A Study on Merits and Demerits of SAN Protocols
Ashutosh Kumar Singh1
Section:Survey Paper, Product Type: Journal Paper
Volume-4 ,
Issue-7 , Page no. 111-114, Jul-2016
Online published on Jul 31, 2016
Copyright © Ashutosh Kumar Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ashutosh Kumar Singh, “A Study on Merits and Demerits of SAN Protocols,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.111-114, 2016.
MLA Style Citation: Ashutosh Kumar Singh "A Study on Merits and Demerits of SAN Protocols." International Journal of Computer Sciences and Engineering 4.7 (2016): 111-114.
APA Style Citation: Ashutosh Kumar Singh, (2016). A Study on Merits and Demerits of SAN Protocols. International Journal of Computer Sciences and Engineering, 4(7), 111-114.
BibTex Style Citation:
@article{Singh_2016,
author = {Ashutosh Kumar Singh},
title = {A Study on Merits and Demerits of SAN Protocols},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2016},
volume = {4},
Issue = {7},
month = {7},
year = {2016},
issn = {2347-2693},
pages = {111-114},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1010},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1010
TI - A Study on Merits and Demerits of SAN Protocols
T2 - International Journal of Computer Sciences and Engineering
AU - Ashutosh Kumar Singh
PY - 2016
DA - 2016/07/31
PB - IJCSE, Indore, INDIA
SP - 111-114
IS - 7
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1719 | 1381 downloads | 1544 downloads |
Abstract
This paper focuses on SAN protocols and their various topologies, protocol layers, addresses. This article gives the description of rules and regulation of SAN that work in networks of storage. This study paper deals with the study of SAN and DAS, how they work in the open industrial network. This paper surveys on protocols and their working in storage. DAS have SATA, SCSI and SAN have uses FC, FCOE protocols.
Key-Words / Index Term
Department of Computer Engineering, Bharati Vidyapeeth University, Pune, India
References
[1] Raval, K.S., Suryawanshi, R.S., Naveenkumar, J. and Thakore, D.M., 2011. The Anatomy of a Small-Scale Document Search Engine Tool: Incorporating a new Ranking Algorithm. International Journal of Engineering Science and Technology, 1(3), pp.5802-5808.
[2] Archana, R.C., Naveenkumar, J. and Patil, S.H., 2011. Iris Image Pre-Processing And Minutiae Points Extraction. International Journal of Computer Science and Information Security, 9(6), p.171.
[3] Jayakumar, M.N., Zaeimfar, M.F., Joshi, M.M. and Joshi, S.D., 2014. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET). Journal Impact Factor, 5(1), pp.46-51.
[4] Naveenkumar, J. and Joshi, S.D., 2015. Evaluation of Active Storage System Realized through MobilityRPC.
[5] Jayakumar, D.T. and Naveenkumar, R., 2012. SDjoshi,“. International Journal of Advanced Research in Computer Science and Software Engineering,” Int. J, 2(9), pp.62-70.
[6] Jayakumar, N., Singh, S., Patil, S.H. and Joshi, S.D., Evaluation Parameters of Infrastructure Resources Required for Integrating Parallel Computing Algorithm and Distributed File System.
[7] Jayakumar, N., Bhardwaj, T., Pant, K., Joshi, S.D. and Patil, S.H., A Holistic Approach for Performance Analysis of Embedded Storage Array.
[8] Naveenkumar, J., Makwana, R., Joshi, S.D. and Thakore, D.M., 2015. OFFLOADING COMPRESSION AND DECOMPRESSION LOGIC CLOSER TO VIDEO FILES USING REMOTE PROCEDURE CALL. Journal Impact Factor, 6(3), pp.37-45.
[9] Naveenkumar, J., Makwana, R., Joshi, S.D. and Thakore, D.M., 2015. Performance Impact Analysis of Application Implemented on Active Storage Framework. International Journal, 5(2).
[10] Salunkhe, R., Kadam, A.D., Jayakumar, N. and Thakore, D., In Search of a Scalable File System State-of-the-art File Systems Review and Map view of new Scalable File system.
[11] Salunkhe, R., Kadam, A.D., Jayakumar, N. and Joshi, S., Luster A Scalable Architecture File System: A Research Implementation on Active Storage Array Framework with Luster file System.
[12] Jayakumar, N., Reducts and Discretization Concepts, tools for Predicting Student’s Performance.
[13] Jayakumar, M.N., Zaeimfar, M.F., Joshi, M.M. and Joshi, S.D., 2014. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET). Journal Impact Factor, 5(1), pp.46-51.
[14] Kumar, N., Angral, S. and Sharma, R., 2014. Integrating Intrusion Detection System with Network Monitoring. International Journal of Scientific and Research Publications, 4, pp.1-4.
[15] Namdeo, J. and Jayakumar, N., 2014. Predicting Students Performance Using Data Mining Technique with Rough Set Theory Concepts. International Journal, 2(2).
[16] Naveenkumar, J., Keyword Extraction through Applying Rules of Association and Threshold Values. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), ISSN, pp.2278-1021.
[17] Kakamanshadi, G., Naveenkumar, J. and Patil, S.H., 2011. A Method to Find Shortest Reliable Path by Hardware Testing and Software Implementation. International Journal of Engineering Science and Technology (IJEST), ISSN, pp.0975-5462.
[18] Naveenkumar, J. and Raval, K.S., Clouds Explained Using Use-Case Scenarios.
[19] Naveenkumar J, S.D.J., 2015. Evaluation of Active Storage System Realized Through Hadoop. International Journal of Computer Science and Mobile Computing, 4(12), pp.67–73.
[20] Rishikesh Salunkhe, N.J., 2016. Query Bound Application Offloading: Approach Towards Increase Performance of Big Data Computing. Journal of Emerging Technologies and Innovative Research, 3(6), pp.188–191.
[21] Sagar S lad s d joshi, N.J., 2015. Comparison study on Hadoop’s HDFS with Lustre File System. International Journal of Scientific Engineering and Applied Science, 1(8), pp.491–494.
[22] Salunkhe, R. et al., 2015. In Search of a Scalable File System State-of-the-art File Systems Review and Map view of new Scalable File system. In nternational Conference on electrical, Electronics, and Optimization Techni ques (ICEEOT) - 2016. pp. 1–8.
[23] BVDUCOE, B.B., 2011. Iris Image Pre-Processing and Minutiae Points Extraction. International Journal of Computer Science & Information Security.
[24] P. D. S. D. J. Naveenkumar J, “Evaluation of Active Storage System Realized through MobilityRPC,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 3, no. 11, pp. 11329–11335, 2015
[25] N. Jayakumar, S. Singh, S. H. Patil, and S. D. Joshi, “Evaluation Parameters of Infrastructure Resources Required for Integrating Parallel Computing Algorithm and Distributed File System,” IJSTE, vol. 1, no. 12, pp. 251–254, 2015.
[26] N. Jayakumar, T. Bhardwaj, K. Pant, S. D. Joshi, and S. H. Patil, “A Holistic Approach for Performance Analysis of Embedded Storage Array,” Int. J. Sci. Technol. Eng., vol. 1, no. 12, pp. 247–250, 2015.
[27] J. Naveenkumar, R. Makwana, S. D. Joshi, and D. M. Thakore, “Performance Impact Analysis of Application Implemented on Active Storage Framework,” Int. J., vol. 5, no. 2, 2015.
[28] N. Jayakumar, “Reducts and Discretization Concepts, tools for Predicting Student’s Performance,” Int. J. Eng. Sci. Innov. Technol., vol. 3, no. 2, pp. 7–15, 2014.
[29] J. Namdeo and N. Jayakumar, “Predicting Students Performance Using Data Mining Technique with Rough Set Theory Concepts,” Int. J. Adv. Res. Comput. Sci. Manag. Stud., vol. 2, no. 2, 2014.
[30] R. Salunkhe, A. D. Kadam, N. Jayakumar, and S. Joshi, “Luster A Scalable Architecture File System: A Research Implementation on Active Storage Array Framework with Luster File System.,” in ICEEOT, 2015.
[31] V. Franco, “EMC Proven TM Professional Knowledge Sharing Serial ATA Drives in CLARiiON ® Arrays EMC Proven Professional TM Knowledge Sharing EMC Proven TM Professional Knowledge Sharing,” pp. 1–8, 2007.
[32] D. Anderson, J. Dykes, and E. Riedel, “More than an interface - SCSI vs. ATA,” Proc. FAST ’03 2nd USENIX Conf. File Storage Technol., no. March, pp. 245–257, 2003.
[33] M. R. Batchanaboyina, N. P. Babu, D. Anandam, and R. Thalluri, “Recent Trends on DAS and SAN Protocols,” vol. 5, no. 4, pp. 563–567, 2015.
[34] S. Terms, S. N. Applications, S. N. Topologies, and F. Channel, “STORAGE AREA NETWORKING PROTOCOLS AND ARCHITECTURE Associated Sessions,” 2004.
[35] VMware, “Storage Protocol Comparison White Paper,” pp. 1–10.
[36] D. Reinsel, “WHITE P APER Evolution in Hard Disk Drive Technology: S AS and S AT A,” 2005.
[37] Anjali Nigam and Vineet Singh, “Securing Data Transmission in Cloud using Encryption Algorithms”, International Journal of Computer Sciences and Engineering Research Volume 4, Issue 6, June 2016.
[38] Pritika Goel, “An Improved Load Balancing Technique in Weighted Clustering Algorithm”, International Journal of Computer Sciences and Engineering Research Volume 4, Issue 6, June 2016.