CNIT 344: UNIX Administration - Lecture 7: Network File Sharing

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts related to UNIX file sharing, focusing on NFS and Samba, and important protocols, commands, and configurations for effective network file sharing.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

NFS

Network File System; used to share UNIX filesystems.

2
New cards

Samba

UNIX implementation of Windows networking based on Server Message Block (SMB).

3
New cards

FTP

File Transfer Protocol; uses TCP and provides user authentication in clear text.

4
New cards

TFTP

Trivial File Transfer Protocol; uses UDP and has no user authentication.

5
New cards

SCP

Secure Copy Protocol; part of SSH, provides authentication and encryption of traffic.

6
New cards

NFSv2

Released in 1989; UDP based, stateless, with a 2 GB file size limit.

7
New cards

NFSv3

Released in 1995; supports large file sizes and TCP.

8
New cards

NFSv4

Introduced in 2000; stateful protocol with better concurrency control but complex.

9
New cards

ACLs

Access Control Lists; used in NFS v4 for permissions.

10
New cards

UDP

User Datagram Protocol; a communications protocol used for time-sensitive transmissions.

11
New cards

TCP

Transmission Control Protocol; ensures reliable communication over a network.

12
New cards

SMB

Server Message Block; a network protocol mainly used for providing shared access to files.

13
New cards

CIFS

Common Internet File System; an enhanced version of SMB.

14
New cards

NAT

Network Address Translation; allows multiple devices on a local network to share a single public IP address.

15
New cards

RPC

Remote Procedure Call; a protocol to request a service from a program located on another computer.

16
New cards

NIS

Network Information Service; used for mapping user IDs and group IDs in NFS.

17
New cards

smb.conf

Configuration file for Samba server settings.

18
New cards

Mount

The process of making a filesystem accessible at a certain point in the directory structure.

19
New cards

Soft Mounts

NFS configuration where an error notifies the application if an NFS error occurs.

20
New cards

Hard Mounts

Keep the application waiting until NFS is available; no error notification occurs.

21
New cards

NetBIOS

Network Basic Input/Output System; allows applications on different computers to communicate within a local area network.

22
New cards

UID/GID

User Identifier / Group Identifier; used to define user permissions on a UNIX system.

23
New cards

rpcinfo

Command that displays information on remote RPC services.

24
New cards

showmount

Command that shows remote file systems available for mounting.

25
New cards

nfsstat

Command providing statistics for NFS RPC calls.

26
New cards

smbclient

Command-line tool for accessing shared files and printers on a Samba server.

27
New cards

Automounter

Component that automatically mounts NFS filesystems when needed.

28
New cards

Filesystems

A method for storing and organizing files on a storage device.

29
New cards

Installation

The process of setting up software on a system.

30
New cards

Configuration

The arrangement of specifics that define the way software or hardware functions.

31
New cards

File Ownership

The user and group that own a file, determining its access permissions.

32
New cards

Export

A filesystem that is made available for remote access in NFS.

33
New cards

Mount Point

A directory in a filesystem where a different filesystem is attached.

34
New cards

Connection Timeout

The period after which a connection attempt is aborted if it has not succeeded.

35
New cards

Retransmissions

Attempts to resend data packets in case of failures.

36
New cards

SSH

Secure Shell; a protocol for secure remote login and other secure network services.

37
New cards

Encryption

The process of converting information into a code to prevent unauthorized access.

38
New cards

User Authentication

The process of verifying a user's identity to grant access.

39
New cards

Data Corruption

Errors in data that can occur due to various issues, particularly during transmission.

40
New cards

Performance Metrics

Statistics that indicate the efficiency and effectiveness of a network or system.

41
New cards

Virtual Filesystem (VFS)

An abstraction layer on top of a concrete filesystem that allows access to various filesystems.

42
New cards

NFS Client

A machine that accesses files on a server using the NFS protocol.

43
New cards

NFS Server

A machine that shares its filesystem over the network using the NFS protocol.

44
New cards

Machine Authorization

The process of verifying whether a particular server is allowed to access resources.

45
New cards

Name Mapping

The process by which unique identifiers (UID/GID) are associated between two systems.