The document provides an overview of storage technology options including network attached storage (NAS), storage area networks (SANs), and discusses specific NAS and SAN products. It highlights the key features of an iSCSI SAN brick platform including software for snapshots, replication, and continuous data protection. Appliance strategies and partnerships are also summarized.
3. Use Cases Drive Storage Requirements Applications Operating Environments : Storage Infrastructure Applications have varying needs for storage Operating Environments require storage infrastructure which can deliver a multitude of storage services SQL, Oracle, Web 2.0, CRM, ERP, Exchange, SharePoint, Audio, Video, PDF, Docs, etc. Windows, Linux, Solaris, VMware, Virtual Iron, Citrix/Xen Block Level Access, File Sharing, Data Protection, Data De-Duplication Disaster Recovery
4. General Storage Technology THINGS TO CONSIDER THE GOOD No Network or External Arrays Needed Fast Through-Put Difficult To Maintain Does Not Balance Loads Small and Predictable Storage Flat File Storage Simple To Configure And Maintain Primarily targeted at storing files, not blocks Data Back Up Simple Extra Storage Moving Large Blocks Of Data, Scaleable, Reliable, Ease Of Management Price Point Bandwidth Intensive Mission Critical Data WHO SHOULD USE? DAS NAS SAN WHERE IS THE BEST FIT Local Operating System Flat File, Simple data changes I/Op Intensive, quick block changes, Databases
5. The Storage Continuum Data Storage Centralization NAS Storage Storage Protection & Recovery iSCSI, CDP Brick FC SAN Brick NAS Storage Business Compliance Archive iSCSI, CDP Brick FC SAN Brick NAS Storage FC SAN Brick NAS Storage Server Storage Growth
6. Tiered Storage The Complete Solution Consists of: Tier #2 : Near-Line Storage Tier #1 : On-Line Tier #3 : Off-Line Storage Performance and Fast Recovery Cost Effective and Manageable Secure and Safe NAS Storage iSCSI, CDP Brick FC SAN Brick Automated Tape Backup
7. Appliance Strategy Operating System Applications Continue to bring to market the latest in hardware products serviced with the industry’s best support Bring to market innovative software products that are packaged, serviced and supported as an “Appliance” - DataFRAME SAN - MailFRAME Email Archiving - Virtual Tape Library and others… Appliance Standard Input/Output Standard Storage Standard Hardware Standardized Packaging Standard HW
8. Sharing Common HW Building Blocks SAN Products NAS Products RAID HBA Drivers Motherboard Hard Drives NIC “ StarLake” motherboard from Intel – Widely deployed across the MPC product line and within infrastructure products around the world Servers
11. Storage For the Workgroup Intel “Baxter Creek” Network: Dual GigE Ethernet Drives: Up to 2TB capacity (4 500GB SATA HDD) File System: CIFS, NFS Supported RAID: 0, 1, 5, 10 Client Backup and Recovery Application: Bare Metal Disk back-up and restore Additional Interfaces/Functions: USB ports Client OS Support: Window 2000* SP2,Windows XP*, Linux*
12. Centralized File Storage A wide range of NAS storage systems using standard server hardware implemented with Windows Storage Server Key Features of Windows Storage Servers: -Standard File System: CIFS, NFS & DFS (Distributed File System) -Single Instance Storage: Reduces storage capacity and storage management overhead -Advanced Search indexing: Extracts information from a set of documents and organizes it -Windows SharePoint Services: Provides storage for web based collaboration Baxter Creek NAS Storage using Windows Storage Server 1U Rack 2U Rack Large Tower/ Rack Convertible Large Tower Small Tower Baxter Creek
16. FC Brick 2U Storage System 12 Drive Drive Capacity per shelf 5 Shelf Shelf Expansion
17.
18. FC Brick Configurations Single SAS / SATA RAID Controller – RAID engine for all 12 drives FC Brick HOST Single brick with single host connection SAS Interconnect Dual SAS / SATA RAID Controller – Redundant RAID engine for all 12 drives HOST Single brick with dual host connection Redundant SAS or Fiber Interconnect FC Brick or Fiber Interconnect or or
19. Brick Expansion SAS Interconnection FC or SAS host connection and expandable to 5 shelves (60 drives) Follow-on expansion shelves contain SAS expansion controller 842R HOST Redundant SAS or Fiber 842R or or 1st shelf contains RAID controller for follow-on expansion shelves
24. Architecture Comparison Hardware Hardware Proprietary Welded on Apps. Software is bolted to hardware Software is tied to proprietary kernel Applications are welded onto platform Software can be easily moved to new hardware IPStor utilizes standard Linux OS Application Suites are added to make different appliances S A N IPStor V T L C D P Stove Pipe Architecture Totally Open Architecture Linux
25. One Single Platform - Multiple Solutions Replication Snapshots Mirroring IPStor Continuous Data Protection IPStor De-Duplication Virtual Tape IPStor ABC DEF IPStor SAN CDP VTL Other Totally Open: Common Platform Enabling Multiple solutions Other Mixed environment and difficult to manage or… Replication Snapshots Mirroring Vendor A Vendor B Vendor C Vendor D Continuous Data Protection De-Duplication Virtual Tape ABC DEF
26.
27.
28. Configurations iSCSI SAN Brick iSCSI HOST iSCSI SAN Brick Single iSCSI SAN Brick Single Brick w/Expansion HOST Expansion Module SAS Interconnect iSCSI
29. Configurations Mirrored Head units with Redundant Expansion iSCSI Brick 1GbE or 10GbE iSCSI Brick HOST Expansion Mirrored iSCSI Bricks Expansion Shelves with redundant RAID and SAS interconnect iSCSI Dual 1GbE or 10GbE
34. human error software malfunction computer virus site disaster hardware or system malfunction 32% 44% 3% 7% 14% iSCSI: Data Protection – How To Prevent It RAID and Failvoer Redundant Power MPIO Snapshots Intelligent Server Agents Distributed SAN Efficient Remote Replication
38. Snapshots – Recovering Data Snapshot created at 10:00 AM This report Is due This report Is due File is recovered at 10:12 AM The file is recovered from the snapshot image created at 10:00 AM and in that time the user made some changes. However, the majority of the report is the same. File is accidentally deleted at 10:10 AM This report Is due today
44. Disk Safe Agents for Continuous Data Protection Disk Safe agent software resides on client and server disks the customer wants to protect. As a protected disk is written to, the agent simultaneously sends the written data to the iSCSI Brick Should a protected disk fail completely, the disk can be replaced, the system PXE booted, and the entire disk recovered. PROTECTED!!! PROTECTED!!! PROTECTED!!! PROTECTED!!!