req. no 13 ASWN 04, August 11, 2004

14 FS in Proximity Networks: Performance Results (cont.) Effect of disconnections (measurements) RPC seq. no cold no discon. UDP finish when no time finish when no time wasted (warm) wasted (cold) warm no discon. UDP cold with discon. UDP warm with discon. UDP cold with discon. TCP warm with discon. TCP wasted time (cold) 5.5s 5.5s 5.5s wasted time (warm) Time (s) 14 ASWN 04, August 11, 2004

15 FS in Proximity Networks: Performance Results (cont.) 350 Effect of packet loss rate (simulation model) time to read 100K file (s) timeo=0.1s timeo=0.5s timeo=1s timeo=10s TCP packet loss rate (%) 15 ASWN 04, August 11, 2004

16 M-DFS Design Topics and Suggestions More aggressive caching to support temporary disconnections In the case of RO ephemeral sharing caching can be simplified, e.g. callbacks with leases: close-to-open consistency, reduced traffic In addition to file and directory contents, client caches metadata such as picture thumbnails or mp3 samples Automatic session recovery to deal with errors because of client/server mobility and loss of connectivity Session support mechanism: client and server have active session (server exported and client mounted the file system), data in transit. Need to decide whether to resume or drop pending sessions upon reconnection Session recovery mechanism: the server has started a session and is waiting for client to join (server only exported file system). Need to preserve the file system state related to mounting Techniques for traffic reduction data compression techniques, application specific data reduction techniques using metadata (e.g. thumbnails, mp3 samples) 16 ASWN 04, August 11, 2004

17 M-DFS Design Topics and Suggestions (cont.) Enhanced metadata to help deal with weak connectivity networks Application specific metadata (e.g. thumbnails, mp3 samples) are opaque to the M-DFS. The M-DFS allocates extra space and an API for applications to use them M-DFS specific metadata are seen only by the FS and the OS. Can be used to improve performance, provide enhanced capabilities and make the system more adaptive to mobile conditions. Example: estimated file transmission time Access control and distributed authentication ACL provide better security than Unix access control Use ephemeral ACLs, i.e. ACLs that are created and updated by the server owner on the fly. Remove stale entries in ACLs to avoid long ACLs with few active user. Distributed client/server authentication an issue without trusted authorities. Simplest solution would be to use offline means, e.g. userto-user communication Naming and file system removal A global name space not required. Server repository may be identified explicitly by the device name that exports it. Uniform name space desirable 17 ASWN 04, August 11, 2004

18 An Implementation Proposal M-DFS client M-DFS server App RO M-DFS Client (loopback server) Cache Manager (loopback client) User-level RO M-DFS Server (loopback client) VFS Kernel-level VFS NFS client NFS server NFS server local FS file_op vnode file_op inode NFS RPC M-DFS RPC local FS 18 ASWN 04, August 11, 2004

19 Future Directions Conclude the proposed implementation and experiment with the design suggestions. Assess performance of different design choices Experiment with the M-DFS for ephemeral sharing over ad-hoc testbed using Bluetooth Explore alternatives to NFS to base design of M-DFS, e.g. HTTP-based approach 19 ASWN 04, August 11, 2004

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr

Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS

More information

Chapter 11 Distributed File Systems. Distributed File Systems

Chapter 11 Distributed File Systems. Distributed File Systems Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Distributed File Systems

Distributed File Systems Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.

More information

CS 416: Opera-ng Systems Design

CS 416: Opera-ng Systems Design Question 1 Explain the major difference between a file system that supports journaling (e.g., Linux ext4) versus a log-structured file system (e.g., YAFFS2). Operating Systems 2015 Exam 3 Review Paul Krzyzanowski

More information

Lecture 11. RFS A Network File System for Mobile Devices and the Cloud

Lecture 11. RFS A Network File System for Mobile Devices and the Cloud Lecture 11 RFS A Network File System for Mobile Devices and the Cloud Yuan Dong, Jinzhan Peng, Dawei Wang, Haiyang Zhu, Fang Wang, Sun C. Chan, Michael P. Mesnier Advanced Operating Systems January 4th,

More information

Distributed File Systems. Chapter 10

Distributed File Systems. Chapter 10 Distributed File Systems Chapter 10 Distributed File System a) A distributed file system is a file system that resides on different machines, but offers an integrated view of data stored on remote disks.

More information

RAID Storage, Network File Systems, and DropBox

RAID Storage, Network File Systems, and DropBox RAID Storage, Network File Systems, and DropBox George Porter CSE 124 February 24, 2015 * Thanks to Dave Patterson and Hong Jiang Announcements Project 2 due by end of today Office hour today 2-3pm in

More information

Network File System (NFS)

Network File System (NFS) Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2011 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent

More information

Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF

Survey of Filesystems for Embedded Linux. Presented by Gene Sally CELF Survey of Filesystems for Embedded Linux Presented by Gene Sally CELF Presentation Filesystems In Summary What is a filesystem Kernel and User space filesystems Picking a root filesystem Filesystem Round-up

More information

Implementing the Hadoop Distributed File System Protocol on OneFS Jeff Hughes EMC Isilon

Implementing the Hadoop Distributed File System Protocol on OneFS Jeff Hughes EMC Isilon Implementing the Hadoop Distributed File System Protocol on OneFS Jeff Hughes EMC Isilon Outline Hadoop Overview OneFS Overview MapReduce + OneFS Details of isi_hdfs_d Wrap up & Questions 2 Hadoop Overview

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information

Cisco PIX vs. Checkpoint Firewall

Cisco PIX vs. Checkpoint Firewall Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.

More information

Comparing Mobile VPN Technologies WHITE PAPER

Comparing Mobile VPN Technologies WHITE PAPER Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable

More information

Spectrum Technology Platform. Version 9.0. Administration Guide

Spectrum Technology Platform. Version 9.0. Administration Guide Spectrum Technology Platform Version 9.0 Administration Guide Contents Chapter 1: Getting Started...7 Starting and Stopping the Server...8 Installing the Client Tools...8 Starting the Client Tools...9

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Scalable Linux Clusters with LVS

Scalable Linux Clusters with LVS Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. emsearcy@tag1consulting.com April 2008 Abstract Whether you are perusing mailing lists or reading

More information

Last class: Distributed File Systems. Today: NFS, Coda

Last class: Distributed File Systems. Today: NFS, Coda Last class: Distributed File Systems Issues in distributed file systems Sun s Network File System case study Lecture 19, page 1 Today: NFS, Coda Case Study: NFS (continued) Case Study: Coda File System

More information

GLBP - Gateway Load Balancing Protocol

GLBP - Gateway Load Balancing Protocol GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy

More information

Operating Systems Design 16. Networking: Sockets

Operating Systems Design 16. Networking: Sockets Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski pxk@cs.rutgers.edu 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

Allocating Network Bandwidth to Match Business Priorities

Allocating Network Bandwidth to Match Business Priorities Allocating Network Bandwidth to Match Business Priorities Speaker Peter Sichel Chief Engineer Sustainable Softworks psichel@sustworks.com MacWorld San Francisco 2006 Session M225 12-Jan-2006 10:30 AM -

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

VPN Lesson 2: VPN Implementation. Summary

VPN Lesson 2: VPN Implementation. Summary VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users

More information

Networking Technology Online Course Outline

Networking Technology Online Course Outline Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course

More information

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what

More information

File Services. File Services at a Glance

File Services. File Services at a Glance File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

Visualizations and Correlations in Troubleshooting

Visualizations and Correlations in Troubleshooting Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional

More information

InfiniBand Software and Protocols Enable Seamless Off-the-shelf Applications Deployment

InfiniBand Software and Protocols Enable Seamless Off-the-shelf Applications Deployment December 2007 InfiniBand Software and Protocols Enable Seamless Off-the-shelf Deployment 1.0 Introduction InfiniBand architecture defines a high-bandwidth, low-latency clustering interconnect that is used

More information

To install the SMTP service:

To install the SMTP service: To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click

More information

LotServer Deployment Manual

LotServer Deployment Manual LotServer Deployment Manual Maximizing Network Performance, Responsiveness and Availability DEPLOYMENT 1. Introduction LotServer is a ZetaTCP powered software product that can be installed on origin web/application

More information

We mean.network File System

We mean.network File System We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP

More information

Host/Platform Security. Module 11

Host/Platform Security. Module 11 Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic

More information

Building Applications With Sockets

Building Applications With Sockets C C Building Applications With Sockets Topics & Goals: Sockets mechanism & its use App layer design & implementation principles Building applications using sockets D Sockets: Unifying Transport API Simplify

More information

Distributed File Systems

Distributed File Systems Distributed File Systems File Characteristics From Andrew File System work: most files are small transfer files rather than disk blocks? reading more common than writing most access is sequential most

More information

Networking Systems (10102)

Networking Systems (10102) Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career

More information

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.

More information

A Tutorial on Configuring and Deploying GridFTP for Managing Data Movement in Grid/HPC Environments

A Tutorial on Configuring and Deploying GridFTP for Managing Data Movement in Grid/HPC Environments A Tutorial on Configuring and Deploying GridFTP for Managing Data Movement in Grid/HPC Environments John Bresnahan Michael Link Rajkumar Kettimuthu Dan Fraser Argonne National Laboratory University of

More information

Datacenter Operating Systems

Datacenter Operating Systems Datacenter Operating Systems CSE451 Simon Peter With thanks to Timothy Roscoe (ETH Zurich) Autumn 2015 This Lecture What s a datacenter Why datacenters Types of datacenters Hyperscale datacenters Major

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Application Persistence. High-Availability. White Paper

Application Persistence. High-Availability. White Paper Application Persistence High-Availability White Paper Introduction Highly available solutions remove single points of failure (SPOFs) and this creates an environment in which users can have near continuous

More information

HC900 Hybrid Controller When you need more than just discrete control

HC900 Hybrid Controller When you need more than just discrete control HC900 Hybrid Controller When you need more than just discrete control Product Brief: Wireless Communications and HC900 Controllers Background: With the introduction of Honeywell s One Wireless network

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

An Open Source Wide-Area Distributed File System. Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com

An Open Source Wide-Area Distributed File System. Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com An Open Source Wide-Area Distributed File System Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com What is AFS? A global wide-area Distributed File System providing location independent authenticated

More information

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4

More information

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8. TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327

Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed

More information

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters COSC 6374 Parallel I/O (I) I/O basics Fall 2012 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network card 1 Network card

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Distributed File Systems. NFS Architecture (1)

Distributed File Systems. NFS Architecture (1) COP 6611 Advanced Operating System Distributed File Systems Chi Zhang czhang@cs.fiu.edu NFS Architecture (1) a) The remote access model. (like NFS) b) The upload/download model (like FTP) 2 1 NFS Architecture

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

Porting Lustre to Operating Systems other than Linux. Ken Hornstein US Naval Research Laboratory April 16, 2010

Porting Lustre to Operating Systems other than Linux. Ken Hornstein US Naval Research Laboratory April 16, 2010 Porting Lustre to Operating Systems other than Linux Ken Hornstein US Naval Research Laboratory April 16, 2010 Motivation We do a lot of data visualization on Lustre data, and would like to do that on

More information

Magnet Voice Windows PC Softphone Installation

Magnet Voice Windows PC Softphone Installation Magnet Voice Windows PC Softphone Installation Contents 1. Introduction 3 2. Installation 3 Step 1: Install the Software on your PC 4 Step 2: Input your registration details 4 3. Connected State 6 6. Port

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

Cisco Wide Area Application Services Version 4.0

Cisco Wide Area Application Services Version 4.0 Data Sheet Cisco Wide Area Application Services Version 4.0 Cisco Wide Area Application Services (WAAS) is a powerful new application acceleration and WAN optimization solution that enables branch office

More information

WW HMI SCADA-08 Remote Desktop Services Best Practices

WW HMI SCADA-08 Remote Desktop Services Best Practices Slide 1 WW HMI SCADA-08 Remote Desktop Services Best Practices Steven L. Weygandt Portfolio Product Manager - Device Integration /Wonderware social.invensys.com @InvensysOpsMgmt / #SoftwareRevolution /InvensysVideos

More information

Arduino Wifi shield And reciever. 5V adapter. Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the shield:

Arduino Wifi shield And reciever. 5V adapter. Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the shield: the following parts are needed to test the unit: Arduino UNO R3 Arduino Wifi shield And reciever 5V adapter Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the

More information

Sunita Suralkar, Ashwini Mujumdar, Gayatri Masiwal, Manasi Kulkarni Department of Computer Technology, Veermata Jijabai Technological Institute

Sunita Suralkar, Ashwini Mujumdar, Gayatri Masiwal, Manasi Kulkarni Department of Computer Technology, Veermata Jijabai Technological Institute Review of Distributed File Systems: Case Studies Sunita Suralkar, Ashwini Mujumdar, Gayatri Masiwal, Manasi Kulkarni Department of Computer Technology, Veermata Jijabai Technological Institute Abstract

More information

TCP/IP Security Problems. History that still teaches

TCP/IP Security Problems. History that still teaches TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home

More information

Fault Tolerance in the Internet: Servers and Routers

Fault Tolerance in the Internet: Servers and Routers Fault Tolerance in the Internet: Servers and Routers Sana Naveed Khawaja, Tariq Mahmood Research Associates Department of Computer Science Lahore University of Management Sciences Motivation Client Link

More information

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015

More information

Investigation of storage options for scientific computing on Grid and Cloud facilities

Investigation of storage options for scientific computing on Grid and Cloud facilities Investigation of storage options for scientific computing on Grid and Cloud facilities Overview Context Test Bed Lustre Evaluation Standard benchmarks Application-based benchmark HEPiX Storage Group report

More information

Monitoring WAAS Using Cisco Network Analysis Module. Information About NAM CHAPTER

Monitoring WAAS Using Cisco Network Analysis Module. Information About NAM CHAPTER CHAPTER 5 Monitoring WAAS Using Cisco Network Analysis Module This chapter describes Cisco Network Analysis Module (NAM), which you can use to monitor your WAAS devices. This chapter contains the following

More information

Using NetBooting on the Mac OS X Server for delivery of mass client deployment

Using NetBooting on the Mac OS X Server for delivery of mass client deployment 23.07 Netbooting 6/2/07 1:30 PM Page 2 Using NetBooting on the Mac OS X Server for delivery of mass client deployment by Criss Myers Preface In this modern era of high technical and support costs, it is

More information

Using AnywhereUSB to Connect USB Devices

Using AnywhereUSB to Connect USB Devices VMWARE TECHNICAL NOTE VMware ESX Server Using to Connect Devices Digi International s Remote I/O Concentrator is a remote networking solution that utilizes over IP technology, called RealPort, to enable

More information

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals Denial of Service Attacks Notes derived from Michael R. Grimaila s originals Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident

More information

EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER

EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER White Paper EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER Abstract The objective of this white paper is to describe the architecture of and procedure for configuring EMC Documentum xplore

More information

Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP)

Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) M. Udin Harun Al Rasyid, Ph.D http://lecturer.eepis-its.edu/~udinharun udinharun@eepis-its.edu Lab Jaringan Komputer (C-307) Table of

More information

Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition

Chapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

SGFS: Secure, Flexible, and Policy-based Global File Sharing

SGFS: Secure, Flexible, and Policy-based Global File Sharing SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached

More information

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.

WAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

File Systems for Clusters from a Protocol Perspective

File Systems for Clusters from a Protocol Perspective File Systems for Clusters from a Protocol Perspective Peter J. Braam School of Computer Science Carnegie Mellon University Abstract: The protocols used by distributed file systems vary widely. The aim

More information

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport

More information

Measuring Wireless Network Performance: Data Rates vs. Signal Strength

Measuring Wireless Network Performance: Data Rates vs. Signal Strength EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength

More information

1 Serial RS232 to Ethernet Adapter Installation Guide

1 Serial RS232 to Ethernet Adapter Installation Guide Installation Guide 10/100 Mbps LED (amber color ) Link/Activity LED (green color ) 1. Introduction Thank you for purchasing this 1-port RS232 to Ethernet Adapter (hereinafter referred to as Adapter ).

More information

How it works. b) IP addresses are allocated dynamically and may change any time.

How it works. b) IP addresses are allocated dynamically and may change any time. NeoRouter is a cross-platform zero-configuration VPN solution that securely connects Windows, Mac and Linux computers at any locations into a virtual LAN and provides a networking platform for various

More information

Linksys Gateway SPA2100-SU Manual

Linksys Gateway SPA2100-SU Manual Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your

More information

Remote Unix Lab Environment (RULE)

Remote Unix Lab Environment (RULE) Remote Unix Lab Environment (RULE) Kris Mitchell krmitchell@swin.edu.au Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au

More information

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage Data Sheet Cisco WAAS Express Product Overview Organizations today face several unique WAN challenges: the need to provide employees with constant access to centrally located information at the corporate

More information

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE

USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts

More information

Apache Traffic Server Extensible Host Resolution

Apache Traffic Server Extensible Host Resolution Apache Traffic Server Extensible Host Resolution at ApacheCon NA 2014 Speaker Alan M. Carroll, Apache Member, PMC Started working on Traffic Server in summer 2010. Implemented Transparency, IPv6, range

More information

Controller Management

Controller Management Controller Management - Setup & Provisioning - 1 PRONTO SERVICE CONTROLLER (PN-CPP-A-1422) 2 PSC Key Features Fully interoperable with IEEE802.11b/g compliant products External AP support and management

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

vsphere Networking ESXi 5.0 vcenter Server 5.0 EN-000599-01

vsphere Networking ESXi 5.0 vcenter Server 5.0 EN-000599-01 ESXi 5.0 vcenter Server 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Computer Security: Principles and Practice

Computer Security: Principles and Practice Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion

More information