This document provides an introduction to storage concepts and the history of disk and tape storage. It discusses how storage has evolved from the earliest mainframes using punched cards and magnetic tape, to the introduction of disk drives and disk arrays. The key developments covered include the transition from tape to disk drives for faster direct access storage, the benefits of RAID technology for performance and redundancy, and how storage architectures continue advancing with higher capacity and faster disks.
Basic knowledge of Storage technology and complete understanding on DAS, NAS & SAN with advantages and disadvantages. A quick understanding on storage will help you make the best decision in terms of cost and need.
Data is being generated at rates never before encountered. The explosion of data threatens to consume all of our IT resources: People, budget, power, cooling and data center floor space. Are your systems coping with your data now? Will they continue to deliver as the stress on data centers increases and IT budgets dwindle?
Imagine if you could be ahead of the data explosion by being proactive about your storage instead of reactive. Now you can be, with NetApp's approach to the designs and deployment of storage systems. With it, you can take advantage of NetApp's latest storage enhancements and take control of your storage. This will allow you to focus on gathering more insights from your data and deliver more value to your business.
NetApp's most advanced storage solutions are NetApp Virtualization & scale out. By taking control of your existing storage platform with either solution, you get:
• Immortal Storage system
• Infinite scalability
• Best possible ROI from existing environment
Basic knowledge of Storage technology and complete understanding on DAS, NAS & SAN with advantages and disadvantages. A quick understanding on storage will help you make the best decision in terms of cost and need.
Data is being generated at rates never before encountered. The explosion of data threatens to consume all of our IT resources: People, budget, power, cooling and data center floor space. Are your systems coping with your data now? Will they continue to deliver as the stress on data centers increases and IT budgets dwindle?
Imagine if you could be ahead of the data explosion by being proactive about your storage instead of reactive. Now you can be, with NetApp's approach to the designs and deployment of storage systems. With it, you can take advantage of NetApp's latest storage enhancements and take control of your storage. This will allow you to focus on gathering more insights from your data and deliver more value to your business.
NetApp's most advanced storage solutions are NetApp Virtualization & scale out. By taking control of your existing storage platform with either solution, you get:
• Immortal Storage system
• Infinite scalability
• Best possible ROI from existing environment
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
White Paper: EMC Isilon OneFS — A Technical Overview EMC
This white paper provides an in-depth look at the major components of the Isilon OneFS operating and file system and details the hardware, software, distributed architecture, and various data protection mechanisms.
Oracle Flex ASM - What’s New and Best Practices by Jim WilliamsMarkus Michalewicz
Oracle Open World (OOW) 2014 Presentation by Jim Williams (Oracle ASM Product Manager) on Oracle Flex ASM - What's New and Best Practices. The presentation provides an overview of enhancements (What's New) in Oracle ASM 12c, especially with respect to Oracle Flex ASM, and provides best practices which can be applied in any environment (Flex or Standard ASM). This presentation has also more background information for some of the configuration recommendations that I made in my "Oracle RAC (12.1.0.2) Operational Best Practices" presentation.
A brief study on Storage Area Network (SAN), SAN architecture & its importance. It focuses on the techniques and the technologies that have evolved around SAN & its Security.
White Paper: EMC Isilon OneFS — A Technical Overview EMC
This white paper provides an in-depth look at the major components of the Isilon OneFS operating and file system and details the hardware, software, distributed architecture, and various data protection mechanisms.
Oracle Flex ASM - What’s New and Best Practices by Jim WilliamsMarkus Michalewicz
Oracle Open World (OOW) 2014 Presentation by Jim Williams (Oracle ASM Product Manager) on Oracle Flex ASM - What's New and Best Practices. The presentation provides an overview of enhancements (What's New) in Oracle ASM 12c, especially with respect to Oracle Flex ASM, and provides best practices which can be applied in any environment (Flex or Standard ASM). This presentation has also more background information for some of the configuration recommendations that I made in my "Oracle RAC (12.1.0.2) Operational Best Practices" presentation.
Secondary storage devices are required mainly because primary storage devices are volatile and information is lost the moment power is switched off. Floppy Disks and Drive, Hard Disks, CD/DVD drive, Pen drive and magnetic tapes are some of the secondary storage devices.
For more such innovative content on management studies, join WeSchool PGDM-DLP Program: http://bit.ly/ZEcPAc
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Storage basics
1. 1EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Storage Basics
An Introduction to Storage
Concepts
2. 2EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What You Will Learn
About this training
After completing this course, you will be able to:
• Explain how storage has developed over time
• Describe the basics of today’s storage environment
• Identify elements of storage architecture and performance
3. 3EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
A Short History of Disk
and Tape
This section will cover the history of
disk and tape.
4. 4EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Using Your Mainframe in the Good Old Days
• A long time ago applications were called programs
• These were input to a mainframe using punched holes
• Output was usually to paper (printed or punched)
• Life was binary...everything was black or white
5. 5EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Magnetic Tape Device
• Tape was introduced, in 1952, as a superior alternative to
punched cards
• Tape was:
– Much better capacity than a box of punched cards
– Less fragile than a punched card
– A whole lot faster than reading a deck of punched cards
• But too slow for emerging application requirements
• Tape is sequential
– Must read tape until desired data is found
– Murphy’s Law always ensures that:
• Data is at the end of the current tape or
• On a different tape or
• On a tape which can’t be read
• A better approach had to be found
– Direct Access Storage Devices (DASD)
6. 6EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Disk Storage Devices for Computers - 1954
Early direct access storage
devices were rotating “drums”
covered with a magnetic coating
and many fixed read/write
heads.
The drum design was improved upon by
“Winchester” technology, which used
movable heads and flat platters
7. 7EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Disk
• Invented by in the early 50s
• Aluminium platter with magnetic coating on both sides
• Platters assembled into a “pack”
• Moving read/write heads to access data on each platter
8. 8EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Disk Drive and the Spindle
• Platters rotate around a central shaft called a spindle
• The word spindle is still used to refer to individual disk drive
Spindle
Actuator
Read/Write Head
Platters
The actuator
moves the Read/Write
heads
9. 9EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Come Fly With Me
• Read/Write heads fly in the air currents generated by the
spinning disk
– Just like an aircraft flies in the air currents generated by its
forward thrust
10. 10EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Benefits of DASD
• The ability of a disk to randomly access data gave rise to a
HUGE increase in mainframe performance
• A tape could take minutes to reach a particular piece of data
whereas a disk could do it in milliseconds
• This meant that the number of transactions a mainframe or
server could execute, in a given period, was vastly increased if
disk was used
11. 11EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Evolution of Disk Technology
• Drive capacities continue to increase
dramatically from increased data density
– Longitudinal Recording limited by SuperParaMagnetic Effect (SPME)
– Perpendicular Recording now in production (10x)
• Performance trends
– Increased RPM speed
– Increased use of memory and cache at the drive level
– Solid State disks (Flash)
• Disk interfaces are driven by industry
standards
– Ultra SCSI
– Fibre Channel (Optical)
– SATA, PATA (EIDE)
• Industry challenge
– Higher capacity per disk drive reduces cost, but…
– Reduces the number of actuators for a given capacity
– Vector active I/O to Flash drives…inactive to higher density
mechanical devices
12. This section will cover disk performance
basics
Disk Performance Fundamentals
13. 13EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
How is a Disk Formatted?
A uniquely addressable area within a
disk drive is Cylinder, Head, and Sector
Track The Disk Platter is
segmented into a number of
concentric rings, called
Tracks
Cylinder
Tracks in the same position on all of
the disk platters in a spindle are called
a Cylinder
Tracks are selected by head number
Every track on the disk platter is also
segmented into individual sections
called Sectors
Sector
14. 14EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Choosing the Right Disk
• Performance (aka Access Time):
– How fast can the heads be moved to the right track
– How quickly can data be moved to and from the disk
These are explained in the next few slides
• Capacity
– How much data can the disk hold
• Let’s look at the performance parameters
– The things that make a difference to disk behavior
Different Disk Types Exist
15. 15EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Disk Drive Access Time
Seek Time:
• The average amount of time
necessary to move the actuator
arm to position the read/write
head over the track
• Early disks were 14” (35 cm) in
diameter and had long seek times
– 50ms!
• Modern disks are 3 ½” (9 cm) or
2 ½” (6 cm) and have much
shorter seek times
– 3 – 4ms!!
16. 16EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Disk Drive Access Time
Latency:
• The average amount of time to wait
for the data to arrive under the
read/write head as the disk spins
• Also called rotational delay
• The faster the disk spins the less
the latency
• Older disks rotated at
– 2,400 RPM
• Modern disks rotate at:
– 5,400 – 15,000 RPM
17. 17EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Disk Drive Access Time
Transfer Rate:
• The amount of data which can be
written or read in a given amount
of time (normally expressed in
bytes per second)
• Higher RPM and faster
connectivity give higher transfer
rates
• Transfer rates are higher at the
outer edge of the disk
18. 18EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Coming of the Storage Array
• Up until 1984 storage subsystems were made
up of the following components
• Storage Controller
– Controlled “strings” of disk drives
– Proprietary and expensive
– Controller also provided the interface to the
mainframe or similar
• String
– A number of disk drives sharing some
resources to communicate with a controller
– Disks were SLED (Single Large Expensive
Disk)
– Disk failure = data loss
– Some manufacturers got around that problem
by writing the same data to different disks in
different strings – dual copy
• Expensive, slow and proprietary
• RAID Technology changed everything…
19. 19EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
RAID Technology
Redundant
Arrays of
Independent
Disks
Writing data across multiple disks
• For better performance
• To improve availability
20. 20EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
RAID1 (1989) - Sun 4/280 WS,128 MB DRAM, 4 dual-string SCSI
controllers, 28 5.25-inch SCSI disks with disk mirroring software.
Randy Katz
Dave Patterson
Garth Gibson
The First RAID Group
UC Berkeley-- 1984
21. 21EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Short Guide to RAID
RAID 0 – data striped across disks
Improves performance
Any disk failure = loss of data
RAID 1 – the SAME data mirrored on 2 disks
Improves performance and availability
Can get expensive
Can survive loss of one disk
RAID 3 – data striped across disks
Parity element used for validation/recovery
Improves disk utilisation and availability
Can survive loss of one disk BUT
Single parity disk can be performance bottleneck
RAID 5 – data striped across disks
Parity element used for validation/recovery
Parity written to different disks for each
stripe
Improves performance over RAID 3 (no
bottleneck)
Can survive loss of one disk
Data
Parity
All RAID types not shown
Number of disks in a RAID group can exceed 4 (except RAID 1)
4 disks shown for example only
A RAID configuration of disks is called a RAID Group
P
A B C D
AA
CBA
FED
P
P
CBA P
E FD
22. 22EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
0 Striping with no Parity Large Block Performance,
No Redundancy
1 Mirrored Disks High Availability and Performance
Simple Implementation
0+1 Mirrored Stripe Highest Availability and Performance
2 Hamming Code Large Block Performance
Multiple Check Disks Availability, Poor Cost
3 Striping with Parity Large Block Performance
Single Check Disk Availability at Less Cost
4 Independent Read/Write Transaction Processing, High Availability,
Single Parity Disk High Percentage of Reads
5 Independent Read/Write Transaction Processing, High Availability,
Independent Parity Disks High Percentage of Reads
6 Independent Read/Write Transaction Processing, High Availability,
Multiple Independent Parity Disks High Percentage of Reads
RAID Summary
RAID Technique Application
23. 23EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What really happened to the dinosaurs...
24. 24EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
RAID Benefits (and a Few Drawbacks)
• The approach made storage cheaper and more reliable
– “Commodity” disk drives could be used instead of very
expensive, proprietary disk drives specific to individual
manufacturers
– RAID protected against data loss when a disk failed
• Except RAID 0 which is performance enhancement only
• The technology was adopted by many manufacturers and
many products became available
– This added to the confusion over time
• Different server types
• Different operating systems
• Different applications
• Different management approaches
• And now different storage arrays
(and a Few Drawbacks)
25. 25EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Evolution of the Storage Array
Fault Tolerant
Cache Memory
Array Controller Array Controller
Disk Directors Disk Directors
Host Interface Host Interface
Disks in RAID Groups
Mainframe/Server
26. 26EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Storage Networking
This section will cover Storage
Networking: SAN, NAS, and
iSCSI
27. 27EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Evolving Connections
Mainframe Disk Bus/Tag – 8lbs/meter
SCSI Cable- 8oz/meter
CAT6/Fiber Optic Cable >1 oz/meter
28. 28EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What is a Storage Area Network (SAN)?
A dedicated network carrying block-based storage traffic
Servers / Applications Storage/File Data
SAN
Switches
Directors
Fibre Channel
NETWORK
29. 29EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
SAN
SAN
Storage Area
Network
Host Bus Adapter
Fibre Channel Cabling
Switch or Director
Storage Array
Good for:
• Application performance
• Highest availability
• Large scale consolidation
Not So Good for:
• Acquisition and connectivity cost for small numbers of servers
• Specialist knowledge required to manage
App Server App Server
Mirrored Cache
0 1 2 3
Mirrored CacheArray
0 1 2 3
HBA
HBA
HBA
HBA
Array
Data Stored as Blocks and Volumes
30. 30EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What’s all this noise about IP Storage (iSCSI)?
Consolidated SAN Infrastructures
Direct Attached Storage Deployments
Consolidated NAS
Infrastructure
iSCSI extends SAN
consolidation benefits
to “stranded” servers
and storage
iSCSI offers a cost
effective IP Storage
infrastructure for my entry
level SAN
iSCSI extends my
consolidation
capabilities to include
traditional block
applications
31. 31EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The IP Storage (iSCSI) SAN
iSCSI
App Server App Server
NIC
NIC
DeviceDevice
NIC
IP Network
Router or Switch
Storage or other device
Good for:
• Storage consolidation
• Acquisition Cost/Connectivity Cost
• Ease of use, simple deployment
• Ability to use existing networks
• Campus connectivity
Not So Good for:
• High-end applications performance
Data Stored as Blocks and Volumes
iSCSI Driver iSCSI Driver
iSCSI Target iSCSI Target
32. 32EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What is the Purpose of Block I/O?
• Allows small amount of memory to run multiple applications
• Swap data between computers
• Applications and data stored in fixed “Blocks”
33. 33EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Today’s Blocks..
• Size of a block in Kilobytes
• Common block sizes are 4K, 8K, 16K, 32K and 64K
• Large block sizes are used for sequential applications where
data pre-fetch is effective, i.e. video streaming
• Modern servers have huge amounts of memory
• Block storage can be either direct-attached or SAN-attached to
servers
34. 34EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What’s in a Block?
• A block contains raw data
• Applications use blocks as a form of communication
while running
• Everything on your hard drive is in blocks
• Applications assemble blocks in such a way as to
provide information
• Applications use blocks to create files
35. 35EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
File Storage
• The file system to store files was invented in the early 80s
• Files are kept in folders and sub-folders
• File systems are commonly used by applications such as small
databases
• External file storage is called Network-Attached Storage (NAS)
because the storage is attached over IP networks
36. 36EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
This is a human-friendly file system
These are blocks assembled by the Windows File System into files
37. 37EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Block and File Relationships
Block
Block
Block
Block
SAN
Database
CatApp
Blocks are DATA
QueryResult
Report
• This is INFORMATION
• It is a FILE
• It can be stored using NAS
IP Network
Cat.docx
38. 38EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Why is Storage Growing and What’s Growing?
• Block storage is mainly used for databases and applications
– These belong to organizations (business, government)
– They grow as organizations add more clients and services
– Analysts say that block storage grows around 20% to 30% a year
• File storage is used by everybody
– Inside organisations for internal file storage
– Available on the internet as some kind of service
• Web pages for commerce
• Facebook
• eBay
– Billions of people use the internet and this is driving file storage
growth at a tremendous rate
– IDC’s “Digital Universe” will be 50 times bigger in 2020 than it is
today
– Analysts say that file storage grows around 80% a year
39. 39EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
September 1977 – Early Networking
ARCNET was invented to connect
computers to each other for information
exchange
The technology would go on to be the
basis for the Local-Area Network and
Network-Attached Storage
40. 40EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What is Network Attached Storage (NAS)?
A network carrying file-based traffic
Users / Application
Clients
Servers / Applications Storage / File Data
LAN
Switches
IP
NETWORK
41. 41EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
NAS
NAS
Network-Attached
Storage
User
Desktop
Oracle
Server
NIC
NIC
File
Sharing
Device
File
Sharing
Device
Network Interface Card
IP Network
Router or Switch
Storage or Server
Good for:
File sharing and some apps
Acquisition and connectivity cost
Ease of use, simple deployment
Long-distance connectivity
Not So Good for:
High-end applications performance
Supporting Microsoft Applications
Data Stored as Files in File Systems
42. 42EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Host
A
Host
B
NIC NIC
Host
A
HBA
Host
B
HBA
How can we Build Consolidated Environments?
SANs consolidate storage
Physical
Storage is
shared, not
information
Application Servers
BlockI/O
Fibre
Channel
Network
Application Servers
Host
A
Host
B
FileI/O
NAS consolidates file servers
and storage…
Physical
Storage and
information
is shared
NIC NIC
Application Servers
BlockI/O
IP
Network
IP
Network
IP SAN NASFibre Channel SAN
SAN, iSCSI, and NAS
43. 43EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Unified Storage
Unified storage provides connectivity for all the protocols
– FC SAN
– IP (iSCSI) SAN
– Ethernet networks
– Fibre-channel over Ethernet (FCoE) from Cisco
Physical storage is shared between the block and file
environments
– Both environments managed using the same tools
– Common data protection and replication for both environments
– High degree of hypervisor (VMware, Hyper-V and Citrix) for both
environments
44. 44EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Users / Application Clients Servers / Applications Storage / File Data
LAN
Switches
IP
NETWORK
Putting it all Together
Unified
Storage
45. 45EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Servers / Applications Storage / File Data
SAN
Switches
Directors
Fibre Channel
NETWORK
Putting it all Together
Unified
Storage
46. 46EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Putting it all Together
Users / Application Clients Servers / Applications Storage / File Data
SAN
Switches
Directors
LAN
Switches
IP
NETWORK
Fibre Channel
NETWORK
Gateway
Unified
Storage
47. 47EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
How Many Customers Still Look Like This?
48. 48EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Storage Consolidation Drives TCO Down
49. 49EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Storage Management
50. 50EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Data Replication, Backup &
Recovery
This section will cover data
replication, backup, and recovery
51. 51EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Local Copies of Data – Clones
• Physically independent point-in-
time copies of source volume
– Minimal performance impact on
applications
– Good for:
• Backup
• Recovery
• Testing
• Database extract
• Source of data to be moved
• Significant cost if many clones
are needed
– Clone capacity must equal
production capacity
52. 52EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Local Copies of Data – Snapshots
• Logical, point-in-time copies of data
• Pointer-based copy of data
– May have some performance impact on
applications
– Good for:
• Backup
• Restore
• Testing
• Managing change to data over a
period of time
• Block Storage uses either clones or
snapshots
• NAS Storage usually uses snapshots
53. 53EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Remote Replication
• Recovery Point Objective (RPO)
– How far back in time does data need to be recovered if data loss
occurs ?
• Recovery Time Objective (RTO)
– How much time will pass after a data loss incident before
operations are online again?
54. 54EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Synchronous Model
1. I/O from host to local storage system
2. I/O from local storage system to remote (target) system
3. Acknowledgement back from remote to local system
4. Acknowledgement from local storage system back to host
55. 55EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Asynchronous Replication with Periodic Update
1. I/O from host to storage system
2. Acknowledgement from local storage system back to host
3. Trigger event
4. Delta Sets from local storage system to remote (target)
system
5. Acknowledgement back from remote to local system
56. 56EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Continuous Data Protection
Software-based replication solution
Uses server or dedicated appliance
Array-agnostic
DVR-like in operation
All writes replicated to journal and then to recovery storage
Journal acts as a buffer to prevent corruption events, for
example from spreading to recovery storage
57. 57EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Struggle with Backup
• The time allowed for backup is called the “backup window”
• Increased application availability requirements make the
window smaller and smaller
• The amount of data at the user is increasing
– So the amount of data to be backed up is increasing
58. 58EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
• Very common way to backup/restore
– Individual tape drives can be attached
to each server
– Backup can be done over the LAN
▪ Slow and error-prone but cheap
– Backup can also be done over the SAN
▪ Fast but expensive
– A tape library of some kind can used
– As information grows the number of
tapes also has to grow and this can
get expensive and difficult to manage
– Security is an issue because tapes get
lost or stolen
– Tape is fairly fragile and gets damaged
when people carry it from place to
place
Features
Backup and Recovery Using Tape
Problem: Backup to tape can be fast but recovery is always much slower
59. 59EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Backup and Recovery Using Disk
• Increasingly common way to
backup/restore
– Backup target can be large ATA
drives inside the storage array
▪ This can be the same storage
array being used by the
production environment
– Backup target can be a virtual
tape library
▪ This is a storage array with
emulation hardware and software
▪ Multiple tape drive and library
types supported simultaneously
– A virtual tape library appears
“just like the real thing” to the
backup application
– Disk Libraries provide remote
replication for better availability
of backups
Features
Solution: Restore from disk is as fast as the backup, so much better recovery
60. 60EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Struggle with Backup
• Clones and Snapshots can be used for backup
– This really helps to improve application availability
• But the data grows and grows and everything gets bigger
– More storage
– More tape
– More people to manage it all
61. 61EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
• Data Growth
– Production will grow 5x,
• Backup represents 30x production
capacity
– Daily, weekly, and monthly full
backups kept for months or years
• Server Virtualization
– VM sprawl creates protection
challenges
– Server consolidation leaves little
bandwidth for backup
• Conventional backups typically move
200% of the data each week
• Next Generation Virtual Data Center
– “IT as a Service” models drive
demands for greater availability,
resource flexibility, and shorter
backup windows, RTOs and RPOs
Digital Information Created and Replicated Worldwide
5,000
4,000
3,000
2,000
1000
0
Exabytes
Source: IDC Digital Universe white paper, sponsored by EMC
5-FOLD Growth
in 4 YEARS
Why Data Deduplication?
62. 62EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Backup Has Evolved
63. 63EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Deduplication at Work
64. 64EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
De-dupe Real-World Results
Data Type
Amount of
Primary
Data
Backed Up
Amount of
Data
Moved
Daily
Daily
De-
duplication
Ratio
Windows file systems 3,573 GB 6.1 GB 586:1
Mix of Windows, Linux, and UNIX file
systems
5,097 GB 11.7 GB 436:1
Engineering files on NAS (NDMP
backups)
3,265 GB 24.2 GB 135:1
Mix of 20 percent databases, 80
percent
file systems (Windows and UNIX)
9,583 GB 80.0 GB 120:1
Mix of Linux file systems and
databases
7,831 GB 104.2 GB 75:1
Source: EMC
Results Vary by Data Type: Customer Ratios vs. Full Backups
65. 65EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Old Paradigm
Physical Environment: Low
overall server utilization and
plenty of bandwidth for backup
20 percent resource utilization
100%
80%
40%
0%
60%
20%
CPUUtilization
Server
A
Server
B
Server
C
Virtual Server A Virtual Server B Virtual Server C
New Paradigm
Virtual Environment: High
overall server utilization and little
bandwidth for backup
80 percent resource utilization
100%
80%
40%
0%
60%
20%
CPUUtilization
ESXServer
Hardware
Shared Physical Resources
Next Generation Backup Drives Utilization
66. 66EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Next Generation Backup – The Big Picture
67. 67EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Course Summary
During this course, you have learned:
• How information storage has evolved over time
• The basic’s of today’s storage environments
• How to identify fundamental elements of storage
architecture & performance
68. 68EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Thank You
• Please note:
– It may take up to 24 hours for your
transcript to be updated and reflect
that you have successfully
completed this course.
– If after 24 hours your transcript is
not updated, please send an e-mail
to EdServices@emc.com describing
your issue.
• Please include:
– Badge Number
– Course Title
– Issue
2014 Sales Accreditation Training
69. 69EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Click here to provide feedback