Your Seagate server has predefined volumes. One volume is used for the Windows system software, and another is for data. You cannot modify the system volume, but you can reconfigure the data volume. Show
Storage Pools Versus RAIDWith WSS 2012, you can group physical hard drives into storage pools or RAID configurations. Grouping drives together creates a larger logical unit, increases reliability, and enhances performance. Storage pools are more flexible and can potentially include hundreds of disks. Storage pools allow you to use the physical disk space more efficiently. Mirrored storage pools can be resistant to disk failure. RAID allows for storage to be shared between disks in ways that can improve reliability. However, RAID configurations are less flexible than storage pools and are not easily expanded. Storage pools offer greater flexibility and ease of maintenance. Seagate recommends storage pools over RAID. Note: Disks that are configured for RAID cannot be used in storage pools. Create a storage pool
After the storage pool is created, you can create a virtual disk to make the storage pool available for use. Add a hard drive to a storage poolTo add a hard drive to a storage pool, it must first be inserted into the server’s enclosure. You cannot add USB or USM hard drives to storage pools.
Important: You can view unallocated portions of disks that are added to storage pools in Disk Management. However, if an entire disk has been added to a storage pool, it is not be visible in Disk Management. Virtual DisksVirtual disks can have one of the following storage layouts:
A virtual disk can have one of the following provisioning systems:
Create a virtual disk
A virtual disk must have a file system before it can be used by PCs on the network. For more information, see Volumes. Extend a virtual diskYou can increase the size of a virtual disk.
RAID TypesRAID levels vary according to the number of hard drives, protection, and performance. RAID 0 – Striped volume: Unallocated space on two or more drives is combined into a single array. RAID 0 offers a small improvement in performance, but no data protection should a hard drive fail. RAID 1 – Mirrored volume: Unallocated space on two drives is combined into a single array. The same data is simultaneously written to both drives, providing a measure of data safety if one drive fails. However, you lose 50% of the total disk capacity due to mirroring the data. RAID 5 – Striped volumes with distributed parity: Unallocated space on at least three hard drives is combined into a single array. RAID 5 offers improved performance and data protection. If one drive fails, the data can be recovered. A RAID-5 volume requires space on at least three separate physical disks. RAID-5 disks use one-third of the space for overhead. For example, if you create a RAID-5 volume from three 1TB drives, the resulting RAID-5 volume is 2TB. Create a RAID-5 volume
The time to complete the process depends on the total capacity. You can use the volume while it creates the RAID volume but performance might be affected. VolumesA volume is a logical storage space available to a PC. When the volume is allocated on the virtual disk, it is assigned a size, a drive letter, and a file system. Using ReFS Versus NTFSWSS 2012 has two types of file systems: Resilient File System (ReFS) and New Technology File System (NTFS). NTFS has been the principal file system for Windows implementations since 1993. ReFS is based on NTFS, but has been enhanced for storage applications. ReFS offers the following functionality:
ReFS cannot be:
If you are using NTFS, you can expand or reduce the volume size. Create a volume
Expand an NTFS volume
Shrink an NTFS volume
BitLocker drive encryptionBitLocker is a
volume-level encryption service that protects data on hard drives that have been booted on a foreign operating system or another computer. When BitLocker is used on a data volume, the user is prompted for a password before being able to use its data. When it is used on the system volume, you unlock it using a password or an encrypted key on a USB drive. Add BitLocker
BitLocker is added as a feature to the target server. After restart, the Control Panel includes BitLocker Drive Encryption under the heading System and Security. Enable BitLocker drive encryption on a data volumeBitLocker must be installed to enable encryption.
Enable BitLocker drive encryption on the system volumeAdding BitLocker encryption to your system volume gives you greater security.
Unlock a volumeAfter a volume is encrypted, it must be unlocked after rebooting.
You can use the Control Panel option Turn On Auto-Unlock to Automatically Unlock the Volume if the Windows system drive is unlocked. To enable this option, the Windows system drive (C:) must be encrypted. If BitLocker is enabled on the Windows system drive, additional authentication is required during the boot process. USB and USM DrivesIf your Seagate server includes USB ports, you can manage USB hard drives and flash drives with the same tools as conventional disk drives. It is strongly recommended that you do not add USB drives to volumes associated with internal drives. Removing a USB drive from such a volume can have unpredictable effects on the volume’s data. Your Seagate server might include a universal storage module (USM) slot that supports SATA II and SATA III hard drives for added storage. A USM drive is ideal for backing up data that you want to transport to a separate location or copy to another computer. The volumes on the USM drive must be separate from the volumes on internal drives. Seagate recommends that you do not add USM drives to volumes associated with the internal drives. Veri saklama yöntemleri nelerdir?Veri Depolama. Veri Depolama Türleri.. 1-Harici Sabit Sürücü. 2-SSD Sürücüler (Solid State Drive). 3-Ağa Bağlı Depolama (NAS). 4-USB Thumb Sürücü veya Flash Sürücü. 5-Optik Sürücü (CD / DVD). 6-Bulut Depolama.. Bilgisayar verileri nasıl saklanır?Veriler öncelikle manyetik alanlarda disk üzerinde fiziksel olarak depolanır ve sonrasında depolanmış veriler dosya sistemleri tarafından yönetilir. Dosya sistemleri ise verilerin konumlarını analiz edebilen bir yapıya sahiptir.
Veriler nerede saklanır?Sondan başa doğru gelecek olursak, bu veriler, İnternet sitelerinin 'Server' yani 'Sunucu' diye tabir ettiğimiz alanlarında saklanır. Bu sunucular içinde fotoğraftan, yazıya, videolardan, ses kayıtlarına internetteki her izimiz saklanır. Tüm içeriklerin kasası bu sunuculardır.
Data nasıl saklanır?Bir veri tek bir yerde tutulmamalı, gerekirse tüm ortamlarda (sabit disk, bulut, kurumsal arşiv gibi) ve farklı mekanlarda (ofis, ev gibi) saklanmalıdır. Rıza formları veya hasta kayıtları gibi hassas verilere erişim kısıtlanmalıdır.
|