According to Microsoft (2009) Distributed File Systems (DFS) allows administrators to group shared folders located on different servers and present them to users as a virtual tree of folders known as a namespace. When a user views the namespace, the folders appear to reside on a single, high-capacity hard disk. There is no need to configure any additional security as DFS namespace access is permitted to only those folders or files for which the user has appropriate NTFS or shared folder permissions.
Suggested Usage of Distributed File System:
In the given network scenario that is shown above, DFS can be used as follow:
- DFS can be used to link together network storage resources in order to create a single, hierarchical structure that behaves as a single high-capacity hard disk.
- It can be used to move the actual data between servers or disk drives and the logical DFS namespace can be reconfigured without affecting the user's access to the data.
- In this scenario DFS replication services can be used to balance the load and improve the response time during peak usage periods.
- It can be used to keep important data accessible at all times, even when a server or disk drive fails or when a shared folder or file becomes corrupted by hosting the roots and replicas on two or more computers.
- It can be used to minimize network traffic and improve response times as it uses the intelligent client caching. By using this feature when a user accesses the same portion of namespace more than once, it uses the cached referral rather than obtaining a new referral every time.
Benefits of Distributed File System:
Distributed file system will provide the following benefits to the organization (Microsoft 2009):
- DFS provides a combined view of shared folders that can be customize for individual users and groups.
- It provides increased administrative flexibility and allows management of physical network storage independent of its logical representation to users.
- Reduces training time and the need for full-time server administrators.
- It is capable of balancing loads and improving response time during peak usage periods.
- It keeps important data accessible at all times and uses secure mechanism of accessing the data
- It minimises network traffic and improves user response times.