Welcome!

Containers Expo Blog Authors: Liz McMillan, Pat Romanski, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

Related Topics: Containers Expo Blog

Containers Expo Blog: Article

SANs and NAS: Improved Efficiency Through Virtualization

SANs and NAS: Improved Efficiency Through Virtualization

SANs, NAS, iSCSI, virtualization, in-band, out-of-band, the terminology seems never ending when it comes to storage and what's worse, no-one will tell you what's best.

Unfortunately, it's not that simple. The advent of SANs and the introduction of new technology has increased the number of options available, but there are no clear guidelines as to which one to use and when. There isn't a silver bullet or golden configuration that is good for everyone, the solution has to be tailored to the specific environment.

But all is not lost, there has been a lot written about storage and storage architectures, and if all else fails look at what you are trying to achieve and how much money you have to spend.

While it is widely thought that SANs are for big enterprises and NAS for smaller ones, this is not true. Most enterprises, whether big or small, now have NAS servers and many are using them for more than just file serving. The cost of SANs has fallen such that they are now a very real prospect for smaller organizations that want to take advantage of improved connectivity and performance to utilize with technologies such as third-party copy and clustered file systems.

So it is the applications and the business requirements that should drive the architecture, not the "latest and greatest" technology or the cheapest solution. Storage is not just about the online disk. Backup (which now might be to disk before going to tape), disaster recovery, and legislative compliance all have their part to play. Without a big picture of what needs to be achieved (from the business perspective) the decisions made will be insufficient.

Another factor to include is storage growth. If the space required in 12 months is 100% more than you have today, will that influence your architecture decision; what happens if it is 1000% in three years? How long do you plan to remain with the architecture that has been defined? The immediate logical conclusion is to go for the biggest you can buy - now. But we know this is not a pragmatic business decision, the architecture should be designed so that it can be grown - and this might mean starting with NAS and expanding into a SAN just as much as starting with SAN and acquiring a NAS solution later.

Utility computing is a trend we are hearing a great deal about, with many vendors touting it as the next big thing. When it comes to storage, applying utility computing principles and creating a storage utility is a great place to start. By using storage virtualization tools storage can be pooled and then provisioned when required; by having it attached to a SAN it can be allocated to any server that needs it. Additional functionality allows file systems to be grown automatically without the need to take the application using it down.

Business reporting tools enable departments (or lines of business) to see how much storage they are using. The IT organization can then choose to apply costs to the storage and could present each business with a bill (a.k.a., chargeback) if they so wished. More often than not it is the insight into costs that is useful, and it can be an invaluable guide as to where best to invest money in IT to get the greatest return for the business. In addition, utility computing is all about improving efficiency through best practice and automation. Again, storage is a great place to begin and putting in some best practices and simple automation - e.g., increasing space on servers when they are running out - can save a business a great deal of money, no matter what its size.

The grid is also seen as the next big thing and again, storage is a key component of a grid architecture. However most grid applications, while they need a large amount of space to store data centrally, it is then farmed out and generally processed in memory within the grid so the actual storage requirements are virtually nonexistent on the fringe nodes. For the main central storage, ensuring that the application serving out the data is highly available and that the data is sufficiently protected, i.e. backed up or replicated, is generally adequate.

Outside of storage, a general comparison of grid versus utility computing is interesting because while both have very different applications running on the architecture and so from 30,000 feet look very different, from the ground level there are many similarities. What is being used, how much is it being used, can it be used more - either to improve efficiency and/or utilization. --

More Stories By Guy Bunker

Dr. Guy Bunker, an Independent Expert at Bunker and Associates, is co-author with Gareth Fraser-King of "Data Leaks For Dummies" (John Wiley & Sons, February 2009). He holds a PhD in Artificial Neural Networks from King’s College London, several patents, and is a Chartered Engineer with the IET.

Comments (1) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
In Vino Veritas 11/18/04 11:27:09 AM EST

When it comes to storage, applying utility computing principles and creating a storage utility is a great place to start.

So you mean "utility computing" truly isn't just The New New Thing, but actually is something we can implement and benefit from, how refreshing! :-)

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...