Académique Documents
Professionnel Documents
Culture Documents
EMC Proven
Professional
Knowledge Sharing
Abstracts 2007
Compilation of Abstracts Submitted
by EMC Proven Professionals for EMCs
First Annual Knowledge Sharing Initiative
EMC Proven Professional Knowledge Sharing 2
Disclaimer: The views, processes or methodologies published in this compilation are those of the
authors. They do not necessarily reflect EMC Corporations views, processes, or methodologies.
Edited by Michelle Lavoie, EMC Global Services
(Education Services)
Best Practices for Deploying FCIP and iFCP Solutions Using Connectrix
Multi-Protocol Routers
by Venugopal Reddy (EMC Corporation)
Migration of File Servers to NAS and Multi-Tiered Storage
by Bryan Horton (A Leading Healthcare Provider)
Challenges and Best Practices in the Deployment and Management
of IPTV Networks
by Paul Brant (EMC Corporation)
Best Case StudyStoring Taming the Data Tiger
by John Bowling (Busata Systems)
Best Case StudyProtecting Local Replication and Availability
in a CLARiiON Environment:
The Clone Task Force
by Fernando Moreno Liso (Comparex)
Best Case StudyOptimizing StorageScope Validates Storage Area
Network before Migration to New SAN
by Barry Nelson (EMC Corporation)
3
rd
2
nd
1
st
The Winners
Contents
Introduction ....................................................................................................................6
Serial Advanced Technology Attachment (ATA) Drives in CLARiiON Arrays
Victor Franco, Lead Instructor, Education Services, EMC Corporation ................................7
Local Replication and Availability in a CLARiiON Environment: The Clone Task Force
Fernando Moreno Liso, Systems Executive Engineer, Comparex ......................................8
How CLARiiON Helped our Exchange Organization
Todd Simmons, Senior Consultant, Citizens Bank............................................................9
Choosing the Right CLARiiON Data Replication Method: A Performance-Based Approach
Andre Rossouw, Advisory Technology Solutions Educational Consultant, EMC Corporation......10
CLARiiON Performance Monitoring Scripting
Derek Yu, Senior Consultant, Bell ICT Solutions ..............................................................11
Best Practices for Deploying FCIP and iFCP Solutions Using Connectrix
Multi-Protocol Routers
Venugopal Reddy, Senior Engineer, Problem Resolution & Escalation, EMC Corporation ..12
Brocade Fibre Channel Routing (FCR) Technology Overview and Fundamentals
Joe Holbrook, Consultant, Brocade Solutions ................................................................13
The Importance of Being Earnest
Alastair Adamson, SAN Architect ..................................................................................14
Real-Life Challenges in Todays Storage World
Kiran Ghag, Senior Systems Administrator, HSBC ..........................................................15
How to Deploy a Celerra iSCSI Solution
John Shubeck, Technical Business Consultant, EMC Corporation ....................................16
Setting Up an Invista Environment
Adam Jones, Senior Technology Consultant, EMC Corporation ........................................17
Deploying an SQL 2005 Cluster in a Virtualized SAN Environment
Bartley Corbin, Implementation Specialist, EMC Corporation..........................................18
Backing Up a Large Oracle Database with EMC NetWorker and EMC Business Continuity
Solutions
Maciej Mianowski, Regional Software Specialist, EMC Corporation ................................19
Designing and Implementing a Backup, Recovery, and Archiving (BURA) Solution in a
Pharmaceutical Company
Carmen Marcano, Solutions Architect, EMC Corporation ................................................21
EMC Proven Professional Knowledge Sharing 3
Contents
NetWorker Best PracticesDesigning for Performance
Matt Steinberg, Senior Solutions Architect, Cambridge Computer Services Inc. ..............22
Integrating the EMC Disk Library with Veritas Netbackup
Adam Jones, Senior Technology Consultant, EMC Corporation ........................................23
EMC NetWorker: Wearing Belts and SuspendersSuggestions for Improving Security,
Performance, and Life-Span using EMC NetWorker
Tor Eikanger, Senior Systems Engineer, Ementor Norge AS ............................................24
Utilizing EMC Replication Technologies to Help Save Texas Electricity Consumers
Billions of Dollars
Michael Solari, Manager, Storage Engineer, Electric Reliability Council of Texas ..............25
Implementing Replication Manager/SE for Exchange
Carl Granfelt, Storage Implementation Consultant, Posetiv Ltd.......................................26
Symmetrix Local Replication from A-Z: All the Choices and Which to Choose
Donald Fried-Tanzer, Education Services Consultant, EMC Corporation............................27
Mainframe SRDF/A and MSC Best Practices
Michael Smialek, Solutions Architect, EMC Corporation ................................................29
Backup-to-Disk for Mainframe using the Mainframe Disk Library
Doug Morris, Senior Technical Consultant, EMC Corporation ..........................................30
Stars of EMC
David Pena, Technology Consultant, EMC Corporation ....................................................31
An International Mainframe Consolidation Project: Strategy and Technology
Michael Zimmermann, Account Technology Consultant, EMC Corporation
and Richard Herbst, Technical Business Consultant, EMC Corporation ............................32
StorageScope Validates Storage Area Network before Migration to New SAN
Barry Nelson, Solutions Architect, EMC Corporation ......................................................33
Global Storage Resource Management
Rich Ayala, VP Senior Architect, A Leading Financial Institution ......................................34
Taming the Data Tiger
John Bowling, Data Architect, Busata Systems ..............................................................36
Automation of Customized and Localized Reporting
SungWook Hyung, Senior Technology Consultant, EMC Corporation ..............................38
EMC Proven Professional Knowledge Sharing 4
Contents
Data Gathering and Analysis for Migration, Disaster Recovery, and Business
Continuance in Symmetrix Environments: The Solution Architects Role
Michael Schwartz, Senior Solutions Architect, EMC Corporation ....................................39
Migrating Data from DMX1000 to DMX-3
Henry Zhang, Senior Infrastructure Specialist, EDS ........................................................41
Migration of File Servers to NAS and Multi-Tiered Storage
Bryan Horton, Systems Engineer, A Leading Healthcare Provider ..................................42
ISL Security Monitoring within EMC MirrorView/SRDF
Thomas Mitrovits, Global Development Business ManagerStorage Networking,
ADVA Optical Networking AG ........................................................................................43
EMC Security Initiatives: A Market Differentiator
Jenny Beazley, Senior Project Manager, EMC Corporation ..............................................44
Challenges and Best Practices in the Deployment and Management of IPTV Networks
Paul Brant, Senior Advisory Technology Consultant, EMC Corporation ............................46
Project Delivery Approach: Pre-work or Re-work?
Lalit Mohan, Senior Solutions Architect, EMC Corporation..............................................47
Business Information Management Reengineering (BIMR)
Eugene Demigillo, Technical Development Consultant, EMC Corporation ........................48
EMC Proven Professional Knowledge Sharing 5
Introduction
The EMC Proven
. Remote
data replication may make use of SAN Copy, MirrorView
or Brocades
Fabric Manager, they are not sufficient to affirm the SANs cleanliness. Additional tools are
required to ease the administrators burden and increase his/her efficiency. With these tools,
the answer to questions such as, to which array(s) does this server have access, how many
unused aliases are there in the active zoning, or how much disk has been assigned to this
cluster, can easily be answered. Often, these tools are Shell or Perl scripts. However, these
scripts are dependent on the clarity of the administrative rules.
Accurate documentation and status reports can only be built on a foundation of ground rules,
conventions, best practices and procedures. For example, naming conventions should be
defined. The definition of best practices, based on vendor recommendations or in-house
requirements, should be agreed upon and documented. Whenever the SAN physically
changes, the fabric spreadsheet must be updated. This is one example of a procedure that
ensures a maintainable and manageable SAN.
When these rules are well-defined, writing administrative tools is greatly simplified. The tools will
be moreeffectivebecause they will automate tasksand checkthe consistencyof SAN components.
Tools can maintain a server-based copy of the current zone configuration, for example. This in turn
can verify that zoning conforms to the naming convention. It can also provide the WWNs (world
wide names) of a server, required when masking LUNs from an EMCSymmetrix
system.
Other scripts could automatically generate LUN (logical unit number) maps using navicli and
symcli commands, to show LUN capacities, owners, RAID (Redundant Array of Independent
Disks) information, as well as a cumulative disk usage per server or cluster, array front-port
usage, and total used and free capacities per array or RAID group. In turn, the LUN maps can
be cross-referenced with the zoning information to ensure servers are not zoned to arrays on
which they have no provisioned space.
This paper focuses on defining logical and meaningful conventions, documenting best practices,
and developing procedures for SAN administration. A serious and active approach to adminis-
tration and automation makes it far easier to control the SAN and optimize workload execution.
Additionally, it provides you with the opportunity to keep your managers confidence by reducing
the potential for problems.
EMC Proven Professional Knowledge Sharing 14
EMC Proven Professional Knowledge Sharing 15
Real-Life Challenges in Todays Storage World
Kiran Ghag, Senior Systems Administrator
HSBC
This paper is targeted primarily at storage architects and administrators as it presents real-
life challenges faced while implementing SAN solutions.
Storage implementations are growing faster than ever. The information world is booming and
the technology is evolving to keep pace. Users view SAN as a panacea that is going to solve
all their data storage, performance, and protection requirements. The architects and admin-
istrators have to work diligently to satisfy end users needs and provide a design that will
address their requirements.
SAN works well to meet these needs, but many practical hurdles prevent businesses from
achieving optimal results. Every organization faces these challenges on a different scale.
Numerous best practices, How To documents, and user manuals present technical prob-
lems and ways to solve them. But there are few papers that talk about worst practices.
This paper goes beyond the technical to identify the human error and root causes behind
many SAN issues. It adopts a vendor-neutral approach; hence it is applicable to a larger num-
ber of setups.
With this paper, you will be able to identify the risks/issues in your existing or planned setup.
This will prepare you to mitigate them and optimize performance.
How to Deploy a Celerra iSCSI Solution
John Shubeck, Technical Business Consultant
EMC Corporation
iSCSI (Internet Small Computer Storage Interface) is a transport protocol for sending SCSI
packets over TCP/IP networks. iSCSI initiators (clients) and iSCSI targets (servers) are the key
components in an iSCSI architecture. These iSCSI initiators and targets are the devices which
transfer SCSI information over an IP network. The term IP SAN has often been used to
describe an iSCSI network.
In addition to traditional file sharing protocols Common Internet File System (CIFS) and Network
File System (NFS), the EMC Celerra
that no one thought could be done. During the course of this project, we disproved
several myths about VMware environments utilizing clustering in SANs.
This solution is not supported by any of the major vendors including EMC, VMware, or
Microsoft. Although VMware has documentation on segments of the process, they explicitly
state that certain things will not work. This article is intended to remove the guesswork.
Although we are beginning to see some white papers, it is simply too new for any of the vendors
to announce that they are willing to support this. For instance, EMC PowerPath
cannot be
used in a VMware host, so how do you control failover paths?
This article contributes a single repository for anyone wanting to deploy an SQL 2005 cluster
in a virtualized SAN environment.
EMC Proven Professional Knowledge Sharing 18
Backing Up a Large Oracle Database with EMC NetWorker
and EMC Business Continuity Solutions
Maciej Mianowski, Regional Software Specialist
EMC Corporation
There are many articles describing the Oracle database backup, but none clearly describe the
backup of a large database. EMC provides many solutions which could be used to fill this gap.
The most common definition of a very large database (VLDB) is a database that occupies more
than one terabyte or contains several billion rows. Typically, these are decision-support systems
or data warehouses. Recently, transaction processing applications serving large numbers of
users also fit into this definition.
The storage architects challenge is to design a backup solution that achieves the following:
The backup operation should have no impact on the production process.
The backup window should not be exceeded and the backup solution should be scalable.
The backup solution should be resistant to any type of failure, including whole system failure.
The recovery of the Oracle database should be fast and provide recovery at any point in time.
The backup solution should satisfy all incomplete recovery scenarios supported by Oracle.
The majority of the backup/restore operations should be automated and provide user-friendly
administration and reporting tools.
The solution should be fully supported by Oracle and EMC.
This article provides a guideline on how to use EMC NetWorker
Module and their integration with the Oracle database backup mechanisms.
The differences between the conventional and proxy Oracle backup are outlined.
EMC Proven Professional Knowledge Sharing 19
Finally, a few examples of the advantages and limitations of backup/recovery solutions are
described. The EMC NetWorker PowerSnap image backup is included.
Many of the topics discussed in this article require comprehensive coverage, so additional
reading will be recommended.
EMC Proven Professional Knowledge Sharing 20
Designing and Implementing a Backup, Recovery, and
Archiving Solution (BURA) in a Pharmaceutical Company
Carmen Marcano, Solutions Architect
EMC Corporation
This paper explores the processes and practices used to design and implement a backup,
recovery, and archiving solution in a pharmaceutical company. The customers primary business
objective was to optimize the overall information management practices that were based on
an obsolete storage infrastructure, inefficient data safeguard practices, and ad hoc information
management processes.
The solution involved a whole new architecture of EMC hardware and software integrated
components. The customer adopted an information lifecycle management (ILM) model to
achieve cost-effective storage, data resilience, and more-effective information management.
We divided the project into seven major phases to accommodate customer needs and existing
processes. Due to the nature of the pharmaceutical business, proper care was taken to fulfill
the regulated systems validation processes. During each phase, we were challenged to over-
come the inherent difficulties in a regulated environment.
Each phase began with a design based on customer needs. Since we had to minimize downtime
during the transition, we focused on the migration strategy from the old to the new storage
infrastructure, with data integrity and compliance always in mind.
The architectural components were based on several infrastructure building blocks. They
included CAS and SAN storage technologies, information availability, and storage management
components such as EMC Legato
for Open
Systems. In the mainframe environment, this customer has DB2 as a database solution and
Oracle/SQL in the open systems environment. They are very interested in having three sites
for disaster recovery in three different areas inside Spain.
The second is a star configuration for EMC Centera
with EMC Centera, and we are offering three systems for three
different sites in a unique star configuration similar to SRDF/Star and Symmetrix. Documentum
will be used to store, manage, and organize business-critical information.
With these two solutions, we are offering two NS40G replicated with SRDF/S and six Cisco
directors 9506 (two in each site) for SAN connectivity, SAN Extension, IP replication, and FC/IP
routing. We are also offering to integrate EmailXtender
, EMC DiskXtender
survey revealed that EMC customers fear auditors more than hackers. In the
wake of Enron, the Sarbanes-Oxley law imposes severe penalties on publicly traded companies
for exposure or tainting of financial data. There are a growing number of regulationsand standards
companies must adhere to, including the California Senate Bill 1386, Gramm-Leach-Bliley Act,
and the EUs Directive 95/46/EC.
In 2005, EMCconducted a security assessment of its products and subsequently initiated projects
including two-factor or two-pass authentication to storage arrays and connectivity devices,
removing static passwords from array management software, and creating audit trails.
With such a complex product range, changes cannot be expected overnight. However, there
are steps that all EMC employees can take to promote storage management security for EMC
and its customers. It is our responsibility as EMC Proven Professionals to blaze the trail and
encourage colleagues to follow best practices to ensure a more secure environment for both
EMC and our customers.
The full paper brieflydescribesEMCsecurityinitiativesand offerssuggestionsfor securelymanaging
storage arrays. One suggestion is for customers to implement the ESRS Gateway for secure remote
access, securely erasing failed diskdrives, and setting secure passwords and access control.
Initiatives
Symmetrix Service Credentials, secured by RSA
Service Credentials for other storage arrays
Data Erasure (both single-disk and rack-mounted units for Symmetrix, CLARiiON, and
eventually EMC Centera)
ESRS Gateway
Alert Server
Tools Server
EMC Proven Professional Knowledge Sharing 44
Security Best Practices
Setting Secure Passwords
Access Control
Secure Transmission
Confidential Information
Customer-Facing Security
Top-five storage array customer questions from the Customer Security Management Office
EMC Proven Professional Knowledge Sharing 45
Challenges and Best Practices in the Deployment and
Management of IPTV Networks
Paul Brant, Senior Advisory Technology Consultant
EMC Corporation
Reliability and quality of service are the greatest challenges that Internet Protocol Television
(IPTV) operators face as they deploy IPTV and other broadband services. These complex serv-
ices must be extremely resilient. If consumers experience less than optimal service levels,
both customers and providers are negatively impacted.
It is challenging to integrate video-over-IP equipment into existing metro and access net-
works. So, how can service providers be sure that those networks are capable of delivering
quality service as they grow from thousands to millions of customers?
This paper reviews the video-stream and integrated triple-play/multicast video solutions
available and examines how they work. Video service delivery for example, places high band-
width demands on its network and related applications as the provider integrates storage,
delivery, and access to the consumer. There are enormous scalability requirements that can
include thousands of servers with back-end storage in the petabyte range. This will challenge
any deployed solution.
Networks rely on multiple layered protocols. Since the layers are independent, a problem in
a lower protocol can be masked and/or spread to the other protocols. This type of lower-level
protocol disruption can be easily hidden and hard to diagnose. A timely diagnosis and quick
resolution are critical.
The Next-Generation Network Architecture (NGNA) is the cable industrys umbrella vision
for its network of the futureultimately a move to IP. Parts of NGNA can be found in Cable
Labs specifications, including DOCSIS 3.0, PacketCable, OpenCable, and CableHome. This
technology also has scalability and quality of service issues.
The EMC Smarts
family of solutions, including support for IPTV, helps service providers create
a high availability and high-performance environment. Smarts powerful modeling, cross-
domain correlation, analysis plus a scalable and distributed architecture make EMC Smarts
capable of supporting and managing large complex environments. This helps to isolate any
problem with a high degree of accuracy.
This paper discusses the unique management challenges posed by next-generation networks
(NGN) and how the EMC Smarts architecture is uniquely suited to address them.
EMC Proven Professional Knowledge Sharing 46
Project Delivery Approach: Pre-work or Re-work?
Lalit Mohan, Senior Solutions Architect
EMC Corporation
Project delivery engagements, whether large or small, require a quickprogression from initiation
to close. These undeniable pressures emanate from tight deadlines, cost pressures, short
opportunity windows, and many other factors.
Under such pressure, it is easy to ignore pre-work; the creation of the charter, scope, tasklists,
schedule, and the many supporting plans required for the delivery of the project.
Ignoring or minimizing pre-work almost always results in late discovery of critical requirements,
unrestrained stakeholder influence, and use of unsuited deployment methods. Ultimately, it
results in extensive re-work leading to runaway costs.
This article reinforces the theory that pre-work and re-work are inversely related. Conducting
the appropriate amount of pre-work has the potential to reduce or even eliminate re-work.
Conversely, paying less attention to the pre-workalmost certainly increases the amount of re-work.
Helping stakeholders understand the linked relationship will help them to overcome their
resistance to spending time on pre-work and balance the pressure to bypass it. This would
minimize the total cost of service delivery.
EMC Proven Professional Knowledge Sharing 47
Business Information Management Reengineering (BIMR)
Eugene Demigillo, Technical Development Consultant
EMC Corporation
We have delivered various solutions (platforms and software) and services (consolidation,
continuity, compliance, comprehensive BURA, content management, and classification) that
benefit our customers. But there is another facet of our customers business that we need to
address; we need to help them re-engineer their information management processes and
procedures.
It can take between six and nine months for customers to align their processes with our solutions.
As they focus on that alignment, they tend to delay other projects with us.
Offering BIMR consulting to customers helps them to more quickly adapt their processes. This
may be a bit outside our comfort zone, but as the leading provider of information management
and infrastructure solutions, it is essential for us to deliver this valuable service to customers.
This paper reviews the following topics:
Understanding business process reengineering
Understanding the value of information management/infrastructure
Why the need for BIMR? (Who needs a BIMR?)
Executing BIMR (a methodology)
Rewards of a successful BIMR exercise
EMC Proven Professional Knowledge Sharing 48
EMC Proven Professional Program
The EMC Proven Professional program is the leading, most comprehensive training and certi-
fication program in the information and storage management industry.
Tracks/Roles
EMC Proven Professional Storage Technologist (EMCST)
EMC Proven Professional Storage Administrator (EMCSA)
EMC Proven Professional Technology Architect (EMCTA)
EMC Proven Professional Implementation Engineer (EMCIE)
EMC Proven Professional Customer Engineer (EMCCE)
EMC Proven Professional Application Developer (EMCApD)
EMC Proven Professional Product/Technology Specific
Specializations
Symmetrix Business Continuity
CLARiiON Solutions
Networked StorageSAN
Networked StorageNAS
Networked StorageCAS
Storage Management
Backup and Recovery
Mainframe
Availability
EmailXtender and EmailXaminer
EMC Proven Professional Knowledge Sharing 49
EMCs Proven Professional Framework
Our unique framework is a consistent, measurable means to build and maintain technical
knowledge and skills. Our closed-loop process allows participants to enjoy the full range
of our offeringfrom practice tests to distribution of updated content in your specialty area
and, of course, to knowledge sharing.
Special thanks to all of our certified individuals who contributed to this publication.
EMC Proven Professional Knowledge Sharing 50
EMC Corporation, Hopkinton, Massachusetts 01748-9103, 1-508-435-1000, In North America 1-866-464-7381
EMCbelieves the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES
OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC
2
, EMC, CLARiiON, Documentum, and where information lives are registered trademarks and EMC Proven is a trademark of
EMC Corporation. VMware is a registered trademark of VMware, Inc. All other trademarks used herein are the property of their
respective owners. Copyright 2007 EMC Corporation. All rights reserved. Published in the USA. 05/07 Handbook H2771.2