• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Technologies » What is a Storage Area Network (SAN)? – Definition
Next →
← Prev

What is a Storage Area Network (SAN)? – Definition

By Dinesh Thakur

Definition: Storage area network is abbreviated as SAN. SAN is a network which is designed to attach computer storage devices such as disk array controllers and tape libraries to servers. SAN network can be accessed by multiple computers. It is a secure and high-speed data network. It is also known as SAN storage, SAN network, etc.

We assemble the storage area network by using three principal components:
•    Cabling
•    Host bus adapters
•    Switches
We attach the switches to storage arrays and servers. Generally, all storage arrays were hard disk drives but nowadays flash solid-state drives are used.

A storage area network is most commonly used for:
• For improving the availability of applications
• For enhancing the performance of applications like off-loading storage functions.
• For increasing the utilization of storage and its effectiveness which include consolidating storage resources, tiered storage, etc.
• For improving security and data protection
• For organizing Business Continuity Management activities.

We’ll be covering the following topics in this tutorial:

  • Types of SAN (Storage area network)
  • SAN Use Cases
  • Advantages of SAN

Types of SAN (Storage area network)

The most commonly used SAN protocols are as follows:
• Fibre Channel Protocol (FCP): it is the most widely used SAN protocol. It makes use of Fibre Channel transport protocol which is embedded with the SCSI commands. This protocol is deployed in 70 to 80% of the total SAN market.
• Internet Small Computer System Interface: It is the another most common type of SAN protocol which is used in the SAN market. It is deployed in 10 to 15% of the total SAN market. This protocol encapsulates with the SCSI command inside an Ethernet frame. It also makes use of an IP Ethernet network for transport purpose.
• Fibre Channel over Ethernet (FCoE): it is deployed in less than 5% of the SAN market. It is somewhere similar to iSCSI as it also encapsulated with SCSI command inside an Ethernet frame.
Similarly, it also makes use of IP Ethernet network for transport.
• Non-Volatile Memory Express over Fibre Channel (FC-NVMe): it is an interface protocol. We make use of this protocol for accessing the flash storage. We can access this flash storage via PCI Express (PCIe) bus. It supports tens of thousands of parallel queues. Each queue can help tens of thousands of concurrent commands.

SAN Use Cases

We deploy the storage area network in support of business-critical, performance-sensitive applications which are illustrated as below:
• Oracle databases: Oracle databases are business-critical. It requires high performance and availability.
• Large virtualization deployments using VMware, KVM, or Microsoft Hyper-V: This kind of environments extend to thousands of virtual machines. These machines run a broad range of operating system and applications. It has different performance requirements. The large virtual environments may concentrate on many forms.
• SAP or other massive ERP or CRM environments: San architectures are ideal for customer resource management workloads and enterprise resource planning.
• Microsoft SQL server databases: MS SQL Server database similar to Oracle database stores the most valuable data of the enterprises. So, they also require high performance and availability.
• Large virtual desktop infrastructures (VDIs): it serves virtual desktops to large numbers. By doing the centralization of virtual desktops, the data protection and data security can be easily managed by the organizations.

Advantages of SAN

• Storage virtualization: In this, the capacity of the server is not linked to the single storage devices. Now we can make use of large and consolidated storage pools for software applications.
• High-speed disk technologies: we can consider FC (Fiber Channel) as an example for this. FC is a network that offers speed for retrieval of data is more than 5 Gbps. In this, we can directly transfer the data from the source device to the target device such that there is either decidedly less or no intervention of servers. Also, storage-to-storage data transfer is also available.
• Centralized backup: it contains advanced backup features which includes block level and incremental backups, streamline IT system administrator responsibilities, etc., In this, the backup of data is stored on local disks instead of multiple disks.
• Dynamic Failover Protection: it provides continuous network operation. Suppose if our system fails in between, or some other maintenance problem occurs due to which it enables built-in redundancy and automatic rerouting of traffic, even then our operation will work.

You’ll also like:

  1. What are Network Protocols? – Definition
  2. What is network switch? – Definition
  3. What is the Network Layer? – Definition
  4. What is Metropolitan Area Network (MAN)? – Definition
  5. What is VPN (Virtual Private Network)? Definition
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Networking

Networking Tutorials

  • Network - Home
  • Network - Uses
  • Network - Advantages
  • Network - Classification
  • Network - Architecture Type
  • Nework - Networks Vs Comms

Networking Devices

  • Network - Modem
  • Network - Routers Types
  • Network - Bluetooth
  • Network - RS-232C
  • Network - Hub
  • Network - Devices
  • Network - Bridges
  • Network - Repeaters
  • Network - Routers
  • Network - Switching Hubs
  • Network - Transceiver
  • Network - Multiplexer
  • Network - Gateway
  • Network - BNC Connector
  • Network - Optical Connectors
  • Network - NICs
  • Networking Protocol

  • Protocol - Definition
  • Protocol - IP
  • Protocol - Aloha
  • Protocol - MAC Layer
  • Protocol - Sliding Window
  • Protocol - Stop & Wait
  • Protocol - Network Protocols
  • Protocol - Token Passing
  • Protocol - SIP
  • Protocol - Ad-Hoc Networks Routing
  • Protocol - Lap-f
  • Protocol - Point-to-Point
  • Protocol - PPP
  • Protocol - PPP Phases
  • Protocol - LDP
  • Protocol - MPLS
  • Protocol - MPOA
  • Protocol - HDLC
  • Protocol - Distance Vector routing
  • Protocol - IGMP
  • Protocol - ICMP
  • Protocol - SLIP
  • Protocol - DVMRP
  • Protocol - SDLC
  • Protocol - Routing
  • Protocol - UDP
  • Protocol - ARP and RARP
  • Protocol - Link-State
  • Protocol - ARP Table
  • Protocol - RTP
  • Protocol - NHRP
  • Network Addressing

  • Addressing - Home
  • Addressing - SubNetting
  • Addressing - Classless
  • Addressing - Classes or Classful
  • Addressing - IPV4 vs IPV6
  • Addressing - IPv6
  • Addressing - Subnet Mask
  • Addressing - MAC Address
  • Addressing - Supernetting
  • Addressing - Private IP
  • Addressing - IPv4
  • Addressing - Public IP
  • Addressing - Multihomed
  • Addressing - Indirect Addressing
  • Addressing - ASP
  • Addressing - VLSM
  • Addressing - Routing Algorithms
  • Addressing - Hierarchical Routing
  • Addressing - Routing
  • Addressing - Distributed Routing
  • Addressing - Data Routing
  • Addressing - Services
  • Addressing - IP forwarding
  • Addressing - Aging
  • Addressing - Algorithm CR
  • Networking Media

  • Transmission - Home
  • Transmission - Modes
  • Transmission - Media
  • Transmission - System
  • Transmission - Bound
  • Transmission - Unbound
  • Transmission - Baseband
  • Transmission - Wired
  • Transmission - Fiber Benfits
  • Transmission - Infrared
  • Transmission - UnGuided
  • Transmission - Microwave
  • Transmission - Infrared
  • Transmission - Radio Wave
  • Transmission - Network
  • Transmission - Digital Signal
  • Transmission - Data
  • Transmission - Asynchronous
  • Transmission - Sync Vs Async
  • Cable - Twisted-Pair
  • Cable - Coaxial
  • Cable - UTP and STP
  • Cable - Fiber Optics
  • Cable - Gigabit Ethernet
  • Cable - Fast Ethernet
  • Cable - Ethernet Cable
  • Cable - Fiber-Optic Using
  • Cable - CATV
  • Cable - 100Base T
  • Cable - 10BASE T
  • Cable - 10 Base 2
  • Cable - 10 Base 5
  • Networking Types

  • IEEE - 802.11
  • IEEE - 802.5
  • IEEE - 802.15
  • IEEE - 802.11e
  • IEEE - 802.11n
  • Network - Ethernet
  • Network - Arpanet
  • Network - Frame Relay
  • Network - X.25
  • Network - Telephone
  • Network - WSN
  • Network - Metro Ethernet
  • Network - WAN Ethernet
  • Network - Wireless Mesh
  • Network - SAN
  • Network - SNA
  • Network - Cisco Architecture
  • Network - Vlan
  • Network - FDDI
  • Network - 100VG-Any
  • Network - EPON
  • Network - ISDN
  • Network - ARCNet
  • Network - Passive Optical
  • Networking Reference Models

  • Models - TCP/IP
  • Models - OSI
  • Models - MAC Layer
  • Models - Network Layer
  • Models - MAC Layer Functions
  • Models - TCP/IP Vs OSI
  • Models - CSMA
  • Models - CSMA/CD
  • Models - CSMA/CA
  • Models - CDMA
  • Models - STDM
  • Models - FDMA
  • Models - TDMA
  • Models - SDH
  • Models - CDM
  • Models - Multiplexing
  • Models - Reference
  • Models - Random Access Methods
  • Models - TCP/IP Architecture
  • Models - FDM
  • Models - IP Header
  • Models - OTN
  • Models - Amplitude Levels
  • Models - MIMO
  • Models - Plesiochronous Media
  • Models - Half Duplex
  • Models - ISO Architecture
  • Models - Data-Link Layer
  • Models - WDM
  • Models - Duplex
  • Models - Ethernet FDSE
  • Networking Switching Techniques

  • Switching - Home
  • Switching - Techniques
  • Switching - Packet
  • Switching - Circuit
  • Switching - Message
  • Switching - Packet Vs virtual Circuit
  • Switching - Cell
  • Switching - ATM Cell Structure
  • Switching - Virtual Circuit Vs Datagram
  • Switching - Time Space
  • Switching - Modulation
  • Switching - Cell Relay
  • Switching - ATM Structure
  • Switching - VC Vs PVC
  • Switching - Packet and Circuit
  • Switching - VPC
  • Switching - IP
  • Switching - Logical Channels
  • Switching - TDM
  • Switching - FDM
  • Network Codes

  • Codes - CRC
  • Codes - Error Correction and Detection
  • Codes - Hamming
  • Codes - Piggybacking
  • Codes - Encoding Techniques
  • Codes - Error Control
  • Codes - Parity Check
  • Codes - Parity bit
  • Codes - Bit Error
  • Codes - CRC
  • Codes - Transmission Errors
  • Codes - Error Detection and Correction
  • Network Communication

  • Communication - Home
  • Communication - Satellite
  • Communication - Wireless
  • Communication - Data Type
  • Communication - Congestion Control
  • Communication - Network
  • Communication - Data
  • Communication - Software
  • Communication - Layering Process
  • Networking Signaling

  • Signal - Analog
  • Signal - Digital
  • Signal - Analog Vs Digital
  • Signal - Digitization
  • Network Security

  • Security - Home
  • Security - Requirements
  • Security - Threats
  • Security - Services

Other Links

  • Networking - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW