{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

coda (1)

coda (1) - A Seminar on Exploiting the weak connectivity...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: A Seminar on Exploiting the weak connectivity for mobile file access www.powerpointpresentationon.blogspot.com Introduction • Weak connectivity : low b/w , high latency , intermittence, expensive n/w • Result : Coda is able to provide good performance even when n/w bandwidth varies over four order of magnitude • modification in communication, cache validation, reduce update propagation delays and cache miss handling Disconnected operation • Extend battery life • Reduce network charges • Radio silence to be maintained Benefits limitations • Updates are not visible to other clients. • Cache misses may impede progress. • Updates are at risk due to theft, loss or damage. • Update conflicts become more likely. • Exhaustion of cache space is a concern. Implementation in Coda Preserve the model of security and scalability Achieves high availability through: 1. Disconnected operation 2. Server replication Venus Three states: 1. Hoarding 2. Emulating 3. Reintegrating •...
View Full Document

{[ snackBarMessage ]}

Page1 / 22

coda (1) - A Seminar on Exploiting the weak connectivity...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon bookmark
Ask a homework question - tutors are online