StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Infrastructure for Data Storage - Essay Example

Cite this document
Summary
This paper “Infrastructure for Data Storage” demonstrates the options for data storage and technology. Likewise, Direct attached storage and network area storage is discussed in detail. Moreover, Redundant Array of Inexpensive Disk (RAID) is also highlighted as a storage option…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Infrastructure for Data Storage
Read Text Preview

Extract of sample "Infrastructure for Data Storage"

Infrastructure for Data Storage Abstract This paper demonstrates the options for data storage and technology. Likewise, Direct attached storage and network area storage is discussed in detail. Moreover, Redundant Array of Inexpensive Disk (RAID) is also highlighted as a storage option. Furthermore, we have discussed the security aspects of these data storage and technological options. The purpose is to highlight key benefits to the senior management. 1 Infrastructure for Storage The DAS provides Server-located direct-attached storage a quicker and easy drive I/O to the applications as compared to SAN. (Direct attached storage.2007) In simple words, Direct Attached Storage (DAS) is a storage device directly attached to a host system, such as the internal hard drive of a server computer. In order to store data for the computer system, the DAS is the most well-known method. This is considered as the core element that is promoted by Oracle and several other startups. In 2004, the Sun’s Honeycomb filter box introduces Nutanix’s Compete Cluster and Oracle’s Exadata and Exalogic along with incorporated server or storage supplies. The DAS model is then reinvented by these modern developments and a kind of clustered DAS. There is a threat according to the dominant nature of SAN among the direct-attached storage and SAN preference. Moreover, SAN provides extra ordinary and well-organized storage elements to many servers as compared to DAS. In a typical SAN display, the server-based applications obtain storage I/Os completed in a constantly short time and data is saved from missing. In addition, many servers share the infrastructure provided by SAN to access the application. However, SAN data can be accessed by any independent servers. The applications assume that they are using DAS while but in real hey are accessing a SAN. In order to speed up the applications, the SUN Honeycomb is implicated by placing NAS disks into the similar inclusion while using multiple servers and advanced file systems. This proposal did not spread commonly but it worked for Sun. Moreover, once the Oracle is purchased by the Sun, the class was generated for super charged Exalogic and Exadata boxes. The typical SAN was produced and created earlier than utilization of VMware and server virtualization. If this is accomplished, the servers can get a larger number of cores and sockets. For instance, a physical servers including CPU in working condition along with Windows became a two socket, quad-core computer and contain eight cores. These were ordinary physical resources for virtual machines (VMs), resultantly; a server equipped with operating system is operational with eight servers equipped with different operating systems, all on a single system. There is difference in speed of the servers that helps to process data and networked storage arrays. Some of the network architects now think that the networked storage are easy and not working for applications present in servers. In order to lessen the distance that is generated among servers and data we need to make them closer. In this way a number of servers can act in an individual direct-attached storage grouped along with virtual storage appliance (VSA). The SAN is still available and was skilled for an independent usage or DAS servers as a substitute of storage arrangements. It is also possible for the EMC array software to accomplish the same task as VNX. 2 RAID, Data Protection, Redundancy and High Availability Redundant Array of Inexpensive Disk is effective to a limited level i.e. hard drive mirroring also resembles with RAID, as data is stored on two storage devices simultaneously. Likewise, in case of failure of any one of the storage device, data is always available. For an enterprise level backup solution, a separate facility is required. (Clas, 2008) For this reason, a comprehensive business continuity//Disaster Recovery Plan or contingency plan is required. This plan addresses impact analysis, risk management, recovery time objectives and recovery point objectives for identified critical business processes. Moreover, the plan also incorporates strategy for declaration a disaster pertaining to unavailability of systems or services. Similarly, the recovery phase assures the recovery of information technology based services and business process by utilizing the sites. These sites are divided into many types such as hot site, warm site, cold site and satellite site. Hot and satellite site is the most expensive, as it comprises of full operational and replicated I.T infrastructure that is required for recovery. The third component of the Business Continuity Plan/Disaster Recovery Plan is the restoration phase. The restoration phase involves the recovery of services from the contingency site to the primary site. There is a requirement of a powerful vulnerability assessment and management tool that will facilitate the network security team in crises situations. Moreover, there is one more challenge for the network administrators i.e. they are not able to find traces for the threat that has already penetrated into a distributed network environment. Likewise, distributed network is a merger of two or more networks and may be operational on a broad spectrum. Moreover, the existing network security controls are not capable to detect the worm, as the distributed network is connected to one or more networks; it is difficult to analyze specific anomalies and patterns of unknown activity on the distributed network. Successful information security management involves an amalgamation of prevention, detection and response in order to deploy a strong security defense. Security has become an encircling issue for designers and developers of the digital world. A system should also be able to counter incidents and raise proper procedures in case an information security incident occurs. Information security incident handling takes a stride forward in the information security management procedure (Dhillon, 2001). The aim is to provide a reference for the management, administration and other technical operational staff. If considering the enterprise government, focus on executing management actions is required to support the strategic goals of the organization. It has been calculated approximately half of the breaches to the security of the information systems are made by the internal staff or employee of the organization (Dhillon, 2001). Security incident management facilitates the development of security incident handling and planning including preparation for detection and reply to information security issues. The standard of the incident management primarily relates to ensure the existence of processes rather than the contents of these procedures (Blokdijk & Menken, 2008). The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the organization need to tailor the security incident handling plan according to specific operational requirements. In order to do so, the security staff must equip with tools for vulnerability detection and assessment. 3 References Blokdijk, G., & Menken, I. (2008). Information security management best practice workbook: Implementation and management roadmap for threats, challenges and solutions - ready to use supporting documents bringing theory into practice Emereo Pty Limited. Clas, E. (2008). Business continuity plans. (cover story). Professional Safety, 53(9), 45-48. Direct attached storage. (2007). Network Dictionary, , 152-152. Dhillon, G. (2001). Information security management: Global challenges in the new millennium Idea Group Publishing. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Infrastructure for Data Storage Essay Example | Topics and Well Written Essays - 1000 words - 1”, n.d.)
Infrastructure for Data Storage Essay Example | Topics and Well Written Essays - 1000 words - 1. Retrieved from https://studentshare.org/information-technology/1471539-examine-data-storage-technology-options-for-business-needs
(Infrastructure for Data Storage Essay Example | Topics and Well Written Essays - 1000 Words - 1)
Infrastructure for Data Storage Essay Example | Topics and Well Written Essays - 1000 Words - 1. https://studentshare.org/information-technology/1471539-examine-data-storage-technology-options-for-business-needs.
“Infrastructure for Data Storage Essay Example | Topics and Well Written Essays - 1000 Words - 1”, n.d. https://studentshare.org/information-technology/1471539-examine-data-storage-technology-options-for-business-needs.
  • Cited: 0 times

CHECK THESE SAMPLES OF Infrastructure for Data Storage

The Basic Idea behind Cloud Computing

Cloud promises the availability of all the required architecture including application, hardware, platform, software, and required amount of storage through ownership of a suitable internet connection.... Virtualized infrastructure Virtualized infrastructure enables the development and deployment of plications dramatically easier, thus increasing the reliable scow of these applications achievable within the allocated budget and organizational controls....
7 Pages (1750 words) Essay

Cloud Storage as a Means for the US Government to Store Data under Various Security Designations

This paper "Cloud storage as a Means for the US Government to Store Data under Various Security Designations" examines the nature of security and then focuses on the potential underlying vulnerabilities that could threaten the integrity confidentiality, availability, and authenticity of the data.... The paper then recommends more rigorous encryption policies as well as a better rating of staff and localization of cloud storage to limit physical access especially from abroad....
14 Pages (3500 words) Case Study

Global transportation issues and challenges

Investment in infrastructure is fundamental for ensuring effective transportation systems.... Nations must be considerate of such infrastructure dynamics as parking lots, traffic lights, roadway networks, and ports (to name only a few).... Whether transport occurs by air, sea or by land, there are a plethora of challenges that must be recognized or overcome in order to reduce costs, ensure… Today, consumers want products that are produced in other countries around the world, such as wine from the nation of South Africa or inexpensive computing systems from Korea (De Nazareth, 2011)....
8 Pages (2000 words) Thesis

Data Migration Between Clouds

Generally, the paper "data Migration Between Clouds" has provided an exploratory overview of the topic of data computing technology and described an effective model that can address the challenges associated with the Amazon cloud system considerably.... hellip; The study has described the Windows Azure platform that may be effective in transferring data among clouds.... Lastly, Cloud portability is primarily the ability to transfer data from one a cloud-managed by a particular dealer to the one serviced by a different dealer (Shroff, 2010)....
18 Pages (4500 words) Thesis

Cloud Computing Voting Architecture Diagram

At the moment there is no a straightforward answer to a simple question shuch as “who owns the data that is maintained by a cloud storage services, the storage provider or the uploader.... It will be important for the designer to consider what data will be sent to the system in order to prevent any security related risk.... Also, in cloud computing environment data cannot be segregated (Raouaf, 2009).... data is found to be distributed throughout the cloud computing network and this may cause a lot of problems when specific data or information is needed to be segregated....
5 Pages (1250 words) Assignment

Cloud-Based System for S-mart Retail Company

nbsp;By definition cloud computing also known as the “cloud” technology refers to a computing paradigm that connects a pool of large systems either in a public or private network to enable dynamic sharing of scalable infrastructure for data, storage.... nbsp;By definition cloud computing also known as the “cloud” technology refers to a computing paradigm that connects a pool of large systems either in a public or private network to enable dynamic sharing of scalable infrastructure for data, storage, and applications contained in the particular systems....
8 Pages (2000 words) Case Study

Corporate Digital Forensic Investigations

The technology provides cloud storage whose purpose is to maintain and manage users' data and make it available over the internet (Al-Sadi 21).... Clouds can be used as a tool for launching technological attacks or be a target of the attacks such as internet fraud, data theft, pornography, business espionage, and cyber-terrorism (Babu and Rao 239).... The Impact of Cloud Computing on Digital Forensic Investigations Digital forensic is defined as the process of identification, collection, and analysis of data that encompasses the preservation of the integrity of information and maintenance of the chain of custody of the data (Al-Sadi 21)....
6 Pages (1500 words) Essay

Building Green Infrastructure

… The paper "Building Green infrastructure" is a great example of a term paper on environmental studies.... nbsp;Green infrastructure has evolved as a topic of worldwide significance for the last decade.... nbsp; The paper "Building Green infrastructure" is a great example of a term paper on environmental studies.... Introduction Green infrastructure has evolved as a topic of worldwide significance for the last decade....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us