Protecting Your Data with Remote Data Replication Solutions

Size: px
Start display at page:

Download "Protecting Your Data with Remote Data Replication Solutions"

Transcription

1 Protecting Your Data with Remote Data Replication Solutions Fausto Vaninetti SNIA Europe Board of Directors (Cisco)

2 Table of Contents Protecting Your Data with Remote Data Replication Solutions... 1 Achieving data protection... 1 RAID and RAIN... 1 Local, Metro, Geo... 2 Remote Data Replication for Fibre Channel-Based Disk Arrays... 4 Advanced TCP/IP Stack... 5 Optimization and Efficiency in IP-based Storage Replication Solutions... 6 More To The Game... 9 Summary Last Page Address Section... 11

3 September 2015 Protecting Your Data with Remote Data Replication Solutions Achieving data protection No one doubts the amount of data being generated across the world is increasing exponentially. Data generated by all organizations is stored, mined, transformed and utilized seamlessly. Data represents a critical component for the operation and function of organizations and consequently data protection methodologies are required to avoid disruptions in business operations. In fact, every company should consider their data as the second most valuable asset after their employees and should implement some form of data protection. This paper examines some of the more common and effective data protection schemes in use today, offering a concise and simple to understand point of view. Remote data replication solutions are also covered with some level of technical detail. RAID and RAIN The first approach to data protection is typically the adoption of a disk array with an embedded specific mechanism known as Redundant Array of Independent Disks (RAID), a term dated back to In short, this is a data virtualization technology that combines multiple disk drives into a logical group for the purpose of data protection (and performance improvement as well). Data is distributed across the set of drives according to the desired RAID level schema and a specific balance is achieved among reliability, performance and capacity. RAID is categorized according to levels. The Common RAID Disk Data Format specification by SNIA defines a standard data structure describing how data is formatted across the disks in a RAID group for every RAID level. Some of the primary RAID levels are shown in the table below: With RAID levels higher than 0, damage to individual disk sectors or the failure of one or more hard disks can be tolerated, still preserving data integrity. Data is not actually copied, but rather complemented with an amount of redundancy so that the original data can be reconstructed via appropriate mathematical algorithms even if a limited portion of data becomes unavailable due to 1

4 failure. In order to improve performance without sacrificing fault tolerance, the use of a fast cache to front end the RAID group has become the norm, both on servers and within disk arrays. This explains why RAID 5 and RAID 6 have become very popular implementations in our age. It is also worth mentioning that solid state disks, instead of magnetic disks, are the new trend and, according to many analysts, this represents the single biggest revolution in the storage industry since a long while. Recently a variation of the RAID implementation got industry attention. This time multiple copies of data are spread across multiple computational nodes. To hold naming similarity with the previously described mechanism, this approach has been referred to as Redundant Array of Independent Nodes (RAIN) and it forms the bases of data protection within multiple commercially available implementations of Big Data Hadoop clusters and Hyper-converged systems. All of the above solutions are in wide use by virtually all organizations and do provide effective local data protection. Nevertheless, in order to protect from local site disasters, a copy of all data should also be stored in a properly identified alternative location. Whether it is your secondary datacenter or a third-party managed datacenter, remote data replication across a distance is the way to go. Some organizations are also keen to keep copies of data on different physical media, in an effort to further minimize chances of concurrent disruption related to the technology itself. When a time lapse of 24 hours between production data and their copy is acceptable, tape backups can also be used as another option for data protection. Tapes can store huge quantity of data at a fraction of the cost of disk arrays, consume negligible power and are compatible with the highest security standards requiring that tape cartridges get stored inside underground bank vaults for long term retention. Organizations tend to use tape backups as a complement to disk-based remote data protection solutions. Local, Metro, Geo The essence to data protection is to securely store multiple copies of data onto independent physical media. Doing this within a single datacenter is clearly a local solution. If something goes wrong with the facility (flood, fire, hurricanes, power black-out, sabotage), data can be inaccessible or even completely lost. Having a copy of data in another location removes the criticality of single site disaster. Interest in data recovery solutions is well demonstrated by surveys with CIOs and further underlined by recent forecasts that indicate Disaster Recovery as a Service (DRaaS) as one of the fastest growing segments for the cloud business. The secondary site has to be carefully chosen and outside the so called threat radius so that chances of any failure affecting both datacenters at the same time are negligible. As a result, distances above 300 km are the norm when looking for a true protection from natural calamities or sudden and unforeseen major system failures. Organizations with an even higher requirement for data availability and uptime have now adopted the three site approach, whereby twin datacenters are deployed within short distances and both of 2

5 them are active at the same time to achieve business continuity. The third site is far away and used for simple data recovery needs or true disaster recovery purposes. In this situation, failure of one of the twin datacenters will not prevent the business from remaining up and running. Applications will always be on and no downtime will be required to recover them after the failure. Technically this can be expressed as a Recovery Time Objective (RTO) equal to zero. Within the twin datacenters, data is kept in-synch and can be assumed to be identical in both sites. In fact, every write needs to be acknowledged by both storage arrays before being considered completed. This imposes a practical restriction on the maximum distance between the two locations and in the range of about 100km. Longer distances would affect application performance, driving it down to unacceptable levels. From the point of view of the synchronous replication software in use, it would actually be better to consider an upper limit in round trip latency rather than distance. To some degree, this depends on the vendor of choice, but a valid rule of thumb calls for 2 msec as the limit for these kinds of metro implementations. As a matter of fact, when round trip latency exceeds 8 msec, it is clearly going to be considered a geographical implementation and data replication is achieved asynchronously. In fact, writes are considered completed when acknowledged only by the local storage array and then data will get transferred to the remote disk array with a little delay. In other words, data in the two locations is slightly different and the copy is lagging the source. The temporal difference between them is more appropriately called Recovery Point Objective (RPO). For both cost and technical reasons, nearly all geographical solutions rely upon the Internet Protocol (IP) for transport across the Wide Area Network (WAN). This is the true realm of disaster recovery, where both RPO and RTO values are above zero and, if disaster strikes, a manual intervention is required to transition activity to the secondary site with an expected downtime for applications to recover. There are many factors involved in choosing the correct remote data replication solution for any specific business, like the amount of data that can be lost, time taken to recover, distance between sites and so on. 3

6 Remote Data Replication for Fibre Channel-Based Disk Arrays Fibre Channel (FC) has been the technology of choice for storage connectivity since the inception of storage networks and even today, despite being far beyond hype-cycle and no more high on the press, it still dominates over alternatives in terms of adoption for shared external disk arrays. For Fibre Channel based disk arrays, two main alternative approaches for remote data replication using IP are currently available. The first one leverages dedicated IP replication ports on the disk array itself, whereby servers access their local data via FC fabrics but the remote connection between peer disk arrays go straight to the IP network. Clearly, this method implies the availability of a sufficient number of native IP ports on the disk array and this condition is not always met. The second option makes use of a multi-service appliance that not only provides local FC switching capabilities but also enables FC encapsulation within IP packets for optimized transmission through the Wide Area Network (WAN). A variation of this approach sees the same functionality hosted on a specific line-card within a highly available FC modular switch, known as director. In most but not all cases, data transmission is mono-directional, from the production datacenter toward the disaster recovery site. Twin datacenters with active/active operation or occasional data recovery situations may require data to flow in the opposite direction as well. Companies should carefully evaluate the rainbow of technical solutions on the market by confronting them based on some decision criteria that include performance, security, flexibility, reliability, diagnostic tools and price. Price should not be the main decision factor since a consistent disaster recovery project requires an overall level of investment that by far exceeds the price of the data replication solution alone, whatever it may be. For large organizations with large storage environments, the adoption of IP replication ports on disk arrays may not be optimal. The number of IP replication ports that can be used concurrently on disk arrays is limited, and in any case lower than the number of 16G FC ports connected toward the production fabrics. Potentially this will 4

7 create a bottleneck since aggregate throughput on 16G FC ports on most arrays far outperforms the capability of their native 10G IP counterparts. For their flexibility and performance as well as the capability to use a single remote data replication solution for multiple disk arrays from different vendors, Fibre Channel over IP (FCIP) encapsulation engines are the most used implementation to extend a Storage Area Network (SAN) across geographically separated datacenters. Moreover, FCIP is not limited to remote data replication. It supports other applications, such as centralized SAN backup and data migration over very long distances. As a matter of fact, when distances go up, it becomes impractical, or very costly, to rely upon native Fibre Channel connections, eventually transported over optical transmission equipment. FCIP tunnels, built on a physical connection between two SAN extension switches or blades, allow Fibre Channel frames to pass through the existing IP WAN. The TCP connections ensure in-order delivery of Fibre Channel frames and lossless transmission. The Fibre Channel fabric and all Fibre Channel targets and initiators are unaware of the presence of the IP WAN. The TCP/IP stack ensures all data lost in flight is retransmitted and placed back in order prior to being delivered to upper layer protocols. This is an essential feature to prevent SCSI timeouts for open system-based replication. This stack is also capable to automatically and quickly adjust traffic rate on the WAN connection between the user-defined min and max bandwidth values. In other words, a feedback mechanism ensures that the quality of the long distance IP link will dynamically affect the FCIP transmission rate, permitting optimal throughput for all flows. Evidently, the user-defined min bandwidth value should be carefully chosen so that it does not exceed the available bandwidth on the WAN link. As a best practice, this minimum bandwidth should be available at all times because the need for replication may arise at any time. This can be achieved by either specifically reserving bandwidth for FCIP or by having sufficient bandwidth available that far exceeds the current needs for all uses. Furthermore, whenever possible, adopt a reliable IP connection that drops very few packets since the performance of FCIP, as any high performance TCP connection for that matter, greatly depends on a low retransmission rate. An enterprise-class remote data replication solution should excel in performance (achieved throughput, tolerated latency, packet drop handling), monitoring (port and flow visibility and statistics) and diagnostic capabilities (ping, trace-route, logging) and the group of advanced features that are the main constituents would start from a sophisticated TCP/IP stack. Advanced TCP/IP Stack Despite software implementations on top of a general purpose processor would be possible, the required performance and reliability levels that disaster recovery projects impose are considerable. For that reason, most solutions use hardware assisted implementations, where custom ASICs sustain the most demanding computational tasks like compression or encryption. 5

8 A valid remote data replication solution should be able to operate both in asynchronous and synchronous mode. In the first case, the most typical one, distances up to 10,000 km should be supported to address the needs of multinational companies with datacenters in multiple continents. For synchronous replication, latency is a gating factor and extra care is required in order to minimize it. Not all solutions are equal in this respect. Data needs to be encapsulated before transmission over a long distance IP network. In general, the efficiency of the chosen transport method depends on its capability to reduce overhead by filling datagrams to the supported Maximum Transmission Unit (MTU). This creates maximum payload per unit of overhead. The best approach is to use frame batching so that a stream of data frames (typically 4 or 64 of them) is worked on at the same time, compressed and fit into the available MTU size. When a single data is compressed and mapped to an Ethernet frame, wasted payload bytes cause inefficiency and, consequently, higher overhead for the same traffic. In this case, the bigger the MTU the better it is: Jumbo frames up to 9000 bytes are preferred to the standard MTU of 1500 bytes when best performance is desired. Since a Fibre Channel frame can be up to 2148 bytes, and considering some margin for additional headers, an MTU size of 2300 bytes would be the minimum recommended value to use. Some implementations also incorporate a way to determine the maximum MTU all the way to the remote target with a feature known as Path MTU Discovery. PMTUD is described in RFC 1191 and works well with pure L3 networks. It is worth mentioning that the TCP Maximum Segment Size (MSS) is slightly smaller than Ethernet MTU size in order to accommodate for TCP and IP headers. In the end, data frames need to go through the TCP/IP stack and here is where some solutions may fall short of expectations due to technical trade-offs. On one side, a long distance IP network poses challenges on available bandwidth, available paths and packet drops. On the other side, data replication dislikes instabilities and variability and would prefer a guaranteed bandwidth with no packet drops. Distance, so latency, has a negative effect on throughput. Put simply, with standard TCP/IP, information transfer suffers the farther you go. This is because of the flow control mechanism that is part of TCP protocol. In fact, link latency and the waiting for acknowledgment of each set of packets sent will prevent long and fat pipes to be efficiently utilized. Optimization and Efficiency in IP-based Storage Replication Solutions For these reasons, an efficient remote data replication solution cannot fall short of a purpose-built WAN optimized TCP/IP stack. Thanks to that, it becomes possible to achieve wire-rate transmission on high speed links, with application throughput up to 1250 MBytes/s for 10 Gbps ports. It is also possible to overcome 100+ msec of latency on the WAN and tolerate excessive jitter, bit errors and a loss of 1 out of 2000 transmitted packets. Experience has shown that general purpose WAN optimization devices cannot provide better performance than purpose-built remote data replication solutions, but rather introduce complexity, another point of failure, and another asset to configure, 6

9 manage, monitor, and troubleshoot. Moreover, being general purpose, they would have no specific storage protocol awareness (FC, SCSI) and consequently fail to add real value to the solution. Transmitting data over an IP network avoids the constraints and distance limitations suffered by native Fibre Channel links whereby a Buffer-to-Buffer Credit mechanism is used to make sure packets are not lost due to congestion from source to target. The burden for proper handling of congestion situations and flow control in general is offloaded to the TCP layer and its native capabilities. One of them is the transmission window size, dynamically adjustable in response to WAN conditions. In TCP, the amount of outstanding unacknowledged data that is needed to fully utilize a WAN connection is tightly associated with the Bandwidth Delay Product (BDP), derived by multiplying link bandwidth and link round trip time. A solid remote data replication solution will have a large BDP value, even in excess of 120MB, and avoid any drooping effect over long and fat pipes. Another optimization that becomes handy when more efficiency over the WAN is required is known as Selective Acknowledgment (SACK) and described in RFC Although TCP was a very robust and adaptable protocol since the very beginning, it has gone through several iterations to enhance its ability to perform in high latency environments coupled with high bandwidth. The goal is to minimize the TCP control traffic and allow it to recover faster from any dropped frames. The standard TCP protocol implements reliability by sending a cumulative acknowledgment for received data segments that appear to be complete and in sequence. In case of packet loss, subsequent segments will not get acknowledged by the receiver and the sender will retransmit all segments after the packet loss is detected. This behavior is pretty inefficient since it leads to retransmission of segments which were actually successfully received and provokes a sharp reduction in the congestion window size so that subsequent transmissions will happen at a slower rate than before. By using the SACK mechanism, a receiver is able to selectively acknowledge segments that were received after a packet loss. The sender will now have the capability to only retransmit the lost segments and fill the holes in the data stream. 7

10 More often than not, organizations try to save money on the WAN connectivity service by enabling compression before sending data across. The simple idea is to transmit the same amount of data over a lower bandwidth link. The compression engines are typically based on the well-known deflate algorithm as described in RFC 1951, even if derivative implementations provide a different trade-off of throughput vs. compression ratio. The achieved results are very dependent on the data to be compressed but a good implementation is normally capable of a 4:1 compression ratio for real data (not test data). Of course last but not least, with the ever-increasing amount of data generated across the globe, there is also a clear trend toward high-speed remote replication solutions. Up to a couple of years ago Gigabit Ethernet speeds were adequate at least for most companies; nowadays the sweet spot is certainly at 10 Gigabit per second with 40 Gigabit Ethernet looming as the next candidate for market adoption. 8

11 The TCP/IP implementation on enterprise-class remote data replication solutions is clearly optimized for carrying storage traffic. It can accommodate long and fat pipes, avoid the low throughput, slow start behavior of normal TCP implementations and recover more quickly from packet loss, as described within several documents including RFC 1323 (Window Scaling) and RFC 5681 (Slow-start, congestion avoidance, fast retransmit, and fast recovery). It also employs variable, per-flow traffic shaping that yields high instantaneous throughput while minimizing the possibility of overruns on downstream routers. More To The Game Security can be an added feature of the chosen implementation. By using 256-bit keys and hardware-assisted encryption engines in compliance with the Advanced Encryption Standard (AES), high performance can be achieved despite the complexity of algorithms. Various situations determine where is best to apply encryption for data in-flight: for example, if only disk-to-disk replication traffic needs this level of security, it can be advantageous to enable it on the dedicated remote data replication solution. If other traffic needs to be encrypted between the two datacenters, it is preferred to enable encryption on the exit datacenter routers where wire-speed encrypted traffic on 100G ports is now possible. Alternative implementations on hosts or dedicated security engines or DWDM muxponders are also available, but they don t offer the same benefits in real world deployments and are confined to more specific use cases. Ideally the same remote data replication solution would be capable of both open system logical disk replication and mainframe volume replication, providing a consistent and homogeneous response to both FC and FICON replication needs. This capability, sometime referred to as multimodality or FC/FICON intermix, helps justify the investment in high-performance extension technologies since it can now be leveraged across the enterprise to include mainframe volume replication and tape vaulting in addition to a variety of open system disk replication solutions and tape libraries. 9

12 Large-scale storage deployments often require support for multimodality (disk, tape, open system, mainframe), heterogeneous arrays, large bandwidth, high throughput, nonstop operations, tools for administration and configuration, and robust diagnostics. Some leading SAN extension solutions can accommodate all of these requirements and allow them to be managed by different administrator groups within an enterprise, by using INCITS T11 Virtual Fabrics (VF) technology for logical partitioning and Role Based Access Control (RBAC) for user profiling and privileges assignment. This is a warm welcome to multi-tenancy for storage area networks. For high availability considerations, it is also recommended to architect the overall solution in such a way that replication traffic can still operate during firmware upgrades and single replication port or device failures. That is why link aggregation groups are configured and where equipment redundancy comes into play. The remote data replication network can be incorporated into production FC fabrics or kept separate. Separation can be achieved logically or physically, using INCITS T11 Virtual Fabrics (VF) technology or dedicated devices. When physical separation is desired, the disk array will host onboard dedicated FC ports for replicas, connected to the SAN extension network. In small environments, the disk array will have a limited number of FC ports and all of them will be shared for production as well as replication traffic. In this case, the SAN extension appliance will need to provide specific functionalities in order to avoid merging the SAN in the primary datacenter with the secondary one, so that issues on the remote site, or even the WAN, will not negatively affect production traffic. Now that migration from IPv4 to IPv6 addressing is underway in many datacenters, IPv6 compatibility is also a very reasonable ask for any modern remote data replication solution. Depending on situations, where strong asymmetry in scale (and budget) for the two datacenters exist, there can also be a need for support of mismatched speeds on the WAN ports at both ends of the replication link, so that 10G is used in one location and 1G in the other one. IP sub-interfaces and VLAN tagging are extra features that are sometime required for a properly architected solution. Cloud providers and Hosted Managed Service providers tend to make use of these capabilities when offering Storage Private Clouds to their customers. Most replication protocols today support unsolicited writes and thus require a single round trip to write data to a remote disk array. If they don t, multiservice FCIP engines can provide ad-hoc acceleration capabilities to properly compensate for that. The industry has thus developed a wide range of specialized acceleration solutions, falling under the name of Write Acceleration, Read Acceleration, Tape Acceleration, Input/Output Acceleration and the likes. Summary Organizations looking for a remote data protection solution across geographically separated datacenters can nowadays choose among a variety of options, including Fibre Channel based disk array IP replication and multiservice appliances. Enterprise-class features and low TCO (Total Cost of 10

13 Ownership) represent valid decision criteria, just like multi-modality and multi-tenancy. The ability to integrate into any IP network without special tuning considerations is enabled through an optimized TCP/IP stack and resulting capabilities to handle glitches over the WAN. Ease of configuration and comprehensive management tools help providing insight and end to end visibility for proper performance assessment and troubleshooting. FCIP has emerged over alternative protocols and since many years purpose-built FCIP devices represent the preferred solution for remote data replication, especially for medium and large companies. Thanks to this technology, it is now possible to alleviate the distance barrier and achieve secure local replication performance over long distances. About the SNIA Europe SNIA Europe advances the interests of the storage industry by empowering organizations to translate data and information into business value by promoting the adoption of enabling technologies and standards. As a Regional Affiliate of SNIA Worldwide, we represent storage product and solutions manufacturers and the channel community across EMEA. For more information, visit 11

Extending SANs Over TCP/IP by Richard Froom & Erum Frahim

Extending SANs Over TCP/IP by Richard Froom & Erum Frahim Extending SANs Over TCP/IP by Richard Froom & Erum Frahim Extending storage area networks (SANs) over a distance has become a necessity for enterprise networks. A single SAN island with one storage system

More information

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data White Paper Storage Extension Network Solutions Between Data Centers Simplified, Low Cost, Networks for Storage Replication, Business Continuity and Disaster Recovery TODAY S OPERATING CLIMATE DEMANDS

More information

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5

How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5 Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5

More information

Fibre Channel over Ethernet in the Data Center: An Introduction

Fibre Channel over Ethernet in the Data Center: An Introduction Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification

More information

Cisco WAAS for Isilon IQ

Cisco WAAS for Isilon IQ Cisco WAAS for Isilon IQ Integrating Cisco WAAS with Isilon IQ Clustered Storage to Enable the Next-Generation Data Center An Isilon Systems/Cisco Systems Whitepaper January 2008 1 Table of Contents 1.

More information

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide

Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate

More information

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

HyperIP : VERITAS Replication Application Note

HyperIP : VERITAS Replication Application Note QuickTime and a Graphics decompressor are needed to see this picture. HyperIP : VERITAS Replication Application Note Introduction HyperIP is a Linux software application that quantifiably and measurably

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

IP Storage On-The-Road Seminar Series

IP Storage On-The-Road Seminar Series On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions

More information

IP SAN Best Practices

IP SAN Best Practices IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.

More information

Four Ways High-Speed Data Transfer Can Transform Oil and Gas WHITE PAPER

Four Ways High-Speed Data Transfer Can Transform Oil and Gas WHITE PAPER Transform Oil and Gas WHITE PAPER TABLE OF CONTENTS Overview Four Ways to Accelerate the Acquisition of Remote Sensing Data Maximize HPC Utilization Simplify and Optimize Data Distribution Improve Business

More information

Solution Brief Network Design Considerations to Enable the Benefits of Flash Storage

Solution Brief Network Design Considerations to Enable the Benefits of Flash Storage Solution Brief Network Design Considerations to Enable the Benefits of Flash Storage Flash memory has been used to transform consumer devices such as smartphones, tablets, and ultranotebooks, and now it

More information

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like

More information

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade

Application Note. Windows 2000/XP TCP Tuning for High Bandwidth Networks. mguard smart mguard PCI mguard blade Application Note Windows 2000/XP TCP Tuning for High Bandwidth Networks mguard smart mguard PCI mguard blade mguard industrial mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489

More information

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008

Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 Improving Effective WAN Throughput for Large Data Flows By Peter Sevcik and Rebecca Wetzel November 2008 When you buy a broadband Wide Area Network (WAN) you want to put the entire bandwidth capacity to

More information

The Impact Of The WAN On Disaster Recovery Capabilities A commissioned study conducted by Forrester Consulting on behalf of F5 Networks

The Impact Of The WAN On Disaster Recovery Capabilities A commissioned study conducted by Forrester Consulting on behalf of F5 Networks February 2007 The Impact Of The WAN On Disaster Recovery Capabilities A commissioned study conducted by Forrester Consulting on behalf of F5 Networks TABLE OF CONTENTS Introduction: Upgrading Disaster

More information

The proliferation of the raw processing

The proliferation of the raw processing TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer

More information

EonStor DS remote replication feature guide

EonStor DS remote replication feature guide EonStor DS remote replication feature guide White paper Version: 1.0 Updated: Abstract: Remote replication on select EonStor DS storage systems offers strong defense against major disruption to IT continuity,

More information

Data Center Fabric Convergence for Cloud Computing (the Debate of Ethernet vs. Fibre Channel is Over)

Data Center Fabric Convergence for Cloud Computing (the Debate of Ethernet vs. Fibre Channel is Over) Extreme Networks White Paper Data Center Fabric Convergence for Cloud Computing (the Debate of Ethernet vs. Fibre Channel is Over) The evolution of the data center fabric has been well documented. The

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Deploying Riverbed wide-area data services in a LeftHand iscsi SAN Remote Disaster Recovery Solution

Deploying Riverbed wide-area data services in a LeftHand iscsi SAN Remote Disaster Recovery Solution Wide-area data services (WDS) Accelerating Remote Disaster Recovery Reduce Replication Windows and transfer times leveraging your existing WAN Deploying Riverbed wide-area data services in a LeftHand iscsi

More information

VXLAN: Scaling Data Center Capacity. White Paper

VXLAN: Scaling Data Center Capacity. White Paper VXLAN: Scaling Data Center Capacity White Paper Virtual Extensible LAN (VXLAN) Overview This document provides an overview of how VXLAN works. It also provides criteria to help determine when and where

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

Accelerate Private Clouds with an Optimized Network

Accelerate Private Clouds with an Optimized Network Accelerate Private Clouds with an Optimized Network An Allstream White Paper 1 Table of contents The importance of WAN 1 WAN challenges for Private Clouds 1 WAN Optimization methods 2 Benefits of WAN Optimization

More information

Block based, file-based, combination. Component based, solution based

Block based, file-based, combination. Component based, solution based The Wide Spread Role of 10-Gigabit Ethernet in Storage This paper provides an overview of SAN and NAS storage solutions, highlights the ubiquitous role of 10 Gigabit Ethernet in these solutions, and illustrates

More information

How To Build A Clustered Storage Area Network (Csan) From Power All Networks

How To Build A Clustered Storage Area Network (Csan) From Power All Networks Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require

More information

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert

VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by

More information

Storage at a Distance; Using RoCE as a WAN Transport

Storage at a Distance; Using RoCE as a WAN Transport Storage at a Distance; Using RoCE as a WAN Transport Paul Grun Chief Scientist, System Fabric Works, Inc. (503) 620-8757 pgrun@systemfabricworks.com Why Storage at a Distance the Storage Cloud Following

More information

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO

WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO WAN Optimization Integrated with Cisco Branch Office Routers Improves Application Performance and Lowers TCO The number of branch-office work sites is increasing, so network administrators need tools to

More information

ADVANCED NETWORK CONFIGURATION GUIDE

ADVANCED NETWORK CONFIGURATION GUIDE White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4

More information

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All

More information

Cisco Virtual SAN Advantages and Use Cases

Cisco Virtual SAN Advantages and Use Cases Cisco Virtual SAN Advantages and Use Cases The Challenge Application data is accumulating at an increasingly fast pace, and to control costs, IT departments are looking at the benefits of economies of

More information

MOBILITY AND MOBILE NETWORK OPTIMIZATION

MOBILITY AND MOBILE NETWORK OPTIMIZATION MOBILITY AND MOBILE NETWORK OPTIMIZATION netmotionwireless.com Executive Summary Wireless networks exhibit uneven and unpredictable performance characteristics which, if not correctly managed, can turn

More information

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved. Cost Effective Backup with Deduplication Agenda Today s Backup Challenges Benefits of Deduplication Source and Target Deduplication Introduction to EMC Backup Solutions Avamar, Disk Library, and NetWorker

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International

Keys to Successfully Architecting your DSI9000 Virtual Tape Library. By Chris Johnson Dynamic Solutions International Keys to Successfully Architecting your DSI9000 Virtual Tape Library By Chris Johnson Dynamic Solutions International July 2009 Section 1 Executive Summary Over the last twenty years the problem of data

More information

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds February 2011 1 Introduction Today's business environment requires organizations

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

WAN Performance Analysis A Study on the Impact of Windows 7

WAN Performance Analysis A Study on the Impact of Windows 7 A Talari Networks White Paper WAN Performance Analysis A Study on the Impact of Windows 7 Test results demonstrating WAN performance changes due to upgrading to Windows 7 and the network architecture and

More information

Managing Data Center Interconnect Performance for Disaster Recovery

Managing Data Center Interconnect Performance for Disaster Recovery Application Note Managing Data Center Interconnect Performance for Disaster Recovery Overview Data center interconnects (DCI) are traditionally used for critical data replication to meet corporate compliance

More information

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest

More information

iscsi Top Ten Top Ten reasons to use Emulex OneConnect iscsi adapters

iscsi Top Ten Top Ten reasons to use Emulex OneConnect iscsi adapters W h i t e p a p e r Top Ten reasons to use Emulex OneConnect iscsi adapters Internet Small Computer System Interface (iscsi) storage has typically been viewed as a good option for small and medium sized

More information

White Paper Technology Review

White Paper Technology Review White Paper Technology Review iscsi- Internet Small Computer System Interface Author: TULSI GANGA COMPLEX, 19-C, VIDHAN SABHA MARG, LUCKNOW 226001 Uttar Pradesh, India March 2004 Copyright 2004 Tata Consultancy

More information

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,

More information

Server and Storage Virtualization with IP Storage. David Dale, NetApp

Server and Storage Virtualization with IP Storage. David Dale, NetApp Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this

More information

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците

Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily

More information

How To Protect Data On Network Attached Storage (Nas) From Disaster

How To Protect Data On Network Attached Storage (Nas) From Disaster White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

Storage Networking Management & Administration Workshop

Storage Networking Management & Administration Workshop Storage Networking Management & Administration Workshop Duration: 2 Days Type: Lecture Course Summary & Description Achieving SNIA Certification for storage networking management and administration knowledge

More information

Storage Networking Foundations Certification Workshop

Storage Networking Foundations Certification Workshop Storage Networking Foundations Certification Workshop Duration: 2 Days Type: Lecture Course Description / Overview / Expected Outcome A group of students was asked recently to define a "SAN." Some replies

More information

Get Control of Your Data Center. Application Delivery Controllers

Get Control of Your Data Center. Application Delivery Controllers White Paper Get Control of Your Data Center Application Delivery Controllers May 2011 Get Control of Your Data Center Access. Security. Delivery. Introduction Data center and networking technologies have

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

White Paper. Accelerating VMware vsphere Replication with Silver Peak

White Paper. Accelerating VMware vsphere Replication with Silver Peak Accelerating VMware vsphere Replication with Silver Peak Accelerating VMware vsphere Replication with Silver Peak Contents Overview...3 The Challenge of Replicating Over Distance...3 VMware vsphere Replication

More information

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical

More information

PORTrockIT. Spectrum Protect : faster WAN replication and backups with PORTrockIT

PORTrockIT. Spectrum Protect : faster WAN replication and backups with PORTrockIT 1 PORTrockIT 2 Executive summary IBM Spectrum Protect, previously known as IBM Tivoli Storage Manager or TSM, is the cornerstone of many large companies data protection strategies, offering a wide range

More information

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage

Cisco WAAS Express. Product Overview. Cisco WAAS Express Benefits. The Cisco WAAS Express Advantage Data Sheet Cisco WAAS Express Product Overview Organizations today face several unique WAN challenges: the need to provide employees with constant access to centrally located information at the corporate

More information

HP Cisco data replication solutions. Partnering to deliver business continuity and availability

HP Cisco data replication solutions. Partnering to deliver business continuity and availability HP Cisco data replication solutions Partnering to deliver business continuity and availability For many businesses, keeping the promises they have made to their employees, customers, shareholders, and

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE

COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area

More information

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE

SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak

More information

The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN

The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Background and Goal Many papers have been written

More information

WHITE PAPER. Extending Network Monitoring Tool Performance

WHITE PAPER. Extending Network Monitoring Tool Performance WHITE PAPER Extending Network Monitoring Tool Performance www.ixiacom.com 915-6915-01 Rev. A, July 2014 2 Table of Contents Benefits... 4 Abstract... 4 Introduction... 4 Understanding Monitoring Tools...

More information

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center

Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

WAN Optimization Technologies in EMC Symmetrix Replication Environments

WAN Optimization Technologies in EMC Symmetrix Replication Environments Applied Technology Abstract This white paper outlines and defines the evolution, differences, and best practices for implementing WAN optimization in order to improve the functionality of data center to

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS )

Volume Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Open-E Data Storage Server (DSS ) Volume Replication INSTALATION GUIDE Enterprise-class Volume Replication helps ensure non-stop access to critical business data. Open-E DSS Volume Replication Open-E Data

More information

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment Introduction... 2 Virtualization addresses key challenges facing IT today... 2 Introducing Virtuozzo... 2 A virtualized environment

More information

Building High-Performance iscsi SAN Configurations. An Alacritech and McDATA Technical Note

Building High-Performance iscsi SAN Configurations. An Alacritech and McDATA Technical Note Building High-Performance iscsi SAN Configurations An Alacritech and McDATA Technical Note Building High-Performance iscsi SAN Configurations An Alacritech and McDATA Technical Note Internet SCSI (iscsi)

More information

DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization

DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain

More information

Virtual PortChannels: Building Networks without Spanning Tree Protocol

Virtual PortChannels: Building Networks without Spanning Tree Protocol . White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed

More information

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES

A TECHNICAL REVIEW OF CACHING TECHNOLOGIES WHITEPAPER Over the past 10 years, the use of applications to enable business processes has evolved drastically. What was once a nice-to-have is now a mainstream staple that exists at the core of business,

More information

Ultra-Scalable Storage Provides Low Cost Virtualization Solutions

Ultra-Scalable Storage Provides Low Cost Virtualization Solutions Ultra-Scalable Storage Provides Low Cost Virtualization Solutions Flexible IP NAS/iSCSI System Addresses Current Storage Needs While Offering Future Expansion According to Whatis.com, storage virtualization

More information

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP

More information

EVOLUTION OF NETWORKED STORAGE

EVOLUTION OF NETWORKED STORAGE EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. sonika_manoj@yahoo.com 2 Lecturer, Deptt

More information

Future-Proofed Backup For A Virtualized World!

Future-Proofed Backup For A Virtualized World! ! Future-Proofed Backup For A Virtualized World! Prepared by: Colm Keegan, Senior Analyst! Prepared: January 2014 Future-Proofed Backup For A Virtualized World Like death and taxes, growing backup windows

More information

Best Practices for Deploying WAN Optimization with Data Replication

Best Practices for Deploying WAN Optimization with Data Replication Best Practices for Deploying WAN Optimization with Data Replication Keys for Successful Data Protection Across the WAN The Weak Link in data Protection All too often, the Wide Area Network (WAN) link is

More information

How To Use The Cisco Wide Area Application Services (Waas) Network Module

How To Use The Cisco Wide Area Application Services (Waas) Network Module Cisco Wide Area Application Services (WAAS) Network Module The Cisco Wide Area Application Services (WAAS) Network Module for the Cisco Integrated Services Routers (ISR) is a powerful WAN optimization

More information

Backup Exec 9.1 for Windows Servers. SAN Shared Storage Option

Backup Exec 9.1 for Windows Servers. SAN Shared Storage Option WHITE PAPER Optimized Performance for SAN Environments Backup Exec 9.1 for Windows Servers SAN Shared Storage Option 11/20/2003 1 TABLE OF CONTENTS Executive Summary...3 Product Highlights...3 Approaches

More information

Protecting enterprise servers with StoreOnce and CommVault Simpana

Protecting enterprise servers with StoreOnce and CommVault Simpana Technical white paper Protecting enterprise servers with StoreOnce and CommVault Simpana HP StoreOnce Backup systems Table of contents Introduction 2 Technology overview 2 HP StoreOnce Backup systems key

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

Enabling Cloud Architecture for Globally Distributed Applications

Enabling Cloud Architecture for Globally Distributed Applications The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Hitachi Data Systems and Brocade Disaster Recovery Solutions for VMware Environments

Hitachi Data Systems and Brocade Disaster Recovery Solutions for VMware Environments Hitachi Data Systems and Brocade Disaster Recovery Solutions for VMware Environments Technical Brief By Sarah Hamilton, Hitachi Data Systems, and Marcus Thordal, Brocade December 2009 Executive Summary

More information

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery

More information

White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage

White Paper: Nasuni Cloud NAS. Nasuni Cloud NAS. Combining the Best of Cloud and On-premises Storage Combining the Best of Cloud and On-premises Storage Introduction Organizations rely on corporate data for everything from product design to order processing. Files are the lifeblood of the modern enterprise

More information

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...

More information

- An Essential Building Block for Stable and Reliable Compute Clusters

- An Essential Building Block for Stable and Reliable Compute Clusters Ferdinand Geier ParTec Cluster Competence Center GmbH, V. 1.4, March 2005 Cluster Middleware - An Essential Building Block for Stable and Reliable Compute Clusters Contents: Compute Clusters a Real Alternative

More information

IP SAN BEST PRACTICES

IP SAN BEST PRACTICES IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...

More information