t, - link.springer.com978-1-4302-0694-1/1.pdf · atn scsi control signal, definition of, 91 attack...
TRANSCRIPT
Index
Numbers 00h-80h SES diagnostic page codes,
descriptions of, 97 1 U form factor of Storage Works NAS
1000s, significance of, 220 3 Rs, overview of, 71-72 8b/10b encoding, overview of, 80 10/100 versus GbE, performance in
network storage experiment, 198 lOBase-T, relationship to switches, 27 10 Gigabit Ethernet, future of, 16 lOOBaseT wiring versus Gigabit Ethernet,
56 100-ohm cable, features of, 54 802.1Q and 802.1P standards, overview
of, 61 802 standards, overview of, 51-53
A absorption loss, relationship to fiber
signal attenuation, 69 ACK SCSI control signal, definition of, 91 ACLs (access control lists)
relationship to firewalls, 63 role in storage network management,
166 sample configuration of, 159
Active SMART, downloading, 41 activity diagrams in UML, purpose of, 187 actors
in hardware replacement use case, 235 in server resource administration
consolidation use case, 238 adaptive computing model, future
directions for, 270-272 addresses, creating for TCP liP routing,
62--63 AES (Advanced Encryption Standard),
relationship to GRIP, 161 AFS (Andrew File System), overview of,
123 AH (Authentication Header), role in
IPSec,l51 AME (Autonomic Management Engine),
role in ISC, 177
application attacks, characteristics of, 158 applications, observing usage patterns of,
179 arbitrated loop
diagram of, 21 explanation of, 20
archival value, significance of, 131 ASA server line by'D:itton, features of, 214 asymmetric encryption, role in SSL, 146 asynchronous data transfer, explanation
of,49 asynchronous remote copies, features of,
139 ATA/66
versusATA/100,199-200 versus SCSI, 196-198
ATA disk drives features of, 37 overview of, 25-26
ATA/IDE drives features of, 45 future addressing on, 45 versus S/ ATA drives, 39
ATA versus SCSI command set, 49 ATN SCSI control signal, definition of, 91 attack types
application attacks, 158 buffer overflows, 157 DoS (denial of service), 156 frag attacks, 157 malformed packets, 156 worms, 157
attenuation in fiber optics, 69 relationship to cabling, 55
authentication in SMB (Server Message Block), 119 with SSL (Secure Socket Layers),
146-147 Autonomic Management Engine,
relationship to TEC, 168 autonomies, future directions for,
270-272 AVVID (Architecture for Voice, Video, and
Integrated Data) initiative, explanation of, 223
277
Index
278
B backplanes, implementing internal bus
architectures with, 11 backup
from drive to drive, 138-140 of file systems, 136--138 versus recovery, 134-135
backup strate,gies, performing by data type,135-138
bad blocks and sectors, occurrence, 37. See also blocks
bandwidth, significance of, 8 bending, relationship to fiber signal
attenuation, 69-70 BER (bit error ratio), impact on network
performance, 77-78 bit patterns, overlaying on clock signals,
78 blocks. See also bad blocks
relationship to file systems, 115 transferring in SCSI communications,
89 hots, dynamics of, 185 bottlenecks, segregating impact of, 252 broadcast mode, explanation of, 27 Brocade fabric management software,
features of, 166 BSY SCSI control signal, definition of, 91 buffer overflows, characteristics of, 157 bus architectures, types of, 12-14. See
also HBAs (host bus adapters) buses
versus processors, 10-11 sharing, 10
business cases, building, 243-246
c cabling
comparing between serial and parallel interfaces, 39
deciding on, 53-54 evaluating, 55 standards for, 54 transmission speeds over, 58
cache, explanation of, 46 Cat 5 versus Cat 6 cable, performance in
network storage experiment, 203 Categories of cable, ratings of, 54 C/D SCSI control signal, definition of, 91 channel-attached storage array, diagram
of,9 CHAP (Challenge Authentication
Protocol), relationship to fabric security, 156
character versus block devices, 116 Chimney Offioad Architecture for
Wmdows, features of, 263 chromatic dispersion, occurrence in
Fibre Channel, 70-71 CIFS (Common Internet File System),
significance of, 119-120 cipher methods, examples of, 147, 151 Cisco, products offered by, 223-224 Cisco 515 PIX, cost of, 161 Class 1-3 of service in FC-2, explanations
of, 81 class diagrams in UML, purpose of, 187 classes, significance of, 3 clients, separating from servers, 7 client-server router topology, diagram of,
63 clock recovery, relationship to Fibre
Channel, 79 clock signal, anatomy of, 78 clock synchronization, relationship to
read/write heads, 36 clone copies, features of, 138-139 cloudscape databases, role in ISC, 176 cluster process in Microsoft, overview of,
208-211 Cluster Services
functionality of, 210 setting up, 208-209
clusters topology, relationship to DFSs, 123
Coda distributed file system, overview of, 124
Codd, Dr. E.E and rules for relational data, 186
collaboration diagrams in UML, purpose of, 187
command descriptor block in SCSI, purpose of, 92
communication, initial occurrence of, 267-268
Company A estimated costs for, 257 financial case for, 255 net benefits for, 257-258 nonquantifiable gross benefits for, 256 quantifiable gross benefits for,
255-256 recommendation for, 254-255
Company A versus Company B analyzing existing situations for,
248-249 analyzing problem statements for,
249-250 comparing solutions for, 246--248
CompanyB proposed solutions for, 254 requirements for, 258
component diagrams in UML, purpose of, 187
connectors, overview of, 56, 75 construction, relationship to cabling, 55 consumer NAS, vendors of, 214 copper IP-based networking, future
directions for, 264-265 copper wiring
behavior of, 79 Fibre Channel over, 83
CoreGuard, features of, 163 cost, evaluating in problem-solving, 191 cost estimates, evaluating, 257 criteria, rating relative importance of, 253 cryptainers, features of, 163 CSMA/CD (Carrier Sense Multiple
Access/ Collision Detection), relationship to MAC, 59
CWDM (coarse wave division multiplexing), overview of, 7 4
D data
encrypting, 146-147 fundamental value of, 130-131 protecting, 141
databases, backing up, 140 database servers, accessing, 178-179 datagrams
components of, 59 minimum and maximum sizes of, 61
data loss, common causes of, 132 data management, overview of, 31 data models, outcome of, 186 data sets, benchmarking for backups, 141 dataspeed,constraining,78 data throughput, benchmarking, 8-9 data transmissions, securing with IPSec,
148 data type, backup strategy by, 135-138 DB SCSI control signal, definition of, 91 DC balance, explanation of, 79 DCE/DFS distributed file system,
overview of, 124 decision matrix, example of, 252-254 Decru DataFort's cryptainers, features of,
163 default TCP liP routing, explanation of, 62 Dell, products offered by,224-225,231 deployment diagrams in UML, purpose
of, 187 descriptor block for SCSI command,
example of, 93
DES (Data Encryption Standard), explanation of, 14 7
devices, demand for shrinking devices, 267-268
DFB (Distributed Feedback) lasers, relationship to Fibre Channel, 67
DFSs (distributed file systems) AFS (Andrew File System), 123 Coda,124 DCE/DFS, 124 GFS (Global File System), 125 Intermezzo, 124 Lustre, 124-125 Microsoft Dfs, 124 overview of, 123
diagnostic page header in SES, description of, 95-96
diameter, relationship to cabling, 55 Diffie and Hellman, paper on
cryptography, 150-151 digital certificates
overview of, 149-150 relationship to fabric security, 155
digital messages, encrypting, 148-149 digital signatures, overview of, 149 disasters, examples of, 132 disk management, performing with
StorageCentral Active Directory Edition, 171
disk resources, allocating with LVM, 112-113
disks. See also hard drive technology accessing,44-45 adding and removing with LVM, 113 KfA disk drives, 25-26 connecting to servers, 26-28 SCSI drives, 26 writing to, 24-25
disk storage subsystems, components of, 5
distributed parity RAID operation, overview of, 110
D-Link GbE cards, using with jumbo frames, 203-204
DOl (Domain of Interpretation), role in IPSec,152
doping, relationship to photodiodes and Fibre Channel, 67
DoS (denial of service) attacks, characteristics of, 156
drives mechanical components of, 34-35 mtbf for, 33-34
drive-to-drive backup, performing, 138-140
DS-X9308-SMIP, Cisco's support for, 223
Index
279
Index
280
DWDM (dense wave division multiplexing), overview of, 75
dynamic computing model, future directions for, 270-272
dynamic TCP liP routing, explanation of, 62
E EDFA (Erbium Doped Fiber
Amplification), relationship to optical signals, 72
electromagnetic signals, detection of, 40 electrons, role in quantum computing,
267 EMC, products offered by, 225-226 Emulex, products offered by, 228-229 encapsulation, significance of, 268-269 enclosure descriptor header in SES,
description of, 95-96 encrypted storage, overview of, 162-163 encryption
dynamics of, 150-151 overview of, 148-149 performing with SSL (Secure Socket
Layers), 146-147 ESP (Encapsulated Security Payload), role
in IPSec, 151 estimated costs, evaluating, 257 Ethernet
relationship to switches, 26-27 versus SCSI, 91 and switch technology, 28-30
Ethernet data payload, minimum and maximum sizes of, 61
Ethernet network cards and bridges, 60 and header construction, 60 and MAC (Media Access Control),
57-60 overview of, 56-57 and switches, 60
evidentiary value, significance of, 130 EVMS (Enterprise Volume Management
Systems), overview of, 125-126 exchanges in FC-2, explanation of, 81 expenditures, types of, 255 Ext3 journaling file system, features of,
121-123 extended copies, features of, 140 external buses, use of, 11 extrinsic absorption, relationship to fiber
signal attenuation, 69 EZ17 Autoloader, using, 136
F fabrics
formation of, 9 significance of, 23
fabric security, overview of, 154-156. See also IPSec; security; SSL (Secure Socket Layers)
FAStT200, features of, 216 FAStT600, features of, 216-218 FAT32 simple 1GB to drive type, results
of, 195 FAT32 versus NTFS, performance in
network storage experiment, 198-199 FAT (file allocation table), location of, 116 FC-0, overview of, 77 FC-1, overview of, 77-79 FC-2, overview of, 80-81 FC-3, overview of, 81-82 FC-4, overview of, 82 FC-AL (Fibre Channel-Arbitrated Loops)
topology, overview of, 76 FC cards, using with FASTt500, 217 FCIP, Cisco's support for, 223 FC layers, descriptions of, 18 FCSec, overview of, 153 feasibility study template, structuring,
240-243 fiber optics. See also Fibre Channel
attenuation in, 69 and CWDM (coarse wave division
multiplexing), 7 4 and DWDM (dense wave division
multiplexing), 75 modes in, 72-73 SCSI commands over, 83 security of, 143-144 signal loss in, 70-71 and TDM (time division multiplexing),
73 and WDM (wave division
multiplexing), 74-75 Fibre Channel. See also fiber optics
chromatic dispersion in, 70-71 FC-0, 77 FC-1, 77-79 FC-2,80-81 FC-3,81-82 FC-4,82 features of, 18-19,23 maximum distance reached by, 69 over copper cable, 83 over parallel SCSI, 83 overview of, 64-70,76-77 and propagation over distance, 68-70 security benefits of, 160 and switch technology, 28-30
Fibre Channel SCSI, overview of, 98 fibre-optic cable, path oflight at entrance
of,69 file request, path of, 6 files, transferring from client data
directory to server drive, 205--206 file systems
backing up, 136-138 characteristics of, 116-117 DFSs (distributed file systems),
123-125 journaling file systems, 121-123 overview of, 115--116 shared file systems, 116-121
finite spectral width, relationship to fiber optics, 70
firewalls, features of, 63 fiscal value, significance of, 131 flow of events
in hardware replacement use case, 235--236
in server resource administration consolidation use case, 238-239
flux reversals, relationship to read/write heads,36
flying height, relationship to read/write heads, 35
FP (Fabry-Perot) lasers, relationship to Fibre Channel, 67
frag attacks, characteristics of, 157 frames in FC-2, explanation of, 81 FTP, performance in network storage
experiment, 201 future directions
autonomies, 270-272
G
Chimney Offioad Architecture for Windows, 262
microdrive technology, 264 quantum computing, 266-267 quantum cryptography, 265--266 shrinking devices, 267-268 Silicon phototonics, 264-265 virtualization,268-269
gauge, relationship to cabling, 55 GbE cards, using with jumbo frames,
203-204 GbE storage network components,
tuning,204-205 GbE versus 10/100, performance in
network storage experiment, 198 generation code in SES, description of,
95--96 geometry of disks, explanation of, 45
GFS (Global File System), overview of, 125
GFS (Google File System), overview of, 185
Gigabit Ethernet versus 100Base-Twiring, 56 features of, 16-17
GIO bus architecture, description of, 13 Great Wall of China, vulnerability of, 145 GRIP (Gigabit Rate IPSec), overview of,
161-162
H half duplex, explanation of, 27 handshake process of SSL, components
of, 147 hard disk factors, reporting with SMART,
41-43 hard disks
performance of, 46 specifications pertaining to, 37-38
hard drive technology, weaknesses of, 35. See also disks
hardware, relationship to virtualization, 173
hardware RAID, overview of, 110-111. See also RAID levels; software RAID
hardware replacement use case, 234-237 hard zoning, relationship to fabric
security, 155 hashing, role in encryption, 150 hash methods, examples of, 147, 151 HBAs (host bus adapters). See also bus
architectures from Emulex, 228 features of, 15--16 Fibre Channel, 18-19,23, 64-70 Gigabit Ethernet, 16-17 iSCSI, 17-18 purpose of, 6 from QLogic, 228 role in SCSI communications, 88
headers in MAC, components of, 60 heads. See read/write head Heisenberg Uncertainty Principle,
relationship to quantum mechanics, 266
hertz, explanation of, 58 Hewlett Packard, products offered by,
219-220 Hifn's HIPP II 8155 Security Protocol
Processor, features of, 162 HIO bus architecture, description of, 14 HIPP II 8155 Security Protocol Processor,
features of, 162
Index
281
Index
282
Hitachi, products offered by, 226-227 hot swapping, Dell's support for, 224 hubs, relationship to switches, 27
I I_T_L nexus, role in SCSI messaging, 92 I_T nexus, role in iSCSI, 99 IBM, management of storage network
assets by, 17 4-177 IBM products
FAStT200, 216 FAStT600,216-218 overview of, 215--216 SAN Volume Controller, 219
ffiM's developerWorks, web address for, 175
IDE devices, features of, 37 IDE W2K stripe 1GB to drive type, results
of, 195 IEEE, development of Learning Object
Meta-Data Specification by, 185--186 IEEE 802 standards
802.1Q and 802.1P, 61 overview of, 51-53
IKE (Internet Key Exchange), overview of, 153
11M (information life cycle management), overview of, 183-184
IMAP (Internet Message Access Protocol), features of, 179-180
impedance, relationship to cabling, 55 IMS metadata, representing, 186 in-band connections, role in storage
network management, 166-167 INCITS (International Committee on
Information Technology Standards), purpose of, 86-87
InfiniBand specification, overview of, 14-15
information classifying, 144 protecting,131-132
"information-based economy," significance of, 130
information life cycle, significance of, 182-183
information management, future directions for, 269-270
initiator, role in SCSI communications, 88 instances, significance of, 3 Integrated Solutions Console in
Autonomic Toolkit, features of, 272 interests, protecting, 131-132 Intermezzo distributed file system,
overview of, 124
internal bus architectures, implementing, 11
intrinsic absorption, relationship to fiber signal attenuation, 69
1/0 SCSI control signal, definition of, 91 IP addresses, creating for TCP liP routing,
62--63 IP fragmentation, characteristics of, 157 IPSec. See also fabric security; security;
SSL (Secure Socket Layers) dynamics of, 151-152 functionality of, 151 overview of, 147-148
IPSec-complaint encryption, relationship to security, 160-161
ISAKMP (Internet Security Association and Key Management/Oakley Protocol), relationship to IPSec, 148, 152
ISC (Integrated Solutions Console), overview of, 175--177
iSCSI Cisco support for, 223 features of, 17-18 overview of, 99-100
iSCSI cards from QLogic, features of, 228 ISO/ITU /OSI network model, overview
of. See OSI network model ISO Layer 1 and Layer 2, overview of, 64 ISO stack, vulnerabilities of, 158
J JFS joumaling file system, features of, 123 joumaling file systems, overview of,
121-123 JSR 168, relationship to ISC, 177 jumbo frames, support for, 203-204
K keyword search, significance of, 135
L lasers, relationship to Fibre Channel,
66--67 Layer 1 and Layer 2 of OSI, overview of,
64 layers of OSI model, diagram of, 4 layers of switches, explanations of, 29-30 LBA (Logical Block Access), explanation
of,46 Learning Object Meta-Data Specification,
purpose of, 185--186 Linksys, products offered by, 214
Linux 2.4 kernel, journaling file systems supported by, 122-123
Linux ext2/66 1GB to drive type, results of, 196
Linux file systems, performance in network storage experiment, 201
LMHosts, relationship to SMB, 121 local storage, typical configuration of, 136 longwave lasers, relationship to Fibre
Channel,66 LUN ID, role in SCSI commands, 93 LUN (Logical Unit Number)
relationship to SCSI devices, 48 role in SCSI communications, 88
LUN masking, relationship to fabric security, 155
Lustre distributed file system, overview of, 124-125
LVM (Logical Volume Management), overview of, 111-113
M MAC (Media Access Control),
relationship to Ethernet network cards, 57-60
mail servers, accessing, 179-180 malformed-packets attacks,
characteristics of, 156 Manchester Phase Encoding, explanation
of, 79 MAPE-K concept, diagram of, 175 MBUS architecture, description of, 13 MCA bus architecture, description of, 13 McCluhan, Marshal on communication,
267-268 McData, relationship to iFCP protocol, 224 message digests, role in encryption, 150 metadata mechanisms, overview of,
184-186 Metcalf's Law, significance of, 11 MFM (Modified Frequency Modulation),
relationship to read/write heads, 36 MHz rate for cable, significance of, 54 MicroChannel architecture, significance
of, 9 microdrive technology, future directions
for,264 Microsoft, products offered by, 221-222 Microsoft Advanced Server 2000
limitations of, 208 using, 230
Microsoft Dfs, overview of, 124 mirror copies, features of, 139 mirrored drives, performance in network
storage experiment, 201-202
mirrored striped drives, performance in network storage experiment, 201-202
mirrored stripe set RAID (level 0+ 1), overview of, 106
mirroring operation in RAID, overview of, 109
mirroring RAID (level!), overview of, 105-106
M (mandatory) SCSI command, explanation of, 92
modes 0-4 ofPIO, explanations of, 38 modes in Fibre Channel, explanation of,
72-73 Moore's Law, significance of, 11,262 MSG SCSI control signal, definition of, 91 MS (Microsoft) cluster process, overview
of, 208-211 mtbf (mean time between failures),
determining for drives, 33-34 multimode cable, using with Fibre
Channel, 72-73 multiplexing signals
CWDM (coarse wave division multiplexing), 74
DWDM (dense wave division multiplexing), 75
TDM (time division multiplexing), 73 WDM (wave division multiplexing),
74-75 Myricom, products offered by, 215
N NAS appliances, managing with
StorageCentral Network Appliances Edition, 172
NAS gateways, features of, 24 NAS (Network Attached Storage)
benefits of, 19 example of, 5 overview of, 22-23 versus SANs (Storage Area Networks),
9 vendors of consumer NAS, 214
NAS solutions, costs of, 258 NAT services, recording client IP
addresses in, 62 NBT (NetBIOS overTCPIIP), resolving
addresses of hosts in, 119 NCSA (National Center for
Supercomputing Applications), purpose of, 215
NearStore products, features of, 222 NetApps, products offered by, 222 NetWin 200, features of, 225-226
Index
283
Index
284
networked storage, overview of, 22-23 network entity in iSCSI, explanation of,
99 "The network is the computer,"
significance of, 2 network load balancing, support for, 208 network performance, 19
affecting, 77-78 benchmarking, 8-9 enhancing, 263 evaluating in problem-solving,
154-155,191 network portal in iSCSI, explanation of,
99 network resource management, overview
of,31 network storage experiment
comparisons in, 196-204 elements of, 191-193 establishing, 191 lessons learned from, 211-212 methodology for, 205-206 practical application of, 208-211 premise for, 193-194 requirements for, 206-208 results of, 194-196 sustainable performance in, 202-203 theory and practice of, 194
NFS (Network File System) overview of, 117-118 versus SMB (Server Message Block),
118,200-201 NIC (network interface card), purpose of,
6 NIS (Network Information Services),
overview of, 118 node growth patterns, computing, 262 nonrepudiation, role in digital signatures,
149 nonroutable protocols and IP addresses,
overview of, 62-63 NTFS simple/661GB to drive type, results
of, 195 NTFS versus FAT32, performance in
network storage experiment, 198-199
0 object diagrams in UML, purpose of, 187 objectives, determining for storage
networks, 244-245 ODBFS (object-based distributed file
system), Lustre as, 125 OFC (Optical Fiber Control) lasers,
relationship to Fibre Channel, 67
Office documents, accessing, 180-181 on-board controller, purpose of, 34 on-demand computing, explanation of,
270 0 (optional) SCSI command, explanation
of,92 open standards versus proprietary
products, 178 optical signals, relationship to EDFA, 72 ordered SCSI commands, explanation of,
94 ordered sets in FC-2, explanation of, 80 OSI network model
and Fibre Channel, 19 and Gigabit Ethernet, 16 and InfiniBand, 15 overview of, 3-4
out-of-band connections, role in storage network management, 166
p packet filtering, relationship to firewalls,
63 parallel SCSI, explanation of, 82--83 parallel versus serial interfaces, 39-40 PCI (Peripheral Component
Interconnect) bus, features of, 12-13 PERC3 RAID controller, features of, 225 performance. See network performance photodiodes, relationship to Fibre
Channel, 67-68 photons, role in quantum computing,
267 physical security, benefits of, 144 ping flood, explanation of, 156 PIO (Programmed I/0), modes and
transfer rates for, 38 PKI (public key infrastructure), role in
SSL, 146 platters
and read/write heads, 35-37 spin rates for, 34
PMC bus architecture, description of, 14 point-to-point topology
diagram of, 20 and Fibre Channel, 65-66
policy-driven storage management, overview of, 17 4-178. See also storage network management
policy management, overview of, 31 portal group in iSCSI, explanation of, 100 port concentrators, relationship to
switches, 27 portlet applications, relationship to ISC,
177
ports, connecting with FC-3, 81--82 PowerConnect 6024 switch, using, 231 PowerCrypt 5X Encryption Accelerator
card, features of, 162 power cycle count, monitoring with
SMART,42 power on hours count, monitoring with
SMART,42 PowerVault 660F, using, 231 PowerVault 725 N, features of, 224-225 priority box, establishing for network
storage experiment, 193 private key encryption, explanation of,
151 private keys, managing, 265 private value, significance of, 131 probes, function in Tivoli storage
management tools, 167-169 problems
criteria for evaluation of, 190-191 placing in context, 250
problem statements analyzing, 249-250 example of, 249 proposed solutions for, 251-259 purpose of, 248
processors versus buses, 10-11 products, selecting, 230-231 proffies, relationship to UML, 187 proprietary products versus open
standards, 178 protocol independence, significance of,
75 protocols
encapsulating within SCSI communications,94
inFC-2, 81 nonroutable protocols and IP
addresses, 62-63 public keys, role in IPSec, 148 pulse, role in fiber optics, 70-71
Q QLogic, products offered by, 227-228 quantum computing, future directions
for, 266-267 quantum cryptography, future directions
for, 265-266 QuickShadow, features of, 226
R RAID levels. See also hardware RAID;
software RAID levelS, 107-108
mirrored stripe set (0+1), 106 mirroring Oevel1), 105-106 spanning, 104-105 stripe with parity Oevel3), 106-107 striping Oevel 0), 104
RAID read/write operations distributed parity, 110 mirroring,109 stripe setting, 108-109 stripe with parity, 109
RAID strategies, overview of, 111 raw read error rate, monitoring with
SMART,42 RDF (Resource Description Framework),
relationship to Learning Object Meta-Data Specification, 186
read-modify-write function, relationship to RAID, 110
read/write head, clearance of, 35 recovery versus backup, 134-135 refractive index of medium, explanation
of,68 regeneration of optical signals,
significance of, 71-72 ReiserFS journaling file system, features
of, 122 relational data, rules for, 186 remote copies, features of, 139 reports, generating with Tivoli, 169 REQ SCSI control signal, definition of, 91 reshaping of optical signals, significance
of, 71-72 retention period, role in information life
cycle, 183 retiming of optical signals, significance
of, 71-72 risk, evaluating in problem-solving, 191 RJ-45 connectors, significance of, 56 RLL (Run Length Limited), relationship to
read/write heads, 36 routers
example of, 28 features of, 61
RPCs (remote procedure calls), relationship to NFS, 117-118
rpm (revolutions per minute), explanation of, 46
R (reserved) SCSI command, explanation of,92
RSCN (Registered State Change Notification), role in fabric security, 155
RST SCSI control signal, definition of, 91
Index
285
Index
286
s SAlT (Sony Super-AIT) technology,
significance of, 136-137 SAM (SCSI Architecture Model), overview
of, 86-88 SAN component vendors, products
offered by, 213-214 SANs (Storage Area Networks)
components of, 4-8 cornerstone concept of, 9 determining objectives for, 244 example of, 230-231 feasibility of, 259 versus NAS (Network Attached
Storage), 9 solutions for Company A versus
Company B, 246-250 terms of reference for, 244-245 trends related to, 229-230 use cases for, 234-240
SAN-switched network storage, overview of, 23. See also switched storage network topology
SAN Volume Controller, features of, 219 Sarbanes-Oxley Act of 2002, significance
of, 133-134 SAs (security associations), role in IPSec,
151-152 Sf KrA versus ATA/IDE drives, 39 SBUS architecture, description of, 13 scattering, relationship to fiber signal
attenuation, 69-70 SCSI (Small Computer System Interface),
transport services provided by, 94 SCSI addressing, overview of, 47 SCSI Architecture Model (SAM), overview
of, 86-88 SCSI bus versus TCP /IP communication,
100 SCSI commands
length of, 92 life cycle of, 90 over fiber-optic cable, 83 overview of, 92-93 processing, 93-94 solutions offered by Fibre Channel,
76-77 standards architecture for, 88 types of, 92
SCSI command set, overview of, 49, 86 SCSI communications
encapsulating protocols within, 94 · overview of, 88-91
SCSI control signals, list of, 91 SCSI devices
linking, 89 overview of, 48-49
SCSI disk read operations, steps involved in,89
SCSI drives features of, 26, 37 parallel SCSI, 82-83 varieties of, 38
SCSI exchanges, phases of, 90 SCSI-PCP, overview of, 98 SCSI messaging, overview of, 91-92 SCSI simple 1GB to drive type, results of,
195 SCSI stripe 1GB to drive type, results of,
195 SCSI versus ATA/66, performance in
network storage experiment, 196-198
SCSI versus Ethernet, 91 SeawayPCI-Xcard, features of, 162 sector count, monitoring with SMART, 42 sectors, bad sectors, 37 Secure Favrid OS, elements of, 154 security. See also fabric security; IPSec;
SSL (Secure Socket Layers) access and encryption aspects of,
143-144 evaluating, 144 and IPSec-compliant encryption,
160-161 seek error rate, monitoring with SMART,
42,44 seek time
explanation of, 46 measuring,34 monitoring performance with SMART,
42 segregation, relationship to NAS, 22 SEL SCSI control signal, definition of, 91 semiconductor lasers, relationship to
Fibre Channel, 66 sequence diagrams in UML, purpose of,
187 sequences in FC-2, explanation of, 81 serial KrA disk drives, overview of, 25-26 serial versus parallel interfaces, 39-40 server clusters, supporting with
FASTtSOO, 218 server consolidation, implementing,
245-246 server resource administration
consolidation use case, 237-240 servers
connecting with storage arrays and disks, 26-28
separating clients from, 7 SES (SCSI Enclosure Services), overview
of, 94-97 shared buses, dynamics of, 10
shared file systems, 116-117 NFS (NetworkFileSystem), 117-118 NIS (Network Information Services),
118 SMB (Server Message Block), 118-121
Share level in SMB, authentication at, 119 shortwave lasers, relationship to Fibre
Channel,66 signal loss, occurrence in fiber optics,
70-71 signals
boosting for Fibre Channel, 68 representing single bits with, 79
Silicon phototonics, future directions for, 264-265
single mode cable, using with Fibre Channel, 72-73
SI (Solution Install), features of, 271-272 SMART (Self-Monitoring Analysis and
Reporting Tool), overview of, 40-44 SMB (Server Message Block)
versus NFS (Network File System), 118,200-201
relationship to shared file systems, 118-121
SMB servers, location in TCP /IP environment, 119
snapshots advantages of, 138 taking with LVM, 113
software RAID, overview of, 111. See also hardware RAID; RAID levels
soft zoning, relationship to fabric security, 155
spanned drives, performance in network storage experiment, 201-202
spanned SCSI sw 1GB to drive type, results of, 195
spanning RAID, overview of, 104-105 speed, evaluating requirements for, 212 spiders, dynamics of, 185 spin retry count, monitoring with SMART,
42 spin up time, monitoring with SMART, 42 SPI (security parameter index), role in
IPSec,l51 SRM (storage resource management),
overview of, 31 SSL (Secure Socket Layers). See also fabric
security; IPSec; security functionality of, 151 overview of, 146-147
Start/Stop count, monitoring with SMART,42
state diagrams in UML, purpose of, 187 static TCP /IP routing, explanation of, 62
storage, encrypting, 162-163 Storage Area Networks. See SANs (Storage
Area Networks) storage arrays, connecting servers to,
26-28 storage assets, accessing, 178-181 StorageCentral, features of, 170-173 storage feasibility
estimated costs of, 243 gross benefits of, 243 net benefits of, 243 objective of, 241 problem statement for, 242 proposed solutions for, 242 recommendation for, 242 terms of reference for, 241
storage network content modeling,l86-188 overview of, 181-186
storage network management. See also policy-driven storage management
automatic model for, 17 4-175 overviewof, 166-167 tools for, 167-173
storage networks. See SANs (Storage Area Networks)
storage network topology, example of, 158-160
storage solutions, proposing, 251 Storage Works NAS 1000, features of, 220 STO (shielded twisted pair) cabling,
features of, 55 stripe with parity RAID (level3), overview
of, 106-109 striping RAID (level 0), 104 Sun Microsystems, products offered by,
227 switched storage network topology,
diagram of, 21. See also SANswitched network storage
switches dynamics of, 26-28 and Ethernet network cards, 60 remote access and configuration of,
166-167 technology of, 28-30
switch layers, comparing, 30 synchronous remote copies, features of,
139
T tagged command queuing, using with
SCSI commands, 93 tape backup characteristics, advantages
and disadvantages of, 137
Index
287
Index
288
tape devices backing up file systems on, 136-138 problems with, 142
target, role in SCSI communications, 88 TCP liP routing
overview of, 61--63 versus SCSI bus, 100
TCP /IP (Thansmission Control Protocol/Internet Protocol), relationship to NFS, 118
TOM (time division multiplexing), overview of, 73
TEC (Tivoli Event Console), features of, 168-169
terms of reference, significance of, 244-245
throughput, explanation of, 46 throughput performance, monitoring
with SMART, 42 Thunder 9500V series, features of, 226 Tivoli storage management tools,
features of, 167-170 TOE (TCP/IP offioad engine),
incorporating into networks, 263 topologies
example of, 158-160 and fiber optics, 75-76 overview of, 20-24 forWorden.net, 207
transaction logs, backing up, 140 transport mode, role in IPSec, 148 triggers
in hardware replacement use case, 235 in server resource administration
consolidation use case, 238 llitton's ASA server line, features of, 214 ThueCopy, features of, 226 TSL (Thansport Security Layer),
functionality of, 151 tunneling, overview of, 145 tunnel mode, role in IPSec, 148 type descriptor header lists in SES,
descriptions of, 95-96
u UDP (User Datagram Protocol),
relationship to NFS, 118 ULPs (Upper-Layer Protocols), support of
Fibre Channel for, 82 UML (Unified Modeling Language), using
with storage network content, 187-188
unification engines, role in NetApps products, 222
untagged command queuing, using with SCSI commands, 93
use case diagrams in UML, purpose of, 187
use cases hardwarereplacement,234-237 server resource administration
consolidation,237-240 User level in SMB, authentication at, 119 utility computing, explanation of, 270 utility value, significance of, 130 UTP (unshielded twisted pair) cabling,
features of, 55
v VCSEL (Vertical Cavity) lasers,
relationship to Fibre Channel, 67 vendors
Cisco, 223-224 comparing,229-230 of consumer NAS, 214 Dell, 224-225 EMC, 225-226 Emulex, 228-229 Hewlett Packard, 219-220 Hitachi, 226-227 IBM, 215-219 Microsoft, 221-222 NetApps, 222 QLogic, 227-228 of SAN components, 213-214 selecting, 230-231 Sun Microsystems, 227
VERITAS storage administration tools, features of, 172
VFM (VIrtual File Manager) software, features of, 222
virtualization benefits of, 258, 259-260 future directions for, 268-269 necessity of, 271 overview of, 31-32,173-174
VME Bus architecture, description of, 14 Volume Controller, features of, 219 Vormetric's CoreGuard, features of, 163 VPNs (virtual private networks)
disadvantages of, 160 relationship to tunneling, 145
VSS (Volume Shadow Services), features of, 221
V (vendor) SCSI command, explanation of,92
w W2K hw stripe 1GB to drive type, results
of, 196 W2K mirror 1GB to drive type, results of,
196 W2K NTFS stripe 66 1GB to drive type,
results of, 195 W2K SCSI stripe 1GB to drive type, results
of, 195 WDM (wave division multiplexing),
overviewof, 74-75 web sites
802 standards, 52 Active SMART, 41 GFS (Google File System), 185 ffiM's developerWorks, 175 SES diagnostic page codes, 97
weight, relationship to cabling, 55 Wmdows Storage Server 2003, using, 253 WINS, relationship to SMB, 121 wireless standards, 802.11 as, 53 wiring
comparing between serial and parallel interfaces, 39
deciding on, 53-54 evaluating, 55 standards for, 54 transmission speeds over, 58
Worden.net, topology of, 207 worldwide unique name in iSCSI,
explanation of, 100 worms, characteristics of, 157 write error count, monitoring with
SMART,42 writing to disk, overview of, 24-25
X xDSL installation, cost of, 257 XFS journaling file system, features of,
122
z ZBR (Zoned Bit Recording), introduction
of,45 zoning, relationship to fabric security,
154-155
Index
289
JOIN THE APRESS FORUMS AND BE PART OF OUR COMMUNilY. You'll find discussions that cover topics
of interest to IT professionals, programmers, and enthusiasts just like you. If you post a query to one of our
forums, you can expect that some of the best minds in the business-especially Apress authors, who all write
with The Expert's Voice TM -will chime in to help you. Why 1ot aim to become one of our most valuable partic
ipants (MVPs) and win cool stuff? Here's a sampling of what you'll find:
DATABASES
Data drives everything.
Share information, exchange ideas, and discuss any database programming or administration issues.
INTERNET TECHNOLOGIES AND NETWORKING
Try living without plumbing (and eventually 1Pv6).
Talk about networking topics including protocols, design, administration, wireless, wired, storage, backup, certifications, trends, and new technologies.
JAVA
We've come a long way from the old Oak tree.
Hang out and discuss Java in whatever flavor you choose: J2SE, J2EE, J2ME, Jakarta, and so on.
MAC OS X
All about the Zen of OS X. OS X is both the present and the future for Mac apps. Make suggestions, offer up ideas, or boast about your new hardware.
OPEN SOURCE
Source code is good; understanding (open) source is better.
Discuss open source technologies and related topics such as PHP, MySQL, Linux, Peri, Apache, Python, and more.
HOW TO PARTICIPATE:
PROGRAMMING/BUSINESS
Unfortunately, it is. Talk about the Apress line of books that cover software methodology, best practices, and how programmers interact with the 'suits."
WEB DEVELOPMENT/DESIGN
Ugly doesn't cut it anymore, and CGI is absurd.
Help is in sight for your site. Find design solutions for your projects and get ideas for building an interactive Web site.
SECURITY
Lots of bad guys out there-the good guys need help.
Discuss computer and network security issues here. Just don't let anyone else know the answers!
TECHNOLOGY IN ACTION
Cool things. Fun things. If'; after hours. It's time to play. Whether you're into LEGO® MINDSTORMS™ or turning an old PC into a DVR, this is where technology turns into fun.
WINDOWS
No defenestration here.
Ask questions about all aspects of Windows programming, get help on Microsoft technologies covered in Apress books, or provide feedback on any Apress Windows book.
Go to the Apress Forums site at http://forums.apress.com/.
Click the New User link.