Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Network Design, Case Study Example
Hire a Writer for Custom Case Study
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
In network design, availability of the store information is dependent on the storage system in which it is stored and the online connectivity of those systems. In attached disk systems, the two factors show sufficient reliability and users need only to handle the issue of availability in an ad hoc manner when making regular backups. With RAID systems, the probability of disk failures is reduced to a certain degree. However, connectivity challenges are not affected by it. This is so because hardly do catastrophic network failures happen between a disk and the processor attached to it.
Storage Area Networks (SANs) have taken the option of working with directly attached disk model, taking the assumption that connectivity will never fail at least, not in catastrophic levels. This brings to the question of the availability of SANs within the wide area network (WAN).
Network Availability
It is possible that in Wide Area Networks, storage mediums can be unavailable intermittently or when they are available, the quality of service could be inadequate. This is usually caused by a number of factors in the network including congestion in the network, problems in routing, changes in topology and sabotage in the form of malicious interference.
Resolution of these kinds of network problems can take between seconds to several days. Therefore, it is necessary to develop end to end strategies that will ensure continued availability. In the case of Alpha Omega Technical Industries given its rapid growth, a wide range of strategies will be put in place to ensure availability. This will range from simple automated retries to redundant data accesses distributed across the entire network. This will be augmented with a kind of RAID error correction system to minimize data redundancy. These two measures will serve to ensure high latency in archival backups. The implementation of the algorithms to enforce the above measures will be done at end points, to ensure delivery to the end point and to get to the required level of sensitivity requirements of the operating systems at the end points, applications and users. The Venti design (Venti, 2002) where storage block are indexed by 160 bit hashes of their data is the right approach to ensure the unification of the various end to end strategies, hence, ensuring maximum system availability.
System Accuracy and Correctness
The assumptions as concerns the accuracy and correctness of storage systems have evolved over the years. At some point in the evolution, the tape was viewed as unreliable as a result of various environmental factors while at the same time, the optical disk was considered reliable. As a result, verification of data stored in tapes was done using checksums while disk data was never verified. This was based on the assumption that disk storage fails by the corruption of entire sectors which was easy to detect by the hardware controller. However, with the emergence of mass produced disks a wide variety of complex failure modes such as the undetected delivery of incorrect data has been common (Quantum, personal communication 2001).
In Storage Area Networks, it is assumed that RAID storage systems have adequate internal checking capabilities to ensure accuracy and that the networks utilizes highly reliable network protocols. Given that Storage Are Networks are implemented in extremely controlled environments, the components within the network are assumed to be reliable. This can or cannot be a reasonable assumption, however, for Alpha Omega Technical Industries; there is a need to ensure an end to end approach to the WAN requiring data accuracy to be checked by the end systems. This means that the ultimate writers and readers of the data will always be checking for data accuracy. This will not only ensure protection against errors in the composition of a reliable disk and unreliable network components but also against malicious components that could be introduced without being detected from the wide area network (WAN). In this situation too, the implementation of the Venti Design can also prove to be beneficial given that handle to data is a checksum of the data.
Network Security
The storage systems that are directly attached and localized storage area networks solutions are considered to have a high level of physical security that can only be breached by highly complicated intrusive means. However, once the storage area networks are connected to the office networks and especially when tunneled through the WAN, the security definitely becomes an issue. When it comes to Internet Protocol (IP) networking, one cannot assume that intermediate nodes are trustworthy. Therefore, for Alpha Omega Technical Industries, there is a need to implement an end to end application of cryptographic systems.
Nonetheless, the security aspect of Alpha Omega Technical Industries cannot sufficiently manage Denial of Service with just end to end techniques alone. In this regard, the security mechanisms implemented in the network should have control over the rights to allocate storage. Even then, it must be appreciated that any kind of security measures are just best efforts and the end points must be fully prepared to be affected by denial of service attacks, which might render data allocations within the WAN impossible or make it possible to have stored data overwritten as a result of security breaches at intermediate nodes. The techniques for detecting or preventing denial of service attacks are the only bits in the network design that cannot be handled in an end to end manner. However, analogous storage can be implemented to handle Denial of service in IP networks.
Conclusions and Recommendations
The end to end network security argument was developed in the context of IP network architecture, which encapsulates the end to end delivery of datagrams from sender to receiver. This network system conceptualization is highly scalable, and storage sharing can be designed in line with end to end principles. The resultant architecture creates a model for the extension of storage networks into the Wide Area Networks. This is an exciting niche in the development of storage technology.
It is advisable for Alpha Omega Technical Industries that the deployment of end to end networking solutions is the most effective way as they grow. Therefore, they need to scale their data storage systems. In any case, wide spread deployment of storage internetworks will hugely improve the capacity and the flexibility of the network. In using this model, the network architecture evolves into radically decentralized computer architecture.
References
Quinlan, S. and Dorward, S., Venti (2002) a new approach to archival storage. in USENIX File and Storage Technologies. Monterey, CA, 2002
Reed, D.P., Saltzer, J.H. and Clark, D.D. Comment on Active Networking and End-to-End Arguments. IEEE Network, 12 (3). 69-71.May/June
Plank, J.S., Bassi, A., Beck, M., Moore, T., Swany, M.and Wolski, R. (2003) Managing Data Storage in the Network. IEEE Internet Computing, 5 (5). 50-58.
Stuck with your Case Study?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee