Question

In: Computer Science

Consider a file system in which multiple users/clients can access the data from the disks over...

Consider a file system in which multiple users/clients can access the data from the disks
over storage network. Assume each user/client has its file system and considers its storage
disks (shared with other clients) as local.
(a) Explain how this file system is different as compared to NFS (Network File
Servers).
(b) What are the major advantages and disadvantages of this type of file systems (do
not repeat the points mentioned in answering the part-a)?

Solutions

Expert Solution

a ans:

Pros

The professionals of victimisation NFS for backups include:

NFS does not need authentication, therefore you do not ought to code in usernames and passwords.

NFS is extremely quick over Gigabit local area network networks.

NFS is typically associate on the market choice on a NAS device.

NFS exports mounts directly into the classification system on mount points. terribly simple to repeat information back and forth victimisation native copy commands like cp and vmkfstools.

Cons

The cons of victimisation NFS for backups include:

NFS doesn't have any native support in Windows. needs Services for UNIX system. Not suggested.

NFS isn't as secure as different choices, because of lack of authentication and encoding.

B ans:

Advantages:

1)Backup

2)Compactness

3)Editing

4)Sharing

5)Remote Access

Disadvantages:

1)Data Inconsistency

2) Integrity Problems

3) Concurrent Access Anomalies:

4). Security Problems

5)Limited Data Sharing


Related Solutions

(Operating System CSE) Consider a file system in which a file can be deleted and its...
(Operating System CSE) Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided?2)Consider a file systemthat uses a modifiedcontiguous-allocation scheme with support for extents.A file is a collection of extents, with each extent corresponding to a contiguous set of...
1)Consider a file system in which a file can be deleted and its disk space reclaimed...
1)Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What problems may occur if a new file is created in the same storage area or with the same absolute path name? How can these problems be avoided? 2)Consider a file systemthat uses a modified contiguous-allocation scheme with support for extents.A file is a collection of extents, with each extent corresponding to a contiguous set of blocks....
True/False: A primary goal of a database system is to share data with multiple users
True/False: A primary goal of a database system is to share data with multiple users
Providing access to healthcare providers and securing a system from inappropriate access can be a difficult...
Providing access to healthcare providers and securing a system from inappropriate access can be a difficult balancing act. In many cases, the more secure a system is, the more restricted access to that system becomes. Discuss situations where this balancing act has created conflict or might create conflict within the clinical area and how that conflict was (or could be) managed.
Consider the applications for home mortgages data in the file of P12_04.xlsx. Use multiple regression to...
Consider the applications for home mortgages data in the file of P12_04.xlsx. Use multiple regression to develop an equation that can be used to predict future applications for home mortgages (hint: use dummy variables for the quarters and create a time variable for the quarter numbers) Quarter Year Applications 1 1 96 2 1 114 3 1 112 4 1 81 1 2 97 2 2 103 3 2 120 4 2 99 1 3 105 2 3 110 3...
In this lab, you will learn to read data from a sequential-access text file. To read...
In this lab, you will learn to read data from a sequential-access text file. To read data from a file, you need one FileStream object and one StreamReader object. The StreamReader object accepts the FileStream object as its argument. To read data from a sequential-access text file, here's what you need to do: From the desktop, open Visual Studio 2017. From the menu bar, navigate to File > New > Project. In the New Project window, select Windows Forms App...
Question 10a. Consider again the file MyNotes.txt from the previous questions. Assuming that users who are...
Question 10a. Consider again the file MyNotes.txt from the previous questions. Assuming that users who are neither Bob nor members of the personnel group should have no access to the file, which octal code would you use with chmod to set the permissions on the file for all users? Select one: a. 665 b. 664 c. 110 d. o+0 e. 660 f. 770 g. o-0 h. 550 i. o=7 j. 764 k. 655 l. o=0 m. 755 n. 760 Part...
Consider the data in the file Growth.csvwhich contains data on average growth rates over 1960-1995 for...
Consider the data in the file Growth.csvwhich contains data on average growth rates over 1960-1995 for 65 countries, along with variables that are potentially related to growth. A complete description of the data is given in data description which is under the name Growth- Data Description and can be found on Blackboard. Using this data, carry out the following empirical exercises: Construct a table that shows the sample mean, std. deviation, minimum and maximum values for the variablesGrowth, Trade-Share, YearsSchool,...
Are you planning to allow clients to ACCESS YOUR RAW DATA (Big Data) or are you...
Are you planning to allow clients to ACCESS YOUR RAW DATA (Big Data) or are you planning on analyzing that Big Data and presenting FINISHED ANALYTICS to clients?? If you are planning on allowing many many customers to access your data, then how big is your helpdesk and how big does your network throughput need to be to allow customer-access?  And what about Security?  If you're mostly in the cloud - is your CSP going to provide sufficient security?  If...
Consider the problem statement for an "Online Auction System" to be developed: New users can register...
Consider the problem statement for an "Online Auction System" to be developed: New users can register to the system through an online process. By registering a user agrees to abide by different pre-defined terms and conditions as specified by the system. Any registered user can access the different features of the system authorized to him / her, after he authenticates himself through the login screen. An authenticated user can put items in the system for auction. Authenticated users can place...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT