12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

FiguresFigure 49. Traces of original data remain even if the specificsector has been erased or overwritten .............................................................99Figure 50. Remote office processing compounds the growth ofremote servers and storage and data vulnerability ...................................... 104Figure 51. Decentralization of data storage has inherent cost anddata protection issues ..................................................................................... 105Figure 52. Centralized file access replaces remote server and storageassets with appliances optimized <strong>for</strong> high-per<strong>for</strong>mance file serving ........... 109Figure 53. <strong>Brocade</strong> StorageX provides a global namespace to virtualizefile access across heterogeneous OSs and back-end storage elements .... 111Figure 54. <strong>Brocade</strong> File Management Engine components andarchitecture ...................................................................................................... 112Figure 55. <strong>Brocade</strong> DCX Backbone with all slots populated (no door) ....... 116Figure 56. <strong>Brocade</strong> 48000 Director with all slots populated ...................... 119Figure 57. <strong>Brocade</strong> Mi10K Director .............................................................. 121Figure 58. <strong>Brocade</strong> M6140 Director ............................................................. 122Figure 59. FC4-16IP iSCSI Blade ................................................................... 123Figure 60. <strong>Brocade</strong> 5300 Switch .................................................................. 125Figure 61. <strong>Brocade</strong> 5100 Switch .................................................................. 126Figure 62. <strong>Brocade</strong> 300 Switch ..................................................................... 127Figure 63. <strong>Brocade</strong> 825 FC 8 Gbit/sec HBA (dual ports shown) ................ 128Figure 64. <strong>Brocade</strong> 415 FC 4 Gbit/sec HBA (single port shown) ................ 129Figure 65. SAN Health topology display ........................................................ 130Figure 66. SAN Health reporting screen ....................................................... 132Figure 67. <strong>Brocade</strong> 7500 Extension Switch ................................................. 133Figure 68. FR4-18i Extension Blade ............................................................. 134Figure 69. <strong>Brocade</strong> Edge M3000 .................................................................. 135Figure 70. <strong>Brocade</strong> USD-X, 12-slot and 6-slot versions ............................... 136Figure 71. <strong>Brocade</strong> FA4-18 ............................................................................ 137Figure 72. EMC RecoverPoint on <strong>Brocade</strong> scenario .................................... 141Figure 73. <strong>Brocade</strong> File Management Engine (FME) ................................... 143Figure 74. Overview of <strong>Brocade</strong> File Insight ................................................. 147Figure 75. Access Gateway on blades and the <strong>Brocade</strong> 300 Switch ......... 152Figure 76. <strong>Brocade</strong> EFCM interface .............................................................. 157Figure 77. <strong>Brocade</strong> Fabric Manager displays a topology-centricview of SAN environments .............................................................................. 159Figure 78. <strong>Brocade</strong> Web Tools Switch Explorer View of the<strong>Brocade</strong> 48000 Director ................................................................................. 161Figure 79. Storage Networking Industry Association organizationalstructure ........................................................................................................... 168<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong>xiii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!