| Preface |
|
xv | |
| Acknowledgments |
|
xix | |
| About the Author |
|
xxi | |
|
Chapter 1 Industry Trends and Perspectives: From Issues and Challenges to Opportunities |
|
|
1 | (20) |
|
|
|
1 | (1) |
|
|
|
2 | (1) |
|
1.2 The Importance of Data and Storage |
|
|
2 | (4) |
|
1.2.1 The Business End of IT Data Storage Impact |
|
|
3 | (2) |
|
1.2.2 Addressing Business and IT Issues |
|
|
5 | (1) |
|
1.2.3 What Is Driving Data Growth and Information Reliance |
|
|
5 | (1) |
|
1.3 Business Issues and IT Challenges |
|
|
6 | (1) |
|
1.4 Business and IT Opportunities |
|
|
7 | (4) |
|
1.4.1 Traditional Information Services Delivery/Model |
|
|
7 | (1) |
|
1.4.2 Information Factories |
|
|
8 | (3) |
|
1.5 Opportunity for Cloud, Virtualization, and Data Storage Networking |
|
|
11 | (3) |
|
1.5.1 IT Clouds and Virtualization: Not If, Rather When, Where, Why, and How |
|
|
11 | (3) |
|
1.5.2 Private Cloud: Coexistence vs. Competing with Legacy IT |
|
|
14 | (1) |
|
1.6 Common Cloud, Virtualization, and Storage Networking Questions |
|
|
14 | (3) |
|
1.7 Cloud, Virtualization, and Storage Networking: Bringing It Together (for Now) |
|
|
17 | (1) |
|
|
|
18 | (3) |
|
Chapter 2 Cloud, Virtualization, and Data Storage Networking Fundamentals |
|
|
21 | (28) |
|
|
|
21 | (1) |
|
|
|
22 | (1) |
|
2.2 Server and Storage I/O Fundamentals |
|
|
22 | (16) |
|
2.2.1 Server and I/O Architectures |
|
|
24 | (2) |
|
|
|
26 | (1) |
|
|
|
27 | (2) |
|
2.2.4 Disk Storage Fundamentals |
|
|
29 | (1) |
|
2.2.5 Initiators and Targets |
|
|
29 | (1) |
|
2.2.6 How Data Is Written to and Read from a Storage Device |
|
|
30 | (1) |
|
2.2.7 Storage Sharing vs. Data Sharing |
|
|
31 | (1) |
|
2.2.8 Different Types of Storage: Not All Data Storage Is the Same |
|
|
32 | (6) |
|
2.3 I/O Connectivity and Networking Fundamentals |
|
|
38 | (2) |
|
|
|
40 | (2) |
|
2.5 Virtualization: Servers, Storage, and Networking |
|
|
42 | (1) |
|
2.6 Virtualization and Storage Services |
|
|
43 | (1) |
|
2.7 Data and Storage Access |
|
|
44 | (3) |
|
2.7.1 Direct Attached Storage (DAS) |
|
|
45 | (1) |
|
2.7.2 Networked Storage: Network Attached Storage (NAS) |
|
|
45 | (1) |
|
2.7.3 Networked Storage: Storage Area Network (SAN) |
|
|
45 | (2) |
|
2.7.4 Networked Storage: Public and Private Clouds |
|
|
47 | (1) |
|
|
|
47 | (1) |
|
|
|
48 | (1) |
|
Chapter 3 Infrastructure Resource Management |
|
|
49 | (24) |
|
|
|
49 | (1) |
|
3.1 Managing Data Infrastructures for Cloud and Virtual Environments |
|
|
49 | (2) |
|
3.2 Introduction to Infrastructure Resource Management |
|
|
51 | (3) |
|
3.3 Understanding IT Resources |
|
|
54 | (4) |
|
3.4 Managing IT Resources |
|
|
58 | (1) |
|
3.5 Service Offerings, Categories, and Technology Alignment |
|
|
59 | (5) |
|
3.6 Gaining Situational Awareness and Control |
|
|
64 | (2) |
|
|
|
66 | (1) |
|
3.8 Search and eDiscovery |
|
|
67 | (1) |
|
3.9 Performance and Capacity Planning |
|
|
68 | (2) |
|
3.10 Data Movement and Migration |
|
|
70 | (1) |
|
|
|
71 | (2) |
|
Chapter 4 Data and Storage Networking Security |
|
|
73 | (18) |
|
|
|
73 | (1) |
|
4.1 Being Secure Without Being Scared |
|
|
73 | (1) |
|
4.2 Eliminating Blind Spots, Gaps in Coverage, or "Dark Territories" |
|
|
74 | (2) |
|
4.3 Security Threat Risks and Challenges |
|
|
76 | (2) |
|
4.4 Taking Action to Secure Your Resources |
|
|
78 | (4) |
|
|
|
79 | (1) |
|
|
|
80 | (1) |
|
|
|
80 | (1) |
|
4.4.4 Deciphering Encryption |
|
|
81 | (1) |
|
|
|
82 | (2) |
|
|
|
84 | (1) |
|
4.6.1 Removable Media Security |
|
|
85 | (1) |
|
4.7 Virtual Servers, Physical Servers, and Desktops |
|
|
85 | (1) |
|
|
|
86 | (1) |
|
4.9 Disposing of Digital Assets and Technology |
|
|
87 | (1) |
|
|
|
88 | (1) |
|
4.11 Common Security-Related Questions |
|
|
88 | (1) |
|
|
|
89 | (2) |
|
Chapter 5 Data Protection: Backup/Restore and Business Continuance/Disaster Recovery |
|
|
91 | (38) |
|
|
|
91 | (1) |
|
|
|
92 | (1) |
|
5.2 Data Protection Challenges and Opportunities |
|
|
92 | (1) |
|
5.3 Protect, Preserve, and Serve Information Services |
|
|
93 | (7) |
|
5.3.1 Basic Information Reliability-Availability-Serviceability (RAS) |
|
|
96 | (1) |
|
5.3.2 High Availability and Business Continuance |
|
|
97 | (1) |
|
|
|
98 | (1) |
|
5.3.4 Data Protection vs. Preservation (Backup vs. Archive) |
|
|
99 | (1) |
|
5.4 SLO and SLAs: How Much Availability Do You Need vs. Want |
|
|
100 | (3) |
|
5.4.1 RTO and RPO: Balancing Data Availability vs. Time and Budgets |
|
|
100 | (1) |
|
5.4.2 Reconciling and Assessing RTO and RPO Requirements |
|
|
101 | (2) |
|
5.4.3 Tiered Data Protection |
|
|
103 | (1) |
|
5.5 Common-Sense Data Protection |
|
|
103 | (1) |
|
5.6 Virtual, Physical, and Cloud Data Protection |
|
|
104 | (19) |
|
5.6.1 Tools and Technologies |
|
|
105 | (4) |
|
5.6.2 Virtual and Physical Machine Movement |
|
|
109 | (1) |
|
5.6.3 Enabling High Availability |
|
|
110 | (2) |
|
5.6.4 Snapshots and Continuous Data Protection |
|
|
112 | (2) |
|
5.6.5 Backup and Recovery |
|
|
114 | (6) |
|
5.6.6 Data Replication (Local, Remote, and Cloud) |
|
|
120 | (2) |
|
5.6.7 Data Protection Management |
|
|
122 | (1) |
|
5.7 Modernizing Data Protection and Backup |
|
|
123 | (4) |
|
5.7.1 Expanding from DR to BC, Shifting from Cost Overhead to Profit Center |
|
|
124 | (1) |
|
5.7.2 Using Virtualization and Clouds to Enhance Data Protection |
|
|
124 | (3) |
|
5.8 Data Protection Checklist |
|
|
127 | (1) |
|
5.9 Common HA-, BC-, and DR-Related Questions |
|
|
127 | (1) |
|
|
|
128 | (1) |
|
Chapter 6 Metrics and Measurements for Situational Awareness |
|
|
129 | (22) |
|
|
|
129 | (1) |
|
|
|
129 | (2) |
|
6.2 Making Sense of Metrics and Measurements |
|
|
131 | (1) |
|
6.3 Different Metrics for Different Audiences |
|
|
132 | (1) |
|
6.4 Key Performance Indicators |
|
|
133 | (4) |
|
6.4.1 Averages, Rates, and Ratios |
|
|
134 | (2) |
|
|
|
136 | (1) |
|
6.5 Measuring IT Resources and Services Delivery |
|
|
137 | (8) |
|
6.5.1 Performance, Availability, Capacity, Energy, and Economics (PACE) |
|
|
138 | (7) |
|
|
|
145 | (1) |
|
6.7 Accounting and Chargeback |
|
|
146 | (1) |
|
6.8 Benchmarks and Simulation Comparisons |
|
|
147 | (2) |
|
6.9 Common Metrics-Related Questions |
|
|
149 | (1) |
|
|
|
150 | (1) |
|
Chapter 7 Data Footprint Reduction: Enabling Cost-Effective Data Demand Growth |
|
|
151 | (16) |
|
|
|
151 | (1) |
|
|
|
152 | (6) |
|
7.1.1 What Is Driving Expanding Data Footprints |
|
|
154 | (1) |
|
7.1.2 Changing Data Access and Lifecycles |
|
|
155 | (1) |
|
7.1.3 What Is Your Data Footprint Impact? |
|
|
155 | (2) |
|
7.1.4 Business Benefits of Data Footprint Reduction |
|
|
157 | (1) |
|
7.2 The Expanding Scope and Focus of Data Footprint Reduction |
|
|
158 | (3) |
|
7.2.1 Reducing Your Data Footprint |
|
|
159 | (1) |
|
7.2.2 Not All Data or Applications Are the Same |
|
|
160 | (1) |
|
|
|
161 | (1) |
|
7.4 Metrics and Measurements |
|
|
161 | (1) |
|
7.5 What to Look for in a DFR Technology Solution |
|
|
162 | (1) |
|
|
|
163 | (1) |
|
|
|
163 | (1) |
|
|
|
164 | (3) |
|
Chapter 8 Enabling Data Footprint Reduction: Storage Capacity Optimization |
|
|
167 | (24) |
|
|
|
167 | (1) |
|
|
|
167 | (1) |
|
|
|
168 | (4) |
|
|
|
171 | (1) |
|
8.3 Compression and Compaction |
|
|
172 | (4) |
|
8.3.1 Compression Implementation |
|
|
173 | (1) |
|
8.3.2 Real-Time and On-the-Fly Compression |
|
|
173 | (3) |
|
8.3.3 Postprocessing and Deferred Compression |
|
|
176 | (1) |
|
8.4 Consolidation and Storage Tiering |
|
|
176 | (1) |
|
|
|
177 | (9) |
|
8.5.1 Dedupe Fundamentals |
|
|
178 | (3) |
|
8.5.2 How and Where Dedupe Is Implemented |
|
|
181 | (1) |
|
8.5.3 Dedupe Locations (Hardware, Software, Appliance, Source, and Target) |
|
|
182 | (2) |
|
8.5.4 Global vs. Local Dedupe |
|
|
184 | (2) |
|
8.6 DFR and RAID Configurations |
|
|
186 | (1) |
|
8.7 Space-Saving Snapshots |
|
|
187 | (1) |
|
|
|
188 | (1) |
|
|
|
189 | (1) |
|
|
|
189 | (2) |
|
Chapter 9 Storage Services and Systems |
|
|
191 | (42) |
|
|
|
191 | (1) |
|
|
|
191 | (2) |
|
|
|
193 | (1) |
|
9.3 Storage Reliability, Availability, and Serviceability (RAS) |
|
|
194 | (1) |
|
9.4 Aligning Storage Technology and Media to Application Needs |
|
|
195 | (11) |
|
|
|
197 | (1) |
|
9.4.2 Hybrid Hard Disk Drives |
|
|
198 | (1) |
|
9.4.3 Removable Hard Disk Drives |
|
|
199 | (1) |
|
9.4.4 Solid-State Devices |
|
|
200 | (3) |
|
|
|
203 | (1) |
|
9.4.6 Different Storage Media Are Better Together |
|
|
204 | (2) |
|
9.5 Storage Services and Functionalities |
|
|
206 | (14) |
|
9.5.1 Redundant Components |
|
|
206 | (2) |
|
9.5.2 RAID and Data Availability |
|
|
208 | (4) |
|
9.5.3 Enhancing Data Availability and Protection |
|
|
212 | (2) |
|
9.5.4 Automated Storage Tiering and Data Movement |
|
|
214 | (1) |
|
9.5.5 Performance Optimization |
|
|
215 | (1) |
|
9.5.6 Unified, Multiprotocol, and Function Storage |
|
|
216 | (2) |
|
9.5.7 Intelligent Power Management and "Green" Storage |
|
|
218 | (1) |
|
|
|
219 | (1) |
|
9.6 Storage System Architectures |
|
|
220 | (6) |
|
9.6.1 Servers as Storage, Storage as Servers |
|
|
221 | (1) |
|
9.6.2 Clustered and Grid Storage |
|
|
222 | (3) |
|
|
|
225 | (1) |
|
9.7 Storage Virtualization and Virtual Storage |
|
|
226 | (4) |
|
9.7.1 Volume Mangers and Global Name Spaces |
|
|
226 | (1) |
|
9.7.2 Virtualization and Storage Services |
|
|
226 | (3) |
|
9.7.3 Storage Virtualization Locations |
|
|
229 | (1) |
|
9.8 Common Storage Questions |
|
|
230 | (1) |
|
|
|
230 | (3) |
|
Chapter 10 Server Virtualization |
|
|
233 | (16) |
|
|
|
233 | (1) |
|
|
|
233 | (1) |
|
|
|
234 | (1) |
|
10.3 Inside Virtual Servers and Virtual Machines |
|
|
235 | (6) |
|
10.4 Virtual Desktop Infrastructure |
|
|
241 | (2) |
|
10.5 Cloud and Virtual Servers |
|
|
243 | (1) |
|
10.6 Can and Should All Servers or Desktops Be Virtualized? |
|
|
244 | (1) |
|
10.7 Virtualization Beyond Consolidation: Enabling IT Agility |
|
|
245 | (2) |
|
10.8 Common Virtualization Questions |
|
|
247 | (1) |
|
|
|
248 | (1) |
|
Chapter 11 Connectivity: Networking with Your Servers and Storage |
|
|
249 | (40) |
|
|
|
249 | (1) |
|
|
|
249 | (2) |
|
11.2 Networking Challenges |
|
|
251 | (1) |
|
11.3 I/O and Networking Bits and Bytes, Decoding Encoding |
|
|
252 | (1) |
|
11.4 I/O and Networking Fundamentals |
|
|
253 | (2) |
|
11.5 Server (Physical, Virtual and Cloud) Topics |
|
|
255 | (4) |
|
11.5.1 Peripheral Component Interconnect (PCI) |
|
|
255 | (2) |
|
11.5.2 Adapters, NICs, and CNAs |
|
|
257 | (2) |
|
11.6 I/O and Networking Devices |
|
|
259 | (1) |
|
11.7 Converged and Unified Networking |
|
|
260 | (5) |
|
11.7.1 PCI-SIG I/O Virtualization |
|
|
261 | (2) |
|
11.7.2 Converged Networks |
|
|
263 | (2) |
|
11.8 Local Networking (DAS, SANs, and LANs) |
|
|
265 | (10) |
|
11.8.1 The Role of Networking with Storage |
|
|
265 | (2) |
|
|
|
267 | (1) |
|
11.8.3 Fibre Channel (FC) |
|
|
268 | (1) |
|
11.8.4 Fibre over Ethernet (FCoE) |
|
|
269 | (2) |
|
|
|
271 | (1) |
|
11.8.6 iSCSI (Internet SCSI) |
|
|
272 | (1) |
|
11.8.7 Serial Attached SCSI (SAS) |
|
|
272 | (2) |
|
11.8.8 The Best Protocol for Block Storage |
|
|
274 | (1) |
|
11.9 Enabling Distance (MANs and WANs) |
|
|
275 | (3) |
|
11.9.1 Bandwidth and Protocol Optimization |
|
|
277 | (1) |
|
11.10 Cloud, Virtualization, and Management Topics |
|
|
278 | (4) |
|
11.10.1 Accessing Cloud Storage and Services |
|
|
279 | (1) |
|
11.10.2 Virtual I/O and I/O Virtualization (IOV) |
|
|
280 | (1) |
|
11.10.3 N_Port ID Virtualization (NPIV) |
|
|
281 | (1) |
|
11.11 Configuring for Reliability, Availability, and Serviceability (RAS) |
|
|
282 | (4) |
|
|
|
283 | (1) |
|
11.11.2 Configuration and Topologies |
|
|
284 | (1) |
|
11.11.3 Cabling: Tools and Management |
|
|
285 | (1) |
|
11.12 Common Networking Questions |
|
|
286 | (1) |
|
|
|
287 | (2) |
|
Chapter 12 Cloud and Solution Packages |
|
|
289 | (16) |
|
|
|
289 | (1) |
|
|
|
289 | (2) |
|
12.2 Clarifying Cloud Confusion: What Does Your Cloud Need to Do |
|
|
291 | (1) |
|
12.3 IaaS, PaaS, SaaS, and AaaS |
|
|
291 | (2) |
|
|
|
293 | (2) |
|
12.5 Public Cloud Services |
|
|
295 | (2) |
|
|
|
297 | (1) |
|
12.7 Stacks and Solutions |
|
|
297 | (2) |
|
12.8 PODs and Modular Data Center Components |
|
|
299 | (1) |
|
12.9 Vendor Lock-in: The Good, the Bad, and the Ugly |
|
|
300 | (2) |
|
12.10 Evaluating Cloud Servers and Solutions |
|
|
302 | (1) |
|
12.11 Common Cloud Questions |
|
|
303 | (1) |
|
|
|
304 | (1) |
|
Chapter 13 Management and Tools |
|
|
305 | (16) |
|
|
|
305 | (1) |
|
|
|
305 | (1) |
|
13.2 Software and Management Tools |
|
|
306 | (2) |
|
13.3 Management Tool Interfaces |
|
|
308 | (2) |
|
13.4 End-to-End Management |
|
|
310 | (2) |
|
|
|
312 | (2) |
|
13.6 The Evolving Role of Management Tools |
|
|
314 | (1) |
|
13.7 Hard vs. Soft Products |
|
|
315 | (1) |
|
13.8 The Other IT Resources: People, Processes, and Policies |
|
|
316 | (2) |
|
13.9 Common Management-Related Questions |
|
|
318 | (1) |
|
|
|
318 | (3) |
|
Chapter 14 Applying What You Have Learned |
|
|
321 | (10) |
|
|
|
321 | (1) |
|
|
|
321 | (1) |
|
14.2 Don't Be Afraid, but Look Before You Leap |
|
|
322 | (1) |
|
14.3 Addressing Issues and Challenges While Enabling Opportunities |
|
|
323 | (1) |
|
14.4 What's Your Vision, Strategy, and Plan? |
|
|
324 | (3) |
|
14.5 What to Consider When Evaluating Technologies, Techniques, and Services |
|
|
327 | (1) |
|
14.6 Common Cloud, Virtualization and Data Storage Networking Questions |
|
|
328 | (1) |
|
|
|
329 | (2) |
|
Chapter 15 Wrap-up, What's Next, and Book Summary |
|
|
331 | (10) |
|
|
|
331 | (1) |
|
15.1 Wrapping up This Part of the Journey |
|
|
331 | (1) |
|
15.2 Where Have We Been, Where Are We Going: From Efficiency to Effectiveness |
|
|
332 | (2) |
|
|
|
334 | (2) |
|
15.4 Futures, Trends, Perspectives, and Predictions |
|
|
336 | (2) |
|
15.5 Chapter and Book Summary |
|
|
338 | (3) |
| Appendix |
|
341 | (2) |
| Glossary |
|
343 | (14) |
| Index |
|
357 | |