12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Storage-Centric vs. Network-Centric SAN ArchitecturesWhich solution is better depends on the projected growth in both storagecapacity and server attachment, as well as availability needs.Un<strong>for</strong>tunately, some customers have inherited complex meshed SANtopologies due to the spontaneous acquisition of switches to satisfygrowing port requirements. At some point, fabric consolidation may berequired to simplify cabling and management and to provide stability<strong>for</strong> storage operations. Without a solid foundation of a well-designedmanaged unit of SAN, higher-level data protection solutions are alwaysat risk.A managed unit of SAN can also be characterized by its intended functionality;and functionality, in turn, can drive a specific SAN topology. Ahigh-availability SAN, <strong>for</strong> example, requires redundancy in switch elementsand pathing, as well as management tools to monitor anden<strong>for</strong>ce continuous operation. However, a SAN designed <strong>for</strong> secondtierapplications may not justify full redundancy and be adequatelysupported on a more streamlined topology. In addition, a SANdesigned specifically <strong>for</strong> tape backup has very different requirementscompared to a production SAN. Tape is characterized by large block,bandwidth-intensive transactions, while production disk access is typicallydistinguished by small block and I/O-intensive transactions.Because tape operations consume bandwidth <strong>for</strong> extended periods oftime and are sensitive to fabric events, customers can implement twoseparate SANs or leverage Virtual Fabrics to isolate production diskaccess from backup operations. As a separate tape SAN, a flat SANtopology that avoids potential ISL oversubscription is recommended.An optimized SAN topology can also be affected by the server technologyused to host applications. Blade servers and blade SAN switches,in particular, can adversely impact the consumption of switchaddresses, or Domain IDs, and limit the total number of switchesallowable in a SAN unit. A new standard <strong>for</strong> N_Port ID Virtualization(NPIV) has been created to address this problem. An NPIV-enabledgateway presents logical hosts to the SAN and thus eliminates theaddition of another switch element, Domain ID assignment, andinteroperability or switch management issue. <strong>Brocade</strong> Access Gateway,<strong>for</strong> example, leverages NPIV to bring blade servers into the SANwithout requiring administrative overhead to monitor Domain ID usageand potential interoperability conflicts. As long as the edge SANswitches are NPIV aware, larger populations of blade servers can beaccommodated without limiting the scalability of the SAN topology.<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong> 15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!