network file system protocol by authentication experts
TRANSCRIPT
![Page 1: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/1.jpg)
Network File System Protocol
By Authentication
Experts
![Page 2: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/2.jpg)
Introduction
Provides transparent remote access to shared file across the network
Portable across different architecture and operating system
![Page 3: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/3.jpg)
Introduction
Aim: to provide the following logical view
![Page 4: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/4.jpg)
Introduction First version developed by Sun
Microsystems for internal research Version 2 introduced in March, 1989
defined in RFC 1094 Version 3 introduced in June, 1995
defined in RFC 1813 Version 4 introduced in December, 2000
defined in RFC 3031; revised in RFC 3530, April 2003
![Page 5: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/5.jpg)
Introduction to File System
A file system is a way of storing data on a medium: the way it is organized and managed
Every file is represented by an “inode”A file descriptor holding, among other things, file access permissions, physical block addresses holding data, etc.
The NFS server’s task is to give clients the inodes they want to access
An NFS server gives an additional net layer allowing remote machines to handle the inodes
![Page 6: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/6.jpg)
The NFS Protocol
NFS is built from 4 distinct protocols: nfs
- File creation, searching, reading, writingAuthentication and statistics
mountd- Mounting of “exported” systems for access via nfs
nsm- Network Status Monitor- Monitors a client or server machine’s status
nlm- Network Lock Manager- Avoid simultaneous data modification by multiple clients
![Page 7: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/7.jpg)
The NFS Protocol
![Page 8: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/8.jpg)
How does RPC work?
![Page 9: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/9.jpg)
Port Mapper : Analogy
![Page 10: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/10.jpg)
Port Mapper : Analogy
![Page 11: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/11.jpg)
File Handling in NFS The protocol revolves around the filehandle
-A data structure allow unique identification of a file system object
-Contains the file inode and an entry representing the device where the file resides
How does a server know which file/directory the client needs to access?
- At first, client obtains a file handle for root of the file system
- File handle is opaque to the client- Client sends file handle to server when referencing a file/directory- No need to use the full path names
The file handle contains whatever information the server needs to distinguish an individual file
![Page 12: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/12.jpg)
The NFS Protocol
![Page 13: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/13.jpg)
The NFS Protocol
Each relies on Remote Procedure Calls(RPC) andPortmap(also calledrpc.portmap).
An RPC server tells portmap which port will be used and the managed RPC number
A client contacts portmap to get port number of desired server program
RPC packets are addressed to the corresponding port
![Page 14: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/14.jpg)
Sequence Diagram
![Page 15: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/15.jpg)
![Page 16: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/16.jpg)
![Page 17: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/17.jpg)
![Page 18: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/18.jpg)
![Page 19: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/19.jpg)
Statelessness
What is statelessness ?- Server does not need to maintain protocol state about it’s client- Server does not keep previous request information- Client keeps track of all information required to send requests to the server
Advantage :- If server crashes, no state information lost- Client needs only retransmit a request until the server responds
![Page 20: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/20.jpg)
NFS Procedure
![Page 21: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/21.jpg)
NFS Version 3
Introduced in June,1995, described in RFC 1813
Support for 64-bit file sizes and offsets, to handle files larger than 4 GB
Support for asynchronous writes on the server, to improve write performance
Using TCP as a transport made using NFS over a WAN more feasible
![Page 22: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/22.jpg)
NFS Version 4
Introduced in December,2000(RFC 3010) and revised in April,2003, described in RFC 3530
Introduces a stateful protocol Mandates strong security Performance improvements
![Page 23: Network File System Protocol By Authentication Experts](https://reader035.vdocuments.us/reader035/viewer/2022062421/56649f4d5503460f94c6da40/html5/thumbnails/23.jpg)
Thank you