数据备份解决方案:磁带备份存储解决方案
方案背景 9-11事件以来,数据备份的重要意义已经逐步被用户所接受,备份被誉为是保证数据安全的最后一道防线。但是,需要明确指出的是,备份的意义在于恢复,一旦真的出现...
方案背景 9-11事件以来,数据备份的重要意义已经逐步被用户所接受,备份被誉为是保证数据安全的最后一道防线。但是,需要明确指出的是,备份的意义在于恢复,一旦真的出现...
在过去几年中,中国企业对电子商务解决方案的依赖性提到了一个空前的高度。关键任务的业务数据容量也成比例增长,企业必须对这些数据进行存储、联网、保护和管理。 IDC预计,中国外部存储市场近年平均每年增长17.9%,2005年市场价值将达到8.3...
企业的网络部门和数据中心的IT经理们面临最大挑战之一便是找到有效的和可靠的方法,来对付电子商务和其他活动所产生的大量信息。存储区域网络(Storage area networks,简称SAN)就是一个灵...
Though this paper is not specific to iSCSI, it is such a good introduction to storage networking that we had to include ...
This is an overview of how iSCSI is structured, including naming, network entities, and portals. The details of the prot...
This is the definitive algebraic description of the CRC used in iSCSI. Recommended for those with a strong mathematics b...
The Internet Storage Name Sever (iSNS) protocol is needed to perform discovery of iSCSI targets and initiators in an IP ...
This paper is exactly what it says. If you already understand the basics of SCSI and TCP/IP, and you need a concise (12 ...
This covers the requirements for IPsec with iSCSI (and other protocols). Note that this is a requirement to implement, n...
The iSNS protocol is used for device discovery in IP networks, so this standard has references to both iSCSI and iFCP.