Making the Coda File System a 1 st Class Citizen on Handheld Linux Devices Sang Kil Cha Jae Yoon Chong Anoop Jaishankar 15-821/18-843: Mobile and Pervasive.

Slides:



Advertisements
Similar presentations
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
Advertisements

Applications of Feather-Weight Virtual Machines (FVMs) Hadi Salimi Distributed Systems Lab, School of Computer Engineering, Iran University of Science.
PHANI VAMSI KRISHNA.MADDALI. BASIC CONCEPTS.. FILE SYSTEMS: It is a method for storing and organizing computer files and the data they contain to make.
General Operation and Facts As of 3/24/2014. Virtual Desktop 1. What is a Virtual Desktop? 2. Why VDI? 3. Installing the Virtual Desktop 4. Accessing.
Mello-Dee Simmons Liza Klosterman.  Who We Are ‣Largest community-owned utility in Florida and the eighth largest in the United States. ‣Electric system.
Bringing Handheld, PDA’s, and Smart Phone to the Enterprise Martin Graf Group Product Manager Oracle Corporation Session id:
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Coda file system: Disconnected operation By Wallis Chau May 7, 2003.
Lesson 15 – INSTALL AND SET UP NETWARE 5.1. Understanding NetWare 5.1 Preparing for installation Installing NetWare 5.1 Configuring NetWare 5.1 client.
Firefox 2 Feature Proposal: Remote User Profiles TeamOne August 3, 2007 TeamOne August 3, 2007.
Overview Basic functions Features Installation: Windows host and Linux host.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Client-Server Computing in Mobile Environments
Module 2: Planning to Install SQL Server. Overview Hardware Installation Considerations SQL Server 2000 Editions Software Installation Considerations.
Passage Three Introduction to Microsoft SQL Server 2000.
Network File System (NFS) in AIX System COSC513 Operation Systems Instructor: Prof. Anvari Yuan Ma SID:
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Virtual Machine Management
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
1. 2 LXU800 User’s Manual 1.Installation – Windows XP UI Features Introduction Data Connection & Disconnection.
An Introduction to ASP.NET Web Pages 2 Module 1: Webmatrix Installation and Your First Web Site Tom Perkins.
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
Microsoft ® Official Course Module 9 Configuring Applications.
Test Review. What is the main advantage to using shadow copies?
Operating Systems Operating System
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Configuring the MagicInfo Pro Display
Lesson 6 Operating Systems and Software
MagicInfo Pro Server Software All control, content, and scheduling is performed within the MagicInfo Pro Server software previously installed. Before.
Week 9 Objectives Securing Files and Folders Protecting Shared Files and Folders by Using Shadow Copies Configuring Network Printing.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 4 Manage Software for SUSE Linux Enterprise Server.
9/13/20151 Threads ICS 240: Operating Systems –William Albritton Information and Computer Sciences Department at Leeward Community College –Original slides.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Week #7 Objectives: Secure Windows 7 Desktop
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
1 Installation When this module is complete, you will be able to:  Set a static IP address for your laptop  Install the snom ONE software  Navigate.
Installing Oracle9i RAC Release 2 on HP OpenVMS Systems.
Module 7: Managing the User Environment by Using Group Policy.
What’s new in Kentico CMS 5.0 Michal Neuwirth Product Manager Kentico Software.
Presented by: Reem Alshahrani. Outlines What is Virtualization Virtual environment components Advantages Security Challenges in virtualized environments.
Kickstart Installation
GAAIN Virtual Appliances: Virtual Machine Technology for Scientific Data Analysis Arihant Patawari USC Stevens Neuroimaging and Informatics Institute July.
Presented By: Samreen Tahir Coda is a network file system and a descendent of the Andrew File System 2. It was designed to be: Highly Highly secure Available.
CMap Version 0.16 Ben Faga. CMap CMap Version 0.16 Bug fixes and code optimizations More intuitive menu system Asynchronous loading of comparative map.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
Linux Operations and Administration
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
Sem 2v2 Chapter 5 Router Startup and Setup. A router initializes by loading the bootstrap, the operating system, and a configuration file. If the router.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (1) The Operating System.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
System Software (1) The Operating System
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
به نام خدای مهربان زبان تخصصی دانشجویان کامپیوتر English for Computer Students درس 3 جوانمرد Ejavanmard.blogfa.com
BY: SALMAN 1.
BY: SALMAN.
Chapter 2 Starting a Project
Module 4: Managing Access to Resources
Chapter 2: System Structures
FTP - File Transfer Protocol
Introduction to Computers
More than just File Sync and Share.
Rev Up Your Design Cycle With DesktopServer
Presentation transcript:

Making the Coda File System a 1 st Class Citizen on Handheld Linux Devices Sang Kil Cha Jae Yoon Chong Anoop Jaishankar /18-843: Mobile and Pervasive Computing – Checkpoint 2 Unlocking the Hildon-FM & Introducing Fine File Manager for Coda Mentor: Jan Harkes

Agenda Abstract High-level Requirement Achievement Risk Analysis Schedule Future Work Question /18-843: Mobile and Pervasive Computing – Checkpoint 2

Abstract Failure-resilient, scalable, and secure access to shared information by mobile user over wireless network is a challenge Coda file system meets this challenge through disconnected operation, weak connectivity, translucent caching, and other mechanisms /18-843: Mobile and Pervasive Computing – Checkpoint 2

High-level Requirement Visibility Coda file system should be visible in any application that uses Hildon-FM library Hildon-FM should provide graphical user interface for authentication Usability User should be able to access cached information in any built-in application /18-843: Mobile and Pervasive Computing – Checkpoint 2

Achievement Installed Coda client on Nokia N810 device Analyzed and modified Hildon-FM library to show Coda file system Designed new user friendly file manager application Incorporated Coda authentication module in Hildon- FM library /18-843: Mobile and Pervasive Computing – Checkpoint 2

Coda Client Failed to run Coda client in Scratchbox environment Scratchbox tool-kit does not emulate Maemo Opportunity to learn more about Maemo, Scratchbox, libraries, and other environment Installed Coda client on the device with required dependencies Works for current Maemo version, Diablo Cache saved in internal memory Manual load of Venus and kernel module required /18-843: Mobile and Pervasive Computing – Checkpoint 2

Coda Client /18-843: Mobile and Pervasive Computing – Checkpoint 2 Manually loading Coda kernel module

Coda Client /18-843: Mobile and Pervasive Computing – Checkpoint 2 Manually loading Venus client cache manager

Coda Client /18-843: Mobile and Pervasive Computing – Checkpoint 2 Manually loading Venus client cache manager

Coda Client What to do next Automate loading Venus and kernel module Risk Analysis Venus crash, kernel module failed to load, cache directory being deleted Out of scope of this project Is internal memory enough for Coda? 2 GB space shared with other application Yes, it is /18-843: Mobile and Pervasive Computing – Checkpoint 2

Hildon-FM Library Application transparent vs. application aware Part of Hildon application framework, default library for Maemo platform Default application (music player, web browser) use the library for file system related operation Provides encapsulated view for protection of system Right click equivalent mechanism support Analyzed Hildon-FM source code to figure out its structure and modified it to show Coda file system /18-843: Mobile and Pervasive Computing – Checkpoint 2

Hildon-FM Library /18-843: Mobile and Pervasive Computing – Checkpoint 2 Coda file system is shown in file manager

Hildon-FM Library What to do next Refresh Coda directory after Venus is executed and the directory is mounted /18-843: Mobile and Pervasive Computing – Checkpoint 2

File Manager Application From application-transparent to application-aware Some features cannot be made application transparent Source code for Maemo file manager application is not available to developer There’s no open source file manager that uses Hildon-FM library /18-843: Mobile and Pervasive Computing – Checkpoint 2

File Manager Application /18-843: Mobile and Pervasive Computing – Checkpoint 2 New Fine File Manager (left) and original Maemo File Manager(right)

File Manager Application What to do next Copy and paste, and move More options in main menu Full file system display /18-843: Mobile and Pervasive Computing – Checkpoint 2

Authentication Module User has to authenticate with Coda server Parameters required: username, password, realm Two ways Modify and include clog as a function Fork/exec a clog program to authenticate Problems: Context menu is application-dependent /18-843: Mobile and Pervasive Computing – Checkpoint 2

Authentication Module (cont’d) /18-843: Mobile and Pervasive Computing – Checkpoint 2

Risk Analysis /18-843: Mobile and Pervasive Computing – Checkpoint 2 Internal memory for caching Software/hardware update Theft of the device after authentication

Schedule /18-843: Mobile and Pervasive Computing – Checkpoint 2 Original schedule after checkpoint 1 Sang Kil: file manager application Jae Yoon: analyze and modified Hildon-FM Anoop: authentication and file manager application

Schedule /18-843: Mobile and Pervasive Computing – Checkpoint 2 Revised Schedule, actual work done after checkpoint 1

Future Work Script for Coda client startup Fix Hildon-FM related problem USB disconnection, mount refresh Distinguish realms in authentication More features in file manager application Testing with multiple Coda server Embellishment / packaging /18-843: Mobile and Pervasive Computing – Checkpoint 2

Future Work (cont’d) /18-843: Mobile and Pervasive Computing – Checkpoint 2 Register with the official Maemo website, as an open source application

Questions /18-843: Mobile and Pervasive Computing – Checkpoint 2

Gtk+2.0 LibraryGtkObjectGtkWidgetGtkContainer HildonFileSe lection GtkBinGtkWindowGtkDialog HildonFileC hooserDialog HildonFileD etailsDialog GtkBut ton GtkToo lbar GtkBox GtkEnt ry HildonFileSy stemModel /18-843: Mobile and Pervasive Computing – Checkpoint 2 Hildon-FM Library Libraries used in our application

Work Division /18-843: Mobile and Pervasive Computing – Checkpoint 2 New Coda File Manager Application Hildon-FM Analysis and Modification Coda Client Installation and Automation Authentication Module Sang Kil Cha 80%10%33%10% Jae Yoon Chong 10%80%33%10% Anoop Jaishankar 10% 33%80%