11:32 AM
George Crump
George Crump


Remember the Storage Area Network vs. Network Attached Storage debate? There were books written about it, articles and forum debates (this is before we had blogs). Eventually NAS vendors like NetApp become SAN vendors and SAN vendors either created their own gateway NAS front ends as did EMC or partnered with someone that offered a NAS Gateway like ONStor or B

Remember the Storage Area Network vs. Network Attached Storage debate? There were books written about it, articles and forum debates (this is before we had blogs). Eventually NAS vendors like NetApp become SAN vendors and SAN vendors either created their own gateway NAS front ends as did EMC or partnered with someone that offered a NAS Gateway like ONStor or BlueArc. Now there is a new debate; Direct Attached Storage vs. Shared Storage.The DAS vs. SAN debate will end up much like the SAN vs. NAS debate; a middle ground will be found where the users will choose what makes the most sense for them and there will be integration between the two worlds that will allow for a seamless transition between them. Our next series of entries will examine the DAS vs. SAN debate and how to select the right strategy for your environment, or how to know when mixing them makes more sense.

If you have more than a few servers why would you stay with DAS at all? Most customers who stick with a DAS strategy do so because it has the reputation of being both inexpensive and simple. Those are big motivators not to network your storage. That said, it seemed like a foregone conclusion that as a business grew it would eventually network its storage to be able to improve utilization, data protection and ability to fully leverage server virtualization.

Despite these motivators to network your storage, inexpensive and simple were still big drivers to allow DAS to maintain a sizable market share, even more so DAS seems to be increasing its value proposition. There are three primary drivers for this. First very high storage capacity servers and some in the 20TB plus range now, second PCI-E based Solid State Storage and third medium capacity, high performance (450GB 15K RPM) SAS based drives.

As a result DAS has been able to keep pace with the demands of many growing businesses. The first driver for this is capacity. For many customers one of the reasons to implement a SAN was to gain access and to leverage the high capacity offered by shared storage systems. Today's servers can be configured with TB's of capacity suitable for many applications or virtualization environments.

The problem is that because the capacity of even the lowest capacity drive when put into a four or five drive RAID configuration results in far more overall capacity than is required by the one application running on the server. Also small capacity drives are not as cost effective on a price per GB basis as high capacity drives. This is what leads many customers to a SAN; to leverage high speed, high capacity drive economics across multiple servers as to not waste the resource but yet optimize the investment.

In the past a SAN was the only way to accomplish this balancing act, but now this is where the second driver comes in. PCI-E SSD cards from suppliers like Texas Memory Systems and Fusion-io allow for very high performance, application specific storage to be built and to be done so at a smaller capacity. The final case where large capacity performance and reliability are needed can be resolved with the third driver, high speed SAS drives.

To some extent you can say that DAS has held serve but that assumes that network storage and SAN have not evolved as well. In our next entry we will further examine the capacity amortization comparison of DAS vs. SAN and then we will look at the simplicity aspect

Track us on Twitter:

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Why else would HR ask me if I have a handicap?"
Current Issue
The Changing Face of Identity Management
Mobility and cloud services are altering the concept of user identity. Here are some ways to keep up.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.