Talk:Untrusted Distributed Storage
Group 1
Pond:
1) Why use Java?
2) How was the inner-ring chosen?
3) How big was the prototype able to scale?
Farsite:
1) What is convergence cryptography?
2) What are the advantages/disadvantages of not locking the directory name of an open file handle?
3) What assumptions did they make about concurrency in the system and how did they plan to handle it?
Retro:
1) Why did this never move beyond a research project?
2) (in lessons learned) networking turned out to be the limiting factor over disk space.
Why had they assumed that networking wouldn't be an issue?
3) What planned goals did they achieve?
Group 2
OceanStore
- What was the purpose of introspection in terms of nomadic data?
- How does the less-reliable-but-faster
- What is a Bloom filter and how is it used in OceanStore?
FarSite
- Farsite was desgined to look like NTFS. How do Farsite's semantics differ from NTFS?
- How is the content lease system similar to lease systems in distributed systems we've already soon, and which is most similar?
- What is the scope of Farsite? Could it work as a world wide filesystem like OceanStore.
Retro
- How did the lease system change between planning and implementation?
- What was the programming model used in the implementation of Farsite?
- What was the biggest disadvantage to the implementation?