There is an obvious concept in some system managers, advanced solutions such as SAN based on Fibre Channel are offered better characteristic. Or they may like the products based on iSCSI, because has offered the advantage like block level magnetic disc I/O. In addition, the products based on iSCSI step the Off-The-Shelf Ethernet connection based on cable and run, and does not need more expensive optic fibre framework, this is very attractive for controller.
So, where does this kind prove it is a good NAS apparatus through test? When newer technology is paid close attention to at most, the present NAS apparatus has offered a lot of new functions, include simplifying the virtual virtual machine supporting more quantity. How these advanced functions help the virtual focal point discussed by this text.
Virtual and NAS
Before describing a series of NAS advanced function, let’s look in order to support host computer server and virtual machine, use several kinds of methods of NAS apparatus. First and most obvious one in store the fictitious hard disk at the home server is stored at network share at first. Assume the network delay and bandwidth are OK, this kind of method can help consolidated storage and reduce and manage the expenses. When store and change on different magnetic discsing, a plurality of virtual machines share the identical basic minidisk to pay read-onlily and visit too.
NAS can be used for storing the virtual machine backup too to store, and it must be in the system such as ISO file to store any During share data. Like physics machine, you can be connected to NAS sharing the virtual machine. This is a useful method for often employing the organization that test or dispose extensively.
In addition, the organization considers using NAS apparatus to have other several reasons, such as Fig.:
Characteristic and expansibility
Because the identical magnetic disc resources of a large number of potential virtual machine competitions, while assessing and storing the solution, consider characteristic and expansibility are very important. Most NAS supports the extensive capacity to select. Add driving in order to increase characteristic and storage space newly without shutdown when needing. The great memory is buffered and can be asked to promote throughput prominently by the random diskette I/O that virtual machine produce as a lot of. The best way to increase magnetic disc I/O is to avoid using the magnetic disc. In more quick framework 10GB Ethernet On use network adapter not to get together and last expansibility a plurality of network link. The organization can be based on the calculation between their characteristic and cost and use different typological hard disks too. A lot of manufacturers support SAS, SATA and SCSI.
Tags: virtual machines, magnetic disc, home server, physics machine, memory technology
Benefit from the virtual development of the server and applied increase of database, in the past few years, the enormous change took place in the requirement for storing the infrastructure. It needs to deal with more random I/O to store the infrastructure, offer more high IOPS characteristic, and afford the load of top management. In realizing optimum performance and maximum usability, the way connected to SAN of the server has become a huge determing factor.
In the step of improving the infrastructure, the most common method is to find and improve the infrastructure characteristic method. The football coach of the name has ever said that one burnt: “It is impossible for you to teach the speed. ” A lot of data centres are disposing the optic fibre card of 8 – Gbit and ether network card of 10 – Gbit. To most companies, the infrastructure staging is a progressive migration, but not instantaneous change. With the appearance of the material object card, dispose and become reality at the end of this year or the beginning of next year in 16 – Gbit fiber channel.
If your environment has sufficient flexibility, then the more available bandwidth that you have is, on the issue that furthermore help to solve the characteristic. The intersection of speed and for being generally applicable a little the word. Certainly, the connection speed between host computer and switchboard port must be the same. It will be a little different in this respect to store. For example, if storage system can be got together and linked, perhaps connection between the storage systems and switchboards of so many I/O passways will not be too high. As to most polymerization technology, will often have rule that a remuneration decreases progressively.
But the speech compared with the bandwidth, the characteristic means more things. In other words, the bandwidth of intelligent management that can your card? A very good example is our common service quality QoS Function. The switching stage card with the similar service quality function can allow users to set up the priority issue. In the ideal virtual server environment, these cards can be offered and offered more bandwidth for more key business. This makes you maintain the applied service level agreement of these key tasks better.
Another function is the fictitious exchange that is the card grade in the new developing interface card products are. This means, if two virtual machines on a physical plane need communicating with each other, not needing the switchboard of mainframe network to transfer communication, but can go on in exchanging the card fictitiously. It made sure to lighten the burden for the supervisory routine, unloaded current-carrying capacity from the network at the same time.
When involving the supervisory routine and unloading, we can see interface card is willing to offer assistance. In IP stores the world, it has the one that is obviously helped to change to make IP on the card. Though most physical servers have sufficient handling capacity to deal with SCSI to IP to change. One really up to the mark of IP cartoon finishes this kind of conversion, and brought the predictability of greater intensity to the environment, especially in the time of peak load.
The other challenges that face also include dealing with physical main frame communication, these host computers employ completely to drive interruptedly. One handle core, must cut off in order to check inbound data packet, then its must stop, run core of the virtual machine. In this course, while finishing on the activity host computer, can reduce the utilization factor of the bandwidth greatly. At present, increasingly many card already begin, support a certain standard, in order to make the intersection of user and fine communication between supervisory routine and virtual machine. In fact, these card products can make a certain package for the particular virtual machine the mark. This makes supervisory routine and virtual machine more efficient, does not need to cut off because the data packet can be sent to the virtual machine directly.
The efficiency on speed and characteristic of network interface card of future generation will be better. Will be increased in the intelligent respect by a wide margin too. The enhanced intelligent card will not only presume the percentage for the utilization factor of the bandwidth, and will increase the efficiency that supervisory routine and fictitious host computer deal with resources.
Tags: maximum usability, host computer, enormous change, virtual development, instantaneous change
Within short a few years, store Virtual Have already proved it has been worth and pass by the old road from up-market solution of costing an arm and a leg to goods of the moderate price in the big enterprise. As a standard function of the memory array of most middle levels, storing and turning a medium and small organization fictitiously solves extensive memory and manages the difficult problem. At the same time, the special solution of the first-class manufacturer has offered the greatest investment repayment for the fact that manage the large-scale enterprises with large-scale memory LAN of the intensive data usability demand.
Store virtual to establish first abstract layer store, in host computer and physics, have concealed the characteristic of storing the apparatus singly. When implementing while storing the LAN in one, it has offered a single management for the fact that all piece grades are stored to click. To be simple, store virtually and store a plurality of varied networks apparatuses to concentrate together, offer one group to store one and is used as host computer fictitiously.
Besides establishing the memory pool composed of physical hard disks of different arrays, store virtually and offer the extensive service in unanimous way. These services begin with basic roll management, including LUN logic unit number Shield, connect in series, roll divide into groups and segment, simplify disposition and automatic roll expand and automatic data move and data protect with disaster recovering the function including the snapshot and making mirror images . In brief, the virtual solution can be used as enforcing and storing the management policy and realizing a central control point of one grade of agreements of higher service.
Perhaps the virtual most important services that realizes are not to produce the confused data to move. To large-scale organization, it is almost the life fact not changed to move the data. Since the end of old apparatus lease and reach the standard grade with the new apparatus, storing virtually can realize that move without cutting off the service to piece one grade of data of another apparatus from an apparatus. Store administrator’s maintenance very apt to carry on the walking example or change the outmoded memory array, will not interfere with application program and user. The production system will keep running.
Tags: important services, class manufacturer, moderate price, intensive data, memory array, scale organization, market solution
25 years ago, that is to say when ” Network World ” was born, Internet was only 3 years old too. Hou when the that piece, connect host computer on Internet to, less than 2500, it uses people of network to be just less than 10,000 people often. Now, the quantity of the networking host computer has already exceeded 800 million, crowd who often surfs the Net has already been up to more than 1,800 million.
Only need to see these figures, you can understand how great on earth the impact on communicating industry in the whole world of Internet is.
It was in 1986 that I in Internet for the first timed. Before that, I was once a user of ARPANET, but I did not think at that time ARPANET before TCP/IP appears was Internet, because what it adopted is the communication protocol between the computers, but not the communication protocol of the internetwork. In 1983, acted as ARPANET from the network controller NCP When switch is TCP/IP, today’s Internet really appears.
I really must feel it to be very much cool in the nonrecoverable Internet 1986 – -But it needs very professional skill and can be used. I at that time thought, if it was almost impossible to want to let my mother use that of Internet. Because want to surf the Net and finish anything, need input to see the thing like magical incantation too much. Just after many years, after World Wide Web began to dispose conscientiously, the thing of kind of these incantations disappeared. But to most people at that time, Internet is still very magical, especially it is like this to research and develop the organization to person who supervises telecommunication, Off-The-Shelf company and telecommunication standard of telecommunication industry.
To telecommunication industry professional in middle period of the eighties of last century, internet protocol IP It is not almost a useful communication protocol at all. Function that IP can’t offer any guarantee, service quality rating, security or charge. The government never participates in IP relevant canonial formulation too, so nobody will think of controlling Internet too. IP, it is ” high-quality ” Internet and any There is obvious fault between communication, most communication manufacturers have totally neglected Internet, it is too late when they have really realized the importance of Internet.
From the beginning of the 1990s of last century to middle period of the 1990s, I was responsible for IPv6 work of IETF with Allison Mankind. During this period, we have consulted a lot of demands for the IP ng of people. Among them a respondent is Hans-Werner Braun, working for the American National Science Foundation at that time. He says to us, we may be developing the future global communication system very strictly. Hou when the that piece, few people will think so, few people will think this will become reality too, but Hans-Werner is accurate.
Nowadays, Internet and correlation technique have already become technical foundations of most modern communication.
At a certain time in middle period of the 1990s of last century, ” Network World ” editor responsible for a page once said to me, their readers are not interested in Internet at all. I understand their meaning may be saying, other things, for example foundation that ATM will replace Internet and become future communication.
But reached today, Internet has already defeated all technology that has ever coveted communication industry’s throne. But even so, Internet fails to prevent the standard organization of some telecommunications or telecommunication operator and engaged in technical ” patch up ” of existing telecommunication ,Doing the best can’t remedy the place of compliance Internet; The person who can not prevent from either some supervision attempts to guide the research and development direction of Internet, attempt to minimize the destruction level to the present situation of technique or political current situation of telecommunication industry of Internet.
Though Internet has already made success attracting people’s attention, for most people, it seems to be still from what has been controlled by a handful of traditional communication operators – -It is these operator that think Internet needs repairing that is to say repair can bring more control power and ownership of property to operator when getting .
But the person in a few foresights, such as in Hans-Werner Braun,et al.’s view, predict the future of Internet is easier than to experience it. In my view, even if there is unpredictability, can’t prevent Internet from continuing developing forward either. wave wave is compiled
Tags: communication protocol, professional skill, guarantee service, time internet
Differing widely with Ethernet exchanger, most users are while constructing and storing, FC exchanger often closely integrated in the system. Users pay close attention to intensity not height, on the other hand all OEM optic fibre passway exchangers of apparatus manufacturer of large-scale memory to him on one hand, non- careful user’s even manufacturer of the exchanger is not clear.
In the eighties of the 20th century, connect host computer and it stores standard methods of apparatus to be through look like or IDE walk abreast point-to-point DAS that interface realize connect and store directly such as the SCSI Way. It is offered the speed 5MBps or 10MBps of relatively fast visit SCSI hard disk that SCSI runs side by side ,And several hard disks can be coupled to computer through the same interface.
However, with becoming bigger and bigger to store the subsystem, the computer makes more and more fast, a new problem has appeared: The outside stores the apparatus and begins to become huge. Tape storehouse, RAID the redundant magnetic disc array cheap Begin, need increasingly many space with other the intersection of SCSI and apparatus, this demand, run side by side SCSI connect, extend, come out far from host computer. Meanwhile, I/O input / export The speed is increasing constantly too, then what a big bundle of threads 32 or 64 data bus China keeps the consistency of the signal too on the issue to need to solve in physics as one. SCSI purpose of design of improving edition of simple running side by side lies in, increase the distance of data transmission and solve the consistency problem of signals. But they formidable high-speed signal transmit this technological difficult problem under walking abreast SCSI bus framework finally.
In order to meet these new demands, people have developed the optic fibre passway Fibre Channel offering the access ability of one giga of serial networks for storing the apparatus Agreement. Have set up SCSI agreement used for storing based on optic fibre passway on the fourth storey of the agreement of optic fibre passway, fictitious interface VI used for cluster used for IP agreement and shining upon the network framework of the network Agreement. Optic fibre the intersection of passway and agreement synthesize a lot of advantage, until the intersection of network and range can remotely up to 10 kilometers most, can use simple serial cable, one giga of network speed of many kinds of mediums and can use many kinds of agreements on the same cable at the same time. Characteristic these make optic fibre passway agreement the intersection of SCSI and replacement of agreement approve by people the 1990s while being whole as walk abreast, the passway agreement of optic fibre is used in overwhelming majority high capacity, high side and stored on the apparatus in succession straight now.
With replacement’s appearance of point-to-point way that the passway agreement of optic fibre is regarded as to run side by side SCSI, and as it is accepted by market gradually, the simple memory of a kind of association employs presenting
Tags: speed signal, hard disks, high speed, optic fibre, data transmission, hard disk
Which kind of SAN technology still has a lot of problems to the meaning maximum of small and medium-sized enterprises. Which kind of SAN of the most common question is preferably technological: The fiber channel SAN or iSCSI SAN? This question does not have stationary answer. Fiber channel or iSCSI SAN all suitable small and medium-sized enterprises of different types. Each kind of technology has backer and critic, and the deterministic difference exists between these two kinds of SAN technology. But these differences are smaller and smaller between latest iSCSI and technology of fiber channel. The great partial discussion is obtained from the information out of date and in the misunderstanding.
Whether you decide before using fiber channel or iSCSI SAN in your data storage environment of small and medium-sized enterprises, you must understand the present SAN grade setting up and characteristic of the fiber channel SAN and iSCSI SAN at first. This text has listed present SAN technology and characteristic in the fiber channel SAN.
The present SAN grade is set up
SAN is essentially a technology based on switchboard, the mutual connected sum of application,etc. that can be stored with many physical server, virtual machine and outside is exchanged. Store a controller to usually all confuse very much, think SAN storage array is SAN. In fact, SAN storage array is only a part of SAN. Than have more physics carry oral array, can let more host computer visit SAN storage array SAN.
Analysis of the fiber channel SAN
Fiber channel technology the intersection of SAN and a technical kind that can choose for small and medium-sized enterprises. Fiber channel one very stable maturity bilaminar to exchange SAN technology, and SAN variable in most vogue in enterprises at present. It, nine years ahead of time, and optic fibre channel protocol FCP than the intersection of iSCSI and standard It is the only commercial agreement used on the fiber channel. FCP is that canonial memory SCSI stores the agreement in the fiber channel chassis.
There are three physical assemblies in the fiber channel SAN. First is to pay attention to the bus adapter HBA in the fiber channel ,Also known as the starter initiator . HBA is PCIe card, it is a chip on host computer bottom panel too. It reaches FC standard implantation in the silicon dice, minimizes host resource. The software is driven and lain on the host computer too.
Part two It is a switchboard of fiber channel. The optic fibre switchboard is that one is not module ‘ There is no internal bandwidth surplus Bilaminar switchboard, have and the intersection of FC and the intersection of extension and supervisory function that standard accords with. Another variant that FC exchanges is FC directors FC director . FC one piece bull to count the intersection of ports and non- modularized switchboard in director; It has high usability, and there is no simple point to collapse, and the characteristic function of the enterprise layer for example encrypt, Virtual SAN, reaching the gateways of other networks,etc..
Part three It is a goal of HBA, are named FC and stored the goal port, or the goal. It is a fiber channel SAN FC fabric An external memory is connected. The goal stores each goal of port and stores and carries the oral address or famous address WWN of world . These host computers each have one’s own unique WWN addresses, let them be connected to the goal and stored, read and write. The key part of the software is lying in each one and visiting the host computer fiber channel SAN multipath code that outside stored. This allows each host computer to have a plurality of to reach the route that the goal stored, in case the main passway fails, and under some situations, the loading is balanced and the characteristic is integrated.
FC starter, goal and port bandwidth of switchboard can be regarded as the common operation variant of 8 Gbps or 4 Gbps at present. They can mutually operate with 2Gbps in the past too, but 1Gbps was not all right.
Tags: medium sized enterprises, iscsi san, physical server, channel protocol, san storage
Describe in detail: The whole network discontinuity cuts off the network communication, cause the regular client to employ the delay and surf the Net slowly. Find households of the intersection of machine and the intersection of control over main exchanger and ping of address, tenant of host computer, wrap up, too can take place intermittence substitute while carrying on ping in the host computer room and chartering testing. Households of machine, tenant of host computer, communication of communication break down situation to be further more serious to each floor exchanger.
The preliminary experience question is judged:
1ARP table upgrades the question;
2Broadcast the trouble;
3The route watch upgrades the trouble;
4The virus attacks and other safe states.
The further information needing obtaining is:
1 ARP table information;
2 The exchanger is supported;
3 The communication data are caught.
Carry on simple ARP test, find that it is normal to upgrade ARP; Because the exchanger reacts slowly, operate for overtime, it is unable to be supported the data accurately at present.
Choose to mainly exchange a network port and insert testing with the note-book, starts the agreement and analyzes tools.
Inserting ports has not done the mirror image, insert, find that receives average 8000 of gentle quantity of data newspaper every second, reach 14000 per second at most. According to this calculation, each exchanger backplate may exchange more than 336000 packages per second, this may cause the processor of the exchanger to be taken up seriously, the immediate cause causing the intermission to lose the bag.
Because the intersection of exchanger and port make mirror image, can it thinks present data that receives to be the intersection of radio and communication mainly. After utilizing the agreement to analyze tools are caught and decoded, can receive the following results.
The main agreement communication broadcasts the communication. Including ARP broadcast, SMB broadcast and Name SVC are broadcast.
It is smaller than 255 byteses that almost all the packages are big or small. So though the package is very large in quantity, little that overall byte is counted, the throughput is relatively little, in some software system to record flow, can’t find the danger of question accurately.
Watch from decoding the angle, can see in some time, it is mainly the crazy communication of a certain host computer. Often the communication of a host computer occupied more than 50% of the overall communication at that time in the twinkling of an eye.
, the question reason was once led to the host computer of very big specific flow, suspect it causes formulation of high flux by infringement of the virus / worm. But while further analyzed, it has had a characteristic in news report that we have noticed these, for example it is UDP agreement to broadcast in Name SVC of NetBIOS, UDP includes IP Identification information abbreviation IPID in IP Baotou for the communication that is encapsulated above IP ,Each host computer while sending a data packet voluntarily, will increase progressively to the intersection of IPID and these value generally. For example first IPID 10000, second send, it wraps up to be may 10001, third 10002, analogize sequentially, a different one initiative to send to it offers gentle IPID to be should different. But can find within some time, IPID is being repeated briefly in a large amount in decoding. In other words, these a large number of broadcast newspapers are gentle, it usually should not be that some host computer causes voluntarily, but sent by the exchanger and replied transmittinging causes.
In this case, for this formal phenomenon, we have done a test, let some host computer send and ask to an address not existing in order to cause ARP radio with the frequency of once every three seconds ,But the broadcast of once every three seconds, the result caught in the network is to take shape 7991 times within one second and is transmitted repeatedly, have caused a large number of network flow. Through the course, we confirm this question is caused by cycle of exchanger.
Will open in the network to usually exchange no phenomenon of the cycle of exchanger will take place in order to ensure in Spanning Tree agreement, if does not use Spanning Tree Protocol hereafter referred to as STP ,As two exchangers happen two cable interconnecteds time at the same time, will form the cycle, the exchanger can’t detect and examine this situation oneself, its result is to offer broadcasting to transmit repeatedly.
If launch STP, each exchange opportunity sends and has priority BPDU data package of one degree of a very high ones, carry on circuit measure, act as BPDU sent to find wrap up transmitting come back when appropriate, the exchanger can be consulted each other, close a certain cycle route. Ensure in two arbitrary exchangers only one one couple the chain. After the question confirms getting, we attempt to solve.
Adopt dichotomy law, disconnect the optic fibre chains of the east buildings and west wings temporarily. Find the trouble is dispelled immediately, the phenomenon no longer appear in all overtime after disconnection, the flow is calmed down normally. So as to judge, the cycle happens between west wing and east building, or within the old building.
After resuming the optic fibre chain, we go to the old floor to further investigate the trouble source. Because it is relatively bad to put the place condition the old floor exchanger, through sorting out and analyzing, to 18: About 45 fens, find in the old building the trouble source has already disappeared too. Because of time factor, further the intersection of localization and job go on, dwindle question some can orientate trouble type ing floor until old already, there was better help to the maintenance guarantee.
Diagnosing this trouble finds the phenomenon that some networks scan at the same time, still follow the signs of some virus and worm in the network, so network maintenance shoulders heavy responsibilities, still need more efforts and input.
Tags: virus attacks, note book, mirror image
The inscriptions on bones or tortoise shells: Cloud basic framework, cloud application and cloud host computer three-dimension are unified
It is well known that the inscriptions on bones or tortoise shells wants to conquer the wild ambition of the field of enterprise’s software, its CEO once announced to the masses companies would concentrate sight on IBM and other large-scale important competitors too.
Though this company will often describe some persons who subdivides weak tendency of the market by oneself, but it still plans to fully utilize its extensive products and resource, captures a cup of custard on the market of enterprise cloud.
The senior vice-president Steve Miranda of application and development of inscriptions on bones or tortoise shells shows recently, in the cloud field, the inscriptions on bones or tortoise shells has three kinds of different roles: Cloud infrastructure provider; The cloud employs the supplier; Cloud host computer.
Miranda claims: “Our distinctive quality lies in possessing these three items of ability. ”
The inscriptions on bones or tortoise shells has offered Fusion Applications through presetting, privately owned cloud, public cloud and combined form. This can offer more than 100 pieces of module function to apply to seven product series, including Human Capital Management, Customer Relationship Management and Supply Chain Management.
Oracle has also introduced the cloud API used for interoperability, can guarantee live load can move among cloud. Oracle Cloud Resource Model API is a part of Cloud API, can rely on standard HTTP way and available resource to carry on mutually, in order to dispose the apparatus and revise setting up. It still supports the cloud standard to construct the canonicalization of the module, such as the apparatus, memory capacity and network.
Inscriptions on bones or tortoise shells put out allow enterprise in the intersection of operation and privately owned new system of cloud under isolated system on will it be September 2010 – -Exalogic Elastic Compute Cloud, it is known as ” medium cloud of the box ” too ,Have 30 servers, 360 cores, there are networks and store, has and combined the virtual machine of inscriptions on bones or tortoise shells VM running under Solaris and Linux Technology.
When the inscriptions on bones or tortoise shells marched into the cloud on a large scale to calculate the field, have already found that there is technological giant’s rival like IBM in the market, they can offer the similar service, and the rival as with relatively a little less scale like Salesforce.com, they concentrate the competitive strategy on cloud’s calculating. And Microsoft has dense thick interests to offer cloud service, this is another potential domain that inscriptions on bones or tortoise shells pays close attention to.
Miranda shows: “We will be all in this kind of situation in very long segment period. We will be supplier, customer and rival. We understand the customer has one’s own choices, this is a highly competitive market too, but we must become the strongest manufacturer in the market. And the advantage of the inscriptions on bones or tortoise shells lies in being can be offered and suited integration and intact system of enterprise’s concrete demand. ”
Though increasingly many enterprises begin to employ the cloud to calculate now, some of enterprises calculate to the cloud can be in order that are kept what they bring to some extent on earth. Miranda shows too: “I see more and more people want to know, they can get something in public cloud and privately owned cloud on earth. And the most important thing is, the more doubt is, the more doubt is. ” And participate in assumed business segments of cloud in some, though other people still hesitate, sell automation and some key human resources and obviously take an early lead.
Even so, the cloud calculates that will be accepted eventually. Oracle’s extensive product mix is this company and competitive tactics core of other manufacturers. Miranda adds: “It is presetted the solution that SaaS supplier without others can offer too. ”
This field may well be constantly changing, change unpredictably, who will win the laurel finally, there are fixed numbers to need some time.
Tags: senior vice president, supply chain management, resource model, distinctive quality, isolated system
Memory Virtual Create first abstract layer store, in host computer and physics, when SAN implements, it offers a form for the fact that all piece grades are stored to click and manage. To put it briefly, a plurality of is different to construct the network to store the apparatus and form a invention and store the pool, shown as and used one set to store the roll on the host computer fictitiously.
Within short a few years, it is virtual to store, is called fictitious one too, has already proved its value in the big enterprise, transform goods that can afford into from expensive solution, relevant article see ” utilize symmetrical type store, raise, store efficiency while being fictitious “. As a kind of standard characteristic, especially in most conservative China end’s magnetic disc array, storing the fictitious memory management of turning the small and medium enterprise brings new development. Meanwhile, the concentration data management that the exclusive solution from top supplier adopted brought the maximum rate of return on investment to big enterprise.
Store virtual to create first abstract layer store, in host computer and physics, when SAN implements, it offers a form for the fact that all piece grades are stored to click and manage. To put it briefly, a plurality of is different to construct the network to store the apparatus and form a invention and store the pool, shown as and used one set to store the roll on the host computer fictitiously.
In addition, besides establishing and storing the pool from the physical magnetic disc of different arrays, has stored virtually and offered very extensive service, hand over in a unified way. Expansion the expand since basic roll management, LUN mapping, connect in series, quantity divide into groups with strip taking, simplify the disposition automatically, the automatic roll is expanded, moves with the automatic data, protect and resume the function with the disaster to the data, including the snapshot and making mirror images. In a word, the virtual solution can be regarded as and carried out and managed and stored the centralized control point, can reach higher SLA.
Perhaps virtual most important services are not to cut off the data to move. As to the big enterprise, it is ordinary affairs in the life to move the data, the no longer using of because old apparatus and new apparatus is on-line, can store it virtually on condition that cut off, transfer a data to another apparatus from an apparatus. Storing administrators can carry on regular maintenance by oneself, or replace the old array on condition that intervene application and user.
Four kinds of SAN fictitious frameworks
In the fictitious framework of SAN, there are four kinds of methods to offer service of storing virtually: Employ in the strip, take, employ outside, mixed method separate fictitious the intersection of framework and law promptly, and virtual because of controller. It must have three kinds of basic elements that all memory is virtual: Keep one fictitious magnetic disc and physics store, and other the intersection of disposition and yuans of data shine upon; Execution order used for disposing and changing and storing the management role; Transmit the data among host computer and memory. When they deal with these three kinds of single routes,
Tags: data management, host computer, memory management, rate of return, return on investment, relevant article, magnetic disc
The natural disaster hard to predict makes the best of the disaster backup scheme in the high in the clouds
A field strength has happened in Japan to reach 9 magnitude of violent earthquake recently, besides making the few people lose the home bitterly, a lot of enterprises are forced decommissioning too, has caused the bulky economic loss. This incident makes many enterprises realize that prepare the importance of the backup scheme of the disaster.
IT trade professional has been approving the importance of the disaster backup all the time, but for fear of the cost question, most enterprises define it as important not urgent problem. In fact, once natural calamity or other major accidents take place, the damage influence on enterprises is different to appraise, and the cloud computing technique of rising in recent years, will help to offer the elastric, lower disaster backup scheme of cost.
Network transfer system Influence enterprise’s operation lifeblood
Earthquake cause the intersection of enterprise and computer system break down probably, especially China some cities in the earthquake, pull to, the possibility in this respect must be considered.
Besides some natural calamities, set on fire, destroy, steal and steal artificially, the electricity is cut off, the apparatus does not work and the data may make the computer systems of enterprises destroyed to damage etc.. Reveal according to studying, if there is no help of the computer system in enterprises, time is like over one week, 65% of the companies lose business, and unable to recover forever. So to some transnational or trans-regional enterprises, the trans-regional data backup seem unusually important if set up.
Deposit, backup in the high in the clouds Have cost-effective even more
A lot of large-scale enterprises, choose the trans-regional duplicating method, but cost deposit Co-location such as buying the software and hardware, host computer at present Rental cost,etc. But very high. So, depositing in comparatively popular high in the clouds in recent years, cloud depositing, service, offer the choice that has cost-effective even more for enterprise.
On the market, we find that fit the high in the clouds offered in fields lying fallow in rotation exclusively to deposit in the forefront Cloud Dedicated Hosting, CDH, hereafter referred to as CDH And high in the clouds data backup Cloud Data Safe, CDS ,When the disaster take place, let the site of backup take over the work of the main site immediately, and the data backups of two operating points act in agreement. CDH utilizes advanced technique, combines the cloud operating system Cloud OS , server Virtual Technology, iSCSI store the intersection of MPLS VPN and network, can let the intersection of business and application of enterprise, until ERM, CRM, Intranet, Email, the intersection of webpage and utility program carry out smoothly.
CDS is the extension of CDH service even more, mainly carry out the job of the data backup, including data base system, e-mail system, file share server, or even the desktop and inner machine format backup of computer system of notebook computer. CDS framework is a hard disk, to the hard disk disk to disk to disk, D2D2D to the hard disk Design, the software of customer end will be installed on a plurality of protected servers, control the backup job of the server in an all-round way.
Simple and speech, enterprises can go to the local high in the clouds to store the data backup through MPLS VPN technology, and duplicate the computer lab to the strange land through MPLS VPN network and do the second and store the backup in the cloud end systems of the other areas, can guarantee that no matter accident of any burst happens, will not destroy the normal operation of enterprise’s network either.
Tags: host computer, economic loss, field strength, regional data, computer system