NAS and SAN Scaling Together (NASD Approach)
|
|
|
- Horace Riley
- 10 years ago
- Views:
Transcription
1 NAS and SAN Scaling Together (NASD Approach) Luís Manuel Oliveira Soares Departamento de Informática, Universidade do Minho Braga, Portugal Abstract. This communication exhibits the state of the art of distributed storage architectures based on a hybrid approach of NAS 1 (file oriented) and SAN 2 (block oriented) approaches, focusing an emergent solution, the NASD 3 architecture. It also brings out the benefits when combining a conceptual NASD device with smart devices such as Active Disks. 1. Introduction The goal of network-shared storage is to enable efficient access to heterogeneous data contents, spread over a network. The actual Internet dependence is a fact as well as the growing necessity to reach information that is not close to the end user. This need compels storage manufacturers and software designers toward scientific research, in order to provide reliable, robust and scalable solutions. Storage bandwidth becomes critical nowadays mostly due to the richer data types, such as video or data-intensive applications that travel through the Internet. A recent study [1] claims that explosive growth of information is only beginning: humankind will generate more original information over the next three years than was created in the previous 300,000 years combined. These throughput requirements for network-shared contents suggest efficient storage capability as well as easy retrieval. A question may arise when bringing up the network storage matter: why spread data over a network when it could be kept nearby. Networked storage reduces wasted capacity, the time to deploy new storage, and backup inconveniences. It also simplifies storage management, increases data availability, and enables the sharing of data among clients [2]. But there are still some details that must not be left out when handling network-shared storage. The system entropy is much higher, i.e., in order to make it all work, more machines have to function correctly, data is more vulnerable to privacy and integrity attacks and processing of network protocols is needed, which, by itself, is more expensive than a local hardware device access. Two distinct approaches come forth when mentioning network storage issues. The NAS solution, which is mostly filesystem oriented and SAN, frequently declared as being a block-oriented solution. With these two distinct philosophies, potential problems may be solved, but still leave some situations uncovered. Along these facts, technology evolution and its side effects must be dealt with. It is not hard to perceive that the continuous development of computers has enabled and drastically increased the scale on which files are managed on behalf of multiple users and shared across networks. This communication brings out a SAN/NAS hybrid solution that deals with server bottlenecks, providing a scalable solution for network storage problems. In Section 2, some 1 Network Address Storage 2 Storage Area Network 3 Network Attached Secure Disks ICCA
2 a) b) Fig. 1 : (a) Typical NAS Environment (b) Typical SAN Environment Courtesy of Zerowait Corp. background on NAS and SAN is presented. In Section 3, the two paradigms are drawn near to show the benefits when combining them. In Section 4, the NASD approach is presented. Section 5, presents a possible improvement on the NASD architecture, taking advantage of Active Disks [3] features. Finally, Section 6 concludes the paper. 2. Background In 1979, the Shugart Associates, felt that people would be interested in a way to easily use and share disk devices. This feeling originated the definition of the SASI 4, which is the predecessor of SCSI 5. This happening was shortly followed by NFS 6 creation when in the early eighties, a team of engineers at Sun Microsystems developed it. Right about the same time, IBM developed NetBIOS that became the foundation of the SMB 7 protocol which lead to the CIFS 8, the predominant method of sharing files in a Windows environment. Due to this historical overview, it is noticed that neither SAN nor NAS are revolutionary concepts; in fact, SANs and NAS may be considered to be the next step in the evolutionary path of SCSI and NFS/CIFS, respectively. 2.1 Storage Area Network A SAN, is a set of two or more storage devices communicating through a serial SCSI protocol, such as Fibre Channel or iscsi [4]. In a certain way, the concept System Area Networks refers to the storage device and the network hardware to which the storage is attached. Note that a LAN, which is used only for the purpose of handling storage traffic, is not a SAN. However, if that network deals with the storage traffic using a protocol such as iscsi, then it may be considered a SAN. These systems are often used for high-performance architectures that demand low latency and direct access to any small group of data units. Therefore, scalability for storage resources is required. On the other hand, the ability to supply file sharing for several hosts is not accomplished. This handicap originates in the incapacity of SAN systems to enable synchronized access to data. It is true that SANs allows multiple clients to access same 4 Shugart Associates System Interface 5 Small Computer System Interface 6 Network File System 7 Server Message Block 8 Common Internet Filesystem ICCA 03
3 Table 1: Differences Between NAS and SAN SAN NAS Protocol Serial SCSI-3 NFS/CIFS Shares Raw disk and tape drives Filesystems storage device directly, but its interface does not provide any mechanism to ensure synchronization in concurrent accesses. 2.2 Network Attached Storage NAS originated in CIFS and NFS. These two file sharing protocols have some limitations that motivated some new thoughts about the network file sharing concept. In fact, these two protocols became quite popular and are generally accepted by the industry, despite their unfitness to communicate with each other. Another disadvantage is that both implementations behave as another application executing in the machine that leads to CPU and network resource consumption. To solve these problems, NAS was invented. The typical idea about Network Attached Storage is nothing more than a server in a stand alone box with hot-swappable RAID 9 arrays. This server continues to serve files using NFS and CIFS, but with customized versions, which make file system sharing easier, thus improving performance. Nevertheless, as it will be shown later, it is common for a NAS filer to be comprised of a filer head with SAN-attached storage behind it. Actually, many NAS systems internally interface with non-volatile magnetic media through a SAN-like interface. This situation is depicted in Figure 2. As it may be noticed from Table 1, these two approaches are quite different, but they may be linked together to produce an hybrid solution. 3. Combining NAS and SAN The combination of NAS and SANs may overcome the flaws of each other. They both have several blemishes. On the NAS side, the server itself is the system bottleneck. These hinder strings up, because a single server collects data from the storage device/network, acting as a storage controller, and forwards it to the client host/network. In addition to this store-and-forward behaviour, the server also handles concurrency control and metadata consistency. Considering these facts, one notices that in high-performance distributed filesystems, there is an evident cost associated with the overhead produced by the filer, which serves files and handles all the filesystem semantics. This flaw becomes clearer when the server, apart from managing the tasks mentioned above, also bridges traffic between a storage network and a client network. SANs present approximately the same problem, because a controller is needed to operate accesses to devices. To amortize the cost of the controller, it is usual to associate multiple disks per storage-controller, which degrades the controller performance. Another SANs incapacity is the inability to present file sharing support, due to the block oriented interface and the lack of explicit concurrency control mechanism. Deciding what network messages to trust is also a problem. Storage-system interconnects, including most of SANs 9 Redundant Array of Inexpensive Disks ICCA
4 Fig. 2: NAS and SAN collaborating - Courtesy of Zerowait Corp. technology, were originally designed as an extension of the internal buses of their hosts thence security provisions do not exist or are very restricted [2]. When combining both these technologies, one virtue may hopefully overcome the other's flaws, and vice versa. An easily data sharing on the NAS side combined with the scalability presented by the SANs is a very attractive solution. It is clear that not all the drawbacks may be solved combining these two approaches, but some are indeed. Actually, a strategy for avoiding controller bottlenecks is to separate control and datapaths, roughly like DMA. Another way is to maintain a load-balanced cluster of controllers, which is not a cost effective solution. To solve some of the security problems mentioned above, NAS take advantage of Operating System access restriction techniques while SANs hold to VPNs 10 using IPSec 11 protocols, firewalls and Fibre Channel zoning, restricting trust only to participating systems. 4. Network Attached Secure Disks NASD architecture enables cost-effective bandwidth scaling. Server bandwidth bottlenecks are eliminated because storage devices are modified granting them the ability to directly transfer data to clients. They are also able to share file server or database functionality with clients and servers. 4.1 NASD Based Storage Architecture NASD based architecture essentially minimizes server-based data movement, embedding disk management functions into the device. Taking advantage of persistent capabilities granted by file managers, clients may access storage objects directly. If a client requests object access permission to the file manager, and it is granted, the next time this client needs to access the same object, it does not need to request it again, unless it was revoked. Therefore, all data and most control information, travels once across the network and directly between entities, avoiding expensive mechanism of store-and-forward. Typically, file managers grant capabilities over object access, handle concurrency control, global naming and cache coherency. Note that a centralized controller is still required, but it is relieved from several management functions that can now be conducted at the device level. The storage device does no aim to replace the file server entirely, but it 10 Virtual Private Network 11 Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the IP layer ICCA 03
5 acts like a helper. Since high-level distributed filesystem functionality varies significantly, filesystem policies are defined at the file manager, leaving storage primitives to be efficiently operated at the NASD device itself. This architecture is instantiated in Figure 3. Another point of interest is the NASD interface, which is an object-based one. This means that data layout management may be handled at the device, because, the device needs to know the storage metadata to define the data objects. Hence, the data units exported by the device are variable length objects instead of raw disk blocks. Consequently, the client does not access metadata but pre-defined data objects, thus it does not need to query the file manager on each access. The alternative, exporting storage metadata to clients and enabling client access to arbitrary disk blocks, ``is worse than insecure, it is accident-prone and puts the entire storage system at risk'' [5]. 4.2 Security NASD security is based on cryptographic capabilities. Clients obtain the capabilities from the file manager through a private and secure protocol external to NASD. This process ensures the integrity of the requests, by filtering possible attacks and accidents. Cryptographic techniques are intuitively expensive and may be unacceptable in a disk. Software implementations operating at disk rates are not available with the computational resources we expect on a disk, but schemes based on multiple DES 12 functions blocks in hardware can be implemented in a few tens of thousand of gates and operate faster than disk rates [6]. 4.3 NASD Properties Generally, NASD exhibits four properties: Direct Transfer, Asynchronous Oversight, Cryptographic Integrity, Object-based Interface [6]. The first one asserts that data is transferred directly between drive and client without indirection or store-and-forward through a file server machine. The second one claims that client's have the ability to perform most operations without synchronous appeal to the file manager. Frequently consulted but infrequently changed policy decisions, such as authorization decisions, should be encoded into capabilities by the file manager and subsequently enforced by drives. Cryptographic Integrity affirms that drives attached to the network become vulnerable to direct attacks from adversaries, hence it is necessary to apply cryptographic techniques to defend against potential attacks. The last one allows drive entities to possess direct knowledge of the relationship between disk blocks and to minimize security overhead because, drives export variable length "objects" instead of fixed-size blocks. This also improves opportunities for storage self-management by extending into a disk an understanding of the relationships between blocks on the disk. 4. Active Disks and Network Attached Secure Disks Current disk drives integrate all the components of a simple computer, i.e., a microprocessor, memory, and a communications subsystem with a control unit for signal processing control. Due to the improvements in the silicon circuit production, that enables production of integrated circuits using.25 or even.18 microns technology. The space available inside the drive circuit chip may now be used to incorporate a 200MHz embedded microprocessor. 12 Data Encryption Standard Algorithm ICCA
6 Fig. 3: Scalable bandwidth NASD system - Courtesy of Carnegie Mellon University This is a powerful execution environment directly at the drive that enables new fields of research for distributed processing. Code can be executed near the data providing devices with the ability to examine data before it is released into the network. Not only the processing power is increased, but also the entity independence regarding the file manager may be strengthened. This way all the tasks regarding NASD procedures, like filesystem management, may be easily executed at the device. The extra cycles may then be used to execute application-level code. Facing these new drive capabilities, a distributed environment concept focusing distributed intelligent storage devices arises, since these devices cease to be thought of dummy storage drives that export data blocks to be understood as an entity capable of code execution and hence data processing. Distributing application code throughout devices improves I/O performance and challenges the actual tendency that is to bring data to the application code. This new trend presents an innovate concept: sending application code to processing capable storage drives so that code executes near data, hoping that network traffic is reduced due to unnecessary data movement. Typically, this data movement was necessary because some part of the application code need it to evaluate some expression, without any output directed to the user, i.e., it was needed because of an in-between algorithm step. Note that this approach extends cluster based processing, because it does not take advantage of code processing only, it capitalizes data closeness so that code executes near data without generating extra network traffic. Apart from incorporating a processor capable of filesystem semantics and data processing, there will still be available free area where it may fit on-chip DRAM functionalities or cryptographic support. This also favours the NASD approach, because it easies the cryptographic processing which is a mandatory NASD property ICCA 03
7 6. Conclusions Decisions regarding storage systems are becoming very important due to the role that modern storage devices play in the corporate data centres. Investment in such devices is often very expensive which makes these decisions to be thoughtful ones. Two approaches to distributed storage systems are very popular today: NAS and SANs, that differ from each other mostly in the technology used. The first presents generic solutions that make use of cheap Ethernet exporting data as files while the second is based on expensive Fibre Channel and exports data as blocks instead of files. This second approach benefits from the SCSI-like interface that is usually used in SANs, which means that is very scalable. Nevertheless, these differences tend to blur and may soon not be recognizable. Moreover, NAS servers stand in an Ethernet network accepting client requests and fetch data through a SAN like private storage network. Although the combination of NAS and SANs brings considerable improvements to storage network, aspects such security, availability and data sharing still lack some efficiency. To reduce these inefficiencies, a NASD architecture has been proposed. Network attached secure devices are defined by supporting: direct device-to-client transfers, secure interfaces (possibly through cryptographic techniques), asynchronous access to storage (accessing only once to the file manager) and object-based interface exporting variable length objects instead of fixed-size disk blocks. Finally, NASD devices may take advantage of technology evolution due to the new generation disk drives with improved ASIC 13 chips. These new smart drives may embed in their integrated circuit all the actual functionalities plus an ARM or similar microprocessor, increasing the drive processing capabilities. Therefore, on-drive processing becomes available enabling the device-to-client communication to be handled as well as processing the cryptographic algorithms needed by NASD devices. References [1] Winter Corporation. Convergence of NAS and SAN With Highroad. Technical Report, Winter Corporation, (2001) [2] Garth A. Gibson and Rodney Van Meter: Network Attached Storage Architecture. Communications of the ACM, (2000) [3] Garth A. Gibson Erik Riedel, Christos Faloutsos and David Nagle: Active Disks for Large-Scale Data Processing. IEEE Computer, (2001) [4] W. Curtis Preston. Using SANs and NAS O'Reilly, 1st edn, (2002) [5] Garth A. Gibson, David F. Nagle, William Courtright II, Nat Lanza, Paul Mazaitis, Marc Unangst, and Jim Zelenka: NASD Scalable Storage Systems. Proc. USENIX, Linux Workshop, Monterey, CA, (1999) [6] Garth A. Gibson, David F. Nagle, Khalil Amiri, Jeff Butler, Fay W. Chang, Howard Gobioff, Charles Hardin, Erik Riedel, David Rochberg, and Jim Zelenka: A Cost- Effective, High-Bandwidth Storage Architecture. Proc. 8th Int. Conf. on Architectural 13 Application-Specific Integrated Circuit ICCA
8 Support for Programming Languages and Operating Systems, ACM Press (1998) [7] Garth A. Gibson, David F. Nagle, Khalil Amiri, Fay W. Chang, Eugene M. Feinberg, Howard Gobioff, Chen Lee, Berend Ozceri, Erik Riedel, David Rochberg, and Jim Zelenka: File Server Scaling With Network-Attached Secure Disks. Proc. ACM SIGMETRICS Int. Conf. on Measurement and Modelling of Computer Systems, ACM Press, (1997) [8] Hyeran Lim Vikram Kapoor, Chirag Wighe and David H.-C. Du: Active Disk File System: A Distributed, Scalable File System. Proc. 8th IEEE Symposium on Mass Storage Systems, IEEE Press, (2001) ICCA 03
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
VERITAS Backup Exec 9.0 for Windows Servers
WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS
Best Practices for Data Sharing in a Grid Distributed SAS Environment. Updated July 2010
Best Practices for Data Sharing in a Grid Distributed SAS Environment Updated July 2010 B E S T P R A C T I C E D O C U M E N T Table of Contents 1 Abstract... 2 1.1 Storage performance is critical...
EVOLUTION OF NETWORKED STORAGE
EVOLUTION OF NETWORKED STORAGE Sonika Jindal 1, Richa Jindal 2, Rajni 3 1 Lecturer, Deptt of CSE, Shaheed Bhagat Singh College of Engg & Technology, Ferozepur. [email protected] 2 Lecturer, Deptt
Big data management with IBM General Parallel File System
Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers
Storage Technologies for Video Surveillance
The surveillance industry continues to transition from analog to digital. This transition is taking place on two fronts how the images are captured and how they are stored. The way surveillance images
Scala Storage Scale-Out Clustered Storage White Paper
White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current
SCSI vs. Fibre Channel White Paper
SCSI vs. Fibre Channel White Paper 08/27/99 SCSI vs. Fibre Channel Over the past decades, computer s industry has seen radical change in key components. Limitations in speed, bandwidth, and distance have
an introduction to networked storage
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation
Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly
How To Build A Clustered Storage Area Network (Csan) From Power All Networks
Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require
Chapter 13 Selected Storage Systems and Interface
Chapter 13 Selected Storage Systems and Interface Chapter 13 Objectives Appreciate the role of enterprise storage as a distinct architectural entity. Expand upon basic I/O concepts to include storage protocols.
Quantum StorNext. Product Brief: Distributed LAN Client
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.
M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK 2014 2015 Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2. What are the different types of virtualization? Explain
Block based, file-based, combination. Component based, solution based
The Wide Spread Role of 10-Gigabit Ethernet in Storage This paper provides an overview of SAN and NAS storage solutions, highlights the ubiquitous role of 10 Gigabit Ethernet in these solutions, and illustrates
Storage Solutions Overview. Benefits of iscsi Implementation. Abstract
Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses
DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization
DAS, NAS or SAN: Choosing the Right Storage Technology for Your Organization New Drivers in Information Storage Data is unquestionably the lifeblood of today s digital organization. Storage solutions remain
Cluster Scalability of ANSYS FLUENT 12 for a Large Aerodynamics Case on the Darwin Supercomputer
Cluster Scalability of ANSYS FLUENT 12 for a Large Aerodynamics Case on the Darwin Supercomputer Stan Posey, MSc and Bill Loewe, PhD Panasas Inc., Fremont, CA, USA Paul Calleja, PhD University of Cambridge,
iscsi: Accelerating the Transition to Network Storage
iscsi: Accelerating the Transition to Network Storage David Dale April 2003 TR-3241 WHITE PAPER Network Appliance technology and expertise solve a wide range of data storage challenges for organizations,
How To Virtualize A Storage Area Network (San) With Virtualization
A New Method of SAN Storage Virtualization Table of Contents 1 - ABSTRACT 2 - THE NEED FOR STORAGE VIRTUALIZATION 3 - EXISTING STORAGE VIRTUALIZATION METHODS 4 - A NEW METHOD OF VIRTUALIZATION: Storage
Chapter 6. 6.1 Introduction. Storage and Other I/O Topics. p. 570( 頁 585) Fig. 6.1. I/O devices can be characterized by. I/O bus connections
Chapter 6 Storage and Other I/O Topics 6.1 Introduction I/O devices can be characterized by Behavior: input, output, storage Partner: human or machine Data rate: bytes/sec, transfers/sec I/O bus connections
How To Improve Performance On A Single Chip Computer
: Redundant Arrays of Inexpensive Disks this discussion is based on the paper:» A Case for Redundant Arrays of Inexpensive Disks (),» David A Patterson, Garth Gibson, and Randy H Katz,» In Proceedings
Optimizing Large Arrays with StoneFly Storage Concentrators
Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time
3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
The proliferation of the raw processing
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,
A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman
Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V
Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...
Flash Memory Arrays Enabling the Virtualized Data Center. July 2010
Flash Memory Arrays Enabling the Virtualized Data Center July 2010 2 Flash Memory Arrays Enabling the Virtualized Data Center This White Paper describes a new product category, the flash Memory Array,
POWER ALL GLOBAL FILE SYSTEM (PGFS)
POWER ALL GLOBAL FILE SYSTEM (PGFS) Defining next generation of global storage grid Power All Networks Ltd. Technical Whitepaper April 2008, version 1.01 Table of Content 1. Introduction.. 3 2. Paradigm
TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS
TECHNOLOGY BRIEF August 1999 Compaq Computer Corporation Prepared by ISSD Technology Communications CONTENTS Executive Summary 1 Introduction 3 Subsystem Technology 3 Processor 3 SCSI Chip4 PCI Bridge
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
TCP Offload Engines. As network interconnect speeds advance to Gigabit. Introduction to
Introduction to TCP Offload Engines By implementing a TCP Offload Engine (TOE) in high-speed computing environments, administrators can help relieve network bottlenecks and improve application performance.
WHITE PAPER Guide to 50% Faster VMs No Hardware Required
WHITE PAPER Guide to 50% Faster VMs No Hardware Required Think Faster. Visit us at Condusiv.com GUIDE TO 50% FASTER VMS NO HARDWARE REQUIRED 2 Executive Summary As much as everyone has bought into the
How To Design A Data Center
Data Center Design & Virtualization Md. Jahangir Hossain Open Communication Limited [email protected] Objectives Data Center Architecture Data Center Standard Data Center Design Model Application Design
ISCSI-The Future of the Storage Network
ISCSI-The Future of the Storage Network Ms. Sulbha V. Hemke 1, Dr. A. D. Gawande 2 and Prof. L. K. Gautum 3 1 Student, M.E. Computer Engineering, Sipna COET- Amravati 2 Head of Computer Science and Engg.
Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
Practical Challenges in Scaling Storage Networks
Practical Challenges in Scaling Networks First Intelligent Workshop May 19-21, 2003 Mark Bakke Cisco Systems Cisco Networking 5428 Stackable iscsi-fc switch/gateway Small-medium business 9xxx Modular FC-based
Enabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
How To Create A Large Enterprise Cloud Storage System From A Large Server (Cisco Mds 9000) Family 2 (Cio) 2 (Mds) 2) (Cisa) 2-Year-Old (Cica) 2.5
Cisco MDS 9000 Family Solution for Cloud Storage All enterprises are experiencing data growth. IDC reports that enterprise data stores will grow an average of 40 to 60 percent annually over the next 5
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center
Best Practice and Deployment of the Network for iscsi, NAS and DAS in the Data Center Samir Sharma, Juniper Networks Author: Samir Sharma, Juniper Networks SNIA Legal Notice The material contained in this
From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller
White Paper From Ethernet Ubiquity to Ethernet Convergence: The Emergence of the Converged Network Interface Controller The focus of this paper is on the emergence of the converged network interface controller
Dependable Systems. 9. Redundant arrays of. Prof. Dr. Miroslaw Malek. Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs
Dependable Systems 9. Redundant arrays of inexpensive disks (RAID) Prof. Dr. Miroslaw Malek Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs Redundant Arrays of Inexpensive Disks (RAID) RAID is
Lizy Kurian John Electrical and Computer Engineering Department, The University of Texas as Austin
BUS ARCHITECTURES Lizy Kurian John Electrical and Computer Engineering Department, The University of Texas as Austin Keywords: Bus standards, PCI bus, ISA bus, Bus protocols, Serial Buses, USB, IEEE 1394
Storage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member
Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member March, 2010 Table of Contents Introduction...1 What is Multi-Tenancy?...2 Storage Multi-Tenancy...2 Enabling Cloud-Based Data Management CDMI...3
Object Store Based SAN File Systems
Object Store Based SAN File Systems J. Satran A. Teperman [email protected] [email protected] IBM Labs, Haifa University, Mount Carmel, Haifa 31905, Israel Abstract SAN file systems today allow
Zadara Storage Cloud A whitepaper. @ZadaraStorage
Zadara Storage Cloud A whitepaper @ZadaraStorage Zadara delivers two solutions to its customers: On- premises storage arrays Storage as a service from 31 locations globally (and counting) Some Zadara customers
Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
E4 UNIFIED STORAGE powered by Syneto
E4 UNIFIED STORAGE powered by Syneto THE E4 UNIFIED STORAGE (US) SERIES POWERED BY SYNETO From working in the heart of IT environment and with our major customers coming from Research, Education and PA,
Index Terms : Load rebalance, distributed file systems, clouds, movement cost, load imbalance, chunk.
Load Rebalancing for Distributed File Systems in Clouds. Smita Salunkhe, S. S. Sannakki Department of Computer Science and Engineering KLS Gogte Institute of Technology, Belgaum, Karnataka, India Affiliated
Architecting Your SAS Grid : Networking for Performance
ABSTRACT Paper SAS6760-2016 Architecting Your SAS : Networking for Performance Tony Brown and Margaret Crevar, SAS Institute Inc. With the popularity of network-attached storage for shared file systems,
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
Storage and Print Solutions for SOHOs
1 Storage and Print Solutions for SOHOs Rajiv Mathews, Ravi Shankar T, Sriram P, Ranjani Parthasarathi Department Of Computer Science & Engineering, College Of Engineering, Guindy, Anna University, Chennai,
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily
Speed and Persistence for Real-Time Transactions
Speed and Persistence for Real-Time Transactions by TimesTen and Solid Data Systems July 2002 Table of Contents Abstract 1 Who Needs Speed and Persistence 2 The Reference Architecture 3 Benchmark Results
Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup
Technical white paper Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup Table of contents Executive summary... 2 Introduction... 2 What is NDMP?... 2 Technology overview... 3 HP
The Revival of Direct Attached Storage for Oracle Databases
The Revival of Direct Attached Storage for Oracle Databases Revival of DAS in the IT Infrastructure Introduction Why is it that the industry needed SANs to get more than a few hundred disks attached to
Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...
Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
Deconstruction: The 21st Century Business Model
THE DAFS BUSINESS CASE Jon William Toigo, Independent Consultant and Author of The Holy Grail of Data Storage Management Deconstruction: The 21st Century Business Model If there is one recurrent theme
Future technologies for storage networks. Shravan Pargal Director, Compellent Consulting
Future technologies for storage networks Shravan Pargal Director, Compellent Consulting Agenda Storage applications Application requirements Available technology solutions Who is winning today? What will
NAS or iscsi? White Paper 2007. Selecting a storage system. www.fusionstor.com. Copyright 2007 Fusionstor. No.1
NAS or iscsi? Selecting a storage system White Paper 2007 Copyright 2007 Fusionstor www.fusionstor.com No.1 2007 Fusionstor Inc.. All rights reserved. Fusionstor is a registered trademark. All brand names
File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
How To Design A Data Centre
DATA CENTRE TECHNOLOGIES & SERVICES RE-Solution Data Ltd Reach Recruit Resolve Refine 170 Greenford Road Harrow Middlesex HA1 3QX T +44 (0) 8450 031323 EXECUTIVE SUMMARY The purpose of a data centre is
PIONEER RESEARCH & DEVELOPMENT GROUP
SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for
Database Configuration: SAN or NAS
Database Configuration: SAN or NAS Discussion of Fibre Channel SAN and NAS Version:.0 Greg Schulz DBSANNAS.DOC Preface This publication is for general guidance and informational purposes only. The information
Object Storage: Out of the Shadows and into the Spotlight
Technology Insight Paper Object Storage: Out of the Shadows and into the Spotlight By John Webster December 12, 2012 Enabling you to make the best technology decisions Object Storage: Out of the Shadows
LSI SAS inside 60% of servers. 21 million LSI SAS & MegaRAID solutions shipped over last 3 years. 9 out of 10 top server vendors use MegaRAID
The vast majority of the world s servers count on LSI SAS & MegaRAID Trust us, build the LSI credibility in storage, SAS, RAID Server installed base = 36M LSI SAS inside 60% of servers 21 million LSI SAS
CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY
51 CHAPTER 3 PROBLEM STATEMENT AND RESEARCH METHODOLOGY Web application operations are a crucial aspect of most organizational operations. Among them business continuity is one of the main concerns. Companies
Moving Virtual Storage to the Cloud. Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage
Moving Virtual Storage to the Cloud Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage Table of Contents Overview... 1 Understanding the Storage Problem... 1 What Makes
Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION
Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated APRIl 2012 Table of Contents Introduction.... 3 Storage Protocol Comparison Table....4 Conclusion...10 About the
RAID Technology. RAID Overview
Technology In the 1980s, hard-disk drive capacities were limited and large drives commanded a premium price. As an alternative to costly, high-capacity individual drives, storage system developers began
Oracle Database 11g Direct NFS Client. An Oracle White Paper July 2007
Oracle Database 11g Direct NFS Client An Oracle White Paper July 2007 NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not
Moving Virtual Storage to the Cloud
Moving Virtual Storage to the Cloud White Paper Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage www.parallels.com Table of Contents Overview... 3 Understanding the Storage
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
Enabling Technologies for Distributed and Cloud Computing
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Multi-core CPUs and Multithreading
NETWORK ATTACHED STORAGE DIFFERENT FROM TRADITIONAL FILE SERVERS & IMPLEMENTATION OF WINDOWS BASED NAS
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology (IJCET), ENGINEERING ISSN 0976-6367(Print), ISSN 0976 & 6375(Online) TECHNOLOGY Volume 4, Issue (IJCET) 3,
Virtualizing the SAN with Software Defined Storage Networks
Software Defined Storage Networks Virtualizing the SAN with Software Defined Storage Networks Introduction Data Center architects continue to face many challenges as they respond to increasing demands
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE
COMPARING STORAGE AREA NETWORKS AND NETWORK ATTACHED STORAGE Complementary technologies provide unique advantages over traditional storage architectures Often seen as competing technologies, Storage Area
Wireless ATA: A New Data Transport Protocol for Wireless Storage
Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr
