Information Storage and
Management
Storing, Managing, and Protecting Digital Information
Ali Broumandnia, Broumandnia@gmail.com 1
Section I Storage System
In This Section:
• Chapter 1: Introduction to Information Storage and Management
• Chapter 2: Storage System Environment
• Chapter 3: Data Protection: RAID
• Chapter 4: Intelligent Storage Systems
Ali Broumandnia, Broumandnia@gmail.com 2
Chapter 1
Introduction to Information Storage and
Management
• 1.1 Information Storage
• 1.2 Evolution of Storage Technology and Architecture
• 1.3 Data Center Infrastructure
• 1.4 Key Challenges in Managing Information
• 1.5 Information Lifecycle
• Summary
Ali Broumandnia, Broumandnia@gmail.com 3
Key Concepts:
• Data and Information
• Structured and Unstructured Data
• Storage Technology Architectures
• Core Elements of a Data Center
• Information Management
• Information Lifecycle Management
Ali Broumandnia, Broumandnia@gmail.com 4
This chapter describes the evolution of information storage
architecture from simple direct-attached models to complex
networked topologies.
It introduces the information lifecycle management (ILM)
strategy, which aligns the information technology (IT)
infrastructure with business priorities.
Ali Broumandnia, Broumandnia@gmail.com 5
• Information created by individuals gains value when shared
with others. When created, information resides locally on
devices such as cell phones, cameras, and laptops.
• To share this information, it needs to be uploaded via
networks to data centers. It is interesting to note that while the
majority of information is created by individuals, it is stored
and managed by a relatively small number of organizations.
Ali Broumandnia, Broumandnia@gmail.com 6
Figure 1-1: Virtuous cycle of informationAli Broumandnia, Broumandnia@gmail.com 7
1.1 Information Storage
Businesses use data to derive information that is
critical to their day-to-day operations. Storage is a
repository that enables users to store and retrieve this
digital data.
Ali Broumandnia, Broumandnia@gmail.com 8
1.1.1 Data
• Data is a collection of raw facts from which
conclusions may be drawn.
• Data in this form is called digital data and is
accessible by the user only after it is processed by
a computer.
Ali Broumandnia, Broumandnia@gmail.com 9
Ali Broumandnia, Broumandnia@gmail.com 10
With the advancement of computer and communication
technologies, the rate of data generation and sharing has increased
exponentially. The following is a list of some of the factors that
have contributed to the growth of digital data:
• Increase in data processing capabilities
• Lower cost of digital storage
• Affordable and faster communication technology
Ali Broumandnia, Broumandnia@gmail.com 11
• Increase in data processing capabilities: Modern-day computers provide a
significant increase in processing and storage capabilities. This enables the
conversion of various types of content and media from conventional forms to
digital formats.
• Lower cost of digital storage: Technological advances and decrease in the cost
of storage devices have provided low-cost solutions and encouraged the
development of less expensive data storage devices. This cost benefit has
increased the rate at which data is being generated and stored.
• Affordable and faster communication technology: The rate of sharing digital
data is now much faster than traditional approaches. A handwritten letter may
take a week to reach its destination, whereas it only takes a few seconds for an
e-mail message to reach its recipient .Ali Broumandnia, Broumandnia@gmail.com 12
1.1.2 Types of Data
• Data can be classified as structured or unstructured based on how it is stored
and managed.
• Structured data is organized in rows and columns in a rigidly defined
format so that applications can retrieve and process it efficiently. Structured
data is typically stored using a database management system (DBMS).
• Data is unstructured if its elements cannot be stored in rows and
columns, and is therefore difficult to query and retrieve by business
applications. For example, customer contacts may be stored in various forms
such as sticky notes, e-mail messages, business cards, or even digital format
files such as .doc, .txt, and .pdf.
Ali Broumandnia, Broumandnia@gmail.com 13
Ali Broumandnia, Broumandnia@gmail.com 14
1.1.3 Information
• Data, whether structured or unstructured, does not
fulfill any purpose for individuals or businesses unless it
is presented in a meaningful form.
• Businesses need to analyze data for it to be of
value.
• Information is the intelligence and knowledge
derived from data.
Ali Broumandnia, Broumandnia@gmail.com 15
• Because information is critical to the success of a business,
there is an ever present concern about its availability and
protection.
• Legal, regulatory, and contractual obligations regarding the
availability and protection of data only add to these concerns.
Ali Broumandnia, Broumandnia@gmail.com 16
1.1.4 Storage
• Data created by individuals or businesses must be stored so that it is easily
accessible for further processing. In a computing environment, devices
designed for storing data are termed storage devices or simply storage.
• Devices such as memory in a cell phone or digital camera, DVDs, CD-
ROMs, and hard disks in personal computers are examples of storage
devices.
Ali Broumandnia, Broumandnia@gmail.com 17
1.2 Evolution of Storage Technology and Architecture
• Historically, organizations had centralized computers (mainframe) and
information storage devices (tape reels and disk packs) in their data center. The
evolution of open systems and the affordability and ease of deployment that
they offer made it possible for business units/departments to have their own
servers and storage. In earlier implementations of open systems, the storage
was typically internal to the server.
• The proliferation of departmental servers in an enterprise resulted in
unprotected, unmanaged, fragmented islands of information and increased
operating cost. Originally, there were very limited policies and processes for
managing these servers and the data created. To overcome these challenges,
storage technology evolved from non-intelligent internal storage to intelligent
networked storage.
Ali Broumandnia, Broumandnia@gmail.com 18
Highlights of this technology evolution include:
• Redundant Array of Independent Disks (RAID):
• Direct-attached storage (DAS):
• Storage area network (SAN):
• Network-attached storage (NAS):
• Internet Protocol SAN (IP-SAN):
Ali Broumandnia, Broumandnia@gmail.com 19
• Redundant Array of Independent Disks (RAID): This technology was
developed to address the cost, performance, and availability
requirements of data. It continues to evolve today and is used in all
storage architectures such as DAS, SAN,…
• Direct-attached storage (DAS): This type of storage connects
directly to a server (host) or a group of servers in a cluster. Storage
can be either internal or external to the server. External DAS
alleviated the challenges of limited internal storage capacity.
Highlights of this technology evolution include:
Ali Broumandnia, Broumandnia@gmail.com 20
1.2 Evolution of Storage Technology and Architecture
• Storage area network (SAN): This is a dedicated, high-performance
Fiber Channel (FC) network to facilitate block-level communication between
servers and storage. Storage is partitioned and assigned to a server for
accessing its data. SAN offers scalability, availability, performance, and cost
benefits compared to DAS.
• Network-attached storage (NAS): This is dedicated storage for file
serving applications. Unlike a SAN, it connects to an existing communication
network (LAN) and provides file access to heterogeneous clients. Because it is
purposely built for providing storage to file server applications, it offers higher
scalability, availability, performance, and cost benefits compared to general
purpose file servers.
Ali Broumandnia, Broumandnia@gmail.com 21
1.2 Evolution of Storage Technology and Architecture
• Internet Protocol SAN (IP-SAN): One of the latest evolutions in storage
architecture, IP-SAN is a convergence of technologies used in SAN and NAS. IP-
SAN provides block-level communication across a local or wide area network
(LAN or WAN), resulting in greater consolidation and availability of data.
Storage technology and architecture continues to
evolve, which enables organizations to consolidate,
protect, optimize, and leverage their data to achieve the
highest return on information assets.
Ali Broumandnia, Broumandnia@gmail.com 22
1.2 Evolution of Storage Technology and Architecture
Storage technology and architecture continues to evolve, which
enables organizations to consolidate, protect, optimize, and leverage
their data to achieve the highest return on information assets.Ali Broumandnia, Broumandnia@gmail.com 23
1.3 Data Center Infrastructure
• Organizations maintain data centers to provide centralized data
processing capabilities across the enterprise. Data centers store
and manage large amounts of mission-critical data.
• Large organizations often maintain more than one data center to
distribute data processing workloads and provide backups in the
event of a disaster.
Ali Broumandnia, Broumandnia@gmail.com 24
1.3.1 Core Elements
• Application: An application is a computer program that provides the logic
for computing operations.
• Database: Database management system (DBMS) provides a structured
way to store data in logically organized tables that are interrelated.
• Server and operating system: A computing platform that runs
applications and databases.
• Network: A data path that facilitates communication between clients and
servers or between servers and storage.
• Storage array: A device that stores data persistently for subsequent use.
Ali Broumandnia, Broumandnia@gmail.com 25
Ali Broumandnia, Broumandnia@gmail.com 26
1.3.2 Key Requirements for Data Center Elements
• Uninterrupted operation of data centers is critical to the
survival and success of a business. It is necessary to
have a reliable infrastructure that ensures data is
accessible at all times. While the requirements, shown in
Figure 1-6, are applicable to all elements of the data
center infrastructure, our focus here is on storage
systems..Ali Broumandnia, Broumandnia@gmail.com 27
Ali Broumandnia, Broumandnia@gmail.com 28
• Availability: All data center elements should be designed to
ensure accessibility. The inability of users to access data can
have a significant negative impact on a business.
• Security: Polices, procedures, and proper integration of the data
center core elements that will prevent unauthorized access
to information must be established.
Ali Broumandnia, Broumandnia@gmail.com 29
• Scalability: Data center operations should be able to allocate
additional processing capabilities or storage on demand, without
interrupting business operations.
• Performance: All the core elements of the data center should be
able to provide optimal performance and service all processing
requests at high speed.
• Data integrity: Data integrity refers to mechanisms such as error
correction codes or parity bits which ensure that data is written to
disk exactly as it was received.
Ali Broumandnia, Broumandnia@gmail.com 30
• Capacity: Data center operations require adequate resources to
store and process large amounts of data efficiently. When capacity
requirements increase, the data center must be able to provide
additional capacity without interrupting availability, or, at the very
very least, with minimal disruption.
• Manageability: A data center should perform all operations and
activities in the most efficient manner. Manageability can be
achieved through automation and the reduction of human
(manual) intervention in common tasks.
Ali Broumandnia, Broumandnia@gmail.com 31
1.3.3 Managing Storage Infrastructure
Key management activities:
• Monitoring is the continuous collection of information and the review
of the entire data center infrastructure include security, performance,
accessibility, and capacity.
• Reporting is done periodically on resource performance, capacity, and
utilization.
• Provisioning is the process of providing the hardware, software, and
other resources needed to run a data center. Provisioning activities
include capacity and resource planning. Capacity planning ensures that
the user’s and the application’s future needs will be addressed in the
most cost-effective and controlled manner.
Ali Broumandnia, Broumandnia@gmail.com 32
1.4 Key Challenges in Managing Information
• Exploding digital universe: The rate of information growth is increasing
exponentially. Duplication of data to ensure high availability and
repurposing has also contributed to the multifold increase of
information growth.
• Increasing dependency on information: The strategic use of
information plays an important role in determining the success of a
business and provides competitive advantages in the marketplace.
• Changing value of information: Information that is valuable today may
become less important tomorrow. The value of information often
changes over time.
Ali Broumandnia, Broumandnia@gmail.com 33
1.5 Information Lifecycle
• The information lifecycle is the “change in the value of
information” over time. When data is first created, it often has the
highest value and is used frequently.
• As data ages, it is accessed less frequently and is of less value to
the organization. Understanding the information lifecycle helps to
deploy appropriate storage infrastructure, according to the
changing value of information.
Ali Broumandnia, Broumandnia@gmail.com 34
Ali Broumandnia, Broumandnia@gmail.com 35
1.5.1 Information Lifecycle Management:
• Information lifecycle management (ILM) is a proactive
strategy that enables an IT organization to effectively
manage the data throughout its lifecycle, based on
predefined business policies. This allows an IT organization
to optimize the storage infrastructure for maximum return
on investment.
Ali Broumandnia, Broumandnia@gmail.com 36
An ILM strategy should include the following characteristics:
• Business-centric: It should be integrated with key processes, applications, and
initiatives of the business to meet both current and future growth in information.
• Centrally managed: All the information assets of a business should be under the
purview of the ILM strategy.
• Policy-based: The implementation of ILM should not be restricted to a few
departments. ILM should be implemented as a policy and encompass all business
applications, processes, and resources.
• Heterogeneous: An ILM strategy should take into account all types of storage
platforms and operating systems.
• Optimized: Because the value of information varies, an ILM strategy should consider
the different storage requirements and allocate storage resources based on the
information’s value to the business.Ali Broumandnia, Broumandnia@gmail.com 37
1.5.2 ILM Implementation
• The process of developing an ILM strategy includes four activities:
• 1- Classifying data and applications on the basis of business rules and
policies to enable differentiated treatment of information
• 2- Implementing policies by using information management tools,
starting from the creation of data and ending with its disposal
• 3- Managing the environment by using integrated tools to reduce
operational complexity
• 4- Organizing storage resources in tiers to align the resources with data
classes, and storing information in the right type of infrastructure based on the
information’s current value
Ali Broumandnia, Broumandnia@gmail.com 38
• Steps 1 and 2 are aimed at implementing ILM in a limited way
across a few enterprise-critical applications. In Step 1, the goal is to
implement a storage networking environment. Storage
architectures offer varying levels of protection and performance
and this acts as a foundation for future policy-based information
management in Steps 2 and 3. The value of tiered storage
platforms can be exploited by allocating appropriate storage
resources to the applications based on the value of the
information processed.Ali Broumandnia, Broumandnia@gmail.com 39
• Step 2 takes ILM to the next level, with detailed application or data
classification and linkage of the storage infrastructure to business
policies. These classifications and the resultant policies can be
automatically executed using tools for one or more applications,
resulting in better management and optimal allocation of storage
resources.
• Step 3 of the implementation is to automate more of the
applications or data classification and policy management activities
in order to scale to a wider set of enterprise applications.
Ali Broumandnia, Broumandnia@gmail.com 40
Ali Broumandnia, Broumandnia@gmail.com 41
1.5.3 ILM Key Benefits
• 1- Improved utilization by using tiered storage platforms and
increased visibility of all enterprise information.
• 2- Simplified management by integrating process steps and
interfaces with individual tools and by increasing automation.
• 3- A wider range of options for backup, and recovery to balance
the need for business continuity.
Ali Broumandnia, Broumandnia@gmail.com 42
• 4- Maintaining compliance by knowing what data needs to be
protected for what length of time.
• 5- Lower Total Cost of Ownership (TCO) by aligning the
infrastructure and management costs with information value.
1.5.3 ILM Key Benefits
Ali Broumandnia, Broumandnia@gmail.com 43
Summary
• This chapter described the importance of data, information, and storage
infrastructure. Meeting today’s storage needs begins with understanding
the type of data, its value, and key management requirements of a
storage system. This chapter also emphasized the importance of the ILM
strategy, which businesses are adopting to manage information effectively
across the enterprise. ILM is enabling businesses to gain competitive
advantage by classifying, protecting, and leveraging information.
• The evolution of storage architectures and the core elements of a data
center covered in this chapter provided the foundation on information
storage. The next chapter discusses storage system environment.
Ali Broumandnia, Broumandnia@gmail.com 44

More Related Content

PPTX
NIST Cloud Computing Reference Architecture
PPTX
CCS335 – CLOUD COMPUTING.pptx
DOCX
Levels of Virtualization.docx
PPTX
Information storage and management
PPTX
cluster computing
PPTX
distributed Computing system model
PPTX
Cloud Computing and Data Centers
PDF
Distributed Operating System_4
NIST Cloud Computing Reference Architecture
CCS335 – CLOUD COMPUTING.pptx
Levels of Virtualization.docx
Information storage and management
cluster computing
distributed Computing system model
Cloud Computing and Data Centers
Distributed Operating System_4

What's hot (20)

PDF
UNIT 1 -BIG DATA ANALYTICS Full.pdf
PPTX
IOT PROTOCOLS.pptx
DOCX
VIRTUALIZATION STRUCTURES TOOLS.docx
PPT
Network Protocol and TCP/IP
PPT
Cluster Computing
PDF
Cs8493 unit 5
PDF
Security in Cyber-Physical Systems
PPTX
Models of Distributed System
PPTX
Hadoop Distributed File System
PPTX
Cloud Resource Management
PPT
cloud computing:Types of virtualization
PDF
Cloud Computing Architecture
PPTX
Ppt 3 - IOT logic design
PPTX
Routing algorithm
PPTX
Data-Intensive Technologies for Cloud Computing
PDF
Distributed deadlock
PPT
File replication
PPT
Unit 4
UNIT 1 -BIG DATA ANALYTICS Full.pdf
IOT PROTOCOLS.pptx
VIRTUALIZATION STRUCTURES TOOLS.docx
Network Protocol and TCP/IP
Cluster Computing
Cs8493 unit 5
Security in Cyber-Physical Systems
Models of Distributed System
Hadoop Distributed File System
Cloud Resource Management
cloud computing:Types of virtualization
Cloud Computing Architecture
Ppt 3 - IOT logic design
Routing algorithm
Data-Intensive Technologies for Cloud Computing
Distributed deadlock
File replication
Unit 4
Ad

Similar to Chapter 1 (20)

PDF
ISM Unit 1.pdf
PDF
Data Storage and Information Management
PPTX
CCS367-STORAGE TECHNOLOGIES-UNIT -I.pptx
PPTX
lecture-1-1487765601.pptx
PDF
CCS367-Storage-Technologies-Lecture-Notes-1.pdf
PPTX
Database management system chap1 ppt.pptx
DOCX
Information Storage and Management notes ssmeena
PPTX
DataBaseManagementSystems OVERVIEW and introduction
PPT
data as the new corporate resource
PDF
SAN module_1.pdf
DOC
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
PPTX
Storage_Technologdawdadsies_Detailed.pptx
PPT
Digital Revolution
ODT
Mis notes
PDF
Gerenral insurance Accounts IT and Investment
PDF
01-Introduction-to-Information-Management.pdf
ISM Unit 1.pdf
Data Storage and Information Management
CCS367-STORAGE TECHNOLOGIES-UNIT -I.pptx
lecture-1-1487765601.pptx
CCS367-Storage-Technologies-Lecture-Notes-1.pdf
Database management system chap1 ppt.pptx
Information Storage and Management notes ssmeena
DataBaseManagementSystems OVERVIEW and introduction
data as the new corporate resource
SAN module_1.pdf
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
Storage_Technologdawdadsies_Detailed.pptx
Digital Revolution
Mis notes
Gerenral insurance Accounts IT and Investment
01-Introduction-to-Information-Management.pdf
Ad

More from Ali Broumandnia (15)

PPTX
Chapter 06 eng
PPTX
Chapter 16
PPTX
Chapter 15
PPTX
Chapter 14
PPTX
Chapter 12
PPTX
Chapter 11
PPTX
Chapter 10
PPTX
Chapter 9
PPTX
Chapter 8
PPTX
Chapter 7
PPTX
Chapter 6
PPTX
Chapter 5
PPTX
Chapter 4
PPTX
Chapter 3
PPTX
Chapter 2
Chapter 06 eng
Chapter 16
Chapter 15
Chapter 14
Chapter 12
Chapter 11
Chapter 10
Chapter 9
Chapter 8
Chapter 7
Chapter 6
Chapter 5
Chapter 4
Chapter 3
Chapter 2

Recently uploaded (20)

PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PPTX
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PPTX
Solar energy pdf of gitam songa hemant k
PDF
Project_Mgmt_Institute_-Marc Marc Marc .pdf
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PPT
UNIT-I Machine Learning Essentials for 2nd years
PDF
Present and Future of Systems Engineering: Air Combat Systems
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PPTX
Unit_1_introduction to surveying for diploma.pptx
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Wireless sensor networks (WSN) SRM unit 2
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PDF
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
PDF
Cryptography and Network Security-Module-I.pdf
PDF
First part_B-Image Processing - 1 of 2).pdf
DOCX
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
PDF
MLpara ingenieira CIVIL, meca Y AMBIENTAL
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
A Brief Introduction to IoT- Smart Objects: The "Things" in IoT
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Solar energy pdf of gitam songa hemant k
Project_Mgmt_Institute_-Marc Marc Marc .pdf
Beginners-Guide-to-Artificial-Intelligence.pdf
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
UNIT-I Machine Learning Essentials for 2nd years
Present and Future of Systems Engineering: Air Combat Systems
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
Unit_1_introduction to surveying for diploma.pptx
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Wireless sensor networks (WSN) SRM unit 2
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
Unit I -OPERATING SYSTEMS_SRM_KATTANKULATHUR.pptx.pdf
Cryptography and Network Security-Module-I.pdf
First part_B-Image Processing - 1 of 2).pdf
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
MLpara ingenieira CIVIL, meca Y AMBIENTAL
distributed database system" (DDBS) is often used to refer to both the distri...

Chapter 1

  • 1. Information Storage and Management Storing, Managing, and Protecting Digital Information Ali Broumandnia, [email protected] 1
  • 2. Section I Storage System In This Section: • Chapter 1: Introduction to Information Storage and Management • Chapter 2: Storage System Environment • Chapter 3: Data Protection: RAID • Chapter 4: Intelligent Storage Systems Ali Broumandnia, [email protected] 2
  • 3. Chapter 1 Introduction to Information Storage and Management • 1.1 Information Storage • 1.2 Evolution of Storage Technology and Architecture • 1.3 Data Center Infrastructure • 1.4 Key Challenges in Managing Information • 1.5 Information Lifecycle • Summary Ali Broumandnia, [email protected] 3
  • 4. Key Concepts: • Data and Information • Structured and Unstructured Data • Storage Technology Architectures • Core Elements of a Data Center • Information Management • Information Lifecycle Management Ali Broumandnia, [email protected] 4
  • 5. This chapter describes the evolution of information storage architecture from simple direct-attached models to complex networked topologies. It introduces the information lifecycle management (ILM) strategy, which aligns the information technology (IT) infrastructure with business priorities. Ali Broumandnia, [email protected] 5
  • 6. • Information created by individuals gains value when shared with others. When created, information resides locally on devices such as cell phones, cameras, and laptops. • To share this information, it needs to be uploaded via networks to data centers. It is interesting to note that while the majority of information is created by individuals, it is stored and managed by a relatively small number of organizations. Ali Broumandnia, [email protected] 6
  • 7. Figure 1-1: Virtuous cycle of informationAli Broumandnia, [email protected] 7
  • 8. 1.1 Information Storage Businesses use data to derive information that is critical to their day-to-day operations. Storage is a repository that enables users to store and retrieve this digital data. Ali Broumandnia, [email protected] 8
  • 9. 1.1.1 Data • Data is a collection of raw facts from which conclusions may be drawn. • Data in this form is called digital data and is accessible by the user only after it is processed by a computer. Ali Broumandnia, [email protected] 9
  • 11. With the advancement of computer and communication technologies, the rate of data generation and sharing has increased exponentially. The following is a list of some of the factors that have contributed to the growth of digital data: • Increase in data processing capabilities • Lower cost of digital storage • Affordable and faster communication technology Ali Broumandnia, [email protected] 11
  • 12. • Increase in data processing capabilities: Modern-day computers provide a significant increase in processing and storage capabilities. This enables the conversion of various types of content and media from conventional forms to digital formats. • Lower cost of digital storage: Technological advances and decrease in the cost of storage devices have provided low-cost solutions and encouraged the development of less expensive data storage devices. This cost benefit has increased the rate at which data is being generated and stored. • Affordable and faster communication technology: The rate of sharing digital data is now much faster than traditional approaches. A handwritten letter may take a week to reach its destination, whereas it only takes a few seconds for an e-mail message to reach its recipient .Ali Broumandnia, [email protected] 12
  • 13. 1.1.2 Types of Data • Data can be classified as structured or unstructured based on how it is stored and managed. • Structured data is organized in rows and columns in a rigidly defined format so that applications can retrieve and process it efficiently. Structured data is typically stored using a database management system (DBMS). • Data is unstructured if its elements cannot be stored in rows and columns, and is therefore difficult to query and retrieve by business applications. For example, customer contacts may be stored in various forms such as sticky notes, e-mail messages, business cards, or even digital format files such as .doc, .txt, and .pdf. Ali Broumandnia, [email protected] 13
  • 15. 1.1.3 Information • Data, whether structured or unstructured, does not fulfill any purpose for individuals or businesses unless it is presented in a meaningful form. • Businesses need to analyze data for it to be of value. • Information is the intelligence and knowledge derived from data. Ali Broumandnia, [email protected] 15
  • 16. • Because information is critical to the success of a business, there is an ever present concern about its availability and protection. • Legal, regulatory, and contractual obligations regarding the availability and protection of data only add to these concerns. Ali Broumandnia, [email protected] 16
  • 17. 1.1.4 Storage • Data created by individuals or businesses must be stored so that it is easily accessible for further processing. In a computing environment, devices designed for storing data are termed storage devices or simply storage. • Devices such as memory in a cell phone or digital camera, DVDs, CD- ROMs, and hard disks in personal computers are examples of storage devices. Ali Broumandnia, [email protected] 17
  • 18. 1.2 Evolution of Storage Technology and Architecture • Historically, organizations had centralized computers (mainframe) and information storage devices (tape reels and disk packs) in their data center. The evolution of open systems and the affordability and ease of deployment that they offer made it possible for business units/departments to have their own servers and storage. In earlier implementations of open systems, the storage was typically internal to the server. • The proliferation of departmental servers in an enterprise resulted in unprotected, unmanaged, fragmented islands of information and increased operating cost. Originally, there were very limited policies and processes for managing these servers and the data created. To overcome these challenges, storage technology evolved from non-intelligent internal storage to intelligent networked storage. Ali Broumandnia, [email protected] 18
  • 19. Highlights of this technology evolution include: • Redundant Array of Independent Disks (RAID): • Direct-attached storage (DAS): • Storage area network (SAN): • Network-attached storage (NAS): • Internet Protocol SAN (IP-SAN): Ali Broumandnia, [email protected] 19
  • 20. • Redundant Array of Independent Disks (RAID): This technology was developed to address the cost, performance, and availability requirements of data. It continues to evolve today and is used in all storage architectures such as DAS, SAN,… • Direct-attached storage (DAS): This type of storage connects directly to a server (host) or a group of servers in a cluster. Storage can be either internal or external to the server. External DAS alleviated the challenges of limited internal storage capacity. Highlights of this technology evolution include: Ali Broumandnia, [email protected] 20
  • 21. 1.2 Evolution of Storage Technology and Architecture • Storage area network (SAN): This is a dedicated, high-performance Fiber Channel (FC) network to facilitate block-level communication between servers and storage. Storage is partitioned and assigned to a server for accessing its data. SAN offers scalability, availability, performance, and cost benefits compared to DAS. • Network-attached storage (NAS): This is dedicated storage for file serving applications. Unlike a SAN, it connects to an existing communication network (LAN) and provides file access to heterogeneous clients. Because it is purposely built for providing storage to file server applications, it offers higher scalability, availability, performance, and cost benefits compared to general purpose file servers. Ali Broumandnia, [email protected] 21
  • 22. 1.2 Evolution of Storage Technology and Architecture • Internet Protocol SAN (IP-SAN): One of the latest evolutions in storage architecture, IP-SAN is a convergence of technologies used in SAN and NAS. IP- SAN provides block-level communication across a local or wide area network (LAN or WAN), resulting in greater consolidation and availability of data. Storage technology and architecture continues to evolve, which enables organizations to consolidate, protect, optimize, and leverage their data to achieve the highest return on information assets. Ali Broumandnia, [email protected] 22
  • 23. 1.2 Evolution of Storage Technology and Architecture Storage technology and architecture continues to evolve, which enables organizations to consolidate, protect, optimize, and leverage their data to achieve the highest return on information assets.Ali Broumandnia, [email protected] 23
  • 24. 1.3 Data Center Infrastructure • Organizations maintain data centers to provide centralized data processing capabilities across the enterprise. Data centers store and manage large amounts of mission-critical data. • Large organizations often maintain more than one data center to distribute data processing workloads and provide backups in the event of a disaster. Ali Broumandnia, [email protected] 24
  • 25. 1.3.1 Core Elements • Application: An application is a computer program that provides the logic for computing operations. • Database: Database management system (DBMS) provides a structured way to store data in logically organized tables that are interrelated. • Server and operating system: A computing platform that runs applications and databases. • Network: A data path that facilitates communication between clients and servers or between servers and storage. • Storage array: A device that stores data persistently for subsequent use. Ali Broumandnia, [email protected] 25
  • 27. 1.3.2 Key Requirements for Data Center Elements • Uninterrupted operation of data centers is critical to the survival and success of a business. It is necessary to have a reliable infrastructure that ensures data is accessible at all times. While the requirements, shown in Figure 1-6, are applicable to all elements of the data center infrastructure, our focus here is on storage systems..Ali Broumandnia, [email protected] 27
  • 29. • Availability: All data center elements should be designed to ensure accessibility. The inability of users to access data can have a significant negative impact on a business. • Security: Polices, procedures, and proper integration of the data center core elements that will prevent unauthorized access to information must be established. Ali Broumandnia, [email protected] 29
  • 30. • Scalability: Data center operations should be able to allocate additional processing capabilities or storage on demand, without interrupting business operations. • Performance: All the core elements of the data center should be able to provide optimal performance and service all processing requests at high speed. • Data integrity: Data integrity refers to mechanisms such as error correction codes or parity bits which ensure that data is written to disk exactly as it was received. Ali Broumandnia, [email protected] 30
  • 31. • Capacity: Data center operations require adequate resources to store and process large amounts of data efficiently. When capacity requirements increase, the data center must be able to provide additional capacity without interrupting availability, or, at the very very least, with minimal disruption. • Manageability: A data center should perform all operations and activities in the most efficient manner. Manageability can be achieved through automation and the reduction of human (manual) intervention in common tasks. Ali Broumandnia, [email protected] 31
  • 32. 1.3.3 Managing Storage Infrastructure Key management activities: • Monitoring is the continuous collection of information and the review of the entire data center infrastructure include security, performance, accessibility, and capacity. • Reporting is done periodically on resource performance, capacity, and utilization. • Provisioning is the process of providing the hardware, software, and other resources needed to run a data center. Provisioning activities include capacity and resource planning. Capacity planning ensures that the user’s and the application’s future needs will be addressed in the most cost-effective and controlled manner. Ali Broumandnia, [email protected] 32
  • 33. 1.4 Key Challenges in Managing Information • Exploding digital universe: The rate of information growth is increasing exponentially. Duplication of data to ensure high availability and repurposing has also contributed to the multifold increase of information growth. • Increasing dependency on information: The strategic use of information plays an important role in determining the success of a business and provides competitive advantages in the marketplace. • Changing value of information: Information that is valuable today may become less important tomorrow. The value of information often changes over time. Ali Broumandnia, [email protected] 33
  • 34. 1.5 Information Lifecycle • The information lifecycle is the “change in the value of information” over time. When data is first created, it often has the highest value and is used frequently. • As data ages, it is accessed less frequently and is of less value to the organization. Understanding the information lifecycle helps to deploy appropriate storage infrastructure, according to the changing value of information. Ali Broumandnia, [email protected] 34
  • 36. 1.5.1 Information Lifecycle Management: • Information lifecycle management (ILM) is a proactive strategy that enables an IT organization to effectively manage the data throughout its lifecycle, based on predefined business policies. This allows an IT organization to optimize the storage infrastructure for maximum return on investment. Ali Broumandnia, [email protected] 36
  • 37. An ILM strategy should include the following characteristics: • Business-centric: It should be integrated with key processes, applications, and initiatives of the business to meet both current and future growth in information. • Centrally managed: All the information assets of a business should be under the purview of the ILM strategy. • Policy-based: The implementation of ILM should not be restricted to a few departments. ILM should be implemented as a policy and encompass all business applications, processes, and resources. • Heterogeneous: An ILM strategy should take into account all types of storage platforms and operating systems. • Optimized: Because the value of information varies, an ILM strategy should consider the different storage requirements and allocate storage resources based on the information’s value to the business.Ali Broumandnia, [email protected] 37
  • 38. 1.5.2 ILM Implementation • The process of developing an ILM strategy includes four activities: • 1- Classifying data and applications on the basis of business rules and policies to enable differentiated treatment of information • 2- Implementing policies by using information management tools, starting from the creation of data and ending with its disposal • 3- Managing the environment by using integrated tools to reduce operational complexity • 4- Organizing storage resources in tiers to align the resources with data classes, and storing information in the right type of infrastructure based on the information’s current value Ali Broumandnia, [email protected] 38
  • 39. • Steps 1 and 2 are aimed at implementing ILM in a limited way across a few enterprise-critical applications. In Step 1, the goal is to implement a storage networking environment. Storage architectures offer varying levels of protection and performance and this acts as a foundation for future policy-based information management in Steps 2 and 3. The value of tiered storage platforms can be exploited by allocating appropriate storage resources to the applications based on the value of the information processed.Ali Broumandnia, [email protected] 39
  • 40. • Step 2 takes ILM to the next level, with detailed application or data classification and linkage of the storage infrastructure to business policies. These classifications and the resultant policies can be automatically executed using tools for one or more applications, resulting in better management and optimal allocation of storage resources. • Step 3 of the implementation is to automate more of the applications or data classification and policy management activities in order to scale to a wider set of enterprise applications. Ali Broumandnia, [email protected] 40
  • 42. 1.5.3 ILM Key Benefits • 1- Improved utilization by using tiered storage platforms and increased visibility of all enterprise information. • 2- Simplified management by integrating process steps and interfaces with individual tools and by increasing automation. • 3- A wider range of options for backup, and recovery to balance the need for business continuity. Ali Broumandnia, [email protected] 42
  • 43. • 4- Maintaining compliance by knowing what data needs to be protected for what length of time. • 5- Lower Total Cost of Ownership (TCO) by aligning the infrastructure and management costs with information value. 1.5.3 ILM Key Benefits Ali Broumandnia, [email protected] 43
  • 44. Summary • This chapter described the importance of data, information, and storage infrastructure. Meeting today’s storage needs begins with understanding the type of data, its value, and key management requirements of a storage system. This chapter also emphasized the importance of the ILM strategy, which businesses are adopting to manage information effectively across the enterprise. ILM is enabling businesses to gain competitive advantage by classifying, protecting, and leveraging information. • The evolution of storage architectures and the core elements of a data center covered in this chapter provided the foundation on information storage. The next chapter discusses storage system environment. Ali Broumandnia, [email protected] 44