快好知 kuaihz


NFS造句
31 The number field sieve ( NFS ) is the asymptotically fastest factoring method known. 32 With this new availability option, the messages and data for a multi-instance queue manager are held on networked storage accessed via a network file system (NFS) protocol, such as NFS V4. 33 In this case, you can see that the Network File System (NFS) protocol is in the first file but not the second, while both the mysql and vnc ports have been open during the latter scan. 34 Network file system: Learn more about NFS and its long history. 35 Most systems even let you use swap files on NFS mounted filesystems, which can be used when you have no local disk space available. 36 The server address is the IP address (or FQDN) of the server (in this case, it is 9.182.192.250 or fsaix010) exporting the NFS share. 37 You do this by using the setfsoptions subcommand to tune NFS Version 4. 38 In addition, this new version of the NFS protocol supports byte range file locking, whereas previous versions used the lockd protocol provided by the Network Lock Manager. 39 Thus, the NFS server would access the file as user1:group1; however, on the NFS client, the file ownership information will be visible as user2:group2. 40 rpc.rquotad daemon is one of the components of the NFS server that provides quota information of the local file system, which is exported to the remote user. 41 To applications running on an NFS client, the shared file system appears as if it's local, native storage. 42 Unfortunately, if you don't pay attention to NFS tuning, you might have a poorly performing Network File System. 43 The network file system (NFS) is a way to share disk volumes across the network. 44 This is why you should share user data through NIS, because the user ID, group ID, and other information applies to NFS shared files. 45 Two of the most popular protocols, which are fully supported in Linux, are Network File System (NFS) and Server Message Block/Common Internet File System (SMB/CIFS). 46 The NFS lock manager on the file server holds the locks that are granted to server H on its behalf. 47 The solution is using a shared file system (for example, NFS) or a shared database. 48 The management node also runs the TORQUE server and scheduler daemons, as well as several services required to manage the compute nodes with xCAT, including DNS, DHCP, TFTP, and NFS. 49 Past NFS versions did not have this ability and therefore could not negotiate for the quality of protection, data integrity, the requirement for authentication, or the type of encryption. 50 If you use O_EXCL yourself, your program will be insecure if the shared directory is implemented using these old NFS versions. 51 The current implementation of NFS Version 4 makes use of Kerberos (RFC 4120) as its underlying security mechanism to achieve authentication, privacy, integrity, and non-repudiation. 52 Next, let's look at some of the design decisions when implementing a generic NFS mounter. 53 NFS follows the client-server model of computing (see Figure 2). 54 Then we mount the NFS shared path "/ibm/gpfs0/remote_storage" on this directory. 55 CFS operates at the user level, communicating with the kernel through Network File System (NFS). 56 You might want to copy the public keys to a central location on a Network File System (NFS) share to enable people to add them to the known host keys list. 57 NFS was the first modern network file system (built over the IP protocol). 58 Next, use NFS to set up a shared directory that you'll use to distribute the necessary files to the other computers in the network. 59 Most NFS clients have little need for working segment pages. 60 Here, the layout enumerates the servers that hold the pieces of the file, the size of the stripe on each server, and the NFS file handle of each segment.