SlideShare une entreprise Scribd logo
1  sur  18
NETWORK ATTACHED STORAGE(NAS)




                                            3/13/2012
   1      Student ID : 1032174
          Name       : Sandeep Gopalreddy
Outline
   Definition
   Introduction
   NAS Architecture
   NAS Framework
   Difference Between NAS And SAN
    Managing NAS
   NAS Security
   Benefits And Drawbacks
   Future Enrichment
    Conclusion
   References                          2


                            3/13/2012
Definition
   A storage device which attached directly to a network,




                                                                  3/13/2012
    called network attached storage(NAS)

   NAS provide file access services to computer system and
    act like a storage element –SNIA(Storage Network
    Industry Association)

   NFS (Network File System) is one of the common
    Network Protocols implemented on NAS.

   NAS is used to access and store different type of data
    over a network. It contain one or more hard disks.        3
Introduction
   Originally NAS have the fixed disks, RAID arrays magnetic
    tape drives which are exactly connected to the




                                                                        3/13/2012
    networks(Eg.SAN and other networks).

   NAS have its own LAN ip address for RAID configuration
    which is attached to the administrator computer that provide
    applications to network workplace clients.

   Nowadays electronic data rising frequently, so reliable data is a
    essential for small business.

   NAS device is most efficient way to centralize, share and protect
    information. Compared with DAS NAS solutions are easier to
    manage and improved performance.                                4
NAS Architecture




                       3/13/2012
                   5
NAS Framework




                                                                      3/13/2012
   NAS device has a printed circuit board that removes TCP/IP
    functions from a microprocessor. This high end version is
    able to serving the files in web browsing (e-mail) and huge
    file transfers between clients.

   RAID Arrays : One or more redundantly aligned independent
    hard disks, It will defend you from losing when an entity
    hard disk fails in the NAS device.

   Operating System : It is configured to present a computing
    background for network attached storage device
                                                                  6
NAS Components




                                                           3/13/2012
   Data reception component.

   Data interception component.

   Intermediate component.

   Data identification component.

These are components for configuring the NAS system.
                                                       7
Difference between NAS and SAN




                                     3/13/2012
                                 8
Managing NAS




                                                              3/13/2012
   NAS Installation : firstly we need to prepare our
    network then install the proper operating system.

   Configuration : We can use different type of
    interfaces for NAS configuration.

   Interfaces : Console, Remote cell(rsh), comand line
    interface(CLI), HTTP(hypertext transfer protocol)
    and secure shell(ssh).

                                                          9
Managing NAS (cont..)




                                                            3/13/2012
   Applications : NAS server need some applications for
    accessing data. These applications gives easy way to
    access their files from everywhere in the network
    environment.

   Examples :
      Home directories
      Email
      Database

                                                           10
Maintenance




                                                             3/13/2012
    For the reliable file sharing and access speed , NAS
    system need day to day maintenance.

Such as,
 Analyzing and monitoring the performance.

 Hardware and software failures.

 Performance tuning.

 Storage management and user support.



   However once we configured the NAS system then its
                                                            11
    very easy to maintain.
NAS Security




                                                               3/13/2012
    Every organization and industries mostly depend upon
    security feature and NAS device also face some security
    challenges as other network components

   NAS system uses strong cryptography for data hiding
    from unauthorized users.

   NAS have some main protection process in these areas
      Physical security.
      General network security.
     Access control lists.                                    12
NAS Security(cont..)
   Physical security :




                                                                3/13/2012
    NAS device should be placed in separate room, where
    only authorized access allowed.

    General network security :
    This is the traditional networking security method where
    the system administrator make sure that these devices
    are accessed by only companies ip addresses.

    Access control list :
      Administrators should create a complex password to
    secure the access to the NAS device.

                                                               13
Benefits of NAS




                                                                  3/13/2012
   Network attached storage is very simple to share files
    anywhere on your network in less time by applying
    power and configuring a few settings.

   A reliable and efficient network saves your organization
    time and money.

   It is very low cost to add additional storage drives in to
    the NAS system.

   The NAS storage is shared by multiple clients and
    servers.                                                     14
Disadvantages of NAS




                                                              3/13/2012
   The file transfer speed is not as fast as DAS(direct
    attached storage).

   For using NAS device people should know some basic
    knowledge about computer networking.

   System available features depend upon the NAS chip and
    firmware.



                                                             15
Future Enrichment




                                                          3/13/2012
   In high confidential Zone many companies don’t use
    NAS system because sharing of data will become a
    problem.

   A Research & Development team continuously
    developing NAS system for future enhancement.

   This development makes NAS system more faster,
    flexibility and high functionality.

                                                         16
Conclusion




                                                         3/13/2012
   Nowadays NAS is a new concept for the computer
    network. This concept used for development and
    growth of computer networks.



   This NAS system is becoming a initial part of the
    small scale industries and computing environment.




                                                        17
References
   Available online at




                                                              3/13/2012
    www.freepatentsonline.com/y2010/0070466.html

   “Using SANs and NAS” W.curtis preston, O‟Reilly
    Publisher, First edition 2002,isbn: 0-596-00153.

   www.pdl.cmu.edu/pp2-ftp/NASD/cmu-cs-97-185.pdf.

   „Mission critical network planning‟ by matthew liotine

   www.brighthub.com/computing/smb.security/articales/23
    63.aspx
                                                             18

Contenu connexe

Tendances

Storage area network
Storage area networkStorage area network
Storage area networkNeha Agarwal
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)sankcomp
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NASSpiceworks
 
Storage networks
Storage networksStorage networks
Storage networksAhmed Nour
 
Storage Technology Overview
Storage Technology OverviewStorage Technology Overview
Storage Technology Overviewnomathjobs
 
Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer NetworksSeraphic Nazir
 
Introduction to Data Center Network Architecture
Introduction to Data Center Network ArchitectureIntroduction to Data Center Network Architecture
Introduction to Data Center Network ArchitectureAnkita Mahajan
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-sanAshwin Pawar
 
Direct Attached Storage CONCEPTS
Direct Attached Storage CONCEPTSDirect Attached Storage CONCEPTS
Direct Attached Storage CONCEPTSRamkaliyaperumal
 
Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage TechnologyLopamudra Das
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)Shreyans Jain
 

Tendances (20)

Storage area network
Storage area networkStorage area network
Storage area network
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
What Is Cloud Computing
What Is Cloud ComputingWhat Is Cloud Computing
What Is Cloud Computing
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Storage networks
Storage networksStorage networks
Storage networks
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Storage Technology Overview
Storage Technology OverviewStorage Technology Overview
Storage Technology Overview
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer Networks
 
Introduction to Data Center Network Architecture
Introduction to Data Center Network ArchitectureIntroduction to Data Center Network Architecture
Introduction to Data Center Network Architecture
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
 
Storage area network
Storage area networkStorage area network
Storage area network
 
network storage
network storagenetwork storage
network storage
 
Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019Windows Server 2019 -InspireTech 2019
Windows Server 2019 -InspireTech 2019
 
Direct Attached Storage CONCEPTS
Direct Attached Storage CONCEPTSDirect Attached Storage CONCEPTS
Direct Attached Storage CONCEPTS
 
Windows server
Windows serverWindows server
Windows server
 
Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage Technology
 
Storage As A Service (StAAS)
Storage As A Service (StAAS)Storage As A Service (StAAS)
Storage As A Service (StAAS)
 
Netapp Storage
Netapp StorageNetapp Storage
Netapp Storage
 

Similaire à Network Attached Storage (NAS)

Network attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenNetwork attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenIAEME Publication
 
Network attached storage (nas)
Network attached storage (nas)Network attached storage (nas)
Network attached storage (nas)Vîvék Thørät
 
Nas and san
Nas and sanNas and san
Nas and sansongaco
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdfSamiksha880257
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown DonutsDavid Pechon
 
Spinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSpinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSparkhound Inc.
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10Fiaz27
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkCSCJournals
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsMaryJWilliams2
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & sanAishwarya wankhade
 
Fulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationFulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationSteve Meek
 
What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?MaryJWilliams2
 
What is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfWhat is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfEnterprisenas
 
NAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsNAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsIBM India Smarter Computing
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And NasJill Lyons
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?Saroj Sahu
 

Similaire à Network Attached Storage (NAS) (20)

Network attached stroage
Network attached stroageNetwork attached stroage
Network attached stroage
 
Network attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenNetwork attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemen
 
Network attached storage (nas)
Network attached storage (nas)Network attached storage (nas)
Network attached storage (nas)
 
Nas and san
Nas and sanNas and san
Nas and san
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown Donuts
 
Spinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSpinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still Counts
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable Framework
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage Solutions
 
Advanced DB chapter 2.pdf
Advanced DB chapter 2.pdfAdvanced DB chapter 2.pdf
Advanced DB chapter 2.pdf
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & san
 
Fulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationFulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization Presentation
 
What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?
 
What is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfWhat is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdf
 
NAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsNAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage Demands
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And Nas
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 

Dernier

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Network Attached Storage (NAS)

  • 1. NETWORK ATTACHED STORAGE(NAS) 3/13/2012 1 Student ID : 1032174 Name : Sandeep Gopalreddy
  • 2. Outline  Definition  Introduction  NAS Architecture  NAS Framework  Difference Between NAS And SAN  Managing NAS  NAS Security  Benefits And Drawbacks  Future Enrichment  Conclusion  References 2 3/13/2012
  • 3. Definition  A storage device which attached directly to a network, 3/13/2012 called network attached storage(NAS)  NAS provide file access services to computer system and act like a storage element –SNIA(Storage Network Industry Association)  NFS (Network File System) is one of the common Network Protocols implemented on NAS.  NAS is used to access and store different type of data over a network. It contain one or more hard disks. 3
  • 4. Introduction  Originally NAS have the fixed disks, RAID arrays magnetic tape drives which are exactly connected to the 3/13/2012 networks(Eg.SAN and other networks).  NAS have its own LAN ip address for RAID configuration which is attached to the administrator computer that provide applications to network workplace clients.  Nowadays electronic data rising frequently, so reliable data is a essential for small business.  NAS device is most efficient way to centralize, share and protect information. Compared with DAS NAS solutions are easier to manage and improved performance. 4
  • 5. NAS Architecture 3/13/2012 5
  • 6. NAS Framework 3/13/2012  NAS device has a printed circuit board that removes TCP/IP functions from a microprocessor. This high end version is able to serving the files in web browsing (e-mail) and huge file transfers between clients.  RAID Arrays : One or more redundantly aligned independent hard disks, It will defend you from losing when an entity hard disk fails in the NAS device.  Operating System : It is configured to present a computing background for network attached storage device 6
  • 7. NAS Components 3/13/2012  Data reception component.  Data interception component.  Intermediate component.  Data identification component. These are components for configuring the NAS system. 7
  • 8. Difference between NAS and SAN 3/13/2012 8
  • 9. Managing NAS 3/13/2012  NAS Installation : firstly we need to prepare our network then install the proper operating system.  Configuration : We can use different type of interfaces for NAS configuration.  Interfaces : Console, Remote cell(rsh), comand line interface(CLI), HTTP(hypertext transfer protocol) and secure shell(ssh). 9
  • 10. Managing NAS (cont..) 3/13/2012  Applications : NAS server need some applications for accessing data. These applications gives easy way to access their files from everywhere in the network environment.  Examples : Home directories Email Database 10
  • 11. Maintenance 3/13/2012  For the reliable file sharing and access speed , NAS system need day to day maintenance. Such as,  Analyzing and monitoring the performance.  Hardware and software failures.  Performance tuning.  Storage management and user support.  However once we configured the NAS system then its 11 very easy to maintain.
  • 12. NAS Security 3/13/2012  Every organization and industries mostly depend upon security feature and NAS device also face some security challenges as other network components  NAS system uses strong cryptography for data hiding from unauthorized users.  NAS have some main protection process in these areas Physical security. General network security. Access control lists. 12
  • 13. NAS Security(cont..)  Physical security : 3/13/2012 NAS device should be placed in separate room, where only authorized access allowed.  General network security : This is the traditional networking security method where the system administrator make sure that these devices are accessed by only companies ip addresses.  Access control list : Administrators should create a complex password to secure the access to the NAS device. 13
  • 14. Benefits of NAS 3/13/2012  Network attached storage is very simple to share files anywhere on your network in less time by applying power and configuring a few settings.  A reliable and efficient network saves your organization time and money.  It is very low cost to add additional storage drives in to the NAS system.  The NAS storage is shared by multiple clients and servers. 14
  • 15. Disadvantages of NAS 3/13/2012  The file transfer speed is not as fast as DAS(direct attached storage).  For using NAS device people should know some basic knowledge about computer networking.  System available features depend upon the NAS chip and firmware. 15
  • 16. Future Enrichment 3/13/2012  In high confidential Zone many companies don’t use NAS system because sharing of data will become a problem.  A Research & Development team continuously developing NAS system for future enhancement.  This development makes NAS system more faster, flexibility and high functionality. 16
  • 17. Conclusion 3/13/2012  Nowadays NAS is a new concept for the computer network. This concept used for development and growth of computer networks.  This NAS system is becoming a initial part of the small scale industries and computing environment. 17
  • 18. References  Available online at 3/13/2012 www.freepatentsonline.com/y2010/0070466.html  “Using SANs and NAS” W.curtis preston, O‟Reilly Publisher, First edition 2002,isbn: 0-596-00153.  www.pdl.cmu.edu/pp2-ftp/NASD/cmu-cs-97-185.pdf.  „Mission critical network planning‟ by matthew liotine  www.brighthub.com/computing/smb.security/articales/23 63.aspx 18

Notes de l'éditeur

  1. Mission – Critical Network Planning Book by Mathew Liotine.
  2. http://www.bestpricecomputers.co.uk/reviews/advice/network-attached-storage.html(DAS – Direct Attached Storage),(SAN-Storage Area Network)
  3. www.dabs.com/learn-more/components-and-storage/network-attached-srorage--nas--explained-3989The above diagram shows modern Network Attached Storage Architecture. A NAS multimedia storage server is interconnected to several servers and clients through wireless area network. The NAS is places the network between the file client and file system. This connection is far easier to connect and manage and share your multimedia files and other files in one convenient place. Compared with Direct Storage System(DAS) NAS is mush faster. Importantly the NAS devices support effective data sharing between Network File System(NFS) and Common Internet File System(CIFS). In this different machines users can access the same collection of data without any special effort.
  4. www.freepatentsonline.com/y2010/0070466.html
  5. Data Reception Component : It configured to accept multiple data file from several clients systemsb) Data Interception Component :It is used to data transformation from reception component to non-volatile data storage and also it updates the index information.c) Intermediate Component :This is used to tracks the relevant data from index information.d) Data identification Component: It is used to identifies the allocation of the data items using index information.
  6. www.nas-san.com/differ.htmlThe above figures shows NAS and SAN differences. These storage devices are almost same process but in some facts its defer.Mostly both SAN and NAS use RAID arrays for connecting t network.Some major differences between NAS and SAN : NAS Head is connected to servers by using TCP/IP network connection and SAN uses Fiber channel switch to communicate with servers. Protocols : NAS uses TCP/IP, NFS, CIFS, HTTP but SAN used only encapsulated SCSI(small computer system interface) protocols. NAS file System : managed by NAS head unit SAN file system : managed by servers
  7. www.brighthub.com/computing/smb.security/articals/23633.aspx
  8. www.channelpro.co.uk/glossary/271710/network_attached_storage_file_sharing.html