Performance Comparison Analysis Between Network File System (NFS) And Primary Domain Controller (PDC) Samba
Abstract
File sharing is a system where many users can share files and storage resources with client-server concepts which run through the network. A File Server allows users to share information over a network without having to physically send the file to a floppy disk or some other external storage devices. The protocols and applications are often used to share files (filesharing) is the Network File System (NFS), and the Primary Domain Controller (PDC)Samba. NFS(Network File System) is a set of protocols used to access multiple file systems over a network. While SAMBA is an open source program that provides file sharing services (file service) and share a printer device (print service). Of both these protocols, each has its own advantages and disadvantages.on this research, the authors have tried to analyze the comparison between the two in terms of speed of data transfer, from research conducted showed that the performance of file sharing Network File System (NFS)is better than the performance of the Samba file sharing
Full Text:
PDFReferences
Carter, Gerald. 2020. LDAP System Administration. 1005 Gravenstein Highway North Sebastopol, CA 95472, USA. : Oh, Reilly.
Prasetyo, Aji., Rochim, A.F., Satoto, K.I. 2020. Network Files System (Active Case Study Undip Open Source Repository). Department of Electrical Engineering, Faculty Engineering, Diponegoro University. Semarang.
Forouzan, Behrouz A. 2021. Data Communications and Networking: McGraw-Hill Science /engineering/Math;4th edition.
Winarno, Idris. 2020. Network Files System (NFS) + Samba Server. Information Technology Department , Institute of Technology Ten November. Surabaya.
K. J. Lee & W. S. Jeong. (2021). An Analysis of the Economic Effects for the Immersive Media Industry. The Journal of Korean Institute of Communications and Information Sciences, 36(7), 795-805.
S. Jonathan (2022). Defining virtual reality: Dimensions determining telepresence. Journal of communication, 42(4), 73-93.
E. Damiani, S. Vimercati, S. Paraboschi & P. Samarati (2020). Securing XML Documents. Proceedings of the 2020 International Conference on Extending Database Technology(EDBT2020).
Wen, Quan, Yufei Wang & Peng Li. (2018). Two Zero-Watermark methods for XML documents. Journal of Real-Time Image Processing, 14(1), 183-192.
J. L. Raheja, A. Chaudhary, K. Singal. (2021). Tracking of fingertips and centers of palm using kinect. In Computational intelligence, modelling and simulation (CIMSiM), 248-252.
S. A. Kumar. (2017). Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications, 76(6), 8881-8900.
S. H. Kim. (2016). Realtime 3D Human Full-Body Convergence Motion Capture using a Kinect Sensor. Journal of Digital Convergence, 14(1), 189-194.
Muqorobin, M., Rokhmah, S., Muslihah, I., & Rais, N. A. R. (2020). Classification of Community Complaints Against Public Services on Twitter. International Journal of Computer and Information System (IJCIS), 1(1), 7-10.
K. W. Park & J. Y. Lee. (2018). A Morphology Technique-Based Boundary Detection in a Two-Dimensional QR Code. Journal of Digital Convergence, 13(12), 159-175.
S. M. Jung, J. G. Song, D. J. Hwang, J. Y. Aan & S. S. Kim. (2020). A Study on Software-based Sensing
Fitriyadi, F., & Muqorobin, M. (2021). Prediction System for the Spread of Corona Virus in Central Java with K-Nearest Neighbor (KNN) Method. International Journal of Computer and Information System (IJCIS), 2(3), 80-85.
J. U. Hou, D. G. Kim & H. K. Lee. (2019). Blind 3D Mesh Watermarking for 3D Printed Model by Analyzing Layering Artifact. IEEE Transactions on Information Forensics and Security, 12(11), 2712-2725.
A. F. Tawfiq & J. Lu. (2017). Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques: A Smart Fuzzy-Based Model for Financial XML Transactions Security Using XML Encryption. Ontologies and Big Data Considerations for Ef ective Intelligence. IGI Global, 2017, 214-326.
K. Fatma. (2017). High Performance and Reliable Fault Detection Scheme for the Secure Hash Algorithm. Indian Journal of Science and Technology 10.19 (2017).
S. R. Kokate & S. G. Salunke. (2017). Implementation of Intelligent Malware Detection System Using Post Processing Techniques. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). (pp. 1-4).
Muqorobin, M. (2021). ANALYSIS OF FEE ACCOUNTING INFORMATION SYSTEMS LECTURE AT ITB AAS INDONESIA IN THE PANDEMIC TIME OF COVID-19. International Journal of Economics, Business and Accounting Research (IJEBAR), 5(3), 1994-2007.
S. W Jeong, U. R Chio & I. G. Lee. (2018). Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things. Journal of Digital Convergence, 16(9), 179-185.
H. U. Kim, H. J. Kim, J. H. Kang & M. S. Jun. (2017). A Study on Analysis and Countermeasure of Security threat in NFC. Journal of Digital Convergence, 14(12), 183-191.
K. H Ko. (2018). An Estimating Algorithm of Vehicle Collision Speed Through Images of Blackbox. Journal of Digital Convergence, 16(9), 173-178
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License.

