coda (1)

coda (1) - A Seminar on Exploiting the weak connectivity...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: A Seminar on Exploiting the weak connectivity for mobile file access www.powerpointpresentationon.blogspot.com Introduction Weak connectivity : low b/w , high latency , intermittence, expensive n/w Result : Coda is able to provide good performance even when n/w bandwidth varies over four order of magnitude modification in communication, cache validation, reduce update propagation delays and cache miss handling Disconnected operation Extend battery life Reduce network charges Radio silence to be maintained Benefits limitations Updates are not visible to other clients. Cache misses may impede progress. Updates are at risk due to theft, loss or damage. Update conflicts become more likely. Exhaustion of cache space is a concern. Implementation in Coda Preserve the model of security and scalability Achieves high availability through: 1. Disconnected operation 2. Server replication Venus Three states: 1. Hoarding 2. Emulating 3. Reintegrating...
View Full Document

This note was uploaded on 01/05/2012 for the course ECEN 212 taught by Professor Hamilton during the Fall '11 term at BYU.

Page1 / 22

coda (1) - A Seminar on Exploiting the weak connectivity...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online