Uncategorized

FAST TCP

FAST TCP

FAST TCP is a TCP variant and an alternative congestion control algorithm in TCP, that is designed to sustain high throughput and utilization for high-speed data transfers over large distance (e.g., tens of gigabyte files across the Atlantic).

The Fast TCP system being developed by Steven Low and colleagues at the California Institute of Technology. Current implementation is in TCP on the Linux platform, although the principles and design can be implemented in other contexts than TCP.

Uncategorized

session hijacking

session hijacking

(n.) Also referred to as TCP session hijacking, a security attack on a user session over a protected network. The most common method of session hijacking is called IP spoofing, when an attacker uses source-routed IP packets to insert commands into an active communication between two nodes on a network and disguising itself as one of the authenticated users. This type of attack is possible because authentication typically is only done at the start of a TCP session. Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

Uncategorized

XML Schema Definition – XSD

XML Schema Definition – XSD

Short for XML Schema Definition, a way to describe and validate data in an XML environment. (A schema is a model for describing the structure of information.) XSD is a recommendation of the W3C.

XSD has advantages over earlier XML schema languages, such as DTD. Because XSD is written in XML, there is no need for a parser. XSD defines a richer set of data typessuch as booleans, numbers, dates and times, and currencies — which is invaluable for e-commerce applications. DTDs, on the other hand, express data types as explicit enumerations, which makes validation much more difficult and less accurate.

More important, XSD makes it easier to validate documents based on namespaces (used to qualify element and attributes names by associating them with namespaces identified by URI references. Namespaces prevent identically custom-named tagsthat may be used in different XML documents from being read the same way), something DTDs cannot do.

XSD is defined in the W3C’s XML Schema Working Group Working Draft published on May 6, 1999.

Uncategorized

SDS – software-defined storage

SDS – software-defined storage

Storage infrastructure that is managed and automated by intelligent software as opposed to by the storage hardware itself. In this way, the pooled storage infrastructure resources in a software-defined storage (SDS) environment can be automatically and efficiently allocated to match the application needs of an enterprise.

Separating the Storage Hardware from the Software

By separating the storage hardware from the software that manages the storage infrastructure, software-defined storage enables enterprises to purchase heterogeneous storage hardware without having to worry as much about issues such as interoperability, under- or over-utilization of specific storage resources, and manual oversight of storage resources.

The software that enables a software-defined storage environment can provide functionality such as deduplicationreplicationthin provisioningsnapshots and other backup and restore capabilities across a wide range of server hardware components. The key benefits of software-defined storage over traditional storage are increased flexibility, automated management and cost efficiency.

Software-Defined Storage is Not Storage Virtualization

Software-defined storage is sometimes confused with the term storage virtualization, but as an article from CRN explains, while the latter term involves separating capacity from specific storage hardware resources (and thereby pooling storage devices), SDS involves separating the storage capabilities and services from the storage hardware.

Prominent examples of software-defined-storage include OpenStack, EMC ViPR, Nexenta and HP StoreVirtual.

Uncategorized

architecture

architecture

The term architecture can refer to either hardware or software, or to a combination of hardware and software. The architecture of a system always defines its broad outlines, and may define precise mechanisms as well.

Open Architecture

An open architecture allows the system to be connected easily to devices and programs made by other manufacturers. Open architectures use off-the-shelf components and conform to approved standards. A system with a closed architecture, on the other hand, is one whose design is proprietary, making it difficult to connect the system to other systems.

Also see a diagram of n-tier application architecture in the quick reference section of Webopedia.

Uncategorized

Serial ATA

Serial ATA

Often abbreviated SATA or S-ATA, an evolution of the Parallel ATA physical storage interface. Serial ATA is a serial link — a single cable with a minimum of four wires creates a point-to-point connection between devices. Transfer rates for Serial ATA begin at 150MBps. One of the main design advantages of Serial ATA is that the thinner serial cables facilitate more efficient airflow inside a form factor and also allow for smaller chassis designs. In contrast, IDE cables used in parallel ATA systems are bulkier than Serial ATA cables and can only extend to 40cm long, while Serial ATA cables can extend up to one meter.

Serial ATA supports all ATA and ATAPI devices.

Uncategorized

Serial Storage Architecture

Serial Storage Architecture

Abbreviated as SSA, Serial Storage Architecture  is an open industry-standard interface that provides a high-performance, serial interconnect technology used to connect disk devices and host adapters. SSA serializes the SCSI data set and using loop architecture that requires only two wires: transmit and receive. The SSA interface also supports full-duplex, so it can transmit and receive data simultaneously at full speed.