UCD IT Services. Data Storage in the UCD Cloud
|
|
- Merilyn Parrish
- 8 years ago
- Views:
Transcription
1 UCD IT Services Data Storage in the UCD Cloud Customer Policy, Procedures & Information Project: Description: Data Storage in the UCD Cloud Customer Policy, Procedure & Information Document Version: 10 Last Modified: By Ruth Lynch on 4 October 2010 Budget Code: Abstract N/A This document covers briefly the policies and procedures to be followed for Data Storage customers. Ruth Lynch Page 1 of 7 Version 10
2 Table of Contents Introduction...3 Pre-application Considerations...3 Backups...3 Technical Considerations...3 Client / Initiator Hardware Options...3 Client / Initiator Operating Systems Options...3 Configuration...4 Client / Initiator Configuration Options...4 CHAP...4 LUN Details...4 Getting Storage...5 The Process...5 Charges...5 Application Steps...5 Next Steps...6 Accessing the Storage...6 Further Information...7 Ruth Lynch Page 2 of 7 Version 10
3 Introduction UCD IT Services have traditionally provided high available storage to all users. Now, given the large volumes of data created by the research community, researchers can purchase data storage space on reliable highly available mirrored storage, hosted, and administered by UCD IT Services. The storage system is collocated in the Research IT Data Centre and the UCD Computer Centre, which allows for disaster recovery. It can be accessed easily and quickly via the existing network using iscsi; allowing researchers to locate their servers either within the Research IT Data Centre or anywhere on the UCD network. Pre-application Considerations By its nature iscsi connectivity can be delivered to anywhere on the UCD Network and as such this gives customers flexibility in connecting to the storage. However, customers should be aware that the location of the iscsi Client, its hardware configuration and network connectivity all contribute to the delivered performance of the iscsi storage. Backups Customers should be aware that the UCD IT Services Storage Solution is not backed-up to tape by default. However, there is a Backup Service detailed in the UCD IT Services information document, Backups as a Service. This is an additional service and such has additional costs associated with it. Technical Considerations Client / Initiator Hardware Options Once a customer has decided to use the UCD IT Services SAN, the following options are available to the customer: Client Location: Local Building / Data Centre Hardware: Shared NIC / Dedicated NIC NIC Type: NIC / TOE NIC / iscsi HBA UCD IT Services recommend that each client have a dedicated NIC attached to the iscsi VLAN local to the client. Ideally this should be an iscsi HBA or TOE NIC to get the best performance. Client / Initiator Operating Systems Options Due to the large variety of operating systems on the UCD network, UCD IT Services are unable to guarantee support for iscsi on every OS. However, the Research IT Services Team will assist all customers, under a best efforts understanding and regardless of OS, to connect successfully to the UCD IT Services SAN via iscsi. UCD IT Services can provide support, and documentation, under the following operating systems: Red Hat Linux (RHEL 4 & 5) Microsoft Windows Server 2003 Ruth Lynch Page 3 of 7 Version 10
4 Note: Fedora Core 8 Intending users of the UCD iscsi storage solution should be aware that the iscsi client / initiator that they intend on using is required to support target redirection as this is a core component of the service. Configuration Client / Initiator Configuration Options The client / initiator software installed and used is dependent on the Client Operating System. Whilst many operating systems are now supplied with iscsi software built in, these may not always work successfully. For example UCD IT Services recommend that you use the Cisco iscsi Initiator for connecting Microsoft Windows servers to the iscsi storage. This is available for download at The iscsi connectivity in UCD is provided using Cisco technology and Cisco iscsi software is also available at the above URL for a variety of operating systems. A benefit from the manner in which iscsi services are configured in UCD, there is one single target IP Address to which users need to connect. This solution means that operating systems unable to support iscsi multi-path fail-over can benefit from path fail-over through the UCD solution. As a result customers need not configure multi path iscsi thus simplifying connection. CHAP CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link, and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user's password). [RFC 1994] UCD IT Services intend to implement CHAP authenticated iscsi when possible. LUN Details UCD IT Services allocate a LUN, or a number of LUNs, for a customer to access allocated storage. The maximum amount of storage that can be allocated per LUN is currently 2TB. Customers requiring more than 2TB of mirrored storage will be allocated one LUN for each 2TB, or part of, requested. For example if a customer requests 5TB of storage then 2 x 2TB LUN and 1 x 1TB LUN allocations will be made. Ruth Lynch Page 4 of 7 Version 10
5 Getting Storage The Process The process involved in availing of the opportunity to participate in the UCD IT Services storage solution is very much discussion based. In order to ensure that this discussion is based on the customer requirements from the outset, customers are encourage to first complete the web form available on Research IT Services Storage Enquiry Form available on Once this has been received customers will be contacted by the Research IT Services Team to discuss storage requirements, storage access requirements and costs. This process allows customers the opportunity to assess their storage needs from both an immediate and future perspective. Charges Storage is now charged on an annual basis to the owner of the iscsi Storage. This means that should you own and administer a server to which other users have connected iscsi LUNs and are not the owner of these LUNs you will not be charged. UCD IT Services charging policy is based on the cost incurred in providing a service, in this case iscsi Data Storage, to that customer, not on a cost recovery basis for the overall service. UCD IT Services provide all of the infrastructure including the fibre backbone, hardware and software backend and related licensing. Storage is charged for on the basis that each 1TB of storage is mirrored across sites. Details of all charges associated with services in the UCD Cloud are detailed in the UCD IT Services information document UCD IT Services - Payments for UCD Cloud Services. Charges are applied annually in advance and are subject to review 1 Application Steps As already mentioned, the application procedure is a discussion-based process. However, in order that this process itself is transparent to the customer, each logical step in that process is outlined below. 1. Customer assesses their data storage needs and completes the Storage Enquiry Form on 2. Research IT Services contacts the customer within three working days to discuss the customer storage needs and associated costs. This discussion will gather and agree the following: Duration for which iscsi Storage is required Amount of storage required immediately along with customer forecast increase / decrease in needs. 1 Whilst charges are subject to review it is not UCD IT Services intention that this would be in an upward direction. However, it should be noted that where maintenance or supplies such as tapes increase dramatically in price that UCD IT Services would not be in a position to absorb the full cost. Ruth Lynch Page 5 of 7 Version 10
6 Client Operating System(s) and initiator software identified. Client network location Hardware requirements & Configuration options Cost of the storage to the customer 3. Research IT Services will with the UCD IT Services Operations Team establish the ability of UCD IT Services to fully satisfy the customer requirements. 4. When the customer is satisfied that they wish to proceed with obtaining storage from UCD IT Services, a funds transfer of the total cost agreed should be made to UCD IT Services. This will be arranged with the UCD IT Services Finance Officer. 5. Research IT Services will complete the request process within UCD IT Services. Next Steps Accessing the Storage Setting Up iscsi Once the appropriate iscsi software has been installed on the server then the customer should 1. The customer must ensure that the agreed hardware configuration for iscsi connection has been met. In the case where a test LUN is being provided to the customer there is no requirement for the customer to provide a dedicated NIC for iscsi connection. These are short term connections. In the case where the LUN is being allocated on a more permanent basis, customers are required to provide a dedicated NIC to handle iscsi traffic. This configuration provides for separation of iscsi traffic from other general network traffic, improving performance and security. UCD IT Services recommend that customers configure two dedicated iscsi NICs for redundancy within the server. 2. Customers are required to register dedicated iscsi NICs for IP Address allocation. 3. The customer is responsible for configuring their own equipment to access the iscsi storage, however the Research IT Services Team are available to assist and advise where possible. Amongst the configuration settings for which the customer is responsible are the following: Initiator name should be set to reflect the host name of the client. For example if the default initiator name is set to: InitiatorName=iqn com.redhat:researchit-gx520.ucd.ie and the host name of the client is Ruth Lynch Page 6 of 7 Version 10
7 customer-server.ucd.ie then the customer should reconfigure the initiator name to: InitiatorName=iqn com.redhat:customer-server.ucd.ie 4. CHAP authentication settings on the initiator (when available through the UCD IT Services storage solution) Connect to the Storage 1. Once iscsi is configured on the client the customer should perform a Target Discovery to the IP Address And inform the Research IT Services team that this has been done. 2. The UCD IT Services Operations Team will then allocate a WWN to which the requested LUN(s) will then be presented. 3. The Research IT Services Team will contact the customer to ensure that they can mount the storage. 4. The customer will then format the storage for use as required. Further Information Further information, and regular updates on the iscsi Storage Services is available on the Research IT Services web page at links to a variety of drivers and other storage related information will also be available from this site. Support Support for iscsi storage is available to customers through the UCD IT Services Helpdesk at helpdesk@ucd.ie or by telephone at extension All queries relating to the information contained within this document should be directed to ResearchIT@ucd.ie Ruth Lynch Page 7 of 7 Version 10
Windows Host Utilities 6.0.2 Installation and Setup Guide
Windows Host Utilities 6.0.2 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
More informationWindows Host Utilities 6.0 Installation and Setup Guide
Windows Host Utilities 6.0 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 4-NETAPP
More informationIntroduction to MPIO, MCS, Trunking, and LACP
Introduction to MPIO, MCS, Trunking, and LACP Sam Lee Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201002-P210C lntroduction Many users confuse the
More informationDell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN
Dell EqualLogic Red Hat Enterprise Linux 6.2 Boot from SAN A Dell EqualLogic best practices technical white paper Storage Infrastructure and Solutions Engineering Dell Product Group November 2012 2012
More informationWHITE PAPER. How To Build a SAN. The Essential Guide for Turning Your Windows Server Into Shared Storage on Your IP Network
WHITE PAPER How To Build a SAN The Essential Guide for Turning Your Windows Server Into Shared Storage on Your IP Network TABLE OF CONTENTS Introduction... 3 What is a SAN?... 4 Why iscsi Storage?... 4
More informationServer and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
More informationIP SAN Fundamentals: An Introduction to IP SANs and iscsi
IP SAN Fundamentals: An Introduction to IP SANs and iscsi Updated April 2007 Sun Microsystems, Inc. 2007 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 USA All rights reserved. This
More informationAX4 5 Series Software Overview
AX4 5 Series Software Overview March 6, 2008 This document presents an overview of all software you need to configure and monitor any AX4 5 series storage system running the Navisphere Express management
More informationSAN Implementation Course SANIW; 3 Days, Instructor-led
SAN Implementation Course SANIW; 3 Days, Instructor-led Course Description In this workshop course, you learn how to connect Windows, vsphere, and Linux hosts via Fibre Channel (FC) and iscsi protocols
More informationPractical Challenges in Scaling Storage Networks
Practical Challenges in Scaling Networks First Intelligent Workshop May 19-21, 2003 Mark Bakke Cisco Systems Cisco Networking 5428 Stackable iscsi-fc switch/gateway Small-medium business 9xxx Modular FC-based
More informationOwner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.msexchange.org Written by Marc Grote www.it-training-grote.de Exchange 2003 Implementing iscsi for Exchange Server 2003 Written by Marc Grote - mailto:grotem@it-training-grote.de
More informationFUJITSU Storage ETERNUS DX Configuration Guide -Server Connection-
FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection- (iscsi) for Linux This page is intentionally left blank. Preface This manual briefly explains the operations that need to be performed
More informationWith Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments
RED HAT ENTERPRISE VIRTUALIZATION DATASHEET RED HAT ENTERPRISE VIRTUALIZATION AT A GLANCE Provides a complete end-toend enterprise virtualization solution for servers and desktop Provides an on-ramp to
More informationHow To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On
Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing
More informationUsing EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4
Using EonStor FC-host Storage Systems in VMware Infrastructure 3 and vsphere 4 Application Note Abstract This application note explains the configure details of using Infortrend FC-host storage systems
More informationUse cases and best practices for HP StorageWorks P2000 G3 MSA FC/iSCSI Combo Controller
Use cases and best practices for HP StorageWorks P2000 G3 MSA FC/iSCSI Combo Controller Technical white paper Table of contents About this document... 2 Intended audience... 2 About the HP P2000 Combo
More informationSCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
More informationVMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
More informationIT service for life science
anterio performs research in the field of molecular modelling including computer-aided drug design. With our experience in these fields we help customers to implement an IT infrastructure to aid these
More informationVMWARE VSPHERE 5.0 WITH ESXI AND VCENTER
VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER CORPORATE COLLEGE SEMINAR SERIES Date: April 15-19 Presented by: Lone Star Corporate College Format: Location: Classroom instruction 8 a.m.-5 p.m. (five-day session)
More informationMCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
More informationTROUBLESHOOTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCT)
TROUBLESHOOTING CISCO DATA CENTER UNIFIED COMPUTING (DCUCT) Temario This 3-day course is designed to prepare system engineers and implementers with the knowledge and hands-on experience required to troubleshoot
More informationCisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
More informationHP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Application Notes Backup Exec 11D VSS Snapshots and Transportable Offhost Backup Legal Notices Warranty The only warranties for HP products and services are set
More informationInstallation Guide July 2009
July 2009 About this guide Edition notice This edition applies to Version 4.0 of the Pivot3 RAIGE Operating System and to any subsequent releases until otherwise indicated in new editions. Notification
More informationSnapManager 7.0 for Microsoft Exchange Server
SnapManager 7.0 for Microsoft Exchange Server Installation and Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
More informationStorage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION
Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated APRIl 2012 Table of Contents Introduction.... 3 Storage Protocol Comparison Table....4 Conclusion...10 About the
More informationRED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
More informationiscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
More informationTable of Contents. Introduction... 3. Prerequisites... 5. Installation... 6. Configuration... 7. Conclusion... 19. Recommended Reading...
Software to Simplify and Share SAN Storage Implementing a Highly Scalable and Highly Available Server and Desktop Provisioning Solution Using Citrix Provisioning Server 5.0, Sanbolic Melio FS 2008 and
More informationFUJITSU Storage ETERNUS DX Configuration Guide -Server Connection-
FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection- (iscsi) for HP-UX This page is intentionally left blank. Preface This manual briefly explains the operations that need to be performed
More informationCourse Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)
Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000
More informationBackup Solution Testing on UCS for Small-Medium Range Customers (Disk to Tape) Acronis Advanced Backup Software
Backup Solution Testing on UCS for Small-Medium Range Customers (Disk to Tape) Acronis Advanced Backup Software First Published: April 28, 2014 Last Modified: May 06, 2014 Americas Headquarters Cisco Systems,
More informationParallels Virtuozzo Containers 4.7 for Linux
Parallels Virtuozzo Containers 4.7 for Linux Deploying Clusters in Parallels-Based Systems Copyright 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. Parallels Holdings, Ltd.
More informationSnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009
SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009 1 Table of Contents 1 Introduction... 3 2 ed SnapServer NAS Systems... 3 3 Client Compatibility... 3 3.1 Microsoft Windows... 3 3.2 Apple
More informationiscsi SAN for Education
WHITE PAPER iscsi SAN for Education Shared Storage, Server & Desktop Virtualization, Replication, Backup, Recovery TABLE OF CONTENTS Overview... 3 The IT Challenge for Educational Institutions... 4 What
More informationCitrix XenServer 6 Administration
Citrix XenServer 6 Administration CTX-XS06 DESCRIZIONE: In this Citrix XenServer 6.0 training course, you will gain the foundational knowledge necessary to effectively install, configure, administer, and
More informationScale-Out File Server. Subtitle
Scale-Out File Server Subtitle About Aidan Finn Technical Sales Lead at MicroWarehouse (Dublin) Working in IT since 1996 MVP (Virtual Machine) Experienced with Windows Server/Desktop, System Center, virtualisation,
More informationServer and Storage Consolidation with iscsi Arrays. David Dale, NetApp
Server and Consolidation with iscsi Arrays David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this
More informationEnd to end application delivery & Citrix XenServer 5. John Glendenning Vice President Server Virtualization, EMEA
End to end application delivery & Citrix XenServer 5 John Glendenning Vice President Server Virtualization, EMEA Businesses Run on Applications Users Apps 2 Users and Apps are Moving Further Apart Consolidation
More informationConfiguring a FlexPod for iscsi Boot
Configuring a FlexPod for iscsi Boot Christopher Nickl World Wide Technology 12/15/2011 Table of Contents Introduction... 2 Prerequisites... 2 Overview... 2 Installation... 3 Configuring the UCS Part 1...
More informationCisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
More informationThe functionality and advantages of a high-availability file server system
The functionality and advantages of a high-availability file server system This paper discusses the benefits of deploying a JMR SHARE High-Availability File Server System. Hardware and performance considerations
More informationCompellent Storage Center
Compellent Storage Center Microsoft Multipath IO (MPIO) Best Practices Guide Dell Compellent Technical Solutions Group October 2012 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationStorage Networking Management & Administration Workshop
Storage Networking Management & Administration Workshop Duration: 2 Days Type: Lecture Course Summary & Description Achieving SNIA Certification for storage networking management and administration knowledge
More informationVolume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )
Open-E Data Storage Server (DSS ) Volume Replication INSTALATION GUIDE Enterprise-class Volume Replication helps ensure non-stop access to critical business data. Open-E DSS Volume Replication Open-E Data
More informationCisco MDS 9000 Family Highlights: Storage Virtualization Series
Cisco MDS 9000 Family Highlights: Storage Virtualization Series Highlighted Feature: Cisco Data Mobility Manager Purpose The Cisco MDS 9000 Family Highlights series provides both business and technical
More informationBrocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
More informationPart 1 - What s New in Hyper-V 2012 R2. Clive.Watson@Microsoft.com Datacenter Specialist
Part 1 - What s New in Hyper-V 2012 R2 Clive.Watson@Microsoft.com Datacenter Specialist Microsoft Cloud OS Vision Public Cloud Azure Virtual Machines Windows Azure Pack 1 Consistent Platform Windows Azure
More informationConfigure Backup Server for Cisco Unified Communications Manager
Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified
More informationFOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
More informationistorage Server: High-Availability iscsi SAN for Windows Server 2008 & Hyper-V Clustering
istorage Server: High-Availability iscsi SAN for Windows Server 2008 & Hyper-V Clustering Tuesday, Feb 21 st, 2012 KernSafe Technologies, Inc. www.kernsafe.com Copyright KernSafe Technologies 2006-2012.
More informationLab Validation Report. By Steven Burns. Month Year
1 Hyper-V v2 Host Level Backups Using Symantec NetBackup 7.0 and the Hitachi VSS Hardware Provider with the Hitachi Adaptable Modular Storage 2000 Family Lab Validation Report By Steven Burns March 2011
More informationCXS-203-1 Citrix XenServer 6.0 Administration
Page1 CXS-203-1 Citrix XenServer 6.0 Administration In the Citrix XenServer 6.0 classroom training course, students are provided with the foundation necessary to effectively install, configure, administer,
More informationistorage Server: High Availability iscsi SAN for Windows Server 2012 Cluster
istorage Server: High Availability iscsi SAN for Windows Server 2012 Cluster Tuesday, December 26, 2013 KernSafe Technologies, Inc www.kernsafe.com Copyright KernSafe Technologies 2006-2013.All right reserved.
More informationDAS to SAN Migration Using a Storage Concentrator
DAS to SAN Migration Using a Storage Concentrator April 2006 All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject to
More informationIP SAN Best Practices
IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
More informationProduct Overview. UNIFIED COMPUTING Managed Hosting - Storage Data Sheet
Product Overview Interoute offers a range of managed storage solutions to provide the best fit for our customers budget, capacity, performance and compliance needs. By taking advantage of our unrivalled
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationGlobal Namespace The Future of Distributed File Server Management
The Future of Distributed File Server Management By Rahul Mehta January 2003 INTRODUCTION Today s file systems were designed to take advantage of the storage architecture of the 1960 s, which was far less
More informationConfiguration Maximums VMware Infrastructure 3
Technical Note Configuration s VMware Infrastructure 3 When you are selecting and configuring your virtual and physical equipment, you must stay at or below the maximums supported by VMware Infrastructure
More informationDell High Availability Solutions Guide for Microsoft Hyper-V
Dell High Availability Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationCustomer Education Services Course Overview
Customer Education Services Course Overview Accelerated SAN Essentials (UC434S) This five-day course provides a comprehensive and accelerated understanding of SAN technologies and concepts. Students will
More informationVMware vsphere 4.1 with ESXi and vcenter
VMware vsphere 4.1 with ESXi and vcenter This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter. Assuming no prior virtualization
More informationData Migration: Moving from Dell PowerVault MD3000i/MD3000 to MD3200i/MD3220i and MD3600i/MD3620i Series Storage Arrays
Data Migration: Moving from Dell PowerVault MD3000i/MD3000 to MD3200i/MD3220i and MD3600i/MD3620i A Dell Technical White Paper PowerVault MD3200/MD3200i and MD3600i Storage Arrays THIS WHITE PAPER IS FOR
More informationADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
More informationInformation Services hosted services and costs
Information Services hosted services and costs 1. Overview Information Services (I.S.) has provided a popular hosting service for specialized departmental servers for many years. Servers hosted by I.S.
More informationSECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS. Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it
SECURITY SUMMIT 06/06/2013 Roma STORAGE FORENSICS Litiano Piccin (NCDA-NCIE/SAN) litiano@studiopiccin.it 1. Introduction: SAN vs NAS. 2. SAN. 3. NAS. 4. SNAPSHOT. 5. Data Acquisition. INTRODUCTION STORAGE:
More informationDeveloping a dynamic, real-time IT infrastructure with Red Hat integrated virtualization
Developing a dynamic, real-time IT infrastructure with Red Hat integrated virtualization www.redhat.com Table of contents Introduction Page 3 Benefits of virtualization Page 3 Virtualization challenges
More informationFrequently Asked Questions. 57712-k. Third-party information brought to you courtesy of Dell. NIC Partitioning (NPAR) FAQs
Frequently Asked Questions 57712-k Third-party information brought to you courtesy of Dell NIC Partitioning (NPAR) FAQs 2CS57712-K-FAQ100-R 5300 California Avenue Irvine, CA 92617 Phone: 949-926-5000 Fax:
More informationDiscover Smart Storage Server Solutions
Accelerating Your Success Discover Smart Server Solutions Performance, efficiency and value STORAGE Block and file explained Block explained IP-SAN, also known as Internet Small Computer System Interface
More informationHow To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5
Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5
More informationVIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
More informationConfiguring iscsi Multipath
CHAPTER 13 Revised: April 27, 2011, OL-20458-01 This chapter describes how to configure iscsi multipath for multiple routes between a server and its storage devices. This chapter includes the following
More informationOVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available
Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous
More informationPlanning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers Course 6430 Five days Instructor-led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students
More informationBuilding Storage Service in a Private Cloud
Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain
More informationDatasheet. FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0
Datasheet FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0 Central console and advanced management functions for ETERNUS DX storage environments..
More informationBosch Video Management System High Availability with Hyper-V
Bosch Video Management System High Availability with Hyper-V en Technical Service Note Bosch Video Management System Table of contents en 3 Table of contents 1 Introduction 4 1.1 General Requirements
More informationEvaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
More informationBackup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
More informationTable Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
More informationImproving Application Performance, Scalability, and Availability using Microsoft Windows Server 2008 and NLB with Sanbolic Melio FS and SAN Storage
Improving Application Performance, Scalability, and Availability using Microsoft Windows Server 2008 and NLB with Sanbolic Melio FS and SAN Storage (A step-by-step guide) www.sanbolic.com Software to Simplify
More informationVirtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture
Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V Copyright 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information
More informationSTORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
More informationAchieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
More informationVMware vsphere 5.0 Boot Camp
VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this
More informationHow To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)
Data Sheet Cisco Storage Media Encryption for Disk and Tape Product Overview Cisco Storage Media Encryption (SME) protects data at rest on heterogeneous tape drives, virtual tape libraries (VTLs), and
More informationDrobo How-To Guide. Use a Drobo iscsi Array as a Target for Veeam Backups
This document shows you how to use a Drobo iscsi SAN Storage array with Veeam Backup & Replication version 5 in a VMware environment. Veeam provides fast disk-based backup and recovery of virtual machines
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationMICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track
MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track In recent years Microsoft s MCSE programs has established itself as the premier computer and networking industry certification. For the Windows 2003
More informationStorSimple Appliance Quick Start Guide
StorSimple Appliance Quick Start Guide 5000 and 7000 Series Appliance Software Version 2.1.1 (2.1.1-267) Exported from Online Help on September 15, 2012 Contents Getting Started... 3 Power and Cabling...
More informationPreface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5
Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................
More informationVirtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
More informationEMC ViPR Controller. User Interface Virtual Data Center Configuration Guide. Version 2.4 302-002-416 REV 01
EMC ViPR Controller Version 2.4 User Interface Virtual Data Center Configuration Guide 302-002-416 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published November,
More informationTroubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
More informationHP StorageWorks P2000 G3 and MSA2000 G2 Arrays
HP StorageWorks P2000 G3 and MSA2000 G2 Arrays Family Data sheet How can the flexibility of the HP StorageWorks P2000 G3 MSA Array Systems help remedy growing storage needs and small budgets? By offering
More information