Vous êtes sur la page 1sur 52

Compilation

EMC Proven

Professional
Knowledge Sharing
Abstracts 2007
Compilation of Abstracts Submitted
by EMC Proven Professionals for EMCs
First Annual Knowledge Sharing Initiative
EMC Proven Professional Knowledge Sharing 2
Disclaimer: The views, processes or methodologies published in this compilation are those of the
authors. They do not necessarily reflect EMC Corporations views, processes, or methodologies.
Edited by Michelle Lavoie, EMC Global Services
(Education Services)
Best Practices for Deploying FCIP and iFCP Solutions Using Connectrix
Multi-Protocol Routers
by Venugopal Reddy (EMC Corporation)
Migration of File Servers to NAS and Multi-Tiered Storage
by Bryan Horton (A Leading Healthcare Provider)
Challenges and Best Practices in the Deployment and Management
of IPTV Networks
by Paul Brant (EMC Corporation)
Best Case StudyStoring Taming the Data Tiger
by John Bowling (Busata Systems)
Best Case StudyProtecting Local Replication and Availability
in a CLARiiON Environment:
The Clone Task Force
by Fernando Moreno Liso (Comparex)
Best Case StudyOptimizing StorageScope Validates Storage Area
Network before Migration to New SAN
by Barry Nelson (EMC Corporation)
3
rd
2
nd
1
st
The Winners
Contents
Introduction ....................................................................................................................6
Serial Advanced Technology Attachment (ATA) Drives in CLARiiON Arrays
Victor Franco, Lead Instructor, Education Services, EMC Corporation ................................7
Local Replication and Availability in a CLARiiON Environment: The Clone Task Force
Fernando Moreno Liso, Systems Executive Engineer, Comparex ......................................8
How CLARiiON Helped our Exchange Organization
Todd Simmons, Senior Consultant, Citizens Bank............................................................9
Choosing the Right CLARiiON Data Replication Method: A Performance-Based Approach
Andre Rossouw, Advisory Technology Solutions Educational Consultant, EMC Corporation......10
CLARiiON Performance Monitoring Scripting
Derek Yu, Senior Consultant, Bell ICT Solutions ..............................................................11
Best Practices for Deploying FCIP and iFCP Solutions Using Connectrix
Multi-Protocol Routers
Venugopal Reddy, Senior Engineer, Problem Resolution & Escalation, EMC Corporation ..12
Brocade Fibre Channel Routing (FCR) Technology Overview and Fundamentals
Joe Holbrook, Consultant, Brocade Solutions ................................................................13
The Importance of Being Earnest
Alastair Adamson, SAN Architect ..................................................................................14
Real-Life Challenges in Todays Storage World
Kiran Ghag, Senior Systems Administrator, HSBC ..........................................................15
How to Deploy a Celerra iSCSI Solution
John Shubeck, Technical Business Consultant, EMC Corporation ....................................16
Setting Up an Invista Environment
Adam Jones, Senior Technology Consultant, EMC Corporation ........................................17
Deploying an SQL 2005 Cluster in a Virtualized SAN Environment
Bartley Corbin, Implementation Specialist, EMC Corporation..........................................18
Backing Up a Large Oracle Database with EMC NetWorker and EMC Business Continuity
Solutions
Maciej Mianowski, Regional Software Specialist, EMC Corporation ................................19
Designing and Implementing a Backup, Recovery, and Archiving (BURA) Solution in a
Pharmaceutical Company
Carmen Marcano, Solutions Architect, EMC Corporation ................................................21
EMC Proven Professional Knowledge Sharing 3
Contents
NetWorker Best PracticesDesigning for Performance
Matt Steinberg, Senior Solutions Architect, Cambridge Computer Services Inc. ..............22
Integrating the EMC Disk Library with Veritas Netbackup
Adam Jones, Senior Technology Consultant, EMC Corporation ........................................23
EMC NetWorker: Wearing Belts and SuspendersSuggestions for Improving Security,
Performance, and Life-Span using EMC NetWorker
Tor Eikanger, Senior Systems Engineer, Ementor Norge AS ............................................24
Utilizing EMC Replication Technologies to Help Save Texas Electricity Consumers
Billions of Dollars
Michael Solari, Manager, Storage Engineer, Electric Reliability Council of Texas ..............25
Implementing Replication Manager/SE for Exchange
Carl Granfelt, Storage Implementation Consultant, Posetiv Ltd.......................................26
Symmetrix Local Replication from A-Z: All the Choices and Which to Choose
Donald Fried-Tanzer, Education Services Consultant, EMC Corporation............................27
Mainframe SRDF/A and MSC Best Practices
Michael Smialek, Solutions Architect, EMC Corporation ................................................29
Backup-to-Disk for Mainframe using the Mainframe Disk Library
Doug Morris, Senior Technical Consultant, EMC Corporation ..........................................30
Stars of EMC
David Pena, Technology Consultant, EMC Corporation ....................................................31
An International Mainframe Consolidation Project: Strategy and Technology
Michael Zimmermann, Account Technology Consultant, EMC Corporation
and Richard Herbst, Technical Business Consultant, EMC Corporation ............................32
StorageScope Validates Storage Area Network before Migration to New SAN
Barry Nelson, Solutions Architect, EMC Corporation ......................................................33
Global Storage Resource Management
Rich Ayala, VP Senior Architect, A Leading Financial Institution ......................................34
Taming the Data Tiger
John Bowling, Data Architect, Busata Systems ..............................................................36
Automation of Customized and Localized Reporting
SungWook Hyung, Senior Technology Consultant, EMC Corporation ..............................38
EMC Proven Professional Knowledge Sharing 4
Contents
Data Gathering and Analysis for Migration, Disaster Recovery, and Business
Continuance in Symmetrix Environments: The Solution Architects Role
Michael Schwartz, Senior Solutions Architect, EMC Corporation ....................................39
Migrating Data from DMX1000 to DMX-3
Henry Zhang, Senior Infrastructure Specialist, EDS ........................................................41
Migration of File Servers to NAS and Multi-Tiered Storage
Bryan Horton, Systems Engineer, A Leading Healthcare Provider ..................................42
ISL Security Monitoring within EMC MirrorView/SRDF
Thomas Mitrovits, Global Development Business ManagerStorage Networking,
ADVA Optical Networking AG ........................................................................................43
EMC Security Initiatives: A Market Differentiator
Jenny Beazley, Senior Project Manager, EMC Corporation ..............................................44
Challenges and Best Practices in the Deployment and Management of IPTV Networks
Paul Brant, Senior Advisory Technology Consultant, EMC Corporation ............................46
Project Delivery Approach: Pre-work or Re-work?
Lalit Mohan, Senior Solutions Architect, EMC Corporation..............................................47
Business Information Management Reengineering (BIMR)
Eugene Demigillo, Technical Development Consultant, EMC Corporation ........................48
EMC Proven Professional Knowledge Sharing 5
Introduction
The EMC Proven

Professional program was developed in response to the growing demand


for storage and IT professionals with the knowledge and skills to store, protect, optimize, and
leverage their information infrastructures. There is an industry-acknowledged requirement
for increasing levels of expertise, and the program has begun to play an important role in
helping participants to assess, acquire, and validate the skills required to build and manage
efficient information storage and management environments.
The Knowledge Sharing initiative creates a platform for EMC Proven-certified professionals to
share their work, best practices, and experiences with other fellow certified professionals. In our
first year, this initiative attracted dozens of submissions from EMC

customers, partners, and


employees. We are proud to have abstracts and papers from around the globe and to create
a global community of EMC Proven Professionals who are willing to share their experiences.
On behalf of EMC Education Services, and all of your colleagues who will learn from your work,
we would like to thank everyone who submitted abstracts and papers.
Tom Clancy
Vice-President (Education Services)
EMC Global Services
Alok Shrivastava
Senior Director (Education Services)
EMC Global Services
EMC Proven Professional Knowledge Sharing 6
EMC Proven Professionals
can access the complete
papers by going to
http://education.EMC.com.
Serial Advanced Technology Attachment (ATA) Drives
in CLARiiON Arrays
Victor Franco, Lead Instructor, Education Services
EMC Corporation
Serial ATA is a computer bus technology designed to transfer data to and from a hard disk.
There are three specifications regarding this technology, the third is pending.
The second-generation specs were documented mid-2004, but the implementations were not
deployed until approximately 2006. So, EMC has begun to support SATA II drives, though this
naming convention is improper as it does not mean 3 Gb/s.
If we compare the performance of Serial ATA Disks and FC (SCSI) disks, besides the obvious dif-
ferencesin rotational speed, we achieve similar transfer rates. Whyare we told that Serial ATA drive
performance ranges from 25 percent to 90 percent of Fibre Channel (FC) drives? This paper argues
that the answer depends on the application. Performance is very similar for sequential access and
very different for random access.
The underlying reason is that FC drives implement a Command Queuing technology called
Tagged Command Queuing (TCQ) with an effective reordering of eight (8) IOs. Conversely,
Serial ATA drives do not implement this or if they do (SATA II drives use Native Command
Queuing, NCQ), they use an effective queue depth of two (2).
The implications of this technology difference impact two main areas:
Data Safety. More head movement equals more heat generation. More heat increases the
likelihood of failure. Also, longer rebuild times yield more data exposure.
Performance. More head movement means more time to get data serviced.
To compensate for EMC CLARiiON

arrays using Serial ATA drives, a number of counter-


measures have been taken concerning data safety and data performance. This paper details
methods to implement sequential access to the drive and not to the logical unit number
(LUN).
EMC Proven Professional Knowledge Sharing 7
Local Replication and Availability in a CLARiiON Environment:
The Clone Task Force
Fernando Moreno Liso, Systems Executive Engineer
Comparex
Designing: Needs and Challenge.
Availability and protection are among the final steps in a project that included establishing
an infrastructure and designing and implementing a storage information architecture.
Once the systems were in production, we needed to implement a task to keep the systems
running while performing availability task routines. A backup can seriously impact a customer,
so we needed to test the routine under crash conditions.
Thisarticle, based upon EMCbest practices, relatesthe challenge of implementing local replication,
backup, restore, and recovery of AIX and Linux (SLES) systems with Oracle and SAP environments.
This project was successful. By scheduling automatic tasks which involved cloning, backup
and re-charge of production databases in test systems; and by using scheduler tools, navicli
commands, and database scripting, we made it easy to execute one script to recover a whole
database information system. And, we did it twice a day.
Implementing the method.
The process is simple. Every eight hours, three groups of clones for each environment (AIX or
Linux, SLES) synchronize and fracture automatically. The fractured one is assigned to a backup
server then restored to a test server. This paper will provide detail on the methodology and
consideration of the sequencing of events.
While developing this method, we had to consider the implementation and integration of several
tools. These included crontab, navicli commands, SAP and Oracle scripts in order to suspend and
put in special mode databases of different versions, sync, consistent fracture, resume data-
base, assign, backup to a disk library, de-assign clones, restore data, and start instances in
test servers without impacting production systems. This method allows us to do all this
mechanically and automatically with only one click.
EMC Proven Professional Knowledge Sharing 8
How CLARiiON Helped our Exchange Organization
Todd Simmons, Senior Consultant
Citizens Bank
When storage capacity and I/O demands increased, our organization quickly realized that we
had outgrown our direct-attached storage (DAS) environment. Plagued by poor performance,
the inability to expand, and server sprawl, we decided it was time to consider an enterprise
storage solution for our Exchange environment.
Exchange is considered a mission-critical application for our organization. Our environment
supports over 27,000 mailboxes and processes an average of 1.1 million internal messages daily.
Performance, capacity, and expandability are absolute requirements.
In addition to the absolute requirements we also hoped to remedy some existing pain points
by installing an enterprise storage solution. As a result, ease-of-use, dynamic reconfiguration,
backup and restore, disaster recovery capability, and support for Exchange Server 2007 were
all added to the list.
The EMC CLARiiON SAN was the only solution we found that met all of our requirements.
This paper details how we implemented the CLARiiON SAN.
EMC Proven Professional Knowledge Sharing 9
Choosing the Right CLARiiON Data Replication Method:
A Performance-Based Approach
Andre Rossouw, Advisory Technology Solutions Educational Consultant
EMC Corporation
CLARiiON storage systems offer a variety of methods to replicate data. Local data replication
may be performed with SnapView

Snapshots, SnapView Clones, and SAN Copy

. Remote
data replication may make use of SAN Copy, MirrorView

/A, or MirrorView/S. Replication is


defined as making copies without destroying the original data; as a result, logical unit number
(LUN) migration is not included in this paper.
Each replication product has its own advantages and disadvantages, depending on unique
customer requirements. Choosing a replication product is even more difficult when methods
are combined, for example MirrorView/S with Snapshots, or SAN Copy with Clones. In some
cases, copies of the data are required only at a remote location, while in others the data
needs to be copied locally and remotely.
Customers require data backups with minimal disruption; they require their data to be protected
and secured. This paper reviews the various ways that CLARiiON replication software may be
used to meet specific business needs, and makes recommendations based on customer
requirements and the characteristics of the solution. This approach ensures the least impact
on scheduled business activities.
We will use Navisphere

Analyzer and Analyzer archive files captured from storage systems


running representative data access patterns to illustrate and support our conclusions.
EMC Proven Professional Knowledge Sharing 10
CLARiiON Performance Monitoring Scripting
Derek Yu, Senior Consultant
Bell ICT Solutions
CLARiiON Navisphere Analyzer is a great performance monitoring tool for the CLARiiON array.
It gathers storage system performance statistics and presents them visually in various types
of charts. It can help you to identify bottlenecks in the disk storage component of a computer
system, but you have to access it through Web-based Navisphere Manager and view each
CLARiiON array separately.
Based on large enterprise customers requests, we crafted a scripted approach that has been
implemented and well accepted. This CLARiiON performance monitoring solution is based on
Navisphere Analyzer and performs three major functions:
Retrieves CLARiiON performance raw data,
Extracts specific SP/LUN/DISK (storage processor/logical unit number/disk) performance
metrics,
Generates daily CLARiiON performance reports.
This paper provides average and maximum values of all selected CLARiiON performance metrics
for a quickoverview. Daily CLARiiON performance reports are maintained indefinitely to conduct
performance trending analyses. The raw performance data (NAR files) can be kept for the long
term in the event that further investigation or reference to a specific time frame is required.
This is a centralized monitoring solution, running on a single monitoring server. It can be easily
scaled to include multiple CLARiiON arrays at the same or different locations. It can also be
expended to be application aware, i.e., SQL Server database, Exchange storage groups, and
Oracle databases.
EMC Proven Professional Knowledge Sharing 11
Best Practices for Deploying FCIP and iFCP Solutions Using
Connectrix Multi-Protocol Routers
Venugopal Reddy, Senior Engineer,
Problem Resolution & Escalation
EMC Corporation
Extending Fibre Channel (FC) storage area networks (SANs) over medium to wide area distances
utilizing Internet Protocol (IP) networks is becoming increasingly prevalent as IP networks are
ubiquitously available and larger IP bandwidth capacities are a fraction of the cost of Fibre channel.
FCIP (Fibre Channel over IP) and iFCP (Internet Fibre Channel Protocol) are the two protocols
that are widely used to implement these extensions of geographically spread Fibre Channel
networks. Synchronous and asynchronous data replication for data protection and remote
replication, remote tape consolidation, and remote storage pools are some of the applications
of these IP-based SAN extension solutions. Multi-protocol routers that convert Fibre Channel
traffic to IP traffic for transport are used in deploying these solutions. Currently Brocade, Cisco,
and McDATA are three of the prominent vendors that offer these IP-based multi-protocol routers.
However, Fibre Channel storage traffic spikes and then drops, affecting the IP-SAN solution
implementations. Traditional TCP/IP stacks tend to overreact to spikes of traffic, resulting in
excessive slow starts and retransmissions. In order to flatten the burst of the FC traffic and
to sustain high throughput, vendors implement features such as storage-optimized Transmission
Control Protocol (TCP) stacks, Fast Write, and tape pipelining in their solutions.
This paper compares and contrasts the features of storage-optimized TCP solutions by three
vendors (Brocade, Cisco, and McDATA) and reviews best practices to deploy these solutions.
The discussion examines the following aspects of implementing an IP-based SAN solution
using multi-protocol routers:
How do we size the solution based on required I/O throughput and available bandwidth?
How do we design a solution that ensures reliability, availability, and serviceability?
How do we secure an IP-based SAN solution?
How do we deploy an IP-based SAN solution?
How do we ensure sustained application performance?
Due to the interdisciplinary nature of IP-based SAN solutions, the design and deployment of
these solutions tends to be complex and the vendor documentation often tends to be scattered
and limited to product features. This paper bridges the gap by defining the characteristics of an
IP-based SAN solution, contrasting the features among the products of the three vendors,
and detailing best practices for implementation.
EMC Proven Professional Knowledge Sharing 12
Brocade Fibre Channel Routing (FCR) Technology Overview
and Fundamentals
Joe Holbrook, Consultant
Brocade Solutions
Designing a storage area network(SAN) fabric requires a concise understanding of the customers
current and future requirements. SAN fabrics in most large environments have exceeded or
soon will be exceeding the current scalability limits of the SAN solution.
The rapid growth and increasing complexity of SANs has been the driving force behind the
adoption of multi-protocol SAN routers. Brocade has developed routing services that increase
SAN functionality, scalability, and flexibility. These services are a significant evolution for storage
networks.
Merging SAN fabrics is complex and time-consuming for SAN administrators and SAN engineers.
Brocade SAN fabrics can be expanded without merging fabrics via Fibre Channel Routing (FCR)
protocols. In this article, we present both the fundamentals of Fibre Channel Routing (FCR) and
Brocade best practices in meta-SAN design. Best practices are highlighted and presented in a
case study format, making them easy to understand and to apply in the work environment.
EMC Proven Professional Knowledge Sharing 13
The Importance of Being Earnest
Alastair Adamson, SAN Architect
As SANs grow with more servers and disks, and gain complexity with the implementation of
disaster recovery and meta-SANs, it is important to maintain control and to fully understand
the implemented architecture. This requires proactively ensuring coherence and consistency
rather than just setting up some management and monitoring tools and reactively addressing
problems as they occur. A few judiciously written scripts, based on a solid rule set, can greatly
help the administrator by providing information that is not readily available elsewhere.
While there are many powerful vendor tools available, such as EMC ControlCenter

or Brocades
Fabric Manager, they are not sufficient to affirm the SANs cleanliness. Additional tools are
required to ease the administrators burden and increase his/her efficiency. With these tools,
the answer to questions such as, to which array(s) does this server have access, how many
unused aliases are there in the active zoning, or how much disk has been assigned to this
cluster, can easily be answered. Often, these tools are Shell or Perl scripts. However, these
scripts are dependent on the clarity of the administrative rules.
Accurate documentation and status reports can only be built on a foundation of ground rules,
conventions, best practices and procedures. For example, naming conventions should be
defined. The definition of best practices, based on vendor recommendations or in-house
requirements, should be agreed upon and documented. Whenever the SAN physically
changes, the fabric spreadsheet must be updated. This is one example of a procedure that
ensures a maintainable and manageable SAN.
When these rules are well-defined, writing administrative tools is greatly simplified. The tools will
be moreeffectivebecause they will automate tasksand checkthe consistencyof SAN components.
Tools can maintain a server-based copy of the current zone configuration, for example. This in turn
can verify that zoning conforms to the naming convention. It can also provide the WWNs (world
wide names) of a server, required when masking LUNs from an EMCSymmetrix

system.
Other scripts could automatically generate LUN (logical unit number) maps using navicli and
symcli commands, to show LUN capacities, owners, RAID (Redundant Array of Independent
Disks) information, as well as a cumulative disk usage per server or cluster, array front-port
usage, and total used and free capacities per array or RAID group. In turn, the LUN maps can
be cross-referenced with the zoning information to ensure servers are not zoned to arrays on
which they have no provisioned space.
This paper focuses on defining logical and meaningful conventions, documenting best practices,
and developing procedures for SAN administration. A serious and active approach to adminis-
tration and automation makes it far easier to control the SAN and optimize workload execution.
Additionally, it provides you with the opportunity to keep your managers confidence by reducing
the potential for problems.
EMC Proven Professional Knowledge Sharing 14
EMC Proven Professional Knowledge Sharing 15
Real-Life Challenges in Todays Storage World
Kiran Ghag, Senior Systems Administrator
HSBC
This paper is targeted primarily at storage architects and administrators as it presents real-
life challenges faced while implementing SAN solutions.
Storage implementations are growing faster than ever. The information world is booming and
the technology is evolving to keep pace. Users view SAN as a panacea that is going to solve
all their data storage, performance, and protection requirements. The architects and admin-
istrators have to work diligently to satisfy end users needs and provide a design that will
address their requirements.
SAN works well to meet these needs, but many practical hurdles prevent businesses from
achieving optimal results. Every organization faces these challenges on a different scale.
Numerous best practices, How To documents, and user manuals present technical prob-
lems and ways to solve them. But there are few papers that talk about worst practices.
This paper goes beyond the technical to identify the human error and root causes behind
many SAN issues. It adopts a vendor-neutral approach; hence it is applicable to a larger num-
ber of setups.
With this paper, you will be able to identify the risks/issues in your existing or planned setup.
This will prepare you to mitigate them and optimize performance.
How to Deploy a Celerra iSCSI Solution
John Shubeck, Technical Business Consultant
EMC Corporation
iSCSI (Internet Small Computer Storage Interface) is a transport protocol for sending SCSI
packets over TCP/IP networks. iSCSI initiators (clients) and iSCSI targets (servers) are the key
components in an iSCSI architecture. These iSCSI initiators and targets are the devices which
transfer SCSI information over an IP network. The term IP SAN has often been used to
describe an iSCSI network.
In addition to traditional file sharing protocols Common Internet File System (CIFS) and Network
File System (NFS), the EMC Celerra

Network Server supports the iSCSI protocol for host


access. Although Celerras capability has existed for over three years, many customers have
yet to explore iSCSI as an alternative to traditional SAN or NAS connectivity.
In some cases, lack of awareness has prevented customers from exploring iSCSI capability
and its potential value. As a result, a viable alternative to traditional host connectivity which
could result in cost savings cannot be achieved. I would argue that education is a key
approach that can raise awareness and, in turn, lead to evaluation and adoption of iSCSI as a
host connectivity solution for application and database servers.
This article establishes a baseline of understanding about iSCSI and discusses the key ben-
efits and indicators when considering an iSCSI storage solution. In addition, the article
describes a step-by-step process for implementing a Celerra iSCSI design which will include
details about how to set up both the Celerra target and the Windows iSCSI initiator hosts. We
emphasize performance and high availability considerations, specifically Celerra trunking and
failsafe networking as well as Microsoft Multipathing Support for iSCSI (MPIO). Finally, a specific
field experience will be used as a case study to illustrate planning considerations and decision
points throughout the implementation project.
EMC Proven Professional Knowledge Sharing 16
EMC Proven Professional Knowledge Sharing 17
Setting Up an Invista Environment
Adam Jones, Senior Technology Consultant
EMC Corporation
Since the EMC Invista

Instance configuration is new to most individuals, I wanted to share a


complete end-to-end guide to outline the procedures for setting up an Invista environment
from the ground up utilizing Brocade 7420 multi-protocol routers. This paper details all of
the steps necessary to cable and configure the CPCs, IP switches, and Brocade 7420 multi-
protocol routers (DPCs) to integrate into a Symmetrix and CLARiiON storage environment.
In addition to covering the standard configuration tasks, I have included the procedures to
build out the CPCs from scratch with the Invista .mif file and also how to recover the Brocade
7420 multi-protocol routers from the recovery kernel.
The equipment used for this procedure:
Two Invista CPCs running Code Level 1.0SP2
Two Allied Telesyn AT-8948 IP Switches running Code Level 2.7.3-00
Two Brocade 7420 Multi-Protocol Routers running Code Level 7.4.1
and SAS Code Level 2.1.3h
One Symmetrix DMX800 running Microcode Release 5671.54.59
One CLARiiON CX 600 running FLARE

Code Level 2.19.600.5.007


One Windows 2003 Server (SP1) with two QLogic QLA2342 HBAs
running Code Level 9.1.4.15 (Driver), 1.52 (BIOS), and 3.03.21 (Firmware)
Deploying an SQL 2005 Cluster in a Virtualized SAN
Environment
Bartley Corbin, Implementation Specialist
EMC Corporation
This article was inspired by a deployment team from the EMCFederal West, Solutions Engineering
Group. We rewrote two of Microsofts Knowledge Base articles and are doing something with
VMware

that no one thought could be done. During the course of this project, we disproved
several myths about VMware environments utilizing clustering in SANs.
This solution is not supported by any of the major vendors including EMC, VMware, or
Microsoft. Although VMware has documentation on segments of the process, they explicitly
state that certain things will not work. This article is intended to remove the guesswork.
Although we are beginning to see some white papers, it is simply too new for any of the vendors
to announce that they are willing to support this. For instance, EMC PowerPath

cannot be
used in a VMware host, so how do you control failover paths?
This article contributes a single repository for anyone wanting to deploy an SQL 2005 cluster
in a virtualized SAN environment.
EMC Proven Professional Knowledge Sharing 18
Backing Up a Large Oracle Database with EMC NetWorker
and EMC Business Continuity Solutions
Maciej Mianowski, Regional Software Specialist
EMC Corporation
There are many articles describing the Oracle database backup, but none clearly describe the
backup of a large database. EMC provides many solutions which could be used to fill this gap.
The most common definition of a very large database (VLDB) is a database that occupies more
than one terabyte or contains several billion rows. Typically, these are decision-support systems
or data warehouses. Recently, transaction processing applications serving large numbers of
users also fit into this definition.
The storage architects challenge is to design a backup solution that achieves the following:
The backup operation should have no impact on the production process.
The backup window should not be exceeded and the backup solution should be scalable.
The backup solution should be resistant to any type of failure, including whole system failure.
The recovery of the Oracle database should be fast and provide recovery at any point in time.
The backup solution should satisfy all incomplete recovery scenarios supported by Oracle.
The majority of the backup/restore operations should be automated and provide user-friendly
administration and reporting tools.
The solution should be fully supported by Oracle and EMC.
This article provides a guideline on how to use EMC NetWorker

and EMC business continuity


solutions such as EMC TimeFinder

or Open Replicator and describes how they support the


above mentioned principles.
First, the Oracle database backup strategies are discussed and applied to the large database
backup. Some misconceptions about the Oracle hot-backup mode will be presented.
Then, the paper describes EMCs business continuity solutions to illustrate how this technology
interacts with the Oracle backup/recovery mechanisms, e.g., how EMC consistency technology
may be used in Oracle database environments. EMC TimeFinder/Mirror/Clone/Snap and
remote EMC SRDF

and OpenReplicator solutions are introduced and compared.


We discuss EMC NetWorker software including the EMC NetWorker Module for Oracle and
EMC PowerSnap

Module and their integration with the Oracle database backup mechanisms.
The differences between the conventional and proxy Oracle backup are outlined.
EMC Proven Professional Knowledge Sharing 19
Finally, a few examples of the advantages and limitations of backup/recovery solutions are
described. The EMC NetWorker PowerSnap image backup is included.
Many of the topics discussed in this article require comprehensive coverage, so additional
reading will be recommended.
EMC Proven Professional Knowledge Sharing 20
Designing and Implementing a Backup, Recovery, and
Archiving Solution (BURA) in a Pharmaceutical Company
Carmen Marcano, Solutions Architect
EMC Corporation
This paper explores the processes and practices used to design and implement a backup,
recovery, and archiving solution in a pharmaceutical company. The customers primary business
objective was to optimize the overall information management practices that were based on
an obsolete storage infrastructure, inefficient data safeguard practices, and ad hoc information
management processes.
The solution involved a whole new architecture of EMC hardware and software integrated
components. The customer adopted an information lifecycle management (ILM) model to
achieve cost-effective storage, data resilience, and more-effective information management.
We divided the project into seven major phases to accommodate customer needs and existing
processes. Due to the nature of the pharmaceutical business, proper care was taken to fulfill
the regulated systems validation processes. During each phase, we were challenged to over-
come the inherent difficulties in a regulated environment.
Each phase began with a design based on customer needs. Since we had to minimize downtime
during the transition, we focused on the migration strategy from the old to the new storage
infrastructure, with data integrity and compliance always in mind.
The architectural components were based on several infrastructure building blocks. They
included CAS and SAN storage technologies, information availability, and storage management
components such as EMC Legato

software, and archiving, backup, restore, and replication.


All were seamlessly integrated in a resilient BURA architecture.
The optimized platforms were ERP based on SAP technology, and Microsoft File Server technology.
The messaging platform was based on IBM Lotus Domino technology and the Chromatography
Data System was also based on Microsoft technology.
Our efforts optimized customer backup, restore, and archiving processes. Data remained avail-
able, and we collaboratively achieved the IT objective to eliminate backup windows, reallocate
data, and integrate information management. The full article details our experience and what
we learned.
EMC Proven Professional Knowledge Sharing 21
NetWorker Best PracticesDesigning for Performance
Matt Steinberg, Senior Solutions Architect
Cambridge Computer Services Inc.
This paper explores three distinct areas of NetWorker performance. The first section addresses
how to define the business and technical issues in a NetWorker backup environment, including
a discussion of recovery-point objectives (RPOs) and recovery-time objectives (RTOs).
As the amount of data continues to increase, we must meet backup objectives within prescribed
backup windows. RPO and RTO are important measurement criteria to align performance with
business objectives. They support goal-setting, identifying needs, implementing solutions,
and reconciling those solutions to the available budget.
The second section will identify three bottlenecks in NetWorker backup environments:
host, or client side
I/O of the NetWorker server
tape drive
The third section reviews strategies to eliminate bottlenecks using NetWorker tools and software
including NetWorker Storage Node, Dedicated Storage Node, SnapImage, and PowerSnap
software modules.
This paper also addresses the type and number of tape drives, and utilizing backup-to-disk.
Non-NetWorker tools, like EMCs RecoverPoint and RepliStor

software for continuous data


protection are included in the discussion.
The final section presents findings and conclusions.
EMC Proven Professional Knowledge Sharing 22
Integrating the EMC Disk Library with Veritas Netbackup
Adam Jones, Senior Technology Consultant
EMC Corporation
This paper outlines the procedures for integrating the EMC Disk Library platforms with Veritas
Netbackup 5.0.
The equipment used in this procedure:
One MDS 9509 running Fabric OS 3.0 (2a)
One DL310 running Code Release 2.2 and 1 Windows 2003 Server (SP 1) with two
QLogic QLA2342 HBAs running Code Release 9.1.2.16 (Driver), 1.47 (BIOS), and 3.0.3.19
(Firmware)
The EMC Disk Library is emulating one ADIC i2000 tape library with five Quantum Super DLT1
tape drives.
EMC Proven Professional Knowledge Sharing 23
EMC NetWorker: Wearing Belts and Suspenders
Suggestions for Improving Security, Performance, and Life-Span using
EMC NetWorker
Tor Eikanger, Senior Systems Engineer
Ementor Norge AS
The article presents a scenario where built-in functions and customized scripts enhance the
functionality of EMC NetWorker.
It presents issues including:
Using cloning and scripts to maintain the clones. By doing so, you obtain enhanced staging
functionality. All save sets go to an adv_file device and are automatically cloned to tape.
When the adv_file device is full, a script deletes the oldest instances on disk, keeping the
clones on tape. Fresh data is kept in two locations; and older data only on tape.
Using groups and cloning pools for maintaining differentiated retention time. By implementing
this practice, you can keep daily backups for one month, weekly backups for the next six
months, and monthly backups for a decade. This effectively utilizes your storage and reflects
most users need for restores.
Customizing schedules using nsradmin to achieve functionality beyond what is possible in
the NetWorker Administrator GUI (graphical user interface).
Using WORM (write once, read many) media to comply with regulations.
EMC Proven Professional Knowledge Sharing 24
Utilizing EMC Replication Technologies to Help Save Texas
Electricity Consumers Billions of Dollars
Michael Solari, Manager, Storage Engineer
Electric Reliability Council of Texas
The mission of the Electric Reliability Council of Texas (ERCOT) is to direct and ensure reliable
and cost-effective operation of the electric grid and to enable fair and efficient market-driven
solutions to meet customers growing electric service needs.
In 1999, the 76th Texas Legislature passed Senate Bill 7 requiring the creation of a competitive
retail electricity market, and ERCOT was named as central registration agent for retail choice.
Since 1999, the total retail electricity market in the ERCOT region has grown from an estimated
$17 billion annually to an estimated $23.5 billion in 2007. Total generation capacity has grown
to approximately 70,000 megawatts to meet peak demands that have grown from 54,980 MW
in 1999 to estimated peak requirements of 63,000MW in 2007. The ERCOT region has also
added 3,000 MWof renewable energy-generation capacity, while retiring older, more-polluting,
less-efficient generators.
The ERCOT region has seen much greater expansion of transmission infrastructure in recent
years than any other North American region and has been rated as the #1 competitive electric
market in North America.
In 2000, EMC was chosen to meet the retail deregulation requirements. The solutions have
expanded from an initial EMC Symmetrix 8430 in 2000 with 1 TB of capacity, to multiple DMX-3
arrays with 600 TB of usable space in 2007. ERCOT utilizes Symmetrix Remote Data Facility for
disaster recovery replication and migrations; TimeFinder/Mirror, TimeFinder/Clone, and
TimeFinder/Snap for effective replication of critical development projects, fast backup and
recovery solutions, and recently, tiering solutions to meet information lifecycle requirements,
that, by protocol, mandate ERCOT to retain data for seven years.
In 2006, ERCOT was chartered to implement systems to support a more competitive wholesale
electricity market; the goal is to save consumers even more money. These critical systems
must be operational by the end of 2008. EMC replication technologies are critical to the success
of the project, which by some estimates could grow to five times the current size of production
in terms of capacity, and 70 times the current size of processing requirements. All of this must
be achieved without hiring more ERCOT staff, and in the face of data center power, space, and
cooling constraints.
This article shares the ERCOT solution. It reviews how to manage storage growth in uncertain
times to meet critical project timelines with very limited resources.
EMC Proven Professional Knowledge Sharing 25
Implementing Replication Manager/SE for Exchange
Carl Granfelt, Storage Implementation Consultant
Posetiv Ltd.
This article describes best practices associated with implementing Replication Manager/SE
for Exchange.
It reviews and details the following topics:
Exchange best practices
CLARiiON LUN design best practices for Exchange
RM/SE prerequisite software
Configuration Checker
This best-practice document assembles otherwise dispersed industry best practices for
implementing RM/SE specifically in Exchange environments.
EMC Proven Professional Knowledge Sharing 26
Symmetrix Local Replication from AZ:
All the Choices and Which to Choose
Donald Fried-Tanzer, Education Services Consultant
EMC Corporation
EMC offers many different ways to replicate data on a Symmetrix array. Few are aware of all
the options and even fewer know how to select the best option for a particular situation. In
the case of a Symmetrixstorage array, the replication unit discussed in this paper is the Symmetrix
Logical Volume (LV) which appears as a hard disk to the host.
EMC also offers additional products for remote replication, file or directory-level replication,
and automating and managing replication creation and restoration. These additional products
are discussed when their use in combination with local replication may either limit or affect
the choice of the best local replication method.
The key EMC local replication methods discussed in this paper include the TimeFinder family:
TimeFinder/Mirror
TimeFinder/Clone
TimeFinder/Snap
Symmetrix back-end replication (RAID 1, RAID 5, and RAID 6) is discussed to provide back-
ground for the unique capabilities of TimeFinder/Mirror and also the impact on LV mirror
positions which may limit local replication options.
EMC Open Migrator is presented as an example of a host migration product with different per-
formance impacts and features. In particular, it is critical to understand how TimeFinder/Mirror
and TimeFinder/Clone differ and what circumstances might prompt you to add on the TimeFinder/
Mirror feature above the base TimeFinder/Clone product.
LV replication serves many functions: data protection, backup, restore, secondary applications,
migration, and upgrade testing. Both the primary and secondary use of the data impact the
decision about which type of replication to deploy.
Among the factors that may affect your decision:
number of copies
ability to make copies of copies
backup functionality
restore functionality
EMC Proven Professional Knowledge Sharing 27
how soon the copy is available
performance impact of the copy on both the primary and secondary use
This paper includes information on all of the latest features available with EMC Enginuity

level 5772 and Solutions Enabler 6.4.


We begin by defining basic concepts, such as mirror and copy. Then, we move onto implementation
alternatives for achieving the mirror or copy with particular attention to the performance effects and
feature availability. We discuss the specific implementation and features of currently available EMC
Symmetrix local replication methods. Then, we explore how we can achieve customer application
needs with different local replication solutions. Finally, the paper concludes with recommendations
about choosing the best local replication solution to meet any particular situation.
EMC Proven Professional Knowledge Sharing 28
Mainframe SRDF/A and MSC Best Practices
Michael Smialek, Solutions Architect
EMC Corporation
Implementing SRDF/A and Multi-Session Consistency (MSC) in a mainframe environment is a
balancing act between key resources such as cache, diskdrives, Redundant Array of Independent
Disks (RAID) protection schemes, and networkbandwidth. Properly configuring these resources
can guarantee a smooth SRDF/A implementation.
This best-practices document provides specific recommendations for configuring the Symmetrix
hardware, SRDF/A and MSC software, and network equipment. Storage administrators will
learn to build a solid production and disaster recovery environment using the approaches to
operational and recovery procedures in this article.
EMC Proven Professional Knowledge Sharing 29
Backup-to-Disk for Mainframe using the Mainframe Disk Library
Doug Morris, Senior Technical Consultant
EMC Corporation
EMCs mainframe Disk Library (MDL) is an emulation gateway providing either ESCON (Enterprise
Systems) or FICON (Fibre) connectivity to the mainframe host with a shareable, highly available,
high-performing storage backstore to contain the mainframe tape data. The MDLs biggest
advantage is that it allows organizations to eliminate tape in their mainframe environments.
Many mainframe environments suffer from:
aging, unsupported tape infrastructure
immense floorspace requirements
high tape-failure rates
lack of available tape drives during peak backups
tape handling by employees that can lead to loss of the physical tape containing important
financial data
The MDL corrects these problems by emulating IBM tape drives. From a mainframe perspective,
the MDL looks, acts, and feels like a real tape drive. Only a handful of floor tiles are
required to deploy it, greatly reducing the footprint. There are no single points of failure
(SPOFs). The base configuration comes with 512 virtual tape drives. So, theres no waiting for
resources. Best of all, replication is built in and easily configured, thus requiring no tape
handling by employees.
This article discusses what the MDL is, what questions an organization needs to ask in order to
size it for both throughput and capacity, and how to migrate to the device once it is deployed.
Numerous MDL deployments, large and small, have been made. The convergence of 500 GB disk
drives and mainframe tape emulation has made backup to disk for the mainframe a reality.
EMC Proven Professional Knowledge Sharing 30
Stars of EMC
David Pena, Technology Consultant
EMC Corporation
My paper introduces two star configurations that we are offering a stock exchange customer
in Madrid, Spain. It is particularly noteworthy since there is no similar solution offered in Spain.
The first one is an SRDF/Star configuration for mainframe and open systems environments
with AutoSwap

for Mainframe (general availability in February) and AutoStart

for Open
Systems. In the mainframe environment, this customer has DB2 as a database solution and
Oracle/SQL in the open systems environment. They are very interested in having three sites
for disaster recovery in three different areas inside Spain.
The second is a star configuration for EMC Centera

. This customer is also very interested in


purchasing Documentum

with EMC Centera, and we are offering three systems for three
different sites in a unique star configuration similar to SRDF/Star and Symmetrix. Documentum
will be used to store, manage, and organize business-critical information.
With these two solutions, we are offering two NS40G replicated with SRDF/S and six Cisco
directors 9506 (two in each site) for SAN connectivity, SAN Extension, IP replication, and FC/IP
routing. We are also offering to integrate EmailXtender

with EMC Centera and Documentum.


Both star configurations, Cisco directors and NAS, will be managed with EMC ControlCenter
providing one single point of control.
This project supports the ONE EMC initiative, and we are happy to offer it as a valuable best
practice.
EMC Proven Professional Knowledge Sharing 31
An International Mainframe Consolidation Project:
Strategy and Technology
Michael Zimmermann, Account Technology Consultant
EMC Corporation
Richard Herbst, Technical Business Consultant
EMC Corporation
One of the largest outsourcing customers in Germany was planning an ambitious project to
consolidate all of their existing mainframes and storage into one central location. This was a
significant opportunity for EMC to demonstrate our service value.
The customer is an international technology services company with annual revenues of more
than EUR 5.4 billion; employing more than 50,000 people in 40 countries. This was a huge
opportunity that resulted in a win for EMC.
This paper describes the processes that we used to achieve this clients requirements.
Beginning with the analysis of the existing systems landscape, we generated performance
reports from each of the companys systems. Using project management techniques, we collab-
oratively identified milestones that were particularly useful since the migration included
eight steps and each step included at least two tests to ensure migration security.
The paper details the processes we used to achieve:
Tape migration
Data migration
Migration of standard volumes
Migration of R1 volumes
Migration of R2 volumes
Migration of BCV volumes
Data migration tests using SRDF
This paper illustrates how collaboration and partnership with a customer can yield excellent
results.
EMC Proven Professional Knowledge Sharing 32
StorageScope Validates Storage Area Network before
Migration to New SAN
Barry Nelson, Solutions Architect
EMC Corporation
A leading health insurance provider planned a SAN technology refresh that affected 80 hosts,
12 storage arrays, and 10 switches in two data centers. The plan was ambitious; there were
over a hundred systems undergoing change on the same day. The business owners
demanded minimal application downtime. This window was a few hours for some hosts and
16 hours for other less-critical hosts.
Months of planning were required to minimize the risk that a host would move to the new SAN
and miss just one volume that would prevent it from returning to service. Nevertheless, the
project team was concerned that the change control process could validate the design, but
there was no assurance that there would be zero implementation errors.
There were over 12,000 volumes in the plan. If the execution followed the design to an accuracy
of 99.9 percent (an ambitious goal), there would be 12 volumes missing in the new SAN. In
the worst case, these 12 volumes would mean 12 hosts would not be available when the customer
needed them.
There were also over 800 zones that needed to be checked. The team decided to use software
to validate the implementation against the requirements since it was unreasonable to expect
an individual to find an error in 12,000 records and 800 zones.
EMC ControlCenter StorageScope

is well-suited to address this problem since its repository


contains information on what is actually implemented. Prior to the migration, we connected
hosts with ControlCenter agents to the new SAN to collect all the configuration information
about the storage arrays and switches. Then, using custom reports on the StorageScope
tables, we compared the existing host device allocation to the new SAN device allocation.
As expected we discovered missing volumes, masking errors, mapping errors, and errors in
zones. It was relatively easy to correct these errors before the migration event. Had these errors
occurred during migration, they could have damaged our relationship with the customer.
The migration was a success because the team did not lose time fixing SAN execution errors.
Change control examines the design and plan, but has not traditionally reviewed the imple-
mentation. When it is possible to perform implementation steps in advance of a data migration,
it is prudent to verify those activities as well.
This paper shares our experience.
EMC Proven Professional Knowledge Sharing 33
Global Storage Resource Management
Rich Ayala, VP Senior Architect
A Leading Financial Institution
As the lead technical architect designing and implementing the worlds largest storage resource
management (SRM) system for a large financial institution, I have a unique opportunity to reflect
on the experience.
During this project, we made many decisions based on the storage technology base, size of the
organization, existing tools, past experiences with storage resource management (SRM), corpo-
rate storage priorities, as well as vendors tools. With 15 PB sitting on 450 arrays, served to over
8,000 servers, connected to over 50,000 switch ports, residing in over 60 data centers world-
wide, we believe that this SRM implementation is the largest to date in terms of total storage and
server assets discovered, size, and distributed nature of the environment.
Some of the banks internally developed tools were mature in areas such as storage request
and reservation capability. However, no one tool could satisfy the immediate need to manage
a global storage infrastructure that is growing 60 percent annually; and to put that utilization
information into the hands of the user/customer, the banks lines of business.
The overall goal of the global SRM project (GSRM) was to provide one approach to collect and
distribute storage capacity, utilization, and configuration information from several perspectives,
including the array, switch, server, database; and to provide roll-up summaries as well as drill-
down capability by geographic location, owning customer organization, and storage tier.
This article discusses the following:
GSRM (global storage resource management) solution requirements
How the solution enables a strategy for storage/data center consolidation and application
re-tiering
Past and current toolsets and how they applied or did not apply to the solution
Toolsets and technical architecture of this developed solution (EMC and third-party products)
EMC ControlCenter as the foundation and source for our global SRM data
The combination and compilation of EMC ControlCenter data to provide a single report
repository for all global storage assets
How one common GSRM report repository enables end users to meet corporate storage
standards
The specific metrics used to measure customer compliance to standard guidelines
EMC Proven Professional Knowledge Sharing 34
How the GSRM deployment yielded ancillary benefits of standardized performance reporting
and provisioning using EMC ControlCenter
The challenges of deploying and supporting a global SRM solution
EMC Proven Professional Knowledge Sharing 35
Taming the Data Tiger
John Bowling, Data Architect
Busata Systems
Introduction
Storage management has become more than inserting monolithic subsystems and carving out
logical unit numbers (LUNs) largely due to the onslaught of data storage requirements and the
accompanying resource burden placed upon many organizations. The practice of storage man-
agement has evolved into an art form.
While working for a fairly large insurance company, Ive experienced many of these challenges.
Due to regulatory and internal mandates, we have witnessed triple-digit growth during the past
three years. We have grown from a couple of terabytes to a couple-hundred terabytes in very
short orderwith no relief in sight.
In order to absorb the increasing demands placed upon our data systems, we took a fresh
and systematic approach to managing the ever-increasing data storage requirements.
This is how EMC helped us:
Subsystem Infrastructure
We implemented a more flexible infrastructure that sustains exponential growth and performance.
In the past, we procured just enough to handle our immediate demands. This led to wasted time,
money, and effort implementing smaller systems that didnt necessarily integrate well with one
another.
To combat this, we implemented a Symmetrix DMX-3 subsystem which we are confident will
meet our long-term strategic storage needs. This system easily scales as our data requirements
increase. In addition, the DMX-3 provides the ability to tier and consolidate many of our aging
subsystems within a single box. It also provides enhanced optimization, notification, and alerting
with enterprise-class reliability.
Fabric Infrastructure
In order to handle the additional connections to our storage systems, we implemented a dual
core-edge fabric utilizing McDATA i10K directors and McDATA departmental switches. This
approach provides enterprise-class reliability along with scalability ensuring no single points
of failure within the SAN fabric.
Critical systems are dual-attached and remain online in the event of a host bus adapter (HBA),
cable, switch, fabric port, or storage port failure(s).
EMC Proven Professional Knowledge Sharing 36
Backup Infrastructure
Taming the storage infrastructure is only part of the solution. Many organizations face challenges
related to backup and recovery due to additional data capacities.
In order to deal with this issue, we chose to implement an EMC Disk Library (CDL) in a disk-
disk-tape backup architecture.
With CDL replication, we eliminated the majority (96 percent) of our tape requirements while
enhancing backup reliability and total throughput.
Virtualization
Server virtualization utilizing VMware reduced infrastructure-related costs while enhancing
disaster recovery (DR) capabilities.
Information Lifecycle Management (ILM)
A key component to our approach was to reduce the costs associated with explosive growth
on our enterprise subsystems. ILM alleviates this issue by archiving static and underutilized
e-mail and unstructured files to lower-cost storage platforms.
We chose the EMC Centera product for this purpose because it was easy to manage and it easily
scales in the hundreds of terabytes. Due to its compliance options, EMC Centera also meets
HIPAA, Sarbanes Oxley, as well as other governmental and internal mandates.
The full article presents lessons learned and best practices implemented to help us tame the
tiger without getting bitten.
EMC Proven Professional Knowledge Sharing 37
Automation of Customized and Localized Reporting
SungWook Hyung, Senior Technology Consultant
EMC Corporation
This article focuses on capacity management. Each customer has unique requirements. Some
consider storage management part of a larger system without providing a separate storage
management area, or thinkof storage as a black-box. In either case, we need to provide customers
with storage management guidance and education.
EMC ControlCenter StorageScope is playing a major role in automating capacity manage-
ment. The Basic Customize Feature with a default requirement column, or the Custom Field
Feature with a defining and reporting column, can generate a customers Capacity Report. But
customers want more than these features.
Our customer wanted the storage management report to show which host is consuming how
much of the volume, and how the file system or the database is being utilized. And, they
wanted all of this in one view. They wanted an end-to-end capacity report, including configuration
information, beyond separate storage, host, database, or SAN switch volume information. And,
they wanted it in Korean.
This required a different method, the StorageScope Customer Report for Korea. Officially
called Korea Customized EMC ControlCenter StorageScope Report (or Korea Customized STS),
it started by considering the customers needs.
Using StorageScope, each agent collects data in a repository in real time and saves it in XML
format. This was a good approach to resolve the double-byte issue as well as customizing the
report form that Korean customers wanted.
Term definition and calculation are prerequisites for executing this program. Reports are
meaningful only when they are created in a users language and use the customers data and
calculations. Most of the pre-work consisted of converting the terms and structure of different
productsSymmetrix, CLARi (CLARiiON for Korea), Celerra, EMC Centera, or Connectrixto fit
the customer.
I wouldnt have been interested in this type of work, but the EMC Proven Professional Program
Specialist and Expert courses certainly have helped me develop my expertise. Customers with
large-scale storage infrastructures are more satisfied with capacity management in Control-
Center and provided EMC with more than 10 references regarding the best practice of effective
management reports.
We were able to provide a real end-to-end service that automatically collects and processes data
and creates a report that can be used to manage the customers business. In conclusion, the local-
ization of software is not about language, but is about resolving cultural differences. Unlike
hardware that is mass produced, software is, after all, a reflection of a country and its culture.
EMC Proven Professional Knowledge Sharing 38
Data Gathering and Analysis for Migration, Disaster Recovery,
and Business Continuance in Symmetrix Environments:
The Solution Architects Role
Michael Schwartz, Senior Solutions Architect
EMC Corporation
There are many ways to gather the requisite data for planning and implementing migrations
and/or disaster recovery (DR). This article presents processes and methodologies that I have
successfully used to accelerate and improve data gathering and analysis.
This paper describes the steps to install Solutions Enabler on your laptop and gather the following
information from the customer:
Common
Symmaskdb list database
Copy of SYMAPI_DB.BIN file
Get DG/CG from customer
Symmetrix BIN file(s)
GRABs
Switch reports
DR/BC
RPO/RTO
Intended bandwidth
Connectivity topology
With this information, Solutions Enabler has the ability to create xml output of most commands
by simply adding a -output xml to the command. Xml structure allows for easy importing into
Excel, as well as simplified Perl scripting.
This paper fully explores this topic. By loading the customers symapi_db.bin file on your laptop,
you will be able to execute many show, list, and query commands. This will ease the discovery of
device info, SRDF/TF relationships, device groups/composite groups, and more.
Once all of the details are captured in your Excel document, it is easy to sort/filter the current
information and to plan your migration/replication implementation.
EMC Proven Professional Knowledge Sharing 39
Outline of analysis procedures included in the paper
1. Know your team members
2. Gathering, aggregating, and qualifying data
3. Determining which data is pertinent for analysis
4. Analysis steps for migration planning
5. Analysis steps for replication planning
6. Finalizing the design with the customer
7. Successful handoff to implementation personnel
8. Keys to success for customer test and acceptance
9. Project completion
EMC Proven Professional Knowledge Sharing 40
Migrating Data from DMX1000 to DMX-3
Henry Zhang, Senior Infrastructure Specialist
EDS
This article introduces EDS Canadas best practice on migrating data from EMC DMX1000
arrays to EMC DMX-3 arrays using EMC Open Replicator. It reviews all stages of our successful
project including migration planning, pre-implementation, implementation, and verification.
This project took approximately three months to complete and we migrated nearly 100 servers
including Windows, Solaris, AIX, HP-UX base, as well as most popular cluster environments
like Veritas Cluster, Sun Cluster, and Microsoft Cluster.
The article introduces an EDS-developed utility, symcli scripts, to enable faster migrations.
EMC Proven Professional Knowledge Sharing 41
Migration of File Servers to NAS and Multi-Tiered Storage
Bryan Horton, Systems Engineer
A Leading Healthcare Provider
The proper software running within a robust hardware infrastructure, coupled with enter-
prise-class best practices, can produce a healthy, resilient, multi-tiered environment for data
storage. This article describes the journey of migrating Windows and UNIX file servers from
many servers using a single tier of storage to a NAS-based solution utilizing a multi-tiered
environment.
The EMC hardware platforms included the Symmetrix, CLARiiON, Celerra, EMC Centera, EMC
Disk Library, and EMC Connectrix

. Well review the associated EMC software including Celerra


SnapSure

, EMC DiskXtender

for NAS, SnapView, and TimeFinder.


Starting with design considerations, and moving to current use and future plans, this article
explores technology selections and the criteria on which they are based. We also discuss the
trials and errors we experienced on our journey to find the optimal solution.
EMC Proven Professional Knowledge Sharing 42
ISL Security Monitoring within EMC MirrorView/SRDF
Thomas Mitrovits, Global Development Business ManagerStorage Networking
ADVA Optical Networking AG
In todays environment, the security of data transmission is critical. Fibre intrusion and degra-
dation monitoring is sometimes necessary to ensure that the lines between data centers are
secure and healthy. When a failure occurs, the data path should switch automatically to another
more secure line. Many times, temporal changes in fibre performance are difficult to detect. If
not monitored in real time, data may be manipulated/stolen faster than you can react.
With the use of an ADVA FSP2000 with an Optical Line Monitoring module (OLM) and the inte-
gration into MirrorView, SRDF via a Management Server, or EMC ControlCenter, we can prevent
this problem.
This article reviews and discusses:
Fibre intrusion monitoring
Fibre degradation monitoring
Fibre cut monitoring (optionalbecause MV/SRDF are aware of it)
It details the steps taken to implement a solution and describes additional components.
EMC Proven Professional Knowledge Sharing 43
EMC Security Initiatives: A Market Differentiator
Jenny Beazley, Sr. Project Manager
EMC Corporation
A recent RSA

survey revealed that EMC customers fear auditors more than hackers. In the
wake of Enron, the Sarbanes-Oxley law imposes severe penalties on publicly traded companies
for exposure or tainting of financial data. There are a growing number of regulationsand standards
companies must adhere to, including the California Senate Bill 1386, Gramm-Leach-Bliley Act,
and the EUs Directive 95/46/EC.
In 2005, EMCconducted a security assessment of its products and subsequently initiated projects
including two-factor or two-pass authentication to storage arrays and connectivity devices,
removing static passwords from array management software, and creating audit trails.
With such a complex product range, changes cannot be expected overnight. However, there
are steps that all EMC employees can take to promote storage management security for EMC
and its customers. It is our responsibility as EMC Proven Professionals to blaze the trail and
encourage colleagues to follow best practices to ensure a more secure environment for both
EMC and our customers.
The full paper brieflydescribesEMCsecurityinitiativesand offerssuggestionsfor securelymanaging
storage arrays. One suggestion is for customers to implement the ESRS Gateway for secure remote
access, securely erasing failed diskdrives, and setting secure passwords and access control.
Initiatives
Symmetrix Service Credentials, secured by RSA
Service Credentials for other storage arrays
Data Erasure (both single-disk and rack-mounted units for Symmetrix, CLARiiON, and
eventually EMC Centera)
ESRS Gateway
Alert Server
Tools Server
EMC Proven Professional Knowledge Sharing 44
Security Best Practices
Setting Secure Passwords
Access Control
Secure Transmission
Confidential Information
Customer-Facing Security
Top-five storage array customer questions from the Customer Security Management Office
EMC Proven Professional Knowledge Sharing 45
Challenges and Best Practices in the Deployment and
Management of IPTV Networks
Paul Brant, Senior Advisory Technology Consultant
EMC Corporation
Reliability and quality of service are the greatest challenges that Internet Protocol Television
(IPTV) operators face as they deploy IPTV and other broadband services. These complex serv-
ices must be extremely resilient. If consumers experience less than optimal service levels,
both customers and providers are negatively impacted.
It is challenging to integrate video-over-IP equipment into existing metro and access net-
works. So, how can service providers be sure that those networks are capable of delivering
quality service as they grow from thousands to millions of customers?
This paper reviews the video-stream and integrated triple-play/multicast video solutions
available and examines how they work. Video service delivery for example, places high band-
width demands on its network and related applications as the provider integrates storage,
delivery, and access to the consumer. There are enormous scalability requirements that can
include thousands of servers with back-end storage in the petabyte range. This will challenge
any deployed solution.
Networks rely on multiple layered protocols. Since the layers are independent, a problem in
a lower protocol can be masked and/or spread to the other protocols. This type of lower-level
protocol disruption can be easily hidden and hard to diagnose. A timely diagnosis and quick
resolution are critical.
The Next-Generation Network Architecture (NGNA) is the cable industrys umbrella vision
for its network of the futureultimately a move to IP. Parts of NGNA can be found in Cable
Labs specifications, including DOCSIS 3.0, PacketCable, OpenCable, and CableHome. This
technology also has scalability and quality of service issues.
The EMC Smarts

family of solutions, including support for IPTV, helps service providers create
a high availability and high-performance environment. Smarts powerful modeling, cross-
domain correlation, analysis plus a scalable and distributed architecture make EMC Smarts
capable of supporting and managing large complex environments. This helps to isolate any
problem with a high degree of accuracy.
This paper discusses the unique management challenges posed by next-generation networks
(NGN) and how the EMC Smarts architecture is uniquely suited to address them.
EMC Proven Professional Knowledge Sharing 46
Project Delivery Approach: Pre-work or Re-work?
Lalit Mohan, Senior Solutions Architect
EMC Corporation
Project delivery engagements, whether large or small, require a quickprogression from initiation
to close. These undeniable pressures emanate from tight deadlines, cost pressures, short
opportunity windows, and many other factors.
Under such pressure, it is easy to ignore pre-work; the creation of the charter, scope, tasklists,
schedule, and the many supporting plans required for the delivery of the project.
Ignoring or minimizing pre-work almost always results in late discovery of critical requirements,
unrestrained stakeholder influence, and use of unsuited deployment methods. Ultimately, it
results in extensive re-work leading to runaway costs.
This article reinforces the theory that pre-work and re-work are inversely related. Conducting
the appropriate amount of pre-work has the potential to reduce or even eliminate re-work.
Conversely, paying less attention to the pre-workalmost certainly increases the amount of re-work.
Helping stakeholders understand the linked relationship will help them to overcome their
resistance to spending time on pre-work and balance the pressure to bypass it. This would
minimize the total cost of service delivery.
EMC Proven Professional Knowledge Sharing 47
Business Information Management Reengineering (BIMR)
Eugene Demigillo, Technical Development Consultant
EMC Corporation
We have delivered various solutions (platforms and software) and services (consolidation,
continuity, compliance, comprehensive BURA, content management, and classification) that
benefit our customers. But there is another facet of our customers business that we need to
address; we need to help them re-engineer their information management processes and
procedures.
It can take between six and nine months for customers to align their processes with our solutions.
As they focus on that alignment, they tend to delay other projects with us.
Offering BIMR consulting to customers helps them to more quickly adapt their processes. This
may be a bit outside our comfort zone, but as the leading provider of information management
and infrastructure solutions, it is essential for us to deliver this valuable service to customers.
This paper reviews the following topics:
Understanding business process reengineering
Understanding the value of information management/infrastructure
Why the need for BIMR? (Who needs a BIMR?)
Executing BIMR (a methodology)
Rewards of a successful BIMR exercise
EMC Proven Professional Knowledge Sharing 48
EMC Proven Professional Program
The EMC Proven Professional program is the leading, most comprehensive training and certi-
fication program in the information and storage management industry.
Tracks/Roles
EMC Proven Professional Storage Technologist (EMCST)
EMC Proven Professional Storage Administrator (EMCSA)
EMC Proven Professional Technology Architect (EMCTA)
EMC Proven Professional Implementation Engineer (EMCIE)
EMC Proven Professional Customer Engineer (EMCCE)
EMC Proven Professional Application Developer (EMCApD)
EMC Proven Professional Product/Technology Specific
Specializations
Symmetrix Business Continuity
CLARiiON Solutions
Networked StorageSAN
Networked StorageNAS
Networked StorageCAS
Storage Management
Backup and Recovery
Mainframe
Availability
EmailXtender and EmailXaminer
EMC Proven Professional Knowledge Sharing 49
EMCs Proven Professional Framework
Our unique framework is a consistent, measurable means to build and maintain technical
knowledge and skills. Our closed-loop process allows participants to enjoy the full range
of our offeringfrom practice tests to distribution of updated content in your specialty area
and, of course, to knowledge sharing.
Special thanks to all of our certified individuals who contributed to this publication.
EMC Proven Professional Knowledge Sharing 50
EMC Corporation, Hopkinton, Massachusetts 01748-9103, 1-508-435-1000, In North America 1-866-464-7381
EMCbelieves the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES
OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC
2
, EMC, CLARiiON, Documentum, and where information lives are registered trademarks and EMC Proven is a trademark of
EMC Corporation. VMware is a registered trademark of VMware, Inc. All other trademarks used herein are the property of their
respective owners. Copyright 2007 EMC Corporation. All rights reserved. Published in the USA. 05/07 Handbook H2771.2

Vous aimerez peut-être aussi