Académique Documents
Professionnel Documents
Culture Documents
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE AND ENGINEERING
by
MOHAMMAD ASIF MIYA - 16P61A0519
2019-2020
i
(A UGC Autonomous Institution, Approved by AICTE,
Affiliated to JNTUH, Kukatpally
Accredited by National Board of Accreditation (NBA),
National Assessment and Accreditation Council (NAAC))
CERTIFICATE
This is to certify that the technical seminar report titled “STORAGE AREA NETWORK” is
being submitted by MOHAMMAD ASIF MIYA(16P61A0519) in B. Tech IV-I semester
Computer Science & Engineering is a record of bonafide work carried out by them. The
results embodied in this report have not been submitted to any other University for the award
of any degree.
ii
ACKNOWLEDGEMENT
Self-confidence, hard work, commitment and planning are essential to carry-out any task.
Possessing these qualities is sheer waste, if an opportunity does not exist. So, we whole-
heartedly thank Mr. Dr.G. AMARENDER RAO, Principal, and Dr.K.Sreenivasa Rao, Head
of the Department, Computer Science and Engineering for their encouragement and support.
We thank our seminar in-charge, K.Keerthana for guiding us in completing our seminar
successfully.
We would also like to express our sincere thanks to all the staff of Computer Science and
Engineering, VBIT, for their kind cooperation and timely help during the course of our seminar.
Finally, we would like to thank our parents and friends who have always stood by us whenever
we were in need of them.
iii
CONTENTS
ABSTRACT 1
CHAPTER 1 2-5
INTRODUCTION
1.1 Problem Statement
1.2. Background
1.3 Relevant Development In Technology
CHAPTER 2 6-11
SYSTEM ARCHITECTURE
CHAPTER 3
ETHICLAL FRAMEWORK FOR AUTONOMOUS SYSTEMIN ARTIFICIAL
INTELLIGENCE 12-21
CHAPTER 4
AUTONOMOUS ROBOTS AND THEIR TYPES 22-27
CHAPTER 5
APPLICATIONS 28-33
CHAPTER 6
CONCLUSION/BIBLIOGRAPHY 34-35
iv
ABSTRACT
A storage area network (SAN) or storage network is a computer network which provides
access to consolidated, block-level data storage. SANs are primarily used to enhance
accessibility of storage devices, such as disk arrays and tape libraries, to servers so that the
devices appear to the operating system as locally-attached devices. A SAN typically is a
dedicated network of storage devices not accessible through the local area network (LAN) by
other devices, thereby preventing interference of LAN traffic in data transfer.
The cost and complexity of SANs dropped in the early 2000s to levels allowing wider adoption
across both enterprise and small to medium-sized business environments.
A SAN does not provide file abstraction, only block-level operations. However, file
systems built on top of SANs do provide file-level access, and are known as shared-disk file
systems.
1
CHAPTER 1
INTRODUCTION
INTRODUCTION
The volume and value of enterprise data have been growing faster than the speed at which
traditional backup utilities’ effectiveness has been increasing. Enterprises have become more
dependent on their online systems and cannot ensure the availability of these data by relying only
on traditional, network-bottlenecked, server-attached storage systems. Solutions to this problem
have been offered by storage area network (SAN) technology, which provides enterprises with
server less zero-time-windows backup. In this new backup approach, backed-up data are
removed to a secondary remote storage device, and the enterprise server becomes off-loaded,
permitting high-performance continuous access to both applications and data. The objective of a
SAN is to allow multiple servers access to a pool of data storage in which any server can
potentially access any storage unit. In this environment, management plays a large role in
providing security guarantees (with authorization to access particular storage devices) and
sequencing or serialization guarantees (with authorization to access a particular device at certain
time-point) (Server Clusters 2003) . A SAN fabric is usually based on fiber-channel technology
that allows up to 10-km long-distance connections. This feature has a significant advantage in a
campus environment, where reliable backup resources can be shared among several divisions.
For example, fiber-channel SANs for a health care enterprise allow 24/7 continuous operation,
patient record backup, and medical image archiving (Farley 2001) . The SAN becomes a key
element of the enterprise environment in which data availability, serviceability, and reliability
are critical for a company’s business. Many enterprise solutions (e.g., ATTO Fiber Bridge
products, rack mount solutions, ATTO FibreCenter3400R/D, host bus adapters, the ATTO
Diamond array, Compaq Storage Works products, EMC Connectrix solutions, LSI Logic E4600
Storage System) are available today. They can be effectively used in multiple platform storage-
infrastructure solutions for data-intensive applications such as e-commerce, online transaction
processing, electronic vaulting, data warehousing, data mining, Internet/intranet browsing,
multimedia audio/video editing, high-definition television (HDTV) streaming, and enterprise
database management applications (Riabov 2004) .
2
1.1 WHAT IS SAN :
A SAN (storage area network) is a networked high-speed infrastructure (sub network) that
establishes direct access by servers to an interconnected group of heterogeneous data-
storage devices such as optical disks, redundant arrays of inexpensive disks (RAIDs), and
tape backups (or tape libraries). SANs are effective for storing large amounts of information
and backing up data online in e-commerce, online transaction processing, electronic
vaulting, data warehousing, data mining, multimedia Internet/intranet browsing, and
enterprise-database-managing applications. SANs provide additional capabilities (fault
tolerance, remote management, clustering, and topological flexibility) to mission-critical,
data-intensive applications (Troppens, Erkens, and Müeller 2004) . A SAN is typically a
part of an enterprise network of computing resources (Sachdev and Arun kundram 2002) . A
simple model of the storage area network as a networked high-speed infrastructure.
Each storage devices are having the different types of technologies to store the data. Logical
unit numbers are the terms used to provide the storage, and it is a very fundamental issue in
the SAN. The LUN is not the matter to create the volumes. LUN created and assigned to the
host bus adapter (HBAs) by through the front –end SAN port. Problems arise when a typo is
a configuration the array by the storage administrator.
3
1.3 PROPESED SYSTEM:
This incredible development puts the considerable weight on Storage Area Networks (SANs),
which must have the capacity to handle the blossoming activity loads between the processes and
function layers. To keep up top effectiveness, Storage managers should have the ability to
distinguish rapidly and resolve moderate channel and other typical SAN clog issues. If not
tended to in a convenient manner, these can have a falling impact, notwithstanding corrupting the
execution of utterly remote applications .The Storage Area Network Provide the pliability to
amalgamate and match Storage System suppliers, furthermore sanctioning storage to be robust
and secure. In the Storage area network substantial amount of data in terabytes are Incrementing
numbers, and it obstructs in subsisting networks.
4
CHAPTER 2
SYSTEM ARCHITECTURE
2.1 SYSTEM ARCHITECTURE:
SAN architectures have been changed evolutionarily, adapting to new application demands and
expanding capacities. The original fiber-channel-based SANs were simple loop configurations
based on the fiber-channel arbitrated loop (FC-AP) standard. Low-cost loops are easily expanded
and combined with up to 126 hosts and devices, but they are difficult to deploy and have signifi -
cant limitations on overall bandwidth. Requirements of scalability and new functionality had
transformed SANs into fabric-based switching systems (fiber-channel switch fabric [FC-SW])
that could support up to 16 million hosts and devices. Numerous vendors offered different
proprietary solutions of problems based on fabric switching. As a result, immature and
competing standards created various interoperability problems. Homogeneous high-cost SANs
were developed. Ottem (2001) refers to this phase as the “legacy proprietary fabric switch
phase.” The modern established architectural approach is associated with a standards-based
“Open” 2-Gb fabric switch that provides all the benefits of fabric switching, but is based on new
industry standards (FC-SW-2) and an interoperability architecture that runs at twice the speed of
legacy fabric. The standards-based switches provide heterogeneous capability, fault isolation,
and rerouting. The introduction of industry standards, as a substitute for proprietary standards,
has reduced the price of SAN components and management costs of running a SAN. The Open
2-Gb fiber channel allows doubled SAN speeds, enables greater flexibility in configuring SANs
for a wide range of applications, and is especially useful for managing 1.5-Gb high-definition
video data. In HDTV applications, a single fiber can carry a full high-definition video stream
without having to cache, buffer, or compress the data. Other examples (Ottem 2001) include
storage service providers that must deliver block data from and to users at the highest possible
speeds and e-commerce companies that have to minimize transaction times. The 2-Gb fiber
channel provides the high-speed backbone capability for fiber-channel networks, which can be
used to interconnect two SAN switches. This configuration increases overall data throughput
across the SAN even if servers and disk subsystems continue to operate via 1-Gb channels.
5
Fig 2.1 The Fiber Channel SAN connects servers to storage via Fiber Channel switches.
6
Fig 2.2 Dual port 8 Gb FC host bus adapter card
7
Fig 2.3 Qlogic SAN-switch optical Fiber Channel
8
Identified by a LUN. LUN masking is a technique whereby the host bus adapter and the SAN
software of a server restrict the LUNs for which commands are accepted. In doing so LUNs that
should in any case not be accessed by the server are masked. Another method to restrict server
access to particular SAN storage devices is fabric-based access control, or zoning, which has to
be implemented on the SAN networking devices and the servers. Thereby server access is
restricted to storage devices that are in a particular SAN zone.
9
CHAPTER 3
STORAGE AREA NETWORK MODULES
3.1 MODULES:
3.1.1 SOFTWARE:
A SAN is primarily defined as a special purpose network, the Storage Networking Industry
Association (SNIA) defines a SAN as "a network whose primary purpose is the transfer of data
between computer systems and storage elements". But a SAN does not just consist of a
communication infrastructure, it also has a software management layer. This software organizes
the servers, storage devices, and the network so that data can be transferred and stored. Because
a SAN is not a direct attached storage (DAS), the storage devices in the SAN are not owned and
managed by a server. Potentially the data storage capacity that can be accessed by a single server
through a SAN is infinite, and this storage capacity may also be accessible by other
servers. Moreover, SAN software must ensure that data is directly moved between storage
devices within the SAN, with minimal server intervention.[1]
SAN management software is installed on one or more servers and management clients on the
storage devices. Two approaches have developed to SAN management software: in-band
management means that management data between server and storage devices is transmitted on
the same network as the storage data. While out-of-band management means that management
data is transmitted over dedicated links. SAN management software will collect management
data from all storage devices in the storage layer, including info on read and write failure, storage
capacity bottlenecks and failure of storage devices. SAN management software may integrate
with the Simple Network Management Protocol (SNMP).
In 1999 an open standard was introduced for managing storage devices and provide
interoperability, the Common Information Model (CIM). The web-based version of CIM is
called Web-Based Enterprise Management (WBEM) and defines SAN storage device objects
and process transactions. Use of these protocols involves a CIM object manager (CIMOM), to
manage objects and interactions, and allows for the central management of SAN storage devices.
Basic device management for SANs can also be achieved through the Storage Management
Interface Specification (SMI-S), were CIM objects and processes are registered in a directory.
10
Management software applications are also available to configure SAN storage devices,
allowing, for example, the configuration of zones and logical unit numbers (LUNs).
Ultimately SAN networking and storage devices are available from many vendors. Every SAN
vendor has its own management and configuration software. Common management in SAN s
that include devices from different vendors is only possible if vendors make the application
programming interface (API) for their devices available to other vendors. In such cases, upper-
level SAN management software can manage the SAN devices from other vendors.
In a SAN data is transferred, stored and accessed on a block level. As such a SAN does not
provide data file abstraction, only block-level storage and operations. But file systems have been
developed to work with SAN software to provide file-level access. These are known as SAN file
systems, or shared disk file system.[7] Server operating systems maintain their own file
systems on their own dedicated, non-shared LUNs, as though they were local to themselves. If
multiple systems were simply to attempt to share a LUN, these would interfere with each other
and quickly corrupt the data. Any planned sharing of data on different computers within a LUN
requires software, such as SAN file systems or clustered computing.
Video editing systems require very high data transfer rates and very low latency. SANs in media
and entertainment are often referred to as server less due to the nature of the configuration which
places the video workflow (ingest, editing, play out) desktop clients directly on the SAN rather
than attaching to servers. Control of data flow is managed by a distributed file system such as
Stor Next by Quantum.[8] Per-node bandwidth usage control, sometimes referred to as quality of
service (QoS), is especially important in video editing as it ensures fair and prioritized bandwidth
usage across the network.
11
3.1.4 QUALITY OF SERVICE:
SAN Storage QoS enables the desired storage performance to be calculated and maintained for
network customers accessing the device. Some factors that affect SAN QoS are:
QoS can be impacted in a SAN storage system by an unexpected increase in data traffic (usage
spike) from one network user that can cause performance to decrease for other users on the same
network. This can be known as the “noisy neighbour effect.” When QoS services are enabled in a
SAN storage system, the “noisy neighbour effect” can be prevented and network storage
performance can be accurately predicted.
Using SAN storage QoS is in contrast to using disk over-provisioning in a SAN environment.
Over-provisioning can be used to provide additional capacity to compensate for peak network
traffic loads. However, where network loads are not predictable, over-provisioning can
eventually cause all bandwidth to be fully consumed and latency to increase significantly
resulting in SAN performance degradation.
Storage virtualization is the process of abstracting logical storage from physical storage. The
physical storage resources are aggregated into storage pools, from which the logical storage is
created. It presents to the user a logical space for data storage and transparently handles the
process of mapping it to the physical location, a concept called location transparency.
12
CHAPTER 4
The name implies, uses software to provide a remote, centralized, heterogeneous data backup
capability allowing companies in a campus or multi-site environment to optimize tape library
utilization and reduce backup administration. Centralized backup also enables a streamlined
disaster-protection solution by providing electronic vaulting of tape backups at a disaster
recovery site. Centralized backup eliminates the manual effort of writing and delivering physical
tapes from multiple server sites by remotely locating the backup storage equipment to a
centralized and safe location.
It provides a remote storage infrastructure over the metropolitan area. It offers any-to-any server
and storage connectivity over metro and regional distances, and enables consolidation of storage
resources that are shared by servers residing at other locations. Storage consolidation
disaggregates servers and storage over distance, allowing the servers to access remote storage
resources. This increases system flexibility and optimizes use of resources, simplifying storage
management. With this approach, companies can save capital through maximum utilization of
storage resources. They can also save operational costs by centralizing IT staff at a single storage
location.
13
CHAPTER 5
Every technology is having some issues which can solve after understanding complete
knowledge. The SAN is the high-end storage technology. If you see that SAN changes occur
recently, Check the SAN Logs and compare the running configuration and the previously created
documentation. If the SAN component fails, to look for the faulty port and log-out from it. The
storage in SAN creates a question how it reports for errors if any changes occur. So after
initialization on SAN is always having design Issues at some conditions which we discuss in this
paper. So the SAN issues can become nonissues when you follow the instruction which shows in
this article (documentation, Compatibility). It is the best practice to prevent massive issues when
something goes wrong
14
5.2 REFERENCES:
networking essentials: A complete guide to understanding and implementing SANs. New York : Wiley .
Beauchamp , C. , Judd J. , and Kuo , B. 2002 .
Building SANs with Brocade fi bre channel fabric switches. Rockland, MA : Syngress .
Broadcom Corporation . 2006 . www.broadcom.com (accessed April 4, 2006).
Storage Communication Systems, Inc . 2006 . (see the SAN Info Center)
www.brocade.com(accessed April 4, 2006). Business Brief . 2006 .
SAN next generation—moving to 4 Gbps (2006). White paper. Hewlett-Packard, Inc.
www.hp.com (accessed April 4, 2006). Clark , T. 2003 .
Designing storage area networks: A practical reference for implementing fi bre channel
and IP SANs. Boston : Addison–Wesley . Clark , T. 2002 .
IP SANS: An introduction to iSCSI, iFCP, and FCIP protocols for storage area networks.
Boston : Addison–Wesley . Couture , A. , A. MacNeela , Y. Adachi , M , Caminos , and
R. DeSouza. 2006March 16.
Forecast: IT Storage Services, Worldwide, 2003–2009.
Stamford, CT : Gartner . Crossroads Systems, Inc . 2006 .
www.crossroads.com/ about(accessed April 4, 2006).
Cutting Edge, Inc . 2006 . www.cuttedge.com(accessed April 4, 2006).
Dell, Inc . 2006 . www.dell.com(accessed April 4, 2006).
Distributed Management Task Force (DMTF) 2006 .
15
WHAT IS ROBOTICS?
Robotics is the study of robots and robots are electro-mechanical machines that are used
to perform different tasks. Most popular robots are placed in hazardous places because these
robots perform the tasks that humans are restricted to perform. Some robots can do work by
themselves and other robots always need the help of persons to perform the tasks or to tell the
task to be done. Robots can be used in different fields like medical, space communication,
military applications, and so on.
AUTONOMOUS ROBOTS
An Autonomous robots are mainly used in industrial areas; whereas the remote controlled robots
are used in environments that are restricted for human beings. The manually controlled robots
are widely used for handling goods and also for transportation.
22
The Remote controlled robots are used in environments that are restricted for human
beings.
The Manually controlled robots are widely used for handling goods and also for
transportation
Out of three types of manipulation robotic system, the autonomous system is further classified
into four types:
1 .Programmable Robots
2. Non-programmable Robots
3. Adaptive Robots
4. Intelligent Robots
1.Programmable Robots :
A programmable robot is a first generation robot with an actuator facility on each joint.The
robots can be reprogrammable based on the kind of application they are commissioned to.The
function and application of the robots can be changed by reprogramming after the robot is
programmed once to perform a function in the given pattern and fixed sequence. Robot kits like
Lego mind storms, Bioloid from programmable Robotics can help the students to learn about its
programming and working. The advanced mobile robot, robotic arms and gadgeteer are some of
the examples of these programmable robots.
Drawback:
The main drawback of this autonomous robot is that once programmed it persists operation even
if there is a need to change its task (in the event of emergency). These robots can be used in
different applications like mobile robotics, industrial controlling and space craft applications
23
This robot is one of the basic types of robot, in fact, a non-programmable robot. This
robot is not even considered as a robot, but is an exploiter lacking reprogrammable controlling
device. The mechanical arms used in industries are some of the examples of these types of robots
wherein the robots are generally attached to the programmable devices used in industries for
mass production as shown in the figure.These types of robots find applications in some of the
devices including path guiders and medical products’ carriers and also some line follower robots.
24
FIG 6:NON-PROGRAMMABLE ROBOTS
3.ADAPTIVE ROBOTS:
Adaptive robots are also industrial robots that can be adapted independently to various
ranges in the process. However, these robots are more sophisticated than programmable robots.
These can be adapted up to a certain extent, and after evaluation they can perform the action
required in that adapted area. These robots are mostly equipped with sensors and control
systems.Sensors are used to sense environmental conditions, process variables and other
parameters related to a particular task. Feedback control system accesses these signals from the
sensors, and depending on the algorithm implemented, it controls the outputs.Adaptive robots are
mainly used in applications such as spraying and welding systems. Robotic gripper and 2- finger
adaptive gripper are examples of this autonomous robot. These robots can be used in different
applications like aerospace, medical, consumer goods, house-hold applications and
manufacturing industrial areas.
25
Intelligent robots, as the name suggests, are the most intelligent of all the other types of
robots with sensors and microprocessors for storing and processing the data. These robots
performance is highly efficient due to their situation-based analyzing and task performing
abilities. Intelligent robots can sense the senses like pain, smell and taste and are also capable of
vision and hearing, and – in accordance, perform the actions and expressions like emotions,
thinking and learning.These robots find their applications in the fields like medical, military
applications and home appliance control systems, etc.
26
CHAPTER 5
APPLICATIONS
1.Scale human expertise
Autonomous systems is based on a new approach to AI development called machine
teaching. Domain experts can leverage their knowledge to teach the machine without data
science expertise required, keeping humans in the loop during operations with explainable
predictions and fail-safe mechanisms.
28
30
FIG 10: DRONE FOR SURVILLANCE
Drones are controlled by remote ground control systems (GSC) and also referred to as a ground
cockpit. An unmanned aerial vehicle system has two parts, the drone itself and the control
system. The nose of the unmanned aerial vehicle is where all the sensors and navigational
systems are present
31
FIG 11:GRAPH REPRESENTATION FOR INCREASE OF AUTONOMOUS DEVICES
A future with self-driving cars was first envisioned as early as 1918 , with the idea even
broadcasted over television as early as 1958 . By 1988, Carnegie Mellon’s NAVLAB vehicle
was being demonstrated to perform lane-following using camera images . Development was
accelerated when several research teams later developed more advanced driverless vehicles to
traverse desert terrain in the 2004 and 2005 DARPA Grand Challenges , and then urban roads in
the 2007 DARPA Urban Challenge (DUC) . Research related to self-driving has since continued
at a fast pace in academic settings, but furthermore is now receiving considerable attention in
industry as well. As research in the field of autonomous vehicles has matured, a wide variety of
impressive demonstrations have been made on full-scale vehicle platforms. Recent studies have
also been conducted to model and anticipate the social impact of implementing autonomous
Mobility-onDemand (MoD) . The case studies have shown that MoD system would make access
to mobility more affordable and convenient compared to traditional mobility system
characterized by extensive private vehicle ownership.
32
Autonomous driving on urban roads has seen tremendous progress in recent years, with
several commercial entities pushing the bounds alongside academia. Google has perhaps the
most experience in the area, having tested its fleet of autonomous vehicles for more than 2
million miles, with expectation to soon launch a pilot MoD service project using 100 self-driving
vehicles . Tesla is early to market their work, having already provided an autopilot feature in
their 2016 Model S cars . Uber’s mobility service has grown to upset the taxi markets in
numerous cities worldwide, and has furthermore recently indicated plans to eventually replace all
their human driven fleet with self-driving cars , with their first self-driving vehicle pilot program
already underway . There are several places where automated road shuttles are in commercial
operations. Examples include deployments at Rivium Business Park, Masdar City, and Heathrow
Airport . The common feature of these operations is that road vehicles are certified as a rail
system meaning that vehicles operate in a segregated space .
This approach has been necessary due to legal uncertainty around liability in the event of
an accident involving an autonomous vehicle. To address this, governments around the world are
reviewing and implementing new laws. Part of this process has involved extended public trials of
automated shuttles, with CityMobil and CityMobil2 being among the largest of such projects .
While the majority of the research contributions discussed in the remaining sections of this
article are from academic institutions, it is worth noting that the industrial market interest is also
largely responsible for research investigations into certification and validations processes,
especially in regards to autonomous car manufacturability and services. These topics are
however left out of the scope of this survey paper. Driving in urban environments has been of
great interest to researchers due in part to the high density of vehicles and various area-specific
traffic rules that must be obeyed.
The DARPA Urban Challenge , and more recently the V-Charge Project catalyzed the
launch of research efforts into autonomous driving on urban road for numerous organizations.
Referring to the problem of urban driving is both interesting and difficult because it pushes the
research direction to address both increased operating speeds of autonomous vehicles as well
increased environmental complexity. The core competencies of an autonomous vehicle software
system can be broadly categorized into three categories, namely perception, planning, and
control, with the interactions between these competencies and the vehicle’s interactions with the
environment depicted in Figure 2. Also, Vehicle-to-Vehicle (V2V) communications can be
leveraged to achieve further improvements in areas of perception and/or planning through
vehicle cooperation.
33
CHAPTER 6
CONCLUSION / BIBILOGRAPHY
CONCLUSION
AI is at the centre of a new enterprise to build computational models of intelligence. The
main assumption is that intelligence (human or otherwise) can be represented in terms of symbol
structures and symbolic operations which can be programmed in a digital computer. There is
much debate as to whether such an appropriately programmed computer would be a mind, or
would merely simulate one, but AI researchers need not wait for the conclusion to that debate,
nor for the hypothetical computer that could model all of human intelligence. Aspects of
intelligent behaviour, such as solving problems, making inferences, learning, and understanding
language, have already been coded as computer programs, and within very limited domains, such
as identifying diseases of soybean plants, AI programs can outperform human experts. Now the
great challenge of AI is to find ways of representing the commonsense knowledge and
experience that enable people to carry out everyday activities such as holding a wide-ranging
conversation, or finding their way along a busy street. Conventional digital computers may be
capable of running such programs, or we may need to develop new machines that can support the
complexity of human thought.
34
BIBILOGRAPHY
http://standards.ieee.org/news/2016/ethically_aligned_design.html
https://www.itu.int/en/ITU-T/AI/Pages/201706-default.aspx
http://www.aies-conference.com/
https://www.partnershiponai.org/
https://openai.com/
https://futureoflife.org/ai-principles/
http://nouvelles.umontreal.ca/en/article/2017/11/03/montreal-declaration-for-a responsible-
development-of-artificial-intelligence/
35