12.07.2015 Views

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

Strategies for Data Protection - Brocade

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Highly Available StorageFigure 11, alternate pathing can be configured as Fabrics A and B,which provide each server with a primary and secondary path to storageassets.Figure 11. Providing alternate paths from servers to storageIn this example, the failure of a storage port on the array or any link orport through Fabric A would still allow access through Fabric B. Withboth sides active in normal operation, though, each individual serversees two separate images of the same storage target: one from the Aside and one from the B side. A mechanism is there<strong>for</strong>e required toreconcile this side effect of dual pathing and present a single image ofstorage to the initiator. Typically, this reconciliation is per<strong>for</strong>med by adevice driver installed on the host. The driver may include the additionalability to load balance between alternate paths to maximizeutilization of all fabric connectivity.<strong>Strategies</strong> <strong>for</strong> <strong>Data</strong> <strong>Protection</strong> 21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!