Download presentation
Presentation is loading. Please wait.
Published byVerity Austin Modified over 9 years ago
1
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Nine 1 Business Data Communications Chapter Nine Enterprise Solutions
2
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 2 Primary Learning Objectives Describe direct attached storage Define a storage area network Explain network attached storage Understand virtual private networking Define Voice-over-IP Identify two key elements of Web services
3
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 3 Economics of Data and Information
4
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 4 Direct Attached Storage – DAS Is a mature storage technology that has been available for several decades Is usually associated with magnetic tape and hard drives For servers, is usually implemented using SCSI: SCSI is a block-level I/O protocol SCSI commands can be issued over Ethernet, Fibre Channel, Serial Storage Architecture, or over standard SCSI parallel cables SCSI cables have a 25-meter length limitation Most SCSI DAS implementations use standard SCSI cables
5
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 5 Direct Attached Storage – DAS A DAS server: Does not support capacity sharing, which allows a storage device to pool storage space with other processors Capacity sharing: Provides for scalability Allows a pool of storage space to be defined from multiple devices Is associated with multiple servers Does not support data sharing, which is the capability of a storage device to share data and files with other storage devices Data sharing is associated with a single server
6
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 6 Direct Attached Storage – DAS
7
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 7 Storage Area Network – SAN Is itself a network Is composed of storage devices that other computers--servers or clients--can access Storage of commonly used resources are removed from the LAN and placed instead on the SAN Generally uses servers to provide the interface between itself and LAN clients Is often implemented using Fibre Channel
8
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 8 SAN Clients, through the LAN, access servers that, in turn, through the SAN, access storage devices, on the clients’ behalf.
9
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 9 Storage Area Network – SAN Optimized for storage traffic, a SAN: Is capable of managing multiple hard and tape drives as a single pool Provides a single point of control Offers specialized backup facilities that reduce server and LAN utilization Allows for greater distances between clients and servers that access data, and the storage devices where the data is housed Usually results in virtualization of the SAN for the clients that utilize it Requires a management component Can be costly to implement, but has significant advantages
10
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 10 Storage Area Network – Relevant SAN Questions Which applications in use would justify the SAN? How are current storage and server capacities being utilized? How many departments and/or locations could benefit from a SAN? What business objectives would a SAN address? What technical staffing is available to manage the SAN? How have past server and storage technologies been budgeted?
11
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 11 Network Attached Storage – NAS Can be implemented in conjunction with a SAN or as a stand-alone solution Devices are also called NAS appliances These devices provide high-performance data and file sharing to clients and servers in a LAN Applications include: Data mining Knowledge management Data warehousing Trend analysis
12
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 12 Network Attached Storage – NAS NAS devices: Have an internal, integrated processor Typically use either a hub or switch to connect to a LAN or WAN Must be attached to a network that supports IP-based protocols Use a stripped-down and proprietary operating system Use specialized file sharing protocols, such as: Network File System (NFS) Common Internet File System (CIFS)
13
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 13 Network Attached Storage – NAS In this configuration the NAS appliances are attached to a TCP/IP LAN and are accessed by using specialized file access and sharing protocols.
14
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 14 NAS
15
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 15 Network Attached Storage – NAS Can be directly connected to the LAN or WAN Useful when storing frequently used individual client files Can be placed on a separate dedicated storage network Useful when storing a resource, such as a database, needed by many clients and/or networks Can run on lower-cost Ethernet networks Is relatively easy to install Permits resource pooling only within the device itself
16
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 16 DAS vs SAN vs NAS
17
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 17 Virtual Private Networking – VPN Is a private network that utilizes a common carrier’s telecommunications infrastructure Implements privacy using various tunneling and security procedures Tunneling is a technique that allows packets from one protocol to be wrapped within a second protocol In effect, results in businesses’ outsourcing their networking infrastructure
18
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 18 Virtual Private Networking – VPN Permits many businesses to concurrently utilize a common carrier’s telecommunications infrastructure for their VPN Provides many of the benefits of private leased lines, but at a reduced cost However, a business has no control over the common carrier’s infrastructure Is implemented in one of three ways: Trusted – the oldest Secure Hybrid – the newest
19
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 19 Trusted VPNs Require that the business “trust” the common carrier to provide secure and reliable services Depend on only the carrier to affect the creation or modification of the VPN’s path: The path is the series of links between sender and receiver Many customers use the same links within a path To be established, VPNs must define routing and addressing between sender and receiver
20
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 20 Trusted VPNs
21
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 21 Secure VPNs Encrypt the data at the sender’s end Encryption scrambles the data so that unauthorized users are not able to interpret it Unencrypt the data at the receiver's end The sender and receiver must share the same encryption technology and key Require that all parties in the secure VPN agree to the encryption and security methods implemented Encryption does require a time element
22
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 22 Secure VPNs Establish two endpoints, the sender’s and the receiver’s Require administrators from each endpoint to agree on the characteristics of the secure VPN tunnel Must not permit someone outside the secure VPN to affect the security properties of the VPN Require more processes, or steps, than a simple trusted VPN
23
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 23 Secure VPNs
24
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 24 Hybrid VPNs Enable one portion of a communication to be trusted and another to be secure Allow the secure part of the hybrid VPN to be controlled by the customer or the common carrier provider Must have well-defined boundaries between the trusted and secure VPN Network administrators on each end of the connection must be able to determine which portion of a communication uses encryption and which does not
25
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 25 Virtual Private Networking – VPN Most frequently has these uses: Secure remote access Intranet access Extranet access Is particularly associated with Internet Protocol Security, standardized by the IETF Some other protocols used with VPNs are: Point-to-Point Tunneling Multi-Protocol Label Switching Layer-2 Tunneling
26
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 26 Voice-over-IP – VoIP Is a data service promising to provide many standard voice functionalities, including: Supervision Signaling Dialing Voice transmission Call routing Ring Billing Administration
27
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 27 Voice-over-IP – Standard Voice vs. VoIP Standard voice communications are carried as direct current on copper wire VoIP uses a bit stream on copper wire Standard voice is analog VoIP is digital Standard voice transmission is continuous VoIP is packetized
28
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 28 Voice-over-IP – VoIP VoIP potentially results in significant cost savings: Creates a single infrastructure for voice and data Virtualizes telephone operations Supports unified messaging Allows for linkage of customer resource management (CRM) applications with computer-telephone integration Possible VoIP implementation questions: What is current network utilization? Are network elements in place that support VoIP? Does the current network support IP-based QoS? What are current and future voice bandwidth requirements?
29
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 29 VoIP
30
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 30 Web Services An umbrella term referring to a suite of software components designed to dynamically interact with each other using Internet standards Three standard-setting organizations particularly associated with Web services are: World Wide Web Consortium (W3C) Organization for the Advancement of Structured Information Standards (OASIS) Distributed Management Task Force (DMTF)
31
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 31 Web Services
32
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 32 Web Services Utilize two key elements: Languages and protocols that allow devices, software, and people to better communicate and collaborate A key Web services language is XML, Extensible Markup Language A key Web services protocol is SOAP, Simple Object Access Protocol Web services are device and operating system platform-independent
33
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 33 Web Services
34
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 34 Steps in a Simplified SOAP Request/Response
35
Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Nine 35 In Summary DAS is a mature storage solution Newer storage solutions include SAN and NAS A SAN and a NAS can be configured jointly or independently A SAN typically uses Fibre Channel, and a NAS SCSI VPNs allow a business to create a network, using common carrier infrastructures VoIP can implement a single infrastructure for voice and data Web services utilize languages and protocols that are platform-independent
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.