Sie sind auf Seite 1von 26

Storage Foundation I- Part 1

All rights reserved. The information contained herein is subject to change without notice.

2010, Cognizant Technology Solutions

Course Sections:
This course contains the following sections:
1. Introduction to Storage Technology

2. Storage Systems Architecture


3. Networked Storage

4. Storage Systems
5. Business Continuity

1 | 2010, Cognizant Technology Solutions

Confidential

Objectives:
Upon completion of this course, you will be able to: Describe storage concepts and architecture.
Describe the evolution of storage and storage environments. Describe logical and physical components of storage systems. Describe storage technologies and solutions. Describe how storage systems are structured Describe options for Business Continuity.

2 | 2010, Cognizant Technology Solutions

Confidential

Introduction to Storage Technology

3 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

Data Creation
Data is being created at an ever increasing rate Data creation/generation is growing at a rate in excess of 50% year over-year The need to store the data over longer periods of time with improved accessibility is also growing Information Technology (IT) budgets are responding IT budgets typically have to account for expenditure on Servers, Networks, Storage, Personnel, etc. To keep up with data storage needs, IT expenditure on Storage has increased proportionally It is estimated that about 40% of the IT expenditure is Data Storage related

4 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

What data is created by Individuals?

Examples include: Photos Documents Spreadsheets Video Storage can be in: Cameras MP3 players Laptop hard drives CDROM/DVDs USB drives

5 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

What data is created by a business?


Examples of data created by a business include: Product data: inventory, description, pricing, availability, sales numbers and projections. Customer data: orders, shipping details. Account data: banking, financial services industry. Medical data: health care providers, insurance industry, hospitals. Business data can be stored on: Employee workstations Servers Disk arrays Tapes CDROM/DVDs Off-site libraries

6 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology
Value of Information to a Business Identify new business opportunities. For example: Buying/spending patterns: Internet stores, retail stores, supermarkets. Customer satisfaction/service: tracking shipments & deliveries. Identifying patterns that lead to changes in existing business. For example: Reduced cost: delivery service optimizing utilization of vehicles. New products: MP3 player speaker systems. New services: security alerts for stolen credit card purchases. Targeted marketing campaigns: communicate to bank customers with high checking account balances about a special savings plan. Creating a competitive advantage!

7 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

Common Data Storage Media Tape Library: A collection of tape drives and tapes Jukeboxes: A collection of optical disks and drives Disk Arrays: A collection hard disks Each solution addresses specific needs for data storage and management. Tape Library: Backup/Restore; Archival of data Jukeboxes: Typically to store non-changing content over long periods of time. Disk Arrays:To store data that has to be immediately accessible and on-line Tape Storage Systems : Tape based storage is relatively inexpensive compared to disk arrays. They served as primary storage solutions in the early days. Tape drives use Read/Write heads to record bits of data onto magnetic material on the tape surface. This technology continues to evolve, providing higher storage capacity, greater reliability, and improved performance.

8 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology
Storing Data on Tape : Data is recorded sequentially from the beginning to end, one byte after another. Because data is stored linearly along the length of the tape, random access to specific bits of data is slow and time consuming. This severely limits tape as a medium for real-time, rapid access to data. Tapes cannot be shared among multiple users or applications. Optical Data Storage :

Popular in small, single-user computing environments. Frequently used by individuals to store & share data, as backup solution. Also used as distribution medium for applications, or as a means of transferring small amounts of data from one self-contained system to another.
Disk Based Storage : From a historical perspective, we will explore the following disk based storage solutions: DASD: Direct Access Storage Device JBOD: Just a Bunch Of Disks Disk Arrays Intelligent Disk Arrays
9 | 2010, Cognizant Technology Solutions
Confidential

Storage Technology

Storage Environment
Upon completion of this, you will be able to: Describe Direct Attached Storage (DAS) features. Describe Storage Area Network (SAN) features. Describe Network Attached Storage (NAS) features.

10 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

DAS :Direct Attached Storage


DAS is a type of storage that is connected directly to the server which enables quick access to the data.
DAS is a basic level of storage in which the host server holds the storage device or there can be connected to one server one at a time. There may be more than one server but storage for each server is managed separately and can not be shared. DAS configuration can be achieved in two ways, Disk is integral to the server. Disk is installed in a separate enclosure (RAID, JBOD) but attached to the server.

11 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

Performance:
In DAS performance can be impacted by : Hard disk performance Virtual memory Cache on storage controller RAID Level Bus type

Advantages:
Minimal cost solution. Quick deployment in small environments. Guaranteed bandwidth between host and storage.

Disadvantages:
Storage resources cannot be easily shared or moved to other servers. Low availability

12 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

NAS (Network Attached Storage)

NAS is a concept of shared storage on a network. NAS provides the capacity to handle huge data storage and to share data. NAS server also called appliance or filer a storage device that consists of a high performance file server that is attached to LAN.

NAS communicates using NFS on UNIX environments, CIFS for Microsoft windows environment, FTP, http, and other networking protocols.

13 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

NAS topology

14 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

NAS Implementations:
Integrated NAS Gateway NAS

15 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology
Integrated NAS: Combines storage with other physical elements. The storage devices are dedicated for use by NAS head. Gateway NAS : The storage devices are separated from NAS head. The NAS head is connected to SAN storage environment through FC switch. The NAS head serves as gateway to SAN environment, hence the name gateway NAS. Benefits of NAS storage solutions: Global information access Efficiency Centralized storage Simplified management Scalability High availability

16 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

SAN (Storage Area Network)


SAN is a dedicated network connecting servers and storage devices.
Servers and storages are the nodes of SAN which allows any-to-any connection. Connects multiple servers to a pool of storage over a private network. Interface used is fibre channel. Distance up to 10km between devices. Data transfer rate is up to 8Gbps. Highly reliable.

17 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology

SAN Layout :

18 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology
Protocols used: Fibre Channel Protocol SCSI protocol Internet SCSI (iSCSI) protocol
FC Topologies: Point-to-point Arbitrated Loop Switched Fabric Advantages of SAN:

Flexibility- Storage can be easily allocated between multiple servers. Improved storage utilization - Unallocated resources can be made available to other resources Economics of scale - Storage may be purchased and managed in large increments. High availability Extensive storage options - Wide variety of storage capacities and performance options.
Limitations of SAN: High cost Difficult to manage Scalability is concern in complex deployments
19 | 2010, Cognizant Technology Solutions
Confidential

Storage Technology SAN


Uses block level I/O protocols File system managed by NAS head unit

NAS
NAS I/O operations uses file level I/O protocols. File system managed by servers

Data communication between server and storage takes place in blocks of data using the scsi protocols. SAN plays a strong role in consolidating storage.

Data communication between server and clients takes place in files of data using the IP protocols. NAS is traditionally used for server consolidation

SAN uses FC, SCSI and iSCSI protocols


Backups and mirrors require a block by block copy operation. SAN servers uses normal WIN/UNIX/LINUX OS

NAS uses NFS and CIFS, TCP/IP protocols


Backups and mirrors are generated on files NAS server (filers) uses optimized OS

20 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology
The Core Elements : Applications - Specialized and dedicated software to manipulate data typically stored in Databases. Databases - more commonly, Database Management Systems (DBMS), provide a structured way of storing data in logically organized tables with an interrelation between them. They optimize the storage and retrieval of data.

Servers/Operating Systems - provide the computing platform required to run the applications and databases.
Networks - provide the data communication paths between clients and servers or between servers and storage.

Storage Arrays - this is where data and information lives

21 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology
Key Requirements of Storage Systems Availability ensure that data is accessible at all times when needed. As seen earlier, loss of access to data can have significant financial impact on businesses.
Security prevent unauthorized access to data. Mechanisms to allow servers to access only their allocated resources on Storage Arrays.

Capacity ability to add storage capacity on-demand, without interruption to the business. If a Database runs out of space on physical storage, it comes to a halt, thus impacting the business. Scalability The Storage solution should be able to grow with the business. As the business grows, more Servers will be deployed, new applications/databases will be developed.
Performance Service all the I/O requests at high speed. With the Centralized model, several Servers connect to one Storage Array. The intelligence of the Array, the Processors and architecture should enable optimal performance. Data Integrity throughout the I/O chain checks have to be in place to ensure that data is not corrupted along the way. The Storage system has to guarantee that the data that was sent to it was indeed the data that was written to disk and is available for retrieval when requested. Manageability the operations and activities required to meet all of these requirements should be performed seamlessly and or with minimal disruption to business activity.

22 | 2010, Cognizant Technology Solutions

Confidential

Storage Technology
Some Constraints to Meeting the Requirements Cost Businesses are constrained by budgets and the ability to spend to solve problems. They must prioritize expenditures to obtain the best return. One of the key measurements in the technology space is the Total Cost of Ownership or TCO. This value tries to capture all of the costs for a specific solution such as the installation, maintenance, personnel resources, etc. needed for any piece of equipment. Physical Environment The site infrastructure may limit the number and location of systems needed to address the constraints.
Maintenance and Support Systems need humans for maintenance and support. Adding resources may not be practical or possible.

Compliance / regulatory and legal businesses need to address many laws and administrative regulations.This impacts the available resources and helps define the amount of resources and equipment capable of being applied to the requirements.
Hardware and software infrastructure - The limitations of the hardware or software may inhibit totally achieving the requirements. Interoperability and compatibility equipment interoperability may prevent efficient use of different solutions. Systems that dont talk to each other may required duplication and interfere with availability or performance.
23 | 2010, Cognizant Technology Solutions
Confidential

Storage Technology
Management Activities :
Data Center management activities include: Provisioning/Capacity/Resource Planning Monitoring Reporting Monitoring : Performance Security Data Protection Utilization Reporting: Utilization Performance Internal Chargeback system for cost recovery Provisioning ; Capacity Security Performance

24 | 2010, Cognizant Technology Solutions

Confidential

Thank you

All rights reserved. The information contained herein is subject to change without notice.

2010, Cognizant Technology Solutions

Das könnte Ihnen auch gefallen