The Best Protocol For The Entry Level SANThe Best Protocol For The Entry Level SAN
When the time comes to select your first shared storage system or even a second, one of the key points of debate is going to be what protocol you should use for it. The choices today can be somewhat staggering. At a minimum there is fibre, iSCSI and the NAS protocols CIFS and NFS, but there are also several new protocols that you may want to explore.
April 12, 2010
When the time comes to select your first shared storage system or even a second, one of the key points of debate is going to be what protocol you should use for it. The choices today can be somewhat staggering. At a minimum there is fibre, iSCSI and the NAS protocols CIFS and NFS, but there are also several new protocols that you may want to explore.For example, one of the new protocols to watch is ATA over Ethernet. Similar to iSCSI it transports a storage protocol over standard Ethernet cables. Unlike iSCSI it does not try to encapsulate and use IP. It is a native storage connection to the IP based storage. This does require a dedicated card, but it's inexpensive and the performance of the protocol can rival fibre.
The first thing you will want to understand is what you are going to use the shared storage for. The most common early use cases for shared storage is either basic file serving, clustering or most recently, virtualization. If it is just file sharing then NAS becomes the obvious choice. Clustering and virtualization are not so cut and dry.
Clustering for example may not even require shared storage. There are several solutions on the market today that will synchronously mirror data from one physical server to another, typically across a dedicated 1GBE link. In fact several of the companies offering this type of solution also provide similar functionality for the virtual server environment. Mirroring one physical host to a standby host. For environments with small server count but high uptime requirements these solutions may be ideal.
When you get beyond the simple file sharing use case or the need to provide clustering to more than a few servers, shared storage quickly becomes the best option. The good news is that regardless of the shared storage type that you select the entry price has become significantly more affordable over the last few years.
The truth is you are most likely to select a protocol based on your familiarity with it. That is why most companies will look at iSCSI or NAS for their entry level storage systems. You almost always have a network before you have shared storage and of course that network is IP. Fibre is often left out of the consideration because of it's reputation of being expensive and complicated. If your needs are relatively basic then that is a fair assessment. Understand though that as your shared storage network scales all three of the protocols becomes more complicated. My advice is to not rule out any protocol based on it's reputation but to judge the protocol on it's short term learning curve as well as it's long term flexibility.
There are some inherent advantages to each protocol. iSCSI does not have the need to have additional hardware installed and can use standard Ethernet switches. A NAS' built in sharing capabilities make setting up a virtualization environment with live migration a little easier. Fibre remains the performance leader and has become more affordable over the last few years.
Unless you have an overwhelming advantage to sticking with one protocol or another, you are going to be selecting the solution based on the capabilities of the software it comes with, not just on the capabilities of the protocol. As we discussed in our prior entry, that is where the functionality of the system comes into play.
Track us on Twitter: http://twitter.com/storageswiss
Subscribe to our RSS feed.
George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Modernize your Security Operations with Human-Machine Intelligence
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
2021 Banking and Financial Services Industry Cyber Threat Landscape Report