Filters








9,996 Hits in 4.0 sec

OGSSim: Open Generic data Storage systems Simulation tool

Sebastien Gougeaud, Soraya Zertal, Jacques-Charles Lafoucriere, Philippe Deniel
2015 Proceedings of the Eighth EAI International Conference on Simulation Tools and Techniques  
The diversity of the supported devices, regardless to their nature: disks, buses, ..etc and organisation: JBOD, RAID, ..etc makes the simulator open to many technologies.  ...  The target simulated system is constructed from the hardware configuration input, then sent to the simulator modules along with the trace file and the appropriate simulator functions are selected and executed  ...  It achieves the simulation process in a reduced duration: about 10s for 400K req with the simplest configuration (JBOD) and 140s with the most complex one (RAID 5+2).  ... 
doi:10.4108/eai.24-8-2015.2261023 dblp:conf/simutools/GougeaudZLD15 fatcat:ryeubuh3mbe4zn2vn4g34sx524

Energy aware RAID configuration for large storage systems

Norifumi Nishikawa, Miyuki Nakano, Masaru Kitsuregawa
2011 2011 International Green Computing Conference and Workshops  
Large storage facilities have various RAID configurations incorporating different RAID levels, numbers of drives, and media types.  ...  Nevertheless, few discussions of RAID configurations have been pursued from an energy saving perspective.  ...  We can then implement RAID configuration tools for energy-aware RAID configuration tools for high performance storages. We can then evaluate those tools and configurations using several workloads.  ... 
doi:10.1109/igcc.2011.6008568 dblp:conf/green/NishikawaNK11 fatcat:xohi5kenqrbrfgtmq3n4rkxalq

Generic RAID reassembly using block-level entropy

Christian Zoubek, Sabine Seufert, Andreas Dewald
2016 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
This might be the case because the original configuration just has not been documented or in the forensic case, the administrator might not be cooperating and not willing to reveal the configuration.  ...  Due to the variety of RAID controllers and various implementation and configuration possibilities, different parameters that are necessary for reconstruction are often unknown.  ...  In case of RAID systems created with the tool mdadm (version 3.2.5), a superblock with details about the configuration of the RAID system is stored 4 KB after start of each device.  ... 
doi:10.1016/j.diin.2016.01.007 fatcat:a2unqmds6zeshmoeuctonmvqpa

Deconstructing storage arrays

Timothy E. Denehy, John Bent, Florentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2004 Proceedings of the 11th international conference on Architectural support for programming languages and operating systems - ASPLOS-XI  
We introduce Shear, a user-level software tool that characterizes RAID storage arrays.  ...  We illustrate the correctness of Shear by running it upon numerous simulated configurations, and then verify its real-world applicability by running Shear on both software-based and hardware-based RAID  ...  ACKNOWLEDGEMENTS We would like to thank Bradford Beckmann, Nathan Burnett, Vijayan Prabhakaran, Muthian Sivathanu, and the anonymous reviewers for their excellent feedback.  ... 
doi:10.1145/1024393.1024401 dblp:conf/asplos/DenehyBPAA04 fatcat:wi6nqzfamvhbtm5vne4pw6t3sq

Deconstructing storage arrays

Timothy E. Denehy, John Bent, Florentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2004 SIGPLAN notices  
We introduce Shear, a user-level software tool that characterizes RAID storage arrays.  ...  We illustrate the correctness of Shear by running it upon numerous simulated configurations, and then verify its real-world applicability by running Shear on both software-based and hardware-based RAID  ...  ACKNOWLEDGEMENTS We would like to thank Bradford Beckmann, Nathan Burnett, Vijayan Prabhakaran, Muthian Sivathanu, and the anonymous reviewers for their excellent feedback.  ... 
doi:10.1145/1037187.1024401 fatcat:br7nzcuhevgzpbqmy77lg2p75m

Deconstructing storage arrays

Timothy E. Denehy, John Bent, Florentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2004 ACM SIGOPS Operating Systems Review  
We introduce Shear, a user-level software tool that characterizes RAID storage arrays.  ...  We illustrate the correctness of Shear by running it upon numerous simulated configurations, and then verify its real-world applicability by running Shear on both software-based and hardware-based RAID  ...  ACKNOWLEDGEMENTS We would like to thank Bradford Beckmann, Nathan Burnett, Vijayan Prabhakaran, Muthian Sivathanu, and the anonymous reviewers for their excellent feedback.  ... 
doi:10.1145/1037949.1024401 fatcat:5dwc74fdwbazraoybbbqta5xhy

Deconstructing storage arrays

Timothy E. Denehy, John Bent, Florentina I. Popovici, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2004 SIGARCH Computer Architecture News  
We introduce Shear, a user-level software tool that characterizes RAID storage arrays.  ...  We illustrate the correctness of Shear by running it upon numerous simulated configurations, and then verify its real-world applicability by running Shear on both software-based and hardware-based RAID  ...  ACKNOWLEDGEMENTS We would like to thank Bradford Beckmann, Nathan Burnett, Vijayan Prabhakaran, Muthian Sivathanu, and the anonymous reviewers for their excellent feedback.  ... 
doi:10.1145/1037947.1024401 fatcat:nbykww4dtzfafj76c4p233bysm

Addressing the Security Issues of Kerberos Method using RAID Level 5

Mousumi Hasan Mukti, Sabina Zaman, Khalil Ahammad, Chowdhury Shahriar Muzammel
2018 European Journal of Engineering Research and Science  
Also, RAID 5 can be used in case of distributed data. So, a model has been proposed to configure RAID 5 to ensure better security of cloud storage by overcoming the limitations of Kerberos.  ...  This research paper has tried to overcome these security issues, accessing and recovering data by using the RAID level.  ...  This can be accessed either from Computer Management tools or from the Server Manager. Disk Management Tools are found in the storage Category in all scenarios.  ... 
doi:10.24018/ejers.2018.3.7.832 fatcat:uu6pseb76jbfdeovn5eoz2b67u

Performance Analysis of RAIDs in Storage Area Network

Sneha M.
2015 International Journal of Computer Applications  
The redundancy of data is very important to provide high data availability; this can be achieved by having RAID (Redundant Array of Inexpensive Disks) methods.  ...  This paper describes the performance analysis on RAID levels 0,1,5,6 and10 through IOR benchmark tests on SAN which is implemented using ATA(Advanced Technology Attachment) over Ethernet protocol AoE(ATA  ...  INTRODUCTION RAID management tools are used to configure storage on Storage Area Network.  ... 
doi:10.5120/ijca2015906231 fatcat:f544inpd7bem7akr4l3qih2qa4

Performance Parameters in File-Based Workflows

Karl Paulsen
2013 SMPTE Motion Imaging Journal  
(a) A RAID 5S array configuration with single-drive failure fault tolerance. The 5-drive set will provide better bandwidth (more spindles) than the 4-drive set.  ...  If a set of 4 TB drives were configured into a RAID set, then multiplied to obtain high-capacity volumes, the time required to rebuild a RAID set when (not if) a 4 TB drive fails can take several hours  ... 
doi:10.5594/j18358xy fatcat:bkbeffu3vbebdacu2fivver4t4

Minerva: An automated resource provisioning tool for large-scale storage systems

Guillermo A. Alvarez, John Wilkes, Elizabeth Borowsky, Susie Go, Theodore H. Romer, Ralph Becker-Szendy, Richard Golding, Arif Merchant, Mirjana Spasojevic, Alistair Veitch
2001 ACM Transactions on Computer Systems  
To solve the configuration nightmare, we present MIN-ERVA: a suite of tools for designing storage systems automatically.  ...  MINERVA uses declarative specifications of application requirements and device capabilities; constraintbased formulations of the various sub-problems; and optimization techniques to explore the search  ...  Acknowledgments We are grateful to Eric Anderson, who wrote the set of scripts for the TPC-D experiments and provided valuable feedback.  ... 
doi:10.1145/502912.502915 fatcat:q6sykmknpveepiwql42m6rxln4

Simulating fault injection on disk arrays

Henning Klein, Jörg Keller
2012 FERS-Mitteilungen  
The software is completely parameterizable in order to simulate different types of disk errors and disk array configurations.  ...  We believe that this simulation software is the first one that is able to cover a complete range of disk error types in many commonly used disk array configurations.  ...  in complex disk arrays with different sets of parameters. 3 Simulator architecture Supported configurations The proposed tool simulates the behavior of a disk array (RAID) over an extended period  ... 
doi:10.1007/bf03345459 fatcat:qvjir5a5nbftxpnrpxczyklhje

CLOUD COMPUTING FOR SPACECRAFT CHECKOUT OPERATIONS

Priyanka T L .
2016 International Journal of Research in Engineering and Technology  
A lot of manual effort goes in the checkout preparatory phase where in the databases, test procedures and configuration files are prepared.  ...  About 60 percent of the Spacecraft Checkout operations have been automated using a suite of software tools which runs on Checkout servers which are on LINUX platform.  ...  Sheena Jose, Section Head, IMCD, ISRO Satellite Centre, Bangalore, India for the valuable guidance, support and inspiring innovation throughout the realization of this project.  ... 
doi:10.15623/ijret.2016.0506088 fatcat:pg6qmpkgvja3batus34gbzxcgq

Building a research data science platform from industrial machines

Fang Cherry Liu, Fu Shen, Duen Horng Chau, Neil Bright, Mehmet Belgin
2016 2016 IEEE International Conference on Big Data (Big Data)  
While traditional HPC offers tools on leveraging existing technologies with data processing needs, the large volume of data and the speed of data generation pose significant challenges.  ...  Turning these industrial machines into a research Data Science Platform (DSP) poses unique challenges, such as: nontrivial hardware design decisions, configuration tool choices, node integration into existing  ...  And it uses another tool (which we shall discuss next) to configure Hadoop related settings. A.  ... 
doi:10.1109/bigdata.2016.7840859 dblp:conf/bigdataconf/LiuSCBB16 fatcat:z2pp57xhsvdkfjdqlutvnjuita

Disk-to-Disk network transfers at 100 Gb/s

Artur Barczyk, Ian Gable, Marilyn Hay, Colin Leavett-Brown, Iosif Legrand, Kim Lewall, Shawn McKee, Donald McWilliam, Azher Mughal, Harvey Newman, Sandor Rozsa, Yvan Savard (+3 others)
2012 Journal of Physics, Conference Series  
We will discuss the transfer tools, disk configurations, and monitoring tools used in the demonstration.  ...  The configuration of the network and the server configuration are discussed.  ...  We would like to acknowledge the support of the Natural Sciences and Engineering Research Council of Canada, the National Science Foundation, and the US Department of Energy.  ... 
doi:10.1088/1742-6596/396/4/042006 fatcat:x6mjkdb3brfinhhiftmeytdxfy
« Previous Showing results 1 — 15 out of 9,996 results