Welcome back to Cyberia. I t. My name is just a fling will be going over Cloud. Plus,
we'll be covering the network storage and the configuration will cover a brief overview of them and how to set them up for us off. We'll talk about network and direct stores types.
We'll also talk about the access and protocols that network storage uses, along with the store's preparation and accessing so never end direct source types. Personally, you have is nasty. The next thing you have is stand in. The next thing is death. NASA stands for network intact stores. Sand,
his storage area network
and death is direct attack storage within. As you have a cheaper stores than the sand, it's easier to implement who have a server, and that server will have share files agreeable to intimate. Implement it with current infrastructure. So
in your network, if you do not have any stores
types on there, you're able to just set this up, set up a server, have a lot of hard drives into it and then be able to implement it out with very administrative functions.
Just taking a server, setting it up and let me go
it offers shares storage over the network again.
The server. You set it up, you configure the files and then users will connect to it as needed is the lowest performance, so it doesn't really require a whole lot performance. You just need the hard drives in it, a network connection and then able to offer those resources with very little user and functions. Next,
you have a sand which stands were a storage area network.
It's a shared storage. Access over the lamp
is expensive and requires special training. Sand isn't really for people that have never implemented these things. You do require a little bit of trying to be able to do this,
but in the most part it is easy to implement.
You have something called an H B A, which stands for host bus adapter host. Most adapter is basically a port that is connected to a cluster of hard drives. Switches. A lot of times, sands offer switches, they will. A group of servers will be connected together, and then they will be able to use this particular switch
for those servers on Lee.
To be able to offer their resource is vendor specific hardware and software
with a sand. A lot of times you have to have a vendor specific to be able to use these.
It does require a little bit more on the front end as far as cause goes. But whenever you have Cisco Products with Cisco Products, we have a lot better functionality than, say, friends Zylon or on the with Cisco or Barrack Ood or something else of that nature.
The configuration does take some time setting up.
You have to open up particular ports to be able to implement this. We'll talk more about it later on, and it offers the highest performance highest performance because it's not just a server, it's a group of servers or a group of clusters
that are offering their service. Is out also has very good fault tolerance.
Block level allocation block level is a particular way of sending information to the network as needed. You have file level and block level. We'll talk about those later, too.
The last one is direct attached. Storage directed at stories is directly connected to a computer, basically is like a USB with an external most of time. It's used by local PCs and local laptops. Not really so much on the server end, but it does offer that
the protocols that you have is I D,
which stands for integrated development environment. You also have
Seita, and then you also have scuzzy. We'll talk more about those later, but Seita is probably the newest one.
Say that you have the option of having to say the one said it, too, or say the three Each one has speed associated with them. Say the three is the fastest. Say the oneness. It's Lois.
And with the death most of time, it's not part of the design, mainly because the user will take an external hard drive or a flash drive or something that nature connected to their computer and then do what they need to do.
So admit administrators usually don't know that they exist.
However, most administrators don't allow them onto the network. They have to have authorization to have them in
next. We won't talk about accesses and protocols.
We'll cover the Internet fibre channel. The I P will also cover I scuzzy
F C P. Barbara Channel Protocol and Fibre Channel over Ethan. It
even it is most commonly used inside the network is the typical R J 45 it is eight pins. It's cheap and easy to implement. It doesn't really require a whole lot on the user. You just have to have the Ethernet cable match the speed you can't have
CAT three Knicks inside of a Cat five Network
Not very compatible,
it's not as fast as FC Fibre Channel, however. It does offer for quick implementation when needed.
You're able to use 10 gigabit Ethernet, but that does require the higher grade in Ethan, and it does require a nick stronger neck.
The T 56 a and the T 568 b are important. Knowing the color scheme is important. Whenever you go to a new network, you need to know those color schemes you need to be able to set it up. You have to have
the pin's match on each side of the cable, knowing that they go orange, white, orange, green on blue, blue, green, brown, brown.
It's very important.
Common and 10 Gig networks.
Barbara Channel is very widely accepted inside the network, and a lot of networks actually use fiber over Ethan that they just used Ethan. That going from the switch
to the actual work station itself, however, switches the switches switches. The servers, most commonly used fiber fiber, is also common in wins.
The reason why fiber is common and went and wide area network is because sending information over large geographic areas is a lot easier. One of your child with light versus with infinite, the thin it will lose a continuation, whereas fiber uses light doesn't lose its continuation as fast as what you can at what
connects server, the source
and the top apologists. You have a point the point abbreviated luke and switch fabric, and it's used with long distances has said would wins
the point. The point is basically one year to another gear,
and then the other two are ways that
fibre channel. Inside of this network.
They're not protocols.
I P operated the Internet layer of the TCP I P model,
and it provides traffic routing. I P is a connection list
protocol, and it's unacknowledged,
and what that means is that
it sends the packets out, but it doesn't know if the other side of see them or not. It just sends the packets out. It doesn't ask for an acknowledge.
I've been before is 192168 100. That one
I'm 56 will be something along this nature
I before is the technology that is actually going out. They realized that they ran out of I p addresses and that they're having to implement something else. I could be. Six, on the other hand, has a limited number of peace. I scuzzy air in that small computer system interface is another way of sending information
Whenever it comes to a sand, I feel the sins packets via scuzzy command,
and you have scuzzy, which is a connector like a H P A. That connects servers to stores devices.
Well, they can't just talk directly. They had to have a protocol, and I scuzzy is that protocol that sends the information from the server to the actual storage network. Vibrational protocol is another type of command that ice goes he uses. Basically, it will sin
the packets over long distances in case the story's device is not inside of the same building there. Transmit scuzzy command
and they utilize hardware to transmit packets. So
whenever you connect a server up to the network, it will send discussing commands through the neck out over the fiber channel. But I'll send them out and scuzzy commands. So that way they're able to connect to a sand or connect to a storage device and be able to communicate back and forth and relay the information that the native relay
in the speed of fiber.
The protocol offload engine P o E. That's just another form that they're also called the five a Channel five and channel over Ethernet F C O E.
That is used, isn't it? Instead of Fibre Channel,
have the speed of fiber, but they're using Ethernet toe have that speak
used to transmit scuzzy commands also, and it's cheaper than fiber in case there's an issue with transmitting the information back and forth. You could just use
uh, f c O e. You can use that, so that way you don't have to have the cost of the fibre channel. You're able to send out the speed and send out all the information the an Ethernet, instead of using a fibre channel or using a scuzzy,
and it is capable of using 10 gigs
stores preparation and accessing.
It's the network share
multi patching lines,
zoning and land mass. We won't talk about these. Also,
network shares. His resource is available across the land.
They appear on a logical machine as a drive with Microsoft OS SMB Protocol
Service. Mrs Block Protocols used Lennox OSF NFS with Linux operating systems. You use NFS protocols network file sharing protocols.
Network shares are basically
share folder out somewhere on the land most of time on a NASA or a sand
that whenever you access my computer, agreeable to see that as if it's a drive.
A lot of times you'll see the drive icon, and then there'll be a T. Blow it in upside down t below it.
This lets you know that you're accessing a share folder that that Dr does not physically reside on that machine. But it is a folder inside of the hard drive somewhere else on a source network.
This allows you to be able to access, say, for instance, a share. Dr. You'll access that shared drive, which will hold your company's information. The department's the IittIe staff forums, things like that.
You're able to access that drive from any computer. You don't have to be at that one computer. And when have you moved to another computer? You lose that. You just re map to that drive, and then you have all your information that you need. Multi patching is a form of fault. Tolerance creates multiple pass. Basically, you'll have
instead of having one port for this sand or for this nest, you'll have to ports for the sand or this nest,
so you'll be in case one switch goes out of commission. You'll be able to use your secondary switch just a redundancy so that away you're able to offer your service is up at all times without a loss.
multiple means of getting resources multiple next for connecting
connectivity or HBs from a PC. As I said,
you're connected to two different switches. The file servers connected to two different switches, and if one
switch goes down, be ableto still. Get to your information the of the other switch ones.
Logical Unit Numbers operates as technique identifiers.
It represents a virtual hard disk from my block of allocated stories within an *** or sand
lunch is basically an identifier used to associate with a hard drive or virtual disk. It takes the first bits out of the file or the folder, and it allows you to be able to access them virtually if needed.
The device that's requesting information is called initiator. You're initiating the contact, so therefore you're requesting it.
The device that performs request is called a target, so therefore, the device that's going to be sending it to you is the target. The next thing is zone and lan masking. These are very important. Whenever it comes to security.
Zoning lets you isolate a single server
to a group of source devices or a single storage device.
Zoning is implemented at the hardware level.
Lund Masking allows a line to be available to some host and unavailable to other hosts. Basically, with zoning and Lund mashing, the combination of the two were ableto isolate files, voters or
maybe other drives that you have the Russian network. Thataway. Particular users are able to access it.
You don't want your accounting people toe access business information. You don't want your
marketing department tow, access, accounting or business well with zoning and one mashing. You're able to separate those so that away,
the business people will only be able to access the business information, your marketing, accessing your marketing and accounting. Accessing the accounting departments.
One masking provides more detail security than zoning. So masking your lines is way better than Zanni.
As a brief overview of the end, we've described the network and direct source types the access protocols. We've also talked about preparation and accessing. This is Sy Berry. I t. Have you guys learned a lot?