Introducing the server security hotspot 12 technologies

  
Now the information stored in the server is more and more important, and it is more and more important; in order to prevent the server from accident or accidental attack, resulting in a large number of important data loss, the server generally adopts many important Security technology to ensure its security. Here are some of the major server security hotspot technologies.
1. iSCSI Technology
iSCSI technology is a new type of storage protection technology that combines existing SCSI interfaces with Ethernet technology to enable servers to exchange data with storage devices that use IP networks. . The technology is not only cheaper than the industry standard FibreChannel, which is currently in common use, but system administrators can use the same device to manage all networks without the need for additional devices for network management.
The iSCSI technology was developed by IBM's two R&D organizations, Almaden, California, and the Haifa Research Center in Israel. It is a SCSI instruction set for hardware devices that can run on top of the IP protocol. Simply put, iSCSI can run the SCSI protocol over an IP network, enabling it to route on high-speed Gigabit Ethernet. Nowadays, many network storage providers are committed to setting Fibre Channel used in SAN (Storage Area Network) as a practical standard, but its architecture requires high construction costs, which is not affordable for the average enterprise; In contrast, although NAS technology is low in cost, it is limited by bandwidth consumption and cannot complete large-capacity storage applications, and the system is difficult to meet the requirements of openness. The use of iSCSI technology bridges the gap between the two. iSCSI technology is based on the technical standard of IP protocol, which realizes the connection between SCSI and TCP/IP protocols. For users with LAN as the network environment, it is convenient and quick to interactively exchange information and data for only a small investment. Transmission and management. Although iSCSI is based on the IP protocol, it has the quality of SAN large-capacity centralized open storage. This technology is undoubtedly a huge attraction for many small and medium-sized enterprises that are facing the rapid growth of information on the one hand and the “data island” on the other.
2. Fully automatic backup technology
This technology is to establish two sets of the same and synchronous file server on the network system. If one set fails, the other set will automatically access the system immediately, taking over. The entire work of the failed file server. By using this technology, it is ensured that the data information of the fault-tolerant system can be quickly recovered locally in time after being damaged or lost due to system or human error; in addition, the technology can ensure that the fault-tolerant system is unpredictable or resistant. In the case of regional disasters (earthquakes, fires, machine damage, etc.), timely recovery of data and the entire system in a local or remote location.
3. Transaction Tracking Technology
This technology is designed for the needs of databases and multi-user software to ensure that database and multi-user applications occur when the entire processing is not finished, or at the workstation or server. In the case of sudden damage, the data can be kept consistent. It works by either doing the same for the specified transaction (operation) or not.
4. Automatic Inspection Technology
Generally speaking, before recovering from erroneous or damaged data, the system must have the ability to detect the cause of these errors in time, so a complete fault-tolerant system should Support for automatic inspection technology is inseparable. The automatic inspection technology is an effective means for rapid fault detection, especially the self-checking device with full self-checking property, which can not only detect the errors of the system module in time, but also detect its own errors. When designing a fault-tolerant system, if the automatic inspection technology is used correctly, the system's ability to respond to errors can be greatly improved, the latency of errors can be shortened, and the further spread of errors can be effectively prevented, thereby facilitating other technical functions to make mistakes in time. Related corrective actions.
5. Memory Error Correction Technology
This technology is a server transparent detection and fault correction technology. It can effectively erase bad data bits from RAM while discovering and correcting a memory error. Reduce the occurrence of multiple errors that cannot be corrected.
6. Thermal Positioning Technology
This technology is also a technique for checking data errors. This technology can perform some check and comparison work on the data written to the disk to determine whether the data just read is correct or whether there are other Aspects of the problem. In the inspection and comparison work, the technology can automatically read the data just written from the hard disk to compare with the original data in the memory. If an error occurs, the hard disk bad area is recorded by using an area called "thermal positioning re-determination area" opened in the hard disk, and the data in the determined bad area is written into the thermal positioning re-determination area with the original data. in.
7. Automatic restart technology
Automatic restart technology means that the PC server can complete the restart process without administrators, and restore the system operation at an extremely fast speed. //This article is transferred from www.45it.com computer software and hardware application network
8. Network monitoring technology
This technology allows users to monitor all the servers used on the network, monitor and judge on a common client. Whether the server is "healthy" will alert the administrator if an error occurs in any of the server's chassis, fans, memory, processor, system information, temperature, voltage, or third-party hardware. It is worth mentioning that the network between the monitoring end and the server side can be a local area network or a wide area network, and the server can be started, shut down or re-set directly through the network, which greatly facilitates management and maintenance work.
9. On-line repair technology for faults
The online repair technology for faults includes online configuration technology for faulty parts that can be plugged in and out and parts. The parts that can be plugged and unplugged include hard disk, memory, peripheral card, power supply, fan, etc. The current technology that is proud of PC server is PCI hot plug. Modular design will be the future direction of development.
10. File allocation table and table of contents technology
The file allocation table and directory table on the hard disk store information such as the location and file size of the file on the hard disk. If they fail, the data will be lost or mis-stored. Go to other files. By providing two identical file allocation tables and table of contents, they are stored in different locations. Once a failure occurs, the system will prompt to achieve fault-tolerant purposes.
11.VersaStor Technology
This technology is one of Compaq Computer's masters in data storage. Its biggest highlight is the realization of the concept of network storage pool for the first time to eliminate the widespread existence of different storage systems. The boundaries between them make it easy to store and manage between different storage systems. In addition, the capacity of the storage pool can be dynamically and transparently scaled according to different servers and applications, supporting seamless and transparent migration of different server data. VersaStor technology can provide storage space storage and storage for any online storage system connected to a SAN network, regardless of the manufacturer; and this technology simplifies the deployment of storage systems, and the management of storage is upgraded from general mechanical labor to a Higher level.
12.AutoRAID Technology
This technology is a multi-level RAID array technology that combines the advantages of different RAID. It will put the most recently used data in a fast and high-performance hard disk stored in RAID0/1, which will be less commonly used. The data is placed on a cost-effective hard drive in RAID5 storage. With AutoRAID, the installation, configuration, and expansion of the system is simple and easy. The technology no longer needs to transfer data to other hard disks in the array. Just install the new hard disk and AutoRAID can automatically determine the size of the hard disk. And add it to the hard disk array; the system can take advantage of the new hard disk space and store more data in RAID0/1 to improve system performance and access speed. In addition, AutoRAID manages disk arrays consisting of hard drives of different capacities.

Copyright © Windows knowledge All Rights Reserved