How Does the ECASD Network Work?
|
|
|
- Mercy Preston
- 10 years ago
- Views:
Transcription
1 Slide 1 How Does the ECASD Network Work? Jim Blodgett, Network Engineer
2 Slide 2 Network Overview The ECASD Network has 3500 computers, 350 switches, 100 servers and users spread over 22 different buildings connected via lease fiber from Charter and our own fiber. We connect to the Internet through a WiscNet POP at UWEC on 2 pairs of fiber that take redundant paths around the center of the city. The network also supports all internal phone traffic and aggregates all incoming and outgoing calls over four T1 Primary Rate Interface (PRI) connections.
3 Slide 3 What Happens when I log in? ECASD uses Active Directory, a Network Operating System (NOS) from Microsoft, to manage and provide an interface to all of the resources connected to the network. Active Directory is also used to apply security restrictions and interface enhancements to users and computers in the form of policies. These policies ensure that the computers provide users with a uniform interface including Start Menu, Desktop, Storage and Application features and behaviors. These policies also help prevent users from making unsupported changes to the computers or network. All activities on the ECASD network, including keystrokes, are tracked and archived.
4 Slide 4 Where is my data? Home Folder School Folders Shared Folders Storage Area Network When a user logs on to a computer, all of the data and resources associated with that user is presented over the network by servers connected to a Storage Area Network (SAN). The Servers and the SAN are located in the Network Operations Center in the basement of the Central Office Building. This allows for very efficient management of the hardware and data while providing students and staff with a very stable and robust computing environment.
5 Slide 5 Why do we use a SAN? Normal computer One to several hard drives Independent Drives Inefficient Slow Limited space (<1TB) Limited reliability No redundancy Access limited to single computer Inexpensive When the hard drive fails the computer is down and the data is hard to recover Storage Area Network (SAN) Dozens of hard drives Drives work as a Redundant Array of Independent Drives Efficient: only deploy what is needed Huge amount of space (100 stb) Very fast: data can be read and written to all drives at once Data available to all network users Very reliable: can lose mulitple drives with losing data and servers remain available Data is consolidate making backup very efficient Expensive ECASD utilizes a Storage Area Network to manage data efficiently, providing a high level of performance and reliability. A normal computer can have several hard drives, though they usually only have one. These drives will be relatively slow (7200rpm on a SATA or IDE connection) with limited capacity and reliability. Filling a drive beyond 80% comes with a significant performance penalty. Without network storage, a user would need to use the same computer every time and backups would be inordinately complex and unreliable. In a SAN, all of the drives are aggregated into one big pool. Volumes are carved out of this pool with very little reserve space, and assigned to servers that provide the network interface. Data stored here is accessible from any computer on the network. Instead of slow, unreliable drives, the SAN uses very fast (15000rpm on a 4Gb/sec SCSI connection), very reliable hot-swappable drives that are setup in an array to provide high performance, high availability and redundancy. Because the data is consolidated, the SAN also allows for very efficient backups and recovery.
6 Slide 6 The ECASD SAN The center rack contains all of the disk arrays, the controllers, the management appliance and the switches that create the network fabric to tie everything together. The left rack contains the network tape library for backups and the home directory servers. The right rack contains the shared storage servers, the Exchange server and the database server. In the bottom of each rack are 2 generator compatible Uninterruptable Power Supplies (UPS) that provide electricity during the period between an electrical outage and the generator engaging.
7 Slide 7 Redundant Array of Independent Disks RAID takes two to many disks and ties them together to make one big volume RAID 0: data is striped across the disks. Very Fast no resiliency No lost capacity When one disk fails, the volume fails RAID 1(+0): data is mirrored across the disks Slower Resilient 50% capacity is lost RAID 5: Data is striped across the disks with a parity bit Need at least 3 disks Very Fast Very resilient Capacity is (Number of disks 1)*size of smallest disk What is RAID? All hard disks fail; they have moving parts and they wear out. When a single disk fails it is very hard to recover the data and the computer is not usable during that time. A Redundant Array of Independent Disks (RAID) provides varying levels of resiliency, efficiency and performance. In general, the more disks in the array, the higher the resiliency, efficiency and performance, with the exception of RAID 0, which provides very high efficiency and performance but no resiliency. In RAID 0, the disks are tied together in one volume and the data is striped across all disks, so the loss of any disk causes the volume to fail. In RAID 1, the data is written to the first disk and then mirrored to the second disk. This actually slows down the computer, but provides a high degree of resiliency, though a failed disk needs to be replaced quickly. It is also only 50% efficient with regards to space. In RAID 5, the disks are tied together and striped, like in RAID 0, but a parity bit is also written, so the volume can be reconstructed without going offline, in the event of a disk failure. This is very fast and highly resilient, but costs one disk out of every array for parity, so the more disks in the array the more efficient it is. The loss of 2 disks will cause the array to fail. Our SAN uses a proprietary impelmentation of RAID 5 that provides much more resiliency than standard RAID 5.
8 Slide 8 What happens when I surf the web? ECASD must meet the requirements of the Child Internet Protection Act (CIPA) and the Deleting Online Predators Act (DOPA) to receive Erate funding. That means we must filter Internet content and provide students with information about how to protect themselves when they are on line.
9 Slide 9 How does my get filtered? is the vector of choice for distributers of unsolicited advertising (SPAM), malware and viruses. We receive roughly 3 million s a day, 96% of which are from known spammers. Of the that is not from a known spammer, half is classified as spam or malicious, so we get roughly 60, 000 legitimate s a day.
10 Slide 10 Questions? Please refer any questions that your teacher can not answer to: Jim Blodgett
RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1
RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.
Availability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
an introduction to networked storage
an introduction to networked storage How networked storage can simplify your data management The key differences between SAN, DAS, and NAS The business benefits of networked storage Introduction Historical
Distribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
The Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes
How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power
Database Backup and Recovery using NetVault Backup and PowerVault MD3260 A Dell Technical White Paper Database Solutions Engineering Dell Product Group Umesh Sunnapu Mayura Deshmukh Robert Pound This document
June 2009. Blade.org 2009 ALL RIGHTS RESERVED
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
12 NETWORK MANAGEMENT
12 NETWORK MANAGEMENT PROJECTS Project 12.1 Project 12.2 Project 12.3 Project 12.4 Understanding Key Concepts Backing Up and Restoring Data Monitoring Computer Activity Configuring SNMP Support 276 Networking
PIONEER RESEARCH & DEVELOPMENT GROUP
SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for
RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card.
RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. 1 Contents 3 RAID Utility User s Guide 3 Installing the RAID Software 4 Running
Version : 1.0. SR3620-2S-SB2 User Manual. SOHORAID Series
Version : 1.0 SR3620-2S-SB2 User Manual SOHORAID Series Introduction About this Manual Thank you for using the product of RAIDON Technology Inc. This user manual will introduce the STARDOM SR3620-2S-SB2
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
An Introduction to RAID. Giovanni Stracquadanio [email protected] www.dmi.unict.it/~stracquadanio
An Introduction to RAID Giovanni Stracquadanio [email protected] www.dmi.unict.it/~stracquadanio Outline A definition of RAID An ensemble of RAIDs JBOD RAID 0...5 Configuring and testing a Linux
IncidentMonitor Server Specification Datasheet
IncidentMonitor Server Specification Datasheet Prepared by Monitor 24-7 Inc October 1, 2015 Contact details: [email protected] North America: +1 416 410.2716 / +1 866 364.2757 Europe: +31 088 008.4600
RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card
RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility
Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud
Cloud Computing Chapter 10 Disaster Recovery and Business Continuity and the Cloud Learning Objectives Define and describe business continuity. Define and describe disaster recovery. Describe the benefits
Terms of Reference Microsoft Exchange and Domain Controller/ AD implementation
Terms of Reference Microsoft Exchange and Domain Controller/ AD implementation Overview Maldivian Red Crescent will implement it s first Microsoft Exchange server and replace it s current Domain Controller
THE CASE FOR ACTIVE DATA ARCHIVING
THE CASE FOR ACTIVE DATA ARCHIVING Written by Ray Quattromini 3 rd September 2007 Contact details Tel: 01256 782030 / 08704 286 186 Fax: 08704 286 187 Email: [email protected] Web: www.data-storage.co.uk
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering
Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution Database Solutions Engineering By Subhashini Prem and Leena Kushwaha Dell Product Group March 2009 THIS WHITE PAPER IS FOR INFORMATIONAL
RAID Made Easy By Jon L. Jacobi, PCWorld
9916 Brooklet Drive Houston, Texas 77099 Phone 832-327-0316 www.safinatechnolgies.com RAID Made Easy By Jon L. Jacobi, PCWorld What is RAID, why do you need it, and what are all those mode numbers that
Backup & Disaster Recovery Options
Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,
Filing Systems. Filing Systems
Filing Systems At the outset we identified long-term storage as desirable characteristic of an OS. EG: On-line storage for an MIS. Convenience of not having to re-write programs. Sharing of data in an
How to recover a failed Storage Spaces
www.storage-spaces-recovery.com How to recover a failed Storage Spaces ReclaiMe Storage Spaces Recovery User Manual 2013 www.storage-spaces-recovery.com Contents Overview... 4 Storage Spaces concepts and
Storage Design for High Capacity and Long Term Storage. DLF Spring Forum, Raleigh, NC May 6, 2009. Balancing Cost, Complexity, and Fault Tolerance
Storage Design for High Capacity and Long Term Storage Balancing Cost, Complexity, and Fault Tolerance DLF Spring Forum, Raleigh, NC May 6, 2009 Lecturer: Jacob Farmer, CTO Cambridge Computer Copyright
Server and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Patriot Hardware and Systems Software Requirements
Patriot Hardware and Systems Software Requirements Patriot is designed and written for Microsoft Windows. As a result, it is a stable and consistent Windows application. Patriot is suitable for deployment
RAID Storage System of Standalone NVR
ACTi Knowledge Base Category: Installation & Configuration Note Sub-category: Hardware; Recording & Storage Model: XNR-4200, GNR-2000 Firmware: Software: Author: Ando.Meritee Published: 2011/05/04 Reviewed:
technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels
technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California
<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
Installation Guide July 2009
July 2009 About this guide Edition notice This edition applies to Version 4.0 of the Pivot3 RAIGE Operating System and to any subsequent releases until otherwise indicated in new editions. Notification
Solution Brief: Creating Avid Project Archives
Solution Brief: Creating Avid Project Archives Marquis Project Parking running on a XenData Archive Server provides Fast and Reliable Archiving to LTO or Sony Optical Disc Archive Cartridges Summary Avid
Chapter 6 External Memory. Dr. Mohamed H. Al-Meer
Chapter 6 External Memory Dr. Mohamed H. Al-Meer 6.1 Magnetic Disks Types of External Memory Magnetic Disks RAID Removable Optical CD ROM CD Recordable CD-R CD Re writable CD-RW DVD Magnetic Tape 2 Introduction
Cloud Attached Storage
CTERA Appliance Disaster Recovery Guide Cloud Attached Storage June 2013 Version 3.2 1 Introduction This document is intended for CTERA Portal administrators. It describes how to replace CTERA appliances
How To Write A Disk Array
200 Chapter 7 (This observation is reinforced and elaborated in Exercises 7.5 and 7.6, and the reader is urged to work through them.) 7.2 RAID Disks are potential bottlenecks for system performance and
Paragon Backup Retention Wizard
Paragon Backup Retention Wizard User Guide Getting Started with the Paragon Backup Retention Wizard In this guide you will find all the information necessary to get the product ready to use. System Requirements
How To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On
Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing
Storage Technologies for Video Surveillance
The surveillance industry continues to transition from analog to digital. This transition is taking place on two fronts how the images are captured and how they are stored. The way surveillance images
Hard Disk Drives and RAID
Hard Disk Drives and RAID Janaka Harambearachchi (Engineer/Systems Development) INTERFACES FOR HDD A computer interfaces is what allows a computer to send and retrieve information for storage devices such
XenData Product Brief: SX-550 Series Servers for LTO Archives
XenData Product Brief: SX-550 Series Servers for LTO Archives The SX-550 Series of Archive Servers creates highly scalable LTO Digital Video Archives that are optimized for broadcasters, video production
Enterprise Backup Solution Vendor Questions
Enterprise Backup Solution Vendor Questions What is the size of a single full back up? If Backups comprise 28% of the 19TB, can we assume that a single full (not compressed) is approximately 6TB? The approximate
USER GUIDE. PageScope Enterprise Suite. Backup and Recovery
PageScope Enterprise Suite Backup and Recovery USER GUIDE Date : 07/31/2008 Written by: Tony Gliatta, Vartkes Tashjian and Rob Posenato Location: CEC Lab, HQ Ramsey, NJ Table of Content Chapter 1 PageScope
MICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP
MICROSOFT EXCHANGE 2003 best practices BEST PRACTICES - DATA STORAGE SETUP TABLE OF CONTENTS E-mail has become a business critical communication tool 3 Build a disaster recovery solution with VSS and Data
NSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
Optimizing Large Arrays with StoneFly Storage Concentrators
Optimizing Large Arrays with StoneFly Storage Concentrators All trademark names are the property of their respective companies. This publication contains opinions of which are subject to change from time
Symantec Backup Exec 2014 TM Licensing Guide
Product Overview Symantec Backup Exec delivers powerful, flexible, and easy- to- use backup and recovery to protect your entire infrastructure - both virtual and physical. Using modern technology, Backup
Expert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V
\\\\ Best Practices for Managing Storage with Hyper-V Learn how storage functionality changes with the newest Hyper-V release and how it differs from VMware. Get details on specific Hyper-V features including
File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
RAID installation guide for ITE8212F
RAID installation guide for ITE8212F Contents Contents 2 1 Introduction 3 1.1 About this Guide 3 1.2 The Basics 3 1.2.1 What is RAID? 3 1.2.2 Advantages of RAID 3 1.2.3 Disadvantages of RAID 3 1.3 Different
A Virtual Tape Library Architecture & Its Benefits
A Virtual Tape Library Architecture & Its Benefits Mas Omae Ultera Systems, Inc. A Decade of Enhancing Removable Storage 26052 Merit Cir., Laguna Hills CA 92653 Phone: +1-949-367-8800 FAX: +1-949-367-0758
16 Common Backup Problems & Mistakes
16 Common Backup Problems & Mistakes 1. Tape errors, Tape Drive failures. Probably the number one backup problem is simply caused by the unreliability of tape. Tape drives have a higher failure rate than
The safer, easier way to help you pass any IT exams. Exam : 000-115. Storage Sales V2. Title : Version : Demo 1 / 5
Exam : 000-115 Title : Storage Sales V2 Version : Demo 1 / 5 1.The IBM TS7680 ProtecTIER Deduplication Gateway for System z solution is designed to provide all of the following EXCEPT: A. ESCON attach
Call: 08715 900800. Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT
Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT The VirtuousIT DR/BC solution is designed around RecoveryShield from Thinking SAFE. The service includes a local backup appliance
BounceBack Server Solution Reference Guide
BounceBack Server Solution Reference Guide Contents Introduction... 2 System Requirements... 3 Initial Setup... 4 BounceBack Server Appliance Front View... 5 BounceBack Server Appliance Rear View... 6
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
How To Create A Multi Disk Raid
Click on the diagram to see RAID 0 in action RAID Level 0 requires a minimum of 2 drives to implement RAID 0 implements a striped disk array, the data is broken down into blocks and each block is written
VMware Virtual Machine File System: Technical Overview and Best Practices
VMware Virtual Machine File System: Technical Overview and Best Practices A VMware Technical White Paper Version 1.0. VMware Virtual Machine File System: Technical Overview and Best Practices Paper Number:
High Availability Databases based on Oracle 10g RAC on Linux
High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database
CYBERNETICS. Virtualization of Tape Storage
Abstract: Realizing the benefits of Disk to Disk to Tape backup strategies incorporating disk-based virtual tape devices. CYBERNETICS Intelligent Storage Solutions Table of Contents Introduction 1 Benefits
Deploying a File Server Lesson 2
Deploying a File Server Lesson 2 Skills Matrix Technology Skill Objective Domain Objective # Adding a New Disk Configure storage 1.5 File Server The most basic and the most universal type of application
How To Virtualize A Storage Area Network (San) With Virtualization
A New Method of SAN Storage Virtualization Table of Contents 1 - ABSTRACT 2 - THE NEED FOR STORAGE VIRTUALIZATION 3 - EXISTING STORAGE VIRTUALIZATION METHODS 4 - A NEW METHOD OF VIRTUALIZATION: Storage
EMC DATA DOMAIN OVERVIEW. Copyright 2011 EMC Corporation. All rights reserved.
EMC DATA DOMAIN OVERVIEW 1 2 With Data Domain Deduplication Storage Systems, You Can WAN Retain longer Keep backups onsite longer with less disk for fast, reliable restores, and eliminate the use of tape
Email Gateways Using MDaemon 6.0
Email Gateways Using MDaemon 6.0 Alt-N Technologies, Ltd 1179 Corporate Drive West, #103 Arlington, TX 76006 Tel: (817) 652-0204 2002 Alt-N Technologies. All rights reserved. Product and company names
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006
OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006 EXECUTIVE SUMMARY Microsoft Exchange Server is a disk-intensive application that requires high speed storage to deliver
RAID Level Descriptions. RAID 0 (Striping)
RAID Level Descriptions RAID 0 (Striping) Offers low cost and maximum performance, but offers no fault tolerance; a single disk failure results in TOTAL data loss. Businesses use RAID 0 mainly for tasks
Electronic Records Storage Options and Overview
Electronic Records Storage Options and Overview www.archives.nysed.gov Objectives Understand the options for electronic records storage, including cloud-based storage Evaluate the options best suited for
Online Storage Replacement Strategy/Solution
I. Current Storage Environment Online Storage Replacement Strategy/Solution ISS currently maintains a substantial online storage infrastructure that provides centralized network-accessible storage for
White Paper. What is IP SAN?
White Paper What is IP SAN? Introduction Internet Protocol, or IP, has grown to become the most widely used telecommunications standard worldwide. The technology is well understood, easy to implement and
46xx_47xx_1546_1547 RAID Recovery/Set Up Instructions
46xx_47xx_1546_1547 RAID Recovery/Set Up Instructions Note: The Windows RAID utility should handle most RAID recovery situations without any trouble. In Windows, when the ICON in the RAID utility turns
SafeMail April 2015. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres.
SafeMail April 2015 Secure cloud solutions with guaranteed UK data sovereignty. SafeMail Helping your business reach further with email hosted at UK based, ISO 27001, Tier 4 data centres. Detailing the
Comprehending the Tradeoffs between Deploying Oracle Database on RAID 5 and RAID 10 Storage Configurations. Database Solutions Engineering
Comprehending the Tradeoffs between Deploying Oracle Database on RAID 5 and RAID 10 Storage Configurations A Dell Technical White Paper Database Solutions Engineering By Sudhansu Sekhar and Raghunatha
WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server
WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server
Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication
Trends in Enterprise Backup Deduplication
Trends in Enterprise Backup Deduplication Shankar Balasubramanian Architect, EMC 1 Outline Protection Storage Deduplication Basics CPU-centric Deduplication: SISL (Stream-Informed Segment Layout) Data
Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software
Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software The Video Edition of XenData Archive Series software manages one or more automated data tape libraries on
Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
Digital Data Storage and Enterprise Tape Library Backup Solution Award of Request for Proposal
To: Toronto Public Library Board January 21, 2002 From: Subject: City Librarian Digital Data Storage and Enterprise Tape Library Backup Solution Award of Request for Proposal Purpose: To obtain Toronto
PrimeArray Data Storage Solutions Network Attached Storage (NAS) iscsi Storage Area Networks (SAN) Optical Storage Systems (CD/DVD)
Fall 2008 PrimeArray Data Storage Solutions Network Attached Storage (NAS) iscsi Storage Area Networks (SAN) Optical Storage Systems (CD/DVD) AutoStor iscsi SAN solution. See pages 8 and 9 for more information.
Reliability and Fault Tolerance in Storage
Reliability and Fault Tolerance in Storage Dalit Naor/ Dima Sotnikov IBM Haifa Research Storage Systems 1 Advanced Topics on Storage Systems - Spring 2014, Tel-Aviv University http://www.eng.tau.ac.il/semcom
Lesson Plans Configuring Exchange Server 2007
Lesson Plans Configuring Exchange Server 2007 (Exam 70-236) Version 2.1 Table of Contents Course Overview... 2 Section 1.1: Server-based Messaging... 4 Section 1.2: Exchange Versions... 5 Section 1.3:
EMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, 16.10.2008. Copyright 2008 EMC Corporation. All rights reserved.
EMC arhiviranje Lilijana Pelko Primož Golob Sarajevo, 16.10.2008 1 Agenda EMC Today Reasons to archive EMC Centera EMC EmailXtender EMC DiskXtender Use cases 2 EMC Strategic Acquisitions: Strengthen and
Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation
Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly
About Backing Up a Cisco Unity System
CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues
Chapter 10: Mass-Storage Systems
Chapter 10: Mass-Storage Systems Physical structure of secondary storage devices and its effects on the uses of the devices Performance characteristics of mass-storage devices Disk scheduling algorithms
HANTZ + PARTNER. The Upgrade Company! www.hantz.com. :: NAStorage Server ::
HANTZ + PARTNER The Upgrade Company! www.hantz.com :: NAStorage Server :: Delivering Power of Storage Top 10 reasons for choosing NAStorage your network attached storage (NAS) server server as 1.Experience
Building Storage Service in a Private Cloud
Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain
Input / Ouput devices. I/O Chapter 8. Goals & Constraints. Measures of Performance. Anatomy of a Disk Drive. Introduction - 8.1
Introduction - 8.1 I/O Chapter 8 Disk Storage and Dependability 8.2 Buses and other connectors 8.4 I/O performance measures 8.6 Input / Ouput devices keyboard, mouse, printer, game controllers, hard drive,
BackupAssist Common Usage Scenarios
WHITEPAPER BackupAssist Version 5 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Table of Contents Introduction... 3 Disaster recovery for 2008, SBS2008 & EBS 2008... 4 Scenario 1: Daily backups with
Disaster Recovery for Small Businesses
Technical White Paper Disaster Recovery for Small Businesses A disaster recovery plan helps you understand what data is critical to your business operations and how to best protect it from unexpected failures.
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
