SlideShare una empresa de Scribd logo
1 de 18
NETWORK ATTACHED STORAGE(NAS)




                                            3/13/2012
   1      Student ID : 1032174
          Name       : Sandeep Gopalreddy
Outline
   Definition
   Introduction
   NAS Architecture
   NAS Framework
   Difference Between NAS And SAN
    Managing NAS
   NAS Security
   Benefits And Drawbacks
   Future Enrichment
    Conclusion
   References                          2


                            3/13/2012
Definition
   A storage device which attached directly to a network,




                                                                  3/13/2012
    called network attached storage(NAS)

   NAS provide file access services to computer system and
    act like a storage element –SNIA(Storage Network
    Industry Association)

   NFS (Network File System) is one of the common
    Network Protocols implemented on NAS.

   NAS is used to access and store different type of data
    over a network. It contain one or more hard disks.        3
Introduction
   Originally NAS have the fixed disks, RAID arrays magnetic
    tape drives which are exactly connected to the




                                                                        3/13/2012
    networks(Eg.SAN and other networks).

   NAS have its own LAN ip address for RAID configuration
    which is attached to the administrator computer that provide
    applications to network workplace clients.

   Nowadays electronic data rising frequently, so reliable data is a
    essential for small business.

   NAS device is most efficient way to centralize, share and protect
    information. Compared with DAS NAS solutions are easier to
    manage and improved performance.                                4
NAS Architecture




                       3/13/2012
                   5
NAS Framework




                                                                      3/13/2012
   NAS device has a printed circuit board that removes TCP/IP
    functions from a microprocessor. This high end version is
    able to serving the files in web browsing (e-mail) and huge
    file transfers between clients.

   RAID Arrays : One or more redundantly aligned independent
    hard disks, It will defend you from losing when an entity
    hard disk fails in the NAS device.

   Operating System : It is configured to present a computing
    background for network attached storage device
                                                                  6
NAS Components




                                                           3/13/2012
   Data reception component.

   Data interception component.

   Intermediate component.

   Data identification component.

These are components for configuring the NAS system.
                                                       7
Difference between NAS and SAN




                                     3/13/2012
                                 8
Managing NAS




                                                              3/13/2012
   NAS Installation : firstly we need to prepare our
    network then install the proper operating system.

   Configuration : We can use different type of
    interfaces for NAS configuration.

   Interfaces : Console, Remote cell(rsh), comand line
    interface(CLI), HTTP(hypertext transfer protocol)
    and secure shell(ssh).

                                                          9
Managing NAS (cont..)




                                                            3/13/2012
   Applications : NAS server need some applications for
    accessing data. These applications gives easy way to
    access their files from everywhere in the network
    environment.

   Examples :
      Home directories
      Email
      Database

                                                           10
Maintenance




                                                             3/13/2012
    For the reliable file sharing and access speed , NAS
    system need day to day maintenance.

Such as,
 Analyzing and monitoring the performance.

 Hardware and software failures.

 Performance tuning.

 Storage management and user support.



   However once we configured the NAS system then its
                                                            11
    very easy to maintain.
NAS Security




                                                               3/13/2012
    Every organization and industries mostly depend upon
    security feature and NAS device also face some security
    challenges as other network components

   NAS system uses strong cryptography for data hiding
    from unauthorized users.

   NAS have some main protection process in these areas
      Physical security.
      General network security.
     Access control lists.                                    12
NAS Security(cont..)
   Physical security :




                                                                3/13/2012
    NAS device should be placed in separate room, where
    only authorized access allowed.

    General network security :
    This is the traditional networking security method where
    the system administrator make sure that these devices
    are accessed by only companies ip addresses.

    Access control list :
      Administrators should create a complex password to
    secure the access to the NAS device.

                                                               13
Benefits of NAS




                                                                  3/13/2012
   Network attached storage is very simple to share files
    anywhere on your network in less time by applying
    power and configuring a few settings.

   A reliable and efficient network saves your organization
    time and money.

   It is very low cost to add additional storage drives in to
    the NAS system.

   The NAS storage is shared by multiple clients and
    servers.                                                     14
Disadvantages of NAS




                                                              3/13/2012
   The file transfer speed is not as fast as DAS(direct
    attached storage).

   For using NAS device people should know some basic
    knowledge about computer networking.

   System available features depend upon the NAS chip and
    firmware.



                                                             15
Future Enrichment




                                                          3/13/2012
   In high confidential Zone many companies don’t use
    NAS system because sharing of data will become a
    problem.

   A Research & Development team continuously
    developing NAS system for future enhancement.

   This development makes NAS system more faster,
    flexibility and high functionality.

                                                         16
Conclusion




                                                         3/13/2012
   Nowadays NAS is a new concept for the computer
    network. This concept used for development and
    growth of computer networks.



   This NAS system is becoming a initial part of the
    small scale industries and computing environment.




                                                        17
References
   Available online at




                                                              3/13/2012
    www.freepatentsonline.com/y2010/0070466.html

   “Using SANs and NAS” W.curtis preston, O‟Reilly
    Publisher, First edition 2002,isbn: 0-596-00153.

   www.pdl.cmu.edu/pp2-ftp/NASD/cmu-cs-97-185.pdf.

   „Mission critical network planning‟ by matthew liotine

   www.brighthub.com/computing/smb.security/articales/23
    63.aspx
                                                             18

Más contenido relacionado

La actualidad más candente

Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage TechnologyLopamudra Das
 
Storage area network
Storage area networkStorage area network
Storage area networkNeha Agarwal
 
Network attached storage (nas)
Network attached storage (nas)Network attached storage (nas)
Network attached storage (nas)Vîvék Thørät
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-sanAshwin Pawar
 
Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer NetworksSeraphic Nazir
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NASSpiceworks
 
Storage Area Network
Storage Area NetworkStorage Area Network
Storage Area NetworkRaphael Ejike
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsKuber Chandra
 
Storage virtualization
Storage virtualizationStorage virtualization
Storage virtualizationramya1591
 
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)Raid Data Recovery
 

La actualidad más candente (20)

Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Network attached storage (nas)
Network attached storage (nas)Network attached storage (nas)
Network attached storage (nas)
 
Storage basics
Storage basicsStorage basics
Storage basics
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Raid and its levels
Raid and its levelsRaid and its levels
Raid and its levels
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
 
Storage Area Networks, Networks, Networking, Computer Networks
Storage Area Networks, Networks, Networking,  Computer NetworksStorage Area Networks, Networks, Networking,  Computer Networks
Storage Area Networks, Networks, Networking, Computer Networks
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
Storage Area Network
Storage Area NetworkStorage Area Network
Storage Area Network
 
Raid
RaidRaid
Raid
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Raid
Raid Raid
Raid
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) Basics
 
Raid
RaidRaid
Raid
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
Storage virtualization
Storage virtualizationStorage virtualization
Storage virtualization
 
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
Understanding RAID Levels (RAID 0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5)
 
Netapp Storage
Netapp StorageNetapp Storage
Netapp Storage
 

Similar a Network Attached Storage (NAS)

Network attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenNetwork attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenIAEME Publication
 
Nas and san
Nas and sanNas and san
Nas and sansongaco
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdfSamiksha880257
 
Spinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSpinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSparkhound Inc.
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown DonutsDavid Pechon
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10Fiaz27
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkCSCJournals
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsMaryJWilliams2
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & sanAishwarya wankhade
 
Fulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationFulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationSteve Meek
 
What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?MaryJWilliams2
 
What is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfWhat is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfEnterprisenas
 
NAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsNAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsIBM India Smarter Computing
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And NasJill Lyons
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?Saroj Sahu
 

Similar a Network Attached Storage (NAS) (20)

Network attached stroage
Network attached stroageNetwork attached stroage
Network attached stroage
 
Network attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemenNetwork attached storage different from traditional file servers & implemen
Network attached storage different from traditional file servers & implemen
 
Nas and san
Nas and sanNas and san
Nas and san
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Spinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSpinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still Counts
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown Donuts
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Storage Training July 10
Storage Training July 10Storage Training July 10
Storage Training July 10
 
Storage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable FrameworkStorage Virtualization: Towards an Efficient and Scalable Framework
Storage Virtualization: Towards an Efficient and Scalable Framework
 
SAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage SolutionsSAN vs NAS vs DAS: Decoding Data Storage Solutions
SAN vs NAS vs DAS: Decoding Data Storage Solutions
 
Advanced DB chapter 2.pdf
Advanced DB chapter 2.pdfAdvanced DB chapter 2.pdf
Advanced DB chapter 2.pdf
 
Enterprise class storage & san
Enterprise class storage & sanEnterprise class storage & san
Enterprise class storage & san
 
Fulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization PresentationFulcrum Group Storage And Storage Virtualization Presentation
Fulcrum Group Storage And Storage Virtualization Presentation
 
What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?What is a Network-Attached-Storage device and how does it work?
What is a Network-Attached-Storage device and how does it work?
 
What is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdfWhat is Network Attached Storage Used for?.pdf
What is Network Attached Storage Used for?.pdf
 
NAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage DemandsNAS Systems Scale Out to Meet Growing Storage Demands
NAS Systems Scale Out to Meet Growing Storage Demands
 
Difference Between San And Nas
Difference Between San And NasDifference Between San And Nas
Difference Between San And Nas
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Challenges in Managing IT Infrastructure
Challenges in Managing IT InfrastructureChallenges in Managing IT Infrastructure
Challenges in Managing IT Infrastructure
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Último (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Network Attached Storage (NAS)

  • 1. NETWORK ATTACHED STORAGE(NAS) 3/13/2012 1 Student ID : 1032174 Name : Sandeep Gopalreddy
  • 2. Outline  Definition  Introduction  NAS Architecture  NAS Framework  Difference Between NAS And SAN  Managing NAS  NAS Security  Benefits And Drawbacks  Future Enrichment  Conclusion  References 2 3/13/2012
  • 3. Definition  A storage device which attached directly to a network, 3/13/2012 called network attached storage(NAS)  NAS provide file access services to computer system and act like a storage element –SNIA(Storage Network Industry Association)  NFS (Network File System) is one of the common Network Protocols implemented on NAS.  NAS is used to access and store different type of data over a network. It contain one or more hard disks. 3
  • 4. Introduction  Originally NAS have the fixed disks, RAID arrays magnetic tape drives which are exactly connected to the 3/13/2012 networks(Eg.SAN and other networks).  NAS have its own LAN ip address for RAID configuration which is attached to the administrator computer that provide applications to network workplace clients.  Nowadays electronic data rising frequently, so reliable data is a essential for small business.  NAS device is most efficient way to centralize, share and protect information. Compared with DAS NAS solutions are easier to manage and improved performance. 4
  • 5. NAS Architecture 3/13/2012 5
  • 6. NAS Framework 3/13/2012  NAS device has a printed circuit board that removes TCP/IP functions from a microprocessor. This high end version is able to serving the files in web browsing (e-mail) and huge file transfers between clients.  RAID Arrays : One or more redundantly aligned independent hard disks, It will defend you from losing when an entity hard disk fails in the NAS device.  Operating System : It is configured to present a computing background for network attached storage device 6
  • 7. NAS Components 3/13/2012  Data reception component.  Data interception component.  Intermediate component.  Data identification component. These are components for configuring the NAS system. 7
  • 8. Difference between NAS and SAN 3/13/2012 8
  • 9. Managing NAS 3/13/2012  NAS Installation : firstly we need to prepare our network then install the proper operating system.  Configuration : We can use different type of interfaces for NAS configuration.  Interfaces : Console, Remote cell(rsh), comand line interface(CLI), HTTP(hypertext transfer protocol) and secure shell(ssh). 9
  • 10. Managing NAS (cont..) 3/13/2012  Applications : NAS server need some applications for accessing data. These applications gives easy way to access their files from everywhere in the network environment.  Examples : Home directories Email Database 10
  • 11. Maintenance 3/13/2012  For the reliable file sharing and access speed , NAS system need day to day maintenance. Such as,  Analyzing and monitoring the performance.  Hardware and software failures.  Performance tuning.  Storage management and user support.  However once we configured the NAS system then its 11 very easy to maintain.
  • 12. NAS Security 3/13/2012  Every organization and industries mostly depend upon security feature and NAS device also face some security challenges as other network components  NAS system uses strong cryptography for data hiding from unauthorized users.  NAS have some main protection process in these areas Physical security. General network security. Access control lists. 12
  • 13. NAS Security(cont..)  Physical security : 3/13/2012 NAS device should be placed in separate room, where only authorized access allowed.  General network security : This is the traditional networking security method where the system administrator make sure that these devices are accessed by only companies ip addresses.  Access control list : Administrators should create a complex password to secure the access to the NAS device. 13
  • 14. Benefits of NAS 3/13/2012  Network attached storage is very simple to share files anywhere on your network in less time by applying power and configuring a few settings.  A reliable and efficient network saves your organization time and money.  It is very low cost to add additional storage drives in to the NAS system.  The NAS storage is shared by multiple clients and servers. 14
  • 15. Disadvantages of NAS 3/13/2012  The file transfer speed is not as fast as DAS(direct attached storage).  For using NAS device people should know some basic knowledge about computer networking.  System available features depend upon the NAS chip and firmware. 15
  • 16. Future Enrichment 3/13/2012  In high confidential Zone many companies don’t use NAS system because sharing of data will become a problem.  A Research & Development team continuously developing NAS system for future enhancement.  This development makes NAS system more faster, flexibility and high functionality. 16
  • 17. Conclusion 3/13/2012  Nowadays NAS is a new concept for the computer network. This concept used for development and growth of computer networks.  This NAS system is becoming a initial part of the small scale industries and computing environment. 17
  • 18. References  Available online at 3/13/2012 www.freepatentsonline.com/y2010/0070466.html  “Using SANs and NAS” W.curtis preston, O‟Reilly Publisher, First edition 2002,isbn: 0-596-00153.  www.pdl.cmu.edu/pp2-ftp/NASD/cmu-cs-97-185.pdf.  „Mission critical network planning‟ by matthew liotine  www.brighthub.com/computing/smb.security/articales/23 63.aspx 18

Notas del editor

  1. Mission – Critical Network Planning Book by Mathew Liotine.
  2. http://www.bestpricecomputers.co.uk/reviews/advice/network-attached-storage.html(DAS – Direct Attached Storage),(SAN-Storage Area Network)
  3. www.dabs.com/learn-more/components-and-storage/network-attached-srorage--nas--explained-3989The above diagram shows modern Network Attached Storage Architecture. A NAS multimedia storage server is interconnected to several servers and clients through wireless area network. The NAS is places the network between the file client and file system. This connection is far easier to connect and manage and share your multimedia files and other files in one convenient place. Compared with Direct Storage System(DAS) NAS is mush faster. Importantly the NAS devices support effective data sharing between Network File System(NFS) and Common Internet File System(CIFS). In this different machines users can access the same collection of data without any special effort.
  4. www.freepatentsonline.com/y2010/0070466.html
  5. Data Reception Component : It configured to accept multiple data file from several clients systemsb) Data Interception Component :It is used to data transformation from reception component to non-volatile data storage and also it updates the index information.c) Intermediate Component :This is used to tracks the relevant data from index information.d) Data identification Component: It is used to identifies the allocation of the data items using index information.
  6. www.nas-san.com/differ.htmlThe above figures shows NAS and SAN differences. These storage devices are almost same process but in some facts its defer.Mostly both SAN and NAS use RAID arrays for connecting t network.Some major differences between NAS and SAN : NAS Head is connected to servers by using TCP/IP network connection and SAN uses Fiber channel switch to communicate with servers. Protocols : NAS uses TCP/IP, NFS, CIFS, HTTP but SAN used only encapsulated SCSI(small computer system interface) protocols. NAS file System : managed by NAS head unit SAN file system : managed by servers
  7. www.brighthub.com/computing/smb.security/articals/23633.aspx
  8. www.channelpro.co.uk/glossary/271710/network_attached_storage_file_sharing.html