A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
Complete configuration of SAN using ESXI Environment and Installation guide. Now you will be able to configure storage area network with the help of these slides.
This configuration helps user to configure ESXI 4, ESXI 3.0 Servers
INTRODUCTION : Server Centric IT Architecture and its Limitations; Storage – Centric IT Architecture and its advantages; Case study: Replacing a server with Storage Networks; The Data Storage and Data Access problem; The Battle for size and access.
INTELLIGENT DISK SUBSYSTEMS – 1
Architecture of Intelligent Disk Subsystems; Hard disks and Internal I/O Channels, JBOD, Storage virtualization using RAID and different RAID levels;
INTELLIGENT DISK SUBSYSTEMS – 2, I/O TECHNIQUES – 1
Caching: Acceleration of Hard Disk Access; Intelligent disk subsystems; Availability of disk subsystems. The Physical I/O path from the CPU to the Storage System; SCSI.
I/O TECHNIQUES – 2, NETWORK ATTACHED STORAGE
Fibre Channel Protocol Stack; Fibre Channel SAN; IP Storage. The NAS Architecture, The NAS hardware Architecture, The NAS Software Architecture, Network connectivity, NAS as a storage system.
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
Complete configuration of SAN using ESXI Environment and Installation guide. Now you will be able to configure storage area network with the help of these slides.
This configuration helps user to configure ESXI 4, ESXI 3.0 Servers
INTRODUCTION : Server Centric IT Architecture and its Limitations; Storage – Centric IT Architecture and its advantages; Case study: Replacing a server with Storage Networks; The Data Storage and Data Access problem; The Battle for size and access.
INTELLIGENT DISK SUBSYSTEMS – 1
Architecture of Intelligent Disk Subsystems; Hard disks and Internal I/O Channels, JBOD, Storage virtualization using RAID and different RAID levels;
INTELLIGENT DISK SUBSYSTEMS – 2, I/O TECHNIQUES – 1
Caching: Acceleration of Hard Disk Access; Intelligent disk subsystems; Availability of disk subsystems. The Physical I/O path from the CPU to the Storage System; SCSI.
I/O TECHNIQUES – 2, NETWORK ATTACHED STORAGE
Fibre Channel Protocol Stack; Fibre Channel SAN; IP Storage. The NAS Architecture, The NAS hardware Architecture, The NAS Software Architecture, Network connectivity, NAS as a storage system.
Best Network Performance Monitoring ToolJoe Shestak
Latest information about basic of Network Performance monitoring and best network monitoring tool with it's key features. I hope this information helps you to choose best network monitoring tools for your enterprise.
A file system is used to control how data is stored and retrieved.
A filesystem is the methods and data structures that an operating system uses to keep track of files on a disk or partition; that is, the way the files are organized on the disk.
A file allocation table (FAT) is a table that an operating system maintains on a hard disk that provides a map of the clusters (the basic units of logical storage on a hard disk) that a file has been stored in.
File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a legacy file system which is simple and robust.
Today, FAT file systems are still commonly found on floppy disks, USB sticks, flash and other solid-state memory cards and modules, and many portable and embedded devices.
FILE SYSTEM AND NAS: Local File Systems; Network file Systems and file servers; Shared Disk file systems; Comparison of fiber Channel and NAS.
STORAGE VIRTUALIZATION: Definition of Storage virtualization; Implementation Considerations; Storage virtualization on Block or file level; Storage virtualization on various levels of the storage Network; Symmetric and Asymmetric storage virtualization in the Network
Everything you wanted to know about iSCSI, but were afraid to ask. Presneted by David Black PhD who was a fundamental influence on the development of the protocol. This presentation is really fantastic!
Learn how to setup Samba and NFS in ubuntu server-ubuntu client and ubuntu server-windows client. Also, comparsion of NAS vs SAN, NAS vs DAS, why we are using NAS, its comonents and challanges with actual real world scenario that what if we use NAS and what if we not use NAS.
Designed by Sanjay Ghemawat , Howard Gobioff and Shun-Tak Leung of Google in 2002-03.
Provides fault tolerance, serving large number of clients with high aggregate performance.
The field of Google is beyond the searching.
Google store the data in more than 15 thousands commodity hardware.
Handles the exceptions of Google and other Google specific challenges in their distributed file system.
Best Network Performance Monitoring ToolJoe Shestak
Latest information about basic of Network Performance monitoring and best network monitoring tool with it's key features. I hope this information helps you to choose best network monitoring tools for your enterprise.
A file system is used to control how data is stored and retrieved.
A filesystem is the methods and data structures that an operating system uses to keep track of files on a disk or partition; that is, the way the files are organized on the disk.
A file allocation table (FAT) is a table that an operating system maintains on a hard disk that provides a map of the clusters (the basic units of logical storage on a hard disk) that a file has been stored in.
File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a legacy file system which is simple and robust.
Today, FAT file systems are still commonly found on floppy disks, USB sticks, flash and other solid-state memory cards and modules, and many portable and embedded devices.
FILE SYSTEM AND NAS: Local File Systems; Network file Systems and file servers; Shared Disk file systems; Comparison of fiber Channel and NAS.
STORAGE VIRTUALIZATION: Definition of Storage virtualization; Implementation Considerations; Storage virtualization on Block or file level; Storage virtualization on various levels of the storage Network; Symmetric and Asymmetric storage virtualization in the Network
Everything you wanted to know about iSCSI, but were afraid to ask. Presneted by David Black PhD who was a fundamental influence on the development of the protocol. This presentation is really fantastic!
Learn how to setup Samba and NFS in ubuntu server-ubuntu client and ubuntu server-windows client. Also, comparsion of NAS vs SAN, NAS vs DAS, why we are using NAS, its comonents and challanges with actual real world scenario that what if we use NAS and what if we not use NAS.
Designed by Sanjay Ghemawat , Howard Gobioff and Shun-Tak Leung of Google in 2002-03.
Provides fault tolerance, serving large number of clients with high aggregate performance.
The field of Google is beyond the searching.
Google store the data in more than 15 thousands commodity hardware.
Handles the exceptions of Google and other Google specific challenges in their distributed file system.
Block Level Storage Vs File Level StoragePradeep Jagan
Video Management System is responsible for accessing, controlling and managing the video content management environment across an Internet Protocol Network.
Maybe your business has outgrown its file server and you’re thinking of replacing it. Or perhaps your server is dated and not supporting your business like it should, so you’re considering moving to the cloud. It might be that you’re starting a new business and wondering if an in-house server is adequate or if you should adopt cloud technology from the start.
Regardless of why you’re debating an in-house server versus a cloud-based server, it’s a tough decision that will impact your business on a daily basis. We know there’s a lot to think about, and we’re here to help show why you should consolidate your file servers and move your data to the cloud.
In this webinar with Talon Storage Solutions, we covered:
-Challenges of using a physical file server
-Benefits of using a cloud file server
-Current State of the File Server market
-Reference Architecture examples for cloud file servers
-Demo: how to architect a cloud file server with highly-available storage
Learn more at https://www.softnas.com
In this presentation, we will discuss in details about challenges in managing the IT infrastructure with a focus on server sizing, storage capacity planning and internet connectivity. We will also discuss about how to set up security architecture and disaster recovery plan.
To know more about Welingkar School’s Distance Learning Program and courses offered, visit:
http://www.welingkaronline.org/distance-learning/online-mba.html
2018 Infortrend EonStor GSe Pro Family Introductioninfortrendgroup
EonStor GSe Pro is a single controller solution with support for SATA and SSD drives exclusively designed for SMBs, integrating SAN and NAS services as well as Cloud Gateway features to be deployed under a general NAS architecture for file sharing, backup, cloud synchronization, video editing, and surveillance purposes. Its complete product line features a hardware design of rackmount or desktop enclosures and flexible host boards to choose from; as for software, it comes with complete data services and simple, intuitive management interfaces, so that you can find the perfect storage device according to your performance or budget needs.
More Information:
https://www.infortrend.com/global/products/GSePro
Recommended Series:
https://www.infortrend.com/global/products/families/GSePro/pro3000
https://www.infortrend.com/global/products/families/GSePro/pro1000
https://www.infortrend.com/global/products/families/GSePro/Pro%20200
Authenticated Key Exchange Protocols for Parallel Network File Systems1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A presentation for FY and SY student about basic knowledge of NAS which includes :
1. Introduction of NAS
2. Applications
3. Benefits
4. Advantages
5. Disadvantages
6. NAS vs SAN
7. Future of NAS
Image steganography techniques can be classified into two major categories such as spatial domain techniques and frequency domain techniques.
In spatial domain techniques the secret message is hidden inside the image by applying some manipulation over the different pixels of the image.
In frequency domain techniques the image is transformed to another form by applying a transformation like discrete wavelet transform and then the message is hidden by applying any of the usual embedding techniques.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
2. Section II Storage Networking
Technologies and Virtualization
In This Section:
• Chapter 5: Direct-Attached Storage and Introduction to SCSI
• Chapter 6: Storage Area Networks
• Chapter 7: Network-Attached Storage
• Chapter 8: IP SAN
Ali Broumandnia, Broumandnia@gmail.com 2
3. Chapter 7
Network-Attached Storage
• 7.1 General-Purpose Servers vs. NAS Devices
• 7.2 Benefits of NAS
• 7.3 NAS File I/O
• 7.4 Components of NAS
• 7.5 NAS Implementations
• 7.6 NAS File-Sharing Protocols
• 7.7 NAS I/O Operations
• 7.8 Factors Affecting NAS Performance and Availability
• 7.9 Concepts in Practice: EMC Celerra
• SummaryAli Broumandnia, Broumandnia@gmail.com 3
4. Key Concepts:
• NAS Device
• Remote File Sharing
• NAS Connectivity and Protocols
• NAS Performance and Availability
• MTU and Jumbo Frames
Ali Broumandnia, Broumandnia@gmail.com 4
5. This chapter describes the components of NAS, different
types of NAS implementations, the file-sharing
protocols, and the transport and network layer protocols
used in NAS implementations. The chapter also explains
NAS design considerations and factors that affect NAS
performance.
Ali Broumandnia, Broumandnia@gmail.com 5
6. 7.1 General-Purpose Servers vs. NAS
Devices
A NAS device is optimized for file-serving functions such
as storing, retrieving, and accessing files for applications
and clients. As shown in Figure 7-1, a general-purpose
server can be used to host any application, as it runs a
generic operating system. Unlike a general-purpose server,
a NAS device is dedicated to file-serving.
Ali Broumandnia, Broumandnia@gmail.com 6
8. 7.2 Benefits of NAS
Supports comprehensive access to information
Improved efficiency
Improved flexibility
Centralized storage
Simplified management
Scalability
High availability
Security
Ali Broumandnia, Broumandnia@gmail.com 8
9. 7.3 NAS File I/O
NAS uses file-level access for all of its I/O operations.
File I/O is a high-level request that specifies the file to be
accessed, but does not specify its logical block address.
For example, a file I/O request from a client may specify
reading 256 bytes from byte number 1152 onward in a
specific file. Unlike block I/O, there is no disk volume or
disk sector information in a file I/O request. The NAS
operating system keeps track of the location of files on
the disk volume and converts client file I/O into block-
level I/O to retrieve data.
Ali Broumandnia, Broumandnia@gmail.com 9
10. 7.3.1 File Systems and Remote File
Sharing
A file system is a structured way of storing and
organizing data files. Many file systems maintain a file
access table to simplify the process of finding and
accessing files.
Ali Broumandnia, Broumandnia@gmail.com 10
11. 7.3.2 Accessing a File System
A file system must be mounted before it can be used. In
most cases, the operating system mounts a local file
system during the boot process. The mount process
creates a link between the file system and the operating
system. When mounting a file system, the operating
system organizes files and directories in a tree-like
structure and grants the user the privilege of accessing
this structure.
Ali Broumandnia, Broumandnia@gmail.com 11
12. The tree is rooted at a mount point that is named using
operating system conventions. Users and applications
can traverse the entire tree from the root to the leaf
nodes. Files are located at leaf nodes, and directories and
subdirectories are located at intermediate roots. The
relationship between the user and the file system
terminates when the file system is unmounted. Figure 7-2
shows an example of the UNIX directory structure under
UNIX operating environments.
Ali Broumandnia, Broumandnia@gmail.com 12
14. 7.3.3 File Sharing
File Transfer Protocol (FTP), distributed file systems,
and a client/server model that uses a file-sharing protocol
are some examples of implementations of file-sharing
environments. A distributed file system (DFS) is a file
system that is distributed across several hosts. A DFS can
provide hosts with direct access to the entire file system,
while ensuring efficient management and data security.
Ali Broumandnia, Broumandnia@gmail.com 14
15. 7.4 Components of NAS
• NAS head (CPU and Memory)
• One or more network interface cards (NICs), which
provide connectivity to the network. Examples of NICs
include Gigabit Ethernet, Fast Ethernet, ATM, and
Fiber Distributed Data Interface (FDDI).
• An optimized operating system for managing NAS
functionality
Ali Broumandnia, Broumandnia@gmail.com 15
16. • NFS and CIFS protocols for file sharing
• Industry-standard storage protocols to connect and
manage physical disk resources, such as ATA, SCSI, or
FC
The NAS environment includes clients accessing a NAS
device over an IP network using standard protocols.
Ali Broumandnia, Broumandnia@gmail.com 16
18. 7.5 NAS Implementations
As mentioned earlier, there are two types of NAS
implementations: integrated and gateway. The integrated
NAS device has all of its components and storage system
in a single enclosure. In gateway implementation, NAS
head shares its storage with SAN environment.
Ali Broumandnia, Broumandnia@gmail.com 18
19. 7.5.1 Integrated NAS
An integrated NAS device has all the components of
NAS, such as the NAS head and storage, in a single
enclosure, or frame. This makes the integrated NAS a
self-contained environment. The NAS head connects to
the IP network to provide connectivity to the clients and
service the file I/O requests. The storage consists of a
number of disks that can range from low-cost ATA to
high throughput FC disk drives. Management software
manages the NAS head and storage configurations.
Ali Broumandnia, Broumandnia@gmail.com 19
20. 7.5.2 Gateway NAS
A gateway NAS device consists of an independent NAS
head and one or more storage arrays. The NAS head
performs the same functions that it does in the integrated
solution; while the storage is shared with other
applications that require block-level I/O. Management
functions in this type of solution are more complex than
those in an integrated environment because there are
separate administrative tasks for the NAS head and the
storage.
Ali Broumandnia, Broumandnia@gmail.com 20
21. 7.5.3 Integrated NAS Connectivity
An integrated solution is self-contained and can connect
into a standard IP network. Although the specifics of how
devices are connected within a NAS implementation
vary by vendor and model. In some cases, storage is
embedded within a NAS device and is connected to the
NAS head through internal connections, such as ATA or
SCSI controllers. In others, the storage may be external
but connected by using SCSI controllers.
Ali Broumandnia, Broumandnia@gmail.com 21
22. In a high-end integrated NAS model, external storage
can be directly connected by FC HBAs or by dedicated
FC switches. In the case of a low-end integrated NAS
model, backup traffic is shared on the same public IP
network along with the regular client access traffic. In
the case of a high-end integrated NAS model, an isolated
backup network can be used to segment the traffic from
impeding client access.
Ali Broumandnia, Broumandnia@gmail.com 22
23. More complex solutions may include an intelligent
storage subsystem, enabling faster backup and larger
capacities while simultaneously enhancing performance.
Figure 7-4 illustrates an example of integrated NAS
connectivity.
Ali Broumandnia, Broumandnia@gmail.com 23
25. 7.5.4 Gateway NAS Connectivity
In a gateway solution, front-end connectivity is similar to
that in an integrated solution. An integrated environment
has a fixed number of NAS heads, making it relatively
easy to determine IP networking requirements. In
contrast, networking requirements in a gateway
environment are complex to determine due to scalability
options. Adding more NAS heads may require additional
networking connectivity and bandwidth.
Ali Broumandnia, Broumandnia@gmail.com 25
26. Communication between the NAS gateway and the
storage system in a gateway solution is achieved through
a traditional FC SAN. To deploy a stable NAS solution,
factors such as multiple paths for data, redundant fabrics,
and load distribution must be considered. Figure 7-5
illustrates an example of gateway NAS connectivity.
Ali Broumandnia, Broumandnia@gmail.com 26
28. 7.6 NAS File-Sharing Protocols
Most NAS devices support multiple file service protocols
to handle file I/O requests to a remote file system. As
mentioned earlier, NFS and CIFS are the common
protocols for file sharing. NFS is predominantly used in
UNIX-based operating environments; CIFS is used in
Microsoft Windows–based operating environments.
These file sharing protocols enable users to share file
data across different operating environments and provide
a means for users to migrate transparently from one
operating system to another.
Ali Broumandnia, Broumandnia@gmail.com 28
29. 7.6.1 NFS
oSearching files and directories
oOpening, reading, writing to, and closing a file
oChanging file attributes
oModifying file links and directories
Ali Broumandnia, Broumandnia@gmail.com 29
30. NFS version 2 (NFSv2): Uses UDP to provide a
stateless network connection between a client and a
server. Features such as locking are handled outside the
protocol.
NFS version 3 (NFSv3): The most commonly used
version, it uses UDP or TCP, and is based on the
stateless protocol design. It includes some new
features, such as a 64-bit file size, asynchronous writes,
and additional file attributes to reduce re-fetching.
Ali Broumandnia, Broumandnia@gmail.com 30
31. NFS version 4 (NFSv4): This version uses TCP and is
based on a state full protocol design. It offers enhanced
security.
Ali Broumandnia, Broumandnia@gmail.com 31
32. 7.6.2 CIFS
CIFS is a client/server application protocol that enables
client programs to make requests for files and services on
remote computers over TCP/IP. It is a public, or open,
variation of Server Message Block (SMB) protocol. The
CIFS protocol enables remote clients to gain access to
files that are on a server. CIFS enables file sharing with
other clients by using special locks.
Ali Broumandnia, Broumandnia@gmail.com 32
33. File names in CIFS are encoded using Unicode characters.
CIFS provides the following features to ensure data integrity:
It uses file and record locking to prevent users from
overwriting the work of another user on a file or a record.
It runs over TCP.
It supports fault tolerance and can automatically
restore connections and reopen files that were open
prior to interruption.
Ali Broumandnia, Broumandnia@gmail.com 33
34. 7.7 NAS I/O Operations
The NFS and CIFS protocols handle file I/O requests to a
remote file system, which is managed by the NAS
device. The process of NAS I/O is as follows:
Ali Broumandnia, Broumandnia@gmail.com 34
35. 1. The requestor packages an I/O request into TCP/IP and forwards
it through the network stack. The NAS device receives this
request from the network.
2. The NAS device converts the I/O request into an appropriate
physical storage request, which is a block-level I/O, and then
performs the operation against the physical storage pool.
3. When the data is returned from the physical storage pool, the
NAS device processes and repackages the data into an
appropriate file protocol response.
4. The NAS device packages this response into TCP/IP again and
forwards it to the client through the network.
Ali Broumandnia, Broumandnia@gmail.com 35
37. 7.7.1 Hosting and Accessing Files on
NAS
1. Create storage array volumes
2. Create NAS Volumes
3. Create NAS file systems
4. Mount file systems
5. Access the file systems
Ali Broumandnia, Broumandnia@gmail.com 37
38. 7.8 Factors Affecting NAS Performance
and Availability
Network congestion is one of the most significant sources
of latency (Figure 7-7) in a NAS environment.
Ali Broumandnia, Broumandnia@gmail.com 38
39. 1. Number of hops
2. Authentication with a directory service such as
LDAP, Active Directory, or NIS
3. Retransmission
4. Over utilized routers and switches
5. File/directory lookup and metadata requests
6. Over utilized NAS devices
7. Over utilized clientsAli Broumandnia, Broumandnia@gmail.com 39
41. 7.9 Concepts in Practice: EMC Celerra
EMC offers NAS solutions with the Celerra family of
products. Celerra is available in either a gateway or an
integrated configuration. EMC Celerra provides a
dedicated, high-performance, high-speed communication
infrastructure for file level I/O s. It uses a significantly
streamlined or tuned operating system. It supports
Network Data Management Protocol (NDMP) for
backup, CIFS, NFS, FTP, and iSCSI.
Ali Broumandnia, Broumandnia@gmail.com 41
42. 7.9.1 Architecture
Celerra consists of a Control Station and NAS heads
(Data Movers). The Data Mover is a network and storage
interface device and the control station is a management
interface device.
Ali Broumandnia, Broumandnia@gmail.com 42
43. Data Mover
The Data Mover is an independent, autonomous file
server that transfers requested files to clients. Figure 7-8
shows the NS40 and NSX blade Data Movers. Data
Access in Real Time (DART) is Celerra’s specialized
operating system, which runs on the Data Mover. This
operating system is optimized for performing file
operations to move data from the storage array to the
network. DART supports standard network file access
protocols, such as NFS, CIFS, and FTP. Features of the
Celerra Data Mover include the following:Ali Broumandnia, Broumandnia@gmail.com 43
44. Dual Intel processors
PCI or PCI-X support
High-memory capacity
Multiport network cards
Fibre Channel connectivity to storage arrays
A highly specialized operating system (DART)
Ali Broumandnia, Broumandnia@gmail.com 44
46. Control Station
The control station provides dedicated processing
capabilities to control, manage, and configure a NAS
solution. The control station hosts the Linux operating
system that is used to install, manage, and configure Data
Movers and monitor the environmental conditions and
performance of all components. The control station also
provides high-availability features such as fault
monitoring, fault recovery, fault reporting, call home,
and remote diagnostics.
Ali Broumandnia, Broumandnia@gmail.com 46
47. Storage Connectivity
Celerra data movers connect to storage in two ways:
integrated and gateway. In the integrated configuration,
dedicated storage is assigned to Celerra (see Figure 7-9[a]).
In this configuration, the control station is connected to the
Data Movers via a private, internal IP network.
Ali Broumandnia, Broumandnia@gmail.com 47
50. 7.9.3 Celerra Management Software
• CLI Management : This can be accessed from the
control station through the SSH (secure shell) interface
tool, or PUTTY.
• GUI Management—Celerra Manager : GUI
management through the Celerra Manager has the
following two options—Celerra Manager Basic
Edition, or Celerra Manager Advanced Edition, which
is licensed separately and provides advanced features.
Ali Broumandnia, Broumandnia@gmail.com 50
51. Summary
Decisions regarding storage infrastructure are based on
maintaining the balance between cost and performance.
Organizations look for the performance and scalability of
SAN combined with the ease of use and lower total cost
of ownership of NAS solutions. The convergence of
SAN and NAS is inevitable because of advances in
storage networking technology. Both SAN and NAS
have enjoyed unique advantages in enterprises, and the
advances in IP technology have scaled NAS solutions to
meet the demands of performance-sensitive applications.Ali Broumandnia, Broumandnia@gmail.com 51
52. Cost and ease of use drive the application’s needs in
terms of performance and capacity. Although NAS
invariably imposes higher protocol overhead, NAS
applications tend to be most efficient for file-sharing
tasks, such as NFS in UNIX, and CIFS in Microsoft
Windows. Network-based locking at the file level
provides a high level of concurrent access protection.
Ali Broumandnia, Broumandnia@gmail.com 52
53. NAS can also be optimized to deliver file information to
many clients with file-level protection. Two common
applications that utilize the effectiveness of NAS include
hosting home directories and providing a data store for
static Web pages that are accessed by different Web
servers. In certain situations, organizations can deploy
NAS solutions for database applications in a limited
manner.
Ali Broumandnia, Broumandnia@gmail.com 53
54. These situations are usually limited to applications for
which the majority of data access is read-only, the
databases are small, access volume is low, and
predictable performance is not mandatory. In this type of
situation, NAS solutions can reduce overall storage costs.
Ali Broumandnia, Broumandnia@gmail.com 54
55. Careful evaluation of emerging trends in the networking
and storage industry is imperative when selecting the
appropriate technology. Along with the need for high
performance, ease of management and sharing of data
are also increasing. The choice of technology should
balance these requirements; consider the complexity and
maturity of the technology that is deployed. IP-SAN,
detailed in the following chapter, is an emerging
technology that has matured to meet enterprise demands.
Ali Broumandnia, Broumandnia@gmail.com 55