Technology and Business Proposal of Phantosys
Technology &Business proposal for IDV, VDI or Thin-client Solutions selection
IDV: Intelligent Desktop Virtualization: ● Centralized management, but local execution ● Layered images delivered intelligently (layered images are virtual environments constructed on the fly that include system software, application software, application data, user preferences and user data) ● Intelligent device management that uses the capabilities available on the machine in the most intelligent way (Graphs would be processed locally, If a system has a high performance graphics system, for example)---- Issued by Intel VDI: Virtualized Desktop Infrastructure: Desktop virtualization is software technology that separates the desktop environment and associated application software from the physical client device that is used to access it. Desktop virtualization can be used in conjunction with application virtualization and (Windows) user profile management systems, now termed "user virtualization," to provide a comprehensive desktop environment management system.( From Wikipedia, the free encyclopedia)
Thin-client:
A thin client (sometimes also called a lean, zero or slim client) is a computer or a computer program that depends heavily on some other computer (its server) to fulfill its computational roles. (From Wikipedia, the free encyclopedia)
!
!
© Generated by Steven Chiu,Phantosys Ltd. Technology and Business Proposal of Phantosys
TABLE OF CONTENTS 1
! Page !1
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
Background ...... 4 Introduction of current major solutions in the marketing ...... 4 1. Citrix 4 2. Microsoft 5 3. VMware 7 2. Phantosys Technology ...... 7 1. Challenges of Enterprises/Government/educational IT Environments ...... 8 1.2.2 Service Availability ...... 9 1.2.3 Service Performance ...... 9 1.2.4 Service Access ...... 10 1.2.5 Escalating Total Cost of Service Availability...... 10 3. The Phantosys Solution...... 12 1.3.1 How Does Phantosys Solution Work? ...... 14 1.3.2 Phantosys Solution Manages User Services Easily ...... 16 1.3.3 What's DOEc™ Protocol?...... 20 1.3.4 The Phantosys solution shows the following features: ...... 21 1.3.5 Phantosys Solution Compared to Other Computing Models ...... 22 2. System Introduction—Unique and outstanding technologies ...... 24 2.1. Autonomous Transmission protocol ...... 24 2.1.1. DOEc™ Protocol: “Please refer to “What's DOEc™ Protocol” on page 19 ...... 24 2.1.2 EDSC Protocol: Ethernet Disk Sector Communication...... 24 2.2. Cross-platform Cluster Files System—PIM ...... 26 2.3. Multiple OS, Nodes and Inheritance Technology ...... 27 2.4. Local HDD as cache ...... 27 2.5. Top secure level design ...... 29 1. How secure we are ...... 29 2. Three models for Option: ...... 30 2.1. Diskless — just like any thin-client (server-based )solution did...... 30 2.2. Local cache—HDD as cache ...... 30 2.3. All Local cache—Whole HDD as cache ...... 31 6. Input/output ports blocked ...... 31 7. Internal and external network completely separated centrally ...... 32 8. Mini OS guide control System ...... 33 9. Multiple authentication security mechanism ...... 34
! Page !2
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
10. No back door of detection or monitoring for any organization or government ...... 34 11. 801.1X authentication ...... 35 12. Friendly Interface, localization and useful DLL ...... 35 3. Application fields ...... 37 1. SOE be centrally managed, deployed and dispatched ...... 37 2. Mobile Devices Security Management ...... 39 2.1. Solution brief ...... 39 2.2. Design Concept: ...... 39 2.3. Running Windows Operation System on mobile devices ...... 39 2.4. Running MAC Operating System on mobile devices ...... 41 2.5. Solution advantages: ...... 42
3. FTP/Email/File etc. servers security...... 43 4. Website server security management—Machine gun ...... 49 5. Anti-Ransomware solution ...... 50 6. Education field applications --Computer room, Classroom, Administration...... 53 6.1. IT problems and management issues in current environment ...... 53 3.6.2 Digitalization of teaching in any classroom environment ...... 54 7. Phantosys advantages for education, training center ...... 55 3.7.1 SOE, central deployment and management via WAN or cloud ...... 59 3.7.2 The virtual lab. And Experiment Environment Established ...... 60 8. Government/Enterprises/Defence fields applications ...... 66 4. Cost comparison and analysis ...... 73 4.1 ICT manpower saving ...... 73 4.2 Idle loss ...... 74 4.3 Licenses fee issue ...... 74 4.4 Power consumption in whole environment ...... 75 4.5 Invisible Intellectual Property Loss cost ...... 79 1. System requirement and supporting ...... 80 6 Criteria for handling our solution ...... 81 7 ROI analysis and Business Model ...... 82 8. Typical Reference Sites ...... 82 9.Future 84
! Page !3
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
Background
Introduction of current major solutions in the marketing
There are a lot of VDI, IDV or thin-client solution in the market. As we known major players are Citrix, VMware, MS etc.
1. Citrix
Citrix(NASDAQ︰CTXS) Is the leader of thin client solution provider of the world
Using ICA the remote display protocol, the client transmits user input to the server, and the server returns screen updates of the user interface of the applications from the server to the client
Citrix merged the virtual technology supplier Xen at US$ 5 hundred million 。Citrix attempt to involve in server & desktop virtualized marketing. Xen technology let a server virtualizes multiple independent PC to provide multiple OS+AP service on desktop. To solve the problems of thin client had before.
! Page !4
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
!
2. Microsoft Microsoft(NASDAQ︰MSFT)
Owned WBT technology. RDP is designed to provide remote display and input capabilities over network connections for Windows-based applications running on your Windows XP Professional desktop.
! Page !5
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
!
! Page !6
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
3. VMware
!
!
2. Phantosys Technology Our logical thinking is most clients are more powerful with lower price date by day and bandwidth is always very limit compared to application contents, its resolutions and
! Page !7
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
clients growing. Why not apply local client’s resources (CPU, RAM, HDD etc.) for processing. Therefore central management but local computing concept be implemented.
!
1. Challenges of Enterprises/Government/educational IT Environments In a fast-emerging knowledge economy, an enterprise IT competitive edge depends more and more on networked computer systems on which the work forces (users) relies to access information services. Information services are outcome of data being processed by applications running on computers that are in general categorized as servers or clients. Emphasis on data availability has placed server computers at the center of data processing in an enterprise IT environment, where mission critical data reside on well- guarded expensive storage systems such as SANs and NAS's while service availability is maintained by high-caliber system administrators and technical personnel. Such policy poses a problem in an IT environment where client computers get disproportionately low support in terms of both user services and user data despite their outnumbering server computers by orders of magnitude. With ever-increasing portion of enterprise value accounted for by user-involved knowledge work compared to traditional nonstop operation, the total cost of service availability to client computers (whereon users access information
! Page !8
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
services for knowledge processing) grows faster than the total cost of service availability to servers (whereon the enterprise operational data are processed) does. A skewed IT resource allocation will end up with higher total cost of service availability for the entire enterprise.
Along with the effort to reduce the total cost of service availability, an IT environment must accomplish the tasks of:
▪ maintaining, timely and cost-effectively, high user service availability ¨C including necessary system restoration after system failure ▪ support of users IT ad hoc requests for restoration/recovery of system integrity
▪ ensuring adequate service performance by balancing the convenience of homogeneous all-encompassed client service environment with the versatility of service varieties provided by prevalent powerful personal computers ▪ extending access to business-critical applications to dispersed users regardless of connection, location or device
These challenges have made enterprise-wide service availability even more daunting because prevailing computing models have skew emphasis placed on server computing.
1.2.2 Service Availability From a management perspective, traditional enterprise IT environment adopts costly process in its deployment of application services and in maintenance of service availability. Not only do administrators have to physically distribute applications to every client computer, but they also have to deal with tedious works of version control, remote support, multiple system configuration and data replication. A work force of thousands of users can easily put the cost of service availability out of control. In case of system failure on a client computer, current maintenance process always requires dispatching an IT professional to do field support including system restoration or system integrity recovery.
1.2.3 Service Performance
! Page !9
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
With more productivity tools delivering user services that demand computing power, the IT environment must be so constructed that user service performance is not sacrificed. The IT service's performance degrades dramatically when the administrator addresses his convenience of maintenance by providing users with a virtually all-encompassed computing services. On the other hand, users suffer service inadequacy if they are provided with the homogeneous minimally-included services such as office tools and web accessing tools only
1.2.4 Service Access Today's enterprise computing addresses more on mobile information access. In one form, it is the user service availability anywhere. Services should be delivered to where the user has access to the access device, instead of being confined to a specific desktop computer.
1.2.5 Escalating Total Cost of Service Availability Service availability entails costs, which can be described by the term Total Cost of Service Availability (TCSA).
To make IT services constantly available to users requires one-time costs and recurring costs. The one-time costs include such things as initial acquisition cost for both hardware and software and cost for attaching the hardware to the enterprise IT infrastructure. The recurring costs pertain to installation/deployment and recovery work performed by the IT personnel, as well as the users' work losses during system downtime. In a typical enterprise IT environment, the recurring costs usually account for over 80% of the TCSA and relate essentially to management and delivery of services that vary with heterogeneous accommodating platforms ranging from full-PC such as powerful servers, desktops and notebooks to thin-PC such as Java-based network computers, Windows- based terminals and handheld information access devices. To aggravate the variety of service platforms, users demand more flexible and rich services on multiple platforms that may be dispersed around the world in branch offices, homes, hotels, customer sites and many other places. The exponentially growing complexity of service availability has added overwhelmingly to the TCSA.
! Page !10
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
TCSA Calculator
Each client or server computer’s TCSA can be calculated as:
client TCSA = Cost of acquiring the client computer and its application services + Cost of setting up the client + Cost of installing/deploying the client's services + Cost of updating/deploying the client's services + Cost of support to recover the client’s services + Cost of work loss to all users using the client
server TCSA = Cost of acquiring the server computer and its application services + Cost of setting up the server + Cost of installing/deploying the server’s services + Cost of updating/deploying the server's services + Cost of support to recover the server’s services + Cost of work loss to all users relying on the server
where the cost of work loss is the user productivity loss due to service unavailability:
Cost of work loss = User wage ´ Hours of service outage
and the Total Cost of Service Availability is calculated as: Enterprise TCSA = (# of servers) *(server TCSA) + (# of clients)*(client TCSA)
! Page !11
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
3. The Phantosys Solution The Phantosys is a solution to address the problem of escalating total cost of service availability to any IT environment where a lot of clients (PC farm) such as in governments, military, schools, enterprises.
The Phantosys Solution is essentially a storage area network addressing the availability of IT services to the users, by shifting focus to management of disks as media for service delivery. The rich set of powerful management tools for user disks facilitates significant reduction in the total cost of service availability to the users, a most desired feature in any IT environment.
Storage networking has been proliferating in the past few years, thanks to awareness of the crucial role of business data availability in an enterprise. The awareness stops regrettably at enterprise data availability only. With user-generated knowledge accounted for larger portion of the enterprise value, the user service availability becomes more important. Existing storage networking models failed to address these needs.
The Phantosys Solution minimizes the enterprise TCSA according to the following benefits or cost saving in the client side:
! Page !12
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
!
A further assumption of Nc = 100 units, install deployment cost = $50, update deployment cost = $25, #of updates = 8 (for the PC's life cycle), recovery cost = $50/hr, average downtime = 208hr (for the PC's life cycle), and user wages = $12/hr, then the total cost saved during each PC's life cycle is calculated as:
(install deployment cost) + (# of updates) * (update deployment cost) + (recovery cost + user wages)* (avg. downtime) = $50 + 8 * $25 + ($50/hr + $12/hr) * 208 hr = $13146
This is a significant saving considering the average cost of acquisition of PC hardware and software together with the initial setup cost is about $4000. The downtime-caused cost saving, which is $12896, contributes to the major portion of the total cost saved. It is obvious that the Phantosys Solution approach reduces the PC life cycle cost down to the initial acquisition cost and the setup cost plus negligible average installation cost and update cost when the total number of deployment is large (in our example, 100 units is large enough to pull the cost of installation and update down to 1% when averaged across the whole IT environment).
! Page !13
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
1.3.1 How Does Phantosys Solution Work? The Phantosys Solution is a platform for management and delivery of user services, using the popular disk-based computing model. It is a new architecture, by further layering the disk access path in the conventional disk-based computing architecture (Fig. 1) and placing management functions in the path (Fig. 2).
Phantosys solution can automatically swift from disk-based computing mode to DOE mode
!
Fig. 1 Conventional disk-based computing model
! Page !14
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
!
Fig. 2 DOE-based computing architecture
The Phantosys OS Server provides the storage space to be used by the client PC as a disk. These storage spaces are managed by the Server as an image file. The Server implements a rich set of management functions to manipulate these image files for all client PCs that have registered with the Server for operation.
• The system administrator can easily handle the deployment of services after software is properly installed or updated. • A failed installation or update of software does not mean a laborious rollback/ cleanup work prior to re-installation. • User service recovery means slashing the user's ill disk image to force using the parent image, in case of novice user who is fully incapable of the simple task of managing his/her own disks.
! Page !15
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
Properly managed disk image files manifests many useful features as desired by each user of the client PCs:
• A user is granted to version his/her disk at will. An analogy is to provide virtually unlimited number of disks for him/her to perform the "mount new disk"-->"duplicate disk"-->"unmount and put away the disk" system backup procedure. The conventional practice entails hardware costs (of the disks) and labor costs of physically performing the mount-duplicate-unmount procedure or at least, in the best case of doing it on the network disk, the cost of bandwidth (or of the user's precious time) of making duplication after elimination of the mount-unmount activity. • A user is given total control of his/her 'disks' in a extremely user-friendly way. No novice user will find managing his/her own disks intimidating. • User disk versioning is intrinsically the Windows directory branching and navigating within is trivial for average Windows users. • When coming to recovery of disk, it is as simple as dropping a subdirectory and moving up to the parent directory. The user no more have to go through the painful and lengthy "locate the lately put-away disk and mount it"-->"duplicate disk"-- >"unmount disk" procedure.
1.3.2 Phantosys Solution Manages User Services Easily
The Phantosys Solution manages user services to execute on the client PC. It helps the system administrator maintain easily the users in relation to authorized software services. As shown in Fig. 3, the status screen monitors both the Phantosys Server status (in terms of the resource being used) and the Phantosys Solution status (in terms of the network and storage access).
! Page !16
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
!
Fig. 3 Phantosys Server monitoring screen
Each user in an enterprise is usually assigned a client PC which can boot up using specified or selected disk image. The Phantosys Server manages user by specifying the user client's configuration, as well as controlling the operation of the client PC -- booting it up, shutting it down, rebooting it, or disconnecting it from the server. (Fig. 4)
! Page !17
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
!
Fig. 4 Phantosys Server user management screen
! Page !18
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
The Phantosys Server manages the computing services available to each user by specifying disk images the user can access. Based on each accessible disk image, the user can further manipulate versioning of the disk. Each version of such manipulation is termed a node. The Phantosys Server is able to manage the parameters specifying the node tree a user can manipulate. (Fig. 5)
!
Fig. 5 Phantosys Server client images & nodes management screen
! Page !19
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
1.3.3 What's DOEc™ Protocol?
DOEc™ protocol is a disk management and delivery protocol defined by Phantosys Limited. It is the foundation of the Phantosys Solution. DOEc™ stands for Disk-on- Ethernet Communication.
The fundamental principle behind DOEc™ protocol is the disk-based computing architecture, with service package managed and delivered as a disk, to a computing platform (client computer in the Phantosys environment), just like the conventional PC’s disk that holds services available to run on the PC.
The DOEc™ protocol essentially covers the presentation layer and the session layer of the seven-layered OSI model. It comprises groups of protocol command to do disk accessing and disk management (e.g. construction, destruction, resizing, duplication, access blocking, etc.)
Third-party tools can easily be implemented using the DOEc™ protocol for sophisticated management of the enterprise services designated for use by individual member of the work force.
On the client is an DOE™ disk emulator that communicates via DOEc™ protocol with the DOE™ delivery server, which most likely also hosts the management module. The DOE™ disk emulator presents, after getting the disk blocks from the server, a disk to its hosting client computer.
The DOE™ server manages a storage pool and dynamically constructs up, through the presentation and application layer, virtual disks for client computers that request for disk services. Upon receiving request, the DOE™ server will authenticate the user request first and start providing disk access for authenticated user.
Role of DOEc DOEc™ is flexible and powerful it allows access and management of virtual disks over the network. No specific constraint except security requirement is exerted on the transporting
! Page !20
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
or linking mechanism. So the DOE™ server and client module can be implemented on top of any kind of SAN architecture.
1.3.4 The Phantosys solution shows the following features: ! Supports any applications programs and operation systems: Full range of application services (business and personal productivity tools) can be deployed and delivered to run on any client computer on the Phantosys Solution.
! Supports clients of varying computing power: The Phantosys Solution focuses on managing services available to client users, instead of the client computing power.
The obvious benefits of Phantosys Solution is the reduced total cost of service availability (TCSA) for the schools, defenses dept., government, enterprise etc. any IT environment.
With centrally managed services and user-initiated self-maintenance, the enterprise computing network is easily maintained, resulting in high user service availability at very low cost. The saving is significant for schools, defenses dept., government, enterprise etc. any IT environment with thousands of user client computers to be supported.
What is Disk-based Service Provisioning?
Most of existing PC computers operates on the disk-based computing architecture. The directly attached storage device (DASD, or disk) provides a media for storing the data and software (OS and applications). It also serves as an optional system bootstrapping mechanism.
In essence, the PC’s disk is a self-sustaining service package as a whole. It contains OS and applications that are executed on the PC to provide services to its user. A user is only allowed services installed on the disk. This is the very first model of providing services via disk.
As the work force grows in parallel with schools, defenses dept., government, enterprise etc. any IT environment, the above described primitive disk-based service provisioning
! Page !21
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
model becomes hard for IT personnel to support. Installation of software onto each user disk (the application deployment process) is tedious and painful.
By virtualization of pooled storage into manageable disks, the service packages can be easily constructed, duplicated, deployed, all done centrally with no need of field visit on the client computer.
1.3.5 Phantosys Solution Compared to Other Computing Models
Three models are used in modern computing: (1) server-based computing, (2) network computing, and (3) traditional client/server computing. While all models have valid roles in today’s schools, defenses dept., government, enterprise etc. any IT environment, it's important to know the differences between them. In the traditional client/server model, processing is conducted on local resources. In the network computing model as defined by Sun, Oracle, Netscape, IBM and Apple, components are dynamically downloaded from the network into the client for local execution. In the server-based computing approach, users accesses business-critical applications without requiring them to be downloaded to the client. In the Phantosys Solution architecture, the applications are accessed just like they reside on the local disk, and employ full local computing resources for processing. This approach provides considerable saving on the total cost of service availability since service packages are centrally managed and delivered to requesting and authenticated user.
! Page !22
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
Some of the other differences in the four computing models are listed in the following chart:
Computing Phantosys Server-based Network Traditional Architecture Solution Computing Computing Client/Server Computing Processing remote disk access 1 0 0 % s e r v e r download for local local Model for local execution execution execution execution Hardware Diskless/disk PC thin client or diskless diskless PC Full PC PC (computing (full computing (sub-computing (full power) power) (sub-computing power) computing power) power) Native Device variable function variable or fixed Variable function variable (PC) function (PC<, NPC, (NC) function (PC)
NC, WBT) Application 2 - /3 - ti e r c l i e n t/ monolithic, component-based 2 - / 3 - t i e r Architecture server component or 2-/3- client/server tier client/server Native Window W i n d o w s Java applets W i n d o w s Application applications, Linux applications or Java applications services applications, Java applets applets, etc. Service F u l l s e r v i c e s Limited services, Limited services, Full services Completenes delivered bandwidth hog bandwidth hog supported s usually excluded usually excluded Easiness of Full spectrum of Near-full spectrum of Specially designed Services hard Service off-the-shelf off-the-shelf services, services, centrally to deploy and Deployment services, centrally centrally managed m a n a g e d f o r manage m a n a g e d f o r f o r d y n a m i c d y n a m i c d y n a m i c deployment deployment deployment
! Page !23
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
U s e r s e l f - Fully empowered Limited user self- N o u s e r s e l f - No user self- maintenance user, able to do maintenance maintenance maintenance self-maintenance
Basically, the Phantosys solution computing approach delivers all the benefits of both host (server-based) computing and personal computing.
Host computing benefits
• Single-point management
• Universal application access
• Predictable service availability cost
• Mission-critical service availability
Personal computing benefits
• Thousands of off-shelf applications
• Full multimedia services provided
• Standards based
• Wide choice of peripherals
• Full compatible with any external devices
2. System Introduction—Unique and outstanding technologies
2.1. Autonomous Transmission protocol
2.1.1. DOEc™ Protocol: “Please refer to “What's DOEc™ Protocol” on page 19
2.1.2 EDSC Protocol: Ethernet Disk Sector Communication EDSC(Ethernet Disk Sector Communication) It is a protocol for transmitting data between DOE NetDisk Server and DOE NetDisk (network electric HDD) via the most standards, popular Ethernet. EDSC is compatible to Win2000,2003,2008,2012 /Win XP Vista/Win7/Win 8.1 and Linux all versions and work in very high efficient ! Page !24
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
which can provide Instant-on, instant backup, instant recovery system, centralized remote Ethernet hard drive maintenance and management (monitoring system information, hard disk space, network flow) and backup restore Mechanisms
Based on EDSC transmitting protocol, we implement Client SAN (Client Storage Area Network Architecture) structure which provide mainframe’s advantages---management and storage centralized) then keep distributed computing (local execution) characteristics of (apply full advantage of client's hardware resources). The performance and habit is same as standalone PC or station’s functions or compatibility. Fully implement CSANA (Client Storage Area Network Architecture) effectiveness to make whole performance, compatibility usage same as standalone PC linking to LAN or WAN easily. Due to providing SOE(standard Operating Environment) make maintain and update more convenient and efficient then reduce TCSA (total cost of service availability)。 DOE NetDisk Server infrastructure is based on DOS and Linux platform which is autonomous development with easy understanding, excellent anti-virus and secured characteristics. Its unique EDSC (Ethernet Disk Sector Communication) is operating at MAC layer(The next layer of OS operating system)—Not like ICA of Citrix which operating at layer upper than OS. Its principle and structure are totally different. Therefore security level is very distinguish also
Principle as below:
A P Application Program layer
O S Operation System Layer
MAC BIOS layer and EDSC protocol
From the structure, may know EDSC protocol at (Client Storage Area Network Architecture) can work well in Linux and Window even Mac too and be compatible to any application programs smoothly at al.
! Page !25
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
2.2. Cross-platform Cluster Files System—PIM
!
!
! Page !26
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
We integrate different operation systems (such as Microsoft and Linux) and application programs in different “group nodes” in one image in our own format (PIM). Those group nodes are like recovery points which deploy proper environment (OS+AP) to different clients on demand
2.3. Multiple OS, Nodes and Inheritance Technology
!
Each node operates independently but mother and daughter node can be inherited well For example, If node B be deleted, node C will replace B position and inherited what node B has (which application programs at group node B). Each node is recovery and booting point and can be boot from any node on demand or management.
Based on the unique technologies we have, we can keep the image in very compact (compared to another solution have to install application programs in one image) all the time to make each group node in very efficient
2.4. Local HDD as cache We make HDD as cache function, no matter in formatted partition or unallocated partition as well.
! Page !27
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
Sector table be randomly saved in server and clients, only integrate “Mini OS guide control System” then the client can be booted and worked properly.
Due to the technology we have, we can neglect the network environment (band width) but can keep the standalone PC’s high performance and keep in very high secured capability on client sites.
!
! Page !28
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
! 2.5. Top secure level design
1. How secure we are a) We design own our Autonomous Transmission protocol to run at Medium Access Layer (MAC) layer b) With diskless, local cache or full local cache (with AES128/256bit encryption) modes for potions c) Input/output ports block function can be manageable in LAN or offline mode in desktop or mobile devices. d) Inner and outer (internal and external) network completely separated centrally, clients are not capable to change the configuration at all e) Clients cannot edit computer name, user name, network bands themselves and integrated perfectly with AD f) 802.1X authentication supported
! Page !29
! © Generated by Steven Chiu, Phantosys Ltd Version 1. Technology and Business Proposal of Phantosys
!
2. Three models for Option:
2.1. Diskless — just like any thin-client (server-based )solution did. OS+AP are in server not at client site but run in client site. While client disconnect to server, can’t work or find OS+AP at client site
2.2. Local cache—HDD as cache