Title: Naming
1Naming
2Naming
- Names are used to share resources, to uniquely
identify entities, or to refer to locations. - Name resolution is used for a process to access
the named entity. - Three issues are covered in this chapter
- Naming entities the organization and
implementation of human-friendly names - Locating mobile entities
- Removing unreferenced entities
3Naming
- A name in a distributed system is a string of
bits or characters that is used to refer to an
entity. - An entity in a distributed system can be
practically anything including resources,
processes, users, mailboxes, newsgroups, Web
pages, and so on. - To operate on an entity, we need to access it at
an access point. The name of an access point is
called an address. The address of an access point
of an entity is the address of that entity. - A locationindependent name for an entity E, is
independent from the addresses of the access
points offered by E. For example, www.yahoo.com
has service across several machines.
4Naming
- A true identifier is a name having the following
properties - Each identifier refers to at most one entity
- Each entity is referred to by at most one
identifier - An identifier always refers to the same entity
(prohibits reusing an identifier) - In many computer systems, addresses and
identifiers are represented in machine-readable
form only. - Human-friendly names are tailored to be used by
humans and generally represented as a character
string.
5Name Space
- Names in a distributed system are organized into
a name space. - A name space can be represented as a labeled,
directed graph with two types of nodes - a leaf node represents a (named) entity
- a directory node is an entity that refers to
other nodes. - A directory node contains a directory table of
(edge label, node identifier) pairs. Example
(home, n1), (keys, n5)
6Name Space
- A node which has only outgoing and no incoming
edges is called the root (node). - Each path in a naming graph can be referred to by
the sequence of labels corresponding to the edges
in the path, such as - Nltlabel-1, label-2, , label-ngt where N
refers to the first node in the path. - If the first node in a path name is the root of
the naming graph, it is called an absolute path
name. Otherwise, it is called a relative path
name.
7Name Space
- A global name is a name that denotes the same
entity no matter where that name is used in a
system. (e.g. absolute path) - A local name is a name whose interpretation
depends on where that name is being used. (e.g.
relative path) - Example of path names in file systems (Refer to
Figure 4-1) - N0lthome, steen, mboxgt ? /home/steen/mbox
- /home/steen/keys /keys (The same node
represented by different path names.) - Name space can be organized in various ways a
tree or a acyclic graph.
8Name Spaces
- A general naming graph with a single root node.
9Name Space
- We can easily store all kinds of attributes in a
node, describing aspects of the entity the node
represents - Type of the entity
- An identifier for that entity
- Address of the entity's location
- Nicknames
- Directory nodes can also have attributes, besides
just storing a directory table with (edge label,
node identifier) pairs.
10Name Spaces
- The general organization of the UNIX file system
implementation on a logical disk of contiguous
disk blocks. - Boot block loaded when system is booted.
- Super block information on the entire file
system - Inode information on the location of the data of
its associated file - Disk block file data blocks
11Name Resolution
- The process of looking up a name is called name
resolution. - Problem To resolve a name we need a directory
node. How do we actually find that (initial)
node? - Knowing how and where to start name resolution is
called closure mechanism. The mechanism - selects the implicit context from which to start
name resolution. - determine how name resolution should proceed.
- Examples
- www.cs.twsu.edu start at a DNS name server
- /home/john/box start at the local NFS file
server (possible recursive search) - 316-978-3156 dial a phone number
- 156.26.1.30 route to the WSU Web server
12Naming Linking and Mounting
- An alias is another name for the same entity.
- The hard link approach is to allow multiple
absolute paths names to refer to the same node in
a naming graph. - The symbolic link approach uses the leaf node to
store an entity path. - Name resolution can also be used to merge
different name spaces. Mounting is an example
(one way) of merging different name spaces.
13Linking and Mounting
- The concept of a symbolic link explained in a
naming graph.
14Merging Name Spaces
- Mount point is a (Directory) node storing the
node identifier. Mounting point is a (Directory)
node in the foreign name space. For example, - To mount a foreign name space in a distributed
system requires the following information - The name of an access protocol
- The name of the server
- The name of the mounting point in the foreign
name space - Example mount nfs//flits.cs.vu.nl//home/steen
/remote/vu - nfs//flits.cs.vu.nl//home/steen is the mounting
point. - /remote/vu is the mout point.
15Linking and Mounting
- Mounting remote name spaces through a specific
process protocol.
16Merging Name Spaces
- We have different name spaces that we wish to
access from any given name space. - Solution 1 Introduce a naming scheme by which
pathnames of different name spaces are simply
concatenated (URLs). - Solution 2 Introduce (specific) nodes that
contain the name of a node in a foreign name
space, along with the information how to select
the initial context in that foreign name space
(Jade). - Solution 3 Use only full pathnames, in which the
starting context is explicitly identified, and
merge by adding a new root node (DEC's Global
Name Space). - n0/home/stten/keys, m0/home/steen
17Linking and Mounting
- Organization of the DEC Global Name Service
18Name Space Implementation
- A name space forms the heart of a naming service.
A naming service is implemented by name server.
In distributed systems, it is necessary to
distribute the name resolution process as well as
name space management across multiple machines,
by distributing nodes of the naming graph. - Consider a hierarchical naming graph and
distinguish three levels - Global level Consists of the highlevel
directory nodes. Main aspect is that these
directory nodes have to be jointly managed by
different administrations - Administrational level Contains midlevel
directory nodes that can be grouped in such a way
that each group can be assigned to a separate
administration. - Managerial level Consists of lowlevel directory
nodes within a single administration. Main issue
is effectively mapping directory nodes to local
name servers.
19Name Space Distribution
- An example partitioning of the DNS name space,
including Internet-accessible files, into three
layers.
20Name Space Distribution
Item Global Administrational Managerial
Geographical scale of network Worldwide Organization Department
Total number of nodes Few Many Vast numbers
Responsiveness to lookups Seconds Milliseconds Immediate
Update propagation Lazy Immediate Immediate
Number of replicas Many None or few None
Is client-side caching applied? Yes Yes Sometimes
- A comparison between name servers for
implementing nodes from a large-scale name space
partitioned into a global layer, an
administrational layer, and a managerial layer. - Name servers in the global and administrational
layer are the most difficult to implement because
of replication and caching.
21Implementation of Name Resolution
- Each client has access to a local name resolver,
which is responsible for ensuring that the name
resolution process is carried out. - There are two ways to implement name resolution
- In iterative name resolution, a name resolver
hands over the complete name to the root name
server, returning each intermediate result back
to the clients name resolver. - In recursive name resolution, a name server
passes the result to the next name server it
finds.
22Implementation of Name Resolution
- The principle of iterative name resolution.
23Implementation of Name Resolution
- The principle of recursive name resolution.
24Implementation of Name Resolution
- Recursive name resolution
- Drawback it demands high performance on each
name server. - Advantages
- Caching results is more effective.
- Communication cost is reduced.
- One of the largest distributed naming services is
the Internet Domain Name System (DNS).
25Implementation of Name Resolution
Server for node Should resolve Looks up Passes to child Receives and caches Returns to requester
cs ltftpgt ltftpgt -- -- ltftpgt
vu ltcs,ftpgt ltcsgt ltftpgt ltftpgt ltcsgtltcs, ftpgt
ni ltvu,cs,ftpgt ltvugt ltcs,ftpgt ltcsgtltcs,ftpgt ltvugtltvu,csgtltvu,cs,ftpgt
root ltni,vu,cs,ftpgt ltnlgt ltvu,cs,ftpgt ltvugtltvu,csgtltvu,cs,ftpgt ltnlgtltnl,vugtltnl,vu,csgtltnl,vu,cs,ftpgt
- Recursive name resolution of ltnl, vu, cs, ftpgt.
Name servers cache intermediate results for
subsequent lookups.
26Implementation of Name Resolution
- The comparison between recursive and iterative
name resolution with respect to communication
costs.
27The DNS Name Space
- The DNS name space is hierarchically organized as
a rooted tree. - The string representation of a path name consists
of listing its labels, starting with the
rightmost one, and separating the labels by a
dot. - For example, www.cs.twsu.edu., which includes the
rightmost dot to indicate the root node. - The label attached to a nodes incoming edge is
used as the name for that node. - A subtree is a called a domain a path name to
its root node is called a domain name. - The contents of a node is formed by a collection
of resource records. Different types of resource
records are shown in Figure 4-12. - DNS distinguishes aliases from what are called
canonical names or primary name
28The DNS Name Space
Type of record Associated entity Description
SOA Zone Holds information on the represented zone
A Host Contains an IP address of the host this node represents
MX Domain Refers to a mail server to handle mail addressed to this node
SRV Domain Refers to a server handling a specific service
NS Zone Refers to a name server that implements the represented zone
CNAME Node Symbolic link with the primary name of the represented node
PTR Host Contains the canonical name of a host
HINFO Host Holds information on the host this node represents
TXT Any kind Contains any entity-specific information considered useful
- The most important types of resource records
forming the contents of nodes in the DNS name
space.
29DNS Implementation
- The DNS name space can be divided into a global
layer and administrational layer. - Secondary name servers do not access the database
directly but request the primary server to
transfer its content. The latter is called a zone
transfer in DNS terminology. - A DNS database is implemented as a small
collection of files. - DNS is comparable to a telephone book for looking
up phone numbers.
30DNS Implementation
- An excerpt from the DNS database for the zone
cs.vu.nl.
31DNS Implementation
Name Record type Record value
cs.vu.nl NIS solo.cs.vu.nl
solo.cs.vu.nl A 130.37.21.1
- Part of the description for the vu.nl domain
which contains the cs.vu.nl domain.
32X.500
- X.500 Directory Service is a standard way to
develop an electronic directory so that it can be
part of a global directory available with
Internet access. - The idea is to be able to look up people in a
user-friendly way by name, department, or
organization. It is similar to use the yellow
pages. - Because these directories are organized as part
of a single global directory, you can search for
hundreds of thousands of entries from a single
place on the World Wide Web.
33X.500
- An X.500 directory service consists of a number
of records, usually referred to as directory
entries. - The collection of all directory entries in an
X.500 directory service is called a Directory
Information Base (DIB). - Each record is uniquely named. Each naming
attribute is called a Relative Distinguished Name
(RDN). - Calling read will return a directory entry.
Calling list will return a list of entries.
34The X.500 Name Space
Attribute Abbr. Value
Country C NL
Locality L Amsterdam
Organization L Vrije Universiteit
OrganizationalUnit OU Math. Comp. Sc.
CommonName CN Main server
Mail_Servers -- 130.37.24.6, 192.31.231,192.31.231.66
FTP_Server -- 130.37.21.11
WWW_Server -- 130.37.21.11
- A simple example of a X.500 directory entry using
X.500 naming conventions.
35The X.500 Name Space
- Part of the directory information tree.
36The X.500 Name Space
Attribute Value Attribute Value
Country NL Country NL
Locality Amsterdam Locality Amsterdam
Organization Vrije Universiteit Organization Vrije Universiteit
OrganizationalUnit Math. Comp. Sc. OrganizationalUnit Math. Comp. Sc.
CommonName Main server CommonName Main server
Host_Name star Host_Name zephyr
Host_Address 192.31.231.42 Host_Address 192.31.231.66
- Two directory entries having Host_Name as RDN.
37X.500 Implementation
- In X.500, each local directory is called a
Directory System Agent (DSA). A DSA can represent
one organization or a group of organizations. - The DSAs are interconnected from the Directory
Information Tree (DIT). The user interface
program for access to one or more DSAs is a
Directory User Agent (DUA). - DUAs include whois, finger, and programs that
offer a graphical user interface. X.500 is
implemented as part of the Distributed Computing
Environment (DCE) in its Global Directory Service
(GDS). - The Lightweight Directory Access Protocol (LDAP)
is a simplified protocol to accommodate X.500
directory services in the Internet.
38X.500 Implementation
- Providing an X.500 directory allows an
organization to make itself and selected members
known on the Internet. - Two of the largest directory service providers
are InterNIC, the organization that supervises
domain name registration in the U.S., and ESnet,
which maintains X.500 data for all the U.S.
national laboratories. - ESNet and similar providers also provide access
to looking up names in the global directory,
using a number of different user interfaces
including designated Web sites, whois, and
finger. - These organizations also provide assistance to
organizations that are creating their own
Directory Information Tree (DIT).
39Naming Locating Objects
- Observation If a traditional naming service is
used to locate entities, we also have to assume
that node contents at the managerial level is
stable, as we can use only names as identifiers
(think of Web pages). - Problem It is not realistic to assume stable
node contents down to the local naming level - Solution Decouple naming from locating entities
- Location service
- Solely aimed at providing the addresses of the
current locations of entities. - Assumption Entities are mobile, so that their
current address may change frequently.
40Naming Locating Objects
- Naming service
- Aimed at providing the content of nodes in a name
space, given a (compound) name. Content consists
of different (attribute,value) pairs. - Assumption Node contents at global and
administrational level is relatively stable for
scalability reasons. - Two-level mapping is used to local mobile
objects - Name Any name in a traditional naming space
- Entity ID A true identifier
- Address Provides all information necessary to
contact an entity - Observation An entity's name is now completely
independent from its location.
41Naming Locating Objects
- Observation If a traditional naming service is
used to locate entities, we also have to assume
that node contents at the managerial level is
stable, as we can use only names as identifiers
(think of Web pages). - Problem It is not realistic to assume stable
node contents down to the local naming level - Solution Decouple naming from locating entities
42Naming versus Locating Entities
- Direct, single level mapping between names and
addresses. - T-level mapping using identities.
43Simple Solutions for Locating Entities
- Broadcasting Simply broadcast the ID, requesting
the entity to return its current address. - Can never scale beyond localarea networks (think
of ARP/RARP) - Requires all processes to listen to incoming
location requests - One possible solution is to switch multicasting.
- Forwarding pointers Each time an entity moves,
it leaves behind a pointer telling where it has
gone to. - Referencing can be made entirely transparent to
clients by simply following the chain of pointers - Update a client's reference as soon as present
location has been found - Geographical scalability problems
- Long chains are not fault tolerant
- Increased network latency
44Forwarding Pointers
- The principle of forwarding pointers using
(proxy, skeleton) pairs.
45Forwarding Pointers
- Redirecting a forwarding pointer, by storing a
shortcut in a proxy.
46HomeBased Approaches
- The use of broadcasting or multicasting is
difficult to implement. Long chains of forwarding
pointers introduce performance problems and are
susceptible to broken link. - A popular approach to supporting mobile entities
in large-scale networks is to introduce a home
location, which keeps track of the current
location of an entity. - Singletiered scheme Let a home keep track of
where the entity is - An entity's home address is registered at a
naming service - The home registers the foreign address
(care-of-address) of the entity - Clients always contact the home first, and then
continues with the foreign location
47HomeBased Approaches
- Problems with homebased approaches
- The home address has to be supported as long as
the entity lives. - The home address is fixed, which means an
unnecessary burden when the entity permanently
moves to another location - Poor geographical scalability (the entity may be
next to the client) - Possible solution to home-based approaches
Twotiered scheme (similar to mobile telephony) - Check local visitor registry first
- Fall back to home location if local lookup fails
48Home-Based Approaches
- The principle of Mobile IP.
49Hierarchical Location Services
- The two-tiered home-based approach can be
generalized to multiple layers. A network is
divided into a collection of domains. Each domain
can be subdivided into multiple subdomain. A
lowest-level domain, called a leaf domain. - Each domain has an associated directory node that
keeps track of the entities in that domain. - HLS (Hierarchical Location Services)
- Each entity in a domain is represented by a
location record in that directory node. - The address of an entity is stored in a leaf
node. - Intermediate nodes contain a pointer to a child
if and only if the subtree rooted at the child
stores an address of the entity - The root knows about all entities
50Hierarchical Approaches
- Hierarchical organization of a location service
into domains, each having an associated directory
node.
51Hierarchical Approaches
- An example of storing information of an entity
having two addresses in different leaf domains.
52Hierarchical Location Services
- Basic principles
- Start lookup at local leaf node
- If node knows about the entity, follow downward
pointer, otherwise go one level up - Upward lookup always stops at the node that
stores a location record for the entity - If a mobile entity moves regularly within a
domain, it is effective to cache a reference to
the directory node. In this case, it makes sense
to start a lookup at that directory node. This
approach is referred as a pointer caching.
53Hierarchical Approaches
- Looking up a location in a hierarchically
organized location service.
54Hierarchical Approaches
- An insert request is forwarded to the first node
that knows about entity E. - A chain of forwarding pointers to the leaf node
is created.
55Pointer Caching
- Example If an entity E moves regularly between
leaf domains D 1 and D 2 , it may be more
efficient to store E 's contact record at the
least common ancestor - Lookup operations from either D 1 or D 2 are on
average cheaper - Update operations (i.e., changing the current
address) can be done directly at - Note assuming that E generally stays in it does
make sense to cache a pointer to
56Pointer Caches
- Caching a reference to a directory node of the
lowest-level domain in which an entity will
reside most of the time.
57Pointer Caches
- A cache entry that needs to be invalidated
because it returns a nonlocal address, while such
an address is available.
58Scalability Issues
- Storing a location record for each entity is not
a problem. The problem is we need to ensure that
servers can handle a large number of requests per
time unit highlevel servers are in big trouble.
- Solution Assume at least at global and
administrational level) that content of nodes
hardly ever changes. In that case, we can apply
extensive replication by mapping nodes to
multiple servers, and start name resolution at
the nearest server. - Observation An important attribute of many nodes
is the address where the represented entity can
be contacted. Replicating nodes makes largescale
traditional name servers unsuitable for locating
mobile entities.
59HLS Scalability Issues
- Size scalability Again, we have a problem of
over loading higherlevel nodes - Only solution is to partition a node into a
number of subnodes and evenly assign entities to
subnodes - Naive partitioning may introduce a node
management problem, as a subnode may have to know
how its parent and children are partitioned.
60HLS Scalability Issues
- Geographical scalability We have to ensure that
lookup operations generally proceed monotonically
in the direction of where we'll find an address - If entity E generally resides in California, we
should not let a root subnode located in France
store E 's contact record. - Unfortunately, subnode placement is not that
easy, and only a few tentative solutions are
known
61Scalability Issues
- Geographical scalability We need to ensure that
the name resolution process scales across large
geographical distances. - Problem By mapping nodes to servers that may, in
principle, be located anywhere, we introduce an
implicit location dependency in our naming
scheme. - Solution No general one available yet.
62Scalability Issues
- The scalability issues related to uniformly
placing subnodes of a partitioned root node
across the network covered by a location service.
63Unreferenced Objects Problem Naming
- Assumption Objects may exist only if it is known
that they can be contacted - Each object should be named
- Each object can be located
- A reference can be resolved to client-object
communication - Problem Removing unreferenced objects
- How do we know when an object is no longer
referenced (think of cyclic references)? - Who is responsible for (deciding on) removing an
object?
64The Problem of Unreferenced Objects
- An example of a graph representing objects
containing references to each other.
65Reference Counting
- Principle Each time a client creates (removes) a
reference to an object O, a reference counter
local to O is incremented (decremented) - Problem 1 Dealing with lost (and duplicated)
mes - sages
- An is lost so that the object may be prematurely
removed - A is lost so that the object is never re moved
- An ACK is lost, so that the increment/decrement
is resent. - Solution Keep track of duplicate requests.
66Reference Counting
- The problem of maintaining a proper reference
count in the presence of unreliable communication.
67Reference Counting
- Problem 2 Dealing with duplicated references -
client P 1 tells client P 2 about object O - Client P 2 creates a reference to O, but
dereferencing (communicating with O) may take a
long time - If the last reference known to O is removed
before P 2 talks to O, the object is removed
prematurely - Solution 1 Ensure that P 2 talks to O on time
- Let P 1 tell O it will pass a reference to P 2
- Let O contact P 2 immediately
- A reference may never be removed before O has
acked that reference to the holder
68Reference Counting
- Copying a reference to another process and
incrementing the counter too late - A solution.
69Weighted Reference Counting
- Solution 2 Avoid increment and decrement
messages - Let O allow a maximum M of references
- Client P 1 creates reference grant it M 2 credit
- Client P 1 tells P 2 about O, it passes half of
its credit grant to P 2 - Pass current credit grant back to O upon
reference deletion Skeleton
70Advanced Referencing Counting
- The initial assignment of weights in weighted
reference counting - Weight assignment when creating a new reference.
71Reference Listing
- Observation We can avoid many problems if we can
tolerate message loss and duplication - Reference listing Let an object keep a list of
its - clients
- Increment operation is replaced by an
(idempotent) - Decrement operation is replaced by an
(idempotent) - There are still some problems to be solved
- Passing references client B has to be listed at
O before last reference at O is removed (or keep
a chain of references) - Client crashes we need to remove outdated
registrations (e.g., by combining reference
listing with leases)
72Leases
- Observation If we cannot be exact in the
presence of communication failures, we will have
to tolerate some mistakes - Essential issue We need to avoid that object
references are never reclaimed - Solution Hand out a lease on each new reference
- The object promises not to decrement the
reference count for a specified time - Leases need to be refreshed (by object or client)
- Observations
- Refreshing may fail in the face of message loss
- Refreshing can tolerate message duplication
- Does not solve problems related to cyclic
references
73Advanced Referencing Counting
- Weight assignment when copying a reference.
74Advanced Referencing Counting
- Creating an indirection when the partial weight
of a reference has reached 1.
75Advanced Referencing Counting
- Creating and copying a remote reference in
generation reference counting.
76Tracing in Groups
- Initial marking of skeletons.
77Tracing in Groups
- After local propagation in each process.
78Tracing in Groups