Xem 1-20 trên 136 kết quả Network file system
  • GlusterFS is a Cluster File System that aggregates multiple storage bricks over InfiniBand RDMA into one large parallel network file system. GlusterFS is MORE than making data available over a network or the organization of data on disk storage…. GlusterFS allows scaling of capacity and I/O using industry standard inexpensive modules!

    pdf28p hanguyen 07-07-2009 220 73   Download

  • Tham khảo tài liệu 'advanced linux programming: 7-the /proc file system', công nghệ thông tin, hệ điều hành phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf20p kaka 29-07-2010 76 12   Download

  • Tham khảo tài liệu 'bài thực hành số 3: đối tượng file system object', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    doc0p ngoisaotrongdem 08-12-2009 49 11   Download

  • In this chapter you will learn: To explore the principles upon which Windows 7 is designed and the specific components involved in the system, to understand how Windows 7 can run programs designed for other operating systems, to provide a detailed explanation of the Windows 7 file system, to illustrate the networking protocols supported in Windows 7, to cover the interface available to system and application programmers.

    pdf63p youcanletgo_05 23-01-2016 6 2   Download

  • Chapter summary: The Windows NT, Windows 2000, and UNIX operating systems include both server and client functionality; Novell NetWare is strictly a client/server network operating system; Windows NT and Windows 2000 were designed to provide application services and file and print services; a client is a software component that enables a computer to access server resources;...

    pdf9p tangtuy08 21-04-2016 3 1   Download

  • Chapter 4 - Networking software. Chapter summary: The Windows NT, Windows 2000, and UNIX operating systems include both server and client functionality; Novell NetWare is strictly a client/server network operating system; Windows NT and Windows 2000 were designed to provide application services and file and print services; a client is a software component that enables a computer to access server resources;...and other contents.

    ppt39p tangtuy08 21-04-2016 3 1   Download

  • Module 11: Configuring and managing distributed file system. This module introduces the Distributed File System (DFS) solution that can be used to address these challenges by providing fault-tolerant access and WANfriendly replication of files located throughout the enterprise. The main contents in module includes: DFS overview, configuring DFS namespaces, configuring DFS replication.

    pdf51p tangtuy20 28-07-2016 5 1   Download

  • This book is intended primarily for Linux system administrators who are familiar with the following activities: • Linux system administration procedures, including kernel configuration • Installation and configuration of shared storage networks, such as Fibre Channel SANs

    pdf54p hanguyen 27-06-2009 208 78   Download

  • This module provides students with the knowledge and skills to share file resources in a network by installing, configuring, and managing the Distributed file system (Dfs). In the hands -on lab in this module, students will have a chance to use Dfs to share network resources.

    pdf36p vuthuong 10-08-2009 102 35   Download

  • This course provides you with the knowledge and skills needed to configure and administer a complex network. The course is designed to provide you with an advanced skill set and abilities to handle more challenging network situations than were presented in the NetWare 5TM Administration course. The NetWare® 5 Advanced Administration course is intended for network administrators who have completed the NetWare 5 Administration course and Networking Technologies course.

    pdf1128p mylinh 12-08-2009 162 31   Download

  • Configuring and Testing Your Network. Learning Objectives Upon completion of this chapter, you will be able to: Define the role of the InternetworkOperating System (IOS). Define the purpose of a configuration file. Identify several classes of devices that have the IOS embedded. Identify the factors contributing to the set of IOS commands available to a device. Identify the IOS modes of operation. Identify the basic IOS commands. Compare and contrast the basic show commands.

    pdf65p thanhtung_hk 03-11-2010 89 27   Download

  • Network Security. Objectives: In this chapter, you will learn to: Identify security threats to enterprise networks. Describe methods to mitigate security threats to enterprise networks. Configure basic router security. Disable unused router services and interfaces. Use the Cisco SDM one-step lockdown feature. Manage files and software images with the Cisco IOS Integrated File System (IFS).

    pdf61p thanhtung_hk 05-11-2010 197 25   Download

  • History Design Principles Kernel Modules Process Management Scheduling Memory Management File Systems Input and Output Interprocess Communication Network Structure Security History Linux is a modem, free operating system based on UNIX standards. First developed as a small but self-contained kernel in 1991 by Linus Torvalds, with the major design goal of UNIX compatibility. Its history has been one of collaboration by many users from all around the world, corresponding almost exclusively over the Internet.

    pdf10p kanguru_91 28-09-2010 85 21   Download

  • Linux History Design Principles Kernel Modules Process Management Scheduling Memory Management File Systems Input and Output Interprocess Communication Network Structure Security To explore the history of the UNIX operating system from which Linux is derived and the principles which Linux is designed upon To examine the Linux process model and illustrate how Linux schedules processes and provides interprocess communication To look at memory management in Linux To explore how Linux implements file systems and manages I/O devices...

    pdf62p perpan 02-09-2012 31 13   Download

  • When providing access to file resources on a computer running Microsoft® Windows® 2000 Server, you control who has access to resources and the nature of the access that they have. To control access to files and folders, you assign NTFS file system permissions to user accounts and groups. NTFS is a file system designed for use with Windows 2000 and Windows NT operating systems. It supports file system recovery, very large storage media, long file names, and other features.

    pdf64p vuthuong 10-08-2009 70 12   Download

  • Netware-Based Networking Identify the advantages of using the NetWare network operating system Describe NetWare’s server hardware requirements Understand NetWare’s file system and directory structure Plan for and perform a simple NetWare server installation Explain how NetWare supports multiple clients and integrates with other network operating systems

    ppt42p itvovantien 13-07-2012 32 9   Download

  • History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface To explore the principles upon which Windows XP is designed and the specific components involved in the system To understand how Windows XP can run programs designed for other operating systems To provide a detailed explanation of the Windows XP file system To illustrate the networking protocols supported in Windows XP To cover the interface available to system and application programmers .

    pdf64p perpan 02-09-2012 39 6   Download

  • Hệ thống hỗ trợ các hoạt động đa người dùng. Nhiều người dùng có thể truy cập vào hệ thống. Tất cả các daemon hệ thống đang chạy trừ Network File System (NFS) máy chủ và một số mạng máy chủ daemon tài nguyên liên quan khác. Hệ thống hỗ trợ các hoạt động đa người dùng và đã chia sẻ tài nguyên máy chủ mạng NFS

    pdf73p kimku5 24-10-2011 30 3   Download

  • Tất cả các daemon hệ thống đang chạy trừ Network File System (NFS) máy chủ và một số mạng máy chủ daemon tài nguyên liên quan khác. Hệ thống hỗ trợ các hoạt động đa người dùng và đã chia sẻ tài nguyên máy chủ mạng NFS và nguồn tài nguyên khác có sẵn. Mức này là không thực hiện. Một

    pdf73p taoxanh10 02-11-2011 26 3   Download

  • Taking the network scenario of Figure 1, there will be web interfaces (routers and serv- ers), BACnet/IP controllers (connected to interesting devices that are network accessible), and operator workstations that may have vulnerable OS as well as configuration files and other interesting data and resources. The following table is adapted from a Drexel report on network security [Eisenstein et al., 2003a] and lists known IT threats to a BACnet network connected to the public Internet.

    pdf8p khongmuonnghe 04-01-2013 24 3   Download

Đồng bộ tài khoản