How Does the ECASD Network Work?



Similar documents
RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1

Availability and Disaster Recovery: Basic Principles

an introduction to networked storage

Distribution One Server Requirements

The Microsoft Large Mailbox Vision

How To Backup And Restore A Database With A Powervault Backup And Powervaults Backup Software On A Poweredge Powervalt Backup On A Netvault 2.5 (Powervault) Powervast Backup On An Uniden Power

June Blade.org 2009 ALL RIGHTS RESERVED

12 NETWORK MANAGEMENT

PIONEER RESEARCH & DEVELOPMENT GROUP

RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card.

Version : 1.0. SR3620-2S-SB2 User Manual. SOHORAID Series

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

An Introduction to RAID. Giovanni Stracquadanio

IncidentMonitor Server Specification Datasheet

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Terms of Reference Microsoft Exchange and Domain Controller/ AD implementation

THE CASE FOR ACTIVE DATA ARCHIVING

Protecting Microsoft SQL Server with an Integrated Dell / CommVault Solution. Database Solutions Engineering

RAID Made Easy By Jon L. Jacobi, PCWorld

Backup & Disaster Recovery Options

Filing Systems. Filing Systems

How to recover a failed Storage Spaces

Storage Design for High Capacity and Long Term Storage. DLF Spring Forum, Raleigh, NC May 6, Balancing Cost, Complexity, and Fault Tolerance

Server and Storage Virtualization with IP Storage. David Dale, NetApp

SAN Conceptual and Design Basics

Patriot Hardware and Systems Software Requirements

RAID Storage System of Standalone NVR

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels

<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures

Installation Guide July 2009

Solution Brief: Creating Avid Project Archives

Chapter 6 External Memory. Dr. Mohamed H. Al-Meer

Cloud Attached Storage

How To Write A Disk Array

Paragon Backup Retention Wizard

How To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On

Storage Technologies for Video Surveillance

Hard Disk Drives and RAID

XenData Product Brief: SX-550 Series Servers for LTO Archives

Enterprise Backup Solution Vendor Questions

USER GUIDE. PageScope Enterprise Suite. Backup and Recovery

MICROSOFT EXCHANGE best practices BEST PRACTICES - DATA STORAGE SETUP

NSS Volume Data Recovery

Optimizing Large Arrays with StoneFly Storage Concentrators

Symantec Backup Exec 2014 TM Licensing Guide

Expert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V

File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System

RAID installation guide for ITE8212F

A Virtual Tape Library Architecture & Its Benefits

16 Common Backup Problems & Mistakes

The safer, easier way to help you pass any IT exams. Exam : Storage Sales V2. Title : Version : Demo 1 / 5

Call: Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

BounceBack Server Solution Reference Guide

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

How To Create A Multi Disk Raid

VMware Virtual Machine File System: Technical Overview and Best Practices

High Availability Databases based on Oracle 10g RAC on Linux

CYBERNETICS. Virtualization of Tape Storage

Deploying a File Server Lesson 2

How To Virtualize A Storage Area Network (San) With Virtualization

EMC DATA DOMAIN OVERVIEW. Copyright 2011 EMC Corporation. All rights reserved.

Gateways Using MDaemon 6.0

OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006

RAID Level Descriptions. RAID 0 (Striping)

Electronic Records Storage Options and Overview

Online Storage Replacement Strategy/Solution

White Paper. What is IP SAN?

46xx_47xx_1546_1547 RAID Recovery/Set Up Instructions

Saf April Saf Helping your business reach further with hosted at UK based, ISO 27001, Tier 4 data centres.

Comprehending the Tradeoffs between Deploying Oracle Database on RAID 5 and RAID 10 Storage Configurations. Database Solutions Engineering

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Trends in Enterprise Backup Deduplication

Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Digital Data Storage and Enterprise Tape Library Backup Solution Award of Request for Proposal

PrimeArray Data Storage Solutions Network Attached Storage (NAS) iscsi Storage Area Networks (SAN) Optical Storage Systems (CD/DVD)

Reliability and Fault Tolerance in Storage

Lesson Plans Configuring Exchange Server 2007

EMC arhiviranje. Lilijana Pelko Primož Golob. Sarajevo, Copyright 2008 EMC Corporation. All rights reserved.

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation

About Backing Up a Cisco Unity System

Chapter 10: Mass-Storage Systems

HANTZ + PARTNER. The Upgrade Company! :: NAStorage Server ::

Building Storage Service in a Private Cloud

Input / Ouput devices. I/O Chapter 8. Goals & Constraints. Measures of Performance. Anatomy of a Disk Drive. Introduction - 8.1

BackupAssist Common Usage Scenarios

Disaster Recovery for Small Businesses

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Transcription:

Slide 1 How Does the ECASD Network Work? Jim Blodgett, Network Engineer

Slide 2 Network Overview The ECASD Network has 3500 computers, 350 switches, 100 servers and 13000 users spread over 22 different buildings connected via lease fiber from Charter and our own fiber. We connect to the Internet through a WiscNet POP at UWEC on 2 pairs of fiber that take redundant paths around the center of the city. The network also supports all internal phone traffic and aggregates all incoming and outgoing calls over four T1 Primary Rate Interface (PRI) connections.

Slide 3 What Happens when I log in? ECASD uses Active Directory, a Network Operating System (NOS) from Microsoft, to manage and provide an interface to all of the resources connected to the network. Active Directory is also used to apply security restrictions and interface enhancements to users and computers in the form of policies. These policies ensure that the computers provide users with a uniform interface including Start Menu, Desktop, Storage and Application features and behaviors. These policies also help prevent users from making unsupported changes to the computers or network. All activities on the ECASD network, including keystrokes, are tracked and archived.

Slide 4 Where is my data? Home Folder School Folders Shared Folders Storage Area Network When a user logs on to a computer, all of the data and resources associated with that user is presented over the network by servers connected to a Storage Area Network (SAN). The Servers and the SAN are located in the Network Operations Center in the basement of the Central Office Building. This allows for very efficient management of the hardware and data while providing students and staff with a very stable and robust computing environment.

Slide 5 Why do we use a SAN? Normal computer One to several hard drives Independent Drives Inefficient Slow Limited space (<1TB) Limited reliability No redundancy Access limited to single computer Inexpensive When the hard drive fails the computer is down and the data is hard to recover Storage Area Network (SAN) Dozens of hard drives Drives work as a Redundant Array of Independent Drives Efficient: only deploy what is needed Huge amount of space (100 stb) Very fast: data can be read and written to all drives at once Data available to all network users Very reliable: can lose mulitple drives with losing data and servers remain available Data is consolidate making backup very efficient Expensive ECASD utilizes a Storage Area Network to manage data efficiently, providing a high level of performance and reliability. A normal computer can have several hard drives, though they usually only have one. These drives will be relatively slow (7200rpm on a SATA or IDE connection) with limited capacity and reliability. Filling a drive beyond 80% comes with a significant performance penalty. Without network storage, a user would need to use the same computer every time and backups would be inordinately complex and unreliable. In a SAN, all of the drives are aggregated into one big pool. Volumes are carved out of this pool with very little reserve space, and assigned to servers that provide the network interface. Data stored here is accessible from any computer on the network. Instead of slow, unreliable drives, the SAN uses very fast (15000rpm on a 4Gb/sec SCSI connection), very reliable hot-swappable drives that are setup in an array to provide high performance, high availability and redundancy. Because the data is consolidated, the SAN also allows for very efficient backups and recovery.

Slide 6 The ECASD SAN The center rack contains all of the disk arrays, the controllers, the management appliance and the switches that create the network fabric to tie everything together. The left rack contains the network tape library for backups and the home directory servers. The right rack contains the shared storage servers, the Exchange server and the database server. In the bottom of each rack are 2 generator compatible Uninterruptable Power Supplies (UPS) that provide electricity during the period between an electrical outage and the generator engaging.

Slide 7 Redundant Array of Independent Disks RAID takes two to many disks and ties them together to make one big volume RAID 0: data is striped across the disks. Very Fast no resiliency No lost capacity When one disk fails, the volume fails RAID 1(+0): data is mirrored across the disks Slower Resilient 50% capacity is lost RAID 5: Data is striped across the disks with a parity bit Need at least 3 disks Very Fast Very resilient Capacity is (Number of disks 1)*size of smallest disk What is RAID? All hard disks fail; they have moving parts and they wear out. When a single disk fails it is very hard to recover the data and the computer is not usable during that time. A Redundant Array of Independent Disks (RAID) provides varying levels of resiliency, efficiency and performance. In general, the more disks in the array, the higher the resiliency, efficiency and performance, with the exception of RAID 0, which provides very high efficiency and performance but no resiliency. In RAID 0, the disks are tied together in one volume and the data is striped across all disks, so the loss of any disk causes the volume to fail. In RAID 1, the data is written to the first disk and then mirrored to the second disk. This actually slows down the computer, but provides a high degree of resiliency, though a failed disk needs to be replaced quickly. It is also only 50% efficient with regards to space. In RAID 5, the disks are tied together and striped, like in RAID 0, but a parity bit is also written, so the volume can be reconstructed without going offline, in the event of a disk failure. This is very fast and highly resilient, but costs one disk out of every array for parity, so the more disks in the array the more efficient it is. The loss of 2 disks will cause the array to fail. Our SAN uses a proprietary impelmentation of RAID 5 that provides much more resiliency than standard RAID 5.

Slide 8 What happens when I surf the web? ECASD must meet the requirements of the Child Internet Protection Act (CIPA) and the Deleting Online Predators Act (DOPA) to receive Erate funding. That means we must filter Internet content and provide students with information about how to protect themselves when they are on line.

Slide 9 How does my email get filtered? Email is the vector of choice for distributers of unsolicited advertising (SPAM), malware and viruses. We receive roughly 3 million emails a day, 96% of which are from known spammers. Of the email that is not from a known spammer, half is classified as spam or malicious, so we get roughly 60, 000 legitimate emails a day.

Slide 10 Questions? Please refer any questions that your teacher can not answer to: Jim Blodgett jblodgett@ecasd.k12.wi.us