Penerapan Network Attached Storage (NAS) berbasis Raspberry Pi di LP3SDM AZRA Palembang
نویسندگان
چکیده
منابع مشابه
Wireless Network Security Using Raspberry Pi
This educational project uses a second generation Raspberry Pi that runs multiple Open Source software packages, to perform network penetration testing and to analyze the results. Implementing this project provides undergraduate students with practical hands-on experience and explains advanced concepts in computer hardware, operating systems, and network security. This project is fairly afforda...
متن کاملEasy as Pi: A Network Coding Raspberry Pi Testbed
In the near future, upcoming communications and storage networks are expected to tolerate major difficulties produced by huge amounts of data being generated from the Internet of Things (IoT). For these types of networks, strategies and mechanisms based on network coding have appeared as an alternative to overcome these difficulties in a holistic manner, e.g., without sacrificing the benefit of...
متن کاملNetwork Attached Storage
of scaling aggregate bandwidth by spreading partial functions over a number of disk processors. Object-level storage abstraction, introduced by NASD, is recognized to be the third alternative in addition to block-level storage abstraction typically seen in SAN storage environments and file-level storage abstraction in NAS storage environments. Content-Addressable Storage is another example whic...
متن کاملAuthenticating Network-Attached Storage
0272-1732/00/$10.00 2000 IEEE The need to access anything from anywhere has increased the role of distributed file servers in computing. Distributed file systems provide local file system semantics for access to remote storage. This allows network clients to incorporate the remote storage into their local file system. File semantics are well understood by users and applications, making distri...
متن کاملDecentralized creation of academic documents using a Network Attached Storage (NAS) server
Scholarly document creation continues to face various obstacles. Scholarly text production requires more complex word processors than other forms of texts because of the complex structures of citations, formulas and figures. The perceived need for peer review, often single-blind or double-blind, creates needs for document management that other texts do not require. Additionally, the need for co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Teknologi Informasi dan Ilmu Komputer
سال: 2019
ISSN: 2528-6579,2355-7699
DOI: 10.25126/jtiik.2019631416