This website uses cookies to ensure you have the best experience. Learn more

Considerations For Lun Security In San Environment

1055 words - 5 pages

In my understanding LUN security starts in step by step
1) In Storage Array
2) In Fabric Switch Zoning
3) Using a Host software
LUN Security in a Storage Array:
Lun (Logical Unit Number) Security starts in Storage array through
1) Registering HBA in a storage array.
2) In Raid Group (for Data security)
3) Lun Masking:

Registering HBA in a Storage Array: A SCSI cable or a fiber channel cable is connected to the storage array front end port directly from the HBA card or through the Fabric switch. We can register a HBA in a manual way or storage array host agent will automatically identify the HBA WWN number. For every storage array there will be fail over mode to avoid single path ...view middle of the document...

Lun will be created across the disks. There will be no security for the data. If a disk fails then the entire data will be lost from array. The only main advantage of this is performance will be more.
RAID 1: RAID 1 is worked by mirroring process. If you select RAID 1 type while creating a RAID group (Example RAID Group 0) then 2 disks will be reserved for that raid group. When we create a lun from RAID Group 0 the incoming written data will be written one disk and the same data will be copied (mirrored) over to the second disk. When host requests to read a data then data will be read from disk 1. If a harm happened to disk 1 then automatically disk 2 comes into picture. Replacing disk1 automatically hot spare disk will work as disk2 until the disk is replaced.
RAID 3: RAID 3 worked on a dedicated parity. Lun will be written across the disks and the other disk will reserve for parity. If a disk goes down then the replaced disk will be rebuild using parity.
RAID 5: It is same as RAID 3 but in this parity is distributed across the disks instead of a fixed disk. It support one dual disk failure.
RAID 6: It is same as RAID 5 but in this it will support dual parity and will with stand up two two disk failures.
Lun Masking: Lun masking in a storage system like clariion is done by using a storage group. In process of mapping a lun to server HBA firstly a storage group needs to be created. Required host HBA nodes and luns are added to the storage group. The main role of a storage group is the hosts which are in that particular storage group can only see the luns in same storage group. They can’t see or access other luns. Another main important aspect is one lun can be part of many number of storage groups but a HBA node cannot be part of more than one storage group. Server team will identify the lun by...

Find Another Essay On Considerations for LUN security in SAN Environment

Tips for Working in a Restaurant Environment

1684 words - 7 pages follow the required rules given at the orientation and the handbook so it’s possible for anyone to be employee of the month. To stand out, you must develop different techniques that will help make your work easier and more rewarding in the end of each shift. The orientation was helpful, but you must develop your own special working habits that will always keep you on track. When working in a restaurant environment, making a good impression every

Application Essay for the MSFA Program in the University of San Francisco

704 words - 3 pages since it is so interesting, elastic and flexible. It requires very comprehensive skills in different situations. So I defended my interest firmly with my father and ended up studying in business school as my final choice. There are three reasons for me to choose the MSFA Program in University of San Francisco. Firstly, USF has very good reputation in the Great Bay Area for its prestigious education in finance. The school of Management

Human Security in the UN Mandate for UN Missions

3263 words - 13 pages because that would have no benefit for them. Therefore, Human Security, which relies on support from other states, failed to fulfill all of its missions. The USA did not get involved in the war or post-war activities despite the Human Security considerations as there were no security concerns or threats to them, which needed them to participate. European countries on the other hand did get involved in a small way at a later stage. They were

Using Data Encryption for Security in Cloud Computing

2098 words - 8 pages will analyze cloud computing and the issues it faces from a security standpoint. The main focus for this paper will be on how data encryption can help safeguard information being stored in the cloud. Data encryption is a key component in security for cloud computing and is often used when secure information is being transmitted. Keywords: cloud, security, data encryption Using Data Encryption for Security in Cloud Computing Today

Creating and Maintaining an Environment for Students to Work In

2221 words - 9 pages How to maintain and create an environment for students to work in Creating and maintaining an environment for students to work in is a very important part to the success of classroom management. According to Guthrie, “maintaining a learning environment requires teachers to actively monitor their students” (Guthrie, 2003, pg. 301). This means that an elementary school teacher must keep a close eye on what students are learning and ethical

Managing for Ethical Conduct in a Global Business Environment

540 words - 2 pages the business environment."(pg.335)They also need to have respect for the human rights of that country.Thus, organizations need to strive to achieve higher standards of economic excellence when they do business overseas. Since doing business overseas presents many challenges. Companies do well in training the expatriate managers before they go on a foreign assignment. Some of these training should include language training as well as how people behave and conduct business in other countries.ReferencesTrevino, Linda K. and Katherine A. Nelson (2003), Managing Business Ethics: Straight Talk about How to Do it Right, 3rd edition, Wiley Text Books.

Managing for ethical conduct in a global business environment

540 words - 2 pages the business environment."(pg.335)They also need to have respect for the human rights of that country.Thus, organizations need to strive to achieve higher standards of economic excellence when they do business overseas. Since doing business overseas presents many challenges. Companies do well in training the expatriate managers before they go on a foreign assignment. Some of these training should include language training as well as how people

Seven Considerations for an Ideal Job Complete all the exercises in Bolles' Your Flower Diagram in Parachute Complete the Holland Self-Directed Search Assessment

2032 words - 8 pages , and accept that the environment will likely change to present new challenges. Adaptation, I have always felt, is the key to successful completion, rather than constant complaining. While I hope for a team effort, with those willing to pitch in and help where needed, I have always felt it paramount that professionals take responsibility for their own work. If the group constantly has to pick up the slack for an individual, resent quickly sets in

Considerations for Using Technology in Schools

1191 words - 5 pages As technologies such as cellular phones and computers advance, they are becoming an important and permanent part of society. Today’s youth are growing up in an information age, and many school districts are beginning to consider whether or not the incorporation of technology would be beneficial. However, in the ongoing debates, school officials should consider the potential for technology to distract students, as well as its potential to

The New Great Game for Energy and Security in Central Asia

1503 words - 7 pages Introduction Central Asia after almost a Century of non-existence in the global politics with an exception of the Afghan war is once again a pivotal area of global power struggle. Military presence of the coalition forces in Afghanistan for the last decade changed the balance of force between the competing powers. The post-soviet deal and security architecture was once again revised. First time by the US led intervention in Afghanistan. Second

The Roles of Water in Living Organisms and as an Environment for the Organisms

797 words - 3 pages The Roles of Water in Living Organisms and as an Environment for the Organisms Without water there would be no life on Earth; this is why water is the most important biochemical of all. In "Human Biology" by J.M Orten and O.W. Nevhans, it is suggested that 70% of all body weight is water, most of which is found in three major compartments: 70% intracellular fluid, 20% interstitial fluid (lymph) and 7% blood plasma

Similar Essays

Security In The Business Environment Essay

1919 words - 8 pages Standards Organization (ISO) 17799:2000 and the IT Infrastructure Library (ITIL) Best Practice in Security Management. Introduction This service management function (SMF) provides information about security management for organizations that have deployed, or are considering deploying, Microsoft or other technologies in a data center or other enterprise-level computing environment. The guide assumes that the reader is familiar with the

Dynamic Key Management System For Improving Security In Three Tier Environment

1807 words - 7 pages this paper proposal of Dynamic key management and Duplicate data sending for Improve security in three tire environment is very important for save the data’s from the third party peoples like intruders. Providing security to network is not an easy thing. But trying to save our network, if we have an biggest idea about network. So choosing the key management issue will briefly explains the saving activities of data’s. Works Cited [1.]I.F

Considerations In Designing The Curriculum For The Undergraduate English Majors

1367 words - 5 pages the fact that their graduates find work unrelated to their field of study.Under such considerations, Shenzhen University revised its curriculum for English majors in 1999. In comparison with the previous version, the new curriculum has three noticeable changes. Firstly, language skill courses have been reduced to make room for the content courses of the English major. We have removed Extensive Reading and Video English altogether. Listening

The Future Security Environment In The Middle East

701 words - 3 pages demographic pressures, but also economic problem, and environment security issue in the future. Because of new and free media expanding in the Middle East, the policy decision-making considers about many point of views to formulate with little foreign policies decision-making. Also, the world power countries, for example, Russia, China, and the major European also have a little influence in the Middle East. Information technology changes provide