The Holy Grail of Network Storage Management
| CHAPTER TWO FIGURE 2-1 SAN versus SAS Topologies FIGURE 2-2 Inductive versus Deductive Reasoning FIGURE 2-3 Disk Capacity Improvement and Cost-Per-Megabyte Decline FIGURE 2-4 Data Densities and the Superparamagnetic Effect CHAPTER THREE FIGURE 3-1 The Holy Grail SAN: Heterogeneous Storage and Server Equipment with Any-to-Any Network-Based Connectivity FIGURE 3-2 The Holy Grail SAN: A Virtual Storage Resource Pool FIGURE 3-3 Capacity Allocation Inefficiency in Server Attached Storage FIGURE 3-4 Capacity Allocation Efficiency with Virtual SAN-Based Volumes FIGURE 3-5 Downtime Costs as a Function of Idle Labor FIGURE 3-6 Fibre Channel Protocol versus the ISO Open Storage Interconnect Network Model FIGURE 3-7 The FC SAN Topology ”A "Kludge" CHAPTER FOUR FIGURE 4-1 Metcalfe's Law FIGURE 4-2 SCSI Encaptulation in ISCSI FIGURE 4-3 FCIP and iFCP Architectures CHAPTER FIVE FIGURE 5-1 Zen Riddle: All Storage is Networked Across an IP Network FIGURE 5-2 Network-Attached Storage Operating System Components FIGURE 5-3 Zen Riddle: No Storage is Networked FIGURE 5-4 A Contemporary Storage Taxonomy FIGURE 5-5 Before the Implementation of a StorageX Global Namespace FIGURE 5-6 After Implementation of a StorageX Global Namespace FIGURE 5-7 An Inclusive and Non-Disruptive Approach FIGURE 5-8 Traditional NAS Design FIGURE 5-9 Vertical Scaling in NAS Facilitated through FC Switching FIGURE 5-10 NAS/SAN Hybrids with Network File System and Network Block Protocol Accessibility CHAPTER SIX FIGURE 6-1 Areal Density: Tracks per Inch (TPI) X Bits per Inch (BPI) FIGURE 6-2 An Exploded View of a Contemporary Disk Drive FIGURE 6-3 SAS Topology with Expanders FIGURE 6-4 SAS Maximum Expander Device Topology FIGURE 6-5 TCP Offload Engines Lessen Server CPU Load FIGURE 6-6 Parallel and Serial ATA FIGURE 6-7 Building a Fault Tolerant RAID Array with SATA and SAS FIGURE 6-8 SATA, SAS and Fibre Channel: One View of the Future Enterprise Storage Landscape FIGURE 6-9 Dual Ported Drives for High Availability FIGURE 6-10 Single Ported Drives in High Availability Array Configuration using Routing/Switching/Multiplexing (RSM) Technology FIGURE 6-11 Long Blocks for Data Integrity FIGURE 6-12 Industry Matrix Model of Disk/Interface Solutions CHAPTER SEVEN FIGURE 7-1 Channel/Device Emulation in a Wide Area Channel Extension Configuration FIGURE 7-2 Options for Locating Virtualization Intelligence in a SAN FIGURE 7-3 Host-Based Virtualization FIGURE 7-4 Tape Restore Issues and Virtualization FIGURE 7-5 All Virtualization Is In-Band FIGURE 7-6 Storage is Allocated Inefficiently, But Virtualization (LUN Aggregation) Can't Resolve the Problem FIGURE 7-7 Dante Was A Storage Manager CHAPTER EIGHT FIGURE 8-1 Storage Allocation to a Database FIGURE 8-2 Storage Management Approaches by Granularity FIGURE 8-3 Product-Centric Management FIGURE 8-4 Infrastructure-Centric Management FIGURE 8-5 Application-Centric Storage Management FIGURE 8-6 Hierarchy of Functionality in Application-Centric Storage Management FIGURE 8-7 High Level Architecture of an ACSM-Based Storage Management Server FIGURE 8-8 A Simplified Data Naming Scheme FIGURE 8-9 Data Naming Header Attachment Process FIGURE 8-10 An Access Frequency-Based Data Migration Approach CHAPTER NINE FIGURE 9-1 Multitiered Storage Architecture FIGURE 9-2 A Data Management System featuring Access Frequency-Based Data Migration FIGURE 9-3 Disk and Tape Pricing Guidelines FIGURE 9-4 Multi-Hop Mirroring with Identical Arrays FIGURE 9-5 Tape Enables Cross-Platform Data Restore FIGURE 9-6 Combined Roadmaps of Leading Tape Products FIGURE 9-7 A traditional Tape-Based Data Protection Strategy Adds Substantial Time-to-Data FIGURE 9-8 Tape-Based Restore is a Function of Media Transfer Rates Plus Handling and Transportation Times FIGURE 9-9 Electronic Vaulting Technology Augments Traditional Tape to Reduce Time-to-Data FIGURE 9-10 Mirror-Splits and Replication FIGURE 9-11 The Ever-Widening Spectrum of Data Protection Solutions FIGURE 9-12 Disk-to-Disk-to-Tape FIGURE 9-13 Possible Uses for Second Disk Tier in DDT FIGURE 9-14 Avamar Technologies' Axion Solution in a Rack-Mount RAIN Configuration FIGURE 9-15 DDT in a Box FIGURE 9-16 Virtualization-Based Data Replication in a Fibre Channel Fabric using DataCore Software SANSymphony FIGURE 9-17 Tacit Networks Network-Based File Caching Architecture FIGURE 9-18 Revivio Technology as Write-Only Mirror During Normal Operation FIGURE 9-19 Presentation of TimeImage Prior to Corruption Event FIGURE 9-20 Rapid Recovery with Revivio CHAPTER TEN FIGURE 10-1 Security Administration is a 24/7 Job FIGURE 10-2 Internet Engineering Task Force IP Security (IPSEC) Standard FIGURE 10-3 Typical Security Provisioning in a LAN FIGURE 10-4 One Deployment Plan for NeoScale Storage Security Appliances FIGURE 10-5 Security Targets in Storage |