Storage Area Networks
1,532 Followers
Recent papers in Storage Area Networks
We propose the creation of a wireless storage area network (SAN) and analyze its benefits. The proposed wireless SAN (WSAN) consists of a SAN switch that is connected to multiple wireless access points (APs) that communicate with the... more
Storage area network is one of the most well liked and structured storage system for both multi domain storage and enterprise domain. In both the domain the data are stored securely and in an efficient manner. In this paper we present... more
Since the onset of Cloud computing and its inroads into infrastructure as a service, Virtualization has become peak of importance in the field of abstraction and resource management. However, these additional layers of abstraction... more
Pada pengalokasian media penyimpanan skala jaringan (network storage), diperlukan konsep yang baru untuk meningkatkan efektivitas komunikasi antar storage server dan client. Pada network storage konvensional, setiap node berkomunikasi... more
Storage Area Net work (SAN) switches and Storage Arrays have used for many t ime; they have become mo re ab ility of fault tolerance. These often involve some degree of redundancy. However, there are still issues that can occur and take... more
Laboratorium komputer pada UPT STMIK AMIKOM Yogyakarta berjumlah banyak dan kapasitas pengguna yang besar maka kebutuhan layanan data center juga semakin tinggi. Untuk memenuhi kebutuhan pengembangan data center tersebut dibutuhkan... more
Laboratorium komputer pada UPT STMIK AMIKOM Yogyakarta berjumlah banyak dan kapasitas pengguna yang besar maka kebutuhan layanan data center juga semakin tinggi. Untuk memenuhi kebutuhan pengembangan data center tersebut dibutuhkan... more
Pada pengalokasian media penyimpanan skala jaringan (network storage), diperlukan konsep yang baru untuk meningkatkan efektivitas komunikasi antar storage server dan client. Pada network storage konvensional, setiap node berkomunikasi... more
Cloud storage allows moving the remote data to the centralized large data centers, where the da ta i nt egr it y is not achieved. This paper studies the problem of ensuring the integrity of the data storage in Cloud Computing.... more
Cloud computing is the dominating paradigm in distributed computing. The most popular open source cloud solutions support different type of storage subsystems, because of the different needs of the deployed services (in terms of... more
AbstractMost organizations are becoming increasingly re-liant on IT product and services to manage their daily operations. The total cost of ownership (TCO), which includes the hardware and software purchase cost, management cost, etc.,... more
A program to develop planetary rover technology is underway at the Jet Propulsion Laboratory (JPL) under sponsorship of NASA. Developmental systems with the necessary sensing, computing, power, and mobility resources to demonstrate... more
In current social networking world, organizations ar e demanding high-speed security for client data such as images, audio video files even huge databases. Also no flexibility to connect and share... more
This paper describes our experience using the dynamic resource reallocation capabilities offered by virtualization technologies, in implementing:
As businesses have grown, so has the need to deploy I/T applications rapidly to support the expanding business processes. Often, this growth was achieved in an unplanned way: each time a new application was needed a new server along with... more
This paper presents an overview of the storageaware routing protocol proposed for the MobilityFirst network architecture being developed as a part of the NSF Future Internet Architecture (FIA) project. The storage-aware routing method... more
This paper introduces method for implementing NFS protocol for larger block/network packets transfer over to NAS [Network Attached Storage] from Highly Available clients. NAS storage scalability is habitually inadequate to the volume of... more
A program to develop planetary rover technology is underway at the Jet Propulsion Laboratory (JPL) under sponsorship of NASA. Developmental systems with the necessary sensing, computing, power, and mobility resources to demonstrate... more
Preface The BeaST is the new FreeBSD based dual-headed reliable storage system concept. Recently we implemented both ZFS and in-memory cache in our architecture. And after this last improvement the BeaST system has become quite complex... more
Abstract-Storage Area Networks (SANs) connect storage devices to servers over fast network interconnects. We consider the problem of optimal SAN configuration with the goal of retaining more security in meeting service level agreements... more
Policy-based management provides the ability to dynamically re-configure DiffServ networks such that desired quality of service (QoS) goals are achieved. This includes network provisioning decisions, performing admission control, and... more
Management of a switch fabric security configuration, a core component of Storage Area Networks, is complex and error prone. As a consequence, misconfiguration of and/or a poor understanding of a switch fabric may unnecessarily expose an... more
The growing complexity of mass storage systems at major data centers is causing stress on system administrators to keep performance at optimal levels. As storage requirements grow, so does the number of routine tasks that the... more
The usage of network-based applications is increasing, as network speeds increase, and the use of streaming applications, e.g BBC iPlayer, YouTube etc., running over network infrastructure is becoming commonplace. These applications... more
In this paper, we present a novel real-time image restoration approach using a truncated constrained least-squares (TCLS) filter and spatially adaptive noise smoothing (SANS) algorithm based on alpha map for the extended depth of field... more
In current social networking world, organizations are demanding high-speed security for client data such as images, audio video files even huge databases. Also no flexibility to connect and share remote devices and servers reduces the... more
Today, access control security for storage area networks (zoning and masking) is implemented by mechanisms that are inherently insecure, and are tied to the physical network components. However, what we want to secure is at a higher... more
and the functionality and data that reside in the storage subsystem. Recent technological trends, such as shared SAN or NAS storage and virtualization, have the potential to break this tight association between functionality and machines.... more
The TCP connection endpoint migration allows arbitrary server-side connection endpoint assignments to server nodes in cluster-based servers. The mechanism is clienttransparent and supports back-end level request dispatching. It has been... more
Security has been considered as the key concern of adopting cloud computing. This could be ascribed to the customers' lack of control over their confidential data once in the cloud and to the absence of trust in cloud providers.... more
Optical DWDM technology has delivered immense scalability across long-haul and metro core networks. However, since many client services still operate at slower speeds, there remains a large "granularity gap" with larger multi-gigabit... more
Cluster federations are attractive to execute applications like large scale code coupling. However, faults may appear frequently in such architectures. Thus, checkpointing longrunning applications is desirable to avoid to restart them... more
Dynamic network reconfiguration is defined as the process of changing from one routing function to another while the network remains up and running. The main challenge is in avoiding deadlock anomalies while keeping restrictions on packet... more
Different studies show that programmers are more interested in finding definitions of functions and their uses than variables, statements, or arbitrary code fragments [30, 29, 31]. Therefore, programmers require support in finding... more
We present a novel algorithm, called IPASS, for root cause analysis of performance problems in Storage Area Networks (SANs). The algorithm uses configuration information available in a typical SAN to construct I/O paths, that connect... more
Dependability evaluation is useful and important in designing computer systems, while at the same time it is also difficult. The difficulty becomes significant when the model combines hardware, software and their interactions due to the... more
Future missions to the moon, Mars, or other planetary surfaces will use planetary rovers for exploration or other tasks. Operation of these rovers as unmanned robotic vehicles with some form of remote or semi-autonomous control is... more
A program to develop planetary rover technology is underway at the Jet Propulsion Laboratory (JPL) under sponsorship of NASA. Developmental systems with the necessary sensing, computing, power, and mobility resources to demonstrate... more
Capturing attacker behavior in a security test plan allows the systematic, repeated assessment of a system's defenses against attacks. To address the lack of security experts capable of developing effective black box security test plans,... more
This paper focuses on a switching architecture designed for Storage Area Network (SAN) applications, with a crossbar switching fabric and an aggregate bandwidth of hundreds of Gbps. We describe the architecture and adopt an abstract model... more
Efficient support of multicast traffic in Storage Area Networks (SANs) enables applications such as remote data replication and distributed multimedia systems, in which a server must access concurrently multiple storage devices or,... more
ABSTRACT This paper presents a solution for optimal business continuity, with storage architecture for enterprise applications, which shall ensure negligible data loss and quick recovery. The solution makes use of IP SAN, which are used... more
This paper presents a novel data mirroring method for storage area networks (SANs) in metropolitan area WDM (wavelength division multiplexing) ring network scenario. We describe our network architecture, the protocol, the network traffic... more
— Storage Area Networks (SAN’s) connect groups of storage devices to servers over fast interconnects using protocols like Fibre Channel or iSCSI, so that storage resources can be assigned to servers in a flexible and scalable way. An... more