UbiqStor: A Remote Storage Service for Mobile Devices
نویسندگان
چکیده
In Ubiquitous computing environment the mobile devices such as PDAs necessarily connect to remote storage servers. We present an iSCSI caching system that localizes iSCSI target to overcome the shortcomings of iSCSI performance dropping sharply as the latency increases. 1 Motivation Mobile devices such as PDAs are evolving to be incorporated into Ubiquitous computing environment. Due to lightly equipped storage, they lack enough capacity to process application of large data, thus it has been necessitated supplying vast storage capacity from remote machine. For mass storage service, SCSI has been representative protocol in its widespread application. We have built a remote storage system for mobile appliances using iSCSI protocol, which mobile devices can use the storage of a remote server through wireless link but just as their own local storage. It enables mobile appliances to overcome the limitation of storage capacity, as well as the ability to adapt various applications of wired environment in need of mass scale data. 1.1 iSCSI The iSCSI (Internet Small Computer System Interface) is an emerging standard storage protocol that can transfer a SCSI command over IP network. Since the iSCSI protocol can make clients access the SCSI I/O devices of server host over an IP Network, client can use the storage of another host transparently without the need to pass through a server host's file system[1]. Fig. 1 illustrates iSCSI protocol linkage. In iSCSI layer common SCSI commands and data are encapsulated in the form of iSCSI PDU (Protocol Data Unit). The iSCSI PDU is sent to the TCP layer for the IP network transport. The encapsulation and the decapsulation of SCSI I/O commands over TCP/IP enable the storage user to access a remote storage device of the remote server directly[2]. 1.2 iCache iCache is developed to improve iSCSI performance using local cache of a client system. Initiator’s systems have specific cache space for iSCSI data, and iSCSI block M. Ok, D. Kim, and M.-s. Park 686 Fig. 1. Remote Storage Service with iSCSI protocol Fig. 2. iCache Architecture data is cached to minimize network block I/O. Thus iSCSI does not send I/O requests through the network every time the disk I/O happens. Instead it reads cached blocks or sends blocks cached in LogDisk at once to the server for improving iSCSI performance. iCache's buffer space consists of two hierarchical caches comprising Non-Volatile RAM and LogDisk. Data is stored sequentially in NVRAM. When enough data is gathered, iCache process moves data from NVRAM to LogDisk. Blocks which are frequently accessed, are kept in NVRAM where access speed is fast. iCache stores less accessed data in the LogDisk. Caching techniques used in iCache are based on DCD technology, [3] proposed to improve Disk I/O performance. However storage subsystem like iCache is not adequate to mobile devices since it needs additional NVRAM and LogDisk to embody the local cache. Data Data Data SAN Disk Bunch Storage Server UbiqStor Server UbiqStor Server
منابع مشابه
UbiqStor: Server and Proxy for Remote Storage of Mobile Devices
Mobile devices have difficulty in sustaining various services as in a wired environment, due to the storage shortage of the mobile device. The research[8] which provides remote storage service for mobile appliances using iSCSI has been conducted to overcome the storage shortage in mobile appliances. In research the proposed cache server performed well with relatively small files of sizes, howev...
متن کاملCluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks
The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملService Based Offloading from Mobile Devices into the Cloud
With an increase in usage of mobile devices it is always expected that a mobile device perform the execution of all applications the way a desktop device do. Mobile devices have become an integral part of a human life. However, with limited processing power, memory & battery lifetime of mobile phones it becomes difficult to execute computationally intensive applications such as image processing...
متن کاملEfficency of Service Based Offloading from Mobile Devices into the Cloud
Mobile cloud computing is a new rapidly growing field. In addition to the conventional fashion that mobile clients access cloud services as in the well-known client/server model, existing work has proposed to explore cloud functionalities in another perspective — offloading part of the mobile codes to the cloud for remote execution in order to optimize the application performance and energy eff...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004