際際滷

際際滷Share a Scribd company logo
Distributed File Systems
A distributed file system is a resource management
component of a distributed operating system. It implements a
common file system that can be shared by all the autonomous
computers in the system.
DISTRIBUTED FILE SYSTEM
Two important goals :
1. Network transparency  to access files distributed over a
network. Ideally, users do not have to be aware of the
location of files to access them.
2. High Availability - to provide high availability. Users should
have the same easy access to files, irrespective of their
physical location.
ARCHITECTURE
In a distributed file system, files can be stored at any
machine and the computation can be performed at any
machine.
 The two most important services present in a distributed file
system are name server and cache manager.
 A name server is a process that maps names specified by
clients to stored objects such as files and directories.
 The mapping (also referred to as name resolution)
 A cache manager is a process that implements file caching.
 In file caching, a copy of data stored at a remote file server is
brought to the clients machine when referenced by the
client.
DISTRIBUTED FILE SYSTEM
 Cache managers can be present at both clients and file servers.
 Cache managers at the servers cache files in the main memory
to reduce delays due to disk latency.
 If multiple clients are allowed to cache a file and modify it,
the copies can become inconsistent.
 To avoid this inconsistency problem, cache managers at both
servers and clients coordinate to perform data storage and
retrieval operations.
Architecture of a Distributed File System
DISTRIBUTED FILE SYSTEM
 A request by a process to access a data block is presented to
the local cache (client cache) of the machine (client) on
which the process is running .
 If the block is not in the cache, then the local disk, if
present, is checked for the presence of the data block.
 If the block is present, then the request is satisfied and the
block is loaded into the client cache.
 If the block is not stored locally, then the request is passed
on to the appropriate file server
 The server checks its own cache for the presence of the data
block before issuing a disk I/O request.
 The data block is transferred to the client cache in any case
and loaded to the server cache if it was missing in the server
cache.
MECHANISMS FOR BUILDING DISTRIBUTED
FILE SYSTEM
Mounting
A mount mechanism allows binding together of different
filename spaces to form a single hierarchically structured name
space.
Two approaches to maintain the mount information:
 Mount information can be maintained at clients, in which
case each client has to individually mount every required file
system. This approach is employed in the Sun network file
system. Since each client can mount a file system at any node
in the name space tree, every client need not necessarily see
an identical filename space.
 Mount information can be maintained at servers, in which
case it is possible that every client sees an identical filename
space. If files are moved to a different server, then mount
information need only be updated at the servers. In the first
approach, every client needs to update its mount table.
 Caching is commonly employed in distributed files systems to
reduce delays in the accessing of data.
 In file caching, a copy of data stored at a remote file server is
brought to the client when referenced by the client.
 The temporal locality of reference refers to the fact that a file
recently accessed is likely to be accessed again in the near
future.
 Data can either be cached in the main memory (server cache) at
the servers to reduce disk access latency.
 Caching improves files system performance by reducing the
delay in accessing data.
CACHING
 An alternative approach is to treat cached data as hints.
 In this case, cached data are not expected to be completely
accurate.
 However, valid cache entries improve performance
substantially without incurring the cost of maintaining
cost consistency.
 The class of applications that can utilize hints are those
which can recover after discovering that the cached data
are invalid.
HINTS
 Transferring data in bulk reduces the protocol processing overhead
at both servers and clients.
 In bulk data transfer, multiple consecutive data blocks are
transferred from servers to clients instead of just the block
referenced by clients.
 While file caching amortizes the high cost of accessing remote
servers over several local references to the same information
 Bulk transfer amortizes the protocol processing overhead and disk
seek time over many consecutive blocks of a file.
 Bulk transfers reduce file access overhead through obtaining a
multiple number of blocks with a single seek; by formatting and
transmitting a multiple number of large packets in a single context
switch; and by reducing the number of acknowledgements that
need to be sent.
BULK DATA TRANSFER
 Encryption is used for enforcing security in distributed
systems.
 The work of Needham and Schroeder is the basis for most of
the current security mechanisms in distributed systems.
 In their scheme, two entities wishing to communicate with
each other establish a key for conversation with the help of
an authentication server.
 It is important to note that the conversation key is
determined by the authentication server, but is never spent
in plain (unencrypted) text to either of the entities.
ENCRYPTION

More Related Content

What's hot (20)

Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
Kavya Barnadhya Hazarika
Distributed deadlock
Distributed deadlockDistributed deadlock
Distributed deadlock
Md. Mahedi Mahfuj
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
Pritom Saha Akash
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
ishmecse13
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
Rupsee
File replication
File replicationFile replication
File replication
Klawal13
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System Implementation
Wayne Jones Jnr
Naming in Distributed System
Naming in Distributed SystemNaming in Distributed System
Naming in Distributed System
MNM Jain Engineering College
Distributed File Systems
Distributed File Systems Distributed File Systems
Distributed File Systems
Maurvi04
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
Gaurav Rawat
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote Invocation
Medicaps University
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
Ashish Kumar
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
Rajan Kumar
Deadlock in distribute system by saeed siddik
Deadlock in distribute system by saeed siddikDeadlock in distribute system by saeed siddik
Deadlock in distribute system by saeed siddik
Saeed Siddik
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
SHIKHA GAUTAM
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
AjithaG9
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
Sunita Sahu
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
Pritom Saha Akash
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
ishmecse13
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
Rupsee
File replication
File replicationFile replication
File replication
Klawal13
Chapter 11 - File System Implementation
Chapter 11 - File System ImplementationChapter 11 - File System Implementation
Chapter 11 - File System Implementation
Wayne Jones Jnr
Distributed File Systems
Distributed File Systems Distributed File Systems
Distributed File Systems
Maurvi04
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
Gaurav Rawat
Distributed Objects and Remote Invocation
Distributed Objects and Remote InvocationDistributed Objects and Remote Invocation
Distributed Objects and Remote Invocation
Medicaps University
Distributed web based systems
Distributed web based systemsDistributed web based systems
Distributed web based systems
Reza Gh
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
Ashish Kumar
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
Rajan Kumar
Deadlock in distribute system by saeed siddik
Deadlock in distribute system by saeed siddikDeadlock in distribute system by saeed siddik
Deadlock in distribute system by saeed siddik
Saeed Siddik
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
SHIKHA GAUTAM
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
AjithaG9
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
Sunita Sahu

Similar to Distributed file systems dfs (20)

Distributed File System.ppt
Distributed File System.pptDistributed File System.ppt
Distributed File System.ppt
KhawajaWaqasRaheel
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
Kathirvel Ayyaswamy
OSCh16
OSCh16OSCh16
OSCh16
Joe Christensen
Ch16 OS
Ch16 OSCh16 OS
Ch16 OS
C.U
OS_Ch16
OS_Ch16OS_Ch16
OS_Ch16
Supriya Shrivastava
Chapter 17 - Distributed File Systems
Chapter 17 - Distributed File SystemsChapter 17 - Distributed File Systems
Chapter 17 - Distributed File Systems
Wayne Jones Jnr
DFS PPT.pptx
DFS PPT.pptxDFS PPT.pptx
DFS PPT.pptx
VMahesh5
Document 22.pdf
Document 22.pdfDocument 22.pdf
Document 22.pdf
rahulsahu887608
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage system
Zhichao Liang
Dos unit 4
Dos unit 4Dos unit 4
Dos unit 4
JebasheelaSJ
12. dfs
12. dfs12. dfs
12. dfs
Dr Sandeep Kumar Poonia
11. dfs
11. dfs11. dfs
11. dfs
Dr Sandeep Kumar Poonia
Distributed file systems chapter 9
Distributed file systems chapter 9Distributed file systems chapter 9
Distributed file systems chapter 9
Alagappa Government Arts College, Karaikudi
Authenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallelAuthenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallel
jpstudcorner
Chapter-5-DFS.ppt
Chapter-5-DFS.pptChapter-5-DFS.ppt
Chapter-5-DFS.ppt
rameshwarchintamani
Deduplication - Remove Duplicate
Deduplication - Remove DuplicateDeduplication - Remove Duplicate
Deduplication - Remove Duplicate
txttoolsmanipulation
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
Samiksha880257
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
IGEEKS TECHNOLOGIES
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
IGEEKS TECHNOLOGIES
Distributed database
Distributed databaseDistributed database
Distributed database
sanjay joshi

Recently uploaded (20)

iso 45001 en 111111111111111111111111111
iso 45001 en 111111111111111111111111111iso 45001 en 111111111111111111111111111
iso 45001 en 111111111111111111111111111
ssuser3c947d
OFFICE AUTOMATION USING ESP32 AND ESP RAINMAKER
OFFICE AUTOMATION USING ESP32 AND ESP RAINMAKEROFFICE AUTOMATION USING ESP32 AND ESP RAINMAKER
OFFICE AUTOMATION USING ESP32 AND ESP RAINMAKER
AdityaSK5
Industry 4.0: Transforming Modern Manufacturing and Beyond
Industry 4.0: Transforming Modern Manufacturing and BeyondIndustry 4.0: Transforming Modern Manufacturing and Beyond
Industry 4.0: Transforming Modern Manufacturing and Beyond
GtxDriver
MODULE 01 - CLOUD COMPUTING [BIS 613D] .pptx
MODULE 01 - CLOUD COMPUTING [BIS 613D] .pptxMODULE 01 - CLOUD COMPUTING [BIS 613D] .pptx
MODULE 01 - CLOUD COMPUTING [BIS 613D] .pptx
Alvas Institute of Engineering and technology, Moodabidri
22PCOAM16 ML UNIT 2 NOTES & QB QUESTION WITH ANSWERS
22PCOAM16 ML UNIT 2 NOTES & QB QUESTION WITH ANSWERS22PCOAM16 ML UNIT 2 NOTES & QB QUESTION WITH ANSWERS
22PCOAM16 ML UNIT 2 NOTES & QB QUESTION WITH ANSWERS
Guru Nanak Technical Institutions
BCS401 ADA First IA Test Question Bank.pdf
BCS401 ADA First IA Test Question Bank.pdfBCS401 ADA First IA Test Question Bank.pdf
BCS401 ADA First IA Test Question Bank.pdf
VENKATESHBHAT25
UHV UNIT-I INTRODUCTION TO VALUE EDUCATION.pptx
UHV UNIT-I INTRODUCTION TO VALUE EDUCATION.pptxUHV UNIT-I INTRODUCTION TO VALUE EDUCATION.pptx
UHV UNIT-I INTRODUCTION TO VALUE EDUCATION.pptx
arivazhaganrajangam
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Priyanka Dange
Explainability and Transparency in Artificial Intelligence: Ethical Imperativ...
Explainability and Transparency in Artificial Intelligence: Ethical Imperativ...Explainability and Transparency in Artificial Intelligence: Ethical Imperativ...
Explainability and Transparency in Artificial Intelligence: Ethical Imperativ...
AI Publications
Chemical_Safety | Chemical Safety Management | Gaurav Singh Rajput
Chemical_Safety | Chemical Safety Management | Gaurav Singh RajputChemical_Safety | Chemical Safety Management | Gaurav Singh Rajput
Chemical_Safety | Chemical Safety Management | Gaurav Singh Rajput
Gaurav Singh Rajput
22PCOAM16_ML_Unit 1 notes & Question Bank with answers.pdf
22PCOAM16_ML_Unit 1 notes & Question Bank with answers.pdf22PCOAM16_ML_Unit 1 notes & Question Bank with answers.pdf
22PCOAM16_ML_Unit 1 notes & Question Bank with answers.pdf
Guru Nanak Technical Institutions
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-8-2025 FINAL ver4...
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-8-2025 FINAL ver4...YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-8-2025 FINAL ver4...
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-8-2025 FINAL ver4...
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...
Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...
Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...
Alberto Lorenzo
Introduction to CLoud Computing Technologies
Introduction to CLoud Computing TechnologiesIntroduction to CLoud Computing Technologies
Introduction to CLoud Computing Technologies
cloudlab1
Shallow base metal exploration in northern New Brunswick.pdf
Shallow base metal exploration in northern New Brunswick.pdfShallow base metal exploration in northern New Brunswick.pdf
Shallow base metal exploration in northern New Brunswick.pdf
DUSABEMARIYA
Kamal 2, new features and practical examples
Kamal 2, new features and practical examplesKamal 2, new features and practical examples
Kamal 2, new features and practical examples
Igor Aleksandrov
BUILD WITH AI for GDG on campus MVJCE.pptx
BUILD WITH AI for GDG on campus MVJCE.pptxBUILD WITH AI for GDG on campus MVJCE.pptx
BUILD WITH AI for GDG on campus MVJCE.pptx
greeshmadj0
Artificial Neural Network to Identify Verical Fractured Wells Flow Period (Lo...
Artificial Neural Network to Identify Verical Fractured Wells Flow Period (Lo...Artificial Neural Network to Identify Verical Fractured Wells Flow Period (Lo...
Artificial Neural Network to Identify Verical Fractured Wells Flow Period (Lo...
Long Vo
PCB Design - Top Factors Related to Data Routing and Layout
PCB Design - Top Factors Related to Data Routing and LayoutPCB Design - Top Factors Related to Data Routing and Layout
PCB Design - Top Factors Related to Data Routing and Layout
Epec Engineered Technologies
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal buildingAirport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Priyanka Dange
iso 45001 en 111111111111111111111111111
iso 45001 en 111111111111111111111111111iso 45001 en 111111111111111111111111111
iso 45001 en 111111111111111111111111111
ssuser3c947d
OFFICE AUTOMATION USING ESP32 AND ESP RAINMAKER
OFFICE AUTOMATION USING ESP32 AND ESP RAINMAKEROFFICE AUTOMATION USING ESP32 AND ESP RAINMAKER
OFFICE AUTOMATION USING ESP32 AND ESP RAINMAKER
AdityaSK5
Industry 4.0: Transforming Modern Manufacturing and Beyond
Industry 4.0: Transforming Modern Manufacturing and BeyondIndustry 4.0: Transforming Modern Manufacturing and Beyond
Industry 4.0: Transforming Modern Manufacturing and Beyond
GtxDriver
BCS401 ADA First IA Test Question Bank.pdf
BCS401 ADA First IA Test Question Bank.pdfBCS401 ADA First IA Test Question Bank.pdf
BCS401 ADA First IA Test Question Bank.pdf
VENKATESHBHAT25
UHV UNIT-I INTRODUCTION TO VALUE EDUCATION.pptx
UHV UNIT-I INTRODUCTION TO VALUE EDUCATION.pptxUHV UNIT-I INTRODUCTION TO VALUE EDUCATION.pptx
UHV UNIT-I INTRODUCTION TO VALUE EDUCATION.pptx
arivazhaganrajangam
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Intro of Airport Engg..pptx-Definition of airport engineering and airport pla...
Priyanka Dange
Explainability and Transparency in Artificial Intelligence: Ethical Imperativ...
Explainability and Transparency in Artificial Intelligence: Ethical Imperativ...Explainability and Transparency in Artificial Intelligence: Ethical Imperativ...
Explainability and Transparency in Artificial Intelligence: Ethical Imperativ...
AI Publications
Chemical_Safety | Chemical Safety Management | Gaurav Singh Rajput
Chemical_Safety | Chemical Safety Management | Gaurav Singh RajputChemical_Safety | Chemical Safety Management | Gaurav Singh Rajput
Chemical_Safety | Chemical Safety Management | Gaurav Singh Rajput
Gaurav Singh Rajput
22PCOAM16_ML_Unit 1 notes & Question Bank with answers.pdf
22PCOAM16_ML_Unit 1 notes & Question Bank with answers.pdf22PCOAM16_ML_Unit 1 notes & Question Bank with answers.pdf
22PCOAM16_ML_Unit 1 notes & Question Bank with answers.pdf
Guru Nanak Technical Institutions
Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...
Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...
Reinventando el CD_ Unificando Aplicaciones e Infraestructura con Crossplane-...
Alberto Lorenzo
Introduction to CLoud Computing Technologies
Introduction to CLoud Computing TechnologiesIntroduction to CLoud Computing Technologies
Introduction to CLoud Computing Technologies
cloudlab1
Shallow base metal exploration in northern New Brunswick.pdf
Shallow base metal exploration in northern New Brunswick.pdfShallow base metal exploration in northern New Brunswick.pdf
Shallow base metal exploration in northern New Brunswick.pdf
DUSABEMARIYA
Kamal 2, new features and practical examples
Kamal 2, new features and practical examplesKamal 2, new features and practical examples
Kamal 2, new features and practical examples
Igor Aleksandrov
BUILD WITH AI for GDG on campus MVJCE.pptx
BUILD WITH AI for GDG on campus MVJCE.pptxBUILD WITH AI for GDG on campus MVJCE.pptx
BUILD WITH AI for GDG on campus MVJCE.pptx
greeshmadj0
Artificial Neural Network to Identify Verical Fractured Wells Flow Period (Lo...
Artificial Neural Network to Identify Verical Fractured Wells Flow Period (Lo...Artificial Neural Network to Identify Verical Fractured Wells Flow Period (Lo...
Artificial Neural Network to Identify Verical Fractured Wells Flow Period (Lo...
Long Vo
PCB Design - Top Factors Related to Data Routing and Layout
PCB Design - Top Factors Related to Data Routing and LayoutPCB Design - Top Factors Related to Data Routing and Layout
PCB Design - Top Factors Related to Data Routing and Layout
Epec Engineered Technologies
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal buildingAirport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Airport Components Part2 ppt.pptx-Apron,Hangers,Terminal building
Priyanka Dange

Distributed file systems dfs

  • 2. A distributed file system is a resource management component of a distributed operating system. It implements a common file system that can be shared by all the autonomous computers in the system. DISTRIBUTED FILE SYSTEM Two important goals : 1. Network transparency to access files distributed over a network. Ideally, users do not have to be aware of the location of files to access them. 2. High Availability - to provide high availability. Users should have the same easy access to files, irrespective of their physical location.
  • 3. ARCHITECTURE In a distributed file system, files can be stored at any machine and the computation can be performed at any machine. The two most important services present in a distributed file system are name server and cache manager. A name server is a process that maps names specified by clients to stored objects such as files and directories. The mapping (also referred to as name resolution) A cache manager is a process that implements file caching. In file caching, a copy of data stored at a remote file server is brought to the clients machine when referenced by the client. DISTRIBUTED FILE SYSTEM
  • 4. Cache managers can be present at both clients and file servers. Cache managers at the servers cache files in the main memory to reduce delays due to disk latency. If multiple clients are allowed to cache a file and modify it, the copies can become inconsistent. To avoid this inconsistency problem, cache managers at both servers and clients coordinate to perform data storage and retrieval operations.
  • 5. Architecture of a Distributed File System
  • 6. DISTRIBUTED FILE SYSTEM A request by a process to access a data block is presented to the local cache (client cache) of the machine (client) on which the process is running . If the block is not in the cache, then the local disk, if present, is checked for the presence of the data block. If the block is present, then the request is satisfied and the block is loaded into the client cache. If the block is not stored locally, then the request is passed on to the appropriate file server The server checks its own cache for the presence of the data block before issuing a disk I/O request. The data block is transferred to the client cache in any case and loaded to the server cache if it was missing in the server cache.
  • 7. MECHANISMS FOR BUILDING DISTRIBUTED FILE SYSTEM Mounting A mount mechanism allows binding together of different filename spaces to form a single hierarchically structured name space. Two approaches to maintain the mount information: Mount information can be maintained at clients, in which case each client has to individually mount every required file system. This approach is employed in the Sun network file system. Since each client can mount a file system at any node in the name space tree, every client need not necessarily see an identical filename space.
  • 8. Mount information can be maintained at servers, in which case it is possible that every client sees an identical filename space. If files are moved to a different server, then mount information need only be updated at the servers. In the first approach, every client needs to update its mount table.
  • 9. Caching is commonly employed in distributed files systems to reduce delays in the accessing of data. In file caching, a copy of data stored at a remote file server is brought to the client when referenced by the client. The temporal locality of reference refers to the fact that a file recently accessed is likely to be accessed again in the near future. Data can either be cached in the main memory (server cache) at the servers to reduce disk access latency. Caching improves files system performance by reducing the delay in accessing data. CACHING
  • 10. An alternative approach is to treat cached data as hints. In this case, cached data are not expected to be completely accurate. However, valid cache entries improve performance substantially without incurring the cost of maintaining cost consistency. The class of applications that can utilize hints are those which can recover after discovering that the cached data are invalid. HINTS
  • 11. Transferring data in bulk reduces the protocol processing overhead at both servers and clients. In bulk data transfer, multiple consecutive data blocks are transferred from servers to clients instead of just the block referenced by clients. While file caching amortizes the high cost of accessing remote servers over several local references to the same information Bulk transfer amortizes the protocol processing overhead and disk seek time over many consecutive blocks of a file. Bulk transfers reduce file access overhead through obtaining a multiple number of blocks with a single seek; by formatting and transmitting a multiple number of large packets in a single context switch; and by reducing the number of acknowledgements that need to be sent. BULK DATA TRANSFER
  • 12. Encryption is used for enforcing security in distributed systems. The work of Needham and Schroeder is the basis for most of the current security mechanisms in distributed systems. In their scheme, two entities wishing to communicate with each other establish a key for conversation with the help of an authentication server. It is important to note that the conversation key is determined by the authentication server, but is never spent in plain (unencrypted) text to either of the entities. ENCRYPTION