Storage and Print Solutions for SOHOs
|
|
|
- Gervase Peregrine Martin
- 9 years ago
- Views:
Transcription
1 1 Storage and Print Solutions for SOHOs Rajiv Mathews, Ravi Shankar T, Sriram P, Ranjani Parthasarathi Department Of Computer Science & Engineering, College Of Engineering, Guindy, Anna University, Chennai, India Abstract Small offices/home offices have storage and print requirements that are very hard to fulfill. They require that the methods used are both economical and efficient. Network printers can be very expensive, and to provide a print server for a small network (say 15 stations) is also not economically viable. On the same lines, providing specialized network-attached storage devices too is an expensive option. We aim to solve this problem, by providing a cost-effective, yet efficient solution for storage and print requirements for SOHOs by making efficient use of the IXP425 Network Processor. Internet SCSI (iscsi) is an official standard that allows the use of SCSI over TCP/IP networks. The recent shift to gigabit ethernet has seen a rapid acceleration in the usage of the iscsi protocol. Although iscsi has predominantly seen use in Storage-Area Networks (SANs), nothing in its architecture prevents its use in other devices. We exploit this device independent nature of iscsi, and that which is seen inherently in SCSI, by providing both storage and print solutions, with the same back bone architecture. We also provide host independent printing, which is to say that, we provide a medium for printing directly without the intervention of a host machine. We use a network processor (IXP425) to implement the solution effectively, making use of its inherent support of networking features, so that we can provide an efficient solution to the task at hand. Index Terms iscsi, IXP425, print, small office/home office, storage seamlessly over a network of stations running modern day commodity OSs. b) The network-attached printer device must appear as a directly attached printer device to the host c) Enable host independent printing service, that is, to be able to print directly without out the intervention of a host machine. In designing the device, it is required that the protocol employed should be device independent in order to make the end product generalized, as well as extensible. SCSI is widely known to be a standard that promotes device independence, which means that SCSI can be used with any type of computer hardware. In order to extend this over a network, we build an iscsi stack over the network processor device. iscsi is touted to be a de-facto standard for such purposes. Using iscsi also has the additional advantage that many implementations of iscsi initiators for modern day commodity OSs already exist, thus making the device universal. Added with the fact that once we've provided an iscsi target on the network processor board we will be able to attach other SCSI devices, and provide network access to them too. So in essence we have a network based adapter to a SCSI device. The device also features host independent printing, that is, the ability to print from a directly connected flash device, without the intervention of a host machine. II. RELATED WORK O I. INTRODUCTION VER the years, storage architectures have seen flavors such as SANs and NASs. These solutions though feasible and proved, are not suitable for a Small Office/Home Office environment. Similarly, print solutions such as print servers, referring to simplistic designs such as LAN adapters with parallel ports to specialized routers attached to printers that implement networking protocols are also not suitable for such environments. Effective storage and print solutions for SOHOs must meet the following targets, a) The network-attached storage device must integrate A. Contemporary Print Systems There are many popular solutions for network-based printing. The Internet Printing Protocol or IPP is a standard printing protocol. IPP, similar to most IP based protocols can be used over the Internet. However, since it is built over HTTP, it makes for a more complex and bloated protocol. We judged this unfit for a small office/home office environment as the compromise on performance, due to a taller protocol stack is not justifiable [8]. A print server is a host computer or device that can accept print jobs over a network of stations connected to it. To have a dedicated host machine for a print server is not an economically sound solution. Instead, having an embedded device providing the same interface and functionality is preferred. We try to justify this with our device.
2 2 B. Contemporary Storage Systems Storage Area Networks (SANs) and Network-Attached Storage Devices (NASs) have existed for nearly a decade now. A Storage Area Network is a network designed to attach computer storage devices such as disk array controllers and tape libraries to servers. A SAN allows a machine to connect to remote targets such as disks and tape drives on a network for block level I/O. There are two variations of SANs, 1) A network whose primary purpose is the transfer of data between computer systems and storage elements. A SAN consists of a communication infrastructure, which provides physical connections, and a management layer, which organizes the connections, storage elements, and computer systems so that data transfer is secure and robust. The term SAN is usually (but not necessarily) identified with block I/O services rather than file access services. 2) A storage system consisting of storage elements, storage devices, computer systems, and/or appliances, plus all control software, communicating over a network. Network-Attached Storage (NAS) is the name given to dedicated data storage technology that can be connected directly to a computer network to provide centralized data access and storage to heterogeneous network clients. NAS uses file-based protocols such as the Network File System (NFS) (popular on UNIX systems) or Common Internet File System (CIFS) (used with MS Windows systems). Contrast NAS's filebased approach and use of well-understood protocols with storage area network (SAN) which uses a block-based approach and generally runs over proprietary protocols. For a small office/home office environment a NAS like architecture is best suited since it blends performance with cost [4]. identified [3,6]. a) Kernel Modification is to be kept at a bare minimum. Modifying the source code of the Linux kernel, which is not specialized, may lead to better performance. This may however cause compatibility issues with newer versions of the kernel. b) Maintain interoperability with existing systems. The success of a device like ours depends to a large extent on the interoperability that it provides with existing systems. c) Utilize existing device management features. For instance, the storage solution that we provide must utilize disk management features like the logical volume manager (LVM), as is provided in the Linux kernel. d) Meet production environment performance standards. The device should meet the workloads of a typical SOHO production environment. The target software serves a dual purpose. It interacts with both a printer subsystem and a storage subsystem. The target software is responsible for classifying incoming requests into these two major categories. B. Storage Subsystem While dealing with the storage subsystem, several design options have been identified. [3] With respect to the kernel interface with which the storage subsystem interacts we consider the following design alternatives (Figure 1). a) Directly with the SCSI subsystem, meaning to work directly with the device. b) At the block I/O layer, thereby providing to the initiator devices, blocks as logical units. c) With the virtual file system and hence provide a regular file as the logical unit. III. PROPOSED SOLUTION Our solution merges the best features of those that are available in literature, in that it provides network access to a centralized storage along with centralized printing capability. With regard to the storage solution that it provides, it emulates a directly-attached storage device by making use of iscsi. It also extends the principle of iscsi, which is typically understood to be for storage systems to print systems too [1]. The IXP425 board is the ideal environment to host an iscsi target on. It provides major networking capabilities that are required for this purpose. For instance, it inherently supports several security features, its network processing engines export common networking functions to hardware and it provides a balance between efficiency and cost, which are critical for SOHOs. A. Target Software Features The iscsi target software, which is housed on the network processor, must adhere to certain basic principles that we Fig. 1. Layers of accessibility in the kernel Working with the SCSI subsystem or the block I/O layer would keep us from taking advantage of the rich functionality that the kernel could other wise provide us. The virtual file system is chosen, to keep the design simple and to work with as many high level interfaces as possible [5]. It provides us with several advantages, a) This method provides us the advantage of device
3 3 virtualization. The Linux kernel provides a generic interface to various block devices, allowing homogeneous access to all block devices like SCSI, IDE, ATA disk drives. b) Working at this level of abstraction also allows us to make use of the page cache, which minimizes disk I/O latency. c) Also, it allows us to make use of flexible storage management, logical volume manager, and redundancy (Software RAID). Write Durability is a feature that database programs and file systems rely on in order to maintain data integrity in case system failures. It means that when an initiator device receives a response from the target on a write, it expects that the data has been written to the physical disk drive. C. Printer Subsystem The printer subsystem is a far more simplified module. The aim of the device with respect to the service of printing was that the printer must appear to be directly attached, rather than a network-attached printer. The initiator concerns itself only with the task of packaging SCSI Command Descriptor Blocks (CDBs) within iscsi PDUs for transfer over a network to the target. The target will forward printer commands to the printer subsystem. Thus the host machine assumes that the printer is directly connected, due to the fact that the initiator subsystem falls below the SCSI mid layer on the host machines. that is suited for high performance network-based applications [7]. The IXP425 combines an Intel XScale core with additional Network Processing Engines (NPEs) to achieve wire-speed packet processing performance. The network processing engines are used to offload computationally intensive data plane operations like IP header inspection and modification, packet filtering and error checking, checksum computation and flag insertion and removal. The NPEs have hardware elements each of which are specialized to increase a specific networking task. The network processor will run a SnapGear Linux distribution operating on a Linux 2.6 kernel. SnapGear is an embedded Linux distribution that represents Linux technology for embedded microprocessors with or without MMUs. The iscsi target software that is housed in the network processor is divided into three major blocks. a) Read thread: This thread will receive requests from the various initiator devices. b) Process block: This block will process the requests, determine the nature of the requests, act on the request and formulate a response. c) Write thread: This thread will respond to the appropriate initiator device. Fig. 2 Printer Architecture Comparison The left pane shows a standard SCSI printer set up. The right pane shows the SCSI mid layer expanded to transparently include the network. Fig. 3 Architectural Overview Incoming requests are buffered in the Incoming Queue, which leads to the process thread. The process thread performs the necessary operation and writes out to the Outgoing Queue. So the network is transparent to the host machines since it falls logically within the SCSI mid layer. To summarize, the target software will forward CDBs destined to the printer, to the printer subsystem which in turn will simply forward these to the SCSI mid layer at the target. IV. WORK IN PROGRESS We are working with the Intel IXP425 Network Processor which is a versatile and highly integrated single-chip processor The read thread passes to the process block, the SCSI CDB that it has extracted from the received iscsi PDU. Incoming requests are picked up by this thread and after stripping out the protocol headers is deposited on the Incoming Queue. The process block has three logical units. The classifier classifies incoming packets into two flows; those which are destined to the storage device and those to the printer device. The flow that is intended for the printer device is led to the Printer I/O thread, and those for the storage device, to the Disk I/O thread, as shown in Figure 4. The classifier based on the Operation Code of the SCSI CDB determines which flow a particular incoming packet falls
4 4 into [2]. The classifier interacts with both the Disk I/O thread and the Print I/O thread. We work with the virtual file system, so as to benefit from all the abstractions that the Linux kernel provides us. So in this scheme, a traditional file stored on the file system, is the logical unit (LU) that is projected to the initiator. we call this dump printing. When the USB flash device is detected by the kernel, it spawns a process that handles this task. The process scans through the root directory of the file system of the flash disk, looking for the meta-data file. V. FUTURE WORK Fig. 4 Design Pipeline This scheme gives us the freedom to use any kind of hardware for the storage device. This device independence is possible due to high level of abstraction that the virtual file system guarantees us. The Printer I/O Thread will receive SCSI CDBs that it sends directly to the SCSI Mid Layer. By doing so it simply emulates a directly connected SCSI printer device. iscsi gives us the benefit of extending it seamlessly over a network. Thus all hosts whose initiators are configured view the printer as a directly attached printer device. The printer I/O thread interacts with the SCSI Mid Layer of the kernel. This way we only interact with the kernel never actually modifying modules, thus preserving the ability to work with newer kernels. Maintaining interoperability with newer kernel versions was an important design goal. The device currently works with SCSI printers. Another feature that the device provides is host independent printing. As mentioned earlier, this provides a direct printing service from a USB flash device, without the intervention of a host machine. The IXP425 is typically suited for such embedded applications. The IXP425 provides a USB 1.0 port, which along with the USB Mass Storage Class drivers that are provided by the Linux 2.6 kernel enables us to provide such a service. Here it must be noted that the Linux 2.6 kernel tree by it self supports several file systems, nearly 20 officially. This is important to such a device because it enables us to detect and mount several different kinds of file systems. USB Flash devices are typically formatted using the FAT 32 file system, but by using the kernel functionality we aren't limited by that. As for host independent printing, we provide two options, a) Either locate meta-data that is present on the flash device that provides information on the files on the flash device that are to be printed. We call this selective printing. b) Or print all the files that are present on the flash device, A. Printer Subsystem The current design supports only SCSI printers as it only extracts the SCSI CDBs from the iscsi PDUs and passes it on to the SCSI mid layer that interacts with the printer. A better and more generalized solution would be to extend this idea to make it work for other types of printers too. This would require the presence of another abstraction layer that will map the SCSI commands set to the appropriate target command set. B. Storage Subsystem The high level abstractions that are used and the rich functionality that the kernel provides makes the storage system very extensible. Some of the intended future work includes a) Building an Object Store Drive [9]. An object store drive is a storage device that manages space in terms of objects and offsets within objects rather than logical block addresses(lba). OSDs are primarily targeted towards shared storage and shared-something multiprocessors architectures. Such systems need high speed devices that work over the network and a network processor based implementation such as ours would be the best-suited for such scenarios. b) Increasing reliability and bandwidth by accommodating RAID based storage solutions on the device. VI. CONCLUSION Our device holds much promise. Its high flexibility, portability, and simplicity make it a general solution to existing problems faced in small office/home office environments. The centralized storage and printing concept increases data management and device utilization which bring down costs. We have designed it to be extensible so that future improvements in storage and print technologies can be incorporated with minimal effort. Usage of the IXP425 Network Processor makes for a cost-effective and efficient implementation that provides high levels of performance. Host independent printing facilitates printer utilization without machine intervention.
5 5 REFERENCES [1] J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka, and E. Zeidner, Internet Small Computer Systems Interface (iscsi), April 2004, RFC [2] M. Chadlapaka, R. Elliott, Small Computer Systems Interface(SCSI) Command Ordering Considerations with iscsi, May 2004, RFC 3783 [3] F. Tomonori and O. Masanori, Analysis of iscsi Target Software. [4] P. Radkov, L. Yin, P. Goyal, and P. Sarkar, A Performance Comparison of NFS and iscsi for IP-Networked Storage, in the USENIX Conference on File and Storage Technologies, San Francisco, CA, March 2004, pp [5] A. Palekar, N. Ganapathy, A. Chadda, and R. D. Russell, Design and implementation of a Linux SCSI target for storage area networks, in the 5 th Annual Linux Showcase & Conference. Atlanta, GA: USENIX, November [6] K. Z. Meth, J. Satran, Design of the iscsi Protocol, in the Mass Storage Systems and Technologies, 2003, proceedings 20 th IEEE/11 th NASA Goddard Conference, April 2003, pp [7] P. Barry, and G. Hartnett, Designing Embedded Networking Applications,, Intel Press, May [8] R. Herriot, S. Butler, P. Moore, R. Turner, Internet Printing Protocol/1.0; Encoding and Transport., April 1999, RFC 2565 [9] A. Azagury, V. Dreizin, M. Factor, E. Henis, D. Naor, N. Rinetzky, O. Rodeh, J. Satran, A. Tavory, L. Yerushalmi, Towards an Object Store, in the Mass Storage Systems and Technologies, 2003, proceedings 20 th IEEE/11 th NASA Goddard Conference, April 2003, pp
A Packet Forwarding Method for the ISCSI Virtualization Switch
Fourth International Workshop on Storage Network Architecture and Parallel I/Os A Packet Forwarding Method for the ISCSI Virtualization Switch Yi-Cheng Chung a, Stanley Lee b Network & Communications Technology,
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
EVOLUTION OF NETWORKED STORAGE
EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. [email protected] 2 Lecturer, Deptt
Online Remote Data Backup for iscsi-based Storage Systems
Online Remote Data Backup for iscsi-based Storage Systems Dan Zhou, Li Ou, Xubin (Ben) He Department of Electrical and Computer Engineering Tennessee Technological University Cookeville, TN 38505, USA
The proliferation of the raw processing
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
iscsi: Accelerating the Transition to Network Storage
iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,
From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller
White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller
Disk-to-Disk Backup & Restore Application Note
Disk-to-Disk Backup & Restore Application Note All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from
Affordable. Simple, Reliable and. Vess Family Overview. VessRAID FC RAID Storage Systems. VessRAID SAS RAID Storage Systems
Simple, Reliable and Affordable Vess Family Overview VessRAID FC RAID Storage Systems Fiber Channel s dominance for applications requiring high substantial bandwidth in the market still remains high as
DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization
DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain
VERITAS Backup Exec 9.0 for Windows Servers
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
Performance of optimized software implementation of the iscsi protocol
Performance of optimized software implementation of the iscsi protocol Fujita Tomonori and Ogawara Masanori NTT Network Innovation Laboratories 1-1 Hikarinooka Yokosuka-Shi Kanagawa, Japan Email: [email protected],
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
Block based, file-based, combination. Component based, solution based
The Wide Spread Role of 10-Gigabit Ethernet in Storage This paper provides an overview of SAN and NAS storage solutions, highlights the ubiquitous role of 10 Gigabit Ethernet in these solutions, and illustrates
Introduction to Gluster. Versions 3.0.x
Introduction to Gluster Versions 3.0.x Table of Contents Table of Contents... 2 Overview... 3 Gluster File System... 3 Gluster Storage Platform... 3 No metadata with the Elastic Hash Algorithm... 4 A Gluster
Accelerating I/O- Intensive Applications in IT Infrastructure with Innodisk FlexiArray Flash Appliance. Alex Ho, Product Manager Innodisk Corporation
Accelerating I/O- Intensive Applications in IT Infrastructure with Innodisk FlexiArray Flash Appliance Alex Ho, Product Manager Innodisk Corporation Outline Innodisk Introduction Industry Trend & Challenge
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
IP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability
White Paper Windows TCP Chimney: Network Protocol Offload for Optimal Application Scalability and Manageability The new TCP Chimney Offload Architecture from Microsoft enables offload of the TCP protocol
760 Veterans Circle, Warminster, PA 18974 215-956-1200. Technical Proposal. Submitted by: ACT/Technico 760 Veterans Circle Warminster, PA 18974.
760 Veterans Circle, Warminster, PA 18974 215-956-1200 Technical Proposal Submitted by: ACT/Technico 760 Veterans Circle Warminster, PA 18974 for Conduction Cooled NAS Revision 4/3/07 CC/RAIDStor: Conduction
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily
ADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4. More information: WWW.NIVEOPROFESSIONAL.COM [email protected]
NIVEO Network Attached Storage Series NNAS-D5 NNAS-R4 More information: WWW.NIVEOPROFESSIONAL.COM [email protected] Product Specification Introduction The NIVEO NNAS series is specifically designed
Wireless ATA: A New Data Transport Protocol for Wireless Storage
Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr
Chapter 13 Selected Storage Systems and Interface
Chapter 13 Selected Storage Systems and Interface Chapter 13 Objectives Appreciate the role of enterprise storage as a distinct architectural entity. Expand upon basic I/O concepts to include storage protocols.
LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client
LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled
EMC VNXe File Deduplication and Compression
White Paper EMC VNXe File Deduplication and Compression Overview Abstract This white paper describes EMC VNXe File Deduplication and Compression, a VNXe system feature that increases the efficiency with
How To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On
Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing
Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata
Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
NETWORK ATTACHED STORAGE DIFFERENT FROM TRADITIONAL FILE SERVERS & IMPLEMENTATION OF WINDOWS BASED NAS
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), ISSN 0976 & 6375(Online) TECHNOLOGY Volume 4, Issue (IJCET) 3,
How To Virtualize A Storage Area Network (San) With Virtualization
A New Method of SAN Storage Virtualization Table of Contents 1 - ABSTRACT 2 - THE NEED FOR STORAGE VIRTUALIZATION 3 - EXISTING STORAGE VIRTUALIZATION METHODS 4 - A NEW METHOD OF VIRTUALIZATION: Storage
DAS (Direct Attached Storage)
Data Storage 101 Data Storage 101 In this guide, we will explain the differences between:» DAS (Direct Attached Storage)» JBOD (Just a Bunch Of Drives)» NAS (Network Attached Storage)» SAN (Storage Area
Best Practices for Data Sharing in a Grid Distributed SAS Environment. Updated July 2010
Best Practices for Data Sharing in a Grid Distributed SAS Environment Updated July 2010 B E S T P R A C T I C E D O C U M E N T Table of Contents 1 Abstract... 2 1.1 Storage performance is critical...
The Panasas Parallel Storage Cluster. Acknowledgement: Some of the material presented is under copyright by Panasas Inc.
The Panasas Parallel Storage Cluster What Is It? What Is The Panasas ActiveScale Storage Cluster A complete hardware and software storage solution Implements An Asynchronous, Parallel, Object-based, POSIX
Backup Solutions for the Celerra File Server
White Paper Backup Solutions for the Celerra File Server EMC Corporation 171 South Street, Hopkinton, MA 01748-9103 Corporate Headquarters: 508) 435-1000, (800) 424-EMC2 Fax: (508) 435-5374, Service: (800)
an introduction to networked storage
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
Intel DPDK Boosts Server Appliance Performance White Paper
Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks
Network Data Management Protocol (NDMP) White Paper
Network Data Management Protocol (NDMP) White Paper Summary What is the primary goal of enterprise storage management? To back up and restore information in an intelligent, secure, timely, cost-effective
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Database Configuration: SAN or NAS
Database Configuration: SAN or NAS Discussion of Fibre Channel SAN and NAS Version:.0 Greg Schulz DBSANNAS.DOC Preface This publication is for general guidance and informational purposes only. The information
Architecting Your SAS Grid : Networking for Performance
ABSTRACT Paper SAS6760-2016 Architecting Your SAS : Networking for Performance Tony Brown and Margaret Crevar, SAS Institute Inc. With the popularity of network-attached storage for shared file systems,
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
Simple Network Management Protocol
A Seminar Report on Simple Network Management Protocol Submitted in partial fulfillment of the requirement for the award of degree Of Computer Science SUBMITTED TO: SUBMITTED BY: www.studymafia.org www.studymafia.org
How To Design A Data Center
Data Center Design & Virtualization Md. Jahangir Hossain Open Communication Limited [email protected] Objectives Data Center Architecture Data Center Standard Data Center Design Model Application Design
IP SAN Fundamentals: An Introduction to IP SANs and iscsi
IP SAN Fundamentals: An Introduction to IP SANs and iscsi Updated April 2007 Sun Microsystems, Inc. 2007 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 USA All rights reserved. This
Microsoft Windows Storage Server 2003 R2
Microsoft Windows Storage Server 2003 R2 Getting Started Guide Abstract This guide documents the various features available in Microsoft Windows Storage Server 2003 R2. Rev 1. 2005 Microsoft Corporation.
VTrak 15200 SATA RAID Storage System
Page 1 15-Drive Supports over 5 TB of reliable, low-cost, high performance storage 15200 Product Highlights First to deliver a full HW iscsi solution with SATA drives - Lower CPU utilization - Higher data
Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION
Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated APRIl 2012 Table of Contents Introduction.... 3 Storage Protocol Comparison Table....4 Conclusion...10 About the
Implementing Storage Concentrator FailOver Clusters
Implementing Concentrator FailOver Clusters Technical Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to
SAN and NAS Bandwidth Requirements
SAN and NAS Bandwidth Requirements Exploring Networked Storage Scott Kipp Office of the CTO Brocade Inc. Categorizing Storage - DAS SAN - NAS Directly Attached Storage DAS Storage that is connected point-to-point
Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation
Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly
Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1
Performance Study Performance Characteristics of and RDM VMware ESX Server 3.0.1 VMware ESX Server offers three choices for managing disk access in a virtual machine VMware Virtual Machine File System
HANTZ + PARTNER. The Upgrade Company! www.hantz.com. :: NAStorage Server ::
HANTZ + PARTNER The Upgrade Company! www.hantz.com :: NAStorage Server :: Delivering Power of Storage Top 10 reasons for choosing NAStorage your network attached storage (NAS) server server as 1.Experience
Moving Media Storage Technologies
Moving Media Storage Technologies Applications & Workflows for Video and Media Server Platforms Karl Paulsen CONTENTS Acknowledgments Introduction xv xvii Chapter 1 Information, Data, and Video 1 Data
Broadcom Ethernet Network Controller Enhanced Virtualization Functionality
White Paper Broadcom Ethernet Network Controller Enhanced Virtualization Functionality Advancements in VMware virtualization technology coupled with the increasing processing capability of hardware platforms
Using High Availability Technologies Lesson 12
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
Storage Design for High Capacity and Long Term Storage. DLF Spring Forum, Raleigh, NC May 6, 2009. Balancing Cost, Complexity, and Fault Tolerance
Storage Design for High Capacity and Long Term Storage Balancing Cost, Complexity, and Fault Tolerance DLF Spring Forum, Raleigh, NC May 6, 2009 Lecturer: Jacob Farmer, CTO Cambridge Computer Copyright
Getting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
Addendum No. 1 to Packet No. 28-13 Enterprise Data Storage Solution and Strategy for the Ingham County MIS Department
Addendum No. 1 to Packet No. 28-13 Enterprise Data Storage Solution and Strategy for the Ingham County MIS Department The following clarifications, modifications and/or revisions to the above project shall
NAS or iscsi? White Paper 2007. Selecting a storage system. www.fusionstor.com. Copyright 2007 Fusionstor. No.1
NAS or iscsi? Selecting a storage system White Paper 2007 Copyright 2007 Fusionstor www.fusionstor.com No.1 2007 Fusionstor Inc.. All rights reserved. Fusionstor is a registered trademark. All brand names
Application Brief: Using Titan for MS SQL
Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical
Storage Solutions Overview. Benefits of iscsi Implementation. Abstract
Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses
Redundancy in enterprise storage networks using dual-domain SAS configurations
Redundancy in enterprise storage networks using dual-domain SAS configurations technology brief Abstract... 2 Introduction... 2 Why dual-domain SAS is important... 2 Single SAS domain... 3 Dual-domain
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Implementing Offline Digital Video Storage using XenData Software
using XenData Software XenData software manages data tape drives, optionally combined with a tape library, on a Windows Server 2003 platform to create an attractive offline storage solution for professional
Performance, Reliability, and Operational Issues for High Performance NAS Storage on Cray Platforms. Cray User Group Meeting June 2007
Performance, Reliability, and Operational Issues for High Performance NAS Storage on Cray Platforms Cray User Group Meeting June 2007 Cray s Storage Strategy Background Broad range of HPC requirements
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
CGHub Client Security Guide Documentation
CGHub Client Security Guide Documentation Release 3.1 University of California, Santa Cruz April 16, 2014 CONTENTS 1 Abstract 1 2 GeneTorrent: a secure, client/server BitTorrent 2 2.1 GeneTorrent protocols.....................................
Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its
DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business
NETAPP WHITE PAPER USING A NETWORK APPLIANCE SAN WITH VMWARE INFRASTRUCTURE 3 TO FACILITATE SERVER AND STORAGE CONSOLIDATION
NETAPP WHITE PAPER USING A NETWORK APPLIANCE SAN WITH VMWARE INFRASTRUCTURE 3 TO FACILITATE SERVER AND STORAGE CONSOLIDATION Network Appliance, Inc. March 2007 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 BACKGROUND...
Overview of Requirements and Applications for 40 Gigabit and 100 Gigabit Ethernet
Overview of Requirements and Applications for 40 Gigabit and 100 Gigabit Ethernet Version 1.1 June 2010 Authors: Mark Nowell, Cisco Vijay Vusirikala, Infinera Robert Hays, Intel 1. This work represents
Introduction to the Network Data Management Protocol (NDMP)
Intelligent Network Computing Introduction to the Network Data Management Protocol (NDMP) The explosion of data generation and storage in recent years has led to the introduction of new technologies for
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Overview and Frequently Asked Questions Sun Storage 10GbE FCoE PCIe CNA
Overview and Frequently Asked Questions Sun Storage 10GbE FCoE PCIe CNA Overview Oracle s Fibre Channel over Ethernet (FCoE technology provides an opportunity to reduce data center costs by converging
HP iscsi storage for small and midsize businesses
HP iscsi storage for small and midsize businesses IP SAN solution guide With data almost doubling in volume every year, businesses are discovering that they need to take a strategic approach to managing
Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
A Comparison on Current Distributed File Systems for Beowulf Clusters
A Comparison on Current Distributed File Systems for Beowulf Clusters Rafael Bohrer Ávila 1 Philippe Olivier Alexandre Navaux 2 Yves Denneulin 3 Abstract This paper presents a comparison on current file
ACHIEVING STORAGE EFFICIENCY WITH DATA DEDUPLICATION
ACHIEVING STORAGE EFFICIENCY WITH DATA DEDUPLICATION Dell NX4 Dell Inc. Visit dell.com/nx4 for more information and additional resources Copyright 2008 Dell Inc. THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES
Ultimate Guide to Oracle Storage
Ultimate Guide to Oracle Storage Presented by George Trujillo [email protected] George Trujillo Twenty two years IT experience with 19 years Oracle experience. Advanced database solutions such
1000-Channel IP System Architecture for DSS
Solution Blueprint Intel Core i5 Processor Intel Core i7 Processor Intel Xeon Processor Intel Digital Security Surveillance 1000-Channel IP System Architecture for DSS NUUO*, Qsan*, and Intel deliver a
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology
I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain
OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available
Phone: (603)883-7979 [email protected] Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous
