t, - link.springer.com978-1-4302-0694-1/1.pdf · atn scsi control signal, definition of, 91 attack...

14
Index Numbers 00h-80h SES diagnostic page codes, descriptions of, 97 1U form factor of Storage Works NAS 1000s, significance of, 220 3 Rs, overview of, 71-72 8b/10b encoding, overview of, 80 10/100 versus GbE, performance in network storage experiment, 198 lOBase-T, relationship to switches, 27 10 Gigabit Ethernet, future of, 16 lOOBaseT wiring versus Gigabit Ethernet, 56 100-ohm cable, features of, 54 802.1Q and 802.1P standards, overview of, 61 802 standards, overview of, 51-53 A absorption loss, relationship to fiber signal attenuation, 69 ACK SCSI control signal, definition of, 91 ACLs (access control lists) relationship to firewalls, 63 role in storage network management, 166 sample configuration of, 159 Active SMART, downloading, 41 activity diagrams in UML, purpose of, 187 actors in hardware replacement use case, 235 in server resource administration consolidation use case, 238 adaptive computing model, future directions for, 270-272 addresses, creating for TCP liP routing, 62--63 AES (Advanced Encryption Standard), relationship to GRIP, 161 AFS (Andrew File System), overview of, 123 AH (Authentication Header), role in IPSec,l51 AME (Autonomic Management Engine), role in ISC, 177 application attacks, characteristics of, 158 applications, observing usage patterns of, 179 arbitrated loop diagram of, 21 explanation of, 20 archival value, significance of, 131 ASA server line by'D:itton, features of, 214 asymmetric encryption, role in SSL, 146 asynchronous data transfer, explanation of,49 asynchronous remote copies, features of, 139 ATA/66 versusATA/100,199-200 versus SCSI, 196-198 ATA disk drives features of, 37 overview of, 25-26 ATA/IDE drives features of, 45 future addressing on, 45 versus S/ ATA drives, 39 ATA versus SCSI command set, 49 ATN SCSI control signal, definition of, 91 attack types application attacks, 158 buffer overflows, 157 DoS (denial of service), 156 frag attacks, 157 malformed packets, 156 worms, 157 attenuation in fiber optics, 69 relationship to cabling, 55 authentication in SMB (Server Message Block), 119 with SSL (Secure Socket Layers), 146-147 Autonomic Management Engine, relationship to TEC, 168 autonomies, future directions for, 270-272 AVVID (Architecture for Voice, Video, and Integrated Data) initiative, explanation of, 223 277

Upload: truonglien

Post on 25-Jul-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Index

Numbers 00h-80h SES diagnostic page codes,

descriptions of, 97 1 U form factor of Storage Works NAS

1000s, significance of, 220 3 Rs, overview of, 71-72 8b/10b encoding, overview of, 80 10/100 versus GbE, performance in

network storage experiment, 198 lOBase-T, relationship to switches, 27 10 Gigabit Ethernet, future of, 16 lOOBaseT wiring versus Gigabit Ethernet,

56 100-ohm cable, features of, 54 802.1Q and 802.1P standards, overview

of, 61 802 standards, overview of, 51-53

A absorption loss, relationship to fiber

signal attenuation, 69 ACK SCSI control signal, definition of, 91 ACLs (access control lists)

relationship to firewalls, 63 role in storage network management,

166 sample configuration of, 159

Active SMART, downloading, 41 activity diagrams in UML, purpose of, 187 actors

in hardware replacement use case, 235 in server resource administration

consolidation use case, 238 adaptive computing model, future

directions for, 270-272 addresses, creating for TCP liP routing,

62--63 AES (Advanced Encryption Standard),

relationship to GRIP, 161 AFS (Andrew File System), overview of,

123 AH (Authentication Header), role in

IPSec,l51 AME (Autonomic Management Engine),

role in ISC, 177

application attacks, characteristics of, 158 applications, observing usage patterns of,

179 arbitrated loop

diagram of, 21 explanation of, 20

archival value, significance of, 131 ASA server line by'D:itton, features of, 214 asymmetric encryption, role in SSL, 146 asynchronous data transfer, explanation

of,49 asynchronous remote copies, features of,

139 ATA/66

versusATA/100,199-200 versus SCSI, 196-198

ATA disk drives features of, 37 overview of, 25-26

ATA/IDE drives features of, 45 future addressing on, 45 versus S/ ATA drives, 39

ATA versus SCSI command set, 49 ATN SCSI control signal, definition of, 91 attack types

application attacks, 158 buffer overflows, 157 DoS (denial of service), 156 frag attacks, 157 malformed packets, 156 worms, 157

attenuation in fiber optics, 69 relationship to cabling, 55

authentication in SMB (Server Message Block), 119 with SSL (Secure Socket Layers),

146-147 Autonomic Management Engine,

relationship to TEC, 168 autonomies, future directions for,

270-272 AVVID (Architecture for Voice, Video, and

Integrated Data) initiative, explanation of, 223

277

Index

278

B backplanes, implementing internal bus

architectures with, 11 backup

from drive to drive, 138-140 of file systems, 136--138 versus recovery, 134-135

backup strate,gies, performing by data type,135-138

bad blocks and sectors, occurrence, 37. See also blocks

bandwidth, significance of, 8 bending, relationship to fiber signal

attenuation, 69-70 BER (bit error ratio), impact on network

performance, 77-78 bit patterns, overlaying on clock signals,

78 blocks. See also bad blocks

relationship to file systems, 115 transferring in SCSI communications,

89 hots, dynamics of, 185 bottlenecks, segregating impact of, 252 broadcast mode, explanation of, 27 Brocade fabric management software,

features of, 166 BSY SCSI control signal, definition of, 91 buffer overflows, characteristics of, 157 bus architectures, types of, 12-14. See

also HBAs (host bus adapters) buses

versus processors, 10-11 sharing, 10

business cases, building, 243-246

c cabling

comparing between serial and parallel interfaces, 39

deciding on, 53-54 evaluating, 55 standards for, 54 transmission speeds over, 58

cache, explanation of, 46 Cat 5 versus Cat 6 cable, performance in

network storage experiment, 203 Categories of cable, ratings of, 54 C/D SCSI control signal, definition of, 91 channel-attached storage array, diagram

of,9 CHAP (Challenge Authentication

Protocol), relationship to fabric security, 156

character versus block devices, 116 Chimney Offioad Architecture for

Wmdows, features of, 263 chromatic dispersion, occurrence in

Fibre Channel, 70-71 CIFS (Common Internet File System),

significance of, 119-120 cipher methods, examples of, 147, 151 Cisco, products offered by, 223-224 Cisco 515 PIX, cost of, 161 Class 1-3 of service in FC-2, explanations

of, 81 class diagrams in UML, purpose of, 187 classes, significance of, 3 clients, separating from servers, 7 client-server router topology, diagram of,

63 clock recovery, relationship to Fibre

Channel, 79 clock signal, anatomy of, 78 clock synchronization, relationship to

read/write heads, 36 clone copies, features of, 138-139 cloudscape databases, role in ISC, 176 cluster process in Microsoft, overview of,

208-211 Cluster Services

functionality of, 210 setting up, 208-209

clusters topology, relationship to DFSs, 123

Coda distributed file system, overview of, 124

Codd, Dr. E.E and rules for relational data, 186

collaboration diagrams in UML, purpose of, 187

command descriptor block in SCSI, purpose of, 92

communication, initial occurrence of, 267-268

Company A estimated costs for, 257 financial case for, 255 net benefits for, 257-258 nonquantifiable gross benefits for, 256 quantifiable gross benefits for,

255-256 recommendation for, 254-255

Company A versus Company B analyzing existing situations for,

248-249 analyzing problem statements for,

249-250 comparing solutions for, 246--248

CompanyB proposed solutions for, 254 requirements for, 258

component diagrams in UML, purpose of, 187

connectors, overview of, 56, 75 construction, relationship to cabling, 55 consumer NAS, vendors of, 214 copper IP-based networking, future

directions for, 264-265 copper wiring

behavior of, 79 Fibre Channel over, 83

CoreGuard, features of, 163 cost, evaluating in problem-solving, 191 cost estimates, evaluating, 257 criteria, rating relative importance of, 253 cryptainers, features of, 163 CSMA/CD (Carrier Sense Multiple

Access/ Collision Detection), relationship to MAC, 59

CWDM (coarse wave division multiplexing), overview of, 7 4

D data

encrypting, 146-147 fundamental value of, 130-131 protecting, 141

databases, backing up, 140 database servers, accessing, 178-179 datagrams

components of, 59 minimum and maximum sizes of, 61

data loss, common causes of, 132 data management, overview of, 31 data models, outcome of, 186 data sets, benchmarking for backups, 141 dataspeed,constraining,78 data throughput, benchmarking, 8-9 data transmissions, securing with IPSec,

148 data type, backup strategy by, 135-138 DB SCSI control signal, definition of, 91 DC balance, explanation of, 79 DCE/DFS distributed file system,

overview of, 124 decision matrix, example of, 252-254 Decru DataFort's cryptainers, features of,

163 default TCP liP routing, explanation of, 62 Dell, products offered by,224-225,231 deployment diagrams in UML, purpose

of, 187 descriptor block for SCSI command,

example of, 93

DES (Data Encryption Standard), explanation of, 14 7

devices, demand for shrinking devices, 267-268

DFB (Distributed Feedback) lasers, relationship to Fibre Channel, 67

DFSs (distributed file systems) AFS (Andrew File System), 123 Coda,124 DCE/DFS, 124 GFS (Global File System), 125 Intermezzo, 124 Lustre, 124-125 Microsoft Dfs, 124 overview of, 123

diagnostic page header in SES, description of, 95-96

diameter, relationship to cabling, 55 Diffie and Hellman, paper on

cryptography, 150-151 digital certificates

overview of, 149-150 relationship to fabric security, 155

digital messages, encrypting, 148-149 digital signatures, overview of, 149 disasters, examples of, 132 disk management, performing with

StorageCentral Active Directory Edition, 171

disk resources, allocating with LVM, 112-113

disks. See also hard drive technology accessing,44-45 adding and removing with LVM, 113 KfA disk drives, 25-26 connecting to servers, 26-28 SCSI drives, 26 writing to, 24-25

disk storage subsystems, components of, 5

distributed parity RAID operation, overview of, 110

D-Link GbE cards, using with jumbo frames, 203-204

DOl (Domain of Interpretation), role in IPSec,152

doping, relationship to photodiodes and Fibre Channel, 67

DoS (denial of service) attacks, characteristics of, 156

drives mechanical components of, 34-35 mtbf for, 33-34

drive-to-drive backup, performing, 138-140

DS-X9308-SMIP, Cisco's support for, 223

Index

279

Index

280

DWDM (dense wave division multiplexing), overview of, 75

dynamic computing model, future directions for, 270-272

dynamic TCP liP routing, explanation of, 62

E EDFA (Erbium Doped Fiber

Amplification), relationship to optical signals, 72

electromagnetic signals, detection of, 40 electrons, role in quantum computing,

267 EMC, products offered by, 225-226 Emulex, products offered by, 228-229 encapsulation, significance of, 268-269 enclosure descriptor header in SES,

description of, 95-96 encrypted storage, overview of, 162-163 encryption

dynamics of, 150-151 overview of, 148-149 performing with SSL (Secure Socket

Layers), 146-147 ESP (Encapsulated Security Payload), role

in IPSec, 151 estimated costs, evaluating, 257 Ethernet

relationship to switches, 26-27 versus SCSI, 91 and switch technology, 28-30

Ethernet data payload, minimum and maximum sizes of, 61

Ethernet network cards and bridges, 60 and header construction, 60 and MAC (Media Access Control),

57-60 overview of, 56-57 and switches, 60

evidentiary value, significance of, 130 EVMS (Enterprise Volume Management

Systems), overview of, 125-126 exchanges in FC-2, explanation of, 81 expenditures, types of, 255 Ext3 journaling file system, features of,

121-123 extended copies, features of, 140 external buses, use of, 11 extrinsic absorption, relationship to fiber

signal attenuation, 69 EZ17 Autoloader, using, 136

F fabrics

formation of, 9 significance of, 23

fabric security, overview of, 154-156. See also IPSec; security; SSL (Secure Socket Layers)

FAStT200, features of, 216 FAStT600, features of, 216-218 FAT32 simple 1GB to drive type, results

of, 195 FAT32 versus NTFS, performance in

network storage experiment, 198-199 FAT (file allocation table), location of, 116 FC-0, overview of, 77 FC-1, overview of, 77-79 FC-2, overview of, 80-81 FC-3, overview of, 81-82 FC-4, overview of, 82 FC-AL (Fibre Channel-Arbitrated Loops)

topology, overview of, 76 FC cards, using with FASTt500, 217 FCIP, Cisco's support for, 223 FC layers, descriptions of, 18 FCSec, overview of, 153 feasibility study template, structuring,

240-243 fiber optics. See also Fibre Channel

attenuation in, 69 and CWDM (coarse wave division

multiplexing), 7 4 and DWDM (dense wave division

multiplexing), 75 modes in, 72-73 SCSI commands over, 83 security of, 143-144 signal loss in, 70-71 and TDM (time division multiplexing),

73 and WDM (wave division

multiplexing), 74-75 Fibre Channel. See also fiber optics

chromatic dispersion in, 70-71 FC-0, 77 FC-1, 77-79 FC-2,80-81 FC-3,81-82 FC-4,82 features of, 18-19,23 maximum distance reached by, 69 over copper cable, 83 over parallel SCSI, 83 overview of, 64-70,76-77 and propagation over distance, 68-70 security benefits of, 160 and switch technology, 28-30

Fibre Channel SCSI, overview of, 98 fibre-optic cable, path oflight at entrance

of,69 file request, path of, 6 files, transferring from client data

directory to server drive, 205--206 file systems

backing up, 136-138 characteristics of, 116-117 DFSs (distributed file systems),

123-125 journaling file systems, 121-123 overview of, 115--116 shared file systems, 116-121

finite spectral width, relationship to fiber optics, 70

firewalls, features of, 63 fiscal value, significance of, 131 flow of events

in hardware replacement use case, 235--236

in server resource administration consolidation use case, 238-239

flux reversals, relationship to read/write heads,36

flying height, relationship to read/write heads, 35

FP (Fabry-Perot) lasers, relationship to Fibre Channel, 67

frag attacks, characteristics of, 157 frames in FC-2, explanation of, 81 FTP, performance in network storage

experiment, 201 future directions

autonomies, 270-272

G

Chimney Offioad Architecture for Windows, 262

microdrive technology, 264 quantum computing, 266-267 quantum cryptography, 265--266 shrinking devices, 267-268 Silicon phototonics, 264-265 virtualization,268-269

gauge, relationship to cabling, 55 GbE cards, using with jumbo frames,

203-204 GbE storage network components,

tuning,204-205 GbE versus 10/100, performance in

network storage experiment, 198 generation code in SES, description of,

95--96 geometry of disks, explanation of, 45

GFS (Global File System), overview of, 125

GFS (Google File System), overview of, 185

Gigabit Ethernet versus 100Base-Twiring, 56 features of, 16-17

GIO bus architecture, description of, 13 Great Wall of China, vulnerability of, 145 GRIP (Gigabit Rate IPSec), overview of,

161-162

H half duplex, explanation of, 27 handshake process of SSL, components

of, 147 hard disk factors, reporting with SMART,

41-43 hard disks

performance of, 46 specifications pertaining to, 37-38

hard drive technology, weaknesses of, 35. See also disks

hardware, relationship to virtualization, 173

hardware RAID, overview of, 110-111. See also RAID levels; software RAID

hardware replacement use case, 234-237 hard zoning, relationship to fabric

security, 155 hashing, role in encryption, 150 hash methods, examples of, 147, 151 HBAs (host bus adapters). See also bus

architectures from Emulex, 228 features of, 15--16 Fibre Channel, 18-19,23, 64-70 Gigabit Ethernet, 16-17 iSCSI, 17-18 purpose of, 6 from QLogic, 228 role in SCSI communications, 88

headers in MAC, components of, 60 heads. See read/write head Heisenberg Uncertainty Principle,

relationship to quantum mechanics, 266

hertz, explanation of, 58 Hewlett Packard, products offered by,

219-220 Hifn's HIPP II 8155 Security Protocol

Processor, features of, 162 HIO bus architecture, description of, 14 HIPP II 8155 Security Protocol Processor,

features of, 162

Index

281

Index

282

Hitachi, products offered by, 226-227 hot swapping, Dell's support for, 224 hubs, relationship to switches, 27

I I_T_L nexus, role in SCSI messaging, 92 I_T nexus, role in iSCSI, 99 IBM, management of storage network

assets by, 17 4-177 IBM products

FAStT200, 216 FAStT600,216-218 overview of, 215--216 SAN Volume Controller, 219

ffiM's developerWorks, web address for, 175

IDE devices, features of, 37 IDE W2K stripe 1GB to drive type, results

of, 195 IEEE, development of Learning Object

Meta-Data Specification by, 185--186 IEEE 802 standards

802.1Q and 802.1P, 61 overview of, 51-53

IKE (Internet Key Exchange), overview of, 153

11M (information life cycle management), overview of, 183-184

IMAP (Internet Message Access Protocol), features of, 179-180

impedance, relationship to cabling, 55 IMS metadata, representing, 186 in-band connections, role in storage

network management, 166-167 INCITS (International Committee on

Information Technology Standards), purpose of, 86-87

InfiniBand specification, overview of, 14-15

information classifying, 144 protecting,131-132

"information-based economy," significance of, 130

information life cycle, significance of, 182-183

information management, future directions for, 269-270

initiator, role in SCSI communications, 88 instances, significance of, 3 Integrated Solutions Console in

Autonomic Toolkit, features of, 272 interests, protecting, 131-132 Intermezzo distributed file system,

overview of, 124

internal bus architectures, implementing, 11

intrinsic absorption, relationship to fiber signal attenuation, 69

1/0 SCSI control signal, definition of, 91 IP addresses, creating for TCP liP routing,

62--63 IP fragmentation, characteristics of, 157 IPSec. See also fabric security; security;

SSL (Secure Socket Layers) dynamics of, 151-152 functionality of, 151 overview of, 147-148

IPSec-complaint encryption, relationship to security, 160-161

ISAKMP (Internet Security Association and Key Management/Oakley Protocol), relationship to IPSec, 148, 152

ISC (Integrated Solutions Console), overview of, 175--177

iSCSI Cisco support for, 223 features of, 17-18 overview of, 99-100

iSCSI cards from QLogic, features of, 228 ISO/ITU /OSI network model, overview

of. See OSI network model ISO Layer 1 and Layer 2, overview of, 64 ISO stack, vulnerabilities of, 158

J JFS joumaling file system, features of, 123 joumaling file systems, overview of,

121-123 JSR 168, relationship to ISC, 177 jumbo frames, support for, 203-204

K keyword search, significance of, 135

L lasers, relationship to Fibre Channel,

66--67 Layer 1 and Layer 2 of OSI, overview of,

64 layers of OSI model, diagram of, 4 layers of switches, explanations of, 29-30 LBA (Logical Block Access), explanation

of,46 Learning Object Meta-Data Specification,

purpose of, 185--186 Linksys, products offered by, 214

Linux 2.4 kernel, journaling file systems supported by, 122-123

Linux ext2/66 1GB to drive type, results of, 196

Linux file systems, performance in network storage experiment, 201

LMHosts, relationship to SMB, 121 local storage, typical configuration of, 136 longwave lasers, relationship to Fibre

Channel,66 LUN ID, role in SCSI commands, 93 LUN (Logical Unit Number)

relationship to SCSI devices, 48 role in SCSI communications, 88

LUN masking, relationship to fabric security, 155

Lustre distributed file system, overview of, 124-125

LVM (Logical Volume Management), overview of, 111-113

M MAC (Media Access Control),

relationship to Ethernet network cards, 57-60

mail servers, accessing, 179-180 malformed-packets attacks,

characteristics of, 156 Manchester Phase Encoding, explanation

of, 79 MAPE-K concept, diagram of, 175 MBUS architecture, description of, 13 MCA bus architecture, description of, 13 McCluhan, Marshal on communication,

267-268 McData, relationship to iFCP protocol, 224 message digests, role in encryption, 150 metadata mechanisms, overview of,

184-186 Metcalf's Law, significance of, 11 MFM (Modified Frequency Modulation),

relationship to read/write heads, 36 MHz rate for cable, significance of, 54 MicroChannel architecture, significance

of, 9 microdrive technology, future directions

for,264 Microsoft, products offered by, 221-222 Microsoft Advanced Server 2000

limitations of, 208 using, 230

Microsoft Dfs, overview of, 124 mirror copies, features of, 139 mirrored drives, performance in network

storage experiment, 201-202

mirrored striped drives, performance in network storage experiment, 201-202

mirrored stripe set RAID (level 0+ 1), overview of, 106

mirroring operation in RAID, overview of, 109

mirroring RAID (level!), overview of, 105-106

M (mandatory) SCSI command, explanation of, 92

modes 0-4 ofPIO, explanations of, 38 modes in Fibre Channel, explanation of,

72-73 Moore's Law, significance of, 11,262 MSG SCSI control signal, definition of, 91 MS (Microsoft) cluster process, overview

of, 208-211 mtbf (mean time between failures),

determining for drives, 33-34 multimode cable, using with Fibre

Channel, 72-73 multiplexing signals

CWDM (coarse wave division multiplexing), 74

DWDM (dense wave division multiplexing), 75

TDM (time division multiplexing), 73 WDM (wave division multiplexing),

74-75 Myricom, products offered by, 215

N NAS appliances, managing with

StorageCentral Network Appliances Edition, 172

NAS gateways, features of, 24 NAS (Network Attached Storage)

benefits of, 19 example of, 5 overview of, 22-23 versus SANs (Storage Area Networks),

9 vendors of consumer NAS, 214

NAS solutions, costs of, 258 NAT services, recording client IP

addresses in, 62 NBT (NetBIOS overTCPIIP), resolving

addresses of hosts in, 119 NCSA (National Center for

Supercomputing Applications), purpose of, 215

NearStore products, features of, 222 NetApps, products offered by, 222 NetWin 200, features of, 225-226

Index

283

Index

284

networked storage, overview of, 22-23 network entity in iSCSI, explanation of,

99 "The network is the computer,"

significance of, 2 network load balancing, support for, 208 network performance, 19

affecting, 77-78 benchmarking, 8-9 enhancing, 263 evaluating in problem-solving,

154-155,191 network portal in iSCSI, explanation of,

99 network resource management, overview

of,31 network storage experiment

comparisons in, 196-204 elements of, 191-193 establishing, 191 lessons learned from, 211-212 methodology for, 205-206 practical application of, 208-211 premise for, 193-194 requirements for, 206-208 results of, 194-196 sustainable performance in, 202-203 theory and practice of, 194

NFS (Network File System) overview of, 117-118 versus SMB (Server Message Block),

118,200-201 NIC (network interface card), purpose of,

6 NIS (Network Information Services),

overview of, 118 node growth patterns, computing, 262 nonrepudiation, role in digital signatures,

149 nonroutable protocols and IP addresses,

overview of, 62-63 NTFS simple/661GB to drive type, results

of, 195 NTFS versus FAT32, performance in

network storage experiment, 198-199

0 object diagrams in UML, purpose of, 187 objectives, determining for storage

networks, 244-245 ODBFS (object-based distributed file

system), Lustre as, 125 OFC (Optical Fiber Control) lasers,

relationship to Fibre Channel, 67

Office documents, accessing, 180-181 on-board controller, purpose of, 34 on-demand computing, explanation of,

270 0 (optional) SCSI command, explanation

of,92 open standards versus proprietary

products, 178 optical signals, relationship to EDFA, 72 ordered SCSI commands, explanation of,

94 ordered sets in FC-2, explanation of, 80 OSI network model

and Fibre Channel, 19 and Gigabit Ethernet, 16 and InfiniBand, 15 overview of, 3-4

out-of-band connections, role in storage network management, 166

p packet filtering, relationship to firewalls,

63 parallel SCSI, explanation of, 82--83 parallel versus serial interfaces, 39-40 PCI (Peripheral Component

Interconnect) bus, features of, 12-13 PERC3 RAID controller, features of, 225 performance. See network performance photodiodes, relationship to Fibre

Channel, 67-68 photons, role in quantum computing,

267 physical security, benefits of, 144 ping flood, explanation of, 156 PIO (Programmed I/0), modes and

transfer rates for, 38 PKI (public key infrastructure), role in

SSL, 146 platters

and read/write heads, 35-37 spin rates for, 34

PMC bus architecture, description of, 14 point-to-point topology

diagram of, 20 and Fibre Channel, 65-66

policy-driven storage management, overview of, 17 4-178. See also storage network management

policy management, overview of, 31 portal group in iSCSI, explanation of, 100 port concentrators, relationship to

switches, 27 portlet applications, relationship to ISC,

177

ports, connecting with FC-3, 81--82 PowerConnect 6024 switch, using, 231 PowerCrypt 5X Encryption Accelerator

card, features of, 162 power cycle count, monitoring with

SMART,42 power on hours count, monitoring with

SMART,42 PowerVault 660F, using, 231 PowerVault 725 N, features of, 224-225 priority box, establishing for network

storage experiment, 193 private key encryption, explanation of,

151 private keys, managing, 265 private value, significance of, 131 probes, function in Tivoli storage

management tools, 167-169 problems

criteria for evaluation of, 190-191 placing in context, 250

problem statements analyzing, 249-250 example of, 249 proposed solutions for, 251-259 purpose of, 248

processors versus buses, 10-11 products, selecting, 230-231 proffies, relationship to UML, 187 proprietary products versus open

standards, 178 protocol independence, significance of,

75 protocols

encapsulating within SCSI communications,94

inFC-2, 81 nonroutable protocols and IP

addresses, 62-63 public keys, role in IPSec, 148 pulse, role in fiber optics, 70-71

Q QLogic, products offered by, 227-228 quantum computing, future directions

for, 266-267 quantum cryptography, future directions

for, 265-266 QuickShadow, features of, 226

R RAID levels. See also hardware RAID;

software RAID levelS, 107-108

mirrored stripe set (0+1), 106 mirroring Oevel1), 105-106 spanning, 104-105 stripe with parity Oevel3), 106-107 striping Oevel 0), 104

RAID read/write operations distributed parity, 110 mirroring,109 stripe setting, 108-109 stripe with parity, 109

RAID strategies, overview of, 111 raw read error rate, monitoring with

SMART,42 RDF (Resource Description Framework),

relationship to Learning Object Meta-Data Specification, 186

read-modify-write function, relationship to RAID, 110

read/write head, clearance of, 35 recovery versus backup, 134-135 refractive index of medium, explanation

of,68 regeneration of optical signals,

significance of, 71-72 ReiserFS journaling file system, features

of, 122 relational data, rules for, 186 remote copies, features of, 139 reports, generating with Tivoli, 169 REQ SCSI control signal, definition of, 91 reshaping of optical signals, significance

of, 71-72 retention period, role in information life

cycle, 183 retiming of optical signals, significance

of, 71-72 risk, evaluating in problem-solving, 191 RJ-45 connectors, significance of, 56 RLL (Run Length Limited), relationship to

read/write heads, 36 routers

example of, 28 features of, 61

RPCs (remote procedure calls), relationship to NFS, 117-118

rpm (revolutions per minute), explanation of, 46

R (reserved) SCSI command, explanation of,92

RSCN (Registered State Change Notification), role in fabric security, 155

RST SCSI control signal, definition of, 91

Index

285

Index

286

s SAlT (Sony Super-AIT) technology,

significance of, 136-137 SAM (SCSI Architecture Model), overview

of, 86-88 SAN component vendors, products

offered by, 213-214 SANs (Storage Area Networks)

components of, 4-8 cornerstone concept of, 9 determining objectives for, 244 example of, 230-231 feasibility of, 259 versus NAS (Network Attached

Storage), 9 solutions for Company A versus

Company B, 246-250 terms of reference for, 244-245 trends related to, 229-230 use cases for, 234-240

SAN-switched network storage, overview of, 23. See also switched storage network topology

SAN Volume Controller, features of, 219 Sarbanes-Oxley Act of 2002, significance

of, 133-134 SAs (security associations), role in IPSec,

151-152 Sf KrA versus ATA/IDE drives, 39 SBUS architecture, description of, 13 scattering, relationship to fiber signal

attenuation, 69-70 SCSI (Small Computer System Interface),

transport services provided by, 94 SCSI addressing, overview of, 47 SCSI Architecture Model (SAM), overview

of, 86-88 SCSI bus versus TCP /IP communication,

100 SCSI commands

length of, 92 life cycle of, 90 over fiber-optic cable, 83 overview of, 92-93 processing, 93-94 solutions offered by Fibre Channel,

76-77 standards architecture for, 88 types of, 92

SCSI command set, overview of, 49, 86 SCSI communications

encapsulating protocols within, 94 · overview of, 88-91

SCSI control signals, list of, 91 SCSI devices

linking, 89 overview of, 48-49

SCSI disk read operations, steps involved in,89

SCSI drives features of, 26, 37 parallel SCSI, 82-83 varieties of, 38

SCSI exchanges, phases of, 90 SCSI-PCP, overview of, 98 SCSI messaging, overview of, 91-92 SCSI simple 1GB to drive type, results of,

195 SCSI stripe 1GB to drive type, results of,

195 SCSI versus ATA/66, performance in

network storage experiment, 196-198

SCSI versus Ethernet, 91 SeawayPCI-Xcard, features of, 162 sector count, monitoring with SMART, 42 sectors, bad sectors, 37 Secure Favrid OS, elements of, 154 security. See also fabric security; IPSec;

SSL (Secure Socket Layers) access and encryption aspects of,

143-144 evaluating, 144 and IPSec-compliant encryption,

160-161 seek error rate, monitoring with SMART,

42,44 seek time

explanation of, 46 measuring,34 monitoring performance with SMART,

42 segregation, relationship to NAS, 22 SEL SCSI control signal, definition of, 91 semiconductor lasers, relationship to

Fibre Channel, 66 sequence diagrams in UML, purpose of,

187 sequences in FC-2, explanation of, 81 serial KrA disk drives, overview of, 25-26 serial versus parallel interfaces, 39-40 server clusters, supporting with

FASTtSOO, 218 server consolidation, implementing,

245-246 server resource administration

consolidation use case, 237-240 servers

connecting with storage arrays and disks, 26-28

separating clients from, 7 SES (SCSI Enclosure Services), overview

of, 94-97 shared buses, dynamics of, 10

shared file systems, 116-117 NFS (NetworkFileSystem), 117-118 NIS (Network Information Services),

118 SMB (Server Message Block), 118-121

Share level in SMB, authentication at, 119 shortwave lasers, relationship to Fibre

Channel,66 signal loss, occurrence in fiber optics,

70-71 signals

boosting for Fibre Channel, 68 representing single bits with, 79

Silicon phototonics, future directions for, 264-265

single mode cable, using with Fibre Channel, 72-73

SI (Solution Install), features of, 271-272 SMART (Self-Monitoring Analysis and

Reporting Tool), overview of, 40-44 SMB (Server Message Block)

versus NFS (Network File System), 118,200-201

relationship to shared file systems, 118-121

SMB servers, location in TCP /IP environment, 119

snapshots advantages of, 138 taking with LVM, 113

software RAID, overview of, 111. See also hardware RAID; RAID levels

soft zoning, relationship to fabric security, 155

spanned drives, performance in network storage experiment, 201-202

spanned SCSI sw 1GB to drive type, results of, 195

spanning RAID, overview of, 104-105 speed, evaluating requirements for, 212 spiders, dynamics of, 185 spin retry count, monitoring with SMART,

42 spin up time, monitoring with SMART, 42 SPI (security parameter index), role in

IPSec,l51 SRM (storage resource management),

overview of, 31 SSL (Secure Socket Layers). See also fabric

security; IPSec; security functionality of, 151 overview of, 146-147

Start/Stop count, monitoring with SMART,42

state diagrams in UML, purpose of, 187 static TCP /IP routing, explanation of, 62

storage, encrypting, 162-163 Storage Area Networks. See SANs (Storage

Area Networks) storage arrays, connecting servers to,

26-28 storage assets, accessing, 178-181 StorageCentral, features of, 170-173 storage feasibility

estimated costs of, 243 gross benefits of, 243 net benefits of, 243 objective of, 241 problem statement for, 242 proposed solutions for, 242 recommendation for, 242 terms of reference for, 241

storage network content modeling,l86-188 overview of, 181-186

storage network management. See also policy-driven storage management

automatic model for, 17 4-175 overviewof, 166-167 tools for, 167-173

storage networks. See SANs (Storage Area Networks)

storage network topology, example of, 158-160

storage solutions, proposing, 251 Storage Works NAS 1000, features of, 220 STO (shielded twisted pair) cabling,

features of, 55 stripe with parity RAID (level3), overview

of, 106-109 striping RAID (level 0), 104 Sun Microsystems, products offered by,

227 switched storage network topology,

diagram of, 21. See also SAN­switched network storage

switches dynamics of, 26-28 and Ethernet network cards, 60 remote access and configuration of,

166-167 technology of, 28-30

switch layers, comparing, 30 synchronous remote copies, features of,

139

T tagged command queuing, using with

SCSI commands, 93 tape backup characteristics, advantages

and disadvantages of, 137

Index

287

Index

288

tape devices backing up file systems on, 136-138 problems with, 142

target, role in SCSI communications, 88 TCP liP routing

overview of, 61--63 versus SCSI bus, 100

TCP /IP (Thansmission Control Protocol/Internet Protocol), relationship to NFS, 118

TOM (time division multiplexing), overview of, 73

TEC (Tivoli Event Console), features of, 168-169

terms of reference, significance of, 244-245

throughput, explanation of, 46 throughput performance, monitoring

with SMART, 42 Thunder 9500V series, features of, 226 Tivoli storage management tools,

features of, 167-170 TOE (TCP/IP offioad engine),

incorporating into networks, 263 topologies

example of, 158-160 and fiber optics, 75-76 overview of, 20-24 forWorden.net, 207

transaction logs, backing up, 140 transport mode, role in IPSec, 148 triggers

in hardware replacement use case, 235 in server resource administration

consolidation use case, 238 llitton's ASA server line, features of, 214 ThueCopy, features of, 226 TSL (Thansport Security Layer),

functionality of, 151 tunneling, overview of, 145 tunnel mode, role in IPSec, 148 type descriptor header lists in SES,

descriptions of, 95-96

u UDP (User Datagram Protocol),

relationship to NFS, 118 ULPs (Upper-Layer Protocols), support of

Fibre Channel for, 82 UML (Unified Modeling Language), using

with storage network content, 187-188

unification engines, role in NetApps products, 222

untagged command queuing, using with SCSI commands, 93

use case diagrams in UML, purpose of, 187

use cases hardwarereplacement,234-237 server resource administration

consolidation,237-240 User level in SMB, authentication at, 119 utility computing, explanation of, 270 utility value, significance of, 130 UTP (unshielded twisted pair) cabling,

features of, 55

v VCSEL (Vertical Cavity) lasers,

relationship to Fibre Channel, 67 vendors

Cisco, 223-224 comparing,229-230 of consumer NAS, 214 Dell, 224-225 EMC, 225-226 Emulex, 228-229 Hewlett Packard, 219-220 Hitachi, 226-227 IBM, 215-219 Microsoft, 221-222 NetApps, 222 QLogic, 227-228 of SAN components, 213-214 selecting, 230-231 Sun Microsystems, 227

VERITAS storage administration tools, features of, 172

VFM (VIrtual File Manager) software, features of, 222

virtualization benefits of, 258, 259-260 future directions for, 268-269 necessity of, 271 overview of, 31-32,173-174

VME Bus architecture, description of, 14 Volume Controller, features of, 219 Vormetric's CoreGuard, features of, 163 VPNs (virtual private networks)

disadvantages of, 160 relationship to tunneling, 145

VSS (Volume Shadow Services), features of, 221

V (vendor) SCSI command, explanation of,92

w W2K hw stripe 1GB to drive type, results

of, 196 W2K mirror 1GB to drive type, results of,

196 W2K NTFS stripe 66 1GB to drive type,

results of, 195 W2K SCSI stripe 1GB to drive type, results

of, 195 WDM (wave division multiplexing),

overviewof, 74-75 web sites

802 standards, 52 Active SMART, 41 GFS (Google File System), 185 ffiM's developerWorks, 175 SES diagnostic page codes, 97

weight, relationship to cabling, 55 Wmdows Storage Server 2003, using, 253 WINS, relationship to SMB, 121 wireless standards, 802.11 as, 53 wiring

comparing between serial and parallel interfaces, 39

deciding on, 53-54 evaluating, 55 standards for, 54 transmission speeds over, 58

Worden.net, topology of, 207 worldwide unique name in iSCSI,

explanation of, 100 worms, characteristics of, 157 write error count, monitoring with

SMART,42 writing to disk, overview of, 24-25

X xDSL installation, cost of, 257 XFS journaling file system, features of,

122

z ZBR (Zoned Bit Recording), introduction

of,45 zoning, relationship to fabric security,

154-155

Index

289

JOIN THE APRESS FORUMS AND BE PART OF OUR COMMUNilY. You'll find discussions that cover topics

of interest to IT professionals, programmers, and enthusiasts just like you. If you post a query to one of our

forums, you can expect that some of the best minds in the business-especially Apress authors, who all write

with The Expert's Voice TM -will chime in to help you. Why 1ot aim to become one of our most valuable partic­

ipants (MVPs) and win cool stuff? Here's a sampling of what you'll find:

DATABASES

Data drives everything.

Share information, exchange ideas, and discuss any database programming or administration issues.

INTERNET TECHNOLOGIES AND NETWORKING

Try living without plumbing (and eventually 1Pv6).

Talk about networking topics including protocols, design, administration, wireless, wired, storage, backup, certifications, trends, and new technologies.

JAVA

We've come a long way from the old Oak tree.

Hang out and discuss Java in whatever flavor you choose: J2SE, J2EE, J2ME, Jakarta, and so on.

MAC OS X

All about the Zen of OS X. OS X is both the present and the future for Mac apps. Make suggestions, offer up ideas, or boast about your new hardware.

OPEN SOURCE

Source code is good; understanding (open) source is better.

Discuss open source technologies and related topics such as PHP, MySQL, Linux, Peri, Apache, Python, and more.

HOW TO PARTICIPATE:

PROGRAMMING/BUSINESS

Unfortunately, it is. Talk about the Apress line of books that cover software methodology, best practices, and how programmers interact with the 'suits."

WEB DEVELOPMENT/DESIGN

Ugly doesn't cut it anymore, and CGI is absurd.

Help is in sight for your site. Find design solutions for your projects and get ideas for building an interactive Web site.

SECURITY

Lots of bad guys out there-the good guys need help.

Discuss computer and network security issues here. Just don't let anyone else know the answers!

TECHNOLOGY IN ACTION

Cool things. Fun things. If'; after hours. It's time to play. Whether you're into LEGO® MINDSTORMS™ or turning an old PC into a DVR, this is where technology turns into fun.

WINDOWS

No defenestration here.

Ask questions about all aspects of Windows programming, get help on Microsoft technologies covered in Apress books, or provide feedback on any Apress Windows book.

Go to the Apress Forums site at http://forums.apress.com/.

Click the New User link.