SlideShare a Scribd company logo
1 of 23
© 2009 EMC Corporation. All rights reserved.
EMC Proven Professional
The #1 Certification Program in the information storage
and management industry
Content Addressed Storage
Chapter 9
Section 2 : Storage Networking Technologies and Virtualization
© 2009 EMC Corporation. All rights reserved.
Chapter Objectives
Upon completion of this chapter, you will be able to:
o Describe CAS, fixed content and archives, traditional storage
solutions for archive
o Describe the features and benefits of a CAS based storage
strategy
o List the physical and logical elements of CAS
o Describe the storage and retrieval process for CAS data objects
o Describe the best suited operational environments for CAS
solutions
© 2009 EMC Corporation. All rights reserved.
Lesson: CAS Overview
Upon completion of this lesson, you be able to:
o Define fixed content
o Describe traditional archival solutions and its shortcoming
o Define Content Addressed Storage (CAS)
o List benefits of CAS
© 2009 EMC Corporation. All rights reserved.
What are Fixed Content and Archives
Electronic Documents
•Contracts, claims, etc.
•E-mail and attachments
•Financial spread sheets
•CAD/CAM designs
•Presentations
Digital Records
•Documents
– Checks, securities trades
– Historical preservation
•Photographs
– Personal / professional
•Surveys
– Seismic, astronomic,
geographic
Digital Assets Retained For Active Reference And Value
Leverage
Historical Value
Improve
Service Levels
Generate
New Revenues
Rich Media
•Medical
– X-rays, MRIs, CTI
•Video
– News / media, movies
– Security surveillance
•Audio
– Voicemail
– Radio
© 2009 EMC Corporation. All rights reserved.
Challenges of Storing Fixed Content
o Fixed content is growing at more than 90% annually
o Significant amount of newly created information falls into this category
o New regulations require retention and data protection
o Often, long-term preservation is required (years-decades)
o Simultaneous multi-user online access is preferable to offline
storage
o Need faster access to fixed content
o Need for location independent data, enabling technology
refresh and migration
o Traditional storage methods are inadequate
© 2009 EMC Corporation. All rights reserved.
Traditional storage solutions for Archive
o Three categories of archival solution are:
o Online, nearline, and offline based on the means of access
o Traditional archival solution were offline
o Traditional archival process used optical disks and tapes as media for
archival
o An archive is often stored on a Write Once Read Many (WORM) device,
such as a CD-ROM
© 2009 EMC Corporation. All rights reserved.
Shortcomings of Traditional Archiving Solutions
o Tape is slow, and standards are always changing
o Optical is expensive, and requires vast amounts of media
o Recovering files from tape and optical is often time consuming
o Data on tape and optical is subject to media degradation
o Both solution require sophisticated media management
CAS has emerged as an alternative to traditional
archiving solutions
© 2009 EMC Corporation. All rights reserved.
What is Content Addressed Storage (CAS)
o Object-oriented, location-independent approach to data
storage
o Repository for the “Objects”
o Access mechanism to interface with repository
o Globally unique identifiers provide access to objects
© 2009 EMC Corporation. All rights reserved.
Benefits of CAS
o Content authenticity
o Content integrity
o Location independence
o Single-instance storage (SiS)
o Retention enforcement
o Record-level protection and disposition
o Technology independence
o Fast record retrieval
Additional Task
Research on role of CAS in ILM
Strategy
© 2009 EMC Corporation. All rights reserved.
Lesson Summary
Key points covered in this lesson:
o CAS Definition
o Challenges of Storing Fixed Content
o Shortcomings of Traditional Archiving Solutions
o Benefits of CAS
© 2009 EMC Corporation. All rights reserved.
Lesson: CAS Architecture
Upon completion of this lesson, you will be able to:
o Describe CAS architecture
o Describe Physical and logical elements of CAS
o Describe data storage and retrieval process in CAS
environment
o CAS examples
© 2009 EMC Corporation. All rights reserved.
Physical Elements of CAS
o Storage devices (CAS Based)
o Storage node
o Access node
o Servers (to which storage devices
get connected)
o Client
Server
Private
LAN
Storage
Nodes
Access
Nodes
CAS System
IP
API
© 2009 EMC Corporation. All rights reserved.
CAS Terminology
o Application Programming Interface (API)
o A set of function calls that enables communication
between applications or between an application and
an operating system
o BLOB (Binary Large Object)
o The actual data without the descriptive information
(metadata)
o The Distinct Bit Sequence (DBS) of user data
represents the actual content of a file and is
independent of the filename and physical location
API
© 2009 EMC Corporation. All rights reserved.
CAS Terminology (Cont)
o C-Clip
o A package containing the user's data and associated
metadata
o C-Clip ID (C-Clip handle or C-Clip reference) is the CA that
the system returns to the client application
o Content Address (CA)
o An identifier that uniquely addresses the content of a file
and not its location. Unlike location-based addresses,
content addresses are inherently stable and, once
calculated, they never change and always refer to the same
content
o C-Clip Descriptor File (CDF)
o The additional XML file that the system creates when
making a C-Clip. This file includes the content addresses for
all referenced BLOBs and associated metadata
© 2009 EMC Corporation. All rights reserved.
API
How CAS Stores a Data Object
Unique Content
Address is calculated
Client presents data
to API to be archived CAS System
Client
Application Server
CDF
C-Clip
(Object)
Object is sent
to CAS System via
CAS API over IP
© 2009 EMC Corporation. All rights reserved.
API
How CAS Stores a Data Object
Unique Content
Address is calculated
Client presents data
to API to be archived CAS System
Client
Application Server Object is sent
to CAS System via
CAS API over IP Object
CAS System validates
the Content Address
and stores the object
Acknowledgement
returned to
application
Clip ID is retained and
stored for future use
© 2009 EMC Corporation. All rights reserved.
Application Server
Client
CAS System
Object is needed by
an application
1
CAS authenticates
the request and
delivers the object
4
Application finds
Content Address of
object to be retrieved
2 Retrieval request is
sent to the CAS System via
CAS API over IP
3
How CAS Retrieves a Data Object
API
C-Clip ID
© 2009 EMC Corporation. All rights reserved.
CAS Features
o Features available with most CAS systems are:
o Integrity checking
o Data protection
o Local replication
o Remote replication
o Load balancing
o Scalability
o Self-diagnosis and repair
o Report generation and event notification
o Fault tolerance
o Through the use of redundant components and data protection schemes
o Audit trails
o Documentation of management activities, access and disposition of data
© 2009 EMC Corporation. All rights reserved.
Example 1: CAS Healthcare Solution
o Each X-ray image ranges from about 15MB to over 1GB
o Patient record is stored online for a period of 60-90 days
o Beyond 90 days patient records are archived
Data Stored
on CAS
Patient Studies
Stored locally for
Short-Term Use
(60 Days)
Hospital
CAS SystemApplication
Server
API
© 2009 EMC Corporation. All rights reserved.
Example 2: CAS Financial Solution
o Check image size is about 25KB
o Check imaging service provider may process 50–90 million
check images per month
o Checks are stored online for a period of 60 days
o Beyond 60 days data is archived
Bank
CAS SystemApplication Server
API
© 2009 EMC Corporation. All rights reserved.
Lesson Summary
Key points covered in this lesson:
o CAS architecture
o Physical and logical elements of CAS
o CAS storage and retrieval process
o CAS solution examples
© 2009 EMC Corporation. All rights reserved.
Chapter Summary
Key points covered in this chapter:
o Benefits of CAS based storage strategy
o Overview of physical and logical elements of CAS
o Storing and retrieving data from CAS
o CAS application examples
© 2009 EMC Corporation. All rights reserved.
#1 IT
company
For more information visit http://education.EMC.com

More Related Content

What's hot

Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationRahul Hada
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Ravindra Dastikop
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administrationgamme123
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service AttackDhrumil Panchal
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbharCross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbharSandeep Kumbhar
 
Web application security I
Web application security IWeb application security I
Web application security IMd Syed Ahamad
 
Building systems from off the shelf components
Building systems from off the shelf componentsBuilding systems from off the shelf components
Building systems from off the shelf componentsHimanshu
 
Security Vulnerabilities
Security VulnerabilitiesSecurity Vulnerabilities
Security VulnerabilitiesMarius Vorster
 
Security models
Security models Security models
Security models LJ PROJECTS
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directoryanilinvns
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 

What's hot (20)

Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture Cloud Computing and Service oriented Architecture
Cloud Computing and Service oriented Architecture
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
introduction to system administration
introduction to system administrationintroduction to system administration
introduction to system administration
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbharCross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
 
Web application security I
Web application security IWeb application security I
Web application security I
 
Web controls
Web controlsWeb controls
Web controls
 
Building systems from off the shelf components
Building systems from off the shelf componentsBuilding systems from off the shelf components
Building systems from off the shelf components
 
Security Vulnerabilities
Security VulnerabilitiesSecurity Vulnerabilities
Security Vulnerabilities
 
Network security
Network security Network security
Network security
 
Security models
Security models Security models
Security models
 
Windows Server 2008 Active Directory
Windows Server 2008 Active DirectoryWindows Server 2008 Active Directory
Windows Server 2008 Active Directory
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network attacks
Network attacksNetwork attacks
Network attacks
 

Similar to Chapter 9

Presentation atmos architecture overview
Presentation   atmos architecture overviewPresentation   atmos architecture overview
Presentation atmos architecture overviewxKinAnx
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfTony Pearson
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksVaidas Brundza
 
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 IDT Replaces On-Premises Appliances with Primary Backup on AWS IDT Replaces On-Premises Appliances with Primary Backup on AWS
IDT Replaces On-Premises Appliances with Primary Backup on AWSAmazon Web Services
 
Se training storage grid webscale technical overview
Se training   storage grid webscale technical overviewSe training   storage grid webscale technical overview
Se training storage grid webscale technical overviewsolarisyougood
 
Oracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle CloudOracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle Cloudpasalapudi
 
Oracle Cloud Infraestructure Update
Oracle Cloud Infraestructure UpdateOracle Cloud Infraestructure Update
Oracle Cloud Infraestructure UpdateRaphaelCampelo
 
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018Snowy Chen
 
Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)Simeon Warner
 
S016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dS016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dTony Pearson
 
Storage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyStorage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyEMC
 
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_033020100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330glorykim
 
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_033020100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330광영 김
 
NetApp Se training storage grid webscale technical overview
NetApp Se training   storage grid webscale technical overviewNetApp Se training   storage grid webscale technical overview
NetApp Se training storage grid webscale technical overviewsolarisyougood
 
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bS104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bTony Pearson
 
S100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cS100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cTony Pearson
 
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...Amazon Web Services
 

Similar to Chapter 9 (20)

Presentation atmos architecture overview
Presentation   atmos architecture overviewPresentation   atmos architecture overview
Presentation atmos architecture overview
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area Networks
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 IDT Replaces On-Premises Appliances with Primary Backup on AWS IDT Replaces On-Premises Appliances with Primary Backup on AWS
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 
Se training storage grid webscale technical overview
Se training   storage grid webscale technical overviewSe training   storage grid webscale technical overview
Se training storage grid webscale technical overview
 
Oracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle CloudOracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle Cloud
 
Oci meetup v1
Oci meetup v1Oci meetup v1
Oci meetup v1
 
Oracle Cloud Infraestructure Update
Oracle Cloud Infraestructure UpdateOracle Cloud Infraestructure Update
Oracle Cloud Infraestructure Update
 
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
 
Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)
 
S016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dS016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710d
 
Storage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyStorage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technology
 
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_033020100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
 
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_033020100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
 
NetApp Se training storage grid webscale technical overview
NetApp Se training   storage grid webscale technical overviewNetApp Se training   storage grid webscale technical overview
NetApp Se training storage grid webscale technical overview
 
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bS104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809b
 
S100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cS100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804c
 
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Chapter 9

  • 1. © 2009 EMC Corporation. All rights reserved. EMC Proven Professional The #1 Certification Program in the information storage and management industry Content Addressed Storage Chapter 9 Section 2 : Storage Networking Technologies and Virtualization
  • 2. © 2009 EMC Corporation. All rights reserved. Chapter Objectives Upon completion of this chapter, you will be able to: o Describe CAS, fixed content and archives, traditional storage solutions for archive o Describe the features and benefits of a CAS based storage strategy o List the physical and logical elements of CAS o Describe the storage and retrieval process for CAS data objects o Describe the best suited operational environments for CAS solutions
  • 3. © 2009 EMC Corporation. All rights reserved. Lesson: CAS Overview Upon completion of this lesson, you be able to: o Define fixed content o Describe traditional archival solutions and its shortcoming o Define Content Addressed Storage (CAS) o List benefits of CAS
  • 4. © 2009 EMC Corporation. All rights reserved. What are Fixed Content and Archives Electronic Documents •Contracts, claims, etc. •E-mail and attachments •Financial spread sheets •CAD/CAM designs •Presentations Digital Records •Documents – Checks, securities trades – Historical preservation •Photographs – Personal / professional •Surveys – Seismic, astronomic, geographic Digital Assets Retained For Active Reference And Value Leverage Historical Value Improve Service Levels Generate New Revenues Rich Media •Medical – X-rays, MRIs, CTI •Video – News / media, movies – Security surveillance •Audio – Voicemail – Radio
  • 5. © 2009 EMC Corporation. All rights reserved. Challenges of Storing Fixed Content o Fixed content is growing at more than 90% annually o Significant amount of newly created information falls into this category o New regulations require retention and data protection o Often, long-term preservation is required (years-decades) o Simultaneous multi-user online access is preferable to offline storage o Need faster access to fixed content o Need for location independent data, enabling technology refresh and migration o Traditional storage methods are inadequate
  • 6. © 2009 EMC Corporation. All rights reserved. Traditional storage solutions for Archive o Three categories of archival solution are: o Online, nearline, and offline based on the means of access o Traditional archival solution were offline o Traditional archival process used optical disks and tapes as media for archival o An archive is often stored on a Write Once Read Many (WORM) device, such as a CD-ROM
  • 7. © 2009 EMC Corporation. All rights reserved. Shortcomings of Traditional Archiving Solutions o Tape is slow, and standards are always changing o Optical is expensive, and requires vast amounts of media o Recovering files from tape and optical is often time consuming o Data on tape and optical is subject to media degradation o Both solution require sophisticated media management CAS has emerged as an alternative to traditional archiving solutions
  • 8. © 2009 EMC Corporation. All rights reserved. What is Content Addressed Storage (CAS) o Object-oriented, location-independent approach to data storage o Repository for the “Objects” o Access mechanism to interface with repository o Globally unique identifiers provide access to objects
  • 9. © 2009 EMC Corporation. All rights reserved. Benefits of CAS o Content authenticity o Content integrity o Location independence o Single-instance storage (SiS) o Retention enforcement o Record-level protection and disposition o Technology independence o Fast record retrieval Additional Task Research on role of CAS in ILM Strategy
  • 10. © 2009 EMC Corporation. All rights reserved. Lesson Summary Key points covered in this lesson: o CAS Definition o Challenges of Storing Fixed Content o Shortcomings of Traditional Archiving Solutions o Benefits of CAS
  • 11. © 2009 EMC Corporation. All rights reserved. Lesson: CAS Architecture Upon completion of this lesson, you will be able to: o Describe CAS architecture o Describe Physical and logical elements of CAS o Describe data storage and retrieval process in CAS environment o CAS examples
  • 12. © 2009 EMC Corporation. All rights reserved. Physical Elements of CAS o Storage devices (CAS Based) o Storage node o Access node o Servers (to which storage devices get connected) o Client Server Private LAN Storage Nodes Access Nodes CAS System IP API
  • 13. © 2009 EMC Corporation. All rights reserved. CAS Terminology o Application Programming Interface (API) o A set of function calls that enables communication between applications or between an application and an operating system o BLOB (Binary Large Object) o The actual data without the descriptive information (metadata) o The Distinct Bit Sequence (DBS) of user data represents the actual content of a file and is independent of the filename and physical location API
  • 14. © 2009 EMC Corporation. All rights reserved. CAS Terminology (Cont) o C-Clip o A package containing the user's data and associated metadata o C-Clip ID (C-Clip handle or C-Clip reference) is the CA that the system returns to the client application o Content Address (CA) o An identifier that uniquely addresses the content of a file and not its location. Unlike location-based addresses, content addresses are inherently stable and, once calculated, they never change and always refer to the same content o C-Clip Descriptor File (CDF) o The additional XML file that the system creates when making a C-Clip. This file includes the content addresses for all referenced BLOBs and associated metadata
  • 15. © 2009 EMC Corporation. All rights reserved. API How CAS Stores a Data Object Unique Content Address is calculated Client presents data to API to be archived CAS System Client Application Server CDF C-Clip (Object) Object is sent to CAS System via CAS API over IP
  • 16. © 2009 EMC Corporation. All rights reserved. API How CAS Stores a Data Object Unique Content Address is calculated Client presents data to API to be archived CAS System Client Application Server Object is sent to CAS System via CAS API over IP Object CAS System validates the Content Address and stores the object Acknowledgement returned to application Clip ID is retained and stored for future use
  • 17. © 2009 EMC Corporation. All rights reserved. Application Server Client CAS System Object is needed by an application 1 CAS authenticates the request and delivers the object 4 Application finds Content Address of object to be retrieved 2 Retrieval request is sent to the CAS System via CAS API over IP 3 How CAS Retrieves a Data Object API C-Clip ID
  • 18. © 2009 EMC Corporation. All rights reserved. CAS Features o Features available with most CAS systems are: o Integrity checking o Data protection o Local replication o Remote replication o Load balancing o Scalability o Self-diagnosis and repair o Report generation and event notification o Fault tolerance o Through the use of redundant components and data protection schemes o Audit trails o Documentation of management activities, access and disposition of data
  • 19. © 2009 EMC Corporation. All rights reserved. Example 1: CAS Healthcare Solution o Each X-ray image ranges from about 15MB to over 1GB o Patient record is stored online for a period of 60-90 days o Beyond 90 days patient records are archived Data Stored on CAS Patient Studies Stored locally for Short-Term Use (60 Days) Hospital CAS SystemApplication Server API
  • 20. © 2009 EMC Corporation. All rights reserved. Example 2: CAS Financial Solution o Check image size is about 25KB o Check imaging service provider may process 50–90 million check images per month o Checks are stored online for a period of 60 days o Beyond 60 days data is archived Bank CAS SystemApplication Server API
  • 21. © 2009 EMC Corporation. All rights reserved. Lesson Summary Key points covered in this lesson: o CAS architecture o Physical and logical elements of CAS o CAS storage and retrieval process o CAS solution examples
  • 22. © 2009 EMC Corporation. All rights reserved. Chapter Summary Key points covered in this chapter: o Benefits of CAS based storage strategy o Overview of physical and logical elements of CAS o Storing and retrieving data from CAS o CAS application examples
  • 23. © 2009 EMC Corporation. All rights reserved. #1 IT company For more information visit http://education.EMC.com

Editor's Notes

  1. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  2. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage - The objectives for this chapter are shown here. Please take a moment to read them.
  3. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage - The objectives for this lesson are shown here. Please take a moment to read them.
  4. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  5. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  6. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  7. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  8. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  9. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  10. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  11. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  12. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  13. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  14. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  15. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  16. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  17. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  18. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  19. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  20. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  21. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  22. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  23. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -