Abstract
The
document provides an explanation about Storage Area Network (SAN) Based
Distributed System Architecture. The article outlines of application of Storage
Area Network (SAN) client-server models. The paper gives the significance of
Storage Area Network (SAN) within organization and applications that implement
management of data and information. The paper discusses the critical analysis
in implementation and application of Storage Area Network (SAN). It sites
technological advancements that make Storage Area Network (SAN) applications
obsolete. Finally, the document explains security concerns associated with the
implementation of Storage Area Network (SAN) in providing data and information
confidentiality, integrity, and accessibility.
Introduction
The
storage systems are getting improved by new technology through the acquisition
of improved repository systems in technology. Big data concept requires complex
and sophisticated systems to store data and information. Networked devices
transfer huge data and information across network making a need for complex
system storage to manage and control big data within the network. Big data
operations in business operations require adequate storage system to
accommodate data and information collected through data mining. The current
operations are moving from analog to real-time data and storage systems. The
network is filled with streaming of real-time data and information such as
video, games, music, images, and database. Such storage activities increase
need of better storage facility technology such as SAN. Storage repository
locations are bound to change with rampant changes in technology.
Storage Area Network (SAN)
SAN
is ma mass storage network dedicated to providing repository center on the
network. SAN provides access to complex block level data and information
storage location. Initially, SAN technology was applied in the manufacturing of
portable storage mediums such as Flash disks, disk arrays, tape libraries, as
well as optical jukebox accessible to servers. SAN is a storage location that
modifies a raw storage of data into a pool of resources that can be centrally
managed allowing allocation of space to several other data and information when
the time needed. SAN is highly scalable since the expansion of space for
allocation of storage space involves simple operations (Jon, et al., 2016).
In
a business organization, SAN is preferred due to support it offers universal
storage connectivity. Organization currently connects their computers along
with storage devices. SAN can connect many computers devices to multiple arrays
of mass storage devices. The connection allows computers to manipulate available
storage locations to provide better sharing of repository storage location
between computers. Ownership of storage locations is shifted among the devices
making information stored within a business is spread at several locations.
Users can access data and information stored in any device without requiring
copying data and information manually to another device. SAN storage
applications promote SAN based distributed system that allows real-time sharing
of data and information as well as real-time data access to other computers
requiring to, access data stored on different computers.
Figure
1: SAN Based Distributed System Architecture
Source: (searchstorage.techtarget.com).
SAN
distributed system architecture of client-server model eliminates the concept
of single dedicated data storage and ownership. SAN architecture allows storage
of devices to be connected to all servers. Servers within an organization can
easily trace and access data stored in other storage devices making all
possible allocations of specific data available in a particular storage device
instead of copying entire data (Richard, & Paul, 2002). Through SAN based distributed systems
universal storage can be achieved which helps information service department to
have potential of enjoying the following business oriented advantages
1. The organization data and information
managers do not require configuring and setting schedules for transferring and
copying data from one storage location to another. SAN-based distributed
architecture allow sharing of information between pairs of servers (Richard,
& Paul, 2002).
2. Organization using SAN Based Distributed
System Architecture does not require purchasing extra components for storing
data and information while managing real-time data and information. Extra
temporary storage is not required within SAN Based Distributed System
Architecture. Servers update information stored and most updated information can
be accessed to immediately by another u=ser without requiring staging devices
(Richard, & Paul, 2002).
3. Synchronization of data and information in
SAN Based Distributed System Architecture is guaranteed. Copies of data and
information accessed by two computers have a high level of synchronization
ensuring that data accessed simultaneously has same contents irrespective of
time and location. SAN Based Distributed System Architecture allows computers
working on a same copy of data receive updated information simultaneously.
Organizations responsible for handling electronic information such as
communication companies find SAN Based Distributed System Architecture best
managing data and information accessed by various clients (Richard, & Paul,
2002).
SAN
architecture has widely been used to facilitate managing and controlling of
input and output data and information.
However, SAN Based Distributed System Architecture requires modification
of input and output system bus to be in a position to implement required
formulation of output and input data and information. SAN Based Distributed System Architecture has
the highest availability making it possible for the organization to deal with
data and information for output and input purposes. Data and information entered into the network
by the organization are entered at one end and allowed to be available to other
systems in distributed nature. Output and input data is protected within the
organization through implementation of highly tolerable systems that guarantee
(Meeta, 2002). Organizations implement SAN Based Distributed System
Architecture where the network has links and switches installed with SAN
architecture to encounter problems associated with failure of the network as
well as network power disruptions. The component installed with SAN
architecture have the capability of surviving failures and deliver output or
input information within require end at the most appropriate time.
Organizations implementing network devices having configurations and settings
that support SAN architecture enhances safe delivery of information. When a
failure occurs during data and information transfer systems can still acquire
failure recovery strategies and deliver Data and information to a destination
with high-level reliability.
SAN
Based Distributed System Architecture allows increased growth and development
of individuals within the network. All individuals operate within allocated
network are well served by the available resources of SAN architecture. SAN
Based Distributed System Architecture allows growth and development of traffic
as well as network users through implementation of additional ports and
additional input and connection output sections. SAN architecture scales the
number of interconnected devices easily mounting new computers and storage
devices along the bus connecting other devices. Input and output performance is
not degraded by an increase in some added clients. SAN Based Distributed System
Architecture has the capability of enabling entire system to adopt delivering
high data transfer rates with low input and output request latency. SAN Based
Distributed System Architecture implements a gradual growth in performance as
the organization clients and processing requirements increase (Meeta, 2002).
When the maximum growth of SAN becomes, limited organizations can easily
replace upgrade SAN architecture to provide more powerful and high responsive
architecture.
SAN
Based Distributed System Architecture, which has limited scaling property
provides extra application performance that enables separation of high volume
input and output traffic from client-server message trafficking. SAN Based
Distributed System Architecture has the capability of providing high power path
that enables working of optimum allocation of time output applications
requiring more advanced time and resources. Priority measures are applied
ensuring consistency operation and delivery of information. Real-time data and
information as well as video, and the electronic conference is allocated more
processing time as well as more speed and space to ensure equal throughput is
maintained across the network. Organizations acquire high level and quality
output maintained by SAN Based Distributed System Architecture.
Organization
and investors prefer working and implementing SAN Based Distributed System
Architecture since it guarantees considerable cost with better quality
services. Returns guaranteed by implementing SAN Based Distributed System
Architecture are high since operations with providing relatively equal time of
capital and cost returns. The value of implementing SAN Based Distributed
System Architecture is high, however upon installation and deployment SAN Based
Distributed System Architecture provides best operational cost. Maintenance cost
is the minimal as well as operating cost (Margaret R, 2013). Time and energy
required to manage and implement SAN technology activities designing
organization functions and environmental architecture, deploying the drawn
architecture to the current requirement of the system, tuning developed SAN
Based Distributed System Architecture to cater for defined operations within
the organization and finally maintaining SAN Based Distributed System
Architecture (Meeta, 2002). Organization having interests in implementing SAN
Based Distributed System Architecture require to perform cost analysis as well
as a feasibility study to determine the viability of proposed system within the
organization. Compared with other client server architectures, SAN Based
Distributed System Architecture promise that more payback returns can be
obtained from SAN Based Distributed System Architecture. Enterprises having SAN Based Distributed
System Architecture enable their computers to run at most critical
applications.
Critical Analysis of SAN Based
Distributed System Architecture
SAN
Based Distributed System Architecture has several earlier standards and devices
applied to the network today. Some of the outdated system and storage devices
are still applicable in the organization like the implementation of Disk and
tape drives, RAID subsystems and other technologies are being implemented in
SAN Based Distributed System Architecture. Such devices are likely to become
obsolete in future due to the introduction of newer and advanced devices.
Currently, technology has eliminated some of the storage mediums supported by
SAN Based Distributed System Architecture like the implementation of tape
drivers. Many SAN Based Distributed
System Architecture devices are gradually missing in the market. Maintenance
and repairing of SAN Based Distributed System Architecture is becoming
difficult and none achievable due to compatibility problems. Most devices found
in the markets are do not support SAN Based Distributed System Architecture
making it difficult to deal with entire system when problems arise (Jon, et
al., 2016). The cost of SAN Based Distributed System Architecture makes it feel
discouraging to organizations since most of the systems are discarded n favor
of most recent systems and improved network management. However, some of the applied devices in SAN
Based Distributed System Architecture network systems are still powerful and
rendering better operations within the market. Persisted devices have the potential
of reviving the glory of SAN Based Distributed System Architecture if research
towards improving such systems can be implemented.
Security issues in SAN
SAN Based Distributed System Architecture
provides three levels of security. The first level applied in implementing
security is that servers are kept unaware that data stored on servers is not
local. Data is therefore stored in allocated SAN storage subsystems. The
administrator creates the first level by setting a series of disk arrays with
logical volumes identified by a logical unit number (LUN). SAN Based
Distributed System Architecture can apply the levels automatically (Stewart,
2003). LUN volumes are then allocated a specific port that corresponds to a
specific computer. Storage controller ports are assigned a specific channel that
connects to a dedicated client computer. Through storage controller ports
identified by LUN, computers can access data and information directly to the
system.
The
second security level involves the implementation of fabric that segment
network into a series of groups of switch ports or with the implementation of
worldwide names (WWNs). Zones apply advanced second levels in organizing data
and information which is meant to be sent for backup storage. Second level
security controls data and information that may get overlapped during library
sharing and back up the process. Second level data and information security
backup are most appropriate in facilitating tape backup procedures in a third
party location (Stewart, 2003).
Third
level security backup involves the implementation of LUN masking where system
administrator performs system configuration ensuring that host computer is
applied settings that make it ignore all other ports and only accept the ports
that are allocated to that particular computer. The third layer has limited
application due to the easier configuration of LUN mapping as well as the easy
implementation of switch zoning (Stewart, 2003). The levels of security are
significance in securing SAN Based Distributed System Architecture. The system
allows more paths to existing within the network through the provision of to
secure data and information from interceptions and crossing to wrong output or
input locations when dealing with multiple input paths (Stewart, 2003). The
enterprises that implement the current SAN Based Distributed System
Architecture are applying the use of alternate paths to eliminate cases of
redundancy and implementation of advanced data protection. More advanced
security standards are applied on SAN Based Distributed System Architecture
like the implementation of SONET and DSL when data and information are being
mirrored from databases or replications applied after updating the system.
Conclusion
SAN
Based Distributed System Architecture provides high-level storage
virtualization making server capacity to adapt to high-level storage devices
that ensure storage pools are available. SAN Based Distributed System
Architecture has the provision of high-speed disk technologies that enhance
high data and information retrieval speeds. SAN Based Distributed System
Architecture supports centralized data backup strategies that enhance multiple
simplified data and multiple disk server connections. SAN Based Distributed
System Architecture provides dynamic failover protection that enhances the
provision of continuous network operations.
Offline operation can be continued to enhance secure redundancy.
References
Jon
T., Pall B., Hector H. I., Shanmuganathan K., & Libor M. (2016) Introduction to Storage Area Networks. USA:
IBM Redbooks
Margaret R. (2013). Storage Area Network (SAN). Source: (searchstorage.techtarget.com).
retrieved from
http://searchstorage.techtarget.com/definition/storage-area-network-SAN
Meeta G. (2002) Storage Area Network Fundamentals: USA.
Cisco press
Richard
B., & Paul M. (2002) Storage Area Network
Essentials: A Complete Guide to Understanding and implementing SANs. USA:
Willey
(2003). Issues for SAN security
Sherry Roberts is the author of this paper. A senior editor at Melda Research in nursing writing services if you need a similar paper you can place your order for Customized Research Papers.
No comments:
Post a Comment