Object Store Based SAN File Systems
|
|
|
- Helen Hopkins
- 9 years ago
- Views:
Transcription
1 Object Store Based SAN File Systems J. Satran A. Teperman IBM Labs, Haifa University, Mount Carmel, Haifa 31905, Israel Abstract SAN file systems today allow clients direct access to block devices for data storage and retrieval without going through a server. This however poses new challenges to file system designers such as security, scalability and management. The newly developed Object Stores (ObS) [5][6][9] enable applications to create and delete objects and to write and read byte ranges to/from objects. ObS provide space management abstraction, late binding, security, safe writes and other capabilities. Building a SAN file system using ObS as storage devices alleviates the challenges mentioned above. In this article we briefly detail these challenges and describe how ObS help in solving them. We then describe zfs, a scalable distributed file system which uses ObS. 1 Introduction The advent of high speed networks enables hooking up many storage devices and many computers together in what is called a Storage Area Network (SAN). In such an environment clients interact directly with the storage devices for data storage and retrieval without going through a server. This direct interaction and the high speed network enables building a high performance distributed file system; thus such systems are also referred to as SAN file systems. For such a system to work properly, a coordinating agent in required to coordinate clients' access to the shared data. This agent is usually called the Meta Data Server. In the past where SANs were being used in private Fibre Channel networks to emulate direct attached storage (i.e., no sharing), there was no real problem of security, scalability and management. The reason is that the file system was private thus the clients were trusted, and the file system itself was relatively small, so scalability and management were not a big problem. Once SANs started to be used as enterprise and Wide Area Network (WAN) file system allowing all clients direct access to the storage devices without server mediation, these issues became acute. Since clients can directly access storage devices to store and retrieve data, special care must be taken to provide security, so that one client will not accidentally corrupt the data of another or read its data. Furthermore, storage allocation is a problem; in case a client needs more space not available on the disk, how and who is responsible for allocating more space on another storage device. End-to-end management at a meaningful semantic level is also a problem. The newly introduced Object Stores [5] [6] [9] are developed to address these issues. Building a SAN file system using object stores as storage devices overcomes these problems and provides us with a scalable secure distributed file system which is comparatively easy to manage. In the next section we describe the components of a SAN file system. Section 3 describes the relevant characteristics of ObS followed by section 4 which describes how object stores can be used to build SAN file systems free of the problems mentioned earlier. A description of zfs, a scalable distributed file system using object stores, follows in section 5. Section 6 describes two file systems which use Object Stores followed by summary remarks in section 7. 2 SAN File System Components Figure 1 shows a typical configuration of SAN file system [1]. The configuration consists of a set of hosts (also referred to as nodes), a set of storage devices and networks that interconnect them. The configuration consists of the following components: A set of hosts/clients which read or generate data on the file system. These can be heterogeneous hosts running different operating systems. A cluster of Meta Data Servers to coordinate clients' access to the file system. There must be at least one metadata server, but for high availability several should be setup. A set of storage devices. These devices can be block devices, or a more elaborated storage sub-system which provides RAID virtualization over physical disks. In the remainder of the article we use the term Logical Unit (LU) to refer to such storage volumes. A network which connects the clients, metadata server and the block devices. This can be either Fibre Channel, iscsi or IP network. One or more administrative consoles that control the metadata servers. An IP network connecting the administrative console to clients and metadata servers. Note that the two networks can be merged into one. 1
2 Although SAN file system is a distributed file system, it provides applications with a single system image of the file system. In other words, data consistency for applications Protection is always needed when there is shared access to data. It is intended to address buggy clients, administrative errors, etc. One example of why protection is needed is that Figure 1. SAN File System Components running on different nodes and accessing the same file is the same as all applications running on a single node accessing the same file on a local file system. 3 Object Storage As mentioned before, SAN filesystems promise to improve storage access performance by providing non-mediated, shared access to storage. In a SAN Filesystem the data and control paths are separated. But the use of Block Storage in SAN's raises several issues. The most significant issue raised is probably security on a SAN. This issue exists even on closed networks but it will be exacerbated by the expected adoption of IP-based storage. In discussing SAN security we find it useful to distinguish between two concepts: security and protection. if an administrator incorrectly configures Logical Unit Number (LUN) masking 1, a Windows NT client that discovers a Logical Unit (LU) will assume it owns the LU, writing a signature on the LU, thereby causing a data integrity problem. Protection, as a defense against errors is thus needed even if we have a completely secured and trusted infrastructure. Security goes beyond protection in that it addresses intentional attempts at unauthorized access. Security is thus essential if the infrastructure, (e.g., storage network), is untrusted. 1 Masking is a common way of protecting whole disk units by making them invisible to clients. 2
3 Today, only minimal and very coarse grain support for security in a storage area network environment exists. In general, one must assume that the storage clients are trusted and the mechanisms that do exist such as zoning, LUN masking, etc., are hard to use and related to the physical structure of the storage. Thus, at best it is possible to provide all or nothing access to a LU for a given host. Doing significantly better than this very coarse level of access control in the context of today's block storage devices, is probably not practical. There are too many actively used blocks to provide block-level security and extent-level security as proposed in [2] is foreign to the way higher level software (in this case file systems) are organized to provide access control. For block-level security the storage unit cannot effectively take part in enforcing security decisions since it does not know which blocks need to have the same security attributes, i.e., the storage unit does not know which blocks are related. It would, thus, be necessary to tell the storage unit who is allowed to access each block which clearly would not make sense from the perspective of performance. For extent-level security the coordination required between a managing entity, client and the storage controller would be extensive. It is for this reason that most of the research on object storage has been driven by the need to provide SAN security [3]. A second issue that arises when trying to fully leverage a SAN is scalability. Scalability is not an issue unless hosts share access to volumes. However, shared access is one of the touted benefits of a SAN filesystem. Shared access requires coordination, and coordination can lead to scalability problems. For example, file systems must coordinate allocation of blocks to files and for shared read-write access clients must coordinate usage of data blocks with other clients. In SAN file systems built upon block storage, space allocation is managed by the metadata server, typically in concert with smart client involvement. By having the metadata server run on a cluster and partitioning responsibility between the nodes of the cluster, a good degree of scalability can be achieved. However, there are limits. This coordination can incur several costs including false contention between clients allocating space from different logical units and additional communication. In addition, since a metadata server runs on a traditional computer platform, i.e., one without a non-volatile RAM, there is either additional overhead to harden metadata updates, or a risk of (meta) data loss; since storage control units (typically) have some form of non-volatile RAM (e.g., to support fast writes) this support can be leveraged to harden metadata if the control unit was to perform space allocation. Unlike a traditional block-oriented control unit which provides access to data organized as an array of unrelated blocks, an object store allows access to data via storageobjects. A storage-object is a virtual entity that groups data considered by a client to be related. It is similar to a bytestream file in a flat file-system with a conceptually unlimited size. Space for a storage-object is allocated by the object store control unit on demand; in other words, sparse allocation is supported. The collection of storage-objects, i.e., an object store, forms what is essentially a flat file system. There is no name space -- just a flat ID space. The object store provides security enforcement for access to the storage-objects it contains but it does not provide security management, i.e., it is not the role of the object store to determine who is allowed to access an object -- it is the role of the object store to enforce access rights determined by some external security administrator. While different proposals for object storage vary in the details of the functions they provide, in almost all proposals an object store provides (at least) the following basic functionality: Create an object Delete an object Read from or write to a byte range within an object Format Get object storage info,... An object store provides a level of virtualization and aggregation; more significantly it provides data path security. Thus it is only natural for an object store to be in the data path. A good place to realize an object store is on a control unit. An object store control unit is an element of a scalable, networked storage infrastructure; each such control unit may export multiple object stores, just as a traditional block control unit exports multiple logical units. As described above, an object store is a paradigm shift that places more intelligence in the control unit and aims to address issues of security, scalability and management. An object store addresses security by securing all operations with a credential. Simply providing a credential on each operation, even if the credential is not cryptographically protected, provides protection since it is not realistically possible to accidentally present a valid credential for an operation. To provide security, however, some form of cryptographic protection on the credential is required. The goals of object store security are to provide increased protection/security at the level of objects rather than whole LUs, allow non-trusted hosts to sit in the SAN and allow shared access to storage without giving hosts access to all data on volume. In addition, since allocation metadata is not directly processed by hosts, an additional level of protection is provided by the cooperation of: 3
4 1. A security administrator -- a process that runs outside of the object store and which is responsible for authenticating users, authorizing their access and generating the credential 2. An object store client which must request the credential from the administrator and pass this credential to the object store on all operations 3. The object store itself which is responsible for validating the credential presented by the client. The metadata server in a SAN filesystem in a natural residence for a security administration component. Figure 2. Object Store Security Object stores improve scalability by distributing space allocation among storage controllers rather than doing this at the level of a metadata server. This means that no extra messages are required to coordinate allocation and there is no false contention for allocation to different object stores. In addition, since metadata recoverability is the storage controller's responsibility, we can leverage the non-volatile RAM typically found in a control unit. 4 ObS Based SAN File Systems Using Object Storage to build a SAN filesystem enhances considerably the filesystem scalability and some filesystem builders have chosen Object Storage as their building block mainly because of the enhanced scalability ( [4] ). Using object storage also considerably enhances security in a shared environment. Building a file system based on Object Storage however raises a new set of challenges. Object Storage is not built to support transactional operations. Even operations on a single object are not guaranteed to be atomic and stable. A write operation on an object might end with the object containing neither the old content nor the new content. Object Storage makes only very limited guarantees regarding its operations. Even more so operations that involve more than one object do not carry any guarantees. All modern file systems however provide strong guarantees on some operations (e.g., operations on directories) and recovery from many failures is very efficient. When using conventional file system operations in conjunction with an appropriate locking mechanism, users may provide atomicity guarantees to application data. When building an Object Store based file system we are faced with the challenge of providing this type of mechanisms in a form that keeps the scaling promise of Object Storage. Most of the local and distributed filesystems built based on block-storage have developed block based caching mechanisms. Extending caching to support Object Storage and make effective use of it is another challenge that has to be taken by the Object Storage builder. In addition the security mechanisms employed to insure data integrity on its way from storage to clients could possibly be extended to enable cooperative caching. For some classes of applications using the collective caching capability of a large number of clients might result in high gains in performance. With the extreme scaling enabled by Object Storage, active file management will have to be distributed to a larger number of machines. A file-system built on Object Storage may be able to use distribution techniques that are more efficient that the conventional clustering software and need no or very little group communication support. A Serverless structure will go a long way in improving file-system scalability. 5 zfs: An ObS Based Distributed File System zfs was designed to be a scalable distributed file system by separating storage-space management from file management. Storage-space management is carried out using ObSs, and file management is distributed over a set of cooperative machines [8]. These machines are commodity, off-the-shelf components such as PCs, running existing operating systems and high speed networks. While the current version of zfs does not address the issues of deployment policies and security management (access control), we believe that they can be distributed similarly to the way simple file management is distrusted today, and we plan to investigate these issue in the next version of zfs. 4
5 Files and directories in zfs are mapped to objects on object stores. The ObS does not distinguish between a file and a directory. Each file and directory in the file system is identified by a file pointer. The file pointer is a tuple <obsid,oid> where the obs-id identifies the object store where the object resides and the oid identifies the object within that object store. Figure 3 shows the overall architecture of zfs. The two most prominent features of zfs are its cooperative cache and distributed transactions. The cooperative cache of zfs (C-CACHE) integrates the memory of all participating machines into one coherent cache. Therefore, instead of going to the ObS for a block of data which already resides in the memory of one or more of the participating machines, the zfs cooperative cache retrieves the data block from the memory of another machine. The zfs front-end (FE) runs on every node participating in zfs. It presents the user with a standard file system API and provides access to zfs files and directories. To ensure data integrity, file systems use one form or another of a locking mechanism. zfs use leases rather than locks. The management of leases is split between two components: the lease manager (LMGR) and the file manager (FMGR). The lease manager acquires an ObS lease from the ObS and grants exclusive file leases on whole files to the file managers. The file manager, after getting the exclusive file lease, manages the range leases which it grants the front-ends. When the front-end reads or writes data blocks from/to the ObS, it uses the range lease which is verified by the ObS. The file managers monitors each read lease and write lease it grants, and keeps track of where each file's blocks and leases reside in an internal data structure. This information is used by the cooperative caching algorithm as described below. The file manager also handles lease conflicts and issues the downgrade/revoke commands accordingly. Figure 3. Overall architecture of zfs 2. All metadata operations: create file, delete file, create directory etc., are distributed transactions spanning several object stores. For example, create file may involve two object stores. One which holds the directory in which the file is created and other is the object store where the file itself is created. To ensure consistency in the presence of failures, such metadata operations are executed as distributed transaction by the Transaction Server (TSVR) component. All storage allocation and management in zfs is delegated to the Object Store devices. When a file is created and written to, the data blocks are sent to the ObS, which allocates space on the physical disk and writes the data on the allocated space. Usually, this is done asynchronously for performance reasons. 2 Although the figure shows TSVR, FMGR and LMGR running on each host, this is an extreme case. The other extreme is where non of the above runs on a host; only C-CACHE/FE must run on a host for it to participate in zfs. For details see [8]. Figure 4. Read request with/without Cooperative Cache Figure 4 shows the flow of control for a read operation in case the requested data resides in the memory of another 5
6 host, (which invokes the cooperative cache mechanism), and in case the data is not cached in the local memory of another host. Each opened file in zfs is managed by a single file manager assigned to it when the file is opened. The set of all currently active file managers manage all opened zfs files. Initially, no file has an associated file manager. The first machine to perform an open() on file F creates a local instance of the file manager for that file. Henceforth, and until that file manager is shut down, each lease request for any part of the file F, and from any participating machine is handled by this file manager 3. Building zfs from the components described above is expected to achieve high performance and scalability due to the following reasons: Separation of storage from file management Caching and metadata management are done on a different machine from the one storing the data, the ObS. Dynamic distribution of file and directory management across multiple machines is done when files and directory are opened. This offers superior performance and scalability compared to traditional server-based file systems. Use of cooperative caching Local cache miss, and load on ObS is reduced due to the use of the collective memory of all participating machines as a global cache. Lack of dedicated machines Any machine mounting zfs can run the file manager and lease manager. Hence, machines can automatically get exclusive access to files and directories when they are the sole users. Moreover, any machine in the system can assume the responsibility of failed components. For more details on the recovery mechanism see [8]. Use of Object Stores The use of ObS relieves the file system from handling metadata chores of allocating/removing and keeping track of disk blocks, thus reducing the overhead of the file system management. 6 Related Work There are very few SAN file systems which use Object Store and we give a short description of each here. Lustre [4] is a SAN file-system based on of three components: clients, Cluster control-system, and Storage Targets, connected together by a SAN. The clients see a cluster file system with standard POSIX semantics. The Cluster Control Systems does not handle files data; rather it manages name-space, metadata coherence, security 3 How other nodes find the corresponding file manager for F is described in [8]. and cluster recovery while directing clients to perform file I/O directly with storage targets. Target stores are Object Stores which are programmable allowing execution of modules downloaded to them. Lustre is an open-source project which is currently under development. StorageTank [7], is a SAN file system built in IBM and composed of clients, metadata servers and Storage. In the first version it will use SAN connected conventional block storage and will operate with trusted clients. Later versions will use Object Stores to enable Storage Tank operation with any client. Storage Tank is commercially available under the name SAN-FS. Clients and Object Stores are connected directly by a SAN, allowing efficient movement of large amounts of data. Metadata servers are connected to the other components by an IP network. The roles of the metadata servers are to maintain the file systems metadata state, and are responsible for all coherency and management choirs. Metadata servers may be clustered for scalability and fault-tolerance. 7 Summary SAN file systems based on bock devices poses security, scalability and management challenges which can hardly be answered by the existing technologies. The emerging Object Store technology alleviates these problems and allows large SAN file systems to share data among many clients in a secure and manageable way. While Object Stores address the current challenges they also introduce new ones, like the need to find new ways to execute transactional operations. Object Stores also create the opportunity to use cooperative caching between object stores and (with some additional provisions) between clients and thus further improve performance. These issues are subjects for our future research. 8 Acknowledgements We wish to thank Alain Azagury, Michael Factor, Kalman Meth, Ohad Rodeh, Uri Schonfeld and Avi Weit from IBM Research Labs in Haifa for their useful discussions on this subject. 9 References [1] IBM TotalStorage SAN File System Draft Protocol Specification. [2] M. K. Aguilera, M. Ji, M. Lillibridge, J. MacCormick, E. Oertli, D. Anderson, M. Burrows, T. Mann and C. A. Thekkath, Block-Level Security for Network- Attached Disks, Proceedings of FAST USENIX Conference on File and Storage Technologies, San Francico, CA, USA, March 31-April 2, 2003 [3] A. Azagury, V. Dreizin, M. Factor, E. Henis, D. Naor, N. Rinetzky, O. Rodeh, J. Satran, A. Tavori and L. Yerushalmi, Toward an Object Store, proceeding 20th 6
7 IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies,April 2003, [4] P. J. Braam, The Lustre Storage Architecture, Technical Report, Cluster File Systems, Inc., 2002, [5] G. A. Gibson, D. P. Nagle, K. Amiri, F. W. Chang, H. Gobioff, E. Reidel, D. Rochberg and J. Zelenka, Filesystems for network-attached secure disks, 1997 [6] G. A. Gibson, D. P. Nagle, K. Amiri, F. W. Chang, E. Feinberg, H. G. C. Lee, B. Ozceri, E. Reidel and D. Rochberg, A case for network-attached secure disks. Technical Report, CMU-CS , CMU 1996 [7] J. Menon, D. A. Pease, R. Rees, L. Duyanovich and B. Hillsberg, IBM Storage Tank A heterogenous scalable SAN file system, IBM SYSTEMS JOURNAL, Vol. 42, No. 2, 2003 [8] O. Rodeh and A. Teperman. zfs A Scalable Distributed File System Using Object Disks, proceeding 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies,April 2003, [9] J. Satran and M. Factor, Intelligent Storage Object Storage and Beyond, IPSI
Object Storage: The Future Building Block for Storage Systems
Object Storage: The Future Building Block for Storage Systems A Position Paper Michael Factor Kalman Meth Dalit Naor Ohad Rodeh Julian Satran IBM Haifa Research Laboratories {factor, meth, dalit, orodeh,
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
The functionality and advantages of a high-availability file server system
The functionality and advantages of a high-availability file server system This paper discusses the benefits of deploying a JMR SHARE High-Availability File Server System. Hardware and performance considerations
Software to Simplify and Share SAN Storage Sanbolic s SAN Storage Enhancing Software Portfolio
Software to Simplify and Share SAN Storage Sanbolic s SAN Storage Enhancing Software Portfolio www.sanbolic.com Table of Contents About Sanbolic... 3 Melio File System... 3 LaScala Volume Manager... 3
STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
Client/Server Computing Distributed Processing, Client/Server, and Clusters
Client/Server Computing Distributed Processing, Client/Server, and Clusters Chapter 13 Client machines are generally single-user PCs or workstations that provide a highly userfriendly interface to the
Security in Storage Networks A Current Perspective
Security in Storage Networks A Current Perspective Christian Cachin ZISC Colloquium www.zurich.ibm.com Overview Networked storage systems NAS, SAN, OBS Design options for security
Scala Storage Scale-Out Clustered Storage White Paper
White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current
Snapshots in Hadoop Distributed File System
Snapshots in Hadoop Distributed File System Sameer Agarwal UC Berkeley Dhruba Borthakur Facebook Inc. Ion Stoica UC Berkeley Abstract The ability to take snapshots is an essential functionality of any
How To Get To A Cloud Storage And Byod System
Maginatics Security Architecture What is the Maginatics Cloud Storage Platform? Enterprise IT organizations are constantly looking for ways to reduce costs and increase operational efficiency. Although
Sanbolic s SAN Storage Enhancing Software Portfolio
Software to Simplify and Share SAN Storage Sanbolic s SAN Storage Enhancing Software Portfolio Overview of Product Suites www.sanbolic.com Version 2.0 Page 2 of 10 Contents About Sanbolic... 3 Sanbolic
Storage and Print Solutions for SOHOs
1 Storage and Print Solutions for SOHOs Rajiv Mathews, Ravi Shankar T, Sriram P, Ranjani Parthasarathi Department Of Computer Science & Engineering, College Of Engineering, Guindy, Anna University, Chennai,
Using VMware ESX Server with IBM System Storage SAN Volume Controller ESX Server 3.0.2
Technical Note Using VMware ESX Server with IBM System Storage SAN Volume Controller ESX Server 3.0.2 This technical note discusses using ESX Server hosts with an IBM System Storage SAN Volume Controller
September 2009 Cloud Storage for Cloud Computing
September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009
PARALLELS CLOUD STORAGE
PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...
How To Build A Clustered Storage Area Network (Csan) From Power All Networks
Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require
Violin: A Framework for Extensible Block-level Storage
Violin: A Framework for Extensible Block-level Storage Michail Flouris Dept. of Computer Science, University of Toronto, Canada [email protected] Angelos Bilas ICS-FORTH & University of Crete, Greece
BackupEnabler: Virtually effortless backups for VMware Environments
White Paper BackupEnabler: Virtually effortless backups for VMware Environments Contents Abstract... 3 Why Standard Backup Processes Don t Work with Virtual Servers... 3 Agent-Based File-Level and Image-Level
Using Synology SSD Technology to Enhance System Performance Synology Inc.
Using Synology SSD Technology to Enhance System Performance Synology Inc. Synology_SSD_Cache_WP_ 20140512 Table of Contents Chapter 1: Enterprise Challenges and SSD Cache as Solution Enterprise Challenges...
Configuration Guide. Achieve Unified Management and Scale-Out of Multi-Site File-Serving Deployments Using Windows Server 2012 R2 and Sanbolic
Configuration Guide Achieve Unified Management and Scale-Out of Multi-Site File-Serving Deployments Using Windows Server 2012 R2 and Sanbolic Introduction One of the most popular workloads found in today
Making the Move to Desktop Virtualization No More Reasons to Delay
Enabling the Always-On Enterprise Making the Move to Desktop Virtualization No More Reasons to Delay By Andrew Melmed Director of Enterprise Solutions, Sanbolic Inc. April 2012 Introduction It s a well-known
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Microsoft SQL Server Always On Technologies
Microsoft SQL Server Always On Technologies Hitachi Data Systems Contributes Always On Storage Solutions A Partner Solutions White Paper By Rick Andersen and Simon Pengelly December 2006 Executive Summary
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters
COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly
Moving Virtual Storage to the Cloud
Moving Virtual Storage to the Cloud White Paper Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage www.parallels.com Table of Contents Overview... 3 Understanding the Storage
Moving Virtual Storage to the Cloud. Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage
Moving Virtual Storage to the Cloud Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage Table of Contents Overview... 1 Understanding the Storage Problem... 1 What Makes
EMC VNX Series: Introduction to SMB 3.0 Support
White Paper EMC VNX Series: Introduction to SMB 3.0 Support Abstract This white paper introduces the Server Message Block (SMB) 3.0 support available on the EMC VNX and the advantages gained over the previous
How To Virtualize A Storage Area Network (San) With Virtualization
A New Method of SAN Storage Virtualization Table of Contents 1 - ABSTRACT 2 - THE NEED FOR STORAGE VIRTUALIZATION 3 - EXISTING STORAGE VIRTUALIZATION METHODS 4 - A NEW METHOD OF VIRTUALIZATION: Storage
Building Storage Service in a Private Cloud
Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain
CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY
White Paper CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY DVTel Latitude NVMS performance using EMC Isilon storage arrays Correct sizing for storage in a DVTel Latitude physical security
Non-Stop for Apache HBase: Active-active region server clusters TECHNICAL BRIEF
Non-Stop for Apache HBase: -active region server clusters TECHNICAL BRIEF Technical Brief: -active region server clusters -active region server clusters HBase is a non-relational database that provides
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number
Big data management with IBM General Parallel File System
Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers
COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters
COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network
High Availability Storage
High Availability Storage High Availability Extensions Goldwyn Rodrigues High Availability Storage Engineer SUSE High Availability Extensions Highly available services for mission critical systems Integrated
IBM Tivoli Storage Manager Version 7.1.4. Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.4 Introduction to Data Protection Solutions IBM Note: Before you use this
OSDsim - a Simulation and Design Platform of an Object-based Storage Device
OSDsim - a Simulation and Design Platform of an Object-based Storage Device WeiYa Xi Wei-Khing For DongHong Wang Renuga Kanagavelu Wai-Kit Goh Data Storage Institute, Singapore xi [email protected]
VERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
Centralized Systems. A Centralized Computer System. Chapter 18: Database System Architectures
Chapter 18: Database System Architectures Centralized Systems! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types! Run on a single computer system and do
Introduction to Gluster. Versions 3.0.x
Introduction to Gluster Versions 3.0.x Table of Contents Table of Contents... 2 Overview... 3 Gluster File System... 3 Gluster Storage Platform... 3 No metadata with the Elastic Hash Algorithm... 4 A Gluster
Bigdata High Availability (HA) Architecture
Bigdata High Availability (HA) Architecture Introduction This whitepaper describes an HA architecture based on a shared nothing design. Each node uses commodity hardware and has its own local resources
Analisi di un servizio SRM: StoRM
27 November 2007 General Parallel File System (GPFS) The StoRM service Deployment configuration Authorization and ACLs Conclusions. Definition of terms Definition of terms 1/2 Distributed File System The
A Packet Forwarding Method for the ISCSI Virtualization Switch
Fourth International Workshop on Storage Network Architecture and Parallel I/Os A Packet Forwarding Method for the ISCSI Virtualization Switch Yi-Cheng Chung a, Stanley Lee b Network & Communications Technology,
Citrix XenServer Backups with SEP sesam
Citrix XenServer Backups with SEP sesam Contents Introduction and Overview...2 XenServer Backup Methods...2 Offline Backup... 3 Online Live Memory Backup... 3 Online Quiesced Backup... 4 Online Normal
Fault Tolerance in Hadoop for Work Migration
1 Fault Tolerance in Hadoop for Work Migration Shivaraman Janakiraman Indiana University Bloomington ABSTRACT Hadoop is a framework that runs applications on large clusters which are built on numerous
Using High Availability Technologies Lesson 12
Using High Availability Technologies Lesson 12 Skills Matrix Technology Skill Objective Domain Objective # Using Virtualization Configure Windows Server Hyper-V and virtual machines 1.3 What Is High Availability?
HP StorageWorks MPX200 Simplified Cost-Effective Virtualization Deployment
HP StorageWorks MPX200 Simplified Cost-Effective Virtualization Deployment Executive Summary... 2 HP StorageWorks MPX200 Architecture... 2 Server Virtualization and SAN based Storage... 3 VMware Architecture...
Configuring Windows Server Clusters
Configuring Windows Server Clusters In Enterprise network, group of servers are often used to provide a common set of services. For example, Different physical computers can be used to answer request directed
HDFS Space Consolidation
HDFS Space Consolidation Aastha Mehta*,1,2, Deepti Banka*,1,2, Kartheek Muthyala*,1,2, Priya Sehgal 1, Ajay Bakre 1 *Student Authors 1 Advanced Technology Group, NetApp Inc., Bangalore, India 2 Birla Institute
Optimizing Large Arrays with StoneFly Storage Concentrators
Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time
HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010
White Paper HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010 Abstract This white paper demonstrates key functionality demonstrated in a lab environment
VERITAS Volume Manager for Windows 2000
WHITE PAPER VERITAS Volume Manager for Windows 2000 CAMPUS CLUSTERING: USING VERITAS VOLUME MANAGER FOR WINDOWS WITH MICROSOFT CLUSTER SERVER (MSCS) Using Volume Manager for Windows with MSCS in Campus
EMC: The Virtual Data Center
EMC: The Virtual Data Center Dejan Živanovi EMC Technology Solution Group Sr. Technology Consultant High-End platforms & Business Continuity 1 Business Challenges Data growing at 70% annually 80% are files
Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
Storage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member
Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member March, 2010 Table of Contents Introduction...1 What is Multi-Tenancy?...2 Storage Multi-Tenancy...2 Enabling Cloud-Based Data Management CDMI...3
EMC Invista: The Easy to Use Storage Manager
EMC s Invista SAN Virtualization System Tested Feb. 2006 Page 1 of 13 EMC Invista: The Easy to Use Storage Manager Invista delivers centrally managed LUN Virtualization, Data Mobility, and Copy Services
Storage Challenges Created by a Virtualized Server Infrastructure. Agenda. State of server virtualization
Storage Challenges Created by a Virtualized Server Infrastructure Steve Norall Senior Analyst Taneja Group [email protected] Agenda State of server virtualization Four storage challenges created by
HDFS Users Guide. Table of contents
Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9
Optimizing the Performance of Your Longview Application
Optimizing the Performance of Your Longview Application François Lalonde, Director Application Support May 15, 2013 Disclaimer This presentation is provided to you solely for information purposes, is not
Using Synology SSD Technology to Enhance System Performance. Based on DSM 5.2
Using Synology SSD Technology to Enhance System Performance Based on DSM 5.2 Table of Contents Chapter 1: Enterprise Challenges and SSD Cache as Solution Enterprise Challenges... 3 SSD Cache as Solution...
Implementing Network Attached Storage. Ken Fallon Bill Bullers Impactdata
Implementing Network Attached Storage Ken Fallon Bill Bullers Impactdata Abstract The Network Peripheral Adapter (NPA) is an intelligent controller and optimized file server that enables network-attached
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL
CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter
Citrix XenServer Backups with Xen & Now by SEP
Citrix Backups with Xen & Now by SEP [email protected] www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW... 3 CITRIX XENDESKTOP ENVIRONMENT... 4 CITRIX DESKTOP DELIVERY CONTROLLER BACKUP... 5 CITRIX
Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008
Best Practices Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008 Installation and Configuration Guide 2010 LSI Corporation August 13, 2010
Introduction. Options for enabling PVS HA. Replication
Software to Simplify and Share SAN Storage Enabling High Availability for Citrix XenDesktop and XenApp - Which Option is Right for You? White Paper By Andrew Melmed, Director of Enterprise Solutions, Sanbolic,
A Survey of Shared File Systems
Technical Paper A Survey of Shared File Systems Determining the Best Choice for your Distributed Applications A Survey of Shared File Systems A Survey of Shared File Systems Table of Contents Introduction...
SECURE DATA PROTECTION WITH DOT HILL S BATCH REMOTE REPLICATION. Replication
SECURE DATA PROTECTION WITH DOT HILL S BATCH REMOTE REPLICATION Replication TABLE OF CONTENTS 1 Scope... 3 2 Prerequisites...3 3 Introduction and Overview... 3 4 Design Goals... 4 5 Data Transport... 5
EMC Unified Storage for Microsoft SQL Server 2008
EMC Unified Storage for Microsoft SQL Server 2008 Enabled by EMC CLARiiON and EMC FAST Cache Reference Copyright 2010 EMC Corporation. All rights reserved. Published October, 2010 EMC believes the information
Four Reasons To Start Working With NFSv4.1 Now
Four Reasons To Start Working With NFSv4.1 Now PRESENTATION TITLE GOES HERE Presented by: Alex McDonald Hosted by: Gilles Chekroun Ethernet Storage Forum Members The SNIA Ethernet Storage Forum (ESF) focuses
Cloud and Big Data initiatives. Mark O Connell, EMC
Object storage PRESENTATION systems: TITLE GOES the underpinning HERE of Cloud and Big Data initiatives Mark O Connell, EMC SNIA Legal Notice The material contained in this tutorial is copyrighted by the
FlexArray Virtualization
Updated for 8.2.1 FlexArray Virtualization Installation Requirements and Reference Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
Review from last time. CS 537 Lecture 3 OS Structure. OS structure. What you should learn from this lecture
Review from last time CS 537 Lecture 3 OS Structure What HW structures are used by the OS? What is a system call? Michael Swift Remzi Arpaci-Dussea, Michael Swift 1 Remzi Arpaci-Dussea, Michael Swift 2
High Performance Computing OpenStack Options. September 22, 2015
High Performance Computing OpenStack PRESENTATION TITLE GOES HERE Options September 22, 2015 Today s Presenters Glyn Bowden, SNIA Cloud Storage Initiative Board HP Helion Professional Services Alex McDonald,
Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2
Installing and Configuring a SQL Server 2014 Multi-Subnet Cluster on Windows Server 2012 R2 Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 Assumptions...
VMware Virtual Machine Protection
VMware Virtual Machine Protection PowerVault DL Backup to Disk Appliance Dell Symantec Symantec DL Appliance Team VMware Virtual Machine Protection The PowerVault DL Backup-to-Disk Appliance Powered by
Maxta Storage Platform Enterprise Storage Re-defined
Maxta Storage Platform Enterprise Storage Re-defined WHITE PAPER Software-Defined Data Center The Software-Defined Data Center (SDDC) is a unified data center platform that delivers converged computing,
SAN Implementation Course SANIW; 3 Days, Instructor-led
SAN Implementation Course SANIW; 3 Days, Instructor-led Course Description In this workshop course, you learn how to connect Windows, vsphere, and Linux hosts via Fibre Channel (FC) and iscsi protocols
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Backup Exec 9.1 for Windows Servers. SAN Shared Storage Option
WHITE PAPER Optimized Performance for SAN Environments Backup Exec 9.1 for Windows Servers SAN Shared Storage Option 11/20/2003 1 TABLE OF CONTENTS Executive Summary...3 Product Highlights...3 Approaches
Managing Microsoft Office SharePoint Server Content with Hitachi Data Discovery for Microsoft SharePoint and the Hitachi NAS Platform
Managing Microsoft Office SharePoint Server Content with Hitachi Data Discovery for Microsoft SharePoint and the Hitachi NAS Platform Implementation Guide By Art LaMountain and Ken Ewers February 2010
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*
A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program
Getting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
VMware Virtual Machine File System: Technical Overview and Best Practices
VMware Virtual Machine File System: Technical Overview and Best Practices A VMware Technical White Paper Version 1.0. VMware Virtual Machine File System: Technical Overview and Best Practices Paper Number:
E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.
E-Series NetApp E-Series Storage Systems Mirroring Feature Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)
RAID technology and IBM TotalStorage NAS products
IBM TotalStorage Network Attached Storage October 2001 RAID technology and IBM TotalStorage NAS products By Janet Anglin and Chris Durham Storage Networking Architecture, SSG Page No.1 Contents 2 RAID
Maximizing Your Investment in Citrix XenDesktop With Sanbolic Melio By Andrew Melmed, Director of Enterprise Solutions, Sanbolic Inc. White Paper September 2011 www.sanbolic.com Introduction This white
3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
PARALLELS CLOUD STORAGE
PARALLELS CLOUD STORAGE The Ideal Storage Solution for Hosters 1 Table of Contents Introduction... 3 The Problem with Direct Attached Storage... 3 The Solution: Parallels Cloud Storage... Error! Bookmark
Operating system Dr. Shroouq J.
3 OPERATING SYSTEM STRUCTURES An operating system provides the environment within which programs are executed. The design of a new operating system is a major task. The goals of the system must be well
GeoCloud Project Report GEOSS Clearinghouse
GeoCloud Project Report GEOSS Clearinghouse Qunying Huang, Doug Nebert, Chaowei Yang, Kai Liu 2011.12.06 Description of Application GEOSS clearinghouse is a FGDC, GEO, and NASA project that connects directly
Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
Improving Application Performance, Scalability, and Availability using Microsoft Windows Server 2008 and NLB with Sanbolic Melio FS and SAN Storage
Improving Application Performance, Scalability, and Availability using Microsoft Windows Server 2008 and NLB with Sanbolic Melio FS and SAN Storage (A step-by-step guide) www.sanbolic.com Software to Simplify
