Solved

SAS vs SCSI

Posted on 2006-11-17
3
584 Views
Last Modified: 2013-11-14
I need help, for building my web server,  are SAS disk comparable to SCSI disks ?
I mean with reliability, availability and performance.

thanks
0
Comment
Question by:Maddogslo
3 Comments
 
LVL 95

Expert Comment

by:Lee W, MVP
ID: 17967782
SAS = Serial Attached SCSI - they should be as reliable and perform as well or better than SCSI.
0
 

Expert Comment

by:Reidlymon
ID: 17969949
Your question got me curious too.  I did some poking around at Seagate's website and found this...

http://www.seagate.com/products/interface/sas/faq.html

I also went to Adaptec's site and found a nice 11 page pdf.  ^_^  Pretty interesting stuff.

http://www.adaptec.com/pdfs/SASEndUserGuide.pdf

Hope this sheds some light.  Did for me.
0
 
LVL 57

Accepted Solution

by:
giltjr earned 250 total points
ID: 17973163
SAS is what high end SAN's use.  Serial based SCSI (SSA, FC-AL, or SAS) can, and do, obtain much higher transfer rates.  The speed of sending electrons down the wire has increased so much that parallel connection must build in long delays due to skew.  Skew is the reason that fiber connections are all serial.

However, for a web sever I would say that SAS maybe a bit over kill.  My guess is that you are not going to exceed the peformance of parallel SCSI.

Database servers, or anything else, that must do tons of I/O against lots of data are targets for SAS.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Finding original email is quite difficult due to their duplicates. From this article, you will come to know why multiple duplicates of same emails appear and how to delete duplicate emails from Outlook securely and instantly while vital emails remai…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question