Non-disruptive Data Mitigation through Storage Virtualization

Authors

  • Pankaj Manchanda Amity Institute of Information Technology, Amity University, Noida (Uttar Pradesh), India
  • Rachna Jain Amity Institute of Information Technology, Amity University, Noida (Uttar Pradesh), India

Keywords:

Data Mining, Data Mitigation, RAID, SAN, NAS, Disruptive Data

Abstract

Storage Area Network provides (SAN) matures larger and wide complexity to implement secure and robust communication between host and storage device in storage infrastructure to consolidate data and utilizing storage resources effectively. To adapt this virtualization in storage makes SAN to enhanced productivity, assets utilization and better management of storage infrastructure. Storage virtualization simplifies resource management by pooling and sharing resources for physical infrastructure to logical-view infrastructure by storage utilization and modifying storage without affecting an application�s availability and non-disruptive Data mitigation to access and storage while migration of data-exchange in progress.

References

Mark Blunden “IBM: Storage Networking Virtualization What’s it all about”, Milk Berx-Debeys, February, 2008 , ISBN 0738421367

G. Somasundaram “Information Storage and Management”, Alok Shrivastava EMC Education Services, Wiley, December 2009, Page No(212-215)

http://searchvirtualstorage.techtarget.com/tip/Block-level-storage-virtualization-Reasons-to-implement-it

http://searchstorage.techtarget.com/definition/file-virtualization

Gunjan Khanna “Application Performance Management in Virtualized Server Environments”, Kirk Beaty, Gautam Kar, Andrzej Kochut IBM T.J. Watson Research Center, Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP, ISSN: 1542-1201, Page No( 373-381).

Adrian De Luca “Reinventing Storage Virtualization” Director, Storage Management & Data Protection Asia Pacific, Singapore, Hitachi Storage Solutions April, 2009, Media Buzz

Daniel A. Menasc´e “Virtualization: Concepts, Applications, and Performance Modeling” Fairfax, VA 22030, USA, CMG Journal 2005

R.P. Goldberg, “Survey of Virtual Machine Research,” IEEE Computer , October 2012, Page No(34–45), ISSN: 0018-9162

EMC Corporation, http://www.emc.com, 2014

Rob Peglar: SNIA Education “Storage virtualization I What, where ,ehy and How” Xiotech Corporation Tutorial 2009

Shiv Raj Singh “Virtualization and Information Security A Virtualized DMZ Design Consideration Using VMware ESXi 4.1” Thesis Unitec Institute of Technology, New Zealand, 2012

Marton, G. “Designing and implementing an educational infrastructure for server and storage virtualization technologies” 275 – 279, Oct. 2013

VMware, Inc. Introduction to VMware Infrastructure. 2014 http://www.vmware.com/support/pubs/

Pradnyesh Bhisikar “Security in Data Storage and Transmission in Cloud Computing” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013

http://www.emc.com/products/software/invista/invista.jsp

Aliabadi, M.R. “A proposed storage virtualization architecture for efficient information management” 538-543, May 2010, IEEE

Zhang Qiang, “The out-of-band virtualization model of network storage based on trusted computing”, 4354 – 4357, Aug. 2010, IEEE

Singh, A. “Server-storage virtualization: Integration and load balancing in data centers” Korupolu, M. Mohapatra, 1 – 12, Nov. 2008, IEEE

Downloads

Published

2014-03-31

How to Cite

[1]
P. Manchanda and R. Jain, “Non-disruptive Data Mitigation through Storage Virtualization”, Int. J. Comp. Sci. Eng., vol. 2, no. 3, pp. 18–21, Mar. 2014.

Issue

Section

Research Article