SlideShare a Scribd company logo
Network Attached Storage
Brent Caison
Charles Hammitt
Sean Semone
Lewis Binkowski
Casey Emerson
Georgia Allen
David Pcolar
Rob Noel
James Fox
Michael Barker
Objective: to provide a cost-effective consolidation point for
network attached storage that allows campus units to choose
not to duplicate similar or identical solutions locally
Team members:
Solutions: UNC Home space
• Personal storage space located on a network
accessible resource
• Complementary space to AFS
• Centrally allocated- opt in service using a web
submit, similar to AFS
• Initial offering:
– 10 GB per user, with no expansion at start
– CIFs based
– Authentication based on ad.unc.edu
– User Managed, supported through ITS Help
Solutions: UNC Shared Space
Shared enterprise level network attached storage
space for departments, divisions, and Schools.
• Central provisioning and backup paired with
distributed localized management
• Base allocation established by headcount, and
provided at no cost
• Additional allocation available at cost, billed
annually
• Base allocation calculation: 10 GB per employee
Solutions: UNC Shared Space
Initial offering:
• CIFs based
• Includes disaster recovery protection (backup)
• Authentication based on ad.unc.edu
• Additional allocation:
– $2.50 per GB
– Billed yearly
– Minimum incremental size of 100GB
Possible Future Additions
Add "Dropbox" style connectivity to allow "cloud
like" access.
Add sFTP, FTPs and HTTPs (WebDAV) to allow
more options in connectivity.
Currently out of scope
• Specialty research storage
• Higher level “Sensitive” or “Secure” data
Proposed Timeline
Funding dependent
• Phase roll out beginning in January 2011- Offer
UNC Home space and UNC Shared Space to
campus.
• Late Spring 2011- Expand access options
– Investigate “Dropbox” or “Cloud like” access to UNC
Home
– Expand options for UNC Group to include sFTP, FTPs
• Fall 2012- Expand access options to include NFS4
Next Steps
• Solution review by Security
• Complete hardware evaluation
• Operationalize service
• Work with campus groups on “Secure” storage
needs
Levels of “Secure”
• IRB definitions from UNC VCRED
• UNC Information Security Policies
• Carnegie Mellon Security Policies
• Trend is toward 3 levels of Secure:
– Public
– Private
– Restricted

More Related Content

Viewers also liked

Digital storytelling reflection
Digital storytelling reflectionDigital storytelling reflection
Digital storytelling reflection
Megan Smith
 
Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Gary Wilhelm
 
Using Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementUsing Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data Management
Gary Wilhelm
 

Viewers also liked (9)

Digital storytelling reflection
Digital storytelling reflectionDigital storytelling reflection
Digital storytelling reflection
 
Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations Transitions and Extensions – What Schools Have Learned from Sakai Migrations
Transitions and Extensions – What Schools Have Learned from Sakai Migrations
 
Taller 4 ahiver
Taller 4 ahiverTaller 4 ahiver
Taller 4 ahiver
 
Building Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CHBuilding Cyber-infrastructure at UNC-CH
Building Cyber-infrastructure at UNC-CH
 
Go go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff useGo go gadgets! Implementing a technology collection for staff use
Go go gadgets! Implementing a technology collection for staff use
 
Using Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data ManagementUsing Dataverse Virtual Archive Technology for Research Data Management
Using Dataverse Virtual Archive Technology for Research Data Management
 
Supporting your remote clients with bomgar
Supporting your remote clients with bomgarSupporting your remote clients with bomgar
Supporting your remote clients with bomgar
 
Traits
TraitsTraits
Traits
 
Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative Network Attached Storage (NAS) Initiative
Network Attached Storage (NAS) Initiative
 

Similar to Network Attached Storage Initiative

Desktop as a Service supporting Environmental ‘omics
Desktop as a Service supporting Environmental ‘omicsDesktop as a Service supporting Environmental ‘omics
Desktop as a Service supporting Environmental ‘omics
David Wallom
 
Other distributed systems
Other distributed systemsOther distributed systems
Other distributed systems
Sri Prasanna
 
Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010
Jason Powless
 

Similar to Network Attached Storage Initiative (20)

Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and Education
 
Desktop as a Service supporting Environmental ‘omics
Desktop as a Service supporting Environmental ‘omicsDesktop as a Service supporting Environmental ‘omics
Desktop as a Service supporting Environmental ‘omics
 
Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...Supporting Research through "Desktop as a Service" models of e-infrastructure...
Supporting Research through "Desktop as a Service" models of e-infrastructure...
 
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
SoftLayer Storage Services Overview (for Interop Las Vegas 2015)
 
Dynamic Provisioning of Data Intensive Computing Middleware Frameworks
Dynamic Provisioning of Data Intensive Computing Middleware FrameworksDynamic Provisioning of Data Intensive Computing Middleware Frameworks
Dynamic Provisioning of Data Intensive Computing Middleware Frameworks
 
Other distributed systems
Other distributed systemsOther distributed systems
Other distributed systems
 
Cloud and Desktop aaS for Teaching
Cloud and Desktop aaS for TeachingCloud and Desktop aaS for Teaching
Cloud and Desktop aaS for Teaching
 
Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010
 
Sept 24 NISO Virtual Conference: Library Data in the Cloud
Sept 24 NISO Virtual Conference: Library Data in the CloudSept 24 NISO Virtual Conference: Library Data in the Cloud
Sept 24 NISO Virtual Conference: Library Data in the Cloud
 
Dropbox
DropboxDropbox
Dropbox
 
Network research
Network researchNetwork research
Network research
 
Chapter-5-DFS.ppt
Chapter-5-DFS.pptChapter-5-DFS.ppt
Chapter-5-DFS.ppt
 
e-infrastructural needs to support informatics
e-infrastructural needs to support informaticse-infrastructural needs to support informatics
e-infrastructural needs to support informatics
 
Superior Streaming and CDN Solutions: Cloud Storage Revolutionizes Digital Media
Superior Streaming and CDN Solutions: Cloud Storage Revolutionizes Digital MediaSuperior Streaming and CDN Solutions: Cloud Storage Revolutionizes Digital Media
Superior Streaming and CDN Solutions: Cloud Storage Revolutionizes Digital Media
 
Introduction to the Globus SaaS (GlobusWorld Tour - STFC)
Introduction to the Globus SaaS (GlobusWorld Tour - STFC)Introduction to the Globus SaaS (GlobusWorld Tour - STFC)
Introduction to the Globus SaaS (GlobusWorld Tour - STFC)
 
Web Archiving – Lessons and Potential
 Web Archiving – Lessons and Potential Web Archiving – Lessons and Potential
Web Archiving – Lessons and Potential
 
Edinburgh DataShare - DSpace for Data
Edinburgh DataShare - DSpace for DataEdinburgh DataShare - DSpace for Data
Edinburgh DataShare - DSpace for Data
 
071310 sun d_0930_feldman_stephen
071310 sun d_0930_feldman_stephen071310 sun d_0930_feldman_stephen
071310 sun d_0930_feldman_stephen
 
Container Networking Challenges for Production Readiness
Container Networking Challenges for Production ReadinessContainer Networking Challenges for Production Readiness
Container Networking Challenges for Production Readiness
 
Production Challenges for Container Networking
Production Challenges for Container NetworkingProduction Challenges for Container Networking
Production Challenges for Container Networking
 

More from Gary Wilhelm

Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
Gary Wilhelm
 

More from Gary Wilhelm (8)

Policy-based Data Management
Policy-based Data Management Policy-based Data Management
Policy-based Data Management
 
IPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have ToIPv6: We Care So You Don't Have To
IPv6: We Care So You Don't Have To
 
After the Breach
After the BreachAfter the Breach
After the Breach
 
Virtualization and you: where are we?
Virtualization and you: where are we?Virtualization and you: where are we?
Virtualization and you: where are we?
 
Online Copyright Education
Online Copyright EducationOnline Copyright Education
Online Copyright Education
 
Increasing Utilization of Software Site Licenses
Increasing Utilization of Software Site LicensesIncreasing Utilization of Software Site Licenses
Increasing Utilization of Software Site Licenses
 
Leveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of ContactLeveraging Centralized IT Support Services as a First Point of Contact
Leveraging Centralized IT Support Services as a First Point of Contact
 
S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)S#$% My Network Says (CTC Retreat 2010)
S#$% My Network Says (CTC Retreat 2010)
 

Recently uploaded

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Network Attached Storage Initiative

  • 1. Network Attached Storage Brent Caison Charles Hammitt Sean Semone Lewis Binkowski Casey Emerson Georgia Allen David Pcolar Rob Noel James Fox Michael Barker Objective: to provide a cost-effective consolidation point for network attached storage that allows campus units to choose not to duplicate similar or identical solutions locally Team members:
  • 2. Solutions: UNC Home space • Personal storage space located on a network accessible resource • Complementary space to AFS • Centrally allocated- opt in service using a web submit, similar to AFS • Initial offering: – 10 GB per user, with no expansion at start – CIFs based – Authentication based on ad.unc.edu – User Managed, supported through ITS Help
  • 3. Solutions: UNC Shared Space Shared enterprise level network attached storage space for departments, divisions, and Schools. • Central provisioning and backup paired with distributed localized management • Base allocation established by headcount, and provided at no cost • Additional allocation available at cost, billed annually • Base allocation calculation: 10 GB per employee
  • 4. Solutions: UNC Shared Space Initial offering: • CIFs based • Includes disaster recovery protection (backup) • Authentication based on ad.unc.edu • Additional allocation: – $2.50 per GB – Billed yearly – Minimum incremental size of 100GB
  • 5. Possible Future Additions Add "Dropbox" style connectivity to allow "cloud like" access. Add sFTP, FTPs and HTTPs (WebDAV) to allow more options in connectivity.
  • 6. Currently out of scope • Specialty research storage • Higher level “Sensitive” or “Secure” data
  • 7. Proposed Timeline Funding dependent • Phase roll out beginning in January 2011- Offer UNC Home space and UNC Shared Space to campus. • Late Spring 2011- Expand access options – Investigate “Dropbox” or “Cloud like” access to UNC Home – Expand options for UNC Group to include sFTP, FTPs • Fall 2012- Expand access options to include NFS4
  • 8. Next Steps • Solution review by Security • Complete hardware evaluation • Operationalize service • Work with campus groups on “Secure” storage needs
  • 9. Levels of “Secure” • IRB definitions from UNC VCRED • UNC Information Security Policies • Carnegie Mellon Security Policies • Trend is toward 3 levels of Secure: – Public – Private – Restricted

Editor's Notes

  1. Thanks to Lew Binkowski for authoring the slides and making the initial presentation to ITEC Overview of NAS committee charter Survey results provided a good starting point for development of services. Size and connectivity We decided to focus on the types of services that could be offered. Looking at hardware separately, since there are only a few vendors, needed to determine requirements for service? Focused on CIFs to start for costs Out of scope: Space for specialty research storage High speed drives
  2. UNC Home space Personal storage space located on a network accessible resource Complimentary space to AFS Centrally allocated- opt in service using a web submit, similar to AFS   Initial offering: 10 GB per user, with no expansion at start CIFs based Authentication based on ad.unc.edu - ad/ONYEN User managed, supported through ITS help Backup and recovery service   Guidelines for use: Subject to acceptable use policy Do not recommend storing .pst files since Microsoft does not support network drive access Would prefer that people did not use this for their entertainment collections
  3. UNC Shared Space Shared enterprise level network attached storage space for departments, divisions, and Schools. Central provisioning and backup paired with distributed localized management   Base allocation established by headcount, and provided at no cost may include student employees – under discussion   Additional allocation available at cost, billed annually   Base allocation calculation: 10 GB per employee Initial offering: CIFs based Includes disaster recovery protection (backup) Authentication based on ad.unc.edu Additional allocation: $2.50 per GB Billed yearly Minimum incremental size of 100GB   Potential future options/ Additions   Add sFTP and FTPs Add "Dropbox" style connectivity to allow "cloud like" access. Https (Webdav)         Guidelines for use: Do not recommend storing .pst files since Microsoft does not support network drive access Would prefer fewer larger expansions over several smaller expansions    
  4. Base allocation calculation: 10 GB per employee   Initial offering: CIFs based Includes disaster recovery protection (backup) Authentication based on ad.unc.edu Additional allocation: $2.50 per GB Billed yearly Minimum incremental size of 100GB
  5. Add sFTP and FTPs Add "Dropbox" style connectivity to allow "cloud like" access. Https (Webdav)  
  6. Research data- Most research data sets require specific levels of security etc., HIPPA, Ferpa. Due to the uniqueness of each of these requirements, Many require “one off” solution. Can not offer a “General” service for these with out significant cost increase Research Computing offers service. Committee recommends creation of taskforce to look at expanding this service. Sensitive or secure? Both offerings are being designed to hit mid-level of security- (Level 2 from UNC IRB) Will be some data sets that should not be stored here. Meeting security requirements for Research data sets requires increased security regulations on both infrastructure and access that increase costs significantly. Not necessarily appropriate for lower levels of data High speed disk Different group addressing that issue Can’t put fast disk on slow network Research is built around placing fast disk next to fast systems
  7. Phased roll out beginning Estimated cost about- $1.1 million for year one, same for year 2 500 TB of data to start 7000 SPA, 7000 EPA 14K headcount
  8. Year 3 poses additional costs for replacement/expansion Segway for Stan to talk about storage
  9. Public – “Could be written on billboard” Private- Breach could cause university minor embarrassment or issue Restricted – Breach could cause university major embarrassment or issue