• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Bandwidth regulation and performance enhancements for Open-iSCSI networked storage

Zhang, Yongjian Unknown Date
No description available.
2

Bandwidth regulation and performance enhancements for Open-iSCSI networked storage

Zhang, Yongjian 11 1900 (has links)
Virtual machines are gaining a growing importance in modern business IT infrastructure. They facilitate multiple operating system instances on one physical host, which provides more efficient use of the computing power of the physical host but increases the amount of network traffic as well. To avoid potential network congestion and prioritize link resource usage in a virtual machine system, we propose a bandwidth regulation scheme. Extensive evaluation demonstrates that this bandwidth regulation scheme is accurate and effective. In addition, we resolved a drastic performance degradation of the Open-iSCSI initiator. We thoroughly tested the performance of the Open-iSCSI initiator and three modified versions under two methods of setting the TCP send buffer size - statically and dynamically. Based on these results, we propose a performance tuning scheme, which can enable users of Open-iSCSI, especially those using Open-iSCSI over a long fat network, to achieve significant throughput gains.
3

Secure Management of Networked Storage Services: Models and Techniques

Singh, Aameek 03 May 2007 (has links)
With continued advances in computing, the amount of digital data continues to grow at an astounding rate. This has strained enterprise infrastructures and triggered development of service oriented architectures. In recent years, storage has also begun its transformation into a class of service. By outsourcing storage to an external storage service provider (SSP), enterprises not only cut management cost but also obtain on-demand infrastructure with superior disaster recovery and content dissemination capabilities. Wide deployment of this new outsourced storage environment requires solutions to many challenging problems. The foremost is the development of usable security and access control mechanisms that provide desirable levels of data confidentiality without placing an inordinate amount of trust into the SSP. This absence of a trusted reference monitor is a fundamental departure from traditional mechanisms and new solutions are required. The second important challenge is the autonomic management of SSP's infrastructure, uniquely characterized by a highly dynamic workload with large data capacity requirements. This dissertation research proposes models and techniques to address these two challenges. First, we introduce a novel access control system called xACCESS that uses cryptographic access control primitives (CAPs) to "embed" access control into stored data. This eliminates any dependency on the SSP for enforcement of security policies. We also analyze the privacy characteristics of its data sharing mechanisms and propose enhancements for more secure and convenient data sharing. We also develop a secure multiuser search approach that permits hosting of secured search indices at untrusted SSPs. We introduce a novel access control barrel (ACB) primitive that embeds access control into indices to prevent unauthorized information extraction during search. Our contribution to the autonomic SSP storage management has two important highlights. First, we have developed an impact analysis engine that efficiently analyzes the impact of a client-initiated change (workload surge, storage growth) on the SSP storage area network with minimal administrator involvement. Second, we have designed a new algorithm to quickly perform reallocation of resources in order to efficiently integrate the client change.

Page generated in 0.2033 seconds