Explain why iterative navigation is necessary in a name service in which different name spaces are partially integrated, such as the file naming scheme provided by NFS.

What will be an ideal response?


The reason why iterative navigation is necessary is that when a client encounters a symbolic link, then this symbolic link should be resolved with respect to the client’s name space, even when the server stores the link. For example, suppose that the server’s directory /jewel is mounted on the client’s directory /ruby/red. Suppose that /ruby/red/stone (stored in the server’s name space as /jewel/stone) is a symbolic link to /ruby/stone. The server passes back this link to the client, which then must continue to resolve it. The pathname /ruby/stone might refer to a file stored at the client, or it might be a mount point to another server.

Computer Science & Information Technology

You might also like to view...

When creating a String object, if a character array and two integers are passed to the String constructor, then the created String contains:

a) the characters of the array from the index specified by the first integer for the number of characters represented by the second integer. b) the characters of the array from the index specified by the first integer to the index specified by the second integer. c) all of the characters except those between the indices represented by the two integer values. d) None of the above.

Computer Science & Information Technology

The ____ dialog box is useful when you want to track and update groups of tasks but don't need the detail you applied to tasks when you used the Update Tasks dialog box or the Gantt chart.

A. Update Project B. Status Report C. Tracking Report D. Task Tracking

Computer Science & Information Technology

Briefly describe the TCP/IP Network Interface layer.

What will be an ideal response?

Computer Science & Information Technology

Identify the system feature that is improved due to the highly scalable nature of NoSQL databases.

a. System memory b. System security c. System uptime d. System boot-time

Computer Science & Information Technology