Filters








47 Hits in 2.9 sec

Efficient Logging and Replication Techniques for Comprehensive Data Protection

Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
2007 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)  
Ethernet-based storage area networks.  ...  Mariner is an iSCSI-based storage system that is designed to provide comprehensive data protection on commodity ATA disk and Gigabit Ethernet technologies while offering the same performance as those without  ...  Impact of iSCSI Processing This subsection evaluates the write throughput and latency of Mariner's Trail node as seen from an iSCSI client.  ... 
doi:10.1109/msst.2007.4367972 fatcat:whpuixfm3zfdvjxcs5uurf6iyq

Flash storage disaggregation

Ana Klimovic, Christos Kozyrakis, Eno Thereksa, Binu John, Sanjeev Kumar
2016 Proceedings of the Eleventh European Conference on Computer Systems - EuroSys '16  
We use our analysis to draw conclusions about data and control plane issues in remote storage.  ...  We tune remote access to Flash over commodity networks and analyze its impact on workloads sampled from real datacenter applications.  ...  Acknowledgments We thank Christina Delimitrou, Heiner Litz, and the anonymous reviewers for their valuable feedback.  ... 
doi:10.1145/2901318.2901337 dblp:conf/eurosys/KlimovicKTJK16 fatcat:vtac754qfzerlpwz4ku75n7nf4

Design of an exact data deduplication cluster

Jurgen Kaiser, Dirk Meister, Andre Brinkmann, Sascha Effert
2012 012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST)  
Data deduplication is an important component of enterprise storage environments.  ...  SAN iSCSI/FC GBit/IB SCSI Target Fig. 1. Single deduplication node.  ...  ACKNOWLEDGMENTS The authors would like to thank the German Federal Ministry of Economics and Technology (BMWi) for partly funding this work in the project SIMBA.  ... 
doi:10.1109/msst.2012.6232380 dblp:conf/mss/KaiserMBE12 fatcat:tn3bklssfzg4dfvmnwr63o3egm

Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

Ivy Ong, Hyo-Taek Lim
2011 Journal of Information Processing Systems  
A lightweight block-level protocol, Internet Advanced Technology Attachment (iATA), has been developed to deliver a costeffective storage network solution for mobile devices to obtain more storage.  ...  With the steady growth of mobile technology and applications, demand for more storage in mobile devices has also increased.  ...  An alternative way to obtain more storage is through the use of storage network technology, such as deploying the existing Internet Small Computer System Interface (iSCSI) application protocol to facilitate  ... 
doi:10.3745/jips.2011.7.1.053 fatcat:pk6o2j6jcvcazby3bnl7iuscbu

File Versioning for Block-Level Continuous Data Protection

Maohua Lu, Tzicker Chiueh
2009 2009 29th IEEE International Conference on Distributed Computing Systems  
As a result, the data they maintain cannot be used as an an extension to the on-line system with which users routinely interact.  ...  client serviced by an NFS server backed by a block-level CDP system.  ...  We use the elapsed time for servicing a file versioning query as the metric for evaluating UVFS's performance.  ... 
doi:10.1109/icdcs.2009.48 dblp:conf/icdcs/LuC09 fatcat:m2h6pscmqjdqvfhvupf32tfwji

A Model of Storage I/O Performance Interference in Virtualized Systems

Giuliano Casale, Stephan Kraft, Diwakar Krishnamurthy
2011 2011 31st International Conference on Distributed Computing Systems Workshops  
We use a measurement-based approach based on tools such as blktrace and tshark for storage workload characterization in a commercial virtualized solution, namely VMware ESX server.  ...  Our approach allows a distinct characterization of read/write performance attributes on a per request level and provides valuable information for parameterization of storage I/O performance models.  ...  In order to monitor the I/O request trace submitted from the VMM to the storage server, we use the network protocol analyzer tshark [20] to intercept iSCSI network packets.  ... 
doi:10.1109/icdcsw.2011.46 dblp:conf/icdcsw/CasaleKK11 fatcat:igvbj5oio5bs5m4w6q6zsvjnh4

Dependability evaluation and benchmarking of Network Function Virtualization Infrastructures

Domenico Cotroneo, Luigi De Simone, Antonio Ken Iannillo, Anna Lanzaro, Roberto Natella
2015 Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)  
In this paper, we propose a methodology for the dependability evaluation and benchmarking of NFV Infrastructures (NFVIs), based on fault injection.  ...  Network Function Virtualization (NFV) is an emerging solution that aims at improving the flexibility, the efficiency and the manageability of networks, by leveraging virtualization and cloud computing  ...  The only VNFs that use remote storage (iSCSI) are Homer and Homestead; to emulate storage faults, we will inject network faults in the iSCSI traffic generated by Homestead.  ... 
doi:10.1109/netsoft.2015.7116123 dblp:conf/netsoft/CotroneoSILN15 fatcat:hnvqxb7bvnhlvoutu7kfrfcijm

Dependability Analysis of Data Storage Systems in Presence of Soft Errors

Mostafa Kishani, Mehdi Tahoori, Hossein Asadi
2019 IEEE Transactions on Reliability  
experiments, it is revealed that depending on the controller configuration, up to 40% of cache memory contains end-user data where any unrecoverable soft errors in this part will result in Data Loss (DL) in an  ...  field are mainly the cause of DL in storage systems.  ...  network protocols such as iSCSI and Fiber Channel.  ... 
doi:10.1109/tr.2018.2888515 fatcat:ycwhs5d4frbl5dvfrdvolrjhge

Towards Transactional Load over XtreemFS [article]

Roman Talyansky, Bernd Scheuermann, Bjorn Kolbeck, Jan Stender
2010 arXiv   pre-print
We would like to thank the following people for their contributions to the paper: Adolf Hohl for sharing with us his insightful thoughts; Eliezer Levy for providing valuable comments and reviewing the  ...  paper; Sage Weil and Yehuda Sadeh Weinraub for their support in using CEPH file system; Roman Magarshak and Ruediger Winter for their dedicated support in maintaining the underlying cluster.  ...  In this paper, we describe a trace-based methodology for performing such an evaluation without having to actually run the application.  ... 
arXiv:1001.2931v3 fatcat:pg5jpwr6ozfshjozlwh4ctymiy

Scalable Index Update for Block-Level Continuous Data Protection

Maohua Lu, Dilip Simha, Tzi-cker Chiueh
2011 2011 IEEE Sixth International Conference on Networking, Architecture, and Storage  
A block-level continuous data protection (CDP) system logs every disk update to a network storage server it protects, so as to support more flexible recovery time objective (RTO) and recovery point objective  ...  Empirical performance measurements demonstrate that the proposed technique improves the index update throughput by more than an order of magnitude and reduces the performance overhead associated with index  ...  Every disk write from an application server is duplicated, one for the target storage server and the other for the CDP appliance.  ... 
doi:10.1109/nas.2011.54 dblp:conf/nas/LuSC11 fatcat:nfxw6smhrbfsnambs66sflcoda

Comprehensive Survey of Security Issues & Framework in Data-Centric Cloud Applications

Sudakshina Mandal, Danish Ali Khan
2021 Journal of Engineering Science and Technology Review  
This has enabled a more incredible communication speed paired with a better fault tolerance of web-based applications and the scope of having practically unlimited storage available for the user and business  ...  The presence of such security vulnerabilities has rendered cloud security to be an active research area.  ...  This is an Open Access article distributed under the terms of the Creative Commons Attribution License. ______________________________ References  ... 
doi:10.25103/jestr.141.01 fatcat:iaztwp6lnneb7mbzglqsz7ruaq

E-eco: Performance-aware energy-efficient cloud data center orchestration

Fábio D. Rossi, Miguel G. Xavier, César A.F. De Rose, Rodrigo N. Calheiros, Rajkumar Buyya
2017 Journal of Network and Computer Applications  
In addition to the empirical experiments, we also analyzed the scalability of our approach with an enhanced version of the CloudSim simulator.  ...  In cloud environments, several techniques are being used that aim for energy efficiency, ranging from scaling the processors frequency, to the use of sleep states during idle periods and the consolidation  ...  Tests were carried out on an infrastructure with 2 servers and a shared storage (PowerVault MD3200i SAN Storage Array) configured with 1 Gigabyte iSCSI as the communication protocol between storage and  ... 
doi:10.1016/j.jnca.2016.10.024 fatcat:75j6nlb2ljew5gywi4s4mjrwwi

Computer and Information Science, Vol. 2, No. 4, November, 2009, Part B

Editor CIS
2009 Computer and Information Science  
Each link is symmetric and the approximate distance of two nodes can be evaluated according to the received signal intensity.  ...  Knowledge management system (KMS) can support the processes of knowledge creation, storage or retrieval, transfer and application.  ...  span standard Ethernet cable to establish actual SAN network at any place, and they need not to require special fiber channel network to transfer data between the server and the storage devices. iSCSI  ... 
doi:10.5539/cis.v2n4p0b fatcat:czdrf2wi75avbiq7kbg27zeepi

Enhancement of Hierarchy Cluster-Tree Routing for Wireless Sensor Network

Xuxing Ding, Fangfang Xie, Qing Wu
2009 Computer and Information Science  
Each link is symmetric and the approximate distance of two nodes can be evaluated according to the received signal intensity.  ...  Knowledge management system (KMS) can support the processes of knowledge creation, storage or retrieval, transfer and application.  ...  span standard Ethernet cable to establish actual SAN network at any place, and they need not to require special fiber channel network to transfer data between the server and the storage devices. iSCSI  ... 
doi:10.5539/cis.v2n4p89 fatcat:nhc7jiwirrhstorva4xsgky4pa

Computer and Information Science, Vol. 2, No. 4, November, 2009, Part A

Editor CIS
2009 Computer and Information Science  
Each link is symmetric and the approximate distance of two nodes can be evaluated according to the received signal intensity.  ...  Knowledge management system (KMS) can support the processes of knowledge creation, storage or retrieval, transfer and application.  ...  span standard Ethernet cable to establish actual SAN network at any place, and they need not to require special fiber channel network to transfer data between the server and the storage devices. iSCSI  ... 
doi:10.5539/cis.v2n4p0a fatcat:tgkgoy4mczfevkd42llwzxubl4
« Previous Showing results 1 — 15 out of 47 results