SEO Texas, Web Development, Website Designing, SEM, Internet Marketing Killeen, Central Texas
SEO, Networking, Electronic Medical Records, E - Discovery, Litigation Support, IT Consultancy

NAS Vs. SAN – How To Build Your Network?

Choosing the right storage solution for your company’s data can sometimes be a complex decision. It is important that you gain a deep insight into all the options available to determine the one that will be most suitable for your virtual environment. The technology will depend upon the following factors:

  • The type of data you want to store
  • Your budget
  • Usage pattern
  • Scaling concerns

Discussed below are the two main types of data storage, Network Attached Storage and Storage Area Network.

Network Attached Storage (NAS)

NAS involves the use of TCP/IP protocol, such as Ethernet, to connect to the network. An external device is attached to the web servers through a LAN or WAN. NAS devices usually run on a built-in operating system and management interface. Employees can easily access the files stored on the NAS just as they are on a local hard disc.


  • Installation of NAS devices is very easy and does not require much time. In case you are in an urgent need for additional storage, NAS is your best option.
  • As file serving and storage is not handled by the web server, it reduces downtime to a great extent.
  • The NAS system is quite flexible and can work efficiently in organizations that work with different operating systems.
  • The low capital investment makes it a good choice for small to medium sized businesses.


  • The scope of NAS devices is limited. They are only suitable for sharing files over the network.
  • The performance of NAS devices depends a lot on the network quality. Therefore, you need to get extended bandwidth while deploying a NAS solution.

Storage Area Network (SAN)

SAN is a more complex technology that connects to the network through a fiber channel or SCSI (Small Computer System Interface) protocol. The files are managed centrally and can be shared between multiple computer systems.


  • SAN offers a high level of scalability. You can add as many storage drives you need to keep your data secure.
  • It is a suitable option if you require reliable storage solution to handle large volumes of data.
  • SAN system allows multiples users to access the files seamlessly, without any slowdown or downtime.


  • The requirement of specialized equipment increases the upfront cost of installing a SAN system.
  • There is an increased risk of data corruption if several host machines connect to the same SAN device.

For more tips on choosing the right network storage solution for your organization, feel free to contact Centex Technologies at (972) 375 – 9654.

Network Virtualization: Benefits, Risks And Best Practices

Network virtualization is a way of combining different physical networks to make them function collectively as a single virtual network or vice versa. At times, the process may also include virtualization of storage solution, which facilitates using all storage devices as a single resource. Network virtualization can serve multiple purposes, depending upon the specific requirements of an organization. This may be aimed at either improving the efficiency of the in-house IT systems or lowering investment in additional hardware components.

Given below are some of the benefits offered by network virtualization:

Centralizing Confidential Data

Due to the increasing data breaches and other online attacks, many business owners are considering storing their data on a centralized location. With this, a hacked computer system, lost/stolen device or negligence on the part of an employee would not pose a major risk to the security of sensitive information. When IT administrators store the data on a centralized server, it mitigates the risk of theft, malware infections and unauthorized access to the company’s intellectual property.

Setting Up A Sandbox

Sandboxing involves demarcating and isolating all the applications that may pose a potential threat to the internal network of the company. Network virtualization proves to be a great help in this regard. When a sandbox is created for web browsing, it prevents all the online attacks from affecting the host server and applications that are operating out of the virtual environment.

Facilitating Secure Network Access

With the increase in ‘bring your own device’ (BYOD) and work from home culture, a lot of employees access the corporate network from their personal devices as well as from multiple locations. When virtualization is used, the employees do not have to deal with the management and security aspects of the network. All these can be handled at the back-end by trained IT staff at the office.

Security Risks Of Network Virtualization

  • When virtualization is added to the IT infrastructure, it can make it more difficult to monitor and detect security issues, such as advanced persistent threats (APTs).
  • Network virtualization creates a dynamic environment which, at times, may lead to virtual sprawl. This means that the administrator may not be able to keep a track of the online activities and security vulnerabilities that can be exploited.
  • To eliminate these risks, it is important to improve the security of the host machine. Virtual systems that are not performing important business operations or remain unused should be removed from the network. Lastly, strict access control policies must be implemented to secure the virtual network.

For more information on network virtualization, contact Centex Technologies at (972) 375 – 9654.

How To Diagnose Common Networking Problems

A computer network is bound to have network connectivity related issues, which is why every network user should be familiar with at least a basic level of network troubleshooting. Sometimes the issue can be resolved by simply tweaking a wire or typing a command, saving you hundreds on calling in an IT expert each time something goes wrong. The following simple guidelines take you through a step-by-step tutorial on how to diagnose and solve common networking problems:

  • The first thing to do should be to make sure the physical condition of the network, i.e. the network cable is intact.
  • Next, execute a command prompt with IPCONFIG /all. Make sure that the IP address, default gateway, and subnet mask are correct. If there is any error at this stage, modifying it should bring the network back online.
  • If that doesn’t work, the next step should be to use the PING command to ping the servers by IP address. This is one of the simplest commands to diagnose networking problems and is present in almost all operating systems. DNS issues should be ruled out by pinging the server’s name.
  • If these commands do not work, the issue usually lies in the internal DNS. Pinging a website like tests external DNS resolution.
  • If the DNS resolution is fine, you need to run NetStat ‘’’’a to rule out a Trojan or virus having infested the machine.
  • If no viruses are detected, a pathping or tracert run between the machine and the internet can help to identify any pending network problems. For instance, you might notice another computer using the same IP address and host name as your network. The solution for this is using Angry Ipscanner.exe to identify the host name or query the IP address. If you are working on a Linux or MacOS machine, you can use a similar tool known as traceroute.
  • If none of these techniques diagnose a network issue, this usually indicates that there is no problem in the machine, but the issue lies in the network itself. For this, try firing up Wireshark to listen to all the traffic and responses for your network. If you are not familiar with how to decode the data at this stage, you can make use of one of the many useful online resources available to get help with that.

Centex Technologies is a leading IT support and networking company providing complete computer network installation and repair services. We serve Dallas, Killeen and other surrounding areas in Central Texas. For more information, call us at - (972) 375-9654