Applied-Information Technology in Virtualized Cloud Storage on Campus

2014 ◽  
Vol 685 ◽  
pp. 571-574
Author(s):  
Kun Huang

With the constant development of campus network informationization construction, the amount of information on campus exponentially increases, thus requiring more storage on campus. This paper discusses about the transformation of storage architecture in campus data center based on current situations of campus network storage as well as storage virtualization technology, with an aim to provide an efficient and transparent storage environment to users.

2015 ◽  
Vol 713-715 ◽  
pp. 2435-2439 ◽  
Author(s):  
Yuan Yuan Hu ◽  
Lu Wang ◽  
Xiao Dong Zhang

Based on cloud computing and cloud storage, this paper discussed three kinds of typical virtualization technology in cloud computing, that is, storage virtualization based on host or server, storage virtualization based on storage devices, and storage virtualization based on Storage Area Network (SAN). In addition, application value of storage virtualization technology was discussed. What’s more, platform architecture model of cloud storage was proposed, and the characteristics of cloud backup were discussed as an example.


2014 ◽  
Vol 519-520 ◽  
pp. 450-457
Author(s):  
Yan Zhang ◽  
Zhao Jing Wang ◽  
Xue Bing Dai ◽  
Zhi Qiang Wei ◽  
Mei Ling Li

The comprehensive analysis of Qingdao Development of e-government is presented in this paper. E-government is to resolve the current construction of the "resource sharing" and "business disaster" problem.By using the structure of the two three-center model for Qingdao,an e-government platform is built for cloud computing resources. Information resources for e-government integration provides a unified cloud environment, and the use of cloud storage virtualization technology to solve more than 120 kilometers of remote data synchronization and application-level redundant disaster problems, combined with the "Hong Jin e-office systems business". The testing and construction practice has proved the feasibility of the model.


Author(s):  
Mark Jeffery ◽  
Cassidy Shield ◽  
H. Nevin Ekici ◽  
Mike Conley

The case centers on Shilling & Smith's acquisition of Xteria Inc. and the resulting need to quickly scale the company's IT infrastructure to accommodate the acquisition. The case is based on a real leasing problem faced by a major retail firm in the Chicago area when it purchased a small credit card processing firm and scaled the operations to handle the retail firm's credit card transactions. The CIO of Shilling & Smith needs to determine which lease option is the best means of providing the technical infrastructure needed to support the firm after the acquisition of Xteria. Several issues will drive this decision, including the value and useful life of the equipment, as well as the strategic context of the firm. This case examines how to evaluate different lease options when acquiring data center information technology infrastructure. Specifically, the case addresses software vs. hardware leasing, different lease terms, and choosing between different lease structures depending on the strategy and needs of a company. This case enables students to understand the different types of technology leases and in which situations these leases would be employed.The Shilling & Smith case examines how to evaluate different lease options when acquiring data center information technology infrastructure. Specifically, students learn software vs. hardware leasing, different lease terms, and how to choose between different lease structures depending on the strategy and needs of the company. A secondary objective of the case is to teach students the important components and relative costs of information technology infrastructure.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Bin Zhou ◽  
ShuDao Zhang ◽  
Ying Zhang ◽  
JiaHao Tan

In order to achieve energy saving and reduce the total cost of ownership, green storage has become the first priority for data center. Detecting and deleting the redundant data are the key factors to the reduction of the energy consumption of CPU, while high performance stable chunking strategy provides the groundwork for detecting redundant data. The existing chunking algorithm greatly reduces the system performance when confronted with big data and it wastes a lot of energy. Factors affecting the chunking performance are analyzed and discussed in the paper and a new fingerprint signature calculation is implemented. Furthermore, a Bit String Content Aware Chunking Strategy (BCCS) is put forward. This strategy reduces the cost of signature computation in chunking process to improve the system performance and cuts down the energy consumption of the cloud storage data center. On the basis of relevant test scenarios and test data of this paper, the advantages of the chunking strategy are verified.


2014 ◽  
Vol 599-601 ◽  
pp. 1575-1579
Author(s):  
Fang Fang ◽  
Xin Ge Luo

With teaching and research of campus reliance on information technology is growing; the campus information technology development is also increasingly rapidly. Information system of campus should adapt to the campus’s long-term development plan, considering the economic conditions of campus to meet the needs of teaching and research as the fundamental starting point. Network system is the support platform of information technology. The selection of equipments is an important part of network system planning, including routers, switches, servers and other network security products, and so on. This paper described the three-layer design system. Each layer has different requirements for routers and switches. Based on the classification and the performance analysis of main network devices, this paper presented the principles and programs of the campus network construction in the purchase of network equipment should be followed.


Author(s):  
O Sri Nagesh ◽  
Tapas Kumar ◽  
Venkateswara Rao Vedula

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.


2020 ◽  
Vol 142 (2) ◽  
Author(s):  
Oluwaseun Awe ◽  
Jimil M. Shah ◽  
Dereje Agonafer ◽  
Prabjit Singh ◽  
Naveen Kannan ◽  
...  

Abstract Airside economizers lower the operating cost of data centers by reducing or eliminating mechanical cooling. It, however, increases the risk of reliability degradation of information technology (IT) equipment due to contaminants. IT Equipment manufacturers have tested equipment performance and guarantee the reliability of their equipment in environments within ISA 71.04-2013 severity level G1 and the ASHRAE recommended temperature-relative humidity (RH) envelope. IT Equipment manufacturers require data center operators to meet all the specified conditions consistently before fulfilling warranty on equipment failure. To determine the reliability of electronic hardware in higher severity conditions, field data obtained from real data centers are required. In this study, a corrosion classification coupon experiment as per ISA 71.04-2013 was performed to determine the severity level of a research data center (RDC) located in an industrial area of hot and humid Dallas. The temperature-RH excursions were analyzed based on time series and weather data bin analysis using trend data for the duration of operation. After some period, a failure was recorded on two power distribution units (PDUs) located in the hot aisle. The damaged hardware and other hardware were evaluated, and cumulative corrosion damage study was carried out. The hypothetical estimation of the end of life of components is provided to determine free air-cooling hours for the site. There was no failure of even a single server operated with fresh air-cooling shows that using evaporative/free air cooling is not detrimental to IT equipment reliability. This study, however, must be repeated in other geographical locations to determine if the contamination effect is location dependent.


Sign in / Sign up

Export Citation Format

Share Document