© Copyright 2007 Instrumental, Inc. Slide 1 of 11 What Is Important in the Datapath Henry Newman Library of Congress Designing Storage Architectures Workshop.

Slides:



Advertisements
Similar presentations
Data Storage Solutions Module 1.2. Data Storage Solutions Upon completion of this module, you will be able to: List the common storage media and solutions.
Advertisements

Chapter 4 Storing Information in a Computer Peter Nortons Introduction to Computers.
Interactive lesson about operating system
Operating System.
Copyright © 2004 Pearson Education, Inc.. Chapter 13 Disk Storage, Basic File Structures, and Hashing.
Introduction to Storage Area Network (SAN) Jie Feng Winter 2001.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 7. Systems Software 1 System Software This software is used to provide the.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
COMPUTER APPLICATIONS Mr. Toscano Computer Concepts Lesson Objectives Students are introduced to the differences between computer software and computer.
Vorlesung Speichernetzwerke Teil 2 Dipl. – Ing. (BA) Ingo Fuchs 2003.
04/18/2007CSCI 315 Operating Systems Design1 Mass Storage Structure Notice: The slides for this lecture have been largely based on those accompanying the.
Introduction to Systems Architecture Kieran Mathieson.
Cs238 Lecture 3 Operating System Structures Dr. Alan R. Davis.
CS533 Concepts of Operating Systems Class 18 File Systems.
Management Information Systems Lection 02 CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
MIS 175 Spring Learning Objectives When you finish this chapter, you will: –Recognize major components of an electronic computer. –Understand how.
Designing Storage Architectures for Preservation Collections Library of Congress, September 17-18, 2007 Preservation and Access Repository Storage Architecture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
Imaging Informatics and PACS
Introducing Windows 7 Lesson 1. Objectives Define Windows 7 interface refinements Describe new features of Windows 7 Describe the six editions of Windows.
Anthony Atkins Digital Library and Archives VirginiaTech ETD Technology for Implementers Presented March 22, 2001 at the 4th International.
1 Input/Output. 2 Principles of I/O Hardware Some typical device, network, and data base rates.
Module 10 Configuring and Managing Storage Technologies.
Module 9 Review Questions 1. The ability for a system to continue when a hardware failure occurs is A. Failure tolerance B. Hardware tolerance C. Fault.
Suggested Exercise 9 Sarah Diesburg Operating Systems CS 3430.
Storage Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application software and.
CHAPTER 2 OPERATING SYSTEM OVERVIEW 1. Operating System Operating System Definition A program that controls the execution of application programs and.
N-Tier Client/Server Architectures Chapter 4 Server - RAID Copyright 2002, Dr. Ken Hoganson All rights reserved. OS Kernel Concept RAID – Redundant Array.
Operating System. Architecture of Computer System Hardware Operating System (OS) Programming Language (e.g. PASCAL) Application Programs (e.g. WORD, EXCEL)
Implementation Considerations Yonglei Tao. Components of Coding Standards 2  File header  file location, version number, author, project, update history.
1 © 2010 Overland Storage, Inc. © 2012 Overland Storage, Inc. Overland Storage The Storage Conundrum Neil Cogger Pre-Sales Manager.
COMP25212: Virtualization Learning Objectives: a)To describe aims of virtualization - in the context of similar aims in other software components b)To.
Databases March 14, /14/2003Implementation Review2 Goals for Database Architecture Changes Simplify hardware architecture Improve performance Improve.
Citrix MPS 3.0 Licensing Douglas A. Brown President
Unit R005: Understanding Computer Systems Introduction System Software Software (i.e., programs) used to control the hardware directly Used to run the.
Ocean Observatories Initiative OOI Cyberinfrastructure Life Cycle Objectives Review January 8-9, 2013 Tom O’Reilly Monterey Bay Aquarium Research Institute.
Redundant Array of Independent Disks.  Many systems today need to store many terabytes of data.  Don’t want to use single, large disk  too expensive.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Chapter 4 Information Technology in Business: Hardware.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
Clustering In A SAN For High Availability Steve Dalton, President and CEO Gadzoox Networks September 2002.
1 © Copyright 2007 EMC Corporation. All rights reserved. Library of Congress Designing Storage Architectures Workshop Hardware Kem Clawson CTO Federal.
Chapter 5 Input/Output 5.1 Principles of I/O hardware
Copyright © Curt Hill Disk Basics Structure and Characteristics of Secondary Storage.
A.Abhari CPS1251 Topic 1: Introduction to Computers Computer Hardware Computer components Connecting Computers Computer Software Operating System (OS)
Operating Systems COT 4600 – Fall 2009 Dan C. Marinescu Office: HEC 439 B Office hours: W, F 3:00-4:00 PM.
Copyright © Genetic Computer School 2008 Computer Systems Architecture SA 8- 0 Lesson 8 Secondary Management.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
© Copyright 2004 Instrumental, Inc I/O Types and Usage in DoD Henry Newman Instrumental, Inc/DOD HPCMP/DARPA HPCS May 24, 2004.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
ECE 456 Computer Architecture Lecture #9 – Input/Output Instructor: Dr. Honggang Wang Fall 2013.
SEPTEMBER 8, 2015 Computer Hardware 1-1. HARDWARE TERMS CPU — Central Processing Unit RAM — Random-Access Memory  “random-access” means the CPU can read.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
Cs506 First lecture. Materials Lecture note ELearning web site : Main text book : “Operating System Concepts”, 8 th edition,Auther:
System Components Operating System Services System Calls.
Chapter 3 Getting Started. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. Objectives To give an overview of the structure of a contemporary.
A Technical View of Risk Assessment Methods for Backup Systems Bradley Wong Life Sciences Consulting Tustin, CA – USA DIA/All Hands: 12 February 2015.
Slide Template for Module 4 Data Storage, Backup, and Security
CHAPTER 10: Computer Peripherals
Operating System.
Chapter 1: Introduction
Operating System Structure
Operating Systems What are they and why do we need them?
Introduction of Week 6 Assignment Discussion
Chapter 7.
Computer Fundamentals
Lecture 15 Reading: Bacon 7.6, 7.7
Presentation transcript:

© Copyright 2007 Instrumental, Inc. Slide 1 of 11 What Is Important in the Datapath Henry Newman Library of Congress Designing Storage Architectures Workshop September 2007 Henry Newman Library of Congress Designing Storage Architectures Workshop September 2007

Slide 2 of 11 Agenda Hardware Components Software Components Areas of Concern Hardware Components Software Components Areas of Concern

© Copyright 2007 Instrumental, Inc. Slide 3 of 11 Hardware Components What are the hardware components and the potential area of risk and change

Slide 4 of 11 What Hardware is in the datapath Server  CPUs, memory, PCIe bus, NIC,HBA/HCA Switch  Interconnect to storage and external network Disk based storage  RAID, Just a Bunch Of Disks (JBOD) connectivity issues Tape  Tapes and Libraries Future hardware storage technologies All of these impact cumulative service cost and replacement cost cycles -End of Life/Service (EOS/L) What about software? Server  CPUs, memory, PCIe bus, NIC,HBA/HCA Switch  Interconnect to storage and external network Disk based storage  RAID, Just a Bunch Of Disks (JBOD) connectivity issues Tape  Tapes and Libraries Future hardware storage technologies All of these impact cumulative service cost and replacement cost cycles -End of Life/Service (EOS/L) What about software?

© Copyright 2007 Instrumental, Inc. Slide 5 of 11 Software Components What are the software components and the potential area of risk and change

Slide 6 of 11 What Software is in the datapath Operating System  Operating systems change and are not necessarily compatible Per File Metadata  Home grown or package File systems affect storage management and performance (some of which affect hardware)  Storage HSMs, hardware impacts Device Drivers and firmware all over the place Future software storage technologies All of these impact cumulative costs based on service costs and replacement cost cycles - EOS/L What about hardware? Operating System  Operating systems change and are not necessarily compatible Per File Metadata  Home grown or package File systems affect storage management and performance (some of which affect hardware)  Storage HSMs, hardware impacts Device Drivers and firmware all over the place Future software storage technologies All of these impact cumulative costs based on service costs and replacement cost cycles - EOS/L What about hardware?

© Copyright 2007 Instrumental, Inc. Slide 7 of 11 Areas of Concern Lots of Worries

Slide 8 of 11 Migration How do we migrate hardware and software  Everything has a life; and technology changes requires almost constant migration  Constant migration to new more compact media is required- given floor space and data growth More important - What about our data and formats?  If PDF is only good for 25 years, how can we migrate to new formats without major work in software?  No framework as part of technology migration to migrate formats There seems to be a lack of integration between all of layers of software How do we change one component or (worse yet) move to a new system? How do we migrate hardware and software  Everything has a life; and technology changes requires almost constant migration  Constant migration to new more compact media is required- given floor space and data growth More important - What about our data and formats?  If PDF is only good for 25 years, how can we migrate to new formats without major work in software?  No framework as part of technology migration to migrate formats There seems to be a lack of integration between all of layers of software How do we change one component or (worse yet) move to a new system?

Slide 9 of 11 Data Reliability Silent data corruption  Undetected errors  Mis-corrected errors Per-file error detection and correction is required from file creation through the life of the file  Common and open error correction algorithms throughout the system Silent data corruption  Undetected errors  Mis-corrected errors Per-file error detection and correction is required from file creation through the life of the file  Common and open error correction algorithms throughout the system Undetectable Bit Error Rate (UDBER)

Slide 10 of 11 Standards Process Seem Disjointed No standards for  File systems  HSM policy  Per-file metadata Lots of different standards bodies:  T-10, T-11, T-13, IETF, SNIA, OpenGroup etc etc  T-10 DIF: Data Integrity Field can improve end-to-end reliability  If used No standards for error correction for each file No standards for  File systems  HSM policy  Per-file metadata Lots of different standards bodies:  T-10, T-11, T-13, IETF, SNIA, OpenGroup etc etc  T-10 DIF: Data Integrity Field can improve end-to-end reliability  If used No standards for error correction for each file

Slide 11 of 11 Operational Error Management Needed Collection, coordination and management of errors Proactive error management  For example many RAID vendors hide SMART data from system manager  Self-monitoring data provided by hard disks Frameworks to track and manage errors and warning throughout the system  Tracking things like data corruption and DIF errors (for example) Collection, coordination and management of errors Proactive error management  For example many RAID vendors hide SMART data from system manager  Self-monitoring data provided by hard disks Frameworks to track and manage errors and warning throughout the system  Tracking things like data corruption and DIF errors (for example)