Files can be shared across the network via variety of methods –
- Using FTP i.e., file transfer protocol is used to transfer file from one computer to other.
- Using distributed file system (DFS) in which remote directories are visible from local machine.
- Using Remote File System (RFS) in which the arrival of networks has allowed communication between remote computer. These networks allows various hardware and software resources to be shared throughout the world.
Remote file sharing (RFS) is a type of distributed file system technology. It was developed in 1980 by AT&T. Later, it was delivered with UNIX System version V (five) release 3 (SVR3). It enables file and/or data access to multiple remote users over the Internet or a network connection. It is also known as a general process of providing remote user access to locally stored files and/or data.
It was relied on the STREAMS Transport Provider Interface feature of the operating system.
To implement remote file system we use client-server model. It was one of the basic application of Remote File System.
Client-Server Model in RFS :
RFS allows a computer to support one or more file systems from one or more remote machines. In this case, the machine containing the files is server and the machine wanting access to the files is the client. The server specifies which file can be accessed by a particular client(s). Files are usually specified on a partition level.
A server can serve multiple clients, and a client can access multiple servers, depending on the implementation details of a given client-server facility. Once it is mounted, file operation requests are sent on the behalf of the user to the server, via network.
For example, a user sends a file open request to the server along with its ID. The server then check file access to determine if the user has rights to access the file requested mode. This request is either allowed or denied. If it is allowed, a file is returned to the client application, and the application then may perform read, write and other operations on file.
After the required operation is performed, the client closes the files.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Difference between site to site VPN and remote access VPN
- Advantages and disadvantages of Remote Communication Technology
- Introduction To RAT - Remote Administration Tool
- Remote Direct Memory Access (RDMA)
- Introduction to Remote Login
- InterPlanetary File System
- What is DFS(Distributed File System)?
- Difference between File Transfer Protocol (FTP) and Secure File Transfer Protocol (SFTP)
- Risk Management for Information Security | Set-1
- Risk Management for Information Security | Set-2
- Simple Network Management Protocol (SNMP)
- Easy Key Management in Cryptography
- Session Management in HTTP
- Areas of Network Management
- What is IGMP(Internet Group Management Protocol)?
- What is Thales Cloud Key Management Solutions ?
- Hybrid Fiber Coaxial (HFC) Access Network Management
- Domain Name System (DNS) in Application Layer
- Hash Functions in System Security
- Administrative Distance (AD) and Autonomous System (AS)
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.