Network Attached Storage Initiative
-
Upload
gary-wilhelm -
Category
Technology
-
view
437 -
download
0
description
Transcript of Network Attached Storage Initiative
Network Attached Storage
Brent CaisonCharles Hammitt
Sean SemoneLewis BinkowskiCasey Emerson
Georgia AllenDavid Pcolar
Rob NoelJames Fox
Michael Barker
Objective: to provide a cost-effective consolidation point for network attached storage that allows campus units to choose
not to duplicate similar or identical solutions locally
Team members:
Solutions: UNC Home space• Personal storage space located on a network
accessible resource• Complementary space to AFS• Centrally allocated- opt in service using a web
submit, similar to AFS• Initial offering:– 10 GB per user, with no expansion at start– CIFs based– Authentication based on ad.unc.edu– User Managed, supported through ITS Help
Solutions: UNC Shared SpaceShared enterprise level network attached storage space for departments, divisions, and Schools.• Central provisioning and backup paired with
distributed localized management• Base allocation established by headcount, and
provided at no cost• Additional allocation available at cost, billed
annually• Base allocation calculation: 10 GB per employee
Solutions: UNC Shared SpaceInitial offering:• CIFs based• Includes disaster recovery protection (backup)• Authentication based on ad.unc.edu• Additional allocation:– $2.50 per GB– Billed yearly– Minimum incremental size of 100GB
Possible Future AdditionsAdd "Dropbox" style connectivity to allow "cloud like" access.
Add sFTP, FTPs and HTTPs (WebDAV) to allow more options in connectivity.
Currently out of scope• Specialty research storage• Higher level “Sensitive” or “Secure” data
Proposed TimelineFunding dependent
• Phase roll out beginning in January 2011- Offer UNC Home space and UNC Shared Space to campus.
• Late Spring 2011- Expand access options– Investigate “Dropbox” or “Cloud like” access to UNC
Home– Expand options for UNC Group to include sFTP, FTPs
• Fall 2012- Expand access options to include NFS4
Next Steps• Solution review by Security• Complete hardware evaluation• Operationalize service• Work with campus groups on “Secure” storage
needs
Levels of “Secure”• IRB definitions from UNC VCRED• UNC Information Security Policies• Carnegie Mellon Security Policies
• Trend is toward 3 levels of Secure:– Public– Private– Restricted