ClusterNFS is a set of patches for the "Universal NFS Daemon" (UNFSD) to allow multiple clients to nfs mount the same root filesystem by providing "tagged" filenames. When a client requests the file "/path/filename", the ClusterNFS server checks for the existence of files of the form "/path/filename$$TAG=value$$". If such a file exists and the client has a matching value for KEY, this file is returned. If the client does not have a matching value or no such file exists, the file request proceeds as normal. Currently supported keys include HOST (hostname), IP (IP number), CLIENT (matches any nfs client) and CREATE (for "tagged" creation of files).
GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP, TCP, HTTP, HTTPS, or direct 802.11 (WLAN). GNUnet supports accounting to provide contributing nodes with better service. The services built on top of the framework include anonymous file sharing and a virtual network providing IPv4-IPv6 transition via protocol translation over the P2P network.
LUFS is a hybrid userspace filesystem framework supporting many "exotic" filesystems (localfs, sshfs, ftpfs, httpfs, socketfs, freenetfs, and nutellafs) transparently for any application. It can be regarded as doing the same job as the VFS (virtual filesystem switch) in the kernel: it is a switch, distributing the filesystem calls to its supported filesystems. However, LUFS filesystems are implemented in userspace. This would be a drawback for local filesystems where the access speed is important, but proves to be a huge advantage for networked filesystems where the userland flexibility is most important.
Sharity mounts shares exported by Windows, Samba, and other SMB/CIFS servers in the file system of Unix computers. It implements Resource Browsing, which is similar to the Windows Network Neighborhood (Netbios Workgroups and Active Directory), NTLM, NTLMv2, and Kerberos authentication, Microsoft's Distributed File System (DFS), and manipulation of Access Control Lists (ACLs).