SAN Data Encryption System on iscsi
|
|
|
- Vanessa Lewis
- 10 years ago
- Views:
Transcription
1 2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: /IPCSIT.2012.V51.51 SAN Data System on iscsi Xu Xuedong a, Sun Wei a and Li Muyuan b a Changchun institute of Technology, Changchun , China b Technology Department Changchun E-sun Software Co., ltd,, Changchun , China Abstract. To protect the static data in SAN, this paper proposed and realized a SAN storage and encryption system based on iscsi by encrypting the SAN disk static data, which realized a flexible security management strategy by multiple-key and multiple layer encryption system to project the physical resources through iscsi protocol stack and virtualization technique. Besides, as it has optimized iscsi s function through RC aggregation cache data pack and this system is proved to function well in simulation test. This system is as good as or better than other products in this line on the international market, by saving about 10% of the conversation expenditure. Keywords: IP SAN, Static Data, ISCSI, 1. Introduction As a vital capital in this information age, data s storage becomes the core of its values in the information system. According to the survey by CSI and FBI in USA, about 80% of attacks are directed at the static data[1]. Thus, the encryption disk and encryption data techniques develop quickly as more attention has been given to the techniques of encryption of static data. With the network storage technique, here is also a problem for the data storage. Recently, information system storage devices at enterprise level have changed from DAS frame into storage area network (SAN) or network-attached storage (NAS), in which the access interface at block level has solved the problem of nonmerging of NAS files interface across the networks and realized the needs of mass storage. SAN comprises FC SAN and IP SAN. As the latter employs optic fiber technique which provides better speed and flexibility but higher price and lower mutual operation. It easily becomes an isolated information island. IP SAN, having developed from iscsi technique, is a storage technique for data exchange through IP protocol on Ethernet. It is a step towards universalization of net storage, a direction of future development of SAN generally believed[2]. However, the storage system exposes itself to great risk of being attacked as it connects itself to Ethernet. Thus the storage encryption technique and its products for IP SAN become an urgent focus for study. This paper, based on SecureSAN, a storage encryption system at SAN files level, proposed a protection for the disk static data in IP SAN. The system realized the data stream control at backend through virtualization of storage device and host computer. We have realized complete transparency of customers through the iscsi protocol stack, and parsing of business data in IP data package. This system encrypts the SCSI commands and files as a whole, in which all the data in the storage are encrypted, making the data useless even the disk is stolen. With the key deleted, the data is useless minimizing the physical damage to the disk from formatting it. 2. ISCSI TECHNIQUES Corresponding author. Tel.: ; fax: address: [email protected]. 298
2 2.1. The Mechanism for iscsi iscsi is a SCSI protocol expanded by IMB as small computer system interface to overcome the shortcoming shorter distance transmission and fewer connection equipments. It could be realized on IP network and route selection on Ethernet. It realized a seamless connection between storage and network by combining the two protocols of SCSI and. iscsi storage network will reach or surpass the band width and functions on FC network as the gigabit ethernet becomes more popular[3]. iscsi is an end-to-end protocol, operates between the host computer (as the initiator) and storage equipment (as the target). iscsi realizes data packaging and transmission between the two ends by starting from host computer to storage equipment. The mechanism is to package SCSI commands by in order to control the information, parameters and data, and forms the protocol data unit (PDU) to transmit them on the IP network[4] iscsi Protocol and Its Workflow iscsi protocol comprises iscsi naming and addressing iscsi, iscsi dialogue, iscsi fault-tolerance, and iscsi security[5]. iscsi equipment s name is used for ID authentication at the sending end and target end. During the logging on, iscsi dialogue establishes a TCP connection, and ID authentication at both sending end and target end. It negotiates parameters for the dialogue and tags the TCP connections belonging to the dialogue. SCSI commands and data would be packaged into iscsi PDU, which is sent to the target by iscsi dialogue. iscsi fault-tolerance detects and restores any erroneous PDU. iscsi security mechanism comprises IPsec and ID authentication within the band. iscsi protocol is in fact a process of packaging data and unpackaging the data packs on the network. Data packs are packaging in three parts: IP head, iscsi recognition packs and SCSI data. When received at the receiving end on the network, the data unpacks into the three parts in sequence. First, SCSI adapter card on the iscsi system sends a SCSI command, packed as an information pack at the third layer. And the receiving end extracts the commands and execute them. Then the SCSI commands and data to be returned are packed into an information pack to be sent back to the sending end. Finally the system extracts data or commands and sends them to the sub-system in the SCSI[6]. All the process is transparent needs no intervention at the end customers. 3. THE DESIGN OF SECURESAN SYSTEM The SecureSAN is defined as storage encryption system at the corporate level. Typical BBD uses backend encryption mode, and connects SecureSAN directly to IP exchange, through which it directs the data from frontend to SecureSAN. After being encrypted by SecureSAN, they are sent to the storage equipment. The system is transparent for the frontend user Application Model Initiator V-Targeter PC V-Initiator Encrypted Data Targeter HOST Decrypted Data Storage Fig. 1. SAN application model based on securesan. The SAN Application Model Based on SecureSAN is shown as in Figure 1, comprising host computer and storage equipment. The SecureSAN is based on Linux system. With two network cards, one set at the V- Target mode and the other set at the V-Initiator mode. Both of the two network cards are controlled by the drivers compiled by ourselves. By data encryption and conversion, we have realized transparency at the user s backend storage equipment, and data at the backend is in plain text and data in the storage equipment is encrypted. 299
3 All the data stream passes through SecureSAN. The data at the V-Target end is in plain text and the data at the V-Initiator end is encrypted. The data is encrypted with the SM4 encryption algorithm approved by State Cryptography Administration. The key is stored in the SecureSAN, which is managed through Web management interface and command lines The Design of the General Frame Application Server File Syetem SecureSAN Data Console Disk SCSI Genenic Analysis Module Ciphertext iscsi initiator V-iSCSI target V-iSCSI initiator iscsi Target NIC Net work NIC1 NIC2 Net work NIC Fig. 2. The General SecureSAN Frame. SecureSNA is realized through the software in Linux environment, as shown in Figure 2, which comprises: Driver in the host computer: The iscsi Initiator driver is installed in the host computer, which, together with SCSI drivers with the system, realizes the packaging of the SCSI commands and data into PCT/IP packs, and send the requests to target equipment of the Ether network. SecureSAN function software: The data and encryption function software for iscsi protocols in Linux environment is developed by ourselves, comprising V-iSCSI target at the target end, V-iSCSI initiator at the vitalizing initiator end and encryption module. The process is that V-iSCSI target monitors the data released by the iscsi initiator. It receives data packs after establishing the dialogue. Through the parsing of iscsi data (including the unpacking and separating of the data), it send them to the IO modules at the server kernel for encryption to be packed encrypted by V-iSCSI initiator and encryption software. Driver software at the storage end: The PPD iscsi target monitors the released packs by V-iSCSI initiator and authentication, and starts dialogue on receiving the request for dialogue, processes the data packs and stores the data on the disk. Console software: It is used to configure SecureSAN, to form storage strategy, to supervise customers, the management of keys and other functions. SecureSAN restoring strategy software: It comprises the management of expiration of the key and decryption software of the data etc. It is used to restore the encrypted data to plain text when the system is crashed. 4. Core Technique in the System 4.1. The and Decryption System in SecureSAN To lower the risk of misconduct and leakout by insiders, SecureSAN adapts a management strategy of Power Sharing. We have designed a multi-level encryption system with keys in many categories for data encryption at customer s end through SM4 encryption card. The keys comprises start key, management key, restoring key, local key and base key ( as shown in Table I). 300
4 Table 1. System key categories Categories Type Uses Start key Asymmetrical System starts key, protecting management key at two levels. Management key Asymmetrical System management key, restoring and decrypting keys. Restoring key Symmetrical key for local key, protected by key encryption. Local key Symmetrical key for base key, protected by restoring key. Base key Symmetrical Data encryption key, protected by local key Processing Flowchart is shown in Figure 3.In the encryption and decryption system, data is encrypted in the storage processors and sent to the storage equipment. The base key generates a K1 through encryption by local key, which generates K2 through decryption restoring local key, which generates K3 through decryption by restoring key, which generates T through primary start key. Secondary start key encrypts T into TT. The K1, K2, K3, T and TT together are stored in the parameters databank of SecureSAN. One System TWO System Management Key T TT First Start key Restore Second Start key Restore key K3 Local Local Key K2 Configuration database Base key K1 Data Encrypted Data Fig. 3. Grade System in SecureSAN. In this encryption system, the emphasis of protection is that the password stored in the key rather than in the data, in the base key is encrypted at multiple layers. This disperses the management power and lowers the risk of leakout and simple the steps of data encryption but with better functions Virtualization Management in SecureSAN To filter by-pass data in the SecureSAN, a management of the virtualization of host computer and storage equipment in SAN is necessary. First, a V-storage is virtualized in Secure SAN with a virtual IP address, which is bound with the host-side NIC at the customer s end port. It monitors and receives the packs from the host computer iscsi initiator. After it parses and encrypts the iscsi data packs, it establishes a client virtual host in SecureSAN with virtual IP address, which is bound with storage-side-nic at the storage end for packaging and releasing of the encrypted data on these mapping relations between the virtual host IP and host IP. A user-level library and two loadable Linux kernel modules were developed to realize the above process. Through the address mapping table, the virtual address is translated into the physical address recognizable by net card for the sequential process of data packs The Optimization of Cache on RAM We found that the size of data in iscsi influences the transmission and small size of data lowers width performance of the network[7]. A better performance of iscsi is realized with a plan of aggregation data packs by cache technique. A space is opened up in the system non-paged pool, and two-layer structured RC cache is created though a log disk Small data packs are collected in the pool thus created and the data is written in the log disk with the advantage of fast reading and writing of log files system. Thus large log files are formed and sent to the storage system at the far end. This plan is proved to have increased transmission efficiency by 20%. 301
5 5. Evaluation of SecureSAN s Functions and Performances Typical SAN storage encryption products on the market are those by DataFort in three series (E, FC and S), supporting IP network, optical channels and SICI bus respectively. Its technique is a commercial secrete and expensive. In comparison, DataFort is similar in function, but cheaper and flexible in safety strategy. To evaluate its performance, we have set up the simulation test on following configuration: the SecureSAN is deployed on a PC server (with CUP of Intel Xeon Processor X Core, RAM of 2GB, data ports of two 1000Mbps Ethernet NIC, a management ports of a 10/100Mbps Ethernet NIC) on the system of RedHat8.0 with Apache, SCSI card of double-channel Adaptec AIC-7889 Ultra160, disk-array of 4-digit SCSI disks (Seagate ST336607LC, 36.2GB) of total volume of 4*36.2GB. PostMark was used to evaluate the capacity of the system, and Iometer developed by INTEL was used to evaluate the response time and conversation expenditure. Here we regarded the conversation success rate as the units of conversation expenditure, which reflected the utilization rate of cache and the potentials of the system. Table 2. SecureSAN performance test I/O Mode Data Block Size Concurrent Process Data Transmission rate Average Response time conversation expenditure Sync 8KB 16 64MB/S 5.6ms 90% Sync 16KB 16 60MB/S 8.9ms 86% Sync 32KB MB/S 16.9ms 88% Sync 64KB MB/S 35.2ms 84% As shown in Table Ⅱ.It is proved the in the test that the capacity of SecureSAN and transmission efficiency and average response time of the data functioned well. conversation expenditure more than 84%, by saving about 10% of the conversation expenditure. It is found from the technical documentaries that Datafort is gateway-product based on software and with better functions. DataFort optimized specifically the hardware in the aspects of cache, parallel processing numbers with data transferring rate at 200MB/S and average response time at less than 2 ms. It is estimated from our experience that the optimized hardware could have its performance increased by 1-2 times. Considering the conversation expenditure of SecureSAN, it is reasonable to believe that SecureSAN is expected to be as good as or better than DataFort Products. 6. Conclusion This paper has analyzed the iscsi protocol and technique and proposed a new storage encryption system of SecureSAN on iscsi. The design realized an iscsi protocol stack and the encryption of SAN static data on SM4encryption card. It differs itself from the common encryption disk or encryptor in its adaptability of SAN secure storage, the end-to-end security between host computer and storage equipment, transparent connection with the network, and maximum protection of the customer s investment. In the future, we shall optimize this software system realized in Linux system and its related hardware, and develop special SAN encryption equipment for the market, which is at present dominated by the techniques and prices of foreign corporations. 7. Acknowledgements The authors would like to thank Professor Yao Nianmin From Harbin Engineering University for kindly sharing his dataset with us.the work was supported by Fund for Electronic Information Industry Development (No. IIMF [2009]453) ; Jilin Science and Technology Support Plan (No ) ; Changchun Science and Technology Plan (No. 09KT21) ; The 12th Five Year Planning by Jilin Education Bureau(No. 2001[238]). 302
6 8. References [1] ROGERW Future hard disk drive systems[j] Journal ofmagnetism andmagneticmaterials, 2009, 321(6): [2] David Lie, John Mitchell, Chandramohan A. Thekkath, Mark Horowitz. Specifying and Verifying Hardware for Tamper-Resistant Software. Symposium on Security and Privacy, 2003, pp [3] Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. Efficient memory integrity verification and encryption for secure processors. The 36th International Symposium on Microarchitecture, pp , [4] Gregory R. Ganger, Pradeep K. Khosla, Mehmet Bakkaloglu, et al. Survivable Storage Systems. DARPA Information Survivability Conference and Exposition, Anaheim, CA, IEEE, Vol.2, June 2001,pp.l [5] M. Blaze. A cryptographic file system for unix. In 1st ACM Conference on Communications and Computing Security, 1993, pp [6] Ethan L. Miller, Darrell D. E. Long, William E. Freeman, and Benjamin C. Reed. Strong security for networkattached storage. In Proceedings of the 2002 Conference on File and Storage Technologies (FAST), Monterey, CA, January 2002, pp. l 一 13. [7] Jonathan Corbet,Alessandro Rubini,Greg Kroah-hartman. Linux Drivers.3rd edition[m]. American:O Reilly,2005.pp: [8] WANG Jun, YAO Xiao-yu, CHRISTOPHERM, et al A NewHierarchicalData Cache Architecture for iscsi Storage Server[J] IEEE Transactions on Computers, 2009, 58(4), [9] ROBERT L,GU Yun-hong,MICHAEL S, et al Computer and storage clouds using wide area high performance networks[j]. Future Generagtion ComputerSystems, 2009, 25(2):
365 Cloud Storage. Security Brief
365 Cloud Storage Security Brief Overview Surveys reveal time and again that security and data protection concerns are the top barriers to Cloud adoption. At, we take these concerns seriously and have
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Online Remote Data Backup for iscsi-based Storage Systems
Online Remote Data Backup for iscsi-based Storage Systems Dan Zhou, Li Ou, Xubin (Ben) He Department of Electrical and Computer Engineering Tennessee Technological University Cookeville, TN 38505, USA
A Packet Forwarding Method for the ISCSI Virtualization Switch
Fourth International Workshop on Storage Network Architecture and Parallel I/Os A Packet Forwarding Method for the ISCSI Virtualization Switch Yi-Cheng Chung a, Stanley Lee b Network & Communications Technology,
SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY
SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Microsoft Exchange Server 2003 Deployment Considerations
Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers
Storage Solutions Overview. Benefits of iscsi Implementation. Abstract
Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Stingray Traffic Manager Sizing Guide
STINGRAY TRAFFIC MANAGER SIZING GUIDE 1 Stingray Traffic Manager Sizing Guide Stingray Traffic Manager version 8.0, December 2011. For internal and partner use. Introduction The performance of Stingray
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
IP SAN Fundamentals: An Introduction to IP SANs and iscsi
IP SAN Fundamentals: An Introduction to IP SANs and iscsi Updated April 2007 Sun Microsystems, Inc. 2007 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 USA All rights reserved. This
How To Evaluate Netapp Ethernet Storage System For A Test Drive
Performance evaluation sponsored by NetApp, Inc. Introduction Ethernet storage is advancing towards a converged storage network, supporting the traditional NFS, CIFS and iscsi storage protocols and adding
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
OSDsim - a Simulation and Design Platform of an Object-based Storage Device
OSDsim - a Simulation and Design Platform of an Object-based Storage Device WeiYa Xi Wei-Khing For DongHong Wang Renuga Kanagavelu Wai-Kit Goh Data Storage Institute, Singapore xi [email protected]
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
Wireless ATA: A New Data Transport Protocol for Wireless Storage
Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr
Building High-Performance iscsi SAN Configurations. An Alacritech and McDATA Technical Note
Building High-Performance iscsi SAN Configurations An Alacritech and McDATA Technical Note Building High-Performance iscsi SAN Configurations An Alacritech and McDATA Technical Note Internet SCSI (iscsi)
Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study
White Paper Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study 2012 Cisco and/or its affiliates. All rights reserved. This
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Strong Security for Distributed File Systems
Strong Security for Distributed File Systems Ethan Miller Darrell Long William Freeman Benjamin Reed University of California, Santa CruzTRW IBM Research Abstract We have developed a scheme to secure networkattached
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems
Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems Applied Technology Abstract This white paper investigates configuration and replication choices for Oracle Database deployment with EMC
Review On Incremental Encrypted Backup For Cloud
Review On Incremental Encrypted Backup For Cloud Rohini Ghenand, Pooja Kute, Swapnil Shinde, Amit Shinde, Mahesh Pavaskar, Shitalkumar Jain Department of Computer Engineering MIT AOE [email protected]
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
EVOLUTION OF NETWORKED STORAGE
EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. [email protected] 2 Lecturer, Deptt
Distributed RAID Architectures for Cluster I/O Computing. Kai Hwang
Distributed RAID Architectures for Cluster I/O Computing Kai Hwang Internet and Cluster Computing Lab. University of Southern California 1 Presentation Outline : Scalable Cluster I/O The RAID-x Architecture
Certification Document macle GmbH Grafenthal-S1212M 24/02/2015. macle GmbH Grafenthal-S1212M Storage system
macle GmbH Grafenthal-S1212M Storage system Executive summary After performing all tests, the macle GmbH Grafenthal-S1212M has been officially certified according to the Open-E Hardware Certification Program
Installation and Configuration Guide for Cluster Services running on Microsoft Windows 2000 Advanced Server using Acer Altos Servers
Acer Altos Server Installation and Configuration Guide for Cluster Services running on Microsoft Windows 2000 Advanced Server using Acer Altos Servers This installation guide provides instructions for
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
SERVER CLUSTERING TECHNOLOGY & CONCEPT
SERVER CLUSTERING TECHNOLOGY & CONCEPT M00383937, Computer Network, Middlesex University, E mail: [email protected] Abstract Server Cluster is one of the clustering technologies; it is use for
Introduction to MPIO, MCS, Trunking, and LACP
Introduction to MPIO, MCS, Trunking, and LACP Sam Lee Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201002-P210C lntroduction Many users confuse the
Future technologies for storage networks. Shravan Pargal Director, Compellent Consulting
Future technologies for storage networks Shravan Pargal Director, Compellent Consulting Agenda Storage applications Application requirements Available technology solutions Who is winning today? What will
H ARDWARE C ONSIDERATIONS
H ARDWARE C ONSIDERATIONS for Sidewinder 5 firewall software Dell Precision 530 This document provides information on specific system hardware required for running Sidewinder firewall software on a Dell
New!! - Higher performance for Windows and UNIX environments
New!! - Higher performance for Windows and UNIX environments The IBM TotalStorage Network Attached Storage Gateway 300 (NAS Gateway 300) is designed to act as a gateway between a storage area network (SAN)
Chapter 13 Selected Storage Systems and Interface
Chapter 13 Selected Storage Systems and Interface Chapter 13 Objectives Appreciate the role of enterprise storage as a distinct architectural entity. Expand upon basic I/O concepts to include storage protocols.
NFS SERVER WITH 10 GIGABIT ETHERNET NETWORKS
NFS SERVER WITH 1 GIGABIT ETHERNET NETWORKS A Dell Technical White Paper DEPLOYING 1GigE NETWORK FOR HIGH PERFORMANCE CLUSTERS By Li Ou Massive Scale-Out Systems delltechcenter.com Deploying NFS Server
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES Dinil.D 1, Aravind.P.A 1, Thothadri Rajesh 1, Aravind.P 1, Anand.R 1, Jayaraj Poroor
FIBRE CHANNEL OVER ETHERNET
FIBRE CHANNEL OVER ETHERNET A Review of FCoE Today ABSTRACT Fibre Channel over Ethernet (FcoE) is a storage networking option, based on industry standards. This white paper provides an overview of FCoE,
Storage Area Network
Storage Area Network 2007 Infortrend Technology, Inc. All rights Reserved. Table of Contents Introduction...3 SAN Fabric...4 Advantages of SAN Solution...4 Fibre Channel SAN vs. IP SAN...4 Fibre Channel
The team that wrote this redbook Comments welcome Introduction p. 1 Three phases p. 1 Netfinity Performance Lab p. 2 IBM Center for Microsoft
Foreword p. xv Preface p. xvii The team that wrote this redbook p. xviii Comments welcome p. xx Introduction p. 1 Three phases p. 1 Netfinity Performance Lab p. 2 IBM Center for Microsoft Technologies
TLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability
White Paper Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability The new TCP Chimney Offload Architecture from Microsoft enables offload of the TCP protocol
Scala Storage Scale-Out Clustered Storage White Paper
White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current
The proliferation of the raw processing
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Research on the Course of Network Performance Testing and Analysis
2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore Research on the Course of Network Performance Testing and Analysis Xiurong
Riverbed Stingray Traffic Manager VA Performance on vsphere 4 WHITE PAPER
Riverbed Stingray Traffic Manager VA Performance on vsphere 4 WHITE PAPER Content Introduction... 2 Test Setup... 2 System Under Test... 2 Benchmarks... 3 Results... 4 2011 Riverbed Technology. All rights
A Reliable File Protection System Based on Transparent Encryption
, pp.123-132 http://dx.doi.org/10.14257/ijsia.2014.8.1.12 A Reliable File Protection System Based on Transparent Encryption Jun Liu 1, ShuYu Chen 2*, MingWei Lin 1 and Han Liu 1 1 College of Computer Science,
Violin: A Framework for Extensible Block-level Storage
Violin: A Framework for Extensible Block-level Storage Michail Flouris Dept. of Computer Science, University of Toronto, Canada [email protected] Angelos Bilas ICS-FORTH & University of Crete, Greece
An Implementation of Storage-Based Synchronous Remote Mirroring for SANs
An Implementation of Storage-Based Synchronous Remote Mirroring for SANs SHU Ji-wu, YAN Rui, WEN Dongchan, ZHENG Weimin Department of Computer Science and Technology, Tsinghua University, Beijing 100084,
IP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
System Requirements for Microsoft Dynamics GP 10.0
Requirements for Dynamics GP 10.0 Last Modified 5/21/2007 Posted 5/21/2007 This document contains the minimum client hardware requirements, server recommendations and Terminal Server minimum hardware requirements
Bloombase StoreSafe Security Best Practice
Bloombase StoreSafe Security Best Practice How to Harden Bloombase StoreSafe and Get the Most from Bloombase Next-Generation Data At-Rest Security B E S T P R A C T I C E Bloombase - Next Generation Data
Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata
Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached
Fusionstor NAS Enterprise Server and Microsoft Windows Storage Server 2003 competitive performance comparison
Fusionstor NAS Enterprise Server and Microsoft Windows Storage Server 2003 competitive performance comparison This white paper compares two important NAS operating systems and examines their performance.
HP Intelligent Management Center User Access Management Software
Data sheet HP Intelligent Management Center User Access Management Software Key features One central database of users and available services Advanced reporting capabilities Directory of network-attached
W H I T E P A P E R. VMware Infrastructure Architecture Overview
W H I T E P A P E R ware Infrastructure Architecture Overview ware white paper Table of Contents Physical Topology of the ware Infrastructure Data Center............................... 4 Virtual Data Center
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
On Benchmarking Popular File Systems
On Benchmarking Popular File Systems Matti Vanninen James Z. Wang Department of Computer Science Clemson University, Clemson, SC 2963 Emails: {mvannin, jzwang}@cs.clemson.edu Abstract In recent years,
Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
Oracle Database Security and Audit
Copyright 2014, Oracle Database Security and Audit Beyond Checklists Learning objectives Understand Oracle architecture Database Listener Oracle connection handshake Client/server architecture Authentication
Quantum StorNext. Product Brief: Distributed LAN Client
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing
Journal of Information & Computational Science 9: 5 (2012) 1273 1280 Available at http://www.joics.com VON/K: A Fast Virtual Overlay Network Embedded in KVM Hypervisor for High Performance Computing Yuan
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Analysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
: HP HP0-771. Version : R6.1
Exam : HP HP0-771 Title : Designing & Implementing HP Enterprise Backup Solutions Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products
SCSI The Protocol for all Storage Architectures
SCSI The Protocol for all Storage Architectures David Deming, Solution Technology April 12, 2005 Abstract SCSI: The Protocol for All Storage Architectures This session will appeal to System Administrators,
From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller
White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Fibre Channel over Ethernet in the Data Center: An Introduction
Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification
LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client
LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled
Virtualised MikroTik
Virtualised MikroTik MikroTik in a Virtualised Hardware Environment Speaker: Tom Smyth CTO Wireless Connect Ltd. Event: MUM Krackow Feb 2008 http://wirelessconnect.eu/ Copyright 2008 1 Objectives Understand
Building Enterprise-Class Storage Using 40GbE
Building Enterprise-Class Storage Using 40GbE Unified Storage Hardware Solution using T5 Executive Summary This white paper focuses on providing benchmarking results that highlight the Chelsio T5 performance
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
