Advanced Storage Technologies for Business Continuity

Advanced Storage Technologies for Business Continuity

Nijaz Bajgoric (University of Sarajevo, Bosnia)
DOI: 10.4018/978-1-60566-160-5.ch011
OnDemand PDF Download:
$37.50

Abstract

In addition to standard storage and traditional tape-based backup technologies explained in Chapter X, businesses employ advanced storage technologies in order to achieve higher levels of applications and data availability. Most widely used advanced storage technologies such as direct access storage (DAS), storage area network (SAN), network attached storage (NAS), RAID technology, mirroring and data replication, data vaulting, continuous data protection, and clustering are explained in Chapter XI.
Chapter Preview
Top

Das, San, And Nas

Direct access storage, storage area network, and network access storage technologies are briefly explained in this section.

Contemporary business is forced to cope with demands for more efficient and effective storage solutions as part of its efforts to recover faster and more efficiently from any type of failure and/or disaster. Apart from standard backup technologies, business computing employs additional technologies in finding the ways of managing data in an efficient and effective way. With advances in data communications, networking technologies and high speed coomunication lines, in addition to traditional primary storage technologies, several new approaches called “advanced storage systems” have been developed.

Most widely used advanced storage technologies are: a) direct access storage, b) storage area network (SAN), and c) network attached storage (NAS).

SAN and NAS technologies are mainly based on a) Fibre Channel as a mature storage backbone technology and/or b) newly developed Internet SCSI (iSCSI) and Serial ATA technologies. SANs that use iSCSI protocol are gaining acceptance as a supplement or even complete replacement for Fibre Channel-based SANs. Today, these storage solutions and services are being integrated into server operating platforms. For instance, HP decided to integrate Smart Array serial controllers, storage enclosures, Hot-Plug Serial Attached SCSI and Serial ATA hard drivers with HP ProLiant servers (Singer, 2005). Such an operating environment does not require separate connection devices/protocols for interconnecting servers, storage, networking devices. Support for storage scalability includes support for RAID systems and scalability clustering options.

Direct access storage (DAS) is a solution that is based on a direct connection between a server and its storage system (see Figure 1). Hard disk installed on a standard computer is also considered as a direct access storage system. This approach does not use a lot of networking devices, it is implemented onsite. Hence, it is characterized as a high performance solution with regard to data transfer rates. Several technologies are used within this model of storing data:

Figure 1.

Direct attached storage (DAS)

  • SCSI (Small Computer System Interface)

  • RAID systems (Redundant Array of Independent/Inexpensive Disks)

  • Serial or Serial Attached SCSI—SAS

  • Fibre Channel technology.

Storage area network approach is based on sharing a storage system among several servers and storage devices by using SCSI, iSCSI, and Fibre Channel communication technology. Remote storage devices (disks, disk arrays, tape devices, tape libraries) can be attached to servers. SAN model uses file-based protocols such as NFS, SMB-SAMBA (Small/Server Message Block) and CIFS that allow attaching and sharing file systems over the network.

Storage area network is a network that is usually isolated from the local area networks and wide area networks. It employs high-speed networking technologies (Gigabits/sec).

NFS is an acronym for network file system developed by Sun and is used as a main networking platform on UNIX servers and workstations. Another product called NIS (network information services) was also developed by Sun and is distributed today together with NFS, in the form of NFS/NIS protocol. A version for connecting PCs called PCNFS was developed as well and is used in order to connect PCs to UNIX/Linux servers and share file systems.

SAMBA is a distributed as an open source code under the GNU General Public License system (www.samba.org). It is available for most UNIX versions including: HP-UX, AIX, IRIX, Solaris, SunOS, Ultrix, NetBSD, FreeBSD, OpenBSD, SCO-UNIX, proprietary systems such as OpenVMS and IBM MVS (OS/390—z/OS). It is supported by Linux community, as well. SAMBA is used as a powerful tool for interoperability between UNIX/Linux servers, proprietary servers and Windows-based servers and clients. However, this protocol can be used as a platform for SAN platforms.

Complete Chapter List

Search this Book:
Reset
Dedication
Nijaz Bajgoric
Table of Contents
Foreword
Angappa Gunasekaran
Preface
Nijaz Bajgoric
Acknowledgment
Nijaz Bajgoric
Chapter 1
Nijaz Bajgoric
The first chapter aims at defining a “big picture” of contemporary business and business computing. Business pressures and business risks are... Sample PDF
Business Computing in the Internet Era
$37.50
Chapter 2
Economics of Downtime  (pages 23-39)
Nijaz Bajgoric
After introducing some basic facts on how today’s businesses are faced with several types of business risks, the second chapter tends to explain one... Sample PDF
Economics of Downtime
$37.50
Chapter 3
Nijaz Bajgoric
The previous chapter introduced the two major concepts of continuous computing: downtime and uptime. Chapter three goes a step further and aims at... Sample PDF
Business Continuity and Business Continuity Drivers
$37.50
Chapter 4
Nijaz Bajgoric
Based on the framework defined in Chapter III, the fourth chapter discusses the models of information architectures that are used in implementing... Sample PDF
Information Architectures for Business Continuity
$37.50
Chapter 5
Nijaz Bajgoric
After identifying major downtime points within a client-server architecture in Chapter IV, Chapter V discusses in more details enterprise servers... Sample PDF
Server Operating Environment and Business Continuity Drivers
$37.50
Chapter 6
Server Operating Systems  (pages 103-131)
Nijaz Bajgoric
Server configurations described in Chapter V are operated by server operating systems. Server-based application software and business-critical... Sample PDF
Server Operating Systems
$37.50
Chapter 7
Nijaz Bajgoric
Server operating systems described in Chapter VI usually come preinstalled. Additional components can be installed “on-demand” in the form of... Sample PDF
Advanced Server Technologies for Business Continuity
$37.50
Chapter 8
Nijaz Bajgoric
Chapter VIII discusses the server operating systems’ main attributes from the selection perspective. Several selection criteria are explained... Sample PDF
Choosing the Server Operating Platform for Business Continuity
$37.50
Chapter 9
Nijaz Bajgoric
Chapter IX focuses on the role of system administration as an IT-profession and system administrator as a person who does the administrative... Sample PDF
System Administration and System Administrator's Role in Business Continuity
$37.50
Chapter 10
Nijaz Bajgoric
Chapters V-IX dealt with server operating environment and its role in ensuring business continuity mostly in cases of ongoing data processing... Sample PDF
Backup and Recovery Technologies for Business Continuity
$37.50
Chapter 11
Nijaz Bajgoric
In addition to standard storage and traditional tape-based backup technologies explained in Chapter X, businesses employ advanced storage... Sample PDF
Advanced Storage Technologies for Business Continuity
$37.50
Chapter 12
Nijaz Bajgoric
Continuous computing technologies explored in previous chapters, in many cases, are located on different locations. However, they depend on each... Sample PDF
Networking Technologies for Business Continuity
$37.50
Chapter 13
Nijaz Bajgoric
After explaining several continuous computing technologies in previous chapters, the book focuses on business continuity management in Chapter XIII.... Sample PDF
Business Continuity Management
$37.50
Chapter 14
Nijaz Bajgoric
Continuous computing technologies are employed in order to achieve business continuity from the business operations perspective. In the same time... Sample PDF
Business Continuity for Business Agility
$37.50
About the Author