Client-side caching in NFS reduces the number of RPC requests sent to the server.

 

The NFS client can cache data, which can be read out of local memory instead of

 

from a remote disk. The caching scheme available for use depends on the ®le

 

system being accessed. Some caching schemes are prohibited because they

 

cannot guarantee the integrity and consistency of data that multiple clients

 

simultaneously change and update. The standard NFS cache policies ensure that

 

performance is acceptable while also preventing the introduction of state into the

 

client/server communication relationship.

 

There are two types of client caches: the directory and ®le attribute cache and

 

the data cache.

 

Directory and File Attribute Cache

 

Not all ®le system operations use the data in ®les and directories. Many operations

 

get or set the attributes of the ®le or directory, such as its length, owner, and

 

modi®cation time. Because these attribute-only operations are frequent and do not

 

affect the data in a ®le or directory, they are prime candidates for using cached

 

information.

The client-side ®le and directory cache will store ®le attributes. The system does

this so that every operation that gets or sets attributes does not have to go through

the connection to the NFS server. When the system reads a ®le's attributes, they

remain valid on the client for some minimum period of time, typically 30 seconds.

You can set this time period by using the acregmin option on the mount command.

If the client changes the ®le, he updates its attributes. This makes changes to the

local copy of the attributes and extends the cache validity period another minimum

time period. The attributes of a ®le remain static for some maximum period, typically

sixty seconds. Additionally, the system deletes ®le attributes from the cache, and

writes changed ®le attributes back to the server. You can set this time period with

the acregmax option on the mount command. To force a refresh of remote attributes

when opening a ®le, use thenocto option on the mount command. Specifying the

noac option suppresses all the local caching of attributes, negating the acregmin,

acregmax, acdirmin, and the acdirmax options on the mount command.

 

The same mechanism is used for directory attributes, although they are given a

 

longer minimum life-span. The minimum and maximum time period for directory

 

attribute ¯ushing from the cache is set by theacdirmin and acdirmax options on the

 

mount command.

 

Attribute caching allows a client to make multiple changes to a ®le or directory

 

without having to constantly get and set attributes on the server. Intermediate

 

attributes are cached, and the sum total of all updates is later written to the server

 

when the maximum attribute cache period expires. Frequently accessed ®les and

 

directories have their attributes cached locally on the client so that some NFS

 

requests can be performed without having to make an RPC call. By preventing this

 

type of client/server interaction, caching attributes improves the performance of

 

NFS.

 

For more information on the ADDMFS and MOUNT commands, see ªChapter 5.

 

Client Mounting of File Systemsº on page 39. For more information on the options

 

to the ADDMFS and MOUNT commands, see CL Reference, SC41-4722.

Chapter 2. The Network File System Client/Server Model 13

Page 31
Image 31
IBM AS/400E manual Directory and File Attribute Cache, Data cache

AS/400E specifications

The IBM AS/400E, now more commonly known as IBM i, is a robust and versatile midrange server that has been designed to provide a comprehensive computing solution for businesses of all sizes. First introduced in the late 1980s, the AS/400 series has undergone multiple enhancements and rebranding, with the AS/400E being one of the notable iterations. This powerful platform is closely associated with IBM's commitment to reliability, scalability, and integrated business solutions.

One of the main features of the AS/400E is its highly integrated architecture that combines hardware and software into a cohesive system. This integration allows for seamless operations, reducing the complexity typically associated with managing disparate systems. The system is powered by IBM's proprietary OS/400 operating system, which has evolved into IBM i, featuring advanced capabilities like object-oriented programming, integrated database management, and security features that are essential for enterprise environments.

A key characteristic of the AS/400E is its robust database support, primarily through the use of DB2 for i. This integrated database management system enables efficient data handling and retrieval, facilitating real-time business analytics and reporting. Furthermore, the platform supports a variety of programming languages, including RPG, COBOL, and Java, making it flexible for developers who require diverse tools for application development.

The AS/400E is also known for its exceptional reliability and uptime, making it a preferred choice for critical business applications in industries such as finance, healthcare, and manufacturing. This reliability is backed by advanced error detection and correction mechanisms, as well as redundancy features that help prevent data loss and minimize downtime.

In terms of scalability, the AS/400E can effortlessly expand to accommodate growing business demands. Organizations can increase processing power by adding more resources without significant disruption. This scalability, combined with the system’s built-in virtualization capabilities, allows businesses to optimize resource usage and streamline operations.

Security is another defining feature of the AS/400E. The platform incorporates various layers of security measures, including user authentication, encryption, and comprehensive auditing capabilities, ensuring that sensitive business data is protected against unauthorized access.

Overall, the IBM AS/400E remains a powerful tool in the enterprise computing landscape, providing businesses with an integrated, reliable, and secure solution for their technological needs. Its enduring popularity is a testament to its capability to evolve with changing business requirements while maintaining its core attributes of high performance and stability.