?
Solved

NAS/SAN

Posted on 2005-03-24
7
Medium Priority
?
397 Views
Last Modified: 2013-11-15
Dear All,

I am beginner in storage solution, I would like to learn NAS/SAN...  Do you have any good document/url for me
thx

Eric
0
Comment
Question by:bigeric
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
7 Comments
 
LVL 11

Accepted Solution

by:
huntersvcs earned 40 total points
ID: 13624696
0
 
LVL 11

Expert Comment

by:huntersvcs
ID: 13624711
Or maybe this one:

http://compnetworking.about.com/cs/sanvsnas/

A lot of good info!  Including comparisons.
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 13625928
http://www.emc.com/techlib
and indeed: http://www.emc.com

This obviously has a heavy EMC slant.

http://www.redbooks.ibm.com/abstracts/sg245470.html?Open
http://publib-b.boulder.ibm.com/abstracts/sg246240.html?Open

is quite a good introduction, but again very heavily It's Broken Mate vendor-specific. The second article also includes information about iSCSI.

And when you're feeling really serious:
http://www.t11.org/index.htm 

For fibre channel (essential for a good SAN understanding - but, man, it is heavy stuff!):
http://hsi.web.cern.ch/HSI/fcs/

Happy reading!
0
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 13802617
It's that time again already :-)

How do you feel about a split?
0
 
LVL 11

Expert Comment

by:huntersvcs
ID: 13804100
Fine by me.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Are you looking to recover an email message or a contact you just deleted mistakenly? Or you are searching for a contact that you erased from your MS Outlook ‘Contacts’ folder and now realized that it was important.
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question