0% found this document useful (0 votes)
45 views2 pages

Storage Devices: Jyoti Madabhushi

Dengue hemorrhagic fever (DHF) is one of the infectious diseases which is still a public health problem. The success of preventing dengue in the family depends on the mother's understanding of the efforts to implement the Eradication of Mosquito Nests (PSN) in the household environment. The purpose of this study is to describe the knowledge of housewives about DHF and its prevention with the right method.This type of research is included in descriptive research. The data used were 63 samples in

Uploaded by

chandra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views2 pages

Storage Devices: Jyoti Madabhushi

Dengue hemorrhagic fever (DHF) is one of the infectious diseases which is still a public health problem. The success of preventing dengue in the family depends on the mother's understanding of the efforts to implement the Eradication of Mosquito Nests (PSN) in the household environment. The purpose of this study is to describe the knowledge of housewives about DHF and its prevention with the right method.This type of research is included in descriptive research. The data used were 63 samples in

Uploaded by

chandra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

International Journal of New Technology and Research (IJNTR)

ISSN:2454-4116, Volume-3, Issue-2, February 2017 Pages 01-02

Storage Devices
Jyoti Madabhushi

 Thus SANs are primarily used to enhance storage devices


Abstract— A subnetwork of storage devices that are such as disk arrays, tape libraries accessible to servers so that
connected with one another over a high speed network
the devices appear to the operating systems as locally
connection is Storage Area Network(SAN). It allows all
designated users on the network to access multiple storage attached devices. Storage virtualisation hides the physical
devices not only the storage devices installed within their storage from applications on host systems and presents a
computers. Once a SAN is constructed and all the storage simplified view of storage resources to the applications.
devices are shared within the SAN, it is than connected to the
servers that are accessed by network users. Large backup disk Virtualization allows the application to reference the storage
arrays can be stored on an off-site location and shared on a SAN resource by its common name wherethe actual storage could
where users can access them remotely. SANs are used for be on complex multi-layered multipath storage networks.
storage redundancy purposes in case of unexpected disaster and RAID is an early example of storage virtualization. Host
loss of data. A SAN typically supports data storage, retrieval
and replication on business networks using high-end servers, based storage virtualization could be implemented on the host
multiple disk arrays and interconnect technology. through logical volume management which provides the
Index Terms— Network, Storage, Devices, Disks, logical view of the storage to the host operating system.
Applications.
Storage virtualization could be implemented on the SAN
switches. Each server is assigned a LUN(logical unit number)
I. INTRODUCTION to access the storage resources. Here we have ease of
A Storage Area Network is a specialised, high speed network configuration and management, redundancy and high
that provides block level network access to storage. SANs are availability. There is potential bottleneck on the switch and
composed of hosts, switches, storage elements and storage high cost.
devices that are interconnected using a wide variety of
II. BENEFITS
technologies, topologies and protocols. SANs are used to
improve application availability e.g. multiple data paths, Benefits of SAN include storage consolidation, data sharing ,
enhance application performance, increase storage utilisation improved backup and recovery, cost effectiveness, ease of
and effectiveness e.g. consolidate storage resources, provide data migration, disaster tolerance, data integrity, high
tiered storage etc. and improve data protection and security. performance, high availability server clustering, lan free and
SANs play an important role in organisation’s business server free data movement. In SAN storage type is in blocks,
continuity management(BCM) activities. A SAN presents data transmission is through fibre channel, access mode is
storage devices to a host such that the storage appears to be through servers, complexity is difficult and management cost
locally attached. is low. Storage is accessed at block level and not at file level.
SANs are helpful in backup and disaster recovery settings. Thus a SAN is a network designed to transfer data from
Within a SAN, data can be transferred from one storage servers to targets and is alternative to directly attached storage
device to another without interacting with a server. This architecture where the storage is connected to the servers on
speeds up the backup process and eliminates the need to use general purpose networks.
server CPU cycles for backup. Many SANs use fibre channel
REFERENCES
technology or other networking protocols that allow the
[1] R. B. Boppana, J. Hastad, and S. Zachos, “Does co-NP have short
networks to span longer distances geographically. That interactive proofs?,” Inf.Process. Lett., vol. 25, no. 2, pp. 127–132,
makes it more feasible for companies to keep their backup 1987.
[2] S. Goldwasser and M. Sipser, “Private coins versus public coins in
data in remote locations. Three major components are needed interactive proof systems,” in STOC ’86, pp. 59–68, 1986.
to setup a simple SAN –a SAN switch, a storage device and a [3] G. Gratzer, General Lattice Theory. Birkhauser, 1998.
server. SAN might also include routers, bridges and gateways [4] W. Imrich and S. Klavzar, Product Graphs: Structure and Recognition.
Wiley, 2000.
to extend the SAN over large areas and to connect to other [5] B. Jonsson, “The unique factorization problem for finite relational
parts of the data centre network. Process of deploying a SAN structures,” Colloq. Math.,vol. 14, pp. 1–32, 1966.
[6] R. Konig, U. Maurer, and R. Renner, “On the power of quantum
first includes designing a SAN taking into account current memory,” IEEE Transactions on Information Theory, vol. 51, no. 7, pp.
needs and future scalability requirements. Necessary 2391–2401, 2005.
[7] R. Konig, U. Maurer, and S. Tessaro, “Abstract storage devices.”
hardware is arranged, installed and software is configured for Available at http://www.arxiv.org/abs/0706.2746, June 2007.
managing the SAN. [8] B. Kopf and D. Basin, “An information-theoretic model for adaptive
side-channel attacks,” in ACM CCS 2007, pp. 286–296, 2007.
[9] M. O. Rabin, “How to exchange secrets with oblivious transfer.”
Jyoti Madabhushi, Information Technology and Information Services Technical Memo TR-81,
Department Tata Consultancy Services Ltd, Hyderabad, India [10] Aiken Computation Laboratory, Harvard University, 1981.

1 www.ijntr.org
Storage Devices

[11] C. E. Shannon, “The zero-error capacity of a noisy channel,” IEEE


Transactions on Information Theory, vol. 2, pp. 8–19, 1956.
[12] S. Tessaro, “An abstract model for storage devices,” Sept. 2005.
Master Thesis, ETH Zurich.

Author’s Information

JyotiMadabhushi, B.E, M.S. has got more than 25 years of work


experience in IT industry with more than one and a half decade experience in
project management. She has worked in various capacities from being a
hands on technical person to project manager, program manager, portfolio
manager to strategic business unit head mapping her portfolio to the
changing trends in IT.

2 www.ijntr.org

You might also like