{"title":"A survey of different storage methods for NGN mobile networks","authors":"Boughanja Manale, Mazri Tomader","doi":"10.1109/ICCSRE.2019.8807526","DOIUrl":null,"url":null,"abstract":"Following the impressive progress of the current technologies and the computerization of various transactions and devices recently, and the appearance of 5G the creation of data in its various forms has become increasingly important. Hence, the usefulness of studying the different stockpiling methods. Researchers have already focused on several stockpiling techniques to provide unlimited storage capabilities. This paper highlights the various storage methods, with the definition and architecture. Also, it examines the methods based on three criteria which are: the storage capacity, response time andsecurity.","PeriodicalId":360150,"journal":{"name":"2019 International Conference of Computer Science and Renewable Energies (ICCSRE)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference of Computer Science and Renewable Energies (ICCSRE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSRE.2019.8807526","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Following the impressive progress of the current technologies and the computerization of various transactions and devices recently, and the appearance of 5G the creation of data in its various forms has become increasingly important. Hence, the usefulness of studying the different stockpiling methods. Researchers have already focused on several stockpiling techniques to provide unlimited storage capabilities. This paper highlights the various storage methods, with the definition and architecture. Also, it examines the methods based on three criteria which are: the storage capacity, response time andsecurity.