SlideShare uma empresa Scribd logo
1 de 35
Baixar para ler offline
NETWORK FILE SYSTEM
(NFS)

By:
Amruta Udamale
Sequence
 Introduction to NFS
 Version
 NFS basic and protocol- State ,Architecture
 Component

 Different NFS processes
 Working

 Read operation while accessing file from server
 Steps to mount directory from NFS server
Introduction to NFS
•
•
•
•

Developed by Sun Microsystems
Use Distributed File Protocol
Mostly used with UNIX OS
Implement for other OS like
- Mac OS, Microsoft Windows, Novell NetWare, and IBM AS/400

•
•
•
•
•

Allows users to ‘Share’ a directory
RPC-based (uses XDR)
NFS is perfect for a NAS
Opposed to SAMBA
Currently based on VFS
Major Goals
- simple crash recovery
- reasonable performance :80% of a local drive
Sun Protocols in the ISO OSI Model
NFS Overview
Shared
directory

Server

Client
/

/

home

usr

home

usr
bin

bin
a

b

NFS: Export Subtree

c

a

b

c

NFS: Mount a remote file system

The clients 'mount' the shared directory, it becomes part
of their own directory structure.
NFS Version
• NFSv1 (1984)
- develop in-house experimental purpose

• NFSv2 (March 1989)
- Release for commercial use
- UDP, Stateless,32 bit

• NFSv3 (June 1995)
- Overcome to v2
- UDP and TCP, stateless,64bit

• NFSv4 (April 2003)
- Overcome to v2,v3
- Statefull Server
- Use tcp
- Focus on Performance, Accessibility, Scalability, Strong
security, Internationalization, Extensibility
System Structure: Server Type
• Stateless

server

– No information kept for client requests
– Information needed to be provided by the client
– More tolerant to server crashes

• Statefull

server

– maintins information about client Access
– Shorted request messages
– Better performance
– Idempotency easier
– Consistency is easier to achieve
NFS Architecture

• VFS to handle local and remote files common interface
• RPC for data transport
Sun NFS Protocol
Component
1. File Handles
How does the client tell the server which file or directory the operation
applies to? Similarly, how does the server return the result of a lookup?
File handle or fhandle
Determined by the server
Includes all information needed to identify the file/object on the server, and find it
quickly.
Client shouldn’t modify it
Stale File Handle

File Handle(32 Bytes)
volume ID

Index no. of mounted file
system

inode #

No. of file within
file system

generation #

To correctly
identify file
Use of File handle
2. Remote Procedure Call (RPC)

• Initially implementations of RPC was used with the UDP protocol
• Today both UDP and TCP are used
3. External Data Representation
(XDR)
4. Portmapper
Portmapper
2.Request for RPC Service

1.Register Service
<Service, Version, Transport>

Client

4.Contact Service on Port Directly

RPC server
5. NFS Daemon Processes
a.
b.
c.
d.
e.

nfsd daemon
biod daemon
rpc.mount daemon
rpc.lockd daemon
rpc.statd daemon
nfsd Daemon
• Handle incoming RPC requests
• May have multiple nfsd daemons per site
• A nfsd daemon makes kernel calls to do
the real work
• Allows multiple threads
biod Daemon
• Does readahead for clients
- To make use of kernel file buffer cache
• Only improves performance
- NFS works correctly without biod daemon

• Also flushes buffered writes for clients
rpc.mount Daemon
• server implements the MOUNT protocol
• Provides initial file handle for a remote volume
• Also checks that incoming requests are from privileged ports (in
UDP/IP packet source address)
• Protocols used: rpc.mountd [-d] [-f] [-h] [-v]
Mount
Daemon

NFS Client
3 .If ‘YES’ then
return rootfile_handle to
client

checks the list of
currently exported
volumes against the
credentials of NFS client

3.If ‘NOT’ Found
then report to
client with error
rpc.lockd Daemon
• NFS server is stateless, so it does not handle file
locking
• rpc.lockd provides locking
• server crashes and recovers : rpc.lockd reestablish
locks
• Use NFS Lock Manager (NLM) Protocol
• Procedure used:
NLM_NULL, NLM_TEST, NLM_LOCK,
NLM_GRANTED NLM_UNLOCK, NLM_FREE
rpc.statd Daemon
• at client and server
• Used to check status of a machine
• Server’s rpc.lockd asks rpc.statd to store lock info (in
file system)
– And to monitor status of locking machine
• If client crashes, clear its locks from server
• client crashes: rpc.statd contacts client when it
becomes available again
• Use Network Status Monitor (NSM) Protocol
• Procedure used:
SM_NULL,SM_STAT,SM_MON,SM_NOTIFY
Working
NFS Server
Read Operation From Server
Steps to mount directory from NFS server

Server Installation
Creating Share Folder in
Home directory
Setting
Folder’s
Properties
File which you want to mount
in share folder
Edit File with IP address
Select Packages For
Mounting Purpose
After wards do on cmd :sudo getit /etc/fstab
For output :mount /home/share1

At client side
shared file will
appear .Hear we
can see video
which was shared
by server side in
share folder.
Conclusions
• It is ubiquitous.
• It is easy to setup and administer.
• It provides a better solution than the alternative of
not sharing files.
• NFS v4 improves security.
• Alternatives of NFS :
–
–
–
–

Server Message Block (SMB, also known as CIFS) protocol
Apple Filing Protocol (AFP)
NetWare Core Protocol (NCP)
OS/400 File Server file system (QFileSvr.400)
References
• http://en.wikipedia.org/wiki/Network_File_System
• http://www.cs.sunysb.edu/~ezk/cse595s13/nfs/ch1+6.pdf
• http://lass.cs.umass.edu/~shenoy/courses/spring07/
lectures/Lec20.pdf
• http://www.tldp.org/HOWTO/pdf/NFS-HOWTO.pdf
Thank You !!

Mais conteúdo relacionado

Mais procurados (20)

The NFS Version 4 Protocol
The NFS Version 4 ProtocolThe NFS Version 4 Protocol
The NFS Version 4 Protocol
 
Server configuration
Server configurationServer configuration
Server configuration
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Storage Management in Linux OS.ppt
Storage Management in Linux OS.pptStorage Management in Linux OS.ppt
Storage Management in Linux OS.ppt
 
Linux distributions
Linux    distributionsLinux    distributions
Linux distributions
 
Linux User Management
Linux User ManagementLinux User Management
Linux User Management
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed Computing
 
Linux kernel
Linux kernelLinux kernel
Linux kernel
 
User Administration in Linux
User Administration in LinuxUser Administration in Linux
User Administration in Linux
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Dns
DnsDns
Dns
 
Wireshark
WiresharkWireshark
Wireshark
 
File System FAT And NTFS
File System FAT And NTFSFile System FAT And NTFS
File System FAT And NTFS
 
Network File System
Network File SystemNetwork File System
Network File System
 
Nfs
NfsNfs
Nfs
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Linux kernel
Linux kernelLinux kernel
Linux kernel
 

Semelhante a NFS(Network File System)

Meeting 9 nfs network file system
Meeting 9   nfs network file systemMeeting 9   nfs network file system
Meeting 9 nfs network file systemSyaiful Ahdan
 
File service architecture and network file system
File service architecture and network file systemFile service architecture and network file system
File service architecture and network file systemSukhman Kaur
 
Oracle database might have problems with stale NFSv3 locks upon restart
Oracle database might have problems with stale NFSv3 locks upon restartOracle database might have problems with stale NFSv3 locks upon restart
Oracle database might have problems with stale NFSv3 locks upon restartAshwin Pawar
 
NETWORK FILE SYSTEM
NETWORK FILE SYSTEMNETWORK FILE SYSTEM
NETWORK FILE SYSTEMRoshan Kumar
 
RHCE (RED HAT CERTIFIED ENGINEERING)
RHCE (RED HAT CERTIFIED ENGINEERING)RHCE (RED HAT CERTIFIED ENGINEERING)
RHCE (RED HAT CERTIFIED ENGINEERING)Sumant Garg
 
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community) [발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community) 동현 김
 
Chapter 05
Chapter 05Chapter 05
Chapter 05cclay3
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxachutachut
 
Multi-Site Perforce at NetApp
Multi-Site Perforce at NetAppMulti-Site Perforce at NetApp
Multi-Site Perforce at NetAppPerforce
 
Chapter 06
Chapter 06Chapter 06
Chapter 06cclay3
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceSam Bowne
 

Semelhante a NFS(Network File System) (20)

Linux06 nfs
Linux06 nfsLinux06 nfs
Linux06 nfs
 
Meeting 9 nfs network file system
Meeting 9   nfs network file systemMeeting 9   nfs network file system
Meeting 9 nfs network file system
 
Nf Sp4
Nf Sp4Nf Sp4
Nf Sp4
 
File service architecture and network file system
File service architecture and network file systemFile service architecture and network file system
File service architecture and network file system
 
Oracle database might have problems with stale NFSv3 locks upon restart
Oracle database might have problems with stale NFSv3 locks upon restartOracle database might have problems with stale NFSv3 locks upon restart
Oracle database might have problems with stale NFSv3 locks upon restart
 
NETWORK FILE SYSTEM
NETWORK FILE SYSTEMNETWORK FILE SYSTEM
NETWORK FILE SYSTEM
 
RHCE (RED HAT CERTIFIED ENGINEERING)
RHCE (RED HAT CERTIFIED ENGINEERING)RHCE (RED HAT CERTIFIED ENGINEERING)
RHCE (RED HAT CERTIFIED ENGINEERING)
 
Nfs
NfsNfs
Nfs
 
NFS.ppt
NFS.pptNFS.ppt
NFS.ppt
 
M3 nfs fs-3.2.1
M3 nfs fs-3.2.1M3 nfs fs-3.2.1
M3 nfs fs-3.2.1
 
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community) [발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
[발표자료] 오픈소스 Pacemaker 활용한 zabbix 이중화 방안(w/ Zabbix Korea Community)
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Multi-Site Perforce at NetApp
Multi-Site Perforce at NetAppMulti-Site Perforce at NetApp
Multi-Site Perforce at NetApp
 
Cl116
Cl116Cl116
Cl116
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
 
FILE SERVER
FILE SERVERFILE SERVER
FILE SERVER
 
File Sever
File SeverFile Sever
File Sever
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise Service
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

NFS(Network File System)

  • 2. Sequence  Introduction to NFS  Version  NFS basic and protocol- State ,Architecture  Component  Different NFS processes  Working  Read operation while accessing file from server  Steps to mount directory from NFS server
  • 3. Introduction to NFS • • • • Developed by Sun Microsystems Use Distributed File Protocol Mostly used with UNIX OS Implement for other OS like - Mac OS, Microsoft Windows, Novell NetWare, and IBM AS/400 • • • • • Allows users to ‘Share’ a directory RPC-based (uses XDR) NFS is perfect for a NAS Opposed to SAMBA Currently based on VFS Major Goals - simple crash recovery - reasonable performance :80% of a local drive
  • 4. Sun Protocols in the ISO OSI Model
  • 5. NFS Overview Shared directory Server Client / / home usr home usr bin bin a b NFS: Export Subtree c a b c NFS: Mount a remote file system The clients 'mount' the shared directory, it becomes part of their own directory structure.
  • 6. NFS Version • NFSv1 (1984) - develop in-house experimental purpose • NFSv2 (March 1989) - Release for commercial use - UDP, Stateless,32 bit • NFSv3 (June 1995) - Overcome to v2 - UDP and TCP, stateless,64bit • NFSv4 (April 2003) - Overcome to v2,v3 - Statefull Server - Use tcp - Focus on Performance, Accessibility, Scalability, Strong security, Internationalization, Extensibility
  • 7. System Structure: Server Type • Stateless server – No information kept for client requests – Information needed to be provided by the client – More tolerant to server crashes • Statefull server – maintins information about client Access – Shorted request messages – Better performance – Idempotency easier – Consistency is easier to achieve
  • 8. NFS Architecture • VFS to handle local and remote files common interface • RPC for data transport
  • 11. 1. File Handles How does the client tell the server which file or directory the operation applies to? Similarly, how does the server return the result of a lookup? File handle or fhandle Determined by the server Includes all information needed to identify the file/object on the server, and find it quickly. Client shouldn’t modify it Stale File Handle File Handle(32 Bytes) volume ID Index no. of mounted file system inode # No. of file within file system generation # To correctly identify file
  • 12. Use of File handle
  • 13. 2. Remote Procedure Call (RPC) • Initially implementations of RPC was used with the UDP protocol • Today both UDP and TCP are used
  • 14. 3. External Data Representation (XDR)
  • 15. 4. Portmapper Portmapper 2.Request for RPC Service 1.Register Service <Service, Version, Transport> Client 4.Contact Service on Port Directly RPC server
  • 16. 5. NFS Daemon Processes a. b. c. d. e. nfsd daemon biod daemon rpc.mount daemon rpc.lockd daemon rpc.statd daemon
  • 17. nfsd Daemon • Handle incoming RPC requests • May have multiple nfsd daemons per site • A nfsd daemon makes kernel calls to do the real work • Allows multiple threads
  • 18. biod Daemon • Does readahead for clients - To make use of kernel file buffer cache • Only improves performance - NFS works correctly without biod daemon • Also flushes buffered writes for clients
  • 19. rpc.mount Daemon • server implements the MOUNT protocol • Provides initial file handle for a remote volume • Also checks that incoming requests are from privileged ports (in UDP/IP packet source address) • Protocols used: rpc.mountd [-d] [-f] [-h] [-v] Mount Daemon NFS Client 3 .If ‘YES’ then return rootfile_handle to client checks the list of currently exported volumes against the credentials of NFS client 3.If ‘NOT’ Found then report to client with error
  • 20. rpc.lockd Daemon • NFS server is stateless, so it does not handle file locking • rpc.lockd provides locking • server crashes and recovers : rpc.lockd reestablish locks • Use NFS Lock Manager (NLM) Protocol • Procedure used: NLM_NULL, NLM_TEST, NLM_LOCK, NLM_GRANTED NLM_UNLOCK, NLM_FREE
  • 21. rpc.statd Daemon • at client and server • Used to check status of a machine • Server’s rpc.lockd asks rpc.statd to store lock info (in file system) – And to monitor status of locking machine • If client crashes, clear its locks from server • client crashes: rpc.statd contacts client when it becomes available again • Use Network Status Monitor (NSM) Protocol • Procedure used: SM_NULL,SM_STAT,SM_MON,SM_NOTIFY
  • 24. Steps to mount directory from NFS server Server Installation
  • 25. Creating Share Folder in Home directory
  • 27. File which you want to mount in share folder
  • 28.
  • 29. Edit File with IP address
  • 31. After wards do on cmd :sudo getit /etc/fstab
  • 32. For output :mount /home/share1 At client side shared file will appear .Hear we can see video which was shared by server side in share folder.
  • 33. Conclusions • It is ubiquitous. • It is easy to setup and administer. • It provides a better solution than the alternative of not sharing files. • NFS v4 improves security. • Alternatives of NFS : – – – – Server Message Block (SMB, also known as CIFS) protocol Apple Filing Protocol (AFP) NetWare Core Protocol (NCP) OS/400 File Server file system (QFileSvr.400)
  • 34. References • http://en.wikipedia.org/wiki/Network_File_System • http://www.cs.sunysb.edu/~ezk/cse595s13/nfs/ch1+6.pdf • http://lass.cs.umass.edu/~shenoy/courses/spring07/ lectures/Lec20.pdf • http://www.tldp.org/HOWTO/pdf/NFS-HOWTO.pdf