CONTENTS   

Acknowledgments

Introduction

Chapter 1    Storage Essentials

How Disk Storage Systems Work

Physical Components

Solid-State Drive

Electrical and Mechanical Differences

I/O vs. Throughput

Capacity vs. Speed

Available Disk Interfaces and Their Characteristics

ATA

SCSI

Fibre Channel

SAS

PCI Versions

Multiple Disks for Larger Storage and Fault Tolerance

RAID Levels

JBOD

Hardware, Host-Based, and Software Implementations

Hosts Interaction with Disks

File Systems

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 2    Storage Infrastructure

Storage Arrays

Controller Head

Disk Enclosure

Hot-Swap

Storage Area Networks

Fibre Channel

Fabric

FC or iSCSI Protocol

Block Mode

File System on Host

Direct Attached Storage

SCSI

SAS

eSATA

FC

Network Attached Storage

Components

UNC-Addressable Storage

TCP/IP-Based Storage

NAS File System Protocols

Ethernet-Based Storage

Cloud Storage

Cloud Storage Types

Cloud Storage Methods

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 3    Storage Networking

Fibre Channel Storage Network

Components

Protocols

Topologies

ISL

Port Channel

Trunking

Port Types

Tools

iSCSI Storage Network

Block Mode

Initiator

Target

Ethernet Switching

Ethernet Features

Tools

Storage over a WAN

Bandwidth

Latency

Flow Control

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 4    Storage Hardware

Cables

Optical Cables

Copper Cables

Storage Networking Devices

HBA

NIC

CNA

Repeaters and Amplifiers

Ethernet Switch

Fiber Hub

Fiber Switch

Director

Router

Hot-Swappable Network Components

Removable Storage

Tape Media

Optical Media

Flash Media

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 5    Virtualization

Types of Storage Virtualization

Tape Virtualization

Disk Virtualization

Block Virtualization

File Virtualization

Host Virtualization

LVM

Virtual Provisioning

Implementing Host Virtualization

Array-Based Virtualization

Virtual Provisioning of the Array

Implementing Array-Based Virtualization

Network Virtualization

Concepts

Methods

Provisioning the Logical Fabric

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 6    Storage Management

Storage Provisioning

LUN Provisioning

Thick Provisioning

Thin Provisioning

Thin Provisioning Woes

Best Practices for Disk Provisioning

Oversubscription

Management Protocols

SNMP

WBEM

SMI-S

In-Band vs. Out-of-Band Management

Storage Administration

GUI

CLI

Configuration Management

Information Technology Infrastructure Library

Storage Monitoring, Alerting, and Reporting

Settings Thresholds

Trending

Forecasting and Capacity Planning

Recording a Baseline

Setting Alerts

Displaying Performance Data in Windows with Performance Monitor

Auditing Log Files

Backup Logs

Alerting Methods

Software-Defined Storage

SDS Caveats

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 7    Business Continuity

Business Continuity Objectives

Integrity

Availability

Reliability

Data Value and Risk

Recovery Point Objective

Recovery Time Objective

Mean Time Between Failures

Mean Time to Failure

Backup Frequency

Rotation Schemes

Continuous Data Protection

Contention of Media

Impact on Production

Backup Reliability

Backup and Restore Methods

Backup Implementation Methods

Backup Reliability Methods

Backup Locations

Disk-to-Disk

Disk-to-Tape

VTL

Disk-to-Disk-to-Tape

Vaulting and E-vaulting

Offsite Tape Storage

Array-Based Backups

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 8    Security

Access Control

Authentication

Authorization

Interoperability

Encryption

Encryption Keys

Data at Rest

Data in Motion

Host Encryption

Storage Visibility

LUN Security

Zoning

iSCSI Security

Storage Segmentation

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 9    Design

Storage Architecture Components

Types of Storage Architecture

High Availability

Online Transaction Processing

Cloud Services

Redundancy

Clustering

Power Supply

Controller

Redundant Paths to Disks

Hot Spare

Multipath I/O

Hot-Swap

Path/Bus

Switch

HBA

NIC

Link Aggregation

Array

Cache Redundancy

Replication

Point-in-Time Replication

Continuous Replication

Scope

Site Redundancy

Consistency

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 10    Environment

Facilities

Cable Management

Cooling

Humidity Control

Fire Suppression

Storage Power Requirements

AC

DC

Grounding

Sufficient Capacity

Division of Circuits

Uninterruptable Power Supply

Safety

Weight Considerations

Antistatic Devices

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 11    Advanced Topics

Information Lifecycle Management

Value of Data Based on Frequency of Access

HSM

Storage Tiers

Compliance

Retention Policy

Archiving and Purging

Preservation and Litigation Holds

Advanced Storage Methods

Content-Addressable Storage

Object-Oriented Storage

Deduplication and Compression

Deduplication Levels

Inline and Postprocess Deduplication

Source and Target Deduplication

Deduplication Software and Appliances

Performance and Capacity Implications

Reduction Ratios for Data Types

Chapter Summary

Chapter Review Questions

Chapter Review Answers

Chapter 12    Performance and Troubleshooting

Optimize Performance

Necessary IOPS

Random vs. Sequential I/O

RAID Performance

Defragmentation

Cache

Impact of Replication

Partition Alignment

Queue Depth

Storage Device Bandwidth

Network Device Bandwidth

Adequate Share Capacity

Performance Metrics and Tools

Switch

Array

Host Tools

Network Troubleshooting

Connectivity Issues

VLAN Issues

Zoning Issues

Interoperability Issues

Host Troubleshooting

Hardware or Software Incompatibility

Outdated Firmware or Drivers

Incorrect NIC Configuration

Bad Connector

Bad Cable

Bad Port

Bad NIC

NIC Improperly Connected

Incorrect Firewall Settings

Incorrect Cluster or Multipath Settings

Backup Troubleshooting

Space Limitations

Open Files

Virus Scanning

Permissions

Chapter Summary

Software References

Chapter Review Questions

Chapter Review Answers

Appendix    Practice Exam

Questions

Quick Answer Key

In-Depth Answers

Analyzing Your Results

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.107.90