Talk:Untrusted Distributed Storage: Difference between revisions

From Soma-notes
Satpal (talk | contribs)
No edit summary
Satpal (talk | contribs)
No edit summary
Line 63: Line 63:


Retro
Retro


1)Whats is the main target environment for farsite?
1)Whats is the main target environment for farsite?
Line 85: Line 84:


Ponds
Ponds


1) Farsite was designed to look like NTFS.  How do Farsite’s semantics differ from NTFS?
1) Farsite was designed to look like NTFS.  How do Farsite’s semantics differ from NTFS?

Revision as of 16:35, 3 November 2008

Group 1

Pond:
1) Why use Java?
2) How was the inner-ring chosen?
3) How big was the prototype able to scale?

Farsite:
1) What is convergence cryptography?
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?

Retro:
1) Why did this never move beyond a research project?
2) (in lessons learned) networking turned out to be the limiting factor over disk space.
Why had they assumed that networking wouldn't be an issue?
3) What planned goals did they achieve?

Group 2

OceanStore

  1. What was the purpose of introspection in terms of nomadic data?
  2. How does the less-reliable-but-faster probabalistic lookup work?
  3. What is a Bloom filter and how is it used in OceanStore?

FarSite

  1. Farsite was desgined to look like NTFS. How do Farsite's semantics differ from NTFS?
  2. How is the content lease system similar to lease systems in distributed systems we've already seen, and which is most similar?
  3. What is the scope of Farsite? Could it work as a world wide filesystem like OceanStore.

Retro

  1. How did the lease system change between planning and implementation?
  2. What was the programming model used in the implementation of Farsite?
  3. What was the biggest disadvantage to the implementation?


Group 3 - Farsite

OceanStore

1) What is convergence cryptography?

Ans. The file key is used to encrypt the hashes rather than to encrypt the file blocks directly.


2) What are the advantages/disadvantages of not locking the directory name of an open file handle?

Ans. Advantages - The results of directory rename operations are not propagated synchronously to all descendent directory groups during the rename operation, because this would unacceptably retard the rename operation, particularly for directories near the root of the namespace tree.

Disadvantages- because they used lazy propagation, other users wouldn’t see the name immediately, also more then one user can change the name at the same time.


3) What assumptions did they make about concurrency in the system and how did they plan to handle it?

Ans. The authors assume that no files are both read by many users and also frequently updated by at least one user. How did they handle it? There are four classes of leases in Farsite: content leases, name leases,mode leases, and access leases.


Retro

1)Whats is the main target environment for farsite?

Ans. The target was governments and universities environments


2) What are the 3 different type of certificates? And what are their purposes?

Ans. Namespace certificates – associated the root of a file system namespace with a set of machines that manage the root metadata.

User certificates - associates a user with his personal public key, so that the user identity can be validated for access control.

Machine certificates - associates a machine with its own public key, which is used for establishing the validity of the machine as a physically unique resource


3) What is convergence encryption?

Ans. The file key is used to encrypt the hashes rather than to encrypt the file blocks directly.


Ponds

1) Farsite was designed to look like NTFS. How do Farsite’s semantics differ from NTFS?

2) How is the content lease system similar to lease systems in distributed systems we’ve already seen and which is most similar.

3) What is the scope of Farsite? Could it work as a World Wide file system like OceanStore.

Ans. Farsites main scope was that of a univertisy, governement or large company. Analysis points to a scale of approximately 10^5 machines whereas OceanStore is around 10^10