SlideShare a Scribd company logo
1EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Storage Basics
An Introduction to Storage
Concepts
2EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What You Will Learn
About this training
After completing this course, you will be able to:
• Explain how storage has developed over time
• Describe the basics of today’s storage environment
• Identify elements of storage architecture and performance
3EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
A Short History of Disk
and Tape
This section will cover the history of
disk and tape.
4EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Using Your Mainframe in the Good Old Days
• A long time ago applications were called programs
• These were input to a mainframe using punched holes
• Output was usually to paper (printed or punched)
• Life was binary...everything was black or white
5EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Magnetic Tape Device
• Tape was introduced, in 1952, as a superior alternative to
punched cards
• Tape was:
– Much better capacity than a box of punched cards
– Less fragile than a punched card
– A whole lot faster than reading a deck of punched cards
• But too slow for emerging application requirements
• Tape is sequential
– Must read tape until desired data is found
– Murphy’s Law always ensures that:
• Data is at the end of the current tape or
• On a different tape or
• On a tape which can’t be read
• A better approach had to be found
– Direct Access Storage Devices (DASD)
6EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Disk Storage Devices for Computers - 1954
Early direct access storage
devices were rotating “drums”
covered with a magnetic coating
and many fixed read/write
heads.
The drum design was improved upon by
“Winchester” technology, which used
movable heads and flat platters
7EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Disk
• Invented by in the early 50s
• Aluminium platter with magnetic coating on both sides
• Platters assembled into a “pack”
• Moving read/write heads to access data on each platter
8EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Disk Drive and the Spindle
• Platters rotate around a central shaft called a spindle
• The word spindle is still used to refer to individual disk drive
Spindle
Actuator
Read/Write Head
Platters
The actuator
moves the Read/Write
heads
9EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Come Fly With Me
• Read/Write heads fly in the air currents generated by the
spinning disk
– Just like an aircraft flies in the air currents generated by its
forward thrust
10EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Benefits of DASD
• The ability of a disk to randomly access data gave rise to a
HUGE increase in mainframe performance
• A tape could take minutes to reach a particular piece of data
whereas a disk could do it in milliseconds
• This meant that the number of transactions a mainframe or
server could execute, in a given period, was vastly increased if
disk was used
11EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Evolution of Disk Technology
• Drive capacities continue to increase
dramatically from increased data density
– Longitudinal Recording limited by SuperParaMagnetic Effect (SPME)
– Perpendicular Recording now in production (10x)
• Performance trends
– Increased RPM speed
– Increased use of memory and cache at the drive level
– Solid State disks (Flash)
• Disk interfaces are driven by industry
standards
– Ultra SCSI
– Fibre Channel (Optical)
– SATA, PATA (EIDE)
• Industry challenge
– Higher capacity per disk drive reduces cost, but…
– Reduces the number of actuators for a given capacity
– Vector active I/O to Flash drives…inactive to higher density
mechanical devices
This section will cover disk performance
basics
Disk Performance Fundamentals
13EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
How is a Disk Formatted?
A uniquely addressable area within a
disk drive is Cylinder, Head, and Sector
Track The Disk Platter is
segmented into a number of
concentric rings, called
Tracks
Cylinder
Tracks in the same position on all of
the disk platters in a spindle are called
a Cylinder
Tracks are selected by head number
Every track on the disk platter is also
segmented into individual sections
called Sectors
Sector
14EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Choosing the Right Disk
• Performance (aka Access Time):
– How fast can the heads be moved to the right track
– How quickly can data be moved to and from the disk
 These are explained in the next few slides
• Capacity
– How much data can the disk hold
• Let’s look at the performance parameters
– The things that make a difference to disk behavior
Different Disk Types Exist
15EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Disk Drive Access Time
Seek Time:
• The average amount of time
necessary to move the actuator
arm to position the read/write
head over the track
• Early disks were 14” (35 cm) in
diameter and had long seek times
– 50ms!
• Modern disks are 3 ½” (9 cm) or
2 ½” (6 cm) and have much
shorter seek times
– 3 – 4ms!!
16EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Disk Drive Access Time
Latency:
• The average amount of time to wait
for the data to arrive under the
read/write head as the disk spins
• Also called rotational delay
• The faster the disk spins the less
the latency
• Older disks rotated at
– 2,400 RPM
• Modern disks rotate at:
– 5,400 – 15,000 RPM
17EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Disk Drive Access Time
Transfer Rate:
• The amount of data which can be
written or read in a given amount
of time (normally expressed in
bytes per second)
• Higher RPM and faster
connectivity give higher transfer
rates
• Transfer rates are higher at the
outer edge of the disk
18EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Coming of the Storage Array
• Up until 1984 storage subsystems were made
up of the following components
• Storage Controller
– Controlled “strings” of disk drives
– Proprietary and expensive
– Controller also provided the interface to the
mainframe or similar
• String
– A number of disk drives sharing some
resources to communicate with a controller
– Disks were SLED (Single Large Expensive
Disk)
– Disk failure = data loss
– Some manufacturers got around that problem
by writing the same data to different disks in
different strings – dual copy
• Expensive, slow and proprietary
• RAID Technology changed everything…
19EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
RAID Technology
Redundant
Arrays of
Independent
Disks
Writing data across multiple disks
• For better performance
• To improve availability
20EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
RAID1 (1989) - Sun 4/280 WS,128 MB DRAM, 4 dual-string SCSI
controllers, 28 5.25-inch SCSI disks with disk mirroring software.
Randy Katz
Dave Patterson
Garth Gibson
The First RAID Group
UC Berkeley-- 1984
21EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Short Guide to RAID
RAID 0 – data striped across disks
Improves performance
Any disk failure = loss of data
RAID 1 – the SAME data mirrored on 2 disks
Improves performance and availability
Can get expensive
Can survive loss of one disk
RAID 3 – data striped across disks
Parity element used for validation/recovery
Improves disk utilisation and availability
Can survive loss of one disk BUT
Single parity disk can be performance bottleneck
RAID 5 – data striped across disks
Parity element used for validation/recovery
Parity written to different disks for each
stripe
Improves performance over RAID 3 (no
bottleneck)
Can survive loss of one disk
Data
Parity
All RAID types not shown
Number of disks in a RAID group can exceed 4 (except RAID 1)
4 disks shown for example only
A RAID configuration of disks is called a RAID Group
P
A B C D
AA
CBA
FED
P
P
CBA P
E FD
22EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
0 Striping with no Parity Large Block Performance,
No Redundancy
1 Mirrored Disks High Availability and Performance
Simple Implementation
0+1 Mirrored Stripe Highest Availability and Performance
2 Hamming Code Large Block Performance
Multiple Check Disks Availability, Poor Cost
3 Striping with Parity Large Block Performance
Single Check Disk Availability at Less Cost
4 Independent Read/Write Transaction Processing, High Availability,
Single Parity Disk High Percentage of Reads
5 Independent Read/Write Transaction Processing, High Availability,
Independent Parity Disks High Percentage of Reads
6 Independent Read/Write Transaction Processing, High Availability,
Multiple Independent Parity Disks High Percentage of Reads
RAID Summary
RAID Technique Application
23EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What really happened to the dinosaurs...
24EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
RAID Benefits (and a Few Drawbacks)
• The approach made storage cheaper and more reliable
– “Commodity” disk drives could be used instead of very
expensive, proprietary disk drives specific to individual
manufacturers
– RAID protected against data loss when a disk failed
• Except RAID 0 which is performance enhancement only
• The technology was adopted by many manufacturers and
many products became available
– This added to the confusion over time
• Different server types
• Different operating systems
• Different applications
• Different management approaches
• And now different storage arrays
(and a Few Drawbacks)
25EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Evolution of the Storage Array
Fault Tolerant
Cache Memory
Array Controller Array Controller
Disk Directors Disk Directors
Host Interface Host Interface
Disks in RAID Groups
Mainframe/Server
26EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Storage Networking
This section will cover Storage
Networking: SAN, NAS, and
iSCSI
27EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Evolving Connections
Mainframe Disk Bus/Tag – 8lbs/meter
SCSI Cable- 8oz/meter
CAT6/Fiber Optic Cable >1 oz/meter
28EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What is a Storage Area Network (SAN)?
A dedicated network carrying block-based storage traffic
Servers / Applications Storage/File Data
SAN
Switches
Directors
Fibre Channel
NETWORK
29EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
SAN
SAN
Storage Area
Network
Host Bus Adapter
Fibre Channel Cabling
Switch or Director
Storage Array
Good for:
• Application performance
• Highest availability
• Large scale consolidation
Not So Good for:
• Acquisition and connectivity cost for small numbers of servers
• Specialist knowledge required to manage
App Server App Server
Mirrored Cache
0 1 2 3
Mirrored CacheArray
0 1 2 3
HBA
HBA
HBA
HBA
Array
Data Stored as Blocks and Volumes
30EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What’s all this noise about IP Storage (iSCSI)?
Consolidated SAN Infrastructures
Direct Attached Storage Deployments
Consolidated NAS
Infrastructure
iSCSI extends SAN
consolidation benefits
to “stranded” servers
and storage
iSCSI offers a cost
effective IP Storage
infrastructure for my entry
level SAN
iSCSI extends my
consolidation
capabilities to include
traditional block
applications
31EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The IP Storage (iSCSI) SAN
iSCSI
App Server App Server
NIC
NIC
DeviceDevice
NIC
IP Network
Router or Switch
Storage or other device
Good for:
• Storage consolidation
• Acquisition Cost/Connectivity Cost
• Ease of use, simple deployment
• Ability to use existing networks
• Campus connectivity
Not So Good for:
• High-end applications performance
Data Stored as Blocks and Volumes
iSCSI Driver iSCSI Driver
iSCSI Target iSCSI Target
32EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What is the Purpose of Block I/O?
• Allows small amount of memory to run multiple applications
• Swap data between computers
• Applications and data stored in fixed “Blocks”
33EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Today’s Blocks..
• Size of a block in Kilobytes
• Common block sizes are 4K, 8K, 16K, 32K and 64K
• Large block sizes are used for sequential applications where
data pre-fetch is effective, i.e. video streaming
• Modern servers have huge amounts of memory
• Block storage can be either direct-attached or SAN-attached to
servers
34EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What’s in a Block?
• A block contains raw data
• Applications use blocks as a form of communication
while running
• Everything on your hard drive is in blocks
• Applications assemble blocks in such a way as to
provide information
• Applications use blocks to create files
35EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
File Storage
• The file system to store files was invented in the early 80s
• Files are kept in folders and sub-folders
• File systems are commonly used by applications such as small
databases
• External file storage is called Network-Attached Storage (NAS)
because the storage is attached over IP networks
36EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
This is a human-friendly file system
These are blocks assembled by the Windows File System into files
37EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Block and File Relationships
Block
Block
Block
Block
SAN
Database
CatApp
Blocks are DATA
QueryResult
Report
• This is INFORMATION
• It is a FILE
• It can be stored using NAS
IP Network
Cat.docx
38EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Why is Storage Growing and What’s Growing?
• Block storage is mainly used for databases and applications
– These belong to organizations (business, government)
– They grow as organizations add more clients and services
– Analysts say that block storage grows around 20% to 30% a year
• File storage is used by everybody
– Inside organisations for internal file storage
– Available on the internet as some kind of service
• Web pages for commerce
• Facebook
• eBay
– Billions of people use the internet and this is driving file storage
growth at a tremendous rate
– IDC’s “Digital Universe” will be 50 times bigger in 2020 than it is
today
– Analysts say that file storage grows around 80% a year
39EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
September 1977 – Early Networking
ARCNET was invented to connect
computers to each other for information
exchange
The technology would go on to be the
basis for the Local-Area Network and
Network-Attached Storage
40EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
What is Network Attached Storage (NAS)?
A network carrying file-based traffic
Users / Application
Clients
Servers / Applications Storage / File Data
LAN
Switches
IP
NETWORK
41EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
NAS
NAS
Network-Attached
Storage
User
Desktop
Oracle
Server
NIC
NIC
File
Sharing
Device
File
Sharing
Device
Network Interface Card
IP Network
Router or Switch
Storage or Server
Good for:
 File sharing and some apps
 Acquisition and connectivity cost
 Ease of use, simple deployment
 Long-distance connectivity
Not So Good for:
High-end applications performance
Supporting Microsoft Applications
Data Stored as Files in File Systems
42EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Host
A
Host
B
NIC NIC
Host
A
HBA
Host
B
HBA
How can we Build Consolidated Environments?
SANs consolidate storage
Physical
Storage is
shared, not
information
Application Servers
BlockI/O
Fibre
Channel
Network
Application Servers
Host
A
Host
B
FileI/O
NAS consolidates file servers
and storage…
Physical
Storage and
information
is shared
NIC NIC
Application Servers
BlockI/O
IP
Network
IP
Network
IP SAN NASFibre Channel SAN
SAN, iSCSI, and NAS
43EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Unified Storage
 Unified storage provides connectivity for all the protocols
– FC SAN
– IP (iSCSI) SAN
– Ethernet networks
– Fibre-channel over Ethernet (FCoE) from Cisco
 Physical storage is shared between the block and file
environments
– Both environments managed using the same tools
– Common data protection and replication for both environments
– High degree of hypervisor (VMware, Hyper-V and Citrix) for both
environments
44EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Users / Application Clients Servers / Applications Storage / File Data
LAN
Switches
IP
NETWORK
Putting it all Together
Unified
Storage
45EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Servers / Applications Storage / File Data
SAN
Switches
Directors
Fibre Channel
NETWORK
Putting it all Together
Unified
Storage
46EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Putting it all Together
Users / Application Clients Servers / Applications Storage / File Data
SAN
Switches
Directors
LAN
Switches
IP
NETWORK
Fibre Channel
NETWORK
Gateway
Unified
Storage
47EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
How Many Customers Still Look Like This?
48EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Storage Consolidation Drives TCO Down
49EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Storage Management
50EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Data Replication, Backup &
Recovery
This section will cover data
replication, backup, and recovery
51EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Local Copies of Data – Clones
• Physically independent point-in-
time copies of source volume
– Minimal performance impact on
applications
– Good for:
• Backup
• Recovery
• Testing
• Database extract
• Source of data to be moved
• Significant cost if many clones
are needed
– Clone capacity must equal
production capacity
52EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Local Copies of Data – Snapshots
• Logical, point-in-time copies of data
• Pointer-based copy of data
– May have some performance impact on
applications
– Good for:
• Backup
• Restore
• Testing
• Managing change to data over a
period of time
• Block Storage uses either clones or
snapshots
• NAS Storage usually uses snapshots
53EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Remote Replication
• Recovery Point Objective (RPO)
– How far back in time does data need to be recovered if data loss
occurs ?
• Recovery Time Objective (RTO)
– How much time will pass after a data loss incident before
operations are online again?
54EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Synchronous Model
1. I/O from host to local storage system
2. I/O from local storage system to remote (target) system
3. Acknowledgement back from remote to local system
4. Acknowledgement from local storage system back to host
55EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Asynchronous Replication with Periodic Update
1. I/O from host to storage system
2. Acknowledgement from local storage system back to host
3. Trigger event
4. Delta Sets from local storage system to remote (target)
system
5. Acknowledgement back from remote to local system
56EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Continuous Data Protection
 Software-based replication solution
 Uses server or dedicated appliance
 Array-agnostic
 DVR-like in operation
 All writes replicated to journal and then to recovery storage
 Journal acts as a buffer to prevent corruption events, for
example from spreading to recovery storage
57EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Struggle with Backup
• The time allowed for backup is called the “backup window”
• Increased application availability requirements make the
window smaller and smaller
• The amount of data at the user is increasing
– So the amount of data to be backed up is increasing
58EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
• Very common way to backup/restore
– Individual tape drives can be attached
to each server
– Backup can be done over the LAN
▪ Slow and error-prone but cheap
– Backup can also be done over the SAN
▪ Fast but expensive
– A tape library of some kind can used
– As information grows the number of
tapes also has to grow and this can
get expensive and difficult to manage
– Security is an issue because tapes get
lost or stolen
– Tape is fairly fragile and gets damaged
when people carry it from place to
place
Features
Backup and Recovery Using Tape
Problem: Backup to tape can be fast but recovery is always much slower
59EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Backup and Recovery Using Disk
• Increasingly common way to
backup/restore
– Backup target can be large ATA
drives inside the storage array
▪ This can be the same storage
array being used by the
production environment
– Backup target can be a virtual
tape library
▪ This is a storage array with
emulation hardware and software
▪ Multiple tape drive and library
types supported simultaneously
– A virtual tape library appears
“just like the real thing” to the
backup application
– Disk Libraries provide remote
replication for better availability
of backups
Features
Solution: Restore from disk is as fast as the backup, so much better recovery
60EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
The Struggle with Backup
• Clones and Snapshots can be used for backup
– This really helps to improve application availability
• But the data grows and grows and everything gets bigger
– More storage
– More tape
– More people to manage it all
61EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
• Data Growth
– Production will grow 5x,
• Backup represents 30x production
capacity
– Daily, weekly, and monthly full
backups kept for months or years
• Server Virtualization
– VM sprawl creates protection
challenges
– Server consolidation leaves little
bandwidth for backup
• Conventional backups typically move
200% of the data each week
• Next Generation Virtual Data Center
– “IT as a Service” models drive
demands for greater availability,
resource flexibility, and shorter
backup windows, RTOs and RPOs
Digital Information Created and Replicated Worldwide
5,000
4,000
3,000
2,000
1000
0
Exabytes
Source: IDC Digital Universe white paper, sponsored by EMC
5-FOLD Growth
in 4 YEARS
Why Data Deduplication?
62EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Backup Has Evolved
63EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Deduplication at Work
64EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
De-dupe Real-World Results
Data Type
Amount of
Primary
Data
Backed Up
Amount of
Data
Moved
Daily
Daily
De-
duplication
Ratio
Windows file systems 3,573 GB 6.1 GB 586:1
Mix of Windows, Linux, and UNIX file
systems
5,097 GB 11.7 GB 436:1
Engineering files on NAS (NDMP
backups)
3,265 GB 24.2 GB 135:1
Mix of 20 percent databases, 80
percent
file systems (Windows and UNIX)
9,583 GB 80.0 GB 120:1
Mix of Linux file systems and
databases
7,831 GB 104.2 GB 75:1
Source: EMC
Results Vary by Data Type: Customer Ratios vs. Full Backups
65EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Old Paradigm
Physical Environment: Low
overall server utilization and
plenty of bandwidth for backup
20 percent resource utilization
100%
80%
40%
0%
60%
20%
CPUUtilization
Server
A
Server
B
Server
C
Virtual Server A Virtual Server B Virtual Server C
New Paradigm
Virtual Environment: High
overall server utilization and little
bandwidth for backup
80 percent resource utilization
100%
80%
40%
0%
60%
20%
CPUUtilization
ESXServer
Hardware
Shared Physical Resources
Next Generation Backup Drives Utilization
66EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Next Generation Backup – The Big Picture
67EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Course Summary
During this course, you have learned:
• How information storage has evolved over time
• The basic’s of today’s storage environments
• How to identify fundamental elements of storage
architecture & performance
68EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Thank You
• Please note:
– It may take up to 24 hours for your
transcript to be updated and reflect
that you have successfully
completed this course.
– If after 24 hours your transcript is
not updated, please send an e-mail
to EdServices@emc.com describing
your issue.
• Please include:
– Badge Number
– Course Title
– Issue
2014 Sales Accreditation Training
69EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY
S a l e s T r a i n i n g
Click here to provide feedback

More Related Content

What's hot

Emc isilon overview
Emc isilon overview Emc isilon overview
Emc isilon overview
solarisyougood
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
Spiceworks
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
David Pasek
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
Ashwin Pawar
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
virtualsouthwest
 
Network attached storage
Network attached storageNetwork attached storage
Network attached storageashutosh rai
 
VMware - Virtual SAN - IT Changes Everything
VMware - Virtual SAN - IT Changes EverythingVMware - Virtual SAN - IT Changes Everything
VMware - Virtual SAN - IT Changes Everything
VMUG IT
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)sagaroceanic11
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
Duncan Epping
 
Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS)
Kshitij Shete
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)sandeepgodfather
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
Jennifer Graham
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
sankcomp
 
Dell VMware Virtual SAN Ready Nodes
Dell VMware Virtual SAN Ready NodesDell VMware Virtual SAN Ready Nodes
Dell VMware Virtual SAN Ready NodesAndrew McDaniel
 
White Paper: EMC Isilon OneFS — A Technical Overview
White Paper: EMC Isilon OneFS — A Technical Overview   White Paper: EMC Isilon OneFS — A Technical Overview
White Paper: EMC Isilon OneFS — A Technical Overview
EMC
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
xKinAnx
 
Oracle Flex ASM - What’s New and Best Practices by Jim Williams
Oracle Flex ASM - What’s New and Best Practices by Jim WilliamsOracle Flex ASM - What’s New and Best Practices by Jim Williams
Oracle Flex ASM - What’s New and Best Practices by Jim Williams
Markus Michalewicz
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
Aakash Panchal
 
Hyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: ConceptsHyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: Concepts
Nick Scuola
 
Raid Technology
Raid TechnologyRaid Technology
Raid Technology
Aman Sadhwani
 

What's hot (20)

Emc isilon overview
Emc isilon overview Emc isilon overview
Emc isilon overview
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
 
Network attached storage
Network attached storageNetwork attached storage
Network attached storage
 
VMware - Virtual SAN - IT Changes Everything
VMware - Virtual SAN - IT Changes EverythingVMware - Virtual SAN - IT Changes Everything
VMware - Virtual SAN - IT Changes Everything
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
 
Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
Dell VMware Virtual SAN Ready Nodes
Dell VMware Virtual SAN Ready NodesDell VMware Virtual SAN Ready Nodes
Dell VMware Virtual SAN Ready Nodes
 
White Paper: EMC Isilon OneFS — A Technical Overview
White Paper: EMC Isilon OneFS — A Technical Overview   White Paper: EMC Isilon OneFS — A Technical Overview
White Paper: EMC Isilon OneFS — A Technical Overview
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
 
Oracle Flex ASM - What’s New and Best Practices by Jim Williams
Oracle Flex ASM - What’s New and Best Practices by Jim WilliamsOracle Flex ASM - What’s New and Best Practices by Jim Williams
Oracle Flex ASM - What’s New and Best Practices by Jim Williams
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 
Hyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: ConceptsHyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: Concepts
 
Raid Technology
Raid TechnologyRaid Technology
Raid Technology
 

Similar to Storage basics

disk sechduling
disk sechdulingdisk sechduling
disk sechdulinggopi7
 
Disk memory systems
Disk memory systemsDisk memory systems
Disk memory systems
Abhishek Rajpoot
 
DIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICESDIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICES
Staus Nyongesa
 
19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf
JESUNPK
 
9781111306366 ppt ch7
9781111306366 ppt ch79781111306366 ppt ch7
9781111306366 ppt ch7
Dr. Ahmed Al Zaidy
 
Auxiliary memory Computer Architecture and Computer Organization
Auxiliary memory Computer Architecture and   Computer OrganizationAuxiliary memory Computer Architecture and   Computer Organization
Auxiliary memory Computer Architecture and Computer Organization
Seraphic Nazir
 
Unit 4 DBMS.ppt
Unit 4 DBMS.pptUnit 4 DBMS.ppt
Unit 4 DBMS.ppt
HARRSHITHAASCSE
 
Data storage csc
Data storage cscData storage csc
Data storage csc
Ashwin Ananthapadmanabhan
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
Muhammad Ahad
 
Csc1401 lecture07 -external memory
Csc1401   lecture07 -external memoryCsc1401   lecture07 -external memory
Csc1401 lecture07 -external memory
IIUM
 
06 external memory
06 external memory06 external memory
06 external memory
dilip kumar
 
06_External Memory.ppt
06_External Memory.ppt06_External Memory.ppt
06_External Memory.ppt
RaziAhmed30
 
06_External Memory.ppt
06_External Memory.ppt06_External Memory.ppt
06_External Memory.ppt
saurabhpawar98
 
Types of secondary storage devices ppt
Types of secondary storage devices pptTypes of secondary storage devices ppt
Types of secondary storage devices ppt
Surkhab Shelly
 
Secondary Storage Devices
Secondary Storage DevicesSecondary Storage Devices
운영체제론 Ch13
운영체제론 Ch13운영체제론 Ch13
운영체제론 Ch13
Jongmyoung Kim
 
18CSC205J-UNIT-5.pptx
18CSC205J-UNIT-5.pptx18CSC205J-UNIT-5.pptx
18CSC205J-UNIT-5.pptx
AdarshMohanty16
 
Hard Disk Drive
Hard Disk Drive Hard Disk Drive
Hard Disk Drive
Rohan Awale
 

Similar to Storage basics (20)

disk sechduling
disk sechdulingdisk sechduling
disk sechduling
 
Disk memory systems
Disk memory systemsDisk memory systems
Disk memory systems
 
DIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICESDIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICES
 
19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf
 
9781111306366 ppt ch7
9781111306366 ppt ch79781111306366 ppt ch7
9781111306366 ppt ch7
 
Auxiliary memory Computer Architecture and Computer Organization
Auxiliary memory Computer Architecture and   Computer OrganizationAuxiliary memory Computer Architecture and   Computer Organization
Auxiliary memory Computer Architecture and Computer Organization
 
Unit 4 DBMS.ppt
Unit 4 DBMS.pptUnit 4 DBMS.ppt
Unit 4 DBMS.ppt
 
Os7
Os7Os7
Os7
 
Data storage csc
Data storage cscData storage csc
Data storage csc
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
Csc1401 lecture07 -external memory
Csc1401   lecture07 -external memoryCsc1401   lecture07 -external memory
Csc1401 lecture07 -external memory
 
06 external memory
06 external memory06 external memory
06 external memory
 
06_External Memory.ppt
06_External Memory.ppt06_External Memory.ppt
06_External Memory.ppt
 
06_External Memory.ppt
06_External Memory.ppt06_External Memory.ppt
06_External Memory.ppt
 
Types of secondary storage devices ppt
Types of secondary storage devices pptTypes of secondary storage devices ppt
Types of secondary storage devices ppt
 
Secondary Storage Devices
Secondary Storage DevicesSecondary Storage Devices
Secondary Storage Devices
 
External memory
External memoryExternal memory
External memory
 
운영체제론 Ch13
운영체제론 Ch13운영체제론 Ch13
운영체제론 Ch13
 
18CSC205J-UNIT-5.pptx
18CSC205J-UNIT-5.pptx18CSC205J-UNIT-5.pptx
18CSC205J-UNIT-5.pptx
 
Hard Disk Drive
Hard Disk Drive Hard Disk Drive
Hard Disk Drive
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Storage basics

  • 1. 1EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Storage Basics An Introduction to Storage Concepts
  • 2. 2EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g What You Will Learn About this training After completing this course, you will be able to: • Explain how storage has developed over time • Describe the basics of today’s storage environment • Identify elements of storage architecture and performance
  • 3. 3EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g A Short History of Disk and Tape This section will cover the history of disk and tape.
  • 4. 4EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Using Your Mainframe in the Good Old Days • A long time ago applications were called programs • These were input to a mainframe using punched holes • Output was usually to paper (printed or punched) • Life was binary...everything was black or white
  • 5. 5EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The Magnetic Tape Device • Tape was introduced, in 1952, as a superior alternative to punched cards • Tape was: – Much better capacity than a box of punched cards – Less fragile than a punched card – A whole lot faster than reading a deck of punched cards • But too slow for emerging application requirements • Tape is sequential – Must read tape until desired data is found – Murphy’s Law always ensures that: • Data is at the end of the current tape or • On a different tape or • On a tape which can’t be read • A better approach had to be found – Direct Access Storage Devices (DASD)
  • 6. 6EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Disk Storage Devices for Computers - 1954 Early direct access storage devices were rotating “drums” covered with a magnetic coating and many fixed read/write heads. The drum design was improved upon by “Winchester” technology, which used movable heads and flat platters
  • 7. 7EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The Disk • Invented by in the early 50s • Aluminium platter with magnetic coating on both sides • Platters assembled into a “pack” • Moving read/write heads to access data on each platter
  • 8. 8EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The Disk Drive and the Spindle • Platters rotate around a central shaft called a spindle • The word spindle is still used to refer to individual disk drive Spindle Actuator Read/Write Head Platters The actuator moves the Read/Write heads
  • 9. 9EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Come Fly With Me • Read/Write heads fly in the air currents generated by the spinning disk – Just like an aircraft flies in the air currents generated by its forward thrust
  • 10. 10EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The Benefits of DASD • The ability of a disk to randomly access data gave rise to a HUGE increase in mainframe performance • A tape could take minutes to reach a particular piece of data whereas a disk could do it in milliseconds • This meant that the number of transactions a mainframe or server could execute, in a given period, was vastly increased if disk was used
  • 11. 11EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The Evolution of Disk Technology • Drive capacities continue to increase dramatically from increased data density – Longitudinal Recording limited by SuperParaMagnetic Effect (SPME) – Perpendicular Recording now in production (10x) • Performance trends – Increased RPM speed – Increased use of memory and cache at the drive level – Solid State disks (Flash) • Disk interfaces are driven by industry standards – Ultra SCSI – Fibre Channel (Optical) – SATA, PATA (EIDE) • Industry challenge – Higher capacity per disk drive reduces cost, but… – Reduces the number of actuators for a given capacity – Vector active I/O to Flash drives…inactive to higher density mechanical devices
  • 12. This section will cover disk performance basics Disk Performance Fundamentals
  • 13. 13EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g How is a Disk Formatted? A uniquely addressable area within a disk drive is Cylinder, Head, and Sector Track The Disk Platter is segmented into a number of concentric rings, called Tracks Cylinder Tracks in the same position on all of the disk platters in a spindle are called a Cylinder Tracks are selected by head number Every track on the disk platter is also segmented into individual sections called Sectors Sector
  • 14. 14EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Choosing the Right Disk • Performance (aka Access Time): – How fast can the heads be moved to the right track – How quickly can data be moved to and from the disk  These are explained in the next few slides • Capacity – How much data can the disk hold • Let’s look at the performance parameters – The things that make a difference to disk behavior Different Disk Types Exist
  • 15. 15EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Disk Drive Access Time Seek Time: • The average amount of time necessary to move the actuator arm to position the read/write head over the track • Early disks were 14” (35 cm) in diameter and had long seek times – 50ms! • Modern disks are 3 ½” (9 cm) or 2 ½” (6 cm) and have much shorter seek times – 3 – 4ms!!
  • 16. 16EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Disk Drive Access Time Latency: • The average amount of time to wait for the data to arrive under the read/write head as the disk spins • Also called rotational delay • The faster the disk spins the less the latency • Older disks rotated at – 2,400 RPM • Modern disks rotate at: – 5,400 – 15,000 RPM
  • 17. 17EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Disk Drive Access Time Transfer Rate: • The amount of data which can be written or read in a given amount of time (normally expressed in bytes per second) • Higher RPM and faster connectivity give higher transfer rates • Transfer rates are higher at the outer edge of the disk
  • 18. 18EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The Coming of the Storage Array • Up until 1984 storage subsystems were made up of the following components • Storage Controller – Controlled “strings” of disk drives – Proprietary and expensive – Controller also provided the interface to the mainframe or similar • String – A number of disk drives sharing some resources to communicate with a controller – Disks were SLED (Single Large Expensive Disk) – Disk failure = data loss – Some manufacturers got around that problem by writing the same data to different disks in different strings – dual copy • Expensive, slow and proprietary • RAID Technology changed everything…
  • 19. 19EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g RAID Technology Redundant Arrays of Independent Disks Writing data across multiple disks • For better performance • To improve availability
  • 20. 20EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g RAID1 (1989) - Sun 4/280 WS,128 MB DRAM, 4 dual-string SCSI controllers, 28 5.25-inch SCSI disks with disk mirroring software. Randy Katz Dave Patterson Garth Gibson The First RAID Group UC Berkeley-- 1984
  • 21. 21EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Short Guide to RAID RAID 0 – data striped across disks Improves performance Any disk failure = loss of data RAID 1 – the SAME data mirrored on 2 disks Improves performance and availability Can get expensive Can survive loss of one disk RAID 3 – data striped across disks Parity element used for validation/recovery Improves disk utilisation and availability Can survive loss of one disk BUT Single parity disk can be performance bottleneck RAID 5 – data striped across disks Parity element used for validation/recovery Parity written to different disks for each stripe Improves performance over RAID 3 (no bottleneck) Can survive loss of one disk Data Parity All RAID types not shown Number of disks in a RAID group can exceed 4 (except RAID 1) 4 disks shown for example only A RAID configuration of disks is called a RAID Group P A B C D AA CBA FED P P CBA P E FD
  • 22. 22EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g 0 Striping with no Parity Large Block Performance, No Redundancy 1 Mirrored Disks High Availability and Performance Simple Implementation 0+1 Mirrored Stripe Highest Availability and Performance 2 Hamming Code Large Block Performance Multiple Check Disks Availability, Poor Cost 3 Striping with Parity Large Block Performance Single Check Disk Availability at Less Cost 4 Independent Read/Write Transaction Processing, High Availability, Single Parity Disk High Percentage of Reads 5 Independent Read/Write Transaction Processing, High Availability, Independent Parity Disks High Percentage of Reads 6 Independent Read/Write Transaction Processing, High Availability, Multiple Independent Parity Disks High Percentage of Reads RAID Summary RAID Technique Application
  • 23. 23EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g What really happened to the dinosaurs...
  • 24. 24EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g RAID Benefits (and a Few Drawbacks) • The approach made storage cheaper and more reliable – “Commodity” disk drives could be used instead of very expensive, proprietary disk drives specific to individual manufacturers – RAID protected against data loss when a disk failed • Except RAID 0 which is performance enhancement only • The technology was adopted by many manufacturers and many products became available – This added to the confusion over time • Different server types • Different operating systems • Different applications • Different management approaches • And now different storage arrays (and a Few Drawbacks)
  • 25. 25EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Evolution of the Storage Array Fault Tolerant Cache Memory Array Controller Array Controller Disk Directors Disk Directors Host Interface Host Interface Disks in RAID Groups Mainframe/Server
  • 26. 26EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Storage Networking This section will cover Storage Networking: SAN, NAS, and iSCSI
  • 27. 27EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Evolving Connections Mainframe Disk Bus/Tag – 8lbs/meter SCSI Cable- 8oz/meter CAT6/Fiber Optic Cable >1 oz/meter
  • 28. 28EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g What is a Storage Area Network (SAN)? A dedicated network carrying block-based storage traffic Servers / Applications Storage/File Data SAN Switches Directors Fibre Channel NETWORK
  • 29. 29EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g SAN SAN Storage Area Network Host Bus Adapter Fibre Channel Cabling Switch or Director Storage Array Good for: • Application performance • Highest availability • Large scale consolidation Not So Good for: • Acquisition and connectivity cost for small numbers of servers • Specialist knowledge required to manage App Server App Server Mirrored Cache 0 1 2 3 Mirrored CacheArray 0 1 2 3 HBA HBA HBA HBA Array Data Stored as Blocks and Volumes
  • 30. 30EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g What’s all this noise about IP Storage (iSCSI)? Consolidated SAN Infrastructures Direct Attached Storage Deployments Consolidated NAS Infrastructure iSCSI extends SAN consolidation benefits to “stranded” servers and storage iSCSI offers a cost effective IP Storage infrastructure for my entry level SAN iSCSI extends my consolidation capabilities to include traditional block applications
  • 31. 31EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The IP Storage (iSCSI) SAN iSCSI App Server App Server NIC NIC DeviceDevice NIC IP Network Router or Switch Storage or other device Good for: • Storage consolidation • Acquisition Cost/Connectivity Cost • Ease of use, simple deployment • Ability to use existing networks • Campus connectivity Not So Good for: • High-end applications performance Data Stored as Blocks and Volumes iSCSI Driver iSCSI Driver iSCSI Target iSCSI Target
  • 32. 32EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g What is the Purpose of Block I/O? • Allows small amount of memory to run multiple applications • Swap data between computers • Applications and data stored in fixed “Blocks”
  • 33. 33EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Today’s Blocks.. • Size of a block in Kilobytes • Common block sizes are 4K, 8K, 16K, 32K and 64K • Large block sizes are used for sequential applications where data pre-fetch is effective, i.e. video streaming • Modern servers have huge amounts of memory • Block storage can be either direct-attached or SAN-attached to servers
  • 34. 34EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g What’s in a Block? • A block contains raw data • Applications use blocks as a form of communication while running • Everything on your hard drive is in blocks • Applications assemble blocks in such a way as to provide information • Applications use blocks to create files
  • 35. 35EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g File Storage • The file system to store files was invented in the early 80s • Files are kept in folders and sub-folders • File systems are commonly used by applications such as small databases • External file storage is called Network-Attached Storage (NAS) because the storage is attached over IP networks
  • 36. 36EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g This is a human-friendly file system These are blocks assembled by the Windows File System into files
  • 37. 37EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Block and File Relationships Block Block Block Block SAN Database CatApp Blocks are DATA QueryResult Report • This is INFORMATION • It is a FILE • It can be stored using NAS IP Network Cat.docx
  • 38. 38EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Why is Storage Growing and What’s Growing? • Block storage is mainly used for databases and applications – These belong to organizations (business, government) – They grow as organizations add more clients and services – Analysts say that block storage grows around 20% to 30% a year • File storage is used by everybody – Inside organisations for internal file storage – Available on the internet as some kind of service • Web pages for commerce • Facebook • eBay – Billions of people use the internet and this is driving file storage growth at a tremendous rate – IDC’s “Digital Universe” will be 50 times bigger in 2020 than it is today – Analysts say that file storage grows around 80% a year
  • 39. 39EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g September 1977 – Early Networking ARCNET was invented to connect computers to each other for information exchange The technology would go on to be the basis for the Local-Area Network and Network-Attached Storage
  • 40. 40EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g What is Network Attached Storage (NAS)? A network carrying file-based traffic Users / Application Clients Servers / Applications Storage / File Data LAN Switches IP NETWORK
  • 41. 41EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g NAS NAS Network-Attached Storage User Desktop Oracle Server NIC NIC File Sharing Device File Sharing Device Network Interface Card IP Network Router or Switch Storage or Server Good for:  File sharing and some apps  Acquisition and connectivity cost  Ease of use, simple deployment  Long-distance connectivity Not So Good for: High-end applications performance Supporting Microsoft Applications Data Stored as Files in File Systems
  • 42. 42EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Host A Host B NIC NIC Host A HBA Host B HBA How can we Build Consolidated Environments? SANs consolidate storage Physical Storage is shared, not information Application Servers BlockI/O Fibre Channel Network Application Servers Host A Host B FileI/O NAS consolidates file servers and storage… Physical Storage and information is shared NIC NIC Application Servers BlockI/O IP Network IP Network IP SAN NASFibre Channel SAN SAN, iSCSI, and NAS
  • 43. 43EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Unified Storage  Unified storage provides connectivity for all the protocols – FC SAN – IP (iSCSI) SAN – Ethernet networks – Fibre-channel over Ethernet (FCoE) from Cisco  Physical storage is shared between the block and file environments – Both environments managed using the same tools – Common data protection and replication for both environments – High degree of hypervisor (VMware, Hyper-V and Citrix) for both environments
  • 44. 44EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Users / Application Clients Servers / Applications Storage / File Data LAN Switches IP NETWORK Putting it all Together Unified Storage
  • 45. 45EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Servers / Applications Storage / File Data SAN Switches Directors Fibre Channel NETWORK Putting it all Together Unified Storage
  • 46. 46EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Putting it all Together Users / Application Clients Servers / Applications Storage / File Data SAN Switches Directors LAN Switches IP NETWORK Fibre Channel NETWORK Gateway Unified Storage
  • 47. 47EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g How Many Customers Still Look Like This?
  • 48. 48EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Storage Consolidation Drives TCO Down
  • 49. 49EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Storage Management
  • 50. 50EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Data Replication, Backup & Recovery This section will cover data replication, backup, and recovery
  • 51. 51EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Local Copies of Data – Clones • Physically independent point-in- time copies of source volume – Minimal performance impact on applications – Good for: • Backup • Recovery • Testing • Database extract • Source of data to be moved • Significant cost if many clones are needed – Clone capacity must equal production capacity
  • 52. 52EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Local Copies of Data – Snapshots • Logical, point-in-time copies of data • Pointer-based copy of data – May have some performance impact on applications – Good for: • Backup • Restore • Testing • Managing change to data over a period of time • Block Storage uses either clones or snapshots • NAS Storage usually uses snapshots
  • 53. 53EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Remote Replication • Recovery Point Objective (RPO) – How far back in time does data need to be recovered if data loss occurs ? • Recovery Time Objective (RTO) – How much time will pass after a data loss incident before operations are online again?
  • 54. 54EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Synchronous Model 1. I/O from host to local storage system 2. I/O from local storage system to remote (target) system 3. Acknowledgement back from remote to local system 4. Acknowledgement from local storage system back to host
  • 55. 55EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Asynchronous Replication with Periodic Update 1. I/O from host to storage system 2. Acknowledgement from local storage system back to host 3. Trigger event 4. Delta Sets from local storage system to remote (target) system 5. Acknowledgement back from remote to local system
  • 56. 56EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Continuous Data Protection  Software-based replication solution  Uses server or dedicated appliance  Array-agnostic  DVR-like in operation  All writes replicated to journal and then to recovery storage  Journal acts as a buffer to prevent corruption events, for example from spreading to recovery storage
  • 57. 57EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The Struggle with Backup • The time allowed for backup is called the “backup window” • Increased application availability requirements make the window smaller and smaller • The amount of data at the user is increasing – So the amount of data to be backed up is increasing
  • 58. 58EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g • Very common way to backup/restore – Individual tape drives can be attached to each server – Backup can be done over the LAN ▪ Slow and error-prone but cheap – Backup can also be done over the SAN ▪ Fast but expensive – A tape library of some kind can used – As information grows the number of tapes also has to grow and this can get expensive and difficult to manage – Security is an issue because tapes get lost or stolen – Tape is fairly fragile and gets damaged when people carry it from place to place Features Backup and Recovery Using Tape Problem: Backup to tape can be fast but recovery is always much slower
  • 59. 59EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Backup and Recovery Using Disk • Increasingly common way to backup/restore – Backup target can be large ATA drives inside the storage array ▪ This can be the same storage array being used by the production environment – Backup target can be a virtual tape library ▪ This is a storage array with emulation hardware and software ▪ Multiple tape drive and library types supported simultaneously – A virtual tape library appears “just like the real thing” to the backup application – Disk Libraries provide remote replication for better availability of backups Features Solution: Restore from disk is as fast as the backup, so much better recovery
  • 60. 60EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g The Struggle with Backup • Clones and Snapshots can be used for backup – This really helps to improve application availability • But the data grows and grows and everything gets bigger – More storage – More tape – More people to manage it all
  • 61. 61EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g • Data Growth – Production will grow 5x, • Backup represents 30x production capacity – Daily, weekly, and monthly full backups kept for months or years • Server Virtualization – VM sprawl creates protection challenges – Server consolidation leaves little bandwidth for backup • Conventional backups typically move 200% of the data each week • Next Generation Virtual Data Center – “IT as a Service” models drive demands for greater availability, resource flexibility, and shorter backup windows, RTOs and RPOs Digital Information Created and Replicated Worldwide 5,000 4,000 3,000 2,000 1000 0 Exabytes Source: IDC Digital Universe white paper, sponsored by EMC 5-FOLD Growth in 4 YEARS Why Data Deduplication?
  • 62. 62EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Backup Has Evolved
  • 63. 63EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Deduplication at Work
  • 64. 64EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g De-dupe Real-World Results Data Type Amount of Primary Data Backed Up Amount of Data Moved Daily Daily De- duplication Ratio Windows file systems 3,573 GB 6.1 GB 586:1 Mix of Windows, Linux, and UNIX file systems 5,097 GB 11.7 GB 436:1 Engineering files on NAS (NDMP backups) 3,265 GB 24.2 GB 135:1 Mix of 20 percent databases, 80 percent file systems (Windows and UNIX) 9,583 GB 80.0 GB 120:1 Mix of Linux file systems and databases 7,831 GB 104.2 GB 75:1 Source: EMC Results Vary by Data Type: Customer Ratios vs. Full Backups
  • 65. 65EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Old Paradigm Physical Environment: Low overall server utilization and plenty of bandwidth for backup 20 percent resource utilization 100% 80% 40% 0% 60% 20% CPUUtilization Server A Server B Server C Virtual Server A Virtual Server B Virtual Server C New Paradigm Virtual Environment: High overall server utilization and little bandwidth for backup 80 percent resource utilization 100% 80% 40% 0% 60% 20% CPUUtilization ESXServer Hardware Shared Physical Resources Next Generation Backup Drives Utilization
  • 66. 66EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Next Generation Backup – The Big Picture
  • 67. 67EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Course Summary During this course, you have learned: • How information storage has evolved over time • The basic’s of today’s storage environments • How to identify fundamental elements of storage architecture & performance
  • 68. 68EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Thank You • Please note: – It may take up to 24 hours for your transcript to be updated and reflect that you have successfully completed this course. – If after 24 hours your transcript is not updated, please send an e-mail to EdServices@emc.com describing your issue. • Please include: – Badge Number – Course Title – Issue 2014 Sales Accreditation Training
  • 69. 69EMC CONFIDENTIAL — FOR TRAINING PURPOSES ONLY S a l e s T r a i n i n g Click here to provide feedback