Category: ISM

ISM Architectural Framework

ARCHITECTURAL FRAMEWORK 1. Users/Brokers: They submit their service requests from anywhere in the world to the cloud 2. SLA resource allocator: It is a kind of interface between users and cloud service provider which enable the SLA-oriented resource management. 3. Service request examiner and admission control: It interprets the submitted request for QoS requirements before […]

Server information storage and management

SERVER In computer networking, a server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet. Network servers typically are configured with additional processing, memory, and storage capacity to handle the load of servicing clients. Common types of network servers include: Web servers Proxy servers FTP servers […]

Network virtualization

NETWORK VIRTUALIZATION Network virtualization: 1. Network virtualization is a method of combining the available resource in a network by splitting up the available bandwidth into channels each of which is independent from the other and each of which can be designed to a particular server or device in real time. 2. Each channel is independently […]

Data center concepts & requirements

DATA CENTER CONCEPTS & REQUIREMENTS Data Center Infrastructure Data Center supports following things: Process your business transaction. Host your website. Process and store your intellectual property. Maintain your financial records. Route your e-mails. Core Elements The main purpose of a data centre is running the application that handle the core business and operational data of […]

Memory virtualization

MEMORY VIRTUALIZATION 1. A technique that gives an application program the impression that it has its own contiguous logical memory independent of available physical memory. 2. Memory virtualization is a generalization of the concept of virtual memory. 3. Virtual memory makes application programming easier to hiding fragmentation of physical memory. 4. In virtual memory implementation, […]

FC Connectivity

FC CONNECTIVITY The FC architecture supports three basic interconnectivity options point to point , arbitrated loop  ,and Fibre Channel switched fabric. POINT-TO-POINT Point-to-point is simplest FC configuration in which two devices are connected directly to each other. This configuration provides a dedicated connection for data transmission between nodes. The point-to-point configuration offers limited connectivity , […]

Management of DAS,NAS,CAS,SAN

MANAGEMENT OF DAS, NAS, CAS & SAN 1. Management of DAS: DAS is the traditional method of locally attaching storage devices to servers via a direct communication path between the server and storage devices. As shown in Figure 1, the connectivity between the server and the storage devices are on a dedicated path separate from […]

NAS security

NETWORK-ATTACHED STORAGE NAS SECURITY A storage device which attached directly to a network is called network attached storage (NAS). NAS provide file access services to computer system and act like a storage element-SNIA (Storage Network Industry Association). NFS (Network File System) is one of the common Network Protocols implemented on NAS. NAS is used to […]

Cloud vocabulary

CLOUD VOCABULARY 1. Cloudburst (negative) : The failure of a cloud computing environment due to the inability to handle a spike in demand. 2. Cloudburst (positive) : The dynamic deployment of a software applications runs on internal organization compute resources to a public cloud to address a spike in demand. 3. Vertical Cloud : A […]

Limitations of DAS

LIMITATION OF DIRECT ATTACHED STORAGE (DAS) 1. The major disadvantages of DAS are its distance restriction, high network overhead, and limited scalability. 2. SCSI device connections cannot typically exceed 12 meters, which means data storage is usually confined to a single room, or even within a single system enclosure. 3. Network File-Level access to DAS […]

Elements of DAS,NAS,CAS,SAS

ELEMENTS OF DAS, NAS, CAS AND SAN DAS Elements: 1. Storage Device: (DAS) Directed Attached Storage consist of a storage device that is directly attached to a single computer or a service via a physical network cable. Block level access protocol is used to access data from cache. 2. HBA: An internal host bus adopter […]

JBOD

JBOD EVOLUTION AND COMPARISON WITH OTHERS 1. JBOD means ‘just a bunch of disks’ and sometimes ‘just a bunch of drives’. 2. It has an array of hard disks that not have been configured according to the RAID (for “redundant array of independent disks”) system. 3. JBOD is used in reference to a system that […]

SAN security

SAN SECURITY The ability to identify the points of vulnerability and implement a reliable security solution is the key to securing a SAN fabric infrastructure. Following are the main key area of security: SAN management access : Secure access to management services. Fabric access : Secure device access to fabric access. Target access : Secure […]

Hot spare

HOT SPARE: Here hot means a “backup” component and spare means extra disk which can be used when a disk gets failed. So hot spare means a backup device. Hot spare is also known as warm spare or hot standby. Hot spares word is related with RAID technology. Read about RAID here…. In RAID, multiple […]

RAID

RAID: RAID – Redundant Array of Independent Disks The storage which we are used in laptop computers are single disk but in servers, data centers, cloud computing we used multiple disk, means RAID technology. RAID saves data in multiple disk. RAID is a set of multiple hard disk, which are in the network. As additional […]

Storage system architecture

STORAGE SYSTEM ARCHITECTURE Introduction: Storage system architecture are specialized environments that safeguard the company’s most valuable information.  It store and manage the data in large amount which require specialized designs, greater reliability and manageability.  It support the following things- Process the business transactions. Process and share your intellectual property. Route your emails. Maintain your financial […]

Mapping n operations

MAPPING AND OPERATIONS A file system block is the smallest “Container” of a Physical disk space allocated for data. Each file system block is a contiguous area on the physical disk. The block size of file system is fixed at the time of its creation. The mapping process of user files to the disk storage […]

Intelligent disk subsystems overview

INTELLIGENT DISK SUBSYSTEM OVERVIEW Introduction: This system optimize all available storage solution automatically Data must be automatically placed and stripped across multiple physical storage resources, including arrays, RAID groups, Disk types and Controllers. Four main components: Front End Cache Back End Physical Disk Front End: Interface between host and storage system. Consist of two components […]

Component architecture of intelligent disk subsystem

COMPONENT ARCHITECTURE OF INTELLIGENT DISK SUBSYSTEM Architecture of intelligent Disk subsystem: 1. A disk subsystem is a hard disk server. 2. Servers are connected to the connection port of the subsystem using standard I/O techniques such as SCSI, fibre channel etc. 3. The internal structure of the disk subsystem is completely hidden from the server. The […]

Data categorization

DATA CATEGORIZATION Data categories are groupings of data with common characteristics or features. Data classification is the process of organizing data into categories for its most effective and efficient use. A well-planned data classification system makes essential data easy to find and retrieve. This can be of particular importance for risk management, legal discovery, and […]

Data proliferation

1. Data proliferation is an umbrella term concerned with the large number of files & amount of data stored by entities such as governments &businesses. These entities need more space& hardware, but data proliferation is moving faster than computer advancements.2. It does not matter what type of information is stored, whether it is structured or […]

Integrated VS Modular Array

Array generally fall into one of two categories, monolithic and modular. Integrated Array: 1. Monolithic array are sometimes called integrated arrays, enterprise arrays, or cache centric arrays.2. Monolithic storage systems are generally aimed at the enterprise level, centralizing data in a powerful system with hundreds of drives. Characteristics of integrated array: Large storage capacity. Large […]

Storage infrastructure

Storage infrastructure refers to the overall set of hardware and software components needed to facilitate storage for a system. This is often applied to cloud computing, where cloud storage infrastructure is composed of hardware elements like servers, as well as software elements like operating systems and proprietary delivery applications. The storage infrastructure components are: DAS(Direct […]

Information Life Cycle Management (ILM)

Information lifecycle management (ILM) refers to creation and management of storage systems on computing devices. ILM consists of the policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost effective IT infrastructure in the life cycle of information. ILM Policy: Storage and information policies that drive management […]