Professional Documents
Culture Documents
White Paper
Nandakumar N
Confidential
Confidentiality Statement
2008 TATA CONSULTANCY SERVICES LIMITED
All rights reserved.
This document contains confidential information of TATA CONSULTANCY
SERVICES LIMITED, which is provided for the sole purpose of permitting the
recipient to evaluate any proposal submitted herewith or separately.
In
consideration of receipt of this document, the recipient agrees to maintain such
information in confidence and to not reproduce or otherwise disclose this
information to any person outside the group directly responsible for evaluation
of its contents, except that there is no obligation to maintain the confidentiality
of any information which was known to the recipient prior to receipt of such
information from TATA CONSULTANCY SERVICES LIMITED, or becomes publicly
known through no fault of recipient, or is received without obligation of
confidentiality from a third party owing no obligation of confidentiality to TATA
CONSULTANCY SERVICES LIMITED.
This document is the property of TATA CONSULTANCY SERVICES LIMITED and
TATA CONSULTANCY SERVICES LIMITED may require the return of this document
at any time at their sole discretion. Unauthorized access or copying is prohibited
without the prior written permission of TATA CONSULTANCY SERVICES LIMITED.
All product and company names mentioned herein may be trademarks of their
respective owners.
Confidential
Confidential
Introduction
Computing is based on information. Information is the underlying resource on
which all computing processes are based; it is a company asset. Information is
stored on storage media, and is accessed by applications executing on a server.
Often the information is a unique company asset. Information is created and
acquired every second of every day. Information is the currency of business.
To ensure that any business delivers the expected results, they must have
access to accurate information, and without delay. The management and
protection of business information is vital for the availability of business
processes.
This white paper introduces the concept of a Storage Area Network, which has been
regarded as the ultimate response to all these needs.
Confidential
geographical distances.
SANs create new methods of attaching storage to servers. These new methods
can enable great improvements in both availability and performance. Todays
SANs are used to connect shared storage arrays and tape libraries to multiple
servers, and are used by clustered servers for failover.
A SAN can be used to bypass traditional network bottlenecks. It facilitates direct,
high-speed data transfers between servers and storage devices, potentially in
any of the following three ways:
_ Server to storage: This is the traditional model of interaction with storage
devices. The advantage is that the same storage device may be accessed
serially or concurrently by multiple servers.
_ Server to server: A SAN may be used for high-speed, high-volume
communications between servers.
_ Storage to storage: This outboard data movement capability enables data to
be moved without server intervention, thereby freeing up server processor
cycles for other activities like application processing. Examples include a disk
device backing up its data to a tape device without server intervention, or
remote device mirroring across the SAN.
SANs allow applications that move data to perform better, for example, by having
the data sent directly from the source to the target device with minimal server
intervention. SANs also enable new network architectures where multiple hosts
access multiple storage devices connected to the same network. Using a SAN
can potentially offer the following benefits:
_ Improvements to application availability: Storage is independent of
applications and accessible through multiple data paths for better reliability,
availability, and serviceability.
_ Higher application performance: Storage processing is off-loaded from
servers and moved onto a separate network.
_ Centralized and consolidated storage: Simpler management, scalability,
flexibility, and availability.
_ Data transfer and vaulting to remote sites: Remote copy of data enabled for
disaster protection and against malicious attacks.
_ Simplified centralized management: Single image of storage media simplifies
management.
SAN connectivity
The first element that must be considered in any SAN implementation is the
connectivity of storage and server components typically using Fibre Channel.
The components listed above have typically been used for LAN and WAN
implementations. SANs, like LANs, interconnect the storage interfaces together
into many network configurations and across longer distances.
SAN storage
The SAN liberates the storage device so it is not on a particular server bus, and
attaches it directly to the network. In other words, storage is externalized and can
be functionally distributed across the organization. The SAN also enables the
centralization of storage devices and the clustering of servers, which has the
Confidential
potential to make for easier and less expensive centralized administration that
lowers the total cost of ownership (TCO).
The storage infrastructure is the foundation on which information relies, and
therefore must support a companys business objectives and business model. In
this environment simply deploying more and faster storage devices is not
enough. A SAN infrastructure provides enhanced network availability, data
accessibility, and system manageability, and It is important to remember that a
good SAN begins with a good design. This is not only a maxim, but must be a
philosophy when we design or implement a SAN.
SAN servers
The server infrastructure is the underlying reason for all SAN solutions. This
infrastructure includes a mix of server platforms such as Windows, UNIX (and
its various flavors), and z/OS. With initiatives such as server consolidation and
e-business, the need for SANs will increase, making the importance of storage in
the network greater.
SANs Future:
Are SANs themselves evolving or are they likely to become extinct? Will they be
overtaken by other technology? Certainly reports of the death of SANs have
been greatly exaggerated. There has been far too much investment made for
SANs to quietly lay down and go the way of the dinosaurs. There is no new killer
application or technology in the immediate future that is threatening the SAN
world. However, there is a gradual evolution that is beginning to pick up pace in
the SAN world.
Confidential
The evolution that is taking place is one of diversity. More and more we are
seeing advances in technology find their way into the SAN chassis. What is
quickly happening is that SANs are becoming multiprotocol capable. The
industry recognizes that it is no longer acceptable to build a solution that will
either create SAN islands (in much the same way as islands of information
existed), or take an inordinate amount of cabling, support, power, and
management.
Rather, the trend towards the simplification of the SAN infrastructure suddenly
took a turn for the better. In a single footprint, multiple technologies that were
once competing for floor space now happily sit alongside the competition in a
single chassis. It is not uncommon to see FCIP, iFCP, and iSCSI together these
days, and they are working together rather nicely. Most IT vendors also have
virtualization solutions that present a single view of storage, and management
solutions at the enterprise level. The SAN has quietly become an enabler for
many technologies and protocols to share the same arena, without the
somewhat tiresome arguments of which is best.
So, it is a case of evolution, not revolution, in the SAN world.
Confidential
often find that they have to purchase more storage capacity, even though free
capacity is available in other platforms.
Additionally, it is difficult to scale capacity and performance to meet rapidly
changing requirements, such as the explosive growth in e-business applications,
and the need to manage information over its entire life cycle, from conception to
intentional destruction.
Information stored on one system cannot readily be made available to other
users, except by creating duplicate copies, and moving the copy to storage that is
attached to another server. Movement of large files of data may result in
significant degradation of performance of the LAN/WAN, causing conflicts with
mission-critical applications. Multiple copies of the same data may lead to
inconsistencies between one copy and another. Data spread on multiple small
systems is difficult to coordinate and share for enterprise-wide applications, such
as e-business, Enterprise Resource Planning (ERP), Data Warehouse, and
Business Intelligence (BI).
Backup and recovery operations across a LAN may also cause serious
disruption to normal application traffic. Even using fast Gigabit Ethernet
transport, sustained throughput from a single server to tape is about 25 GB per
hour. It would take approximately 12 hours to fully back up a relatively moderate
departmental database of 300 GBs. This may exceed the available window of
time in which this must be completed, and it may not be a practical solution if
business operations span multiple time zones. It is increasingly evident to IT
managers that these characteristics of client/server computing are too costly, and
too inefficient. The islands of information resulting from the distributed model of
computing do not match the needs of the enterprise.
New ways must be found to control costs, improve efficiency, and simplify the
storage infrastructure to meet the requirements of the modern business world.
Business continuity
It goes without saying that the business climate in today's on demand era is
highly competitive. Customers, employees, suppliers, and business partners
expect to be able to tap into their information at any hour of the day from any
corner of the globe. Continuous business operations are no longer
optionalthey are a business imperative to becoming successful, and
maintaining a competitive advantage. Businesses must also be increasingly
sensitive to issues of customer privacy and data security, so that vital information
assets are not compromised. Factor in those legal and regulatory requirements,
and the inherent demands of participating in the global economy, and
accountability, and all of a sudden the lot of an IT manager is not a happy one.
It is little wonder that a sound and comprehensive business continuity strategy
has become a business imperative, and SANs play a key role in this. By
deploying a consistent and safe infrastructure, they make it possible to meet any
availability requirements.
Confidential
and highly scalable storage environment. SANs accomplish this by enabling many
direct connections between servers and storage devices such as disk storage systems
and tape libraries.
High-performance Fibre Channel switches and Fibre Channel network protocols
ensure that device connections are both reliable and efficient.These connections are
based on either native Fibre Channel or SCSI (through a SCSI-to-Fibre Channel converter
or gateway). One or more Fibre Channel switchessuch as one of the Brocade
SilkWorm family of switchesprovides the interconnectivity for the host servers and
storage devices in a meshed topology referred to as a SAN fabric.
Because SANs are optimized to transfer large blocks of data between servers and storage
devices, they are ideal for a wide variety of applications such as:
Mission-critical database applications where predictable response time, availability,
and storage scalability are essential
Centralized storage backups where performance, data integrity, and reliability
ensure that critical enterprise data is secure
High-availability and application failover environments that ensure very high levels
of application availability at reduced costs
Scalable storage virtualization, which detaches storage from direct host attachments
and enables dynamic storage allocation from a centralized pool
Improved disaster tolerance, which provides high Fibre Channel performance at
extended distances (up to 150 km) between host servers and connected devices.
Confidential
tolerate wide swings in application performance. SANs address this need by using the
highly reliable and high-performance Fibre Channel protocol.
Another key advantage of SANs is the ability to deliver block data to enterprise-level
data-intensive applications. During data transfer, SANs impose less processing overhead
on communicating nodes (particularly servers), since data is broken into fewer segments
during transmission. As a result, Fibre Channel SANs are much more effective at delivering
large bursts of block datawhich makes Fibre Channel an ideal protocol for
storage-intensive environments.
Today, SANs are increasingly implemented in conjunction with NAS environments to
provide high-performance, large-capacity storage pools for NAS facilities. In fact, many
SANs currently reside behind NAS appliances to address critical storage scalability and
backup requirements.
Conclusion:
The rapid growth of e-commerce and the need to have all kinds of applications operating at top
speed at the same time, all on a 24/7 basis while connected to the Internet, is overwhelming
traditional data storage methods. The solution? Storage Area Networks (SANs)--the data
communications technology that's expected to revolutionize distributed computing.
Confidential
10
References:
1. Storage Area Networking Essentials: A Complete Guide to Understanding & Implementing SANs
Wiley edition
2. Using SANs and NAS OReilly Edition
Confidential
11