Proceedings of the Fifteenth ACM Symposium on Operating Systems Principles - SOSP '95 1995
DOI: 10.1145/224056.224068
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting weak connectivity for mobile file access

Abstract: Weak corrrrecdvi~, in the form of intermittent, low-bandwidth, or expensive networks is a fact of life in mobile computing. In this paper, we describe how the Coda File System has evolved to exploit such networks.The underlying theme of this evolution has been the systematic introduction of adaptivity to eliminate hidden assumptions about strong connectivity. Many aspects of the system, including communication, cache validation, update propagation and cache miss handling have been modified.As a result, Coda is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0
1

Year Published

1996
1996
2005
2005

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 137 publications
(60 citation statements)
references
References 19 publications
0
59
0
1
Order By: Relevance
“…To generate the initial access distribution, we replayed a trace of distributed file system accesses using Mummert's DFSTrace tool [18]. This tool re-executes previously recorded file system operations such as open and mkdir, preserving the inter-arrival time of each system call.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…To generate the initial access distribution, we replayed a trace of distributed file system accesses using Mummert's DFSTrace tool [18]. This tool re-executes previously recorded file system operations such as open and mkdir, preserving the inter-arrival time of each system call.…”
Section: Methodsmentioning
confidence: 99%
“…For example, the Coda distributed file system prefetches file data from servers to improve performance and guard against disconnection [12]. Coda also writes file modifications back to the server asynchronously [18]. For both prefetching and asynchronous writes, latency is not a critical constraint since a human user is not waiting for the transfer to complete.…”
Section: Respect the Critical Pathmentioning
confidence: 99%
“…The priority aging in [20], for instance, continually depresses a job's priority until the end of every decay cycle. The aging window in [21] is the amount of time a record is eligible for reintegration. Comparing to our approaches, most of them simply keep track of time then take some actions such as update, remove or reuse the data in certain time points.…”
Section: Related Workmentioning
confidence: 99%
“…Supporting file accesses in a mobile environment in the presence of weak connectivity has been introduced in later versions of Coda through the introduction of a new 'write disconnected' state of operation (Mummert et al, 1995). Coda is focused on file accesses rather than accesses to database items.…”
Section: Related Workmentioning
confidence: 99%