SlideShare une entreprise Scribd logo
1  sur  18
NETWORK ATTACHED STORAGE(NAS)




                                            3/13/2012
   1      Student ID : 1032174
          Name       : Sandeep Gopalreddy
Outline
   Definition
   Introduction
   NAS Architecture
   NAS Framework
   Difference Between NAS And SAN
    Managing NAS
   NAS Security
   Benefits And Drawbacks
   Future Enrichment
    Conclusion
   References                          2


                            3/13/2012
Definition
   A storage device which attached directly to a network,




                                                                  3/13/2012
    called network attached storage(NAS)

   NAS provide file access services to computer system and
    act like a storage element –SNIA(Storage Network
    Industry Association)

   NFS (Network File System) is one of the common
    Network Protocols implemented on NAS.

   NAS is used to access and store different type of data
    over a network. It contain one or more hard disks.        3
Introduction
   Originally NAS have the fixed disks, RAID arrays magnetic
    tape drives which are exactly connected to the




                                                                        3/13/2012
    networks(Eg.SAN and other networks).

   NAS have its own LAN ip address for RAID configuration
    which is attached to the administrator computer that provide
    applications to network workplace clients.

   Nowadays electronic data rising frequently, so reliable data is a
    essential for small business.

   NAS device is most efficient way to centralize, share and protect
    information. Compared with DAS NAS solutions are easier to
    manage and improved performance.                                4
NAS Architecture




                       3/13/2012
                   5
NAS Framework




                                                                      3/13/2012
   NAS device has a printed circuit board that removes TCP/IP
    functions from a microprocessor. This high end version is
    able to serving the files in web browsing (e-mail) and huge
    file transfers between clients.

   RAID Arrays : One or more redundantly aligned independent
    hard disks, It will defend you from losing when an entity
    hard disk fails in the NAS device.

   Operating System : It is configured to present a computing
    background for network attached storage device
                                                                  6
NAS Components




                                                           3/13/2012
   Data reception component.

   Data interception component.

   Intermediate component.

   Data identification component.

These are components for configuring the NAS system.
                                                       7
Difference between NAS and SAN




                                     3/13/2012
                                 8
Managing NAS




                                                              3/13/2012
   NAS Installation : firstly we need to prepare our
    network then install the proper operating system.

   Configuration : We can use different type of
    interfaces for NAS configuration.

   Interfaces : Console, Remote cell(rsh), comand line
    interface(CLI), HTTP(hypertext transfer protocol)
    and secure shell(ssh).

                                                          9
Managing NAS (cont..)




                                                            3/13/2012
   Applications : NAS server need some applications for
    accessing data. These applications gives easy way to
    access their files from everywhere in the network
    environment.

   Examples :
      Home directories
      Email
      Database

                                                           10
Maintenance




                                                             3/13/2012
    For the reliable file sharing and access speed , NAS
    system need day to day maintenance.

Such as,
 Analyzing and monitoring the performance.

 Hardware and software failures.

 Performance tuning.

 Storage management and user support.



   However once we configured the NAS system then its
                                                            11
    very easy to maintain.
NAS Security




                                                               3/13/2012
    Every organization and industries mostly depend upon
    security feature and NAS device also face some security
    challenges as other network components

   NAS system uses strong cryptography for data hiding
    from unauthorized users.

   NAS have some main protection process in these areas
      Physical security.
      General network security.
     Access control lists.                                    12
NAS Security(cont..)
   Physical security :




                                                                3/13/2012
    NAS device should be placed in separate room, where
    only authorized access allowed.

    General network security :
    This is the traditional networking security method where
    the system administrator make sure that these devices
    are accessed by only companies ip addresses.

    Access control list :
      Administrators should create a complex password to
    secure the access to the NAS device.

                                                               13
Benefits of NAS




                                                                  3/13/2012
   Network attached storage is very simple to share files
    anywhere on your network in less time by applying
    power and configuring a few settings.

   A reliable and efficient network saves your organization
    time and money.

   It is very low cost to add additional storage drives in to
    the NAS system.

   The NAS storage is shared by multiple clients and
    servers.                                                     14
Disadvantages of NAS




                                                              3/13/2012
   The file transfer speed is not as fast as DAS(direct
    attached storage).

   For using NAS device people should know some basic
    knowledge about computer networking.

   System available features depend upon the NAS chip and
    firmware.



                                                             15
Future Enrichment




                                                          3/13/2012
   In high confidential Zone many companies don’t use
    NAS system because sharing of data will become a
    problem.

   A Research & Development team continuously
    developing NAS system for future enhancement.

   This development makes NAS system more faster,
    flexibility and high functionality.

                                                         16
Conclusion




                                                         3/13/2012
   Nowadays NAS is a new concept for the computer
    network. This concept used for development and
    growth of computer networks.



   This NAS system is becoming a initial part of the
    small scale industries and computing environment.




                                                        17
References
   Available online at




                                                              3/13/2012
    www.freepatentsonline.com/y2010/0070466.html

   “Using SANs and NAS” W.curtis preston, O‟Reilly
    Publisher, First edition 2002,isbn: 0-596-00153.

   www.pdl.cmu.edu/pp2-ftp/NASD/cmu-cs-97-185.pdf.

   „Mission critical network planning‟ by matthew liotine

   www.brighthub.com/computing/smb.security/articales/23
    63.aspx
                                                             18

Contenu connexe

Tendances

CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NASSpiceworks
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 
Storage networks
Storage networksStorage networks
Storage networksAhmed Nour
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
 
Network attached storage (nas)
Network attached storage (nas)Network attached storage (nas)
Network attached storage (nas)Vîvék Thørät
 
Active directory
Active directory Active directory
Active directory deshvikas
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-VMark Wilson
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Aakash Panchal
 
Server configuration
Server configurationServer configuration
Server configurationAisha Talat
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 

Tendances (20)

CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Storage networks
Storage networksStorage networks
Storage networks
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
Storage area network
Storage area networkStorage area network
Storage area network
 
RAID seminar
RAID seminarRAID seminar
RAID seminar
 
Network attached storage (nas)
Network attached storage (nas)Network attached storage (nas)
Network attached storage (nas)
 
Active directory
Active directory Active directory
Active directory
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Storage Managment
Storage ManagmentStorage Managment
Storage Managment
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 
Server configuration
Server configurationServer configuration
Server configuration
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 

Similaire à Network Attached Storage (NAS)

Network attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenNetwork attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenIAEME Publication
 
Nas and san
Nas and sanNas and san
Nas and sansongaco
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdfSamiksha880257
 
Spinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSpinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSparkhound Inc.
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown DonutsDavid Pechon
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10Fiaz27
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkCSCJournals
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsMaryJWilliams2
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & sanAishwarya wankhade
 
Fulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationFulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationSteve Meek
 
What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?MaryJWilliams2
 
What is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfWhat is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfEnterprisenas
 
NAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsNAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsIBM India Smarter Computing
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And NasJill Lyons
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?Saroj Sahu
 

Similaire à Network Attached Storage (NAS) (20)

Network attached stroage
Network attached stroageNetwork attached stroage
Network attached stroage
 
Network attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenNetwork attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemen
 
Nas and san
Nas and sanNas and san
Nas and san
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Spinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSpinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still Counts
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown Donuts
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable Framework
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage Solutions
 
Advanced DB chapter 2.pdf
Advanced DB chapter 2.pdfAdvanced DB chapter 2.pdf
Advanced DB chapter 2.pdf
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & san
 
Fulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationFulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization Presentation
 
What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?
 
What is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfWhat is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdf
 
NAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsNAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage Demands
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And Nas
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Challenges in Managing IT Infrastructure
Challenges in Managing IT InfrastructureChallenges in Managing IT Infrastructure
Challenges in Managing IT Infrastructure
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Network Attached Storage (NAS)

  • 1. NETWORK ATTACHED STORAGE(NAS) 3/13/2012 1 Student ID : 1032174 Name : Sandeep Gopalreddy
  • 2. Outline  Definition  Introduction  NAS Architecture  NAS Framework  Difference Between NAS And SAN  Managing NAS  NAS Security  Benefits And Drawbacks  Future Enrichment  Conclusion  References 2 3/13/2012
  • 3. Definition  A storage device which attached directly to a network, 3/13/2012 called network attached storage(NAS)  NAS provide file access services to computer system and act like a storage element –SNIA(Storage Network Industry Association)  NFS (Network File System) is one of the common Network Protocols implemented on NAS.  NAS is used to access and store different type of data over a network. It contain one or more hard disks. 3
  • 4. Introduction  Originally NAS have the fixed disks, RAID arrays magnetic tape drives which are exactly connected to the 3/13/2012 networks(Eg.SAN and other networks).  NAS have its own LAN ip address for RAID configuration which is attached to the administrator computer that provide applications to network workplace clients.  Nowadays electronic data rising frequently, so reliable data is a essential for small business.  NAS device is most efficient way to centralize, share and protect information. Compared with DAS NAS solutions are easier to manage and improved performance. 4
  • 5. NAS Architecture 3/13/2012 5
  • 6. NAS Framework 3/13/2012  NAS device has a printed circuit board that removes TCP/IP functions from a microprocessor. This high end version is able to serving the files in web browsing (e-mail) and huge file transfers between clients.  RAID Arrays : One or more redundantly aligned independent hard disks, It will defend you from losing when an entity hard disk fails in the NAS device.  Operating System : It is configured to present a computing background for network attached storage device 6
  • 7. NAS Components 3/13/2012  Data reception component.  Data interception component.  Intermediate component.  Data identification component. These are components for configuring the NAS system. 7
  • 8. Difference between NAS and SAN 3/13/2012 8
  • 9. Managing NAS 3/13/2012  NAS Installation : firstly we need to prepare our network then install the proper operating system.  Configuration : We can use different type of interfaces for NAS configuration.  Interfaces : Console, Remote cell(rsh), comand line interface(CLI), HTTP(hypertext transfer protocol) and secure shell(ssh). 9
  • 10. Managing NAS (cont..) 3/13/2012  Applications : NAS server need some applications for accessing data. These applications gives easy way to access their files from everywhere in the network environment.  Examples : Home directories Email Database 10
  • 11. Maintenance 3/13/2012  For the reliable file sharing and access speed , NAS system need day to day maintenance. Such as,  Analyzing and monitoring the performance.  Hardware and software failures.  Performance tuning.  Storage management and user support.  However once we configured the NAS system then its 11 very easy to maintain.
  • 12. NAS Security 3/13/2012  Every organization and industries mostly depend upon security feature and NAS device also face some security challenges as other network components  NAS system uses strong cryptography for data hiding from unauthorized users.  NAS have some main protection process in these areas Physical security. General network security. Access control lists. 12
  • 13. NAS Security(cont..)  Physical security : 3/13/2012 NAS device should be placed in separate room, where only authorized access allowed.  General network security : This is the traditional networking security method where the system administrator make sure that these devices are accessed by only companies ip addresses.  Access control list : Administrators should create a complex password to secure the access to the NAS device. 13
  • 14. Benefits of NAS 3/13/2012  Network attached storage is very simple to share files anywhere on your network in less time by applying power and configuring a few settings.  A reliable and efficient network saves your organization time and money.  It is very low cost to add additional storage drives in to the NAS system.  The NAS storage is shared by multiple clients and servers. 14
  • 15. Disadvantages of NAS 3/13/2012  The file transfer speed is not as fast as DAS(direct attached storage).  For using NAS device people should know some basic knowledge about computer networking.  System available features depend upon the NAS chip and firmware. 15
  • 16. Future Enrichment 3/13/2012  In high confidential Zone many companies don’t use NAS system because sharing of data will become a problem.  A Research & Development team continuously developing NAS system for future enhancement.  This development makes NAS system more faster, flexibility and high functionality. 16
  • 17. Conclusion 3/13/2012  Nowadays NAS is a new concept for the computer network. This concept used for development and growth of computer networks.  This NAS system is becoming a initial part of the small scale industries and computing environment. 17
  • 18. References  Available online at 3/13/2012 www.freepatentsonline.com/y2010/0070466.html  “Using SANs and NAS” W.curtis preston, O‟Reilly Publisher, First edition 2002,isbn: 0-596-00153.  www.pdl.cmu.edu/pp2-ftp/NASD/cmu-cs-97-185.pdf.  „Mission critical network planning‟ by matthew liotine  www.brighthub.com/computing/smb.security/articales/23 63.aspx 18

Notes de l'éditeur

  1. Mission – Critical Network Planning Book by Mathew Liotine.
  2. http://www.bestpricecomputers.co.uk/reviews/advice/network-attached-storage.html(DAS – Direct Attached Storage),(SAN-Storage Area Network)
  3. www.dabs.com/learn-more/components-and-storage/network-attached-srorage--nas--explained-3989The above diagram shows modern Network Attached Storage Architecture. A NAS multimedia storage server is interconnected to several servers and clients through wireless area network. The NAS is places the network between the file client and file system. This connection is far easier to connect and manage and share your multimedia files and other files in one convenient place. Compared with Direct Storage System(DAS) NAS is mush faster. Importantly the NAS devices support effective data sharing between Network File System(NFS) and Common Internet File System(CIFS). In this different machines users can access the same collection of data without any special effort.
  4. www.freepatentsonline.com/y2010/0070466.html
  5. Data Reception Component : It configured to accept multiple data file from several clients systemsb) Data Interception Component :It is used to data transformation from reception component to non-volatile data storage and also it updates the index information.c) Intermediate Component :This is used to tracks the relevant data from index information.d) Data identification Component: It is used to identifies the allocation of the data items using index information.
  6. www.nas-san.com/differ.htmlThe above figures shows NAS and SAN differences. These storage devices are almost same process but in some facts its defer.Mostly both SAN and NAS use RAID arrays for connecting t network.Some major differences between NAS and SAN : NAS Head is connected to servers by using TCP/IP network connection and SAN uses Fiber channel switch to communicate with servers. Protocols : NAS uses TCP/IP, NFS, CIFS, HTTP but SAN used only encapsulated SCSI(small computer system interface) protocols. NAS file System : managed by NAS head unit SAN file system : managed by servers
  7. www.brighthub.com/computing/smb.security/articals/23633.aspx
  8. www.channelpro.co.uk/glossary/271710/network_attached_storage_file_sharing.html