Académique Documents
Professionnel Documents
Culture Documents
EMCs Focus
EMC is a
EMCs focus is
TECHNOLOGY
company
IT Infrastructure
Who We Are
We are a leading technology company that is driven to perform, to partner, to execute We go about our jobs with a passion for delivering results that exceed our customers expectations for quality, service, innovation, and interaction
We pride ourselves on doing whats right and on putting our customers best interests first
We lead change and change to lead We are devoted to advancing our people, customers, industry, and community We say what we mean and do what we say We are EMC, where information lives
2009 EMC Corporation. All rights reserved.
2000 Joe Tucci joins EMC 2001 EMC Sales segments market into large, commercial, and small customers EMC teams up with Dell
Five-year, multi-billion dollar alliance
Dell and EMC announced a multi-year extension of their global alliance through 2013
Infrastructure Requirement
o Classroom to conduct the trainings
o User ids to access the EAA portal from server by the students or faculties involved
o Student Guide
o Solution to ISM Textbook Questions o Assignment o Managing Information Storage Study o Topology Guide
Purpose
Todays IT Environment
I cant find skilled storage professionals.
Todays IT Challenges
Open course
Industry-leading
Learning formats
5 day Instructor Led Training
Visit : https://education.emc.com/ism
2009 EMC Corporation. All rights reserved.
If the video doesnt run on full screen Install the code Pack from http://www.filehippo.com/download_klite_codec_pack/
2009 EMC Corporation. All rights reserved.
Course Objectives
Upon completion of this course, you will be able to:
o Describe the challenges found in todays complex information management environment o Describe storage technology solutions (such as DAS, NAS, SAN and Virtualization technologies)
o Describe the key business drivers for storage: Information Availability and Business Continuity
o Describe common storage management roles and responsibilities
o Describe the processes and technologies for identifying, analyzing, and mitigating security risks in storage infrastructure
2009 EMC Corporation. All rights reserved.
Course Organization
Information Storage
and Management Section 2 Storage Networking Technologies and Virtualization Section 4 Storage Security and Management
Syllabus
Introduction to
Business Continuity
Network-Attached Storage
Local Replication
IP SAN
Remote Replication
Content-Addressed Storage
New Version
Storage Virtualization 2009 EMC Corporation. All rights reserved.
Audience
College and university computer science/ IT students IT Professionals who are new to the storage technology Experienced storage professionals who want to understand all areas of storage technology
Alignment Aligns with course offered by EMC Academic Alliances Aligns with EMC Proven Professional (EMCPP) certification
http://education.EMC.com/ismbook
2009 EMC Corporation. All rights reserved.
Associate Level
Information Storage and Management
Specialist Level
Storage Networking Information Availability
Expert Level
Enterprise Storage Solutions
Open
Identify RIGHT metrics to monitor and manage storage infrastructure, to meet business requirements.
NAS for File Sharing SAN for OLTP CAS for Compliance RAID 4 or RAID 3 for video streaming RAID 1+0 or RAID 0+1 for OLTP Zoning Port or HBA or Both
ISL Buffer credit for Performance Identify SPOF for Availability Link utilization and Port Availability Monitor for 60% or 80% or Both Soft or Hard error threshold 3 or 5 attempts spoofing attempt
Understand various storage technologies that affect the performance of your network and plan
Improve Server Performance Avoid costly Server upgrades LVM on Storage array Server or Storage Replication Direct or SAN based backup
Improve Network Performance and Availability Avoid complex upgrades IP-SAN Common LAN or VLAN SAN or LAN based Replication Direct or LAN based backup
Integrate functions of storage technology and improve application availability and performance
Improve Database Performance Migrate Database RAID1 or 5 or 1 + 0 for Index file 1 or 2 BCV for Recoverability Shipping or Replication of Logs
IT Project Managers
IT Managers, Directors
Effectively negotiate with your project stake holders on storage infrastructure implementation
Choose right implementation strategy Mitigate project risks Impact of changing Raid 1 to Raid 0 Migration: Downtime required or not Balance RTO - RPO - RGO
Learning Aids
(Registration Mandatory)
Gain Access to supplemental ISM resources and materials, including: Simulators Case studies Videos Whiteboard discussions White papers
Steps for Registering at the EMC Academic Alliance student website: Step 1: Go to http://education.emc.com/academicalliance Step 2: Click Register on the top right hand side of the screen. Step 3: Follow the instructions to complete the form. Fill in the details under the required fields: First Name Last Name
Registration Id
Institution Name is populated itself on entering the Registration Id Email Address Select Country from drop down box Step 4: Click on Submit On Submission, an automated email will be sent to your email address with registration confirmation
**
Steps towards Registering for a Powerlink Account : Step 1: Go to http://powerlink.emc.com Step 2: Click Register on the top right hand side of the screen by selecting your country & language.
Step 3: Select
Company Others Enter your Name & Email Address Press Next Step 4: Click Continue for the Question Are you Associated with any Company Step 5:Fill in the Contact Details & Click Next Step 6 : Fill in your Contact Number Step 7: Click on Submit
On Submission, an automated email will be sent to your email address with registration confirmation ** Note : Please reset your password before first log-in.
https://community.emc.com
**Login Using Powerlink Id
www.emc.com/community/index.htm
2009 EMC Corporation. All rights reserved.
EMC On
o On EMC Corp & RSA Solutions
o www.youtube.com/PointBB o www.youtube.com/EMCCorp o http://www.youtube.com/SecuredByRSA
o On Iomega
o www.youtube.com/iomegachannel
o On Vmware ( Virtualization )
o www.youtube.com/vmwarerocks
http://twitter.com/EMCCorp http://twitter.com/EMCWorld
Flickr
http://del.icio.us/EMCcorp http://del.icio.us/EMCsoftware
Delicious
Slideshare
http://slideshare.net/EMCsoftware http://www.slideshare.net/EMCCorp
http://friendfeed.com/emccorp
FriendFeed
2009 EMC Corporation. All rights reserved.
Orkut
Education.emc.com > EMC Proven Professional Certification > Benefits > Knowledge Sharing
https://education.emc.com/guest/certification/benefits/ks.aspx
2009 EMC Corporation. All rights reserved.
http://www.emc.com/digital_universe/downloads/web/personal-ticker.htm
2009 EMC Corporation. All rights reserved.
Must Read
www.emc.com/resource-library/resource-library.esp
On Demand Webinars
www.emc.com/events/ondemand-events.esp
o Infostor (www.infostor.com)
o InfoStore (www.infostoremag.com )
Industry Conferences
o EMC World is the ultimate information exchange for all customers and partners. Attendees will gain unparalleled access to EMC's entire portfolio of software, platforms, solutions, and services. www.emcworld.com
o RSA Conference is the most prestigious information security event of the year. It is the must-attend event for organizations that deploy, develop or investigate data security or cryptography products. The RSA Conference brings together IT professionals, developers, policy makers, industry leaders and academics to share information and exchange ideas on technology trends and best practices in identity theft, hacking, cyberterrorism, biometrics, network forensics, perimeter defense, secure web services, encryption and related topics. www.rsaconference.com
o Momentum offers the most comprehensive view of content & information management solutions available. www.momentumeurope.com o VMworld is the Online Virtualization Conference. www.vmworld.com
2009 EMC Corporation. All rights reserved.
www.cisco.com/go/virtualdatacenter
2009 EMC Corporation. All rights reserved.
Local Chapters of SIG to host events round the year. Please Speak to your Academic Officer/Student Ambassador to find out more about the nearest SIG Chapter
o Keep Yourself Informed on all EAA Activities, Weekly coverage on EMC & Industry Updates o Web address: http://eaasig.ning.com/
2009 EMC Corporation. All rights reserved.
Storage System
Section 1
Section 1
Section 3
Storage System
Business Continuity
Introduction to
Business Continuity
Managing the
Storage Infrastructure
Network-Attached Storage
Local Replication
IP SAN
Remote Replication
Content-Addressed Storage
Chapter 1
Chapter Objectives
Upon completion of this chapter, you will be able to: o Describe who is creating data and the amount of data being created o Describe the value of data to business o List the solutions available for data storage o List and explain the core elements of data center o Describe the ILM strategy
Nearly a quarter of the world's population roughly 1.4 billion people will use the Internet on a regular basis in 2009.
2009 EMC Corporation. All rights reserved.
Online Video
Photo traffic now peaks at over 300,000 images served per second
2009 EMC Corporation. All rights reserved.
People Needs
People Needs
oWork wherever, whenever, and with whatever oCompute diversity must be embraced
People Needs
oWork wherever, whenever, and with whatever oCompute diversity must be embraced
People Needs
Work wherever, whenever, and with whatever Compute diversity must be embraced
Context
RIGHT Place
Community
Maximize constituents with common interest Collaborate without boundaries Embrace culture of open innovation
Going external (future) >100+ communities>no knowledgeable outsourcers
Compliance
Web 2.0 without risk Manage all content types across platform
Store
Protect
Optimize
Leverage
Store
Protect
Optimize
Leverage
1 Megabyte =
1 million bytes a tablespoon of sand
1 Gigabyte =
1 billion bytes patch of sand 9 square, 1 deep
1 Terabyte =
1 Petabyte =
1 Megabyte =
1 million bytes a tablespoon of sand
1 Exabyte =
1,000 petabytes the same beach from Maine to North Carolina
1 Gigabyte =
1 billion bytes patch of sand 9 square, 1 deep
1 Zetabyte =
1 Terabyte =
1 Yottabyte =
1 Petabyte =
1,000 zetabytes enough info to bury the entire US under 296 feet of sand
What is Data
Collection of raw facts from which conclusions may be drawn
Photo
Book
Letter
Categories of Data
o Data can be categorized as either structured or unstructured data o Over 80% of enterprise information is unstructured
E-Mail Attachments X-Rays PDFs
Check
Unstructured (80%)
Instant Messages Documents
Manuals
Images
Forms
Contracts
Structured (20%)
Rows and Columns
2009 EMC Corporation. All rights reserved.
Define Information
o What do individuals/businesses do with the data they collect?
o They turn it into information
Wired
Wireless
Wireless
Wired
Uploading information
Accessing information
Users of Information
o Customer satisfaction/service
o Tracking shipments, and deliveries
o New services
o Security alerts for stolen credit card purchases
History of Information
Storage
o Data created by individuals/businesses must be stored for further processing o Type of storage used is based on the type of data and the rate at which it is created and used o Examples:
o Individuals: Digital camera, Cell phone, DVDs, Hard disk
o Businesses: Hard disk, external disk arrays, tape library
LAN
FC SAN
Lesson Summary
Key points covered in this lesson: o Importance of information
Additional Task for Students Research on Storage Technologies & Architecture evolution ( RAID & Storage Networking )
Upon completion of this lesson, you will be able to: o List the five core elements of a data center infrastructure
o Describe the requirements of storage systems for optimally supporting business activities
o Explain the importance of Information Lifecycle Management
Server/ OS Client
LAN
FC SAN
Manageability
Performance Scalability
Capacity
Protect
Process order
Deliver order
Warranty claim
Time
Fulfilled order
Aged data
Warranty Voided
Create
Access
Migrate
Archive
Dispose
A proactive strategy that enables an IT organization to effectively manage the data throughout its lifecycle
2009 EMC Corporation. All rights reserved.
o Policy-based
o Heterogeneous o Optimized
AUTOMATED
Classify data / applications based on business rules
Implement policies with information management tools Integrated management of storage environment Organize storage resources to align with data classes
FLEXIBLE
o Simplified management
o Processes, tools and automation
o Maintaining compliance
o Knowledge of what data needs to be protected for what length of time
Lesson Summary
Key points covered in this lesson: o The five core elements of a Data Center infrastructure
o Key requirements of storage systems to support business activities, as well as some of the constraints
o ILM strategy
o Importance o Characteristics o Activities in developing ILM strategy o IML implementation o Benefits of ILM
Chapter Summary
Key points covered in this chapter: o Importance of data, information, and storage infrastructure
o Types of data, its value, and key management requirements of a storage system
o Evolution of storage architectures o Core elements of a data center o Importance of the ILM strategy
ILM Video
2.2 MB
Document 1 MB
2.2 MB
Original Document + E-mail Text Local E-mail Copy E-mail Server Desktop Backup Redundant Server Tape Archive Copies (4) E-mail Local Copies Server Copies Server Backup Tape Archive
MB 1.0 0.1 1.1 1.1 1.0 2.1 4.2 9.5 4.4 4.4 4.4 8.8 22.0
2.2 MB
8.8 MB
Tape Back-up
Source: IDC White Paper, "The Diverse and Exploding Digital Universe," Sponsored by EMC, March 2008
2009 EMC Corporation. All rights reserved.
Before taking the online Test Input your First & Last Name, with the Email address Add Badge Number as EAA Partner Registration Id (same id used to register on EAA Portal) Choose Primary Functional Area as Others & Country as India
Year 2001
The data generated was the equivalent of one stack of books reaching 1/5 of the way towards the sun
Year 2007
The amount of digital information created equaled 21 stacks of books
implications for IT
IDC 2007 & 2008 Study on Digital Universe
( Study available on http://www.emc.com/digitaluniverse )
Source: IDC Digital Universe White Paper, Sponsored by EMC, May 2009
2009 EMC Corporation. All rights reserved.
3,892,179,868,480,350,000,000
3 sextillion, 892 quintillion, 179 quadrillion, 868 trillion, 480 billion, 350 million Approx : 486 exabytes, or 486 billion gigabytes
3,892,179,868,480,350,000,000
Equivalent to : 237 billion fully-loaded Amazon Kindle wireless reading devices 4.8 quadrillion online bank transactions 3 quadrillion Twitter feeds 162 trillion digital photos 30 billion fully-loaded Apple iPod Touches
1,500
1,000
500
DVD RFID Digital TV MP3 players Digital cameras Camera phones, VoIP Medical imaging, Laptops, Data center applications, Games 486 Exabytes Satellite images, GPS, ATMs, Scanners Sensors, Digital radio, DLP theaters, Telematics Peer-to-peer, Email, Instant messaging, Videoconferencing, CAD/CAM, Toys, Industrial machines, Security systems, Appliances
2,502
Exabytes
-FOLD
Growth in
YEARS
0 2008
2009
2010
2011
2012
Source: IDC Digital Universe White Paper, Sponsored by EMC, May 2009
2009 EMC Corporation. All rights reserved.
70%
Source: IDC Digital Universe White Paper, Sponsored by EMC, May 2009
2009 EMC Corporation. All rights reserved.
85%
70%
Will be the responsibility of organizations to ensure informations security, privacy, reliability, and compliance
Source: IDC Digital Universe White Paper, Sponsored by EMC, May 2009
2009 EMC Corporation. All rights reserved.
Typical IT Environment
Web server
Exchange servers
LAN
CRM server
App server
SQL server
Tape backup
Web server
Data Everywhere
Exchange servers
Data Everywhere
LAN
CRM server
server
SQL server
Tape backup
Web server
Exchange servers
LAN
Multiple Backup
CRM server
App server
Multiple Backup Hard to Manage
SQL server
Tape backup
Low Utilization
Difficult to build DR
User Identification
Web server
Automating workflow
Exchange servers
How to Archive
LAN
Unprotected Tape
CRM server
How to handle paper
SQL server
Business Intelligence
Tape backup
Web server
Exchange servers
LAN IP/iSCSI ERP server App server LAN backup FC SQL server SAN IP iSCSI
Tape backup
Unified Storage
Web server
Exchange servers
LAN FC ERP server App server Consolidated backup SQL server SAN IP iSCSI
Web server
Exchange servers
SQL server
Web server
Exchange servers
Tiered Storage
Web server
Exchange servers
LAN
Web Content
Unstructured files
Email Transaction
ERP server
Report Data
SQL server
ECM server
VMware Environment
VMware Environment
Users
ERP Server App server
Web server Exchange Server SQL server
Archive
#1 IT company
http://education.EMC.com