OceanStor UDS Massive Storage System Technical White Paper Reliability

Size: px
Start display at page:

Download "OceanStor UDS Massive Storage System Technical White Paper Reliability"

Transcription

1 OceanStor UDS Massive Storage System Technical White Paper Reliability Issue 1.1 Date HUAWEI TECHNOLOGIES CO., LTD.

2 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Website: Huawei Industrial Base Bantian, Longgang Shenzhen People's Republic of China i

3 Contents Contents 1 Executive Summary Overview Intended Audience Decentralized Architecture End-to-End Data Protection Smart Disk Level: Disk Lifecycle Management Node Level: Erasure Code Redundancy Algorithm Data Center Level: Cross-Regional Disaster Recovery and Switchover Continuous Data Detection and Repair Short-Term Fault Handling Data Integrity End-to-End Consistency Conclusion A Acronyms and Abbreviations ii

4 1 Executive Summary 1 Executive Summary From the day when storage came into being, data security has become a focus in the professional storage area. Different levels of storage products are created to meet different requirements on performance, data security, and costs. No matter how advanced a storage system is, its system software or universal hardware may be faulty. Some faults will have immediate impacts on system availability, for example, a faulty disk, CPU, or main board. Some faults may be found only when data is being read or written, for example, a faulty file system, data partition, or memory. Therefore, an excellent storage system should be able to minimize impacts on system availability caused by software and hardware faults using a well-designed architecture and take measures to ensure data integrity. In the past, the design of the disk storage was mainly targeted at online enterprise services. Therefore, the requirements for quick response have higher priorities than those for reliability and recoverability. As data has been growing explosively, data is closely connected to and is taking a greater role in people's daily life. Cloud service providers are more concerned about data reliability because it is the foundation of their services. In the cloud storage infrastructure, data reliability not system latency should be the first concern because the storage system latency is far too small to be a system bottleneck compared with network latency. However, if data integrity is neglected, data is at risk and user data loss will have great impacts on cloud service providers or even put them in legal risks. Requirements for disk backup and archiving are soaring in enterprise applications. Similarly, in backup and archiving, data reliability not system performance should be the first concern. However, if data integrity is neglected, data is at risk. When duplicates of primary data or archiving data are lost, data recovery may be impossible. Most current disk backup and archiving systems are based on inexpensive disks. Although those systems have inherited the design concept of mainstream storage arrays, they actually improve performance by sacrificing data reliability. The HUAWEI OceanStor UDS massive storage system (the UDS for short) is an innovative massive storage product based on public cloud, disk backup, and archiving. 1

5 2 Overview 2 Overview The UDS is a new breakthrough in storage system design. The UDS design has taken into consideration of requirements for public cloud, backup, and archiving. The UDS brings a new design concept of decentralized architecture which is based on algorithm addressing and refined reliability and scalability which are based on extreme total cost of ownership control (TCO) control. This white paper will focus on the reliability design of the UDS in the following three aspects: Reliability revolution brought by the decentralized architecture End-to-end fault prevention and control Continuous data detection and repair The UDS can perform end-to-end data test to ensure that users can get the data availability protection corresponding to the Service Level Agreement (SLA) policy they have set. 2.1 Intended Audience This white paper is intended for Huawei customers, technical consultants, partners, and anyone who is interested in UDS reliability. 2

6 3 UDS Reliability Framework and Technology Overview 3.1 Decentralized Architecture The UDS uses a decentralized architecture the sea of disks (SoD) framework. The storage layer and the access layer are located in two separate cluster rings, namely the access cluster and the storage cluster. The storage cluster is made of smart disks which are distributed in the distributed hash table (DHT) ring. Figure 3-1 shows the UDS architecture. Figure 3-1 UDS architecture Data flow Access layer SoD engine Storage layer Distributed hash table ring SmartDisk Storage cluster The distributed data storage ring consists of all the smart disks. When data needs to be stored in the UDS, the access node partitions the data and stores the data to different smart disks on the DHT ring based on the storage addresses calculated by the hash algorithm. Before data is stored onto smart disks, the access node automatically detects the status of the smart disks and then stores data onto different smart disks based on the status of each disk. In this way, load in the storage layer is automatically balanced, greatly reducing the load sharing on each smart disk and avoiding single points of failure. 3

7 If any smart disk is faulty (manmade or mechanical), data on this disk can be recovered to other smart disks automatically. The damaged disk can be removed from the UDS without affecting data availability and data partitioning. Unlike the traditional storage system, a RAID group in the UDS will not be degraded nor will other disks be damaged due to a faulty disk. With the decentralized architecture, immediate maintenance is not needed, reducing data loss risks caused by human factors. When one of the two following conditions is met, all the faulty smart disks can be maintained in batches: 1. When the failure rate or the capacity threshold reaches the upper limit, critical alarms are generated informing customers of replacing disks in batches or expanding the capacity. In this way, maintenance period is prolonged and the maintenance costs are reduced. Examples for critical alarms: The disk damage rate reaches 6% or the capacity exceeds 85%. 2. Customers are advised to create a routine maintenance table. During the maintenance period, all the damaged or slow smart disks are replaced in batches, reducing the possibility of system faults. After batch replacement is completed, data partitions are redistributed to normal nodes through the smart balancing algorithm, ensuring disk lifespan, lowering disk failure rate, reducing data loss, and improving system reliability. Access cluster 1. All the access nodes are connected by the load balancer to form a distributed access node cluster. Access nodes do not exchange data with each other and only synchronize status information of smart disks through the Gossip mechanism. All the access nodes do not control and save layout information of data and metadata because the DHT hash algorithm will automatically calculate the data storage position. 2. This innovation is a great breakthrough in storage structure. In the traditional storage structure, data layout is determined by the controller and then recorded. In the UDS structure, the access node determines the data flow direction through rules and do not record and determine the layout information. This change has greatly simplified the work of access nodes and resolves the biggest bottleneck for cluster scalability and reliability. The complicated data synchronization and lock mechanism is no longer needed between clusters, which has eliminated restrictions on the number of clustered systems. The data synchronization and lock mechanism limits the expansion of the clustered system and is a great risk for consistency and reliability of the clustered system. 3. With the UDS's decentralized architecture, any access node fault (man-made or mechanical) will have no impacts on system availability. With the use of node overload control, impacts on the whole system from access nodes will be reduced. 3.2 End-to-End Data Protection Smart Disk Level: Disk Lifecycle Management The annual failure rates of enterprise-level disks and desktop disks are about 2% and 6% respectively due to reliability problems of mechanical disks. The UDS disk lifecycle management focuses on how to lower failure rates of disks and control impacts brought by faulty disks. The disk lifecycle management consists of disk detection, disk repair, disk failure control, and pre-reconstruction technologies. 4

8 1. Disk detection: The UDS detects different properties of disks, such as data throughput performance, motor startup time, and seek failure rate and compares those data with standard values. Then the UDS adjusts weights of each smart disk. Furthermore, the UDS predicts disk faults using the SMART statistics of disks and moves the data before a disk is faulty, reducing the workload for reconstruction. 2. Disk repair: When a disk is faulty, the UDS repairs the bad logical sector. If the fault still exists, the unrecoverable sector is isolated. The UDS then starts to reconstruct data in this sector. The reconstruction process usually takes a short time and is automatic, which prevents human errors. 3. Disk failure control and pre-reconstruction: If a disk cannot be repaired, the UDS will consider the disk invalid and start the pre-reconstruction structure to eliminate risks. Figure 3-2 shows the disk failure detection process. Figure 3-2 Disk failure detection process The disk lifecycle management greatly reduces disk damage rate, prolongs disk lifespan, and has the following advantages: 1. Automatic hardware control: In the self-management smart disk architecture, smart disks can monitor, control, recover themselves and perform data synchronization selectively, making it possible for refined hardware management and recovery. In this way, system robustness is improved and hardware faults are reduced. 2. A 0.7% minimum annual disk failure rate: The disk lifecycle management can effectively reduce disk failure rate. It repairs and isolates bad physical and logical sectors in a timely manner with real-time monitoring of disk status. Furthermore, the weight management can balance data and service load, prolong disk lifespan, and reduce disk failure rate to 0.7% Node Level: Erasure Code Redundancy Algorithm The disk capacity has been growing recently, increasing from several hundred GB to 2 TB and 3 TB. Disks of 6 TB and 10 TB will be applied in a large scale very soon. Large-capacity disks, while bringing high cost-efficiency, make disk data security (disk reconstruction in particular) a more serious problem. A traditional RAID group is made of member disks and hot spare disks. When a disk is faulty, a hot spare disk will replace the faulty disk and the storage system will reconstruct the data. In RAID 5, when no data is written onto a 2 TB disk, the reconstruction takes 20 hours and when data is written onto the disk, the reconstruction may take a week. When data is being reconstructed, system performance and reliability are greatly compromised. If one more disk is faulty in the RAID 5 group, data in the whole RAID 5 group will be lost because the RAID 5 only allows one disk to fail at a time. 5

9 To tackle those challenges, Huawei develops the Erasure Code (EC) redundancy algorithm, which is a superset of RAID. The UDS arranges smart disks in a unified storage pool called the DHT ring. Data is written onto the storage system based on the redundancy policy. The system writes data blocks and parity blocks as objects to random smart disks. Smart disks automatically manage all the internal objects and physical space corresponding to those objects. If any object and its space are faulty, the UDS will move the object or repair the bad sector to avoid reconstructing of the whole disk. Even in some special cases where the whole disk needs to be reconstructed, the smart disk will clone healthy data units to a new smart disk in advance and only verify and calculate the faulty data. In this way, reconstruction time is greatly decreased and data loss caused by multiple faulty disks is reduced. Working principle of EC The EC mainly contains the following three parts: 1. Creating storage pools: All the disks are constructed as a DHT ring based on a certain rule. The DHT ring technology introduced here is basic to the EC technology. 2. Partitioning objects: The UDS uses the EC technology to divide objects into data partitions of fixed length. Based on the EC algorithm, every M data partitions have N parity blocks. Then the UDS writes the data partitions to different smart disks based on the DHT hash algorithm and smart disks determine the location for saving the data. Figure 3-3 shows the partitioning principle of the EC algorithm. Figure 3-3 Partitioning principle of the EC algorithm In the UDS, customers can define the values for M and N of the EC algorithm. Different tenants and sub-tenants can configure different EC policies. The EC policy is part of the SLA in the multi-tenant model. A bigger N means higher data reliability but a lower data utilization rate. The biggest N can be 6. A maximum of 6 smart disks or storage nodes can be faulty simultaneously. The maximum allowed number of faulty disks (not exceeding 6) is related to the total number of disks. Compared with the redundancy protection provided by RAID, the UDS can offer customers with better protection. In the EC policy, M (the number of data blocks) = {12/15}, N (the number of parity blocks) = {3/6}. The EC policy, disk type, and number of nodes have direct impacts on data durability. 3. Balanced object saving: The UDS writes data to different storage nodes based on the DHT hash algorithm. If any hardware faults occur during the data write, the short-term fault handling mechanism is started (see section "Short-Term Fault Handling"). Figure 3-4 shows the principle of the DHT ring hash algorithm. 6

10 Figure 3-4 Principle of the DHT ring hash algorithm Refined EC reconstruction algorithm To further improve data durability, Huawei created the refined EC reconstruction algorithm to recover the seemingly unrecoverable data. Smart disks manage partitioned objects and space, determine the range of lost data by scanning, and divide the EC group dynamically to reconstruct the lost data. In Figure 3-5, M is 6 and N is 2. Four disks have data damaged but the UDS only allows two disks to be recovered because N is 2. Therefore, some data will be lost. Figure 3-5 shows the data partitioning before the reconstruction. Figure 3-5 Data partitioning before the reconstruction To improve system reliability and availability and prevent data damage and loss, the UDS will start the refined EC reconstruction algorithm. The procedure of the EC algorithm is as follows: 7

11 1. Smart disks scan the physical areas of partitions and determine the range and size of damaged data partitions. 2. Based on the range and size of the damaged partitions, the EC group is divided temporarily to ensure that each EC has only N damaged partitions at most. Figure 3-6 shows the divided EC groups: Erasure Code 1-1 (0 KB to 300 KB), Erasure Code 1-2 (300 KB to 700 KB), and Erasure Code 1-3 (700 KB to 1024 KB). One EC group is temporarily divided into multiple EC groups (in this example, the number is 3) so that each divided EC group has not more than N damaged disks. 3. The UDS reconstructs damaged data in temporary EC groups. Figure 3-6 shows the data partitioning after the reconstruction. Figure 3-6 Data partitioning after the reconstruction The EC algorithm brings the following innovations: 1. Better data durability: When EC configuration is M:N=15:6, data reliability can reach %, minimizing data loss risks. 2. Faster data reconstruction speed: The UDS distributes data objects to different smart disks for reconstruction. Multiple disks are involved in the reconstruction, increasing the capacity for parallel reconstruction and reducing the reconstruction time for 1 TB data to four hours. This has greatly reduced the reconstruction time and improved system reliability. 3. Reconstruction of damaged data only: Data reconstruction is based on objects and only damaged objects are reconstructed. Intact objects or empty regions are not processed. In this way, data reconstruction rate is greatly increased. 4. Global hot spare and batch disk replacement: The UDS uses global hot spare space not hot spare disks for data reconstruction. When the failure rate of smart disks reaches the threshold, the UDS will send alarms for disk replacement. In the UDS, immediate maintenance is not needed, reducing quantities of spare parts and upgrade cycle and saving inputs of maintenance personnel. 5. Elimination of restrictions on data recovery and enhanced EC recoverability: Compared with the RAID algorithm, the refined EC reconstruction algorithm can effectively reduce restrictions on the quantity of damaged data. Any damaged data block can be recovered fully, which enhances data durability and system reliability. 6. More flexible data redundancy and improved disk utilization rate: The available EC policy configuration for tenants is as follows: M (the number of data blocks) ={12/15}, N (the number of parity blocks) = {3/6}. The EC policy, which is defined based on user environment, has direct impacts on data durability and provides users with flexible 8

12 redundancy ratio configuration and more choices of data durability. The EC algorithm can flexibly control the disk utilization rate and reduce costs. For example, when M is 12 and N is 3, the disk utilization rate is nearly 80%. 7. Enhanced storage management efficiency and lowered costs: Users do not need to spend much time on storage planning because all the disks automatically form a unified storage pool, and users only need to insert new disks to expand the system capacity. The UDS will automatically distribute data to each disk. 8. Smart reconstruction of EC groups and lowered system load: The UDS intelligently determines the range and size of the damaged data. It temporarily reconstructs EC groups and segments the data to be recovered, which reduces system load and improves recovery efficiency Data Center Level: Cross-Regional Disaster Recovery and Switchover Service continuity is an inherent attribute of massive storage. Running of operators' cloud storage systems and backup and archiving systems of enterprises all rely on service continuity. Meanwhile, service continuity is more and more independent on the storage system's disaster recovery capacity to tackle all risks and challenges. A traditional disaster recovery system consists of three data centers in two regions (one active and two standby centers). The disaster recovery center only processes backup requests from the active data center, which greatly wastes storage resources. If a customer has multiple data centers that work in active-standby mode for one another or all data centers are related, the investment costs may be huge. The UDS uses the active-active data center mode and synchronizes data using the asynchronous data replication policies. Users can access the nearest UDS system to maximize resource utilization and reduce investments. The active-active mode will be implemented by the end of 2014 and the UDS currently uses the active-standby mode. The UDS supports multiple data centers and provides cross-regional data redundancy policies. When disasters or unpredicted events happen in the active data center, user data will not be lost and service data can be quickly recovered in standby data centers, reducing service interruption duration and ensuring service continuity. In addition to protecting data and supporting service continuity, multiple data centers supported by the UDS can maximize resource utilization and increase users' return on investment through resource management and smart load balancing. Figure 3-7 shows the networking for multiple data centers. Figure 3-7 Networking for multiple data centers 9

13 Not all the data needs to be stored in multiple data centers to improve durability. Some data in the UDS may need a high durability while some data only need an ordinary durability. Therefore, the SLA policy is used to differentiate durability of different data. Base on the multi-tenant multi-data center (MDC) technology, multiple data centers have the following advantages: 1. Unified resource scheduling: Multiple data centers use global virtualization technology to establish unified storage pools and consolidate resources, increasing resource utilization rate. Based on the scheduling policy, user can put and get objects on the nearest data center 2. SLA policy control: Based on the SLA contracting mechanism, the UDS can control the disaster recovery, quantity of disaster backup, and quality of service (QoS) to support customer services and optimize service and resource utilization. 3. Cross-regional disaster recovery: Data centers implement remote backup and data verification through the disaster recovery port HTTP/REST to optimize data transmission through the Internet and to improve disaster recovery efficiency. Data centers provide disaster recovery for one another to optimize resource utilization. 3.3 Continuous Data Detection and Repair Short-Term Fault Handling Although many reliability technologies are available, computer hardware may occasionally be faulty. In a storage system, disk drive faults are the most common problems. Some partial and temporary faults may also occur. For example, one disk block cannot be read, or one bit of the interconnection or internal system bus is faulty. The UDS defines a special intermediate state: short-term fault state. If the UDS detects a short-term fault, it will start the fault diagnosis mechanism and try to rectify the fault. If the 10

14 recovery fails and the fault persists for more than X (X can be defined, for example 15 minutes), the fault goes to the permanent fault state and exits from the DHT ring. The UDS starts the data recovery policy to recover damaged data. Figure 3-8 shows the change of fault states. Figure 3-8 Change of fault states Data Integrity The short-term fault handing technology has the following advantages: 1. Improved data and performance stability: Only the faults that cannot be detected and rectified by the short-term handling mechanism are considered permanent faults and require adjusting the DHT ring, reducing the workload for data recovery and migration. 2. Transparent to upper-layer services and enhanced service continuity: The short-term fault handling mechanism is invisible to upper-layer services, ensuring service continuity and durability. 3. Efficient system performance utilization and increased data recovery rate: After a fault is considered as a permanent fault, the UDS starts the data rebalancing process and distributes damaged data to multiple nodes through effective data distribution control. The UDS provides multiple-level data integrity protection measures and supports four-level data repair function: track, partition, object, and data center. When damaged data is detected, the UDS handles the faults as follows: 1. Try to recover data using disk track level repair. 2. If data cannot be recovered, the UDS tries to repair data through redundant data blocks with EC algorithm. 3. If data still cannot be recovered, the EC refined reconstruction technology repairs data of bad sectors by dividing the EC group and reading undamaged data in multiple damaged objects. 4. If all the three methods fail, the UDS tries to recover the damaged data through backup data centers. Figure 3-9 shows the processing flowchart for damaged data. 11

15 Figure 3-9 Processing flowchart for damaged data Damaged data is detected. Succeeded Track level repair Succeeded Failed Block verification repair Failed Succeeded EC refined repair Failed Succeeded Remote backup repair The repair is completed. The data integrity protection measures effectively ensure end-to-end data durability and have the following advantages: 1. Four-level integrity protection, ensuring data durability: The UDS provides end-to-end repair measures for damaged data with track, partition, object, and data center level integrity protection. 2. Different levels of recovery measures, reducing resource utilization caused by data recovery: Based on the degree of data damage, the UDS tries to recover the data in a range as small as possible to reduce resource utilization End-to-End Consistency The UDS supports end-to-end data consistency verification, which can be divided into the following four levels: 1. Application level: The UDS uses the verification of the TCP/IP and HTTP protocols to ensure that data received from and sent to users are correct. 2. Object level: At the access node, the MD5 algorithm verifies data objects. 3. Partition level: Each partition carries the verification fields calculated by the HMAC SHA256 algorithm. After smart disks receive data partitions, they check whether the partitions are correct. 4. Physical level: Each partition and its verification code are verified by the track cyclic redundancy check (CRC) after written onto the disk. Figure 3-10 shows different levels of UDS data consistency verification. 12

16 Figure 3-10 Different levels of UDS data consistency verification With four levels of data verification measures, the UDS ensures that no silence errors occur during the data writing process (from the time when data is sent by end users to the time when data is written onto the disk). In each level, once incorrect data verification is detected, the UDS can repair or resend the data quickly. The end-to-end data consistency verification greatly improves data security and has the following advantages: 1. Data will not be damaged in storage and transmission, ensuing data correctness. 2. Possible malicious data tampering from internal personnel of cloud storage service providers is prevented, increasing data security. 13

17 4 Conclusion 4 Conclusion No single technologies can ensure data availability and integrity independently. Data reliability can be ensured only with the combination of multiple mechanisms to tackle all risks. Different from traditional storage systems, the UDS is designed for reliability and scalability and has the following advantages: The decentralized architecture that is based on algorithm addressing provides an excellent solution to system reliability problems, enhancing data integrity and recoverability. With the smart disks, the UDS can control software and hardware faults and data integrity in a refined manner. The end-to-end data protection policies ensure that hardware and software faults at any levels, such as smart disks, storage nodes, cabinets, and data centers can be handled properly to protect data availability. With uninterrupted real-time data detection and repair, the UDS can automatically find out and repair potential faults before they become problems. Huawei UDS, with its innovative architecture and focuses on reliability, provides a highly reliable, extensible, and low-cost massive storage solution for customers. 14

18 A Acronyms and Abbreviations A Acronyms and Abbreviations Table A-1 Acronyms and abbreviations Acronyms and Abbreviations UDS SoD A-node UDSN Full Spelling UDS massive storage system Sea of Disks Access Node Universal Distributed Storage Node 15

Huawei OceanStor UDS Massive Storage System Technical White Paper

Huawei OceanStor UDS Massive Storage System Technical White Paper Huawei OceanStor UDS Massive Storage System Technical White Paper Issue 1.1 Date 2014-06 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this

More information

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be

More information

Huawei Business Continuity and Disaster Recovery Solution

Huawei Business Continuity and Disaster Recovery Solution Huawei Business Continuity and Disaster Recovery Solution Contents 01 Great Challenges to Business Continuity and Disaster Recovery 02 Huawei Business Continuity and Disaster Recovery Solution 02 Application

More information

Doc. Code. OceanStor VTL6900 Technical White Paper. Issue 1.1. Date 2012-07-30. Huawei Technologies Co., Ltd.

Doc. Code. OceanStor VTL6900 Technical White Paper. Issue 1.1. Date 2012-07-30. Huawei Technologies Co., Ltd. Doc. Code OceanStor VTL6900 Technical White Paper Issue 1.1 Date 2012-07-30 Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

OceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD.

OceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD. OceanStor 9000 InfoProtector Technical White Paper Issue 01 Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may

More information

Technical White Paper for the Oceanspace VTL6000

Technical White Paper for the Oceanspace VTL6000 Document No. Technical White Paper for the Oceanspace VTL6000 Issue V2.1 Date 2010-05-18 Huawei Symantec Technologies Co., Ltd. Copyright Huawei Symantec Technologies Co., Ltd. 2010. All rights reserved.

More information

HUAWEI OceanStor Enterprise Storage System Success Cases

HUAWEI OceanStor Enterprise Storage System Success Cases Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies

More information

HUAWEI OceanStor 18000 Series Enterprise Storage System Disaster Recovery White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01.

HUAWEI OceanStor 18000 Series Enterprise Storage System Disaster Recovery White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. HUAWEI OceanStor 18000 Series Enterprise Storage System Issue 01 Date 2013-12-30 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any

More information

End-to-end Data integrity Protection in Storage Systems

End-to-end Data integrity Protection in Storage Systems End-to-end Data integrity Protection in Storage Systems Issue V1.1 Date 2013-11-20 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in

More information

IBM System Storage DS5020 Express

IBM System Storage DS5020 Express IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (Fibre Channel/iSCSI) enables SAN tiering Balanced performance well-suited

More information

Key Messages of Enterprise Cluster NAS Huawei OceanStor N8500

Key Messages of Enterprise Cluster NAS Huawei OceanStor N8500 Messages of Enterprise Cluster NAS Huawei OceanStor Messages of Enterprise Cluster NAS 1. High performance and high reliability, addressing bid data challenges High performance: In the SPEC benchmark test,

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read

More information

Business-centric Storage FUJITSU Hyperscale Storage System ETERNUS CD10000

Business-centric Storage FUJITSU Hyperscale Storage System ETERNUS CD10000 Business-centric Storage FUJITSU Hyperscale Storage System ETERNUS CD10000 Clear the way for new business opportunities. Unlock the power of data. Overcoming storage limitations Unpredictable data growth

More information

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything

BlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest

More information

How To Build A Clustered Storage Area Network (Csan) From Power All Networks

How To Build A Clustered Storage Area Network (Csan) From Power All Networks Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require

More information

Oceanspace Series Storage Product Technical White Paper for the WORM

Oceanspace Series Storage Product Technical White Paper for the WORM Technical White Paper for the WORM Issue 01 Release Date 2009-12-01 Huawei Symantec Technologies Co., Ltd. Copyright Chengdu Huawei Symantec Technologies CO., Ltd. 2010. All rights reserved. No part of

More information

OceanStor 18500/18800/18800F Data Sheet

OceanStor 18500/18800/18800F Data Sheet Huawei OceanStor 18500/18800/18800F enterprise storage systems (the OceanStor 18000 series for short) are optimal storage platforms for next-generation data centers. Secure, trusted, flexible, and efficient,

More information

High Availability Design Patterns

High Availability Design Patterns High Availability Design Patterns Kanwardeep Singh Ahluwalia 81-A, Punjabi Bagh, Patiala 147001 India kanwardeep@gmail.com +91 98110 16337 Atul Jain 135, Rishabh Vihar Delhi 110092 India jain.atul@wipro.com

More information

DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering

DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering DELL RAID PRIMER DELL PERC RAID CONTROLLERS Joe H. Trickey III Dell Storage RAID Product Marketing John Seward Dell Storage RAID Engineering http://www.dell.com/content/topics/topic.aspx/global/products/pvaul/top

More information

Huawei N2000 NAS Storage System Technical White Paper

Huawei N2000 NAS Storage System Technical White Paper Huawei N2000 NAS Storage System Technical White Paper Issue 2.1 Date 2012-10-19 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any

More information

HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010

HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010 White Paper HIGHLY AVAILABLE MULTI-DATA CENTER WINDOWS SERVER SOLUTIONS USING EMC VPLEX METRO AND SANBOLIC MELIO 2010 Abstract This white paper demonstrates key functionality demonstrated in a lab environment

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

Huawei Cloud Data Center Solution

Huawei Cloud Data Center Solution Huawei Cloud Data Center Solution Copyright Huawei Technologies Co., Ltd. 2015. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior

More information

WHITE PAPER. QUANTUM LATTUS: Next-Generation Object Storage for Big Data Archives

WHITE PAPER. QUANTUM LATTUS: Next-Generation Object Storage for Big Data Archives WHITE PAPER QUANTUM LATTUS: Next-Generation Object Storage for Big Data Archives CONTENTS Executive Summary....................................................................3 The Limits of Traditional

More information

Scala Storage Scale-Out Clustered Storage White Paper

Scala Storage Scale-Out Clustered Storage White Paper White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current

More information

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c

An Oracle White Paper January 2013. A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c An Oracle White Paper January 2013 A Technical Overview of New Features for Automatic Storage Management in Oracle Database 12c TABLE OF CONTENTS Introduction 2 ASM Overview 2 Total Storage Management

More information

Availability Digest. MySQL Clusters Go Active/Active. December 2006

Availability Digest. MySQL Clusters Go Active/Active. December 2006 the Availability Digest MySQL Clusters Go Active/Active December 2006 Introduction MySQL (www.mysql.com) is without a doubt the most popular open source database in use today. Developed by MySQL AB of

More information

Big data management with IBM General Parallel File System

Big data management with IBM General Parallel File System Big data management with IBM General Parallel File System Optimize storage management and boost your return on investment Highlights Handles the explosive growth of structured and unstructured data Offers

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

How To Create A Network Access Control (Nac) Solution

How To Create A Network Access Control (Nac) Solution Huawei Terminal Security Management Solution Create Enterprise Intranet Security Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security

More information

Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems

Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems Fault Tolerance & Reliability CDA 5140 Chapter 3 RAID & Sample Commercial FT Systems - basic concept in these, as with codes, is redundancy to allow system to continue operation even if some components

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

FLASH STORAGE SOLUTION

FLASH STORAGE SOLUTION Invest in the right FLASH STORAGE SOLUTION A guide for the savvy tech buyer Introduction You re looking at flash storage because you see it s taking the storage world by storm. You re interested in accelerating

More information

W H I T E P A P E R E n t e r p r i s e S t o r a g e S y s t e m : S e c u r e a n d T r u s t e d

W H I T E P A P E R E n t e r p r i s e S t o r a g e S y s t e m : S e c u r e a n d T r u s t e d Room 02/03/05/06 F12 Tower D, Global Trade Center No.36 North Third Ring Road Dongcheng District Beijing 100013 People's Republic of China +86 10 5889 1666 W H I T E P A P E R E n t e r p r i s e S t o

More information

How To Make A Backup System More Efficient

How To Make A Backup System More Efficient Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem October, 2006 Introduction Data de-duplication has recently gained significant industry attention,

More information

Accelerate Oracle Performance by Using SmartCache of T Series Unified Storage

Accelerate Oracle Performance by Using SmartCache of T Series Unified Storage Accelerate Oracle Performance by Using SmartCache of T Series Unified Storage This document describes why and how to use SmartCache in Oracle OLTP database to accelerate the transaction performance. SmartCache

More information

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All

More information

RAID Basics Training Guide

RAID Basics Training Guide RAID Basics Training Guide Discover a Higher Level of Performance RAID matters. Rely on Intel RAID. Table of Contents 1. What is RAID? 2. RAID Levels RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID 0+1 RAID 1E

More information

SDN, a New Definition of Next-Generation Campus Network

SDN, a New Definition of Next-Generation Campus Network SDN, a New Definition of Next-Generation Campus Network Contents Campus Evolution and Development Trends... 1 Three Changes to Drive the Campus Network Development... 2 Fundamental Changes in User Behaviors...2

More information

INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT

INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California

More information

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei FusionCloud Desktop Solution

HUAWEI TECHNOLOGIES CO., LTD. Huawei FusionCloud Desktop Solution HUAWEI TECHNOLOGIES CO., LTD. Huawei FusionCloud Desktop Solution User side TC CT3000 CT5000 Data center Desktop software FusionAccess Login page WI Cloud platform software Connection control HDC VM VM

More information

EMC DATA DOMAIN DATA INVULNERABILITY ARCHITECTURE: ENHANCING DATA INTEGRITY AND RECOVERABILITY

EMC DATA DOMAIN DATA INVULNERABILITY ARCHITECTURE: ENHANCING DATA INTEGRITY AND RECOVERABILITY White Paper EMC DATA DOMAIN DATA INVULNERABILITY ARCHITECTURE: ENHANCING DATA INTEGRITY AND RECOVERABILITY A Detailed Review Abstract No single mechanism is sufficient to ensure data integrity in a storage

More information

Using Multipathing Technology to Achieve a High Availability Solution

Using Multipathing Technology to Achieve a High Availability Solution Using Multipathing Technology to Achieve a High Availability Solution Table of Contents Introduction...3 Multipathing Technology...3 Multipathing I/O Implementations...5 Storage Redundancy...5 Infortrend

More information

Software-Defined Networks Powered by VellOS

Software-Defined Networks Powered by VellOS WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible

More information

Huawei Smart Education Solution

Huawei Smart Education Solution Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

EMC XtremSF: Delivering Next Generation Storage Performance for SQL Server

EMC XtremSF: Delivering Next Generation Storage Performance for SQL Server White Paper EMC XtremSF: Delivering Next Generation Storage Performance for SQL Server Abstract This white paper addresses the challenges currently facing business executives to store and process the growing

More information

Huawei esight Brief Product Brochure

Huawei esight Brief Product Brochure Huawei esight Brief Product Brochure esight Integrated Enterprise NMS As the network scales and the number of enterprise network applications continue to grow, so does the number of devices, such as multi-service

More information

Application Brief: Using Titan for MS SQL

Application Brief: Using Titan for MS SQL Application Brief: Using Titan for MS Abstract Businesses rely heavily on databases for day-today transactions and for business decision systems. In today s information age, databases form the critical

More information

NSS Volume Data Recovery

NSS Volume Data Recovery NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management

More information

Understanding EMC Avamar with EMC Data Protection Advisor

Understanding EMC Avamar with EMC Data Protection Advisor Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection

More information

Business white paper Invest in the right flash storage solution

Business white paper Invest in the right flash storage solution Business white paper Invest in the right flash storage solution A guide for the savvy tech buyer Business white paper Page 2 Introduction You re looking at flash storage because you see it s taking the

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

Protect Microsoft Exchange databases, achieve long-term data retention

Protect Microsoft Exchange databases, achieve long-term data retention Technical white paper Protect Microsoft Exchange databases, achieve long-term data retention HP StoreOnce Backup systems, HP StoreOnce Catalyst, and Symantec NetBackup OpenStorage Table of contents Introduction...

More information

Virtualization s Evolution

Virtualization s Evolution Virtualization s Evolution Expect more from your IT solutions. Virtualization s Evolution In 2009, most Quebec businesses no longer question the relevancy of virtualizing their infrastructure. Rather,

More information

Mirror File System for Cloud Computing

Mirror File System for Cloud Computing Mirror File System for Cloud Computing Twin Peaks Software Abstract The idea of the Mirror File System (MFS) is simple. When a user creates or updates a file, MFS creates or updates it in real time on

More information

High Availability with Windows Server 2012 Release Candidate

High Availability with Windows Server 2012 Release Candidate High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions

More information

Network Attached Storage. Jinfeng Yang Oct/19/2015

Network Attached Storage. Jinfeng Yang Oct/19/2015 Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability

More information

Photonic Switching Applications in Data Centers & Cloud Computing Networks

Photonic Switching Applications in Data Centers & Cloud Computing Networks Photonic Switching Applications in Data Centers & Cloud Computing Networks 2011 CALIENT Technologies www.calient.net 1 INTRODUCTION In data centers and networks, video and cloud computing are driving an

More information

Get Success in Passing Your Certification Exam at first attempt!

Get Success in Passing Your Certification Exam at first attempt! Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with

More information

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management Business-centric Storage for small and medium-sized enterprises How DX powered by Intel Xeon processors improves data management DX Online Storage Family Architecture DX60 S2 DX100 S3 DX200 S3 Flexible

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

VRRP Technology White Paper

VRRP Technology White Paper Issue 01 Date 2012-08-31 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster

More information

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER

STORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead

More information

SQL Server 2012 Performance White Paper

SQL Server 2012 Performance White Paper Published: April 2012 Applies to: SQL Server 2012 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication.

More information

Distribution One Server Requirements

Distribution One Server Requirements Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Why clustering and redundancy might not be enough This paper discusses today s options for achieving

More information

Intel RAID Controllers

Intel RAID Controllers Intel RAID Controllers Best Practices White Paper April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial release. Modifications

More information

OceanStor 18500/18800/18800F Enterprise Storage System

OceanStor 18500/18800/18800F Enterprise Storage System The OceanStor 18500/18800/18800F is an ideal storage platform for the new-generation data center, featuring secure and trusted, flexible and efficient. The OceanStor is suited for mission-critical applications

More information

ORACLE COHERENCE 12CR2

ORACLE COHERENCE 12CR2 ORACLE COHERENCE 12CR2 KEY FEATURES AND BENEFITS ORACLE COHERENCE IS THE #1 IN-MEMORY DATA GRID. KEY FEATURES Fault-tolerant in-memory distributed data caching and processing Persistence for fast recovery

More information

Configuring Celerra for Security Information Management with Network Intelligence s envision

Configuring Celerra for Security Information Management with Network Intelligence s envision Configuring Celerra for Security Information Management with Best Practices Planning Abstract appliance is used to monitor log information from any device on the network to determine how that device is

More information

Huawei Agile WAN Solution

Huawei Agile WAN Solution Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management Business-centric Storage for small and medium-sized enterprises How DX powered by Intel Xeon processors improves data management Data management requirements are increasing day by day Storage administrators

More information

System Infrastructure Non-Functional Requirements Related Item List

System Infrastructure Non-Functional Requirements Related Item List System Infrastructure Non-Functional Requirements Related Item List April 2013 Information-Technology Promotion Agency, Japan Software Engineering Center Copyright 2010 IPA [Usage conditions] 1. The copyright

More information

Advanced Knowledge and Understanding of Industrial Data Storage

Advanced Knowledge and Understanding of Industrial Data Storage Dec. 3 rd 2013 Advanced Knowledge and Understanding of Industrial Data Storage By Jesse Chuang, Senior Software Manager, Advantech With the popularity of computers and networks, most enterprises and organizations

More information

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies

More information

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V

Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...

More information

Introduction to NetApp Infinite Volume

Introduction to NetApp Infinite Volume Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in

More information

EMC XtremSF: Delivering Next Generation Performance for Oracle Database

EMC XtremSF: Delivering Next Generation Performance for Oracle Database White Paper EMC XtremSF: Delivering Next Generation Performance for Oracle Database Abstract This white paper addresses the challenges currently facing business executives to store and process the growing

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

Nimble Storage for VMware View VDI

Nimble Storage for VMware View VDI BEST PRACTICES GUIDE Nimble Storage for VMware View VDI N I M B L E B E S T P R A C T I C E S G U I D E : N I M B L E S T O R A G E F O R V M W A R E V I E W V D I 1 Overview Virtualization is an important

More information

The Sierra Clustered Database Engine, the technology at the heart of

The Sierra Clustered Database Engine, the technology at the heart of A New Approach: Clustrix Sierra Database Engine The Sierra Clustered Database Engine, the technology at the heart of the Clustrix solution, is a shared-nothing environment that includes the Sierra Parallel

More information

Quantum StorNext. Product Brief: Distributed LAN Client

Quantum StorNext. Product Brief: Distributed LAN Client Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without

More information

Definition of RAID Levels

Definition of RAID Levels RAID The basic idea of RAID (Redundant Array of Independent Disks) is to combine multiple inexpensive disk drives into an array of disk drives to obtain performance, capacity and reliability that exceeds

More information

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number

More information

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery

More information

Monitoring DoubleTake Availability

Monitoring DoubleTake Availability Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

Doc. code. Huawei OceanStor T Series Technical White Paper. Issue V3.0. Date 201211 HUAWEI TECHNOLOGIES CO., LTD.

Doc. code. Huawei OceanStor T Series Technical White Paper. Issue V3.0. Date 201211 HUAWEI TECHNOLOGIES CO., LTD. Doc. code Huawei OceanStor T Series Technical White Paper Issue V3.0 Date 201211 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document

More information

White Paper Storage for Big Data and Analytics Challenges

White Paper Storage for Big Data and Analytics Challenges White Paper Storage for Big Data and Analytics Challenges Abstract Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10

More information

Building a Flash Fabric

Building a Flash Fabric Introduction Storage Area Networks dominate today s enterprise data centers. These specialized networks use fibre channel switches and Host Bus Adapters (HBAs) to connect to storage arrays. With software,

More information

Long term retention and archiving the challenges and the solution

Long term retention and archiving the challenges and the solution Long term retention and archiving the challenges and the solution NAME: Yoel Ben-Ari TITLE: VP Business Development, GH Israel 1 Archive Before Backup EMC recommended practice 2 1 Backup/recovery process

More information

The Data Placement Challenge

The Data Placement Challenge The Data Placement Challenge Entire Dataset Applications Active Data Lowest $/IOP Highest throughput Lowest latency 10-20% Right Place Right Cost Right Time 100% 2 2 What s Driving the AST Discussion?

More information