SlideShare a Scribd company logo
1 of 12
Distributed File Systems
A distributed file system is a resource management
component of a distributed operating system. It implements a
common file system that can be shared by all the autonomous
computers in the system.
DISTRIBUTED FILE SYSTEM
Two important goals :
1. Network transparency – to access files distributed over a
network. Ideally, users do not have to be aware of the
location of files to access them.
2. High Availability - to provide high availability. Users should
have the same easy access to files, irrespective of their
physical location.
ARCHITECTURE
In a distributed file system, files can be stored at any
machine and the computation can be performed at any
machine.
 The two most important services present in a distributed file
system are name server and cache manager.
 A name server is a process that maps names specified by
clients to stored objects such as files and directories.
 The mapping (also referred to as name resolution)
 A cache manager is a process that implements file caching.
 In file caching, a copy of data stored at a remote file server is
brought to the client’s machine when referenced by the
client.
DISTRIBUTED FILE SYSTEM
 Cache managers can be present at both clients and file servers.
 Cache managers at the servers cache files in the main memory
to reduce delays due to disk latency.
 If multiple clients are allowed to cache a file and modify it,
the copies can become inconsistent.
 To avoid this inconsistency problem, cache managers at both
servers and clients coordinate to perform data storage and
retrieval operations.
Architecture of a Distributed File System
DISTRIBUTED FILE SYSTEM
 A request by a process to access a data block is presented to
the local cache (client cache) of the machine (client) on
which the process is running .
 If the block is not in the cache, then the local disk, if
present, is checked for the presence of the data block.
 If the block is present, then the request is satisfied and the
block is loaded into the client cache.
 If the block is not stored locally, then the request is passed
on to the appropriate file server
 The server checks its own cache for the presence of the data
block before issuing a disk I/O request.
 The data block is transferred to the client cache in any case
and loaded to the server cache if it was missing in the server
cache.
MECHANISMS FOR BUILDING DISTRIBUTED
FILE SYSTEM
Mounting
A mount mechanism allows binding together of different
filename spaces to form a single hierarchically structured name
space.
Two approaches to maintain the mount information:
 Mount information can be maintained at clients, in which
case each client has to individually mount every required file
system. This approach is employed in the Sun network file
system. Since each client can mount a file system at any node
in the name space tree, every client need not necessarily see
an identical filename space.
 Mount information can be maintained at servers, in which
case it is possible that every client sees an identical filename
space. If files are moved to a different server, then mount
information need only be updated at the servers. In the first
approach, every client needs to update its mount table.
 Caching is commonly employed in distributed files systems to
reduce delays in the accessing of data.
 In file caching, a copy of data stored at a remote file server is
brought to the client when referenced by the client.
 The temporal locality of reference refers to the fact that a file
recently accessed is likely to be accessed again in the near
future.
 Data can either be cached in the main memory (server cache) at
the servers to reduce disk access latency.
 Caching improves files system performance by reducing the
delay in accessing data.
CACHING
 An alternative approach is to treat cached data as hints.
 In this case, cached data are not expected to be completely
accurate.
 However, valid cache entries improve performance
substantially without incurring the cost of maintaining
cost consistency.
 The class of applications that can utilize hints are those
which can recover after discovering that the cached data
are invalid.
HINTS
 Transferring data in bulk reduces the protocol processing overhead
at both servers and clients.
 In bulk data transfer, multiple consecutive data blocks are
transferred from servers to clients instead of just the block
referenced by clients.
 While file caching amortizes the high cost of accessing remote
servers over several local references to the same information
 Bulk transfer amortizes the protocol processing overhead and disk
seek time over many consecutive blocks of a file.
 Bulk transfers reduce file access overhead through obtaining a
multiple number of blocks with a single seek; by formatting and
transmitting a multiple number of large packets in a single context
switch; and by reducing the number of acknowledgements that
need to be sent.
BULK DATA TRANSFER
 Encryption is used for enforcing security in distributed
systems.
 The work of Needham and Schroeder is the basis for most of
the current security mechanisms in distributed systems.
 In their scheme, two entities wishing to communicate with
each other establish a key for conversation with the help of
an authentication server.
 It is important to note that the conversation key is
determined by the authentication server, but is never spent
in plain (unencrypted) text to either of the entities.
ENCRYPTION

More Related Content

What's hot

CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSKathirvel Ayyaswamy
 
Distributed operating system(os)
Distributed operating system(os)Distributed operating system(os)
Distributed operating system(os)Dinesh Modak
 
Thread scheduling in Operating Systems
Thread scheduling in Operating SystemsThread scheduling in Operating Systems
Thread scheduling in Operating SystemsNitish Gulati
 
Free space managment46
Free space managment46Free space managment46
Free space managment46myrajendra
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualizationGokulnath S
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSKathirvel Ayyaswamy
 
Replication in Distributed Database
Replication in Distributed DatabaseReplication in Distributed Database
Replication in Distributed DatabaseAbhilasha Lahigude
 
Multiprocessor architecture
Multiprocessor architectureMultiprocessor architecture
Multiprocessor architectureArpan Baishya
 
Multiprocessor Architecture (Advanced computer architecture)
Multiprocessor Architecture  (Advanced computer architecture)Multiprocessor Architecture  (Advanced computer architecture)
Multiprocessor Architecture (Advanced computer architecture)vani261
 
Limitations of memory system performance
Limitations of memory system performanceLimitations of memory system performance
Limitations of memory system performanceSyed Zaid Irshad
 
Cache performance considerations
Cache performance considerationsCache performance considerations
Cache performance considerationsSlideshare
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docxkumari36
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemudaya khanal
 
Chap 2 classification of parralel architecture and introduction to parllel p...
Chap 2  classification of parralel architecture and introduction to parllel p...Chap 2  classification of parralel architecture and introduction to parllel p...
Chap 2 classification of parralel architecture and introduction to parllel p...Malobe Lottin Cyrille Marcel
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architecturesPooja Dixit
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Gyanmanjari Institute Of Technology
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Meghaj Mallick
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemorySHIKHA GAUTAM
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed SystemRajan Kumar
 

What's hot (20)

CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Distributed operating system(os)
Distributed operating system(os)Distributed operating system(os)
Distributed operating system(os)
 
Thread scheduling in Operating Systems
Thread scheduling in Operating SystemsThread scheduling in Operating Systems
Thread scheduling in Operating Systems
 
Free space managment46
Free space managment46Free space managment46
Free space managment46
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Replication in Distributed Database
Replication in Distributed DatabaseReplication in Distributed Database
Replication in Distributed Database
 
Multiprocessor architecture
Multiprocessor architectureMultiprocessor architecture
Multiprocessor architecture
 
Multiprocessor Architecture (Advanced computer architecture)
Multiprocessor Architecture  (Advanced computer architecture)Multiprocessor Architecture  (Advanced computer architecture)
Multiprocessor Architecture (Advanced computer architecture)
 
Limitations of memory system performance
Limitations of memory system performanceLimitations of memory system performance
Limitations of memory system performance
 
Cache performance considerations
Cache performance considerationsCache performance considerations
Cache performance considerations
 
Virtualize of IO Devices .docx
Virtualize of IO Devices .docxVirtualize of IO Devices .docx
Virtualize of IO Devices .docx
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Chap 2 classification of parralel architecture and introduction to parllel p...
Chap 2  classification of parralel architecture and introduction to parllel p...Chap 2  classification of parralel architecture and introduction to parllel p...
Chap 2 classification of parralel architecture and introduction to parllel p...
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
 

Similar to Distributed file systems dfs

Similar to Distributed file systems dfs (20)

Distributed File System.ppt
Distributed File System.pptDistributed File System.ppt
Distributed File System.ppt
 
Ch16 OS
Ch16 OSCh16 OS
Ch16 OS
 
OS_Ch16
OS_Ch16OS_Ch16
OS_Ch16
 
OSCh16
OSCh16OSCh16
OSCh16
 
Chapter 17 - Distributed File Systems
Chapter 17 - Distributed File SystemsChapter 17 - Distributed File Systems
Chapter 17 - Distributed File Systems
 
DFS PPT.pptx
DFS PPT.pptxDFS PPT.pptx
DFS PPT.pptx
 
Document 22.pdf
Document 22.pdfDocument 22.pdf
Document 22.pdf
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage system
 
Dos unit 4
Dos unit 4Dos unit 4
Dos unit 4
 
12. dfs
12. dfs12. dfs
12. dfs
 
Distributed file systems chapter 9
Distributed file systems chapter 9Distributed file systems chapter 9
Distributed file systems chapter 9
 
Authenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallelAuthenticated key exchange protocols for parallel
Authenticated key exchange protocols for parallel
 
Chapter-5-DFS.ppt
Chapter-5-DFS.pptChapter-5-DFS.ppt
Chapter-5-DFS.ppt
 
Distributed File Systems
Distributed File Systems Distributed File Systems
Distributed File Systems
 
Deduplication - Remove Duplicate
Deduplication - Remove DuplicateDeduplication - Remove Duplicate
Deduplication - Remove Duplicate
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Distributed File Systems
Distributed File SystemsDistributed File Systems
Distributed File Systems
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 

Distributed file systems dfs

  • 2. A distributed file system is a resource management component of a distributed operating system. It implements a common file system that can be shared by all the autonomous computers in the system. DISTRIBUTED FILE SYSTEM Two important goals : 1. Network transparency – to access files distributed over a network. Ideally, users do not have to be aware of the location of files to access them. 2. High Availability - to provide high availability. Users should have the same easy access to files, irrespective of their physical location.
  • 3. ARCHITECTURE In a distributed file system, files can be stored at any machine and the computation can be performed at any machine.  The two most important services present in a distributed file system are name server and cache manager.  A name server is a process that maps names specified by clients to stored objects such as files and directories.  The mapping (also referred to as name resolution)  A cache manager is a process that implements file caching.  In file caching, a copy of data stored at a remote file server is brought to the client’s machine when referenced by the client. DISTRIBUTED FILE SYSTEM
  • 4.  Cache managers can be present at both clients and file servers.  Cache managers at the servers cache files in the main memory to reduce delays due to disk latency.  If multiple clients are allowed to cache a file and modify it, the copies can become inconsistent.  To avoid this inconsistency problem, cache managers at both servers and clients coordinate to perform data storage and retrieval operations.
  • 5. Architecture of a Distributed File System
  • 6. DISTRIBUTED FILE SYSTEM  A request by a process to access a data block is presented to the local cache (client cache) of the machine (client) on which the process is running .  If the block is not in the cache, then the local disk, if present, is checked for the presence of the data block.  If the block is present, then the request is satisfied and the block is loaded into the client cache.  If the block is not stored locally, then the request is passed on to the appropriate file server  The server checks its own cache for the presence of the data block before issuing a disk I/O request.  The data block is transferred to the client cache in any case and loaded to the server cache if it was missing in the server cache.
  • 7. MECHANISMS FOR BUILDING DISTRIBUTED FILE SYSTEM Mounting A mount mechanism allows binding together of different filename spaces to form a single hierarchically structured name space. Two approaches to maintain the mount information:  Mount information can be maintained at clients, in which case each client has to individually mount every required file system. This approach is employed in the Sun network file system. Since each client can mount a file system at any node in the name space tree, every client need not necessarily see an identical filename space.
  • 8.  Mount information can be maintained at servers, in which case it is possible that every client sees an identical filename space. If files are moved to a different server, then mount information need only be updated at the servers. In the first approach, every client needs to update its mount table.
  • 9.  Caching is commonly employed in distributed files systems to reduce delays in the accessing of data.  In file caching, a copy of data stored at a remote file server is brought to the client when referenced by the client.  The temporal locality of reference refers to the fact that a file recently accessed is likely to be accessed again in the near future.  Data can either be cached in the main memory (server cache) at the servers to reduce disk access latency.  Caching improves files system performance by reducing the delay in accessing data. CACHING
  • 10.  An alternative approach is to treat cached data as hints.  In this case, cached data are not expected to be completely accurate.  However, valid cache entries improve performance substantially without incurring the cost of maintaining cost consistency.  The class of applications that can utilize hints are those which can recover after discovering that the cached data are invalid. HINTS
  • 11.  Transferring data in bulk reduces the protocol processing overhead at both servers and clients.  In bulk data transfer, multiple consecutive data blocks are transferred from servers to clients instead of just the block referenced by clients.  While file caching amortizes the high cost of accessing remote servers over several local references to the same information  Bulk transfer amortizes the protocol processing overhead and disk seek time over many consecutive blocks of a file.  Bulk transfers reduce file access overhead through obtaining a multiple number of blocks with a single seek; by formatting and transmitting a multiple number of large packets in a single context switch; and by reducing the number of acknowledgements that need to be sent. BULK DATA TRANSFER
  • 12.  Encryption is used for enforcing security in distributed systems.  The work of Needham and Schroeder is the basis for most of the current security mechanisms in distributed systems.  In their scheme, two entities wishing to communicate with each other establish a key for conversation with the help of an authentication server.  It is important to note that the conversation key is determined by the authentication server, but is never spent in plain (unencrypted) text to either of the entities. ENCRYPTION