Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments
Lýsing:
The book will follow the Storage Technologist EMC course path covering Information Availability Design and Management, planning, implementation, and deployment and will cover components of a storage system and different storage system models--ranging from basic storage models such as Direct Attached Storage (DAS) to networked storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), and Content Addressed Storage (CAS).
New content will cover advances in existing technologies and the emergence of Cloud which has changed the way computing has been done. Storage consolidation and convergence of networking protocols has given a unified approach to data center infrastructure. This edition includes all the updates and information on the new technologies. New content includes: Separate section on emerging area of virtualization and cloud computing New chapter on Cloud Computing Inclusion of new technologies: Data de-duplication, Unified storage, Continuous Data Protection Technology, Virtual Provisioning, FCoE, Flash drives, Storage Tiering, Server Configuration Backup etc.
Annað
- Höfundur: EMC Education Services
- Útgáfa:2
- Útgáfudagur: 5/7/12
- Engar takmarkanir á útprentun
- Engar takmarkanir afritun
- Format:ePub
- ISBN 13: 9781118488799
- Print ISBN: 9781118094839
- ISBN 10: 1118488792
Efnisyfirlit
- Front Matter
- About the Editors
- Credits
- Acknowledgments
- Icons Used In This Book
- Foreword
- Introduction
- EMC Academic Alliance
- EMC Proven Professional Certification
- Chapter 1 Introduction to Information Storage
- Key Concepts
- 1.1 Information Storage
- 1.1.1 Data
- Figure 1-1: Digital data
- Examples of Research and Business Data
- 1.1.2 Types of Data
- Figure 1-2: Types of data
- 1.1.3 Big Data
- Figure 1-3: Big data ecosystem
- 1.1.4 Information
- 1.1.5 Storage
- 1.1.1 Data
- 1.2 Evolution of Storage Architecture
- Figure 1-4: Evolution of storage architecture
- 1.3 Data Center Infrastructure
- 1.3.1 Core Elements of a Data Center
- Figure 1-5: Example of an online order transaction system
- 1.3.2 Key Characteristics of a Data Center
- Figure 1-6: Key characteristics of a data center
- 1.3.3 Managing a Data Center
- 1.3.1 Core Elements of a Data Center
- 1.4 Virtualization and Cloud Computing
- Summary
- Exercises
- Key Concepts
- 2.1 Application
- Application Virtualization
- 2.2 Database Management System (DBMS)
- 2.3 Host (Compute)
- 2.3.1 Operating System
- Memory Virtualization
- 2.3.2 Device Driver
- 2.3.3 Volume Manager
- Figure 2-1: Disk partitioning and concatenation
- 2.3.4 File System
- Figure 2-2: Process of mapping user files to disk storage
- 2.3.5 Compute Virtualization
- Figure 2-3: Server virtualization
- Desktop Virtualization
- 2.3.1 Operating System
- 2.4.1 Physical Components of Connectivity
- Figure 2-4: Physical components of connectivity
- 2.4.2 Interface Protocols
- IDE/ATA and Serial ATA
- SCSI and Serial SCSI
- Fibre Channel
- Internet Protocol (IP)
- Figure 2-5: Disk drive components
- 2.6.1 Platter
- Figure 2-6: Spindle and platter
- 2.6.2 Spindle
- 2.6.3 Read/Write Head
- Figure 2-7: Actuator arm assembly
- 2.6.4 Actuator Arm Assembly
- 2.6.5 Drive Controller Board
- 2.6.6 Physical Disk Structure
- Figure 2-8: Disk structure: sectors, tracks, and cylinders
- Disk Advertised Capacity Versus Available Capacity
- 2.6.7 Zoned Bit Recording
- Figure 2-9: Zoned bit recording
- 2.6.8 Logical Block Addressing
- Figure 2-10: Physical address and logical block address
- 2.7.1 Disk Service Time
- Seek Time
- Rotational Latency
- Data Transfer Rate
- Figure 2-11: Data transfer rate
- Figure 2-12: I/O processing
- Figure 2-13: Utilization versus response time
- Figure 2-14: Host access to storage
- Figure 2-15: Internal and external DAS architecture
- 2.9.1 DAS Benefits and Limitations
- Table 2-1: IOPS Performed by Disk Drive
- Figure 2-16: Disk command queuing
- 2.12.1 Components and Architecture of Flash Drives
- 2.12.2 Features of Enterprise Flash Drives
- Exercises
- Key Concepts
- 3.1 RAID Implementation Methods
- 3.1.1 Software RAID
- 3.1.2 Hardware RAID
- 3.2 RAID Array Components
- Figure 3-1: Components of a RAID array
- 3.3 RAID Techniques
- 3.3.1 Striping
- Figure 3-2: Striped RAID set
- 3.3.2 Mirroring
- Figure 3-3: Mirrored disks in an array
- 3.3.3 Parity
- Figure 3-4: Parity RAID
- XOR Operation
- 3.3.1 Striping
- Table 3-1: Raid Levels
- 3.4.1 RAID 0
- Figure 3-5: RAID 0
- 3.4.2 RAID 1
- Figure 3-6: RAID 1
- 3.4.3 Nested RAID
- Figure 3-7: Nested RAID
- 3.4.4 RAID 3
- Figure 3-8: RAID 3
- 3.4.5 RAID 4
- 3.4.6 RAID 5
- Figure 3-9: RAID 5
- 3.4.7 RAID 6
- Figure 3-10: RAID 6
- Figure 3-11: Write penalty in RAID 5
- 3.5.1 Application IOPS and RAID Configurations
- Table 3-2: Comparison of Common RAID Types
- Exercises
- Key Concepts
- 4.1 Components of an Intelligent Storage System
- Figure 4-1: Components of an intelligent storage system
- 4.1.1 Front End
- 4.1.2 Cache
- Structure of Cache
- Figure 4-2: Structure of cache
- Read Operation with Cache
- Figure 4-3: Read hit and read miss
- Write Operation with Cache
- Cache Implementation
- Cache Management
- Figure 4-4: Types of flushing
- Cache Data Protection
- Server Flash-Caching Technology
- Structure of Cache
- 4.1.3 Back End
- 4.1.4 Physical Disk
- 4.2.1 Traditional Storage Provisioning
- Figure 4-5: RAID set and LUNs
- LUN Expansion: MetaLUN
- Figure 4-6: Concatenated metaLUN
- Figure 4-7: Striped metaLUN
- Comparison between Virtual and Traditional Storage Provisioning
- Figure 4-8: Virtual provisioning
- Figure 4-9: Traditional versus virtual provisioning
- Use Cases for Thin and Traditional LUNs
- 4.3.1 High-End Storage Systems
- Figure 4-10: Active-active configuration
- 4.3.2 Midrange Storage Systems
- Figure 4-11: Active-passive configuration
- 4.4.1 EMC Symmetrix Storage Array
- Figure 4-12: EMC Symmetrix VMAX
- 4.4.2 EMC Symmetrix VMAX Component
- 4.4.3 Symmetrix VMAX Architecture
- Figure 4-13: VMAX architecture
- Exercises
- Chapter 5 Fibre Channel Storage Area Networks
- Key Concepts
- 5.1 Fibre Channel: Overview
- 5.2 The SAN and Its Evolution
- Figure 5-1: FC SAN implementation
- Figure 5-2: FC SAN evolution
- 5.3 Components of FC SAN
- 5.3.1 Node Ports
- Figure 5-3: Nodes, ports, and links
- 5.3.2 Cables and Connectors
- Figure 5-4: Multimode fiber and single-mode fiber
- Figure 5-5: SC, LC, and ST connectors
- 5.3.3 Interconnect Devices
- 5.3.4 SAN Management Software
- FC Switch Versus FC Hub
- 5.3.1 Node Ports
- 5.4 FC Connectivity
- 5.4.1 Point-to-Point
- Figure 5-6: Point-to-point connectivity
- 5.4.2 Fibre Channel Arbitrated Loop
- Figure 5-7: Fibre Channel Arbitrated Loop
- 5.4.3 Fibre Channel Switched Fabric
- Figure 5-8: Fibre Channel switched fabric
- Figure 5-9: Tiered structure of Fibre Channel switched fabric
- FC-SW Transmission
- Figure 5-10: Data transmission in Fibre Channel switched fabric
- 5.4.1 Point-to-Point
- Figure 5-11: Switched fabric ports
- 5.6.1 Fibre Channel Protocol Stack
- Figure 5-12: Fibre Channel protocol stack
- FC-4 Layer
- FC-2 Layer
- FC-1 Layer
- FC-0 Layer
- 5.6.2 Fibre Channel Addressing
- Figure 5-13: 24-bit FC address of N_Port
- N_Port ID Virtualization (NPIV)
- 5.6.3 World Wide Names
- Figure 5-14: World Wide Names
- 5.6.4 FC Frame
- Figure 5-15: FC frame
- 5.6.5 Structure and Organization of FC Data
- 5.6.6 Flow Control
- BB_Credit
- EE_Credit
- 5.6.7 Classes of Service
- Table 5-1: FC Class of Services
- Figure 5-16: Fabric services provided by FC switches
- Figure 5-17: Zoning
- Figure 5-18: Members, zones, and zone sets
- 5.9.1 Types of Zoning
- Figure 5-19: Types of zoning
- Single HBA Zoning
- 5.10.1 Mesh Topology
- A Single-Switch Topology
- Figure 5-20: Partial mesh and full mesh topologies
- 5.10.2 Core-Edge Fabric
- Benefits and Limitations of Core-Edge Fabric
- Figure 5-21: Single-core topology
- Figure 5-22: Dual-core topology
- Figure 5-23: Compound core-edge topology
- Fan-Out and Fan-In
- Benefits and Limitations of Core-Edge Fabric
- 5.11.1 Block-level Storage Virtualization
- Figure 5-24: Block-level storage virtualization
- Figure 5-25: Federation of block storage across data centers
- 5.11.2 Virtual SAN (VSAN)
- 5.12.1 EMC Connectrix
- Figure 5-26: EMC Connectrix
- Connectrix Switches
- Connectrix Directors
- Connectrix Multi-purpose Switches
- Connectrix Management Tools
- 5.12.2 EMC VPLEX
- VPLEX Family of Products
- Exercises
- Key Concepts
- 6.1 iSCSI
- Figure 6-1: iSCSI implementation
- 6.1.1 Components of iSCSI
- 6.1.2 iSCSI Host Connectivity
- 6.1.3 iSCSI Topologies
- Native iSCSI Connectivity
- Figure 6-2: iSCSI Topologies
- Bridged iSCSI Connectivity
- Combining FC and Native iSCSI Connectivity
- Native iSCSI Connectivity
- 6.1.4 iSCSI Protocol Stack
- Figure 6-3: iSCSI protocol stack
- 6.1.5 iSCSI PDU
- Figure 6-4: iSCSI PDU encapsulated in an IP packet
- Figure 6-5: Alignment of iSCSI PDUs with IP packets
- 6.1.6 iSCSI Discovery
- 6.1.7 iSCSI Names
- Figure 6-6: Discovery using iSNS
- Network Address Authority
- 6.1.8 iSCSI Session
- Figure 6-7: iSCSI session
- 6.1.9 iSCSI Command Sequencing
- Figure 6-8: Command and status sequence number
- 6.2.1 FCIP Protocol Stack
- Figure 6-9: FCIP protocol stack
- Figure 6-10: FCIP encapsulation
- 6.2.2 FCIP Topology
- Figure 6-11: FCIP topology
- 6.2.3 FCIP Performance and Security
- 6.3.1 I/O Consolidation Using FCoE
- Figure 6-12: Infrastructure before using FCoE
- Figure 6-13: Infrastructure after using FCoE
- 6.3.2 Components of an FCoE Network
- Converged Network Adapter
- Figure 6-14: Converged Network Adapter
- Cables
- FCoE Switches
- Figure 6-15: FCoE switch generic architecture
- Converged Network Adapter
- Figure 6-16: FCoE frame structure
- FCoE Frame Mapping
- Figure 6-17: FCoE frame mapping
- FCOE ports
- Priority-Based Flow Control (PFC)
- Figure 6-18: Priority-based flow control
- Enhanced Transmission Selection (ETS)
- Congestion Notification (CN)
- Figure 6-19: Congestion Notification
- Data Center Bridging Exchange Protocol (DCBX)
- Exercises
- Key Concepts
- 7.1 General-Purpose Servers versus NAS Devices
- Figure 7-1: General purpose server versus NAS device
- 7.2 Benefits of NAS
- 7.3 File Systems and Network File Sharing
- 7.3.1 Accessing a File System
- 7.3.2 Network File Sharing
- Figure 7-2: UNIX directory structure
- Figure 7-3: Components of NAS
- Figure 7-4: NAS I/O operation
- 7.6.1 Unified NAS
- 7.6.2 Unified NAS Connectivity
- 7.6.3 Gateway NAS
- Figure 7-5: Unified NAS connectivity
- 7.6.4 Gateway NAS Connectivity
- Figure 7-6: Gateway NAS connectivity
- 7.6.5 Scale-Out NAS
- 7.6.6 Scale-Out NAS Connectivity
- Figure 7-7: Scale-out NAS with dual internal and single external networks
- InfiniBand
- 7.7.1 NFS
- pNFS and MPFS
- 7.7.2 CIFS
- Figure 7-8: Causes of latency
- Figure 7-9: File-serving environment before and after file-level virtualization
- 7.10.1 EMC Isilon
- 7.10.2 EMC VNX Gateway
- Exercises
- Key Concepts
- 8.1 Object-Based Storage Devices
- Figure 8-1: Hierarchical file system versus flat address space
- Figure 8-2: Object structure
- 8.1.1 Object-Based Storage Architecture
- Figure 8-3: Block-level access versus object-level access
- 8.1.2 Components of OSD
- Figure 8-4: OSD components
- 8.1.3 Object Storage and Retrieval in OSD
- Figure 8-5: Storing objects on OSD
- Figure 8-6: Object retrieval from an OSD system
- 8.1.4 Benefits of Object-Based Storage
- 8.1.5 Common Use Cases for Object-Based Storage
- REST and SOAP
- 8.3.1 Healthcare Solution: Storing Patient Studies
- Figure 8-7: Storing patient studies on a CAS system
- 8.3.2 Finance Solution: Storing Financial Records
- Figure 8-8: Storing financial records on a CAS system
- 8.4.1 Components of Unified Storage
- Figure 8-9: Unified storage platform
- Data Access from Unified Storage
- 8.5.1 EMC Atmos
- Figure 8-10: EMC Atmos storage system
- 8.5.2 EMC VNX
- Figure 8-11: EMC VNX storage system
- 8.5.3 EMC Centera
- EMC Centera Architecture
- Figure 8-12: Centera architecture
- EMC Centera Architecture
- Exercises
- Chapter 9 Introduction to Business Continuity
- Key Concepts
- 9.1 Information Availability
- 9.1.1 Causes of Information Unavailability
- Figure 9-1: Disruptors of information availability
- 9.1.2 Consequences of Downtime
- 9.1.3 Measuring Information Availability
- Figure 9-2: Information availability metrics
- Table 9-1: Availability Percentage and Allowable Downtime
- 9.1.1 Causes of Information Unavailability
- 9.2 BC Terminology
- Figure 9-3: Strategies to meet RPO and RTO targets
- 9.3 BC Planning Life Cycle
- Figure 9-4: BC planning life cycle
- 9.4 Failure Analysis
- 9.4.1 Single Point of Failure
- Figure 9-5: Single point of failure
- 9.4.2 Resolving Single Points of Failure
- Figure 9-6: Resolving single points of failure
- 9.4.3 Multipathing Software
- 9.4.1 Single Point of Failure
- 9.5 Business Impact Analysis
- 9.6 BC Technology Solutions
- 9.7 Concept in Practice: EMC PowerPath
- 9.7.1 PowerPath Features
- 9.7.2 Dynamic Load Balancing
- Figure 9-7: I/O without PowerPath
- I/O Operation without PowerPath
- I/O Operation with PowerPath
- Figure 9-8: I/O with PowerPath
- 9.7.3 Automatic Path Failover
- Path Failure without PowerPath
- Figure 9-9: Path failure without PowerPath
- Path Failover with PowerPath: Active-Active Array
- Figure 9-10: Path failover with PowerPath for an active-active array
- Path Failover with PowerPath: Active-Passive Array
- Figure 9-11: Path failover with PowerPath for an active-passive array
- Path Failure without PowerPath
- Exercises
- Key Concepts
- 10.1 Backup Purpose
- 10.1.1 Disaster Recovery
- 10.1.2 Operational Recovery
- 10.1.3 Archival
- Backup Window
- Figure 10-1: Backup granularity levels
- Synthetic Full Backup
- Figure 10-2: Restoring from an incremental backup
- Figure 10-3: Restoring a cumulative backup
- Server Configuration Backup
- Figure 10-4: Backup architecture
- Figure 10-5: Backup operation
- Figure 10-6: Restore operation
- Figure 10-7: Direct-attached backup topology
- Figure 10-8: LAN-based backup topology
- Figure 10-9: SAN-based backup topology
- Figure 10-10: Mixed backup topology
- 10.9.1 Server-Based and Serverless Backup
- Figure 10-11: Server-based backup in a NAS environment
- Figure 10-12: Serverless backup in a NAS environment
- 10.9.2 NDMP-Based Backup
- Figure 10-13: NDMP 2-way in a NAS environment
- Figure 10-14: NDMP 3-way in a NAS environment
- 10.10.1 Backup to Tape
- Physical Tape Library
- Figure 10-15: Physical tape library
- Figure 10-16: Multiple streams on tape media
- Limitations of Tape
- Physical Tape Library
- 10.10.2 Backup to Disk
- Figure 10-17: Tape versus disk restore
- 10.10.3 Backup to Virtual Tape
- Virtual Tape Library
- Figure 10-18: Virtual tape library
- Table 10-1: Backup Targets Comparison
- Virtual Tape Library
- 10.11.1 Data Deduplication Methods
- 10.11.2 Data Deduplication Implementation
- Source-Based Data Deduplication
- Figure 10-19: Source-based data deduplication
- Target-Based Data Deduplication
- Figure 10-20: Target-based data deduplication
- Remote Office/Branch Office (ROBO) Backup
- Source-Based Data Deduplication
- Figure 10-21: Traditional VM backup
- Figure 10-22: Image-based backup
- Figure 10-23: Examples of fixed content data
- Figure 10-24: Archiving solution architecture
- 10.14.1 Use Case: E-mail Archiving
- 10.14.2 Use Case: File Archiving
- Archiving Data to Cloud Storage
- 10.15.1 EMC NetWorker
- 10.15.2 EMC Avamar
- 10.15.3 EMC Data Domain
- Exercises
- Key Concepts
- 11.1 Replication Terminology
- Replica versus Backup Copy
- 11.2 Uses of Local Replicas
- 11.3 Replica Consistency
- 11.3.1 Consistency of a Replicated File System
- Figure 11-1: Flushing the file system buffer
- 11.3.2 Consistency of a Replicated Database
- Figure 11-2: Dependent write consistency on sources
- Figure 11-3: Dependent write consistency on replica
- Figure 11-4: Inconsistent database replica
- 11.3.1 Consistency of a Replicated File System
- 11.4.1 Host-Based Local Replication
- LVM-Based Replication
- Advantages of LVM-Based Replication
- Figure 11-5: LVM-based mirroring
- Limitations of LVM-Based Replication
- File System Snapshot
- Figure 11-6: Write to production FS
- Figure 11-7: Storage array-based local replication
- Full-Volume Mirroring
- Figure 11-8: Full-volume mirroring
- Pointer-Based, Full-Volume Replication
- Figure 11-9: Copy on first access (CoFA) — write to source
- Figure 11-10: Copy on first access (CoFA) — read from target
- Figure 11-11: Copy on first access (CoFA) — write to target
- Pointer-Based Virtual Replication
- Figure 11-12: Pointer-based virtual replication — write to source
- Figure 11-13: Pointer-based virtual replication — write to target
- Continuous Data Protection
- CDP Local Replication Operation
- Figure 11-14: Continuous data protection — local replication
- Figure 11-15: Tracking changes
- Table 11-1: Comparison of Local Replication Technologies
- Figure 11-16: Multiple replicas created at different PIT
- 11.9.1 EMC TimeFinder
- TimeFinder/Clone
- TimeFinder/Snap
- 11.9.2 EMC SnapView
- SnapView Snapshot
- SnapView Clone
- 11.9.3 EMC RecoverPoint
- Exercises
- Key Concepts
- 12.1 Modes of Remote Replication
- Figure 12-1: Synchronous replication
- Figure 12-2: Bandwidth requirement for synchronous replication
- Figure 12-3: Asynchronous replication
- Figure 12-4: Bandwidth requirement for asynchronous replication
- 12.2 Remote Replication Technologies
- 12.2.1 Host-Based Remote Replication
- LVM-Based Remote Replication
- Figure 12-5: LVM-based remote replication
- Host-Based Log Shipping
- Figure 12-6: Host-based log shipping
- LVM-Based Remote Replication
- 12.2.1 Host-Based Remote Replication
- 12.2.2 Storage Array-Based Remote Replication
- Synchronous Replication Mode
- Figure 12-7: Array-based synchronous remote replication
- Asynchronous Replication Mode
- Figure 12-8: Array-based asynchronous remote replication
- Disk-Buffered Replication Mode
- Figure 12-9: Disk-buffered remote replication
- Synchronous Replication Mode
- CDP Remote Replication
- Figure 12-10: CDP remote replication
- 12.3.1 Three-Site Replication — Cascade/Multihop
- Synchronous + Asynchronous
- Figure 12-11: Three-site remote replication cascade/multihop
- Synchronous + Disk Buffered
- Synchronous + Asynchronous
- 12.3.2 Three-Site Replication — Triangle/Multitarget
- Figure 12-12: Three-site replication triangle/multitarget
- Figure 12-13: Bitmap status during push operation
- Figure 12-14: Hypervisor-to-hypervisor VM migration
- Figure 12-15: Array-to-array VM migration
- 12.6.1 EMC SRDF
- 12.6.2 EMC MirrorView
- 12.6.3 EMC RecoverPoint
- Exercises
- Chapter 13 Cloud Computing
- Key Concepts
- 13.1 Cloud Enabling Technologies
- 13.2 Characteristics of Cloud Computing
- Multitenancy
- 13.3 Benefits of Cloud Computing
- 13.4 Cloud Service Models
- 13.4.1 Infrastructure-as-a-Service
- Figure 13-1: IaaS, PaaS, and SaaS models
- 13.4.2 Platform-as-a-Service
- 13.4.3 Software-as-a-Service
- 13.4.1 Infrastructure-as-a-Service
- 13.5 Cloud Deployment Models
- 13.5.1 Public Cloud
- Figure 13-2: Public cloud
- 13.5.2 Private Cloud
- Figure 13-3: On-premise and externally hosted private clouds
- 13.5.3 Community Cloud
- Figure 13-4: Community cloud
- 13.5.4 Hybrid Cloud
- Figure 13-5: Hybrid cloud
- 13.5.1 Public Cloud
- 13.6 Cloud Computing Infrastructure
- 13.6.1 Physical Infrastructure
- Figure 13-6: Cloud infrastructure layers
- 13.6.2 Virtual Infrastructure
- 13.6.3 Applications and Platform Software
- 13.6.4 Cloud Management and Service Creation Tools
- Cloud-optimized Storage
- 13.6.1 Physical Infrastructure
- 13.7.1 Challenges for Consumers
- 13.7.2 Challenges for Providers
- Exercises
- Chapter 14 Securing the Storage Infrastructure
- Key Concepts
- 14.1 Information Security Framework
- 14.2 Risk Triad
- 14.2.1 Assets
- 14.2.2 Threats
- Examples of Passive Attacks
- 14.2.3 Vulnerability
- 14.3 Storage Security Domains
- Figure 14-1: Storage security domains
- 14.3.1 Securing the Application Access Domain
- Figure 14-2: Security threats in an application access domain
- Controlling User Access to Data
- Protecting the Storage Infrastructure
- Data Encryption
- 14.3.2 Securing the Management Access Domain
- Figure 14-3: Security threats in a management access domain
- Controlling Administrative Access
- Protecting the Management Infrastructure
- 14.3.3 Securing Backup, Replication, and Archive
- Figure 14-4: Security threats in a backup, replication, and archive environment
- 14.4 Security Implementations in Storage Networking
- 14.4.1 FC SAN
- FC SAN Security Architecture
- Basic SAN Security Mechanisms
- Figure 14-5: FC SAN security architecture
- Table 14-1: Security Zones and Protection Strategies
- LUN Masking and Zoning
- Securing Switch Ports
- Switch-Wide and Fabric-Wide Access Control
- Logical Partitioning of a Fabric: Virtual SAN
- 14.4.2 NAS
- Figure 14-6: Securing SAN with VSAN
- NAS File Sharing: Windows ACLs
- NAS File Sharing: UNIX Permissions
- NAS File Sharing: Authentication and Authorization
- Figure 14-7: Securing user access in a NAS environment
- Kerberos
- Figure 14-8: Kerberos authorization
- Network-Layer Firewalls
- Figure 14-9: Securing a NAS environment with a network-layer firewall
- Application-Layer Firewalls and XML Firewalls
- 14.4.1 FC SAN
- 14.4.3 IP SAN
- Figure 14-10: Securing IPSAN with CHAP authentication
- Figure 14-11: Securing IPSAN with iSNS discovery domains
- 14.5.1 Security Concerns
- 14.5.2 Security Measures
- Security at the Compute Level
- Trusted Network Connect (TNC)
- Security at the Network Level
- Security at the Storage Level
- Security at the Compute Level
- 14.6.1 RSA SecureID
- 14.6.2 RSA Identity and Access Management
- 14.6.3 RSA Data Protection Manager
- 14.6.4 VMware vShield
- Exercises
- Key Concepts
- 15.1 Monitoring the Storage Infrastructure
- 15.1.1 Monitoring Parameters
- 15.1.2 Components Monitored
- Hosts
- Storage Network
- Storage
- 15.1.3 Monitoring Examples
- Accessibility Monitoring
- Figure 15-1: Switch failure in a storage infrastructure
- Capacity Monitoring
- Figure 15-2: Monitoring storage array capacity
- Figure 15-3: Monitoring server file system space
- Performance Monitoring
- Figure 15-4: Monitoring array port utilization
- Figure 15-5: Monitoring the CPU and memory usage of a server
- Security Monitoring
- Figure 15-6: Monitoring security in a storage array
- Accessibility Monitoring
- 15.1.4 Alerts
- 15.2.1 Availability Management
- 15.2.2 Capacity Management
- 15.2.3 Performance Management
- 15.2.4 Security Management
- 15.2.5 Reporting
- 15.2.6 Storage Infrastructure Management in a Virtualized Environment
- Storage Multitenancy
- 15.2.7 Storage Management Examples
- Example 1: Storage Allocation to a New Server/Host
- Figure 15-7: Storage allocation tasks
- Example 2: File System Space Management
- Figure 15-8: Extending a file system
- Example 3: Chargeback Report
- Figure 15-9: Chargeback report
- Figure 15-10: Correlation of capacity configured for an application
- Example 1: Storage Allocation to a New Server/Host
- 15.4.1 Storage Management Initiative
- 15.4.2 Enterprise Management Platform
- Figure 15-11: Changing value of sales order information
- 15.6.1 Intra-Array Storage Tiering
- Figure 15-12: Implementation of intra-array storage tiering
- Figure 15-13: Cache tiering
- 15.6.2 Inter-Array Storage Tiering
- Figure 15-14: Implementation of inter-array storage tiering
- 15.7.1 EMC ControlCenter and Prosphere
- 15.7.2 EMC Unisphere
- 15.7.3 EMC Unified Infrastructure Manager (UIM)
- Exercises
- Appendix A Application I/O Characteristics
- Random and Sequential
- Reads and Writes
- Table A-1: Read/Write Interactions with Cache
- I/O Request Size
- Table A-2: Application Characteristics
- SCSI Standards Family
- Figure B-1: The SCSI standards family
- SCSI Client-Server Model
- Figure B-2: SCSI client-server model
- Parallel SCSI Addressing
- Figure B-3: SCSI Initiator-Target communication
- Exercise 1
- Solution
- Exercise 2
- Solution
- Exercise 1
- Solution
- Exercise 2
- Solution
- DWDM
- Figure E-1: Dense wavelength division multiplexing (DWDM)
- CWDM
- SONET
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 11523
- Leyfi : 379