Designing an NFS-based Mobile Distributed File System for Ephemeral Sharing in Proximity Networks
|
|
- Mervin Page
- 8 years ago
- Views:
Transcription
1 Designing an NFS-based Mobile Distributed File System for Ephemeral Sharing in Proximity Networks Nikolaos Michalakis Computer Science Department New York University, New York, NY Dimitris Kalofonos Pervasive Computing Group (PCG) Nokia Research Center, Boston, MA 1 ASWN 04, August 11, 2004
2 Outline Ephemeral vs. Persistent file sharing Motivation for using NFS as a basis for Ephemeral M-DFS Related Approaches NFS Performance in Proximity Networks Problems with Mobility Experimental and Simulation Setup Performance Results Designing an M-DFS for Ephemeral Sharing M-DFS Design Topics and Suggestions An Implementation Proposal Future Directions 2 ASWN 04, August 11, 2004
3 Ephemeral vs. Persistent File Sharing >> cd /sophia/pictures >>./netscape /tom/cool_page.html >> /sophia/mplayer /mary/music/cool_song.mp3 >> /tom/xview /jack/cool_pic.jpg >>./excel /office/not_so_cool_spreadsheet.xls >> ls /home/my_files/ JOHN HERMES PHONE HOME TOM HERMES HERMES INTERNET PROXIMITY NETWORK Example of persistent sharing OFFICE SOPHIA JACK Example of ephemeral sharing HERMES 3 ASWN 04, August 11, 2004
4 Ephemeral vs. Persistent File Sharing (cont.) Ephemeral file sharing: a remote file system is discovered and mounted to enable short-lived collaboration among users Intended mainly for read-only file sharing Client caching takes place mainly to improve performance (e.g. in low bandwidth-links). It does not guarantee disconnected operation Deals with short disconnections (order of seconds-minutes) due to intermittent connectivity at the link level. No state is expected to survive long (as defined by the user) disconnections If files are to remain accessible in the long-term, user saves local copies Persistent file sharing: enables users to keep a personal distributed file repository among their devices (e.g. phones, PC s) Intended mainly for read-write file sharing Client performs (Coda-like) hoarding when fully connected, can operate on files when disconnected, reintegration-conflict resolution when reconnected Disconnections can be arbitrarily long (order of hours-days) Files are accessible in the long-term without saving local copies 4 ASWN 04, August 11, 2004
5 Why Use NFS as Basis for Ephemeral M-DFS? NFS perhaps the most successful DFS to date. Widely used, well tested Native support for NFS in Linux kernel. Appealing for Linuxbased mobile devices and experimentation NFS interface has made it attractive as a basis to build DFS with additional features. Tools available (e.g. SFS toolkit) for user level implementation. Makes portability across platforms possible Light mounting and unmounting process allows discovering exported files systems and mounting on demand Allows RPC-based access to remote files, without requiring the transfer of whole files Not as complex as other popular DFS for mobility (e.g. CODA). More suitable as a basis to build M-DFS for resourceconstraint devices 5 ASWN 04, August 11, 2004
6 Related Approaches CODA/Intermezzo Supports true disconnected operation Client performs aggressive caching (hoarding) when connected Optimizations available for weak connectivity Intended for Persistent sharing Some design aspects applicable to Ephemeral sharing. However, too complex to be used as is. Removing functionality tricky NFS/M NFS modified to support (CODA-like) disconnected operation Requires Kernel modifications Intended for Persistent sharing. Redundant functionality for us SFS/LBFS User-level DFS on top of NFS to add security, low BW enhancements SFS toolkit available that deals with issues of loopback NFS 6 ASWN 04, August 11, 2004
7 NFS Performance in Proximity Networks: Experimental Setup NFS v3 client and server on two laptops running Linux Mobility: IP address changes by attaching to different AP Intermittent connectivity: disconnections by releasing IP address b measurements Transfers with both client and server on same AP Data rate selection: 1Mbps, 2Mbps, 11Mbps Bluetooth measurements BlueZ stack v2.2 with PAN profile 1.0 Bluetooth v1.1 USB adapters Simple piconet with a Master (NFS Server) and a Slave (NFS Client) Increasing distance increased the RTT because of link-level re-tx Data rate selection: DH1, DH3, DH5 7 ASWN 04, August 11, 2004
8 NFS Performance in Proximity Networks: Simulation Client1 Routing Host Link11 Server1 Hub1 eth0 Link12 Link21 Link22 Hub2 eth1 Client2 Server2 Network simulator using the Click modular router 8 ASWN 04, August 11, 2004
9 NFS Performance in Proximity Networks: Simulation (cont.) Client to server path Delay Module Bandwidth Module Disconnection Module Loss Module eth0 Control Socket eth1 Loss Module Disconnection Module Bandwidth Module Delay Module Server to client path The configurable link 9 ASWN 04, August 11, 2004
10 NFS Problems with Mobility and Disconnections Client has mounted Client not mounted (server already started) Client IP address change: Server IP address change: Client network interface down: Server network interface down: Client disconnects and reconnects with old IP address: Server disconnects and reconnects with old IP address: Client receives a stale filehandle error. The client is using a filehandle that is exported to another client address. Client is trying to contact old address. If hard mounted then it blocks forever. If soft mounted it timeouts and fails (I/O error). Network unreachable error, no matter whether data cached or not at the client. If hard mounted client blocks forever. If soft mounted it timeouts and fails (I/O error). As long as the reassignment does not take longer than the timeout, the client only experiences a delay. As long as the reassignment does not take longer than the timeout, the client only experiences a delay. Client receives an access denied error. The server has already created a list of client addresses that can access the exported file systems. No errors. The mounted directory is empty, i.e. not mounted to anything. Client cannot mount. Mount process gets can't get address for server error. No errors. No errors. 10 ASWN 04, August 11, 2004
11 NFS in Proximity Networks: Performance Results Effect of RTT vs Bandwidth (measurements) BTH WLAN 10K file 50K file 100K file time to read file (s) bandwidth (KB/s) T N ( RTT + rpc ) bw 11 ASWN 04, August 11, 2004
12 FS in Proximity Networks: Performance Results (cont.) 70 Effect of RTT vs Bandwidth (simulation model) Time to read 50K file (s) Bandwidth (KB/s) log scale T N ( RTT + RTT=200ms RTT=100ms RTT=20ms rpc ) bw 12 ASWN 04, August 11, 2004
13 FS in Proximity Networks: Performance Results (cont.) BTH dark zone (measurements) BTH dark zone (measurements) 140 UDP, timeout =10s UDP, timeout =1s 120 TCP 100 UDP, timeout =0.5s UDP, timeout =0.1s timeout =0.1s 40 timeout =0.5s timeout =1s 20 timeout =10s TCP Time (s) time to reply (s) timeout =0.1s timeout =0.5s timeout =1s timeout =10s TCP RPC req. no 13 ASWN 04, August 11, 2004
14 FS in Proximity Networks: Performance Results (cont.) Effect of disconnections (measurements) RPC seq. no cold no discon. UDP finish when no time finish when no time wasted (warm) wasted (cold) warm no discon. UDP cold with discon. UDP warm with discon. UDP cold with discon. TCP warm with discon. TCP wasted time (cold) 5.5s 5.5s 5.5s wasted time (warm) Time (s) 14 ASWN 04, August 11, 2004
15 FS in Proximity Networks: Performance Results (cont.) 350 Effect of packet loss rate (simulation model) time to read 100K file (s) timeo=0.1s timeo=0.5s timeo=1s timeo=10s TCP packet loss rate (%) 15 ASWN 04, August 11, 2004
16 M-DFS Design Topics and Suggestions More aggressive caching to support temporary disconnections In the case of RO ephemeral sharing caching can be simplified, e.g. callbacks with leases: close-to-open consistency, reduced traffic In addition to file and directory contents, client caches metadata such as picture thumbnails or mp3 samples Automatic session recovery to deal with errors because of client/server mobility and loss of connectivity Session support mechanism: client and server have active session (server exported and client mounted the file system), data in transit. Need to decide whether to resume or drop pending sessions upon reconnection Session recovery mechanism: the server has started a session and is waiting for client to join (server only exported file system). Need to preserve the file system state related to mounting Techniques for traffic reduction data compression techniques, application specific data reduction techniques using metadata (e.g. thumbnails, mp3 samples) 16 ASWN 04, August 11, 2004
17 M-DFS Design Topics and Suggestions (cont.) Enhanced metadata to help deal with weak connectivity networks Application specific metadata (e.g. thumbnails, mp3 samples) are opaque to the M-DFS. The M-DFS allocates extra space and an API for applications to use them M-DFS specific metadata are seen only by the FS and the OS. Can be used to improve performance, provide enhanced capabilities and make the system more adaptive to mobile conditions. Example: estimated file transmission time Access control and distributed authentication ACL provide better security than Unix access control Use ephemeral ACLs, i.e. ACLs that are created and updated by the server owner on the fly. Remove stale entries in ACLs to avoid long ACLs with few active user. Distributed client/server authentication an issue without trusted authorities. Simplest solution would be to use offline means, e.g. userto-user communication Naming and file system removal A global name space not required. Server repository may be identified explicitly by the device name that exports it. Uniform name space desirable 17 ASWN 04, August 11, 2004
18 An Implementation Proposal M-DFS client M-DFS server App RO M-DFS Client (loopback server) Cache Manager (loopback client) User-level RO M-DFS Server (loopback client) VFS Kernel-level VFS NFS client NFS server NFS server local FS file_op vnode file_op inode NFS RPC M-DFS RPC local FS 18 ASWN 04, August 11, 2004
19 Future Directions Conclude the proposed implementation and experiment with the design suggestions. Assess performance of different design choices Experiment with the M-DFS for ephemeral sharing over ad-hoc testbed using Bluetooth Explore alternatives to NFS to base design of M-DFS, e.g. HTTP-based approach 19 ASWN 04, August 11, 2004
Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr
Network File System (NFS) Pradipta De pradipta.de@sunykorea.ac.kr Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
More informationChapter 11 Distributed File Systems. Distributed File Systems
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationDistributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
More informationCS 416: Opera-ng Systems Design
Question 1 Explain the major difference between a file system that supports journaling (e.g., Linux ext4) versus a log-structured file system (e.g., YAFFS2). Operating Systems 2015 Exam 3 Review Paul Krzyzanowski
More informationLecture 11. RFS A Network File System for Mobile Devices and the Cloud
Lecture 11 RFS A Network File System for Mobile Devices and the Cloud Yuan Dong, Jinzhan Peng, Dawei Wang, Haiyang Zhu, Fang Wang, Sun C. Chan, Michael P. Mesnier Advanced Operating Systems January 4th,
More informationDistributed File Systems. Chapter 10
Distributed File Systems Chapter 10 Distributed File System a) A distributed file system is a file system that resides on different machines, but offers an integrated view of data stored on remote disks.
More informationRAID Storage, Network File Systems, and DropBox
RAID Storage, Network File Systems, and DropBox George Porter CSE 124 February 24, 2015 * Thanks to Dave Patterson and Hong Jiang Announcements Project 2 due by end of today Office hour today 2-3pm in
More informationNetwork File System (NFS)
Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2011 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent
More informationSurvey of Filesystems for Embedded Linux. Presented by Gene Sally CELF
Survey of Filesystems for Embedded Linux Presented by Gene Sally CELF Presentation Filesystems In Summary What is a filesystem Kernel and User space filesystems Picking a root filesystem Filesystem Round-up
More informationImplementing the Hadoop Distributed File System Protocol on OneFS Jeff Hughes EMC Isilon
Implementing the Hadoop Distributed File System Protocol on OneFS Jeff Hughes EMC Isilon Outline Hadoop Overview OneFS Overview MapReduce + OneFS Details of isi_hdfs_d Wrap up & Questions 2 Hadoop Overview
More informationImproved Digital Media Delivery with Telestream HyperLaunch
WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news
More informationCisco PIX vs. Checkpoint Firewall
Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.
More informationComparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
More informationSpectrum Technology Platform. Version 9.0. Administration Guide
Spectrum Technology Platform Version 9.0 Administration Guide Contents Chapter 1: Getting Started...7 Starting and Stopping the Server...8 Installing the Client Tools...8 Starting the Client Tools...9
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationProcedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
More informationCOSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network
More informationTCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
More informationScalable Linux Clusters with LVS
Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. emsearcy@tag1consulting.com April 2008 Abstract Whether you are perusing mailing lists or reading
More informationLast class: Distributed File Systems. Today: NFS, Coda
Last class: Distributed File Systems Issues in distributed file systems Sun s Network File System case study Lecture 19, page 1 Today: NFS, Coda Case Study: NFS (continued) Case Study: Coda File System
More informationGLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
More informationOperating Systems Design 16. Networking: Sockets
Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski pxk@cs.rutgers.edu 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify
More informationLinux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
More informationAllocating Network Bandwidth to Match Business Priorities
Allocating Network Bandwidth to Match Business Priorities Speaker Peter Sichel Chief Engineer Sustainable Softworks psichel@sustworks.com MacWorld San Francisco 2006 Session M225 12-Jan-2006 10:30 AM -
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationVPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More informationCS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
More informationFile Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
More informationA Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
More informationVisualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast kevin_burns@cable.comcast.com 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
More informationInfiniBand Software and Protocols Enable Seamless Off-the-shelf Applications Deployment
December 2007 InfiniBand Software and Protocols Enable Seamless Off-the-shelf Deployment 1.0 Introduction InfiniBand architecture defines a high-bandwidth, low-latency clustering interconnect that is used
More informationTo install the SMTP service:
To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click
More informationLotServer Deployment Manual
LotServer Deployment Manual Maximizing Network Performance, Responsiveness and Availability DEPLOYMENT 1. Introduction LotServer is a ZetaTCP powered software product that can be installed on origin web/application
More informationWe mean.network File System
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationConfiguring NetFlow Secure Event Logging (NSEL)
73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
More informationDeploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
More informationHost/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
More informationBuilding Applications With Sockets
C C Building Applications With Sockets Topics & Goals: Sockets mechanism & its use App layer design & implementation principles Building applications using sockets D Sockets: Unifying Transport API Simplify
More informationDistributed File Systems
Distributed File Systems File Characteristics From Andrew File System work: most files are small transfer files rather than disk blocks? reading more common than writing most access is sequential most
More informationNetworking Systems (10102)
Networking Systems (10102) Rationale Statement: The goal of this course is to help students understand and participate in the significant impact of computer networking in their lives. Virtually any career
More informationFile Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
More informationA Tutorial on Configuring and Deploying GridFTP for Managing Data Movement in Grid/HPC Environments
A Tutorial on Configuring and Deploying GridFTP for Managing Data Movement in Grid/HPC Environments John Bresnahan Michael Link Rajkumar Kettimuthu Dan Fraser Argonne National Laboratory University of
More informationDatacenter Operating Systems
Datacenter Operating Systems CSE451 Simon Peter With thanks to Timothy Roscoe (ETH Zurich) Autumn 2015 This Lecture What s a datacenter Why datacenters Types of datacenters Hyperscale datacenters Major
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationApplication Persistence. High-Availability. White Paper
Application Persistence High-Availability White Paper Introduction Highly available solutions remove single points of failure (SPOFs) and this creates an environment in which users can have near continuous
More informationHC900 Hybrid Controller When you need more than just discrete control
HC900 Hybrid Controller When you need more than just discrete control Product Brief: Wireless Communications and HC900 Controllers Background: With the introduction of Honeywell s One Wireless network
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationDetecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
More informationAn Open Source Wide-Area Distributed File System. Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com
An Open Source Wide-Area Distributed File System Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com What is AFS? A global wide-area Distributed File System providing location independent authenticated
More informationIPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date
IPv4 and IPv6 Integration Formation IPv6 Workshop Location, Date Agenda Introduction Approaches to deploying IPv6 Standalone (IPv6-only) or alongside IPv4 Phased deployment plans Considerations for IPv4
More informationTECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
More informationPerformance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
More informationAcronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327
Acronis Backup & Recovery: Events in Application Event Log of Windows http://kb.acronis.com/content/38327 Mod ule_i D Error _Cod e Error Description 1 1 PROCESSOR_NULLREF_ERROR 1 100 ERROR_PARSE_PAIR Failed
More informationCOSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel I/O (I) I/O basics Fall 2012 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network card 1 Network card
More informationSmart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
More informationDistributed File Systems. NFS Architecture (1)
COP 6611 Advanced Operating System Distributed File Systems Chi Zhang czhang@cs.fiu.edu NFS Architecture (1) a) The remote access model. (like NFS) b) The upload/download model (like FTP) 2 1 NFS Architecture
More informationHow To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
More informationNetwork Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
More informationPorting Lustre to Operating Systems other than Linux. Ken Hornstein US Naval Research Laboratory April 16, 2010
Porting Lustre to Operating Systems other than Linux Ken Hornstein US Naval Research Laboratory April 16, 2010 Motivation We do a lot of data visualization on Lustre data, and would like to do that on
More informationMagnet Voice Windows PC Softphone Installation
Magnet Voice Windows PC Softphone Installation Contents 1. Introduction 3 2. Installation 3 Step 1: Install the Software on your PC 4 Step 2: Input your registration details 4 3. Connected State 6 6. Port
More informationCentralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
More informationCisco Wide Area Application Services Version 4.0
Data Sheet Cisco Wide Area Application Services Version 4.0 Cisco Wide Area Application Services (WAAS) is a powerful new application acceleration and WAN optimization solution that enables branch office
More informationWW HMI SCADA-08 Remote Desktop Services Best Practices
Slide 1 WW HMI SCADA-08 Remote Desktop Services Best Practices Steven L. Weygandt Portfolio Product Manager - Device Integration /Wonderware social.invensys.com @InvensysOpsMgmt / #SoftwareRevolution /InvensysVideos
More informationArduino Wifi shield And reciever. 5V adapter. Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the shield:
the following parts are needed to test the unit: Arduino UNO R3 Arduino Wifi shield And reciever 5V adapter Connecting wifi module on shield: Make sure the wifi unit is connected the following way on the
More informationSunita Suralkar, Ashwini Mujumdar, Gayatri Masiwal, Manasi Kulkarni Department of Computer Technology, Veermata Jijabai Technological Institute
Review of Distributed File Systems: Case Studies Sunita Suralkar, Ashwini Mujumdar, Gayatri Masiwal, Manasi Kulkarni Department of Computer Technology, Veermata Jijabai Technological Institute Abstract
More informationTCP/IP Security Problems. History that still teaches
TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home
More informationFault Tolerance in the Internet: Servers and Routers
Fault Tolerance in the Internet: Servers and Routers Sana Naveed Khawaja, Tariq Mahmood Research Associates Department of Computer Science Lahore University of Management Sciences Motivation Client Link
More informationTECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
More informationInvestigation of storage options for scientific computing on Grid and Cloud facilities
Investigation of storage options for scientific computing on Grid and Cloud facilities Overview Context Test Bed Lustre Evaluation Standard benchmarks Application-based benchmark HEPiX Storage Group report
More informationMonitoring WAAS Using Cisco Network Analysis Module. Information About NAM CHAPTER
CHAPTER 5 Monitoring WAAS Using Cisco Network Analysis Module This chapter describes Cisco Network Analysis Module (NAM), which you can use to monitor your WAAS devices. This chapter contains the following
More informationUsing NetBooting on the Mac OS X Server for delivery of mass client deployment
23.07 Netbooting 6/2/07 1:30 PM Page 2 Using NetBooting on the Mac OS X Server for delivery of mass client deployment by Criss Myers Preface In this modern era of high technical and support costs, it is
More informationUsing AnywhereUSB to Connect USB Devices
VMWARE TECHNICAL NOTE VMware ESX Server Using to Connect Devices Digi International s Remote I/O Concentrator is a remote networking solution that utilizes over IP technology, called RealPort, to enable
More informationDenial of Service Attacks. Notes derived from Michael R. Grimaila s originals
Denial of Service Attacks Notes derived from Michael R. Grimaila s originals Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident
More informationEMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER
White Paper EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER Abstract The objective of this white paper is to describe the architecture of and procedure for configuring EMC Documentum xplore
More informationAdministrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP)
Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) M. Udin Harun Al Rasyid, Ph.D http://lecturer.eepis-its.edu/~udinharun udinharun@eepis-its.edu Lab Jaringan Komputer (C-307) Table of
More informationChapter 11: File System Implementation. Operating System Concepts with Java 8 th Edition
Chapter 11: File System Implementation 11.1 Silberschatz, Galvin and Gagne 2009 Chapter 11: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation
More informationHow To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
More informationSGFS: Secure, Flexible, and Policy-based Global File Sharing
SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached
More informationWAN OPTIMIZATION. Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc.
WAN OPTIMIZATION Srinivasan Padmanabhan (Padhu) Network Architect Texas Instruments, Inc. Disclaimer Please be aware that the concepts and opinions expressed in the following presentation are those of
More information7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
More informationFile Systems for Clusters from a Protocol Perspective
File Systems for Clusters from a Protocol Perspective Peter J. Braam School of Computer Science Carnegie Mellon University Abstract: The protocols used by distributed file systems vary widely. The aim
More informationLecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
More informationMeasuring Wireless Network Performance: Data Rates vs. Signal Strength
EDUCATIONAL BRIEF Measuring Wireless Network Performance: Data Rates vs. Signal Strength In January we discussed the use of Wi-Fi Signal Mapping technology as a sales tool to demonstrate signal strength
More information1 Serial RS232 to Ethernet Adapter Installation Guide
Installation Guide 10/100 Mbps LED (amber color ) Link/Activity LED (green color ) 1. Introduction Thank you for purchasing this 1-port RS232 to Ethernet Adapter (hereinafter referred to as Adapter ).
More informationHow it works. b) IP addresses are allocated dynamically and may change any time.
NeoRouter is a cross-platform zero-configuration VPN solution that securely connects Windows, Mac and Linux computers at any locations into a virtual LAN and provides a networking platform for various
More informationLinksys Gateway SPA2100-SU Manual
Linksys Gateway SPA2100-SU Manual Manuel de l'utilisateur Table of Contents Looking for Basic Setup Instructions?... 3 Most Recent Version of this Manual... 3 Advanced Setup Instructions... 4 Wiring Your
More informationRemote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell krmitchell@swin.edu.au Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
More informationCisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage
Data Sheet Cisco WAAS Express Product Overview Organizations today face several unique WAN challenges: the need to provide employees with constant access to centrally located information at the corporate
More informationUSING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
More informationApache Traffic Server Extensible Host Resolution
Apache Traffic Server Extensible Host Resolution at ApacheCon NA 2014 Speaker Alan M. Carroll, Apache Member, PMC Started working on Traffic Server in summer 2010. Implemented Transparency, IPv6, range
More informationController Management
Controller Management - Setup & Provisioning - 1 PRONTO SERVICE CONTROLLER (PN-CPP-A-1422) 2 PSC Key Features Fully interoperable with IEEE802.11b/g compliant products External AP support and management
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationDSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
More informationMeasure wireless network performance using testing tool iperf
Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,
More informationvsphere Networking ESXi 5.0 vcenter Server 5.0 EN-000599-01
ESXi 5.0 vcenter Server 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 9 Firewalls and Intrusion Prevention Systems First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Firewalls and Intrusion
More information