Unit-1 Introduction www.bookspar.com | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP.

Slides:



Advertisements
Similar presentations
Data Storage Solutions Module 1.2. Data Storage Solutions Upon completion of this module, you will be able to: List the common storage media and solutions.
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Buffers & Spoolers J L Martin Think about it… All I/O is relatively slow. For most of us, input by typing is painfully slow. From the CPUs point.
BY MAULIK PATEL CED, GPERI Computing Architecture.
Computer Parts Assignment
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Introduction to Systems Architecture Kieran Mathieson.
Chapter 9 : Distributed Database.
Virtual Memory Deung young, Moon ELEC 5200/6200 Computer Architecture and Design Lectured by Dr. V. Agrawal Lectured by Dr. V.
©Silberschatz, Korth and Sudarshan18.1Database System Concepts Centralized Systems Run on a single computer system and do not interact with other computer.
NETWORKING HARDWARE.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
CACHING: ACCELERATION OF HARD DISK ACCESS | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP.
File Systems and N/W attached storage (NAS) | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP.
For more notes and topics visit:
Ekrem Kocaguneli 11/29/2010. Introduction CLISSPE and its background Application to be Modeled Steps of the Model Assessment of Performance Interpretation.
XP Practical PC, 3e Chapter 17 1 Upgrading and Expanding your PC.
Architecture of intelligent Disk subsystem
Computer Hardware and Software
12 1 Chapter 12 Distributed Database Management Systems Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
1 Computer and Network Bottlenecks Author: Rodger Burgess 27th October 2008 © Copyright reserved.
1 Selecting LAN server (Week 3, Monday 9/8/2003) © Abdou Illia, Fall 2003.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Personal Computer - Stand- Alone Database  Database (or files) reside on a PC - on the hard disk.  Applications run on the same PC and directly access.
Computing in the Modern World Unit 4. GPS: BCS-CMW-8. Students will demonstrate knowledge of basic components of computer networks.
Advanced Principles of Operating Systems (CE-403).
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Server Virtualization
Unit 2 Architectural Styles and Case Studies | Website for Students | VTU NOTES | QUESTION PAPERS | NEWS | RESULTS 1.
UNIX and Shell Programming
COMP3122 Network Management Richard Henson March 2011.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
 There are many parts that work together to make a computer work.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
TM 8-1 Copyright © 1999 Addison Wesley Longman, Inc. Client/Server and Middleware.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
CH (5) Computer Organization
Thepul Ginige Lecture-5 Implementation of Information System Part - I Thepul Ginige.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
Client Server Model. Server Applications (Software) Management and maintenance of Data including Management and maintenance of Data including User login.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Chapter 1: Introduction to the Personal Computer
Business System Development
ICT II Unit 6 Networking.
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Network Attached Storage Overview
Data Center Infrastructure
UNIT 19 Data Security 2.
Network Configurations
The Client/Server Database Environment
Introduction to Computers
Storage Virtualization
Instructor Materials Chapter 1: Introduction to the Personal Computer
Lecture-5 Implementation of Information System Part - I Thepul Ginige
An Introduction to Computer Networking
"Cloud services" - what it is.
Presentation transcript:

Unit-1 Introduction | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS In conventional IT architectures, storage devices are normally connected to a single server. To increase fault-tolerance, storage devices are sometimes connected to two servers, with only one server actually able to use the storage device at any one time. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

Server Centric IT Architecture and Its Limitations | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

The storage devices exists only in relation to the server to which it is connected. Other servers cannot directly access the data; they always have to go through the server that is connected to the storage device. This architecture is called Server-Centric IT architecture. In this architecture servers and storage devices are generally connected together by SCSI (Small Computer System Interface) cables. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

In conventional Server-Centric IT architecture storage devices exist only in relation to the one or two servers to which they are connected. Failure of both of these computers would make it impossible to access this data. For companies which manage patient files, websites etc failure of server is not acceptable as they need data round the clock. Although the storage density of hard disks and tapes is increasing all the time due to ongoing technical development, the need for installed storage is increasing even faster. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

Consequently, it is necessary to connect more storage devices to a computer. This throws up the problem that each computer can accommodate only a limited number of I/O cards (for example, SCSI cards). Furthermore, the length of SCSI cables is limited to a maximum of 25 m. This means that the storage capacity that can be connected to a computer using conventional technologies is limited. Conventional technologies are therefore no longer sufficient to satisfy the growing demand for storage capacity. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

In server-centric IT environments the storage device is statically assigned to the computer to which it is connected. In general, a computer cannot access storage devices that are connected to a different computer. This means that if a computer requires more storage space than is connected to it, it can not use another storage space attached to another computer. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

storage devices are often scattered throughout an entire building or branch. Also, computers may be consciously set up where the user accesses the data in order to reduce LAN data traffic. The result is that the storage devices are distributed throughout many rooms, which are neither protected against unauthorized access nor sufficiently air-conditioned. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

Storage-Centric IT Architecture And Its Advantages The idea behind storage networks is that the SCSI cable is replaced by a network that is installed in addition to the existing LAN and is primarily used for data exchange between computers and storage devices. In contrast to server-centric IT architecture, in storage networks storage devices exist completely independently of any computer. Several servers can access the same storage device directly over the storage network without another server having to be involved. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

Storage devices are thus placed at the centre of the IT architecture. IT architectures with storage networks are therefore known as storage-centric IT architectures. When a storage network is introduced, the storage devices are usually also consolidated. This involves replacing the many small hard disks attached to the computers with a large disk subsystem. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

The storage network permits all computers to access the disk subsystem and share it. Free storage capacity can thus be flexibly assigned to the computer that needs it at the time. More and more companies are converting their IT systems to a storage-centric IT architecture. It has now become a permanent component of large data centers and the IT systems of large companies. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

CASE STUDY: REPLACING A SERVER WITH STORAGE NETWORKS In a production environment an application server is no longer powerful enough. Then the ageing computer must be replaced by a higher-performance device. But such a measure can be very complicated in a conventional, server-centric IT architecture. It can be carried out very elegantly in a storage network. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

The steps involved in storage network is: 1)Before the exchange, the old computer is connected to a storage device via the storage network, which it uses partially 2) First, the necessary application software is installed on the new computer. The new computer is then set up at the location at which it will ultimately stand. With storage networks it is possible to set up the computer and storage device several kilometres apart. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

3) Next, the production data for generating test data within the disk subsystem is copied. Modern storage systems can (practically) copy even terabyte-sized data files within seconds. This function is called instant copy. 4) Then the copied data is assigned to the new computer and the new computer is tested intensively. 5) After successful testing, both computers are shut down and the production data assigned to the new server. The assignment of the production data to the new server also takes just a few seconds. 6) Finally, the new server is restarted with the production data. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

Data storage and data access problem The challenge of Designing Applications: Storing and accessing data depends on the business application. The basic idea is the storage strategy used. The choice of database depends on economic, type of application or existing infrastructure etc.. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

The choice of database leads to the overall interaction of the application with the storage device. Applications are dependent upon memory management(RAM,Cache),file systems,relational and non relational database systems. Business applications will show non linear performance. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

Non linear performance in applications The reasons for non linear performance is due to : i)The availability of sufficient online storage capacity for application data coupled with sufficient temporary storage resources.(RAM,Cache etc.) Online storage is the mechanism that allows users to interact with an application,and information is available in real time. The amount of online storage required depends on user data, data requirement of the application etc. when users submit data RAM,cache etc are used for temporary storage. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

ii) The number of users who will interact with the application and thus access the online storage for application data retrieval and storage of new data. The number of user transactions accessing the storage resources correspond linearly to the amount of time each transaction takes to complete. Even in diverse applications,transactions depend on storage infrastructure and not just on the server computing capacity and network capability. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

Client-server storage model The C/S storage model provides data storage capabilities for the server component as well as storage for the network clients. When online storage is used with high performance servers,(increased RAM and cache)storage devices are used by clients and servers. Servers reach its maximum capacity as client demand increases. When more demand arises,networks use more servers. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP

As data grows storage solutions with client/server storage model continue to be problematic. For data centric applications, more storage space is needed. also applications look for server with more storage space, which may result with wastage of space,or servers may not perform due to less space. | VTU NOTES | QUESTION PAPERS | NEWS | VTU RESULTS | FORUM | BOOKSPAR ANDROID APP