8. Data Storage Techniques
8.1 CIFS
The Common Internet File system (CIFS) is a native file sharing protocol used by computer users across corporate intranets and Internet. It defines series of commands to pass the information between the networked computers. CIFS implements the client/server programming model. A client program sends a request to server program for access to a file or to pass a message to a program that runs in the server computer, the server then takes the requested action and gives a response.
CIFS Functions are:
● Get access to files that are local to the server and read and write to them
● Share files with other clients using special locks
● Restore connections automatically in case of network failure.
● Unicode file names
Similar to SMB protocol, CIFS implements the Internet 's TCP/IP protocol. CIFS can be considered as supplement of existing Internet application protocols such as the File Transfer Protocol (FTP) and the Hypertext Transfer Protocol (HTTP).
Common Internet File System runs as an application-layer network protocol used for providing shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network. It also facilitates an authenticated inter-process communication mechanism.
8.2 Network File System (NFS)
Sun Microsystems in 1984 developed a distributed file system protocol called Network File System (NFS) allowing a user on a client computer to access files over a network much like local
Once one of the computers is properly configured as a file server, users can access the storage by mapping the drives on the respective computers. The file server will be mapped as a drive and users can store, edit and access files directly from the shared storage disk. The disk will be connected to each computer. For example, when a user needs to access any file from the file server, he/she can access the drive that will now be mapped on the every computer (Science - Opposing Views, 2014).
• “Application - The Application Layer is the layer that most network users are exposed to, and is the level at which human communication happens. HTTP, FTP, and SMTP are examples of the application layer protocols the Patton-Fuller will now be utilizing for communicating electronically” (Network Design, 2012).
The customer required that each workstation have at least 256 GB to 500 GB of local storage. They also wanted a file server on the network to protect data in case a workstation went down. This server will be networked into allow file sharing between devices and have available 40 GB to start. These network upgrades, the greater use of applications, and file sharing will require more protection; a new firewall programmed to filter packets and analyze external requests and direct requests and traffic to the right application.
SAMBA : Samba service is necessary to share files between Linux and Windows system. Also used to configure domain controller and wins server.
name that other computers use to identify one another in a network. Internet protocol is
can usefuly be shared. Give examples of their sharing as it ocurs in practice in distributed
Files are stored at server disk. Clients do read and write operations on the network.
The Application layer within the OSI reference model is where the application and the user communicates. In other words, the application layer is the ending of data that is transferred in visual form to the user. This layer provides the interface between the applications we use to communicate and the underlying network over which our messages are transmitted. The Application Layer functions are to provide the interface for application-specific protocols commonly used such as HyperText Transfer (HTTP), file transfer (FTP), Simple mail transfer (SMTP), Internet message Access (IMAP),
It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. On many LANs, cables are used to connect the network interface cards in each computer; other LANs may be wireless.
Network protocol communications, network connections established by host computer, network routing information, information about computers
b. Uses high-speed networking technologies to give servers fast access to large amounts of disk storage
Many people have uncomplicated needs (or wants) for their home networks. Even though 80% of users have multiple computers within a single home, many of these users don't even network the systems together. Their file transfers are usually done by means of "sneaker net", or copying files to and from a USB/CD or by sending the file(s) through
The TCP/IP protocols are the heart and soul of the Internet, and they describe the fundamental rules that govern all communications in the network. The original address system of the Internet is Internet Protocol version 4 (IPv4). The Internet Engineering Task Force (IETF) developed IPv6 to deal with the long-anticipated problem of IPv4 address exhaustion. However, IPv6 is not foreseen to supplant IPv4 instantaneously.
This is one of the crucial advantages of networking computers. Everyibe can find and share data because of networking. This is beneficial for large organizations to maintain their information in an
Well-known communications protocols are Ethernet, a hardware and Link standard that is ubiquitous in local area networks, and the Internet Protocol Suite, which defines a set of protocols for internetworking, i.e. for data communication between multiple networks, as well as host-to-host data transfer, and application-specific data transmission formats.