To see the other types of publications on this topic, follow the link: Storage Area Network (SAN).

Dissertations / Theses on the topic 'Storage Area Network (SAN)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 31 dissertations / theses for your research on the topic 'Storage Area Network (SAN).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Hajirostam, Siavash. "Evaluation of Storage Area Network (SAN) security and performance." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-24142.

Full text
Abstract:
Due to growing the number of Information Technology (IT) users all around the world, consequently the amount of data that needs to be stored is increasing day by day. Single attached disks and old storage technologies cannot manage the storing these amounts of data. Storage Area Network (SAN) is a distributed storage technology to manage the data from several nodes in centralize place and secure. This thesis investigates how SAN works, the file system  and protocols that are used in implementation of SAN. The thesis also investigate about other storages technologies such as Network Attached Storage (NAS) and Direct Attached Storage (DAS) to figure out the advantages and disadvantages of SAN, The main focus of the thesis project is on identifying the security vulnerabilities in SAN such as possible attacks in different SAN protocols. The thesis finally identifies the performance factors in SAN to figure out how to improve the performance with respect to security solutions aimed to enhance the security level in SAN.
APA, Harvard, Vancouver, ISO, and other styles
2

Altaf, Moaz. "SMI-S for the Storage Area Network (SAN) Management." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6125.

Full text
Abstract:
The storage vendors have their own standards for the management of their storage resources but it creates interoperability issues on different storage products. With the recent advent of the new protocol named Storage Management Initiative-Specification (SMI-S), the Storage Networking Industry Association (SNIA) has taken a major step in order to make the storage management more effective and organized. SMI-S has replaced its predecessor Storage Network Management Protocol (SNMP) and it has been categorized as an ISO standard. The main objective of the SMI-S is to provide interoperability management of the heterogeneous storage vendor systems by unifying the Storage Area Network (SAN) management, hence making the dreams of the network managers come true. SMI-S is a guide to build systems using modules that ‘plug’ together. SMI-S compliant storage modules that use CIM ‘language’ and adhere to CIM schema interoperate in a system regardless of which vendor built them. SMI-S is object-oriented, any physical or abstract storage-related elements can be defined as a CIM object. SMI-S can unify the SAN management systems and it works well with the heterogeneous storage environment. SMI-S has offered a cross-platform, cross-vendor storage resource management. This thesis work discusses the use of SMI-S at Compuverde which is a storage solution provider, located in the heart of the Karlskrona, the southeastern part of Sweden. Compuverde was founded by Stefan Bernbo in Karlskrona,Sweden. Just like all others leading storage providers, Compuverde has also decided to deploy the Storage Management Initiative-Specification (SMI-S) to manage their Storage Area Network (SAN) and to achieve interoperability. This work was done to help Compuverde to deploy the SMI-S protocol for the management of the Storage Area Network (SAN) which, among many of its features, would create alerts/traps in case of a disk failure in the SAN. In this way, they would be able to keep the data of their clients, safe and secure and keep their reputation for being reliable in the storage industry. Since Compuverde regularly use Microsoft Windows and Microsoft have started to support SMI-S for storage provisioning in System Center 2012 Virtual Machine Manager (SCVMM), this work was done using the SCVMM 2012 and the Windows Server 2012.The SMI-S provider which was used for this work was QNAP TS- 469 Pro.<br>0764354242
APA, Harvard, Vancouver, ISO, and other styles
3

Glöckner, Alexander. "Fibre Channel im Einsatz in Storage Area Networks (SAN)." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100511.

Full text
Abstract:
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur "Rechnernetze und verteilte Systeme" der Fakultaet fuer Informatik der TU Chemnitz. Workshop-Thema: Mobilitaet Dieser Vortrag beschreibt neue Techniken zum Speichern grosser Datenmenge, auch über grosse Entfernungen hinweg.
APA, Harvard, Vancouver, ISO, and other styles
4

Müller, Thomas. "TUCSAN - Plattform für neue Speicherdienste." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700537.

Full text
Abstract:
TUCSAN ist das Speichernetzwerk (Storage Area Network) der TU Chemnitz. Es realisiert auf einem Midrange-Speichersystem und elf Raid-Systemen eine direkt nutzbare Gesamtspeicherkapazität von 83 TB. Für automatisierte Datensicherungen und Redundanz stehen weitere 104 TB zur Verfügung. Der Vortrag stellt die eingesetzte Technik und die Sturktur von TUCSAN vor. Weiterhin werden die damit realisierten Dienste präsentiert und es wird ein Ausblick auf künftige Vorhaben gegeben. Der Vortrag wurde am 10. Mai 2007 im Rahmen eines Kolloquiums zur Inbetriebnahme des TUCSAN gehalten.
APA, Harvard, Vancouver, ISO, and other styles
5

Kalibjian, Jeff. "Storage Systems and Security Challenges in Telemetry Post Processing Environments." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606206.

Full text
Abstract:
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California<br>A common concern in telemetry post-processing environments is adequate disk storage capacity to house captured and post-processed telemetry data. In today's network environments there are many storage solutions that can be deployed to address storage needs. Recent trends in storage systems reveal movement to implement security services in storage systems. After reviewing storage options appropriate for telemetry post-processing environments; the security services such systems typically offer will also be discussed and contrasted with other third party security services that might be implemented directly on top of a networked storage system.
APA, Harvard, Vancouver, ISO, and other styles
6

Heik, Andreas. "Managing VMware Virtual Infrastructure Environments." Universitätsbibliothek Chemnitz, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-64729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ziegler, Christoph, Matthias Clauß, Thomas Müller, Frank Richter, and Wolfgang Riedel. "Mitteilungen des URZ 4/2006." Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200602057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Knobloch, DI Ralf. "Storage Area Networks." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pease, David A. "Storage tank: a storage area network file system /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2008. http://uclibs.org/PID/11984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chou, Tahsin. "Storage Reduction for Distributed disk-Based Backup in Storage Area Network." NSUWorks, 2006. http://nsuworks.nova.edu/gscis_etd/452.

Full text
Abstract:
For many organizations today, data is their most important asset. How to safeguard the data in this dynamic environment is an important issue in any organization. The backup process is cumbersome in large organizations. Typically, the backup saves files from a network client to a remote storage location on a daily basis. This means that the same file, often in multiple versions, is saved and stored many times, resulting in excessive storage. A distributed disk-based backup system collects the data to be backed up from network clients and stores files remotely on multiple storage locations in the network. In recent years, Storage Area Network (SAN) has become a popular solution to effectively store or access huge amounts of enterprise information. A SAN is a dedicated storage network designed specifically to connect storage, backup devices, and servers. By consolidating storage in one location, customers benefit from efficiencies of management, utilization, and reliability. Since there is no end in sight to the exponential growth of enterprise data, storage reduction technology plays an important role in enterprise backup. The goal of this study is to investigate how to effectively reduce storage usage through a distributed disk-based backup system in a SAN. The working name for the distributed backup system used for this study is SAN-Backup system. In SAN-Backup system, the backup storage reduction can be made at file level, block level, and backup catalog level. The design and development of this distributed disk-based backup system utilized a phased approach. The prototype of SAN-Backup system was validated through enterprise backup environments. The validation process included backup storage usage and backup performance comparisons between a backup application with an embedded storage reduction technology and a backup application without an embedded storage reduction technology both running in a SAN. The test results showed that SAN-Backup system reduced storage usage by 55.9% when compared to Backup Express Enterprise backup system, and also improved the overall backup performance by 43.74%. The test results indicated that SAN-Backup system did significantly reduce the backup storage usage and also improved the backup performance.
APA, Harvard, Vancouver, ISO, and other styles
11

Thomson, Susan Elizabeth. "A storage service for structured data." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ozkan, Siragan, Bryan Zimmerman, Mike Williams, and Monica DeShong. "APPLICATION OF A STORAGE AREA NETWORK IN A HIGHRATE TELEMETRY GROUND STATION." International Foundation for Telemetering, 2001. http://hdl.handle.net/10150/607573.

Full text
Abstract:
International Telemetering Conference Proceedings / October 22-25, 2001 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>A traditional Front-end Processor (FEP) with local RAID storage can limit the operational throughput of a high-rate telemetry ground station. The Front-end processor must perform pass processing (frame synchronization, decoding, routing, and storage), post-pass processing (level-zero processing), and tape archiving. A typical fifteen minute high-rate satellite pass can produce data files of 10 to 20 GB. The FEP may require up to 2 hours to perform the post-pass processing and tape archiving functions for these size files. During this time, it is not available to support real-time pass operations. Honeywell faced this problem in the design of the data management system for the DataLynx ä* ground stations. Avtec Systems, Inc. and Honeywell worked together to develop a data management system that utilizes a Storage Area Network (SAN) in conjunction with multiple High-speed Front-end Processors (HSFEP) for Pass Processing (PFEP), multiple HSFEPs for Post-pass Processing (PPFEP), and a dedicated Tape Archive server. A SAN consists of a high-capacity, high-bandwidth shared RAID that is connected to multiple nodes using 1 Gbps Fibre Channel interfaces. All of the HSFEPs as well as the Tape Archive server have direct access to the shared RAID via a Fibre Channel network. The SAN supports simultaneous read/write transfers between the nodes at aggregate rates up to 120 Mbytes/sec. With the Storage Area Network approach, the High-Speed Front-end Processors can quickly transfer the data captured during a pass to the shared RAID for post-processing and tape archiving so that they are available to support another satellite pass. This paper will discuss the architecture of the Storage Area Network and how it optimizes ground station data management in a high-rate environment.
APA, Harvard, Vancouver, ISO, and other styles
13

McMahon, Michael J. "An approach for enhanced management of network-attached devices." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Gatton, Tim. "Using Telemetry Front-end Equipment and Network Attached Storage Connected to Form a Real-time Data Recording and Playback System." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605316.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California<br>The use of traditional telemetry decommutation equipment can be easily expanded to create a real-time pulse code modulation (PCM) telemetry data recorder. However, there are two areas that create unique demands where architectural investment is required: the PCM output stage and the storage stage. This paper details the efforts to define the requirements and limits of a traditional telemetry system when used as a real-time, multistream PCM data recorder with time tagging.
APA, Harvard, Vancouver, ISO, and other styles
15

Munishwar, Vikram P. "Storage and indexing issues in sensor networks." Diss., Online access via UMI:, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Pesare, Stefano. "Sistemi di Backup e tecniche di conservazione dei dati digitali." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018.

Find full text
Abstract:
La tesi si occupa del problema della conservazione dei dati digitali, spesso sottovalutato. Le odierne tecniche e strategie di conservazione e archiviazione non possono garantire da sole la sicurezza dei dati nel tempo, ma solo se vengono utilizzate sinergicamente. Durante questo percorso capiremo cosa siano i dati digitali, le loro caratteristiche e problematiche inerenti la loro gestione, nonché le tecniche di conservazione e storage. Vedremo come si sono evolute le memorie di massa, dalle schede perforate fino alla nascita dei dischi a stato solido. Inoltre, verranno introdotti il Cloud Computing e il ventaglio di servizi che offre, compreso il Cloud Storage. Infine, si mostreranno gli algoritmi principali di compressione, utili nella gestione dei dati.
APA, Harvard, Vancouver, ISO, and other styles
17

Bergenhem, Carl, and Magnus Jonsson. "Two Protocols with Heterogeneous Real-Time Services for High-Performance Embedded Networks." Högskolan i Halmstad, Centrum för forskning om inbyggda system (CERES), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21296.

Full text
Abstract:
High-performance embedded networks are found in computer systems that perform applications such as radar signal processing and multimedia rendering. The system can be composed of multiple computer nodes that are interconnected with the network. Properties of the network such as latency and speed affect the performance of the entire system. A node´s access to the network is controlled by a medium access protocol. This protocol decides e.g. real-time properties and services that the network will offer its users, i.e. the nodes. Two such network protocols with heterogeneous real-time services are presented. The protocols offer different communication services and services for parallel and distributed real-time processing. The latter services include barrier synchronisation, global reduction and short message service. A network topology of a unidirectional pipelined optical fibre-ribbon ring is assumed for both presented protocols. In such a network several simultaneous transmissions in non-overlapping segments are possible. Both protocols are aimed for applications that require a high-performance embedded network such as radar signal processing and multimedia. In these applications the system can be organised as multiple interconnected computation nodes that co-operate in parallel to achieve higher performance. The computing performance of the whole system is greatly affected by the choice of network. Computing nodes in a system for radar signal processing should be tightly coupled, i.e., communications cost, such as latency, between nodes should be small. This is possible if a suitable network with an efficient protocol is used. The target applications have heterogeneous real-time requirements for communication in that different classes of data-traffic exist. The traffic can be classified according to its requirements. The proposed protocols partition data-traffic into three classes with distinctly different qualities. These classes are: traffic with hard real-time demands, such as mission critical commands; traffic with soft real-time demands, such as application data (a deadline miss here only leads to decreased performance); and traffic with no real-time constraints at all. The protocols are analysed and performance is tested through simulation with different data-traffic patterns.
APA, Harvard, Vancouver, ISO, and other styles
18

Ghostine, Rony. "Influence des fautes transitoires sur la fiabilité d'un système contrôlé en réseau." Thesis, Vandoeuvre-les-Nancy, INPL, 2008. http://www.theses.fr/2008INPL023N/document.

Full text
Abstract:
Ce travail s'inscrit dans le cadre de l'évaluation de la sûreté de fonctionnement des systèmes commandés en réseau (SCR). La capacité des systèmes de commandes à compenser les effets de certaines défaillances de composants amène à redéfinir le concept de défaillances du système. La conséquence est que l'évaluation de la fiabilité prévisionnelle du système est dépendante de l'évaluation fonctionnelle et devient impossible avec les méthodes traditionnelles de la sûreté de fonctionnement. Pour surmonter ces difficultés, une approche basée sur la modélisation en vue de la simulation est proposée. Nous avons choisi les Réseaux d'activités stochastiques (SAN) largement connus dans la modélisation des protocoles de communication ainsi que dans les études de la sûreté de fonctionnement. Dans un premier temps, nous avons cherché à identifier l'incidence de deux types de défaillances fugitives : la perte d'un échantillon d'une part et le retard d'un échantillon dans la boucle de régulation d'autre part. Après, nous simulons le comportement en présence des deux types de perturbations simultanément, mettant en évidence des effets cumulatifs. Si on tient compte maintenant du fait que l'origine des pertes ou retards est due à la présence du réseau, il faut l'introduire dans le modèle. On introduit alors dans le modèle global du système la représentation SAN d'un réseau CAN et l'injection des défaillances dans celui-ci. La méthode de Monte Carlo est utilisée pour estimer les indicateurs de sûreté de fonctionnement et on montre l'influence de certains facteurs comme la charge du réseau par exemple. Nous avons proposé une méthode et les outils associés pour approcher cette évaluation par simulation et ainsi apporter une aide à la conception des systèmes satisfaisant à des exigences critiques sur certains paramètres de performance<br>Achieved work in this thesis deals with dependability evaluation of networked controlled system (NCS). The ability of control system to offset the effects of some components’ failure leads to redefine the concept of system failure. Consequently the reliability evaluation is dependent on functional parameters and becomes impossible with traditional dependability methods. This work aims at bringing a contribution relative to this aspect. To overcome these difficulties, an approach based on both modelling and simulation is proposed. We choose to work with stochastic activity network (SAN) widely used in modelling communication protocols as well as in dependability studies. First we sought to identify the incidence of two types of transient faults: loss of samples and delay within the control loop. Next we simulate the behaviour in the presence of two types of disturbances at the same time highlighting the cumulative effects. In fact the origin of the loss or delay information inside the control loop is due to the presence of the network, this aspect must be taken into account, that is why we introduce a new model representing the Controller Area Network (CAN) and injection of possible perturbations. Monte-Carlo method is used to estimate dependability parameters showing the influence of some factors such as network load for example. We have proposed a method and associated tools to approach this evaluation by simulation and thus provide assistance in designing systems to meet requirements on certain performance parameters
APA, Harvard, Vancouver, ISO, and other styles
19

Clauß, Matthias, Thomas Müller, Frank Richter, and Wolfgang Riedel. "Mitteilungen des URZ 2/2007." Universitätsbibliothek Chemnitz, 2007. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200700611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ghostine, Rony. "Influence des fautes transitoires sur la fiabilité d'un système contrôlé en réseau." Electronic Thesis or Diss., Vandoeuvre-les-Nancy, INPL, 2008. http://www.theses.fr/2008INPL023N.

Full text
Abstract:
Ce travail s'inscrit dans le cadre de l'évaluation de la sûreté de fonctionnement des systèmes commandés en réseau (SCR). La capacité des systèmes de commandes à compenser les effets de certaines défaillances de composants amène à redéfinir le concept de défaillances du système. La conséquence est que l'évaluation de la fiabilité prévisionnelle du système est dépendante de l'évaluation fonctionnelle et devient impossible avec les méthodes traditionnelles de la sûreté de fonctionnement. Pour surmonter ces difficultés, une approche basée sur la modélisation en vue de la simulation est proposée. Nous avons choisi les Réseaux d'activités stochastiques (SAN) largement connus dans la modélisation des protocoles de communication ainsi que dans les études de la sûreté de fonctionnement. Dans un premier temps, nous avons cherché à identifier l'incidence de deux types de défaillances fugitives : la perte d'un échantillon d'une part et le retard d'un échantillon dans la boucle de régulation d'autre part. Après, nous simulons le comportement en présence des deux types de perturbations simultanément, mettant en évidence des effets cumulatifs. Si on tient compte maintenant du fait que l'origine des pertes ou retards est due à la présence du réseau, il faut l'introduire dans le modèle. On introduit alors dans le modèle global du système la représentation SAN d'un réseau CAN et l'injection des défaillances dans celui-ci. La méthode de Monte Carlo est utilisée pour estimer les indicateurs de sûreté de fonctionnement et on montre l'influence de certains facteurs comme la charge du réseau par exemple. Nous avons proposé une méthode et les outils associés pour approcher cette évaluation par simulation et ainsi apporter une aide à la conception des systèmes satisfaisant à des exigences critiques sur certains paramètres de performance<br>Achieved work in this thesis deals with dependability evaluation of networked controlled system (NCS). The ability of control system to offset the effects of some components’ failure leads to redefine the concept of system failure. Consequently the reliability evaluation is dependent on functional parameters and becomes impossible with traditional dependability methods. This work aims at bringing a contribution relative to this aspect. To overcome these difficulties, an approach based on both modelling and simulation is proposed. We choose to work with stochastic activity network (SAN) widely used in modelling communication protocols as well as in dependability studies. First we sought to identify the incidence of two types of transient faults: loss of samples and delay within the control loop. Next we simulate the behaviour in the presence of two types of disturbances at the same time highlighting the cumulative effects. In fact the origin of the loss or delay information inside the control loop is due to the presence of the network, this aspect must be taken into account, that is why we introduce a new model representing the Controller Area Network (CAN) and injection of possible perturbations. Monte-Carlo method is used to estimate dependability parameters showing the influence of some factors such as network load for example. We have proposed a method and associated tools to approach this evaluation by simulation and thus provide assistance in designing systems to meet requirements on certain performance parameters
APA, Harvard, Vancouver, ISO, and other styles
21

Ghostine, Rony. "Influence des fautes transitoires sur la fiabilité d'un système commandé en réseau." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2008. http://tel.archives-ouvertes.fr/tel-00320185.

Full text
Abstract:
Ce travail s'inscrit dans le cadre de l'évaluation de la sûreté de fonctionnement des systèmes commandés en réseau (SCR). La capacité des systèmes de commandes à compenser les effets de certaines défaillances de composants amène à redéfinir le concept de défaillances du système. La conséquence est que l'évaluation de la fiabilité prévisionnelle du système est dépendante de l'évaluation fonctionnelle et devient impossible avec les méthodes traditionnelles de la sûreté de fonctionnement. Pour surmonter ces difficultés, une approche basée sur la modélisation en vue de la simulation est proposée. Nous avons choisi les Réseaux d'activités stochastiques (SAN) largement connus dans la modélisation des protocoles de communication ainsi que dans les études de la sûreté de fonctionnement. Dans un premier temps, nous avons cherché à identifier l'incidence de deux types de défaillances fugitives : la perte d'un échantillon d'une part et le retard d'un échantillon dans la boucle de régulation d'autre part. Après, nous simulons le comportement en présence des deux types de perturbations simultanément, mettant en évidence des effets cumulatifs. Si on tient compte maintenant du fait que l'origine des pertes ou retards est due à la présence du réseau, il faut l'introduire dans le modèle. On introduit alors dans le modèle global du système la représentation SAN d'un réseau CAN et l'injection des défaillances dans celui-ci. La méthode de Monte Carlo est utilisée pour estimer les indicateurs de sûreté de fonctionnement et on montre l'influence de certains facteurs comme la charge du réseau par exemple. Nous avons proposé une méthode et les outils associés pour approcher cette évaluation par simulation et ainsi apporter une aide à la conception des systèmes satisfaisant à des exigences critiques sur certains paramètres de performance.
APA, Harvard, Vancouver, ISO, and other styles
22

Muppalaneni, Nitin. "Adaptive Hierarchical RAID." Thesis, 1998. http://etd.iisc.ac.in/handle/2005/2171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Muppalaneni, Nitin. "Adaptive Hierarchical RAID." Thesis, 1998. http://etd.iisc.ernet.in/handle/2005/2171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Lin, Changchih, and 林昌志. "High Availability Architecture of Storage Area Network." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/98340470299995446019.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>100<br>With the development of the cloud computing technique, there is now one more choice for baking up data. Although the cloud storage service offers much to the users in terms of convenience and resource space saving, is it secure enough for the business enterprises if important data or business confidential information are stored in such an uncontrollable facility? Given this problem, business enterprises are more receptive to the method of storing important data or confidential information in a storage sever which is under their management and supervision. Hence, for many business enterprises, the standby mechanism of the storage host and the consistency of data are particularly important. This thesis studies the high-availability fault-tolerance standby mechanism of the LAN host during the disaster recovery process, and employs two VMs by virtualization technology and install relation softwares to simulate the storage area network (SAN) operations and to implement the disaster recovery drills, thereby verifying the high availability of the system architecture.
APA, Harvard, Vancouver, ISO, and other styles
25

Murphy, Matthew R. Harvey Bruce A. "ISCSI-based storage area network for disaster." Diss., 2005. http://etd.lib.fsu.edu/theses/available/etd-04082005-134722.

Full text
Abstract:
Thesis (M.S.)--Florida State University, 2005.<br>Advisor: Dr. Bruce A. Harvey, Florida State University, College of Engineering, Dept. of Electrical and Computer Engineering. Title and description from dissertation home page (viewed June 10, 2005). Document formatted into pages; contains vii, 73 pages. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
26

"A quasi-static routing scheme for cross-connected storage area network." 2001. http://library.cuhk.edu.hk/record=b5890845.

Full text
Abstract:
Yang Qin.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2001.<br>Includes bibliographical references (leaves [65]-[67]).<br>Abstracts in English and Chinese.<br>Chapter 1 --- Introduction --- p.1<br>Chapter 1.1 --- Thesis Overview --- p.7<br>Chapter 2 --- Storage Area Network(SAN) --- p.9<br>Chapter 2.1 --- Fibre Channel Protocol --- p.11<br>Chapter 2.2 --- Switched Fibre Channel SAN --- p.16<br>Chapter 2.2.1 --- Cascaded Topology --- p.17<br>Chapter 2.2.2 --- Meshed Topology --- p.17<br>Chapter 2.2.3 --- Cross-Connected Topology --- p.19<br>Chapter 2.2.4 --- Routing Scheme in Cross-Connected SAN --- p.21<br>Chapter 3 --- Path Switching --- p.24<br>Chapter 3.1 --- Cross-path Switching Principle --- p.24<br>Chapter 3.2 --- Capacity Assignment --- p.28<br>Chapter 3.3 --- Route Assignment --- p.31<br>Chapter 4 --- Path Switching in Cross-Connected SAN --- p.34<br>Chapter 4.1 --- Path Switching in SAN --- p.34<br>Chapter 4.1.1 --- Connectionless Traffic --- p.36<br>Chapter 4.1.2 --- Connection-Oriented Traffic --- p.39<br>Chapter 4.1.3 --- Mixed Traffic --- p.47<br>Chapter 4.2 --- Measurement Based Algorithm --- p.53<br>Chapter 4.3 --- Repetition Rate --- p.59<br>Chapter 5 --- Conclusion --- p.63
APA, Harvard, Vancouver, ISO, and other styles
27

"Switching considerations in storage networks." 2003. http://library.cuhk.edu.hk/record=b5891724.

Full text
Abstract:
by Leung Yiu Tong.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.<br>Includes bibliographical references (leaves 96-98).<br>Abstracts in English and Chinese.<br>Chapter 1. --- Introduction --- p.1<br>Chapter 1.1 --- Motivation --- p.1<br>Chapter 1.2 --- Thesis Organization --- p.3<br>Chapter 2. --- Storage Network Fundamentals --- p.4<br>Chapter 2.1 --- Storage Network Topology --- p.4<br>Chapter 2.1.1 --- Direct Attached Storage (DAS) --- p.5<br>Chapter 2.1.2 --- Network Attached Storage (NAS) --- p.7<br>Chapter 2.1.3 --- Storage Area Network (SAN) --- p.9<br>Chapter 2.1.3.1 --- SAN and the Fibre Channel Protocol --- p.11<br>Chapter 2.1.4 --- Summary on Storage Network Topology --- p.12<br>Chapter 2.2 --- Storage Protocol --- p.15<br>Chapter 2.2.1 --- Fibre Channel --- p.15<br>Chapter 2.2.1.1 --- Fibre Channel over IP (FCIP) --- p.17<br>Chapter 2.2.1.2 --- Internet Fibre Channel Protocol (iFCP) --- p.19<br>Chapter 2.2.2 --- Internet SCSI (iSCSI) --- p.20<br>Chapter 2.2.3 --- InfiniBand --- p.22<br>Chapter 2.2.4 --- Review on Storage Network Protocol --- p.25<br>Chapter 2.3 --- Standard Organization --- p.27<br>Chapter 2.4 --- Summary --- p.28<br>Chapter 3. --- Switching Design for Storage Networks --- p.30<br>Chapter 3.1. --- Shared Bus Design --- p.32<br>Chapter 3.2. --- Time Division Switch --- p.36<br>Chapter 3.3. --- Share Buffer Memory Switch --- p.37<br>Chapter 3.3.1 --- Parallel Memory Array --- p.40<br>Chapter 3.3.2 --- Distributive Storage --- p.43<br>Chapter 3.4. --- Crossbar Switch --- p.45<br>Chapter 3.4.1 --- Arbitrated Crossbar vs. Buffered Crossbar --- p.46<br>Chapter 3.4.1.1 --- Arbitrated Crossbar Switch --- p.47<br>Chapter 3.4.1.2 --- Buffered Crossbar Switch --- p.48<br>Chapter 3.4.2 --- Switch Scheduling --- p.49<br>Chapter 3.4.2.1 --- Bipartite Matching --- p.50<br>Chapter 3.4.2.2 --- Token-based Distributive Scheduling --- p.53<br>Chapter 3.4.2.3 --- Resource Counting using Semaphore --- p.56<br>Chapter 3.5. --- Algebraic Switches --- p.60<br>Chapter 3.5.1 --- Switching by Conditionally Nonblocking Properties --- p.61<br>Chapter 3.5.2 --- Self-Routing Mechanism with Zero-Bit Buffering --- p.64<br>Chapter 3.5.3 --- Multistage Interconnection of Self-routing Concentrators --- p.69<br>Chapter 3.6. --- Summary --- p.73<br>Chapter 4. --- Investigating Switching Issue in Storage Networks --- p.74<br>Chapter 4.1 --- Choosing a Suitable Switch --- p.74<br>Chapter 4.2 --- Quality of Service (QoS) --- p.76<br>Chapter 4.3 --- Multicasting --- p.77<br>Chapter 4.3.1 --- Crossbar Switch --- p.78<br>Chapter 4.3.2 --- Shared-Buffer Memory Switches --- p.80<br>Chapter 4.3.3 --- Algebraic Switch --- p.82<br>Chapter 4.3.4 --- Application on Multicast Transmission --- p.86<br>Chapter 4.4 --- Load Balancing Mechanism --- p.87<br>Chapter 4.5 --- Optimization on Storage Utilization --- p.91<br>Chapter 4.6 --- Summary --- p.93<br>Chapter 5. --- Conclusion and Summary of Original Contributions --- p.94
APA, Harvard, Vancouver, ISO, and other styles
28

Chiang, Chun-Chen, and 姜俊成. "An architecture of Storage Area Network for Disaster Recovery- From perspective of Banking Industry." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/7p3j64.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊管理學系碩士在職專班<br>97<br>For achieving the goal of business continuity, while the enterprise happens to disaster or destruction, which results in that the critical or central information systems could not offer its service. A remote backup system not only can immediately replace or take over the original online system, but also ensure the integrity of information for the purpose of availability and integrity of information. Fiber Cable Storage Area Network (FC SAN) infrastructure for remote backup technology is currently the mainstream. However, the previous researches were focused on part of the technological issue. Thus, explore how to plan remote backup under SAN architecture for considering all factors and technical options is expected and needed. Therefore, the aim of this research is to build a decision-making model for evaluating SAN remote backup alternatives from the perspective of Taiwan’s banking industry. The results of this research include a set of SAN remote backup alternatives of the system architecture and a decision-making model for evaluating these alternatives. We acquire the research architecture for SAN remote backup, assessment criteria and technical options by literature review. And then, through Delphi method, we have 16 alternatives of remote backup technology suitable for banks. Ongoing a survey for the 16 alternatives by four bank staffs shows that the Alternative I is the most appropriate technical solution. This decision-making model can help to improve and enhance the already built SAN remote backup architecture, and to plan an effective SAN remote backup architecture for banks by vendors.
APA, Harvard, Vancouver, ISO, and other styles
29

Hsu, Hsiu-Lien, and 許秀蓮. "The Co-opetition Strategy of High Tech Industries: A Case Study of a Leading Firm from Storage Area Network Industry." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/75hgad.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊管理學系碩士在職專班<br>95<br>Co-opetition focuses on cooperation between companies in imperfectly competitive markets. Yet most companies would benefit from co-opetition relationships when competing in dynamic market conditions. Accordingly, the study of co-opetition is now of critical importance to all firms. However, previous studies using the five forces analysis, the resource-based view, and the core competences have neglected the co-opetition relationships in the overall process of strategy formation and implementation. To address this gap, using qualitative data of an in-depth case study of a leading firm from Storage Area Network Industry, this study seeks to understand how co-opetition relationships can be achieved, what factors influence on the balance of co-opetition relationships, and the impact of new strategy on the co-opetition relationships. Based on the case company’s value net analysis, nine factors such as the innovative technology of new products and market and customer orientations are derived. Also, if a new strategy only aims to employ the homogeneous or replacement products will lead to the negative responses from existing partners and ruin the co-opetition relationships. Alternatively, a complemental product strategy can positively influence on the co-opetition relationships. The implications of the lessons learned and its future research directions are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
30

Jain, Nitisha. "Performance Specific I/O Scheduling Framework for Cloud Storage." Thesis, 2015. http://etd.iisc.ac.in/handle/2005/3765.

Full text
Abstract:
Virtualization is one of the important enabling technologies for Cloud Computing which facilitates sharing of resources among the virtual machines. However, it incurs performance overheads due to contention of physical devices such as disk and network bandwidth. Various I/O applications having different latency requirements may be executing concurrently on different virtual machines provisioned on a single server in Cloud data-centers. It is pertinent that the performance SLAs of such applications are satisfied through intelligent scheduling and allocation of disk resources. The underlying disk scheduler at the server is unable to distinguish between the application requests being oblivious to the characteristics of these applications. Therefore, all the applica- tions are provided best effort services by default. This may lead to performance degradation for the latency sensitive applications. In this work, we propose a novel disk scheduling framework PriDyn (Dynamic Priority) which provides differentiated services to various I/O applications co-located on a single host based on their latency attributes and desired performance. The framework employs a scheduling algorithm which dynamically computes latency estimates for all concurrent I/O applications for a given system state. Based on these, an appropriate pri- ority assignment for the applications is determined which is taken into consideration by the underlying disk scheduler at the host while scheduling the I/O applications on the physical disk. The proposed scheduling framework is able to successfully satisfy QoS requirements for the concurrent I/O applications within system constraints. This has been verified through ex- tensive experimental analysis. In order to realize the benefits of differentiated services provided by the PriDyn scheduler, proper combination of I/O applications must be ensured for the servers through intelligent meta-scheduling techniques at the Cloud data-center level. For achieving this, in the second part of this work, we extended the PriDyn framework to design a proactive admission control and scheduling framework PCOS (P rescient C loud I/O S cheduler). It aims to maximize to Utilization of disk resources without adversely affecting the performance of the applications scheduled on the systems. By anticipating the performance of the systems running multiple I/O applications, PCOS prevents the scheduling of undesirable workloads on them in order to maintain the necessary balance between resource consolidation and application performance guarantees. The PCOS framework includes the PriDyn scheduler as an important component and utilizes the dynamic disk resource allocation capabilities of PriDyn for meeting its goals. Experimental validations performed on real world I/O traces demonstrate that the proposed framework achieves appreciable enhancements in I/O performance through selection of optimal I/O workload combinations, indicating that this approach is a promising step towards enabling QoS guarantees for Cloud data-centers.
APA, Harvard, Vancouver, ISO, and other styles
31

Jain, Nitisha. "Performance Specific I/O Scheduling Framework for Cloud Storage." Thesis, 2015. http://etd.iisc.ernet.in/2005/3765.

Full text
Abstract:
Virtualization is one of the important enabling technologies for Cloud Computing which facilitates sharing of resources among the virtual machines. However, it incurs performance overheads due to contention of physical devices such as disk and network bandwidth. Various I/O applications having different latency requirements may be executing concurrently on different virtual machines provisioned on a single server in Cloud data-centers. It is pertinent that the performance SLAs of such applications are satisfied through intelligent scheduling and allocation of disk resources. The underlying disk scheduler at the server is unable to distinguish between the application requests being oblivious to the characteristics of these applications. Therefore, all the applica- tions are provided best effort services by default. This may lead to performance degradation for the latency sensitive applications. In this work, we propose a novel disk scheduling framework PriDyn (Dynamic Priority) which provides differentiated services to various I/O applications co-located on a single host based on their latency attributes and desired performance. The framework employs a scheduling algorithm which dynamically computes latency estimates for all concurrent I/O applications for a given system state. Based on these, an appropriate pri- ority assignment for the applications is determined which is taken into consideration by the underlying disk scheduler at the host while scheduling the I/O applications on the physical disk. The proposed scheduling framework is able to successfully satisfy QoS requirements for the concurrent I/O applications within system constraints. This has been verified through ex- tensive experimental analysis. In order to realize the benefits of differentiated services provided by the PriDyn scheduler, proper combination of I/O applications must be ensured for the servers through intelligent meta-scheduling techniques at the Cloud data-center level. For achieving this, in the second part of this work, we extended the PriDyn framework to design a proactive admission control and scheduling framework PCOS (P rescient C loud I/O S cheduler). It aims to maximize to Utilization of disk resources without adversely affecting the performance of the applications scheduled on the systems. By anticipating the performance of the systems running multiple I/O applications, PCOS prevents the scheduling of undesirable workloads on them in order to maintain the necessary balance between resource consolidation and application performance guarantees. The PCOS framework includes the PriDyn scheduler as an important component and utilizes the dynamic disk resource allocation capabilities of PriDyn for meeting its goals. Experimental validations performed on real world I/O traces demonstrate that the proposed framework achieves appreciable enhancements in I/O performance through selection of optimal I/O workload combinations, indicating that this approach is a promising step towards enabling QoS guarantees for Cloud data-centers.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!