Professional Documents
Culture Documents
Chapter 1
Chapter Objectives
Upon completion of this chapter, you will be able to: o Describe who is creating data and the amount of data being created o Describe the value of data to business o List the solutions available for data storage o List and explain the core elements of data center o Describe the ILM strategy
Nearly a quarter of the world's population roughly 1.4 billion people will use the Internet on a regular basis in 2009.
2009 EMC Corporation. All rights reserved.
Online Video
Photo traffic now peaks at over 300,000 images served per second
2009 EMC Corporation. All rights reserved.
Store
Protect
Optimize
Leverage
Information Infrastructure
Store
Protect
Optimize
Leverage
1 Megabyte =
1 million bytes a tablespoon of sand
1 Gigabyte =
1 billion bytes patch of sand 9 square, 1 deep
1 Terabyte =
1 Petabyte =
1 Megabyte =
1 million bytes a tablespoon of sand
1 Exabyte =
1,000 petabytes the same beach from Maine to North Carolina
1 Gigabyte =
1 billion bytes patch of sand 9 square, 1 deep
1 Zetabyte =
1 Terabyte =
1 Yottabyte =
1 Petabyte =
1,000 zetabytes enough info to bury the entire US under 296 feet of sand
What is Data
Collection of raw facts from which conclusions may be drawn
Photo
Book
Letter
Categories of Data
o Data can be categorized as either structured or unstructured data o Over 80% of enterprise information is unstructured
E-Mail Attachments X-Rays PDFs
Check
Unstructured (80%)
Instant Messages Documents
Manuals
Images
Forms
Contracts
Structured (20%)
Rows and Columns
2009 EMC Corporation. All rights reserved.
Define Information
o What do individuals/businesses do with the data they collect?
o They turn it into information
Wired
Wireless
Wireless
Wired
Uploading information
Accessing information
Users of Information
o Customer satisfaction/service
o Tracking shipments, and deliveries
o New services
o Security alerts for stolen credit card purchases
Storage
o Data created by individuals/businesses must be stored for further processing o Type of storage used is based on the type of data and the rate at which it is created and used o Examples:
o Individuals: Digital camera, Cell phone, DVDs, Hard disk
o Businesses: Hard disk, external disk arrays, tape library
LAN
FC SAN
Lesson Summary
Key points covered in this lesson: o Importance of information
Additional Task for Students Research on Storage Technologies & Architecture evolution ( RAID & Storage Networking )
Upon completion of this lesson, you will be able to: o List the five core elements of a data center infrastructure
o Describe the requirements of storage systems for optimally supporting business activities
o Explain the importance of Information Lifecycle Management
Server/ OS Client
LAN
FC SAN
Manageability
Performance Scalability
Capacity
Protect
Process order
Deliver order
Warranty claim
Time
Fulfilled order
Aged data
Warranty Voided
Create
Access
Migrate
Archive
Dispose
A proactive strategy that enables an IT organization to effectively manage the data throughout its lifecycle
2009 EMC Corporation. All rights reserved.
AUTOMATED
Classify data / applications based on business rules
Implement policies with information management tools Integrated management of storage environment Organize storage resources to align with data classes
FLEXIBLE
o Simplified management
o Processes, tools and automation
o Maintaining compliance
o Knowledge of what data needs to be protected for what length of time
Lesson Summary
Key points covered in this lesson: o The five core elements of a Data Center infrastructure
o Key requirements of storage systems to support business activities, as well as some of the constraints
o ILM strategy
o Importance o Characteristics o Activities in developing ILM strategy o IML implementation o Benefits of ILM
Chapter Summary
Key points covered in this chapter: o Importance of data, information, and storage infrastructure
o Types of data, its value, and key management requirements of a storage system
o Evolution of storage architectures o Core elements of a data center o Importance of the ILM strategy
2.2 MB
Document 1 MB
2.2 MB
Original Document + E-mail Text Local E-mail Copy E-mail Server Desktop Backup Redundant Server Tape Archive Copies (4) E-mail Local Copies Server Copies Server Backup Tape Archive
MB 1.0 0.1 1.1 1.1 1.0 2.1 4.2 9.5 4.4 4.4 4.4 8.8 22.0
2.2 MB
8.8 MB
Tape Back-up
Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008
2009 EMC Corporation. All rights reserved.
Typical IT Environment
Web server
Exchange servers
LAN
CRM server
App server
SQL server
Tape backup
Web server
Data Everywhere
Exchange servers
Data Everywhere
LAN
CRM server
server
SQL server
Tape backup
Web server
Exchange servers
LAN
Multiple Backup
CRM server
App server
Multiple Backup Hard to Manage
SQL server
Tape backup
Low Utilization
Difficult to build DR
User Identification
Web server
Automating workflow
Exchange servers
How to Archive
LAN
Unprotected Tape
CRM server
How to handle paper
SQL server
Business Intelligence
Tape backup
Web server
Exchange servers
LAN IP/iSCSI ERP server App server LAN backup FC SQL server SAN IP iSCSI
Tape backup
Unified Storage
Web server
Exchange servers
LAN FC ERP server App server Consolidated backup SQL server SAN IP iSCSI
Web server
Exchange servers
SQL server
Web server
Exchange servers
Tiered Storage
Web server
Exchange servers
LAN
Web Content
Unstructured files
Email Transaction
ERP server
Report Data
SQL server
ECM server
VMware Environment
VMware Environment
Users
ERP Server App server
Web server Exchange Server SQL server
Archive