Spelling suggestions: "subject:"film server"" "subject:"fine server""
1 |
Design and Analysis of a Highly Efficient File Server GroupLiu, Feng-jung 29 January 2005 (has links)
The IT community has increasingly come to view storage as a resource that should be shared among computer systems and managed independently of the computer systems that it serves. And, the explosive growth of the Web contents has led to increasing attention on two major challenges: scalability and high availability of network file system. Therefore, the ways to improve the reliability and availability of system, to achieve the expected reduction in operational expenses and to reduce the operations of system management of system have become essential issues. A basic technique for improving reliability of a file system is to mask the effects of failures through replication. Consistency control protocols are implemented to ensure the consistency among these replicas.
In this dissertation, we leveraged the concept of intermediate file handle to cover the heterogeneity of file system. But, the monolithic server system suffered from the poor system utilization due to the lack of dependence checking between writes and management of out-of-ordered requests. Hence, in this dissertation, we followed the concept of intermediate file handle and proposed an efficient data consistency control scheme, which attempts to eliminate unnecessary waits for independent NFS writes to improve the efficiency of file server group. In addition, we also proposed a simple load-sharing mechanism for NFS client to improve system throughput and the utilization of duplicates. Finally, the results of experiments proved the efficiency of the proposed consistency control mechanism and load-sharing policy. Above all, easy to implement is our main design consideration.
|
2 |
The G-Network and Its Inherent Fault Tolerant PropertiesHaynes, Teresa, Dutton, Ronald D. 01 January 1990 (has links)
This paper presents the G-network, a new topological design which is a suitable architecture for point-to-point communication and interconnection networks, We show that the G-network has the following desirable characteristics: Efficient routing, small number of links, and fault tolerance. The performance of the G-network is compared to that of the Barrel Shifter and Illiac Mesh networks.
|
3 |
Säker fillagring i hemmiljö : Hur säkrar man upp fillagring i en hemmiljö?Clarenfjord, Johan, Göransson, Christian January 2015 (has links)
I det här arbetet har författarna valt att fokusera på lagringssäkerhet ur synvinkelnhemmiljö. För att kunna ge målgruppen någon form av riktlinje definieras olika kravpå säkerhet och lagring från författarnas sida att utgå från vid diskussion och arbetetsupplägg. Arbetet inriktar sig på vad det finns för möjligheter för att kunna säkra uppde olika formerna av lagringsmöjligheter. Är det möjligt att göra? Vilka källor kanman förvänta sig att målgruppen använder för att lösa de här problemen? Genom attstudera tidigare forskning och göra omfattande dokumentstudier kommer författarnafram till vad som kan vara lämpligt att använda i en hemmiljö för säker fillagring.Arbetet mynnar ut i ett resultat med vad de olika lagringslösningarna och lagringstjänsternaklarar av för krav samt vad de klarar av för olika funktioner. Det finns ävenen form av rekommendation för användaren vad som kan vara en lämplig väg att gå,dock inte ett direkt svar på hur denna skall se ut. / The authors of this essay have chosen to focus on secure data storage from a homeenvironment standpoint. In order to give this target group something that resembles aguideline, several demands regarding security and storage will be defined. This willalso be used as a basis both for how the essay is approached and the discussion of it.The essay focuses on the possibilities when it comes to securing the varyingforms of storage solutions. Can it be done securely? In order to solve these problems,what sources are the target group most likely to use?Through study of earlier research, and extensive document studies, the authorsfind solutions regarding secure data storage that are feasible to use in a home environment.In the end, the essay will point out which of the defined demands thevarious storage solutions and services can handle, and which functions they can handle.There is also a recommendation for the reader regarding what is feasible andsuitable for use, though not a clear-cut answer saying which solution is the better;that’s still up to the reader herself to determine.
|
4 |
Jahresbericht 2004 / Universitätsbibliothek ChemnitzThümer, Ingrid 21 August 2007 (has links) (PDF)
Jahresbericht der Universitätsbibliothek Chemnitz - Berichtsjahr 2004 / Annual report of the University Library of Chemnitz in 2004
|
5 |
Jahresbericht 2004 / Universitätsbibliothek ChemnitzThümer, Ingrid 21 August 2007 (has links)
Jahresbericht der Universitätsbibliothek Chemnitz - Berichtsjahr 2004 / Annual report of the University Library of Chemnitz in 2004
|
Page generated in 0.0619 seconds