SlideShare a Scribd company logo
1 of 47
Advanced Technical Support, Americas
© 2012 IBM Corporation
Network Attached Storage
The Basics
Norman Bogard
Advanced Technical Support, Americas
© 2012 IBM Corporation
Agenda
 Origins of Network Attached Storage
 Terminology
 Data Transfer: Block versus File
 Converged Storage
 NAS Techniques
 Additional Resources
 A note of thanks for input from
– Brett Cooper
– Nils Haustein
2
Advanced Technical Support, Americas
© 2012 IBM Corporation
Origins of Network Attached Storage (NAS)
 Ethernet was invented in 1973
– By Robert Metcalfe of Xerox
– First paper on Ethernet didn’t come until 1976
 In the early 1980’s Newcastle University demonstrated remote
file access with UNIX systems
 In 1983 Novell’s NetWare Core Protocol (NCP) was released
 In 1983 Barry Feigenbaum of IBM invented Server Message
Block (SMB)
– Foundation of the Common Internet File System (CIFS) {1996}
 In 1984 Sun Microsystems released the Network File System
(NFS)
 The 1990’s saw the beginning of dedicated NAS devices
3
Advanced Technical Support, Americas
© 2012 IBM Corporation
Origins of NAS Continued
 By late 1991 the HyperText Transfer Protocol (HTTP) &
Hypertext Markup Language (HTML) were defined
– HTTP is now often referred to as Representational State
Transfer (REST)
• REST is the foundation of cloud based storage services like
Amazon’s S3
 NAS is always Client / Server based
– Appliance (file server) is the server
– End systems, like workstations or application servers, are the
clients
 1992 saw the beginning of Samba
– Samba gets it’s name from SMB & grep -i '^s.*m.*b'
– Samba integrates NFS & CIFS so files can be shared by both
4
Advanced Technical Support, Americas
© 2012 IBM Corporation
Terminology
 Block: Leverages Small Computer System Interface (SCSI) commands to
read-write specific blocks
– Common SCSI access methods include Fiber Channel (FC), Internet Small
Computer System Interface (iSCSI), or InfiniBand (IB)
• IB is a high speed network interconnect
 NAS: reads/writes files
 File Server: A storage server dedicated (primarily) to serving file-based
workloads
 NAS Gateway: A server that provides network-based storage virtualization
– Provides protocol translation from host-based CIFS/NFS to Storage Area
Network (SAN) based block
– Examples: IBM N series & SONAS; NetApp V Series; EMC VNX/Celerra;
OnStor (LSI); HP P4000 Unified Gateway
 Unified Storage – a single logical, centrally managed storage platform that
serves both block (FC, iSCSI, IB) and file-based (CIFS, NFS, HTTP, etc.)
workloads
– Examples: IBM N series; NetApp V series; & IBM Storwize V7000 Unified
5
Advanced Technical Support, Americas
© 2012 IBM Corporation
Comparing SAN & NAS
6
* Internet Protocol / User Datagram Protocol
*
Advanced Technical Support, Americas
© 2012 IBM Corporation
Block vs File
7
Block Level Storage devices / SAN
(i.e. V7000, DS8000, XIV)
● Provide access to equal sized blocks of storage
● Blocks are found by a number on a device
● Read and Write operations on data blocks –
mainly SCSI protocol
● Block Services segmented into LUNs or vDisks –
usually a few dozen
● Connections to the device in the order of 10-100
● Authorization for generic access by host (10-100)
● Almost no coordination of concurrent access to
these LUNs (other than SCSI protocol device
reservation)
NAS devices
(i.e. N series, SONAS, or V7kU)
● Provide access to files
● Files are found by a name within a tree of names
● Read, Write, Create, Delete and many more –
CIFS, NFS, FTP and other protocols
● Device Services exposed as Exports, Directories,
Files – a few hundred, millions, billions
● Connections can be in the order of 100-10.000s
● Authorization by User ID – for Reads, Writes, Meta-Data operations
● Coordination of concurrent access with Share
Modes and leases/delegations (on whole files),
byte range locks (fragments within files) –
within a protocol (ie CIFS) and across protocols
(i.e. between CIFS and NFS)
Advanced Technical Support, Americas
© 2012 IBM Corporation
Data Transfer: Block versus File
 The key to understanding the difference between
block and file data is the file system owner
8
STORAGE
APPLICATION
Storage Area Network
(SAN)
FC, iSCSI, or IB
NETWORK
FILE SYSTEM
STORAGE
APPLICATION
FILE SYSTEM
Direct Attached Storage
(DAS)
STORAGE
NETWORK
APPLICATION
FILE SYSTEM
Network Attached Storage
(NAS)
IP: CIFS, NFS, Etc.
Advanced Technical Support, Americas
© 2012 IBM Corporation
Converged Storage (Unified Storage)
 Two fundamental approaches to intermixing block &
file storage within a single system
– IBM’s N series uses block on file
• A device file with a Logical Unit Number (LUN) assigned to it
is stored within the file server’s Write Anywhere File Layout
(WAFL) file system and then mapped to a host
• File & block data are stored within the same file system
– IBM’s Storwize V7000 Unified (V7kU) uses file on block
• A raw device from the V7k is mapped to hosts
• File data is contained within discrete devices
• Host block data is contained within discrete devices
• File & block data are stored independently
9
Advanced Technical Support, Americas
© 2012 IBM Corporation
10
Internal
Disks
Mapped LUN = File File Share
File Server
(WAFL File System)
Internal
Disks
SAN
Block-on-File
(N series)
File-on-Block
(V7kU)
FC, iSCSI CIFS, NFS
File Modules
(GPFS)
V7kU
Block Devices
FC, iSCSI Mapped LUN CIFS, NFS
SAN
Advanced Technical Support, Americas
© 2012 IBM Corporation
Block vs File – High Level Application Affinity
 Applications/data types that typically reside in block stores:
– RDBMS (Oracle, SQL Server, DB2)
– Analytics (stream processing)
– OLTP
– Metadata Layers (component of content management)
– Email (MS Exchange, Notes)
– Virtualization Stacks (VMware: VDI, VMDK implementations; HyperV; Citrix Xen)
 Applications/data types that typically reside in files:
– Rich Media (pictures, videos, seismic data, medical imaging, etc.)
– VOD, AOD, IPTV
– Analytics (SAS grid)
– ECM (Enterprise Content Management – e.g., web stores)
– Research Data Sets
– User files (documents, etc.)
– PLM/PDM (Product Lifecycle/Data Management)
– Virtualized Environments (VMware client-driven deployment)
11
Advanced Technical Support, Americas
© 2012 IBM Corporation
The Enterprise Workload Landscape… What Fits Where?
Application Workload Class
LEAD
WITH
Comments
Oracle DBMS B (F) For larger (>20TB) instances, lead with XIV
eBusiness Suite B (F)
SAP OLTP B OLTP/BASIS
BWH F (B) Analytics
Content Mgt.
Filenet, Documentum,
etc. F Metadata layer may be block/RDBMS
Media Streaming VOD, AOD, IPTV F Very performance/latency sensitive; also potential for tape/LTFS
MS Exchange 2010 B Strong ESRP results for both V7K & XIV
2003/2007 B
Lotus Notes B (F) Back end is DB2 database; predominantly block
VMware Virt. Infrastructure B (F) Block: mature (also XIV); File: emerging (MS HyperV – block only)
VDI B / F
IBM DB2 RDBMS B
SAS Analytics B / F Block: mid-range, File: grid; XIV certified & strong; V7KU TBD
PACS/EMR Imaging F Ex.: Cachet Database
Prod. Workflow B / F “Front Office” OLTP: block; Patient archives: file
B: Block; F: File
12
Advanced Technical Support, Americas
© 2012 IBM Corporation
Data Protection: File vs Block - Concept
STORAGE
NETWORK
APPLICATION
FILE SYSTEM
STORAGE
APPLICATION
NAS
(Network Attached Storage)
SAN
(Storage Area Network)
NETWORK
FILE SYSTEM
• Generally
snapshots are
consistent
since the file
system is
consistent on
the NAS System
• Replication is
supported
• NDMP is
leverages
snapshots and
dumps files to
tape
• Integrated
with most
leading
backup
software
• Snapshots
require
integration with
the host file
system and
application to
ensure
consistency
• Backups are
done by moving
blocks through
a master-media
server to
disk/tape
• Replication is
supported once
file system is
consistent
• Acts just like
Direct Attached
Storage
13
Advanced Technical Support, Americas
© 2012 IBM Corporation
Integration points for NAS protocols with
applications
 NAS applications historically have required very little if any
integration with host applications
– Many NAS vendors now provide Application Programming Interfaces (APIs) to
integrated with leading host applications such as Vmware
• Provides seamless movement and recovery of virtual machines through replication
 Many third party management solutions support NAS integration to
discover and manage the storage, including our own Tivoli
Productivity Center (TPC)
 Microsoft Windows Server Applications such as Microsoft
Exchange Server and Microsoft SQL Server do not support NAS
shares for data placement
– These applications require block storage
14
Advanced Technical Support, Americas
© 2012 IBM Corporation
NAS Techniques overview
 File systems
 File shares
 Network services
 Authentication and authorization
 Quota
 Data availability
 Date protection (snapshot, backup, NDMP,
replication)
 Anti virus support
 Information Lifecycle Management
 File cloning
15
Advanced Technical Support, Americas
© 2012 IBM Corporation
File systems and file-sets
 File shares are exports to the user or
application
 User files are organized and stored in file
systems
– File system is local to the NAS system
 File-sets allow for breaking down the file
system space in smaller manageable
units
– Certain operations can be configured for
file-sets such as replication, snapshots,
and quota-management
 Pools allow placement and migration of
files to different cost storage devices
16
NAS System
File-set
(optional)
File System
Pool
(optional)
Share
NFS, CIFS, HTTP, FTP, …
Share
Storage Storage
Pool
(optional)
Pool
(optional)
File-set
(optional)
File-set
(optional)
Advanced Technical Support, Americas
© 2012 IBM Corporation
File shares
 File share is a user file system provided by the file server
– Allow users and groups to share files in a common name space
– Access permissions can be given based on user and group
names
 Typical file sharing protocols are CIFS and NFS
17
 CIFS share is exported under share-
name (usershare) which is mounted by
the user
 NFS share is exported as directory
(/shares/nfs) which is mounted by the
user (as mnt/userdata)
CIFS
Directory: /shares/cifs
Sharename: usershare
Mounted as CIFS share:
filerusershare
File Server
Share
NFS
Directory: /shares/nfs
Mounted as NFS share:
Filer:/shares/nfs /mnt/userdata
File Server
Share
Advanced Technical Support, Americas
© 2012 IBM Corporation
File shares and TCP/IP address failover
 NFS is state-less
– Upon TCP/IP address failover NFS client experiences a short interruption
– I/O continues when TCP/IP connection is available, no re-connection required
• Even though NFS v4 is state-full, durable file handles eliminate the need for a re-
connection
 CIFS is state-full
– Upon TCP/IP address failover CIFS client looses connection
– File share must be reconnected (mounted) before I/O can continue
– Additional tools can be used to automate reconnection (e.g. DFS)
18
Clustered File Server with two file modules
NFS Client connected to module 2 CIFS client
Module 2:
10.10.10.2
Module 1:
10.10.10.1 X
10.10.10.2
Requires reconnect!
I/O continues
Advanced Technical Support, Americas
© 2012 IBM Corporation
Network services
 Network Time Protocol (NTP) is used to synchronize the time
between components (File Server, directory server)
– Very important for authentication services with kerberos and clustered
NAS
 Domain Name Service (DNS) is used to resolve names and IP
addresses
– Required for active directory authentication
– DNS round robin can be used for load balancing
 DNS round robin sequentially selects IP addresses
19
File Server.storage.com
Client 1 Client 2 DNS server
File Server.storage.com
10.10.10.1
10.10.10.2
10.10.10.3
10.10.10.4
Module 2:
10.10.10.2
10.10.10.4
Module 1:
10.10.10.1
10.10.10.3
Advanced Technical Support, Americas
© 2012 IBM Corporation
Multipathing Solutions for NAS
 Link Aggregation
– Relies on the Transmission Control Protocol/Internet Protocol
(TCP/IP) level integration
• Handled at either the switch port level or at the network layer of the Open
Systems Interconnection (OSI) model
– OSI layer 3
– Commonly Known As: Bonding, Teaming or Trunking
 Logically bonds multiple network paths into a single path
effectively increasing the bandwidth and providing redundant
physical connections in the case of a failure
 Uses round-robin scheduling, or is based on hash values
computed from fields in the packet header, or a combination
of these two methods
– Network load is balanced across all links unless active/passive
mode is chosen
1 GbE
1 GbE
1 GbE
1 GbE
2 GbE
2 GbE
20
Advanced Technical Support, Americas
© 2012 IBM Corporation
Authentication
 Authentication validates a resource – whether it is who it claims to be
– A resource can be a computer, user, or group
 Authentication can be done local within the file server
– Local authentication of users requires the user to be configured in the file
server
• This does not scale is not manageable because every user must be configured in
every file server
• Only works in small environments
21
 Authentication can be done remote with a
directory server
– Directory server contains names, profile information,
and machine addresses of every user and resource
on the network
• It is used to manage user accounts and network
permissions
– Upon user access the file server validates user
credentials with the directory server
– Directory servers are Active Directory, LDAP, etc.
NAS file server
User
Directory
server
1. Connect
with
credentials
3. Grant
access
2.Validate
user
Advanced Technical Support, Americas
© 2012 IBM Corporation
Authentication processing
22
Clients
w/o Kerberos
file server
Authentication
Server
with
Kerberos
KDC
1. User Auth. Request
4. Response
2. verify Auth. Request
3. Response
Clients
with Kerberos
1. User Auth. Request
2. Granted Kerberos Ticket
3. Kerberos Ticket
4. Response
Advanced Technical Support, Americas
© 2012 IBM Corporation
Authentication by protocol
 Authentication for NFS is based on host names or IP addresses
– Allowed host-names are typically configured on a per-share basis
– Network Information Service (NIS) can be used to group host-names
• Allows single point of maintenance for host-groups
– NFS also supports user authentication via Kerberos
 Authentication for CIFS is based on Security Identification (SID)
– Each resource within a domain has a unique SID
– SIDs are known to the directory server
– Authentication process validates SID with directory server
23
Client
Directory
Server
Advanced Technical Support, Americas
© 2012 IBM Corporation
 Authorization validates access permissions of user/group to directories/files
– Each shared file and directory has access permission
 Access permissions are also called Access Control Lists (ACL)
– In Unix (NFS) access permissions are simple: r-w-x for owner, group, others
– In Windows the ACLs are more complex
•One user can be in multiple groups
•ACLs include change, append and attribute operation permissions
Authorization
Name ACL Owner Group
Myfile.txt rwx r-- --- MIA root
24
Share
User: MIA
Group: Users
 Upon file access the file server matches user credentials
against file-ACL and validates the level of access for the
user
– ACLs can be inherited from parent folders
 Authorization takes place after authentication
Advanced Technical Support, Americas
© 2012 IBM Corporation
Quota
 Quotas are used to restrict certain aspects of the file system
(share) usage:
– Capacity
– Number of files
 Set by the administrator for specific user, group, file system, or file-
set
 Hard-quota: when reached writing files is denied
 Soft-quota: user or administrator may get a warning, but can
continue to store files
– Grace period may start during which the user can continue to store
files
– When a hard-quota is reached, the user cannot store anymore files
25
Advanced Technical Support, Americas
© 2012 IBM Corporation
Data availability techniques
26
Disk System
(RAID)
File system
(Replication, striping)
Replication, Data striping
Storage network
(Redundancy)
Redundant storage networks
RAID protection on disk subsystem
NAS services
(cluster)
Clustered NAS services
NAS Protocol
NAS System
Advanced Technical Support, Americas
© 2012 IBM Corporation
Data protection
Against what must the data be protected ?
 Techniques to protect against operational errors (changes,
deletion, virus)
– Snapshots
– Backup
 Techniques to protect against disaster (complete failure of
computer center)
– Replication / Mirroring
– Backup
27
Advanced Technical Support, Americas
© 2012 IBM Corporation
Snapshots
 Snapshots freeze the state of a file system or subset at a
certain point in time
– Data resides in the same file server
 Snapshots are typically space efficient
– At the time of the snapshot almost no capacity is consumed
– Changes in the file system cause snapshots to grow
 Snapshot management
– Snapshots can be scheduled by date and time
– Snapshots can be deleted automatically based on rules
 Snapshots can be mounted and accessed by users
– Read-only, no changes allowed
 Snapshot are used to recover deleted or changed files
 Also used for other background operations (backup,
replication, etc.)
28
Snap
File system Snapshot
Advanced Technical Support, Americas
© 2012 IBM Corporation
Backup and Recovery Techniques
Backup from shares Integration in file server
Backup client runs on every user
workstation or on dedicated server(s)
–Backs up the files in the file system
 Dedicated servers provide more
scalability
Recovery can be done by the backup
client
–Can be done by user
General concern: long file scan time
Backup clients run on file server
–Backs up files from file systems
Leverage fast scan process
Recovery can be done by the backup
client internally to the file server
–Usually administrative effort
29
User Dedicated
Backup client(s)
Backup
Server
BR client
BR client
Share
File Server
User
Backup
Server
Share
BR client
File Server
Advanced Technical Support, Americas
© 2012 IBM Corporation
Backup & Recovery considerations
 Typically full, differential and incremental backups are supported
– Full: entire file system or share
– Differential: all changes since last full backup
– Incremental: all changes since last full or differential backup
 Typical requirements
– Backup window: depends on number of files and speed of identification process
– Recovery time: depends on number of files to be recovered and backup medium
– Recovery point: depends on frequency of backups
 Scalability of backup and recovery depends on:
– Number of parallel backup clients
– Network and storage medium
– Scan time
 Use file level backup to recover files or subset of files
 Full system recovery (disaster) may take a long time because restore is typically
on a file level
– Consider other techniques for disaster recovery (replication, etc.)
30
Advanced Technical Support, Americas
© 2012 IBM Corporation
Network Data Management Protocol
31
file server
NDMP Client
NDMP
Backup
Server
(Source: „Storage networks explained“,
Troppens et al, John Wiley & Sons, Ltd, 2009)
 Standardized protocol facilitating backup and recovery for NAS server
 Comprises three services:
– Data service: performs the backup and recovery operation in the NAS server
– Tape service: writes and reads data to the backup storage medium (disk or
tape)
– Data management service (DMA): controls backup and restore operations and
NDMP data movement
Advanced Technical Support, Americas
© 2012 IBM Corporation
NDMP Backup Functions
 Files are backed up in NDMP data stream to tape service
– Streaming provides higher performance
– Meta information is passed to DMA
 NDMP supports full and incremental backup for file systems
 NDMP supports file system and file level recovery
– File system recovery is fast because of streaming
– File level recovery is based on “direct access recovery” where the
NDMP client keeps track of position of file within NDMP data stream
 NDMP version 5 supports compression, encryption and
multiplexing
 Recovery of entire file systems is faster than with file-level backup
– Instead of single files entire container of files (streams) are recovered
32
Advanced Technical Support, Americas
© 2012 IBM Corporation
NDMP for data migration (copy)
 NDMP can be used for data migration (copy) between file servers
– One file server is the source and runs the data service (DS)
– Another file server is the target and runs the tape service (TS) and data service
– DMA runs externally or on either of the file servers
 Source file server (DS) collects the files and attributes and streams it to
target file server TS
 Target file server receives (TS) the stream and DS unpacks it
 General issue: data format within the NDMP stream is not standardized
33
Source file server Target file server
DS
TS
DS
DMA
Data stream
NDMP Control
Advanced Technical Support, Americas
© 2012 IBM Corporation
Replication / Mirroring
 Copy files from one NAS system to another for disaster protection
 Copy can be done on storage system or file system layer
– File system replication typically allows faster recovery (fail over)
– File system replication is more consistent because it has the
awareness of files
– Storage system replication is typically faster and can also be fully
synchronous on block level
 Typically asynchronous methods are used in a NAS environment
 Multi-side and multi-directional replication scenarios are possible
34
Site 2 Site 3
Site 1
Advanced Technical Support, Americas
© 2012 IBM Corporation
Replication considerations
 Data reduction techniques (compression, de-duplication)
help to overcome replication bandwidth challenges
 Encryption helps to provide secure data transmission
between sites
 Main requirements for disaster recovery
– Recovery time objective: how long does it take to recover from
a disaster
– Recovery point objective: how much data will be lost
 Recovery process typically involves administrative
measures at the target site
– Should be well documented and trained
35
Advanced Technical Support, Americas
© 2012 IBM Corporation
Virus protection
Scanning on file shares Scanner integration
with file server
Scanner in file server
Scanner running on user
workstation has limited
scalability
Dedicated scanner(s) are
more scalable
–Need access to shares
File identification may
become the bottleneck
Leverage integrated file
identification techniques
for bulk file scan
Enables scan on-
demand
–On file access
–After file write
Scales with number of
scanners
Scanner runs in file
server
Leverages integrated file
identification techniques
for bulk file scan
Enables scan on-demand
–On file access
–After file write
Limited scalability and
scanner support
36
User Scan Server(s)
Scanner Scanner
Shares
User
Shares
Scanners
User
Scan Servers
Shares
Scanners
AV
Agent
Advanced Technical Support, Americas
© 2012 IBM Corporation
Tiered storage
 Important Information Lifecycle Management technique
– Initial placement of files on the most appropriate storage medium
– Policy based migration during the lifetime of the files
– Keep the files in the original name space to allow transparent access
 Supports the idea of archiving
– For data at rest which needs to be kept for long periods of time
 Integration of ILM functions in file server provides cost efficiency
– No extra infrastructure required
– Central administration in concert with other functions
37
Automated tiering
file server
Gold Silver Bronce Tape
Performance and Cost
Advanced Technical Support, Americas
© 2012 IBM Corporation
Scale out
 Scale out NAS systems can scale in multiple dimensions
– Horizontally: performance and throughput provided by interface nodes
– Vertically: storage capacity provided by storage systems
 Provide single name-space across multiple processing nodes (interfaces)
 Workload is distributed across the components (interface and storage
nodes)
 Centrally managed and maintained
38
Interface nodes
Storage systems
Performance
Capacity
One global namespace
Advanced Technical Support, Americas
© 2012 IBM Corporation
Traditional NAS vs. Scale Out NAS
39
 Scale performance and capacity with number of
disks and file servers
 Adding file servers leads to fragmented data, hot
spots and underutilized disks
 More complex to manage multiple NAS appliances
 Operational costs grow
ALL FILES
“Scale Out NAS”
Goal of Scale Out NAS:
A few “traditional NAS” challenges:
“Traditional NAS”
file
server
1
File 3
File 2
File 1
Storage
Island
file
server
2
Storage
Island
file
server
3
Storage
Island
Single large ‘virtual’ server
including automated storage tiering
Cluster
Interface
node 1
Interface
node 2
Interface
node 3
Interface
node n
 Scale performance and capacity
independently
– With interface and storage nodes
 Very high aggregate performance through
parallelism
 Greatly simplified management because it
is one system
 Provides operational cost reduction
Advanced Technical Support, Americas
© 2012 IBM Corporation
Multi-tenancy
 Provide file space for multiple tenants
 Example
– Multiple departments / organization in one company
– Multiple customers hosted by service provider
 Requirements
– Separation of networks
– Separation of interface nodes
– Separation of storage
– Separation of administration
– Separation of authentication
– Different protection concepts
– Reporting and chargeback, etc…
 Simple Solution: provide one file server per tenant
– Complex to administrate and to maintain
– More costly due to underutilized disk space and complexity
 Combine multi-tenancy with scale-out NAS
40
User Dept. Client
Backup
Authentication
Antivirus
Advanced Technical Support, Americas
© 2012 IBM Corporation
Multi-tenancy and scale-out
 Scale-out system provides scalability in multiple dimensions
 Scale-out system allows dynamic allocation and de-
allocation of resources
 Scale-out system can be centrally managed and maintained
 Scale-out systems help save cost in a multi-tenant
environment
41
Interface nodes
Storage systems
Namespaces
User Dept. Client
Scale-out Systems
Backup
Authentication
Antivirus
Advanced Technical Support, Americas
© 2012 IBM Corporation
File cloning
 Clone is a writable space efficient copy of an individual file
– Clones ‘point’ back to the parent file
– Only modified blocks from clone are stored
 Parent file is read-only, cannot be modified as long as a clone exists
 Multiple clones of the same file can exist
– Clones of clones are possible as well
 Clones can only be created within the file server
 Use case: Provision virtual machines from the same base image
42
Parent file
(read-only)
Writeable
clone files
Source file
Advanced Technical Support, Americas
© 2012 IBM Corporation
Additional Resources for more information on NAS
 Wikipedia’s Definition of NAS:
– http://en.wikipedia.org/wiki/Network-attached_storage
 InfoStor: NAS Advantages a VARs View:
– http://www.infostor.com/index/articles/display/55961/articles/infostor/volume-2/issue-
4/news-analysis-trends/nas-advantages-a-vars-view.html
 About.com: SAN vs. NAS: What’s the difference?
– http://compnetworking.about.com/od/networkstorage/f/san-vs-nas.htm
 About.com: Introduction to NAS – Network Attached Storage
– http://compnetworking.about.com/od/itinformationtechnology/l/aa070101a.htm
 FreeBSD Handbook: What is NFS?
– http://www.freebsd.org/doc/handbook/network-nfs.html
 CodeFX: CIFS Explained
– http://www.codefx.com/CIFS_Explained.htm
 Wikipedia’s Definition of Samba:
– http://en.wikipedia.org/wiki/Samba_%28software%29
 SearchStorage: Using NAS NFS with VMware ESX Technology Pro’s and Con’s
– http://searchstorage.techtarget.com/tip/Pros-and-cons-of-using-NAS-NFS-with-VMware
– (Requires Account Creation to view)
43
Advanced Technical Support, Americas
© 2012 IBM Corporation
Question and Answer
Advanced Technical Support, Americas
© 2012 IBM Corporation
Question and Answer
Advanced Technical Support, Americas
© 2012 IBM Corporation
Question and Answer
Advanced Technical Support, Americas
© 2012 IBM Corporation
Disclaimers
This information is provided on an "AS IS" basis without warranty of any kind, express or implied, including, but not
limited to, the implied warranties of merchantability and fitness for a particular purpose. Some jurisdictions do not allow
disclaimers of express or implied warranties in certain transactions; therefore, this statement may not apply to you.
This information is provided for information purposes only as a high level overview of possible future products.
PRODUCT SPECIFICATIONS, ANNOUNCE DATES, AND OTHER INOFORMATION CONTAINED HEREIN ARE SUBJECT TO
CHANGE AND WITHDRAWAL WITHOUT NOTICE.
Important notes:
IBM reserves the right to change product specifications and offerings at any time without notice. This publication could
include technical inaccuracies or typographical errors. References herein to IBM products and services do not imply that
IBM intends to make them available in all countries.
IBM makes no warranties, express or implied, regarding non-IBM products and services, including but not limited to Year
2000 readiness and any implied warranties of merchantability and fitness for a particular purpose. IBM makes no
representations or warranties with respect to non-IBM products. Warranty, service and support for non-IBM products is
provided directly to you by the third party, not IBM.
All part numbers referenced in this publication are product part numbers and not service part numbers. Other part
numbers in addition to those listed in this document may be required to support a specific device or function.
MHz / GHz only measures microprocessor internal clock speed; many factors may affect application performance. When
referring to storage capacity, GB stands for one billion bytes; accessible capacity may be less. Maximum internal hard
disk drive capacities assume the replacement of any standard hard disk drives and the population of all hard disk drive
bays with the largest currently supported drives available from IBM.
IBM Information and Trademarks
The following terms are trademarks or registered trademarks of the IBM Corporation in the United States or other
countries or both: the e-business logo, IBM, System Storage, Easy Tier, FlashCopy, and System Storage DS.
Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the
U.S. and other countries.
Intel, Pentium 4 and Xeon are trademarks or registered trademarks of Intel Corporation. Microsoft Windows is a
trademark or registered trademark of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Other
company, product, and service names may be trademarks or service marks of others.
47

More Related Content

What's hot

Personal storage to enterprise storage system journey
Personal storage to enterprise storage system journeyPersonal storage to enterprise storage system journey
Personal storage to enterprise storage system journeySoumen Sarkar
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storagesagaroceanic11
 
11 distributed file_systems
11 distributed file_systems11 distributed file_systems
11 distributed file_systemslongly
 
Pyramid: A large-scale array-oriented active storage system
Pyramid: A large-scale array-oriented active storage systemPyramid: A large-scale array-oriented active storage system
Pyramid: A large-scale array-oriented active storage systemViet-Trung TRAN
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsStorage Switzerland
 
Storage Primer
Storage PrimerStorage Primer
Storage Primersriramr
 
S016826 cloud-storage-nola-v1710d
S016826 cloud-storage-nola-v1710dS016826 cloud-storage-nola-v1710d
S016826 cloud-storage-nola-v1710dTony Pearson
 
Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS) Kshitij Shete
 
S100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cS100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cTony Pearson
 
NAS - Network Attached Storage
NAS - Network Attached StorageNAS - Network Attached Storage
NAS - Network Attached StorageShashank Bhatnagar
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)sagaroceanic11
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageTony Pearson
 
S104873 nas-sizing-jburg-v1809d
S104873 nas-sizing-jburg-v1809dS104873 nas-sizing-jburg-v1809d
S104873 nas-sizing-jburg-v1809dTony Pearson
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NASSpiceworks
 
S104872 spectrum nas-one-day-jburg-v1809e
S104872 spectrum nas-one-day-jburg-v1809eS104872 spectrum nas-one-day-jburg-v1809e
S104872 spectrum nas-one-day-jburg-v1809eTony Pearson
 

What's hot (20)

Personal storage to enterprise storage system journey
Personal storage to enterprise storage system journeyPersonal storage to enterprise storage system journey
Personal storage to enterprise storage system journey
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storage
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
11 distributed file_systems
11 distributed file_systems11 distributed file_systems
11 distributed file_systems
 
Pyramid: A large-scale array-oriented active storage system
Pyramid: A large-scale array-oriented active storage systemPyramid: A large-scale array-oriented active storage system
Pyramid: A large-scale array-oriented active storage system
 
Network data storage
Network data storageNetwork data storage
Network data storage
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be Backups
 
Storage Primer
Storage PrimerStorage Primer
Storage Primer
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
S016826 cloud-storage-nola-v1710d
S016826 cloud-storage-nola-v1710dS016826 cloud-storage-nola-v1710d
S016826 cloud-storage-nola-v1710d
 
Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
Storage Networks
Storage NetworksStorage Networks
Storage Networks
 
S100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cS100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804c
 
NAS - Network Attached Storage
NAS - Network Attached StorageNAS - Network Attached Storage
NAS - Network Attached Storage
 
Storage Basics
Storage BasicsStorage Basics
Storage Basics
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object Storage
 
S104873 nas-sizing-jburg-v1809d
S104873 nas-sizing-jburg-v1809dS104873 nas-sizing-jburg-v1809d
S104873 nas-sizing-jburg-v1809d
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
S104872 spectrum nas-one-day-jburg-v1809e
S104872 spectrum nas-one-day-jburg-v1809eS104872 spectrum nas-one-day-jburg-v1809e
S104872 spectrum nas-one-day-jburg-v1809e
 

Similar to Nas fundamentals

S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5Tony Pearson
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsTony Pearson
 
Network Attached Storage Details enivorments.ppt
Network Attached Storage Details enivorments.pptNetwork Attached Storage Details enivorments.ppt
Network Attached Storage Details enivorments.pptLakshmi101519
 
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705aS014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705aTony Pearson
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdfSamiksha880257
 
S ss0886 pendulum-swings-edge2015-v3
S ss0886 pendulum-swings-edge2015-v3S ss0886 pendulum-swings-edge2015-v3
S ss0886 pendulum-swings-edge2015-v3Tony Pearson
 
HP StorageWorks AiO400 Network Storage Server
	HP StorageWorks AiO400 Network Storage Server	HP StorageWorks AiO400 Network Storage Server
HP StorageWorks AiO400 Network Storage Serverdaten
 
Storage Technology Overview
Storage Technology OverviewStorage Technology Overview
Storage Technology Overviewnomathjobs
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageTony Pearson
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
 
Huawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS OverviewHuawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS OverviewUtopia Media
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?Saroj Sahu
 
Spectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSpectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSandeep Patil
 
Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Trishali Nayar
 
IBM Platform Computing Elastic Storage
IBM Platform Computing  Elastic StorageIBM Platform Computing  Elastic Storage
IBM Platform Computing Elastic StoragePatrick Bouillaud
 
Authenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsPvrtechnologies Nellore
 
Nas and san
Nas and sanNas and san
Nas and sansongaco
 
Authenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems1crore projects
 

Similar to Nas fundamentals (20)

S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged Environments
 
Network Attached Storage Details enivorments.ppt
Network Attached Storage Details enivorments.pptNetwork Attached Storage Details enivorments.ppt
Network Attached Storage Details enivorments.ppt
 
S014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705aS014066 scale-ess-orlando-v1705a
S014066 scale-ess-orlando-v1705a
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
S ss0886 pendulum-swings-edge2015-v3
S ss0886 pendulum-swings-edge2015-v3S ss0886 pendulum-swings-edge2015-v3
S ss0886 pendulum-swings-edge2015-v3
 
HP StorageWorks AiO400 Network Storage Server
	HP StorageWorks AiO400 Network Storage Server	HP StorageWorks AiO400 Network Storage Server
HP StorageWorks AiO400 Network Storage Server
 
Storage Technology Overview
Storage Technology OverviewStorage Technology Overview
Storage Technology Overview
 
IBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object StorageIBM Spectrum Scale for File and Object Storage
IBM Spectrum Scale for File and Object Storage
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Huawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS OverviewHuawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS Overview
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
Spectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSpectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN Caching
 
Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...
 
Cl115
Cl115Cl115
Cl115
 
IBM Platform Computing Elastic Storage
IBM Platform Computing  Elastic StorageIBM Platform Computing  Elastic Storage
IBM Platform Computing Elastic Storage
 
Authenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systemsAuthenticated key exchange protocols for parallel network file systems
Authenticated key exchange protocols for parallel network file systems
 
Nas and san
Nas and sanNas and san
Nas and san
 
Authenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File SystemsAuthenticated Key Exchange Protocols for Parallel Network File Systems
Authenticated Key Exchange Protocols for Parallel Network File Systems
 
Pnfs
PnfsPnfs
Pnfs
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Nas fundamentals

  • 1. Advanced Technical Support, Americas © 2012 IBM Corporation Network Attached Storage The Basics Norman Bogard
  • 2. Advanced Technical Support, Americas © 2012 IBM Corporation Agenda  Origins of Network Attached Storage  Terminology  Data Transfer: Block versus File  Converged Storage  NAS Techniques  Additional Resources  A note of thanks for input from – Brett Cooper – Nils Haustein 2
  • 3. Advanced Technical Support, Americas © 2012 IBM Corporation Origins of Network Attached Storage (NAS)  Ethernet was invented in 1973 – By Robert Metcalfe of Xerox – First paper on Ethernet didn’t come until 1976  In the early 1980’s Newcastle University demonstrated remote file access with UNIX systems  In 1983 Novell’s NetWare Core Protocol (NCP) was released  In 1983 Barry Feigenbaum of IBM invented Server Message Block (SMB) – Foundation of the Common Internet File System (CIFS) {1996}  In 1984 Sun Microsystems released the Network File System (NFS)  The 1990’s saw the beginning of dedicated NAS devices 3
  • 4. Advanced Technical Support, Americas © 2012 IBM Corporation Origins of NAS Continued  By late 1991 the HyperText Transfer Protocol (HTTP) & Hypertext Markup Language (HTML) were defined – HTTP is now often referred to as Representational State Transfer (REST) • REST is the foundation of cloud based storage services like Amazon’s S3  NAS is always Client / Server based – Appliance (file server) is the server – End systems, like workstations or application servers, are the clients  1992 saw the beginning of Samba – Samba gets it’s name from SMB & grep -i '^s.*m.*b' – Samba integrates NFS & CIFS so files can be shared by both 4
  • 5. Advanced Technical Support, Americas © 2012 IBM Corporation Terminology  Block: Leverages Small Computer System Interface (SCSI) commands to read-write specific blocks – Common SCSI access methods include Fiber Channel (FC), Internet Small Computer System Interface (iSCSI), or InfiniBand (IB) • IB is a high speed network interconnect  NAS: reads/writes files  File Server: A storage server dedicated (primarily) to serving file-based workloads  NAS Gateway: A server that provides network-based storage virtualization – Provides protocol translation from host-based CIFS/NFS to Storage Area Network (SAN) based block – Examples: IBM N series & SONAS; NetApp V Series; EMC VNX/Celerra; OnStor (LSI); HP P4000 Unified Gateway  Unified Storage – a single logical, centrally managed storage platform that serves both block (FC, iSCSI, IB) and file-based (CIFS, NFS, HTTP, etc.) workloads – Examples: IBM N series; NetApp V series; & IBM Storwize V7000 Unified 5
  • 6. Advanced Technical Support, Americas © 2012 IBM Corporation Comparing SAN & NAS 6 * Internet Protocol / User Datagram Protocol *
  • 7. Advanced Technical Support, Americas © 2012 IBM Corporation Block vs File 7 Block Level Storage devices / SAN (i.e. V7000, DS8000, XIV) ● Provide access to equal sized blocks of storage ● Blocks are found by a number on a device ● Read and Write operations on data blocks – mainly SCSI protocol ● Block Services segmented into LUNs or vDisks – usually a few dozen ● Connections to the device in the order of 10-100 ● Authorization for generic access by host (10-100) ● Almost no coordination of concurrent access to these LUNs (other than SCSI protocol device reservation) NAS devices (i.e. N series, SONAS, or V7kU) ● Provide access to files ● Files are found by a name within a tree of names ● Read, Write, Create, Delete and many more – CIFS, NFS, FTP and other protocols ● Device Services exposed as Exports, Directories, Files – a few hundred, millions, billions ● Connections can be in the order of 100-10.000s ● Authorization by User ID – for Reads, Writes, Meta-Data operations ● Coordination of concurrent access with Share Modes and leases/delegations (on whole files), byte range locks (fragments within files) – within a protocol (ie CIFS) and across protocols (i.e. between CIFS and NFS)
  • 8. Advanced Technical Support, Americas © 2012 IBM Corporation Data Transfer: Block versus File  The key to understanding the difference between block and file data is the file system owner 8 STORAGE APPLICATION Storage Area Network (SAN) FC, iSCSI, or IB NETWORK FILE SYSTEM STORAGE APPLICATION FILE SYSTEM Direct Attached Storage (DAS) STORAGE NETWORK APPLICATION FILE SYSTEM Network Attached Storage (NAS) IP: CIFS, NFS, Etc.
  • 9. Advanced Technical Support, Americas © 2012 IBM Corporation Converged Storage (Unified Storage)  Two fundamental approaches to intermixing block & file storage within a single system – IBM’s N series uses block on file • A device file with a Logical Unit Number (LUN) assigned to it is stored within the file server’s Write Anywhere File Layout (WAFL) file system and then mapped to a host • File & block data are stored within the same file system – IBM’s Storwize V7000 Unified (V7kU) uses file on block • A raw device from the V7k is mapped to hosts • File data is contained within discrete devices • Host block data is contained within discrete devices • File & block data are stored independently 9
  • 10. Advanced Technical Support, Americas © 2012 IBM Corporation 10 Internal Disks Mapped LUN = File File Share File Server (WAFL File System) Internal Disks SAN Block-on-File (N series) File-on-Block (V7kU) FC, iSCSI CIFS, NFS File Modules (GPFS) V7kU Block Devices FC, iSCSI Mapped LUN CIFS, NFS SAN
  • 11. Advanced Technical Support, Americas © 2012 IBM Corporation Block vs File – High Level Application Affinity  Applications/data types that typically reside in block stores: – RDBMS (Oracle, SQL Server, DB2) – Analytics (stream processing) – OLTP – Metadata Layers (component of content management) – Email (MS Exchange, Notes) – Virtualization Stacks (VMware: VDI, VMDK implementations; HyperV; Citrix Xen)  Applications/data types that typically reside in files: – Rich Media (pictures, videos, seismic data, medical imaging, etc.) – VOD, AOD, IPTV – Analytics (SAS grid) – ECM (Enterprise Content Management – e.g., web stores) – Research Data Sets – User files (documents, etc.) – PLM/PDM (Product Lifecycle/Data Management) – Virtualized Environments (VMware client-driven deployment) 11
  • 12. Advanced Technical Support, Americas © 2012 IBM Corporation The Enterprise Workload Landscape… What Fits Where? Application Workload Class LEAD WITH Comments Oracle DBMS B (F) For larger (>20TB) instances, lead with XIV eBusiness Suite B (F) SAP OLTP B OLTP/BASIS BWH F (B) Analytics Content Mgt. Filenet, Documentum, etc. F Metadata layer may be block/RDBMS Media Streaming VOD, AOD, IPTV F Very performance/latency sensitive; also potential for tape/LTFS MS Exchange 2010 B Strong ESRP results for both V7K & XIV 2003/2007 B Lotus Notes B (F) Back end is DB2 database; predominantly block VMware Virt. Infrastructure B (F) Block: mature (also XIV); File: emerging (MS HyperV – block only) VDI B / F IBM DB2 RDBMS B SAS Analytics B / F Block: mid-range, File: grid; XIV certified & strong; V7KU TBD PACS/EMR Imaging F Ex.: Cachet Database Prod. Workflow B / F “Front Office” OLTP: block; Patient archives: file B: Block; F: File 12
  • 13. Advanced Technical Support, Americas © 2012 IBM Corporation Data Protection: File vs Block - Concept STORAGE NETWORK APPLICATION FILE SYSTEM STORAGE APPLICATION NAS (Network Attached Storage) SAN (Storage Area Network) NETWORK FILE SYSTEM • Generally snapshots are consistent since the file system is consistent on the NAS System • Replication is supported • NDMP is leverages snapshots and dumps files to tape • Integrated with most leading backup software • Snapshots require integration with the host file system and application to ensure consistency • Backups are done by moving blocks through a master-media server to disk/tape • Replication is supported once file system is consistent • Acts just like Direct Attached Storage 13
  • 14. Advanced Technical Support, Americas © 2012 IBM Corporation Integration points for NAS protocols with applications  NAS applications historically have required very little if any integration with host applications – Many NAS vendors now provide Application Programming Interfaces (APIs) to integrated with leading host applications such as Vmware • Provides seamless movement and recovery of virtual machines through replication  Many third party management solutions support NAS integration to discover and manage the storage, including our own Tivoli Productivity Center (TPC)  Microsoft Windows Server Applications such as Microsoft Exchange Server and Microsoft SQL Server do not support NAS shares for data placement – These applications require block storage 14
  • 15. Advanced Technical Support, Americas © 2012 IBM Corporation NAS Techniques overview  File systems  File shares  Network services  Authentication and authorization  Quota  Data availability  Date protection (snapshot, backup, NDMP, replication)  Anti virus support  Information Lifecycle Management  File cloning 15
  • 16. Advanced Technical Support, Americas © 2012 IBM Corporation File systems and file-sets  File shares are exports to the user or application  User files are organized and stored in file systems – File system is local to the NAS system  File-sets allow for breaking down the file system space in smaller manageable units – Certain operations can be configured for file-sets such as replication, snapshots, and quota-management  Pools allow placement and migration of files to different cost storage devices 16 NAS System File-set (optional) File System Pool (optional) Share NFS, CIFS, HTTP, FTP, … Share Storage Storage Pool (optional) Pool (optional) File-set (optional) File-set (optional)
  • 17. Advanced Technical Support, Americas © 2012 IBM Corporation File shares  File share is a user file system provided by the file server – Allow users and groups to share files in a common name space – Access permissions can be given based on user and group names  Typical file sharing protocols are CIFS and NFS 17  CIFS share is exported under share- name (usershare) which is mounted by the user  NFS share is exported as directory (/shares/nfs) which is mounted by the user (as mnt/userdata) CIFS Directory: /shares/cifs Sharename: usershare Mounted as CIFS share: filerusershare File Server Share NFS Directory: /shares/nfs Mounted as NFS share: Filer:/shares/nfs /mnt/userdata File Server Share
  • 18. Advanced Technical Support, Americas © 2012 IBM Corporation File shares and TCP/IP address failover  NFS is state-less – Upon TCP/IP address failover NFS client experiences a short interruption – I/O continues when TCP/IP connection is available, no re-connection required • Even though NFS v4 is state-full, durable file handles eliminate the need for a re- connection  CIFS is state-full – Upon TCP/IP address failover CIFS client looses connection – File share must be reconnected (mounted) before I/O can continue – Additional tools can be used to automate reconnection (e.g. DFS) 18 Clustered File Server with two file modules NFS Client connected to module 2 CIFS client Module 2: 10.10.10.2 Module 1: 10.10.10.1 X 10.10.10.2 Requires reconnect! I/O continues
  • 19. Advanced Technical Support, Americas © 2012 IBM Corporation Network services  Network Time Protocol (NTP) is used to synchronize the time between components (File Server, directory server) – Very important for authentication services with kerberos and clustered NAS  Domain Name Service (DNS) is used to resolve names and IP addresses – Required for active directory authentication – DNS round robin can be used for load balancing  DNS round robin sequentially selects IP addresses 19 File Server.storage.com Client 1 Client 2 DNS server File Server.storage.com 10.10.10.1 10.10.10.2 10.10.10.3 10.10.10.4 Module 2: 10.10.10.2 10.10.10.4 Module 1: 10.10.10.1 10.10.10.3
  • 20. Advanced Technical Support, Americas © 2012 IBM Corporation Multipathing Solutions for NAS  Link Aggregation – Relies on the Transmission Control Protocol/Internet Protocol (TCP/IP) level integration • Handled at either the switch port level or at the network layer of the Open Systems Interconnection (OSI) model – OSI layer 3 – Commonly Known As: Bonding, Teaming or Trunking  Logically bonds multiple network paths into a single path effectively increasing the bandwidth and providing redundant physical connections in the case of a failure  Uses round-robin scheduling, or is based on hash values computed from fields in the packet header, or a combination of these two methods – Network load is balanced across all links unless active/passive mode is chosen 1 GbE 1 GbE 1 GbE 1 GbE 2 GbE 2 GbE 20
  • 21. Advanced Technical Support, Americas © 2012 IBM Corporation Authentication  Authentication validates a resource – whether it is who it claims to be – A resource can be a computer, user, or group  Authentication can be done local within the file server – Local authentication of users requires the user to be configured in the file server • This does not scale is not manageable because every user must be configured in every file server • Only works in small environments 21  Authentication can be done remote with a directory server – Directory server contains names, profile information, and machine addresses of every user and resource on the network • It is used to manage user accounts and network permissions – Upon user access the file server validates user credentials with the directory server – Directory servers are Active Directory, LDAP, etc. NAS file server User Directory server 1. Connect with credentials 3. Grant access 2.Validate user
  • 22. Advanced Technical Support, Americas © 2012 IBM Corporation Authentication processing 22 Clients w/o Kerberos file server Authentication Server with Kerberos KDC 1. User Auth. Request 4. Response 2. verify Auth. Request 3. Response Clients with Kerberos 1. User Auth. Request 2. Granted Kerberos Ticket 3. Kerberos Ticket 4. Response
  • 23. Advanced Technical Support, Americas © 2012 IBM Corporation Authentication by protocol  Authentication for NFS is based on host names or IP addresses – Allowed host-names are typically configured on a per-share basis – Network Information Service (NIS) can be used to group host-names • Allows single point of maintenance for host-groups – NFS also supports user authentication via Kerberos  Authentication for CIFS is based on Security Identification (SID) – Each resource within a domain has a unique SID – SIDs are known to the directory server – Authentication process validates SID with directory server 23 Client Directory Server
  • 24. Advanced Technical Support, Americas © 2012 IBM Corporation  Authorization validates access permissions of user/group to directories/files – Each shared file and directory has access permission  Access permissions are also called Access Control Lists (ACL) – In Unix (NFS) access permissions are simple: r-w-x for owner, group, others – In Windows the ACLs are more complex •One user can be in multiple groups •ACLs include change, append and attribute operation permissions Authorization Name ACL Owner Group Myfile.txt rwx r-- --- MIA root 24 Share User: MIA Group: Users  Upon file access the file server matches user credentials against file-ACL and validates the level of access for the user – ACLs can be inherited from parent folders  Authorization takes place after authentication
  • 25. Advanced Technical Support, Americas © 2012 IBM Corporation Quota  Quotas are used to restrict certain aspects of the file system (share) usage: – Capacity – Number of files  Set by the administrator for specific user, group, file system, or file- set  Hard-quota: when reached writing files is denied  Soft-quota: user or administrator may get a warning, but can continue to store files – Grace period may start during which the user can continue to store files – When a hard-quota is reached, the user cannot store anymore files 25
  • 26. Advanced Technical Support, Americas © 2012 IBM Corporation Data availability techniques 26 Disk System (RAID) File system (Replication, striping) Replication, Data striping Storage network (Redundancy) Redundant storage networks RAID protection on disk subsystem NAS services (cluster) Clustered NAS services NAS Protocol NAS System
  • 27. Advanced Technical Support, Americas © 2012 IBM Corporation Data protection Against what must the data be protected ?  Techniques to protect against operational errors (changes, deletion, virus) – Snapshots – Backup  Techniques to protect against disaster (complete failure of computer center) – Replication / Mirroring – Backup 27
  • 28. Advanced Technical Support, Americas © 2012 IBM Corporation Snapshots  Snapshots freeze the state of a file system or subset at a certain point in time – Data resides in the same file server  Snapshots are typically space efficient – At the time of the snapshot almost no capacity is consumed – Changes in the file system cause snapshots to grow  Snapshot management – Snapshots can be scheduled by date and time – Snapshots can be deleted automatically based on rules  Snapshots can be mounted and accessed by users – Read-only, no changes allowed  Snapshot are used to recover deleted or changed files  Also used for other background operations (backup, replication, etc.) 28 Snap File system Snapshot
  • 29. Advanced Technical Support, Americas © 2012 IBM Corporation Backup and Recovery Techniques Backup from shares Integration in file server Backup client runs on every user workstation or on dedicated server(s) –Backs up the files in the file system  Dedicated servers provide more scalability Recovery can be done by the backup client –Can be done by user General concern: long file scan time Backup clients run on file server –Backs up files from file systems Leverage fast scan process Recovery can be done by the backup client internally to the file server –Usually administrative effort 29 User Dedicated Backup client(s) Backup Server BR client BR client Share File Server User Backup Server Share BR client File Server
  • 30. Advanced Technical Support, Americas © 2012 IBM Corporation Backup & Recovery considerations  Typically full, differential and incremental backups are supported – Full: entire file system or share – Differential: all changes since last full backup – Incremental: all changes since last full or differential backup  Typical requirements – Backup window: depends on number of files and speed of identification process – Recovery time: depends on number of files to be recovered and backup medium – Recovery point: depends on frequency of backups  Scalability of backup and recovery depends on: – Number of parallel backup clients – Network and storage medium – Scan time  Use file level backup to recover files or subset of files  Full system recovery (disaster) may take a long time because restore is typically on a file level – Consider other techniques for disaster recovery (replication, etc.) 30
  • 31. Advanced Technical Support, Americas © 2012 IBM Corporation Network Data Management Protocol 31 file server NDMP Client NDMP Backup Server (Source: „Storage networks explained“, Troppens et al, John Wiley & Sons, Ltd, 2009)  Standardized protocol facilitating backup and recovery for NAS server  Comprises three services: – Data service: performs the backup and recovery operation in the NAS server – Tape service: writes and reads data to the backup storage medium (disk or tape) – Data management service (DMA): controls backup and restore operations and NDMP data movement
  • 32. Advanced Technical Support, Americas © 2012 IBM Corporation NDMP Backup Functions  Files are backed up in NDMP data stream to tape service – Streaming provides higher performance – Meta information is passed to DMA  NDMP supports full and incremental backup for file systems  NDMP supports file system and file level recovery – File system recovery is fast because of streaming – File level recovery is based on “direct access recovery” where the NDMP client keeps track of position of file within NDMP data stream  NDMP version 5 supports compression, encryption and multiplexing  Recovery of entire file systems is faster than with file-level backup – Instead of single files entire container of files (streams) are recovered 32
  • 33. Advanced Technical Support, Americas © 2012 IBM Corporation NDMP for data migration (copy)  NDMP can be used for data migration (copy) between file servers – One file server is the source and runs the data service (DS) – Another file server is the target and runs the tape service (TS) and data service – DMA runs externally or on either of the file servers  Source file server (DS) collects the files and attributes and streams it to target file server TS  Target file server receives (TS) the stream and DS unpacks it  General issue: data format within the NDMP stream is not standardized 33 Source file server Target file server DS TS DS DMA Data stream NDMP Control
  • 34. Advanced Technical Support, Americas © 2012 IBM Corporation Replication / Mirroring  Copy files from one NAS system to another for disaster protection  Copy can be done on storage system or file system layer – File system replication typically allows faster recovery (fail over) – File system replication is more consistent because it has the awareness of files – Storage system replication is typically faster and can also be fully synchronous on block level  Typically asynchronous methods are used in a NAS environment  Multi-side and multi-directional replication scenarios are possible 34 Site 2 Site 3 Site 1
  • 35. Advanced Technical Support, Americas © 2012 IBM Corporation Replication considerations  Data reduction techniques (compression, de-duplication) help to overcome replication bandwidth challenges  Encryption helps to provide secure data transmission between sites  Main requirements for disaster recovery – Recovery time objective: how long does it take to recover from a disaster – Recovery point objective: how much data will be lost  Recovery process typically involves administrative measures at the target site – Should be well documented and trained 35
  • 36. Advanced Technical Support, Americas © 2012 IBM Corporation Virus protection Scanning on file shares Scanner integration with file server Scanner in file server Scanner running on user workstation has limited scalability Dedicated scanner(s) are more scalable –Need access to shares File identification may become the bottleneck Leverage integrated file identification techniques for bulk file scan Enables scan on- demand –On file access –After file write Scales with number of scanners Scanner runs in file server Leverages integrated file identification techniques for bulk file scan Enables scan on-demand –On file access –After file write Limited scalability and scanner support 36 User Scan Server(s) Scanner Scanner Shares User Shares Scanners User Scan Servers Shares Scanners AV Agent
  • 37. Advanced Technical Support, Americas © 2012 IBM Corporation Tiered storage  Important Information Lifecycle Management technique – Initial placement of files on the most appropriate storage medium – Policy based migration during the lifetime of the files – Keep the files in the original name space to allow transparent access  Supports the idea of archiving – For data at rest which needs to be kept for long periods of time  Integration of ILM functions in file server provides cost efficiency – No extra infrastructure required – Central administration in concert with other functions 37 Automated tiering file server Gold Silver Bronce Tape Performance and Cost
  • 38. Advanced Technical Support, Americas © 2012 IBM Corporation Scale out  Scale out NAS systems can scale in multiple dimensions – Horizontally: performance and throughput provided by interface nodes – Vertically: storage capacity provided by storage systems  Provide single name-space across multiple processing nodes (interfaces)  Workload is distributed across the components (interface and storage nodes)  Centrally managed and maintained 38 Interface nodes Storage systems Performance Capacity One global namespace
  • 39. Advanced Technical Support, Americas © 2012 IBM Corporation Traditional NAS vs. Scale Out NAS 39  Scale performance and capacity with number of disks and file servers  Adding file servers leads to fragmented data, hot spots and underutilized disks  More complex to manage multiple NAS appliances  Operational costs grow ALL FILES “Scale Out NAS” Goal of Scale Out NAS: A few “traditional NAS” challenges: “Traditional NAS” file server 1 File 3 File 2 File 1 Storage Island file server 2 Storage Island file server 3 Storage Island Single large ‘virtual’ server including automated storage tiering Cluster Interface node 1 Interface node 2 Interface node 3 Interface node n  Scale performance and capacity independently – With interface and storage nodes  Very high aggregate performance through parallelism  Greatly simplified management because it is one system  Provides operational cost reduction
  • 40. Advanced Technical Support, Americas © 2012 IBM Corporation Multi-tenancy  Provide file space for multiple tenants  Example – Multiple departments / organization in one company – Multiple customers hosted by service provider  Requirements – Separation of networks – Separation of interface nodes – Separation of storage – Separation of administration – Separation of authentication – Different protection concepts – Reporting and chargeback, etc…  Simple Solution: provide one file server per tenant – Complex to administrate and to maintain – More costly due to underutilized disk space and complexity  Combine multi-tenancy with scale-out NAS 40 User Dept. Client Backup Authentication Antivirus
  • 41. Advanced Technical Support, Americas © 2012 IBM Corporation Multi-tenancy and scale-out  Scale-out system provides scalability in multiple dimensions  Scale-out system allows dynamic allocation and de- allocation of resources  Scale-out system can be centrally managed and maintained  Scale-out systems help save cost in a multi-tenant environment 41 Interface nodes Storage systems Namespaces User Dept. Client Scale-out Systems Backup Authentication Antivirus
  • 42. Advanced Technical Support, Americas © 2012 IBM Corporation File cloning  Clone is a writable space efficient copy of an individual file – Clones ‘point’ back to the parent file – Only modified blocks from clone are stored  Parent file is read-only, cannot be modified as long as a clone exists  Multiple clones of the same file can exist – Clones of clones are possible as well  Clones can only be created within the file server  Use case: Provision virtual machines from the same base image 42 Parent file (read-only) Writeable clone files Source file
  • 43. Advanced Technical Support, Americas © 2012 IBM Corporation Additional Resources for more information on NAS  Wikipedia’s Definition of NAS: – http://en.wikipedia.org/wiki/Network-attached_storage  InfoStor: NAS Advantages a VARs View: – http://www.infostor.com/index/articles/display/55961/articles/infostor/volume-2/issue- 4/news-analysis-trends/nas-advantages-a-vars-view.html  About.com: SAN vs. NAS: What’s the difference? – http://compnetworking.about.com/od/networkstorage/f/san-vs-nas.htm  About.com: Introduction to NAS – Network Attached Storage – http://compnetworking.about.com/od/itinformationtechnology/l/aa070101a.htm  FreeBSD Handbook: What is NFS? – http://www.freebsd.org/doc/handbook/network-nfs.html  CodeFX: CIFS Explained – http://www.codefx.com/CIFS_Explained.htm  Wikipedia’s Definition of Samba: – http://en.wikipedia.org/wiki/Samba_%28software%29  SearchStorage: Using NAS NFS with VMware ESX Technology Pro’s and Con’s – http://searchstorage.techtarget.com/tip/Pros-and-cons-of-using-NAS-NFS-with-VMware – (Requires Account Creation to view) 43
  • 44. Advanced Technical Support, Americas © 2012 IBM Corporation Question and Answer
  • 45. Advanced Technical Support, Americas © 2012 IBM Corporation Question and Answer
  • 46. Advanced Technical Support, Americas © 2012 IBM Corporation Question and Answer
  • 47. Advanced Technical Support, Americas © 2012 IBM Corporation Disclaimers This information is provided on an "AS IS" basis without warranty of any kind, express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Some jurisdictions do not allow disclaimers of express or implied warranties in certain transactions; therefore, this statement may not apply to you. This information is provided for information purposes only as a high level overview of possible future products. PRODUCT SPECIFICATIONS, ANNOUNCE DATES, AND OTHER INOFORMATION CONTAINED HEREIN ARE SUBJECT TO CHANGE AND WITHDRAWAL WITHOUT NOTICE. Important notes: IBM reserves the right to change product specifications and offerings at any time without notice. This publication could include technical inaccuracies or typographical errors. References herein to IBM products and services do not imply that IBM intends to make them available in all countries. IBM makes no warranties, express or implied, regarding non-IBM products and services, including but not limited to Year 2000 readiness and any implied warranties of merchantability and fitness for a particular purpose. IBM makes no representations or warranties with respect to non-IBM products. Warranty, service and support for non-IBM products is provided directly to you by the third party, not IBM. All part numbers referenced in this publication are product part numbers and not service part numbers. Other part numbers in addition to those listed in this document may be required to support a specific device or function. MHz / GHz only measures microprocessor internal clock speed; many factors may affect application performance. When referring to storage capacity, GB stands for one billion bytes; accessible capacity may be less. Maximum internal hard disk drive capacities assume the replacement of any standard hard disk drives and the population of all hard disk drive bays with the largest currently supported drives available from IBM. IBM Information and Trademarks The following terms are trademarks or registered trademarks of the IBM Corporation in the United States or other countries or both: the e-business logo, IBM, System Storage, Easy Tier, FlashCopy, and System Storage DS. Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries. Intel, Pentium 4 and Xeon are trademarks or registered trademarks of Intel Corporation. Microsoft Windows is a trademark or registered trademark of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Other company, product, and service names may be trademarks or service marks of others. 47