Skip to main content

iSAN – An Intelligent Storage Area Network Architecture

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3296))

Abstract

This paper describes the motivation, architecture and implementation of iSAN, an “intelligent” storage area network. The main contributions of this work are: (1) how to architect an intelligent SAN that understands the storage-consumers to serve them better; (2) how to realise this abstract architecture using existing technologies; and (3) to demonstrate the benefits that would accrue from such an intelligent SAN. Our results show that the iSAN approach has important benefits when compared with conventional SANs: iSAN facilitates storage sharing, is secure and offers better throughput. In this paper, we discuss two case studies as well as discuss how iSAN approach has been generic enough to capture a wide range of other requirements of SANs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amiri, K., Gibson, G., Golding, R.: Highly concurrent shared storage. In: ICDCS (April 2000)

    Google Scholar 

  2. Aziz, A., Markson, T., Prafullchandra, H.: Simple key mgmt for Internet protocols (1998), http://www.skip.org/

  3. Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems (1987)

    Google Scholar 

  4. Biaz, S., Welch, J.L.: Closed form bounds for clock synchronization under simple uncertainty assumption. Info. Processing Letters (2001)

    Google Scholar 

  5. Birman, K.: Technology requirements for virtual overlay networks. IEEE Systems, Man and Cybernetics: Special issue on Information Assurance 31(4) (July 2001)

    Google Scholar 

  6. Biswas, J., et al.: Application programming interfaces for networks - IEEE P1520 (January 1999)

    Google Scholar 

  7. Bouras, C., Spirakis, P.: Performance modeling of distributed timestamp ordering: Perfect and imperfect clocks. Performance Evaluation Journal (April 1996)

    Google Scholar 

  8. Ferguson, N., Schneier, B.: A cryptographic evaluation of IPSec (February 1999)

    Google Scholar 

  9. Gallatin, A., Chase, J., Yocum, K.: Trapeze/IP: TCP/IP at near-gigabit speeds. In: USENIX Technical Conference (June 1999)

    Google Scholar 

  10. Hayden, M.: The Ensemble System. PhD thesis, Computer Science Dept., Cornell Univ. (1998)

    Google Scholar 

  11. ISO. Logical link control - ISO/IRC 8802-2

    Google Scholar 

  12. Katcher, J.: Postmark: A new file system benchmark. TR3022, NetApp (October 1997)

    Google Scholar 

  13. Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Communication of the ACM 21(7) (July 1978)

    Google Scholar 

  14. Lundelius, J., Lynch, N.: An upper and lower bound for clock synchronization. Information and Control 62(2/3) (September 1984)

    Google Scholar 

  15. Mosberger, D.: Memory consistency models. Operating Systems Review (1993)

    Google Scholar 

  16. Herlihy, M.P., Wing, J.M.: Linearizability: a correctness condition for concurrent objects. ACM Transactions on Programming Languages and Systems 12(3) (October 1990)

    Google Scholar 

  17. Narayan, G., Gopinath, K.: iSAN - an intelligent storage area network architecture. TR-IISc-CSA-2004-6, Computer Science and Automation, Indian Inst. of Science (August 2004)

    Google Scholar 

  18. Perlman, R., Kaufman, C.: Analysis of the IPSEC key exchange standard. IEEE Internet Computing 4(6) (November 2000)

    Google Scholar 

  19. Rodeh, O., Birman, K., Dolev, D.: The architecture and performance of security protocols in the ensemble group communication system. TR2000-1822, Computer Science Dept., Cornell Univ. (October 2001)

    Google Scholar 

  20. Ruemmler, C., Wilkes, J.: Unix disk access patterns. TR, HP Labs (December 1992)

    Google Scholar 

  21. Saltzer, J.H., Reed, D.P., Clark, D.D.: End-to-end arguments in system design. ACM TOCS 2(4) (November 1984)

    Google Scholar 

  22. Satran, J., Meth, K., Sapuntzakis, C., Chadalapaka, M., Zeidner, E.: iSCSI (2001)

    Google Scholar 

  23. Simpson, W.A.: IKE/ISAKMP considered dangerous (June 1999)

    Google Scholar 

  24. Srinivasa, R.: Network-Aided Concurrency Control in Distributed Databases. PhD thesis, University of Virginia (January 2002)

    Google Scholar 

  25. Systems, N.: Data storage anywhere, any time - metro and wide area storage networking with Nishan systems IP storage switches (2000)

    Google Scholar 

  26. ANSI NCITS T10/1144D. FC protocol for SCSI, second version (FCP-2), rev. 5 (November 2000)

    Google Scholar 

  27. Tennenhouse, D.L., Smith, J.M., Sincoskie, W.D., Wetherall, D.J., Minden, G.J.: A survey of active network research. IEEE Comm. Magazine 35(1) (January 1997)

    Google Scholar 

  28. Wiesmann, M., Pedone, F., Schiper, A., Kemme, B., Alonso, G.: Understanding replication in databases and distributed systems. In: ICDCS (April 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Narayan, G., Gopinath, K. (2004). iSAN – An Intelligent Storage Area Network Architecture. In: Bougé, L., Prasanna, V.K. (eds) High Performance Computing - HiPC 2004. HiPC 2004. Lecture Notes in Computer Science, vol 3296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30474-6_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30474-6_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24129-4

  • Online ISBN: 978-3-540-30474-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics