SlideShare une entreprise Scribd logo
1  sur  26
Chung Phan CSMN 601 Spring 2001 Storage Area Network  (SAN):  The Technology Behind SAN
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Background
Background (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Background (Cont.) Server  Attach Storage (SAS): usage and issue
Background (Cont.) Network Attach Storage (NAS): usage and issue
Background (Cont.) Storage Area Network (SAN): usage and issue
Background (Cont.) ,[object Object],[object Object]
SAN Topology and Fiber Channel (FC) Technology SAN technology has been existing in the form of proposals and standards drafts for quite sometime, in 1995 the Fiber Channel architecture became ANSI standard and subsequently in 1996 the Fiber Channel products started to flood the market in huge volume
SAN Topology and Fiber Channel (FC) Technology (Cont.) ,[object Object],[object Object]
SAN Topology and Fiber Channel (FC) Technology (Cont.)   ,[object Object],[object Object]
SAN Topology and Fiber Channel (FC) Technology (Cont.)   ,[object Object],[object Object],[object Object]
SAN Topology and Fiber Channel (FC) Technology (Cont.)   ,[object Object],[object Object],[object Object],[object Object]
SAN Topology and Fiber Channel (FC) Technology (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SAN Topology and Fiber Channel (FC) Technology (Cont.) ,[object Object]
Planning and Managing SAN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Planning and Managing SAN (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Planning and Managing SAN (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Planning and Managing SAN (Cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Management Perspective ,[object Object],[object Object],[object Object]
Management Perspective (Cont.) ,[object Object],[object Object]
Management Perspective (Cont.) ,[object Object],[object Object],[object Object],[object Object]
Management Perspective (Cont.) ,[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion (Cont.) ,[object Object],[object Object]
Additional information ,[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer Networks
Seraphic Nazir
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
sagaroceanic11
 
Network attached storage
Network attached storageNetwork attached storage
Network attached storage
ashutosh rai
 
Chapter 9: SCSI Drives and File Systems
Chapter 9: SCSI Drives and File SystemsChapter 9: SCSI Drives and File Systems
Chapter 9: SCSI Drives and File Systems
askme
 
SCSI Protocol
SCSI ProtocolSCSI Protocol
SCSI Protocol
Rakesh T
 

Tendances (20)

Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer Networks
 
Storage Basics
Storage BasicsStorage Basics
Storage Basics
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
 
Storage Managment
Storage ManagmentStorage Managment
Storage Managment
 
Direct Attached Storage CONCEPTS
Direct Attached Storage CONCEPTSDirect Attached Storage CONCEPTS
Direct Attached Storage CONCEPTS
 
Network attached storage
Network attached storageNetwork attached storage
Network attached storage
 
Storage basics
Storage basicsStorage basics
Storage basics
 
Storage Area Network (SAN session Day-2)
Storage Area Network (SAN session Day-2)Storage Area Network (SAN session Day-2)
Storage Area Network (SAN session Day-2)
 
San
SanSan
San
 
Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
RAID
RAIDRAID
RAID
 
RAID CONCEPT
RAID CONCEPTRAID CONCEPT
RAID CONCEPT
 
Chapter 9: SCSI Drives and File Systems
Chapter 9: SCSI Drives and File SystemsChapter 9: SCSI Drives and File Systems
Chapter 9: SCSI Drives and File Systems
 
5. IO virtualization
5. IO virtualization5. IO virtualization
5. IO virtualization
 
SCSI Protocol
SCSI ProtocolSCSI Protocol
SCSI Protocol
 
Network Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure OverviewNetwork Function Virtualization : Infrastructure Overview
Network Function Virtualization : Infrastructure Overview
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
Nas and san
Nas and sanNas and san
Nas and san
 

En vedette

Intelligence, spies & espionage
Intelligence, spies & espionageIntelligence, spies & espionage
Intelligence, spies & espionage
dgnadt
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
Information Technology
 
ICCV2009: MAP Inference in Discrete Models: Part 5
ICCV2009: MAP Inference in Discrete Models: Part 5ICCV2009: MAP Inference in Discrete Models: Part 5
ICCV2009: MAP Inference in Discrete Models: Part 5
zukun
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
koolkampus
 

En vedette (20)

Android UI
Android UIAndroid UI
Android UI
 
Securing Windows web servers
Securing Windows web serversSecuring Windows web servers
Securing Windows web servers
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
Serial Killers Presentation1
Serial Killers Presentation1Serial Killers Presentation1
Serial Killers Presentation1
 
Lec 03 set
Lec 03   setLec 03   set
Lec 03 set
 
Carrick - Introduction to Physics & Electronics - Spring Review 2012
Carrick - Introduction to Physics & Electronics - Spring Review 2012Carrick - Introduction to Physics & Electronics - Spring Review 2012
Carrick - Introduction to Physics & Electronics - Spring Review 2012
 
Functional style programming
Functional style programmingFunctional style programming
Functional style programming
 
Android Application: Introduction
Android Application: IntroductionAndroid Application: Introduction
Android Application: Introduction
 
Noah Z - Spies
Noah Z - SpiesNoah Z - Spies
Noah Z - Spies
 
Intelligence, spies & espionage
Intelligence, spies & espionageIntelligence, spies & espionage
Intelligence, spies & espionage
 
CITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHANCITY OF SPIES BY SORAYYA KHAN
CITY OF SPIES BY SORAYYA KHAN
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Trends in spies
Trends in spiesTrends in spies
Trends in spies
 
ICCV2009: MAP Inference in Discrete Models: Part 5
ICCV2009: MAP Inference in Discrete Models: Part 5ICCV2009: MAP Inference in Discrete Models: Part 5
ICCV2009: MAP Inference in Discrete Models: Part 5
 
Intoduction to Network Security NS1
Intoduction to Network Security NS1Intoduction to Network Security NS1
Intoduction to Network Security NS1
 
Functional programming with python
Functional programming with pythonFunctional programming with python
Functional programming with python
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Functional Programming in R
Functional Programming in RFunctional Programming in R
Functional Programming in R
 
Lecture#01
Lecture#01Lecture#01
Lecture#01
 
Uni cambridge
Uni cambridgeUni cambridge
Uni cambridge
 

Similaire à SAN

Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And Nas
Jill Lyons
 
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docx
C8-1 CASE STUDY 8    CARLSON COMPANIES STORAGE SOLUT.docxC8-1 CASE STUDY 8    CARLSON COMPANIES STORAGE SOLUT.docx
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docx
clairbycraft
 
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docx
C8-1 CASE STUDY 8    CARLSON COMPANIES STORAGE SOLUT.docxC8-1 CASE STUDY 8    CARLSON COMPANIES STORAGE SOLUT.docx
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docx
jasoninnes20
 

Similaire à SAN (20)

Advanced DB chapter 2.pdf
Advanced DB chapter 2.pdfAdvanced DB chapter 2.pdf
Advanced DB chapter 2.pdf
 
Storage area network (san)
Storage area network (san) Storage area network (san)
Storage area network (san)
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And Nas
 
Challenges in Managing IT Infrastructure
Challenges in Managing IT InfrastructureChallenges in Managing IT Infrastructure
Challenges in Managing IT Infrastructure
 
Infrastructure Strategies 2007
Infrastructure Strategies 2007Infrastructure Strategies 2007
Infrastructure Strategies 2007
 
Storage School 2
Storage School 2Storage School 2
Storage School 2
 
Application Report
Application ReportApplication Report
Application Report
 
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
Positioning IBM Flex System 16 Gb Fibre Channel Fabric for Storage-Intensive ...
 
Future Trends in IT Storage
Future Trends in IT StorageFuture Trends in IT Storage
Future Trends in IT Storage
 
Storage Primer
Storage PrimerStorage Primer
Storage Primer
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable Framework
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage Solutions
 
Storage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 NotesStorage Area Networks Unit 1 Notes
Storage Area Networks Unit 1 Notes
 
Cloud storage infrastructures
Cloud storage infrastructuresCloud storage infrastructures
Cloud storage infrastructures
 
InfiniBand in the Enterprise Data Center.pdf
InfiniBand in the Enterprise Data Center.pdfInfiniBand in the Enterprise Data Center.pdf
InfiniBand in the Enterprise Data Center.pdf
 
Virtual SAN- Deep Dive Into Converged Storage
Virtual SAN- Deep Dive Into Converged StorageVirtual SAN- Deep Dive Into Converged Storage
Virtual SAN- Deep Dive Into Converged Storage
 
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docx
C8-1 CASE STUDY 8    CARLSON COMPANIES STORAGE SOLUT.docxC8-1 CASE STUDY 8    CARLSON COMPANIES STORAGE SOLUT.docx
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docx
 
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docx
C8-1 CASE STUDY 8    CARLSON COMPANIES STORAGE SOLUT.docxC8-1 CASE STUDY 8    CARLSON COMPANIES STORAGE SOLUT.docx
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docx
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & san
 
OUTBOARD SERVERS
OUTBOARD SERVERSOUTBOARD SERVERS
OUTBOARD SERVERS
 

Plus de Information Technology

Plus de Information Technology (20)

Web303
Web303Web303
Web303
 
Sql Server Security Best Practices
Sql Server Security Best PracticesSql Server Security Best Practices
Sql Server Security Best Practices
 
SQL 2005 Disk IO Performance
SQL 2005 Disk IO PerformanceSQL 2005 Disk IO Performance
SQL 2005 Disk IO Performance
 
RAID Review
RAID ReviewRAID Review
RAID Review
 
Review of SQL
Review of SQLReview of SQL
Review of SQL
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
 
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2
 
MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007
 
SharePoint Topology
SharePoint Topology SharePoint Topology
SharePoint Topology
 
Sharepoint Deployments
Sharepoint DeploymentsSharepoint Deployments
Sharepoint Deployments
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Migration from ASP to ASP.NET
Migration from ASP to ASP.NETMigration from ASP to ASP.NET
Migration from ASP to ASP.NET
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
Windows network security
Windows network securityWindows network security
Windows network security
 
SQL -PHP Tutorial
SQL -PHP TutorialSQL -PHP Tutorial
SQL -PHP Tutorial
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

SAN

  • 1. Chung Phan CSMN 601 Spring 2001 Storage Area Network (SAN): The Technology Behind SAN
  • 2.
  • 3.
  • 4.
  • 5. Background (Cont.) Server Attach Storage (SAS): usage and issue
  • 6. Background (Cont.) Network Attach Storage (NAS): usage and issue
  • 7. Background (Cont.) Storage Area Network (SAN): usage and issue
  • 8.
  • 9. SAN Topology and Fiber Channel (FC) Technology SAN technology has been existing in the form of proposals and standards drafts for quite sometime, in 1995 the Fiber Channel architecture became ANSI standard and subsequently in 1996 the Fiber Channel products started to flood the market in huge volume
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.