Veritas Storage Foundation and High Availability Solutions ...
Storage Foundation
-
Upload
thakur-arun -
Category
Documents
-
view
24 -
download
0
description
Transcript of Storage Foundation
Lovely Professional University, Punjab
Course Code Course Title Course Planner Lectures Tutorials Practicals Credits
CSE504 STORAGE TECHNOLOGY FOUNDATION 12960::Nitin Kumar 3.0 0.0 0.0 3.0
Course Category Courses with Placement focus
TextBooks
Sr No Title Author Edition Year Publisher Name
T-1 Information Storage and Management – Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments
EMC Education Services 2nd 2012 Wiley
Reference Books
Sr No Title Author Edition Year Publisher Name
R-1 Storage Networks: The Complete Reference
Robert Spalding 1st 2003 Tata McGraw Hill
R-2 Building Storage Networks Marc Farley Osborne 1st 2001 Tata McGraw Hill
Other Reading
Sr No Journals articles as Compulsary reading (specific articles, complete reference)
OR-1 Storage Networking Fundamentals: An Introduction to Storage Devices, Subsystems, Applications, Management, and Filing Systems, Marc Farley, Cisco ,
OR-2 Storage Area Network Essentials, Richard Barker, Wiley ,
OR-3 High Performance DatacenterNetworks Architectures, Algorithms, and Opportunities, Dennis Abts, Morgan &cLaypool publishers ,
OR-4 Storage Virtualization: Technologies for Simplifying Data Storage and Management, Tom Clark, Addison Wesley Professional ,
OR-5 http://blogs.msdn.com/b/data_otaku/archive/2011/11/01/an-introduction-to-big-data-concepts.aspx ,
Relevant Websites
Sr No (Web address) (only if relevant to the course) Salient Features
RW-1 http://www.intel.com/content/dam/doc/white-paper/intel-it-implementing-cloudstoragemetrics- paper.pdf
This paper presents the real time environment basics for the implementation of Cloud Storage by Intel.
RW-2 http://cloudstory.in/2012/04/introduction-to-big-data-hadoop-ecosystem-part-3/ It provides the introduction and advanced learning topics related to big data, hadoop and adoption of them in cloud.
RW-3 http://cloudstoragestrategy.com/2009/12/the-migration-to-object-based-storage.html The basics of unified storage and its implementation under different architectures.
RW-4 http://blogs.gartner.com/thomas_bittman/2009/08/11/virtualization-unlockscloudcomputing/
Virtualization Unlocks Cloud Computing
RW-5 http://lass.cs.umass.edu/~shenoy/courses/spring07/lectures/Lec05.pdf Different types of virtualization
RW-6 http://www.snia.org/education/storage_networking_primer/stor_devices/disk_drives Disk Drives explained
RW-7 http://www.serialstoragewire.org/Articles/2007_09/schultz.html The Many Faces of SAS as Beyond the DAS Factor
RW-8 http://wikibon.org/wiki/v/RAID_performance_and_security_metrics RAID performance and security metrics
RW-9 http://csciwww.etsu.edu/tarnoff/labs2150/harddrvs/drive_interfaces.htm Hard Disk Interfaces and Physical Installation
RW-10 http://msdn.microsoft.com/en-us/library/cc768535(v=bts.10).aspx Measuring Performance on Hyper-V
RW-11 http://techvirtuoso.com/2010/11/12/storage-tiering-vs-caching/ Storage and Cache Tiering
RW-12 http://www.informationweek.com/news/storage/systems/232600068 Server-Based Storage Tiering
RW-13 http://www.storagenetworks.com/writeups/strategies/iscsi-vs-fc/iscsi-vs-fc.php Business Strategy Brief - iSCSI vs FC (Fibre Channel) SANs
RW-14 http://www.sans.org/reading_room/whitepapers/backup/fibre-channel-storageareanetworks- analysis-security-perspective_32913
FC SANs
RW-15 http://blog.ipexpert.com/2012/07/23/ccie-data-center-fibre-channel-part-3-of-3/ Data center fibre channel
RW-16 http://www.infoworld.com/d/virtualization/deep-dive-san-and-nas-virtualization-241 Deep dive: SAN and NAS virtualization
RW-17 http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/white_paper_c11- 495142.html
iSCSI and FCoE: A Comparison
RW-18 http://onlamp.com/onlamp/2002/03/14/sansnas.html SAN and NAS
RW-19 http://www.wwpi.com/index2.php?option=com_content&id=1591 File Storage Virtualization: The Solution to NAS And File Server Manageability Issues
RW-20 http://www.ibm.com/developerworks/training/kp/cl-kp-cloudpaas/ Cloud Computing
RW-21 http://cloud.dzone.com/articles/introduction-cloud-computing An Introduction to Cloud Computing Characteristics and Service/Deployment Models
RW-22 http://www.infostor.com/index/articles/display/6999554049/articles/infostor/volume- 13/Issue_10/Features/How_real_is_cloud_computing_storage_.html
Cloud storage
RW-23 http://blogs.technet.com/b/privatecloud/archive/2012/04/05/planning-guideforinfrastructure- as-a-service-iaas.aspx
Planning Guide for Infrastructure as a Service (IaaS)
RW-24 http://www.answers.com/topic/hierarchical-file-system Hierarchical File System
RW-25 https://developers.google.com/storage/docs/reference/v1/getting-startedv1 Google Cloud Storage
RW-26 http://christoph.ruegg.name/blog/2010/7/21/content-based-storage-in-the-cloud.html Content-Based Storage in the Cloud
RW-27 http://www.cloudtweaks.com/2012/06/unified-storage-for-the-cloud-means-higherlevelinterfaces/
Unified Storage For The Cloud Means Higher-Level Interfaces Read more
RW-28 http://www.isaca.org/Knowledge-Center/Standards/Pages/IS-Auditing-Guideline-G32- Business-Continuity-Plan-BCP-Review-from-IT-Perspective.aspx
IS Auditing Guideline: G32 Business Continuity Plan (BCP) Review from IT Perspective
RW-29 http://blog.disastercomuk.co.uk/tag/business-continuity-lifecycle-diagrams/ Business Continuity Management Lifecycle
RW-30 http://www.backupassist.com/education/articles/why-upgrade-to-v6.html Business Continuity
RW-31 http://www.storagesearch.com/datalink-nasbackup-art-2.pdf NAS BACKUP
RW-32 http://searchdatabackup.techtarget.com/feature/Data-deduplication-approachesinbackup- today
Deduplication in data
RW-33 http://www.ciol.com/resources/UserFiles/Technology/DataDe-duplication- Whitepaper.pdf
DataDe-duplication-II
RW-34 http://www.drbd.org/users-guide/s-replication-protocols.html Replication modes
RW-35 http://docs.oracle.com/cd/E19359-01/819-6148-10/chap2.html Replication and Synchronization Modes
RW-36 http://www.emc.com/collateral/software/white-papers/h8063-data-migrationvspherewp. pdf
Data Migration
RW-37 http://cisjournal.org/journalofcomputing/archive/vol3no3/vol3no3_13.pdf Storage Security
RW-38 http://www.sans.org/reading_room/whitepapers/storage/storage-area-networksecureoverview- storage-area-network-security-perspective_516
Storage Network Security
RW-39 http://technet.microsoft.com/en-us/magazine/hh641415.aspx Cloud Computing: Virtual Cloud Security Concerns
RW-40 https://www.sans.org/security-training/virtualization-private-cloud-security-1651-mid Virtualization and Private Cloud Security
RW-41 http://www.snia-europe.org/objects_store/SNIA_CSI_Storage_Multitenancy_ WPfinal2. pdf
Multitenancy
RW-42 http://www.oracle.com/us/026964.pdf ILM for Business
RW-43 http://hadoop.apache.org/ Apache Hadoop
RW-44 http://cloudcomputing.sys-con.com/node/807481 Cloud Computing: Understanding Infrastructure as a Service
Audio Visual Aids
Sr No (AV aids) (only if relevant to the course) Salient Features
AV-1 Videos for the datacenter , servers and storage arrays. The videos depicts the working and configuration of arrays and servers.
Software/Equipments/Databases
Sr No (S/E/D) (only if relevant to the course) Salient Features
SW-1 Navisphere Simulator A simulator used to showcase the internal working of storage arrays in the networked environment. Students will get hands-on experience.
SW-2 Control Center A Dataceneter Management Suite. This simulator provides the insight into datacenter operations and activities.
Detailed Plan For Lectures
LTP week distribution: (LTP Weeks)
Weeks before MTE 7
Weeks After MTE 7
Spill Over 3
Week Number
Lecture Number
Broad Topic(Sub Topic) Chapters/Sections of Text/reference books
Other Readings,Relevant Websites, Audio Visual Aids, software and Virtual Labs
Lecture Description Learning Outcomes Pedagogical ToolDemonstration/ Case Study / Images / animation / ppt etc. Planned
Week 1 Lecture 1 Storage System : Introduction to Information Storage and Management(Types of Data, Big Data, Information, Storage, Evolution of Storage Technology & Architecture)
T-1:Chapter 1 RW-2 Define the data and itssubsystem,Storageevolution
Student will be able tolearn the concept ofdata and big data
Video lectures, demonstration using data center videos
Lecture 2 Storage System : Introduction to Information Storage and Management(Data Center Infrastructure, Challenges in Information Management, Information Life Cycle)
T-1:Chapter 1 RW-42 Cloud and Virtualizationoverview
Studenst will be able tounderstand the conceptsof cloud and virtualenvironment
Case based discussions and explanation using slide shows
Lecture 3 Storage System : Introduction to Information Storage and Management(Overview of virtualization and cloud computing)
T-1:Chapter 1 RW-20 Applications running indata center,Compute anddesktop virtualization
Students will be able tounderstand the datacenter technologies
Peer to peer discussion and explanation using slide shows
Week 2 Lecture 4 Storage System Environment and Data Protection(Popular connectivity protocols. Disk Drive Components, Disk Drive Performance, Key I/O characteristics of an application, Application virtualization, File system mapping, LVM, Compute and Desktop Virtualization)
T-1:Chapter 2 RW-6 Connectivity options,disk performance metrics
Students will learn about diskconfiguration and its performance
Video lectures, demonstration using disk drive videos
Lecture 5 Storage System Environment and Data Protection(Laws governing the Disk Performance, Compare I/O controller utilization and response time, and storage design based on application requirements)
T-1:Chapter 3 RW-9 Disk utilization laws andresponse time
Students will learnabout the disk basicsand response timeconsiderations
Case based discussions and explanation using slide shows
Lecture 6 Storage System Environment and Data Protection(Disk drive performance. Flash drives,DAS, host to storage access, RAID Implementation)
T-1:Chapter 3 RW-9 Storage allocation todisks based upon theapplication requirements
Students will be able tounderstand the conceptof storage allocationand host access
Case based discussions and explanation using slide shows
Week 3 Lecture 7 Storage System Environment and Data Protection(RAID array Components, RAID implementation methods.)
T-1:Chapter 3 RW-8 RAID and itscomponents,implementation
Students will learnabout RAID and itstypes, Methods
RAID visuals, images in slide show and explanation using case studies
Week 3 Lecture 8 Intelligent Storage System(Server flash-caching technology, back end, physical disks and Disk Drive Interfaces, Components of an Intelligent Storage System, front end, and cache operation and management)
T-1:Chapter 4 RW-6 Intelligent storagesystems and theirimplementation in realworld
Students will learnabout the data centerconfigurations and theirusage
Video lectures, demonstration using server/arrays videos
Lecture 9 Intelligent Storage System(Storage Tiering and Cache Tiering, Traditional and virtual storage provisioning, LUN expansion, and LUN Masking)
T-1:Chapter 4 RW-11 Storage and cachetiering, levels of usage
Students will learn about the basics ofstorage and serverbased cache tiering andits usage
Peer to peer discussion and explanation using slide shows
Week 4 Lecture 10 Intelligent Storage System(Case Study- Study of EMC CLARiiON and Symmetrix storage arrays, their Architecture, management, components.)
T-1:Chapter 4 RW-3 Real world servers andtheir architecture
Students willunderstand the workingand implementation of storage servers and arrays
Video lectures, demonstration using server/arrays videos
Lecture 11 Storage Area Network(Fibre Channel Architecture, Zoning, Fibre Channel Login Types, Fibre Channel, Components of SAN, FC connectivity, Fibre Channel Ports)
T-1:Chapter 6 RW-14 FC SAN ans itscomponents, where theyare used and how theyare usedZoning in SAN, howdata can be protected andassigned to differentusers
Students will be able tolearn about SAN and itsartifactsStudents will learn toapply security to dataand users across zones
Peer to peer discussion and explanation using slide shows
Lecture 12 Test1
Week 5 Lecture 13 Storage Area Network(FC topologies, Organization of FC data, Fabric services, Virtual SAN, Block Level Virtualization)
R-1:Chapter 17 RW-17 Block level virtualizationin SAN and its configuration
Students willunderstand the basics ofBlock virtualizationandits importance
Peer to peer discussion and explanation using slide shows
Lecture 14 Storage Area Network(Designing SAN/NAS, Case Study of EMC Connectrix)
R-1:Chapter 17 RW-14 IO workloadmanagement in SAN,designing of a SAN andNAS
Students will learn todesignand configureSAN and NAS
Peer to peer discussion and explanation using slide shows
Lecture 15 ISCSI, FCIP and Network Attached Storage(iSCSI names, FCIP protocol, and FICP protocol stack, Components of FCoE, Components of iSCSI, host connectivity options, and ISCSI topologies, Protocol stack)
T-1:Chapter 8 RW-17 ISCSI and its usage in the data center, topologies of ISCSI
Students will be able todefine ISCSI protocoland its attributes
Peer to peer and case based discussion. Explanation using slide shows
Week 6 Lecture 16 ISCSI, FCIP and Network Attached Storage(FCoE frame mapping, and Converged Enhanced Ethernet. General purpose Servers v/s NAS Devices)
T-1:Chapter 8 RW-17 FCIP vs IFCP connectivities, their implementation
Students will be able tounderstand thedifference betweenISCSI, FCIP and IFCP
Peer to peer and case based discussion. Explanation using slide shows
Week 6 Lecture 17 ISCSI, FCIP and Network Attached Storage(NAS File Sharing Protocols, NAS I/O Operations, Factors affecting NAS Performance & Availability, NAS Benefits, NAS File I/O, NAS Components, NAS Implementation)
T-1:Chapter 7 RW-19 NAS implementationwith its components
Students will learnabout the NASconfiguration methods
Peer to peer and case based discussion.
Lecture 18 ISCSI, FCIP and Network Attached Storage(File Level Virtualization, Case Study EMC Celerra.)
T-1:Chapter 7 RW-19 NAS virtualiztion and itsusage
students will be able todefine FILE virtulization
Peer to peer and case based discussion
Week 7 Lecture 19 Object and Content Based Storage(Compare traditional and object-based storage model, key components of OSD, Comparison of hierarchical file system and flat address space)
T-1:Chapter 9 RW-26 File systems used forstoring the data acrosssystems, object basedstorage
Students will learnabout the basics of filesystems and objectstorage
Case based discussions and explanation using slide shows
Lecture 20 Object and Content Based Storage(Storage and retrieval process in OSD, CAS, components of unified storage)
T-1:Chapter 9 RW-26 CAS model for archivingthe data across domains
Unified storage modelfor the cloud and datacenters
Students will be able tounderstand the conceptof CAS and itscomponents
Students will learnabout its basics and itsconfiguration
Case based discussions and explanation using visuals
Object and Content Based Storage(Data access from unified storage. Case Study of EMC Centera)
T-1:Chapter 9 RW-26 CAS model for archivingthe data across domains
Unified storage modelfor the cloud and datacenters
Students will be able tounderstand the conceptof CAS and itscomponents
Students will learnabout its basics and itsconfiguration
Case based discussions and explanation using nevisphere simulator
Lecture 21 Test2
MID-TERMWeek 8 Lecture 22 Business Continuity, Backup and
Recovery(Information Availability, BC Terminology, BC Planning Lifecycle, Failure Analysis, Business Impact Analysis)
T-1:Chapter 11 RW-28 Business continuity planand its process, BCplanning lifecycle
Students will be able todefine the BC plan andits implementation
Case based discussions and explanation using slide shows
Lecture 23 Business Continuity, Backup and Recovery(Architecture, Granularity, Considerations, Methods, Process, Backup and Restore Operations, BC Technology Solutions, Continuous data protection (CDP). Backup Purpose)
T-1:Chapter 11 RW-28 BIA tools and theprocess, CDP methodsand procedures
Students will be able tounderstand the conceptof BIA and its applicability, the CDP process
Case based discussions and explanation using nevisphere simulator
Week 8 Lecture 24 Business Continuity, Backup and Recovery(Backup to tapes, backup to disks, backup to virtual tapes, data deduplication methods,Backup Topologies, Backup in NAS Environment, Backup Technologies)
T-1:Chapter 12 RW-29 Backup in NAS scenario,backup technologies tobe used in there
Students will be able todefine the NAS backupmethods and thetechnologies to be used
Video lectures, demonstration using backup videos
Week 9 Lecture 25 Business Continuity, Backup and Recovery(Data deduplication implementations, Backup approaches in virtualized Environment)
T-1:Chapter 12 RW-32 data deduplicationmethods and their types,their applicability
Students will be able todefine deduplicationmethods and their usagein data center andstorage scenario
Peer to peer and case based discussion. Explanation using slide shows
Lecture 26 Replication(Local replication technologies, restore & restart considerations, creating multiple replicas, Local Replication at Source & Target, uses, data consistency, local replication technologies)
T-1:Chapter 13 RW-34 Replication and its types,local replication technologies
Students will be able todefine the concept ofLocal and remotereplication technologiesand their implementation
Case based discussions and explanation using nevisphere simulator
Lecture 27 Replication(CDP, local replication in virtualized environment, management interface)
T-1:Chapter 13 RW-35 Local replication invirtual infra, how tocreate multiple replicas
Students will be able todefine and use the localreplication methosdsand their implementation
Case based discussions and explanation using nevisphere simulator
Week 10 Lecture 28 Replication(Remote Replication Technologies, CDP remote replication, Case Study of EMC Snapview, modes of remote replication)
T-1:Chapter 13 RW-35 Remote replication typesand modes, remotetechnologies, three sitereplication
Students will be able todefine remotereplication technologiesand their usage in datastorage
Case based discussions and explanation using nevisphere simulator
Lecture 29 Replication(Remote replication/migration in virtualized environment)
T-1:Chapter 14 RW-34 Continuous dataprotection and theirusage in data protectionand redundancy,replicatiin virtual infrastructure
Students will learnabout migration andreplication stretegies,their usage,configuration andimplementation
Case based discussions and explanation using nevisphere simulator
Lecture 30 Cloud Computing(Cloud computing overview, essential cloud characteristics, and cloud enabling technologies)
T-1:Chapter 14 RW-20 Cloud and its attributes Students will learnabout cloud computingand its characteristics
Video lectures, demonstration using data center and cloud environment videos
Week 11 Lecture 31 Cloud Computing(Service models and cloud deployment models, Cloud infrastructure framework)
T-1:Chapter 14 RW-21 Cloud and its attributesCloud physical andvirtual infrastructure
Students will learnabout cloud computingand its characteristicsStudents will be able tiunderstand the virtualinfra for the clouddeployment
Peer to peer and case based discussion. Explanation using slide shows
Week 11 Lecture 32 Cloud Computing(Physical infrastructure, virtual infrastructure, application and platform software)
T-1:Chapter 14 RW-25 Cloud storage and itsusage across the domains
Students will be able todefine cloud basedstorage and theirimplementation methods
Peer to peer and case based discussion. Explanation using slide shows
Lecture 33 Cloud Computing(Cloud management and service creation tools, and cloud optimized storage and concept in practice.)
T-1:Chapter 14 RW-39 Cloud deploymentmethods, services
Students will learnabout cloud types andtheir usage across thedomains
Peer to peer and case based discussion. Explanation using slide shows
Week 12 Lecture 34 Storage Security and Management(Storage Security Framework, Risk Triad, Storage Security Domains)
T-1:Chapter 15 RW-37 Security framework indata center scenario andvirtual framework,security domains in datacenter
students will be able todefine the storagesecurity domains andtheir applicability in theinfrastructure
Case based discussions and demonstration using visuals
Lecture 35 Storage Security and Management(Network firewalls, security implementation in IP SAN, Security Implementations in Storage Networking, Kerberos)
T-1:Chapter 15 RW-38 Security implementationin networked infra likeSAN and NAS, SecuritypoliciesSecurity in IP SANscenario, its applicabilityand configuration,implementation
Students will be able todefine the securityinside NAS and SAN ,applying policies onthemStudents will be ble tounderstand the conceptsof security andprotection in IP SAN
Case based discussions and demonstration using visuals
Lecture 36 Storage Security and Management(Security in virtualized and cloud environment, and concept in practice.)
T-1:Chapter 15 RW-39 Security aspects in cloudand virtual world,different techniques to beused for them
Students will eb able todefine and implenmentthe cloud andvirtualization securityconcerns
Case based discussions and demonstration using visuals
Week 13 Lecture 37 Managing the Storage Infrastructure(Monitoring the Storage Infrastructure, Storage infrastructure management in virtualized environment)
T-1:Chapter 16 RW-23RW-28
Monitoring of storageinfrastructure and itsattributes, variousdomains under it, theirconfiguration
Students will learnabout the concepts ofdata centermanagement protocolsand techniques,procedures to befollowed
Case based discussions and demonstration using visuals
Lecture 38 Managing the Storage Infrastructure(Monitoring the Storage Infrastructure, Storage infrastructure management in virtualized environment)
T-1:Chapter 16 RW-23RW-28
Monitoring of storageinfrastructure and itsattributes, variousdomains under it, theirconfiguration
Students will learnabout the concepts ofdata centermanagement protocolsand techniques,procedures to befollowed
Case based discussions and demonstration using visuals
Lecture 39 Test3
Week 14 Lecture 40 Managing the Storage Infrastructure(Challenges in managing information, Information lifecycle management, Storage multitenancy, Storage Management Activities)
T-1:Chapter 16 RW-40RW-42
Storage multitenancy indata center scenarios,how it is useful,management activities indata centers
Students will be able todefine the multitenancyconcept and its usage incloud and data center
Peer to peer and case based discussion. Explanation using slide shows
Week 14 Lecture 41 Managing the Storage Infrastructure(Challenges in managing information, Information lifecycle management, Storage multitenancy, Storage Management Activities)
T-1:Chapter 16 RW-40RW-42
Storage multitenancy indata center scenarios,how it is useful,management activities indata centers
Students will be able todefine the multitenancyconcept and its usage incloud and data center
Peer to peer and case based discussion. Explanation using slide shows
Lecture 42 Managing the Storage Infrastructure(Benefits of ILM, storage tiering, and concept in practice, Case Study of EMC Control Center.)
T-1:Chapter 16 RW-42 ILM management inbusiness, its role andattributes with respect toapplications
Students will define therole played by ILM ininformationmanagement andprocedures used forprocessing and analysis
Peer to peer and case based discussion. Explanation using slide shows
SPILL OVERWeek 15 Lecture 43 Spill Over
Lecture 44 Spill Over
Lecture 45 Spill Over
Scheme for CA:Component Frequency Out Of Each Marks Total Marks
Test 2 3 10 20
Total :- 10 20
Details of Academic Task(s)
AT No. Objective Topic of the Academic Task Nature of Academic Task(group/individuals/field
work
Evaluation Mode Allottment / submission Week
Test1 To Test the Knowledge of the students
Storage System : Introduction to Information Storage andManagement,Storage System Environment and DataProtection,Intelligent Storage System,Fibre Channel Architecture,Zoning, Fibre Channel Login Types, Fibre Channel, Componentsof SAN, FC connectivity, Fibre Channel Ports
Individual On the basis of performance
2 / 4
Test2 To Test the Knowledge of the students
FC topologies, Organization of FC data, Fabric services, VirtualSAN, Block Level Virtualization,SAN/NAS CapacityManagement, I/O workload management in SAN/NAS,DesigningSAN/NAS, Case Study of EMC Connectrix,ISCSI, FCIP andNetwork Attached Storage,Object and Content Based Storage
Individual On the basis of Performance in the test
5 / 7
Test3 To Test the Knowledge of the students regarding Storage Technology concepts
Business Continuity, Backup and Recovery,Replication,CloudComputing,Storage Security and Management
Individual On the basis of Performance in the test
11 / 13