Flylib.com
IP Storage Networking: Straight to the Core
IP Storage Networking: Straight to the Core
ISBN: 0321159608
EAN: 2147483647
Year: 2003
Pages: 108
Authors:
Gary Orenstein
BUY ON AMAZON
Main Page
Table of content
Copyright
Praise for IP Storage Networking: Straight to the Core
Foreword
Preface
Acknowledgments
Chapter 1. Storage in a Wired World
1.1 Storage Takes Center Stage
1.2 The Need for Business Continuance
1.3 Driving Towards Operational Agility
1.4 Charting a Storage Networking Roadmap
1.5 Audience and Text Overview
1.6 Chapter Summary
Chapter 2. The Storage Architectural Landscape
2.1 Storage Building Blocks
2.2 Internal StorageServer-based storage
2.3 External Storage (JBOD, RAID, Tape, Optical, Other)
2.4 Direct-Attached Storage
2.5 Network-Attached Storage
2.6 Storage Area Networks
2.7 IP SAN Protocols
2.8 Chapter Summary
Chapter 3. The Software Spectrum
3.1 Framework for Storage Management Software
3.2 Storage Network Management
3.3 Storage Resource Management
3.4 Data Coordination
3.5 Storage Policy Management
3.6 Data Protection
3.7 High Availability
3.8 Virtualization
3.9 Chapter Summary
Chapter 4. Storage System Control Points
4.1 Storage Service Deliverables
4.2 Brief History and Evolution of Storage
4.3 Placing Storage Intelligence
4.4 Building Blocks of Distributed Systems
4.5 Network Control Points
4.6 Balancing Multivendor Configurations
4.7 Chapter Summary
Chapter 5. Reaping Value from Storage Networks
5.1 Balancing Offensive and Defensive Strategies
5.2 Primary Defensive Strategies
5.3 Primary Offensive Strategies
5.4 Measuring Returns
5.5 Chapter Summary
Chapter 6. Business Continuity for Mission-Critical Applications
6.1 Assessing Business Continuity Objectives
6.2 Availability within the Data Center
6.3 Availability Across Geographies: Disaster Tolerance and Recovery
6.4 Corporate Systems
6.5 Chapter Summary
Chapter 7. Options for Operational Agility
7.1 Outsourced Storage
7.2 Integrated Network Services
7.3 Managing Service Level Agreements
7.4 Application Deployment
7.5 Corporate Asset Management
7.6 Chapter Summary
Chapter 8. Initiating Deployment
8.1 Infrastructure Design Shifts
8.2 Qualifying and Quantifying IT Deployment
8.3 IP Storage Network Scenarios
8.4 Maximizing Operational Efficiency
8.5 Chapter Summary
Chapter 9. Assessing Network Connectivity
9.1 Modern Networks Use Layered Protocols
9.2 Options for Metropolitan-and Wide-Area Storage Networking
9.3 Metropolitan- and Wide-Area Storage Network Products
9.4 MAN and WAN Services
9.5 Security for Storage Networking
9.6 Chapter Summary
Chapter 10. Long-Distance Storage Networking Applications
10.1 IP Storage Networking Expands Remote Data Replication
10.2 The Technology Behind IP Storage Data Replication
10.3 Sizing the Link Bandwidth for Long-Distance Storage Networking Applications
10.4 Estimating the Effects of Network Latency on Applications Performance
10.5 The Effects of TCP on Application Performance
10.6 Chapter Summary
Chapter 11. Managing the Storage Domain
11.1 Incrementing to Simplicity
11.2 Clearing the Decks: Core Versus Context
11.3 Defining Simplicity
11.4 Managing Storage: A Plan of Attack
11.5 Creating Effective Policy Systems
11.6 Outsourcing for Management Simplicity
11.7 Chapter Summary
Chapter 12. Perfecting the Storage Engine
12.1 Strategic Objectives
12.2 Tactical Goals
12.3 Storage Advances to Watch
12.4 Chapter Summary
Appendix A. IT Service Recovery Strategy: Best Opportunity for Success
Executive Overview
Evolution to a SAN Environment
Strategic Decisions
Distributed Systems Strategy
Backup Strategy
Recovery Facility Strategy
IT Service Recovery Documentation
Roadblocks to Quality IT Service Recovery Documentation
IT Service Recovery Risk Assessment
Identifying Assets
Identify Risks
The Need for Speed
Appendix B. The Broadview Storage Perspective
IP Storage Networking: Straight to the Core
ISBN: 0321159608
EAN: 2147483647
Year: 2003
Pages: 108
Authors:
Gary Orenstein
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Basic Security Principles
Choosing the Best Risk-Assessment Approach
Common Risk-Assessment Methodologies and Templates
How to Respond to an Attack
Level I Assessments
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Schedule Risk
Managing Project Constraints and Documenting Risks
Quantifying and Analyzing Activity Risks
Monitoring and Controlling Risky Projects
SQL Tips & Techniques (Miscellaneous)
Using SQL Data Definition Language (DDL) to Create Data Tables and Other Database Objects
Understanding SQL Transactions and Transaction Logs
Working with SQL JOIN Statements and Other Multiple-table Queries
Writing External Applications to Query and Manipulate Database Data
Monitoring and Enhancing MS-SQL Server Performance
Building Web Applications with UML (2nd Edition)
Summary
Architecture Activities
Activities
Activities
User Experience Model
Systematic Software Testing (Artech House Computer Library)
Analysis and Design
The Test Manager
Appendix A Glossary of Terms
Appendix E Simplified Unit Test Plan
Appendix F Process Diagrams
Visual C# 2005 How to Program (2nd Edition)
Microsofts .NET
Constructors in Derived Classes
Wrap-Up
Establishing a Simple TCP Server (Using Stream Sockets)
Terminology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies