Academic literature on the topic 'Storage Area Network (SAN) management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Storage Area Network (SAN) management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Storage Area Network (SAN) management"

1

Kulkarni, Varsha, and Dr Nagaraj Bhat. "A study of Storage Area Networks and issues in its management." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 4, 2021): 238–45. http://dx.doi.org/10.51201/jusst/21/05257.

Full text
Abstract:
A data center has hundreds of servers and storage devices running on virtual machines that can be deployed and migrated over servers as per the requirement. If each server uses local storage, migration of this storage and restoration is mandatory. An attempt to organize and track storage throughout the data center is quite tedious. Using a dedicated storage system like a storage array, it possible to collectively monitor and manage such a network. A storage area network is essentially a network dedicated to storage devices. A storage area network can interconnect devices in all its layers, therefore improving storage availability. Interconnecting all elements in SAN also reduces the chances of a single point of failure. Using the storage devices collectively improves their utilization. SAN offers to manage and maintain all devices in the network. Although SAN is beneficial, it has drawbacks when configuring, monitoring, and managing components in a large-scale network. This paper consolidates the problems associated with SAN and offers possible solutions to overcome them.
APA, Harvard, Vancouver, ISO, and other styles
2

Shevtsov, Vadim, and Evgeny Abramov. "The Analysis of Modern Data Storage Systems." NBI Technologies, no. 1 (August 2019): 25–30. http://dx.doi.org/10.15688/nbit.jvolsu.2019.1.5.

Full text
Abstract:
Today, Storage Area Network and Cloud Storage are the common Storage System. Storage Area Network includes NAS, SAN, DAS systems. Cloud Storage includes object storage, file storage, block storage. Storage Area Network is an important technology because it may give a lot of data volume with a high recovery chance and secure access, work and central management with data. Cloud Storage has many advantages: data mobility, teamwork, stability, scalability, quick start. The main threats include destruction, theft, corruption, unauthentication, replacement, blocking. Storage Area Network components (architecture elements, protocols, interfaces, hardware, system software, exploitation) have a lot of vulnerabilities. Cloud Storage may be attacked by software, functional elements, clients, hypervisor, management systems. A lot of companies design storage solutions: DropBox, QNAP, WD, DELL, SEAGATE.
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Song-Kyoo. "Enhanced management method of storage area network (SAN) server with random remote backups." Mathematical and Computer Modelling 42, no. 9-10 (November 2005): 947–58. http://dx.doi.org/10.1016/j.mcm.2005.06.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bodaniuk, M. E., O. K. Karnaukhov, O. I. Rolik, and S. F. Telenyk. "Storage area network management." Electronics and Communications 18, no. 5 (December 2, 2013): 81–90. http://dx.doi.org/10.20535/2312-1807.2013.18.5.142749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nalini, S., Harini Vaikund, and A. R. Raja. "Fuzzy Controller Based Power Quality Improvement for a Microgrid with Energy Management System." Journal of Computational and Theoretical Nanoscience 17, no. 11 (November 1, 2020): 4957–64. http://dx.doi.org/10.1166/jctn.2020.8994.

Full text
Abstract:
There is a drastic decrease in availability of conventional energy sources such as coal, natural gas and oil. The need for using non-conventional energy sources has increased due to the fast rate depletion in conventional energy sources and the ill effects of using them. Research work in the area of renewable energy sources has hence been increased throughout the world. The rate at which power demands are increasing, requires the need for interconnections of various power generation methods. For the proper use of conventional and non-conventional distributed generation microgrid is essential. Microgrid combines one or more generation units and helps to use the power generated in efficient manner. Microgrid includes the generating units, battery storage system with power electronic converters. The use of power converter is important, but the presence of converter generates harmonics usually so that the power quality issues have become serious. Many controllers are used to solve power quality problems, where one of them is the Unified Power Quality Controller (UPQC). Problems linked to power quality become serious due to the use of power electronics appliances. Microgrid power quality is maintained by using UPQC compensating devices. To control UPQC, there must be some controller to intimate the voltage sag, swell and flickers. In this paper the fuzzy logic controller is used for UPQC. An energy management system (EMS) is a system used by electrical utility network operators to monitor, regulate and optimize transmission and generation system efficiency. The system model is created using MATLAB by merging all DC-microgrid, EMS and UPQC, to solve power quality issues.
APA, Harvard, Vancouver, ISO, and other styles
6

K. Ibrahim, Sarmad, and Saif A. Abdulhussien. "Improved storage area network method for backup approach." Indonesian Journal of Electrical Engineering and Computer Science 17, no. 3 (March 1, 2020): 1493. http://dx.doi.org/10.11591/ijeecs.v17.i3.pp1493-1498.

Full text
Abstract:
<span>Storage Area Network (SAN) could be a dedicated storage network which carries the info between servers and storage devices. SAN offers flexibility to implement and share data between servers and remote devices instead of the traditional method that reduced the performance of service. This paper improves SAN backup method to increase the CPU utilization and reduce the load on the link; the result shows that the improved method is better than of traditional in terms of response time in FTP about 36% while the traffic data is about 3%.</span>
APA, Harvard, Vancouver, ISO, and other styles
7

Putra, Budiya Surya, and Timothy John Pattiasina. "STUDI ANALISA DATA STORAGE DENGAN MENGGUNAKAN SISTEM NAS-DAS-SAN." Teknika 1, no. 1 (July 1, 2012): 47–54. http://dx.doi.org/10.34148/teknika.v1i1.6.

Full text
Abstract:
Teknologi storage (penyimpanan) berkembang cukup pesat. Sampai saat ini, begitu banyak teknologi storage yang tersedia, dengan segala macam keunggulan dan keterbatasan. Di antara teknologi storage yang telah dikenal adalah DAS (Direct Attached Storage), NAS (Network Attached Storage), dan SAN (Storage Area Network). Tujuan penelitian makalah ini, untuk memahami cara kerja data data storage dan memahami kelebihan menggunakan sistem NAS, DAS, SAN. Hasil penelitian membuktikan bahwa terdapat aspek-aspek tertentu yang harus dipertimbangkan dalam pemilihan penagaman data pada sistem penyimpanan data di dalam suatu jaringan komputer.
APA, Harvard, Vancouver, ISO, and other styles
8

AL-aswad, Muthanna Mohammad, and KHALIL ALWAJEH. "Performance Evaluation of Storage Area Network(SAN)With internet Small Computer System Interface (iSCSI)For Local System PC." Algerian Journal of Signals and Systems 5, no. 3 (September 15, 2020): 167–78. http://dx.doi.org/10.51485/ajss.v5i3.113.

Full text
Abstract:
SCSI is a newly emerging protocol with the goal of implementing the Storage Area Network (SAN) technology over TCP/IP,where enables to access to remote data that in attached storage disks storages - Direct Attached Storage(DAS) over IP-networked. Also it's brings economy and convenience whereas it also raises performance and reliability issues. This paper investigates about possibility , using storage technology of the SANs, and iSCSI-SAN protocol,in local system PC, to improve access to attached storage disks storages in local system, with using iSCSI-SANs as virtual storage, is rather than DAS storage in local system of PC. Explicates after experiment procedure is that improving throughput of iSCSI-SANs was better than attached storage disks storages - DAS in local system . This means is that it can use iSCSI-SANs in local system of PC as attache storage disks storages as DAS , without cost , high performance, and easy control.
APA, Harvard, Vancouver, ISO, and other styles
9

Shen, Jin Xing. "The Design and Implementation of Intelligent High-Speed Disk Storage Protocols." Applied Mechanics and Materials 513-517 (February 2014): 889–92. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.889.

Full text
Abstract:
In this paper, through the analysis of the redundant array of independent disks system (RAID), storage area network system (SAN), network storage system (NAS), based on RAID on the system FPGA is used to design a set of intelligent high speed disk storage protocol, through the test and analysis can meet the continuous data acquisition, the real-time data storage needs, in the software through providing high access speed increases memory buffer, large storage capacity and higher data security.
APA, Harvard, Vancouver, ISO, and other styles
10

Mercier, C. "No more blind SAN's bluff [storage area network]." Information Professional 4, no. 4 (August 1, 2007): 41–42. http://dx.doi.org/10.1049/inp:20070411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Storage Area Network (SAN) management"

1

Altaf, Moaz. "SMI-S for the Storage Area Network (SAN) Management." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6125.

Full text
Abstract:
The storage vendors have their own standards for the management of their storage resources but it creates interoperability issues on different storage products. With the recent advent of the new protocol named Storage Management Initiative-Specification (SMI-S), the Storage Networking Industry Association (SNIA) has taken a major step in order to make the storage management more effective and organized. SMI-S has replaced its predecessor Storage Network Management Protocol (SNMP) and it has been categorized as an ISO standard. The main objective of the SMI-S is to provide interoperability management of the heterogeneous storage vendor systems by unifying the Storage Area Network (SAN) management, hence making the dreams of the network managers come true. SMI-S is a guide to build systems using modules that ‘plug’ together. SMI-S compliant storage modules that use CIM ‘language’ and adhere to CIM schema interoperate in a system regardless of which vendor built them. SMI-S is object-oriented, any physical or abstract storage-related elements can be defined as a CIM object. SMI-S can unify the SAN management systems and it works well with the heterogeneous storage environment. SMI-S has offered a cross-platform, cross-vendor storage resource management. This thesis work discusses the use of SMI-S at Compuverde which is a storage solution provider, located in the heart of the Karlskrona, the southeastern part of Sweden. Compuverde was founded by Stefan Bernbo in Karlskrona,Sweden. Just like all others leading storage providers, Compuverde has also decided to deploy the Storage Management Initiative-Specification (SMI-S) to manage their Storage Area Network (SAN) and to achieve interoperability. This work was done to help Compuverde to deploy the SMI-S protocol for the management of the Storage Area Network (SAN) which, among many of its features, would create alerts/traps in case of a disk failure in the SAN. In this way, they would be able to keep the data of their clients, safe and secure and keep their reputation for being reliable in the storage industry. Since Compuverde regularly use Microsoft Windows and Microsoft have started to support SMI-S for storage provisioning in System Center 2012 Virtual Machine Manager (SCVMM), this work was done using the SCVMM 2012 and the Windows Server 2012.The SMI-S provider which was used for this work was QNAP TS- 469 Pro.
0764354242
APA, Harvard, Vancouver, ISO, and other styles
2

Kalibjian, Jeff. "Storage Systems and Security Challenges in Telemetry Post Processing Environments." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606206.

Full text
Abstract:
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California
A common concern in telemetry post-processing environments is adequate disk storage capacity to house captured and post-processed telemetry data. In today's network environments there are many storage solutions that can be deployed to address storage needs. Recent trends in storage systems reveal movement to implement security services in storage systems. After reviewing storage options appropriate for telemetry post-processing environments; the security services such systems typically offer will also be discussed and contrasted with other third party security services that might be implemented directly on top of a networked storage system.
APA, Harvard, Vancouver, ISO, and other styles
3

Ziegler, Christoph, Matthias Clauß, Thomas Müller, Frank Richter, and Wolfgang Riedel. "Mitteilungen des URZ 4/2006." Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200602057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hajirostam, Siavash. "Evaluation of Storage Area Network (SAN) security and performance." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24142.

Full text
Abstract:
Due to growing the number of Information Technology (IT) users all around the world, consequently the amount of data that needs to be stored is increasing day by day. Single attached disks and old storage technologies cannot manage the storing these amounts of data. Storage Area Network (SAN) is a distributed storage technology to manage the data from several nodes in centralize place and secure. This thesis investigates how SAN works, the file system  and protocols that are used in implementation of SAN. The thesis also investigate about other storages technologies such as Network Attached Storage (NAS) and Direct Attached Storage (DAS) to figure out the advantages and disadvantages of SAN, The main focus of the thesis project is on identifying the security vulnerabilities in SAN such as possible attacks in different SAN protocols. The thesis finally identifies the performance factors in SAN to figure out how to improve the performance with respect to security solutions aimed to enhance the security level in SAN.
APA, Harvard, Vancouver, ISO, and other styles
5

McMahon, Michael J. "An approach for enhanced management of network-attached devices." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Müller, Thomas. "TUCSAN - Plattform für neue Speicherdienste." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700537.

Full text
Abstract:
TUCSAN ist das Speichernetzwerk (Storage Area Network) der TU Chemnitz. Es realisiert auf einem Midrange-Speichersystem und elf Raid-Systemen eine direkt nutzbare Gesamtspeicherkapazität von 83 TB. Für automatisierte Datensicherungen und Redundanz stehen weitere 104 TB zur Verfügung. Der Vortrag stellt die eingesetzte Technik und die Sturktur von TUCSAN vor. Weiterhin werden die damit realisierten Dienste präsentiert und es wird ein Ausblick auf künftige Vorhaben gegeben. Der Vortrag wurde am 10. Mai 2007 im Rahmen eines Kolloquiums zur Inbetriebnahme des TUCSAN gehalten.
APA, Harvard, Vancouver, ISO, and other styles
7

Heik, Andreas. "Managing VMware Virtual Infrastructure Environments." Universitätsbibliothek Chemnitz, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-64729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pesare, Stefano. "Sistemi di Backup e tecniche di conservazione dei dati digitali." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018.

Find full text
Abstract:
La tesi si occupa del problema della conservazione dei dati digitali, spesso sottovalutato. Le odierne tecniche e strategie di conservazione e archiviazione non possono garantire da sole la sicurezza dei dati nel tempo, ma solo se vengono utilizzate sinergicamente. Durante questo percorso capiremo cosa siano i dati digitali, le loro caratteristiche e problematiche inerenti la loro gestione, nonché le tecniche di conservazione e storage. Vedremo come si sono evolute le memorie di massa, dalle schede perforate fino alla nascita dei dischi a stato solido. Inoltre, verranno introdotti il Cloud Computing e il ventaglio di servizi che offre, compreso il Cloud Storage. Infine, si mostreranno gli algoritmi principali di compressione, utili nella gestione dei dati.
APA, Harvard, Vancouver, ISO, and other styles
9

Muppalaneni, Nitin. "Adaptive Hierarchical RAID." Thesis, 1998. http://etd.iisc.ernet.in/handle/2005/2171.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Storage Area Network (SAN) management"

1

Orlando, Karen. SAN Storage Performance Management Using Tivoli Storage Productivity Center. Poughkeepsie, NY: IBM, International Technical Support Organization, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sollbach, Wolfgang. Storage area networks: Hohe Datenverfügbarkeit durch Speichernetzwerke ; [network attached storage]. München [u.a.]: Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Securing storage: A practical guide to SAN and NAS security. Indianapolis, IN: Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

International Workshop on Storage Network Architecture and Parallel I/Os (4th 2007 San Diego, Calif.). SNAPI 2007: Fourth International Workshop on Storage Network Architecture and Parallel I/Os in conjunction with 24th IEEE Conference on Mass Storage Systems and Technologies : proceedings : 24 September 2007, San Diego, California, USA. Los Alamitos, CA: IEEE Computer Society, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maximilien, E. Michael. Service-Oriented Computing: ICSOC 2010 International Workshops, PAASC, WESOA, SEE, and SOC-LOG, San Francisco, CA, USA, December 7-10, 2010, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

ICSOC 2010 (2010 San Francisco, Calif.). Service-oriented computing: 8th international conference, ICSOC 2010, San Francisco, CA, USA, December 7-10, 2010 : proceedings. Berlin: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Redbooks, IBM. Introduction to Storage Area Network, SAN. Ibm, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Storage Security: Protecting, SANs, NAS and DAS. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Margaret Romao Toigo (illustrator) (Illustrator), ed. The Holy Grail of Network Storage Management. Prentice Hall, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Toigo, Jon William. The Holy Grail of Network Storage Management. Prentice Hall PTR, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Storage Area Network (SAN) management"

1

Zhang, Tao, Fuxing Zhang, Hongtao Lei, Rui Wang, Kaiwen Li, Yang Chen, and Yonghua Gui. "Multiple Source-Load-Storage Cooperative Optimization of Energy Management for Energy Local Area Network Systems." In Energy Internet, 355–80. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45453-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Jinlei, Xiaomeng Huang, Yongwei Wu, and Guangwen Yang. "Campus Cloud Storage and Preservation." In Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing, 284–301. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2854-0.ch012.

Full text
Abstract:
We are now living in the era of big data. The large volume of data raises a lot of issues related to data storage and management, stimulating the emergence of Cloud storage. Unlike traditional storage systems such as SAN (Storage Area Network) and NAS (Network Attached Storage), Cloud storage is delivered over a network and has such features as easy to scale and easy to manage. With Cloud storage shielding complex technical details such as storage capacity, data location, data availability, reliability and security, users can then concentrate on their business rather than IT (Information Technology) system maintenance. However, it is not an easy task to develop a Cloud storage system because multiple factors are involved. In this chapter, the authors show their experience in the design and implementation of a Cloud storage system. They detail its key components, namely the distributed file system Carrier and the data sharing service Corsair. A case study is also given on its application at Tsinghua University.
APA, Harvard, Vancouver, ISO, and other styles
3

Rogers, Lawrence D. "Network Data and Storage Management Techniques." In Local Area Network, 571–86. Auerbach Publications, 2020. http://dx.doi.org/10.1201/9781003069393-c49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Storage Area Network (SAN) Extension for Disaster Recovery." In Handbook of Fiber Optic Data Communication, 535–36. Elsevier, 2008. http://dx.doi.org/10.1016/b978-012374216-2.50029-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lloyd, Scott J., Joan Peckham, Jian Li, and Qing (Ken) Yang. "Simultaneous Database Backup Using TCP/IP and a Specialized Network Interface Card." In Advances in Database Research, 108–29. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-471-2.ch004.

Full text
Abstract:
Data play an essential role in business today. Most, if not all, e-business applications are database driven, and data backup is a necessary element of managing data. Backup and recovery techniques have always been critical to any database and as real-time databases are used more often, real-time online backup strategies become critical to optimize performance. In this chapter, current backup methods are discussed and evaluated for response time and cost. A prototype device driver, RORIB (Real-time Online Remote Information Backup) is presented and discussed. An experiment is conducted comparing the performance, in terms of response time, of the prototype and several current backup strategies. RORIB provides an economic and efficient solution for real-time online remote backup. Significant improvement in response time is demonstrated using this prototype device driver when compared to other types of software driven backup protocols. Another advantage of RORIB is that the cost is negligible when compared to other hardware solutions for backup, such as Storage Area Networks (SAN) and Private Backup Networks (PBN). Additionally, this multilayered device driver uses TCP/IP, (Telecommunications Protocol/Internet Protocol) which allows the driver to be a “drop in” filter between existing hardware layers and thus reduces the implementation overhead and improves portability. Linux is used as the operating system in this experiment because of its open source nature and its similarity to UNIX. This also increases the portability of this approach. The driver is transparent to both the user and the database management system. Other potential applications and future research directions for this technology are presented. The goal of this work is to show a multifaceted approach that uses software and hardware to provide a cost effective and efficient real-time backup system for databases. This chapter explores the use of a specialized network card and corresponding software to provide service that is demonstrably better than current methods, due to cost containment, ease of operation, real time backup capabilities, or combinations of all of these. Prior to this research, the only option that approached this level of service was the use of an extremely expensive Private Backup Network (PBN) that does not adequately address the issue of obtaining real-time capabilities. Therefore, this research shows a true real-time system that is hardware and software independent and that can be used by any type of system to achieve the desired features.
APA, Harvard, Vancouver, ISO, and other styles
6

Janczewski, Lech. "Road Map to Information Security Management." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 1249–56. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch169.

Full text
Abstract:
Developments in multimedia technology and in networking offer to organizations new and more effective ways of conducting their businesses. That includes both internal as well as external contacts. Practically every business person owns a mobile phone, has PDA/laptop with wireless capabilities, and is able to communicate with colleagues/clients all over the world and from every place on the globe. As a result, well defined barriers between different organizations are becoming less and less visible. This technical progress intensifies the competing forces. In the past, an organization was directly exposed to competition located within their city or region. Now, due to easy communication, their competitor could be located on the opposite side of the globe. The advantage of using multimedia technology and networking could be accomplished only if data handled by a company are secure, that is, are available only to the authorised persons (confidentiality), represent true values (i.e., had not been changed during storage, processing, or transport), and are available on demand (availability). Thus, managing security of information becomes an obligatory part of running any modern IT system. There is not absolute IT system security. If a system is accessible by authorised people, by definition it is impossible to eliminate chances of unauthorised access. However, proper means exist to dramatically decrease the probability of occurrence of such unauthorised activities. This article illustrates the importance of proper managing in information security processes in an organization and presents a first level guidance on how to approach this problem. The most widely known document on information security is an annual Computer Crime and Security Survey (CCSS), conducted by San Francisco’s Computer Security Institute in cooperation with the FBI (CSI, 2006). It is based on responses from over 500 professionals representing all types and sizes of organizations from huge international corporations to small businesses from nationwide government agencies to small community centres. The message the survey is conveying is frightening: • Total losses for 2006 were $52,494,290 (USD) for the 313 respondents that were willing and able to estimate losses. • Losses due to virus contamination caused the most significant loss (over $15 million). • Unauthorised access to information was the second-most expensive computer crime among survey respondents. • As in previous years, virus incidents (65.2%) and insider abuse of network access (47%) were the most cited forms of attack or abuse. • The impact of the Sarbanes–Oxley Act on information security continues to be substantial. In fact, in open-ended comments, respondents noted that regulatory compliance related to information security is among the most critical security issues they face.
APA, Harvard, Vancouver, ISO, and other styles
7

Tong, Carrison K. S., and Eric T. T. Wong. "Picture Archiving and Communication System for Public Healthcare." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 1162–70. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch158.

Full text
Abstract:
For the past 100 years, film has been almost the exclusive medium for capturing, storing, and displaying radiographic images. Film is a fixed medium with usually only one set of images available. Today, the radiologic sciences are on the brink of a new age. In particular, Picture Archiving and Communication System (PACS) technology allows for a near filmless process with all of the flexibility of digital systems. PACS consists of image acquisition devices, storage archiving units, display stations, computer processors, and database management systems. These components are integrated by a communications network system. Filmless radiology is a method of digitizing traditional films into electronic files that can be viewed and saved on a computer. This technology generates clearer and easier-to-read images, allowing the patient the chance of a faster evaluation and diagnosis. The time saved may prove to be a crucial element in facilitating the patient’s treatment process. With filmless radiology, images taken from various medical sources can be manipulated to enhance resolution, increasing the clarity of the image. Images can also be transferred internally within hospital departments and externally to other locations such as the office of the patient’s doctor or medical specialist in other parts of the world. This is made possible through the picture-archiving and communication system (Dreyer, Mehta, & Thrall, 2001), which electronically captures, transmits, displays, and saves images into digital archives for use at any given time. The PACS functions as a state-of-the-art repository for long-term archiving of digital images, and includes the backup and bandwidth to safeguard uninterrupted network availability. The objective of the picture-archiving and communications system is to improve the speed and quality of clinical care by streamlining radiological service and consultation. With instant access to images from virtually anywhere, hospital doctors and clinicians can improve their work processes and speed up the delivery of patient care. Besides making film a thing of the past, the likely benefits would include reduced waiting times for images and reports, and the augmented ability of clinicians since they can get patient information and act upon it much more quickly. It also removes all the costs associated with hard film and releases valuable space currently used for storage. According to Dr. Lillian Leong, Chairman of the Radiology IT Steering Group of the Hong Kong Medical Authroity, a single hospital can typically save up to 2.5 million Hong Kong dollars (approximately US$321,000) a year in film processing cost (Intel, 2007). The growing importance of PACS on the fight against highly infectious disease such as Severe Acute Respiratory Syndrome (SARS) is also identified (Zhang & Xue, 2003). In Hong Kong, there was no PACS-related project until the establishment of Tseung Kwan O Hospital (TKOH) in 1998. The TKOH is a 600-bed acute hospital with a hospital PACS installed for the provision of filmless radiological service. The design and management of the PACS for patient care was discussed in the first edition of this encyclopedia (Tong & Wong, 2005). The TKOH was opened in 1999 with PACS installed. At the beginning, due to immature PACS technologies, the radiology service was operating with film printing. A major upgrade was done in 2003 for the implementation of server clustering, network resilience, liquid crystal display (LCD), smart card, and storage-area-network (SAN) technologies. This upgrade has greatly improved the reliability of the system. Since November 2003, TKOH has started filmless radiology service for the whole hospital. It has become one of the first filmless hospitals in the Greater China region (Seto, Tsang, Yung, Ching, Ng, & Ho, 2003; Tsou, Goh, Kaw, & Chee, 2003).
APA, Harvard, Vancouver, ISO, and other styles
8

Bajgoric, Nijaz. "Advanced Storage Technologies for Business Continuity." In Continuous Computing Technologies for Enhancing Business Continuity, 234–53. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-160-5.ch011.

Full text
Abstract:
In addition to standard storage and traditional tape-based backup technologies explained in Chapter X, businesses employ advanced storage technologies in order to achieve higher levels of applications and data availability. Most widely used advanced storage technologies such as direct access storage (DAS), storage area network (SAN), network attached storage (NAS), RAID technology, mirroring and data replication, data vaulting, continuous data protection, and clustering are explained in Chapter XI.
APA, Harvard, Vancouver, ISO, and other styles
9

Bhardwaj, Sonam, Rochak Swami, and Mayank Dave. "Forensic Investigation-Based Framework for SDN Using Blockchain." In Revolutionary Applications of Blockchain-Enabled Privacy and Access Control, 74–98. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7589-5.ch004.

Full text
Abstract:
Software-defined networking (SDN) is a promising networking technology that provides a new way of network management to the customers. SDN provides more programmable and flexible network services. SDN breaks the vertical integration of control and data planes and promotes centralized network management. This unique characteristic of SDN offers security features to deal with the malicious activities. However, architectural design of SDN makes it vulnerable to several attacks. Therefore, it is important to investigate the crime through various forensic techniques. This work discusses a literature study of some possible forensic techniques. A framework is also presented for forensic investigation of SDN environment in attack scenario. The proposed framework includes the collection of evidence and preserves them against any damage. During investigation, protection of evidence and chain of custody are of utmost importance to avoid misleading of the investigators. The safe storage strategy as well as maintaining the custody link can be achieved through blockchain technology.
APA, Harvard, Vancouver, ISO, and other styles
10

Raman, Anupama C. "Storage Infrastructure for Big Data and Cloud." In Advances in Data Mining and Database Management, 110–28. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5864-6.ch005.

Full text
Abstract:
Unstructured data is growing exponentially. Present day storage infrastructures like Storage Area Networks and Network Attached Storage are not very suitable for storing huge volumes of unstructured data. This has led to the development of new types of storage technologies like object-based storage. Huge amounts of both structured and unstructured data that needs to be made available in real time for analytical insights is referred to as Big Data. On account of the distinct nature of big data, the storage infrastructures for storing big data should possess some specific features. In this chapter, the authors examine the various storage technology options that are available nowadays and their suitability for storing big data. This chapter also provides a bird's eye view of cloud storage technology, which is used widely for big data storage.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Storage Area Network (SAN) management"

1

Routray, Ramani, Sandeep Gopisetty, Pallavi Galgali, Amit Modi, and Shripad Nadgowda. "iSAN: Storage Area Network Management Modeling Simulation." In 2007 International Conference on Networking, Architecture, and Storage (NAS 2007). IEEE, 2007. http://dx.doi.org/10.1109/nas.2007.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Ray, and Fernando Figueroa. "Sensor Area Network (SAN) for Integrated System Health Management." In AIAA Infotech@Aerospace Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2009. http://dx.doi.org/10.2514/6.2009-2035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Yi, and Yajun Ha. "FPGA based Rekeying for cryptographic key management in Storage Area Network." In 2013 23rd International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2013. http://dx.doi.org/10.1109/fpl.2013.6645526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Wei. "Optimizing institute network storage building base on iSCSI for IP-SAN." In 2010 2nd IEEE International Conference on Information Management and Engineering. IEEE, 2010. http://dx.doi.org/10.1109/icime.2010.5477562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Shie-Yuan, Li-Min Chen, Shih-Kai Lin, and Liang-Chi Tseng. "Using SDN congestion controls to ensure zero packet loss in storage area networks." In 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 2017. http://dx.doi.org/10.23919/inm.2017.7987317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ojovan, Michael I., Natalia V. Ojóvan, Irene V. Startceva, Zoja I. Golubeva, and Alexander S. Barinov. "Modelling of the Waste Form Behaviour in a Wet Near-Surface Repository Site Over Extended Time Periods." In ASME 2001 8th International Conference on Radioactive Waste Management and Environmental Remediation. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/icem2001-1291.

Full text
Abstract:
Abstract A mathematical model was used to predict radionuclide release from bitumen and glass waste forms over extended time periods. To calculate some model parameters, we used experimental data derived from 12yr field tests with six borosilicate waste glass blocks (each ∼30 kg in weight) and a bitumen block (310 kg), containing real intermediate-level NPP operational waste (NaNO3, 86 wt.% of a dry salt content; 137Cs, 82% of the radioactive inventory). Specific radioactivities of the glass material containing 35 wt.% waste oxides were βtot(90Sr+90Y), 3.74×106 Bq/kg, and αtot(239Pu), 1.3×104Bq/kg. The bitumen block with ∼31 wt.% salt content and βtot(90Sr+90Y), 4.0·106 Bq/kg, and αtot(239Pu), 3.0×103 Bq/kg was manufactured on base of a hard bitumen BN-IV. Tests with the waste forms were performed under saturated conditions of an experimental near-surface repository with a free access of groundwater to the waste blocks through a covering of host loamy soil and backfill of coarse sand. The way used to quantify the amount of leached radioactivity was to measure the volume and radioactivity concentrations of contacting groundwater. In the model, radionuclide release from the waste glass is assumed to be controlled by the processes of diffusion limited ion exchange and glass network dissolution. The mechanism of radionuclide release from the bitumen matrix is believed to remain the same throughout the long-term storage period, except for the initial stage when an enhanced leaching from the surface layer occurs. This long-term release is assumed to be controlled by diffusion of radionuclides through the bitumen matrix. So, identical formulae were applied to calculate the values of leached radioactivity fractions for two waste forms. Radioactivity release curves were plotted for field data and calculation results. For both waste forms, there was good agreement between the modelled and available experimental data. According to the modelling results, fmax = 2.3×10−3% of the initial radioactivity will release from the waste glass into the environment within a proposed institutional control period of 300 years under conditions of the near-surface repository and in the absence of additional engineered barriers. For the bitumen block and the same 300-yr period, the total (maximum) leached radioactivity fraction will be fmax = 4.2×10−3%. The main result of the modelling and experimental studies concerning the leaching behaviour of the bituminised and vitrified waste materials is that the fractional radioactivity release for two waste forms is on the same order of magnitude. Numerical release values per a unit of a surface area to volume ratio are also rather close for two waste forms (exposed surface area to volume ratio for the bitumen block is 2 to 4 times greater then for the glass).
APA, Harvard, Vancouver, ISO, and other styles
7

Hartwell, William T., and David S. Shafer. "The Community Environmental Monitoring Program: A Model for Stakeholder Involvement in Environmental Monitoring." In The 11th International Conference on Environmental Remediation and Radioactive Waste Management. ASMEDC, 2007. http://dx.doi.org/10.1115/icem2007-7180.

Full text
Abstract:
Since 1981, the Community Environmental Monitoring Program (CEMP) has involved stakeholders directly in its daily operation and data collection, as well as in dissemination of information on radiological surveillance in communities surrounding the Nevada Test Site (NTS), the primary location where the United States (US) conducted nuclear testing until 1992. The CEMP is funded by the US Department of Energy’s National Nuclear Security Administration, and is administered by the Desert Research Institute (DRI) of the Nevada System of Higher Education. The CEMP provides training workshops for stakeholders involved in the program, and educational outreach to address public concerns about health risk and environmental impacts from past and ongoing NTS activities. The network includes 29 monitoring stations located across an approximately 160,000 km2 area of Nevada, Utah and California in the southwestern US. The principal radiological instruments are pressurized ion chambers for measuring gamma radiation, and particulate air samplers, primarily for alpha/beta detection. Stations also employ a full suite of meteorological instruments, allowing for improved interpretation of the effects of meteorological events on background radiation levels. Station sensors are wired to state-of-the-art dataloggers that are capable of several weeks of on-site data storage, and that work in tandem with a communications system that integrates DSL and wireless internet, land line and cellular phone, and satellite technologies for data transfer. Data are managed through a platform maintained by the Western Regional Climate Center (WRCC) that DRI operates for the U.S. National Oceanic and Atmospheric Administration. The WRCC platform allows for near real-time upload and display of current monitoring information in tabular and graphical formats on a public web site. Archival data for each station are also available on-line, providing the ability to perform trending analyses or calculate site-specific exposure rates. This configuration also allows for remote programming and troubleshooting of sensors. Involvement of stakeholders in the monitoring process provides a number of benefits, including increased public confidence in monitoring results, as well as decreasing costs by more than 50 percent from when the program was managed entirely by U.S. federal employees. Additionally, the CEMP provides an ideal platform for testing new environmental sensors.
APA, Harvard, Vancouver, ISO, and other styles
8

Tsai, Hanchung, Yung Y. Liu, and James Shuler. "Monitoring Critical Facilities by Using Advanced RF Devices." In ASME 2013 15th International Conference on Environmental Remediation and Radioactive Waste Management. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/icem2013-96032.

Full text
Abstract:
The ability to monitor critical environment parameters of nuclear plants at all times, particularly during and after a disruptive accident, is vital for the safety of plant personnel, rescue and recovery crews, and the surrounding communities. Conventional hard-wired assets that depend on supplied power may be decimated as a result of such events, as witnessed in the Japanese Fukushima nuclear power plant in March 2011. Self-powered monitoring devices operating on a wireless platform, on the other hand, may survive such calamity and remain functional. The devices would be prepositioned at strategic locations, particularly where the dangerous build-up of contamination and radiation may preclude subsequent manned entrance and surveillance. Equipped with sensors for β-γ radiation, neutrons, hydrogen gas, temperature, humidity, pressure, and water level, as well as with criticality alarms and imaging equipment for heat, video, and other capabilities, these devices can provide vital surveillance information for assessing the extent of plant damage, mandating responses (e.g., evacuation before impending hydrogen explosion), and enabling overall safe and efficient recovery in a disaster. A radio frequency identification (RFID)-based system — called ARG-US — may be modified and adapted for this task. Developed by Argonne for DOE, ARG-US (meaning “watchful guardian”) has been used successfully to monitor and track sensitive nuclear materials packages at DOE sites. It utilizes sensors in the tags to continuously monitor the state of health of the packaging and promptly disseminates alarms to authorized users when any of the preset sensor thresholds is violated. By adding plant-specific monitoring sensors to the already strong sensor suite and adopting modular hardware, firmware, and software subsystems that are tailored for specific subsystems of a plant, a Remote Area Modular Monitoring (RAMM) system, built on a wireless sensor network (WSN) platform, is being developed by Argonne National Laboratory. ARG-US RAMM, powered by on-board battery, can sustain extended autonomous surveillance operation during and following an incident. The benefits could be invaluable to such critical facilities as nuclear power plants, research and test reactors, fuel cycle manufacturing centers, spent-fuel dry-cask storage facilities, and other nuclear installations.
APA, Harvard, Vancouver, ISO, and other styles
9

Duckworth, Robert C., Emily Frame, Leonard S. Fifield, and Samuel W. Glass. "Benchmark Accelerated Aging of Harvested Hypalon/EPR and CSPE/XLPE Power and I&C Cable in Nuclear Power Plants." In 2016 24th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/icone24-60311.

Full text
Abstract:
As part of the Light Water Reactor and Sustainability (LWRS) program in the U.S. Department of Energy (DOE) Office of Nuclear Energy, material aging and degradation research is currently geared to support the long-term operation of existing nuclear power plants (NPPs) as they move beyond their initial 40 year licenses. The goal of this research is to provide information so that NPPs can develop aging management programs (AMPs) to address replacement and monitoring needs as they look to operate for 20 years, and in some cases 40 years, beyond their initial, licensed operating lifetimes. For cable insulation and jacket materials that support instrument, control, and safety systems, accelerated aging data are needed to determine priorities in cable aging management programs. Before accelerated thermal and radiation aging of harvested, representative cable insulation and jacket materials, the benchmark performance of a new test capability at Oak Ridge National Laboratory (ORNL) was evaluated for temperatures between 70 and 135°C, dose rates between 100 and 500 Gy/h, and accumulated doses up to 200 kGy. Samples that were characterized and are representative of current materials in use were harvested from the Callaway NPP near Fulton, Missouri, and the San Onofre NPP north of San Diego, California. From the Callaway NPP, a multiconductor control rod cable manufactured by Boston Insulated Wire (BIW), with a Hypalon/ chlorosulfonated polyethylene (CSPE) jacket and ethylene-propylene rubber (EPR) insulation, was harvested from the auxiliary space during a planned outage in 2013. This cable was placed into service when the plant was started in 1984. From the San Onofre NPP, a Rockbestos Firewall III (FRIII) cable with a Hypalon/ CSPE jacket with cross-linked polyethylene (XLPE) insulation was harvested from an on-site, climate-controlled storage area. This conductor, which was never placed into service, was procured around 2007 in anticipation of future operation that did not occur. Benchmark aging for both jacket and insulation material was carried out in air at a temperature of 125°C or in a uniform 140 Gy/h gamma field over a period of 60 days. Their mechanical properties over the course of their exposures were compared with reference data from comparable cable jacket/insulation compositions and aging conditions. For both accelerated thermal and radiation aging, it was observed that the mechanical properties for the Callaway BIW control rod cable were consistent with those previously measured. However, for the San Onofre Rockbestos FRIII, there was an observable functional difference for accelerated thermal aging at 125°C. Details on possible sources for this difference and plans for resolving each source are given in this paper.
APA, Harvard, Vancouver, ISO, and other styles
10

Jawaharlal, Mariappan, Gustavo Vargas, and Lorenzo Gutierrez. "The Plant Kingdom in Engineering Design: Learning to Design From Trees." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-72497.

Full text
Abstract:
A tree may be the earliest multifunctional structure, and wood is the oldest known engineering material. Yet, trees have no place in engineering education. If we view a tree from merely a mechanical or civil engineering perspective, engineering mechanics can be learned from the tree’s example. Trees have survived by adapting to the most difficult circumstances: heavy winds, rains, floods, droughts, earthquakes, mammal damage, human intervention, etc. The root system must be strong and flexible enough to support the tree’s entire structure from varying load conditions and to provide food storage and nutrient transfer. The stem system provides structural support for the tree’s above-the-ground parts and transfers water and nutrients from the roots through the network of thick-walled cells to other parts of the tree. Leaves produce food and form the surface area surrounding the tree. Leaves come in a variety of shapes and sizes. The tree’s crown, comprising branches, leaves, and reproductive elements, help the tree to catch more sunlight. It moves upward and outward to expose more of its leaves to direct sunlight for photosynthesis while maintaining physical balance on the earth. A tree’s lifecycle can span hundreds of years, despite its vulnerability to constantly changing loads throughout the day and throughout its life. In monsoon and windy seasons, trees endure extremely difficult fatigue-loading. Various parts of the tree and its stem are subjected to combined loading conditions: tension, compression, shear, bending, and torsion. Trees develop and adapt stress management strategies by adjusting their shapes to the type or level of stress they endure: they add more mass where more strength is needed, allows material to easily break off (or physiologically inactive) from locations where it is not necessary, design optimum shapes, and create variable notch radii for reducing stress concentration. But a tree is much more than a structural member. It provides food and shelter for wildlife. It absorbs atmospheric carbon dioxide and produces oxygen. It lowers air temperature and facilitates the water cycle. Structural analysis of a tree can benefit engineering students and practicing engineers alike. Furthermore, a deeper understanding of trees can help us to create multifunctional designs that are in a symbiotic relationship with other members in the system. In short, studying tree mechanics can help us to become better engineers. This paper presents our efforts to integrate trees into engineering curricula to teach mechanics ranging from equilibrium study to stress analysis. Students of statics, dynamics, the strength of materials, stress analysis, material science, design, etc., can benefit from learning about trees. This approach enables students to understand the complexities of real-world living systems, appreciate the genius of nature’s design, and develop methods for creating sustainable designs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography