News
5/12/2009
11:03 AM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

DAS VS. SAN - High Capacity

Continuing our examination of the resurgence of direct attached storage (DAS), in this entry we look at the ever-increasing internal capacity of DAS in servers. One of the key reasons users begin looking at a SAN or NAS is when the capacity demands of a single server outpace its internal storage capabilities. This may no longer be justification enough to make the move to networked storage or to continue to expand the network storage you have.

Continuing our examination of the resurgence of direct attached storage (DAS), in this entry we look at the ever-increasing internal capacity of DAS in servers. One of the key reasons users begin looking at a SAN or NAS is when the capacity demands of a single server outpace its internal storage capabilities. This may no longer be justification enough to make the move to networked storage or to continue to expand the network storage you have.What has made DAS more viable in the "can you get enough" challenge is obviously higher capacity hard drives and the increasing adoption of the 2.5" form factor. The combination allows for very dense packaging. 2.5" drives in particular allow for configurations that can offer either reasonable performance with lower capacity or very high capacity some performance sacrifice.

On the performance side Seagate for example with its Savivio 15k.2 drive can deliver a drive running at 15k RPM and a capacity of 147GB. Using the Intel 5500 based servers as a minimal reference point, a 1U server can support 8 of these drives for 1.1TB's of reasonable performance storage. All these drives are SAS 2.0 based running at 6.0Gb/s.

Of course if that is not enough performance then as discussed in our last entry, DAS VS. SAN - Capacity And Performance Management, 400GB's of PCI-E Solid State Storage can also be had for less than $15k.

The capacity side of things is just as interesting. The Seagate Savvio 10k.3 2.5" drive comes in capacities up to 300GB's running at 10K RPM, allowing for 2.4TB's of capacity in that same 1U box. Obviously there are larger servers available that have a higher drive bay; for example there are 2U servers with up to 24 2.5" drive bays for 7.2TB's in a single server.

The net is with DAS storage for mainstream applications you can get the performance or capacity you need but it may be difficult to get both. The storage decision in a DAS world becomes very application specific.

From the SAN side, when the time is right many of the SAN storage systems will switch to 2.5" drives, and they will pick up the same capacity densities that server storage enjoys today. Right now 2.5" drives are still priced at a slight premium over 3.5" drives and other than power savings there are limited compelling reasons to make the switch.

The final area we will explore in our DAS vs. SAN series is efficiency. While SAN can, in most cases, out perform and out scale DAS, its in the area efficiency where it should have the biggest advantage and provide the biggest benefit. Or does it?

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.