SlideShare uma empresa Scribd logo
1 de 15
Policy Based Validation of SAN Configuration 
SATWIK KUMAR 
1RV13CS141 
Department of Computer Science and Engineering 
R V College of Engineering, Bangalore
Presentation Outline 
INTRODUCTION 
Storage Area Network 
Network Area Storage 
SAN v/s NAS 
BODY 
Awareness of global effects of the product/topic 
Understanding of economic factors 
Awareness of contemporary issues 
Understanding of Professional Issues 
Literature survey 
Data Structures 
Computer Organization and Architecture 
Digital Logic and Design 
Discrete Mathematical Structure 
Future work for next Phase 
REFERENCES
Introduction to Storage Area 
Network 
High-speed network of storage elements. 
Establishes direct and indirect connections between 
multiple servers and storage devices.
Network Area Storage 
File-level computer data storage connected to 
a computer network. 
Provides data access to heterogeneous group of 
clients. 
SAN V/S NAS
Awareness of global effects of the 
product/topic 
Users can access data globally, from multiple locations 
around the world, quickly and transparently without 
breaking budgets. 
Once restricted to large organizations and mainframe 
environments, is becoming more common in mid-sized 
organizations. 
SAN adoption has grown from a market share of a little 
over 20% in 2000 to nearly 60% in 2010.
Understanding of economic factors 
Increasing Number of Enterprises 
Increasing Requirements on Data Availability. 
Reduced cost of external storage. 
Best and Superior performance. 
High Degree of Fault Tolerance.
Awareness of contemporary issues 
Installation of SAN is still a highly complex and 
lengthy procedure. 
A poorly designed SAN can itself be a single point of 
failure for large volume of data. 
Incompatibility issues.
Understanding of Professional Issues 
One of the key challenges of SAN management is the 
large number of configuration problems that are 
encountered when 
(a) adding/removing devices in an existing SAN. 
(b) provisioning new storage. 
(c) upgrading firmware or device drivers. 
(d) trying to ensure a certain level of reliability and 
security in the SAN.
Literature survey 
Data Structures 
Hard Coding 
It is a software development practice in which 
program is directly written into the source code 
manually. 
This may cause a program bug. 
It is difficult for a human to determine conflicts 
between rules, assign priorities, and specify the 
sequence of execution of the rules.
Digital Logic and Design 
Fibre Channel Protocol 
It is a transport protocol that predominantly 
transports commands over Fibre Channel networks. 
Provides the highest performance levels. 
Designed for mission-critical applications. 
Cost of components is relatively high. 
Relatively difficult to implement and manage.
Computer Organization and 
Architecture 
Host Bus Adapters(HBA) 
They are part of the storage network. 
It is the interface between the server and the attached Fibre 
Channel network. 
It provides I/O processing. 
(Basic SAN Configuration) 
LAN 
Tape Library 
HBA HBA 
Switch 
Controller 
Storage Array 
Backup 
Server 
Server Server
Discrete Mathematical Structure 
Graph Theory. 
Used for Developing Architecture of Storage Area Network 
Permutation And Combination. 
Used to allocate Memory in the Disk Arrays. 
Collection Policies. 
Policies that validate properties of a group of SAN 
components. An example policy is “All HBAs in a host should 
be from the same manufacturer”.
Future work for next phase 
Architecture Details of policy based validation of 
Configuration. 
Policy Evaluator. 
Policy Request Generator. 
Action Handler. 
Collection Policies
References 
[1]http://ieeexplore.ieee.org/xpl/Policy-Based Validation of SAN 
Configuration 
[2] M. Bearden, S. Garg, and W. J. Lee. Integrating Goal 
Specification in Policy Based Management. In Proc. of IEEE 
Policy 2001, January 2001. 
[3] R. Chadha, Y.-H. Cheng, T. Cheng, S. Gadgil, A. Hafid, K. 
Kim, G. Levin, N. Natarajan, K. Parmeswaran, A. Poylisher, 
and J. Unger. PECAN: Policy-enabled configuration across 
networks. In Proc. of IEEE Policy 2003, June 2003. 
[4] http://en.wikipedia.org/wiki/Network-attached_storage. 
[5] http://en.wikipedia.org/wiki/Storage_area_network.
Thank You

Mais conteúdo relacionado

Mais procurados

Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
sagaroceanic11
 
Storage area network
Storage area networkStorage area network
Storage area network
Neha Agarwal
 
Network Function Virtualization : Overview
Network Function Virtualization : OverviewNetwork Function Virtualization : Overview
Network Function Virtualization : Overview
sidneel
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Majid Hajibaba
 

Mais procurados (20)

Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Storage Area Network
Storage Area NetworkStorage Area Network
Storage Area Network
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
Network Function Virtualization : Overview
Network Function Virtualization : OverviewNetwork Function Virtualization : Overview
Network Function Virtualization : Overview
 
middleware
middlewaremiddleware
middleware
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Using the Chebotko Method to Design Sound and Scalable Data Models for Apache...
Using the Chebotko Method to Design Sound and Scalable Data Models for Apache...Using the Chebotko Method to Design Sound and Scalable Data Models for Apache...
Using the Chebotko Method to Design Sound and Scalable Data Models for Apache...
 
Cluster Computers
Cluster ComputersCluster Computers
Cluster Computers
 
Living with SQL and NoSQL at craigslist, a Pragmatic Approach
Living with SQL and NoSQL at craigslist, a Pragmatic ApproachLiving with SQL and NoSQL at craigslist, a Pragmatic Approach
Living with SQL and NoSQL at craigslist, a Pragmatic Approach
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
 
NAS - Network Attached Storage
NAS - Network Attached StorageNAS - Network Attached Storage
NAS - Network Attached Storage
 
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
Cloud Computing Principles and Paradigms: 6 on the management of virtual mach...
 
Presentation data center design overview
Presentation   data center design overviewPresentation   data center design overview
Presentation data center design overview
 

Destaque

Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
Krishna Kahar
 
Introduction to san ( storage area networks )
Introduction to san ( storage area networks )Introduction to san ( storage area networks )
Introduction to san ( storage area networks )
sagaroceanic11
 
Vedic mathematics details
Vedic mathematics detailsVedic mathematics details
Vedic mathematics details
Sahil Goel
 
vedic mathematics based MAC unit
vedic mathematics based MAC unitvedic mathematics based MAC unit
vedic mathematics based MAC unit
Navya Shree
 
Chapter 14 replication
Chapter 14 replicationChapter 14 replication
Chapter 14 replication
AbDul ThaYyal
 

Destaque (20)

Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
Introduction to san ( storage area networks )
Introduction to san ( storage area networks )Introduction to san ( storage area networks )
Introduction to san ( storage area networks )
 
The Socialization Process of Twitter
The Socialization Process of TwitterThe Socialization Process of Twitter
The Socialization Process of Twitter
 
BigQuery for the Big Data win
BigQuery for the Big Data winBigQuery for the Big Data win
BigQuery for the Big Data win
 
Vedic mathematics details
Vedic mathematics detailsVedic mathematics details
Vedic mathematics details
 
Vedic
VedicVedic
Vedic
 
Basics of Vedic Mathematics - Multiplication (1 of 2)
Basics of Vedic Mathematics - Multiplication (1 of 2)Basics of Vedic Mathematics - Multiplication (1 of 2)
Basics of Vedic Mathematics - Multiplication (1 of 2)
 
Emc san-overview-presentation
Emc san-overview-presentationEmc san-overview-presentation
Emc san-overview-presentation
 
Sdr seminar
Sdr seminarSdr seminar
Sdr seminar
 
Vedic maths sutras
Vedic maths  sutrasVedic maths  sutras
Vedic maths sutras
 
vedic mathematics based MAC unit
vedic mathematics based MAC unitvedic mathematics based MAC unit
vedic mathematics based MAC unit
 
Software Defined Radio (SDR)
Software Defined Radio (SDR)Software Defined Radio (SDR)
Software Defined Radio (SDR)
 
Software defined radio
Software defined radioSoftware defined radio
Software defined radio
 
Abacus & Vedic Maths Training
Abacus & Vedic Maths TrainingAbacus & Vedic Maths Training
Abacus & Vedic Maths Training
 
Vedic Mathematics.ppt
Vedic Mathematics.pptVedic Mathematics.ppt
Vedic Mathematics.ppt
 
Chapter 14 replication
Chapter 14 replicationChapter 14 replication
Chapter 14 replication
 
Software Defined Radio
Software Defined RadioSoftware Defined Radio
Software Defined Radio
 
Vedic math
Vedic mathVedic math
Vedic math
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)
 
Vedic maths .PPT
Vedic maths .PPTVedic maths .PPT
Vedic maths .PPT
 

Semelhante a Storage area network (san)

Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
Steve Goeringer
 
Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd Iaetsd
 

Semelhante a Storage area network (san) (20)

Infrastructure Strategies 2007
Infrastructure Strategies 2007Infrastructure Strategies 2007
Infrastructure Strategies 2007
 
Moving Forward Faster: How Monash University Automated Data on AWS with Commv...
Moving Forward Faster: How Monash University Automated Data on AWS with Commv...Moving Forward Faster: How Monash University Automated Data on AWS with Commv...
Moving Forward Faster: How Monash University Automated Data on AWS with Commv...
 
Analysis of SOFTWARE DEFINED STORAGE (SDS)
Analysis of SOFTWARE DEFINED STORAGE (SDS)Analysis of SOFTWARE DEFINED STORAGE (SDS)
Analysis of SOFTWARE DEFINED STORAGE (SDS)
 
Rain technology seminar
Rain technology seminar Rain technology seminar
Rain technology seminar
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTIONSECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
 
Case Study: Synchroniztion Issues in Mobile Databases
Case Study: Synchroniztion Issues in Mobile DatabasesCase Study: Synchroniztion Issues in Mobile Databases
Case Study: Synchroniztion Issues in Mobile Databases
 
Case Study: Synchroniztion Issues in Mobile Databases
Case Study: Synchroniztion Issues in Mobile DatabasesCase Study: Synchroniztion Issues in Mobile Databases
Case Study: Synchroniztion Issues in Mobile Databases
 
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
An Energy Efficient Data Transmission and Aggregation of WSN using Data Proce...
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
Designing network topology.pptx
Designing network topology.pptxDesigning network topology.pptx
Designing network topology.pptx
 
An SD-WAN Bill of Rights
An SD-WAN Bill of RightsAn SD-WAN Bill of Rights
An SD-WAN Bill of Rights
 
SD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographicSD-WAN Bill of Rights -infographic
SD-WAN Bill of Rights -infographic
 
A Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System UptimeA Study on Replication and Failover Cluster to Maximize System Uptime
A Study on Replication and Failover Cluster to Maximize System Uptime
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud StorageIRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
 
vNet SAS Focus Group for NextIO
vNet SAS Focus Group for NextIOvNet SAS Focus Group for NextIO
vNet SAS Focus Group for NextIO
 
Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)Iaetsd survey on big data analytics for sdn (software defined networks)
Iaetsd survey on big data analytics for sdn (software defined networks)
 
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...IRJET-  	  A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
 
A big-data architecture for real-time analytics
A big-data architecture for real-time analyticsA big-data architecture for real-time analytics
A big-data architecture for real-time analytics
 

Último

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 

Storage area network (san)

  • 1. Policy Based Validation of SAN Configuration SATWIK KUMAR 1RV13CS141 Department of Computer Science and Engineering R V College of Engineering, Bangalore
  • 2. Presentation Outline INTRODUCTION Storage Area Network Network Area Storage SAN v/s NAS BODY Awareness of global effects of the product/topic Understanding of economic factors Awareness of contemporary issues Understanding of Professional Issues Literature survey Data Structures Computer Organization and Architecture Digital Logic and Design Discrete Mathematical Structure Future work for next Phase REFERENCES
  • 3. Introduction to Storage Area Network High-speed network of storage elements. Establishes direct and indirect connections between multiple servers and storage devices.
  • 4. Network Area Storage File-level computer data storage connected to a computer network. Provides data access to heterogeneous group of clients. SAN V/S NAS
  • 5. Awareness of global effects of the product/topic Users can access data globally, from multiple locations around the world, quickly and transparently without breaking budgets. Once restricted to large organizations and mainframe environments, is becoming more common in mid-sized organizations. SAN adoption has grown from a market share of a little over 20% in 2000 to nearly 60% in 2010.
  • 6. Understanding of economic factors Increasing Number of Enterprises Increasing Requirements on Data Availability. Reduced cost of external storage. Best and Superior performance. High Degree of Fault Tolerance.
  • 7. Awareness of contemporary issues Installation of SAN is still a highly complex and lengthy procedure. A poorly designed SAN can itself be a single point of failure for large volume of data. Incompatibility issues.
  • 8. Understanding of Professional Issues One of the key challenges of SAN management is the large number of configuration problems that are encountered when (a) adding/removing devices in an existing SAN. (b) provisioning new storage. (c) upgrading firmware or device drivers. (d) trying to ensure a certain level of reliability and security in the SAN.
  • 9. Literature survey Data Structures Hard Coding It is a software development practice in which program is directly written into the source code manually. This may cause a program bug. It is difficult for a human to determine conflicts between rules, assign priorities, and specify the sequence of execution of the rules.
  • 10. Digital Logic and Design Fibre Channel Protocol It is a transport protocol that predominantly transports commands over Fibre Channel networks. Provides the highest performance levels. Designed for mission-critical applications. Cost of components is relatively high. Relatively difficult to implement and manage.
  • 11. Computer Organization and Architecture Host Bus Adapters(HBA) They are part of the storage network. It is the interface between the server and the attached Fibre Channel network. It provides I/O processing. (Basic SAN Configuration) LAN Tape Library HBA HBA Switch Controller Storage Array Backup Server Server Server
  • 12. Discrete Mathematical Structure Graph Theory. Used for Developing Architecture of Storage Area Network Permutation And Combination. Used to allocate Memory in the Disk Arrays. Collection Policies. Policies that validate properties of a group of SAN components. An example policy is “All HBAs in a host should be from the same manufacturer”.
  • 13. Future work for next phase Architecture Details of policy based validation of Configuration. Policy Evaluator. Policy Request Generator. Action Handler. Collection Policies
  • 14. References [1]http://ieeexplore.ieee.org/xpl/Policy-Based Validation of SAN Configuration [2] M. Bearden, S. Garg, and W. J. Lee. Integrating Goal Specification in Policy Based Management. In Proc. of IEEE Policy 2001, January 2001. [3] R. Chadha, Y.-H. Cheng, T. Cheng, S. Gadgil, A. Hafid, K. Kim, G. Levin, N. Natarajan, K. Parmeswaran, A. Poylisher, and J. Unger. PECAN: Policy-enabled configuration across networks. In Proc. of IEEE Policy 2003, June 2003. [4] http://en.wikipedia.org/wiki/Network-attached_storage. [5] http://en.wikipedia.org/wiki/Storage_area_network.