skip to main content
research-article

Scalable, Secure, and Highly Available Distributed File Access

Published: 01 May 1990 Publication History

Abstract

A summary of and historical perspective on work done to implement easy-to-share distributed file systems based on the Unix model are presented. Andrew and Coda are distributed Unix file systems that embody many of the recent advances in solving the problem of data sharing in large, physically dispersed workstation environments. The Andrew architecture is presented, the scalability and security of the system are discussed. The Coda system is examined, with emphasis on its high availability.

References

[1]
Satyanarayanan, M., "A Survey of Distributed File Systems," in Annual Review of Computer Science, J.F. Traub et al., eds., Annual Reviews, Inc., Palo Alto, Calif., 1989.
[2]
Svobodova, L., "File Servers for Network-Based Distributed Systems," ACM Computing Surveys, Vol. 16, No. 4, Dec. 1984.
[3]
van Renesse, R., H. van Staveren, and A.S. Tanenbaum, "The Performance of the Amoeba Distributed Operating System," Software Practice and Experience, Vol. 19, No. 3, Mar. 1989.
[4]
Levine, P., "The Apollo Domain Distributed File System" in Theory and Practice of Distributed Operating Systems, Y. Paker, J.-T. Banatre, and M. Bozyigit, eds., NATO ASI Series, Springer-Verlag, 1987.
[5]
Rifkin, A.P., et al., "RFS Architectural Overview" Proc. Summer Usenix Conf., Atlanta, 1986, pp. 248-259.
[6]
Hisgen, A., et al., "Availability and Consistency Trade-Offs in the Echo Distributed File System," Proc. Second IEEE Workshop on Workstation Operating Systems, CS Press, Los Alamitos, Calif., Order No. 2003, Sept. 1989.
[7]
Sauer, C.H., et al., "RT PC Distributed Services Overview," ACM Operating Systems Review, Vol. 21, No. 3, July 1987, pp. 18-29.
[8]
Ousterhout, J.K., et al., "The Sprite Network Operating System," Computer, Vol. 21, No. 2, Feb. 1988, pp. 23-36.
[9]
Sandberg, R., et al., "Design and Implementation of the Sun Network File System," Proc. Summer Usenix Conf., Portland, 1985, pp. 119-130.
[10]
1. J.H. Howard et al., "Scale and Performance in a Distributed File System," ACM Trans. Computer Systems, Vol. 6, No. 1, Feb. 1988, pp. 51-81.
[11]
2. M.N. Nelson, B.B. Welch, and J.K. Ousterhout, "Caching in the Sprite Network File System," ACM Trans. Computer Systems, Vol. 6, No. 1, Feb. 1988, pp. 134-154.
[12]
3. M. Satyanarayanan, "Integrating Security in a Large Distributed System," ACM Trans. Computer Systems, Vol. 7, No. 3, Aug. 1989, pp. 247-280.
[13]
4. R.M Needham and M.D. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Comm. ACM, Vol. 21, No. 12, Dec. 1978, pp. 993-998.
[14]
5. J.G. Steiner, C. Neumann, and J.I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Proc. Usenix Conf., Dallas, Texas, Feb. 1988, pp. 191-202.
[15]
6. M. Satyanarayanan et al, "Coda: A Highly Available File System for a Distributed Workstation Environment," IEEE Trans. Computers, Vol. 39, No. 4, Apr. 1990, pp. 447-459.

Cited By

View all

Recommendations

Reviews

Alan L. Tharp

Security for Carnegie-Mellon's Andrew file system is handled through the servers rather than the workstations. File validation is managed by the server notifying the workstations whenever a file changes, rather than the workstation asking the server every time it opens a local file. This easily-read paper surveys the history and current status of the Andrew and Coda file systems. It should interest anyone desiring an overview of distributed file systems; the author gives references for those who want more detailed information. Since many organizations have moved to or are considering moving to similar systems of networked workstations with backend servers, the paper is timely. The more recent file system, Coda, aims for constant data availability. An interesting consequence of this capacity is that a user at a portable terminal can be considered as a deliberately induced network or server failure. Periods of disconnection for a portable terminal should not be lengthy, however. To accomplish high availability, Coda allows a user to set priorities on which files and directories should be kept at her or his workstation. It also allows updates in multiple partitions but detects and confines conflicting updates as soon as possible. To assist in failure resiliency, Coda maintains server replications with files transmitted in parallel. Performance figures compare Andrew to Sun NFS. The paper concludes with a brief discussion of current problems of distributed file systems. Much information is packed into these few pages.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 23, Issue 5
May 1990
87 pages
ISSN:0018-9162
Issue’s Table of Contents

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 May 1990

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)The Computing Landscape of the 21st CenturyProceedings of the 20th International Workshop on Mobile Computing Systems and Applications10.1145/3301293.3302357(45-50)Online publication date: 22-Feb-2019
  • (2018)Informed Prefetching for Distributed Multi-Level Storage SystemsJournal of Signal Processing Systems10.1007/s11265-017-1277-z90:4(619-640)Online publication date: 1-Apr-2018
  • (2017)Client-Side Journaling for Durable Shared StorageACM Transactions on Storage10.1145/314937213:4(1-34)Online publication date: 17-Nov-2017
  • (2015)Host-side filesystem journaling for durable shared storageProceedings of the 13th USENIX Conference on File and Storage Technologies10.5555/2750482.2750487(59-66)Online publication date: 16-Feb-2015
  • (2015)Remote Data Auditing in Cloud Computing EnvironmentsACM Computing Surveys10.1145/276446547:4(1-34)Online publication date: 26-May-2015
  • (2015)Forward-Secure Authenticated Symmetric Key Exchange ProtocolProceedings of the 9th International Conference on Provable Security - Volume 945110.1007/978-3-319-26059-4_8(149-166)Online publication date: 24-Nov-2015
  • (2013)Replication, history, and grafting in the Ori file systemProceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles10.1145/2517349.2522721(151-166)Online publication date: 3-Nov-2013
  • (2013)Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems PrinciplesundefinedOnline publication date: 3-Nov-2013
  • (2012)The case for elastic operating system services in fosProceedings of the 49th Annual Design Automation Conference10.1145/2228360.2228410(265-270)Online publication date: 3-Jun-2012
  • (2010)Intrusion recovery using selective re-executionProceedings of the 9th USENIX conference on Operating systems design and implementation10.5555/1924943.1924950(89-104)Online publication date: 4-Oct-2010
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media