SlideShare a Scribd company logo
STORAGE AREA NETWORKS (SAN)
3
FINAL
PRESENTATION
Computer Networks CS_221
GROUP MEMBERS
• SYED NOOR UL HASSAN SUBHANI
(20021519-015)
• MUHAMMAD ABDULLAH HASHMI
(20021519-016)
• USAMA ZAFAR
(20021519-092)
PRESENTED TO:
• MR. MUBBASHAR HUSSAIN
4
STORAGE AREA NETWORK(SAN)
A network whose primary purpose is the transfer of data between computer systems
and among storage elements.
5
DEFINITION
STORAGE AREA NETWORKS (SAN)
• A network whose primary purpose is the transfer of data
between computer systems and among storage
elements.
01
• A storage system consisting of storage elements, storage
devices, computer systems, and/or appliances, plus all
control software, communicating over a network.
6
ARCHITECTURE
STORAGE AREA NETWORKS (SAN)
02
• A SAN consists of a communication infrastructure, which
provides physical connections, and a management layer, which
organizes the connections, storage elements, and computer
systems so that data transfer is secure.
• Fibre Channel is the most widely used SAN technology
because of its speed, scalability and flexibility.
• A SAN is typically based on one of two topologies:
Ring topology that manages traffic flow.
• It is a fairly inexpensive configuration for small and medium
sized SANs. •
7
BENEFITS
STORAGE AREA NETWORKS (SAN)
• Using a SAN can potentially offer the following benefits:
03
 Storage is independent of applications and accessible through
multiple data paths for better reliability, availability, and
serviceability.
 Data transfer and vaulting to remote sites: Remote copy of
data enabled for disaster protection and against malicious
attacks.
 Centralized and consolidated storage:
Simpler management, scalability, flexibility ,and availability.
 Higher application performance: Storage processing is off-
loaded from servers and moved onto a separate network.
8
CONSIDERATIONS
STORAGE AREA NETWORKS (SAN)
• SAN management architecture
SAN storage level.
SAN network level
Enterprise systems level
04
• Data format
Data can be stored as files, or in block format. •
• Security
Security in a LAN environment can be complex..
When utilizing multiple storage servers, it is critical that
one server cannot overwrite another's information..
Access control is also extremely important.
9
Recommended steps to minimize the risks :
• Authentication
• Administrative tasks require administrator log in
access.
• Devices must log in to the storage network
to the data.
SECURITY
STORAGE AREA NETWORK (SAN)
• Authorization
• Individual administrators have permissions to
only perform specific actions on specific devices.
• Storage devices validate rights to data to prevent
access from an unauthorized source.
NETWORK
TECHNOLOGIES
STORAGE AREA NETWOK (SAN)
10
Emerging Technologies
• iSCSI
• Fibre Channel over IP
• Fibre Channel over ATM
• Fibre Channel over SONET
• Fibre Channel over dark fiber or DWDM
Current Technology
• Fibre Channel
Storage Area Network PPT.pptx

More Related Content

Similar to Storage Area Network PPT.pptx

Data Center
Data CenterData Center
Data Center
dhana1663
 
Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds
Orgad Kimchi
 
Computer networking
Computer networkingComputer networking
Computer networking
Tapan Khilar
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
Nasser Hassan
 
Research Paper  Find a peer reviewed article in the following d.docx
Research Paper  Find a peer reviewed article in the following d.docxResearch Paper  Find a peer reviewed article in the following d.docx
Research Paper  Find a peer reviewed article in the following d.docx
eleanorg1
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud Computing
Rutuja751147
 
Research Paper  Find a peer reviewed article in the following dat.docx
Research Paper  Find a peer reviewed article in the following dat.docxResearch Paper  Find a peer reviewed article in the following dat.docx
Research Paper  Find a peer reviewed article in the following dat.docx
audeleypearl
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
Eric Vanderburg
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
EC-Council
 
CC_Jeevan
CC_JeevanCC_Jeevan
CC_Jeevan
Jeevan Kumar
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
Samiksha880257
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
SolarWinds
 
ISM Unit 1.pdf
ISM Unit 1.pdfISM Unit 1.pdf
ISM Unit 1.pdf
PriyanshuPatra1
 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
Protik Roy
 
CCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network DesignCCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network Design
Jonathan Alvarado Covarrubias
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
CloudPassage
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
LeahRachael
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
RahulJain989779
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
saritasingh19866
 
Datacenterarchitecture
DatacenterarchitectureDatacenterarchitecture
Datacenterarchitecture
rlynes
 

Similar to Storage Area Network PPT.pptx (20)

Data Center
Data CenterData Center
Data Center
 
Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds
 
Computer networking
Computer networkingComputer networking
Computer networking
 
University Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical DataUniversity Management System - UMS-X1 Technical Data
University Management System - UMS-X1 Technical Data
 
Research Paper  Find a peer reviewed article in the following d.docx
Research Paper  Find a peer reviewed article in the following d.docxResearch Paper  Find a peer reviewed article in the following d.docx
Research Paper  Find a peer reviewed article in the following d.docx
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud Computing
 
Research Paper  Find a peer reviewed article in the following dat.docx
Research Paper  Find a peer reviewed article in the following dat.docxResearch Paper  Find a peer reviewed article in the following dat.docx
Research Paper  Find a peer reviewed article in the following dat.docx
 
A Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric VanderburgA Guide to Secure Remote Access - Eric Vanderburg
A Guide to Secure Remote Access - Eric Vanderburg
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
CC_Jeevan
CC_JeevanCC_Jeevan
CC_Jeevan
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Network Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the BasicsNetwork Management Fundamentals - Back to the Basics
Network Management Fundamentals - Back to the Basics
 
ISM Unit 1.pdf
ISM Unit 1.pdfISM Unit 1.pdf
ISM Unit 1.pdf
 
Net 02 03_lan
Net 02 03_lanNet 02 03_lan
Net 02 03_lan
 
CCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network DesignCCNA 4 Hierarchical Network Design
CCNA 4 Hierarchical Network Design
 
Security and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud InfrastructureSecurity and Compliance for Enterprise Cloud Infrastructure
Security and Compliance for Enterprise Cloud Infrastructure
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
12-Dynamic Resource Provisioning, Security Aspects, Module-5-Cognitive comput...
 
Synapseindia revirews about networking
Synapseindia revirews about networkingSynapseindia revirews about networking
Synapseindia revirews about networking
 
Datacenterarchitecture
DatacenterarchitectureDatacenterarchitecture
Datacenterarchitecture
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 

Storage Area Network PPT.pptx

  • 1.
  • 3. 3 FINAL PRESENTATION Computer Networks CS_221 GROUP MEMBERS • SYED NOOR UL HASSAN SUBHANI (20021519-015) • MUHAMMAD ABDULLAH HASHMI (20021519-016) • USAMA ZAFAR (20021519-092) PRESENTED TO: • MR. MUBBASHAR HUSSAIN
  • 4. 4 STORAGE AREA NETWORK(SAN) A network whose primary purpose is the transfer of data between computer systems and among storage elements.
  • 5. 5 DEFINITION STORAGE AREA NETWORKS (SAN) • A network whose primary purpose is the transfer of data between computer systems and among storage elements. 01 • A storage system consisting of storage elements, storage devices, computer systems, and/or appliances, plus all control software, communicating over a network.
  • 6. 6 ARCHITECTURE STORAGE AREA NETWORKS (SAN) 02 • A SAN consists of a communication infrastructure, which provides physical connections, and a management layer, which organizes the connections, storage elements, and computer systems so that data transfer is secure. • Fibre Channel is the most widely used SAN technology because of its speed, scalability and flexibility. • A SAN is typically based on one of two topologies: Ring topology that manages traffic flow. • It is a fairly inexpensive configuration for small and medium sized SANs. •
  • 7. 7 BENEFITS STORAGE AREA NETWORKS (SAN) • Using a SAN can potentially offer the following benefits: 03  Storage is independent of applications and accessible through multiple data paths for better reliability, availability, and serviceability.  Data transfer and vaulting to remote sites: Remote copy of data enabled for disaster protection and against malicious attacks.  Centralized and consolidated storage: Simpler management, scalability, flexibility ,and availability.  Higher application performance: Storage processing is off- loaded from servers and moved onto a separate network.
  • 8. 8 CONSIDERATIONS STORAGE AREA NETWORKS (SAN) • SAN management architecture SAN storage level. SAN network level Enterprise systems level 04 • Data format Data can be stored as files, or in block format. • • Security Security in a LAN environment can be complex.. When utilizing multiple storage servers, it is critical that one server cannot overwrite another's information.. Access control is also extremely important.
  • 9. 9 Recommended steps to minimize the risks : • Authentication • Administrative tasks require administrator log in access. • Devices must log in to the storage network to the data. SECURITY STORAGE AREA NETWORK (SAN) • Authorization • Individual administrators have permissions to only perform specific actions on specific devices. • Storage devices validate rights to data to prevent access from an unauthorized source.
  • 10. NETWORK TECHNOLOGIES STORAGE AREA NETWOK (SAN) 10 Emerging Technologies • iSCSI • Fibre Channel over IP • Fibre Channel over ATM • Fibre Channel over SONET • Fibre Channel over dark fiber or DWDM Current Technology • Fibre Channel