SlideShare a Scribd company logo
1 of 44
Information Storage and
Management
Storing, Managing, and Protecting Digital Information
Ali Broumandnia, Broumandnia@gmail.com 1
Section I Storage System
In This Section:
• Chapter 1: Introduction to Information Storage and Management
• Chapter 2: Storage System Environment
• Chapter 3: Data Protection: RAID
• Chapter 4: Intelligent Storage Systems
Ali Broumandnia, Broumandnia@gmail.com 2
Chapter 1
Introduction to Information Storage and
Management
• 1.1 Information Storage
• 1.2 Evolution of Storage Technology and Architecture
• 1.3 Data Center Infrastructure
• 1.4 Key Challenges in Managing Information
• 1.5 Information Lifecycle
• Summary
Ali Broumandnia, Broumandnia@gmail.com 3
Key Concepts:
• Data and Information
• Structured and Unstructured Data
• Storage Technology Architectures
• Core Elements of a Data Center
• Information Management
• Information Lifecycle Management
Ali Broumandnia, Broumandnia@gmail.com 4
This chapter describes the evolution of information storage
architecture from simple direct-attached models to complex
networked topologies.
It introduces the information lifecycle management (ILM)
strategy, which aligns the information technology (IT)
infrastructure with business priorities.
Ali Broumandnia, Broumandnia@gmail.com 5
• Information created by individuals gains value when shared
with others. When created, information resides locally on
devices such as cell phones, cameras, and laptops.
• To share this information, it needs to be uploaded via
networks to data centers. It is interesting to note that while the
majority of information is created by individuals, it is stored
and managed by a relatively small number of organizations.
Ali Broumandnia, Broumandnia@gmail.com 6
Figure 1-1: Virtuous cycle of informationAli Broumandnia, Broumandnia@gmail.com 7
1.1 Information Storage
Businesses use data to derive information that is
critical to their day-to-day operations. Storage is a
repository that enables users to store and retrieve this
digital data.
Ali Broumandnia, Broumandnia@gmail.com 8
1.1.1 Data
• Data is a collection of raw facts from which
conclusions may be drawn.
• Data in this form is called digital data and is
accessible by the user only after it is processed by
a computer.
Ali Broumandnia, Broumandnia@gmail.com 9
Ali Broumandnia, Broumandnia@gmail.com 10
With the advancement of computer and communication
technologies, the rate of data generation and sharing has increased
exponentially. The following is a list of some of the factors that
have contributed to the growth of digital data:
• Increase in data processing capabilities
• Lower cost of digital storage
• Affordable and faster communication technology
Ali Broumandnia, Broumandnia@gmail.com 11
• Increase in data processing capabilities: Modern-day computers provide a
significant increase in processing and storage capabilities. This enables the
conversion of various types of content and media from conventional forms to
digital formats.
• Lower cost of digital storage: Technological advances and decrease in the cost
of storage devices have provided low-cost solutions and encouraged the
development of less expensive data storage devices. This cost benefit has
increased the rate at which data is being generated and stored.
• Affordable and faster communication technology: The rate of sharing digital
data is now much faster than traditional approaches. A handwritten letter may
take a week to reach its destination, whereas it only takes a few seconds for an
e-mail message to reach its recipient .Ali Broumandnia, Broumandnia@gmail.com 12
1.1.2 Types of Data
• Data can be classified as structured or unstructured based on how it is stored
and managed.
• Structured data is organized in rows and columns in a rigidly defined
format so that applications can retrieve and process it efficiently. Structured
data is typically stored using a database management system (DBMS).
• Data is unstructured if its elements cannot be stored in rows and
columns, and is therefore difficult to query and retrieve by business
applications. For example, customer contacts may be stored in various forms
such as sticky notes, e-mail messages, business cards, or even digital format
files such as .doc, .txt, and .pdf.
Ali Broumandnia, Broumandnia@gmail.com 13
Ali Broumandnia, Broumandnia@gmail.com 14
1.1.3 Information
• Data, whether structured or unstructured, does not
fulfill any purpose for individuals or businesses unless it
is presented in a meaningful form.
• Businesses need to analyze data for it to be of
value.
• Information is the intelligence and knowledge
derived from data.
Ali Broumandnia, Broumandnia@gmail.com 15
• Because information is critical to the success of a business,
there is an ever present concern about its availability and
protection.
• Legal, regulatory, and contractual obligations regarding the
availability and protection of data only add to these concerns.
Ali Broumandnia, Broumandnia@gmail.com 16
1.1.4 Storage
• Data created by individuals or businesses must be stored so that it is easily
accessible for further processing. In a computing environment, devices
designed for storing data are termed storage devices or simply storage.
• Devices such as memory in a cell phone or digital camera, DVDs, CD-
ROMs, and hard disks in personal computers are examples of storage
devices.
Ali Broumandnia, Broumandnia@gmail.com 17
1.2 Evolution of Storage Technology and Architecture
• Historically, organizations had centralized computers (mainframe) and
information storage devices (tape reels and disk packs) in their data center. The
evolution of open systems and the affordability and ease of deployment that
they offer made it possible for business units/departments to have their own
servers and storage. In earlier implementations of open systems, the storage
was typically internal to the server.
• The proliferation of departmental servers in an enterprise resulted in
unprotected, unmanaged, fragmented islands of information and increased
operating cost. Originally, there were very limited policies and processes for
managing these servers and the data created. To overcome these challenges,
storage technology evolved from non-intelligent internal storage to intelligent
networked storage.
Ali Broumandnia, Broumandnia@gmail.com 18
Highlights of this technology evolution include:
• Redundant Array of Independent Disks (RAID):
• Direct-attached storage (DAS):
• Storage area network (SAN):
• Network-attached storage (NAS):
• Internet Protocol SAN (IP-SAN):
Ali Broumandnia, Broumandnia@gmail.com 19
• Redundant Array of Independent Disks (RAID): This technology was
developed to address the cost, performance, and availability
requirements of data. It continues to evolve today and is used in all
storage architectures such as DAS, SAN,…
• Direct-attached storage (DAS): This type of storage connects
directly to a server (host) or a group of servers in a cluster. Storage
can be either internal or external to the server. External DAS
alleviated the challenges of limited internal storage capacity.
Highlights of this technology evolution include:
Ali Broumandnia, Broumandnia@gmail.com 20
1.2 Evolution of Storage Technology and Architecture
• Storage area network (SAN): This is a dedicated, high-performance
Fiber Channel (FC) network to facilitate block-level communication between
servers and storage. Storage is partitioned and assigned to a server for
accessing its data. SAN offers scalability, availability, performance, and cost
benefits compared to DAS.
• Network-attached storage (NAS): This is dedicated storage for file
serving applications. Unlike a SAN, it connects to an existing communication
network (LAN) and provides file access to heterogeneous clients. Because it is
purposely built for providing storage to file server applications, it offers higher
scalability, availability, performance, and cost benefits compared to general
purpose file servers.
Ali Broumandnia, Broumandnia@gmail.com 21
1.2 Evolution of Storage Technology and Architecture
• Internet Protocol SAN (IP-SAN): One of the latest evolutions in storage
architecture, IP-SAN is a convergence of technologies used in SAN and NAS. IP-
SAN provides block-level communication across a local or wide area network
(LAN or WAN), resulting in greater consolidation and availability of data.
Storage technology and architecture continues to
evolve, which enables organizations to consolidate,
protect, optimize, and leverage their data to achieve the
highest return on information assets.
Ali Broumandnia, Broumandnia@gmail.com 22
1.2 Evolution of Storage Technology and Architecture
Storage technology and architecture continues to evolve, which
enables organizations to consolidate, protect, optimize, and leverage
their data to achieve the highest return on information assets.Ali Broumandnia, Broumandnia@gmail.com 23
1.3 Data Center Infrastructure
• Organizations maintain data centers to provide centralized data
processing capabilities across the enterprise. Data centers store
and manage large amounts of mission-critical data.
• Large organizations often maintain more than one data center to
distribute data processing workloads and provide backups in the
event of a disaster.
Ali Broumandnia, Broumandnia@gmail.com 24
1.3.1 Core Elements
• Application: An application is a computer program that provides the logic
for computing operations.
• Database: Database management system (DBMS) provides a structured
way to store data in logically organized tables that are interrelated.
• Server and operating system: A computing platform that runs
applications and databases.
• Network: A data path that facilitates communication between clients and
servers or between servers and storage.
• Storage array: A device that stores data persistently for subsequent use.
Ali Broumandnia, Broumandnia@gmail.com 25
Ali Broumandnia, Broumandnia@gmail.com 26
1.3.2 Key Requirements for Data Center Elements
• Uninterrupted operation of data centers is critical to the
survival and success of a business. It is necessary to
have a reliable infrastructure that ensures data is
accessible at all times. While the requirements, shown in
Figure 1-6, are applicable to all elements of the data
center infrastructure, our focus here is on storage
systems..Ali Broumandnia, Broumandnia@gmail.com 27
Ali Broumandnia, Broumandnia@gmail.com 28
• Availability: All data center elements should be designed to
ensure accessibility. The inability of users to access data can
have a significant negative impact on a business.
• Security: Polices, procedures, and proper integration of the data
center core elements that will prevent unauthorized access
to information must be established.
Ali Broumandnia, Broumandnia@gmail.com 29
• Scalability: Data center operations should be able to allocate
additional processing capabilities or storage on demand, without
interrupting business operations.
• Performance: All the core elements of the data center should be
able to provide optimal performance and service all processing
requests at high speed.
• Data integrity: Data integrity refers to mechanisms such as error
correction codes or parity bits which ensure that data is written to
disk exactly as it was received.
Ali Broumandnia, Broumandnia@gmail.com 30
• Capacity: Data center operations require adequate resources to
store and process large amounts of data efficiently. When capacity
requirements increase, the data center must be able to provide
additional capacity without interrupting availability, or, at the very
very least, with minimal disruption.
• Manageability: A data center should perform all operations and
activities in the most efficient manner. Manageability can be
achieved through automation and the reduction of human
(manual) intervention in common tasks.
Ali Broumandnia, Broumandnia@gmail.com 31
1.3.3 Managing Storage Infrastructure
Key management activities:
• Monitoring is the continuous collection of information and the review
of the entire data center infrastructure include security, performance,
accessibility, and capacity.
• Reporting is done periodically on resource performance, capacity, and
utilization.
• Provisioning is the process of providing the hardware, software, and
other resources needed to run a data center. Provisioning activities
include capacity and resource planning. Capacity planning ensures that
the user’s and the application’s future needs will be addressed in the
most cost-effective and controlled manner.
Ali Broumandnia, Broumandnia@gmail.com 32
1.4 Key Challenges in Managing Information
• Exploding digital universe: The rate of information growth is increasing
exponentially. Duplication of data to ensure high availability and
repurposing has also contributed to the multifold increase of
information growth.
• Increasing dependency on information: The strategic use of
information plays an important role in determining the success of a
business and provides competitive advantages in the marketplace.
• Changing value of information: Information that is valuable today may
become less important tomorrow. The value of information often
changes over time.
Ali Broumandnia, Broumandnia@gmail.com 33
1.5 Information Lifecycle
• The information lifecycle is the “change in the value of
information” over time. When data is first created, it often has the
highest value and is used frequently.
• As data ages, it is accessed less frequently and is of less value to
the organization. Understanding the information lifecycle helps to
deploy appropriate storage infrastructure, according to the
changing value of information.
Ali Broumandnia, Broumandnia@gmail.com 34
Ali Broumandnia, Broumandnia@gmail.com 35
1.5.1 Information Lifecycle Management:
• Information lifecycle management (ILM) is a proactive
strategy that enables an IT organization to effectively
manage the data throughout its lifecycle, based on
predefined business policies. This allows an IT organization
to optimize the storage infrastructure for maximum return
on investment.
Ali Broumandnia, Broumandnia@gmail.com 36
An ILM strategy should include the following characteristics:
• Business-centric: It should be integrated with key processes, applications, and
initiatives of the business to meet both current and future growth in information.
• Centrally managed: All the information assets of a business should be under the
purview of the ILM strategy.
• Policy-based: The implementation of ILM should not be restricted to a few
departments. ILM should be implemented as a policy and encompass all business
applications, processes, and resources.
• Heterogeneous: An ILM strategy should take into account all types of storage
platforms and operating systems.
• Optimized: Because the value of information varies, an ILM strategy should consider
the different storage requirements and allocate storage resources based on the
information’s value to the business.Ali Broumandnia, Broumandnia@gmail.com 37
1.5.2 ILM Implementation
• The process of developing an ILM strategy includes four activities:
• 1- Classifying data and applications on the basis of business rules and
policies to enable differentiated treatment of information
• 2- Implementing policies by using information management tools,
starting from the creation of data and ending with its disposal
• 3- Managing the environment by using integrated tools to reduce
operational complexity
• 4- Organizing storage resources in tiers to align the resources with data
classes, and storing information in the right type of infrastructure based on the
information’s current value
Ali Broumandnia, Broumandnia@gmail.com 38
• Steps 1 and 2 are aimed at implementing ILM in a limited way
across a few enterprise-critical applications. In Step 1, the goal is to
implement a storage networking environment. Storage
architectures offer varying levels of protection and performance
and this acts as a foundation for future policy-based information
management in Steps 2 and 3. The value of tiered storage
platforms can be exploited by allocating appropriate storage
resources to the applications based on the value of the
information processed.Ali Broumandnia, Broumandnia@gmail.com 39
• Step 2 takes ILM to the next level, with detailed application or data
classification and linkage of the storage infrastructure to business
policies. These classifications and the resultant policies can be
automatically executed using tools for one or more applications,
resulting in better management and optimal allocation of storage
resources.
• Step 3 of the implementation is to automate more of the
applications or data classification and policy management activities
in order to scale to a wider set of enterprise applications.
Ali Broumandnia, Broumandnia@gmail.com 40
Ali Broumandnia, Broumandnia@gmail.com 41
1.5.3 ILM Key Benefits
• 1- Improved utilization by using tiered storage platforms and
increased visibility of all enterprise information.
• 2- Simplified management by integrating process steps and
interfaces with individual tools and by increasing automation.
• 3- A wider range of options for backup, and recovery to balance
the need for business continuity.
Ali Broumandnia, Broumandnia@gmail.com 42
• 4- Maintaining compliance by knowing what data needs to be
protected for what length of time.
• 5- Lower Total Cost of Ownership (TCO) by aligning the
infrastructure and management costs with information value.
1.5.3 ILM Key Benefits
Ali Broumandnia, Broumandnia@gmail.com 43
Summary
• This chapter described the importance of data, information, and storage
infrastructure. Meeting today’s storage needs begins with understanding
the type of data, its value, and key management requirements of a
storage system. This chapter also emphasized the importance of the ILM
strategy, which businesses are adopting to manage information effectively
across the enterprise. ILM is enabling businesses to gain competitive
advantage by classifying, protecting, and leveraging information.
• The evolution of storage architectures and the core elements of a data
center covered in this chapter provided the foundation on information
storage. The next chapter discusses storage system environment.
Ali Broumandnia, Broumandnia@gmail.com 44

More Related Content

What's hot

Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsDatamining Tools
 
Multimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesMultimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesHarshita Ved
 
program partitioning and scheduling IN Advanced Computer Architecture
program partitioning and scheduling  IN Advanced Computer Architectureprogram partitioning and scheduling  IN Advanced Computer Architecture
program partitioning and scheduling IN Advanced Computer ArchitecturePankaj Kumar Jain
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architectureMaulik Togadiya
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 
Data Integration and Transformation in Data mining
Data Integration and Transformation in Data miningData Integration and Transformation in Data mining
Data Integration and Transformation in Data miningkavitha muneeshwaran
 
Shared-Memory Multiprocessors
Shared-Memory MultiprocessorsShared-Memory Multiprocessors
Shared-Memory MultiprocessorsSalvatore La Bua
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveChetan Kumar S
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1Muhammad Ahad
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system modelHarshad Umredkar
 
Clustering: Large Databases in data mining
Clustering: Large Databases in data miningClustering: Large Databases in data mining
Clustering: Large Databases in data miningZHAO Sam
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingSayed Chhattan Shah
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systemsSHATHAN
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating SystemSanthiNivas
 

What's hot (20)

Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Data Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlationsData Mining: Mining ,associations, and correlations
Data Mining: Mining ,associations, and correlations
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Multimedia system, Architecture & Databases
Multimedia system, Architecture & DatabasesMultimedia system, Architecture & Databases
Multimedia system, Architecture & Databases
 
program partitioning and scheduling IN Advanced Computer Architecture
program partitioning and scheduling  IN Advanced Computer Architectureprogram partitioning and scheduling  IN Advanced Computer Architecture
program partitioning and scheduling IN Advanced Computer Architecture
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Distributed shred memory architecture
Distributed shred memory architectureDistributed shred memory architecture
Distributed shred memory architecture
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Data Integration and Transformation in Data mining
Data Integration and Transformation in Data miningData Integration and Transformation in Data mining
Data Integration and Transformation in Data mining
 
Shared-Memory Multiprocessors
Shared-Memory MultiprocessorsShared-Memory Multiprocessors
Shared-Memory Multiprocessors
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Operating system security
Operating system securityOperating system security
Operating system security
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
Clustering: Large Databases in data mining
Clustering: Large Databases in data miningClustering: Large Databases in data mining
Clustering: Large Databases in data mining
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
 

Similar to Chapter 1

Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCOCloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCOStorage Switzerland
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Australia
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
ISM-SLIDE and Data centered Architecture
ISM-SLIDE and Data centered ArchitectureISM-SLIDE and Data centered Architecture
ISM-SLIDE and Data centered ArchitectureReginR2
 
SAN module_1.pdf
SAN module_1.pdfSAN module_1.pdf
SAN module_1.pdfNandishAC
 
EMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaEMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaJonathan Simpson
 
A-B-C Strategies for File and Content Brochure
A-B-C Strategies for File and Content BrochureA-B-C Strategies for File and Content Brochure
A-B-C Strategies for File and Content BrochureHitachi Vantara
 
Benefits to using private cloud storage providers
Benefits to using private  cloud storage providersBenefits to using private  cloud storage providers
Benefits to using private cloud storage providersRonit Sharma
 
Data Storage and Information Management
Data Storage and Information ManagementData Storage and Information Management
Data Storage and Information ManagementChristalin Nelson
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)Denodo
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aTony Pearson
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Current trends in dbms
Current trends in dbmsCurrent trends in dbms
Current trends in dbmsDaisy Joy
 
CC_M2_T1_Data Center Technology.pptx
CC_M2_T1_Data Center Technology.pptxCC_M2_T1_Data Center Technology.pptx
CC_M2_T1_Data Center Technology.pptx121910301016gitam
 
Strongbox Data Storage Podcast
Strongbox Data Storage PodcastStrongbox Data Storage Podcast
Strongbox Data Storage Podcastinside-BigData.com
 
Archiving documents mes hybrid
Archiving documents   mes hybridArchiving documents   mes hybrid
Archiving documents mes hybridMES Hybrid
 

Similar to Chapter 1 (20)

ISM Unit 1.pdf
ISM Unit 1.pdfISM Unit 1.pdf
ISM Unit 1.pdf
 
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCOCloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
Cloudian Webinar - 7 Key Reasons why Object Storage lowers Storage TCO
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
ISM-SLIDE and Data centered Architecture
ISM-SLIDE and Data centered ArchitectureISM-SLIDE and Data centered Architecture
ISM-SLIDE and Data centered Architecture
 
SAN module_1.pdf
SAN module_1.pdfSAN module_1.pdf
SAN module_1.pdf
 
EMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by SigmaEMC InfoArchive Overview: Offered by Sigma
EMC InfoArchive Overview: Offered by Sigma
 
A-B-C Strategies for File and Content Brochure
A-B-C Strategies for File and Content BrochureA-B-C Strategies for File and Content Brochure
A-B-C Strategies for File and Content Brochure
 
Benefits to using private cloud storage providers
Benefits to using private  cloud storage providersBenefits to using private  cloud storage providers
Benefits to using private cloud storage providers
 
Data Storage and Information Management
Data Storage and Information ManagementData Storage and Information Management
Data Storage and Information Management
 
SAN module_1.pdf
SAN module_1.pdfSAN module_1.pdf
SAN module_1.pdf
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
S100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804aS100293 hybrid-cloud-orlando-v1804a
S100293 hybrid-cloud-orlando-v1804a
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Current trends in dbms
Current trends in dbmsCurrent trends in dbms
Current trends in dbms
 
CC_M2_T1_Data Center Technology.pptx
CC_M2_T1_Data Center Technology.pptxCC_M2_T1_Data Center Technology.pptx
CC_M2_T1_Data Center Technology.pptx
 
Strongbox Data Storage Podcast
Strongbox Data Storage PodcastStrongbox Data Storage Podcast
Strongbox Data Storage Podcast
 
Archiving documents mes hybrid
Archiving documents   mes hybridArchiving documents   mes hybrid
Archiving documents mes hybrid
 

More from Ali Broumandnia (14)

Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 

Chapter 1

  • 1. Information Storage and Management Storing, Managing, and Protecting Digital Information Ali Broumandnia, Broumandnia@gmail.com 1
  • 2. Section I Storage System In This Section: • Chapter 1: Introduction to Information Storage and Management • Chapter 2: Storage System Environment • Chapter 3: Data Protection: RAID • Chapter 4: Intelligent Storage Systems Ali Broumandnia, Broumandnia@gmail.com 2
  • 3. Chapter 1 Introduction to Information Storage and Management • 1.1 Information Storage • 1.2 Evolution of Storage Technology and Architecture • 1.3 Data Center Infrastructure • 1.4 Key Challenges in Managing Information • 1.5 Information Lifecycle • Summary Ali Broumandnia, Broumandnia@gmail.com 3
  • 4. Key Concepts: • Data and Information • Structured and Unstructured Data • Storage Technology Architectures • Core Elements of a Data Center • Information Management • Information Lifecycle Management Ali Broumandnia, Broumandnia@gmail.com 4
  • 5. This chapter describes the evolution of information storage architecture from simple direct-attached models to complex networked topologies. It introduces the information lifecycle management (ILM) strategy, which aligns the information technology (IT) infrastructure with business priorities. Ali Broumandnia, Broumandnia@gmail.com 5
  • 6. • Information created by individuals gains value when shared with others. When created, information resides locally on devices such as cell phones, cameras, and laptops. • To share this information, it needs to be uploaded via networks to data centers. It is interesting to note that while the majority of information is created by individuals, it is stored and managed by a relatively small number of organizations. Ali Broumandnia, Broumandnia@gmail.com 6
  • 7. Figure 1-1: Virtuous cycle of informationAli Broumandnia, Broumandnia@gmail.com 7
  • 8. 1.1 Information Storage Businesses use data to derive information that is critical to their day-to-day operations. Storage is a repository that enables users to store and retrieve this digital data. Ali Broumandnia, Broumandnia@gmail.com 8
  • 9. 1.1.1 Data • Data is a collection of raw facts from which conclusions may be drawn. • Data in this form is called digital data and is accessible by the user only after it is processed by a computer. Ali Broumandnia, Broumandnia@gmail.com 9
  • 11. With the advancement of computer and communication technologies, the rate of data generation and sharing has increased exponentially. The following is a list of some of the factors that have contributed to the growth of digital data: • Increase in data processing capabilities • Lower cost of digital storage • Affordable and faster communication technology Ali Broumandnia, Broumandnia@gmail.com 11
  • 12. • Increase in data processing capabilities: Modern-day computers provide a significant increase in processing and storage capabilities. This enables the conversion of various types of content and media from conventional forms to digital formats. • Lower cost of digital storage: Technological advances and decrease in the cost of storage devices have provided low-cost solutions and encouraged the development of less expensive data storage devices. This cost benefit has increased the rate at which data is being generated and stored. • Affordable and faster communication technology: The rate of sharing digital data is now much faster than traditional approaches. A handwritten letter may take a week to reach its destination, whereas it only takes a few seconds for an e-mail message to reach its recipient .Ali Broumandnia, Broumandnia@gmail.com 12
  • 13. 1.1.2 Types of Data • Data can be classified as structured or unstructured based on how it is stored and managed. • Structured data is organized in rows and columns in a rigidly defined format so that applications can retrieve and process it efficiently. Structured data is typically stored using a database management system (DBMS). • Data is unstructured if its elements cannot be stored in rows and columns, and is therefore difficult to query and retrieve by business applications. For example, customer contacts may be stored in various forms such as sticky notes, e-mail messages, business cards, or even digital format files such as .doc, .txt, and .pdf. Ali Broumandnia, Broumandnia@gmail.com 13
  • 15. 1.1.3 Information • Data, whether structured or unstructured, does not fulfill any purpose for individuals or businesses unless it is presented in a meaningful form. • Businesses need to analyze data for it to be of value. • Information is the intelligence and knowledge derived from data. Ali Broumandnia, Broumandnia@gmail.com 15
  • 16. • Because information is critical to the success of a business, there is an ever present concern about its availability and protection. • Legal, regulatory, and contractual obligations regarding the availability and protection of data only add to these concerns. Ali Broumandnia, Broumandnia@gmail.com 16
  • 17. 1.1.4 Storage • Data created by individuals or businesses must be stored so that it is easily accessible for further processing. In a computing environment, devices designed for storing data are termed storage devices or simply storage. • Devices such as memory in a cell phone or digital camera, DVDs, CD- ROMs, and hard disks in personal computers are examples of storage devices. Ali Broumandnia, Broumandnia@gmail.com 17
  • 18. 1.2 Evolution of Storage Technology and Architecture • Historically, organizations had centralized computers (mainframe) and information storage devices (tape reels and disk packs) in their data center. The evolution of open systems and the affordability and ease of deployment that they offer made it possible for business units/departments to have their own servers and storage. In earlier implementations of open systems, the storage was typically internal to the server. • The proliferation of departmental servers in an enterprise resulted in unprotected, unmanaged, fragmented islands of information and increased operating cost. Originally, there were very limited policies and processes for managing these servers and the data created. To overcome these challenges, storage technology evolved from non-intelligent internal storage to intelligent networked storage. Ali Broumandnia, Broumandnia@gmail.com 18
  • 19. Highlights of this technology evolution include: • Redundant Array of Independent Disks (RAID): • Direct-attached storage (DAS): • Storage area network (SAN): • Network-attached storage (NAS): • Internet Protocol SAN (IP-SAN): Ali Broumandnia, Broumandnia@gmail.com 19
  • 20. • Redundant Array of Independent Disks (RAID): This technology was developed to address the cost, performance, and availability requirements of data. It continues to evolve today and is used in all storage architectures such as DAS, SAN,… • Direct-attached storage (DAS): This type of storage connects directly to a server (host) or a group of servers in a cluster. Storage can be either internal or external to the server. External DAS alleviated the challenges of limited internal storage capacity. Highlights of this technology evolution include: Ali Broumandnia, Broumandnia@gmail.com 20
  • 21. 1.2 Evolution of Storage Technology and Architecture • Storage area network (SAN): This is a dedicated, high-performance Fiber Channel (FC) network to facilitate block-level communication between servers and storage. Storage is partitioned and assigned to a server for accessing its data. SAN offers scalability, availability, performance, and cost benefits compared to DAS. • Network-attached storage (NAS): This is dedicated storage for file serving applications. Unlike a SAN, it connects to an existing communication network (LAN) and provides file access to heterogeneous clients. Because it is purposely built for providing storage to file server applications, it offers higher scalability, availability, performance, and cost benefits compared to general purpose file servers. Ali Broumandnia, Broumandnia@gmail.com 21
  • 22. 1.2 Evolution of Storage Technology and Architecture • Internet Protocol SAN (IP-SAN): One of the latest evolutions in storage architecture, IP-SAN is a convergence of technologies used in SAN and NAS. IP- SAN provides block-level communication across a local or wide area network (LAN or WAN), resulting in greater consolidation and availability of data. Storage technology and architecture continues to evolve, which enables organizations to consolidate, protect, optimize, and leverage their data to achieve the highest return on information assets. Ali Broumandnia, Broumandnia@gmail.com 22
  • 23. 1.2 Evolution of Storage Technology and Architecture Storage technology and architecture continues to evolve, which enables organizations to consolidate, protect, optimize, and leverage their data to achieve the highest return on information assets.Ali Broumandnia, Broumandnia@gmail.com 23
  • 24. 1.3 Data Center Infrastructure • Organizations maintain data centers to provide centralized data processing capabilities across the enterprise. Data centers store and manage large amounts of mission-critical data. • Large organizations often maintain more than one data center to distribute data processing workloads and provide backups in the event of a disaster. Ali Broumandnia, Broumandnia@gmail.com 24
  • 25. 1.3.1 Core Elements • Application: An application is a computer program that provides the logic for computing operations. • Database: Database management system (DBMS) provides a structured way to store data in logically organized tables that are interrelated. • Server and operating system: A computing platform that runs applications and databases. • Network: A data path that facilitates communication between clients and servers or between servers and storage. • Storage array: A device that stores data persistently for subsequent use. Ali Broumandnia, Broumandnia@gmail.com 25
  • 27. 1.3.2 Key Requirements for Data Center Elements • Uninterrupted operation of data centers is critical to the survival and success of a business. It is necessary to have a reliable infrastructure that ensures data is accessible at all times. While the requirements, shown in Figure 1-6, are applicable to all elements of the data center infrastructure, our focus here is on storage systems..Ali Broumandnia, Broumandnia@gmail.com 27
  • 29. • Availability: All data center elements should be designed to ensure accessibility. The inability of users to access data can have a significant negative impact on a business. • Security: Polices, procedures, and proper integration of the data center core elements that will prevent unauthorized access to information must be established. Ali Broumandnia, Broumandnia@gmail.com 29
  • 30. • Scalability: Data center operations should be able to allocate additional processing capabilities or storage on demand, without interrupting business operations. • Performance: All the core elements of the data center should be able to provide optimal performance and service all processing requests at high speed. • Data integrity: Data integrity refers to mechanisms such as error correction codes or parity bits which ensure that data is written to disk exactly as it was received. Ali Broumandnia, Broumandnia@gmail.com 30
  • 31. • Capacity: Data center operations require adequate resources to store and process large amounts of data efficiently. When capacity requirements increase, the data center must be able to provide additional capacity without interrupting availability, or, at the very very least, with minimal disruption. • Manageability: A data center should perform all operations and activities in the most efficient manner. Manageability can be achieved through automation and the reduction of human (manual) intervention in common tasks. Ali Broumandnia, Broumandnia@gmail.com 31
  • 32. 1.3.3 Managing Storage Infrastructure Key management activities: • Monitoring is the continuous collection of information and the review of the entire data center infrastructure include security, performance, accessibility, and capacity. • Reporting is done periodically on resource performance, capacity, and utilization. • Provisioning is the process of providing the hardware, software, and other resources needed to run a data center. Provisioning activities include capacity and resource planning. Capacity planning ensures that the user’s and the application’s future needs will be addressed in the most cost-effective and controlled manner. Ali Broumandnia, Broumandnia@gmail.com 32
  • 33. 1.4 Key Challenges in Managing Information • Exploding digital universe: The rate of information growth is increasing exponentially. Duplication of data to ensure high availability and repurposing has also contributed to the multifold increase of information growth. • Increasing dependency on information: The strategic use of information plays an important role in determining the success of a business and provides competitive advantages in the marketplace. • Changing value of information: Information that is valuable today may become less important tomorrow. The value of information often changes over time. Ali Broumandnia, Broumandnia@gmail.com 33
  • 34. 1.5 Information Lifecycle • The information lifecycle is the “change in the value of information” over time. When data is first created, it often has the highest value and is used frequently. • As data ages, it is accessed less frequently and is of less value to the organization. Understanding the information lifecycle helps to deploy appropriate storage infrastructure, according to the changing value of information. Ali Broumandnia, Broumandnia@gmail.com 34
  • 36. 1.5.1 Information Lifecycle Management: • Information lifecycle management (ILM) is a proactive strategy that enables an IT organization to effectively manage the data throughout its lifecycle, based on predefined business policies. This allows an IT organization to optimize the storage infrastructure for maximum return on investment. Ali Broumandnia, Broumandnia@gmail.com 36
  • 37. An ILM strategy should include the following characteristics: • Business-centric: It should be integrated with key processes, applications, and initiatives of the business to meet both current and future growth in information. • Centrally managed: All the information assets of a business should be under the purview of the ILM strategy. • Policy-based: The implementation of ILM should not be restricted to a few departments. ILM should be implemented as a policy and encompass all business applications, processes, and resources. • Heterogeneous: An ILM strategy should take into account all types of storage platforms and operating systems. • Optimized: Because the value of information varies, an ILM strategy should consider the different storage requirements and allocate storage resources based on the information’s value to the business.Ali Broumandnia, Broumandnia@gmail.com 37
  • 38. 1.5.2 ILM Implementation • The process of developing an ILM strategy includes four activities: • 1- Classifying data and applications on the basis of business rules and policies to enable differentiated treatment of information • 2- Implementing policies by using information management tools, starting from the creation of data and ending with its disposal • 3- Managing the environment by using integrated tools to reduce operational complexity • 4- Organizing storage resources in tiers to align the resources with data classes, and storing information in the right type of infrastructure based on the information’s current value Ali Broumandnia, Broumandnia@gmail.com 38
  • 39. • Steps 1 and 2 are aimed at implementing ILM in a limited way across a few enterprise-critical applications. In Step 1, the goal is to implement a storage networking environment. Storage architectures offer varying levels of protection and performance and this acts as a foundation for future policy-based information management in Steps 2 and 3. The value of tiered storage platforms can be exploited by allocating appropriate storage resources to the applications based on the value of the information processed.Ali Broumandnia, Broumandnia@gmail.com 39
  • 40. • Step 2 takes ILM to the next level, with detailed application or data classification and linkage of the storage infrastructure to business policies. These classifications and the resultant policies can be automatically executed using tools for one or more applications, resulting in better management and optimal allocation of storage resources. • Step 3 of the implementation is to automate more of the applications or data classification and policy management activities in order to scale to a wider set of enterprise applications. Ali Broumandnia, Broumandnia@gmail.com 40
  • 42. 1.5.3 ILM Key Benefits • 1- Improved utilization by using tiered storage platforms and increased visibility of all enterprise information. • 2- Simplified management by integrating process steps and interfaces with individual tools and by increasing automation. • 3- A wider range of options for backup, and recovery to balance the need for business continuity. Ali Broumandnia, Broumandnia@gmail.com 42
  • 43. • 4- Maintaining compliance by knowing what data needs to be protected for what length of time. • 5- Lower Total Cost of Ownership (TCO) by aligning the infrastructure and management costs with information value. 1.5.3 ILM Key Benefits Ali Broumandnia, Broumandnia@gmail.com 43
  • 44. Summary • This chapter described the importance of data, information, and storage infrastructure. Meeting today’s storage needs begins with understanding the type of data, its value, and key management requirements of a storage system. This chapter also emphasized the importance of the ILM strategy, which businesses are adopting to manage information effectively across the enterprise. ILM is enabling businesses to gain competitive advantage by classifying, protecting, and leveraging information. • The evolution of storage architectures and the core elements of a data center covered in this chapter provided the foundation on information storage. The next chapter discusses storage system environment. Ali Broumandnia, Broumandnia@gmail.com 44