List of Illustrations


CHAPTER TWO

FIGURE 2-1 SAN versus SAS Topologies

FIGURE 2-2 Inductive versus Deductive Reasoning

FIGURE 2-3 Disk Capacity Improvement and Cost-Per-Megabyte Decline

FIGURE 2-4 Data Densities and the Superparamagnetic Effect

CHAPTER THREE

FIGURE 3-1 The Holy Grail SAN: Heterogeneous Storage and Server Equipment with Any-to-Any Network-Based Connectivity

FIGURE 3-2 The Holy Grail SAN: A Virtual Storage Resource Pool

FIGURE 3-3 Capacity Allocation Inefficiency in Server Attached Storage

FIGURE 3-4 Capacity Allocation Efficiency with Virtual SAN-Based Volumes

FIGURE 3-5 Downtime Costs as a Function of Idle Labor

FIGURE 3-6 Fibre Channel Protocol versus the ISO Open Storage Interconnect Network Model

FIGURE 3-7 The FC SAN Topology ”A "Kludge"

CHAPTER FOUR

FIGURE 4-1 Metcalfe's Law

FIGURE 4-2 SCSI Encaptulation in ISCSI

FIGURE 4-3 FCIP and iFCP Architectures

CHAPTER FIVE

FIGURE 5-1 Zen Riddle: All Storage is Networked Across an IP Network

FIGURE 5-2 Network-Attached Storage Operating System Components

FIGURE 5-3 Zen Riddle: No Storage is Networked

FIGURE 5-4 A Contemporary Storage Taxonomy

FIGURE 5-5 Before the Implementation of a StorageX Global Namespace

FIGURE 5-6 After Implementation of a StorageX Global Namespace

FIGURE 5-7 An Inclusive and Non-Disruptive Approach

FIGURE 5-8 Traditional NAS Design

FIGURE 5-9 Vertical Scaling in NAS Facilitated through FC Switching

FIGURE 5-10 NAS/SAN Hybrids with Network File System and Network Block Protocol Accessibility

CHAPTER SIX

FIGURE 6-1 Areal Density: Tracks per Inch (TPI) X Bits per Inch (BPI)

FIGURE 6-2 An Exploded View of a Contemporary Disk Drive

FIGURE 6-3 SAS Topology with Expanders

FIGURE 6-4 SAS Maximum Expander Device Topology

FIGURE 6-5 TCP Offload Engines Lessen Server CPU Load

FIGURE 6-6 Parallel and Serial ATA

FIGURE 6-7 Building a Fault Tolerant RAID Array with SATA and SAS

FIGURE 6-8 SATA, SAS and Fibre Channel: One View of the Future Enterprise Storage Landscape

FIGURE 6-9 Dual Ported Drives for High Availability

FIGURE 6-10 Single Ported Drives in High Availability Array Configuration using Routing/Switching/Multiplexing (RSM) Technology

FIGURE 6-11 Long Blocks for Data Integrity

FIGURE 6-12 Industry Matrix Model of Disk/Interface Solutions

CHAPTER SEVEN

FIGURE 7-1 Channel/Device Emulation in a Wide Area Channel Extension Configuration

FIGURE 7-2 Options for Locating Virtualization Intelligence in a SAN

FIGURE 7-3 Host-Based Virtualization

FIGURE 7-4 Tape Restore Issues and Virtualization

FIGURE 7-5 All Virtualization Is In-Band

FIGURE 7-6 Storage is Allocated Inefficiently, But Virtualization (LUN Aggregation) Can't Resolve the Problem

FIGURE 7-7 Dante Was A Storage Manager

CHAPTER EIGHT

FIGURE 8-1 Storage Allocation to a Database

FIGURE 8-2 Storage Management Approaches by Granularity

FIGURE 8-3 Product-Centric Management

FIGURE 8-4 Infrastructure-Centric Management

FIGURE 8-5 Application-Centric Storage Management

FIGURE 8-6 Hierarchy of Functionality in Application-Centric Storage Management

FIGURE 8-7 High Level Architecture of an ACSM-Based Storage Management Server

FIGURE 8-8 A Simplified Data Naming Scheme

FIGURE 8-9 Data Naming Header Attachment Process

FIGURE 8-10 An Access Frequency-Based Data Migration Approach

CHAPTER NINE

FIGURE 9-1 Multitiered Storage Architecture

FIGURE 9-2 A Data Management System featuring Access Frequency-Based Data Migration

FIGURE 9-3 Disk and Tape Pricing Guidelines

FIGURE 9-4 Multi-Hop Mirroring with Identical Arrays

FIGURE 9-5 Tape Enables Cross-Platform Data Restore

FIGURE 9-6 Combined Roadmaps of Leading Tape Products

FIGURE 9-7 A traditional Tape-Based Data Protection Strategy Adds Substantial Time-to-Data

FIGURE 9-8 Tape-Based Restore is a Function of Media Transfer Rates Plus Handling and Transportation Times

FIGURE 9-9 Electronic Vaulting Technology Augments Traditional Tape to Reduce Time-to-Data

FIGURE 9-10 Mirror-Splits and Replication

FIGURE 9-11 The Ever-Widening Spectrum of Data Protection Solutions

FIGURE 9-12 Disk-to-Disk-to-Tape

FIGURE 9-13 Possible Uses for Second Disk Tier in DDT

FIGURE 9-14 Avamar Technologies' Axion Solution in a Rack-Mount RAIN Configuration

FIGURE 9-15 DDT in a Box

FIGURE 9-16 Virtualization-Based Data Replication in a Fibre Channel Fabric using DataCore Software SANSymphony

FIGURE 9-17 Tacit Networks Network-Based File Caching Architecture

FIGURE 9-18 Revivio Technology as Write-Only Mirror During Normal Operation

FIGURE 9-19 Presentation of TimeImage Prior to Corruption Event

FIGURE 9-20 Rapid Recovery with Revivio

CHAPTER TEN

FIGURE 10-1 Security Administration is a 24/7 Job

FIGURE 10-2 Internet Engineering Task Force IP Security (IPSEC) Standard

FIGURE 10-3 Typical Security Provisioning in a LAN

FIGURE 10-4 One Deployment Plan for NeoScale Storage Security Appliances

FIGURE 10-5 Security Targets in Storage



The Holy Grail of Network Storage Management
The Holy Grail of Network Storage Management
ISBN: 0130284165
EAN: 2147483647
Year: 2003
Pages: 96

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net