Alternatives Of Network File System Essay

4790 words - 19 pages

Alternatives of Network File System

Since human beings have used Computers , the request of being rich ,and getting more information quicker than before has increased . Have you ever found yourself rushing from one computer to another in your office or home ,attending to several different jobs at various location? Or do you often find yourself moving files that need printing from a PC that you happen to be working on the PC that is Connected to the printer ?
You may have heard a lot about the advantages of using the internet for sending e-mail, and decided that you want to get connected .
Or perhaps you are already connected to the internet through a single PC/Modem , but want all of your office colleagues to have access .
All of these situations can be made easier by allowing the various machines to communicate with each other – by networking the PCs but sometime you don’t know that your PC has (NFS) operating system for sharing file systems and directories across TCP/IP - based Networks.
Network File System (NFS) is a popular network operating system and it’s a distributed file system that allows users to access files and directories located on remote Computers and treat those files and directories as if they were local. For example, users can use operating system commands to create, remove, read write and set files attributes for remotes files and directories.
NFS was first introduced by Sun Microsystems in the early 1980s and was quickly adopted as de facto standard for sharing files and printers between UNIX system. This standard was extended to include PCs and became the basis for must transparent file and print connectivity software solutions . Examples of using NFS
Creating a /usr/local environment in a multi architecture environment. Some directories such as man and doc are architecture neutral, others such as bin and lib are architecture specific.
Creating a rational user file system, when users have files located on their specific machines NFS can be used to make it look coherent on the server.
Creating a central mail spool for all users. This allows users to sign on any machine and access there mail.

In this report , I highlighted some inquires that related with NFS such as :

· Sun Microsystems provides NFS version 4
The NFS standard, which Sun created and turned over to the Internet Engineering Task Force (IETF), enables diverse operating environments to access and share remote files across the network. NFSv4 improves on four areas of the standard: security, performance, interoperability and Internet access. To provide strong security for NFS v4, implementations of the protocol must provide for the use of Kerberos V5 and Public Key Infrastructures through the use of the Low Infrastructure Public Key, LIPKEY; dynamic client response to changes on NFS servers; namespaces that are compatible across all platforms; client file caching that provides for good performance via the Internet while maintaining...

Find Another Essay On Alternatives of Network File System

Discretionary Access Control (DAC) Essay

666 words - 3 pages Discretionary Access Control (DAC) Computer security is important in every organization. It covers several areas such as locking the computer room and the computer itself, protecting login accounts with passwords, encrypting network communication lines and use of file protection among others. Whitman (2011) points out that computer system security ensures that your computer does what it is supposed to, even if the users do what they should not

Network Operating Systems (NOS) Essay

1006 words - 5 pages to peer network operating systems. The second type of NOS serves a client server network. Client server networks differ from peer to peer networks in the way that they can be small LANs or spread about using the internet, but they are usually designed for a larger network with many different users; therefore they contain a centralized file system for easier and more secure access to resources available to the members of the network. “A server

A High Security System For Databases

1855 words - 7 pages havingexclusive access to the primary server. We can also put the primary server behind a firewall. Butthis configuration needs that the secondary server must support multiple network interface i.e. itmust have multiple ethernet cards.III. HARD DISK SHADOWINGHere different levels of system implementation will be discussed:Kernel level: The aim of the design at the kernel level was to implement the part of thesystem that senses the change in file system

Functions of A Wide Area Network

2186 words - 9 pages volume of data or numerous site, for which multiple dedicated line would be too expensive. The most basic uses of WANs are for electronic mail and file transfer, but WANs can also permit user at remote site to access and enter data on a central site's database, such as instantaneously updating accounting records. New type of network based software that facilitate productivity and production tracking, such as groupware and work flow automation

Huffman Trucking VIOP

4563 words - 19 pages workers to be away from the phone without the worries of missing an important call. Furthermore, the company is unable to identify adequately incoming calls such as; solicitors calling to sell services geared toward homeowners. With that said, Team B has identified both the advantages and disadvantages to the current telephone system configuration.Network SystemsNetwork Topologies and SwitchingThe pattern in which machines are linked on a network

Workplace Systems Support

637 words - 3 pages A network administrator is a person who maintains and troubleshoots computer systems. Depending on the size of a company and the complexity of the technology in use, a network administrator's job could be part time or full time. Some tasks a network administrator encounters include installing or upgrading system software, managing user accounts, as well as supervising disk space.The function of a network administrator in a big corporation may be

Red Hat Linux vs. Windows 2000

5256 words - 21 pages system and networking infrastructure for a wide range of entry-level and departmental server applications. It is ideally suited for network, file, print, mail, Web, and custom or packaged business applications. Red Hat Enterprise Linux ES is fully compatible with the Red Hat Enterprise Linux family, providing the stability, performance, and support needed for critical application deployments. (http://www.redhat.com/software/rhel/es/)Microsoft

Netware Salvage Utility

807 words - 3 pages . Since NetWare keeps track of the files by date and time several versions of the file may accumulate. When a directory is deleted, the method for recovery is a bit different. NetWare does not keep track of the directories, only the files. These files are stored in a hidden directory called DELETE LOW_PRIORITYD.SAV. This directory exist in every volume on a network. The supervisor must go to this directory where the desired files can be copied

Chine

5231 words - 21 pages . [ICF.AddReg.StandardProfile] - This section is for defining changes to Windows Firewall's default configuration when a computer is not connected to a network that contains its domain. If a computer is not a member of a domain, then Windows Firewall will always enforce the configuration stored in the Standard Profile. Configuration Options Provided in the Windows Firewall .Inf File The majority of the default configurations for Windows

File Systems

600 words - 2 pages Running head: File Systems File SystemsPOS/421A file system is a method of storing and organizing computer files and that the files are easy to access and find. File systems use hard disk for storage and involve maintaining physical location of the files. Three main file systems to store and retrieve data are FAT, HPFS, and NTFS. Complexity, speed, and ability make the differences between these file systems.The FAT (File Allocation Table

Programming

4028 words - 16 pages . • The buffer area is set up by writing: • FILE *ptvar; 15 Opening a file • FILE (uppercase letters are required) is a special structure type that establishes the buffer area, and ptvar is a pointer variable that indicates the beginning of the buffer area. • The structure type file is defined within a system include file, typically stdio.h. • The pointer ptvar is often referred to as a stream pointer or simply a stream. 6

Similar Essays

The Roles Of Various Enforcement Agencies, Discussing The Limitations Of Legal Aid And Evaluating The Usefulness Of Alternatives To The Court System In Resolving Disputes

1304 words - 5 pages In using the prescribed text book "Legal Studies Preliminary" written by Hamper Boesenberg Kenny and many other sources I have gained sound knowledge in the roles of various enforcement agencies, discussed the limitations of legal aid and evaluated the usefulness of alternatives to the court system in resolving disputes.Enforcement agencies are bodies that have the role of enforcing certain laws. Acts of parliament have created the agencies and

Lan Topologies Essay

2369 words - 9 pages technology · Factors to consider when choosing a Network Operating System LANs are also known as subnets, which are single networks. Overall, LANs use a hybrid TCP/IP-IEEE (Institute of Electrical and Electronic Engineers) framework consisting of 6 layers: application, transport, internet, logical link control layer, media access control layer, and physical layer. The IEEE has many standards committees to develop standards for LANs

Napster Alternatives Essay

970 words - 4 pages . However, none of Napster's competitors have been taken to court, even though both Napster and Napster alternatives freely share copyrighted materials. Many of the Internet music swapping programs are based on two types of networks, either OpenNap or Gnutella. OpenNap is what Napster was run off of. "When using OpenNap the user is logged in to a single, centralized server that mediates the search for a file. On the other hand, Gnutella is a

Internet Piracy: Theft Of Intellectual Property

1757 words - 7 pages known as peer-to-peer (P2P) networking. P2P networking essentially enables users to link their com- puters to other computers all across the network. Each user linked to the Napster network was able to share his or her music files with all the other users on the network, and each user was in turn able to download a copy of any music file on almost any other computer in the network. Napster claimed to have over 20 million users in July 2000, all of