Rajeev Bhardwaj Director, Product Management

Slides:



Advertisements
Similar presentations
Tivoli SANergy. SANs are Powerful, but... Most SANs today offer limited value One system, multiple storage devices Multiple systems, isolated zones of.
Advertisements

Proposed Storage Area Network Facilities For Discussion.
Computer networks Fundamentals of Information Technology Session 6.
7-1 Configure Software Initiator: Enable Topic 1: iSCSI Storage (GUI & Command Line) Enable the iSCSI initiator, the iSCSI name and alias are automatically.
Introduction to Storage Area Network (SAN) Jie Feng Winter 2001.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Beyond NAS and SAN: The Evolution of Storage Marc Farley Author Building Storage Networks.
Virtualization Across The Enterprise Rob Lowden Director, Enterprise Infrastructure Indiana University 23 May 2007.
Vorlesung Speichernetzwerke Teil 2 Dipl. – Ing. (BA) Ingo Fuchs 2003.
Storage Area Network (SAN)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Storage Networking.
Module – 7 network-attached storage (NAS)
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Transforming SAN with Cisco MDS 8G and Advance SAN Services Cisco MDS.
Module 10 Configuring and Managing Storage Technologies.
Storage Security and Management: Security Framework
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Best Practices for Backup in SAN/NAS Environments Jeff Wells.
Introduction to SAN – 1: iSCSI & FCIPBITS Pilani Alumni Association ( 19, 2006 Introduction to Storage Area Networks – I iSCSI.
Meeting the Data Protection Demands of a 24x7 Economy Steve Morihiro VP, Programs & Technology Quantum Storage Solutions Group
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Virtualization in the NCAR Mass Storage System Gene Harano National Center for Atmospheric Research Scientific Computing Division High Performance Systems.
© 2009 EMC Corporation. All rights reserved. Introduction to Information Storage and Management Module 1.1.
Storage Tank in Data Grid Shin, SangYong(syshin, #6468) IBM Grid Computing August 23, 2003.
Storage Trends: DoITT Enterprise Storage Gregory Neuhaus – Assistant Commissioner: Enterprise Systems Matthew Sims – Director of Critical Infrastructure.
1 © 2004 Cisco Systems, Inc. All rights reserved. Rich Gore Cisco Case Study: Storage Networking and the Cisco MDS 9509 Multilayer.
Storage Networking Evolution Jim Morin VP Strategic Planning June 2001.
Server VirtualizationServer Virtualization Hyper-V 2012.
Hosted by Minimizing the Impact of Storage on Your Network W. Curtis Preston President The Storage Group.
Internet Protocol Storage Area Networks (IP SAN)
STORAGE ARCHITECTURE/ MASTER): Where IP and FC Storage Fit in Your Enterprise Randy Kerns Senior Partner The Evaluator Group.
1 © 2004 Cisco Systems, Inc. All rights reserved. izn German government data storage facility cuts costs by 50 per cent.
Storage Virtualization
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Jenny Hobbs Consulting Systems Engineer April 2016 Business Case for Tailored Datacenter Integration (TDI)
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Spring Ch 17 Internetworking Concepts, Architecture, and Protocols Part III Internetworking.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
NG/VITA Strategy & Architecture Tony Shoot
Chapter 1: Explore the Network
Open-E Data Storage Software (DSS V6)
Video Security Design Workshop:
Nexsan iSeries™ iSCSI and iSeries Topologies Name Brian Montgomery
Cisco MDS 9000 SAN Tap Services
Network Attached Storage Overview
100% Exam Passing Guarantee & Money Back Assurance
The sign of success.
Microsoft Windows NT 4.0 Authentication Protocols
iSCSI Storage Area Network
Direct Attached Storage and Introduction to SCSI
Chapter 1: Explore the Network
What is Fibre Channel? What is Fibre Channel? Introduction
SAN (Extension Protocol & Protocol Stack)
SAN Security Management
Introduction to Networks
Introduction to Networks
GGF15 – Grids and Network Virtualization
Module – 7 network-attached storage (NAS)
Managing Clouds with VMM
Keith Spayth ACSG 520 Dr. Alzoubi
Business Continuity Technology
Storage Trends: DoITT Enterprise Storage
Keith Spayth ACSG 520 Dr. Alzoubi
Ron Carovano Manager, Business Development F5 Networks
Storage Automation for BAO
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

Library of Congress – Storage Architectures for Digital Collection Preservation Rajeev Bhardwaj Director, Product Management Data Center Business Unit (DCBU)

Outline Clients Address the role of a Storage Area Networks (SANs) in storage architectures for digital collection preservation in terms of: Costs of long-term storage, including media and facilities Data integrity Migration to new technologies Security LAN Servers SAN Storage Devices

How can a SAN Reduce Costs of Long-Term Storage? Fabric Consolidation 500+ ports SAN Directors 4G, 8G, 10G FC connectivity Virtual SAN (VSAN) SAN Routing for Any-to-Any Connectivity SAN 1 SAN 2 SAN 3 Storage Virtualization Optimal Utilization Tiered Storage Storage Compression Tier 1 Arrays Tier 2 Tier 3 Off-Site Storage SAN Extension over Distance SCSI Protocol Acceleration Data De-duplication Data Integrity and Encryption WAN Primary Storage Site Off-site Storage

Storage Media Encryption (SME) Data Stored with Data Integrity Field Tape Library Servers Storage Media Encryption (SME) Data Integrity for Data-at-Rest Add “Data Integrity Field” in Data Check for “Data Integrity Field” when reading from device Data Stored with Data Integrity Field CRC Checks on a per FC Frame Basis Data Integrity for Data-in-Motion Cisco MDS 9000

Migration to New Technologies Application Servers Enable SAN-based storage lifecycle management Driven by technology refresh Online data migration across heterogeneous arrays Network-hosted storage virtualization provides non-disruptive data migration Network-hosted storage virtualization provides high-performance migration capabilities Migrate multiple TBs of data per hour Data integrity checks Ensure integrity of migrated data on new array Cryptographically erase data on old array Data Migration Application I/O Data Migration Old Array New Array

SAN Security for Digital Collection Preservation Management Access Controls Data Integrity and Encryption SSHv2, SNMPv3, SSL Centralized AAA - RADIUS, TACACS+ Role Based Access Controls VSAN based RBAC IP ACLs Security of Data-at-Rest - Tapes and Disks Security for Data-in-Motion - IPSec for FCIP & iSCSI Device Authorization and Authentication Server and Target Access Controls Port Security Fabric Binding Host/Switch Authentication iSCSI CHAP Authentication VSANs Hardware Zoning LUN Zoning Read-only Zones

Summary Reduce the costs of long-term storage, including media and facilities: Fabric consolidation with large-scale SAN Directors, VSANs, SAN Routing Storage Virtualization Off-site Storage Provide Data Integrity CRC checks on a per frame basis Data Integrity for data-at-rest Enable migration to new technologies High performance data mobility Heterogeneous capability Preserves data integrity Robust and holistic security capabilities Management access controls Server and Target access controls Device-level authorization and authentication Data integrity and encryption of data-at-rest and data-in-motion LAN Clients Servers SAN Storage Devices SANs play a strategic role in storage architectures for digital collection preservation