1 Network Attached Storage Jinfeng Yang Oct/19/2015
2 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability & Fault Tolerance & Scalability, Data Security, and Data Migration). 5. The challenges of NAS. And how do we handle these problems? 6. Compare NAS and DAS (Directly Attached Storage). 7. Compare NAS and SAN (Storage Area Network). - File level storage vs Block level storage. 8. The future of NAS.
3 Outline Part B 9. Network File System definition 10. NFS Architecture 11. Network File System layer 12. NFS Protocol 13. NFS Design feature 14. Benefits of NFS 15. NFS version 16. New Technology RDMA (Remote Direct Memory Access Protocol) 17. NFS Security
4 1. What is the Network Attached Storage (NAS)? NAS: a file level storage system which provide local area network node, all the clients or associated devices on the local area network can share the file-based data through the standard Ethernet connection without physically transfer files by external storage device.
5 1. What is the Network Attached Storage (NAS)? Local area network: a group of computers or associated devices which share the common communication channel. Node: each computer or associated device located on the LAN is an independent node, each node has the capacity to recognize and process other nodes. The Network Attached Storage will assign each independent node a specific IPaddress.
6 1. What is the Network Attached Storage (NAS)? Network Attached Storage device usually don t have keyboard and display, it is managed by the browser-based utility program (utility is a part of operating system). In most case, the NAS devices contain one or more hard drives, they use embedded Linux system, and support USB & Ethernet Connection.
7 2. What are the applications of NAS 1. In the home, NAS often is used for storing files and automated backups. 2. In the enterprise, the NAS can be used a backup target archiving or disaster recovery. Some higher-end NAS products can hold enough disk to support RAID, which will provide better performance and higher redundancy. 3. NAS is also broadly used in Facebook and YouTube. With NAS supported, users can directly update photos to their Facebook account or video to YouTube through the website.
8 1. Efficient and Reliable 3. The benefits of NAS NAS servers contain streamlined operating and hardware component, which let the whole storage system more efficient. Moreover, each hardware component is physically separated from the network servers, which is extremely helpful for system reliability. Even the network server fails, the whole system still can be accessed to store or retrieve data.
9 2. Flexible 3. The benefits of NAS The NAS storage system supports multiple different users access the same file simultaneously. The shared network resource can be efficiently allocated to user based on their specific need. For increasing storage capacity, NAS system support directly plugging a new expansion hard drive to the NAS sever.
10 3. Easy to use The process to use NAS as follow: a. Insert NAS on your network b. Assign IP address c. Specify environment setting d. Ready to use 3. The benefits of NAS
11 4. Data is protected 3. The benefits of NAS Most NAS device support RAID (redundant array of independent disk) which provide a way to storing the same data in different place, so even one disk fails, user still can access his or her data.
12 4. NAS s performance (Reliability, Fault Tolerance, Scalability, Data Security, and Data Migration) NAS Appliances: a type of hardware which has its own dedicated storage disks and RAID which can be extended when more storage capacity is required. Vertical Scalability: ability to increase capacity by adding more memory or CPU. Horizontal Scalability: ability to increase capacity by connecting multiple hardware and software entities.
13 4. NAS s performance (Reliability & Fault Tolerance & Scalability, Data Security, and Data Migration) 1. Reliability & Fault Tolerance & Scalability When the whole NAS system need more storage capacity, the NAS appliances can directly be assigned with larger disk to provide both vertical scalability and horizontal scalability. The other way to increase NAS s storage capacity is using clustered NAS system which is a distributed file system. By using clustered NAS system, user can access all files from any clustered node regardless of the physical location of the file. The number and location of clustered nodes are transparent to users. Moreover clustered NAS system provides transparent replication and fault tolerance, so even one or more nodes fail, the whole system is still work without loss any data.
14 4. NAS s performance (Reliability & Fault Tolerance & Scalability, Data Security, and Data Migration) 2. Data Security NAS is the file-base storage technology. Users can directly using passwords or encrypt their file to guarantee the data security. Passwords is the easiest way to restrict read and write to a particular user. Encrypting is the other way to restrict user access. For file decrypting, user need the key to decrypt the encrypted file.
15 4. NAS s performance (Reliability & Fault Tolerance & Scalability, Data Security, and Data Migration) 3. Data Migration Data migration is the process to migrate data between storage system, or computer system. Data migration is used to replace or upgrade servers, to relocate or maintain data center. Here is one software tool called Data Dynamic Storage X which can support Network Attached Storage data migration.
16 5. The challenges of NAS and Solution 1. Usually, the traditional NAS requires additional hardware than it real need, resulting in the server sprawl. Server sprawl is the situation that servers take up more space and consume more resources than it real need. Purchase the low-end server would cause server sprawl.
17 5. The challenges of NAS and Solution 2. Enterprise usually purchased storage arrays much larger than it needed, to ensure there is enough available space for future extension. However if that extension is never occur or it occur but less than expected, the purchased array space will wasted.
18 5. The challenges of NAS and Solution 3. In tradition network attached storage, there is a controller called head which is a certain amount of hard disk capacity, sometimes there may be two heads for redundancy. Those heads are kind of fixed, and the storage associated with them can continue to grow. If we need better process performance, we need to upgrade head, if we need more storage capacity, we need to upgrade the disk drive, for upgrade there should be a limitation.
19 5. The challenges of NAS and Solution Solution Scale-out storage: 1. Scale-out storage is a new network attached storage architecture which can expand storage space as system real need when a given array reaches its storage limitations. 2. Scale-out NAS allows users add addition heads to improve the process performance without limitation. 3. In the scale-out storage, the clustered file system distributes data across the nodes in the scale-out storage, which spreads the data access load across more processors and more I/O connections.
20 6. NAS vs DAS In Direct Attached Storage, storage devices are directly attached to host system. In order access the file data storage in DAS, user must have physical access to the device. The advantage of DAS is it can end user better performance than NAS. The disadvantage of DAS is, each storage device is managed separately, so that will be too complicated to manage whole direct attached storage system.
21 7. NAS vs SAN SAN and NAS seem similar, because both of them using internet technology to ensure the user can easily excess and manage their storage data. However, they are two different storage technologies.
22 7. NAS vs SAN Difference 1. The high performance storage SAN is divided and allocated to individual servers. Users and applications can only access storage through allocated server. Because The Fibre Channel protocol delivers SCSI commands between the server and the SAN s hard disk system, so it presents as hard disk to servers. However, NAS is connected to all the desktop, workstations and servers on the standard Ethernet. Because NAS provide data access to clients through a file system layer such as Network File System (NFS), so it presents as file servers to client servers.
23 7. NAS vs SAN Difference 2. SAN uses it specific network standard such as Fibre Channel. SAN has its own dedicated switches, cables and protocol. NAS storage devices use the standard Ethernet network, instead of requiring special Fibre Channel network, switches, and cables, NAS is much cheaper than SAN storage system.
24 7. NAS vs SAN Difference 3. The final difference, which is also the key distinction between SAN and NAS is that the Storage Area Network manage I/O requests based on block level, whereas the Network Attached Storage manage I/O requests based on file level. So SAN has lower latency and higher performance than NAS.
25 7. NAS vs SAN (File-level vs Block-level) Block-level storage: the block-level storage is a type of storage, each block in the blocklevel storage system is controlled as the individual hard drive, and each block is managed by the server operating system. The protocol usually is used in block-level storage is iscsi, and Fibre Channel. File-level storage: the file-level storage is a storage technology which usually is used in Network Attached Storage. In file-level storage system, each file and folder can be accessed and managed by the storage system itself. However the smaller storage block which consists of the files and folders cannot be directly controlled. The file-level storage system is simple to implement. And the protocol usually is used in file-level storage is Network File System (NFS).
26 7. NAS vs SAN (File-level vs Block-level) Difference 1. With block level storage, each block can be controlled as an individual hard drive, and the blocks is controlled by the server-based operating system. With file level storage, the files and folders can be accessed and managed by the storage system itself in file-level storage (in the network attached storage, these files and folders are controlled by file server(s)). However, the file level storage system usually is disable to manage the smaller storage blocks which consist the files and folders.
27 7. NAS vs SAN (File-level vs Block-level) Difference 2. The block level storage is the interaction between the system (the allocated server) and storage devices such as disk drive or tape drive. It requires the precise commands that where and how data (block data) is to be located (stored). The file level storage is the interaction between the client server and file server. The client does not care about how and where data is to be located, they just need the file s name.
28 8. The future of NAS (hybrid NAS/SAN) It is also called the Unified Storage that support both filed based network attached storage and block based storage area network. Unified storage allows facilities to consolidate their storage by using either IP or Fibre Channel protocol.
29 8. The future of NAS (hybrid NAS/SAN) Type 1. Some unified storage system layer the file based network attached storage on the top of SAN storage, which provides the block level access.
30 8. The future of NAS (hybrid NAS/SAN) Type 2. Another unified storage system modified NAS to allow block level access through iscsi.
31 9. Network File System Definition The Network File System (NFS) is a client/server application that allows user access, view, store, and update file on a remote client computer through the network in a similar way to local file system.
32 10. NFS Architecture The server implements the shared file system to the attached clients. The clients implement the user interface to the shared file system.
33 11. Network File System Layer VFS: virtual file system switch NFS: network file system RPC: remote procedure call XDR: external data representation TCP: transmission control protocol
34 11. Network File System Layer Virtual file system switch (VFS): is an abstraction layer on the top of a more concrete file system. the VFS support client to access the different type of concrete file system in a uniform way. The VFS is a kernel software layer which process all system call that related to the file system. The VFS provides a common interface to the different file systems, in other word, it is a kind of contract between kernel and concrete file system. The VFS is used to determine which storage that a request is intended for, and which file system should be used to satisfy the request.
35 11. Network File System Layer Network file system (NFS): when the request is found to be related with NFS, VFS will pass it to the NFS within the kernel. Then the VFS will translate the I/O request into an NFS procedure (such as open, access, create, read, remove ). Once a particular NFS procedure is selected from the I/O request, it will be performed by the Remote Procedure Call (RPC) layer.
36 11. Network File System Layer Remote Procedure Call (RPC): is a technology used to process procedure call or exchange message between systems. RPC manages NFS request and sends them to the appropriate remote server, and then tracks and manage the response
37 11. Network File System Layer Four value is defined on RPC service: 1. The program number, 2. The version number of the RPC protocol (different version umber of RPC protocol has different Call Name collection), 3. The procedure number (usually assigned sequentially), 4. UDP or TCP transport protocol. The program is the collection of procedures. Each program has its specific number, for example NFS is a program with program number
38 11. Network File System Layer External Data Representation (XDR) protocol: the XDR is layered within the RPC. XDR is concerned with converting data types to the same representation before being sent, and reconverted data once they are received.
39 11. Network File System Layer Transmission Control Protocol (TCP): once XDR converted data to the same representation, the requested would be transmitted over network by follow Transmission Control Protocol (TCP) which is a kind of Transport Layer. TCP keeps track of the orders of information and resend the missed data.
40 11. Network File System Layer IP: the network layer is concerned with getting the data from one host to the other on the network. The IP layer is used to implement it. IP must get the correct destination address. But it doesn t care about data reliability and data order.
41 11. Network File System Layer Network: is a physical layer to control data transmission.
42 11. Network File System Layer Once the request is received by TCP/IP. The request would flow up the network stack through RPC/XDR and until NSF server. Then the request is sent to daemon, which identifies the target file system, and VFS is again used to get the file system in the local storage.
43 12. NFS Protocol The operation form the client to NSF sever is called mount. Mount represents mounting a remote file system into the local file system. This process begins as a call to mount, which is routed through the VFS to NFS. After establishing the port number for the mount, the client performs an RPC mount request. This client request will be checked by special daemon by against the server s file exported file system, if the requested file system exists and has been accessed, an RPC mount reply would establish the file handle for the file system. The client side stores the remote mount (file system) information with the local mount point and establishes the ability to perform I/O requests.
45 13. NFS Design Feature Inodes: inodes contains a unique ID number which is used to record the file information. Each file or directory has its own specific individual inode. And the inode contains the following informatins: 1. Inode number; 2. File name; 3. File size and type; 4. Data and time of creation, modification, and access; 5. Date and time of inode modification; 6. File security information; 7. Number of links; 8. Block map, with pointers to the data blocks that make up file.
46 13. NFS Design Feature File Naming: the file naming rule that is used to NFS clients request 1. File names is not allowed to beyond 255 characters; 2. < > : / \ is not permitted characters;
47 13. NFS Design Feature File Permission: each file has a set of file permission that can be sued to determine who can access the file, and what they can do.
48 13. NFS Design Feature File Locking: allows a process can access a certain file or prat of a certain file exclusively. For the client, if client is crashed, it would release the lock, so after restart the client, it should reclaim the lock to the server. For the server, if the server is crashed, it would restore the lock status to the previous condition once it is restarted. Moreover, when a file is lock, the buffer cache is no longer used for that file. Every write request can be immediately sent to the server.
49 13. NFS Design Feature File Caching: is used to store the frequently used information (file or file block) in quickly access memory. For example: the UNIX buffer cache is a part of the system memory, it is used to store the file block information that have been recently referenced. In NFS, file caching is use to the client to eliminate the RPC requests over the network.
50 14. Benefit of NFS Network File System makes it possible that different computer architecture with different operating system can share fie system across a network. Because NFS is defined as an abstract file system model instead of an architecture specification, so NFS environment can be implemented on different operating system. Each operating system can apply NFS model to its own file system semantics.
51 14. Benefit of NFS The benefits of NFS as following: 1. Enables multiple clients/users access the same files simultaneously 2. Reduces storage cost by share files(data) through network instead of using local disk 3. Provides data consistency and reliability 4. Makes mounting of files transparent to clients (users) 5. Makes accessing remote data transparent to the clients(user) 6. Supports different operating system 7. Reduces system administration overhead
52 15. NFS Version (Version 2,3,4) Version 2 Version 2 is the first NFS protocol version we use. Version 2 continues to be available on a variety platforms after it is released. And it originally only can be operated over UDF instead of TCP.
53 15. NFS Version (Version 2,3,4) Version 3 Version 3 is the optimized version based on version 2. The version 3 protocol must be running on both NFS server and clients, which improved its interoperability and performance. 1. Version 3 can process files that are larger 2 Gage bytes than version Version 3 allow server to cache client write requests in memory (support the asynchronous writes on server), the client doesn t need to wait server writes changes to disk, so it improved the response time. 3. Moreover, version 3 also allowed server to batch the requests, which improves the server response time.
54 15. NFS Version (Version 2,3,4) 4. Version 3 stores the returned file attributes in the local cache, which decreasing the number of RPC calls to the server and improving performance. 5. The file access permission was improved in version 3. In version 2, it usually generates a write error or read error message when user tried to copy a remote file without permission. However, version 3 implements permission check before the file is opened, so the error is reported as an open error. 6. Version 3 remove the 8-kbyte transfer size limitation. The transfer size is decided by both clients and server.
55 15. NFS Version (Version 2,3,4) Version 4 1. Version 4 protocol represents the user ID and group ID as string. 2. With version 4, when user un-share a file system, all the state for any open files or file locks in that file system will be destroyed. 3. Unlike version 2 and version 3 s sever return persistent file handles, version 4 supports volatile file handles, which means once the file handle is changed, the client must find the new file handle (the file handle is the collection of files and directories information.)
56 16. RDMA Unlike UDP and TCP, RDMA (Remote Direct Memory Access Protocol) is a new technology used for memory to memory transfer data over high-speed network. One improvement of RDMA is it can transfer data directly to and from memory without CPU intervention. Moreover, RDMA support data placement, which eliminates the data copies.
57 16. RDMA The relationship between RDMA with other protocol such as TCP and UDP. After XDR encodes the message information, RPC would use UDP/TCP/or RDMA to transport the message between clients and server. Even one of these protocol is not available, RPC still can use the other available protocol to transmit message.
58 17. NFS Security Several approaches used to secure the NFS access. 1. NFS uses RPC to allow client and server exchange message. The RPC is secured by providing a DES Authentication (a kind of authentication method). Through this method, every RPC message may be optionally authenticated.
59 17. NFS Security 2. Client and server can through exchanging the timestamp to authenticate each other, where the timestamp is encrypted using DES encryption scheme. To complete authentication: both client and server must agree to a common time, must have the same encryption key; and must securely store it for each user.
60 17. NFS Security 3. Even authentication ensures the identity of client and server, it still doesn t mean the file is protected well during the transmission. So the transmission section also should be protected by encrypting it using the common encryption key.
61 Part A Review 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability & Fault Tolerance & Scalability, Data Security, and Data Migration). 5. The challenges of NAS. And how do we handle these problems? 6. Compare NAS and DAS (Directly Attached Storage). 7. Compare NAS and SAN (Storage Area Network). - File level storage vs Block level storage. 8. The future of NAS.
62 Review Part B 9. Network File System definition 10. NFS Architecture 11. Network File System layer 12. NFS Protocol 13. NFS Design feature 14. Benefits of NFS 15. NFS version 16. New Technology RDMA (Remote Direct Memory Access Protocol) 17. NFS Security
63 Reference David H. C. Du, Recent advancements and future challenges of storage system, Vol. 96, No. 11, Nov 2008, pp https://technet.microsoft.com/en-us/library/cc aspx
Network File System (NFS) Pradipta De email@example.com Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
Data Storage 101 Data Storage 101 In this guide, we will explain the differences between:» DAS (Direct Attached Storage)» JBOD (Just a Bunch Of Drives)» NAS (Network Attached Storage)» SAN (Storage Area
DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain
Selling Compellent NAS: File & Block Level in the Same System Chad Thibodeau Agenda Session Objectives Feature Overview Technology Overview Compellent Differentiators Competition Available Resources Questions
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), ISSN 0976 & 6375(Online) TECHNOLOGY Volume 4, Issue (IJCET) 3,
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing
High Performance Computing Course Notes 2007-2008 2008 High Performance Storage Storage devices Primary storage: register (1 CPU cycle, a few ns) Cache (10-200 cycles, 0.02-0.5us) Main memory Local main
Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly
Dec. 3 rd 2013 Advanced Knowledge and Understanding of Industrial Data Storage By Jesse Chuang, Senior Software Manager, Advantech With the popularity of computers and networks, most enterprises and organizations
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
IBM Global Technology Services September 2007 NAS systems scale out to meet Page 2 Contents 2 Introduction 2 Understanding the traditional NAS role 3 Gaining NAS benefits 4 NAS shortcomings in enterprise
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily
Data Center Design & Virtualization Md. Jahangir Hossain Open Communication Limited firstname.lastname@example.org Objectives Data Center Architecture Data Center Standard Data Center Design Model Application Design
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses
E4 UNIFIED STORAGE powered by Syneto THE E4 UNIFIED STORAGE (US) SERIES POWERED BY SYNETO From working in the heart of IT environment and with our major customers coming from Research, Education and PA,
Phone: (603)883-7979 email@example.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
The Wide Spread Role of 10-Gigabit Ethernet in Storage This paper provides an overview of SAN and NAS storage solutions, highlights the ubiquitous role of 10 Gigabit Ethernet in these solutions, and illustrates
Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
STORAGE STORAGE MEDIA independently from the repository model used, data must be saved on a support (data storage media). Arka Service uses the most common methods used as market standard such as: MAGNETIC
White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current
Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached
Operating Systems: Internals and Design Principles Chapter 12 File Management Seventh Edition By William Stallings Operating Systems: Internals and Design Principles If there is one singular characteristic
Storage Architecture Choice, SAN or NAS LaNet Merrill SGI SAN & HA Product Marketing Manager storage elements and computer systems so that data transfer is secure and robust." Unlike the traditional direct-attach
NETWORK STORAGE AND ITS FUTURE 1 S.MOHANTY, 2 P.NAYAK, 3 S. BISWAS Institute of Technical Education and Research SIKSHA O ANUSANDHAN UNIVERSITY 1 firstname.lastname@example.org, 2 email@example.com, 3 firstname.lastname@example.org
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
Ultra-Scalable Storage Provides Low Cost Virtualization Solutions Flexible IP NAS/iSCSI System Addresses Current Storage Needs While Offering Future Expansion According to Whatis.com, storage virtualization
using XenData Software XenData software manages data tape drives, optionally combined with a tape library, on a Windows Server 2003 platform to create an attractive offline storage solution for professional
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
Moving Virtual Storage to the Cloud White Paper Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage www.parallels.com Table of Contents Overview... 3 Understanding the Storage
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller
COMPTIA SERVER+: The Server+ course is designed to help the student take and pass the CompTIA Server+ certification exam. It consists of Book information, plus real world information a student could use
SAN vs. NAS: The Critical Decision Executive Summary The storage strategy for your organization is dictated by many factors: the nature of the documents and files you need to store, the file usage patterns
QUASICOM Private Cloud Backups with ExaGrid Deduplication Disk Arrays Martin Lui Senior Solution Consultant Quasicom Systems Limited Protect Data...... in the Cloud 1 Mobile Computing Users work with their
Moving Virtual Storage to the Cloud Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage Table of Contents Overview... 1 Understanding the Storage Problem... 1 What Makes
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
List of Figures and Tables FIGURES 1.1 Server-Centric IT architecture 2 1.2 Inflexible allocation of free storage capacity 3 1.3 Storage-Centric IT architecture 4 1.4 Server upgrade: preparation of a new
iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,
High Performance Server SAN using Micron M500DC SSDs and Sanbolic Software White Paper Overview The Micron M500DC SSD was designed after months of close work with major data center service providers and
XOR MEDIA CLOUD AQUA Big Data and Traditional Storage The era of big data imposes new challenges on the storage technology industry. As companies accumulate massive amounts of data from video, sound, database,
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
DAS to SAN Migration Using a Storage Concentrator April 2006 All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to
Poster Companion Reference: Hyper-V and Failover Clustering Introduction This document is part of a companion reference that discusses the Windows Server 2012 Hyper-V Component Architecture Poster. This
Private Cloud Storage for Media Bang Chang Vice President, Broadcast Servers and Storage email@example.com Table of Contents Introduction Cloud Storage Requirements Application transparency Universal
Chapter 1: Networking with Microsoft Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter
ABSTRACT Paper SAS6760-2016 Architecting Your SAS : Networking for Performance Tony Brown and Margaret Crevar, SAS Institute Inc. With the popularity of network-attached storage for shared file systems,
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
Simple, Reliable and Affordable Vess Family Overview VessRAID FC RAID Storage Systems Fiber Channel s dominance for applications requiring high substantial bandwidth in the market still remains high as
Distributed Systems REK s adaptation of Prof. Claypool s adaptation of Tanenbaum s Distributed Systems Chapter 1 1 The Rise of Distributed Systems! Computer hardware prices are falling and power increasing.!
Cisco Virtual Wide Area Application Services: Technical Overview What You Will Learn Organizations are offering private and virtual private cloud-based application delivery over the WAN to their end users
Evaluating Storage Technologies for Virtual Server Environments Russ Fellows June, 2010 Technology Insight Series Evaluator Group Copyright 2010 Evaluator Group, Inc. All rights reserved Executive Summary
Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time
Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers
THE CLOUD STORAGE ARGUMENT The argument over the right type of storage for data center applications is an ongoing battle. This argument gets amplified when discussing cloud architectures both private and
POWER ALL GLOBAL FILE SYSTEM (PGFS) Defining next generation of global storage grid Power All Networks Ltd. Technical Whitepaper April 2008, version 1.01 Table of Content 1. Introduction.. 3 2. Paradigm
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
Contingency Planning and Disaster Recovery Best Practices Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................
Analysis from The Wikibon Project September 2011 Business Case for Unified Storage Consolidation for Microsoft Windows Installations Author: David Floyer A Wikibon Reprint Business Case for Unified Storage
STORAGE CENTER WITH STORAGE CENTER DATASHEET THE BENEFITS OF UNIFIED AND STORAGE Combining block and file-level data into a centralized storage platform simplifies management and reduces overall storage
How to Backup and Restore a VM using Veeam Table of Contents Introduction... 3 Assumptions... 3 Add ESXi Server... 4 Backup a VM... 6 Restore Full VM... 12 Appendix A: Install Veeam Backup & Replication
Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator
Cloud and Virtual Data Storage Networking Your journey to efficient and effective information services Greg Schulz CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of
ETERNUS CS High End Unified Data Protection Optimized Backup and Archiving with ETERNUS CS High End 0 Data Protection Issues addressed by ETERNUS CS HE 60% of data growth p.a. Rising back-up windows Too
Introduction to Gluster Versions 3.0.x Table of Contents Table of Contents... 2 Overview... 3 Gluster File System... 3 Gluster Storage Platform... 3 No metadata with the Elastic Hash Algorithm... 4 A Gluster