0% found this document useful (0 votes)
17 views34 pages

U1 - Storage Management

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views34 pages

U1 - Storage Management

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 34

STORAGE

MANAGEMEN
T
-1
Introduction to information
storage technology

Review data creation and the


amount of data being created
and understand the value of data
to a business

2
 Describe the importance of information to
individuals and to businesses
 Define data and information
 Discuss the categories of data
 Describe the storage architectures and their
evolution

-3
 “Digital universe – The Information Explosion”
◦ 21st Century is information era
◦ Information is being created at ever increasing rate
◦ Information has become critical for success
 We live in an on-command, on-demand world
◦ Example: Social networking sites, e-mails, video and
photo sharing website, online shopping, search
engines etc
 Information management is a big challenge
◦ Organization seek to Store Protect Optimize
Leverage the information optimally

-4
“Collection of raw facts from which conclusions may be drawn”

 Most data is being


converted into a digital Video

format
01010101010
◦ Driven by user demand Photo 10101011010
◦ Facilitated by 00010101011
 Increase in data 01010101010
Book
10101010101
processing capabilities 01010101010
 New and cheaper
Letter Digital Data
peripherals
 Lower cost and increased
speed of storage  Who creates data?
 Affordable and faster
◦ Individuals
networks
◦ Businesses
-5
 Data can be categorized as either structured or
unstructured data
◦ Structured E-Mail Attachments PDFs

X-Rays
 Data Bases Check Unstructured (80%)

 Spread Sheets Manuals Instant Messages

Images Documents

◦ Unstructured Forms
Web Pages

 Forms Contracts
Rich Media

 Images Invoices

 Audio Audio Video

Structured (20%)
 Movies

 Over 80% of enterprise Information is unstructured

-6
 What do individuals/businesses do with the data
they collect?
◦ They turn it into “information”
◦ “Information is the intelligence and knowledge
derived from data”
 Businesses analyze raw data in order to identify
meaningful trends
◦ For example:
 Buying habits and patterns of customers
 Health history of patients
 Virtuous cycle of information
◦ Information begets information
-7
Centralized information
storage and processing

Network Network

Wired Wireless
Wireless Wired

Accessing
Uploading
information
information

Creators of Users of
information Information

Demand for more


Information

Virtuous cycle of information

-8
 Creating a competitive advantage
◦ Identifying new business opportunities
 Buying/spending patterns
 Internet stores, retail stores, supermarkets
 Customer satisfaction/service
 Tracking shipments, and deliveries
◦ Identifying patterns that lead to changes in existing
business
 Reduced cost
 Just-in-time inventory, eliminating over-stocking of
products, optimizing shipment and delivery
 New services
 Security alerts for “stolen” credit card purchases
 Targeted marketing campaigns
 Communicate to bank customers with high
account balances about a special savings plan - 9
 Data created by individuals/businesses must be stored for
further processing
 Type of storage used is based on the type of data and the rate
at which it is created and used
 Examples:
◦ Individuals: Digital camera, Cell phone, DVD’s, Hard disk
◦ Businesses: Hard disk, external disk arrays, tape library
 Storage model: An evolution
◦ Centralized: mainframe computers
◦ Decentralized: Client – server model (Data spread across
many servers)
◦ Centralized: Storage Networking (Hugh respositories)

-
10
Multi Protocol
Router
LAN FC SAN

IP SAN

RAID Array SAN / NAS

JBOD

Internal DAS

Time
-
11
Key points covered
 Importance of information
 Data, information and storage
 Categories of data
 Storage architectures and their evolution

-
12
Challenges in
Data Storage
and
Management

-
13
Objectives :

 Core elements of a data center infrastructure


 Requirements of storage systems for optimally
supporting business activities
 Importance of Information Lifecycle
Management
 Activities in developing the ILM strategy

-
14
 Applications
 Databases – Database Management System
(DBMS) and the physical and logical storage
of data
 Servers/Operating systems
 Networks (LAN and SAN)
 Storage arrays
-
15
◦ Applications – specialized and dedicated software
to manipulate data typically stored in databases
◦ Databases – more commonly, Database
Management Systems (DBMS), provide a structured
way of storing data in logically organized tables with
an interrelation between them. They optimize the
storage and retrieval of data
◦ Servers/Operating systems – provide the
computing platform required to run the applications
and databases
◦ Networks – provide the data communication paths
between clients and servers or between servers and
storage
◦ Storage arrays – this is where data and information
lives -
16
Storage
Server
Array
Client Storage Area
Network
Local Area
Network

Application
User OS and Database
Interface DBMS

Consider an order processing system consisting of:


 Application for order entry
 Database Management System (DBMS) to store customer and product
information
 Server/Operating System (OS) on which the application and database
programs are run
 Networks that provide
◦ Connectivity between Clients and the Application/Database Server (LAN)
◦ Connectivity between the Server and the Storage system (SAN)
 Storage Array – database is stored on physical disks in the storage array
Storage
Server
Array
Client Storage Area
Network
Local Area
Network

Application
User OS and Database
Interface DBMS

 A customer order is entered via the Application User


Interface on a client
 Typically from a client machine on the order processing
personnel’s desk.
 An application accesses the DBMS to update the relevant
information; customer name, address, payment method,
products ordered, quantity ordered, etc.
-
18
Storage
Server Array
Client Storage Area
Network
Local Area
Network

OS and Database
DBMS

 A customer order is entered via the Application User


Interface on a client
 The client accesses the server over a Local Area
Network

-
19
Storage
Server Array
Client Storage Area
Network
Local Area
Network

O/S and Database


DBMS

 A DBMS uses the operating system on the server to read


and write this data to the physical location on a disk

-
20
Storage
Server Array
Client Storage Area
Network
Local Area
Network

O/S and Database


DBMS

 A dedicated Storage Area Network provides the


communication link between the server and the
storage array, and transports the read/write
commands and data between the server and the
storage array

-
21
Storage
Server Array
Client Storage Area
Network
Local Area
Network

Database

 A storage array receives the read/write commands


and data from the server and performs the
necessary operations to store the data on the
physical disks

-
22
 The application should be optimized for fast
interaction with the DBMS
 The tables in the database should be
constructed with care so the number of
read/write operations can be minimized
 The server should have sufficient CPU and
memory resources to satisfy application and
DBMS needs
 The different networks should provide fast
communication between client and server,
as well as server and storage array
 The storage array should service the
read/write requests from the server for
optimal performance
-
23
When the DBMS receives a request from the
application:
 It first searches the server memory; if data is
found there, the operation takes about a
millisecond
 If not, it uses the operating system to request
the data from the storage array
 Dedicated high speed networks transport this
request to the storage array
 Intelligent storage arrays can deliver the
requested data within a few milliseconds, and
are typically configured to protect data in the
event of drive failures
-
24
Availability

Data Integrity Security

Manageability

Performance Capacity

Scalability

-
25
 Exploding digital universe
◦ Multifold increase of information growth

 Increasing dependency on information


◦ The strategic use of information plays

 Changing value of information


◦ Information that is valuable today may become
less important tomorrow.

-
26
Constraints include:
 Cost
 Physical environment
 Maintenance and support
 Compliance – regulatory and legal
 Hardware and software infrastructure
 Interoperability and compatibility
-
27
Data Center management activities include:
 Provisioning/Capacity/Resource Planning
 Monitoring
 Reporting

-
28
Data Storage
Infrastructure
Information Lifecycle

-
29
Protect

New Process Deliver Warranty


order order order claim
Time
Value

Fulfilled Aged Warranty


order data Voided

Create Access Migrate Archive Dispose

A proactive strategy that enables an IT organization


to effectively manage the data throughout its lifecycle
-
30
Policy-based Alignment of Storage Infrastructure with Data Value

AUTOMATED

Classify Implement Integrated Organize


data / policies with management storage
applications information of storage resources to
based on management environment align with data
business rules tools classes

FLEXIBLE

-
31
 Improved utilization
◦ Tiered storage platforms
 Simplified management
◦ Processes, tools and automation
 Simplified backup and recovery
◦ A wider range of options to balance the need for business
continuity
 Maintaining compliance
◦ Knowledge of what data needs to be protected for what
length of time
 Lower Total Cost of Ownership
◦ By aligning the infrastructure and management costs with
information value

-
32
Key points are
 The five core elements of a Data Center
infrastructure
 Key requirements of storage systems to
support business activities, as well as some of
the constraints
 ILM strategy

◦ Importance
◦ Characteristics
◦ Activities in developing ILM strategy
◦ IML implementation
◦ Benefits of ILM

-
33
 Importance of data, information, and storage
infrastructure
 Types of data, its value, and key management
requirements of a storage system
 Evolution of storage architectures
 Core elements of a data center
 Importance of the ILM strategy

-
34

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy