If my file system only has lots of big video files what block size do I want? Large (correct) Small.

Slides:



Advertisements
Similar presentations
Peer-to-Peer (P2P) Distributed Storage 1Dennis Kafura – CS5204 – Operating Systems.
Advertisements

1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
The Zebra Striped Network Filesystem. Approach Increase throughput, reliability by striping file data across multiple servers Data from each client is.
Serverless Network File Systems. Network File Systems Allow sharing among independent file systems in a transparent manner Mounting a remote directory.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Coda file system: Disconnected operation By Wallis Chau May 7, 2003.
Sinfonia: A New Paradigm for Building Scalable Distributed Systems Marcos K. Aguilera, Arif Merchant, Mehul Shah, Alistair Veitch, Christonos Karamanolis.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Wide-area cooperative storage with CFS
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
File Systems (2). Readings r Silbershatz et al: 11.8.
Presented by: Alvaro Llanos E.  Motivation and Overview  Frangipani Architecture overview  Similar DFS  PETAL: Distributed virtual disks ◦ Overview.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
Review Session for Fourth Quiz Jehan-François Pâris Summer 2011.
CSC 456 Operating Systems Seminar Presentation (11/13/2012) Leon Weingard, Liang Xin The Google File System.
The Directory A distributed database Distributed maintenance.
Chapter 8 The Internet: A Resource for All of Us.
Using a Web Browser What does a Web Browser do? A web browser enables you to surf the World Wide Web. What are the most popular browsers?
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
CH2 System models.
Data Structures & Algorithms and The Internet: A different way of thinking.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
1 File Systems: Consistency Issues. 2 File Systems: Consistency Issues File systems maintains many data structures  Free list/bit vector  Directories.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Computer Science Lecture 19, page 1 CS677: Distributed OS Last Class: Fault tolerance Reliable communication –One-one communication –One-many communication.
1 Protection and Security How to be a paranoid or just think like one.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Web Server.
I MPLEMENTING FILES. Contiguous Allocation:  The simplest allocation scheme is to store each file as a contiguous run of disk blocks (a 50-KB file would.
POND: THE OCEANSTORE PROTOTYPE S. Rea, P. Eaton, D. Geels, H. Weatherspoon, J. Kubiatowicz U. C. Berkeley.
Final Review Mark Stanovich Operating Systems COP 4610.
Distributed Systems Unit – 1 Concepts of DS By :- Maulik V. Dhamecha Maulik V. Dhamecha (M.Tech.)
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
1 Protection and Security. 2 The Problem Types of misuse  Accidental  Intentional - Adversary in security lingo Protection and security objective 
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
Review CS File Systems - Partitions What is a hard disk partition?
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
GPFS: A Shared-Disk File System for Large Computing Clusters Frank Schmuck & Roger Haskin IBM Almaden Research Center.
JN0-561 Juniper Juniper Networks Certified Internet Associate, J-series Visit:
Dsitributed File Systems
Distributed File System. Outline Basic Concepts Current project Hadoop Distributed File System Future work Reference.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Chapter Five Distributed file systems. 2 Contents Distributed file system design Distributed file system implementation Trends in distributed file systems.
Computer Science Lecture 19, page 1 CS677: Distributed OS Last Class: Fault tolerance Reliable communication –One-one communication –One-many communication.
Skype.
File Systems and Disk Management
Sarah Diesburg Operating Systems CS 3430
Introduction to Data Management in EGI
File System Implementation
Unit OS10: Fault Tolerance
Chapter 12: File System Implementation
Sarah Diesburg Operating Systems CS 3430
File Systems: Fundamentals.
Distributed P2P File System
Lesson 16-Windows NT Security Issues
Printed on Monday, December 31, 2018 at 2:03 PM.
Distributed File Systems
Andy Wang Operating Systems COP 4610 / CGS 5765
Distributed File Systems
Andy Wang Operating Systems COP 4610 / CGS 5765
Distributed File Systems
Chapter 15: File System Internals
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Federated, Available, and Reliable Storage for an Incompletely Trusted Environment Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie.
Distributed File Systems
Distributed Systems (15-440)
Andy Wang Operating Systems COP 4610 / CGS 5765
Distributed File Systems
Presentation transcript:

If my file system only has lots of big video files what block size do I want? Large (correct) Small

Why bother with index blocks? A. Allows greater file size. (true) B. Faster to create files. C. Simpler to grow files. (true) D. Simpler to prepend and append to files. E. Scott Summers is the X-men’s Cyclops

Which is a metadata consistency problem? A. Null double indirect pointer B. File created before a crash is missing C. Free block bitmap contains a file data block that is pointed to by an inode (true) D. Directory contains corrupt file name (could be argued)

Outer rim (good choice) Inner rim Middle Where on the disk would you put the journal for a journaling file system? Anywhere Outer rim (good choice) Inner rim Middle Wherever the inodes are (also good)

Web requests conform to what model? Many-to-one (mostly) One-to-one One-to-many

Java RMI (remote method invocation) is an example of an RPC system. Yes (it is) No

Why does turning every file system operation into an RPC to a server perform poorly? Disk latency is larger than network latency Network latency is larger than disk latency No server-side cache No client-side cache (deadly)

When you log into a website using an http URL, which property are you missing? Authentication Integrity (yes) Privacy (yes) Authorization (arguable) None

Authorization (arguable) None When you log into a website using an https URL, which property are you missing? Authentication Integrity Privacy Authorization (arguable) None Get rid of authorization for this question.

What attack does this address? Password security Instead of hashing your password, I will hash your password concatenated with a random salt. Then I store the unhashed salt along with the hash. (password . salt)^H salt What attack does this address? Brute force password guessing for all accounts. (yes) Brute force password guessing for one account. Trojan horse password value Man-in-the-middle attack when user gives password at login prompt.

Dweeb Nolife develops a file system that responds to requests with digitally signed packets of data from a content provider. Any untrusted machine can serve the data and clients can verify that the packets they receive were signed. So utexas.edu can give signed copies of the read-only portions of its web site to untrusted servers. Dweeb’s FS provides which property? Authentication of file system users Integrity of file system contents (yes) Privacy of file system data & metadata Authorization of access to data & metadata

If A->B and C->B does A->C? Yes No (true)

Distributed control vs. central control Distributed control is easier, and more fault tolerant than central control. Distributed control is harder, and more fault tolerant than central control. (true) Distributed control is easier, but less fault tolerant than central control Distributed control is harder, but less fault tolerant than central control

Distributed concensus in the presence of link failures is possible not possible (true)

Can the two phase commit protocol fail to terminate? Yes (true) No

In the bully algorithm can there every be a point where the highest number process is not the leader? Yes (true) No

Byzantine fault tolerant algorithms tend to run quickly. Yes No (true)