Network File System Protocol. By Authentication Experts. Introduction. Provides transparent remote access to shared file across the network Portable across different architecture and operating system. Introduction. Aim: to provide the following logical view. Introduction.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
By Authentication Experts
A file descriptor holding, among other things, file access permissions, physical block addresses holding data, etc.
NFS is built from 4 distinct protocols:
- File creation, searching, reading, writing
Authentication and statistics
- Mounting of “exported” systems for access via nfs
- Network Status Monitor
- Monitors a client or server machine’s status
- Network Lock Manager
- Avoid simultaneous data modification by multiple clients
-A data structure allow unique identification of a file system object
-Contains the file inode and an entry representing the device where the file resides
- At first, client obtains a file handle for root of the file system
- File handle is opaque to the client
- Client sends file handle to server when referencing a file/directory
- No need to use the full path names
- Server does not need to maintain protocol state about it’s client
- Server does not keep previous request information
- Client keeps track of all information required to send requests to the server
- If server crashes, no state information lost
- Client needs only retransmit a request until the server responds