12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Storage-Centric vs. Network-Centric SAN Architecturesbunch of disks) alike. Consequently, even medium-sized SANs withvarying server requirements and classes of storage are better servedby a more hierarchical core-edge SAN design.Mesh SAN TopologiesIn conventional local area networks (LANs) and wide area networks(WANs), the network is composed of multiple switches and routerswired in a mesh topology. With multiple links connecting groups ofswitches and routers and routing protocols to determine optimumpaths through the network, the network can withstand an outage of anindividual link or switch and still deliver data from source to destination.This network-centric approach assumes that all connected enddevices are peers and that the role of the network is simply to provideany-to-any connectivity between peer devices.Figure 3. A mesh SAN topology with redundant pathing<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong> 7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!