Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. 1
Introduction
Computer Architecture consisting of interconnected multiple
processors are basically of two types:
•Users should know where the required files and directories are and
mount them.
1. 3
Distributed Operating System
Runs on a cluster of machines with no shared memory
Requires
•A single global IPC mechanism
•A global protection mechanism
•Identical process management and system calls at all nodes
•Common file system at all nodes
1. 4
Distributed Operating System
Advantages
Disadvantages
1. 5
Transparency: A Main Design Issue for DOS
Transparency Description
Hide differences in data representation and how a resource
Access
is accessed
Location Hide where a resource is located
Migration Hide that a resource may move to another location
Hide that a resource may be moved to another location
Relocation
while in use
Hide that a resource may be shared by several competitive
Replication
users
Hide that a resource may be shared by several competitive
Concurrency
users
Failure Hide the failure and recovery of a resource
Hide whether a (software) resource is in memory or on
Persistence 1. 6
disk
Distributed Operating System
1. Process Management
1. 7
File System
Two Main Purpose:
2. Sharing of Information
1. 8
Distributed File System Supports…
•Complexity increases as distributed file system is physically dispersed
2. User Mobility:
User should not be forced to work on particular node but
flexibility should be there to work on any node at different times
1. 9
Distributed File System Supports…
Cont…
3. Availability:
Files should be available for use even in the even of
temporary failure of one and more nodes of the system
For this, multiple copies of the file should be kept at
different nodes. Each copy is called “replica”
Both existence of multiple copies and their locations
are hidden from the clients
4. Diskless Workstation:
Allows the use of diskless workstation in a system.
Adv.: Disk drives are expensive, emits heat as well as noisy
1. 10
Services provided by DFS
Typically three types of services
1. Storage Service:
2. True File Service
3. Name Service
1. Storage Service:
1. 11
Services provided by DFS
Cont…
1. 12
Services provided by DFS
Cont..
3. Name Service
1. 13
Desirable Features of the DFS
1. Transparency:
Mainly of Four types :
Structure Transparency –
A DFS normally uses multiple file servers but the multiplicity of file
servers should be transparent to the clients and they should not
know the number of location of the file servers and the storage
devices. Ideally, it should look to its clients, like a conventional file
system offered by a centralized, time-sharing operating system.
Access transparency –
Both remote and local files should be accessible in the same way. File
system interface should not distinguish them
Naming Transparency –
The name of a file should not give the hint as to where the file is
located.
Replication Transparency –
If the file is replicated, their locations should be hidden from the
1. 14
clients
Desirable Features of the DFS
2. User Mobility:
3. Performance
It is measure normally as the average amount of time needed to satisfy
clients requests. It includes CPU processing time, secondary storage
access time as well as network communication overhead
6. High Availibility
• A DFS should continue to function even when partial
failure occur due to failure of one or more components.
• Therefore, highly available and scalable DFS should have
multiple and independent file servers, controlling multiple and
independent storage devices.
• Replication of files at multiple servers is needed
1. 16
Desirable Features of the DFS
7. High Reliability
8. Data Integrity
1. 17
Desirable Features of the DFS
9. Security:
User must be secure for the privacy of their data. Passing rights to
access a file should be performed safely
10. Heterogeneity:
It provides flexibility to user for using different platforms for different
applications… one node may be UNIX workstation and another may
be Macintosh
1. 18
File Models
Conceptual model supported…
1. 19
File Models
1. Unstructured and Structured Models
(cont..)
Structured files are of two types:
ii.)In indexed record, records have one or more key fields and can be
addressed by specifying the values of the key fields. (B-tree or hash-
table is suitable data structure for this)
Mutable files: update of a file, overwrites on its old contents and file
is represented as a single stored sequence. Most modern OS are of
this type.
1. 21
File Accessing Models
Decides the manner in which client request to access a file is
serviced.
Mainly depends on two factors –
1. 22
File Accessing Models
Remote Service Model
Processing of the client’s request is performed at the server’s node.
The client request for file, the server performs the access request and
finally the server replies are transferrred across the network as
messages.
Dis adv: each remote file access generates network traffic
Data-caching model
To reduce traffic, this method copies the data needed to satisfy the
clients’s access request and cached there The algorithm like LRU is
used to keep the cache updated
1. 24
File Accessing Models
Unit of Data Transfer
Dis adv: sufficient storage space on the client’s node is required. Not
efficient when file size is large. Not useful for diskless workstations
1. 25
File Accessing Models
Unit of Data Transfer
Data transfer take place in units of blocks. Also called page level
transfer model as the page size is same as block size
1. 26
File Accessing Models
Unit of Data Transfer
1. 27
File Accessing Models
Unit of Data Transfer
1. 28
File Sharing Semantics
In shared file, the challenge is that when the modification of file data
made by a user is observable by other users…
1) UNIX Semantics
2) Session Semantics
3) Immutable Semantics
4) Transaction – like semantics
1. 29
File Sharing Semantics
UNIX Semantics
• Even if caching is not allowed, the network delay will not make this
possible
• Poor scalability, poor reliability, poor performance – as caching is not
allowed.
• DFS use relaxed schemes and not unix like scheme. Whenever,
immediate effect is expected, mechanism like ‘lock’ should be used
1. 30
File Sharing Semantics
Session Semantics
1. 32
File Sharing Semantics
Transaction like semantics
1. 33
File Caching Schemes
For improving the performance, file caching is used
By this mechanism, recently used data is retained in memory so that
repeated access to the same information can be handled without
additional disk transfer.
It is possible to cache the remotely located data on a client mode,
along with performance scalability and reliability improves, network
traffic decreases considerably.
1. 34
File Caching Schemes
1. 35
File Caching Schemes
Cache Location
Total cost involved in one disk access + one network access , even
though considerable performance gain than no caching
Adv:
Transparent to clients
Always original file and cached data are consistent
Easy to implement
Easy to support UNIX like file sharing semantics
Limitation:
Don’t avoid network access cost
Not helping in scalability and reliability issues
1. 36
File Caching Schemes
Cache Location
2) Client’s Disk
Adv:
Contribute to scalability and Reliability increases (but in case of
crash, modification are lost)
Largest storage capacity, so hit ratio can be increased
Continue to work during disconnected network
Limitation:
Don’t work with diskless workstations
Disk access has not been avoided
According to Tanenbaum, this method is not better than the previous
one. 1. 37
File Caching Schemes
Cache Location
Adv:
Provides max. performance gain
Permits workstations to be diskless
Contributes to scalability and reliability issues
Limitation:
Not good when large file sizes are there
Relaiability is less than the cache on client’s disk
1. 38
File Caching Schemes
Modification Propagation
1. 39
File Caching Schemes
Modification Propagation
1. 40
File Caching Schemes
Modification Propagation
• 2) Delayed-write scheme
Three approaches for this:
2) Server-Initated approach
Server keep track of which client has opened the file in which mode…
1. 42