DOC PREVIEW
CMU CS 15410 - L30_NFSAFS

This preview shows page 1-2-3-20-21-22-41-42-43 out of 43 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 43 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

1NFS & AFSDave [email protected] Maggsuser id 1915 @ cs.cmu.edu“Good judgment comes from experience… Experience comes from bad judgment.” - attributed to many2SynchronizationWho runs shell? Passes test suite?Who will be around Monday at midnight?TodayNFS, AFSPartially covered by textbook: 12.9, 16.6Chapter 16 is short, why not just read it?3Other Materials UsedNFS: RFC 1094 for v2 (3/1989)RFC 1813 for v3 (6/1995)RFC 3530 for v4 (4/2003)AFS:“The ITC Distributed File System: Principles and Design”, Proceedings of the 10th ACM Symposium on Operating System Principles, Dec. 1985, pp. 35-50.“Scale and Performance in a Distributed File System”, ACM Transactions on Computer Systems, Vol. 6, No. 1, Feb. 1988, pp. 51-81.IBM AFS User Guide, version 36http://www.cs.cmu.edu/~help/afs/index.html4OutlineWhy remote file systems?VFS interceptionNFS vs. AFSArchitectural assumptions & goalsNamespaceAuthentication, access controlI/O flowRough edges5Why?Why remote file systems?Lots of “access data everywhere” technologiesLaptopMulti-gigabyte flash-memory keychain USB devices4G Hitachi MicroDrive fits in a CompactFlash slotiPodAre remote file systems dinosaurs?6Remote File System BenefitsReliabilityNot many people carry multiple copies of dataMultiple copies with you aren't much protectionBackups are niceMachine rooms are niceTemperature-controlled, humidity-controlledFire-suppressedTime travel is nice tooSharingAllows multiple users to access dataMay provide authentication mechanism7Remote File System BenefitsScalabilityLarge disks are cheaperLocality of referenceYou don't use every file every day...Why carry everything in expensive portable storage?AuditabilityEasier to know who said what when with central storage...8What Is A Remote File System?OS-centric viewSomething that supports file-system system calls “for us”Other possible viewsRFS/DFS architect, for exampleMostly out of scope for this classCompared todaySun Microsystems NFSCMU/IBM/Transarc/IBM/Open-Source AFS9VFS interceptionVFS provides “pluggable” file systemsStandard flow of remote accessUser process calls read()Kernel dispatches to VOP_READ() in some VFSnfs_read()check local cachesend RPC to remote NFS serverput process to sleep10VFS interceptionStandard flow of remote access (continued)server interaction handled by kernel processretransmit if necessaryconvert RPC response to file system bufferstore in local cachewake up user processnfs_read()copy bytes to user memory11NFS Assumptions, goalsWorkgroup file systemSmall number of clientsVery small number of serversSingle administrative domainAll machines agree on “set of users”...which users are in which groupsClient machines run mostly-trusted OS“User #37 says read(...)”12NFS Assumptions, goals“Stateless” file serverFiles are “state”, but...Server exports files without creating extra stateNo list of “who has this file open”No “pending transactions” across crashResult: crash recovery “fast”, protocol “simple”Some inherently “stateful” operationsFile lockingHandled by separate service outside of NFS13AFS Assumptions, goalsGlobal distributed file systemUncountable clients, servers“One AFS”, like “one Internet”Why would you want more than one?Multiple administrative domainsusername@cellname[email protected] [email protected] Assumptions, goalsClient machines are un-trustedMust prove they act for a specific userSecure RPC layerAnonymous “system:anyuser”Client machines have disks (!!)Can cache whole files over long periodsWrite/write and write/read sharing are rareMost files updated by one user, on one machine15AFS Assumptions, goalsSupport many clients1000 machines could cache a single fileSome local, some (very) remote16NFS NamespaceConstructed by client-side file system mountsmount server1:/usr/local /usr/localGroup of clients can achieve common namespaceEvery machine executes same mount sequence at bootIf system administrators are diligent17NFS Namespace“Auto-mount” process based on maps/home/dae means server1:/home/dae/home/owens means server2:/home/owens18NFS SecurityClient machine presents credentialsuser #, list of group #s – from Unix processServer accepts or rejects credentials“root squashing”map uid 0 to uid -1 unless client on special machine listKernel process on server “adopts” credentialsSets user #, group vectorMakes system call (e.g., read()) with those credentials19AFS NamespaceAssumed-global list of AFS cellsEverybody sees same files in each cellMultiple servers inside cell invisible to userGroup of clients can achieve private namespaceUse custom cell database20AFS SecurityClient machine presents Kerberos ticketAllows arbitrary binding of (machine,user) to (realm,principal)davide on a cs.cmu.edu machine can be [email protected]iff the password is known!Server checks against access control list21AFS ACLsApply to directory, not to fileFormatde0u rlidwka[email protected] rlde0u:friends rlNegative rightsDisallow “joe rl” even though joe is in de0u:friends22AFS ACLsAFS ACL semantics are not Unix semanticsSome parts obeyed in a vague wayFiles check for being executable, writableMany differencesInherent/good: can name people in different administrative domains“Just different”ACLs are per-directory, not per-fileDifferent privileges: create, remove, lockNot exactly Unix / not tied to Unix23NFS protocol architectureroot@client executes mount RPCreturns “file handle” for root of remote file systemRPC for each pathname component/usr/local/lib/emacs/foo.el in /usr/local file systemh = lookup(root-handle, “lib”)h = lookup(h, “emacs”)h = lookup(h, “foo.el”)Allows disagreement over pathname syntaxLook, Ma, no “/”!24NFS protocol architectureI/O RPCs are idempotentmultiple repetitions have same effect as onelookup(h, “emacs”)read(file-handle, offset, length)write(file-handle, offset, buffer)RPCs do not create server-memory stateno open()/close() RPCwrite()


View Full Document

CMU CS 15410 - L30_NFSAFS

Download L30_NFSAFS
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view L30_NFSAFS and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view L30_NFSAFS 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?