Abstract
This paper highlights some of the challenges and solutions in managing data in an Enterprise data center. This paper also look into the aspects of how the data can be secured using shared storage concept and how to make them available for recovery.
With a continuously changing business scenario, enterprises are looking to purchase or develop cutting edge solutions to remain competitive and bring down the cost of operation. The components in the storage stack need be replaceable and built around standard open interfaces. Also it should support seamless data migration capabilities.
4
About the Author
Jiji Murikkoli Puthanpurayil is the Service Delivery Manager for Goldman Sachs Data Canter Managaement project. He holds a Bachelor degree
…show more content…
The client is a reputed financial and banking firm technologically well advanced and always keen to be the first in experiencing cutting edge technologies.
5
1. Shared Storage
Advantages of Shared Storage over Local Storage
● Efficient use and allocation of storage capacity.
● Performance.
● Business continuity.
Shared Storage Offerings
➔ File: Shared network file storage(NAS), presented to a physical or VM host via network (CIFS or
NFS).
➔ Block: Shared block storage (SAN), presented to a physical host via fiber channel, or to a physical or
VM host via network(iSCSI).
➔ Object: Shared blob storage, presented to an application via API.
1.1 Which Storage option suits your business?
While shared storage holds a clear edge over local attached storage, the multiple options available for shared storage can often cause some dilemma. While some of the options may look attractive in terms of performance and data management perspective, it may also require some additional infrastructure which can incur extra cost. However analyzing the business requirement with other factors like cost, one can choose a suitable and viable storage solution.
6
1.1.1 Choosing your Centralized Storage Options
SAN NAS
…show more content…
A SAN does not provide file abstraction, only blocklevel operations. However, file systems built on top of
SANs do provide filelevel access, and are known as SAN filesystems or shared disk file systems.
NAS
Networkattached storage (NAS) is filelevel computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements.
NAS is often manufactured as acomputer appliance – a specialized computer built from the ground up for storing and serving files – rather than simply a general purpose computer being used for the role.
As of 2010 NAS devices began gaining popularity as a convenient method of sharing files among multiple computers. Potential benefits of dedicated networkattached storage, compared to generalpurpose servers also serving files, include faster data access, easier administration, and simple configuration. NAS systems are networked appliances which contain one or more hard drives, often arranged into logical, redundant storage containers or RAID.
1.3 How do local area networks (LANs) differ from wide area networks (WANs) and backbone networks (BNs) Local area networks are limited within an organization Wide area networks extend over a large geographical distance and may be privately owned or rented Backbone network are the part of network infrastructure that feeds the connected networks 1.8 Describe the seven layers in the OSI network model and what they do. Application – this layer is specific to applications and provides services such as email, network software services and file transfers Presentation - In this layer, the data is formatted in a schema that network understands, and also manages data encryption and decryption Session – this layer establishes and controls the data communication between
The files and directories present a Chubby cell is called nodes can act as a lock. Handles are created every time when a client open nodes, which are similar to UNIX file descriptors.
S-CSP: Storage provider is nothing but kind of an entity which makes available storage services of data inside a public cloud. S-CSP offers outsourcing data services and then it stores that data in support of a users of the data. To trim down the cost of storage, the Service Providers eradicates the storing of an unneeded data by using Deduplication technique or methods whereas it also maintains only distinctive form of data rather keeping all the files having similar content. Users:
7.7.1 Data Owners 1. One whose going to access files, one who owns file, who requires his data to be secure. 2. Data owners are responsible for encrypting the data by generating private key. MMCOE, Department of Computer Engineering, 2015-2016 26 Regeneration of code based cloud storage 3.
FTI leverages native storage and multiple replications and erasures techniques to supply many levels of dependability and performance. FTI provides application-level check inform that enables users to pick out that knowledge must be protected, so as to enhance potency and avoid house, time and energy waste. Figure It offers an on the spot knowledge interface so users don 't have to be compelled to wear down files and/or directory names. All data is managed by FTI in a very clear fashion for the user.
Thanks to its flash storage which uses solid state technology, which means there are no moving parts. Without any moving mechanical parts, flash storage is more reliable, durable and quiet than traditional hard drives. And, it takes up much less space than a traditional hard drive too. That creates room
A logical topology describes how software controls access to a network and the sharing of its specific resources such as applications and databases. Both a physical and logical topology are necessary to complete the whole of a network’s functionality. A network cannot exist without setting up and configuring its hardware and software so that the various parts of the whole work together
Prevalent storage choices include the S3 (Amazon Simple Storage Service), EBS (Elastic Block Store) and Amazon CloudFront. Amazon Simple Storage Service offers Web Service based storage and it is a totally redundant storage offering that can process any amount of data at anytime and anywhere on the Web. It can be used for backup, record and calamity recovery, and content storage, allocation and data analysis storage. S3 is current as part of the free Amazon Elastic Compute Cloud (EC2) tier service for 5GB of storage, 20,000 Get Needs or 5,000 Put Needs per month.
KELSER – ‘Technology forward’, provides a cloud solution for disaster recovery and targets especially small and medium business (SMB’s) which can provide a speedy recovery with lesser hardware dependency. The main advantage of using Kelser products is that it provides scalability for its DR services and can be purchased on ‘a need’ basis. The biggest drawback is that, it does not address all the business units of an organization and hence the DR process cannot be address at an organizational level which leads to lack of ownership in dealing with disaster recovery (KELSER, 2016).
Every page, folder, template, group and user record has an audit trail that captures every change made, with the date/time and user stamp to indicate who made the change and when. Users with appropriate security access can view this information, and reporting is also available to pinpoint specific types of changes or to narrow down records to specific time frames. 6. How does the system ensure availability, security and privacy of data on shared
9. What is the function of a network server? The function of a network server is to connect a group of workstations. It can communicate with the connected workstations and other devices.
Susan Mckinney Week 3 MOS 1 Discussion Thread What measures can be taken to guarantee the security of EHRs? So many things can be done to insure the safety of patients Electronic Health Records (EHR).
This gives access to different kinds of websites and information that is shared between
1. Network and trust are availed to everyone-There is the allowance to edit, share, reuse… of data. Content sourcing-Users are motivated and encouraged to update data; the better it gets. Trust-Workers and clients can gain access and use web tools on their own.
Remote teams are becoming more and more common in modern enterprise, for many reasons. The main one is money, as it saves a considerable amount of money in a competitive market and difficult economic climate. However, many managers are questioning whether it is an ideal way to do business and whether remote working or the traditional office structure produces better results and profits. Much of it comes down to personal preference as to how each individual prefers to work, but taking the IT industry as an example, many have found that they are actually much more productive and turn in better quality work from home rather than the office. Here are just a few ways that IT professionals, and indeed people of any profession, have improved their