Vous êtes sur la page 1sur 43

A

TECHNICAL SEMINAR REPORT ON

(STORAGE AREA NETWORK)

Submitted in partial fulfillment of the requirement


for the award of the degree of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING

by
MOHAMMAD ASIF MIYA - 16P61A0519

VIGNANA BHARATHI INSTITUTE OF TECHNOLOGY


(A UGC Autonomous Institution, Approved by AICTE,
Affiliated to JNTUH, Kukatpally
Accredited by National Board of Accreditation (NBA),
National Assessment and Accreditation Council (NAAC))
Aushapur (V), Ghatkesar (M), Medchal(dist.).

2019-2020
i
(A UGC Autonomous Institution, Approved by AICTE,
Affiliated to JNTUH, Kukatpally
Accredited by National Board of Accreditation (NBA),
National Assessment and Accreditation Council (NAAC))

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

This is to certify that the technical seminar report titled “STORAGE AREA NETWORK” is
being submitted by MOHAMMAD ASIF MIYA(16P61A0519) in B. Tech IV-I semester
Computer Science & Engineering is a record of bonafide work carried out by them. The
results embodied in this report have not been submitted to any other University for the award
of any degree.

SEMINAR IN-CHARGE HEAD OF THE DEPARTMENT


K.Keerthana Dr.K.Sreenivasa Rao
DATE : 25-10-2019

ii
ACKNOWLEDGEMENT

Self-confidence, hard work, commitment and planning are essential to carry-out any task.
Possessing these qualities is sheer waste, if an opportunity does not exist. So, we whole-
heartedly thank Mr. Dr.G. AMARENDER RAO, Principal, and Dr.K.Sreenivasa Rao, Head
of the Department, Computer Science and Engineering for their encouragement and support.

We thank our seminar in-charge, K.Keerthana for guiding us in completing our seminar
successfully.

We would also like to express our sincere thanks to all the staff of Computer Science and
Engineering, VBIT, for their kind cooperation and timely help during the course of our seminar.
Finally, we would like to thank our parents and friends who have always stood by us whenever
we were in need of them.

iii
CONTENTS

ABSTRACT 1

CHAPTER 1 2-5
INTRODUCTION
1.1 Problem Statement
1.2. Background
1.3 Relevant Development In Technology

CHAPTER 2 6-11
SYSTEM ARCHITECTURE

CHAPTER 3
ETHICLAL FRAMEWORK FOR AUTONOMOUS SYSTEMIN ARTIFICIAL
INTELLIGENCE 12-21

CHAPTER 4
AUTONOMOUS ROBOTS AND THEIR TYPES 22-27

CHAPTER 5
APPLICATIONS 28-33

CHAPTER 6
CONCLUSION/BIBLIOGRAPHY 34-35

iv
ABSTRACT

A storage area network (SAN) or storage network is a computer network which provides
access to consolidated, block-level data storage. SANs are primarily used to enhance
accessibility of storage devices, such as disk arrays and tape libraries, to servers so that the
devices appear to the operating system as locally-attached devices. A SAN typically is a
dedicated network of storage devices not accessible through the local area network (LAN) by
other devices, thereby preventing interference of LAN traffic in data transfer.

The cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption
across both enterprise and small to medium-sized business environments.

A SAN does not provide file abstraction, only block-level operations. However, file
systems built on top of SANs do provide file-level access, and are known as shared-disk file
systems.

1
CHAPTER 1
INTRODUCTION
INTRODUCTION

The volume and value of enterprise data have been growing faster than the speed at which
traditional backup utilities’ effectiveness has been increasing. Enterprises have become more
dependent on their online systems and cannot ensure the availability of these data by relying only
on traditional, network-bottlenecked, server-attached storage systems. Solutions to this problem
have been offered by storage area network (SAN) technology, which provides enterprises with
server less zero-time-windows backup. In this new backup approach, backed-up data are
removed to a secondary remote storage device, and the enterprise server becomes off-loaded,
permitting high-performance continuous access to both applications and data. The objective of a
SAN is to allow multiple servers access to a pool of data storage in which any server can
potentially access any storage unit. In this environment, management plays a large role in
providing security guarantees (with authorization to access particular storage devices) and
sequencing or serialization guarantees (with authorization to access a particular device at certain
time-point) (Server Clusters 2003) . A SAN fabric is usually based on fiber-channel technology
that allows up to 10-km long-distance connections. This feature has a significant advantage in a
campus environment, where reliable backup resources can be shared among several divisions.
For example, fiber-channel SANs for a health care enterprise allow 24/7 continuous operation,
patient record backup, and medical image archiving (Farley 2001) . The SAN becomes a key
element of the enterprise environment in which data availability, serviceability, and reliability
are critical for a company’s business. Many enterprise solutions (e.g., ATTO Fiber Bridge
products, rack mount solutions, ATTO FibreCenter3400R/D, host bus adapters, the ATTO
Diamond array, Compaq Storage Works products, EMC Connectrix solutions, LSI Logic E4600
Storage System) are available today. They can be effectively used in multiple platform storage-
infrastructure solutions for data-intensive applications such as e-commerce, online transaction
processing, electronic vaulting, data warehousing, data mining, Internet/intranet browsing,
multimedia audio/video editing, high-definition television (HDTV) streaming, and enterprise
database management applications (Riabov 2004) .

2
1.1 WHAT IS SAN :

A SAN (storage area network) is a networked high-speed infrastructure (sub network) that
establishes direct access by servers to an interconnected group of heterogeneous data-
storage devices such as optical disks, redundant arrays of inexpensive disks (RAIDs), and
tape backups (or tape libraries). SANs are effective for storing large amounts of information
and backing up data online in e-commerce, online transaction processing, electronic
vaulting, data warehousing, data mining, multimedia Internet/intranet browsing, and
enterprise-database-managing applications. SANs provide additional capabilities (fault
tolerance, remote management, clustering, and topological flexibility) to mission-critical,
data-intensive applications (Troppens, Erkens, and Müeller 2004) . A SAN is typically a
part of an enterprise network of computing resources (Sachdev and Arun kundram 2002) . A
simple model of the storage area network as a networked high-speed infrastructure.

1.2 PROBLEM STATEMENT :

Each storage devices are having the different types of technologies to store the data. Logical
unit numbers are the terms used to provide the storage, and it is a very fundamental issue in
the SAN. The LUN is not the matter to create the volumes. LUN created and assigned to the
host bus adapter (HBAs) by through the front –end SAN port. Problems arise when a typo is
a configuration the array by the storage administrator.

3
1.3 PROPESED SYSTEM:
This incredible development puts the considerable weight on Storage Area Networks (SANs),
which must have the capacity to handle the blossoming activity loads between the processes and
function layers. To keep up top effectiveness, Storage managers should have the ability to
distinguish rapidly and resolve moderate channel and other typical SAN clog issues. If not
tended to in a convenient manner, these can have a falling impact, notwithstanding corrupting the
execution of utterly remote applications .The Storage Area Network Provide the pliability to
amalgamate and match Storage System suppliers, furthermore sanctioning storage to be robust
and secure. In the Storage area network substantial amount of data in terabytes are Incrementing
numbers, and it obstructs in subsisting networks.

4
CHAPTER 2
SYSTEM ARCHITECTURE
2.1 SYSTEM ARCHITECTURE:

SAN architectures have been changed evolutionarily, adapting to new application demands and
expanding capacities. The original fiber-channel-based SANs were simple loop configurations
based on the fiber-channel arbitrated loop (FC-AP) standard. Low-cost loops are easily expanded
and combined with up to 126 hosts and devices, but they are difficult to deploy and have signifi -
cant limitations on overall bandwidth. Requirements of scalability and new functionality had
transformed SANs into fabric-based switching systems (fiber-channel switch fabric [FC-SW])
that could support up to 16 million hosts and devices. Numerous vendors offered different
proprietary solutions of problems based on fabric switching. As a result, immature and
competing standards created various interoperability problems. Homogeneous high-cost SANs
were developed. Ottem (2001) refers to this phase as the “legacy proprietary fabric switch
phase.” The modern established architectural approach is associated with a standards-based
“Open” 2-Gb fabric switch that provides all the benefits of fabric switching, but is based on new
industry standards (FC-SW-2) and an interoperability architecture that runs at twice the speed of
legacy fabric. The standards-based switches provide heterogeneous capability, fault isolation,
and rerouting. The introduction of industry standards, as a substitute for proprietary standards,
has reduced the price of SAN components and management costs of running a SAN. The Open
2-Gb fiber channel allows doubled SAN speeds, enables greater flexibility in configuring SANs
for a wide range of applications, and is especially useful for managing 1.5-Gb high-definition
video data. In HDTV applications, a single fiber can carry a full high-definition video stream
without having to cache, buffer, or compress the data. Other examples (Ottem 2001) include
storage service providers that must deliver block data from and to users at the highest possible
speeds and e-commerce companies that have to minimize transaction times. The 2-Gb fiber
channel provides the high-speed backbone capability for fiber-channel networks, which can be
used to interconnect two SAN switches. This configuration increases overall data throughput
across the SAN even if servers and disk subsystems continue to operate via 1-Gb channels.

5
Fig 2.1 The Fiber Channel SAN connects servers to storage via Fiber Channel switches.

2.2 HOST LAYER:


Servers that allow access to the SAN and its storage devices are said to form the host layer of the
SAN. Such servers have host bus adapters (HBAs), which are cards that attach to slots on the
servermain board (usually PCI slots) and run with a corresponding firmware and driver. Through
the host bus adapters the operating system of the server can communicate with the storage
devices in the SAN.[ A cable connects to the host bus adapter card through the gigabit interface
converter (GBIC). These interface converters are also attached to switches and storage devices
within the SAN, and they convert digital bits into light impulses that can then be transmitted over
the Fiber Channel cables. Conversely, the GBIC converts incoming light impulses back into
digital bits. The predecessor of the GBIC was called gigabit link module (GLM). This is
applicable for Fiber Channel deployments only.

6
Fig 2.2 Dual port 8 Gb FC host bus adapter card

2.3 FABRIC LAYER:


The fabric layer consists of SAN networking devices that include SAN switches, routers,
protocol bridges, gateway devices, and cables. SAN network devices move data within the SAN,
or between an initiator, such as an HBA port of a server, and a target, such as the port of a
storage device. SAN networks are usually built with redundancy, so SAN switches are connected
with redundant links. SAN switches connect the servers with the storage devices and are
typically non-blocking, thus transmitting data across all attached wires at the same time. When
SANs were first built, hubs were the only devices that were Fiber Channel capable, but Fiber
Channel switches were developed and hubs are now rarely found in SANs. Switches have the
advantage over hubs that they allow all attached devices to communicate simultaneously, as a
switch provides a dedicated link to connect all its ports with one another. SAN switches are for
redundancy purposes set up in a meshed topology. A single SAN switch can have as few as 8
ports, up to 32 ports with modular extensions. So called directors 128 ports. When SANs were
first built Fiber.

7
Fig 2.3 Qlogic SAN-switch optical Fiber Channel

2.4 STORAGE LAYER:


The various storage devices in a SAN are said to form the storage layer. It can include a variety
of hard disk and magnetic tape devices that store data. In SANs disk arrays are joined through
a RAID, which makes a lot of hard disks look and perform like one big storage device. Every
storage device, or even partition on that storage device, has a logical unit number (LUN)
assigned to it. This is a unique number within the SAN and every node in the SAN, be it a server
or another storage device, can access the storage through the LUN. The LUNs allow for the
storage capacity of a SAN to be segmented and for the implementation of access controls. A
particular server, or a group of servers, may, for example, be only given access to a particular
part of the SAN storage layer, in the form of LUNs. When a storage device receives a request to
read or write data, it will check its access list to establish whether the node, identified by its
LUN, is allowed to access the storage area.

8
Identified by a LUN. LUN masking is a technique whereby the host bus adapter and the SAN
software of a server restrict the LUNs for which commands are accepted. In doing so LUNs that
should in any case not be accessed by the server are masked. Another method to restrict server
access to particular SAN storage devices is fabric-based access control, or zoning, which has to
be implemented on the SAN networking devices and the servers. Thereby server access is
restricted to storage devices that are in a particular SAN zone.

Fig 2.4 layered technology

9
CHAPTER 3
STORAGE AREA NETWORK MODULES
3.1 MODULES:
3.1.1 SOFTWARE:
A SAN is primarily defined as a special purpose network, the Storage Networking Industry
Association (SNIA) defines a SAN as "a network whose primary purpose is the transfer of data
between computer systems and storage elements". But a SAN does not just consist of a
communication infrastructure, it also has a software management layer. This software organizes
the servers, storage devices, and the network so that data can be transferred and stored. Because
a SAN is not a direct attached storage (DAS), the storage devices in the SAN are not owned and
managed by a server. Potentially the data storage capacity that can be accessed by a single server
through a SAN is infinite, and this storage capacity may also be accessible by other
servers. Moreover, SAN software must ensure that data is directly moved between storage
devices within the SAN, with minimal server intervention.[1]

SAN management software is installed on one or more servers and management clients on the
storage devices. Two approaches have developed to SAN management software: in-band
management means that management data between server and storage devices is transmitted on
the same network as the storage data. While out-of-band management means that management
data is transmitted over dedicated links. SAN management software will collect management
data from all storage devices in the storage layer, including info on read and write failure, storage
capacity bottlenecks and failure of storage devices. SAN management software may integrate
with the Simple Network Management Protocol (SNMP).

In 1999 an open standard was introduced for managing storage devices and provide
interoperability, the Common Information Model (CIM). The web-based version of CIM is
called Web-Based Enterprise Management (WBEM) and defines SAN storage device objects
and process transactions. Use of these protocols involves a CIM object manager (CIMOM), to
manage objects and interactions, and allows for the central management of SAN storage devices.
Basic device management for SANs can also be achieved through the Storage Management
Interface Specification (SMI-S), were CIM objects and processes are registered in a directory.

10
Management software applications are also available to configure SAN storage devices,
allowing, for example, the configuration of zones and logical unit numbers (LUNs).

Ultimately SAN networking and storage devices are available from many vendors. Every SAN
vendor has its own management and configuration software. Common management in SAN s
that include devices from different vendors is only possible if vendors make the application
programming interface (API) for their devices available to other vendors. In such cases, upper-
level SAN management software can manage the SAN devices from other vendors.

3.1.2 FILE SYSTEM SUPPORT:

In a SAN data is transferred, stored and accessed on a block level. As such a SAN does not
provide data file abstraction, only block-level storage and operations. But file systems have been
developed to work with SAN software to provide file-level access. These are known as SAN file
systems, or shared disk file system.[7] Server operating systems maintain their own file
systems on their own dedicated, non-shared LUNs, as though they were local to themselves. If
multiple systems were simply to attempt to share a LUN, these would interfere with each other
and quickly corrupt the data. Any planned sharing of data on different computers within a LUN
requires software, such as SAN file systems or clustered computing.

3.1.3 IN MEDIA AND ENTERTAINMENT:

Video editing systems require very high data transfer rates and very low latency. SANs in media
and entertainment are often referred to as server less due to the nature of the configuration which
places the video workflow (ingest, editing, play out) desktop clients directly on the SAN rather
than attaching to servers. Control of data flow is managed by a distributed file system such as
Stor Next by Quantum.[8] Per-node bandwidth usage control, sometimes referred to as quality of
service (QoS), is especially important in video editing as it ensures fair and prioritized bandwidth
usage across the network.

11
3.1.4 QUALITY OF SERVICE:
SAN Storage QoS enables the desired storage performance to be calculated and maintained for
network customers accessing the device. Some factors that affect SAN QoS are:

 Bandwidth – The rate of data throughput available on the system.


 Latency – The time delay for a read/write operation to execute.
 Queue depth – The number of outstanding operations waiting to execute to the underlying
disks (traditional or solid-state drives).

QoS can be impacted in a SAN storage system by an unexpected increase in data traffic (usage
spike) from one network user that can cause performance to decrease for other users on the same
network. This can be known as the “noisy neighbour effect.” When QoS services are enabled in a
SAN storage system, the “noisy neighbour effect” can be prevented and network storage
performance can be accurately predicted.

Using SAN storage QoS is in contrast to using disk over-provisioning in a SAN environment.
Over-provisioning can be used to provide additional capacity to compensate for peak network
traffic loads. However, where network loads are not predictable, over-provisioning can
eventually cause all bandwidth to be fully consumed and latency to increase significantly
resulting in SAN performance degradation.

3.1.5 STORAGE VIRTUALIZATION:

Storage virtualization is the process of abstracting logical storage from physical storage. The
physical storage resources are aggregated into storage pools, from which the logical storage is
created. It presents to the user a logical space for data storage and transparently handles the
process of mapping it to the physical location, a concept called location transparency.

12
CHAPTER 4

STORAGE AREA NETWORK APPLICATIONS


4.1 APPLICATIONS:
4.1.1centralized backup:

The name implies, uses software to provide a remote, centralized, heterogeneous data backup
capability allowing companies in a campus or multi-site environment to optimize tape library
utilization and reduce backup administration. Centralized backup also enables a streamlined
disaster-protection solution by providing electronic vaulting of tape backups at a disaster
recovery site. Centralized backup eliminates the manual effort of writing and delivering physical
tapes from multiple server sites by remotely locating the backup storage equipment to a
centralized and safe location.

4.1.2 STORAGE CONSOLATION:

It provides a remote storage infrastructure over the metropolitan area. It offers any-to-any server
and storage connectivity over metro and regional distances, and enables consolidation of storage
resources that are shared by servers residing at other locations. Storage consolidation
disaggregates servers and storage over distance, allowing the servers to access remote storage
resources. This increases system flexibility and optimizes use of resources, simplifying storage
management. With this approach, companies can save capital through maximum utilization of
storage resources. They can also save operational costs by centralizing IT staff at a single storage
location.

13
CHAPTER 5

CONCLUSION AND BIBIOGRAPHY


5.1 CONCLUSION:

Every technology is having some issues which can solve after understanding complete
knowledge. The SAN is the high-end storage technology. If you see that SAN changes occur
recently, Check the SAN Logs and compare the running configuration and the previously created
documentation. If the SAN component fails, to look for the faulty port and log-out from it. The
storage in SAN creates a question how it reports for errors if any changes occur. So after
initialization on SAN is always having design Issues at some conditions which we discuss in this
paper. So the SAN issues can become nonissues when you follow the instruction which shows in
this article (documentation, Compatibility). It is the best practice to prevent massive issues when
something goes wrong

14
5.2 REFERENCES:
networking essentials: A complete guide to understanding and implementing SANs. New York : Wiley .
Beauchamp , C. , Judd J. , and Kuo , B. 2002 .
 Building SANs with Brocade fi bre channel fabric switches. Rockland, MA : Syngress .
Broadcom Corporation . 2006 . www.broadcom.com (accessed April 4, 2006).

 Brocade ATTO . 2006 . SAN solutions. www.attotech.com/sans.html (accessed April 4,


2006). Barker , R. , and Massiglia , P. 2001 .

 Storage Communication Systems, Inc . 2006 . (see the SAN Info Center)
www.brocade.com(accessed April 4, 2006). Business Brief . 2006 .
 SAN next generation—moving to 4 Gbps (2006). White paper. Hewlett-Packard, Inc.
www.hp.com (accessed April 4, 2006). Clark , T. 2003 .
 Designing storage area networks: A practical reference for implementing fi bre channel
and IP SANs. Boston : Addison–Wesley . Clark , T. 2002 .
 IP SANS: An introduction to iSCSI, iFCP, and FCIP protocols for storage area networks.
Boston : Addison–Wesley . Couture , A. , A. MacNeela , Y. Adachi , M , Caminos , and
R. DeSouza. 2006March 16.
 Forecast: IT Storage Services, Worldwide, 2003–2009.
 Stamford, CT : Gartner . Crossroads Systems, Inc . 2006 .
 www.crossroads.com/ about(accessed April 4, 2006).
 Cutting Edge, Inc . 2006 . www.cuttedge.com(accessed April 4, 2006).
 Dell, Inc . 2006 . www.dell.com(accessed April 4, 2006).
 Distributed Management Task Force (DMTF) 2006 .

 www. dmtf.org(accessed April 4, 2006). EMC Corporation . 2006 .


www.emc.com(accessed

15
WHAT IS ROBOTICS?
Robotics is the study of robots and robots are electro-mechanical machines that are used
to perform different tasks. Most popular robots are placed in hazardous places because these
robots perform the tasks that humans are restricted to perform. Some robots can do work by
themselves and other robots always need the help of persons to perform the tasks or to tell the
task to be done. Robots can be used in different fields like medical, space communication,
military applications, and so on.

AUTONOMOUS ROBOTS

An automatic robot is a type of manipulated robotic system considered to be as one of the


earliest robotic systems on the basis of the control system it possesses. Automatic robots are
divided into four main categories based on their characteristics and applications.

Manipulation robotic system is classified into three types:


*Autonomous controlled robots

*Remote controlled robots

*Manually controlled robots

An Autonomous robots are mainly used in industrial areas; whereas the remote controlled robots
are used in environments that are restricted for human beings. The manually controlled robots
are widely used for handling goods and also for transportation.

22

TYPES OF AUTONOMOUS ROBOTS

 An Autonomous robots are mainly used in industrial areas.

 The Remote controlled robots are used in environments that are restricted for human
beings.

 The Manually controlled robots are widely used for handling goods and also for
transportation

Out of three types of manipulation robotic system, the autonomous system is further classified
into four types:

1 .Programmable Robots

2. Non-programmable Robots

3. Adaptive Robots
4. Intelligent Robots

1.Programmable Robots :
A programmable robot is a first generation robot with an actuator facility on each joint.The
robots can be reprogrammable based on the kind of application they are commissioned to.The
function and application of the robots can be changed by reprogramming after the robot is
programmed once to perform a function in the given pattern and fixed sequence. Robot kits like
Lego mind storms, Bioloid from programmable Robotics can help the students to learn about its
programming and working. The advanced mobile robot, robotic arms and gadgeteer are some of
the examples of these programmable robots.

Drawback:

The main drawback of this autonomous robot is that once programmed it persists operation even
if there is a need to change its task (in the event of emergency). These robots can be used in
different applications like mobile robotics, industrial controlling and space craft applications

23

FIG 5: PROGRAMMABLE ROBOTS


2. NON-PROGRAMMABLE ROBOTS :

This robot is one of the basic types of robot, in fact, a non-programmable robot. This
robot is not even considered as a robot, but is an exploiter lacking reprogrammable controlling
device. The mechanical arms used in industries are some of the examples of these types of robots
wherein the robots are generally attached to the programmable devices used in industries for
mass production as shown in the figure.These types of robots find applications in some of the
devices including path guiders and medical products’ carriers and also some line follower robots.

24
FIG 6:NON-PROGRAMMABLE ROBOTS

3.ADAPTIVE ROBOTS:

Adaptive robots are also industrial robots that can be adapted independently to various
ranges in the process. However, these robots are more sophisticated than programmable robots.
These can be adapted up to a certain extent, and after evaluation they can perform the action
required in that adapted area. These robots are mostly equipped with sensors and control
systems.Sensors are used to sense environmental conditions, process variables and other
parameters related to a particular task. Feedback control system accesses these signals from the
sensors, and depending on the algorithm implemented, it controls the outputs.Adaptive robots are
mainly used in applications such as spraying and welding systems. Robotic gripper and 2- finger
adaptive gripper are examples of this autonomous robot. These robots can be used in different
applications like aerospace, medical, consumer goods, house-hold applications and
manufacturing industrial areas.

25

FIG 7:ADAPTIVE ROBOTS


4.INTELLIGENT ROBOTS:

Intelligent robots, as the name suggests, are the most intelligent of all the other types of
robots with sensors and microprocessors for storing and processing the data. These robots
performance is highly efficient due to their situation-based analyzing and task performing
abilities. Intelligent robots can sense the senses like pain, smell and taste and are also capable of
vision and hearing, and – in accordance, perform the actions and expressions like emotions,
thinking and learning.These robots find their applications in the fields like medical, military
applications and home appliance control systems, etc.

26

FIG 8:INTELLIGENT ROBOTS


27

CHAPTER 5
APPLICATIONS
1.Scale human expertise
Autonomous systems is based on a new approach to AI development called machine
teaching. Domain experts can leverage their knowledge to teach the machine without data
science expertise required, keeping humans in the loop during operations with explainable
predictions and fail-safe mechanisms.

2.Drive real-world innovation


Design and manage autonomous systems across their lifecycle with a comprehensive
portfolio of leading-edge technology that you can apply to your real business scenarios. From
smart buildings to robotics, Microsoft is democratizing the development of industrial
autonomous system.

3.Create trustworthy autonomy


Invest with confidence in a trusted, enterprise-grade platform that prioritizes security,
compliance and responsible innovation. Develop autonomous systems with transparent design,
ensuring humans are the ultimate decision-maker. New tools provide increased confidence in
these models and systems.

4.MILTARY DRONES FOR SURVILLANCE


The use of drones has not been a secret within the military, even arming them with
missiles to attack enemy soldiers and terrorists. ... Anytime a drone can be used to protect the
lives of the military men and women; they will be armed with live video remote communications
to ground troops, essential gear, or weapons

5.INTELLIGENT AWARENESS FOR SYSTEMS


Its Intelligent Awareness (IA) system combines to multiple sensors
with intelligent software to mitigate against the safety risks navigators face when operating
vessels in adverse weather conditions, in darkness or in congested waterways.

6.SECURE WEB-PORTALS FOR CYBERSECURITY


Artificial intelligence (AI) is one of the perennial buzzwords of computer science. ...
Many cybersecurity providers now offer products that leverage artificial intelligence and
machine learning (ML) to help with detection and response to cyber threats

28

As technology becomes smarter, it must equally become more human.


Devices and objects, now smarter and more capable, are connecting our world in ways
never imagined. Self-driving vehicles, smart appliances and artificial agents (AI) that proactively
interface with the world are establishing a more intelligent and autonomous ecosystem. This
ecosystem is transforming human experiences and create new paradigms of use.Intelligence and
autonomy opens the door to more efficiency and automation but also raises questions of control,
privacy and relatability. As technology becomes smarter and more aware it must equally become
more human. But this is no small task. Ensuring that technical entities can connect effectively
with humans in ways they trust and value requires deep user experience expertise balanced with
rich technical insight.

We create the intelligent experiences of the future.


As a specialist in UX for autonomous devices and services, we work with companies to
ensure that intelligent experiences are symbiotically connected to humans. We leverage rich
human research to effectively architect new technical minds, integrate natural interfaces (voice,
gesture, touch) and infuse the right emotional sensitivity and perception to create the most
intuitive experiences.
29

FIG 9:ROVER EDGE COMPUTING

30
FIG 10: DRONE FOR SURVILLANCE

Drones are controlled by remote ground control systems (GSC) and also referred to as a ground
cockpit. An unmanned aerial vehicle system has two parts, the drone itself and the control
system. The nose of the unmanned aerial vehicle is where all the sensors and navigational
systems are present

31
FIG 11:GRAPH REPRESENTATION FOR INCREASE OF AUTONOMOUS DEVICES

A future with self-driving cars was first envisioned as early as 1918 , with the idea even
broadcasted over television as early as 1958 . By 1988, Carnegie Mellon’s NAVLAB vehicle
was being demonstrated to perform lane-following using camera images . Development was
accelerated when several research teams later developed more advanced driverless vehicles to
traverse desert terrain in the 2004 and 2005 DARPA Grand Challenges , and then urban roads in
the 2007 DARPA Urban Challenge (DUC) . Research related to self-driving has since continued
at a fast pace in academic settings, but furthermore is now receiving considerable attention in
industry as well. As research in the field of autonomous vehicles has matured, a wide variety of
impressive demonstrations have been made on full-scale vehicle platforms. Recent studies have
also been conducted to model and anticipate the social impact of implementing autonomous
Mobility-onDemand (MoD) . The case studies have shown that MoD system would make access
to mobility more affordable and convenient compared to traditional mobility system
characterized by extensive private vehicle ownership.

32
Autonomous driving on urban roads has seen tremendous progress in recent years, with
several commercial entities pushing the bounds alongside academia. Google has perhaps the
most experience in the area, having tested its fleet of autonomous vehicles for more than 2
million miles, with expectation to soon launch a pilot MoD service project using 100 self-driving
vehicles . Tesla is early to market their work, having already provided an autopilot feature in
their 2016 Model S cars . Uber’s mobility service has grown to upset the taxi markets in
numerous cities worldwide, and has furthermore recently indicated plans to eventually replace all
their human driven fleet with self-driving cars , with their first self-driving vehicle pilot program
already underway . There are several places where automated road shuttles are in commercial
operations. Examples include deployments at Rivium Business Park, Masdar City, and Heathrow
Airport . The common feature of these operations is that road vehicles are certified as a rail
system meaning that vehicles operate in a segregated space .

This approach has been necessary due to legal uncertainty around liability in the event of
an accident involving an autonomous vehicle. To address this, governments around the world are
reviewing and implementing new laws. Part of this process has involved extended public trials of
automated shuttles, with CityMobil and CityMobil2 being among the largest of such projects .
While the majority of the research contributions discussed in the remaining sections of this
article are from academic institutions, it is worth noting that the industrial market interest is also
largely responsible for research investigations into certification and validations processes,
especially in regards to autonomous car manufacturability and services. These topics are
however left out of the scope of this survey paper. Driving in urban environments has been of
great interest to researchers due in part to the high density of vehicles and various area-specific
traffic rules that must be obeyed.

The DARPA Urban Challenge , and more recently the V-Charge Project catalyzed the
launch of research efforts into autonomous driving on urban road for numerous organizations.
Referring to the problem of urban driving is both interesting and difficult because it pushes the
research direction to address both increased operating speeds of autonomous vehicles as well
increased environmental complexity. The core competencies of an autonomous vehicle software
system can be broadly categorized into three categories, namely perception, planning, and
control, with the interactions between these competencies and the vehicle’s interactions with the
environment depicted in Figure 2. Also, Vehicle-to-Vehicle (V2V) communications can be
leveraged to achieve further improvements in areas of perception and/or planning through
vehicle cooperation.

33
CHAPTER 6
CONCLUSION / BIBILOGRAPHY
CONCLUSION
AI is at the centre of a new enterprise to build computational models of intelligence. The
main assumption is that intelligence (human or otherwise) can be represented in terms of symbol
structures and symbolic operations which can be programmed in a digital computer. There is
much debate as to whether such an appropriately programmed computer would be a mind, or
would merely simulate one, but AI researchers need not wait for the conclusion to that debate,
nor for the hypothetical computer that could model all of human intelligence. Aspects of
intelligent behaviour, such as solving problems, making inferences, learning, and understanding
language, have already been coded as computer programs, and within very limited domains, such
as identifying diseases of soybean plants, AI programs can outperform human experts. Now the
great challenge of AI is to find ways of representing the commonsense knowledge and
experience that enable people to carry out everyday activities such as holding a wide-ranging
conversation, or finding their way along a busy street. Conventional digital computers may be
capable of running such programs, or we may need to develop new machines that can support the
complexity of human thought.

34
BIBILOGRAPHY

http://standards.ieee.org/news/2016/ethically_aligned_design.html

https://www.itu.int/en/ITU-T/AI/Pages/201706-default.aspx

http://www.aies-conference.com/

https://www.partnershiponai.org/

https://openai.com/

https://futureoflife.org/ai-principles/

http://nouvelles.umontreal.ca/en/article/2017/11/03/montreal-declaration-for-a responsible-
development-of-artificial-intelligence/

35

Vous aimerez peut-être aussi