Sei sulla pagina 1di 3

remote replication method is most affected by dist.

between src and tgt Synchronous possible failure of FC Switch ports Data most accessible server performance customer and product information Layer between managed objects and management software Tape over disk Client initiated restore Single HBA Zoning Management task for data centre CAS Storage Cache dirty bit flag Synchronous remote replication Local replica successful restore Integrated NAS device Performance for DAS Track changes made to source and target Implement an iSCSI solution Design factor deciding to deploy IP SAN Replication technology EMC Time Finder/Mirror implement Monitor health of data centre Data copied from the source to the save location Increases connectivity, overall port utilization Highest bandwidth requirements NAS NAS Benefits Host to access block level storage over IP Objective of SMI-S Full resynchronization between src, tgt Array based local replication Performance Magnetic Disk Memory utilization Database SMI-S portability Backup catalog must be available Minimizes impact to nodes after RSCN capacity management Object changed data not yet written Response time elongation source device must be healthy NAS software BUS Type Fast Re Sync Leverages existing IP network infrastructure Application Response Time Full Volume Mirroring Examining operational status of device port First write on the source Core Edge Array based synchronous replication Specialized server for content addressed data ability to share data across platforms iSCSI Protocol define a complete SAN object model LVM based remote replication cannot span storage arrays

Celerra component allows mgmt of volumes and file systems Async remote replication improve app performance Minimizes the time the host waits for data to be fetched NAS on SAN environment Stack re-transmits dropped packets in iSCSI To view the logical and physical topology of an MDS SAN Nodes connected in two tier Core Edge fabric Characteristic of a CAS implementation

Control Station Writes are acknowledged by the source Read Ahead Gateway NAS system solution TCP Protocol Fabric Manager Host on Edge, storage on Core globally unique identifier for data object

remote replication method is most affected by dist. b/w src & tgt
consistent replica of the 24*7 database Primary Concern of DAS purpose of iSNS performance affected most by slow seek times

Synchronous

Hold I/Os to source devices just be4 creation of replica Single Points of Failure To assist with discovery of iSCSI targets Random, Small Writes

Auditing Reading & analyzing logs to show that a security policy is being enforced Infrastructure integrity preventing node login to fabric without proper authorization one gain unauthorized, administrator access Spoofing user identity information security three elements of the risk triad Assets, threats & vulnerabilities authentication can be performed Verification "in-band" and "out-of-band" refer to virtualization is implemented In in-band, the configuration is placed directly in the data path In out-of band, the configuration is stored externally to the data path data confidentiality CipherOptics SG appliances remote replication method is most affected by dist. b/w src & tgt Synchronous
consistent replica of the 24*7 database Hold I/Os to source devices just be4 creation of replica Primary Concern of DAS Single Points of Failure purpose of iSNS To assist with discovery of iSCSI targets performance affected most by slow seek times Random, Small Writes

Auditing Reading & analyzing logs to show that a security policy is being enforced Infrastructure integrity preventing node login to fabric without proper authorization one gain unauthorized, administrator access Spoofing user identity information security three elements of the risk triad Assets, threats & vulnerabilities authentication can be performed Verification "in-band" and "out-of-band" refer to virtualization is implemented In in-band, the configuration is placed directly in the data path In out-of band, the configuration is stored externally to the data path data confidentiality CipherOptics SG appliances infrastructure integrity Preventing node login to fabric without proper authorization gain unauthorized, administrator access Spoofing user identity areas define storage security Information security, networking, and storage elements of the risk triad Assets, threats, and vulnerabilities Verification authentication can be performed layers of the storage domain Block, file/record, and services

virtualized by swap files Memory block level storage virtualization enable Data mobility To ensuredata confidentiality CipherOptics SG appliances appropriate for cross-domain RSA Federated Identity Manager virtualization implemented in EMC Invista Out-of-band EMC Rainfinity global name space maintain File system locations & information backup media in virtual tape library Disks stored content has not been altered in the CAS system Content integrity optimal size of the log file Frequency of accessing database loss of uncommitted cached data be minimized Write-through C-Clip A virtual package that contains CDF and BLOB

Potrebbero piacerti anche