Free Essay

History on Nfs

In:

Submitted By Fuckyou69
Words 1317
Pages 6
The first network file system—called File Access Listener—was developed in 1976 by Digital Equipment Corporation (DEC). An implementation of the Data Access Protocol (DAP), it was part of the DECnet suite of protocols. Like TCP/IP, DEC published protocol specifications for its networking protocols, which included the DAP.
NFS was the first modern network file system (built over the IP protocol). It began as an experimental file system developed in-house at Sun Microsystems in the early 1980s. Given the popularity of the approach, the NFS protocol was documented as a Request for Comments (RFC) specification and evolved into what is known as NFSv2. As a standard, NFS grew quickly because of its ability to interoperate with other clients and servers.
The standard continued to evolve into NFSv3, defined by RFC 1813. This iteration of the protocol was much more scalable than previous versions, supporting large files (larger than 2GB), asynchronous writes, and TCP as the transport protocol, paving the way for file systems over wide area networks. In 2000, RFC 3010 (revised by RFC 3530) brought NFS into the enterprise setting. Sun introduced NFSv4 with strong security along with a stateful protocol (prior versions of NFS were stateless). Today, NFS exists as version 4.1 (as defined by RFC 5661), which adds protocol support for parallel access across distributed servers (called the pNFS extension).
The timeline of NFS, including the specific RFCs that document its behavior, is shown in Figure 1.
Figure 1. Timeline of NFS protocols Amazingly, NFS has been under development for almost 30 years. It represents an extremely stable (and portable) networked file system that's scalable, high performing, and enterprise quality. As network speeds increase and latencies decrease, NFS continues to be an attractive option for serving a file system over a network. Even in local network settings, virtualization drives storage into the network to support more mobile virtual machines. NFS even supports the latest computing models to optimize virtualized infrastructures.

The secure shell, ssh, and its companion, scp, are tools that I use more or less on a daily basis. Being able to move files between machines without having to setup SAMBA or NFS is very handy when working with multiple systems. All that you need is to enable the secure shell daemon - sshd.
Before we go into the details of the sshfs, let's run through a quick re-cap of ssh. The secure shell daemon runs on port 22 by default. It makes it possible to run an encrypted shell session. With the -Y flag, you can even run X11-forwarding, allowing you to run X11, i.e. graphical, programs on the remote machine and displaying the windows on the terminal that you are sitting at.
You can configure sshd through the /etc/ssh/sshd_config file (that is the location on my Kubuntu machine). Here, you can disable root access, older protocols, X11 forwarding, etc. The notion is that the more limits you put on the remote access, the more secure your system is from potential attacks. You might also want to tune your hosts.allow and hosts.deny files if you plan to expose sshd to the Internet. There are many guides on hardening servers and ssh, so I will not go into details.
To get things up and running, what you need to do is to install sshd. In Ubuntu, that means the openssh-server package. For external access, you also need to enable port forwarding of port 22 in your router/firewall and find your external IP. Now, you should be able to log onto your machine using your normal user credentials.
$ ssh user@192.168.1.100 user@192.168.1.200's password:
Having entered the password, you should now have full access to the remote system.
The handy scp command, secure copy, works in much the same way. To copy the file test.txt to user's remote home directory, simply enter:
$ scp test.txt user@192.168.1.100:
As before, you will be prompted for a password. You can copy the other way around as well. The command below demonstrates how to copy a file with an absolute path, i.e. not in the home directory of user, to your local machine.
$ scp user@192.168.1.100:/var/log/messages remote-messages
These two commands means that you can browse the file system, and freely copy files between machines. What sshfs does is that it exposes this functionality as a file system that you can mount. Before we look into how, let's have a quick look at sshfs.
The sshfs is implemented using FUSE, and relies on the sftp part of ssh to access the remote computer. As a remote file access protocol, sshfs is not very good. For instance, multiple users writing to the same file at once can create havoc. The benefits are the inherit security and that it is easy to setup.
So, how to use it. Let's look at a very short demonstration.
$ sshfs user@192.168.1.100: remote-home
$ ls remote-home
Desktop Documents Downloads Music
$ fusermount -u remote-home
The initial sshfs command mounts the user's home directory to remote-home. You can specify another path after the colon to mount any other part of the remote file system. Access is only restricted by user's access rights.
Using ls, or any other ordinary command, will work as if the remote home directory was mounted locally. All tools work. For instance, you can log onto your remote machine and build software using your locally installed setup of build tools.
To unmount the filesystem, the fusermount command from the FUSE utilities package is used.
To summarize, sshfs an easy setup remote file access tool. It needs to be used with care if multiple users are involved. It makes it dead easy to temporarily access remote file systems, as well as mounting file systems from virtual machines for easier access and monitoring, as well as for remote installation, compilation and debugging. All-in-all, one of the tools I always keep handy in my toolbox

NFS (Network File System) is basically developed for sharing of files and folders between Linux/Unix systems by Sun Microsystems in 1980. It allows you to mount your local file systems over a network and remote hosts to interact with them as they are mounted locally on the same system. With the help of NFS, we can set up file sharing between Unix to Linux system and Linux to Unix system.
Benefits of NFS
1. NFS allows local access to remote files.
2. It uses standard client/server architecture for file sharing between all *nix based machines.
3. With NFS it is not necessary that both machines run on the same OS.
4. With the help of NFS we can configure centralized storage solutions.
5. Users get their data irrespective of physical location.
6. No manual refresh needed for new files.
7. Newer version of NFS also supports acl, pseudo root mounts.
8. Can be secured with Firewalls and Kerberos.
NFS Services
Its a System V-launched service. The NFS server package includes three facilities, included in the portmap and nfs-utils packages.
1. portmap : It maps calls made from other machines to the correct RPC service (not required with NFSv4).
2. nfs: It translates remote file sharing requests into requests on the local file system.
3. rpc.mountd: This service is responsible for mounting and unmounting of file systems.
Important Files for NFS Configuration
1. /etc/exports : Its a main configuration file of NFS, all exported files and directories are defined in this file at the NFS Server end.
2. /etc/fstab : To mount a NFS directory on your system across the reboots, we need to make an entry in /etc/fstab.
3. /etc/sysconfig/nfs : Configuration file of NFS to control on which port rpc and other services are listening.

Similar Documents

Free Essay

Neurofibromatosis

...The neurofibromatoses (NF) are genetic disorders of the nervous system. At this time two distinct forms are known: NF1 and NF2. One baby in every four thousand is born in the United States with NF1. It is one of the most common genetic disorders, affecting some one hundred thousand americans. NF2 is less common and occurs in only one and every forty thousand births. In both forms of NF severity of symptoms vary greatly. The effects can be severely disabling, mildly disfiguring or can even go undetected. Several other names for this disorder have been used in the past but recent advancements in understanding the disorder made some of those terms obsolete. NF1 was previously known as peripheral neurofibromatosis, or von Recklinghouasen’s disease after the doctor who first described it in 1882. NF2 was called bilateral acoustic nuerofibromatosis, central neurofibromatosis, or vestibular schwannoma. NF is found in every racial and ethnic group throughout the world and affects both sexes equally. Both neurofibromatosis1 and neurofibromitosis2 are caused by abnormal genes. This disease cannot be "caught" from someone who has it already. . A common early sign of NF1 is six or more tan spots on the skin. They are called "cafe-au-lait" (French for "coffee with milk") spots. These spots are often present at birth, and may increase in size and number with age. They also may become darker. More than half of affected children have some signs ...

Words: 1436 - Pages: 6

Premium Essay

Essay On Necrotizing Fasciitis

...Necrotizing fasciitis (NF) is a rare and rapidly progressing skin disease caused by a bacterial infection. It affects the subcutaneous cellular tissue and superficial fascia (type of fibrous connective tissue which surrounds muscles, blood vessels and nerves in the body) causing necrosis of the tissue. [1] A B Figure 1 A. Medical illustration depicting normal epidermal, dermal and subcutaneous anatomy. B. Medical illustration of advanced necrotizing fasciitis with necrosis of skin, vascular thrombosis and involvement of underlying muscle. Source: Musculoskeletal Illustrations, Frank Corl [2] Disease symptoms & Diagnosis The disease symptoms include small, red and painful lumps on the skin which rapidly turn into painful bruise-like areas...

Words: 1203 - Pages: 5

Free Essay

Alzheimer Unfinshed

...Hook Introduction to Alzheimer What is Alzheimer? Who have an Alzheimer? There are two main types of Alzheimer namely, early-onset Alzheimer and late-onset Alzheimer. Early-onset Alzheimer What is it? Who have it? What are the factors that influence this types of disease? What are the symptoms, signs of this disease? How can a doctor treat this disease? Late-onset Alzheimer In United Kingdom, 800000 people have a dementia, and the most common dementia is Alzheimer Dementia is a set of symptoms which comprises of “loss of memory, mood changes, problems with community and reasoning”. 60000 people in United Kingdom die per year attributed to dementia. One third of aged people over 95 years old have dementia. Two third of dementia patients are women (Alzheimer’s society, 2014.a). http://alzheimers.org.uk/site/scripts/documents_info.php?documentID=341 Alois Alzheimer, a German neurologist, first described Alzheimer as a physical disease affecting the brain. People with Alzheimer have a scarcity of certain vitals chemicals, which of these involve in the transmission of messages inside the brain. During the course of Alzheimer’s, protein called plaques and tangles develop inside the structure of the brain, leading to the death of brain cells. Alzheimer’s is a progressive disease, which means gradually more parts of the brain are damaged. As a result, the symptoms and impacts from Alzheimer ‘s are likely to become more severe over time...

Words: 669 - Pages: 3

Premium Essay

Labs

...Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: bash scripts bash history bourne shell bourne again shell commands in Linux Unit 4 Search and explore in the following places. Find resources that help you understand how CUPS is used for printer management. Submit one resource from the ITT Tech Virtual Library and one from the Chapter 14 suggested resources. ITT Tech Virtual Library The More Information section of textbook Chapter 14, page 561 Use the following keywords and phrases to help you locate appropriate resources: CUPS server CUPS in Linux Linux printer configuration Fedora 15 printer server Unit 5 Search and explore in the following places. Find resources that help you understand mail services in Linux. ITT Tech Virtual Library The More Information section of textbook Chapter 20, page 732 Use the following keywords and phrases to help you locate appropriate resources: Send mail configuration SMTP in Linux Dovecot Email servers in Linux Fedora 15 email server Unit 6 Search and explore the ITT Tech Virtual Library for information on the uses of yum. Use the following keywords and phrases to help you locate appropriate resources: Yum repositories Yum Linux history Fedora 15 installing software Linux software repositories Unit 7 Search and explore the ITT Tech Virtual Library for information on the methods for sharing files across...

Words: 467 - Pages: 2

Free Essay

Test

...* Describe the purpose and history of Common UNIX Printing System (CUPS). * CUPS is print server that allows print jobs to be sent to printers in a uniform fashion. It contains many print drivers and can print many different formats. It is also cross platform so can be run under different operating systems. Being so connected CUPS supports HTTP, SMB, LPD/LPR, and IPP. * Michael Sweet at his company Easy Software Products developed CUPS in 1997. When first designed it used the LPD protocol then switched over to IPP because of the limitations. * Explain how to configure CUPS. * Make sure the following packages are installed. (If not yum install) * cups, system-config-printer, cups-pdf * Run chkconfig to start daemon when computer starts * # chkconfig cups on * Start CUPS * # service cups start * Using system-config-printer * Press Add printer * Enter description, location, device URI: * Use Make and Model to find the printer you are connecting * Print Test Page to confirm its working * Describe the purpose and history of OpenSSH. * OpenSSH or OpenBSD Secure Shell is encryption communication software set that uses two levels of authentication. * OpenSSH was created by OpenBSD as an alternative to the proprietary SSH. Making is debut in 1999 it has adapted adding PKCS11 authentication support to OSO layer 2/3 VPN. * Explain how to configure OpenSSH...

Words: 350 - Pages: 2

Premium Essay

Superbugs In Hospital Setting

...our skin can cause someone else a MRSA infection. MRSA can cause complicated skin infections and pneumonia and requires stronger antibiotics (Punnoose, 2012). Hand washing and keeping equipment clean and sanitized are the key to prevention of spreading MRSA. Clostridium difficile (C. diff) C. diff is now the most common infectious diarrhea in hospitals and long term health care facilities. So far in 2014, the CDC has had 500,000 reported case of C. diff and annually at least 15,000 patients will die from complication of it (Mellow M.D., 2014). Some of the risk factors of C. diff are long term antibiotic use, use of chemotherapy drugs, weaken immune system, multiple antibiotic used to treat infections, disease of the colon and previous history of C. diff (Mullany & Roberts, 2010). C. diff can affect the young and the old. Treatment can be difficult because you are given more antibiotic and may take longer to treat. Drinking lots of fluids can help prevent dehydration caused by the diarrhea. Hand washing and keeping equipment clean and sanitized are the key to prevention of spreading C. diff. Vancomycin-resistant Enterococci (VRE) Enterococci are bacteria that can be found in the human intestines and in the female genital tract. Even though it is found in these areas, they still can cause infections of the urinary tract, bloodstream or in wounds associated with catheters or surgical procedures (Centers for Disease Control and Prevention, 2014). The treatment of these infections...

Words: 1579 - Pages: 7

Premium Essay

Strorage Tech Nas

...covering the various areas given in the contents below. Fall 2014 ASHIF ANWAR Illinois Institute of Technology-Chicago 11/30/2014 Contents: 1. Introduction. 2. History. 3. Product demonstration. 4. NAS future perspective. 5. Introduction Network Attached Storage is basically defined as a file level computer data storage server connected to a computer network. It is specialized for file server operation by its hardware, software or configuration of elements to provide data access to wide range of clients (Wikipedia, 2014). In simple words we can say “a network attached storage is a external hard drive which is a computer storage system that access and remains on a computer network via Ethernet and wireless connections. The drive is then accessible to all computers in a network, instead of one just hard wired computer”(Networking, 2014). Figure-1: NAS Storage on a network infrastructure. (slideshare, 2013). NAS is one of the popular approaches which allow homes and business to store and retrieve large amounts of data in an efficient and affordable manner. One can wirelessly backup their computer files such as music, videos and other important documents onto NAS and share the files seamlessly with any connected device such a home theatre and smart TV’s.(Networking, 2014). History: Now a days with fast developing field of computer data backup, new technologies and trends back-up methods and technologies become more complex. If we look closer at the...

Words: 661 - Pages: 3

Free Essay

Systems Understanding Aid

...Solution - Main Transaction Set - Transactions List A SOLUTION - MAIN TRANSACTION SET TRANSACTIONS LIST A The next 23 pages (pages 56-78) are the solutions to the Systems Understand Aid main transaction set for transactions list A. Additional transaction sets are provided later in this manual . See page 234 for the document solutions summary page. Illustrations of completed documents for the main transaction set for transactions list A are included on pages 235-242. See page 259 for a description of the filing system. WAREN SPORTS SUPPLY BALANCE SHEET AT DECEMBER 31, 2009 AND 2008 ASSETS 2009 CURRENT ASSETS Cash Accounts receivable - net Inventory Marketable securities Total current assets FIXED ASSETS - Net of accumulated depreciation Total assets $103,141.67 42,506.08 192,593.00 24,000.00 362,240.75 2008 $11,025.19 7,814.19 101,681.00 0.00 120,520.38 215,921.00 $578,161.75 239,105.50 $359,625.88 LIABILITIES & STOCKHOLDERS' EQUITY CURRENT LIABILITIES Accounts payable Payroll taxes withheld and payable Federal income taxes payable Interest payable Total current liabilities NOTE PAYABLE Total liabilities STOCKHOLDERS' EQUITY Common stock Retained earnings Total stockholders' equity Total liabilities and stockholders' equity $8,767.15 4,262.22 51,429.77 201.37 64,660.51 70,000.00 134,660.51 $11,279.35 3,284.54 29,797.00 0.00 44,360.89 0.00 44,360.89 225,000.00 218,501.24 443,501.24 225,000.00 90,264.99 315,264.99 $578,161.75 $359,625.88 56 ...

Words: 6443 - Pages: 26

Free Essay

Sua-1

...Solution - Main Transaction Set - Transactions List A SOLUTION - MAIN TRANSACTION SET TRANSACTIONS LIST A The next 23 pages (pages 56-78) are the solutions to the Systems Understand Aid main transaction set for transactions list A. Additional transaction sets are provided later in this manual . See page 234 for the document solutions summary page. Illustrations of completed documents for the main transaction set for transactions list A are included on pages 235-242. See page 259 for a description of the filing system. WAREN SPORTS SUPPLY BALANCE SHEET AT DECEMBER 31, 2009 AND 2008 ASSETS 2009 2008 CURRENT ASSETS Cash Accounts receivable - net Inventory Marketable securities Total current assets $103,141.67 42,506.08 192,593.00 24,000.00 362,240.75 $11,025.19 7,814.19 101,681.00 0.00 120,520.38 FIXED ASSETS - Net of accumulated depreciation 215,921.00 239,105.50 $578,161.75 $359,625.88 Total assets LIABILITIES & STOCKHOLDERS' EQUITY CURRENT LIABILITIES Accounts payable Payroll taxes withheld and payable Federal income taxes payable Interest payable Total current liabilities $8,767.15 $11,279.35 4,262.22 51,429.77 201.37 64,660.51 3,284.54 29,797.00 0.00 44,360.89 NOTE PAYABLE Total liabilities 70,000.00 134,660.51 0.00 44,360.89 STOCKHOLDERS' EQUITY Common stock Retained earnings Total stockholders' equity 225,000.00 218,501.24 443,501.24 225,000.00 90,264.99 315,264...

Words: 6443 - Pages: 26

Free Essay

Unix

...enviroment . Communication skills in handling diversified activities like Customer Support, in various capacities from front-end field engineer to the present capacity working. Well versed with Incident resolution and Change Management process. Performing Datacenter administration ( HP/SUN Servers including C7000,M4000, M5000, T5220, T5240, V440, V480/V490, V880/V890, E4500, E6500) tasks such: Backups, restore, Tape Management, Installation, Upgradation & Decommission of Servers. Excellent problem solver with strong communication and interpersonal skills. High ability to work in a team environment and interact with cross-function team members, able to lead as well as to accept instruction, enjoy sharing beneficial knowledge. Certification History: Certificates: SUN Certified System Administrator (SCSA) Oracle Certified Professional (OCP) Vmware Certified...

Words: 1089 - Pages: 5

Premium Essay

Sex Trafficking in Cambodia

...Kassity Payne Professor Stephen Henrichon FYW-101 12/1/11 Sex-Trafficking in Cambodia Many believe that all types of slavery have been banished, but in fact sex trafficking is on the rise especially in areas like Thailand and Cambodia. Sex trafficking is a modern form of slavery in which a sexual act is forced and or the person forced to perform the act is under the age of 18 years old (“Sex Trafficking”). Since there have been advancements in technologies such as the innovation of the Internet, a drastic demand for this trade has increased immensely. Sex trafficking is the slavery of the twenty-first century, but has become one the world’s growing industries (“Kristof”). In fact, sex trafficking is the second most profitable illicit business globally, being a nine to twenty-seven billion dollar industry (“Sex Trafficking”). Since sex trafficking is the second most profitable illicit business globally many people are involved hence why there are over 32 million people enslaved around the world (“Sex Trafficking”). Out of those 32 million people enslaved, eighty percent of the victims are in sexual servitude (“Sex Trafficking”). Sex trafficking is everywhere, but many people are not aware of the issue. People around the world have done little to stem the tide of sex trafficking (“Cambodia”). With the help of people observing signs of sexual activity and donating to organizations that help victims of the sex slave trade, the sex trafficking can hopefully be put to an end...

Words: 1291 - Pages: 6

Free Essay

Demography of Germany

...Demography of Germany Concepts, Data, and Methods G. Rohwer U. P¨tter o Version 3 October 2003 Fakult¨t f¨r Sozialwissenschaft a u Ruhr-Universit¨t Bochum, GB 1 a 44780 Bochum goetz.rohwer@ruhr-uni-bochum.de ulrich.poetter@ruhr-uni-bochum.de Preface This text is an introduction to concepts and methods of demographic description and analysis. The substantial focus is on the demographic development of Germany, all data refer to this country. The main reason for this focus on a single country is that we want to show how the tools of demography can actually be used for the analysis of demographic problems. The text consists of two parts. Part I introduces the conceptual framework and explains basic statistical notions. This part also includes a short chapter that explains how we speak of “models” and why we do not make a sharp distinction between “describing” and “modeling” demographic processes. Then follows Part II that deals with data and methods. In the present version of the text, we almost exclusively discuss mortality and fertility data; migration is only mentioned in Chapter 6 and briefly considered in the context of a Leslie model at the end of the text. In addition to providing a general introduction to concepts of demography, the text also intends to show how to practically work with demographic data. We therefore extensively document all the data used and explain the statistical calculations in detail. In fact, most of these calculations are quite simple;...

Words: 109199 - Pages: 437

Premium Essay

Neurofibromatosis (NF): A Genetic Analysis

...Neurofibromatosis (NF) is an autosomal dominant genetic disorder that affects the nerve system in which symptoms are skin anomalies and tumors at any part of the human body (can be small or big ones); this disease can affect any of the two sexes (Torpy, Burke and Glass 2009). This is one of the most common genetic disorders, but it is mainly known just for the symptoms, not for the scientific cause, because people are not aware about the fact that this illness is caused by a genetic alteration. There are two types of Neurofibromatosis, NF1 and NF2, both caused by a mutation in different genes (Torpy, Burke and Glass 2009). NF1 is the most common one, affecting approximately 1 in 3000 individuals. Most patients’ only show café au lait spots,...

Words: 468 - Pages: 2

Free Essay

Tumeric

...REPORT FROM DR AL SEARS Disease-ending breakthrough STUNS researchers at Johns Hopkins... UCLA... and Baylor Imagine your doctor hands you a brand-new pill... At first glance it looks like any ordinary pill... maybe a little smaller, not so fake-looking. But what he says next leaves you breathless...“This is the last thing I'll ever prescribe you...” “It was formulated by UCLA researchers a few years back.”“Since then studies have documented its ability to cure 619 diseases — virtually everything that affects your health.” “And it has zero side effects — nobody has ever reported feeling anything but pure joy after taking it.”Now at this point you're already a bit floored... Could one tiny tablet really contain so much healing potential? But then he drops the bomb... Something that changes the way you think of your health and medicine forever...He tells you that despite being completely side-effect free... And costing only $1... 6,600 peer-reviewed studies have proven its superiority over the world's leading drugs. With this mountain of research he had no choice but to share it with you — and all of his patients. In fact, double-blind, placebo controlled trials have found it... * * 
Kills 16-times more cancer cells than the leading chemo drug Eloxatin — without harming healthy cells (International Journal of Oncology) * * 
“It's 400-times more potent than the diabetes drug Metformin” — reports Auburn University researchers (Journal...

Words: 5397 - Pages: 22

Premium Essay

Gene Threapy

...DNA that is not like anyone else’s. However, the cells of an individual contains the DNA, which most importantly is needed to create a unique make up for that person. With dominant genetic disorders, it is only necessary for an individual to be affected by one autosomal dominant disorder. Another words, usually a child will only have one parent that has the disorder and when the parents conceive, the child then has a 50% chance of inheriting the mutated gene. Recessive genetic disorders are caused when an individual receives two defective genes, one from each parent. An example of a dominant genetic disorder is Neurofibromatosis. There are two types of NF, there is NF1, and NF2. I have Neurofibromatosis type 1, and with this an individual has neurofibroma tumors that grow on the nerve endings from on the outside of their body. NF type 2 is very uncommon, more so than NF1. With NF2 an individual will have many of the tumors on their cranial and spinal nerves, along with tumors that will affect both of the auditory nerves which could cause hearing loss. Both my girls also have NF1, and my youngest daughter has one of the tumors growing on her bilateral optic nerve, therefore, she has to have MRI test done every six months to once a year to keep an eye on it, to make sure it does not swell too much and cause too much pressure on the eye nerves, if...

Words: 1837 - Pages: 8