You are previewing Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments, Second Edition.
O'Reilly logo
Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments, Second Edition

Book Description

The new edition of a bestseller, now revised and update throughout!

This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies.

  • Features a separate section on emerging area of cloud computing

  • Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more

  • Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components

  • Explores Business Continuity and Security in physical and virtualized environment

  • Includes an enhanced Appendix for additional information

This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.

Table of Contents

  1. Cover
  2. Section I: Storage System
    1. Chapter 1: Introduction to Information Storage
      1. 1.1 Information Storage
      2. 1.2 Evolution of Storage Architecture
      3. 1.3 Data Center Infrastructure
      4. 1.4 Virtualization and Cloud Computing
      5. 1.5 Summary
    2. Chapter 2: Data Center Environment
      1. 2.1 Application
      2. 2.2 Database Management System (DBMS)
      3. 2.3 Host (Compute)
      4. 2.4 Connectivity
      5. 2.5 Storage
      6. 2.6 Disk Drive Components
      7. 2.7 Disk Drive Performance
      8. 2.8 Host Access to Data
      9. 2.9 Direct-Attached Storage
      10. 2.10 Storage Design Based on Application Requirements and Disk Performance
      11. 2.11 Disk Native Command Queuing
      12. 2.12 Introduction to Flash Drives
      13. 2.13 Concept in Practice: VMware ESXi
      14. 2.14 Summary
    3. Chapter 3: Data Protection: RAID
      1. 3.1 RAID Implementation Methods
      2. 3.2 RAID Array Components
      3. 3.3 RAID Techniques
      4. 3.4 RAID Levels
      5. 3.5 RAID Impact on Disk Performance
      6. 3.6 RAID Comparison
      7. 3.7 Hot Spares
      8. 3.8 Summary
    4. Chapter 4: Intelligent Storage Systems
      1. 4.1 Components of an Intelligent Storage System
      2. 4.2 Storage Provisioning
      3. 4.3 Types of Intelligent Storage Systems
      4. 4.4 Concepts in Practice: EMC Symmetrix and VNX
      5. 4.5 Summary
  3. Section II: Storage Networking Technologies
    1. Chapter 5: Fibre Channel Storage Area Networks
      1. 5.1 Fibre Channel: Overview
      2. 5.2 The SAN and Its Evolution
      3. 5.3 Components of FC SAN
      4. 5.4 FC Connectivity
      5. 5.5 Switched Fabric Ports
      6. 5.6 Fibre Channel Architecture
      7. 5.7 Fabric Services
      8. 5.8 Switched Fabric Login Types
      9. 5.9 Zoning
      10. 5.10 FC SAN Topologies
      11. 5.11 Virtualization in SAN
      12. 5.12 Concepts in Practice: EMC Connectrix and EMC VPLEX
      13. 5.13 Summary
    2. Chapter 6: IP SAN and FCoE
      1. 6.1 iSCSI
      2. 6.2 FCIP
      3. 6.3 FCoE
      4. 6.4 Summary
    3. Chapter 7: Network-Attached Storage
      1. 7.1 General-Purpose Servers versus NAS Devices
      2. 7.2 Benefits of NAS
      3. 7.3 File Systems and Network File Sharing
      4. 7.4 Components of NAS
      5. 7.5 NAS I/O Operation
      6. 7.6 NAS Implementations
      7. 7.7 NAS File-Sharing Protocols
      8. 7.8 Factors Affecting NAS Performance
      9. 7.9 File-Level Virtualization
      10. 7.10 Concepts in Practice: EMC Isilon and EMC VNX Gateway
      11. 7.11 Summary
    4. Chapter 8: Object-Based and Unified Storage
      1. 8.1 Object-Based Storage Devices
      2. 8.2 Content-Addressed Storage
      3. 8.3 CAS Use Cases
      4. 8.4 Unified Storage
      5. 8.5 Concepts in Practice: EMC Atmos, EMC VNX, and EMC Centera
      6. 8.6 Summary
  4. Section III: Backup, Archive, and Replication
    1. Chapter 9: Introduction to Business Continuity
      1. 9.1 Information Availability
      2. 9.2 BC Terminology
      3. 9.3 BC Planning Life Cycle
      4. 9.4 Failure Analysis
      5. 9.5 Business Impact Analysis
      6. 9.6 BC Technology Solutions
      7. 9.7 Concept in Practice: EMC PowerPath
      8. 9.8 Summary
    2. Chapter 10: Backup and Archive
      1. 10.1 Backup Purpose
      2. 10.2 Backup Considerations
      3. 10.3 Backup Granularity
      4. 10.4 Recovery Considerations
      5. 10.5 Backup Methods
      6. 10.6 Backup Architecture
      7. 10.7 Backup and Restore Operations
      8. 10.8 Backup Topologies
      9. 10.9 Backup in NAS Environments
      10. 10.10 Backup Targets
      11. 10.11 Data Deduplication for Backup
      12. 10.12 Backup in Virtualized Environments
      13. 10.13 Data Archive
      14. 10.14 Archiving Solution Architecture
      15. 10.15 Concepts in Practice: EMC NetWorker, EMC Avamar, and EMC Data Domain
      16. 10.16 Summary
    3. Chapter 11: Local Replication
      1. 11.1 Replication Terminology
      2. 11.2 Uses of Local Replicas
      3. 11.3 Replica Consistency
      4. 11.4 Local Replication Technologies
      5. 11.5 Tracking Changes to Source and Replica
      6. 11.6 Restore and Restart Considerations
      7. 11.7 Creating Multiple Replicas
      8. 11.8 Local Replication in a Virtualized Environment
      9. 11.9 Concepts in Practice: EMC TimeFinder, EMC SnapView, and EMC RecoverPoint
      10. 11.10 Summary
    4. Chapter 12: Remote Replication
      1. 12.1 Modes of Remote Replication
      2. 12.2 Remote Replication Technologies
      3. 12.3 Three-Site Replication
      4. 12.4 Data Migration Solutions
      5. 12.5 Remote Replication and Migration in a Virtualized Environment
      6. 12.6 Concepts in Practice: EMC SRDF, EMC MirrorView, and EMC RecoverPoint
      7. 12.7 Summary
  5. Section V: Securing and Managing Storage Infrastructure
    1. Chapter 13: Cloud Computing
      1. 13.1 Cloud Enabling Technologies
      2. 13.2 Characteristics of Cloud Computing
      3. 13.3 Benefits of Cloud Computing
      4. 13.4 Cloud Service Models
      5. 13.5 Cloud Deployment Models
      6. 13.6 Cloud Computing Infrastructure
      7. 13.7 Cloud Challenges
      8. 13.8 Cloud Adoption Considerations
      9. 13.9 Concepts in Practice: Vblock
      10. 13.10 Summary
  6. Section V: Securing and Managing Storage Infrastructure
    1. Chapter 14: Securing the Storage Infrastructure
      1. 14.1 Information Security Framework
      2. 14.2 Risk Triad
      3. 14.3 Storage Security Domains
      4. 14.4 Security Implementations in Storage Networking
      5. 14.5 Securing Storage Infrastructure in Virtualized and Cloud Environments
      6. 14.6 Concepts in Practice: RSA and VMware Security Products
      7. 14.7 Summary
    2. Chapter 15: Managing the Storage Infrastructure
      1. 15.1 Monitoring the Storage Infrastructure
      2. 15.2 Storage Infrastructure Management Activities
      3. 15.3 Storage Infrastructure Management Challenges
      4. 15.4 Developing an Ideal Solution
      5. 15.5 Information Lifecycle Management
      6. 15.6 Storage Tiering
      7. 15.7 Concepts in Practice: EMC Infrastructure Management Tools
      8. 15.8 Summary
  7. Appendix A: Application I/O Characteristics
    1. Random and Sequential
    2. Reads and Writes
    3. I/O Request Size
  8. Appendix B: Parallel SCSI
    1. SCSI Standards Family
    2. SCSI Client-Server Model
    3. Parallel SCSI Addressing
  9. Appendix C: SAN Design Exercises
    1. Exercise 1
    2. Exercise 2
  10. Appendix D: Information Availability Exercises
    1. Exercise 1
    2. Exercise 2
  11. Appendix E: Network Technologies for Remote Replication
    1. DWDM
    2. CWDM
    3. SONET
  12. Appendix F: Acronyms and Abbreviations
  13. Glossary
  14. Foreword
  15. Introduction