CHAP 3.2 Data Access Flashcards
direct attached storage (DAS)
- consists of internal/external disks connected directly to the storage controllers in the host
- interface protocol: scsi, sata
das advantages & disadvantages
adv: easy to configure and inexpensive
disadv: slower and isolated bc the disks are attached to a single server
network-attached storage (NAS)
- an ip-based, high performance file sharing and storage device
- support file sharing protocol e.g network file system, server msg block
nas advantages & disadvantages
adv: relatively inexpensive, centralized storage at affordable price, easy to configure
disadv: slower access times, not an enterprise solution
storage area network (SAN)
- high-speed network of servers and shared storage devices
- common SAN deployments: FC SAN, IP SAN
san adv & disadv
adv: fastest access times, easily expandable, centralized storage, high level of redundancy
disadv: more expensive, requires specialized skills
fibre channel
- high speed nwk technology
- can support up to 128 Gb/s
- uses FC switches to form a switched fabric
- runs on optical fibre cables but can also run on copper cabling
- used to connect data storage to servers and between data centres
- highly scalable, support up to 15 mill devices
ip san protocol: iSCSI
- supports access to remote, SCSI-based storage devices
- can run over pre-existing switching and IP infra
components of iSCSI
- iSCSI initiator: client using software (driver) or hardware (iSCSI host bus adapter) to send data to an external iSCSI-based storage array
- iSCSI target: storage array w iSCSI port, provides LUN access
- IP network
ReFS (resilient file system)
- only supported on wdws 8, wdws server 2012 and above
- doesnt support file compression, EFS or disk quotas (ntfs supports all)
effective permissions
- ntfs permissions are CUMULATIVE
- permissions are inherited
- file permissions override folder permissions
- deny overrides all permissions
- creators of files and folders are their owners
- when share and ntfs permissions are active, most restrictive (minimum) permission is applied