Beruflich Dokumente
Kultur Dokumente
ition
Nexenta Special Ed
Find the advantages
to using SDDC
Open the book
and find:
So f t wa r e D e f i n e d
Integrate off-the-shelf
technologies and virtualization
• What you need to
know about Software
Defined Data Centers Data(SCDDeCn ters
to deliver unified storage, • If Software Defined
)
networking, and data center Storage is right for you
capabilities without locking
• How an SDDC lowers
in to proprietary hardware. TCO and improves
• Discover SDDC — what it is and scalability
what it does • Why atomic storage
witch to Software Defined
• S is important
Storage — lower TCO and
improve scalability and
performance
• Understand storage — optimize
the right underlying hardware Learn:
• What an SDDC is and what
• Get the right storage support —
it can do for you
see the solutions that support
your business requirements • How to move to Software Defined
Storage and software defined
networking
Security
Manageability
Availability
Reliability
Lower TCO
Scalability
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Software Defined
Data Centers
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Software Defined Data Centers For Dummies®, Nexenta Special Edition
Published by: John Wiley & Sons, Inc., 111 River St., Hoboken, NJ 07030-5774,
www.wiley.com
Copyright © 2014 by John Wiley & Sons, Inc.
No part of this publication may be reproduced, stored in a retrieval system or trans-
mitted in any form or by any means, electronic, mechanical, photocopying, record-
ing, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976
United States Copyright Act, without the prior written permission of the Publisher.
Requests to the Publisher for permission should be addressed to the Permissions
Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201)
748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permissions.
Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference
for the Rest of Us!, The Dummies Way, Dummies.com, Making Everything Easier, and
related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc.
and/or its affiliates in the United States and other countries, and may not be used with-
out written permission. Nexenta and the Nexenta logo are registered trademarks of
Nexenta. All other trademarks are the property of their respective owners. John Wiley
& Sons, Inc., is not associated with any product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO
REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF
THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING
WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE. NO WARRANTY
MAY BE CREATED OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS. THE ADVICE AND
STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION. THIS WORK IS
SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING
LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES. IF PROFESSIONAL ASSISTANCE IS
REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT.
NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HERE-
FROM. THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A
CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT
THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR
WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE. FURTHER, READERS SHOULD
BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAP-
PEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
For general information on our other products and services, or how to create a
custom For Dummies book for your business or organization, please contact
our Business Development Department in the U.S. at 877-409-4177, contact
info@dummies.biz, or visit www.wiley.com/go/custompub. For information
about licensing the For Dummies brand for products or services, contact
BrandedRights&Licenses@Wiley.com.
ISBN: 978-1-118-90356-8 (pbk); ISBN: 978-1-118-90453-4 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
2
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1
Introducing Software Defined
Data Centers
In This Chapter
▶ Understanding the basics of Software Defined Data
Centers
▶ Understanding the importance of virtualization
▶ Adding cloud computing into the mix
Understanding SDDCs
Originally, data centers housed all of the plumbing for
water cooling a single large mainframe computer. As
computers shrank in size, the data center transformed.
It became a centralized place to house all the special-
ized electrical circuits, network cabling, and cooling
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
4
necessary for maintaining a controlled environment for
the computers. A data center occupied a rather large
physical space, consumed a lot of energy, and required
a full-time, dedicated staff of expensive talent to keep
everything functioning properly.
The SDDC is quite a different thing than the traditional
data center. Instead of being a physical structure, the
SDDC is offered as a service. That is, you have some-
thing that provides all the data center’s functions but
with baggage that’s easier to manage.
One way to visualize how SDDCs differ from tra-
ditional data centers is to consider how most
people watch movies at home. In the past, you
drove to the video store and rented a tape or
DVD that you took home to play. Today, you
don’t have to drive to the video store; instead,
you can watch movies through streaming ser-
vices, such as Netflix. You still can watch what
you want, when you want, but you don’t have
to bother with a physical tape or disc. To take
the analogy one step further, you probably
have no idea where the video stream is coming
from, either. You simply watch movies as a
service provided by someone else.
Early data centers existed to house computers
for specialized computations. These evolved
into specialized machines used for specialized
circumstances. There were machines whose
hardware design reflected their computing
purpose. A database management system
(DBMS) server would be different from a com-
putational server. A storage server for a net-
work file system (NFS) would be different from
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
5
a storage area network (SAN) storage server. A
Hadoop nameserver would be different from a
Hadoop datanode. These designs would change
over time. As the number of cores per CPU
socket increased, so did the data management
requirements. Hadoop users demanded more
drives as the number of CPU cores increased.
Some data centers demanded more and more density
for their storage to maximize their use of floor space.
Others mandated an upper limit on the storage contained
in a single server or chassis (for example, 20 terabytes)
to limit the blast radius (aka how widespread the collat-
eral damage affects users) when a storage server would
fail. Others insisted that their computer systems would
consume less power (and generate less heat) so more of
the power budget could be dedicated to computing and
less to their addiction to CRAC (central room air condi-
tioning), which had traditionally consumed 50 percent of
a data center’s power.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
6
100 physical machines to the task. With virtu-
alization, a single physical machine can supply
many of the virtual machines.
Virtualization saves money by using all of a
computer’s resources. You add virtual users
until the capacity of the machine is fully
utilized. The cost of the machine is recouped
across many users, not just a single user. In
this way the machines aren’t left idle, which
would waste resources; instead, the machine’s
use is maximized. As a result your in-house
data center can purchase fewer machines for
more users.
Although virtualization is a critical part of SDDCs, the
concept of virtualization isn’t something new. Indeed,
virtualization has existed since it was first developed
by a couple of engineers 50 years ago. Today, however,
virtualization provides considerable additional func-
tionality compared to when it was originally envi-
sioned in the 1960s. Back then, virtualization was seen
simply as a means to allow many different users to run
multiple applications at the same time on the same
mainframe computer. Today, virtualization enables
computers to provide many different services simulta-
neously in a far more efficient manner than would be
possible otherwise.
Virtualization improves availability because a
user is no longer tied to a single machine. If
that machine has hardware issues, the user
is unable to do work until the machine is
repaired. If the user is using a virtual instance
of a machine, his application can run on any of
the machines that can run the virtual image.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
7
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
8
Two key elements of SDDCs are as follows:
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
9
tasks can be migrated to off-site computers to handle
the extra storage capacity or workload, saving the
expense of having to buy extra computers for a few
weeks each year.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2
Switching to Software Defined
Networking
In This Chapter
▶ Understanding virtual LANs
▶ Looking at OpenFlow
▶ Considering Open vSwitch
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
12
connections that make up a group of computers that
can communicate and share files locally. Typically,
LANs also include a router to enable communications
to pass data outside the local group, for example, to
the Internet. Traffic outside the router is separated
from local traffic, which prevents local traffic from
being viewed or intercepted on the public network.
Sometimes, however, it’s simply not possible to physi-
cally connect all the computers that need access to the
LAN directly to the local network. For example, an orga-
nization may have offices in different locations that all
need to access the accounting department’s files or the
inventory database. Obviously, you wouldn’t want to
simply make those resources available on a public net-
work such as the Internet, so another method of con-
necting to those files is required. This alternative
method is the virtual LAN (VLAN).
A VLAN consists of multiple LANs or LAN clients that
can communicate privately across a public network
without making that communications traffic public or
visible. Essentially, VLANs function as if each segment
(or domain) of the VLAN is directly connected to all
other segments of the VLAN with a dedicated cable.
SDDCs typically encompass multiple virtual servers
that may be provided by a number of different physical
systems located in various places. A VLAN enables
these virtual servers to be logically grouped together
no matter where the actual physical computers are
located. This private, logical grouping enhances scal-
ability, security, and network management issues to
make the SDDC possible.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
13
VLANs have been around since the early 1980s,
and were originally developed to enhance voice
over IP (VoIP) networking services.
VLANs make cloud-based services, such as
SDDCs, far more secure than they would be if
they were visible on the public Internet because
the VLAN keeps the traffic private. There can be
many different VLANs that can overlay one or
more physical LANs. Each VLAN can represent a
different department’s logical network.
Understanding the
OpenFlow Protocol
OpenFlow is a standardized communications protocol
that enables control of network switches and routers
over the network. In many ways, OpenFlow has become
synonymous with SDN. Although SDN has been in exis-
tence for over 30 years with the advent of VLANs, there
has been no capability to centrally control the network.
Through the use of OpenFlow, you can manage the flow
of traffic through switches and manage the rerouting of
traffic.
OpenFlow provides a set of software and pro-
tocols that spans a wide variety of switches
and routers and even newer, simpler flow con-
trol devices. By using the OpenFlow network,
administrators can design flexible network
paradigms that respond to the changing world
of bring your own device (BYOD).
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
14
BYOD is a company policy that permits
employees to bring their personally owned
mobile devices (laptops, tablets, and smart-
phones) to their workplaces and to use those
devices to access privileged company
information and applications.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3
Understanding Storage
In This Chapter
▶ Considering the different types of storage
▶ Seeing how hardware comes into play
▶ Understanding RAID controllers
Block storage
One of the side effects of the historical Hollerith cards
that were used by the U.S. Census bureau to tabulate
population data was the early adoption of fixed size
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
16
records. Early computers adopted Hollerith cards
(see Figure 3-1) for fixed size records of 80 characters
per record. The thinking behind these fixed records
was later incorporated in early storage systems (drums
and disk drives) so data would be encoded in fixed
sized blocks. The blocks on a storage device were typi-
cally encoded as blocks whose size was a power of 2
and often a multiple of 512 bytes (or characters).
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
17
Object storage
In the 1990s the programming models changed. The
models no longer looked at data as bits, bytes, and
words of information but as logical collections of infor-
mation called objects. These objects in turn weren’t
accessed by addressing the bytes and words but by
using methods (programs) to perform operations on
the objects, like creating an object, modifying the
contents of an object, and destroying an object. These
became important for the later evolution of NoSQL
databases and key/value drives as programming moved
from a model of records with fields to less formally
structured objects and key-value models like XML.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
18
These forms of data representation became ideal for
unstructured data, virtual machine images, photos,
videos, emails, and logs of usage such as electricity,
telephone, water, and other utility data.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
19
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
20
Changes in Underlying
Hardware
Hard disk drives (HDDs) have traditionally supported a
random access model where each individual block of
the drive can be read or written separately from all
other blocks. Because the device write head uses mag-
netic fields to read/write these blocks, the blocks must
be separated by large gaps to avoid having the opera-
tions on one block affect the data in another block.
Advances in the way that data is recorded on these
mechanical spinning disks have allowed the amount of
data stored to increase rapidly for many years.
SSDs
Solid state drives (SSDs) are a modern replacement for
hard drives and are based on semiconductor memory
known as flash memory. Due to the expense of these
SSDs when compared with HDDs, they were initially
used only for caching data closer to the computer
system. However, as prices have dropped, they’ve
begun to displace HDDs due to their lower total cost of
ownership (TCO) due to lower overall failure rates and
lower power consumption. There are no moving parts
in an SSD. SSD comes in two flavors: MLC (100,000
rewrites) and SLC (1,000,000 rewrites).
Because both types of flash memory are known to fail at
unpredictable points, most flash memory is overprovi-
sioned with excess capacity. When a portion of the device
begins to fail, the data in that location is remapped to an
alternate location. When you purchase a 600 GB drive, it
may actually contain as much as 900 GB of capacity in
order to ensure that over the working life of the drive the
600 GB capacity will be available for use.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
21
Caching is a means of storing information in a
high-speed location so that the most frequently
and/or most recently accessed information is
available without having to retrieve it from the
slower device. Storage caching typically uses
solid-state memory technology.
SMR
Shingled magnetic recording (SMR) is one of the newest
technologies contributing to the density of the data
placed on a disk drive. SMR increases the density of
storage and can lower the cost per bit of storage by 20
to 50 percent. This technology can make the cost of
triple redundant object storage palatable to a corpo-
rate customer. The triple redundancy is actually possi-
ble to deploy at a significantly lower cost than current
mirrored or RAID storage solutions (see the later sec-
tion “RAID Controllers” for more on RAID).
SMR devices can’t be used with existing file
systems without a major overhaul, but they’re
perfect for copy on write technologies used by
NexentaStor as well as for key/value storage
devices.
Key/value
One class of storage devices that potentially can
replace all the block-centric storage devices that pre-
cede them are key/value drives. These drives represent
the convergence of transactional database systems,
XML key/value representations of data, and object
oriented programming.
The key/value drive is built around a very simple
premise. You present a binary large object (BLOB or
the value) and the key you want to use to retrieve that
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
22
value. When you want to retrieve the value, you simply
present the device with the correct key, and the value
is returned to you. The world outside of the device has
no information about the location of the value on the
device and doesn’t care how the device manages the
information.
RAID Controllers
A redundant array of inexpensive disks (RAID) is a way
of ensuring that the data stored on devices is pre-
served even if one of the drives should fail. RAID uses
special forms of encoding the information so if one
member of RAID is lost, excess bits in the other devices
can be used to reconstruct the information.
Raid-Z technology
The ZFS file system and volume manager technology
used in NexentaStor and the Illumos/Solaris operating
system fixed the problems associated with both software
and hardware RAID. By avoiding the read-write-read-write
two phase approach of classic RAID technology (which
leads to the “write hole” and silent data corruption even
with hardware RAID), RAID-Z incorporated the RAID
checksums into a single set of atomic writes that guaran-
teed not only the safety of the data but also the integrity
of the file system.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
23
Illumos is a fork of the original OpenSolaris
code that has been used by NexentaStor for its
open source operating system. As OpenSolaris
completed its final build and Oracle announced
waning support going forward, a community of
OpenSolaris users formed Illumos to create a
fork and continue development on a true open
source derivative. Illumos is free, open source,
and Unix-based with the following distinguish-
ing features:
✓ ZFS: A combined file system and logical volume
manager providing high data integrity for very
large storage volumes
✓ DTrace: A comprehensive dynamic tracking frame-
work for troubleshooting kernel and a
pplication
problems in real time
✓ Kernel-based VM (KVM): Supports native virtual-
ization on processors with hardware virtualization
extensions
For more information on Illumos, visit www.
illumos.org.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4
Moving to Software Defined
Storage
In This Chapter
▶ Understanding existing system challenges
▶ Looking at the benefits of Software Defined Storage
▶ Getting ahead with SDS
▶ Looking at what SDS provides
▶ Understanding flexible storage solutions
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
26
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
27
and physical rack infrastructure so you can literally
slide in new servers, JBODs, and switches/routers as
you need them. In addition, by sticking with the right
application program interfaces (APIs), you’ll see addi-
tional benefits to sending your overflow capacity/
demand to outside service providers for your less fre-
quently accessed data.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
28
The VM instance, on the other hand, provides a set of
hardware interfaces that is shared in common by
almost all platforms. If a particular platform is lacking
hardware for most common functions (for example,
64-bit arithmetic on a 32-bit computer) then the VM
hypervisor provides emulation software to implement
the missing functions.
Strong APIs
The ability to build great VM instances is based on
strong APIs that implement specific functions. For
example, writing to a disk drive is a process that’s
invisible to user applications. User applications are
unaware of how much space is available on a particular
disk drive. Similarly, they’re unaware of the underlying
hardware organization of the space on a disk drive. All
of these concerns are hidden behind APIs that provide
definitions of the appropriate system calls or service
routines that provide access to the capabilities to
read/write disks, draw windows on a screen, send mes-
sages to another application, and so on. In this section,
you take a look at a couple of important SDS APIs
What is Posix?
The first API is Portable Operating System Interface
(POSIX). The development of POSIX was strongly influ-
enced by the design of UNIX — the most popular porta-
ble operating system that successfully migrated to a
wide variety of hardware. UNIX provided a lot of
capabilities that couldn’t be found in other portable
operating systems that were more focused on small or
embedded computers.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
29
What is Putget?
Putget represents the operations that are performed on
object storage systems. Although standards are still
evolving in this area, all object storage systems s upport
basic APIs to support three basic operations:
✓ PUT an object
✓ GET an object
✓ DELete an object
Understanding What
SDS Provides
SDS provides a number of important benefits:
✓ Elimination of hardware dependencies: You’re
free to pick and choose from a variety of vendors
that provide a selection of components at differ-
ent prices.
✓ Ease of migration: When your data is no longer
locked in to a specific vendor, you gain not only
lower costs (choice of hardware) but also the flex-
ibility to migrate users and data to different loca-
tions for ease of access and sharing the data.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
30
✓ Separating the management plane from the data
plane: Traditional file systems tightly integrate
the management of the file system and data with
the allocation, layout, and configuration of the
devices. Don’t lock into a storage system that
doesn’t provide flexibility in the types of devices
or the types of management tools. If everything is
locked into a single infrastructure, you can’t adapt
emerging technologies.
✓ Single pane of glass management: This is a set of
tools for the allocation and management of data
that uses standard interfaces to let you see all your
computers from a single point of contact — no
flipping screens between computer systems.
✓ Adopting a flexible connectivity model: With
SDS, you can adapt the connectivity model
(number of pipes, speed of pipes, protocol used
to access data, and the actual/physical location of
the data) to meet the applications needs with any
access method and advanced functionality.
✓ Using commercial off-the-shelf (COTS) platforms:
COTS employ standard interfaces and can be inte-
grated into a cohesive whole with an integrated
management plane on a single pane of glass that
operates independently of the data devices that
are added to the system over time.
✓ Automatic tiering: By using software that auto-
matically places data in the correct storage tier
(slow HDDs versus SSDs versus Ramdisk), you can
achieve the performance you need without buying
excessive storage.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
31
✓ Converged infrastructure: Computing, networking,
and storage are all freed from platform/hardware
dependencies, and Big Data is available to all
users/applications that need it without getting bot-
tlenecked on a single proprietary resource.
When you combine this list of benefits, you
save money over proprietary and legacy
systems. In addition, your organization can
ensure an orderly migration to standard APIs
that are adopted by the industry at large.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32
Nexenta storage software provides SDS that’s
serving a wide variety of workloads and busi-
ness critical applications, working continu-
ously to better integrate the Nexenta products
into customer environments. Collaborative
R&D with technology partners as well as lead-
ing applications and integration-focused part-
ners for specific markets allow Nexenta to
offer solutions for the key workloads running
data centers. Check out Figure 4-1 for a look at
Nexenta’s software stack.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5
Getting the Right Software
In This Chapter
▶ Understanding the interfaces that need support
▶ Making sure all necessary protocols are covered
▶ Supporting all the hardware
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
35
✓ Simple Networking Management Protocol
(SNMP): SNMP has been adopted for computer
systems as well. When a computer system reaches
a critical threshold such as CPU temperature, an
SNMP alert can be sent that allows an SNMP man-
ager to pop up a notification on the management
single pane of glass.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
36
through a migration of 10GB to 20GB to 40GB, but
it too is quickly being supplanted by TCP/IP.
InfiniBand provides a network protocol that imple-
ments a subset of TCP/IP, but it never fully imple-
mented all the TCP/IP capabilities.
✓ ATA over Ethernet (AOE): A method of virtualiza-
tion that allows applications written for Advanced
Technology Attachment (ATA) devices to function
over the Ethernet as if the devices were locally
attached to the computer.
✓ iSCSI: A protocol that allows an application to
treat a SCSI disk drive with block mode operations
to run successfully over the Ethernet.
These protocols are supported by excellent Software
Defined Storage (SDS) systems. In a true SDS environ-
ment, your applications that use such APIs can simply
plug in and take advantage of the underlying devices
without being aware that the world has changed
beneath their interfaces.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
37
These steps don’t have to be accomplished in one fell
swoop. You can migrate your existing data center into
an SDDC by gradually changing over and adding in one
subsystem at a time. Take a look at the types of hard-
ware you’ll likely to need to support your SDDC:
✓ X86 architectures: This architecture is a type of
processor that dates back to the Intel 8086 CPU,
but it’s more than defining the instructions that
execute on the CPU. This architecture also defines
the busses that are used to access other CPUs and
Memory (QPI), as well as the architecture of the
busses to access peripheral controllers (PCIe) and
low-level devices like heat sensors and fan speed
(I2C). The x86 architecture is strong and promises
to be around for some time to come.
✓ ARM architectures: Devices built around this
architecture (another type of CPU) initially were
implemented for embedded controllers to be used
within devices. However, the increasing speed and
performance of the ARM devices have made them
suitable for a variety of tasks that compete at the
low end of the x86 performance range. In some
cases the ARM processors have emerged for entry
level storage capabilities, recognizing that they
don’t have the performance necessary for mid-
range and high-end storage.
✓ Graphical processing units (GPUs): GPUs were
originally designed to accelerate the processing
required to update display information. Due to the
nature of the display, this acceleration involved
performing many computations in parallel. For
storage servers, it isn’t intuitively obvious why
GPUs would be necessary, but due to the parallel
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
38
nature of the many processors found in a GPU,
they’re excellent at performing three major com-
putational tasks that are used in storage:
• Compression of data (to reduce the size of data
on disk)
• Encryption (to protect data from unauthorized
access)
• Deduplication (to reuse data already found in
the storage system)
Tablets and smartphones have driven the
creation of ARM processors with companion
GPUs. These system on a chip (SOC) implemen-
tations are relatively inexpensive because
they’re manufactured by the millions for tablets
and smartphones. As a result, an ARM processor
with a companion GPU is very low cost and
can be adapted to use as low-power storage
p rocessor components.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 6
Ten Questions to Answer
about Your Data Center
In This Chapter
▶ Considering questions about your environment
▶ Helping your transition from legacy environments
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
40
Make sure opportunities exist for your busi-
ness to put a new project into a pilot SDDC
that incorporates elements of Software Defined
Networking (SDN) and Software Defined
Storage (SDS). You can start by migrating a
portion of the user data for a research project
from the proprietary platform to your new SDS
platform.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
41
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42
These devices have very different characteristics for
accessing corporate data than traditional computers,
and they want to have that data available any time, any
place. Although this availability is desirable, the corpo-
ration must ensure that the data (especially in transit)
is protected.
Many of your traditional applications that were devel-
oped for traditional client/server environments, such
as a PC and a mainframe or webserver, have to be
rethought in terms of the object (Put, Get, DEL) model
required for object access.
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
44
✓ Manageability: Is your SDDC simple and easy to
manage?
✓ Availability: Will your SDDC maintain five nines of
availability?
✓ Reliability: Will your SDDC maintain data integrity
to achieve five nines of loss-less data?
✓ Total Cost of Ownership: Has your SDDC lowered
your total cost of ownership (TCO)?
✓ Scalability: Can your SDDC scale to support all
the data, compute, and networking needs of your
end-users?
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Nexenta is the global leader in Software Defined Storage (SDS).
Nexenta delivers secure, easily-managed, highly-available,
reliable, and scalable storage software solutions via ultra-low
TCO. Nexenta solutions are hardware-, protocol-, workload-, and
app-agnostic, providing innovation freedom for organizations
to realize true benefits of cloud computing via virtualization-
enabled Software Defined Data Centers (SDDC). Nexenta
enables workloads from rich media-driven social media to
mobility; from Internet of Things to Big Data. Built on an
open source platform, Nexenta delivers software-only unified
storage management solutions with a global channel
partner network.
Security
Manageability
Availability
Reliability
Lower TCO
Scalability
These materials are © 2014 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Compliments of
ition
Nexenta Special Ed
Find the advantages
to using SDDC
Open the book
and find:
So f t wa r e D e f i n e d
Integrate off-the-shelf
technologies and virtualization
• What you need to
know about Software
Defined Data Centers Data(SCDDeCn ters
to deliver unified storage, • If Software Defined
)
networking, and data center Storage is right for you
capabilities without locking
• How an SDDC lowers
in to proprietary hardware. TCO and improves
• Discover SDDC — what it is and scalability
what it does • Why atomic storage
witch to Software Defined
• S is important
Storage — lower TCO and
improve scalability and
performance
• Understand storage — optimize
the right underlying hardware Learn:
• What an SDDC is and what
• Get the right storage support —
it can do for you
see the solutions that support
your business requirements • How to move to Software Defined
Storage and software defined
networking