Designing a Video Proxy for the Access Network
|
|
- Ariel Simpson
- 7 years ago
- Views:
Transcription
1 Designing a Video Proxy for the Access Network Stijn Eeckhaut, Emmanuel Vanneste, Stijn De Smet, Brecht Vermeulen, Piet Demeester Ghent University - IBBT - IMEC Department of Information Technology (INTEC) Gaston Crommenlaan 8/201, B-9050 Gent, Belgium stijn.eeckhaut@intec.ugent.be, Tel: Abstract Large deployments of time-shifted TV and Video on Demand (VoD) require a distributed architecture with video proxies close to the consumers in order to be scalable. This paper illustrates how we can build such a video proxy without specialized hardware, but rather with components readily available, and with a number of transfer protocols with good open source implementations. Given the large number of video proxies needed in a TV distribution network, this implies a number of benefits while keeping performance and reliability levels at an enterprise level. 1. Introduction Figure 1 depicts a general setup of a TV distribution network. TV can be viewed live from a Broadcast Server, or on-demand from a central Video on Demand (VoD) server which has access to the full catalogue of offered TV programs. In order to be able to provide a rich catalogue, this central server will typically need several hundreds of Terabytes of storage. Current storage solutions for this amount of data typically consist of a Storage Area Network (SAN) based on the Fibre Channel (FC) protocol, and typically use expensive SCSI hard disks as storage medium. Whereas this central VoD server is ideal for not frequently requested programs, it is not for time-shifted TV or VoD of popular TV programs. In this case we will need geographically dispersed video proxies in the aggregation network, close to the customers (caching on multiple levels between the central server and the customers is also possible), in order to optimize bandwidth in the aggregation network and to relieve the load on the central system. These video proxies could also be built with the more expensive components on the market, but there are a number of reasons why it would be interesting to use common hardware and protocols for it. First, the amount of storage needed for a video proxy can be quite moderate. Suppose for example a network provider who wants to store last week s primetime programs (4 hours per day) of the 6 most popular TV channels, together with the 20 most popular films at the moment (each with a duration of 2 hours). This would mean that a capacity of 208 hours is needed. At a bit rate of 4 Mbps (~ 2 GByte/hour) approximately 500 GB of netto storage would be needed to store all this content. For bit streams of 20 Mbps this rises to nearly 2 TB of netto storage. Hard disks of 750 GB are appearing on the market at the time of writing. The throughput of 1 disk will off course not be sufficient for a video proxy, but a system (or combination of systems) with a number of disk drives combined into a RAID array could offer not only the needed capacity, but also sufficient throughput and high reliability levels. Second, a large number of video proxy servers will be needed, so a considerable cost saving could be achieved with a generic storage solution. Further, a Fibre Channel Storage Area Network would be a good idea (and current common practice) to provide enterprise reliability and storage capacity for the central VoD server or a regional (intermediate) proxy server. But Fibre Channel has also a number of disadvantages: high hardware costs, and the fact that special training is needed for the IT staff to master their Fibre Channel skills. These skills are generally not part of the common knowledge in opposition to Ethernet or IP networks. In this paper we will illustrate how a valuable alternative can be built using common (IP-based) hardware. At last, the contents of the proxy will be highly dynamic, and will only consist of a small part of the offered program catalogue. The data preservation strategy for a video proxy should merely be focused on protecting its functioning against smaller failures such as a failing disk. Data preservation against loss, disasters, should be realized on the central VoD system, so appropriate actions should be taken at the central site for that. In the following sections we will describe a number of design decisions to be made to construct a media storage solution with commodity hardware and generally known block and file transfer protocols. The proposals we present can equally be used in systems for digital file-based media production. Figure 1: TV distribution network ISBN13 : Paper Th1A5 Eeckhaut Page 1 of 5
2 2. Designing 1 storage entity: SCSI versus SATA disks Historically, low cost (S)ATA disks have been used in desktop environments, and high reliability SCSI disks have been used in high-end storage systems. SCSI disks have a lower capacity (up to 150 GB), but offer better seek times and better performance due to higher rotational speeds of the disk (up to rpm). They also offer more reliability due to their lower bit areal density (leading to higher drive design operating margins) and extended design verification testing. SCSI disks are traditionally also better armed against rotational vibrations, a phenomenon that occurs when multiple hard disk drives are packaged together and the effect of the seek acceleration is transmitted from the seeking hard disk drive to another hard disk drive that is writing. SATA disks on the other hand offer higher capacities (up to 750 GB) at a lower price, but in most cases also lower reliability and lower performance (typical rotational speed: 7200 rpm). It is however possible to obtain high storage system reliability with moderate reliability individual drives by requiring appropriate SATA drive reliability testing, RAID 1 designs that insure data reconstruction with 2 drives failed (RAID 6 for example), and storage system management of drive failure warnings. A possible procedure for this last item is to make a precautionary backup to a hot spare drive after a warning by the SMART failure prediction system of a drive [1]. Recently the storage manufacturers have also come up with Enterprise SATA disks [2], with the high capacities that can be expected from SATA disks, but with a number of improvements to give them a reliability level which could until recently only be found in SCSI disks. This will further drive the adoption of SATA disks in high-end storage systems. In our experimental comparison of a number of contemporary SCSI and SATA disks we observed that - when the caching policy of the SATA drive is set to write through - the hard disk with the better specs (SCSI) was able to give the best results. However, when the caching policy of the SATA drive is set to write back, both disk types performed equally. Although a write back policy can cause consistency problems in case of a serious failure, this is expected not to be problematic because of the nature of the stored content on a video proxy server. So SATA disks with a write back cache are a good alternative to SCSI disks in this case, both in the field of throughput as in the field of reliability (when the necessary precautions are taken). Typical sizes for a disk cache are 8 and 16 MB. 3. Designing 1 storage entity: combining multiple disks Depending on the type of workload, a single disk is able to offer 5 to 70 MB/s of throughput. In order to offer higher storage throughput and fault tolerance, disks are combined into RAID arrays. Different RAID levels exist, each with their own characteristics [3]. These RAID levels can be implemented in hardware (on a dedicated PCI-X or PCIe card) or in software. This brings us to the following 1 RAID: Redundant Array of Independent Disks. question: in what cases can we justify the extra cost of a hardware RAID controller, and in what cases is software RAID a good alternative? The answer is mainly dependent on the RAID level and the type of disks. Software RAID is most suited for RAID types not requiring high computation levels. RAID 0 for example only stripes 2 blocks over different disks without taking care of redundancy. RAID 1 only creates 2 disks which are exact copies of each other. As a consequence these RAID levels can use software RAID without loading the host CPU too much. These assertions were confirmed during our experiments. Hardware RAID shows its advantage when a computation intensive RAID level has to be implemented. RAID 5 for example not only stripes data blocks over different disks, but also calculates and stores parity information in order to be able to reconstruct the RAID array after 1 disk failure. RAID 6 is similar, but allows 2 disk failures without data loss. Our experiments showed that the CPU load of the host was considerable when using RAID 6 together with software RAID and a sequential access pattern, which proves the necessity for hardware RAID for a heavily loaded RAID 6 system. Hardware RAID will also be needed when the number of disks exceeds the number of connections on the host motherboard. Current RAID controller implementations support up to 24 SATA disks per controller [4]. Another advantage of a hardware RAID controller is its controller cache. A typical size for a RAID controller cache is 128 MB to 1 GB. Using this cache in write back mode, the controller can further optimize write traffic to the disks of the RAID array by regrouping write commands. Our experiments showed that a performance increase was possible for sequential writes using this technique for different RAID levels. In a realistic load scenario, with multiple users each writing a large sequential file to different locations on the storage, we observed that a hardware RAID 5 array (with 3 SATA disks) was able to nearly reach the same performance as a hardware RAID 5 array of SCSI disks, by using the write back controller cache. The same observations hold for a RAID 0 array. So just like using the disk cache of a SATA disk, it seems beneficial from a performance viewpoint to use the RAID controller cache. Of course, we have to make the same remarks on file system inconsistency when using the RAID controller cache. Although this can be partially countered by a journaling file system or file system check, we note again that our system is used to implement a video proxy server, so the stored data are not as valuable as the master copy on the central video server, which is the place where disaster recovery should be implemented. Given the fact that we want to store large video files, we should also consider using large stripe sizes when using a RAID 0, 5 or 6 array. 2 Striping : spreading out logically sequential blocks of a file across multiple disk drives in a round-robin fashion. ISBN13 : Paper Th1A5 Eeckhaut Page 2 of 5
3 4. Designing a system: combining storage entities into a system In one of our experiments we determined the performance of an AMD Opteron 144 system with an Areca ARC1160 PCI-X SATA RAID Controller and 12 SATA disks of 500 GB in a RAID 6 configuration with an xfs file system (5 TB of netto storage). With 100 simultaneous reads and 10 writes to the RAID array we were able to reach 50 MB/s for reading, and 20 MB/s for writing, enough to provide content from hard disk to 100 customers at video bit rates of 4 Mbps, while still writing 40 new items to the cache. If a just requested program can (partially) be kept in main memory on the proxy for a small period of time, it is even possible to serve subsequent requests for the same program directly from memory. The RAID 6 array showed a performance decrease of 30% when operating in degraded mode (1 disk failure), and 70% when operating in rebuilding mode, so scheduled rebuilds during off-peak periods (early morning) should be considered. With approximately a hundred possible users per entity, and approximately 500 DSL connections per DSLAM 3, it is clear that a number of storage entities will be needed to satisfy all cache requests of the home users during peak periods. A number of entities could be clustered together with the GFS distributed file system [5] to provide 1 single logical view of all storage (see Figure 2). In such a scenario, each entity will export its storage as a block device over an IP network (forming an IP Storage Area Network) with GNBD 4 [6] or iscsi 5 [7], and the GFS file system will abstract all storage to a single logical view. Another way to assemble multiple storage entities into a system, is to let each entity have its own file system, and to provide a kind of mapping service on top of the set of storage entities to locate the cached content (see Figure 3). As there is a tendency to expand the functionality of the DSLAM, this could be an extra function for the DSLAM. 10 Gigabit Ethernet could be used to connect storage entities to the DSLAM. iscsi or GNBD could again be used to export the block devices on the storage entities to the DSLAM. In this case, block based storage access is especially interesting because it enables home users to efficiently have interaction with the content (pause, rewind, fast forward, skip a part of a program, ). Figure 3: IP SAN with content mapping service Figure 2: IP SAN with GFS distributed file system 3 DSLAM: Digital Subscriber Line Access Multiplexer 4 GNBD: Global Network Block Device 5 iscsi: Internet Small Computer Systems Interface During our experiments we were able to fill an Ethernet Gigabit link with iscsi and NBD traffic, so on the network level these protocols promise to be a scalable solution for block based access. Redundancy on a system level can be enforced by constructing a RAID over multiple exported block devices. This can be done by a distributed file system such as GFS, or even with a manual configuration. Future possibilities also include cluster aware RAID: a number of block devices are exported to the network and seen by other nodes as 1 physical volume. Subsequently each node can define its own logical volume(s) in the physical volume and use it as its own. 5. File transfer between systems For streaming broadcast TV (on a multicast channel) from the servers to the customers, the Real Time Protocol (RTP) [8] seems a logical choice. RTP can also be used to offer time-shifted TV: when a TV program is broadcast on a multicast channel, the regional servers and proxies can cache the content with sufficiently large sliding windows [9]. This allows users to watch the content with a small time-shift, or allows them to replay the last minutes of a ISBN13 : Paper Th1A5 Eeckhaut Page 3 of 5
4 broadcast program while the content can still be offered by a video cache. For VoD, there are also other options to distribute the content to the home users. Suppose now that a home user requests a film or a previously broadcast TV program not yet available in the video proxy. The video file will have to be fetched from a regional or the central server (or a peer proxy), streamed to the client, and - depending on the expected popularity of the requested item - also stored on the video proxy system. If the decision is made to keep a copy of the item on the video proxy, a number of possibilities exist to transfer the item to the proxy. A first possibility is to make use of the RTP protocol. While the content is streamed with RTP from the central or a regional server to the home user, a copy is stored on the video proxy when the content passes the DSLAM and video proxy (see Figure 4). However, when the user starts to interact with the content (for example skipping a part of the program) only a part of the program will be cached by the video proxy. A subsequent request from another user in the same neighbourhood for the same program will be complicated by the fact that only a part of the file will be available in the video cache. Another possibility is to copy the whole file completely to the video proxy server upon reception of a request from a home user. A file transfer protocol such as FTP could be used to transfer the entire file faster than real time (see Figure 5). In the mean time, streaming (with RTP) from the proxy to the home user can already start. When the user skips a part of the content after a while, the content can be served from the proxy directly while still leaving the possibility to let another user watch the skipped content from the proxy. Another, more static solution would be to transfer new content to the proxy automatically during off-peak periods (early morning). For these faster than real time transfers, FTP - which transfers whole files with minimal overhead over a data TCP connection - is preferable to block based transfer methods like NFS or SMB/CIFS. The performance penalty that a large round trip time (RTT) between proxy and central server can cause with these block based transfer patterns can be very substantial. Special implementations of the FTP protocol exist to meet a number of specific requirements for optimized reliable data transfer in high bandwidth wide area networks (WANs). GridFTP [10] implements a number of interesting features, including multiple data channels for parallel transfers (see Figure 6), partial file transfers, third-party (direct server-to-server) transfers, reusable data channels, and command pipelining. 6. Conclusions In this paper we illustrated how commodity hardware components and a number of block and file transfer protocols with good open source implementations can help to build a VoD proxy out of generic elements, without sacrificing performance and reliability. Given the nature of the content to be stored in a VoD proxy, and the large number of video proxies needed in a TV distribution network, this forms a valuable alternative to current highend storage solutions. Figure 4: Streaming from the central server (RTP) Figure 5: File transfer to the proxy (FTP) + streaming from the proxy (RTP) Figure 6: File transfer to the proxy with parallel transfers (FTP) + streaming from the proxy (RTP) ISBN13 : Paper Th1A5 Eeckhaut Page 4 of 5
5 References 1. Hughes, G.F., Murray J.F., Reliability and Security of RAID Storage Systems and D2D Archives Using SATA Disk Drives, ACM Transactions on Storage, Vol. 1, No. 1 (Dec. 2004), pp Seagate Enterprise SATA disk: es.html 3. Description of RAID types: 4. Areca SATA Raid host adapters: 5. Red Hat Global File System (GFS): 6. Global Network Block Device (GNBD): 7. Internet Small Computer Systems Interface (iscsi): 8. Real Time Protocol : 9. Gilon, E. et al, Demonstration of an IP Aware Multi- Service Access Network, BB Europe, Bordeaux, Dec GridFTP: ISBN13 : Paper Th1A5 Eeckhaut Page 5 of 5
CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY
White Paper CONFIGURATION GUIDELINES: EMC STORAGE FOR PHYSICAL SECURITY DVTel Latitude NVMS performance using EMC Isilon storage arrays Correct sizing for storage in a DVTel Latitude physical security
More informationThe functionality and advantages of a high-availability file server system
The functionality and advantages of a high-availability file server system This paper discusses the benefits of deploying a JMR SHARE High-Availability File Server System. Hardware and performance considerations
More informationDELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering
DELL RAID PRIMER DELL PERC RAID CONTROLLERS Joe H. Trickey III Dell Storage RAID Product Marketing John Seward Dell Storage RAID Engineering http://www.dell.com/content/topics/topic.aspx/global/products/pvaul/top
More informationAgenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
More informationQ & A From Hitachi Data Systems WebTech Presentation:
Q & A From Hitachi Data Systems WebTech Presentation: RAID Concepts 1. Is the chunk size the same for all Hitachi Data Systems storage systems, i.e., Adaptable Modular Systems, Network Storage Controller,
More informationRAID technology and IBM TotalStorage NAS products
IBM TotalStorage Network Attached Storage October 2001 RAID technology and IBM TotalStorage NAS products By Janet Anglin and Chris Durham Storage Networking Architecture, SSG Page No.1 Contents 2 RAID
More informationPARALLELS CLOUD STORAGE
PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...
More informationImplementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive
Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have
More informationImplementing a Digital Video Archive Based on XenData Software
Based on XenData Software The Video Edition of XenData Archive Series software manages a digital tape library on a Windows Server 2003 platform to create a digital video archive that is ideal for the demanding
More informationWHITE PAPER BRENT WELCH NOVEMBER
BACKUP WHITE PAPER BRENT WELCH NOVEMBER 2006 WHITE PAPER: BACKUP TABLE OF CONTENTS Backup Overview 3 Background on Backup Applications 3 Backup Illustration 4 Media Agents & Keeping Tape Drives Busy 5
More informationDependable Systems. 9. Redundant arrays of. Prof. Dr. Miroslaw Malek. Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs
Dependable Systems 9. Redundant arrays of inexpensive disks (RAID) Prof. Dr. Miroslaw Malek Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs Redundant Arrays of Inexpensive Disks (RAID) RAID is
More informationAdvanced Knowledge and Understanding of Industrial Data Storage
Dec. 3 rd 2013 Advanced Knowledge and Understanding of Industrial Data Storage By Jesse Chuang, Senior Software Manager, Advantech With the popularity of computers and networks, most enterprises and organizations
More informationHow To Build A Clustered Storage Area Network (Csan) From Power All Networks
Power-All Networks Clustered Storage Area Network: A scalable, fault-tolerant, high-performance storage system. Power-All Networks Ltd Abstract: Today's network-oriented computing environments require
More informationVMware Virtual SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014
VMware SAN Backup Using VMware vsphere Data Protection Advanced SEPTEMBER 2014 VMware SAN Backup Using VMware vsphere Table of Contents Introduction.... 3 vsphere Architectural Overview... 4 SAN Backup
More informationHow To Create A Multi Disk Raid
Click on the diagram to see RAID 0 in action RAID Level 0 requires a minimum of 2 drives to implement RAID 0 implements a striped disk array, the data is broken down into blocks and each block is written
More informationStorage benchmarking cookbook
Storage benchmarking cookbook How to perform solid storage performance measurements Stijn Eeckhaut Stijn De Smet, Brecht Vermeulen, Piet Demeester The situation today: storage systems can be very complex
More informationRAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1
RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.
More informationHigh Availability Server Clustering Solutions
White Paper High vailability Server Clustering Solutions Extending the benefits of technology into the server arena Intel in Communications Contents Executive Summary 3 Extending Protection to Storage
More informationImplementing an Automated Digital Video Archive Based on the Video Edition of XenData Software
Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software The Video Edition of XenData Archive Series software manages one or more automated data tape libraries on
More informationTechnology Update White Paper. High Speed RAID 6. Powered by Custom ASIC Parity Chips
Technology Update White Paper High Speed RAID 6 Powered by Custom ASIC Parity Chips High Speed RAID 6 Powered by Custom ASIC Parity Chips Why High Speed RAID 6? Winchester Systems has developed High Speed
More informationGet Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Exam : E22-290 Title : EMC Data Domain Deduplication, Backup and Recovery Exam Version : DEMO 1.A customer has a Data Domain system with
More informationVTrak 15200 SATA RAID Storage System
Page 1 15-Drive Supports over 5 TB of reliable, low-cost, high performance storage 15200 Product Highlights First to deliver a full HW iscsi solution with SATA drives - Lower CPU utilization - Higher data
More informationOptimizing Large Arrays with StoneFly Storage Concentrators
Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time
More informationOPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
More informationNetwork Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
More informationVirtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture
Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V Copyright 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information
More informationOnline Remote Data Backup for iscsi-based Storage Systems
Online Remote Data Backup for iscsi-based Storage Systems Dan Zhou, Li Ou, Xubin (Ben) He Department of Electrical and Computer Engineering Tennessee Technological University Cookeville, TN 38505, USA
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationHigh Availability Databases based on Oracle 10g RAC on Linux
High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database
More informationCloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationScala Storage Scale-Out Clustered Storage White Paper
White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current
More informationDistribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
More informationWide-area Network Acceleration for the Developing World. Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton)
Wide-area Network Acceleration for the Developing World Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton) POOR INTERNET ACCESS IN THE DEVELOPING WORLD Internet access is a scarce
More informationIP SAN BEST PRACTICES
IP SAN BEST PRACTICES PowerVault MD3000i Storage Array www.dell.com/md3000i TABLE OF CONTENTS Table of Contents INTRODUCTION... 3 OVERVIEW ISCSI... 3 IP SAN DESIGN... 4 BEST PRACTICE - IMPLEMENTATION...
More informationDiscover Smart Storage Server Solutions
Accelerating Your Success Discover Smart Server Solutions Performance, efficiency and value STORAGE Block and file explained Block explained IP-SAN, also known as Internet Small Computer System Interface
More informationRAID Implementation for StorSimple Storage Management Appliance
RAID Implementation for StorSimple Storage Management Appliance Alpa Kohli June, 2012 KB-00008 Document Revision 1 StorSimple knowledge base articles are intended to provide customers with the information
More informationThe Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage
The Shortcut Guide to Balancing Storage Costs and Performance with Hybrid Storage sponsored by Dan Sullivan Chapter 1: Advantages of Hybrid Storage... 1 Overview of Flash Deployment in Hybrid Storage Systems...
More informationSQL Server Business Intelligence on HP ProLiant DL785 Server
SQL Server Business Intelligence on HP ProLiant DL785 Server By Ajay Goyal www.scalabilityexperts.com Mike Fitzner Hewlett Packard www.hp.com Recommendations presented in this document should be thoroughly
More informationFile System Design and Implementation
WAN Transfer Acceleration Product Description Functionality Interfaces Specifications Index 1 Functionality... 3 2 Integration... 3 3 Interfaces... 4 3.1 Physical Interfaces...5 3.1.1 Ethernet Network...5
More informationIBM ^ xseries ServeRAID Technology
IBM ^ xseries ServeRAID Technology Reliability through RAID technology Executive Summary: t long ago, business-critical computing on industry-standard platforms was unheard of. Proprietary systems were
More informationQuantum StorNext. Product Brief: Distributed LAN Client
Quantum StorNext Product Brief: Distributed LAN Client NOTICE This product brief may contain proprietary information protected by copyright. Information in this product brief is subject to change without
More informationDiagram 1: Islands of storage across a digital broadcast workflow
XOR MEDIA CLOUD AQUA Big Data and Traditional Storage The era of big data imposes new challenges on the storage technology industry. As companies accumulate massive amounts of data from video, sound, database,
More informationDesigning a Cloud Storage System
Designing a Cloud Storage System End to End Cloud Storage When designing a cloud storage system, there is value in decoupling the system s archival capacity (its ability to persistently store large volumes
More informationComprehending the Tradeoffs between Deploying Oracle Database on RAID 5 and RAID 10 Storage Configurations. Database Solutions Engineering
Comprehending the Tradeoffs between Deploying Oracle Database on RAID 5 and RAID 10 Storage Configurations A Dell Technical White Paper Database Solutions Engineering By Sudhansu Sekhar and Raghunatha
More informationMoving Virtual Storage to the Cloud
Moving Virtual Storage to the Cloud White Paper Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage www.parallels.com Table of Contents Overview... 3 Understanding the Storage
More informationMoving Virtual Storage to the Cloud. Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage
Moving Virtual Storage to the Cloud Guidelines for Hosters Who Want to Enhance Their Cloud Offerings with Cloud Storage Table of Contents Overview... 1 Understanding the Storage Problem... 1 What Makes
More informationQuiz for Chapter 6 Storage and Other I/O Topics 3.10
Date: 3.10 Not all questions are of equal difficulty. Please review the entire quiz first and then budget your time carefully. Name: Course: Solutions in Red 1. [6 points] Give a concise answer to each
More informationWHITEPAPER: Understanding Pillar Axiom Data Protection Options
WHITEPAPER: Understanding Pillar Axiom Data Protection Options Introduction This document gives an overview of the Pillar Data System Axiom RAID protection schemas. It does not delve into corner cases
More informationRAID OPTION ROM USER MANUAL. Version 1.6
RAID OPTION ROM USER MANUAL Version 1.6 RAID Option ROM User Manual Copyright 2008 Advanced Micro Devices, Inc. All Rights Reserved. Copyright by Advanced Micro Devices, Inc. (AMD). No part of this manual
More informationInput / Ouput devices. I/O Chapter 8. Goals & Constraints. Measures of Performance. Anatomy of a Disk Drive. Introduction - 8.1
Introduction - 8.1 I/O Chapter 8 Disk Storage and Dependability 8.2 Buses and other connectors 8.4 I/O performance measures 8.6 Input / Ouput devices keyboard, mouse, printer, game controllers, hard drive,
More informationIdentikey Server Performance and Deployment Guide 3.1
Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'
More informationEMC Unified Storage for Microsoft SQL Server 2008
EMC Unified Storage for Microsoft SQL Server 2008 Enabled by EMC CLARiiON and EMC FAST Cache Reference Copyright 2010 EMC Corporation. All rights reserved. Published October, 2010 EMC believes the information
More informationRAID Performance Analysis
RAID Performance Analysis We have six 500 GB disks with 8 ms average seek time. They rotate at 7200 RPM and have a transfer rate of 20 MB/sec. The minimum unit of transfer to each disk is a 512 byte sector.
More informationEvaluation Report: Accelerating SQL Server Database Performance with the Lenovo Storage S3200 SAN Array
Evaluation Report: Accelerating SQL Server Database Performance with the Lenovo Storage S3200 SAN Array Evaluation report prepared under contract with Lenovo Executive Summary Even with the price of flash
More informationBest Practices for Deploying SSDs in a Microsoft SQL Server 2008 OLTP Environment with Dell EqualLogic PS-Series Arrays
Best Practices for Deploying SSDs in a Microsoft SQL Server 2008 OLTP Environment with Dell EqualLogic PS-Series Arrays Database Solutions Engineering By Murali Krishnan.K Dell Product Group October 2009
More informationBackup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v.
Backup architectures in the modern data center. Author: Edmond van As edmond@competa.com Competa IT b.v. Existing backup methods Most companies see an explosive growth in the amount of data that they have
More informationSTORAGE CENTER. The Industry s Only SAN with Automated Tiered Storage STORAGE CENTER
STORAGE CENTER DATASHEET STORAGE CENTER Go Beyond the Boundaries of Traditional Storage Systems Today s storage vendors promise to reduce the amount of time and money companies spend on storage but instead
More informationOverview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation
Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly
More informationWindows Server 2008 R2 Hyper-V Live Migration
Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...
More informationPerformance Report Modular RAID for PRIMERGY
Performance Report Modular RAID for PRIMERGY Version 1.1 March 2008 Pages 15 Abstract This technical documentation is designed for persons, who deal with the selection of RAID technologies and RAID controllers
More informationMilestone Solution Partner IT Infrastructure Components Certification Summary
Milestone Solution Partner IT Infrastructure Components Certification Summary Dell FS8600 NAS Storage 12-1-2014 Table of Contents Introduction:... 2 Dell Storage Architecture:... 3 Certified Products:...
More informationDell PowerVault MD Series Storage Arrays: IP SAN Best Practices
Dell PowerVault MD Series Storage Arrays: IP SAN Best Practices A Dell Technical White Paper Dell Symantec THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND
More informationBest Practices RAID Implementations for Snap Servers and JBOD Expansion
STORAGE SOLUTIONS WHITE PAPER Best Practices RAID Implementations for Snap Servers and JBOD Expansion Contents Introduction...1 Planning for the End Result...1 Availability Considerations...1 Drive Reliability...2
More informationTechnical White Paper for the Oceanspace VTL6000
Document No. Technical White Paper for the Oceanspace VTL6000 Issue V2.1 Date 2010-05-18 Huawei Symantec Technologies Co., Ltd. Copyright Huawei Symantec Technologies Co., Ltd. 2010. All rights reserved.
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for
More informationVIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
More informationOracle Database Scalability in VMware ESX VMware ESX 3.5
Performance Study Oracle Database Scalability in VMware ESX VMware ESX 3.5 Database applications running on individual physical servers represent a large consolidation opportunity. However enterprises
More informationIntroduction to MPIO, MCS, Trunking, and LACP
Introduction to MPIO, MCS, Trunking, and LACP Sam Lee Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201002-P210C lntroduction Many users confuse the
More informationHow A V3 Appliance Employs Superior VDI Architecture to Reduce Latency and Increase Performance
How A V3 Appliance Employs Superior VDI Architecture to Reduce Latency and Increase Performance www. ipro-com.com/i t Contents Overview...3 Introduction...3 Understanding Latency...3 Network Latency...3
More informationRecommended hardware system configurations for ANSYS users
Recommended hardware system configurations for ANSYS users The purpose of this document is to recommend system configurations that will deliver high performance for ANSYS users across the entire range
More informationISTANBUL AYDIN UNIVERSITY
ISTANBUL AYDIN UNIVERSITY 2013-2014 Academic Year Fall Semester Department of Software Engineering SEN361 COMPUTER ORGANIZATION HOMEWORK REPORT STUDENT S NAME : GÖKHAN TAYMAZ STUDENT S NUMBER : B1105.090068
More informationCisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation
Solution Overview Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation IT organizations face challenges in consolidating costly and difficult-to-manage branch-office
More informationStorage Solutions Overview. Benefits of iscsi Implementation. Abstract
Storage Solutions Overview Benefits of iscsi Implementation Aberdeen LLC. Charles D. Jansen Published: December 2004 Abstract As storage demands continue to increase and become more complex, businesses
More informationQsan Document - White Paper. Performance Monitor Case Studies
Qsan Document - White Paper Performance Monitor Case Studies Version 1.0 November 2014 Copyright Copyright@2004~2014, Qsan Technology, Inc. All rights reserved. No part of this document may be reproduced
More informationUK HQ RAID Chunk Size T F www.xyratex.com ISO 14001
RAID Chunk Size Notices The information in this document is subject to change without notice. While every effort has been made to ensure that all information in this document is accurate, Xyratex accepts
More informationIntroduction to Gluster. Versions 3.0.x
Introduction to Gluster Versions 3.0.x Table of Contents Table of Contents... 2 Overview... 3 Gluster File System... 3 Gluster Storage Platform... 3 No metadata with the Elastic Hash Algorithm... 4 A Gluster
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
More informationStaying afloat in today s Storage Pools. Bob Trotter IGeLU 2009 Conference September 7-9, 2009 Helsinki, Finland
Staying afloat in today s Storage Pools Bob Trotter IGeLU 2009 Conference September 7-9, 2009 Helsinki, Finland Background Storage Today What we do Storage Issues Trends Topics to Discuss Background We
More informationImplementing Offline Digital Video Storage using XenData Software
using XenData Software XenData software manages data tape drives, optionally combined with a tape library, on a Windows Server 2003 platform to create an attractive offline storage solution for professional
More informationWhat is RAID--BASICS? Mylex RAID Primer. A simple guide to understanding RAID
What is RAID--BASICS? Mylex RAID Primer A simple guide to understanding RAID Let's look at a hard disk... Several platters stacked on top of each other with a little space in between. One to n platters
More informationHigh Availability with Windows Server 2012 Release Candidate
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
More informationStorage Technologies for Video Surveillance
The surveillance industry continues to transition from analog to digital. This transition is taking place on two fronts how the images are captured and how they are stored. The way surveillance images
More informationEMC Virtual Infrastructure for Microsoft SQL Server
Microsoft SQL Server Enabled by EMC Celerra and Microsoft Hyper-V Copyright 2010 EMC Corporation. All rights reserved. Published February, 2010 EMC believes the information in this publication is accurate
More informationHP StorageWorks P2000 G3 and MSA2000 G2 Arrays
HP StorageWorks P2000 G3 and MSA2000 G2 Arrays Family Data sheet How can the flexibility of the HP StorageWorks P2000 G3 MSA Array Systems help remedy growing storage needs and small budgets? By offering
More information1 Storage Devices Summary
Chapter 1 Storage Devices Summary Dependability is vital Suitable measures Latency how long to the first bit arrives Bandwidth/throughput how fast does stuff come through after the latency period Obvious
More informationHow To Make A Backup System More Efficient
Identifying the Hidden Risk of Data De-duplication: How the HYDRAstor Solution Proactively Solves the Problem October, 2006 Introduction Data de-duplication has recently gained significant industry attention,
More informationA High Performance, High Reliability Perforce Server
A High Performance, High Reliability Perforce Server Shiv Sikand, IC Manage Inc. Marc Lewert, Angela Thomas, TiVo Inc. Perforce User Conference, Las Vegas, April 2005 1 Abstract TiVo has been able to improve
More informationGIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT
Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster
More informationAn Introduction to RAID 6 ULTAMUS TM RAID
An Introduction to RAID 6 ULTAMUS TM RAID The highly attractive cost per GB of SATA storage capacity is causing RAID products based on the technology to grow in popularity. SATA RAID is now being used
More informationBenefits of Intel Matrix Storage Technology
Benefits of Intel Matrix Storage Technology White Paper December 2005 Document Number: 310855-001 INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
More informationGlobus Striped GridFTP Framework and Server. Raj Kettimuthu, ANL and U. Chicago
Globus Striped GridFTP Framework and Server Raj Kettimuthu, ANL and U. Chicago Outline Introduction Features Motivation Architecture Globus XIO Experimental Results 3 August 2005 The Ohio State University
More informationTraditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
More informationEMC ISILON AND ELEMENTAL SERVER
Configuration Guide EMC ISILON AND ELEMENTAL SERVER Configuration Guide for EMC Isilon Scale-Out NAS and Elemental Server v1.9 EMC Solutions Group Abstract EMC Isilon and Elemental provide best-in-class,
More informationQuickSpecs. HP Smart Array 5312 Controller. Overview
Overview Models 238633-B21 238633-291 (Japan) Feature List: High Performance PCI-X Architecture High Capacity Two Ultra 3 SCSI channels support up to 28 drives Modular battery-backed cache design 128 MB
More informationUltra-Scalable Storage Provides Low Cost Virtualization Solutions
Ultra-Scalable Storage Provides Low Cost Virtualization Solutions Flexible IP NAS/iSCSI System Addresses Current Storage Needs While Offering Future Expansion According to Whatis.com, storage virtualization
More information29/07/2010. Copyright 2010 Hewlett-Packard Development Company, L.P.
P2000 P4000 29/07/2010 1 HP D2200SB STORAGE BLADE Twelve hot plug SAS drives in a half height form factor P410i Smart Array controller onboard with 1GB FBWC Expand local storage capacity PCIe x4 to adjacent
More informationOPTIMIZING VIRTUAL TAPE PERFORMANCE: IMPROVING EFFICIENCY WITH DISK STORAGE SYSTEMS
W H I T E P A P E R OPTIMIZING VIRTUAL TAPE PERFORMANCE: IMPROVING EFFICIENCY WITH DISK STORAGE SYSTEMS By: David J. Cuddihy Principal Engineer Embedded Software Group June, 2007 155 CrossPoint Parkway
More informationRAID Basics Training Guide
RAID Basics Training Guide Discover a Higher Level of Performance RAID matters. Rely on Intel RAID. Table of Contents 1. What is RAID? 2. RAID Levels RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID 0+1 RAID 1E
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More information