CIFS in Computer Network

FREE Online Courses: Dive into Knowledge for Free. Learn More!

The Common Internet File System is abbreviated as CIFS. It is a network file system protocol. This protocol allows workstations on the network to share access to files, printers, and serial ports. It is used on devices that use the Windows operating system.

The Common Internet File System (CIFS) was introduced as a more sophisticated version of Microsoft’s 1996 Server Message Block (SMB). It is mostly used for remote file sharing through Internet Protocol (IP).

This protocol is also utilised in embedded systems and appliances. The most current storage devices based on CIFS are NAS (Network Attached Storage) and SAN (Storage Area Network).

This protocol allows the client to edit files in the same way as they would on a local computer. It also enables a group of people to share a document within corporate intranets. It offers a number of functionalities that NFS does not support. Other operating systems, such as Unix, also support this protocol.

Components of CIFS:

1. Client:

The client is a user who initiates the majority of messages and protocol implementation.

2. Server:

It is responsible for storing messages on the network and carrying out the functionality.

3. Application:

Clients use the program to access files that are shared across the network.

Features of CIFS:

1. Authenticate Transfer:

A user can create a secure file transfer within the network so that no data is discovered.

2. Transport Independence:

We do not require any additional transport protocol to send SMB messages between the user and the server.

3. Access to resources:

A user can build many shared services on the server, such as editing files, deleting files, or printing queues.

4. RPC Transport:

It offers authenticated file transfer for RPC protocols such as RPC and RAP.

5. Secure Caching:

It provides record tracking and enables users to cache data for improved efficiency.

6. More attributes:

It also allows characteristics such as author name, content, and description, which fall within the non-file system category.

7. File Access:

Users can access documents over the network. It includes activities such as reading, writing, and editing.

8. Notification:

When a user or client changes the contents of a document over the network, the server is alerted.

9. Replicated and distributed virtual volumes:

It supports file system subtrees with many volumes and servers using distributed replicated virtual volumes.

Files and folders can be moved across servers without altering their names.

For fault tolerance and load sharing, subtrees can be replicated.

10. Batched Requests:

It may handle multiple requests batching as separate messages to reduce round trip latencies.

Connection establishment messages, namespace and file manipulation messages, typesetter messages, and other messages are the different sorts of messages.

11. File Locking:

It enables unlocked file access as well as capabilities such as file and record locking.

Working of CIFS:

The following are the steps involved in the working of CIFS:

1. A user makes a request to the server that he or she wants to access.

2. Following that, the server accepts the client’s request.

3. The server then delivers the back response to the client.

4. Finally, the server linked to other servers and shared files with the client.

Difference between Common Internet File System (CIFS) and Network File System (NFS):

Common Internet File System (CIFS)Network File System (NFS)
The Common Internet File System is abbreviated as CIFS.The Network File System is abbreviated as NFS.
This protocol is used for exchanging the files by Windows operating systems.Unix and Linux operating systems utilise this protocol to share files.
It has poor scalability.It is quite scalable.
The communication speed is medium.Communication moves at a fast pace.
The Network File System is less secure than the Common Internet File System.The Network File System protocol is not secure.
CIFS is a reliable protocol.NFS is not a reliable protocol.
Sessions are provided by this protocol.Sessions are not provided by this protocol.
Its implementation is difficult.This protocol is simple to implement and configure.
This protocol employs 139 and 445 TCP ports, as well as 137 and 138 UDP ports.TCP and UDP are both used on port 111 in this protocol.

Summary:

In this article, we explored the concept of the Common Internet File System (CIFS), and also the various features that it provides. We also looked at the working of CIFS, including the various steps involved in it. Lastly, we covered the differences between CIFS and NFS.

We work very hard to provide you quality material
Could you take 15 seconds and share your happy experience on Google

follow dataflair on YouTube

Leave a Reply

Your email address will not be published. Required fields are marked *