An Introduction to the Mass Storage System Reference Model, Version 5
|
|
- Violet Cross
- 5 years ago
- Views:
Transcription
1 An Introduction to the Mass Storage System Reference Model, Version 5 Robert A. Coyne, Harry Hulen IBM Federal Systems Company Houston, Texas Abstract Brief histories of the IEEE Mass Storage System Reference Model and the IEEE Storage System Standards Working Group are presented. The Reference Model is explained in terms of layers of abstraction, including storage-container layers, mapping-service layers, and storage-sewice layers. The Need for Storage System Standards The history of storage system standards began with the desire for media interchange. Since systems were isolated and proprietary, the requirements were reasonably simple and various form factors and recording formats were standardized, usually after one vendor had gained a significant market presence. Later, logical formats for volume and file structure arose so higher-level semantic objects, such as ANSI labeled tapes, could be exchanged between sites. In the eighties, the IEEE Computer Society Mass Storage Systems and Technology Technical Committee attempted to bring some order to the confusion surrounding the evolving storage industry. The result was an unofficial Mass Storage System Reference Model [l, 21. Every offerer of a significant new commercial storage system in the last several years has used the language of the Reference Model to describe its function. Customers have specified compliance with the Mass Storage System Reference Model even though the IEEE has not approved it as a standard. Storage systems today are quite complex. They often include very expensive equipment and therefore must be shared. Operations and management are often labor intensive. Recent advances in storage system hardware, in particular robotic devices for controlling removable media and large, high-performance, network-attached disk arrays, are under exploited due to lack of systems software that enables sharing by large numbers of distributed clients. It is our hope and conviction that the process of developing standards for storage systems can speed the development of systems software for storage systems. Storage System Standards Working Group The IEEE P1244 Storage System Standards Working Group (IEEE SSSWG) was chartered in May 1990 to abstract the hardware and software components of existing and emerging storage systems and to develop standard software interfaces between these components. The goal of storage service standardization is the decomposition of a storage system into interoperable functional modules that vendors may offer as separate commercial products. The Working Group s ultimate goal is to develop interoperable standards that define the software interfaces and, in the distributed case, the associated protocols to each of the architectural modules identified in the Model. In this way, storage systems will become truly open systems, and competition for both standard software modules and storage devices delivered with compliant software interfaces will lead to higher quality and lower cost. The IEEE SSSWG has served as an important forum for users, developers, and researchers to come together to work on mass storage system issues. The first and perhaps most important accomplishment has been to get representatives from a greatly increased group of more than forty organizations to agree on the basic building blocks of a standard storage system architecture. The Mass Storage System Reference Model The IEEE SSSWG adopted Version 4 of the Reference Model as its technical base, and over the past two years has extended and adjusted the Reference Model to better meet the requirements of the storage community. This paper reflects current drafts of Version 5 [3]. The Model includes several noteworthy architectural features. First is the provision for location independence, one of a number of desirable transparencies that shield clients from the details of the storage system implementation. Clients access storage system objects using unique, system-oriented identifiers. Once issued, these identifiers are immutable. The location of storage system objects may change but the unique identifiers are all that any client must present for access. Another fundamental feature is the separation of control and data paths. The Reference Model architecture allows for physical separation between the logical data path, that transfers storage data directly between sources and sinks, and the logical storage control path, that carries control and status messages between clients and servers. In this way, the architecture enables separate optimization of both the data path, for high-bandwidth bulk transfers, and the /93 $ IEEE 47
2 Twelfth IEEE Svmoosium on Mass Storage Svstems control path, for small control and status messages. In addition, a physically-clustered storage system may employ a dedicated storage device control path for additional data security. The Reference Model separates the concept of file name from file access. By not coupling naming with access, multiple name servers can coexist in a single storage system, each supporting a different human-oriented name Space. The Working Group is chartered to consider storage systems of every scale, from personal computers to the largest, distributed supercomputer storage systems. It appears feasible to standardize a storage architecture that is scale-independent, with individual implementations tailored to their target scale. The Working Group is actively studying the diverse requirements of the entire range of existing and emerging storage systems, from small, stand-alone systems with simple, removable media through departmental file servers to centralized and distributed file servers on networks of supercomputers. Layers of Abstraction in Storage Systems The Mass Storage System Reference Model has not taken the form of a truly layered model such as the familiar OS1 models used in the discipline of communications. Nevertheless, there seems to be value in using the idea of layers to help convey an intuitive grasp of the relationship among elements of a model. There are several aspects of the Reference Model that can be presented in layers. There are also several aspects that appear to defy any attempt at layering as they cut across the more obvious layer boundaries. We will look briefly at three aspects of the Model that more or less fit the layered view and then deal with aspects of the Model that cut across layers. The Data Containment Hierarchy The storage system environment consists of servers and the data entities they manage. Figure 1 depicts the containment hierarchy ranging from the user s view of the data to the physical volume on which data is stored. The top two layers of the hierarchy represent the user s view of the data and are not part of the Reference Model. The top layer represents the data format, such as numbers, pixels, and text. The second layer represents the data organization, which may take the form of a full-featured database management system or file system. Below the data format and data organization is shown the storage system. The bitfile layer is simply a string of bits that are given a name and that can be stored and retrieved. Bitfile is a term that originated with the IEEE Mass Storage System Reference Model. Groups of bitfiles are organized into bitjze containers for the purpose of managing storage hierarchies. I Data Format 3 I Data Organization 1 I Bitfile 1 Bitfile Container Virtual Volume Physical Volume, Mounted State Physical Volume, Repository State Figure I. Data Containment Hierarchy A virtual volume is a collection of contiguous virtual storage space. Virtual volumes are mapped onto physical volumes. A large virtual volume may span several physical volumes, or a small one may share a physical volume with other virtual volumes. For most purposes, the client should only need to be aware of the virtual volumes, leaving the mapping of virtual volumes to physical volumes and the management of physical volumes to the storage system. This transparency shields the user from the need to keep track of the size of individual physical volumes, and it allows the storage system to handle different sizes of physical volumes and to introduce new sizes without changing the client. The physical volume may be removable or permanently mounted. In the case of removable media, there are two states that are important enough to be shown as separate layers in Figure 1. In mounted state, a physical volume becomes identified with a disk drive, a tape transport, a memory socket, or other I/O device, and thereby becomes accessible by the Mover function. The I/O device and the physical volume become bound together into a single entity having both a device identifier and a physical volume identifier. For non-removable media, the mounted state is the only possible state. For removable media, ignoring the state of chaos where a physical volume is on a cluttered table or in a briefcase, the other important state is the state of being in an assigned location. The location may be a numbered place on a shelf where it is stored and retrieved by humans, or the location may be a slot in an automated repository. In this repository state, a physical volume also has two identifiers, the physical volume identifier and the slot identifier. The volume is accessible by a person or by a robotic device that moves the entire volume from one state to another. However, the data is obviously not accessible from the repository state.
3 Storage Service Layers We now come to a layered view of the storage services that comprise the Reference Model. The Reference Model uses a client-server paradigm to describe these entities. A client is a consumer of services and a server is a provider of services. A server can act as a client and request services from other entities. In a strictly-layered reference model such as the OS1 communications model, the user acts as ultimate client and seeks services from the top service layer. This layer seeks services from the next layer, and so on down through the layers in strict sequence. The Mass Storage System Reference Model is not that well behaved; there is some jumping around between layers. However, there is a general direction to the flow and it is useful to discuss the client-server relationships in the order shown in Figure 2. The top layer represents the Clients of a storage system. A Client may be an application that directly accesses storage services. However, there will frequently be an agent or access broker such as a file system or database management system between the application and the storage system. If there is an access broker, the application may not see the storage system at all; it will be totally encapsulated by the access broker. For example, if the access broker is a Unix file system or some entity that would appear to be a Unix file system to the application, then the application only has to know the syntax and rules of a Unix file system. However, the entity providing the user view of a Unix file system has to be very much involved in the syntax and rules of the storage system, for such is the role of an access broker. The layers below the Client have no knowledge of whether the application is using an access broker or accessing the storage system directly. For this reason, the Reference Model does not distinguish between types of Clients. Client (application) Client (access broker) Figure 2. Layers of Storage Services The Bitfile Server manages the storage space on a collection of virtual volumes and presents bitfiles to its clients. Thus, the Bitfile Server converts access requests for bitfiles into logical requests for storage services. The Bitfile Server supports the functions of bitfile migration and replication. Migration refers to the movement of bitfiles, either partially or fully, from one storage medium or location to another. Replication is the duplication of bitfiles at multiple storage locations. These concepts are intertwined as both require managing multiple copies of storage objects in such a way as to appear to be a single COPY. When bitfile migration occurs from one media type to another, certain storage access semantics may become visible to clients. Some clients will wish to be shielded from the knowledge that their data has migrated from disk to tape and will suffer some delay as their data is cached to disk before random accesses. Other clients will be cognizant of the fact that their data is now resident on tape and sequential access is completely adequate for their access patterns. The Bitfile Server coordinates shared access to a bitfile by independent clients. It also provides sufficient semantics to allow clients to determine when their write requests have been committed to stable storage and to optimize requests for sequential versus random access media. The Storage Server is essentially a virtual volume manager. The Storage Server collects labeled physical volume resources and constructs and presents virtual volumes to its clients. It performs this function by mapping access operations from virtual volumes to these non-composite physical volumes. The Storage Server will compose collections of physical or virtual volumes to form such entities as volume sets, stripe sets, RAID arrays, mirror sets and replica suites. Such sets of virtual volumes may have an arbitrary hierarchical structure built from the base volumes. The Storage Server supports reconfiguration of virtual volumes onto different base volumes to allow migration of volumes and extension of existing virtual volumes. The Storage Server requests the mounting and dismounting of physical volumes to satisfy the access requests of its clients to virtual volumes. A virtual volume is not controlled to assure consistency across access by multiple clients. The next layer shown in Figure 2 is an entity which has multiple roles called the Mover. The Mover, as the name implies, is involved in moving data; however, the Mover also serves as a physical device manager. As physical device manager, a Mover encapsulates each device, and all operations on a device are performed through requests to a Mover. The Mover is the software component that knows the detailed inner workings of the storage device and its internal control connections. The external interface to the Mover includes a set of generic device operations that are adequate for reading, writing, and positioning both random 49
4 and sequential-access storage devices. In a conventional host-based storage system, a Mover can be thought of as a specialized I/O driver. In a distributed system, the Mover functions may take the form of an intelligent control unit. We will return to our discussion of the Mover in the next section, when we will look at its role in moving data. The Physical Volume Library (PVL) is a generalization of an enterprise-wide tape management system that tracks the current locations and status of all removable volumes. The PVL controls the actual mounting and dismounting of volumes. It maintains mount queues and verifies internal volume labels. It globally optimizes the use of drives, tracks the life-cycle state of cartridges and maintains scratch pools. To support moving physical volumes around in the storage system without fear of name conflicts, the Reference Model recommends (but does not require) a single PVL. In a very large or widely-distributed storage system, a PVL may be divided into branch libraries which can operate independently under a single PVL-wide policy. The Physical Volume Repository (PVR) maintains the mapping of volume identifiers to slots and drives, optimizes the apparent mount times by staging, and enforces various management and security attributes. Each PVR manages a single repository or a set of connected repositories. A PVR may employ either a mechanical robot or a human operator to perform mounts. The PVR operates under the control of a PVL. There can be any number of PVRs. The Mover, Physical Volume Library, and Physical Volume Repository together form the physical storage system. Although the storage services in Figure 2 are depicted as layers, an important feature of the Reference Model is the ability of a client to go directly to lower level servers. This is particularly important for power clients such as a real-time application or a database manager. Such a client may be designed to reach well down into the storage system and request services of the physical storage system servers such as allocating space or pre-loading a volume of media. Mapping Service Layers Originally, the Reference Model recognized a name server but no other mapping services. It is now recognized that mapping services are a key part of any future storage system standard. Consequently, a subcommittee has been established within the IEEE SSSWG to develop standards for mapping services. policy. Name services are not standardized in the Model because the universe of entities that can act as name servers, from hierarchical file systems through associative databases, prevent standardization of the naming semantics. One of the first proposals of the mapping committee has been the definition of a Storage System Object Identifier, or SSOZD. The Object in SSOID can be a bitfile, a virtual volume, or any of the layers of storage described above; or it can be any of a number of components to be described shortly, such as a Storage Server or Physical Volume Repository. The SSOID may be one of the first standards to emerge from the IEEE SSSWG. The top level of mapping services shown in Figure 3 is the Name Server. This level is recognized as essential by the Reference Model, but no attempt will be made to define the mapping function, other than to define the structure of the SSOID and the basic function interface. The specifics of the Name Server are left to the user or application developer. It may be as simple as a file or as complex as a full fledged data base management system. The second layer represents the Location Server. From the SSOID, the Client of the storage system will use this service to determine where to find the storage services that manage the bitfile. Also from the SSOID, the user will have an internal, unique, and stable handle for accessing the desired bitfile. From this, the Bitfile Server will be able to determine the location of the virtual volume to which the bitfile is assigned. The lower layers map the virtual volume to the physical volume, and for removable media, the physical volume to a location within the repository. I Name Server (name): SSOID I Location Server (SSOID): Service Location Bitfile Server (SSOID): Virtual Volume Location Storage Server (Virtual Volume ID): Physical Volume ~ ~~ Physical Volume Library (Physical Volume ID): Repository Slot Figure 3. Layers of Mapping Services The Mapping Services Subcommittee has proposed that the location and name server(s) operate within a storage system domain. A storage system domain contains one logical location server, a common authentication mechanism and security policy, and a common administration 50, _,..... ll..l-.,~-,. -
5 Twelfth IEEE Svmuosium on Mass Storage Svstems Components Common to Several Layers The Reference Model contains several components that cut across the layers previously described. These components are the Mover, Security, and Storage System Management. The Mover The Mover was introduced in an earlier section in its role as physical device manager. The Mover s other function is to manage the movement of data. In a host-based system, these two functions can fit together easily into a single software module. In a distributed system, however, the Mover will be distributed. A portion of the Mover must be physically co-resident with the storage device and network connections it is controlling. At the Client end, another portion of the Mover is the function that manages delivery of data to the Client s memory. The Mover is a very general function that must be embedded into any client or server that needs to be a source or sink for data. The Mover is one of the principal means by which control functions and data movement functions are separated. This separation may be a physical separation, or it may be a virtual overlay on a physically integrated communications architecture. Distributed systems, particularly those intended for high performance, may be designed such that the Mover is associated with a high speed data network which is physically separate from the control network. On the other hand, in more centralized storage systems, the Mover and control functions may share the same network or the same library of standard communication services. Security Security is divided into three separately implementable components: Authentication, Authorization, and Enforcement. Authentication establishes the identity of a client anfflor server. Authorization calculates the access rights of a principal to a service, while Enforcement applies the results of this calculation at the point where access is actually requested. By separating Authorization and Enforcement, different Authorization models can coexist in the same environment and one module may transfer authorization information to another for enforcement. An example implementation of this security architecture might employ encrypted capability tickets issued by a security server to authenticated clients who then present these tickets to the appropriate modules for service. Each server in the Model would include common interfaces for the three security functions, and each service request would automatically be routed through the appropriate Authentication, Authorization, and Enforcement functions before the service would act on the request. Storage System Management Storage System Management is the collection of functions concerned with control, coordination, monitoring, performance and utilization of the storage system. These functions are typically site-dependent and involve human judgment. Standards are critical in managing a large, distributed collection of heterogeneous storage resources because of the need to exchange management information and provide predictable and consistent control. The Model management framework does not attempt to define the internal facilities and policies that are needed. Instead, the Model provides a generalized framework upon which different storage management subsystems and applications may be built. The functional areas of management cover a broad array of topics. Fault management encompasses the monitoring, detection, isolation, and correction of abnormal operations and components. Configuration management is concerned with initializing, operating, reconfiguring, and shutting down the storage system and its components. Security management determines and implements the security policies of the storage system and monitors the storage system for attempted violations. Accounting management tracks the resource consumption of storage system clients, charges for storage use, and denies resources if accounts are overdrawn. Performance management evaluates the long-term performance of the system through summary statistics and adjusts the use of the system components to be most efficient and cost-effective. Several System Management functions have been identified, including migration of storage objects to a cheaper level in the storage hierarchy, defragmentation and repacking of bitfiles and volumes, initialization, addition, and deletion of new storage resources, logging of relevant storage events, alarms on various types of errors and other events, backup, bitfile recovery, system recovery, and capacity planning. An intelligent operations agent will be a necessity to manage the large, distributed storage systems that are being planned today, as these systems will be implemented on multiple, independent platforms with the attendant management complexity
6 A Composite View of the Model Now we will put Figures 1 through 3 together into a single conceptual view of the Reference Model. The three layered aspects of the Model, together with the cross-layer aspects, are shown together in Figure 4. The boxes on the left side of the figure represent the data containment hierarchy, the right side represents the layers of mapping services, and the center tower represents the storage service layers. Running vertically behind the services are the cross-layer functions: The Mover, Security, and Storage System Management. The intersections of the cross-layer functions and the storage services are not intended to represent the flow of data but represent points of contact and interaction between the cross-layer functions and the storage services. Two of the cross-layer functions, Storage System Management and Authentication, Authorization, and Enforcement, interface with all service layers. The Mover is involved with all layers of service except the Physical Volume Repository. The Mover, as shown in Figure 4, has a branch reaching over to the physical volume layer. This branch represents the Mover's role as physical device manager. Client Application Access Broker Ph sical VoYume a Figure 4. A Layered View of the Reference Model 52
7 A Traditional View of the Reference Model Readers familiar with previous versions of the Reference Model may find the layered view of the Model a departure from the traditional way the Reference Model has been depicted. A more traditional view of the Model is therefore offered as Figure 5. This representation emphasizes the client-server aspect of the Reference Model, the separation of control and data, and the ability of the Client to access all layers of service directly. Across the center of the figure, the Mover is shown as owning the storage devices and providing data paths between the devices and the Client and various servers. The heavy black lines emphasize that all data flow is through the Mover, whether centralized or distributed. The Client, which we recall may be an application or an access broker, has a primary control flow to the Bitfile Server which, in turn, has a control flow connection to the Storage Server and the Physical Storage System. This corresponds to the layered view previously described. However, there are optional control paths between the Client and the lower level servers, emphasizing the ability of the Model to support specialized clients with demiding functional and &&ormake requirements. / Storage System Management / Location Fl - Optional Control Flow Control Flow (Client to Server) Data Flow (Bidirectional) / Figure 5. A Conventional View of the Reference Model, Version 5 Acknowledgment The authors wish to thank the members of the IEEE Storage System Standards Working Group, especially those whose contributions to the Reference Model have found their way into this paper and those whose contributions have been simplified and freely interpreted by the authors. [I] [21 References Stephen W. Miller. A Reference Model for Mass Storage Systems. Advances In Computers, 27: , Sam Coleman and Stephen W. Miller, editors. Mass Storage System Reference Model: Version 4. IEEE Technical Committee on Mass Storage Systems and Technology, May [31 Sam Coleman and David Isaac, editors. Mass Storage Reference Model, Version 5, Draft 0.3. A working document of the IEEE Storage System Standards Working Group.
A GPFS Primer October 2005
A Primer October 2005 Overview This paper describes (General Parallel File System) Version 2, Release 3 for AIX 5L and Linux. It provides an overview of key concepts which should be understood by those
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationSolution Brief: Archiving with Harmonic Media Application Server and ProXplore
Solution Brief: Archiving with Harmonic Media Application Server and ProXplore Summary Harmonic Media Application Server (MAS) provides management of content across the Harmonic server and storage infrastructure.
More informationObjectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture
Objectives Architectural Design To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural
More informationArchitectural Design
Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural
More informationDistributed Computing Environment (DCE)
Distributed Computing Environment (DCE) Distributed Computing means computing that involves the cooperation of two or more machines communicating over a network as depicted in Fig-1. The machines participating
More informationCourse 40045A: Microsoft SQL Server for Oracle DBAs
Skip to main content Course 40045A: Microsoft SQL Server for Oracle DBAs - Course details Course Outline Module 1: Database and Instance This module provides an understanding of the two major components
More informationMinsoo Ryu. College of Information and Communications Hanyang University.
Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based
More informationXenData Product Brief: XenData6 Server Software
XenData Product Brief: XenData6 Server Software XenData6 Server is the software that runs the XenData SX-10 Archive Appliance and the range of SX-520 Archive Servers, creating powerful solutions for archiving
More informationCopyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.
1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than
More information5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered
Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process
More informationEngr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila
Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila Software Design and Architecture Software Design Software design is a process of problem-solving
More informationIBM Best Practices Working With Multiple CCM Applications Draft
Best Practices Working With Multiple CCM Applications. This document collects best practices to work with Multiple CCM applications in large size enterprise deployment topologies. Please see Best Practices
More informationFundamentals to Creating Architectures using ISO/IEC/IEEE Standards
Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards What to Architect? How to Architect? IEEE Goals and Objectives Chartered by IEEE Software Engineering Standards Committee to: Define
More informationStorage Standards Work
1 Storage Standards Work Joel Williams October 15, 1996 http://www.ses-inc.com joel.williams@ses-inc.com 2 Standards Participation File-level Metadata for Portability of Sequential Storage (FMP) Study
More informationAn Introduction to GPFS
IBM High Performance Computing July 2006 An Introduction to GPFS gpfsintro072506.doc Page 2 Contents Overview 2 What is GPFS? 3 The file system 3 Application interfaces 4 Performance and scalability 4
More informationApplication Oriented Networks: An SOA Perspective
Oriented s: An SOA Perspective www.thbs.com Introduction Service Oriented Architecture is the hot topic of discussion in IT circles today. So much so, in fact, that SOA is being seen by many as the future
More informationVeritas InfoScale Enterprise for Oracle Real Application Clusters (RAC)
Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC) Manageability and availability for Oracle RAC databases Overview Veritas InfoScale Enterprise for Oracle Real Application Clusters
More informationHigh Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.
High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:
More informationEstablishing the overall structure of a software system
Architectural Design Establishing the overall structure of a software system Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 13 Slide 1 Objectives To introduce architectural design and
More informationRealTime. RealTime. Real risks. Data recovery now possible in minutes, not hours or days. A Vyant Technologies Product. Situation Analysis
RealTime A Vyant Technologies Product Real risks Data recovery now possible in minutes, not hours or days RealTime Vyant Technologies: data recovery in minutes Situation Analysis It is no longer acceptable
More informationXenData Product Brief: SX-550 Series Servers for LTO Archives
XenData Product Brief: SX-550 Series Servers for LTO Archives The SX-550 Series of Archive Servers creates highly scalable LTO Digital Video Archives that are optimized for broadcasters, video production
More informationA Simple Mass Storage System for the SRB Data Grid
A Simple Mass Storage System for the SRB Data Grid Michael Wan, Arcot Rajasekar, Reagan Moore, Phil Andrews San Diego Supercomputer Center SDSC/UCSD/NPACI Outline Motivations for implementing a Mass Storage
More informationCategorizing Migrations
What to Migrate? Categorizing Migrations A version control repository contains two distinct types of data. The first type of data is the actual content of the directories and files themselves which are
More informationThe International Intelligent Network (IN)
The International Intelligent Network (IN) Definition In an intelligent network (IN), the logic for controlling telecommunications services migrates from traditional switching points to computer-based,
More informationLecture 1. Chapter 6 Architectural design
Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process
More informationIBM 3850-Mass storage system
BM 385-Mass storage system by CLAYTON JOHNSON BM Corporation Boulder, Colorado SUMMARY BM's 385, a hierarchical storage system, provides random access to stored data with capacity ranging from 35 X 1()9
More informationArchitectural Design. Topics covered. Architectural Design. Software architecture. Recall the design process
Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural
More informationChapter 6 Architectural Design
Chapter 6 Architectural Design Chapter 6 Architectural Design Slide 1 Topics covered The WHAT and WHY of architectural design Architectural design decisions Architectural views/perspectives Architectural
More informationCourse Description. Audience. Prerequisites. At Course Completion. : Course 40074A : Microsoft SQL Server 2014 for Oracle DBAs
Module Title Duration : Course 40074A : Microsoft SQL Server 2014 for Oracle DBAs : 4 days Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize
More informationWhite paper ETERNUS CS800 Data Deduplication Background
White paper ETERNUS CS800 - Data Deduplication Background This paper describes the process of Data Deduplication inside of ETERNUS CS800 in detail. The target group consists of presales, administrators,
More informationIt s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration
It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is
More informationAOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz
AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz Results obtained by researchers in the aspect-oriented programming are promoting the aim to export these ideas to whole software development
More informationiscsi Technology: A Convergence of Networking and Storage
HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...
More informationChapter 6 Architectural Design. Chapter 6 Architectural design
Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying
More informationChapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design
Chapter 6 Architectural Design Lecture 1 1 Topics covered ² Architectural design decisions ² Architectural views ² Architectural patterns ² Application architectures 2 Software architecture ² The design
More informationData Movement & Tiering with DMF 7
Data Movement & Tiering with DMF 7 Kirill Malkin Director of Engineering April 2019 Why Move or Tier Data? We wish we could keep everything in DRAM, but It s volatile It s expensive Data in Memory 2 Why
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.1 for Windows brings advanced online storage management to Microsoft Windows Server environments,
More information2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold.
T0/04-023 revision 2 Date: September 06, 2005 To: T0 Committee (SCSI) From: George Penokie (IBM/Tivoli) Subject: SAM-4: Converting to UML part Overview The current SCSI architecture follows no particular
More informationVeritas Storage Foundation for Windows by Symantec
Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.
More informationData Domain OpenStorage Primer
White Paper Data Domain OpenStorage Primer Abstract Data Domain s support for Symantec NetBackup OpenStorage enables the use of disk as disk, eliminating the need to emulate tape drives, tape cartridges,
More information10 Things to expect from a DB2 Cloning Tool
10 Things to expect from a DB2 Cloning Tool This document gives a brief overview of functionalities that can be expected from a modern DB2 cloning tool. The requirement to copy DB2 data becomes more and
More informationSYSTEM UPGRADE, INC Making Good Computers Better. System Upgrade Teaches RAID
System Upgrade Teaches RAID In the growing computer industry we often find it difficult to keep track of the everyday changes in technology. At System Upgrade, Inc it is our goal and mission to provide
More informationAnnouncements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris
Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,
More informationChapter 14: Mass-Storage Systems
Chapter 14: Mass-Storage Systems Disk Structure Disk Scheduling Disk Management Swap-Space Management RAID Structure Disk Attachment Stable-Storage Implementation Tertiary Storage Devices Operating System
More informationAddress Accessible Memories. A.R. Hurson Department of Computer Science Missouri University of Science & Technology
Address Accessible Memories A.R. Hurson Department of Computer Science Missouri University of Science & Technology 1 Memory System Memory Requirements for a Computer An internal storage medium to store
More informationExecutive Summary. Methodology:
Executive Summary The Data Archiving product/technology evaluation team began meeting in September 2014 and concluded work in March 2015. The team met approximately seven times during that period and compiled
More informationdata dependence Data dependence Structure dependence
data dependence Structure dependence If the file-system programs are affected by change in the file structure, they exhibit structuraldependence. For example, when we add dateof-birth field to the CUSTOMER
More informationContemporary Design. Traditional Hardware Design. Traditional Hardware Design. HDL Based Hardware Design User Inputs. Requirements.
Contemporary Design We have been talking about design process Let s now take next steps into examining in some detail Increasing complexities of contemporary systems Demand the use of increasingly powerful
More informationVeritas Storage Foundation for Oracle RAC from Symantec
Veritas Storage Foundation for Oracle RAC from Symantec Manageability, performance and availability for Oracle RAC databases Data Sheet: Storage Management Overviewview offers a proven solution to help
More informationiscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard
iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of
More informationCONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion
CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries
More informationThe Need for a Terminology Bridge. May 2009
May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the
More informationLecture 9: MIMD Architectures
Lecture 9: MIMD Architectures Introduction and classification Symmetric multiprocessors NUMA architecture Clusters Zebo Peng, IDA, LiTH 1 Introduction A set of general purpose processors is connected together.
More informationPhysical Storage Media
Physical Storage Media These slides are a modified version of the slides of the book Database System Concepts, 5th Ed., McGraw-Hill, by Silberschatz, Korth and Sudarshan. Original slides are available
More information1 Overview of Database Management
1 Overview of Database Management 1.1 Data, information and knowledge 1.1.1 Data Data is/are the facts of the World. For example, take yourself. You may be 5ft tall, have brown hair and blue eyes. All
More informationFundamentals of STEP Implementation
Fundamentals of STEP Implementation David Loffredo loffredo@steptools.com STEP Tools, Inc., Rensselaer Technology Park, Troy, New York 12180 A) Introduction The STEP standard documents contain such a large
More informationNetwork protocols and. network systems INTRODUCTION CHAPTER
CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more
More informationCurrent Topics in OS Research. So, what s hot?
Current Topics in OS Research COMP7840 OSDI Current OS Research 0 So, what s hot? Operating systems have been around for a long time in many forms for different types of devices It is normally general
More informationRio-2 Hybrid Backup Server
A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject
More informationDefining OAIS requirements by Deconstructing the OAIS Reference Model Date last revised: August 28, 2005
Defining OAIS requirements by Deconstructing the OAIS Reference Model Date last revised: August 28, 2005 This table includes text extracted directly from the OAIS reference model (Blue Book, 2002 version)
More informationApplication generators: a case study
Application generators: a case study by JAMES H. WALDROP Hamilton Brothers Oil Company Denver, Colorado ABSTRACT Hamilton Brothers Oil Company recently implemented a complex accounting and finance system.
More informationVERITAS Storage Foundation 4.0 TM for Databases
VERITAS Storage Foundation 4.0 TM for Databases Powerful Manageability, High Availability and Superior Performance for Oracle, DB2 and Sybase Databases Enterprises today are experiencing tremendous growth
More informationIntroduction 1.1 SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS
1 Introduction The purpose of this chapter is to convey the basic idea underlying this book. To this end we will first describe conventional server-centric IT architecture and sketch out its limitations
More informationWhat a BACnet system looks like and how it can be used generally depends. By Roland Laird
This article was published in ASHRAE Journal, November 2009. Copyright 2009 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. Posted at www.ashrae.org. This article may not
More informationDigital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview
Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview Published by National Electrical Manufacturers Association 1300 N. 17th Street Rosslyn, Virginia 22209 USA Copyright
More informationChapter 4. Fundamental Concepts and Models
Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas
More informationIBM Compose Managed Platform for Multiple Open Source Databases
IBM Compose Managed Platform for Multiple Source Databases Source for Source for Data Layer Blueprint with Compose Source for Comprehensive Catalogue for Simplified Scoping Scalable Platform for FutureProof
More informationThe Service Availability Forum Platform Interface
The Service Availability Forum Platform Interface The Service Availability Forum develops standards to enable the delivery of continuously available carrier-grade systems with offthe-shelf hardware platforms
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures
More informationDistributed Systems Principles and Paradigms. Chapter 01: Introduction
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter
More informationBrendan Lelieveld-Amiro, Director of Product Development StorageQuest Inc. December 2012
Automated archiving using IBM Tape Libraries and StorageQuest Archive Manager Automated archiving made easy using volume spanning with StorageQuest Archive Manager and an IBM Tape Library Brendan Lelieveld-Amiro,
More informationDatabases and Database Systems
Page 1 of 6 Databases and Database Systems 9.1 INTRODUCTION: A database can be summarily described as a repository for data. This makes clear that building databases is really a continuation of a human
More informationMASS-STORAGE STRUCTURE
UNIT IV MASS-STORAGE STRUCTURE Mass-Storage Systems ndescribe the physical structure of secondary and tertiary storage devices and the resulting effects on the uses of the devicesnexplain the performance
More informationChapter 8 Virtual Memory
Operating Systems: Internals and Design Principles Chapter 8 Virtual Memory Seventh Edition William Stallings Operating Systems: Internals and Design Principles You re gonna need a bigger boat. Steven
More informationhot plug RAID memory technology for fault tolerance and scalability
hp industry standard servers april 2003 technology brief TC030412TB hot plug RAID memory technology for fault tolerance and scalability table of contents abstract... 2 introduction... 2 memory reliability...
More informationDISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed
More informationEvaluator Group Inc. Executive Editor: Randy Kerns
Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright
More information1 Quantum Corporation 1
1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual
More informationDISTRIBUTED TRANSACTION PROCESSING STANDARDS AND THEIR APPLICATIONS
CITR TECHNICAL JOURNAL VOLUME 1 41 DISTRIBUTED TRANSACTION PROCESSING STANDARDS AND THEIR APPLICATIONS GRAHAM CHEN Abstract The OSI Standards committee (ISO SC21 Working Group 8) has defined the distributed
More informationModule 13: Secondary-Storage
Module 13: Secondary-Storage Disk Structure Disk Scheduling Disk Management Swap-Space Management Disk Reliability Stable-Storage Implementation Tertiary Storage Devices Operating System Issues Performance
More informationMobile and Heterogeneous databases Distributed Database System Transaction Management. A.R. Hurson Computer Science Missouri Science & Technology
Mobile and Heterogeneous databases Distributed Database System Transaction Management A.R. Hurson Computer Science Missouri Science & Technology 1 Distributed Database System Note, this unit will be covered
More informationOperating Systems. Operating Systems
The operating system defines our computing experience. It is the first software we see when we turn on the computer, and the last software we see when the computer is turned off. It's the software that
More informationIBM Tivoli Storage Manager for Windows Version Installation Guide IBM
IBM Tivoli Storage Manager for Windows Version 7.1.8 Installation Guide IBM IBM Tivoli Storage Manager for Windows Version 7.1.8 Installation Guide IBM Note: Before you use this information and the product
More informationTechnology Insight Series
IBM ProtecTIER Deduplication for z/os John Webster March 04, 2010 Technology Insight Series Evaluator Group Copyright 2010 Evaluator Group, Inc. All rights reserved. Announcement Summary The many data
More informationPRIMEPOWER ARMTech Resource Management Provides a Workload Management Solution
PRIMEPOWER ARMTech Resource Management Provides a Workload Management Solution A D.H. Brown Associates, Inc. White Paper Prepared for Fujitsu This document is copyrighted by D.H. Brown Associates, Inc.
More informationDe-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid
De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)
More informationBRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT
- 1 Mobile Data Management: Mobile Transactions - Reporting and Co Transactions Kangaroo Transaction Model - Clustering Model Isolation only transaction 2 Tier Transaction Model Semantic based nomadic
More informationWhat's in this guide... 4 Documents related to NetBackup in highly available environments... 5
Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...
More informationSoftware Engineering
Software Engineering Engr. Abdul-Rahman Mahmood MS, MCP, QMR(ISO9001:2000) Usman Institute of Technology University Road, Karachi armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm
More informationWindows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1
Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.
More informationGeneral Objective:To understand the basic memory management of operating system. Specific Objectives: At the end of the unit you should be able to:
F2007/Unit6/1 UNIT 6 OBJECTIVES General Objective:To understand the basic memory management of operating system Specific Objectives: At the end of the unit you should be able to: define the memory management
More informationVERITAS Volume Replicator. Successful Replication and Disaster Recovery
VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1
More informationExecutive Summary. The Need for Shared Storage. The Shared Storage Dilemma for the SMB. The SMB Answer - DroboElite. Enhancing your VMware Environment
Executive Summary The Need for Shared Storage The Shared Storage Dilemma for the SMB The SMB Answer - DroboElite Enhancing your VMware Environment Ideal for Virtualized SMB Conclusion Executive Summary
More informationOOI CyberInfrastructure Architecture & Design
OOI CI Architecture & Design Integrated Dictionary (AV-2) OOI CyberInfrastructure Architecture & Design Operational Node Connectivity Description OV-2 PDR CANDIDATE November 2007 Last revised: 11/13/2007
More informationStatus of IEEE SSSWG and ANSI/AIIM MS71 Standards. Presented at the THIC Meeting at the DoubleTree Hotel Del Mar CA on January 18, 2000
Status of IEEE SSSWG and ANSI/AIIM MS71 Standards P C Hariharan Systems Engineering & Security, Inc 7474 Greenway Center Dr, Suite 700 Greenbelt MD 20770-3523 Phone: +1-301-441-3694; FAX: +1-301-441-3697
More information10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.
10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence
More information