A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
OGSSim: Open Generic data Storage systems Simulation tool
2015
Proceedings of the Eighth EAI International Conference on Simulation Tools and Techniques
The diversity of the supported devices, regardless to their nature: disks, buses, ..etc and organisation: JBOD, RAID, ..etc makes the simulator open to many technologies. ...
The target simulated system is constructed from the hardware configuration input, then sent to the simulator modules along with the trace file and the appropriate simulator functions are selected and executed ...
It achieves the simulation process in a reduced duration: about 10s for 400K req with the simplest configuration (JBOD) and 140s with the most complex one (RAID 5+2). ...
doi:10.4108/eai.24-8-2015.2261023
dblp:conf/simutools/GougeaudZLD15
fatcat:ryeubuh3mbe4zn2vn4g34sx524
Energy aware RAID configuration for large storage systems
2011
2011 International Green Computing Conference and Workshops
Large storage facilities have various RAID configurations incorporating different RAID levels, numbers of drives, and media types. ...
Nevertheless, few discussions of RAID configurations have been pursued from an energy saving perspective. ...
We can then implement RAID configuration tools for energy-aware RAID configuration tools for high performance storages. We can then evaluate those tools and configurations using several workloads. ...
doi:10.1109/igcc.2011.6008568
dblp:conf/green/NishikawaNK11
fatcat:xohi5kenqrbrfgtmq3n4rkxalq
Generic RAID reassembly using block-level entropy
2016
Digital Investigation. The International Journal of Digital Forensics and Incident Response
This might be the case because the original configuration just has not been documented or in the forensic case, the administrator might not be cooperating and not willing to reveal the configuration. ...
Due to the variety of RAID controllers and various implementation and configuration possibilities, different parameters that are necessary for reconstruction are often unknown. ...
In case of RAID systems created with the tool mdadm (version 3.2.5), a superblock with details about the configuration of the RAID system is stored 4 KB after start of each device. ...
doi:10.1016/j.diin.2016.01.007
fatcat:a2unqmds6zeshmoeuctonmvqpa
Deconstructing storage arrays
2004
Proceedings of the 11th international conference on Architectural support for programming languages and operating systems - ASPLOS-XI
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. ...
We illustrate the correctness of Shear by running it upon numerous simulated configurations, and then verify its real-world applicability by running Shear on both software-based and hardware-based RAID ...
ACKNOWLEDGEMENTS We would like to thank Bradford Beckmann, Nathan Burnett, Vijayan Prabhakaran, Muthian Sivathanu, and the anonymous reviewers for their excellent feedback. ...
doi:10.1145/1024393.1024401
dblp:conf/asplos/DenehyBPAA04
fatcat:wi6nqzfamvhbtm5vne4pw6t3sq
Deconstructing storage arrays
2004
SIGPLAN notices
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. ...
We illustrate the correctness of Shear by running it upon numerous simulated configurations, and then verify its real-world applicability by running Shear on both software-based and hardware-based RAID ...
ACKNOWLEDGEMENTS We would like to thank Bradford Beckmann, Nathan Burnett, Vijayan Prabhakaran, Muthian Sivathanu, and the anonymous reviewers for their excellent feedback. ...
doi:10.1145/1037187.1024401
fatcat:br7nzcuhevgzpbqmy77lg2p75m
Deconstructing storage arrays
2004
ACM SIGOPS Operating Systems Review
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. ...
We illustrate the correctness of Shear by running it upon numerous simulated configurations, and then verify its real-world applicability by running Shear on both software-based and hardware-based RAID ...
ACKNOWLEDGEMENTS We would like to thank Bradford Beckmann, Nathan Burnett, Vijayan Prabhakaran, Muthian Sivathanu, and the anonymous reviewers for their excellent feedback. ...
doi:10.1145/1037949.1024401
fatcat:5dwc74fdwbazraoybbbqta5xhy
Deconstructing storage arrays
2004
SIGARCH Computer Architecture News
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. ...
We illustrate the correctness of Shear by running it upon numerous simulated configurations, and then verify its real-world applicability by running Shear on both software-based and hardware-based RAID ...
ACKNOWLEDGEMENTS We would like to thank Bradford Beckmann, Nathan Burnett, Vijayan Prabhakaran, Muthian Sivathanu, and the anonymous reviewers for their excellent feedback. ...
doi:10.1145/1037947.1024401
fatcat:nbykww4dtzfafj76c4p233bysm
Addressing the Security Issues of Kerberos Method using RAID Level 5
2018
European Journal of Engineering Research and Science
Also, RAID 5 can be used in case of distributed data. So, a model has been proposed to configure RAID 5 to ensure better security of cloud storage by overcoming the limitations of Kerberos. ...
This research paper has tried to overcome these security issues, accessing and recovering data by using the RAID level. ...
This can be accessed either from Computer Management tools or from the Server Manager. Disk Management Tools are found in the storage Category in all scenarios. ...
doi:10.24018/ejers.2018.3.7.832
fatcat:uu6pseb76jbfdeovn5eoz2b67u
Performance Analysis of RAIDs in Storage Area Network
2015
International Journal of Computer Applications
The redundancy of data is very important to provide high data availability; this can be achieved by having RAID (Redundant Array of Inexpensive Disks) methods. ...
This paper describes the performance analysis on RAID levels 0,1,5,6 and10 through IOR benchmark tests on SAN which is implemented using ATA(Advanced Technology Attachment) over Ethernet protocol AoE(ATA ...
INTRODUCTION RAID management tools are used to configure storage on Storage Area Network. ...
doi:10.5120/ijca2015906231
fatcat:f544inpd7bem7akr4l3qih2qa4
Performance Parameters in File-Based Workflows
2013
SMPTE Motion Imaging Journal
(a) A RAID 5S array configuration with single-drive failure fault tolerance. The 5-drive set will provide better bandwidth (more spindles) than the 4-drive set. ...
If a set of 4 TB drives were configured into a RAID set, then multiplied to obtain high-capacity volumes, the time required to rebuild a RAID set when (not if) a 4 TB drive fails can take several hours ...
doi:10.5594/j18358xy
fatcat:bkbeffu3vbebdacu2fivver4t4
Minerva: An automated resource provisioning tool for large-scale storage systems
2001
ACM Transactions on Computer Systems
To solve the configuration nightmare, we present MIN-ERVA: a suite of tools for designing storage systems automatically. ...
MINERVA uses declarative specifications of application requirements and device capabilities; constraintbased formulations of the various sub-problems; and optimization techniques to explore the search ...
Acknowledgments We are grateful to Eric Anderson, who wrote the set of scripts for the TPC-D experiments and provided valuable feedback. ...
doi:10.1145/502912.502915
fatcat:q6sykmknpveepiwql42m6rxln4
Simulating fault injection on disk arrays
2012
FERS-Mitteilungen
The software is completely parameterizable in order to simulate different types of disk errors and disk array configurations. ...
We believe that this simulation software is the first one that is able to cover a complete range of disk error types in many commonly used disk array configurations. ...
in complex disk arrays with different sets of parameters.
3 Simulator architecture
Supported configurations The proposed tool simulates the behavior of a disk array (RAID) over an extended period ...
doi:10.1007/bf03345459
fatcat:qvjir5a5nbftxpnrpxczyklhje
CLOUD COMPUTING FOR SPACECRAFT CHECKOUT OPERATIONS
2016
International Journal of Research in Engineering and Technology
A lot of manual effort goes in the checkout preparatory phase where in the databases, test procedures and configuration files are prepared. ...
About 60 percent of the Spacecraft Checkout operations have been automated using a suite of software tools which runs on Checkout servers which are on LINUX platform. ...
Sheena Jose, Section Head, IMCD, ISRO Satellite Centre, Bangalore, India for the valuable guidance, support and inspiring innovation throughout the realization of this project. ...
doi:10.15623/ijret.2016.0506088
fatcat:pg6qmpkgvja3batus34gbzxcgq
Building a research data science platform from industrial machines
2016
2016 IEEE International Conference on Big Data (Big Data)
While traditional HPC offers tools on leveraging existing technologies with data processing needs, the large volume of data and the speed of data generation pose significant challenges. ...
Turning these industrial machines into a research Data Science Platform (DSP) poses unique challenges, such as: nontrivial hardware design decisions, configuration tool choices, node integration into existing ...
And it uses another tool (which we shall discuss next) to configure Hadoop related settings.
A. ...
doi:10.1109/bigdata.2016.7840859
dblp:conf/bigdataconf/LiuSCBB16
fatcat:z2pp57xhsvdkfjdqlutvnjuita
Disk-to-Disk network transfers at 100 Gb/s
2012
Journal of Physics, Conference Series
We will discuss the transfer tools, disk configurations, and monitoring tools used in the demonstration. ...
The configuration of the network and the server configuration are discussed. ...
We would like to acknowledge the support of the Natural Sciences and Engineering Research Council of Canada, the National Science Foundation, and the US Department of Energy. ...
doi:10.1088/1742-6596/396/4/042006
fatcat:x6mjkdb3brfinhhiftmeytdxfy
« Previous
Showing results 1 — 15 out of 9,996 results