SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Computer Engineering and Intelligent Systems                                                       www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)



    Modified Unified Virtual Storage Technique for Improvement in
      Network Storage Implemented on Local Area Network

                                                 K.N.Honwadkar
                                         D.Y.Patil College of Engineering,
                                    Sector 29, PCNTDA, Akurdi, Pune 411 044,
                                               Maharashtra, India
                             Tel: +91-20-27653054 E-mail: knhonwadkar@yahoo.co.in

                                                    Dr.T.R.Sontakke
                                      Principal, Siddhant College of Engineering,
                                             Sudumbare, Pune – 412 109,
                                                 Maharashtra, India
                                Tel: 86-10-8888-7777 E-mail: trsontakke@yahoo.com


Abstract
This paper describes a way to efficiently utilize free disk space on Desktop machines connected over a network.
In many Networks today, the local disks of a client node are only used sporadically. This is an attempt to
manage the data storages in a network efficiently and to provide the software support for sharing of disk space
on Desktop machines in LAN. In the current situation, storage expansion on conventional servers has constraints
like, maximum expansion limitation, costly affair and in case of hardware replacement, up gradation; the
manual relocation of Data becomes messy. UVS (Unified Virtual Storage) is an attempt to efficiently utilize
freely available disk space on Desktop machines connected over a network. Its purpose is to reduce load of data
traffic on network server, to efficiently utilize space on client nodes thereby avoiding wastage of space. It also
eliminates Hardware restriction for Storage Expansion and provides Location transparency of data store. The
main advantage of UVS is that it can be seamlessly integrated into the existing infrastructure (Local Area
Network system). Virtual Storage is virtually infinite supporting scalable architecture. The performance of
prototype implemented on a UVS Server connected by network and performance is better than the centralized
system and that the overhead of the framework is moderate even during high load.
Keywords: Location Transparency, Centralized system, Distributed Storage, Scalable Architecture.


1. Introduction
This paper proposes Unified Virtual Storage system [11], which is suitable for backup data on network storage.
Here, disk-virtualization concept is used by implementing client - server module, locking & file manager
module. The performance of UVS is found superior as compared to LanStore and Windows share drive. „UVS‟
is an attempt to efficiently utilize free disk space [2] on Desktop machines connected over a network. This is a
client - server based model. The main purpose is to reduce load of data on centralized servers & efficiently
utilize space on client machines. This will support Distributed Level Application in which a client will loan
some space (say 1 GB) to server to make that space openly available to all the clients (especially to the client
which has no space). There will be Locking mechanism by which the space loaned to Server will be locked for
that client. On server side, there will be a file system or a mapping table to find who are the loaning clients &
where the file is stored. Non loaning clients can even use this virtual storage transparently. This involves
developing of a client -server based utility with intelligence to scan the network nodes (desktop machine) for
unconsumed Secondary Storage (HDD) spaces and allocate/manage the same „on the fly‟ between different
users for resource sharing. The client can use the Unified Virtual Drive as a single point access for distributed
storage across different nodes thereby eliminating an individual addressing of the nodes.


The paper is organized as follows.
The proposed architecture and its algorithms are described in section2 and 3, respectively. The experimental
results derived after implementations are tabulated in section 4. Modification for the improvement of UVS
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

implementation is proposed and discussed in section5. Related work is described in brief in section 6 and
Conclusions in section 7.

2. Unified Virtual Storage Architecture
This System can prove itself very useful & convenient replacement when there is a need to upgrade the existing
Server or to install high capacity HDD on server, Which involves manual relocation of the existing data, which
is a tedious job for system administrator in industrial scale and also it does not utilize the data storage, which is
available on a remote server on the same network. Finally this will eliminate the restriction to expand storage on
only one specific server. Above all, it will act as one virtually centralized               repository accessible to
everybody. Imagine this being used as a distributed document repository. This would be a new revolutionary
concept of distributed storage with a virtually centralized access. Client machine does not have to worry about
the exact physical location of data. The main Objective of Unified Virtual Storage (A Distributed Solution) is to
deliver a robust and economic Distributed Mass Storage System, which can be seamlessly integrated into the
existing infrastructure at no additional cost. UVS is to be used in Local area network (LAN) by the network
administrators so as to utilize the existing storage space available on server machines efficiently, which should
provide a virtually centralized single point of access for the users. There are some primary reasons for UVS
implementation:
        Ease of Storage Expansion – Scalable Architecture
        Efficient Use of free Space on desktop machines – avoid Wastage
        Eliminate Hardware restriction
        Provides Location Transparency
        Increased Performance
        Lower Costs
2.1 System configuration
UVS is a Client-Server based utility. Network Administrator handles the creation, utilization and maintenance of
Virtual Disk. Users or clients of the network can utilize this virtual storage space. However, the donors of the
storage space must do an agreement that they should be always ON before contributing their local disk space to
UVS. The system best runs on the client-side workstation with at least 64 MB of RAM and at least Pentium
class processor with 350MHz or higher frequency. Interface to the LAN through an Ethernet card preferably
with 100 Mbps data rate.
The basic UVS system is depicted in Fig 1. The client nodes which can spare some of their storage space, for
use on the network storage, declare the size of such space to the server. This is known as „Loaning‟ of space.
The information of such loaned space is registered in the server database under „Loaned space‟.




                                                Fig 1 UVS System overview

Any other client, irrespective of whether it has loaned space earlier, if demands some space on the network
storage, sends a „Demand‟ request to the server; along with the size of the space required. The Virtual Storage
Computer Engineering and Intelligent Systems                                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

Server looks for suitable area in the loaned space and allocates the demanded space to the authenticated user.
This information is also logged in the server database under ‟Allotted Space‟ with all the details of the user to
whom this space is allotted. The server informs the loaning client, the details of the allocation. The loaning
client, in turn, creates a virtual drive on the spared space and allocates a drive name and informs the server about
completion of the drive allocation process. The demanding client can upload files to this drive. The location of
the drive is transparent to the user. The user can access the files stored on the virtual drive as if it is additional
drive available on the local machine. The user can access these files from any member node of the network.
2.2 Software Architecture
The software architecture of the UVS system is shown in the Fig 2. It clearly underlines the roles of client and
server in the system. At the client end there are two basic parts of the implementation viz. UVS Client and UVS
Agent. Various software modules that make the UVS system are discussed below ( refer to Fig 2).
Loaning & Locking Manager: This module is a part of UVS Agent. The UVS Administrator is given privileges
to loan some amount of free space, which can be used by other machines. This space is spared from a drive
which is in normal operating mode is used by the local user as a local drive.
Connection Manager: For every transaction on the network the user has to have well set        communication
facility. The module helps establish and maintains connection between two communicating entities.
File Transfer Manager: The module is meant to transfer of files between two UVS Clients through the upload &
download functions. It also maintains data about where the file is now saved.
File Splitter: It is an operation invoked when there is no enough space on one machine to upload a file & that
user does have enough space on other machine to save remaining part of the file.
Request Handler: This module is basically getting invoked when there is a request from UVS User to UVS
Agent for displaying system information or to loan space.
User Authentication Manager: The module authenticates all types of users on the UVS




                                        Fig 2 Architectural Diagram of UVS
This is done only when there is demand for UVS space. Once some space is allocated to any user and drive
letter is assigned to the virtual drive created on the UVS space for the demanded size, that drive is locked for
further use by the same user to whom the drive is allocated. The space can be used by the local user, till it is
allotted and locked. This makes the UVS loaning and allocation very flexible .

3 Algorithms
The algorithms are divided in four basic modules. These modules are...
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

    1.                                     UVS Server
    2.    UVS Client
    3.    UVS Agent and
    4.    Communication Manager
There are sub-modules within each of the modules stated above. These modules are interrelated. This is shown
in Fig 3 below.




                                      Fig.3 Module Interaction diagram of UVS

UVS Server:
         Create Socket
         Listen to the request from client
         Request received
         Check the request
                              1. User authentication
                                       Get the User Name and Password
                                       Verify with entry in the User Authentication Database
                                                Found „Correct‟ –          Allow the user to access UVS by
transferring the details of
                                                                                    Files stored by the user on
UVS space, if any
                                                         „Incorrect‟ –     Prompt the user about failure
                              2. Loan request
                                       Get the size of space a client node wants to Loan
                                       Create record of the loaned space, against the node, in the Loaning Database
                              3. UVS Service
                                       Demand of Space request
                                                Get the size of space required by the user
                                                Check whether contiguous space loaned by node is available –
                                                                  „Yes‟ – Allocate the space to the user by creating
   a virtual drive of the
                                                                             demanded size and make necessary
   entry in the database
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

                                                                 „No‟ – Compute the demanded size of space
from more than one node.
                                                                             Allocate space to the user and make
entries in the database
                                     File Upload
                                               When user uploads a file, to the allocated Space; make record entry
in file database
                                     File Delete
                                               When the user wants to delete a file from UVS space allotted;
delete the         record
                                               corresponding to the file from the file database
After completion of any of the task return to Listen mode


UVS Client:
When the user wants to use UVS for File Upload or Download
         Send user name and password to the server for authentication on the server socket.
         Get permission granted from the server
         If server informs about contiguous space available on the UVS space; „Upload‟ the file to this space.
         If sufficient space not available on single node; get the sizes of spaces available on different nodes.
         Split the file in fragments of appropriate sizes
         Send the file fragments to respective nodes
While „Download‟
         Get the information about the location/s of the file
     Read the file from the source/s; If from more than one node –         merge the fragments received from
     different nodes in proper order


UVS Agent:
When space is „Loaned‟ to UVS space, the loaned space is spared from use locally. The server informs about
allocation of space and then a virtual drive of the reported size is created with proper drive letter assigned.
   File Write Request
         Get request from the authenticated user for storing a user file or fragment of a file
         Create a file (or directory) by the name specified by the remote UVS user
         Receive contents of the specified file or fragment and store the same in appropriate place in the drive
         Make necessary entry to the local file system
         File Read Request
                   Get the file name with path, if any from the authenticated user
                   Locate the file in the UVS space
                   Open the file in „read‟ mode
                   Send the file as a response to the request on the client socket
         File Delete Request
                   Get the file name with path, if any from the authenticated user
                   Locate the file in the UVS space
                   Delete the file from the UVS space
                   Update the local file system
After completion of every task report to the server to append necessary changes to the UVS system database/s
Computer Engineering and Intelligent Systems                                                        www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)


Communication Manager:
   Create a Socket
   Listen for any request from any user from any node of the network
   Request received
   Check whether this is a „write‟ or „read‟ or „delete‟ request
                  If „write‟ request
                           Get the user name
                           Find the virtual drive from the mapping function
                           Receive file from the user; store it on the specific drive
                           Connect to the server socket; transfer of file information
                  If „read‟ request
                  Get the file name with path
                           Keep the client socket active till the complete file is read
                  If „delete‟ request
                           Get the file name from the remote user
                           Find the file on the UVS space and delete the file
                           Delete metadata record of the file from the local drive
                           Connect to server socket; inform the server the deletion
Careful study of the algorithms given above, it is very clear that, except for the actual data storage and
maintenance, major tasks are server centric. The beauty of the technique lies in the fact that, once the space is
allocated by the server, further file handling and handling requests from users whose files are stored on the
loaned space, is looked after by the two or more nodes involved in the file transaction. This task is carried out by
the Communication manager and file transfer manager. The server is spared from this burden.

4. Performance Measurement
To test the performance, five PC‟s with slightly different configurations are taken. Two of them were having P4-
3GHz processors, 256MB of RAM. Another two were Atom processor, 1.6GHz, 2GB of RAM & Pentium
processor, 1.2 GHz, 512MB of RAM; the fifth machine was having configuration as Pentium processor,
1.2GHz, 512MB of RAM.. These machines were running on Microsoft Windows XP Operating system
platform. The performance is taken after running Upload & Download function of UVS Client. The
observations are noted by considering different constraints. The details are as follows.
The files with average size 68.9 MB were, simultaneously, uploaded on different machines, with n/w speed as
54Mbps, was taking on an average 136 Sec. The bandwidth was getting divided as the Network traffic.
The time taken for download of the same file took considerably less time, as the location of the file on UVS
space was known. The download time recorded was 70 sec. Throughput of UVS is compared with other
systems. The results are summed up in Table1 and Table2 for upload and download of files, on UVS space.

                               Table 1 Comparison of Performance for File Upload
             System
                                        Windows Share                             Disk
                                                            LanStore                               UVS
 Parameter                                  Drive                               Clustering
 Average delay for 1MB (Sec)
                                            0.86              51.2                22.28            1.97

      Throughput MB/Sec                     1.16              0.02                0.04             0.51

                             Table 2 Comparison of Performance for File Download
Computer Engineering and Intelligent Systems                                                           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

        System
                                      Windows Share                               Disk
                                                              LanStore                                UVS
 Parameter                                Drive                                 Clustering

  Average delay for 1MB (Sec)                 1.5                12.1               2.5               1.02
 Throughput MB/Sec
                                              0.66               0.08               0.4               0.98


Observations of Table1 and Table 2 result into a very important fact that UVS gives better performance than
Windows share drive utility. Both the utilities have similar way of functioning. UVS has advantage over
Windows share drive utility; UVS mounts the drive where user files are stored on UVS space when the user logs
into the system and in case of Windows share drive; the user has to find the drive where the files are loaded and
mount the drive whenever needed.

5. Modified ‘UVS’
The algorithm at the server end if modified, slightly, the resultant algorithm will give better flexibility for the
storage space allocation. The implemented algorithm for UVS server is repeated below for ready reference of
the reader. The modifications in the algorithm are shown in bold script


UVS Server:
   Create Socket
          Listen to the request from client
         Request received
         Check the request
                              1. User authentication
                                       Get the User Name and Password
                                       Verify with entry in the User Authentication Database
                                                 Found „Correct‟ –          Allow the user to access UVS by
transferring the details of
                                                                                     Files stored by the user on
UVS space, if any
                                                          „Incorrect‟ –     Prompt the user about failure
                              2. Loan request
                                       Get the size of space a client node wants to Loan
                                       Create a virtual drive of the size ‘Loaned’ on the same node and drive
                                                        letter to this node
                                       Create record of the loaned space, against the node, in the Loaning Database
                              3. UVS Service
                                       Demand of Space request
                                                 Get the size of space required by the user
                                                 Check whether contiguous space loaned by node is available –
                                                          „Yes‟ – Allocate the space to the user by     creating   a
Folder by the name
                                                                     of the demanding user and make necessary
entry in the database
                                                          „No‟ – Find a node where space is available; create a
folder by the
Computer Engineering and Intelligent Systems                                                         www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

                                                                 name of the demanding user on this node
also and make
                                                                 necessary entries in the database
                                    File Upload
                                             When user uploads a file to the allocated Space; make record entry
in file database
                                    File Delete
                                             When the user wants to delete a file from UVS space allotted;
delete the         record
                                             corresponding to the file from the file database
After completion of any of the task return to Listen mode


The effect of the modifications can be described as follows

Proposed modification is related to the way the system responds to the „Loan‟ request. The space loaned on any
of the nodes used to be spared for network storage under UVS and recorded on the loaning database; in the
implemented algorithm. When any user demanded for the space on UVS, part of the loaned space was allotted
to the user by creating a virtual drive on the loaned space and assigning a drive name. This arrangement was
creating a UVS space of fixed size, per demanding user. If the user is interested in „uploading‟ a file which
could not be accommodated in the remaining space allocated to the user, the user was prompted about non
availability of sufficient space and was expected to create space by removing some files on the UVS space. At
the same time there could be user, who had been allotted space on the same node, had not used the space allotted
on the UVS drive. The modified algorithm rectifies this shortcoming by providing UVS space of flexible size to
the users on fixed size UVS space loaned by individual nodes in the system.
Since space allocated to the users by creating folders by their names on available UVS space on virtual drive on
any of the member nodes, every demanding user will have space of variable size on the UVS space. The
fragmentation of files can be minimized, thereby, improving the system performance.

6.       Related Work
1) Study of used space on desktop machines On an average, 62% of a machine‟s raw disk capacity is unused,
which is consistent with results of other disk usage studies, which have reported storage utilization rates of
about 50% [2] . It shows the minimum space available on a machine during the study period –        providing a
more realistic assessment of how much space a mass storage system can safely use on a machine. The results are
nearly the same – the aggregate of the minimum available disk space is 32.8 TB with an average of 45 GB per
machine.
2) Existing Systems
There are some existing systems, which can work as a performance measurement tool for UVS. One of these is
LanStore [3]. The main design goal was to gather the empty storage capacity into a virtual       storage unit. To
utilize in an equal way the storage capacity of the member client nodes, the files are divided into equal
fragments. Every storage node has the same number of stored data fragments Storage@desk[2] (SD) utilizes
excess desktop disk capacity within an organization to create large virtual storage volumes that meet target QoS
and security goals and provide access to a large number of client nodes using standard interfaces. The
distributed RAID approach used in xFS [7] and Petal [6] was applied to build a virtual disk with block interface.
On top the virtual block devices, higher level file systems and distributed file systems were built, like the
metadata manager in xFS and Frangipani.

7        Conclusion
Success of proposed UVS (Unified Virtual Storage) System would grossly depend on its ability to extend
storage capacity using existing infrastructure, tapping unused storage space on network nodes & effectively
managing/allocating the loaned space. The performance of UVS is dependent on the LAN speeds and Traffic
conditions. The performance is quite nice with 100 Mbps networks, but fairly good with     54Mbps wireless
connectivity. Mobility can also be provided to the users of UVS.
Identification of the mobile nodes calls for a little tedious algorithm. One more advantage of UVS over other
systems is, UVS allows the user to have hierarchical directory structure for storing and categorizing the files
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)

stored on UVS space, as against flat file system used for some other implementations. This adds to the metadata
stored on the server, as the directory structure also has to be maintained. This is a bottle neck while stripping
files before they are uploaded. UVS technique is implemented on local area networks with different hardware
configurations but homogeneous operating environments. The system is not, really, tested for heterogeneous
environments. It is very much possible to implement this over the Internet which, if done, will be possible to
support web-based clients.
In the implementation of UVS the „Loaning‟ and allocation of space from the loaned space is done by the
administrator. This can be made software driven so that the loaning and reclaiming of spare space is easier for
any client.


References
[1] Sun Microsystems Inc., NFS: Network File System
[2] H. Howie Huang, John F. Karpovich, and Andrew S. Grimshaw “A Feasibility Study of a Virtual
     Storage System for Large Organizations”, 2nd International Workshop on Virtualization Technology in
     Distributed Computing (VTDC 2006).
[3] Vilmos Bilicki, LanStore: A highly Distributed Reliable File Storage .System; .Net Technologies
     Conference Proceedings, Unioin Agency,-Science Press, Plzen, Czech Republic2005
[4] Eunsung Kim Hyeong S. Kim Heon Y. Yeom. “GiSK: Making Secure, Reliable and Scalable VO Repository
     Virtualizing Generic Disks in the Grid”, in Eighth IEEE International Conference on High-Performance
     Computing in Asia-Pacific Region (HPCASIA‟05). Protocol Specification, RFC 1094. March 1989
[5] Paul massiqlia and frank bunn, “Virtual Storage redefined: technology and applications for storage
    virtualization”, 2nd ed., VERITAS, 2000
[6] E. Lee, and C. Thekkath, "Petal: Distributed virtual disks," in Proceedings of the ACM 7th International
    Conference on Architectural Support for Programming Languages and Operating Systems (ASPWS),
    1996.
[7] T. Anderson, M. Dahlini, et al.. "Serverless Network File Systems," ACM Transactions on Computer
    Systems (TOSC), Feb. 1995.
[8] Edward K. Lee and Chandrohan A. Thekkah. “Petal: Distributed virtual discs”. SIGPLAN Notices,
    31(9):84-92,1-5 October 1996.
[9] E. Riedel, “Storage systems - not just a bunch of disks anymore,” QUEUE, pp. 32–41,2003.
[10] Vazhkudai, S, et al. “Freeloader: Scavenging Desktop Storage sources for Scientific Data”. In
     Supercomputing 2005 (SC'05): Int'l Conference on High Performance Computing, Networking and
     Storage. 2005.
[11] Ms. S.V.Patil, K.N.Honwadkar, “Unified Virtual Storage: Virtualization of Distributed Storage in a
     Network”; Digital Library URI: http://www.ijcaonline.org/archives/number22/447-681, published in IJCA
     Journal on Feb 25, 2010.

Weitere Àhnliche Inhalte

Was ist angesagt?

Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit INANDINI SHARMA
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed SystemsRupsee
 
Lecture 1 (distributed systems)
Lecture 1 (distributed systems)Lecture 1 (distributed systems)
Lecture 1 (distributed systems)Fazli Amin
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systemsnaveedchak
 
Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...eSAT Publishing House
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system modelHarshad Umredkar
 
Distributed Server
Distributed ServerDistributed Server
Distributed ServerRajan Kumar
 
Aw4103303306
Aw4103303306Aw4103303306
Aw4103303306IJERA Editor
 
Microsoft Azure White Paper
Microsoft Azure White PaperMicrosoft Azure White Paper
Microsoft Azure White PaperIgnatiuz Software
 
MULTI-CORE PROCESSORS: CONCEPTS AND IMPLEMENTATIONS
MULTI-CORE PROCESSORS: CONCEPTS AND IMPLEMENTATIONSMULTI-CORE PROCESSORS: CONCEPTS AND IMPLEMENTATIONS
MULTI-CORE PROCESSORS: CONCEPTS AND IMPLEMENTATIONSijcsit
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bankpkaviya
 
Erlang Cache
Erlang CacheErlang Cache
Erlang Cacheice j
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systemsvampugani
 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudIAEME Publication
 

Was ist angesagt? (19)

Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit I
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Lecture 1 (distributed systems)
Lecture 1 (distributed systems)Lecture 1 (distributed systems)
Lecture 1 (distributed systems)
 
Clusetrreport
ClusetrreportClusetrreport
Clusetrreport
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...Load balancing in public cloud by division of cloud based on the geographical...
Load balancing in public cloud by division of cloud based on the geographical...
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
[IJET-V1I6P11] Authors: A.Stenila, M. Kavitha, S.Alonshia
[IJET-V1I6P11] Authors: A.Stenila, M. Kavitha, S.Alonshia[IJET-V1I6P11] Authors: A.Stenila, M. Kavitha, S.Alonshia
[IJET-V1I6P11] Authors: A.Stenila, M. Kavitha, S.Alonshia
 
Distributed Server
Distributed ServerDistributed Server
Distributed Server
 
Aw4103303306
Aw4103303306Aw4103303306
Aw4103303306
 
E0332427
E0332427E0332427
E0332427
 
Microsoft Azure White Paper
Microsoft Azure White PaperMicrosoft Azure White Paper
Microsoft Azure White Paper
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 
Sdn03
Sdn03Sdn03
Sdn03
 
MULTI-CORE PROCESSORS: CONCEPTS AND IMPLEMENTATIONS
MULTI-CORE PROCESSORS: CONCEPTS AND IMPLEMENTATIONSMULTI-CORE PROCESSORS: CONCEPTS AND IMPLEMENTATIONS
MULTI-CORE PROCESSORS: CONCEPTS AND IMPLEMENTATIONS
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Erlang Cache
Erlang CacheErlang Cache
Erlang Cache
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Perceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloudPerceiving and recovering degraded data on secure cloud
Perceiving and recovering degraded data on secure cloud
 

Andere mochten auch

Iro man
Iro manIro man
Iro mantutuy10
 
Luxury autojanuary201001 p84
Luxury autojanuary201001 p84Luxury autojanuary201001 p84
Luxury autojanuary201001 p84Yugi Mina Susu
 
Maylocnuocnanogeyser
MaylocnuocnanogeyserMaylocnuocnanogeyser
Maylocnuocnanogeyserluc nguyen
 
Merry Christmas 2013
Merry Christmas 2013Merry Christmas 2013
Merry Christmas 2013NguyenHoang92002
 
Google adwords
Google adwords Google adwords
Google adwords Quyen Do
 
Unusual Ukrainian Monuments
Unusual Ukrainian MonumentsUnusual Ukrainian Monuments
Unusual Ukrainian MonumentsValeriya Gorshkova
 
Slide bĂ i giới thiệu CĂčng học
Slide bĂ i giới thiệu CĂčng họcSlide bĂ i giới thiệu CĂčng học
Slide bĂ i giới thiệu CĂčng họcBĂči Việt HĂ 
 
Học Tiáșżng Anh Với Mr.Bill - BĂ i 5
Học Tiáșżng Anh Với Mr.Bill - BĂ i 5Học Tiáșżng Anh Với Mr.Bill - BĂ i 5
Học Tiáșżng Anh Với Mr.Bill - BĂ i 5Vaj Tsab
 
Tajuk & kandungan (Laporan)
Tajuk & kandungan (Laporan)Tajuk & kandungan (Laporan)
Tajuk & kandungan (Laporan)Alyn_94
 
BĂĄnh trung thu Casahana Malaysia 2014 - Hộp quĂ  cao cáș„p
BĂĄnh trung thu Casahana Malaysia 2014 - Hộp quĂ  cao cáș„pBĂĄnh trung thu Casahana Malaysia 2014 - Hộp quĂ  cao cáș„p
BĂĄnh trung thu Casahana Malaysia 2014 - Hộp quĂ  cao cáș„phuyen915
 
Aksaray eca kombi servisi 294 16 03
Aksaray eca kombi servisi 294 16 03Aksaray eca kombi servisi 294 16 03
Aksaray eca kombi servisi 294 16 03cuneyt752
 

Andere mochten auch (13)

Iro man
Iro manIro man
Iro man
 
Luxury autojanuary201001 p84
Luxury autojanuary201001 p84Luxury autojanuary201001 p84
Luxury autojanuary201001 p84
 
Maylocnuocnanogeyser
MaylocnuocnanogeyserMaylocnuocnanogeyser
Maylocnuocnanogeyser
 
Merry Christmas 2013
Merry Christmas 2013Merry Christmas 2013
Merry Christmas 2013
 
Google adwords
Google adwords Google adwords
Google adwords
 
Unusual Ukrainian Monuments
Unusual Ukrainian MonumentsUnusual Ukrainian Monuments
Unusual Ukrainian Monuments
 
Slide bĂ i giới thiệu CĂčng học
Slide bĂ i giới thiệu CĂčng họcSlide bĂ i giới thiệu CĂčng học
Slide bĂ i giới thiệu CĂčng học
 
Học Tiáșżng Anh Với Mr.Bill - BĂ i 5
Học Tiáșżng Anh Với Mr.Bill - BĂ i 5Học Tiáșżng Anh Với Mr.Bill - BĂ i 5
Học Tiáșżng Anh Với Mr.Bill - BĂ i 5
 
Lap5
Lap5Lap5
Lap5
 
Tajuk & kandungan (Laporan)
Tajuk & kandungan (Laporan)Tajuk & kandungan (Laporan)
Tajuk & kandungan (Laporan)
 
BĂĄnh trung thu Casahana Malaysia 2014 - Hộp quĂ  cao cáș„p
BĂĄnh trung thu Casahana Malaysia 2014 - Hộp quĂ  cao cáș„pBĂĄnh trung thu Casahana Malaysia 2014 - Hộp quĂ  cao cáș„p
BĂĄnh trung thu Casahana Malaysia 2014 - Hộp quĂ  cao cáș„p
 
Bitacora 5
Bitacora 5Bitacora 5
Bitacora 5
 
Aksaray eca kombi servisi 294 16 03
Aksaray eca kombi servisi 294 16 03Aksaray eca kombi servisi 294 16 03
Aksaray eca kombi servisi 294 16 03
 

Ähnlich wie Ceis 7

Data Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformData Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformIJCSIS Research Publications
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdfAkshithaReddy42848
 
Virtualization
VirtualizationVirtualization
VirtualizationUtkarsh Soni
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storageIGEEKS TECHNOLOGIES
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...Nico Huysamen
 
Distributed computing ).ppt him
Distributed computing ).ppt himDistributed computing ).ppt him
Distributed computing ).ppt himHimanshu Saini
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...IOSR Journals
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage systemZhichao Liang
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageIGEEKS TECHNOLOGIES
 
A Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and ContainersA Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and Containersprashant desai
 
H03401049054
H03401049054H03401049054
H03401049054theijes
 
Multiple Chassis: Virtual Is Now A Reality
Multiple Chassis: Virtual Is Now A RealityMultiple Chassis: Virtual Is Now A Reality
Multiple Chassis: Virtual Is Now A RealityJuniper Networks
 
Procesamiento multinĂșcleo Ăłptimo para aplicaciones crĂ­ticas de seguridad
 Procesamiento multinĂșcleo Ăłptimo para aplicaciones crĂ­ticas de seguridad Procesamiento multinĂșcleo Ăłptimo para aplicaciones crĂ­ticas de seguridad
Procesamiento multinĂșcleo Ăłptimo para aplicaciones crĂ­ticas de seguridadMarketing Donalba
 
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxAdvanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxService Solutions Pvt. Ltd. (SSL)
 
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...Susheel Thakur
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermagargishankar1981
 

Ähnlich wie Ceis 7 (20)

Data Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux PlatformData Redundancy on Diskless Client using Linux Platform
Data Redundancy on Diskless Client using Linux Platform
 
Virtualization in Distributed System: A Brief Overview
Virtualization in Distributed System: A Brief OverviewVirtualization in Distributed System: A Brief Overview
Virtualization in Distributed System: A Brief Overview
 
Virtualization in Distributed System: A Brief Overview
Virtualization in Distributed System: A Brief OverviewVirtualization in Distributed System: A Brief Overview
Virtualization in Distributed System: A Brief Overview
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
virtualization-190329110832.pdf
virtualization-190329110832.pdfvirtualization-190329110832.pdf
virtualization-190329110832.pdf
 
Virtualization
VirtualizationVirtualization
Virtualization
 
A cloud environment for backup and data storage
A cloud environment for backup and data storageA cloud environment for backup and data storage
A cloud environment for backup and data storage
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
 
Distributed computing ).ppt him
Distributed computing ).ppt himDistributed computing ).ppt him
Distributed computing ).ppt him
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
 
Survey of distributed storage system
Survey of distributed storage systemSurvey of distributed storage system
Survey of distributed storage system
 
A cloud enviroment for backup and data storage
A cloud enviroment for backup and data storageA cloud enviroment for backup and data storage
A cloud enviroment for backup and data storage
 
A Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and ContainersA Survey of Performance Comparison between Virtual Machines and Containers
A Survey of Performance Comparison between Virtual Machines and Containers
 
H03401049054
H03401049054H03401049054
H03401049054
 
Dbms
DbmsDbms
Dbms
 
Multiple Chassis: Virtual Is Now A Reality
Multiple Chassis: Virtual Is Now A RealityMultiple Chassis: Virtual Is Now A Reality
Multiple Chassis: Virtual Is Now A Reality
 
Procesamiento multinĂșcleo Ăłptimo para aplicaciones crĂ­ticas de seguridad
 Procesamiento multinĂșcleo Ăłptimo para aplicaciones crĂ­ticas de seguridad Procesamiento multinĂșcleo Ăłptimo para aplicaciones crĂ­ticas de seguridad
Procesamiento multinĂșcleo Ăłptimo para aplicaciones crĂ­ticas de seguridad
 
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxAdvanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
 
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...Performance Analysis of Server Consolidation Algorithms in  Virtualized Cloud...
Performance Analysis of Server Consolidation Algorithms in Virtualized Cloud...
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar verma
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

KĂŒrzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

KĂŒrzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Ceis 7

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Modified Unified Virtual Storage Technique for Improvement in Network Storage Implemented on Local Area Network K.N.Honwadkar D.Y.Patil College of Engineering, Sector 29, PCNTDA, Akurdi, Pune 411 044, Maharashtra, India Tel: +91-20-27653054 E-mail: knhonwadkar@yahoo.co.in Dr.T.R.Sontakke Principal, Siddhant College of Engineering, Sudumbare, Pune – 412 109, Maharashtra, India Tel: 86-10-8888-7777 E-mail: trsontakke@yahoo.com Abstract This paper describes a way to efficiently utilize free disk space on Desktop machines connected over a network. In many Networks today, the local disks of a client node are only used sporadically. This is an attempt to manage the data storages in a network efficiently and to provide the software support for sharing of disk space on Desktop machines in LAN. In the current situation, storage expansion on conventional servers has constraints like, maximum expansion limitation, costly affair and in case of hardware replacement, up gradation; the manual relocation of Data becomes messy. UVS (Unified Virtual Storage) is an attempt to efficiently utilize freely available disk space on Desktop machines connected over a network. Its purpose is to reduce load of data traffic on network server, to efficiently utilize space on client nodes thereby avoiding wastage of space. It also eliminates Hardware restriction for Storage Expansion and provides Location transparency of data store. The main advantage of UVS is that it can be seamlessly integrated into the existing infrastructure (Local Area Network system). Virtual Storage is virtually infinite supporting scalable architecture. The performance of prototype implemented on a UVS Server connected by network and performance is better than the centralized system and that the overhead of the framework is moderate even during high load. Keywords: Location Transparency, Centralized system, Distributed Storage, Scalable Architecture. 1. Introduction This paper proposes Unified Virtual Storage system [11], which is suitable for backup data on network storage. Here, disk-virtualization concept is used by implementing client - server module, locking & file manager module. The performance of UVS is found superior as compared to LanStore and Windows share drive. „UVS‟ is an attempt to efficiently utilize free disk space [2] on Desktop machines connected over a network. This is a client - server based model. The main purpose is to reduce load of data on centralized servers & efficiently utilize space on client machines. This will support Distributed Level Application in which a client will loan some space (say 1 GB) to server to make that space openly available to all the clients (especially to the client which has no space). There will be Locking mechanism by which the space loaned to Server will be locked for that client. On server side, there will be a file system or a mapping table to find who are the loaning clients & where the file is stored. Non loaning clients can even use this virtual storage transparently. This involves developing of a client -server based utility with intelligence to scan the network nodes (desktop machine) for unconsumed Secondary Storage (HDD) spaces and allocate/manage the same „on the fly‟ between different users for resource sharing. The client can use the Unified Virtual Drive as a single point access for distributed storage across different nodes thereby eliminating an individual addressing of the nodes. The paper is organized as follows. The proposed architecture and its algorithms are described in section2 and 3, respectively. The experimental results derived after implementations are tabulated in section 4. Modification for the improvement of UVS
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) implementation is proposed and discussed in section5. Related work is described in brief in section 6 and Conclusions in section 7. 2. Unified Virtual Storage Architecture This System can prove itself very useful & convenient replacement when there is a need to upgrade the existing Server or to install high capacity HDD on server, Which involves manual relocation of the existing data, which is a tedious job for system administrator in industrial scale and also it does not utilize the data storage, which is available on a remote server on the same network. Finally this will eliminate the restriction to expand storage on only one specific server. Above all, it will act as one virtually centralized repository accessible to everybody. Imagine this being used as a distributed document repository. This would be a new revolutionary concept of distributed storage with a virtually centralized access. Client machine does not have to worry about the exact physical location of data. The main Objective of Unified Virtual Storage (A Distributed Solution) is to deliver a robust and economic Distributed Mass Storage System, which can be seamlessly integrated into the existing infrastructure at no additional cost. UVS is to be used in Local area network (LAN) by the network administrators so as to utilize the existing storage space available on server machines efficiently, which should provide a virtually centralized single point of access for the users. There are some primary reasons for UVS implementation:  Ease of Storage Expansion – Scalable Architecture  Efficient Use of free Space on desktop machines – avoid Wastage  Eliminate Hardware restriction  Provides Location Transparency  Increased Performance  Lower Costs 2.1 System configuration UVS is a Client-Server based utility. Network Administrator handles the creation, utilization and maintenance of Virtual Disk. Users or clients of the network can utilize this virtual storage space. However, the donors of the storage space must do an agreement that they should be always ON before contributing their local disk space to UVS. The system best runs on the client-side workstation with at least 64 MB of RAM and at least Pentium class processor with 350MHz or higher frequency. Interface to the LAN through an Ethernet card preferably with 100 Mbps data rate. The basic UVS system is depicted in Fig 1. The client nodes which can spare some of their storage space, for use on the network storage, declare the size of such space to the server. This is known as „Loaning‟ of space. The information of such loaned space is registered in the server database under „Loaned space‟. Fig 1 UVS System overview Any other client, irrespective of whether it has loaned space earlier, if demands some space on the network storage, sends a „Demand‟ request to the server; along with the size of the space required. The Virtual Storage
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Server looks for suitable area in the loaned space and allocates the demanded space to the authenticated user. This information is also logged in the server database under ‟Allotted Space‟ with all the details of the user to whom this space is allotted. The server informs the loaning client, the details of the allocation. The loaning client, in turn, creates a virtual drive on the spared space and allocates a drive name and informs the server about completion of the drive allocation process. The demanding client can upload files to this drive. The location of the drive is transparent to the user. The user can access the files stored on the virtual drive as if it is additional drive available on the local machine. The user can access these files from any member node of the network. 2.2 Software Architecture The software architecture of the UVS system is shown in the Fig 2. It clearly underlines the roles of client and server in the system. At the client end there are two basic parts of the implementation viz. UVS Client and UVS Agent. Various software modules that make the UVS system are discussed below ( refer to Fig 2). Loaning & Locking Manager: This module is a part of UVS Agent. The UVS Administrator is given privileges to loan some amount of free space, which can be used by other machines. This space is spared from a drive which is in normal operating mode is used by the local user as a local drive. Connection Manager: For every transaction on the network the user has to have well set communication facility. The module helps establish and maintains connection between two communicating entities. File Transfer Manager: The module is meant to transfer of files between two UVS Clients through the upload & download functions. It also maintains data about where the file is now saved. File Splitter: It is an operation invoked when there is no enough space on one machine to upload a file & that user does have enough space on other machine to save remaining part of the file. Request Handler: This module is basically getting invoked when there is a request from UVS User to UVS Agent for displaying system information or to loan space. User Authentication Manager: The module authenticates all types of users on the UVS Fig 2 Architectural Diagram of UVS This is done only when there is demand for UVS space. Once some space is allocated to any user and drive letter is assigned to the virtual drive created on the UVS space for the demanded size, that drive is locked for further use by the same user to whom the drive is allocated. The space can be used by the local user, till it is allotted and locked. This makes the UVS loaning and allocation very flexible . 3 Algorithms The algorithms are divided in four basic modules. These modules are...
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) 1. UVS Server 2. UVS Client 3. UVS Agent and 4. Communication Manager There are sub-modules within each of the modules stated above. These modules are interrelated. This is shown in Fig 3 below. Fig.3 Module Interaction diagram of UVS UVS Server: Create Socket Listen to the request from client Request received Check the request 1. User authentication Get the User Name and Password Verify with entry in the User Authentication Database Found „Correct‟ – Allow the user to access UVS by transferring the details of Files stored by the user on UVS space, if any „Incorrect‟ – Prompt the user about failure 2. Loan request Get the size of space a client node wants to Loan Create record of the loaned space, against the node, in the Loaning Database 3. UVS Service Demand of Space request Get the size of space required by the user Check whether contiguous space loaned by node is available – „Yes‟ – Allocate the space to the user by creating a virtual drive of the demanded size and make necessary entry in the database
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) „No‟ – Compute the demanded size of space from more than one node. Allocate space to the user and make entries in the database File Upload When user uploads a file, to the allocated Space; make record entry in file database File Delete When the user wants to delete a file from UVS space allotted; delete the record corresponding to the file from the file database After completion of any of the task return to Listen mode UVS Client: When the user wants to use UVS for File Upload or Download Send user name and password to the server for authentication on the server socket. Get permission granted from the server If server informs about contiguous space available on the UVS space; „Upload‟ the file to this space. If sufficient space not available on single node; get the sizes of spaces available on different nodes. Split the file in fragments of appropriate sizes Send the file fragments to respective nodes While „Download‟ Get the information about the location/s of the file Read the file from the source/s; If from more than one node – merge the fragments received from different nodes in proper order UVS Agent: When space is „Loaned‟ to UVS space, the loaned space is spared from use locally. The server informs about allocation of space and then a virtual drive of the reported size is created with proper drive letter assigned. File Write Request Get request from the authenticated user for storing a user file or fragment of a file Create a file (or directory) by the name specified by the remote UVS user Receive contents of the specified file or fragment and store the same in appropriate place in the drive Make necessary entry to the local file system File Read Request Get the file name with path, if any from the authenticated user Locate the file in the UVS space Open the file in „read‟ mode Send the file as a response to the request on the client socket File Delete Request Get the file name with path, if any from the authenticated user Locate the file in the UVS space Delete the file from the UVS space Update the local file system After completion of every task report to the server to append necessary changes to the UVS system database/s
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Communication Manager: Create a Socket Listen for any request from any user from any node of the network Request received Check whether this is a „write‟ or „read‟ or „delete‟ request If „write‟ request Get the user name Find the virtual drive from the mapping function Receive file from the user; store it on the specific drive Connect to the server socket; transfer of file information If „read‟ request Get the file name with path Keep the client socket active till the complete file is read If „delete‟ request Get the file name from the remote user Find the file on the UVS space and delete the file Delete metadata record of the file from the local drive Connect to server socket; inform the server the deletion Careful study of the algorithms given above, it is very clear that, except for the actual data storage and maintenance, major tasks are server centric. The beauty of the technique lies in the fact that, once the space is allocated by the server, further file handling and handling requests from users whose files are stored on the loaned space, is looked after by the two or more nodes involved in the file transaction. This task is carried out by the Communication manager and file transfer manager. The server is spared from this burden. 4. Performance Measurement To test the performance, five PC‟s with slightly different configurations are taken. Two of them were having P4- 3GHz processors, 256MB of RAM. Another two were Atom processor, 1.6GHz, 2GB of RAM & Pentium processor, 1.2 GHz, 512MB of RAM; the fifth machine was having configuration as Pentium processor, 1.2GHz, 512MB of RAM.. These machines were running on Microsoft Windows XP Operating system platform. The performance is taken after running Upload & Download function of UVS Client. The observations are noted by considering different constraints. The details are as follows. The files with average size 68.9 MB were, simultaneously, uploaded on different machines, with n/w speed as 54Mbps, was taking on an average 136 Sec. The bandwidth was getting divided as the Network traffic. The time taken for download of the same file took considerably less time, as the location of the file on UVS space was known. The download time recorded was 70 sec. Throughput of UVS is compared with other systems. The results are summed up in Table1 and Table2 for upload and download of files, on UVS space. Table 1 Comparison of Performance for File Upload System Windows Share Disk LanStore UVS Parameter Drive Clustering Average delay for 1MB (Sec) 0.86 51.2 22.28 1.97 Throughput MB/Sec 1.16 0.02 0.04 0.51 Table 2 Comparison of Performance for File Download
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) System Windows Share Disk LanStore UVS Parameter Drive Clustering Average delay for 1MB (Sec) 1.5 12.1 2.5 1.02 Throughput MB/Sec 0.66 0.08 0.4 0.98 Observations of Table1 and Table 2 result into a very important fact that UVS gives better performance than Windows share drive utility. Both the utilities have similar way of functioning. UVS has advantage over Windows share drive utility; UVS mounts the drive where user files are stored on UVS space when the user logs into the system and in case of Windows share drive; the user has to find the drive where the files are loaded and mount the drive whenever needed. 5. Modified ‘UVS’ The algorithm at the server end if modified, slightly, the resultant algorithm will give better flexibility for the storage space allocation. The implemented algorithm for UVS server is repeated below for ready reference of the reader. The modifications in the algorithm are shown in bold script UVS Server: Create Socket Listen to the request from client Request received Check the request 1. User authentication Get the User Name and Password Verify with entry in the User Authentication Database Found „Correct‟ – Allow the user to access UVS by transferring the details of Files stored by the user on UVS space, if any „Incorrect‟ – Prompt the user about failure 2. Loan request Get the size of space a client node wants to Loan Create a virtual drive of the size ‘Loaned’ on the same node and drive letter to this node Create record of the loaned space, against the node, in the Loaning Database 3. UVS Service Demand of Space request Get the size of space required by the user Check whether contiguous space loaned by node is available – „Yes‟ – Allocate the space to the user by creating a Folder by the name of the demanding user and make necessary entry in the database „No‟ – Find a node where space is available; create a folder by the
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) name of the demanding user on this node also and make necessary entries in the database File Upload When user uploads a file to the allocated Space; make record entry in file database File Delete When the user wants to delete a file from UVS space allotted; delete the record corresponding to the file from the file database After completion of any of the task return to Listen mode The effect of the modifications can be described as follows
 Proposed modification is related to the way the system responds to the „Loan‟ request. The space loaned on any of the nodes used to be spared for network storage under UVS and recorded on the loaning database; in the implemented algorithm. When any user demanded for the space on UVS, part of the loaned space was allotted to the user by creating a virtual drive on the loaned space and assigning a drive name. This arrangement was creating a UVS space of fixed size, per demanding user. If the user is interested in „uploading‟ a file which could not be accommodated in the remaining space allocated to the user, the user was prompted about non availability of sufficient space and was expected to create space by removing some files on the UVS space. At the same time there could be user, who had been allotted space on the same node, had not used the space allotted on the UVS drive. The modified algorithm rectifies this shortcoming by providing UVS space of flexible size to the users on fixed size UVS space loaned by individual nodes in the system. Since space allocated to the users by creating folders by their names on available UVS space on virtual drive on any of the member nodes, every demanding user will have space of variable size on the UVS space. The fragmentation of files can be minimized, thereby, improving the system performance. 6. Related Work 1) Study of used space on desktop machines On an average, 62% of a machine‟s raw disk capacity is unused, which is consistent with results of other disk usage studies, which have reported storage utilization rates of about 50% [2] . It shows the minimum space available on a machine during the study period – providing a more realistic assessment of how much space a mass storage system can safely use on a machine. The results are nearly the same – the aggregate of the minimum available disk space is 32.8 TB with an average of 45 GB per machine. 2) Existing Systems There are some existing systems, which can work as a performance measurement tool for UVS. One of these is LanStore [3]. The main design goal was to gather the empty storage capacity into a virtual storage unit. To utilize in an equal way the storage capacity of the member client nodes, the files are divided into equal fragments. Every storage node has the same number of stored data fragments Storage@desk[2] (SD) utilizes excess desktop disk capacity within an organization to create large virtual storage volumes that meet target QoS and security goals and provide access to a large number of client nodes using standard interfaces. The distributed RAID approach used in xFS [7] and Petal [6] was applied to build a virtual disk with block interface. On top the virtual block devices, higher level file systems and distributed file systems were built, like the metadata manager in xFS and Frangipani. 7 Conclusion Success of proposed UVS (Unified Virtual Storage) System would grossly depend on its ability to extend storage capacity using existing infrastructure, tapping unused storage space on network nodes & effectively managing/allocating the loaned space. The performance of UVS is dependent on the LAN speeds and Traffic conditions. The performance is quite nice with 100 Mbps networks, but fairly good with 54Mbps wireless connectivity. Mobility can also be provided to the users of UVS. Identification of the mobile nodes calls for a little tedious algorithm. One more advantage of UVS over other systems is, UVS allows the user to have hierarchical directory structure for storing and categorizing the files
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) stored on UVS space, as against flat file system used for some other implementations. This adds to the metadata stored on the server, as the directory structure also has to be maintained. This is a bottle neck while stripping files before they are uploaded. UVS technique is implemented on local area networks with different hardware configurations but homogeneous operating environments. The system is not, really, tested for heterogeneous environments. It is very much possible to implement this over the Internet which, if done, will be possible to support web-based clients. In the implementation of UVS the „Loaning‟ and allocation of space from the loaned space is done by the administrator. This can be made software driven so that the loaning and reclaiming of spare space is easier for any client. References [1] Sun Microsystems Inc., NFS: Network File System [2] H. Howie Huang, John F. Karpovich, and Andrew S. Grimshaw “A Feasibility Study of a Virtual Storage System for Large Organizations”, 2nd International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006). [3] Vilmos Bilicki, LanStore: A highly Distributed Reliable File Storage .System; .Net Technologies Conference Proceedings, Unioin Agency,-Science Press, Plzen, Czech Republic2005 [4] Eunsung Kim Hyeong S. Kim Heon Y. Yeom. “GiSK: Making Secure, Reliable and Scalable VO Repository Virtualizing Generic Disks in the Grid”, in Eighth IEEE International Conference on High-Performance Computing in Asia-Pacific Region (HPCASIA‟05). Protocol Specification, RFC 1094. March 1989 [5] Paul massiqlia and frank bunn, “Virtual Storage redefined: technology and applications for storage virtualization”, 2nd ed., VERITAS, 2000 [6] E. Lee, and C. Thekkath, "Petal: Distributed virtual disks," in Proceedings of the ACM 7th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPWS), 1996. [7] T. Anderson, M. Dahlini, et al.. "Serverless Network File Systems," ACM Transactions on Computer Systems (TOSC), Feb. 1995. [8] Edward K. Lee and Chandrohan A. Thekkah. “Petal: Distributed virtual discs”. SIGPLAN Notices, 31(9):84-92,1-5 October 1996. [9] E. Riedel, “Storage systems - not just a bunch of disks anymore,” QUEUE, pp. 32–41,2003. [10] Vazhkudai, S, et al. “Freeloader: Scavenging Desktop Storage sources for Scientific Data”. In Supercomputing 2005 (SC'05): Int'l Conference on High Performance Computing, Networking and Storage. 2005. [11] Ms. S.V.Patil, K.N.Honwadkar, “Unified Virtual Storage: Virtualization of Distributed Storage in a Network”; Digital Library URI: http://www.ijcaonline.org/archives/number22/447-681, published in IJCA Journal on Feb 25, 2010.