Accession Number : ADA322734
Title : Exploiting Weak Connectivity in a Distributed File System.
Descriptive Note : Doctoral thesis,
Corporate Author : CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE
Personal Author(s) : Mummert, Lily B.
PDF Url : ADA322734
Report Date : DEC 1996
Pagination or Media Count : 246
Abstract : Weak connectivity, in the form of intermittent, low-bandwidth, or expensive networks is a fact of life in mobile computing. For the foreseeable future, access to cheap, high-performance, reliable networks, or strong connectivity will be limited to a few oases, such as work or home, in a vast desert of weak connectivity. The design of distributed file systems has traditionally been based on an assumption of strong connectivity. Yet, to provide ubiquitous data access, it is vital that distributed file systems make effective use of weak connectivity. This dissertation describes the design, implementation, and evaluation of weakly connected operation in the Coda File System. The starting point of this work is disconnected operation, in which a file system client operates using data in its cache during server or network failures. Disconnected clients suffer from many limitations: updates are not visible to other clients, cache misses may impede progress, updates are at risk from client loss or damage, and the danger of update conflicts increases as disconnections are prolonged. Weak connectivity provides an opportunity to alleviate these limitations. Coda's strategy for weakly connected operation is best characterized as application-transparent adaptation. The system bears full responsibility for coping with the demands of weak connectivity. This approach preserves upward compatibility by allowing applications to run unchanged. Coda provides several mechanisms for weakly connected operation motivated by actual experience. The foundation of adaptivity in this system is the communications layer, which derives and supplies information on network conditions to higher system layers. The rapid cache validation mechanism enables the system to recover quickly in intermittent environments.
Descriptors : *DISTRIBUTED DATA PROCESSING, *COMPUTER COMMUNICATIONS, *COMPUTER FILES, DATA BASES, ALGORITHMS, OPTIMIZATION, DATA MANAGEMENT, INFORMATION TRANSFER, DATA PROCESSING SECURITY, THESES, CONCURRENT ENGINEERING, OPERATING SYSTEMS(COMPUTERS), SYSTEMS ANALYSIS, COMPUTER NETWORKS, READ ONLY MEMORIES, STRUCTURED PROGRAMMING.
Subject Categories : Computer Systems
Distribution Statement : APPROVED FOR PUBLIC RELEASE