• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
FUJITSU Storage System
 

FUJITSU Storage System

on

  • 1,007 views

 

Statistics

Views

Total Views
1,007
Views on SlideShare
1,007
Embed Views
0

Actions

Likes
0
Downloads
9
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    FUJITSU Storage System FUJITSU Storage System Document Transcript

    • FUJITSU Storage System Leading storage solution development for a new era FUJITSU LIMITED
    • Contents 1. What is Storplex? ........................................................................................... 3 2. Business Continuation (Secure and stable operation of/Disaster prevention for the IT system) .............5 2-1 Data protection................................................................................................................................................5 2-2 Disaster recovery ............................................................................................................................................6 3. Security and Compliance ............................................................................... 8 3-1 Secure storage management (against external attacks) ................................................................................8 3-2 Data encryption and data key management ...................................................................................................9 3-3 Information reliability/information leakage prevention ....................................................................................9 3-4 Media refresh (information storage beyond device lifetime).........................................................................10 4. Lifecycle Management (IT investment optimization through the lifecycle).... 11 4-1 Tiered storage ...............................................................................................................................................11 4-2 Transparent access from applications ..........................................................................................................12 5. Information Sharing and Retrieval (Prompt strategic utilization of cross-sectoral information (aggressive business management)) ...13 5-1 File virtualization function..............................................................................................................................13 5-2 Wide area file server integration (Wide area contents sharing)....................................................................14 5-3 Parallel search using the multi-clone function ..............................................................................................14 6. Green Products (Approach to environmental problems)............................. 15 6-1 Space and power savings (user friendly)......................................................................................................15 6-2 Improved operation efficiency .......................................................................................................................16 6-3 ECO visualization and operation (Cutting unneeded power consumption) ..................................................17 7. Storage Virtualization Systems (Real time End-to-End service linkage).... 18 7-1 Virtual disks and virtual storage pools ..........................................................................................................18 7-2 Operation using virtual systems....................................................................................................................19 7-3 Future of storage virtualization......................................................................................................................19 8. Core Technology (Commitment to data availability and reliability improvement) ... 21 Please note that this document includes information about planned products and they may not be provided or will be provided with different specifications. Contact Fujitsu for detailed information.
    • 1. What is Storplex? The role of storage has changed significantly from Worsening environmental problems the 20th to the 21st century, with storage growing to IT infrastructure has a significant relationship to be the core of IT infrastructure supporting corporate global warming. In particular data centers with their management. Fujitsu in focusing on the increasing concentration of servers and storage pose serious importance of storage introduced the concept of power consumption problems. In order to create Storplex in 1999. It proposed a new more reliable products, power savings and CO2 sophisticated approach that included applications reductions have become fundamental corporate and middleware as well as storage hardware. activities. This trend will continue to accelerate in By 2008 Storplex had evolved to include solutions the future. that solved the emerging operational problems of Explosive increases in data volumes the new information age, Now Fujitsu announces a Though nothing new, the amount of data keeps further extension to this storage concept, this increasing. For example, data that was previously includes: "Flexible connectivity”, "Dynamic stored in individual personal computers is now scalability”, "Continuous data access", and integrated into file servers for security and other "Enterprise storage management”. reasons, expanding storage requirements. Internal Behind the creation of this concept are the following controls also cause upsurges in the amount of data, storage environment changes of recent years: such as log files that are required to be saved. Also, Globalization of business activities from the standpoint of management accounting, Globalization of business activities continues to storage of payment statements has become accelerate due to advances in, and deregulation of common. As a result, enormous data growth is the internet. In order to ensure smooth continuous having a heavy impact on storage. In addition to business, day and night, IT infrastructure must also storage capacity expansion therefore, new provide stable operation 24 hours a day, every day. measures are required that consider cost System availability and new operation frames are reductions and efficiency of operation. necessary to guarantee this business continuity. Increases in “unstructured” data Increasing corporate social Previously, it was only structured data that was held responsibilities in storage and managed by database systems. Healthy corporate management based on laws and As the internet spread, all employees were regulations is necessary for the stable growth of assigned personal computers to raise business each company. In Japan and around the world, productivity. As a result office documents and Financial Products Trading Laws have come into e-mail exchange rapidly increased with the effect. These stipulate internal controls for business acceleration of business. Along with business processes. Aimed at maintaining shareholder trust documents created in Excel, Word, PowerPoint and they must be established and controlled and their mail documents vital to communication, more validity must be proved. At the same time security unstructured data such as PDF files, images from enforcement is also essential. Systems free from digital cameras, scanned images, audio files, large information leakage, caused not only by external capacity video files, internet web site content, and data access but also by internal malicious activity, production and engineering design drawings, have must be established. also been increasing rapidly. 3
    • In future storage operation management will be ETERNUS enables business continuation from the need to manage storage operations in an standpoints of "data protection" and "data disaster appropriate and effective manner. It must anticipate recovery.” the needs of information management and Security and compliance information utilization, including unstructured data Security is guaranteed through secure storage use to ensure improved business productivity and management, data encryption and encryption key strengthen corporate competitiveness. management. With compliance, access through a Overview of Storplex dedicated API and falsification prevention functions "Storplex" is focusing on five key areas in order to protect contents. respond to changes in business and storage Lifecycle management environments, and to provide solutions to new Fujitsu helps customers make effective investments management problems. in storage through the placement and movement of They are: "Business continuation", "Security and data between suitable storage media. This is keyed compliance", "Lifecycle management", "Information to the value of the information as it changes across sharing and retrieval" and "Green products". Fujitsu in the various stages of its lifecycle. is using its know-how and leading core technologies developed over many years of Information sharing and retrieval research and development. The result will be Integration of scattered file servers using file storage virtualization systems that provide virtualization functions enables information sharing end-to-end solutions. and improved data retrieval. Further, parallelization functions which use multi-cloning and the sharing of widely dispersed files, enable high-speed full-text searching of unstructured data types. Green products Through the development and use of storage products that have fewer effects on the environment, Fujitsu is contributing to reductions in environmental burdens. Fujitsu's green products also prevent wasteful power consumption through effective storage use and promote energy fig.1 conservation. Business continuation Storage systems are part of the fundamental IT infrastructure for business continuity in terms of storing and providing "information" as a crucial management resource. 4
    • 2. Business Continuation (Secure and stable operation of/Disaster prevention for the IT system) Business continuation is an extremely important 2-1 Data protection issue and has always been required by some Hardware data copying and data protection through customers. IT has become so vital in corporate links with databases provide methods of "data activity that an IT system halt can directly lead to a protection". Fujitsu is also developing CDP loss of business opportunity. At the same time, IT (Continuous Data Protection) solutions. system halts also pose a risk of damaging Hardware data copying corporate image and brand value. In order to Stored data backup is a necessary business prevent such problems from occurring Fujitsu operation. However, it can pose problems that continues to make great efforts to improve system affect business operations. These problems are availability by adopting highly reliable components solved by Fujitsu's AdvancedCopy function and redundant configurations for its storage. (high-speed copy function) which allows data In addition plans are necessary to ensure smooth copying at any given point in time without stopping business operation in the event of a system halt business operations. due to a disaster. Such plans must be able to minimize damage and ensure immediate recovery EC (Equivalent Copy) function from such damage. A function to simultaneously copy original data as it Stable business continuation is also essential from is updated. Copies can be created without load on the perspective of compliance and very important in disk storage systems by detaching it while expanding global business and improving maintaining equivalency. This function is suitable corporate image. for when need to avoid competition between heavy Storage systems are therefore fundamental IT load operations such as batch transactions. infrastructure for business continuation and must always store and providing "information" that is a OPC (One Point Copy) function crucial management resource. ETERNUS supports A function for creating a copy of all the original data business continuity from the standpoints of "Data at any given time. The subsequent backup with Protection" and "Disaster Recovery". QuickOPC copies only updated part of original data, resulting in backup time reductions. QuickOPC function A function for creating a copy of all the original data, and then only copying ongoing updated parts of the data. This function is suitable for backup of large-scale databases that require a shorter backup time. SnapOPC+ function A function for only copying updated data. It creates a copy of the data as it was before update. fig.2 Generation management of subsequent data updates is supported. This function is suitable for backup where copy volume capacity is limited and 5
    • there are relatively few updates, such as with file taken while integrity of the data file (tablespace), servers. and control and archive log files are guaranteed. fig.5 fig.3 Continuous data protection solution Data protection through a link with CDP (Continuous Data Protection) is a new type of databases data protection method that saves updated content, AdvancedCopy provides efficient database in chronological order every time data is updated. duplication processing (mirroring). Since This method enables data recovery back to at any AdvancedCopy can mirror data at the point in time (APIT). hardware-level, it can reduce the CPU load of the database server. Validation tests using Symfoware, Fujitsu's own RDBMS, have proved that CPU load can be reduced from approximately 20% to 6%. fig.6 2-2 Disaster recovery "Disaster recovery" provides data mirroring fig.4 between remote sites using either a 1: 1 or 1: n ratio. For Oracle DB, ETERNUS SF Recovery Manager for Oracle, in conjunction with ETERNUS hardware data copy function ensures that backup can be 6
    • Remote mirroring Remote copying to multiple branch It is useful to distribute data between several sites offices in an IT system in order to handle disasters. Fujitsu Fujitsu is enhancing its remote copy functions so has validated remote mirroring using WAN, and has that data copy destinations can be set flexibly to made it possible to construct highly reliable, highly distribute data effectively. This enhancement efficient disaster recovery systems even in remote achieves higher level disaster control by locations. distributing data between multiple data centers. Fujitsu also supports remote mirroring via iSCSI connection, which allows disaster recovery systems to be constructed at lower prices. Now Fujitsu is developing a function for low quality transmission lines (Disk Buffered REC) that allows remote mirroring even over transmission lines with low or fluctuating frequency bands. fig.8 fig.7 7
    • 3. Security and Compliance Storage faces security threats because it not only stores information, but it is the place that is accessed for that information. Protection of storage and stored information is a necessary compliance function. Demand for security has increased dramatically in the 21st century. Beginning with the SOX act implemented in the USA in 2002, the personal information protection law in Japan in 2004 and Financial Products Trading Law (Japanese version SOX act) in 2008, all urge or command companies to comply with security regulations. Security and fig.9 compliance have also become necessary with the globalization of business activities and are significant components in corporate responsibility. 3-1 Secure storage management Storage is moving from servers to devices directly (against external attacks) connected to the network. In such environments Secure data paths from servers and access path storage systems are even more subject to threats, management are required for operational storage including unauthorized access, information leakage, security and management. Monitoring of storage internal fraud, and data destruction. management is important in preventing Fujitsu believes that the following four values must unauthorized access. Segmentation of access be provided to customers: authority is also essential in further restricting - Robust protection from external attacks access methods. As well as simply granting certain - Controls that stop internal attempts to remove or levels of account authority to end users to allow alter data. them to operate a large shared system using large - Information reliability (Information leakage equipment, Fujitsu offers various functions to deal prevention and authenticity assurance) with the associated issues and suggests ways - Information storage beyond individual device operations should be conducted. life-spans. Secure storage management, data encryption and encryption key management ensure security. In terms of compliance, access via a dedicated API, falsification prevention functions, media refresh functions (for long term storage) and access through standardized inter-corporate protocols are keys to content protection. fig.10 8
    • 3-2 Data encryption and data key 3-3 Information management reliability/information leakage Data encryption is one effective measure in prevention preventing information leakage. ETERNUS has Now, storage capable of storing fixed content that internal functions that can encrypt each LUN using cannot be falsified or changed is required as a AES algorithms (Advanced Encryption Standard: a security compliance measure. In order to archive United States standard information processing fixed content safely and over the long term, a new algorithm for encryption. This algorithm has been type of storage product called CAS (Content Aware approved to be included in the "e-Government Storage) has been developed. Recommended Ciphers List" by Ministry of Internal CAS accesses content through a dedicated API Affairs and Communications and Ministry of (Application Programming Interface) for secure Economy, Trade and Industry). information archiving. Authentication by a Even if a disk is removed by a malicious third party dedicated API allows only users permitted access or lost during maintenance work, the encrypted disk to read and write data and prevents information cannot be decrypted. leaks by unauthorized users through illegal access. Also, many information leaks are due to stolen Fujitsu is developing products that are based on tapes. Many of have seen news reports about such XAM (eXtensible access method: specification stolen tapes. In order to prevent this type of defined by SNIA, which regulates interfaces information leakage, Fujitsu provides both a tape between reference information and storage areas). encryption function and also a function that XAM, used as a content access API, provides prevents removal of unencrypted tapes from the methods for accessing fixed content defined by tape library. each storage vendor and for sharing interfaces Furthermore, Fujitsu focuses on the importance of between middleware that accesses content. XAM key management and provides encryption key allows the referencing of content between different management servers. Through these efforts Fujitsu middleware and storage. is working to realize encryption key lifecycle management that complies with each corporate policy. fig.12 fig.11 9
    • 3-4 Media refresh (information storage beyond device lifetime) Some data needs to be stored longer than the lifetime of the storage device. This is becoming more common in meeting legal and regulatory audit requirements. Automatic data migration from old to new media is required. Media refresh allows long-term data storage without concern for media service life. fig.13 10
    • 4. Lifecycle Management (IT investment optimization through the lifecycle) "Information Lifecycle Management (ILM)" - an Automatic storage in the most suitable environment, approach to managing the flow of information from such as Tiered Storage and automatic placement of creation, utilization and management- is receiving files based on policies is key to effective lifecycle increasing attention. management. It also realizes cost reductions and Amid an explosive increase in data distribution and enables effective long-term storage of information. the rapid spread of broadband environments, the amount of data companies are dealing with has been said to be increasing at an annual rate of 70%. Furthermore, compliance with laws and regulations obligate longer-term data storage. The rapid increase in unstructured type data also cannot be ignored either. Most conventional data corresponds to a database table structure, but in recent years enormous quantities of unstructured data, such as mail documents, business fig.15 documents created using office applications, images, PDF documents, audio files, and video files have become ubiquitous. 4-1 Tiered storage Equally managing the various data types is Here storage is created using different media tiers. becoming harder due to cost and the manual Information is automatically stored in the nature of their management. appropriate tier according to its value and lifecycle Lifecycle management solves these problems by management policy. managing information depending on its life “stage”. Tiered storage structure The value of information is highest when Storage is divided into groups according to information is in its "create" and "use" stages and performance and cost. This allows stored changes as it moves into the "reference", "save" information whose value has changed to be moved and "delete" stages. Fujitsu enables effective to more cost effective storage. Here storage has investment in storage devices through data been divided into the following three groups called arrangement and by migration to the most suitable Tier1, Tier2, and Tier3: storage device as data value changes. Tier1: Online high performance storage capable of high-speed update and retrieval Tier2: Nearline storage that has larger capacity with excellent cost performance Tier3: Offline storage with very large capacity ideal for long term low activity data storage The introduction of Solid State Drive (SSD) provides much higher access speeds. Use of flash memory technology means no moving parts and greater reliability. They will be positioned as Tier0. fig.14 11
    • Autonomous data migration and device transfer Data is automatically reorganized whenever a new storage device is installed. When a new device is installed, tiers will be defined for the new device. At the same time, definitions can be made to arrange new target data in the new device and files can be migrated from old tiers to new tiers. Once all data is rearranged in the new device, the old fig.16 device can be deleted from the volume set. Policy based optimal placement of files Files are automatically transferred to where they should be stored based on mapping between their information value and tiered storage. For example, a "*.BAK" file is a backup file before update so it is arranged in Tier3 from the beginning. But placement is important. If a file is not accessed for a month, policy may move it to Tier2 from Tier1, based on its access frequency. It the access frequency declines even further, then it may be fig.18 moved from Tier2 to Tier3 and the file automatically deleted after its storage period expires. 4-2 Transparent access from applications Even if data stored in tiered storage is repeatedly rearranged, applications do not need to know in which tier of the storage data is stored. Transparent access from each application is always guaranteed. fig.17 fig.19 12
    • 5. Information Sharing and Retrieval (Prompt strategic utilization of cross-sectoral information (aggressive business management)) Information is not just something to be stored, it Unified mount point for multiple file needs to be utilized for enhanced corporate servers competitiveness. But with the emergence of The file virtualization function combines multiple file unstructured data types, the amount of information server name spaces into one big name space is not only increasing at an accelerating rate but under the switching layer. This big name space is a new mechanisms, for information sharing and Global Name Space. Scattered mount points are retrieval, are necessary. integrated into one, allowing all clients to share all Integration of scattered servers is gaining a lot of name spaces. attention as a solution. As the amount of unstructured data increases, additional file servers are frequently installed. File servers are easily utilized by connection to networks. However as the number of file servers increases, it becomes more difficult to manage mount points and client access authority. In addition adjusting and securing system maintenance times, amenable to all clients, becomes problematic. File server integration by file virtualization solves these issues. File sharing between widely separated sites and high-speed full-text search for unstructured type data also play important roles in information utilization. fig.21 Benefits of file server integration The file virtualization function can move files between file servers without effect on applications. It does this by hiding physical servers and storage groups from the applications. Smooth data migration becomes possible without affecting client operations. Data can also be mirrored by the replication function and if the primary server fails, the fig.20 secondary file server can take over the primary server's load. Again the virtualization means such a 5-1 File virtualization function device failure has not affect on the clients at all. File virtualization is an important method of A further advantage is that load balancing of integrating multiple file servers. multiple file servers can improve overall system performance. 13
    • 5-2 Wide area file server 5-3 Parallel search using the integration multi-clone function (Wide area contents sharing) Integration of file servers enables access to larger The scattered file servers to be integrated are not data volumes, making technology that can utilize it necessarily all located on a LAN. They may be more important. With conventional data types, data located in an extremely broad area including retrieval is mainly performed using search keys overseas. With such wide areas response prepared at time of database design. But search degradation of Windows shared files (CIFS) in technology called “full-text search” is required for WAN needs to be improved. unstructured data types. Fujitsu can create an environment close to LAN for Parallel search using the multi-clone function is wide area connections and accelerate file equivalent to full-text search. Here many clone integration through WAN optimization and other volumes are created from the master volume by the high-speed solutions. Fujitsu also supports TCP multi-clone function with each clone volume applications (FTP, HTTP, NFS, MAIL, etc.) in assigned to a search server in a 1:1 relationship. addition to CIFS and provides optimized WAN This enables parallel searching on all search networks for variety of customers. servers with data access at the highest possible throughput. fig.22 fig.23 14
    • 6. Green Products (Approach to environmental problems) Global environment problems are becoming 6-1 Space and power savings increasingly serious. It is essential for companies to (user friendly) take an active approach to environment problems, Fujitsu has been making efforts to develop space such as compliance with environmental laws and and power saving, silent design storage devices. It regulations, prevention of environmental risks, and released the ETERNUS2000 disk storage system fulfillment of increasing social responsibilities. As in 2007. And as the successor products of the percentage of IT power consumption continues ETERNUS2000, ETERNUS DX60/DX80 were to rise, due to the widespread and increasing released. demand for IT devices, development of new power Power savings saving technologies is now an urgent task. Through the adoption of cutting-edge technologies Fujitsu commenced Green Policy Innovation in ETERNUS DX60/DX80 consume less power December 2007 aimed at reducing environmental compared to older models. impact by strengthening and promoting Green IT With twelve 300GB disk drives installed, power efforts, something that Fujitsu has spent years to consumption can be reduced by 2,190kWh a year achieve. compared to 2005 year models. This is equal to a Fujitsu is focusing on both "reduction of reduction of 836kg in CO2 emissions. Fujitsu, with environmental burden imposed by IT infrastructure" 2009 year models, is continuing to work on further and "reduction of environmental burden imposed power consumption reductions through improved by IT utilization," and offering products and services device power efficiency. that take advantage of Fujitsu's knowledge and cutting-edge technology. Through the development and use of IT devices with fewer effects on the environment, Fujitsu will contribute to reduced environmental effect. Fujitsu is working to develop eco-friendly, user-friendly green products, and technology that improves energy efficiency by reducing storage capacity needs and power saving technology that controls wasteful power consumption. fig.25 Space savings ETERNUS2000, which was released in 2007, achieved a compact and light-weight design by reducing the number of components by 60 per cent. This is continued in ETERNUS DX60/DX80. With its enhanced storage capacity it requires only half the rack space of 2005 year models. If ETERNUS fig.24 15
    • DX60/DX80 are introduced into a large-scale data Users of individual servers are assigned virtual center, substantial floor space and operating costs volumes according to their requirements but no can be saved. Low component levels also result in physical storage is used at that time. Only when lower failure rates and improved storage device data is written to a volume that physical storage is reliability. assigned pro rata to the user. In environments where Thin Provisioning is introduced, physical 6-2 Improved operation efficiency disk drives can be efficiently expanded by New technologies for storage integration, capacity dynamically expanding physical capacity assigned virtualization, and functions to remove duplicate to each volume. data help improve operational efficiency. The following figure shows a total of 10TB of virtual volumes assigned to a server. Actual use indicates Going "Green" through storage that the disk storage system can start operation integration with just 2TB (1/5th of the virtual volume size). As While the memory density of disk drives doubles on data increases a pre-defined threshold alarm a two-year cycle, disk drive power consumption has notifies the requirement for additional physical stayed about the same regardless of the disks. This means that the new drives can be generation. added without stopping the system, ensuring For example, if 15TB of data stored on a disk continuous system operation. This technology storage system configured with 50 x 300GB online ensures efficient use of storage capacity and disk drives is migrated to a disk storage system minimizes unused disk capacity. supporting the latest 600GB online disk drives; the number of installed disks is reduced by half from 50 to 25, and power consumption also decreases by half. In addition, greater power efficiency is achieved by storing data on the most appropriate disk drives, based on the data’s value and importance. Flash memory based SSD (Solid State Drives) can reduce power consumption further as it contains no mechanical components. fig.26 Storage Capacity Virtualization (Thin Provisioning) Data Deduplication ETERNUS4000 and ETERNUS8000 Disk storage Data deduplication is achieved using technology systems support Thin Provisioning technology that that detects and deletes duplicates and virtualizes storage capacity. With Thin Provisioning, compresses data before storing it in a storage much lower levels of physical capacity can be device. As individual users share and store many installed and only assigned when it is actually used. similar data items, data duplication is common. This reduces the amount of unused physical disk There is also a lot of partially rewritten data, and capacity and power consumption. data with different file names that contain the same content. In this case data undergoes detailed 16
    • checks based on specified byte counts, and if data Further, MAID (Massive Arrays of Idle Disks) overlaps already stored data, the data is prevented technology can perform power-saving operations in from being written. Some reports have shown that conjunction with backup operations. Backup this technology can compress data size by 80% or destination disks can save power by only rotating more. during backup periods. 6-3 ECO visualization and operation (Cutting unneeded power consumption) Fujitsu can centralize storage power consumption and visualizes it along with storage load information. This allows business usage to checked by storage load information and unnecessary storage operations detected. For example, if storage area 1 fig.28 is not used at all for a certain period of time, it is possible to schedule it to be turned off during that period. fig.27 17
    • 7. Storage Virtualization Systems (Real time End-to-End service linkage) New storage systems that incorporate the five key As a result, the load on administrators reduced areas explained so far; "Business continuation", operational errors can be prevented. "Security and compliance", "Lifecycle From virtual storage pools to virtual management", "Information sharing and retrieval", resource pools and "Green products" are provided as “storage It is generally possible to create necessary disk virtualization systems” by Fujitsu. Customers can capacity by virtualizing disks regardless of storage then use storage capacity and I/O performance device capacity. Also, virtual disks can be more packaged as services as required and whenever easily expanded. necessary. In addition, disk capacity can also be flexibly Key benefits of storage virtualization are efficient allocated to servers through unified management setup and operation. Events such as "unexpected (pool operation) of disk capacity in the storage shortages in storage capacity" and " occurrence of device. Fujitsu's virtualization switch ETERNUS I/O bottlenecks" can be flexibly dealt with by the VS900, which supports multiple platforms, provides securing of sufficient capacity and performance. storage pool capability. An advanced version of this idea is a virtualization system which includes all servers and related storage. Virtual resource pools are constructed by virtualizing the network, servers, and storage. System administrators can allocate virtual disks in a flexible and on-demand manner according to business load, without concern for physical devices. fig.29 7-1 Virtual disks and virtual storage pools Virtual disks and virtual storage pools can allocate storage capacity flexibly according to business load. Benefits of virtual disks Storage virtualization technology frees datacenters fig.30 from the following operation tasks.: - Logical volume creation in the storage system - Server address (WWN) registration in the storage system - Logical volume setup in the storage system (Host affinity) - Zone settings for fibre channel switches 18
    • 7-2 Operation using virtual systems The following three operation types enable virtual systems: Automated virtual system creation Virtualization technology allows prompt creation of a virtual system (virtual sever + virtual storage). Virtual server management selects a virtual server from the virtual server pool based on requirements and allocates it to the virtual system. In the same manner, virtual storage management chooses fig.31 virtual storage, matched to needs, from the virtual storage pool and allocates it to the virtual system. Then the OS image that matches requirements is 7-3 Future of storage virtualization It is expected that in the future, when the storage high speed copied from the OS master. In this way, pool concept is well-established and physical a system best suited to the services required is network infrastructure is completely Ethernet, all easily created. I/O protocols used for current storage will be Demand forecasting of required handled by one network device. The storage resources structure of business data will use optimal protocols Resource and performance monitoring is very and the same optimal protocols will be used as the important for operations based on virtual systems. data access method. In this way Fujitsu will provide Resource and performance management functions storage that is best suited for business operation are provided for virtual system integration without concerns about storage space management of virtual systems that integrate virtual servers and storage. The usage status of the entire resources (including CPU, memory, and data extent) in the current virtual system can be checked and future demand on those resources can be predicted using the resource management functions of the virtual system. Migration between devices without stopping business operation Data can be migrated to a newly installed device without business interruption by registering new storage in a storage pool and specifying the target old virtual volume. As a result administrators are fig.32 freed from the many troublesome tasks associated with migration. 19
    • Virtualization Solution Center In December 2008, in order to support virtualization system construction, Fujitsu opened the “Virtualization Solution Center”. Based in the Platform Solution Center and using the various platforms in the total verification center, it verifies optimum virtualization system configurations and combinations. In addition, the center responds to other customer requirements such as performance estimation, compatibility verification and operability of virtualized systems. Fujitsu continues to enhance its provision of environments and centers that provide customers with usable and secure virtualized systems. fig.33 20
    • 8. Core Technology (Commitment to data availability and reliability improvement) Fujitsu is committed to data availability and Evaluation of all circuit elements reliability and that realization has been a corporate through simulated failure policy since inauguration of business. It is such a Fujitsu verifies that recovery can be performed part of our culture it could be said to be without fail and business can continue without incorporated into the DNA of each of our interruption in the event of failure. This is the way employees. we guarantee integrity and security of information With storage, we seek highly reliable systems that distribution and control paths. use carefully-selected, highly reliable components The same quality assurance system as with integrated system control that improves mainframe systems availability. Component redundancy/active The application of quality assurance systems replacement, RAID technology, hot cultivated over many years of mainframe storage swapping/rebuilding, and data mirroring all ensure development, has achieved leadership in quality redundant configuration. To guarantee component assurance systems. level reliability evaluation of each circuit element As shown above Fujitsu takes a unique approach to and accelerated evaluation of a component's the provision of high quality and high reliability. service life based on operational stress testing are performed. In addition, Fujitsu controls all processes from product design, mass production and quality management from Japan. This allows Fujitsu to better incorporate customer requirements into its products and solutions and maintains its advantages over other vendors. Component redundancy/active replacement Reliability is guaranteed by making every component fully redundant. Those components are also hot-swappable and hot-expandable. For example, when a disk drives fails, the fig.34 background process automatically rebuild data onto a hot spare disk. This enables failed disk drives to be hot-swapped without losing data redundancy. Accelerated evaluation of a component's service by operational stress testing Activation is checked after components are left for 24 hours in environments of -35°C, 100°C and 92% humidity. 21
    • ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ Conclusion Storplex continues to evolve. Fujitsu is looking to the future and continuing to refine its concepts and ideas to ensure consistency while helping customers to achieve their business goals. We will continue to offer storage infrastructure and services that allow smooth access to all required data and provide the right storage resource for business applications and business processes. By continuously matching development and concepts to changing business environments and requirements, Fujitsu will supply solutions that best meet customer expectations. Please note that this document includes information about planned products that may or may not be provided or may be provided with different specifications. Contact Fujitsu for any required detailed information. 22