Data Mirroring Alternatives For Network Storage Pools

Size: px
Start display at page:

Download "Data Mirroring Alternatives For Network Storage Pools"

Transcription

1 Data Mirroring Alternatives For Network Storage Pools This white paper discusses various data mirroring alternatives available to customers of Powered by DataCore network storage pools. It suggests a preferred approach to a given data access requirement by considering the basic capabilities and limitations of each option. Starting with locally mirrored copies, the discussion entertains stretching these mirrors over increasingly longer distances. Availability, performance and economic aspects influencing the choice between real-time (synchronous) and store-and-forward (asynchronous) mirroring techniques are also presented. Throughout the document, the unique attributes of DataCore s host- and storage-independent mirroring selection will be explored, as will the compelling reduction in Total Cost of Ownership (TCO) and unprecedented flexibility attainable from advanced storage virtualization. Why Mirror There was a time when data was mirrored for only one reason to protect against a disk failure. Later, it became evident that having more than one copy of data was beneficial in many other ways. Today, with the relatively low cost of online disks, mirrored data volumes are becoming an attractive method to ensure continuous or nearly continuous data access in any of the following scenarios: Basic Failure Protection Mirrored copies are typically used to shield critical applications from equipment and operator errors. The extra copies act as hot-standby images for automatic fail-over mechanisms so that the users never sense a glitch. Example of these conditions include: Disk failures Subsystem failures Path or link failures To achieve application transparent switchover, the mirrored copies must be kept in lock step with the original online data. Generally that implies real-time synchronous mirroring more on this later. Planned Outages With good planning and well-rehearsed procedures, mirrored copies can also insulate users from planned equipment outages. Manually triggering the automatic fail-over mechanisms used for failure protection will just as easily divert the workload to standby resources during: Maintenance activities Upgrades Disaster Recovery In disaster recovery scenarios, where multiple failures have catastrophically impacted business operations, the users may experience some downtime. The objective of data mirroring under these conditions is to contain the downtime to a few minutes or a few hours, as part of an expedited restoration plan. 1

2 Data Migration Mirroring facilities are very powerful substitutes for server-centric file transfer and backup / restore methods traditionally used to migrate data from one array or one location to another. The online image is copied in the background to the new destination. Once a convenient point of synchronization is reached, the copy may be disassociated from the original image and treated as a stand-alone resource. The older equipment may be decommissioned once the new environment is fully verified. Local Access Of Distributed Data Perhaps the most recent facet of IT operations to benefit from data mirroring services are those striving to place largely distributed data in close proximity to their users. Certainly the Internet boom has brought this paradigm into focus with the emphasis on locally cached copies. The most common model relies on a single writer whose updates are mirrored to multiple sites. Known Good Working Images The underlying assumption in all the above scenarios is the notion that mirrored copies represent known good working images. This usually means not only selecting a few files to be mirrored, but also ensuring that all the objects (operating system, registry entries, application data structures, scripts, instructions, etc.) that make up the known good working set are replicated. Sometimes mirroring techniques are combined with snapshot technologies to achieve these objectives. Many Powered by DataCore solutions offer snapshot options that periodically freeze the mirrored image at a known good point in time such as prior to a software or service pack upgrade. Economics Of Managing Multiple Copies Despite the broad applicability of data mirroring and the inexpensive nature of disks, the high cost of managing and maintaining updated mirrored copies often precludes their use. Justification has been further hampered by the differences in mirrored storage administration from one vendor to the next and the excessive costs involved in many of the premium priced products. It is for this reason that DataCore approaches data mirroring as an intrinsic property of uniform storage management for network pools, rather than as a point product tied to a specific OS or a given disk array. At the same time DataCore recognizes that familiar ways die hard, and so the alternatives presented seek to leverage known operating procedures and legacy product features. Mirroring For The Masses The design point and pricing structure for DataCore s offering encourages mirroring for the masses. No longer does the IT staff have to do without these services to live within their budget. In simple terms, Powered by DataCore solutions have proven over and over that customers can do much more with less, by using a common, secure, centralized management approach that encompasses the mix of brands and suppliers typical to many organizations. The affordability mantra extends to remote mirroring as well. Distribute Access, Centralize Management, Fuel Transactions Many of DataCore s customers share the opinion that the best way to achieve processing scalability with adequate and deterministic response time is to fan out multiple instances of data where it is most needed. They see data mirroring as fuel for the engine needed to meet the everincreasing transaction demands driving corporate revenues. These critical transaction-oriented workloads must be fed by subsystems capable of higher and higher input/output operations per second (IOPS). 2

3 Such predictable performance levels are achievable in large scale only by allowing concurrent I/O threads to run undisturbed against separately mirrored and cached copies of data. Network storage pools are the proven way to accomplish these objectives. Mirroring At Its Simplest An easy way to achieve a mirrored copy is to have applications write the same information twice, once for each of two disks. In practice host-based operating system utilities, volume managers and RAID controllers as well as external RAID subsystems relieve applications of this duty (see Figure 1). All of these techniques may be used in a Powered by DataCore configuration. The virtual volumes served by the network storage pools simply appear as well behaved logical disks, but offer a great deal more flexibility. Generally, the paths traveled by the mirrored I/O streams behave very similarly, so the time to complete both I/Os is roughly the same. Reads are taken from a pre-defined preferred path a relatively arbitrary decision given similar response time characteristics. Figure 1: Different Approaches To Simple Local Mirroring Stretching The Separation Intuitively one could obtain remote copies simply by stretching one of the paths to reach a distant storage pool. SCSI and Fibre Channel extenders do just that. They are inserted into the link between the initiator system and the target device as nearly transparent cable extenders. Some of these units passively amplify the signal to overcome transmission losses incurred over the longer distances. Other products encapsulate or translate the I/O stream into an intermediate protocol better suited for wide area connections. These cable stretchers fulfill the general requirement for long distance connectivity but have no real sense for the end-to-end state of remotely mirrored information; especially when transmission or mirroring failures occur. Only the originating (initiator) end can determine if the remote copy is up to date or stale. Therefore, directly accessing the remote copy could lead to unexpected and incorrect results. Figure 2 - Cable extenders to increase separation an incomplete solution 3

4 Distributed Data Replication To better ascertain the state of a remote copy, mirroring intelligence can be placed at both ends of the connection. In this way, additional coordination between the originator and the destination allows one to determine if the copy is synchronized or if it has fallen behind. The approach is sometimes referred to as data replication. Typically the replicated I/O travels over a completely separate path from the local copy with potentially very different performance characteristics. Usually the most direct path is co-located with the originating subsystem and considered primary, while the lengthier indirect path with longer transmission and handling latencies is defined as secondary. (See Figure 3) The distributed mirroring processes take responsibility for keeping the second copy updated. At the same time they hide the underlying replication activities from the application. Both ends collaborate to inform each other of the remote copy state. The added coordination allows system administrators to better understand the state, and hence validity of the secondary copy before granting users access to them. Figure 3 Distributed data replication between cooperating subsystems Conventional replication techniques over the past years have taken either a host-centric or arraycentric tactic. Host-Centric Remote Replication In the host-centric implementations, the originating mirroring process runs in the same server as the application. The remote destination is usually another application server. The primary and secondary storage devices may be different. Host-based replication is manageable when only a pair of hosts are involved. However, there are obvious downsides when multiple hosts require replication services: The administration burden is proportional to the number of connections and host OS flavors. Though not a problem with one or two servers, it becomes a definite headache with hosts, and a complete nightmare in a large server farm such as those found at Internet Service Providers. The replication processes steal host resources (CPU cycles, memory, I/O bandwidth, I/O slots) from the resident applications potentially degrading their performance. 4

5 Array-Centric Remote Replication The array-centric alternatives move replication off-board onto cooperating intelligent arrays. While these offload the hosts and can replicate on behalf of multiple servers, they suffer three flaws: Most work only with their own proprietary disks The primary and secondary disk controllers must be of the same proprietary make and model Many rely on costly external equipment to convert disk channel protocols into the handshake of common WANs and LANs. Because of the cost and vendor-lock issues, this type of mirroring solutions has been confined largely to the very wealthy consumers. What Has Datacore Done Differently? DataCore considers data mirroring and replication as fundamental services of network storage virtualization. The advanced design integrates local and remote mirroring functions into affordable network storage control nodes known as storage domain servers (SDS). In so doing, the disadvantages of host- and array-centric alternatives have been eliminated while retaining all of their benefits. SDS nodes collaborate not only to consolidate the management of the underlying physical storage devices, but also to securely coordinate various replication activities, over short and long distances. Figure 4 - Remote mirroring between network storage pools 5

6 Uniqueness Powered by DataCore data mirroring solutions enjoy the following unique combination of attributes: Affordable Behave as natural extensions of network storage pools Encompass disk arrays and JBOD from different suppliers Support virtual volumes of arbitrary size Allow some volumes to be replicated to one site and a different set to another Support dynamic substitution of destinations, transparent to the applications Resilient to network failures Stretch over indefinitely long distances Run over common Internet Protocol (IP) WANs and LANs without conversion Can operate directly over campus and extended SANs (metropolitan area networks) Offload replication activities from hosts Operate bi-directionally (either site can act as both initiator and target) Note: Familiar host and array-centric products may continue to be used for specific roles in network storage pools alongside DataCore s advanced mirroring features. New Upgrade And Disaster Recovery Choices The ability to transcend disk array boundaries creates new opportunities for low-impact data migration and cost-effective disaster recovery. For example, many customers shy away from the hardship of replacing disk subsystem suppliers regardless of how dissatisfied they are. Most prefer to prolong the relationship rather than face lengthy downtime and uncertain upgrade results. With DataCore s cross-vendor mirroring facilities, the new equipment can be completely staged with live data in the background, while normal processing goes on. After due testing, the individual applications can be redirected to the replacement arrays by simply removing the original arrays from the mirrored volume relationship. The users never experience downtime. Other customers long for disaster recovery capabilities available from premium priced disk subsystems but know they ll never have the budget to roll out such a plan. They can now obtain these contingency services at a fraction of the cost using their choice of storage arrays at either end of the link without compromising their business continuance objectives. In fact, some accounts use intelligent arrays at their primary site and relegate relatively inexpensive JBODs (just-a-bunch-of-disks) for the remote recovery role. Tradeoffs With several alternatives for replicating data across remote sites, the final choice is largely dictated by tradeoffs between 4 variables: Distance Response time Delivery guarantees Networking costs 6

7 Disaster Recovery and Business Continuance plans, for example, count on rapidly restoring operations from unexpected catastrophes. Ideally they would maintain up-to-the-minute copies of critical online volumes at regional contingency sites. Less time critical data mining and application testing scenarios may have less rigorous replication needs. Asynchronous IP Mirroring Option The most convenient approach for widely separated locations is DataCore s Asynchronous IP Mirroring option, or AIM. AIM operates over conventional Local Area Networks (LANs) and Wide Area Networks (WANs) using the popular Internet Protocol (TCP/IP). The term asynchronous describes the store and forward nature of AIM s behavior. It also hints that a best effort will be made to keep the copy up to date, but long distances and slow connections will result in variable lag between the source and target. With very high-speed networks and short separation, AIM can minimize the differences between the two sites. Synchronous Mirroring Option Certain circumstances make it essential to keep the remote copy in lock step with the primary image. This calls for DataCore s synchronous Network Mirroring option and is generally viable with separations up to 100 kilometers. Synchronous mirroring typically takes place over dedicated high-bandwidth optical routes using the Fibre Channel protocol. Generally, the recurring cost of such links is substantially higher than the shared IP connections used for AIM. All of these product features operate independent of the hosts who generate the data stream and the underlying storage devices where their data is housed. They allow customers to centrally and securely manage remote mirroring services in a uniform manner, despite variations in operating systems and disk arrays. They also amortize the investment in the replication infrastructure over a pool of assets. Guaranteed Delivery vs. Response Time The distinction between synchronous and asynchronous mirroring is better characterized as a choice between guaranteed delivery and acceptable response time. Certainly one s instincts demand guaranteed delivery, but the laws of physics and economics sometimes overrule. Distance, performance and budget are very influential elements in the final decision. As the desired separation between the secondary copy and the replication origin grows, so too do the delay and cost factors. Similarly, lower speed (less costly) connections to the secondary copy can slow down the updates. Different applications and users have different tolerances for delay. Many transaction-oriented users find greater than 2-second turnaround unusable, while other batch users may regularly put up with 10-second waits. Extending Synchronous Mirrors Synchronous behavior guarantees delivery by having the replication service await acknowledgement that the second copy has been updated before reporting I/O completion to the application. The sequence of transmissions is illustrated in Figure 5. 7

8 Figure 5 - Synchronous mirroring sequence 1. Initial I/O issued by the application 2. SDS writes to local disk 3. SDS relays remote request* 4. Remote write performed by secondary SDS* 5. Remote copy confirmed 6. I/O completion signaled In reality, steps (2) and (3) occur simultaneously and step (4) may be cached at the remote end. Asynchronous Replication The asynchronous method anticipates various network-related delays in the transmission to, and acknowledgement from the remote destination. Rather than hold up applications and slow down user response time to unacceptable levels, AIM signals I/O complete immediately after the write has completed over the primary path (see Figure 6). Of course, there is no timely guarantee that the secondary update was posted, thus the tradeoff between response time and guaranteed delivery. At any one time the secondary may not have all the latest updates, but the remote copy maintains an ordered time-sequenced image of past I/Os. Figure 6 - Asynchronous Mirroring Sequence 8

9 Note the differences between the asynchronous sequence below, and the synchronous behavior described on Figure Initial I/O issued by the application 2. SDS writes to local disk 3. I/O completion signaled (don t wait on remote acknowledgement) 4. SDS relays remote request 5. Remote write performed by secondary SDS* 6. Remote copy confirmed *Step 5 may be postponed when the remote write is cached on the secondary SDS. Elastic buffers are maintained on the transmit and receive ends to ensure smooth operation despite network anomalies How Close Can They Keep Up? Figure 7 illustrates the fundamental difference between synchronous and asynchronous mirrors by comparing the contents of a synchronous and an asynchronous copy relative to the source volume over a period of time. Figure 7 - Updates with Synchronous and Asynchronous Mirroring The synchronous mirror remains in lockstep with the source over each successive time period. However on the asynchronous mirror, viewed over the same period, writes that occurred on the source at T 0 may not appear on the mirror until T 2 indicating that the asynchronous mirror lags behind the source. The lag will vary depending on the bandwidth of the interconnecting network and the SDS processing resources available to transmit and receive data. In the case shown in figure 7, the asynchronous mirror doesn't catch up until T 5 assuming no additional writes occur after T 3. 9

10 Network Considerations When Extending Mirrors As one might suspect, different network considerations come into play when operating synchronously and asynchronously. The inter-sds Fibre Channel links employed by synchronous Network Mirrors can take several forms depending on distance requirements. A few guidelines are presented below: 500 meters or less- native Fibre Channel point-to-point connections between SDS Host Bus Adapters will do 10 kilometers or less- use point-to-point long wave laser connections between Fibre Channel switches 100 kilometers or less- use optical extenders (including Dense Wave Division Multiplexers) to stretch the inter-switch link Greater than 100 kilometers- while achievable through IP-based Fibre Channel extenders, the longer separation and protocol conversions introduce latencies that exclude them from many real time transaction-oriented applications. WAN extenders may be more appropriate for less time sensitive situations with potentially lower update rates. Right of Way Public right-of-way issues must also be taken into account anytime the Fibre Channel connection leaves a private campus and traverses a public road. Under these circumstances, dark fiber suppliers must be brought into the picture. These companies have been granted special privileges to tunnel underneath streets, railroads and even rivers. Customers then rent or lease the optical infrastructure for their dedicated use. IP Multiplies The Selection The choice of inter-sds mirroring links is much larger with Asynchronous IP Mirroring. Essentially any network interface card (NIC) capable of running under IP can be used as the native SDS connection. These include the broad range of built-in dial-up serial ports and Ethernet LAN cards, as well as the more sophisticated and powerful Gigabit Ethernet and ATM NICs. The right-of-way concerns no longer dominate the choice of network providers. Instead, network provisioning is much more straightforward, dovetailing in with the other IP services already in use by the corporation. Downstream routers, virtual private networks and encryption services can all be leveraged to enhance the privacy and security of the remote mirroring transmissions. Resiliency And Elasticity By now everyone has become accustomed to the occasional network meltdown or the unexpected backhoe incident where vital communications lines are accidentally severed. For synchronous mirroring, the link failures trigger logging at the originating SDS. The logs are used to incrementally refresh the remote copy when the link is restored. AIM s elastic properties are even better suited to gracefully deal with network anomalies. When the network slows to a creep, AIM patiently collects I/Os at the local SDS node, only to stream them out in order as more bandwidth becomes available. In some cases, the network variations are a regular part of the day heavy contention during peak business hours, interleaved with off periods and very fast transmissions. Again, AIM ebbs and flows to match the network service level. 10

11 Conclusions Powered by DataCore solutions offer a wide range of network storage pooling alternatives capable of addressing the most common mirroring and data replication requirements over short and long distances. The compelling economics also make possible the use of these advanced facilities in fresh new opportunities, bringing both the acquisition and recurring investment in storage virtualization within the reach of the masses. Each mirroring option can be configured to circumvent failures or simply to provide convenient data access at remote locations. The underlying technology combines the best features of conventional replication techniques, without the typical lock-in to a specific disk array or host. And unlike any products on the market today, the replication services are supported on a choice of cost effective and open hardware/software platforms using a central and uniform management GUI. For more information on Data Mirroring and Network Storage Pools contact DataCore Software Corporation at or us at info@datacoresoftware.com DataCore Software Corporation Pub # P069AA 11

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

Affordable Remote Data Replication

Affordable Remote Data Replication SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

How To Build A Network For Storage Area Network (San)

How To Build A Network For Storage Area Network (San) White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

Technical Considerations in a Windows Server Environment

Technical Considerations in a Windows Server Environment Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

High Availability Server Clustering Solutions

High Availability Server Clustering Solutions White Paper High vailability Server Clustering Solutions Extending the benefits of technology into the server arena Intel in Communications Contents Executive Summary 3 Extending Protection to Storage

More information

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead

More information

Compellent Source Book

Compellent Source Book Source Book Remote Instant Replay Thin Replication Compellent Corporate Office Compellent Technologies 12982 Valley View Road Eden Prairie, Minnesota 55344 www.compellent.com Contents Contents...2 Document

More information

New Features in SANsymphony -V10 Storage Virtualization Software

New Features in SANsymphony -V10 Storage Virtualization Software New Features in SANsymphony -V10 Storage Virtualization Software Updated: May 28, 2014 Contents Introduction... 1 Virtual SAN Configurations (Pooling Direct-attached Storage on hosts)... 1 Scalability

More information

Using High Availability Technologies Lesson 12

Using High Availability Technologies Lesson 12 Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?

More information

DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization

DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain

More information

E N T E R P R I S E S T O R A G E V I R T U A L I Z A T IO N A N D M A N A G E M E N T. Data Sheet. Storage Management, Virtualization and Control

E N T E R P R I S E S T O R A G E V I R T U A L I Z A T IO N A N D M A N A G E M E N T. Data Sheet. Storage Management, Virtualization and Control E N T E R P R I S E S T O R A G E V I R T U A L I Z A T IO N A N D M A N A G E M E N T Greater ROI Data Sheet Storage Management, Virtualization and Control Lower TCO Flexibility Performance High Availability

More information

iscsi: Accelerating the Transition to Network Storage

iscsi: Accelerating the Transition to Network Storage iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,

More information

Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development

Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development Fibre Channel Overview from the Internet Page 1 of 11 Fibre Channel Overview of the Technology Early History and Fibre Channel Standards Development Interoperability and Storage Storage Devices and Systems

More information

Storage Solutions Overview. Benefits of iscsi Implementation. Abstract

Storage Solutions Overview. Benefits of iscsi Implementation. Abstract Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses

More information

Database Resilience at ISPs. High-Availability. White Paper

Database Resilience at ISPs. High-Availability. White Paper Database Resilience at ISPs High-Availability White Paper Internet Service Providers (ISPs) generally do their job very well. The commercial hosting market is segmented in a number of different ways but

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

High Availability with Windows Server 2012 Release Candidate

High Availability with Windows Server 2012 Release Candidate High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

Extending SANs Over TCP/IP by Richard Froom & Erum Frahim

Extending SANs Over TCP/IP by Richard Froom & Erum Frahim Extending SANs Over TCP/IP by Richard Froom & Erum Frahim Extending storage area networks (SANs) over a distance has become a necessity for enterprise networks. A single SAN island with one storage system

More information

Storage Concentrator in a Microsoft Exchange Network

Storage Concentrator in a Microsoft Exchange Network Implementing a Storage Concentrator in a Microsoft Exchange Network All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc. which are subject

More information

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment Introduction... 2 Virtualization addresses key challenges facing IT today... 2 Introducing Virtuozzo... 2 A virtualized environment

More information

Westek Technology Snapshot and HA iscsi Replication Suite

Westek Technology Snapshot and HA iscsi Replication Suite Westek Technology Snapshot and HA iscsi Replication Suite Westek s Power iscsi models have feature options to provide both time stamped snapshots of your data; and real time block level data replication

More information

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like

More information

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster

More information

Application Brief: Using Titan for MS SQL

Application Brief: Using Titan for MS SQL Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical

More information

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly

More information

Brocade One Data Center Cloud-Optimized Networks

Brocade One Data Center Cloud-Optimized Networks POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area

More information

System Migrations Without Business Downtime. An Executive Overview

System Migrations Without Business Downtime. An Executive Overview System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

Extended Distance SAN with MC/ServiceGuard Opens New Disaster Recovery Opportunities

Extended Distance SAN with MC/ServiceGuard Opens New Disaster Recovery Opportunities Extended Distance SAN with MC/ServiceGuard Opens New Disaster Recovery Opportunities Joseph Algieri Senior Consultant Network Storage Solutions Hewlett-Packard Company Overview What is a SAN Extended distance

More information

Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International

Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International Keys to Successfully Architecting your DSI9000 Virtual Tape Library By Chris Johnson Dynamic Solutions International July 2009 Section 1 Executive Summary Over the last twenty years the problem of data

More information

Safety in Numbers. Using Multiple WAN Links to Secure Your Network. Roger J. Ruby Sr. Product Manager August 2002. Intelligent WAN Access Solutions

Safety in Numbers. Using Multiple WAN Links to Secure Your Network. Roger J. Ruby Sr. Product Manager August 2002. Intelligent WAN Access Solutions Copyright 2002 Quick Eagle Networks Inc. All rights reserved. The White Paper Series Safety in Numbers Using Multiple WAN Links to Secure Your Network Roger J. Ruby Sr. Product Manager August 2002 Executive

More information

Cisco MDS 9000 Family Highlights: Storage Virtualization Series

Cisco MDS 9000 Family Highlights: Storage Virtualization Series Cisco MDS 9000 Family Highlights: Storage Virtualization Series Highlighted Feature: Cisco Data Mobility Manager Purpose The Cisco MDS 9000 Family Highlights series provides both business and technical

More information

Backup Exec 9.1 for Windows Servers. SAN Shared Storage Option

Backup Exec 9.1 for Windows Servers. SAN Shared Storage Option WHITE PAPER Optimized Performance for SAN Environments Backup Exec 9.1 for Windows Servers SAN Shared Storage Option 11/20/2003 1 TABLE OF CONTENTS Executive Summary...3 Product Highlights...3 Approaches

More information

Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )

Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Open-E Data Storage Server (DSS ) Volume Replication INSTALATION GUIDE Enterprise-class Volume Replication helps ensure non-stop access to critical business data. Open-E DSS Volume Replication Open-E Data

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

IP SAN: Low on Fibre

IP SAN: Low on Fibre IP SAN: Low on Fibre Smriti Bhagat CS Dept, Rutgers University Abstract The era of Fibre Channel interoperability is slowly dawning. In a world where Internet Protocol (IP) dominates local and wide area

More information

VERITAS Backup Exec 9.0 for Windows Servers

VERITAS Backup Exec 9.0 for Windows Servers WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

EonStor DS remote replication feature guide

EonStor DS remote replication feature guide EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,

More information

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...

More information

intelligent Bridging Architecture TM White Paper Increasing the Backup Window using the ATTO FibreBridge for LAN-free and Serverless Backups

intelligent Bridging Architecture TM White Paper Increasing the Backup Window using the ATTO FibreBridge for LAN-free and Serverless Backups intelligent Bridging Architecture TM White Paper Increasing the Backup Window using the ATTO FibreBridge for LAN-free and Serverless Backups White Paper intelligent Bridging Architecture TM Increasing

More information

Using Multipathing Technology to Achieve a High Availability Solution

Using Multipathing Technology to Achieve a High Availability Solution Using Multipathing Technology to Achieve a High Availability Solution Table of Contents Introduction...3 Multipathing Technology...3 Multipathing I/O Implementations...5 Storage Redundancy...5 Infortrend

More information

Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL

Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL SCHOONER WHITE PAPER Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL About Schooner Information Technology Schooner Information Technology provides

More information

A Link Load Balancing Solution for Multi-Homed Networks

A Link Load Balancing Solution for Multi-Homed Networks A Link Load Balancing Solution for Multi-Homed Networks Overview An increasing number of enterprises are using the Internet for delivering mission-critical content and applications. By maintaining only

More information

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information

Issue December 2004. SAN Interworking. Contents

Issue December 2004. SAN Interworking. Contents F SAN Interworking Issue December 2004 Contents 1. Introduction 2 2. Global scenarios 2 2.1 Interworking between SAN islands 2 2.2 Connections over large distances 2 2.3 TCP/IP networks for block-oriented

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

The proliferation of the raw processing

The proliferation of the raw processing TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer

More information

Optimizing Large Arrays with StoneFly Storage Concentrators

Optimizing Large Arrays with StoneFly Storage Concentrators Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time

More information

Non-Native Options for High Availability

Non-Native Options for High Availability The Essentials Series: Configuring High Availability for Windows Server 2008 Environments Non-Native Options for High Availability by Non-Native Options for High Availability... 1 Suitability and Cost...

More information

E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.

E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. E-Series NetApp E-Series Storage Systems Mirroring Feature Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Virtual Storage Management for the Enterprise

Virtual Storage Management for the Enterprise Virtual Storage Management for the Enterprise 18 May 2010 Dave Brown Technical Account Manager dave.brown@datacore.com 206 660 7662 2010 DataCore Software Corp 1 Overview Reduce storage management costs

More information

IBM System Storage DS5020 Express

IBM System Storage DS5020 Express IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (Fibre Channel/iSCSI) enables SAN tiering Balanced performance well-suited

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays V Tsutomu Akasaka (Manuscript received July 5, 2005) This paper gives an overview of a storage-system remote copy function and the implementation

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

How To Build A Clustered Storage Area Network (Csan) From Power All Networks

How To Build A Clustered Storage Area Network (Csan) From Power All Networks Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require

More information

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN

A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN A SWOT ANALYSIS ON CISCO HIGH AVAILABILITY VIRTUALIZATION CLUSTERS DISASTER RECOVERY PLAN Eman Al-Harbi 431920472@student.ksa.edu.sa Soha S. Zaghloul smekki@ksu.edu.sa Faculty of Computer and Information

More information

June 2009. Blade.org 2009 ALL RIGHTS RESERVED

June 2009. Blade.org 2009 ALL RIGHTS RESERVED Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS

More information

Fibre Forward - Why Storage Infrastructures Should Be Built With Fibre Channel

Fibre Forward - Why Storage Infrastructures Should Be Built With Fibre Channel Fibre Forward - Why Storage Infrastructures Should Be Built With Fibre Channel Prepared by: George Crump, Lead Analyst Prepared: June 2014 Fibre Forward - Why Storage Infrastructures Should Be Built With

More information

Everything You Need to Know About Network Failover

Everything You Need to Know About Network Failover Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know

More information

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Why clustering and redundancy might not be enough This paper discusses today s options for achieving

More information

Data Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Integrated Data Replication reduces business downtime.

Data Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Integrated Data Replication reduces business downtime. Open-E Data Storage Server (DSS ) Data Replication INSTALATION GUIDE Integrated Data Replication reduces business downtime. Open-E DSS Data Replication Open-E Data Server Storage (DSS) offers enterprise-class

More information

August 2009. Transforming your Information Infrastructure with IBM s Storage Cloud Solution

August 2009. Transforming your Information Infrastructure with IBM s Storage Cloud Solution August 2009 Transforming your Information Infrastructure with IBM s Storage Cloud Solution Page 2 Table of Contents Executive summary... 3 Introduction... 4 A Story or three for inspiration... 6 Oops,

More information

Windows Geo-Clustering: SQL Server

Windows Geo-Clustering: SQL Server Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

All-Flash Arrays Weren t Built for Dynamic Environments. Here s Why... This whitepaper is based on content originally posted at www.frankdenneman.

All-Flash Arrays Weren t Built for Dynamic Environments. Here s Why... This whitepaper is based on content originally posted at www.frankdenneman. WHITE PAPER All-Flash Arrays Weren t Built for Dynamic Environments. Here s Why... This whitepaper is based on content originally posted at www.frankdenneman.nl 1 Monolithic shared storage architectures

More information

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity Simplifying storage processes and ensuring business continuity and high availability IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity The risks are even greater for companies that

More information

Block based, file-based, combination. Component based, solution based

Block based, file-based, combination. Component based, solution based The Wide Spread Role of 10-Gigabit Ethernet in Storage This paper provides an overview of SAN and NAS storage solutions, highlights the ubiquitous role of 10 Gigabit Ethernet in these solutions, and illustrates

More information

Big data management with IBM General Parallel File System

Big data management with IBM General Parallel File System Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers

More information

Uninterrupted Internet:

Uninterrupted Internet: Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover White Paper Page 1 Table of Contents Executive Summary... 3 Considering The Options: Upgrades, Redundancy and

More information

SQL Server Storage Best Practice Discussion Dell EqualLogic

SQL Server Storage Best Practice Discussion Dell EqualLogic SQL Server Storage Best Practice Discussion Dell EqualLogic What s keeping you up at night? Managing the demands of a SQL environment Risk Cost Data loss Application unavailability Data growth SQL Server

More information

Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems

Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems Applied Technology Abstract This white paper investigates configuration and replication choices for Oracle Database deployment with EMC

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data White Paper Storage Extension Network Solutions Between Data Centers Simplified, Low Cost, Networks for Storage Replication, Business Continuity and Disaster Recovery TODAY S OPERATING CLIMATE DEMANDS

More information

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey Exchange Data Protection: To the DAG and Beyond Whitepaper by Brien Posey Exchange is Mission Critical Ask a network administrator to name their most mission critical applications and Exchange Server is

More information

High Availability Essentials

High Availability Essentials High Availability Essentials Introduction Ascent Capture s High Availability Support feature consists of a number of independent components that, when deployed in a highly available computer system, result

More information

Storage Networking Foundations Certification Workshop

Storage Networking Foundations Certification Workshop Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies

More information

Oracle Database Disaster Recovery Using Dell Storage Replication Solutions

Oracle Database Disaster Recovery Using Dell Storage Replication Solutions Oracle Database Disaster Recovery Using Dell Storage Replication Solutions This paper describes how to leverage Dell storage replication technologies to build a comprehensive disaster recovery solution

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Why Choose Native Fibre Channel Backup? Optimal protection for the SAN

Why Choose Native Fibre Channel Backup? Optimal protection for the SAN Exabyte Corporation 1685 38th Street Boulder, CO 80301 1-800-EXABYTE www.exabyte.com An Exabyte White Paper Why Choose Native Fibre Channel Backup? Optimal protection for the SAN Lynda Edgington Exabyte

More information

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5

Preface... 1. Introduction... 1 High Availability... 2 Users... 4 Other Resources... 5 Conventions... 5 Table of Contents Preface.................................................... 1 Introduction............................................................. 1 High Availability.........................................................

More information

IT Service Management

IT Service Management IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata

Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached

More information

Dell Exchange 2013 Reference Architecture for 500 to 20,000 Microsoft Users. 1 Overview. Reliable and affordable storage for your business

Dell Exchange 2013 Reference Architecture for 500 to 20,000 Microsoft Users. 1 Overview. Reliable and affordable storage for your business Technical Report Dell Exchange 2013 Reference Architecture for 500 to 20,000 Microsoft Users Reliable and affordable storage for your business Table of Contents 1 Overview... 1 2 Introduction... 2 3 Infrastructure

More information

Technical Brief: Introducing the Brocade Data Center Fabric

Technical Brief: Introducing the Brocade Data Center Fabric : Introducing the Brocade Data Center Fabric Enterprise data centers are undergoing a transformation driven by the need to reduce costs and increase performance. The evolving data center fabric exploits

More information