Download
review session for fourth quiz n.
Skip this Video
Loading SlideShow in 5 Seconds..
Review Session for Fourth Quiz PowerPoint Presentation
Download Presentation
Review Session for Fourth Quiz

Review Session for Fourth Quiz

125 Views Download Presentation
Download Presentation

Review Session for Fourth Quiz

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Review Session forFourth Quiz Jehan-François Pâris Summer 2011

  2. Blue File System

  3. Blue File System According to the designers of the Blue System what are the two limitations of flash drives?

  4. Blue File System They can be lost. It is hard to keep them synchronized

  5. Blue File System The Blue File System is said to have a dynamic storage hierarchy. What does it mean?

  6. Blue File System The ranking of the storage devices in the storage hierarchy depends on their states. A disk that is powered down will have a lower priority in the hierarchy than the remote server A disk that is powered up will have a higher priority than the same server

  7. Blue File System How does the Blue file system operate its device write queues?

  8. Blue File System It empties them when it flushes them to disk. Much more could be said.

  9. Blue File System Explain how the Blue file system saves energy by aggregating writes to local disks.

  10. Blue File System Aggregating writes to local disks saves energy by amortizing disk power state transitions across multiple writes.

  11. Blue File System True or false:Most of the Blue FS functionality is handled by a user-level server.

  12. Blue File System True

  13. Pergamum

  14. Pergamum • What equipment failures can be corrected by intratome redundancy?

  15. Pergamum • Irrecoverable read errors

  16. Pergamum • What would be the main drawback of a Pergamum system having • Plenty of intratome redundancy but • No intertome redundancy?

  17. Pergamum • It would not tolerate full disk failures

  18. Pergamum • How do intradisk parity blocks contribute to reduce the power consumption of the system?

  19. Pergamum • They allow the local recovery of bad blocks without having to power up other tomes

  20. Pergamum • What are the two main functions of Pergamum digital signatures? • Where are they stored? • Why?

  21. Pergamum • Their two main functions are • To verify the integrity of the tome’s contents • By exchanging them with other Pergamum tomes, to verify the integrity of distributed data.

  22. Pergamum • Where are they stored? • Why?

  23. Pergamum • They are stored in a small flash drive so they can be consulted without powering the tome’s hard drive.

  24. Pergamum • What is disk scrubbing?

  25. Pergamum • Disk scrubbing periodically verifies that a given range of disk blocks can be retrieved and reconstitutes the contents of the blocks that it could no access due to an irrecoverable read error.

  26. Pergamum • Which feature of Pergamum reduces the need for frequent full-disk scrubs?

  27. Pergamum • Pergamum intratome parity reduces the need for frequent disk scrubs as it provides an additional way to reconstitute the contents of the blocks that caused irrecoverable read errors.

  28. Pergamum • How does Pergamum reconstitute data contained on a tome that failed?

  29. Pergamum • Pergamum replaces the failed tome by a new tome • One after the other, each tome in the same parity stripe as the failed tome sends its contents to the new tome

  30. Pergamum • Why?

  31. Pergamum • To avoid powering up too many tomes at the same time

  32. Pergamum How does the system’s workload—and intended use(s)-- affect the tradeoffs to consider when deciding the right amount of intra-disk and inter-disk redundancy in a storage system?

  33. Pergamum Intra-disk redundancy saves energy in archival file systems because it allows local reconstruction of irrecoverable read errors We might prefer using more inter-disk redundancy in conventional file systems as inter-disk redundancy protects data against both irrecoverable read errorsand disk failures.

  34. FARSITE

  35. FARSITE • How does FARSITE store users’ secret keys? • Why?

  36. FARSITE • FARSITE encrypts the secret keys of its users with a symmetric key derived from user password and stores them in a globally-readable directory. • It does it because these keys are typically too long to be memorized by the user.

  37. FARSITE • What characterizes a Byzantine failure?

  38. FARSITE • The failed node keeps communicating with the other nodes • We have no easy way to detect such a failed node

  39. FARSITE • How does Farsite guarantee the availability and the integrity its directory data?

  40. FARSITE • Farsite replicates directory and manage them through a Byzantine fault-tolerant protocol that ensures their integrity (as long as less than one third of the machines misbehave in any manner).

  41. FARSITE • In addition to using a Byzantine agreement protocol in its directory host, which steps does Farsite take to protect user files against malicious behaviors by its file hosts?

  42. FARSITE • File blocks are encrypted so that file hosts cannot access their contents. • File blocks are also replicated on different hosts so that a single file host cannot maliciously destroy a file. • Farsite ensures that all copies of a given file block will be spread over machines controlled by different owners.

  43. FARSITE • You are to design a FARSITE file system that can tolerate two Byzantine failures. • What is the minimum number of members in each directory host?

  44. FARSITE • Each directory host should have at least seven members

  45. FARSITE • What is the minimum number of copies each data block should have?

  46. FARSITE • Each data block should have at least threecopies

  47. FARSITE • What is a Sybil attack? • How does Farsite protects itself against them?

  48. FARSITE • A Sybill attack is an attack where one or more rogue nodes assume multiple identities. • To prevent that, Farsite requires each node entered the system to have a verifiable unique ID issued by a trusted authority

  49. FARSITE • Which actions does FARSITE take when the owner of a file grants or revokes access to a given file?

  50. FARSITE • When the owner of a file grants access to the file to another user, FARSITE encrypts a copy of the file key with the public key of the new user. When that access is revoked, FARSITE deletes that copy.