Nowadays, more and more information is stored in the server, and it is becoming more and more important. In order to prevent the server from accidents or unexpected attacks, resulting in the loss of a large amount of important data, servers generally use many important security protection technologies to ensure their safety. . The following introduces some major server security hotspot technologies.
1. iSCSI technology
iSCSI technology is a new storage protection technology that combines the existing SCSI interface with Ethernet technology, allowing servers to exchange data with storage devices using IP networks. This technology is not only cheaper than the currently commonly used industry technology standard Fiber Channel, but system administrators can use the same equipment to manage all networks and do not need additional equipment for network management.
iSCSI technology was jointly developed by two major R&D institutions under IBM - California's Almaden and Israel's Haifa Research Center. It is a SCSI instruction set for hardware devices that can run on the upper layer of the IP protocol. Simply put, iSCSI enables the SCSI protocol to be run on an IP network, enabling routing on high-speed Gigabit Ethernet networks such as the Internet. Now, many network storage providers are committed to setting Fiber Channel used in SAN (Storage Area Network) as a practical standard, but its architecture requires high construction costs, which is not affordable for ordinary enterprises. In contrast, although NAS technology is low-cost, it is limited by bandwidth consumption, cannot complete large-capacity storage applications, and the system cannot meet the requirements of openness. The use of iSCSI technology builds a bridge between the above two. iSCSI technology is a technical standard based on the IP protocol and realizes the connection between SCSI and TCP/IP protocols. For users who use LAN as the network environment, they can easily and quickly interact with information and data with only a small investment. transmission and management. Although iSCSI is based on IP protocol, it has the quality of SAN large-capacity centralized open storage. This technology is undoubtedly very attractive to many small and medium-sized enterprises that are facing the rapid growth of information but are in "data islands" on the other hand.
2. Fully automatic backup technology
This technology is to establish two sets of identical and synchronously working file servers on a network system. If one of them fails, the other will automatically connect to the system immediately and take over all the work of the failed file server. By using this technology, it can be ensured that after the data information of the fault-tolerant system is damaged or lost due to system or human misoperation, the data can be quickly restored locally in a timely manner; in addition, this technology can also ensure that the fault-tolerant system can be quickly restored in the event of unpredictable or resistant events. In the event of regional disasters (earthquakes, fires, machine damage, etc.), disaster recovery of data and the entire system can be achieved in a timely manner locally or remotely.
3. Transaction tracking technology
This technology is designed for the needs of databases and multi-user software to ensure that databases and multi-user application software can maintain data consistency before all processing work is completed, or when the workstation or server is suddenly damaged. . The way it works is: the specified transaction (operation) is either completed at once, or no operation is performed.
4. Automatic inspection technology
Generally speaking, before recovering erroneous or damaged data, the system must have the ability to promptly discover the causes of these errors. Therefore, a complete fault-tolerant system should be inseparable from the support of automatic verification technology. Automatic inspection technology is an effective means for rapid fault detection, especially a self-verification device with complete self-verification properties. It can not only detect errors in system modules in a timely manner, but also detect its own errors. When designing a fault-tolerant system, if automatic inspection technology is used correctly, it can greatly improve the system's ability to respond to errors, shorten the incubation period of errors, effectively prevent the further spread of errors, and thus facilitate other technical functions to respond to errors in a timely manner. relevant corrective actions.
[Cut-Page]
5. Memory error correction technology
This technology is a server transparent detection and fault correction technology. It can detect and correct a memory error while erasing bad data bits from RAM, thus effectively reducing the occurrence of uncorrectable multi-bit errors.
6. Thermal positioning technology
This technology is also a technology for checking data errors. This technology can perform some checks and comparisons on the data written to the disk to determine whether the data just read is correct or whether there are other problems. When performing maintenance and comparison work, this technology can automatically read the newly written data from the hard disk and compare it with the original data in the memory. If an error occurs, use an area called the "hot relocation area" opened in the hard disk to record the bad areas of the hard disk, and write the data in the determined bad areas with original data into the hot relocation area. middle.
7. Automatic restart technology
Automatic restart technology means that the PC server can complete the restart process without human management and resume system operation at an extremely fast speed.
8. Network monitoring technology
This technology allows users to monitor all servers used on the network on an ordinary client computer, monitor and determine whether the server is "healthy", and once the server's chassis, fan, memory, processor, system information, temperature, voltage or If there is an error in any of the third-party hardware, an alarm will be sent to the administrator. It is worth mentioning that the network between the monitoring end and the server can be a local area network or a wide area network. The server can be started, shut down or reset directly through the network, which greatly facilitates management and maintenance work.
9. Online fault repair technology
The online fault repair technology includes the power-on plugging and unplugging technology of faulty components and the online configuration technology of components. Power-swappable components include hard drives, memory, peripheral cards, power supplies, fans, etc. The proudest technology in PC servers currently is PCI hot-swappability. Modular design will be the future development direction.
10. File allocation table and directory table technology
The file allocation table and directory table on the hard disk store information such as the location and file size of files on the hard disk. If they fail, data will be lost or mistakenly stored in other files. By providing two copies of the same file allocation table and directory table and storing them in different locations, the system will issue a prompt once one of the copies fails, thereby achieving fault tolerance.
11. VersaStor Technology
This technology is one of Compaq Computer's masterpieces in data storage. Its biggest highlight is that it realizes the concept of network storage pool for the first time to eliminate the boundaries that currently widely exist between different storage systems, so that different storage systems can be used in different locations. Easily store and manage between storage systems. In addition, the capacity of the storage pool can be dynamically and transparently scaled according to different servers and applications, supporting seamless and transparent migration of data from different servers. VersaStor technology can provide storage space acquisition and storage for any online storage system connected to a SAN network, regardless of the manufacturer; and this technology simplifies the deployment of storage systems, and the management of storage has been upgraded from ordinary mechanical labor to a higher level.
12. AutoRAID technology
This technology is a multi-level RAID array technology that combines the advantages of different RAIDs. It places recently used data on fast and high-performance hard disks stored in RAID 0/1, and puts less commonly used data on cost-effective RAID5 storage. in the hard drive. With AutoRAID, system installation, configuration and expansion become simple and easy. This technology no longer needs to transfer data to other hard drives in the array. You only need to install the new hard drive, and AutoRAID can automatically determine the size of the hard drive. And add it to the hard disk array; the system can immediately utilize the space of the new hard disk and store more data as RAID 0/1 to improve system performance and access speed. In addition, AutoRAID can manage hard disk arrays composed of hard disks of different capacities.
5. Memory error correction technology
This technology is a server transparent detection and fault correction technology. It can detect and correct a memory error while erasing bad data bits from RAM, thus effectively reducing the occurrence of uncorrectable multi-bit errors.
6. Thermal positioning technology
This technology is also a technology for checking data errors. This technology can perform some checks and comparisons on the data written to the disk to determine whether the data just read is correct or whether there are other problems. When performing maintenance and comparison work, this technology can automatically read the newly written data from the hard disk and compare it with the original data in the memory. If an error occurs, use an area called the "hot relocation area" opened in the hard disk to record the bad areas of the hard disk, and write the data in the determined bad areas with original data into the hot relocation area. middle.
7. Automatic restart technology
Automatic restart technology means that the PC server can complete the restart process without human management and resume system operation at an extremely fast speed.
8. Network monitoring technology
This technology allows users to monitor all servers used on the network on an ordinary client computer, monitor and determine whether the server is "healthy", and once the server's chassis, fan, memory, processor, system information, temperature, voltage or If there is an error in any of the third-party hardware, an alarm will be sent to the administrator. It is worth mentioning that the network between the monitoring end and the server can be a local area network or a wide area network. The server can be started, shut down or reset directly through the network, which greatly facilitates management and maintenance work.
9. Online fault repair technology
The online fault repair technology includes the power-on plugging and unplugging technology of faulty components and the online configuration technology of components. Power-swappable components include hard drives, memory, peripheral cards, power supplies, fans, etc. The proudest technology in PC servers currently is PCI hot-swappability. Modular design will be the future development direction.
10. File allocation table and directory table technology
The file allocation table and directory table on the hard disk store information such as the location and file size of files on the hard disk. If they fail, data will be lost or mistakenly stored in other files. By providing two copies of the same file allocation table and directory table and storing them in different locations, the system will issue a prompt once one of the copies fails, thereby achieving fault tolerance.
11. VersaStor Technology
This technology is one of Compaq Computer's masterpieces in data storage. Its biggest highlight is that it realizes the concept of network storage pool for the first time to eliminate the boundaries that currently widely exist between different storage systems, so that different storage systems can be used in different locations. Easily store and manage between storage systems. In addition, the capacity of the storage pool can be dynamically and transparently scaled according to different servers and applications, supporting seamless and transparent migration of data from different servers. VersaStor technology can provide storage space acquisition and storage for any online storage system connected to a SAN network, regardless of the manufacturer; and this technology simplifies the deployment of storage systems, and the management of storage has been upgraded from ordinary mechanical labor to a higher level.
12. AutoRAID technology
This technology is a multi-level RAID array technology that combines the advantages of different RAIDs. It places recently used data on fast and high-performance hard disks stored in RAID 0/1, and puts less commonly used data on cost-effective RAID5 storage. in the hard drive. With AutoRAID, system installation, configuration and expansion become simple and easy. This technology no longer needs to transfer data to other hard drives in the array. You only need to install the new hard drive, and AutoRAID can automatically determine the size of the hard drive. And add it to the hard disk array; the system can immediately utilize the space of the new hard disk and store more data as RAID 0/1 to improve system performance and access speed. In addition, AutoRAID can manage hard disk arrays composed of hard disks of different capacities.