Your SlideShare is downloading. ×
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
FUJITSU Storage Systems Storplex2008 Whitepaper
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

FUJITSU Storage Systems Storplex2008 Whitepaper

482

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
482
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. FUJITSU Storage System Leading storage solution development for a new era FUJITSU LIMITED
  • 2. Contents 1. What is Storplex 2008? .................................................................................. 3 2. Business Continuation (Secure and stable operation of/Disaster prevention for the IT system) .............5 2-1 Data protection................................................................................................................................................5 2-2 Disaster recovery ............................................................................................................................................6 3. Security and Compliance ............................................................................... 8 3-1 Secure storage management (against external attacks) .............................................................................8 3-2 Data encryption and data key management ...................................................................................................9 3-3 Information reliability/information leakage prevention ....................................................................................9 3-4 Media refresh (information storage beyond device lifetime).........................................................................10 4. Lifecycle Management (IT investment optimization through the lifecycle) ... 11 4-1 Tiered storage ...............................................................................................................................................11 4-2 Transparent access from applications ..........................................................................................................12 5. Information Sharing and Retrieval (Prompt strategic utilization of cross-sectoral information (aggressive business management)).....13 5-1 File virtualization function..............................................................................................................................13 5-2 Wide area file server integration (Wide area contents sharing)....................................................................14 5-3 Parallel search using the multi-clone function ..............................................................................................14 6. Green Products (Approach to environmental problems)............................. 15 6-1 Space and power savings (user friendly) ...................................................................................................15 6-2 Improved operation efficiency .......................................................................................................................16 6-3 ECO visualization and operation (Cutting unneeded power consumption) ..................................................17 7. On-Demand Systems (Real time End-to-End service linkage)..................... 18 7-1 Virtual disks and virtual storage pools ..........................................................................................................18 7-2 Operation using virtual systems....................................................................................................................19 7-3 Grid storage system (Future of storage virtualization)..................................................................................19 8. Core Technology (Commitment to data availability and reliability improvement) .... 21 Please note that this document includes information about planned products and they may not be provided or will be provided with different specifications. Contact Fujitsu for detailed information.
  • 3. Storplex 2008 FUJITSU Storage System 1. What is Storplex 2008? The role of storage has changed significantly from they must be established and controlled and their the 20th to the 21st century, and now storage has validity must be proved. At the same time security grown to be the core of IT infrastructure supporting enforcement is also essential. Systems free from corporate management. Fujitsu in focusing on the information leakage, caused not only by external increasing importance of storage is proposing data access but also by internal malicious activity, storage as a new type of system comprised of must be established. application and middleware rather than any single Worsening environmental problems component. With the first commitment period of the Kyoto From now on, Fujitsu’s new storage concept, Protocol beginning in 2008 (during which obligated Storplex2008, is being developed to resolve reductions in greenhouse gases must be achieved), changing operational problems. companies must seriously tackle environmental As a Cineplex provide a variety of movies in one concerns. IT infrastructure is deeply related to building, Fujitsu's Storplex aims to deliver integrated global warming. In particular data centers with their solutions to customers with a focus on the different concentration of servers and storage pose serious requirements of each operation. The concept of power consumption problems. In order to create Storplex 2008 presents a path to such optimal reliable products, power savings and CO2 applications based on high-level storage related reductions have become fundamental corporate technologies that Fujitsu has developed over the activities. This trend will continue to accelerate in past 10 years. These include: "Flexible connectivity”, the future. "Dynamic scalability”, "Continuous data access", and "Enterprise storage management”. Explosive increases in data volumes Behind the creation of this concept are the following Though nothing new, the amount of data keeps storage environment changes of recent years: increasing. For example, data that was previously stored in individual personal computers is now Globalization of business activities integrated into file servers for security and other Globalization of business activities continues to reasons, expanding storage requirements. Internal accelerate due to advances in, and deregulation of controls also cause upsurges in the amount of data, the internet. In order to ensure smooth continuous such as log files that are required to be saved. Also, business, day and night, IT infrastructure must also from the standpoint of management accounting, provide stable operation 24 hours a day, every day. storage of payment statements has become System availability and new operation frames are common. As a result, enormous data growth is necessary to guarantee this business continuity. having a heavy impact on storage. In addition to Increasing corporate social storage capacity expansion therefore, new responsibilities measures are required that consider cost Healthy corporate management based on laws and reductions and efficiency of operation. regulations is necessary for the stable growth of Increases in “unstructured” data each company. In Japan and around the world, Previously, it was only structured data that was held Financial Products Trading Laws have come into in storage and managed by database systems. effect. These stipulate internal controls for business As the internet spread, all employees were processes. Aimed at maintaining shareholder trust assigned personal computers to raise business 3
  • 4. Storplex 2008 FUJITSU Storage System productivity. As a result office documents and Business continuation e-mail exchange rapidly increased with the Storage systems are part of the fundamental IT acceleration of business. Along with business infrastructure for business continuity in terms of documents created in Excel, Word, PowerPoint and storing and providing "information" as a crucial mail documents vital to communication, more management resource. unstructured data such as PDF files, images from ETERNUS enables business continuation from the digital cameras, scanned images, audio files, large standpoints of "data protection" and "data disaster capacity video files, internet web site content, and recovery.” production and engineering design drawings, have Security and compliance also been increasing rapidly. Security is guaranteed through secure storage In future storage operation management will be management, data encryption and encryption key need to manage storage operations in an management. With compliance, access through a appropriate and effective manner. It must anticipate dedicated API and falsification prevention functions the needs of information management and protect contents. information utilization, including unstructured data use to ensure improved business productivity and Lifecycle management strengthen corporate competitiveness. Fujitsu helps customers make effective investments in storage through the placement and movement of Overview of Storplex 2008 data between suitable storage media. This is keyed "Storplex 2008" focuses on five key areas in order to the value of the information as it changes across to respond to the changes surrounding business in the various stages of its lifecycle. organizations, storage environments and to find solutions to new problems. Information sharing and retrieval They are: "Business continuation", "Security and Integration of scattered file servers using file compliance", "Lifecycle management", "Information virtualization functions enables information sharing sharing and retrieval" and "Green products". Fujitsu and improved data retrieval. Further, parallelization will continue to provide storage systems that functions which use multi-cloning and the sharing comply with these five key areas on an on-demand of widely dispersed files, enable high-speed basis. full-text searching of unstructured data types. Green products Through the development and use of storage products that have fewer effects on the environment, Fujitsu is contributing to reductions in environmental burdens. Fujitsu's green products also prevent wasteful power consumption through effective storage use and promote energy conservation. fig.1 4
  • 5. Storplex 2008 FUJITSU Storage System 2. Business Continuation (Secure and stable operation of/Disaster prevention for the IT system) Business continuation is an extremely important 2-1 Data protection issue and has always been required by some Hardware data copying and data protection through customers. IT has become so vital in corporate links with databases provide methods of "data activity that an IT system halt can directly links to a protection". Fujitsu is also developing CDP loss of business opportunity. At the same time, IT (Continuous Data Protection) solutions. system halts also pose the risk of damaging Hardware data copying corporate image and lose of brand value. In order Stored data backup is a necessary business to prevent such problems from occurring Fujitsu operation. However, it can pose problems that continues to make great efforts to improve system affect business operations. These problems are availability by adopting highly reliable components solved by Fujitsu's AdvancedCopy function and redundant configurations for its storage. (high-speed copy function) which allows data In addition plans are necessary to ensure smooth copying at any given point in time without stopping business operation in the event of a system halt business operations. due to disaster or terrorism. Such plans must be able to minimize damage and ensure immediate EC (Equivalent Copy) function recovery from such damage. This function simultaneously creates copies as the Stable business continuation is also essential from original data is updated. Ostensibly a mirrored the perspective of compliance and very important in relationship, when the relationship is broken the expanding global business and improving previously duplicated data can be used for other corporate image. business processes and for backup to tape Storage systems are therefore fundamental IT devices. infrastructure for business continuation and must always store and providing "information" that is a OPC (One Point Copy) function crucial management resource. ETERNUS supports This function creates a copy of all the original data business continuity from the standpoints of "Data at any given time. The data image, at time the copy Protection" and "Disaster Recovery". instruction is issued, is duplicated and can be used for other business processes and for backup to tape devices. QuickOPC function This function is used to create a copy of all the original data, and then only copy the updated part of such data. This function is suitable for backup of large-scale databases that require a shorter backup time. SnapOPC function This function is used to create a copy of the data fig.2 present before each data update. This approach can save copy destination disk capacity and is suitable for backup up of file servers that have relatively small updates. 5
  • 6. Storplex 2008 FUJITSU Storage System fig.5 fig.3 Continuous data protection solution Data protection through a link with CDP (Continuous Data Protection) is a new type of databases data protection method that saves updated content, AdvancedCopy provides efficient database in chronological order every time data is updated. duplication processing (mirroring). Since This method guarantees continuous data AdvancedCopy can mirror data at the protection. hardware-level, it can reduce the CPU load of the database server. Validation tests using Symfoware, Fujitsu's own RDBMS, have proved that CPU load can be reduced from approximately 20% to 6%. fig.6 2-2 Disaster recovery "Disaster recovery" provides data mirroring between remote sites using either a 1: 1 or 1: n fig.4 ratio. For Oracle DB, ETERNUS SF Recovery Manager Remote mirroring for Oracle, in conjunction with ETERNUS hardware It is useful to distribute data between several sites data copy function ensures that backup can be in an IT system in order to handle disasters. Fujitsu taken while integrity of the data file (tablespace), has validated remote mirroring using WAN, and has and control and archive log files are guaranteed. made it possible to construct highly reliable, highly 6
  • 7. Storplex 2008 FUJITSU Storage System efficient disaster recovery systems even in remote Remote copying to multiple branch locations. offices Fujitsu also supports remote mirroring via iSCSI Fujitsu is enhancing its remote copy functions so connection, which allows disaster recovery that data copy destinations can be set flexibly to systems to be constructed at lower prices. Now distribute data effectively. This enhancement Fujitsu is developing a function for low quality achieves higher level disaster control by transmission lines (Disk Buffered REC) that allows distributing data between multiple data centers. remote mirroring even over transmission lines with low or fluctuating frequency bands. fig.8 fig.7 7
  • 8. Storplex 2008 FUJITSU Storage System 3. Security and Compliance Storage faces security threats because it not only stores information, but it is the place that is accessed for that information. Protection of storage and stored information is a necessary compliance function. Demand for security has increased dramatically in the 21st century. Beginning with the SOX act implemented in the USA in 2002, the personal information protection law in Japan in 2004 and Financial Products Trading Law (Japanese version SOX act) in 2008, all urge or command companies to comply with security regulations. Security and fig.9 compliance have also become necessary with the globalization of business activities and are significant components in corporate responsibility. 3-1 Secure storage management Storage is moving from servers to devices directly (against external attacks) connected to the network. In such environments Secure data paths from servers and access path storage systems are even more subject to threats, management are required for operational storage including unauthorized access, information leakage, security and management. Monitoring of storage internal fraud, and data destruction. management is important in preventing Fujitsu believes that the following four values must unauthorized access. Segmentation of access be provided to customers: authority is also essential in further restricting - Robust protection from external attacks access methods. As well as simply granting certain - Controls that stop internal attempts to remove or levels of account authority to end users to allow alter data. them to operate a large shared system using large - Information reliability (Information leakage prevention and authenticity assurance) equipment, Fujitsu offers various functions to deal - Information storage beyond individual device with the associated issues and suggests ways life-spans. Secure storage management, data operations should be conducted. encryption and encryption key management ensure security. In terms of compliance, access via a dedicated API, falsification prevention functions, media refresh functions (for long term storage) and access through standardized inter-corporate protocols are keys to content protection. fig.10 8
  • 9. Storplex 2008 FUJITSU Storage System 3-2 Data encryption and data key 3-3 Information management reliability/information leakage Data encryption is one effective measure in prevention preventing information leakage. ETERNUS has Now, storage capable of storing fixed content that internal functions that can encrypt each LUN using cannot be falsified or changed is required as a AES algorithms (Advanced Encryption Standard: a security compliance measure. In order to archive United States standard information processing fixed content safely and over the long term, a new algorithm for encryption. This algorithm has been type of storage product called CAS (Content Aware approved to be included in the "e-Government Storage) has been developed. Recommended Ciphers List" by Ministry of Internal CAS accesses content through a dedicated API Affairs and Communications and Ministry of (Application Programming Interface) for secure Economy, Trade and Industry). information archiving. Authentication by a Even if a disk is removed by a malicious third party dedicated API allows only users permitted access or lost during maintenance work, the encrypted disk to read and write data and prevents information cannot be decrypted. leaks by unauthorized users through illegal access. Also, many information leaks are due to stolen Fujitsu is developing products that are based on tapes. Many of have seen news reports about such XAM (eXtensible access method: specification stolen tapes. In order to prevent this type of defined by SNIA, which regulates interfaces information leakage, Fujitsu provides both a tape between reference information and storage areas). encryption function and also a function that XAM, used as a content access API, provides prevents removal of unencrypted tapes from the methods for accessing fixed content defined by tape library. each storage vendor and for sharing interfaces Furthermore, Fujitsu focuses on the importance of between middleware that accesses content. XAM key management and provides encryption key allows the referencing of content between different management servers. Through these efforts Fujitsu middleware and storage. is working to realize encryption key lifecycle management that complies with each corporate policy. fig.12 fig.11 9
  • 10. Storplex 2008 FUJITSU Storage System 3-4 Media refresh (information storage beyond device lifetime) Some data needs to be stored longer than the lifetime of the storage device. This is becoming more common in meeting legal and regulatory audit requirements. Automatic data migration from old to new media is required. Media refresh allows long-term data storage without concern for media service life. fig.13 10
  • 11. Storplex 2008 FUJITSU Storage System 4. Lifecycle Management (IT investment optimization through the lifecycle) "Information Lifecycle Management (ILM)" - an Automatic storage in the most suitable environment, approach to managing the flow of information from such as Tiered Storage and automatic placement of creation, utilization and management- is receiving files based on policies is key to effective lifecycle increasing attention. management. It also realizes cost reductions and Amid an explosive increase in data distribution and enables effective long-term storage of information. the rapid spread of broadband environments, the amount of data companies are dealing with has been said to be increasing at an annual rate of 70%. Furthermore, compliance with laws and regulations obligate longer-term data storage. The rapid increase in unstructured type data also cannot be ignored either. Most conventional data corresponds to a database table structure, but in recent years enormous quantities of unstructured data, such as mail documents, business fig.15 documents created using office applications, images, PDF documents, audio files, and video files have become ubiquitous. 4-1 Tiered storage Equally managing the various data types is Here storage is created using different media tiers. becoming harder due to cost and the manual Information is automatically stored in the nature of their management. appropriate tier according to its value and lifecycle Lifecycle management solves these problems by management policy. managing information depending on its life “stage”. Tiered storage structure The value of information is highest when Storage is divided into groups according to information is in its "create" and "use" stages and performance and cost. This allows stored changes as it moves into the "reference", "save" information whose value has changed to be moved and "delete" stages. Fujitsu enables effective to more cost effective storage. Here storage has investment in storage devices through data been divided into the following three groups called arrangement and by migration to the most suitable Tier1, Tier2, and Tier3: storage device as data value changes. Tier1: Online high performance storage capable of high-speed update and retrieval Tier2: Nearline storage that has larger capacity with excellent cost performance Tier3: Offline storage with very large capacity ideal for long term low activity data storage Policy based optimal placement of files Files are automatically transferred to where they should be stored based on mapping between their information value and tiered storage. fig.14 11
  • 12. Storplex 2008 FUJITSU Storage System For example, a "*.BAK" file is a backup file before update so it is arranged in Tier3 from the beginning. But placement is important. If a file is not accessed for a month, policy may move it to Tier2 from Tier1, based on its access frequency. It the access frequency declines even further, then it may be moved from Tier2 to Tier3 and the file automatically deleted after its storage period expires. fig.17 4-2 Transparent access from applications Even if data stored in tiered storage is repeatedly rearranged, applications do not need to know in which tier of the storage data is stored. Transparent access from each application is always guaranteed. fig.16 Autonomous data migration and device transfer Data is automatically reorganized whenever a new storage device is installed. When a new device is installed, tiers will be defined for the new device. At the same time, definitions can be made to arrange new target data in the new device and files can be migrated from old tiers to fig.18 new tiers. Once all data is rearranged in the new device, the old device can be deleted from the volume set. 12
  • 13. Storplex 2008 FUJITSU Storage System 5. Information Sharing and Retrieval (Prompt strategic utilization of cross-sectoral information (aggressive business management)) Information is not just something to be stored, it Unified mount point for multiple file needs to be utilized for enhanced corporate servers competitiveness. But with the emergence of The file virtualization function combines multiple file unstructured data types, the amount of information server name spaces into one big name space is not only increasing at an accelerating rate but under the switching layer. This big name space is a new mechanisms, for information sharing and Global Name Space. Scattered mount points are retrieval, are necessary. integrated into one, allowing all clients to share all Integration of scattered servers is gaining a lot of name spaces. attention as a solution. As the amount of unstructured data increases, additional file servers are frequently installed. File servers are easily utilized by connection to networks. However as the number of file servers increases, it becomes more difficult to manage mount points and client access authority. In addition adjusting and securing system maintenance times, amenable to all clients, becomes problematic. File server integration by file virtualization solves these issues. File sharing between widely separated sites and high-speed full-text search for unstructured type data also play important roles in information utilization. fig.20 Benefits of file server integration The file virtualization function can move files between file servers without effect on applications. It does this by hiding physical servers and storage groups from the applications. Smooth data migration becomes possible without affecting client operations. Data can also be mirrored by the replication fig.19 function and if the primary server fails, the secondary file server can take over the primary 5-1 File virtualization function server's load. Again the virtualization means such a File virtualization is an important method of device failure has not affect on the clients at all. integrating multiple file servers. A further advantage is that load balancing of multiple file servers can improve overall system performance. 13
  • 14. Storplex 2008 FUJITSU Storage System 5-2 Wide area file server 5-3 Parallel search using the integration multi-clone function (Wide area contents sharing) Integration of file servers enables access to larger The scattered file servers to be integrated are not data volumes, making technology that can utilize it necessarily all located on a LAN. They may be more important. With conventional data types, data located in an extremely broad area including retrieval is mainly performed using search keys overseas. With such wide areas response prepared at time of database design. But search degradation of Windows shared files (CIFS) in technology called “full-text search” is required for WAN needs to be improved. unstructured data types. Fujitsu can create an environment close to LAN for Parallel search using the multi-clone function is wide area connections and accelerate file equivalent to full-text search. Here many clone integration through WAN optimization and other volumes are created from the master volume by the high-speed solutions. Fujitsu also supports TCP multi-clone function with each clone volume applications (FTP, HTTP, NFS, MAIL, etc.) in assigned to a search server in a 1:1 relationship. addition to CIFS and provides optimized WAN This enables parallel searching on all search networks for variety of customers. servers with data access at the highest possible throughput. fig.21 fig.22 14
  • 15. Storplex 2008 FUJITSU Storage System 6. Green Products (Approach to environmental problems) Global environment problems are becoming 6-1 Space and power savings increasingly serious. It is essential for companies to (user friendly) take an active approach to environment problems, Fujitsu has been making efforts to develop space such as compliance with environmental laws and and power saving, silent design storage devices. It regulations, prevention of environmental risks, and released the ETERNUS2000 disk storage system fulfillment of increasing social responsibilities. As in May 2007. the percentage of IT power consumption continues Power savings to rise, due to the widespread and increasing Through the adoption of cutting-edge technologies demand for IT devices, development of new power ETERNUS2000 consumes less power compared to saving technologies is now an urgent task. older models. Fujitsu commenced Green Policy Innovation in With twelve 300GB disk drives are installed in a December 2007 aimed at reducing environmental ETERNUS2000, power consumption can be impact by strengthening and promoting Green IT reduced by 2,100kWh a year compared to older efforts, something that Fujitsu has spent years to models. If this is converted into CO2 emissions, it is achieve. equal to a reduction of 803kg of CO2, the amount Fujitsu is focusing on both "reduction of absorbed by 58 cedar trees a year. In 2009 Fujitsu environmental burden imposed by IT infrastructure" will achieve reductions in power consumption of and "reduction of environmental burden imposed about 20% compared to older models by using disk by IT utilization," and offering products and services drives with better power-saving performance. that take advantage of Fujitsu's knowledge and cutting-edge technology. Through the development and use of IT devices with fewer effects on the environment, Fujitsu will contribute to reduced environmental effect. Fujitsu is working to develop eco-friendly, user-friendly green products, and technology that improves energy efficiency by reducing storage capacity needs and power saving technology that controls wasteful power consumption. fig.24 Space savings In ETERNUS2000, the RAID controller is contained on a single chip, which reduces PCB size by 60%. A further 60% reduction in the number of components leads to a more compact and lighter fig.23 storage device. Reductions in the number of 15
  • 16. Storplex 2008 FUJITSU Storage System components also results in a lower failure ratio and data is written to a volume that physical storage is improved storage device reliability. assigned pro rata to the user. In environments The minimum height of the ETERNUS2000 is 2U where Thin Provisioning is introduced, physical and this size is half that of previous models. If the disk drives can be efficiently expanded by ETERNUS2000 is introduced into a large-scale dynamically expanding physical capacity assigned data center, substantial floor space and customer to each volume. costs can be saved. The following figure shows a total of 400TB virtual volumes are assigned to servers A, B, and C. The 6-2 Improved operation efficiency disk storage system can start operation with 100TB New technology such as storage integration, Thin of shared disk drives in the storage pool (1/4th of Provisioning, and De-duplication helps improve the virtual volume size). The available space is operation efficiency. assigned according to actual needed disk drive capacity. This technology realizes efficient use of Going "Green" through storage storage capacity. integration While the memory density of disk drives doubles on a two-year cycle, disk drive power consumption has stayed about the same regardless of the generation. For example, if 15TB of data stored on a disk storage system configured with 50 x 300GB online disk drives is migrated to a disk storage system supporting the latest 600GB online disk drives; the number of installed disks is reduced by half from 50 to 25, and power consumption also decreases by half. In addition, more efficient power saving is achieved by storing data on appropriate disk drives, based fig.25 on data value and importance. Flash SSD (Solid State Disk) based on flash memory technology, can De-Duplication reduce power consumption further as it contains no (Detection and deletion of duplicated mechanical functions. data) De-duplication is technology that deletes duplicates Thin Provisioning and compresses data before storing it in a storage (Dynamic Storage Capacity Allocation) device. As individual user can share lots of data, Thin Provisioning is technology that virtualizes much duplication can occur. There is also a lot of storage capacity and enables efficient use of partially rewritten data, and data with different file space. names that contains the same content. In this case Users of individual servers are assigned virtual data undergoes detailed checks based on specified volumes according to their requirements but no byte counts, and if data overlaps already stored physical storage is used at that time. Only when data, the data is prevented from being written. 16
  • 17. Storplex 2008 FUJITSU Storage System Some reports have shown that this technology can Further, MAID (Massive Arrays of Idle Disks) compress data size by 80% or more. technology can perform power-saving operations in conjunction with backup operations. Backup 6-3 ECO visualization and destination disks can save power by only rotating operation during backup periods. (Cutting unneeded power consumption) Fujitsu can centralize storage power consumption and visualizes it along with storage load information. This allows business usage to checked by storage load information and unnecessary storage operations detected. For example, if storage area 1 is not used at all for a certain period of time, it is possible to schedule it to be turned off during that period. fig.27 fig.26 17
  • 18. Storplex 2008 FUJITSU Storage System 7. On-Demand Systems (Real time End-to-End service linkage) Storage system that incorporate the five key areas As a result, the load on administrators reduced explained so far; "Business continuation", "Security operational errors can be prevented. and compliance", "Lifecycle management", From virtual storage pools to virtual "Information sharing and retrieval", and "Green resource pools products" help in the construction of new systems It is generally possible to create necessary disk capable of providing on-demand services. capacity by virtualizing disks regardless of storage Customers can then use storage capacity and I/O device capacity. Also, virtual disks can be more performance that are packaged as services as easily expanded. required and whenever necessary. In addition, disk capacity can also be flexibly The benefits of storage device management are allocated to servers through unified management efficient setup and operation. Events such as (pool operation) of disk capacity in the storage "unexpected shortages in storage capacity" and " device. Fujitsu's virtualization switch ETERNUS occurrence of I/O bottlenecks" can be flexibly dealt VS900, which supports multiple platforms, provides with by the securing of sufficient capacity and storage pool capability. performance. An advanced version of this idea is a virtualization system which includes storage. Virtual resource pools are constructed by virtualizing the network, servers, and storage. System administrators can allocate virtual disks in a flexible and on-demand manner according to business load, without concern for physical devices. fig.28 7-1 Virtual disks and virtual storage pools Virtual disks and virtual storage pools can allocate storage capacity flexibly according to business load. Benefits of virtual disks Storage virtualization technology frees datacenters from the following operation tasks.: - Logical volume creation in the storage system fig.29 - Server address (WWN) registration in the storage system - Logical volume setup in the storage system (Host affinity) - Zone settings for fibre channel switches 18
  • 19. Storplex 2008 FUJITSU Storage System 7-2 Operation using virtual entire resources (including CPU, memory, and data systems extent) in the current virtual system can be checked The following three operation types enable virtual and future demand on those resources can be systems: predicted using the resource management functions of the virtual system. Automated virtual system creation Virtualization technology allows prompt creation of Migration between devices without a virtual system (virtual sever + virtual storage). stopping business operation Virtual server management selects a virtual server Data can be migrated to a newly installed device from the virtual server pool based on requirements without business interruption by registering new and allocates it to the virtual system. In the same storage in a storage pool and specifying the target manner, virtual storage management chooses old virtual volume. As a result administrators are virtual storage, matched to needs, from the virtual freed from the many troublesome tasks associated storage pool and allocates it to the virtual system. with migration. Then the OS image that matches requirements is high speed copied from the OS master. In this way, a system best suited to the services required is easily created. fig.31 7-3 Grid storage system (Future of storage virtualization) fig.30 It is expected that in the future, when the storage pool concept is well-established and physical Demand forecasting of required network infrastructure is completely Ethernet, all resources I/O protocols used for current storage will be Resource and performance monitoring is very handled by one network device. The storage important for operations based on virtual systems. structure of business data will use optimal protocols Resource and performance management functions and the same optimal protocols will be used as the are provided for virtual system integration data access method. In this way Fujitsu will provide management of virtual systems that integrate storage that is best suited for business operation virtual servers and storage. The usage status of the without concerns about storage space 19
  • 20. Storplex 2008 FUJITSU Storage System fig.32 20
  • 21. Storplex 2008 FUJITSU Storage System 8. Core Technology (Commitment to data availability and reliability improvement) Fujitsu is committed to data availability and Component redundancy/active reliability and that realization has been a corporate replacement policy since inauguration of business. It is such a Reliability is guaranteed by making every part of our culture it could be said to be component fully redundant. Those components are incorporated into the DNA of each of our also hot-swappable and hot-expandable. employees. For example, when a disk drives fails, the With storage, we seek highly reliable systems that background process automatically rebuild data use carefully-selected, highly reliable components onto a hot spare disk. This enables failed disk with integrated system control that improves drives to be hot-swapped without losing data availability. Component redundancy/active redundancy. replacement, RAID technology, hot Accelerated evaluation of a swapping/rebuilding, and data mirroring all ensure component's service by operational redundant configuration. To guarantee component stress testing level reliability evaluation of each circuit element Activation is checked after components are left for and accelerated evaluation of a component's 24 hours in environments of -35°C, 100°C and 92% service life based on operational stress testing are humidity. performed. Evaluation of all circuit elements through simulated failure Fujitsu verifies that recovery can be performed without fail and business can continue without interruption in the event of failure. This is the way we guarantee integrity and security of information distribution and control paths. As stated above Fujitsu is takes a unique approach to providing high quality and high reliability. fig.33 21
  • 22. Storplex 2008 FUJITSU Storage System ・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・・ Conclusion Storplex 2008 is the advanced version of Storplex released in 1999. By such concepts Fujitsu is looking to the future to consistently help customers achieve their business goals. We will continue to offer storage infrastructure and services that allow smooth access to all required data and storage resource from business applications and business processes based on defined privileges matched to the changing business environment. It is our plan to keep doing our best to satisfy our customer’s expectations. Please note that this document includes information about planned products that may or may not be provided or may be provided with different specifications. Contact Fujitsu for any required detailed information. 22

×