1. Bækur og afþreying
  2. Bækur og kort
  3. Námsbækur

Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

Veldu vöru

Rafræn bók. Uppl. sendar á netfangið þitt eftir kaup
Rafbók til eignar. Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt. Útgáfa: 2
Fá vöru senda með tölvupósti

Efnisyfirlit

  • Front Matter
    • About the Editors
    • Credits
    • Acknowledgments
    • Icons Used In This Book
    • Foreword
    • Introduction
      • EMC Academic Alliance
      • EMC Proven Professional Certification
  • Section I Storage System
    • Chapter 1 Introduction to Information Storage
      • Key Concepts
      • 1.1 Information Storage
        • 1.1.1 Data
          • Figure 1-1: Digital data
          • Examples of Research and Business Data
        • 1.1.2 Types of Data
          • Figure 1-2: Types of data
        • 1.1.3 Big Data
          • Figure 1-3: Big data ecosystem
        • 1.1.4 Information
        • 1.1.5 Storage
      • 1.2 Evolution of Storage Architecture
        • Figure 1-4: Evolution of storage architecture
      • 1.3 Data Center Infrastructure
        • 1.3.1 Core Elements of a Data Center
          • Figure 1-5: Example of an online order transaction system
        • 1.3.2 Key Characteristics of a Data Center
          • Figure 1-6: Key characteristics of a data center
        • 1.3.3 Managing a Data Center
      • 1.4 Virtualization and Cloud Computing
      • Summary
        • Exercises
    • Chapter 2 Data Center Environment
      • Key Concepts
      • 2.1 Application
        • Application Virtualization
      • 2.2 Database Management System (DBMS)
      • 2.3 Host (Compute)
        • 2.3.1 Operating System
          • Memory Virtualization
        • 2.3.2 Device Driver
        • 2.3.3 Volume Manager
          • Figure 2-1: Disk partitioning and concatenation
        • 2.3.4 File System
          • Figure 2-2: Process of mapping user files to disk storage
        • 2.3.5 Compute Virtualization
          • Figure 2-3: Server virtualization
          • Desktop Virtualization
      • 2.4 Connectivity
        • 2.4.1 Physical Components of Connectivity
          • Figure 2-4: Physical components of connectivity
        • 2.4.2 Interface Protocols
          • IDE/ATA and Serial ATA
          • SCSI and Serial SCSI
          • Fibre Channel
          • Internet Protocol (IP)
      • 2.5 Storage
      • 2.6 Disk Drive Components
        • Figure 2-5: Disk drive components
        • 2.6.1 Platter
          • Figure 2-6: Spindle and platter
        • 2.6.2 Spindle
        • 2.6.3 Read/Write Head
          • Figure 2-7: Actuator arm assembly
        • 2.6.4 Actuator Arm Assembly
        • 2.6.5 Drive Controller Board
        • 2.6.6 Physical Disk Structure
          • Figure 2-8: Disk structure: sectors, tracks, and cylinders
          • Disk Advertised Capacity Versus Available Capacity
        • 2.6.7 Zoned Bit Recording
          • Figure 2-9: Zoned bit recording
        • 2.6.8 Logical Block Addressing
          • Figure 2-10: Physical address and logical block address
      • 2.7 Disk Drive Performance
        • 2.7.1 Disk Service Time
          • Seek Time
          • Rotational Latency
          • Data Transfer Rate
            • Figure 2-11: Data transfer rate
        • 2.7.2 Disk I/O Controller Utilization
          • Figure 2-12: I/O processing
          • Figure 2-13: Utilization versus response time
      • 2.8 Host Access to Data
        • Figure 2-14: Host access to storage
      • 2.9 Direct-Attached Storage
        • Figure 2-15: Internal and external DAS architecture
        • 2.9.1 DAS Benefits and Limitations
      • 2.10 Storage Design Based on Application Requirements and Disk Performance
        • Table 2-1: IOPS Performed by Disk Drive
      • 2.11 Disk Native Command Queuing
        • Figure 2-16: Disk command queuing
      • 2.12 Introduction to Flash Drives
        • 2.12.1 Components and Architecture of Flash Drives
        • 2.12.2 Features of Enterprise Flash Drives
      • 2.13 Concept in Practice: VMware ESXi
      • Summary
        • Exercises
    • Chapter 3 Data Protection: RAID
      • Key Concepts
      • 3.1 RAID Implementation Methods
        • 3.1.1 Software RAID
        • 3.1.2 Hardware RAID
      • 3.2 RAID Array Components
        • Figure 3-1: Components of a RAID array
      • 3.3 RAID Techniques
        • 3.3.1 Striping
          • Figure 3-2: Striped RAID set
        • 3.3.2 Mirroring
          • Figure 3-3: Mirrored disks in an array
        • 3.3.3 Parity
          • Figure 3-4: Parity RAID
          • XOR Operation
      • 3.4 RAID Levels
        • Table 3-1: Raid Levels
        • 3.4.1 RAID 0
          • Figure 3-5: RAID 0
        • 3.4.2 RAID 1
          • Figure 3-6: RAID 1
        • 3.4.3 Nested RAID
          • Figure 3-7: Nested RAID
        • 3.4.4 RAID 3
          • Figure 3-8: RAID 3
        • 3.4.5 RAID 4
        • 3.4.6 RAID 5
          • Figure 3-9: RAID 5
        • 3.4.7 RAID 6
          • Figure 3-10: RAID 6
      • 3.5 RAID Impact on Disk Performance
        • Figure 3-11: Write penalty in RAID 5
        • 3.5.1 Application IOPS and RAID Configurations
      • 3.6 RAID Comparison
        • Table 3-2: Comparison of Common RAID Types
      • 3.7 Hot Spares
      • Summary
        • Exercises
    • Chapter 4 Intelligent Storage Systems
      • Key Concepts
      • 4.1 Components of an Intelligent Storage System
        • Figure 4-1: Components of an intelligent storage system
        • 4.1.1 Front End
        • 4.1.2 Cache
          • Structure of Cache
            • Figure 4-2: Structure of cache
          • Read Operation with Cache
            • Figure 4-3: Read hit and read miss
          • Write Operation with Cache
          • Cache Implementation
          • Cache Management
            • Figure 4-4: Types of flushing
          • Cache Data Protection
            • Server Flash-Caching Technology
        • 4.1.3 Back End
        • 4.1.4 Physical Disk
      • 4.2 Storage Provisioning
        • 4.2.1 Traditional Storage Provisioning
          • Figure 4-5: RAID set and LUNs
          • LUN Expansion: MetaLUN
            • Figure 4-6: Concatenated metaLUN
            • Figure 4-7: Striped metaLUN
        • 4.2.2 Virtual Storage Provisioning
          • Comparison between Virtual and Traditional Storage Provisioning
            • Figure 4-8: Virtual provisioning
            • Figure 4-9: Traditional versus virtual provisioning
          • Use Cases for Thin and Traditional LUNs
        • 4.2.3 LUN Masking
      • 4.3 Types of Intelligent Storage Systems
        • 4.3.1 High-End Storage Systems
          • Figure 4-10: Active-active configuration
        • 4.3.2 Midrange Storage Systems
          • Figure 4-11: Active-passive configuration
      • 4.4 Concepts in Practice: EMC Symmetrix and VNX
        • 4.4.1 EMC Symmetrix Storage Array
          • Figure 4-12: EMC Symmetrix VMAX
        • 4.4.2 EMC Symmetrix VMAX Component
        • 4.4.3 Symmetrix VMAX Architecture
          • Figure 4-13: VMAX architecture
      • Summary
        • Exercises
  • Section II Storage Networking Technologies
    • Chapter 5 Fibre Channel Storage Area Networks
      • Key Concepts
      • 5.1 Fibre Channel: Overview
      • 5.2 The SAN and Its Evolution
        • Figure 5-1: FC SAN implementation
        • Figure 5-2: FC SAN evolution
      • 5.3 Components of FC SAN
        • 5.3.1 Node Ports
          • Figure 5-3: Nodes, ports, and links
        • 5.3.2 Cables and Connectors
          • Figure 5-4: Multimode fiber and single-mode fiber
          • Figure 5-5: SC, LC, and ST connectors
        • 5.3.3 Interconnect Devices
        • 5.3.4 SAN Management Software
          • FC Switch Versus FC Hub
      • 5.4 FC Connectivity
        • 5.4.1 Point-to-Point
          • Figure 5-6: Point-to-point connectivity
        • 5.4.2 Fibre Channel Arbitrated Loop
          • Figure 5-7: Fibre Channel Arbitrated Loop
        • 5.4.3 Fibre Channel Switched Fabric
          • Figure 5-8: Fibre Channel switched fabric
          • Figure 5-9: Tiered structure of Fibre Channel switched fabric
          • FC-SW Transmission
            • Figure 5-10: Data transmission in Fibre Channel switched fabric
      • 5.5 Switched Fabric Ports
        • Figure 5-11: Switched fabric ports
      • 5.6 Fibre Channel Architecture
        • 5.6.1 Fibre Channel Protocol Stack
          • Figure 5-12: Fibre Channel protocol stack
          • FC-4 Layer
          • FC-2 Layer
          • FC-1 Layer
          • FC-0 Layer
        • 5.6.2 Fibre Channel Addressing
          • Figure 5-13: 24-bit FC address of N_Port
          • N_Port ID Virtualization (NPIV)
        • 5.6.3 World Wide Names
          • Figure 5-14: World Wide Names
        • 5.6.4 FC Frame
          • Figure 5-15: FC frame
        • 5.6.5 Structure and Organization of FC Data
        • 5.6.6 Flow Control
          • BB_Credit
          • EE_Credit
        • 5.6.7 Classes of Service
          • Table 5-1: FC Class of Services
      • 5.7 Fabric Services
        • Figure 5-16: Fabric services provided by FC switches
      • 5.8 Switched Fabric Login Types
      • 5.9 Zoning
        • Figure 5-17: Zoning
        • Figure 5-18: Members, zones, and zone sets
        • 5.9.1 Types of Zoning
          • Figure 5-19: Types of zoning
          • Single HBA Zoning
      • 5.10 FC SAN Topologies
        • 5.10.1 Mesh Topology
          • A Single-Switch Topology
          • Figure 5-20: Partial mesh and full mesh topologies
        • 5.10.2 Core-Edge Fabric
          • Benefits and Limitations of Core-Edge Fabric
            • Figure 5-21: Single-core topology
            • Figure 5-22: Dual-core topology
            • Figure 5-23: Compound core-edge topology
            • Fan-Out and Fan-In
      • 5.11 Virtualization in SAN
        • 5.11.1 Block-level Storage Virtualization
          • Figure 5-24: Block-level storage virtualization
          • Figure 5-25: Federation of block storage across data centers
        • 5.11.2 Virtual SAN (VSAN)
      • 5.12 Concepts in Practice: EMC Connectrix and EMC VPLEX
        • 5.12.1 EMC Connectrix
          • Figure 5-26: EMC Connectrix
          • Connectrix Switches
          • Connectrix Directors
          • Connectrix Multi-purpose Switches
          • Connectrix Management Tools
        • 5.12.2 EMC VPLEX
          • VPLEX Family of Products
      • Summary
        • Exercises
    • Chapter 6 IP SAN and FCoE
      • Key Concepts
      • 6.1 iSCSI
        • Figure 6-1: iSCSI implementation
        • 6.1.1 Components of iSCSI
        • 6.1.2 iSCSI Host Connectivity
        • 6.1.3 iSCSI Topologies
          • Native iSCSI Connectivity
            • Figure 6-2: iSCSI Topologies
          • Bridged iSCSI Connectivity
          • Combining FC and Native iSCSI Connectivity
        • 6.1.4 iSCSI Protocol Stack
          • Figure 6-3: iSCSI protocol stack
        • 6.1.5 iSCSI PDU
          • Figure 6-4: iSCSI PDU encapsulated in an IP packet
          • Figure 6-5: Alignment of iSCSI PDUs with IP packets
        • 6.1.6 iSCSI Discovery
        • 6.1.7 iSCSI Names
          • Figure 6-6: Discovery using iSNS
          • Network Address Authority
        • 6.1.8 iSCSI Session
          • Figure 6-7: iSCSI session
        • 6.1.9 iSCSI Command Sequencing
          • Figure 6-8: Command and status sequence number
      • 6.2 FCIP
        • 6.2.1 FCIP Protocol Stack
          • Figure 6-9: FCIP protocol stack
          • Figure 6-10: FCIP encapsulation
        • 6.2.2 FCIP Topology
          • Figure 6-11: FCIP topology
        • 6.2.3 FCIP Performance and Security
      • 6.3 FCoE
        • 6.3.1 I/O Consolidation Using FCoE
          • Figure 6-12: Infrastructure before using FCoE
          • Figure 6-13: Infrastructure after using FCoE
        • 6.3.2 Components of an FCoE Network
          • Converged Network Adapter
            • Figure 6-14: Converged Network Adapter
          • Cables
          • FCoE Switches
            • Figure 6-15: FCoE switch generic architecture
        • 6.3.3 FCoE Frame Structure
          • Figure 6-16: FCoE frame structure
          • FCoE Frame Mapping
            • Figure 6-17: FCoE frame mapping
            • FCOE ports
        • 6.3.4 FCoE Enabling Technologies
          • Priority-Based Flow Control (PFC)
            • Figure 6-18: Priority-based flow control
          • Enhanced Transmission Selection (ETS)
          • Congestion Notification (CN)
            • Figure 6-19: Congestion Notification
          • Data Center Bridging Exchange Protocol (DCBX)
      • Summary
        • Exercises
    • Chapter 7 Network-Attached Storage
      • Key Concepts
      • 7.1 General-Purpose Servers versus NAS Devices
        • Figure 7-1: General purpose server versus NAS device
      • 7.2 Benefits of NAS
      • 7.3 File Systems and Network File Sharing
        • 7.3.1 Accessing a File System
        • 7.3.2 Network File Sharing
          • Figure 7-2: UNIX directory structure
      • 7.4 Components of NAS
        • Figure 7-3: Components of NAS
      • 7.5 NAS I/O Operation
        • Figure 7-4: NAS I/O operation
      • 7.6 NAS Implementations
        • 7.6.1 Unified NAS
        • 7.6.2 Unified NAS Connectivity
        • 7.6.3 Gateway NAS
          • Figure 7-5: Unified NAS connectivity
        • 7.6.4 Gateway NAS Connectivity
          • Figure 7-6: Gateway NAS connectivity
        • 7.6.5 Scale-Out NAS
        • 7.6.6 Scale-Out NAS Connectivity
          • Figure 7-7: Scale-out NAS with dual internal and single external networks
          • InfiniBand
      • 7.7 NAS File-Sharing Protocols
        • 7.7.1 NFS
          • pNFS and MPFS
        • 7.7.2 CIFS
      • 7.8 Factors Affecting NAS Performance
        • Figure 7-8: Causes of latency
      • 7.9 File-Level Virtualization
        • Figure 7-9: File-serving environment before and after file-level virtualization
      • 7.10 Concepts in Practice: EMC Isilon and EMC VNX Gateway
        • 7.10.1 EMC Isilon
        • 7.10.2 EMC VNX Gateway
      • Summary
        • Exercises
    • Chapter 8 Object-Based and Unified Storage
      • Key Concepts
      • 8.1 Object-Based Storage Devices
        • Figure 8-1: Hierarchical file system versus flat address space
        • Figure 8-2: Object structure
        • 8.1.1 Object-Based Storage Architecture
          • Figure 8-3: Block-level access versus object-level access
        • 8.1.2 Components of OSD
          • Figure 8-4: OSD components
        • 8.1.3 Object Storage and Retrieval in OSD
          • Figure 8-5: Storing objects on OSD
          • Figure 8-6: Object retrieval from an OSD system
        • 8.1.4 Benefits of Object-Based Storage
        • 8.1.5 Common Use Cases for Object-Based Storage
          • REST and SOAP
      • 8.2 Content-Addressed Storage
      • 8.3 CAS Use Cases
        • 8.3.1 Healthcare Solution: Storing Patient Studies
          • Figure 8-7: Storing patient studies on a CAS system
        • 8.3.2 Finance Solution: Storing Financial Records
          • Figure 8-8: Storing financial records on a CAS system
      • 8.4 Unified Storage
        • 8.4.1 Components of Unified Storage
          • Figure 8-9: Unified storage platform
          • Data Access from Unified Storage
      • 8.5 Concepts in Practice: EMC Atmos, EMC VNX, and EMC Centera
        • 8.5.1 EMC Atmos
          • Figure 8-10: EMC Atmos storage system
        • 8.5.2 EMC VNX
          • Figure 8-11: EMC VNX storage system
        • 8.5.3 EMC Centera
          • EMC Centera Architecture
            • Figure 8-12: Centera architecture
      • Summary
        • Exercises
  • Section III Backup, Archive, and Replication
    • Chapter 9 Introduction to Business Continuity
      • Key Concepts
      • 9.1 Information Availability
        • 9.1.1 Causes of Information Unavailability
          • Figure 9-1: Disruptors of information availability
        • 9.1.2 Consequences of Downtime
        • 9.1.3 Measuring Information Availability
          • Figure 9-2: Information availability metrics
          • Table 9-1: Availability Percentage and Allowable Downtime
      • 9.2 BC Terminology
        • Figure 9-3: Strategies to meet RPO and RTO targets
      • 9.3 BC Planning Life Cycle
        • Figure 9-4: BC planning life cycle
      • 9.4 Failure Analysis
        • 9.4.1 Single Point of Failure
          • Figure 9-5: Single point of failure
        • 9.4.2 Resolving Single Points of Failure
          • Figure 9-6: Resolving single points of failure
        • 9.4.3 Multipathing Software
      • 9.5 Business Impact Analysis
      • 9.6 BC Technology Solutions
      • 9.7 Concept in Practice: EMC PowerPath
        • 9.7.1 PowerPath Features
        • 9.7.2 Dynamic Load Balancing
          • Figure 9-7: I/O without PowerPath
          • I/O Operation without PowerPath
          • I/O Operation with PowerPath
            • Figure 9-8: I/O with PowerPath
        • 9.7.3 Automatic Path Failover
          • Path Failure without PowerPath
            • Figure 9-9: Path failure without PowerPath
          • Path Failover with PowerPath: Active-Active Array
            • Figure 9-10: Path failover with PowerPath for an active-active array
          • Path Failover with PowerPath: Active-Passive Array
            • Figure 9-11: Path failover with PowerPath for an active-passive array
      • Summary
        • Exercises
    • Chapter 10 Backup and Archive
      • Key Concepts
      • 10.1 Backup Purpose
        • 10.1.1 Disaster Recovery
        • 10.1.2 Operational Recovery
        • 10.1.3 Archival
          • Backup Window
      • 10.2 Backup Considerations
      • 10.3 Backup Granularity
        • Figure 10-1: Backup granularity levels
        • Synthetic Full Backup
        • Figure 10-2: Restoring from an incremental backup
        • Figure 10-3: Restoring a cumulative backup
      • 10.4 Recovery Considerations
      • 10.5 Backup Methods
        • Server Configuration Backup
      • 10.6 Backup Architecture
        • Figure 10-4: Backup architecture
      • 10.7 Backup and Restore Operations
        • Figure 10-5: Backup operation
        • Figure 10-6: Restore operation
      • 10.8 Backup Topologies
        • Figure 10-7: Direct-attached backup topology
        • Figure 10-8: LAN-based backup topology
        • Figure 10-9: SAN-based backup topology
        • Figure 10-10: Mixed backup topology
      • 10.9 Backup in NAS Environments
        • 10.9.1 Server-Based and Serverless Backup
          • Figure 10-11: Server-based backup in a NAS environment
          • Figure 10-12: Serverless backup in a NAS environment
        • 10.9.2 NDMP-Based Backup
          • Figure 10-13: NDMP 2-way in a NAS environment
          • Figure 10-14: NDMP 3-way in a NAS environment
      • 10.10 Backup Targets
        • 10.10.1 Backup to Tape
          • Physical Tape Library
            • Figure 10-15: Physical tape library
            • Figure 10-16: Multiple streams on tape media
          • Limitations of Tape
        • 10.10.2 Backup to Disk
          • Figure 10-17: Tape versus disk restore
        • 10.10.3 Backup to Virtual Tape
          • Virtual Tape Library
            • Figure 10-18: Virtual tape library
            • Table 10-1: Backup Targets Comparison
      • 10.11 Data Deduplication for Backup
        • 10.11.1 Data Deduplication Methods
        • 10.11.2 Data Deduplication Implementation
          • Source-Based Data Deduplication
            • Figure 10-19: Source-based data deduplication
          • Target-Based Data Deduplication
            • Figure 10-20: Target-based data deduplication
            • Remote Office/Branch Office (ROBO) Backup
      • 10.12 Backup in Virtualized Environments
        • Figure 10-21: Traditional VM backup
        • Figure 10-22: Image-based backup
      • 10.13 Data Archive
        • Figure 10-23: Examples of fixed content data
      • 10.14 Archiving Solution Architecture
        • Figure 10-24: Archiving solution architecture
        • 10.14.1 Use Case: E-mail Archiving
        • 10.14.2 Use Case: File Archiving
          • Archiving Data to Cloud Storage
      • 10.15 Concepts in Practice: EMC NetWorker, EMC Avamar, and EMC Data Domain
        • 10.15.1 EMC NetWorker
        • 10.15.2 EMC Avamar
        • 10.15.3 EMC Data Domain
      • Summary
        • Exercises
    • Chapter 11 Local Replication
      • Key Concepts
      • 11.1 Replication Terminology
        • Replica versus Backup Copy
      • 11.2 Uses of Local Replicas
      • 11.3 Replica Consistency
        • 11.3.1 Consistency of a Replicated File System
          • Figure 11-1: Flushing the file system buffer
        • 11.3.2 Consistency of a Replicated Database
          • Figure 11-2: Dependent write consistency on sources
          • Figure 11-3: Dependent write consistency on replica
          • Figure 11-4: Inconsistent database replica
      • 11.4 Local Replication Technologies
        • 11.4.1 Host-Based Local Replication
          • LVM-Based Replication
          • Advantages of LVM-Based Replication
            • Figure 11-5: LVM-based mirroring
          • Limitations of LVM-Based Replication
          • File System Snapshot
            • Figure 11-6: Write to production FS
        • 11.4.2 Storage Array-Based Local Replication
          • Figure 11-7: Storage array-based local replication
          • Full-Volume Mirroring
            • Figure 11-8: Full-volume mirroring
          • Pointer-Based, Full-Volume Replication
            • Figure 11-9: Copy on first access (CoFA) — write to source
            • Figure 11-10: Copy on first access (CoFA) — read from target
            • Figure 11-11: Copy on first access (CoFA) — write to target
          • Pointer-Based Virtual Replication
            • Figure 11-12: Pointer-based virtual replication — write to source
        • 11.4.3 Network-Based Local Replication
          • Figure 11-13: Pointer-based virtual replication — write to target
          • Continuous Data Protection
          • CDP Local Replication Operation
            • Figure 11-14: Continuous data protection — local replication
      • 11.5 Tracking Changes to Source and Replica
        • Figure 11-15: Tracking changes
      • 11.6 Restore and Restart Considerations
        • Table 11-1: Comparison of Local Replication Technologies
      • 11.7 Creating Multiple Replicas
        • Figure 11-16: Multiple replicas created at different PIT
      • 11.8 Local Replication in a Virtualized Environment
      • 11.9 Concepts in Practice: EMC TimeFinder, EMC SnapView, and EMC RecoverPoint
        • 11.9.1 EMC TimeFinder
          • TimeFinder/Clone
          • TimeFinder/Snap
        • 11.9.2 EMC SnapView
          • SnapView Snapshot
          • SnapView Clone
        • 11.9.3 EMC RecoverPoint
      • Summary
        • Exercises
    • Chapter 12 Remote Replication
      • Key Concepts
      • 12.1 Modes of Remote Replication
        • Figure 12-1: Synchronous replication
        • Figure 12-2: Bandwidth requirement for synchronous replication
        • Figure 12-3: Asynchronous replication
        • Figure 12-4: Bandwidth requirement for asynchronous replication
      • 12.2 Remote Replication Technologies
        • 12.2.1 Host-Based Remote Replication
          • LVM-Based Remote Replication
            • Figure 12-5: LVM-based remote replication
          • Host-Based Log Shipping
            • Figure 12-6: Host-based log shipping
        • 12.2.2 Storage Array-Based Remote Replication
          • Synchronous Replication Mode
            • Figure 12-7: Array-based synchronous remote replication
          • Asynchronous Replication Mode
            • Figure 12-8: Array-based asynchronous remote replication
          • Disk-Buffered Replication Mode
            • Figure 12-9: Disk-buffered remote replication
        • 12.2.3 Network-Based Remote Replication
          • CDP Remote Replication
            • Figure 12-10: CDP remote replication
      • 12.3 Three-Site Replication
        • 12.3.1 Three-Site Replication — Cascade/Multihop
          • Synchronous + Asynchronous
            • Figure 12-11: Three-site remote replication cascade/multihop
          • Synchronous + Disk Buffered
        • 12.3.2 Three-Site Replication — Triangle/Multitarget
          • Figure 12-12: Three-site replication triangle/multitarget
      • 12.4 Data Migration Solutions
        • Figure 12-13: Bitmap status during push operation
      • 12.5 Remote Replication and Migration in a Virtualized Environment
        • Figure 12-14: Hypervisor-to-hypervisor VM migration
        • Figure 12-15: Array-to-array VM migration
      • 12.6 Concepts in Practice: EMC SRDF, EMC MirrorView, and EMC RecoverPoint
        • 12.6.1 EMC SRDF
        • 12.6.2 EMC MirrorView
        • 12.6.3 EMC RecoverPoint
      • Summary
        • Exercises
  • Section IV Cloud Computing
    • Chapter 13 Cloud Computing
      • Key Concepts
      • 13.1 Cloud Enabling Technologies
      • 13.2 Characteristics of Cloud Computing
        • Multitenancy
      • 13.3 Benefits of Cloud Computing
      • 13.4 Cloud Service Models
        • 13.4.1 Infrastructure-as-a-Service
          • Figure 13-1: IaaS, PaaS, and SaaS models
        • 13.4.2 Platform-as-a-Service
        • 13.4.3 Software-as-a-Service
      • 13.5 Cloud Deployment Models
        • 13.5.1 Public Cloud
          • Figure 13-2: Public cloud
        • 13.5.2 Private Cloud
          • Figure 13-3: On-premise and externally hosted private clouds
        • 13.5.3 Community Cloud
          • Figure 13-4: Community cloud
        • 13.5.4 Hybrid Cloud
          • Figure 13-5: Hybrid cloud
      • 13.6 Cloud Computing Infrastructure
        • 13.6.1 Physical Infrastructure
          • Figure 13-6: Cloud infrastructure layers
        • 13.6.2 Virtual Infrastructure
        • 13.6.3 Applications and Platform Software
        • 13.6.4 Cloud Management and Service Creation Tools
          • Cloud-optimized Storage
      • 13.7 Cloud Challenges
        • 13.7.1 Challenges for Consumers
        • 13.7.2 Challenges for Providers
      • 13.8 Cloud Adoption Considerations
      • 13.9 Concepts in Practice: Vblock
      • Summary
        • Exercises
  • Section V Securing and Managing Storage Infrastructure
    • Chapter 14 Securing the Storage Infrastructure
      • Key Concepts
      • 14.1 Information Security Framework
      • 14.2 Risk Triad
        • 14.2.1 Assets
        • 14.2.2 Threats
          • Examples of Passive Attacks
        • 14.2.3 Vulnerability
      • 14.3 Storage Security Domains
        • Figure 14-1: Storage security domains
        • 14.3.1 Securing the Application Access Domain
          • Figure 14-2: Security threats in an application access domain
          • Controlling User Access to Data
          • Protecting the Storage Infrastructure
          • Data Encryption
        • 14.3.2 Securing the Management Access Domain
          • Figure 14-3: Security threats in a management access domain
          • Controlling Administrative Access
          • Protecting the Management Infrastructure
        • 14.3.3 Securing Backup, Replication, and Archive
          • Figure 14-4: Security threats in a backup, replication, and archive environment
      • 14.4 Security Implementations in Storage Networking
        • 14.4.1 FC SAN
          • FC SAN Security Architecture
          • Basic SAN Security Mechanisms
            • Figure 14-5: FC SAN security architecture
            • Table 14-1: Security Zones and Protection Strategies
          • LUN Masking and Zoning
          • Securing Switch Ports
          • Switch-Wide and Fabric-Wide Access Control
          • Logical Partitioning of a Fabric: Virtual SAN
        • 14.4.2 NAS
          • Figure 14-6: Securing SAN with VSAN
          • NAS File Sharing: Windows ACLs
          • NAS File Sharing: UNIX Permissions
          • NAS File Sharing: Authentication and Authorization
            • Figure 14-7: Securing user access in a NAS environment
          • Kerberos
            • Figure 14-8: Kerberos authorization
          • Network-Layer Firewalls
            • Figure 14-9: Securing a NAS environment with a network-layer firewall
            • Application-Layer Firewalls and XML Firewalls
        • 14.4.3 IP SAN
          • Figure 14-10: Securing IPSAN with CHAP authentication
          • Figure 14-11: Securing IPSAN with iSNS discovery domains
      • 14.5 Securing Storage Infrastructure in Virtualized and Cloud Environments
        • 14.5.1 Security Concerns
        • 14.5.2 Security Measures
          • Security at the Compute Level
            • Trusted Network Connect (TNC)
          • Security at the Network Level
          • Security at the Storage Level
      • 14.6 Concepts in Practice: RSA and VMware Security Products
        • 14.6.1 RSA SecureID
        • 14.6.2 RSA Identity and Access Management
        • 14.6.3 RSA Data Protection Manager
        • 14.6.4 VMware vShield
      • Summary
        • Exercises
    • Chapter 15 Managing the Storage Infrastructure
      • Key Concepts
      • 15.1 Monitoring the Storage Infrastructure
        • 15.1.1 Monitoring Parameters
        • 15.1.2 Components Monitored
          • Hosts
          • Storage Network
          • Storage
        • 15.1.3 Monitoring Examples
          • Accessibility Monitoring
            • Figure 15-1: Switch failure in a storage infrastructure
          • Capacity Monitoring
            • Figure 15-2: Monitoring storage array capacity
            • Figure 15-3: Monitoring server file system space
          • Performance Monitoring
            • Figure 15-4: Monitoring array port utilization
            • Figure 15-5: Monitoring the CPU and memory usage of a server
          • Security Monitoring
            • Figure 15-6: Monitoring security in a storage array
        • 15.1.4 Alerts
      • 15.2 Storage Infrastructure Management Activities
        • 15.2.1 Availability Management
        • 15.2.2 Capacity Management
        • 15.2.3 Performance Management
        • 15.2.4 Security Management
        • 15.2.5 Reporting
        • 15.2.6 Storage Infrastructure Management in a Virtualized Environment
          • Storage Multitenancy
        • 15.2.7 Storage Management Examples
          • Example 1: Storage Allocation to a New Server/Host
            • Figure 15-7: Storage allocation tasks
          • Example 2: File System Space Management
            • Figure 15-8: Extending a file system
          • Example 3: Chargeback Report
            • Figure 15-9: Chargeback report
            • Figure 15-10: Correlation of capacity configured for an application
      • 15.3 Storage Infrastructure Management Challenges
      • 15.4 Developing an Ideal Solution
        • 15.4.1 Storage Management Initiative
        • 15.4.2 Enterprise Management Platform
      • 15.5 Information Lifecycle Management
        • Figure 15-11: Changing value of sales order information
      • 15.6 Storage Tiering
        • 15.6.1 Intra-Array Storage Tiering
          • Figure 15-12: Implementation of intra-array storage tiering
          • Figure 15-13: Cache tiering
        • 15.6.2 Inter-Array Storage Tiering
          • Figure 15-14: Implementation of inter-array storage tiering
      • 15.7 Concepts in Practice: EMC Infrastructure Management Tools
        • 15.7.1 EMC ControlCenter and Prosphere
        • 15.7.2 EMC Unisphere
        • 15.7.3 EMC Unified Infrastructure Manager (UIM)
      • Summary
        • Exercises
  • Back Matter
    • Appendix A Application I/O Characteristics
      • Random and Sequential
      • Reads and Writes
        • Table A-1: Read/Write Interactions with Cache
      • I/O Request Size
        • Table A-2: Application Characteristics
    • Appendix B Parallel SCSI
      • SCSI Standards Family
        • Figure B-1: The SCSI standards family
      • SCSI Client-Server Model
        • Figure B-2: SCSI client-server model
      • Parallel SCSI Addressing
        • Figure B-3: SCSI Initiator-Target communication
    • Appendix C SAN Design Exercises
      • Exercise 1
        • Solution
      • Exercise 2
        • Solution
    • Appendix D Information Availability Exercises
      • Exercise 1
        • Solution
      • Exercise 2
        • Solution
    • Appendix E Network Technologies for Remote Replication
      • DWDM
        • Figure E-1: Dense wavelength division multiplexing (DWDM)
      • CWDM
      • SONET
    • Appendix F Acronyms and Abbreviations
    • Glossary
    • Index

    UM RAFBÆKUR Á HEIMKAUP.IS

    Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!

    Þú kemst í bækurnar hvar sem er
    Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).

    Auðvelt að fletta og leita
    Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.

    Glósur og yfirstrikanir
    Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.

    Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
    Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.



    Fleiri góðir kostir
    - Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
    - Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
    - Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
    - Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
Eiginleikar
Vörumerki: John Wiley
Vörunúmer: 9781118488799
Taka af óskalista
Setja á óskalista

Umsagnir

Engar umsagnir
Lesa fleiri umsagnir

Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

Vörumerki: John Wiley
Vörunúmer: 9781118488799
Rafræn bók. Uppl. sendar á netfangið þitt eftir kaup

Veldu vöru

6.290 kr.
Fá vöru senda með tölvupósti
6.290 kr.