<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Satpal</id>
	<title>Soma-notes - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://homeostasis.scs.carleton.ca/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Satpal"/>
	<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php/Special:Contributions/Satpal"/>
	<updated>2026-05-18T17:42:52Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.1</generator>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Talk:Untrusted_Distributed_Storage&amp;diff=1967</id>
		<title>Talk:Untrusted Distributed Storage</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Talk:Untrusted_Distributed_Storage&amp;diff=1967"/>
		<updated>2008-11-03T16:35:09Z</updated>

		<summary type="html">&lt;p&gt;Satpal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Group 1==&lt;br /&gt;
Pond:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Why use Java?&amp;lt;br&amp;gt;&lt;br /&gt;
2) How was the inner-ring chosen?&amp;lt;br&amp;gt;&lt;br /&gt;
3) How big was the prototype able to scale?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Farsite:&amp;lt;br&amp;gt;&lt;br /&gt;
1) What is convergence cryptography?&amp;lt;br&amp;gt;&lt;br /&gt;
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?&amp;lt;br&amp;gt;&lt;br /&gt;
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Retro:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Why did this never move beyond a research project?&amp;lt;br&amp;gt;&lt;br /&gt;
2) (in lessons learned) networking turned out to be the limiting factor over disk space.&amp;lt;br&amp;gt;&lt;br /&gt;
	Why had they assumed that networking wouldn&#039;t be an issue?&amp;lt;br&amp;gt;&lt;br /&gt;
3) What planned goals did they achieve?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Group 2==&lt;br /&gt;
OceanStore&lt;br /&gt;
&lt;br /&gt;
#	What was the purpose of introspection in terms of nomadic data?&lt;br /&gt;
#	How does the less-reliable-but-faster probabalistic lookup work?&lt;br /&gt;
#	What is a Bloom filter and how is it used in OceanStore?&lt;br /&gt;
&lt;br /&gt;
FarSite&lt;br /&gt;
&lt;br /&gt;
#	Farsite was desgined to look like NTFS. How do Farsite&#039;s semantics differ from NTFS?&lt;br /&gt;
#	How is the content lease system similar to lease systems in distributed systems we&#039;ve already seen, and which is most similar?&lt;br /&gt;
#	What is the scope of Farsite? Could it work as a world wide filesystem like OceanStore.&lt;br /&gt;
&lt;br /&gt;
Retro&lt;br /&gt;
&lt;br /&gt;
#	How did the lease system change between planning and implementation?&lt;br /&gt;
#	What was the programming model used in the implementation of Farsite?&lt;br /&gt;
#	What was the biggest disadvantage to the implementation?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Group 3 - Farsite==&lt;br /&gt;
&lt;br /&gt;
OceanStore&lt;br /&gt;
&lt;br /&gt;
1) What is convergence cryptography?&lt;br /&gt;
&lt;br /&gt;
Ans. The  file key is used to encrypt the hashes rather than to encrypt the file blocks  directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?&lt;br /&gt;
&lt;br /&gt;
Ans. Advantages - The  results  of  directory  rename  operations  are  not propagated  synchronously&lt;br /&gt;
to  all  descendent  directory groups during the rename operation, because this would unacceptably&lt;br /&gt;
retard  the  rename  operation,  particularly for  directories  near  the  root  of  the  namespace  tree. &lt;br /&gt;
&lt;br /&gt;
Disadvantages- because they used lazy propagation, other users wouldn’t see the name immediately, also&lt;br /&gt;
more then one user can change the name at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?&lt;br /&gt;
&lt;br /&gt;
Ans. The authors assume that no files are both read by many users and also frequently updated by at least one user. &lt;br /&gt;
How did they handle it? There are four classes of leases in Farsite: content leases, name leases,mode leases, and &lt;br /&gt;
access leases.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Retro&lt;br /&gt;
&lt;br /&gt;
1)Whats is the main target environment for farsite?&lt;br /&gt;
&lt;br /&gt;
Ans. The target was governments and universities environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) What are the 3 different type of certificates?  And what are their purposes?&lt;br /&gt;
&lt;br /&gt;
Ans. Namespace certificates – associated the root of a file system namespace with a set of machines  that manage the  root metadata.&lt;br /&gt;
&lt;br /&gt;
User certificates - associates  a  user with  his  personal  public  key,  so  that  the  user  identity can  be  validated  for  access  control.&lt;br /&gt;
&lt;br /&gt;
Machine certificates - associates  a  machine  with  its  own  public key,  which  is  used  for  establishing  the  validity  of  the machine as a physically unique resource&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) What is convergence encryption?&lt;br /&gt;
&lt;br /&gt;
Ans. The  file key  is used to encrypt the hashes rather than to encrypt the file blocks  directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ponds&lt;br /&gt;
&lt;br /&gt;
1) Farsite was designed to look like NTFS.  How do Farsite’s semantics differ from NTFS?&lt;br /&gt;
&lt;br /&gt;
2) How is the content lease system similar to lease systems in distributed systems we’ve already seen and which is most similar.&lt;br /&gt;
&lt;br /&gt;
3) What is the scope of Farsite? Could it work as a World Wide file system like OceanStore.&lt;br /&gt;
&lt;br /&gt;
Ans. Farsites main scope was that of a univertisy, governement or large company.  Analysis points to a scale of approximately 10^5 machines whereas OceanStore is around 10^10&lt;/div&gt;</summary>
		<author><name>Satpal</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Talk:Untrusted_Distributed_Storage&amp;diff=1966</id>
		<title>Talk:Untrusted Distributed Storage</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Talk:Untrusted_Distributed_Storage&amp;diff=1966"/>
		<updated>2008-11-03T16:34:35Z</updated>

		<summary type="html">&lt;p&gt;Satpal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Group 1==&lt;br /&gt;
Pond:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Why use Java?&amp;lt;br&amp;gt;&lt;br /&gt;
2) How was the inner-ring chosen?&amp;lt;br&amp;gt;&lt;br /&gt;
3) How big was the prototype able to scale?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Farsite:&amp;lt;br&amp;gt;&lt;br /&gt;
1) What is convergence cryptography?&amp;lt;br&amp;gt;&lt;br /&gt;
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?&amp;lt;br&amp;gt;&lt;br /&gt;
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Retro:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Why did this never move beyond a research project?&amp;lt;br&amp;gt;&lt;br /&gt;
2) (in lessons learned) networking turned out to be the limiting factor over disk space.&amp;lt;br&amp;gt;&lt;br /&gt;
	Why had they assumed that networking wouldn&#039;t be an issue?&amp;lt;br&amp;gt;&lt;br /&gt;
3) What planned goals did they achieve?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Group 2==&lt;br /&gt;
OceanStore&lt;br /&gt;
&lt;br /&gt;
#	What was the purpose of introspection in terms of nomadic data?&lt;br /&gt;
#	How does the less-reliable-but-faster probabalistic lookup work?&lt;br /&gt;
#	What is a Bloom filter and how is it used in OceanStore?&lt;br /&gt;
&lt;br /&gt;
FarSite&lt;br /&gt;
&lt;br /&gt;
#	Farsite was desgined to look like NTFS. How do Farsite&#039;s semantics differ from NTFS?&lt;br /&gt;
#	How is the content lease system similar to lease systems in distributed systems we&#039;ve already seen, and which is most similar?&lt;br /&gt;
#	What is the scope of Farsite? Could it work as a world wide filesystem like OceanStore.&lt;br /&gt;
&lt;br /&gt;
Retro&lt;br /&gt;
&lt;br /&gt;
#	How did the lease system change between planning and implementation?&lt;br /&gt;
#	What was the programming model used in the implementation of Farsite?&lt;br /&gt;
#	What was the biggest disadvantage to the implementation?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Group 3 - Farsite==&lt;br /&gt;
&lt;br /&gt;
OceanStore&lt;br /&gt;
&lt;br /&gt;
1) What is convergence cryptography?&lt;br /&gt;
&lt;br /&gt;
Ans. The  file key is used to encrypt the hashes rather than to encrypt the file blocks  directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?&lt;br /&gt;
&lt;br /&gt;
Ans. Advantages - The  results  of  directory  rename  operations  are  not propagated  synchronously&lt;br /&gt;
to  all  descendent  directory groups during the rename operation, because this would unacceptably&lt;br /&gt;
retard  the  rename  operation,  particularly for  directories  near  the  root  of  the  namespace  tree. &lt;br /&gt;
&lt;br /&gt;
Disadvantages- because they used lazy propagation, other users wouldn’t see the name immediately, also&lt;br /&gt;
more then one user can change the name at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?&lt;br /&gt;
&lt;br /&gt;
Ans. The authors assume that no files are both read by many users and also frequently updated by at least one user. &lt;br /&gt;
How did they handle it? There are four classes of leases in Farsite: content leases, name leases,mode leases, and &lt;br /&gt;
access leases.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Retro&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1)Whats is the main target environment for farsite?&lt;br /&gt;
&lt;br /&gt;
Ans. The target was governments and universities environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) What are the 3 different type of certificates?  And what are their purposes?&lt;br /&gt;
&lt;br /&gt;
Ans. Namespace certificates – associated the root of a file system namespace with a set of machines  that manage the  root metadata.&lt;br /&gt;
&lt;br /&gt;
User certificates - associates  a  user with  his  personal  public  key,  so  that  the  user  identity can  be  validated  for  access  control.&lt;br /&gt;
&lt;br /&gt;
Machine certificates - associates  a  machine  with  its  own  public key,  which  is  used  for  establishing  the  validity  of  the machine as a physically unique resource&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) What is convergence encryption?&lt;br /&gt;
&lt;br /&gt;
Ans. The  file key  is used to encrypt the hashes rather than to encrypt the file blocks  directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ponds&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Farsite was designed to look like NTFS.  How do Farsite’s semantics differ from NTFS?&lt;br /&gt;
&lt;br /&gt;
2) How is the content lease system similar to lease systems in distributed systems we’ve already seen and which is most similar.&lt;br /&gt;
&lt;br /&gt;
3) What is the scope of Farsite? Could it work as a World Wide file system like OceanStore.&lt;br /&gt;
&lt;br /&gt;
Ans. Farsites main scope was that of a univertisy, governement or large company.  Analysis points to a scale of approximately 10^5 machines whereas OceanStore is around 10^10&lt;/div&gt;</summary>
		<author><name>Satpal</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Talk:Untrusted_Distributed_Storage&amp;diff=1965</id>
		<title>Talk:Untrusted Distributed Storage</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Talk:Untrusted_Distributed_Storage&amp;diff=1965"/>
		<updated>2008-11-03T16:32:07Z</updated>

		<summary type="html">&lt;p&gt;Satpal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Group 1==&lt;br /&gt;
Pond:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Why use Java?&amp;lt;br&amp;gt;&lt;br /&gt;
2) How was the inner-ring chosen?&amp;lt;br&amp;gt;&lt;br /&gt;
3) How big was the prototype able to scale?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Farsite:&amp;lt;br&amp;gt;&lt;br /&gt;
1) What is convergence cryptography?&amp;lt;br&amp;gt;&lt;br /&gt;
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?&amp;lt;br&amp;gt;&lt;br /&gt;
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Retro:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Why did this never move beyond a research project?&amp;lt;br&amp;gt;&lt;br /&gt;
2) (in lessons learned) networking turned out to be the limiting factor over disk space.&amp;lt;br&amp;gt;&lt;br /&gt;
	Why had they assumed that networking wouldn&#039;t be an issue?&amp;lt;br&amp;gt;&lt;br /&gt;
3) What planned goals did they achieve?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Group 2==&lt;br /&gt;
OceanStore&lt;br /&gt;
&lt;br /&gt;
#	What was the purpose of introspection in terms of nomadic data?&lt;br /&gt;
#	How does the less-reliable-but-faster probabalistic lookup work?&lt;br /&gt;
#	What is a Bloom filter and how is it used in OceanStore?&lt;br /&gt;
&lt;br /&gt;
FarSite&lt;br /&gt;
&lt;br /&gt;
#	Farsite was desgined to look like NTFS. How do Farsite&#039;s semantics differ from NTFS?&lt;br /&gt;
#	How is the content lease system similar to lease systems in distributed systems we&#039;ve already seen, and which is most similar?&lt;br /&gt;
#	What is the scope of Farsite? Could it work as a world wide filesystem like OceanStore.&lt;br /&gt;
&lt;br /&gt;
Retro&lt;br /&gt;
&lt;br /&gt;
#	How did the lease system change between planning and implementation?&lt;br /&gt;
#	What was the programming model used in the implementation of Farsite?&lt;br /&gt;
#	What was the biggest disadvantage to the implementation?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Group 3 - Farsite==&lt;br /&gt;
&lt;br /&gt;
OceanStore&lt;br /&gt;
&lt;br /&gt;
1) What is convergence cryptography?&lt;br /&gt;
&lt;br /&gt;
Ans. The  file key is used to encrypt the hashes rather than to encrypt the file blocks  directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?&lt;br /&gt;
&lt;br /&gt;
Ans. Advantages - The  results  of  directory  rename  operations  are  not propagated  synchronously&lt;br /&gt;
to  all  descendent  directory groups during the rename operation, because this would unacceptably&lt;br /&gt;
retard  the  rename  operation,  particularly for  directories  near  the  root  of  the  namespace  tree. &lt;br /&gt;
&lt;br /&gt;
Disadvantages- because they used lazy propagation, other users wouldn’t see the name immediately, also&lt;br /&gt;
more then one user can change the name at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?&lt;br /&gt;
&lt;br /&gt;
Ans. The authors assume that no files are both read by many users and also frequently updated by at least one user. &lt;br /&gt;
How did they handle it? There are four classes of leases in Farsite: content leases, name leases,mode leases, and &lt;br /&gt;
access leases.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Retro&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1)Whats is the main target environment for farsite?&lt;br /&gt;
&lt;br /&gt;
Ans. The target was governments and universities environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) What are the 3 different type of certificates?  And what are their purposes?&lt;br /&gt;
&lt;br /&gt;
Ans. Namespace certificates – associated the root of a file system namespace with a set of machines  that manage the  root metadata.&lt;br /&gt;
&lt;br /&gt;
User certificates - associates  a  user with  his  personal  public  key,  so  that  the  user  identity can  be  validated  for  access  control.&lt;br /&gt;
&lt;br /&gt;
Machine certificates - associates  a  machine  with  its  own  public key,  which  is  used  for  establishing  the  validity  of  the machine as a physically unique resource&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) What is convergence encryption?&lt;br /&gt;
&lt;br /&gt;
Ans. The  file key  is used to encrypt the hashes rather than to encrypt the file blocks  directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ponds&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Farsite was designed to look like NTFS.  How do Farsite’s semantics differ from NTFS?&lt;br /&gt;
&lt;br /&gt;
2) How is the content lease system similar to lease system in distributed systems we’ve already seen and which is most similar.&lt;br /&gt;
&lt;br /&gt;
3) What is the scope of Farsite? Could it work as a World Wide file system like OceanStore.&lt;br /&gt;
&lt;br /&gt;
Ans. Farsites main scope was that of a univertisy, governement or large company.  Analysis points to a scale of approximately 10^5 machines whereas OceanStore is around 10^10&lt;/div&gt;</summary>
		<author><name>Satpal</name></author>
	</entry>
	<entry>
		<id>https://homeostasis.scs.carleton.ca/wiki/index.php?title=Talk:Untrusted_Distributed_Storage&amp;diff=1964</id>
		<title>Talk:Untrusted Distributed Storage</title>
		<link rel="alternate" type="text/html" href="https://homeostasis.scs.carleton.ca/wiki/index.php?title=Talk:Untrusted_Distributed_Storage&amp;diff=1964"/>
		<updated>2008-11-03T16:16:01Z</updated>

		<summary type="html">&lt;p&gt;Satpal: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Group 1==&lt;br /&gt;
Pond:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Why use Java?&amp;lt;br&amp;gt;&lt;br /&gt;
2) How was the inner-ring chosen?&amp;lt;br&amp;gt;&lt;br /&gt;
3) How big was the prototype able to scale?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Farsite:&amp;lt;br&amp;gt;&lt;br /&gt;
1) What is convergence cryptography?&amp;lt;br&amp;gt;&lt;br /&gt;
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?&amp;lt;br&amp;gt;&lt;br /&gt;
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Retro:&amp;lt;br&amp;gt;&lt;br /&gt;
1) Why did this never move beyond a research project?&amp;lt;br&amp;gt;&lt;br /&gt;
2) (in lessons learned) networking turned out to be the limiting factor over disk space.&amp;lt;br&amp;gt;&lt;br /&gt;
	Why had they assumed that networking wouldn&#039;t be an issue?&amp;lt;br&amp;gt;&lt;br /&gt;
3) What planned goals did they achieve?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Group 2==&lt;br /&gt;
OceanStore&lt;br /&gt;
&lt;br /&gt;
#	What was the purpose of introspection in terms of nomadic data?&lt;br /&gt;
#	How does the less-reliable-but-faster probabalistic lookup work?&lt;br /&gt;
#	What is a Bloom filter and how is it used in OceanStore?&lt;br /&gt;
&lt;br /&gt;
FarSite&lt;br /&gt;
&lt;br /&gt;
#	Farsite was desgined to look like NTFS. How do Farsite&#039;s semantics differ from NTFS?&lt;br /&gt;
#	How is the content lease system similar to lease systems in distributed systems we&#039;ve already seen, and which is most similar?&lt;br /&gt;
#	What is the scope of Farsite? Could it work as a world wide filesystem like OceanStore.&lt;br /&gt;
&lt;br /&gt;
Retro&lt;br /&gt;
&lt;br /&gt;
#	How did the lease system change between planning and implementation?&lt;br /&gt;
#	What was the programming model used in the implementation of Farsite?&lt;br /&gt;
#	What was the biggest disadvantage to the implementation?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Group 3 - Farsite==&lt;br /&gt;
&lt;br /&gt;
OceanStore&lt;br /&gt;
&lt;br /&gt;
1) What is convergence cryptography?&lt;br /&gt;
&lt;br /&gt;
Ans. The  file key is used to encrypt the hashes rather than to encrypt the file blocks  directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?&lt;br /&gt;
&lt;br /&gt;
Ans. Advantages - The  results  of  directory  rename  operations  are  not propagated  synchronously&lt;br /&gt;
to  all  descendent  directory groups during the rename operation, because this would unacceptably&lt;br /&gt;
retard  the  rename  operation,  particularly for  directories  near  the  root  of  the  namespace  tree. &lt;br /&gt;
&lt;br /&gt;
Disadvantages- because they used lazy propagation, other users wouldn’t see the name immediately, also&lt;br /&gt;
more then one user can change the name at the same time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?&lt;br /&gt;
&lt;br /&gt;
Ans. The authors assume that no files are both read by many users and also frequently updated by at least one user. &lt;br /&gt;
How did they handle it? There are four classes of leases in Farsite: content leases, name leases,mode leases, and &lt;br /&gt;
access leases.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Retro&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1)Whats is the main target environment for farsite?&lt;br /&gt;
&lt;br /&gt;
Ans. The target was governments and universities environments&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2) What are the 3 different type of certificates?  And what are their purposes?&lt;br /&gt;
&lt;br /&gt;
Ans. Namespace certificates – associated the root of a file system namespace with a set of machines  that manage the  root metadata.&lt;br /&gt;
&lt;br /&gt;
User certificates - associates  a  user with  his  personal  public  key,  so  that  the  user  identity can  be  validated  for  access  control.&lt;br /&gt;
&lt;br /&gt;
Machine certificates - associates  a  machine  with  its  own  public key,  which  is  used  for  establishing  the  validity  of  the machine as a physically unique resource&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3) What is convergence encryption?&lt;br /&gt;
&lt;br /&gt;
Ans. The  file key  is used to encrypt the hashes rather than to encrypt the file blocks  directly.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ponds&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1) Farsite was designed to look like NTFS.  How do Farsite’s semantics differ from NTFS?&lt;br /&gt;
&lt;br /&gt;
2) How is the content lease system similar to lease system in distributed systems we’ve already seen and which is most similar.&lt;br /&gt;
&lt;br /&gt;
3) What is the scope of Farsite? Could it work as a World Wide file system like OceanStore.&lt;/div&gt;</summary>
		<author><name>Satpal</name></author>
	</entry>
</feed>