What is a thin collateral?
Thin secure is a method of assigning a central storage reserve based on "demand". This provides computers and servers in the network with additional storage as needed and provides network flexibility. Thin secure avoids wasting network resources by constant monitoring and redistribution that the computer receives available storage space, and provides more flexible access to local and wide network storage. The disadvantage of thin collateral is that it requires a constant network connection for successful operation; If the computer is disconnected from the network, it can no longer receive access or adjustments to the assigned storage amount. With this in mind, from the point of view of a home computer user, it can help appreciate the benefits of thin provision. Every computer in the basic home network is autonomous from others; Available storage for one computer is not available to others and vice versa. This can lead to one computer on the unit a large amount of free space, while the hard disk of another network computer can be close.
In a thin environment, the "extra" storage of a less ecorped computer can be moved to a computer that requires a little more space on the unit. By constantly re -evaluation of which network computer requires additional storage, a thin system can maximize the efficiency of its available space on the hard disk. This improves both the performance and the economic efficiency of the network, because other funds will not have to be spent on driving space until the entire network is really full.
, however, has some disadvantages. First, understand that the storage space that is exchanged is not physically located inside the Sish computer; Instead, there is a central place in a completely separate computer. This problem of close proximite results in problems if the network happens. During the crash, network computers will no longer have access to any other storage space, with J filesThey are stored in these units that are left out of restrictions until the network comes again online.
Second, a network using techniques of provision will have increased computing over with a network with solid storage techniques. One or more computers must take responsibility for storage monitoring and deciding where to assign the available storage blocks. This results in further stress on the CPU system, which may result in an exceptionally high network delay during the period.