An Introduction to the Mass Storage System Reference Model, Version 5

Size: px
Start display at page:

Download "An Introduction to the Mass Storage System Reference Model, Version 5"

Transcription

1 An Introduction to the Mass Storage System Reference Model, Version 5 Robert A. Coyne, Harry Hulen IBM Federal Systems Company Houston, Texas Abstract Brief histories of the IEEE Mass Storage System Reference Model and the IEEE Storage System Standards Working Group are presented. The Reference Model is explained in terms of layers of abstraction, including storage-container layers, mapping-service layers, and storage-sewice layers. The Need for Storage System Standards The history of storage system standards began with the desire for media interchange. Since systems were isolated and proprietary, the requirements were reasonably simple and various form factors and recording formats were standardized, usually after one vendor had gained a significant market presence. Later, logical formats for volume and file structure arose so higher-level semantic objects, such as ANSI labeled tapes, could be exchanged between sites. In the eighties, the IEEE Computer Society Mass Storage Systems and Technology Technical Committee attempted to bring some order to the confusion surrounding the evolving storage industry. The result was an unofficial Mass Storage System Reference Model [l, 21. Every offerer of a significant new commercial storage system in the last several years has used the language of the Reference Model to describe its function. Customers have specified compliance with the Mass Storage System Reference Model even though the IEEE has not approved it as a standard. Storage systems today are quite complex. They often include very expensive equipment and therefore must be shared. Operations and management are often labor intensive. Recent advances in storage system hardware, in particular robotic devices for controlling removable media and large, high-performance, network-attached disk arrays, are under exploited due to lack of systems software that enables sharing by large numbers of distributed clients. It is our hope and conviction that the process of developing standards for storage systems can speed the development of systems software for storage systems. Storage System Standards Working Group The IEEE P1244 Storage System Standards Working Group (IEEE SSSWG) was chartered in May 1990 to abstract the hardware and software components of existing and emerging storage systems and to develop standard software interfaces between these components. The goal of storage service standardization is the decomposition of a storage system into interoperable functional modules that vendors may offer as separate commercial products. The Working Group s ultimate goal is to develop interoperable standards that define the software interfaces and, in the distributed case, the associated protocols to each of the architectural modules identified in the Model. In this way, storage systems will become truly open systems, and competition for both standard software modules and storage devices delivered with compliant software interfaces will lead to higher quality and lower cost. The IEEE SSSWG has served as an important forum for users, developers, and researchers to come together to work on mass storage system issues. The first and perhaps most important accomplishment has been to get representatives from a greatly increased group of more than forty organizations to agree on the basic building blocks of a standard storage system architecture. The Mass Storage System Reference Model The IEEE SSSWG adopted Version 4 of the Reference Model as its technical base, and over the past two years has extended and adjusted the Reference Model to better meet the requirements of the storage community. This paper reflects current drafts of Version 5 [3]. The Model includes several noteworthy architectural features. First is the provision for location independence, one of a number of desirable transparencies that shield clients from the details of the storage system implementation. Clients access storage system objects using unique, system-oriented identifiers. Once issued, these identifiers are immutable. The location of storage system objects may change but the unique identifiers are all that any client must present for access. Another fundamental feature is the separation of control and data paths. The Reference Model architecture allows for physical separation between the logical data path, that transfers storage data directly between sources and sinks, and the logical storage control path, that carries control and status messages between clients and servers. In this way, the architecture enables separate optimization of both the data path, for high-bandwidth bulk transfers, and the /93 $ IEEE 47

2 Twelfth IEEE Svmoosium on Mass Storage Svstems control path, for small control and status messages. In addition, a physically-clustered storage system may employ a dedicated storage device control path for additional data security. The Reference Model separates the concept of file name from file access. By not coupling naming with access, multiple name servers can coexist in a single storage system, each supporting a different human-oriented name Space. The Working Group is chartered to consider storage systems of every scale, from personal computers to the largest, distributed supercomputer storage systems. It appears feasible to standardize a storage architecture that is scale-independent, with individual implementations tailored to their target scale. The Working Group is actively studying the diverse requirements of the entire range of existing and emerging storage systems, from small, stand-alone systems with simple, removable media through departmental file servers to centralized and distributed file servers on networks of supercomputers. Layers of Abstraction in Storage Systems The Mass Storage System Reference Model has not taken the form of a truly layered model such as the familiar OS1 models used in the discipline of communications. Nevertheless, there seems to be value in using the idea of layers to help convey an intuitive grasp of the relationship among elements of a model. There are several aspects of the Reference Model that can be presented in layers. There are also several aspects that appear to defy any attempt at layering as they cut across the more obvious layer boundaries. We will look briefly at three aspects of the Model that more or less fit the layered view and then deal with aspects of the Model that cut across layers. The Data Containment Hierarchy The storage system environment consists of servers and the data entities they manage. Figure 1 depicts the containment hierarchy ranging from the user s view of the data to the physical volume on which data is stored. The top two layers of the hierarchy represent the user s view of the data and are not part of the Reference Model. The top layer represents the data format, such as numbers, pixels, and text. The second layer represents the data organization, which may take the form of a full-featured database management system or file system. Below the data format and data organization is shown the storage system. The bitfile layer is simply a string of bits that are given a name and that can be stored and retrieved. Bitfile is a term that originated with the IEEE Mass Storage System Reference Model. Groups of bitfiles are organized into bitjze containers for the purpose of managing storage hierarchies. I Data Format 3 I Data Organization 1 I Bitfile 1 Bitfile Container Virtual Volume Physical Volume, Mounted State Physical Volume, Repository State Figure I. Data Containment Hierarchy A virtual volume is a collection of contiguous virtual storage space. Virtual volumes are mapped onto physical volumes. A large virtual volume may span several physical volumes, or a small one may share a physical volume with other virtual volumes. For most purposes, the client should only need to be aware of the virtual volumes, leaving the mapping of virtual volumes to physical volumes and the management of physical volumes to the storage system. This transparency shields the user from the need to keep track of the size of individual physical volumes, and it allows the storage system to handle different sizes of physical volumes and to introduce new sizes without changing the client. The physical volume may be removable or permanently mounted. In the case of removable media, there are two states that are important enough to be shown as separate layers in Figure 1. In mounted state, a physical volume becomes identified with a disk drive, a tape transport, a memory socket, or other I/O device, and thereby becomes accessible by the Mover function. The I/O device and the physical volume become bound together into a single entity having both a device identifier and a physical volume identifier. For non-removable media, the mounted state is the only possible state. For removable media, ignoring the state of chaos where a physical volume is on a cluttered table or in a briefcase, the other important state is the state of being in an assigned location. The location may be a numbered place on a shelf where it is stored and retrieved by humans, or the location may be a slot in an automated repository. In this repository state, a physical volume also has two identifiers, the physical volume identifier and the slot identifier. The volume is accessible by a person or by a robotic device that moves the entire volume from one state to another. However, the data is obviously not accessible from the repository state.

3 Storage Service Layers We now come to a layered view of the storage services that comprise the Reference Model. The Reference Model uses a client-server paradigm to describe these entities. A client is a consumer of services and a server is a provider of services. A server can act as a client and request services from other entities. In a strictly-layered reference model such as the OS1 communications model, the user acts as ultimate client and seeks services from the top service layer. This layer seeks services from the next layer, and so on down through the layers in strict sequence. The Mass Storage System Reference Model is not that well behaved; there is some jumping around between layers. However, there is a general direction to the flow and it is useful to discuss the client-server relationships in the order shown in Figure 2. The top layer represents the Clients of a storage system. A Client may be an application that directly accesses storage services. However, there will frequently be an agent or access broker such as a file system or database management system between the application and the storage system. If there is an access broker, the application may not see the storage system at all; it will be totally encapsulated by the access broker. For example, if the access broker is a Unix file system or some entity that would appear to be a Unix file system to the application, then the application only has to know the syntax and rules of a Unix file system. However, the entity providing the user view of a Unix file system has to be very much involved in the syntax and rules of the storage system, for such is the role of an access broker. The layers below the Client have no knowledge of whether the application is using an access broker or accessing the storage system directly. For this reason, the Reference Model does not distinguish between types of Clients. Client (application) Client (access broker) Figure 2. Layers of Storage Services The Bitfile Server manages the storage space on a collection of virtual volumes and presents bitfiles to its clients. Thus, the Bitfile Server converts access requests for bitfiles into logical requests for storage services. The Bitfile Server supports the functions of bitfile migration and replication. Migration refers to the movement of bitfiles, either partially or fully, from one storage medium or location to another. Replication is the duplication of bitfiles at multiple storage locations. These concepts are intertwined as both require managing multiple copies of storage objects in such a way as to appear to be a single COPY. When bitfile migration occurs from one media type to another, certain storage access semantics may become visible to clients. Some clients will wish to be shielded from the knowledge that their data has migrated from disk to tape and will suffer some delay as their data is cached to disk before random accesses. Other clients will be cognizant of the fact that their data is now resident on tape and sequential access is completely adequate for their access patterns. The Bitfile Server coordinates shared access to a bitfile by independent clients. It also provides sufficient semantics to allow clients to determine when their write requests have been committed to stable storage and to optimize requests for sequential versus random access media. The Storage Server is essentially a virtual volume manager. The Storage Server collects labeled physical volume resources and constructs and presents virtual volumes to its clients. It performs this function by mapping access operations from virtual volumes to these non-composite physical volumes. The Storage Server will compose collections of physical or virtual volumes to form such entities as volume sets, stripe sets, RAID arrays, mirror sets and replica suites. Such sets of virtual volumes may have an arbitrary hierarchical structure built from the base volumes. The Storage Server supports reconfiguration of virtual volumes onto different base volumes to allow migration of volumes and extension of existing virtual volumes. The Storage Server requests the mounting and dismounting of physical volumes to satisfy the access requests of its clients to virtual volumes. A virtual volume is not controlled to assure consistency across access by multiple clients. The next layer shown in Figure 2 is an entity which has multiple roles called the Mover. The Mover, as the name implies, is involved in moving data; however, the Mover also serves as a physical device manager. As physical device manager, a Mover encapsulates each device, and all operations on a device are performed through requests to a Mover. The Mover is the software component that knows the detailed inner workings of the storage device and its internal control connections. The external interface to the Mover includes a set of generic device operations that are adequate for reading, writing, and positioning both random 49

4 and sequential-access storage devices. In a conventional host-based storage system, a Mover can be thought of as a specialized I/O driver. In a distributed system, the Mover functions may take the form of an intelligent control unit. We will return to our discussion of the Mover in the next section, when we will look at its role in moving data. The Physical Volume Library (PVL) is a generalization of an enterprise-wide tape management system that tracks the current locations and status of all removable volumes. The PVL controls the actual mounting and dismounting of volumes. It maintains mount queues and verifies internal volume labels. It globally optimizes the use of drives, tracks the life-cycle state of cartridges and maintains scratch pools. To support moving physical volumes around in the storage system without fear of name conflicts, the Reference Model recommends (but does not require) a single PVL. In a very large or widely-distributed storage system, a PVL may be divided into branch libraries which can operate independently under a single PVL-wide policy. The Physical Volume Repository (PVR) maintains the mapping of volume identifiers to slots and drives, optimizes the apparent mount times by staging, and enforces various management and security attributes. Each PVR manages a single repository or a set of connected repositories. A PVR may employ either a mechanical robot or a human operator to perform mounts. The PVR operates under the control of a PVL. There can be any number of PVRs. The Mover, Physical Volume Library, and Physical Volume Repository together form the physical storage system. Although the storage services in Figure 2 are depicted as layers, an important feature of the Reference Model is the ability of a client to go directly to lower level servers. This is particularly important for power clients such as a real-time application or a database manager. Such a client may be designed to reach well down into the storage system and request services of the physical storage system servers such as allocating space or pre-loading a volume of media. Mapping Service Layers Originally, the Reference Model recognized a name server but no other mapping services. It is now recognized that mapping services are a key part of any future storage system standard. Consequently, a subcommittee has been established within the IEEE SSSWG to develop standards for mapping services. policy. Name services are not standardized in the Model because the universe of entities that can act as name servers, from hierarchical file systems through associative databases, prevent standardization of the naming semantics. One of the first proposals of the mapping committee has been the definition of a Storage System Object Identifier, or SSOZD. The Object in SSOID can be a bitfile, a virtual volume, or any of the layers of storage described above; or it can be any of a number of components to be described shortly, such as a Storage Server or Physical Volume Repository. The SSOID may be one of the first standards to emerge from the IEEE SSSWG. The top level of mapping services shown in Figure 3 is the Name Server. This level is recognized as essential by the Reference Model, but no attempt will be made to define the mapping function, other than to define the structure of the SSOID and the basic function interface. The specifics of the Name Server are left to the user or application developer. It may be as simple as a file or as complex as a full fledged data base management system. The second layer represents the Location Server. From the SSOID, the Client of the storage system will use this service to determine where to find the storage services that manage the bitfile. Also from the SSOID, the user will have an internal, unique, and stable handle for accessing the desired bitfile. From this, the Bitfile Server will be able to determine the location of the virtual volume to which the bitfile is assigned. The lower layers map the virtual volume to the physical volume, and for removable media, the physical volume to a location within the repository. I Name Server (name): SSOID I Location Server (SSOID): Service Location Bitfile Server (SSOID): Virtual Volume Location Storage Server (Virtual Volume ID): Physical Volume ~ ~~ Physical Volume Library (Physical Volume ID): Repository Slot Figure 3. Layers of Mapping Services The Mapping Services Subcommittee has proposed that the location and name server(s) operate within a storage system domain. A storage system domain contains one logical location server, a common authentication mechanism and security policy, and a common administration 50, _,..... ll..l-.,~-,. -

5 Twelfth IEEE Svmuosium on Mass Storage Svstems Components Common to Several Layers The Reference Model contains several components that cut across the layers previously described. These components are the Mover, Security, and Storage System Management. The Mover The Mover was introduced in an earlier section in its role as physical device manager. The Mover s other function is to manage the movement of data. In a host-based system, these two functions can fit together easily into a single software module. In a distributed system, however, the Mover will be distributed. A portion of the Mover must be physically co-resident with the storage device and network connections it is controlling. At the Client end, another portion of the Mover is the function that manages delivery of data to the Client s memory. The Mover is a very general function that must be embedded into any client or server that needs to be a source or sink for data. The Mover is one of the principal means by which control functions and data movement functions are separated. This separation may be a physical separation, or it may be a virtual overlay on a physically integrated communications architecture. Distributed systems, particularly those intended for high performance, may be designed such that the Mover is associated with a high speed data network which is physically separate from the control network. On the other hand, in more centralized storage systems, the Mover and control functions may share the same network or the same library of standard communication services. Security Security is divided into three separately implementable components: Authentication, Authorization, and Enforcement. Authentication establishes the identity of a client anfflor server. Authorization calculates the access rights of a principal to a service, while Enforcement applies the results of this calculation at the point where access is actually requested. By separating Authorization and Enforcement, different Authorization models can coexist in the same environment and one module may transfer authorization information to another for enforcement. An example implementation of this security architecture might employ encrypted capability tickets issued by a security server to authenticated clients who then present these tickets to the appropriate modules for service. Each server in the Model would include common interfaces for the three security functions, and each service request would automatically be routed through the appropriate Authentication, Authorization, and Enforcement functions before the service would act on the request. Storage System Management Storage System Management is the collection of functions concerned with control, coordination, monitoring, performance and utilization of the storage system. These functions are typically site-dependent and involve human judgment. Standards are critical in managing a large, distributed collection of heterogeneous storage resources because of the need to exchange management information and provide predictable and consistent control. The Model management framework does not attempt to define the internal facilities and policies that are needed. Instead, the Model provides a generalized framework upon which different storage management subsystems and applications may be built. The functional areas of management cover a broad array of topics. Fault management encompasses the monitoring, detection, isolation, and correction of abnormal operations and components. Configuration management is concerned with initializing, operating, reconfiguring, and shutting down the storage system and its components. Security management determines and implements the security policies of the storage system and monitors the storage system for attempted violations. Accounting management tracks the resource consumption of storage system clients, charges for storage use, and denies resources if accounts are overdrawn. Performance management evaluates the long-term performance of the system through summary statistics and adjusts the use of the system components to be most efficient and cost-effective. Several System Management functions have been identified, including migration of storage objects to a cheaper level in the storage hierarchy, defragmentation and repacking of bitfiles and volumes, initialization, addition, and deletion of new storage resources, logging of relevant storage events, alarms on various types of errors and other events, backup, bitfile recovery, system recovery, and capacity planning. An intelligent operations agent will be a necessity to manage the large, distributed storage systems that are being planned today, as these systems will be implemented on multiple, independent platforms with the attendant management complexity

6 A Composite View of the Model Now we will put Figures 1 through 3 together into a single conceptual view of the Reference Model. The three layered aspects of the Model, together with the cross-layer aspects, are shown together in Figure 4. The boxes on the left side of the figure represent the data containment hierarchy, the right side represents the layers of mapping services, and the center tower represents the storage service layers. Running vertically behind the services are the cross-layer functions: The Mover, Security, and Storage System Management. The intersections of the cross-layer functions and the storage services are not intended to represent the flow of data but represent points of contact and interaction between the cross-layer functions and the storage services. Two of the cross-layer functions, Storage System Management and Authentication, Authorization, and Enforcement, interface with all service layers. The Mover is involved with all layers of service except the Physical Volume Repository. The Mover, as shown in Figure 4, has a branch reaching over to the physical volume layer. This branch represents the Mover's role as physical device manager. Client Application Access Broker Ph sical VoYume a Figure 4. A Layered View of the Reference Model 52

7 A Traditional View of the Reference Model Readers familiar with previous versions of the Reference Model may find the layered view of the Model a departure from the traditional way the Reference Model has been depicted. A more traditional view of the Model is therefore offered as Figure 5. This representation emphasizes the client-server aspect of the Reference Model, the separation of control and data, and the ability of the Client to access all layers of service directly. Across the center of the figure, the Mover is shown as owning the storage devices and providing data paths between the devices and the Client and various servers. The heavy black lines emphasize that all data flow is through the Mover, whether centralized or distributed. The Client, which we recall may be an application or an access broker, has a primary control flow to the Bitfile Server which, in turn, has a control flow connection to the Storage Server and the Physical Storage System. This corresponds to the layered view previously described. However, there are optional control paths between the Client and the lower level servers, emphasizing the ability of the Model to support specialized clients with demiding functional and &&ormake requirements. / Storage System Management / Location Fl - Optional Control Flow Control Flow (Client to Server) Data Flow (Bidirectional) / Figure 5. A Conventional View of the Reference Model, Version 5 Acknowledgment The authors wish to thank the members of the IEEE Storage System Standards Working Group, especially those whose contributions to the Reference Model have found their way into this paper and those whose contributions have been simplified and freely interpreted by the authors. [I] [21 References Stephen W. Miller. A Reference Model for Mass Storage Systems. Advances In Computers, 27: , Sam Coleman and Stephen W. Miller, editors. Mass Storage System Reference Model: Version 4. IEEE Technical Committee on Mass Storage Systems and Technology, May [31 Sam Coleman and David Isaac, editors. Mass Storage Reference Model, Version 5, Draft 0.3. A working document of the IEEE Storage System Standards Working Group.

A GPFS Primer October 2005

A GPFS Primer October 2005 A Primer October 2005 Overview This paper describes (General Parallel File System) Version 2, Release 3 for AIX 5L and Linux. It provides an overview of key concepts which should be understood by those

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this

More information

Solution Brief: Archiving with Harmonic Media Application Server and ProXplore

Solution Brief: Archiving with Harmonic Media Application Server and ProXplore Solution Brief: Archiving with Harmonic Media Application Server and ProXplore Summary Harmonic Media Application Server (MAS) provides management of content across the Harmonic server and storage infrastructure.

More information

Objectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture

Objectives. Architectural Design. Software architecture. Topics covered. Architectural design. Advantages of explicit architecture Objectives Architectural Design To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

Architectural Design

Architectural Design Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

Distributed Computing Environment (DCE)

Distributed Computing Environment (DCE) Distributed Computing Environment (DCE) Distributed Computing means computing that involves the cooperation of two or more machines communicating over a network as depicted in Fig-1. The machines participating

More information

Course 40045A: Microsoft SQL Server for Oracle DBAs

Course 40045A: Microsoft SQL Server for Oracle DBAs Skip to main content Course 40045A: Microsoft SQL Server for Oracle DBAs - Course details Course Outline Module 1: Database and Instance This module provides an understanding of the two major components

More information

Minsoo Ryu. College of Information and Communications Hanyang University.

Minsoo Ryu. College of Information and Communications Hanyang University. Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based

More information

XenData Product Brief: XenData6 Server Software

XenData Product Brief: XenData6 Server Software XenData Product Brief: XenData6 Server Software XenData6 Server is the software that runs the XenData SX-10 Archive Appliance and the range of SX-520 Archive Servers, creating powerful solutions for archiving

More information

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved. 1 Using patented high-speed inline deduplication technology, Data Domain systems identify redundant data as they are being stored, creating a storage foot print that is 10X 30X smaller on average than

More information

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process

More information

Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila

Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila Engr. M. Fahad Khan Lecturer Software Engineering Department University Of Engineering & Technology Taxila Software Design and Architecture Software Design Software design is a process of problem-solving

More information

IBM Best Practices Working With Multiple CCM Applications Draft

IBM Best Practices Working With Multiple CCM Applications Draft Best Practices Working With Multiple CCM Applications. This document collects best practices to work with Multiple CCM applications in large size enterprise deployment topologies. Please see Best Practices

More information

Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards

Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards What to Architect? How to Architect? IEEE Goals and Objectives Chartered by IEEE Software Engineering Standards Committee to: Define

More information

Storage Standards Work

Storage Standards Work 1 Storage Standards Work Joel Williams October 15, 1996 http://www.ses-inc.com joel.williams@ses-inc.com 2 Standards Participation File-level Metadata for Portability of Sequential Storage (FMP) Study

More information

An Introduction to GPFS

An Introduction to GPFS IBM High Performance Computing July 2006 An Introduction to GPFS gpfsintro072506.doc Page 2 Contents Overview 2 What is GPFS? 3 The file system 3 Application interfaces 4 Performance and scalability 4

More information

Application Oriented Networks: An SOA Perspective

Application Oriented Networks: An SOA Perspective Oriented s: An SOA Perspective www.thbs.com Introduction Service Oriented Architecture is the hot topic of discussion in IT circles today. So much so, in fact, that SOA is being seen by many as the future

More information

Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC)

Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC) Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC) Manageability and availability for Oracle RAC databases Overview Veritas InfoScale Enterprise for Oracle Real Application Clusters

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

Establishing the overall structure of a software system

Establishing the overall structure of a software system Architectural Design Establishing the overall structure of a software system Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 13 Slide 1 Objectives To introduce architectural design and

More information

RealTime. RealTime. Real risks. Data recovery now possible in minutes, not hours or days. A Vyant Technologies Product. Situation Analysis

RealTime. RealTime. Real risks. Data recovery now possible in minutes, not hours or days. A Vyant Technologies Product. Situation Analysis RealTime A Vyant Technologies Product Real risks Data recovery now possible in minutes, not hours or days RealTime Vyant Technologies: data recovery in minutes Situation Analysis It is no longer acceptable

More information

XenData Product Brief: SX-550 Series Servers for LTO Archives

XenData Product Brief: SX-550 Series Servers for LTO Archives XenData Product Brief: SX-550 Series Servers for LTO Archives The SX-550 Series of Archive Servers creates highly scalable LTO Digital Video Archives that are optimized for broadcasters, video production

More information

A Simple Mass Storage System for the SRB Data Grid

A Simple Mass Storage System for the SRB Data Grid A Simple Mass Storage System for the SRB Data Grid Michael Wan, Arcot Rajasekar, Reagan Moore, Phil Andrews San Diego Supercomputer Center SDSC/UCSD/NPACI Outline Motivations for implementing a Mass Storage

More information

Categorizing Migrations

Categorizing Migrations What to Migrate? Categorizing Migrations A version control repository contains two distinct types of data. The first type of data is the actual content of the directories and files themselves which are

More information

The International Intelligent Network (IN)

The International Intelligent Network (IN) The International Intelligent Network (IN) Definition In an intelligent network (IN), the logic for controlling telecommunications services migrates from traditional switching points to computer-based,

More information

Lecture 1. Chapter 6 Architectural design

Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process

More information

IBM 3850-Mass storage system

IBM 3850-Mass storage system BM 385-Mass storage system by CLAYTON JOHNSON BM Corporation Boulder, Colorado SUMMARY BM's 385, a hierarchical storage system, provides random access to stored data with capacity ranging from 35 X 1()9

More information

Architectural Design. Topics covered. Architectural Design. Software architecture. Recall the design process

Architectural Design. Topics covered. Architectural Design. Software architecture. Recall the design process Architectural Design Objectives To introduce architectural design and to discuss its importance To explain the architectural design decisions that have to be made To introduce three complementary architectural

More information

Chapter 6 Architectural Design

Chapter 6 Architectural Design Chapter 6 Architectural Design Chapter 6 Architectural Design Slide 1 Topics covered The WHAT and WHY of architectural design Architectural design decisions Architectural views/perspectives Architectural

More information

Course Description. Audience. Prerequisites. At Course Completion. : Course 40074A : Microsoft SQL Server 2014 for Oracle DBAs

Course Description. Audience. Prerequisites. At Course Completion. : Course 40074A : Microsoft SQL Server 2014 for Oracle DBAs Module Title Duration : Course 40074A : Microsoft SQL Server 2014 for Oracle DBAs : 4 days Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize

More information

White paper ETERNUS CS800 Data Deduplication Background

White paper ETERNUS CS800 Data Deduplication Background White paper ETERNUS CS800 - Data Deduplication Background This paper describes the process of Data Deduplication inside of ETERNUS CS800 in detail. The target group consists of presales, administrators,

More information

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration

It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration It s Time for WAN Optimization to Evolve to Meet the Needs of File Collaboration By Zeus Kerravala, Founder and Principal Analyst with ZK Research Contents Introduction: Effective File Collaboration Is

More information

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz

AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz AOSA - Betriebssystemkomponenten und der Aspektmoderatoransatz Results obtained by researchers in the aspect-oriented programming are promoting the aim to export these ideas to whole software development

More information

iscsi Technology: A Convergence of Networking and Storage

iscsi Technology: A Convergence of Networking and Storage HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...

More information

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information

Chapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design

Chapter 6 Architectural Design. Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered ² Architectural design decisions ² Architectural views ² Architectural patterns ² Application architectures 2 Software architecture ² The design

More information

Data Movement & Tiering with DMF 7

Data Movement & Tiering with DMF 7 Data Movement & Tiering with DMF 7 Kirill Malkin Director of Engineering April 2019 Why Move or Tier Data? We wish we could keep everything in DRAM, but It s volatile It s expensive Data in Memory 2 Why

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.1 for Windows brings advanced online storage management to Microsoft Windows Server environments,

More information

2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold.

2.0.3 attributes: A named property of a class that describes the range of values that the class or its instances (i.e., objects) may hold. T0/04-023 revision 2 Date: September 06, 2005 To: T0 Committee (SCSI) From: George Penokie (IBM/Tivoli) Subject: SAM-4: Converting to UML part Overview The current SCSI architecture follows no particular

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Veritas Storage Foundation 5.0 for Windows brings advanced online storage management to Microsoft Windows Server environments.

More information

Data Domain OpenStorage Primer

Data Domain OpenStorage Primer White Paper Data Domain OpenStorage Primer Abstract Data Domain s support for Symantec NetBackup OpenStorage enables the use of disk as disk, eliminating the need to emulate tape drives, tape cartridges,

More information

10 Things to expect from a DB2 Cloning Tool

10 Things to expect from a DB2 Cloning Tool 10 Things to expect from a DB2 Cloning Tool This document gives a brief overview of functionalities that can be expected from a modern DB2 cloning tool. The requirement to copy DB2 data becomes more and

More information

SYSTEM UPGRADE, INC Making Good Computers Better. System Upgrade Teaches RAID

SYSTEM UPGRADE, INC Making Good Computers Better. System Upgrade Teaches RAID System Upgrade Teaches RAID In the growing computer industry we often find it difficult to keep track of the everyday changes in technology. At System Upgrade, Inc it is our goal and mission to provide

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Chapter 14: Mass-Storage Systems

Chapter 14: Mass-Storage Systems Chapter 14: Mass-Storage Systems Disk Structure Disk Scheduling Disk Management Swap-Space Management RAID Structure Disk Attachment Stable-Storage Implementation Tertiary Storage Devices Operating System

More information

Address Accessible Memories. A.R. Hurson Department of Computer Science Missouri University of Science & Technology

Address Accessible Memories. A.R. Hurson Department of Computer Science Missouri University of Science & Technology Address Accessible Memories A.R. Hurson Department of Computer Science Missouri University of Science & Technology 1 Memory System Memory Requirements for a Computer An internal storage medium to store

More information

Executive Summary. Methodology:

Executive Summary. Methodology: Executive Summary The Data Archiving product/technology evaluation team began meeting in September 2014 and concluded work in March 2015. The team met approximately seven times during that period and compiled

More information

data dependence Data dependence Structure dependence

data dependence Data dependence Structure dependence data dependence Structure dependence If the file-system programs are affected by change in the file structure, they exhibit structuraldependence. For example, when we add dateof-birth field to the CUSTOMER

More information

Contemporary Design. Traditional Hardware Design. Traditional Hardware Design. HDL Based Hardware Design User Inputs. Requirements.

Contemporary Design. Traditional Hardware Design. Traditional Hardware Design. HDL Based Hardware Design User Inputs. Requirements. Contemporary Design We have been talking about design process Let s now take next steps into examining in some detail Increasing complexities of contemporary systems Demand the use of increasingly powerful

More information

Veritas Storage Foundation for Oracle RAC from Symantec

Veritas Storage Foundation for Oracle RAC from Symantec Veritas Storage Foundation for Oracle RAC from Symantec Manageability, performance and availability for Oracle RAC databases Data Sheet: Storage Management Overviewview offers a proven solution to help

More information

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard

iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard iscsi Technology Brief Storage Area Network using Gbit Ethernet The iscsi Standard On February 11 th 2003, the Internet Engineering Task Force (IETF) ratified the iscsi standard. The IETF was made up of

More information

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries

More information

The Need for a Terminology Bridge. May 2009

The Need for a Terminology Bridge. May 2009 May 2009 Principal Author: Michael Peterson Supporting Authors: Bob Rogers Chief Strategy Advocate for the SNIA s Data Management Forum, CEO, Strategic Research Corporation and TechNexxus Chair of the

More information

Lecture 9: MIMD Architectures

Lecture 9: MIMD Architectures Lecture 9: MIMD Architectures Introduction and classification Symmetric multiprocessors NUMA architecture Clusters Zebo Peng, IDA, LiTH 1 Introduction A set of general purpose processors is connected together.

More information

Physical Storage Media

Physical Storage Media Physical Storage Media These slides are a modified version of the slides of the book Database System Concepts, 5th Ed., McGraw-Hill, by Silberschatz, Korth and Sudarshan. Original slides are available

More information

1 Overview of Database Management

1 Overview of Database Management 1 Overview of Database Management 1.1 Data, information and knowledge 1.1.1 Data Data is/are the facts of the World. For example, take yourself. You may be 5ft tall, have brown hair and blue eyes. All

More information

Fundamentals of STEP Implementation

Fundamentals of STEP Implementation Fundamentals of STEP Implementation David Loffredo loffredo@steptools.com STEP Tools, Inc., Rensselaer Technology Park, Troy, New York 12180 A) Introduction The STEP standard documents contain such a large

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

Current Topics in OS Research. So, what s hot?

Current Topics in OS Research. So, what s hot? Current Topics in OS Research COMP7840 OSDI Current OS Research 0 So, what s hot? Operating systems have been around for a long time in many forms for different types of devices It is normally general

More information

Rio-2 Hybrid Backup Server

Rio-2 Hybrid Backup Server A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject

More information

Defining OAIS requirements by Deconstructing the OAIS Reference Model Date last revised: August 28, 2005

Defining OAIS requirements by Deconstructing the OAIS Reference Model Date last revised: August 28, 2005 Defining OAIS requirements by Deconstructing the OAIS Reference Model Date last revised: August 28, 2005 This table includes text extracted directly from the OAIS reference model (Blue Book, 2002 version)

More information

Application generators: a case study

Application generators: a case study Application generators: a case study by JAMES H. WALDROP Hamilton Brothers Oil Company Denver, Colorado ABSTRACT Hamilton Brothers Oil Company recently implemented a complex accounting and finance system.

More information

VERITAS Storage Foundation 4.0 TM for Databases

VERITAS Storage Foundation 4.0 TM for Databases VERITAS Storage Foundation 4.0 TM for Databases Powerful Manageability, High Availability and Superior Performance for Oracle, DB2 and Sybase Databases Enterprises today are experiencing tremendous growth

More information

Introduction 1.1 SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS

Introduction 1.1 SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS 1 Introduction The purpose of this chapter is to convey the basic idea underlying this book. To this end we will first describe conventional server-centric IT architecture and sketch out its limitations

More information

What a BACnet system looks like and how it can be used generally depends. By Roland Laird

What a BACnet system looks like and how it can be used generally depends. By Roland Laird This article was published in ASHRAE Journal, November 2009. Copyright 2009 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. Posted at www.ashrae.org. This article may not

More information

Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview

Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview Published by National Electrical Manufacturers Association 1300 N. 17th Street Rosslyn, Virginia 22209 USA Copyright

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

IBM Compose Managed Platform for Multiple Open Source Databases

IBM Compose Managed Platform for Multiple Open Source Databases IBM Compose Managed Platform for Multiple Source Databases Source for Source for Data Layer Blueprint with Compose Source for Comprehensive Catalogue for Simplified Scoping Scalable Platform for FutureProof

More information

The Service Availability Forum Platform Interface

The Service Availability Forum Platform Interface The Service Availability Forum Platform Interface The Service Availability Forum develops standards to enable the delivery of continuously available carrier-grade systems with offthe-shelf hardware platforms

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition.

Distributed Systems Principles and Paradigms. Chapter 01: Introduction. Contents. Distributed System: Definition. Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Version: February 21, 2011 1 / 26 Contents Chapter 01: 02: Architectures

More information

Distributed Systems Principles and Paradigms. Chapter 01: Introduction

Distributed Systems Principles and Paradigms. Chapter 01: Introduction Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 01: Introduction Version: October 25, 2009 2 / 26 Contents Chapter

More information

Brendan Lelieveld-Amiro, Director of Product Development StorageQuest Inc. December 2012

Brendan Lelieveld-Amiro, Director of Product Development StorageQuest Inc. December 2012 Automated archiving using IBM Tape Libraries and StorageQuest Archive Manager Automated archiving made easy using volume spanning with StorageQuest Archive Manager and an IBM Tape Library Brendan Lelieveld-Amiro,

More information

Databases and Database Systems

Databases and Database Systems Page 1 of 6 Databases and Database Systems 9.1 INTRODUCTION: A database can be summarily described as a repository for data. This makes clear that building databases is really a continuation of a human

More information

MASS-STORAGE STRUCTURE

MASS-STORAGE STRUCTURE UNIT IV MASS-STORAGE STRUCTURE Mass-Storage Systems ndescribe the physical structure of secondary and tertiary storage devices and the resulting effects on the uses of the devicesnexplain the performance

More information

Chapter 8 Virtual Memory

Chapter 8 Virtual Memory Operating Systems: Internals and Design Principles Chapter 8 Virtual Memory Seventh Edition William Stallings Operating Systems: Internals and Design Principles You re gonna need a bigger boat. Steven

More information

hot plug RAID memory technology for fault tolerance and scalability

hot plug RAID memory technology for fault tolerance and scalability hp industry standard servers april 2003 technology brief TC030412TB hot plug RAID memory technology for fault tolerance and scalability table of contents abstract... 2 introduction... 2 memory reliability...

More information

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN. Chapter 1. Introduction DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 1 Introduction Modified by: Dr. Ramzi Saifan Definition of a Distributed System (1) A distributed

More information

Evaluator Group Inc. Executive Editor: Randy Kerns

Evaluator Group Inc. Executive Editor: Randy Kerns Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright

More information

1 Quantum Corporation 1

1 Quantum Corporation 1 1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual

More information

DISTRIBUTED TRANSACTION PROCESSING STANDARDS AND THEIR APPLICATIONS

DISTRIBUTED TRANSACTION PROCESSING STANDARDS AND THEIR APPLICATIONS CITR TECHNICAL JOURNAL VOLUME 1 41 DISTRIBUTED TRANSACTION PROCESSING STANDARDS AND THEIR APPLICATIONS GRAHAM CHEN Abstract The OSI Standards committee (ISO SC21 Working Group 8) has defined the distributed

More information

Module 13: Secondary-Storage

Module 13: Secondary-Storage Module 13: Secondary-Storage Disk Structure Disk Scheduling Disk Management Swap-Space Management Disk Reliability Stable-Storage Implementation Tertiary Storage Devices Operating System Issues Performance

More information

Mobile and Heterogeneous databases Distributed Database System Transaction Management. A.R. Hurson Computer Science Missouri Science & Technology

Mobile and Heterogeneous databases Distributed Database System Transaction Management. A.R. Hurson Computer Science Missouri Science & Technology Mobile and Heterogeneous databases Distributed Database System Transaction Management A.R. Hurson Computer Science Missouri Science & Technology 1 Distributed Database System Note, this unit will be covered

More information

Operating Systems. Operating Systems

Operating Systems. Operating Systems The operating system defines our computing experience. It is the first software we see when we turn on the computer, and the last software we see when the computer is turned off. It's the software that

More information

IBM Tivoli Storage Manager for Windows Version Installation Guide IBM

IBM Tivoli Storage Manager for Windows Version Installation Guide IBM IBM Tivoli Storage Manager for Windows Version 7.1.8 Installation Guide IBM IBM Tivoli Storage Manager for Windows Version 7.1.8 Installation Guide IBM Note: Before you use this information and the product

More information

Technology Insight Series

Technology Insight Series IBM ProtecTIER Deduplication for z/os John Webster March 04, 2010 Technology Insight Series Evaluator Group Copyright 2010 Evaluator Group, Inc. All rights reserved. Announcement Summary The many data

More information

PRIMEPOWER ARMTech Resource Management Provides a Workload Management Solution

PRIMEPOWER ARMTech Resource Management Provides a Workload Management Solution PRIMEPOWER ARMTech Resource Management Provides a Workload Management Solution A D.H. Brown Associates, Inc. White Paper Prepared for Fujitsu This document is copyrighted by D.H. Brown Associates, Inc.

More information

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (CRC)

More information

BRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT

BRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT - 1 Mobile Data Management: Mobile Transactions - Reporting and Co Transactions Kangaroo Transaction Model - Clustering Model Isolation only transaction 2 Tier Transaction Model Semantic based nomadic

More information

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Contents Chapter 1 About in this guide... 4 What's in this guide... 4 Documents related to NetBackup in highly available environments... 5 Chapter 2 NetBackup protection against single points of failure...

More information

Software Engineering

Software Engineering Software Engineering Engr. Abdul-Rahman Mahmood MS, MCP, QMR(ISO9001:2000) Usman Institute of Technology University Road, Karachi armahmood786@yahoo.com alphasecure@gmail.com alphapeeler.sf.net/pubkeys/pkey.htm

More information

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1 Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 01 (version September 5, 2007) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20.

More information

General Objective:To understand the basic memory management of operating system. Specific Objectives: At the end of the unit you should be able to:

General Objective:To understand the basic memory management of operating system. Specific Objectives: At the end of the unit you should be able to: F2007/Unit6/1 UNIT 6 OBJECTIVES General Objective:To understand the basic memory management of operating system Specific Objectives: At the end of the unit you should be able to: define the memory management

More information

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

VERITAS Volume Replicator. Successful Replication and Disaster Recovery VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1

More information

Executive Summary. The Need for Shared Storage. The Shared Storage Dilemma for the SMB. The SMB Answer - DroboElite. Enhancing your VMware Environment

Executive Summary. The Need for Shared Storage. The Shared Storage Dilemma for the SMB. The SMB Answer - DroboElite. Enhancing your VMware Environment Executive Summary The Need for Shared Storage The Shared Storage Dilemma for the SMB The SMB Answer - DroboElite Enhancing your VMware Environment Ideal for Virtualized SMB Conclusion Executive Summary

More information

OOI CyberInfrastructure Architecture & Design

OOI CyberInfrastructure Architecture & Design OOI CI Architecture & Design Integrated Dictionary (AV-2) OOI CyberInfrastructure Architecture & Design Operational Node Connectivity Description OV-2 PDR CANDIDATE November 2007 Last revised: 11/13/2007

More information

Status of IEEE SSSWG and ANSI/AIIM MS71 Standards. Presented at the THIC Meeting at the DoubleTree Hotel Del Mar CA on January 18, 2000

Status of IEEE SSSWG and ANSI/AIIM MS71 Standards. Presented at the THIC Meeting at the DoubleTree Hotel Del Mar CA on January 18, 2000 Status of IEEE SSSWG and ANSI/AIIM MS71 Standards P C Hariharan Systems Engineering & Security, Inc 7474 Greenway Center Dr, Suite 700 Greenbelt MD 20770-3523 Phone: +1-301-441-3694; FAX: +1-301-441-3697

More information

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.

10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S. 10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence

More information