Font Size: a A A

The Research And Implementation Of Data Transfer Middleware

Posted on:2008-08-20Degree:MasterType:Thesis
Country:ChinaCandidate:X Q ChenFull Text:PDF
GTID:2178360272469017Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Along with the rapid development of network tech, the information transferred by network is increasing at exponent level. The research on network storage system is becoming a new hotspot in computer architecture field. Also, the next generation of the Internet put forward the new requirement of network storage that is massive in node and capacity, storage service, high reliability, convenient usability and excellent performance.The Storage Service USTOR (Ubiquitous Storage) for the Next Generation Internet is set up in IPv6 WAN, which supports the total storage capacity of PB class, and supports at least 256 distributed nodes. The system is divided into such three parts as the storage management, metadata management and the data transfer middleware. The storage management component based on the SMI-S (Storage Management Interface Specification) protocol is responsible for the unifying management of various storage equipments, and collecting from each storage note of the related data to the metadata management component. Related data is proceed by the metadata management component and then handed to the upper dynamic load-balancing component, which will moderate the load circumstances among storage nodes, and then hand over related data in user storage space to the data transfer middleware. The data transfer middleware provides storage services to customers, mainly for data management and fast, convenient and safe data delivery.As an important part of the USTOR, data transfer middleware, in the open and dynamic IPv6 environment, implements rapid and long-range data access, meanwhile it transfers data with great safety and reliability, and assures the storage service. The storage middleware consists of three parts: the transfer protocol module, the mobile cache module and the security module. The transfer protocol module implements file management as well as file reading and writing. The security module is made up of three-side authentication and secure data transfer mechanism, among which the former one is to check the identity of users while the later one is a security method to protect the important data from being stolen or modified when it is on its way. The mobile cache module, which is the representation of high-quality service and timely, is built on this protocol, and it is an optimization of the performance of data transfer.The testing results of the storage system platform built in the lab shows that the data transfer middleware has some advantage over traditional transfer protocol (e.g. FTP) on the transfer rate. With the optimization of cache, the performance of data transfer has been greatly enhanced and its security is ensured by the security module.
Keywords/Search Tags:Network storage, Storage Management Interface Specification, load-balancing, mobile cache
PDF Full Text Request
Related items