- Page 1 and 2: STRATEGIESFOR DATAPROTECTIONFIRST E
- Page 3: This book is dedicated to the memor
- Page 7 and 8: ContentsIntroduction ..............
- Page 9 and 10: ContentsChapter 7: Extending Data P
- Page 11 and 12: FiguresFigure 1. A simplified flat
- Page 13 and 14: FiguresFigure 49. Traces of origina
- Page 15 and 16: IntroductionData protection is an u
- Page 17 and 18: IntroductionTable 1. Block-based da
- Page 19 and 20: IntroductionAt every level, from en
- Page 21 and 22: Part OneThe following chapters are
- Page 23 and 24: Building the Foundation1Implementin
- Page 25 and 26: Storage-Centric vs. Network-Centric
- Page 27 and 28: Storage-Centric vs. Network-Centric
- Page 29 and 30: Storage-Centric vs. Network-Centric
- Page 31 and 32: Storage-Centric vs. Network-Centric
- Page 33 and 34: Storage-Centric vs. Network-Centric
- Page 35 and 36: Storage-Centric vs. Network-Centric
- Page 37 and 38: Highly Available StorageFigure 8. A
- Page 39 and 40: Highly Available Storagecharacteris
- Page 41 and 42: Highly Available StorageFigure 11,
- Page 43 and 44: Storage and Fabric ConsolidationFig
- Page 45 and 46: SAN SecuritySecuring the SAN Data T
- Page 47 and 48: SAN SecurityFigure 14. Creating sec
- Page 49 and 50: SAN Securitytained at the segment l
- Page 51 and 52: SAN SecuritySecuring Storage Data P
- Page 53 and 54: SAN SecurityiSCSI LUN MappingiSCSI
- Page 55 and 56:
Going to the Next Level: The Brocad
- Page 57 and 58:
Backup Strategies2Tape backup for d
- Page 59 and 60:
Conventional Local BackupFigure 18.
- Page 61 and 62:
Conventional Local BackupFigure 20.
- Page 63 and 64:
Conventional Local BackupSAN may re
- Page 65 and 66:
Remote BackupFigure 23. Combining d
- Page 67 and 68:
Remote BackupTape VaultingThe intro
- Page 69 and 70:
Remote BackupTape pipelining is the
- Page 71 and 72:
Disaster Recovery3Disaster Recovery
- Page 73 and 74:
Defining RTO and RPO for Each Appli
- Page 75 and 76:
Synchronous Data ReplicationSynchro
- Page 77 and 78:
Synchronous Data ReplicationDivisio
- Page 79 and 80:
Asynchronous Data Replicationshorte
- Page 81 and 82:
Asynchronous Data ReplicationBrocad
- Page 83 and 84:
Asynchronous Data ReplicationThe co
- Page 85 and 86:
Asynchronous Data Replicationidenti
- Page 87 and 88:
Asynchronous Data ReplicationFigure
- Page 89 and 90:
Asynchronous Data Replicationexpedi
- Page 91 and 92:
Disaster Recovery TopologiesFigure
- Page 93 and 94:
SAN Routing for DRSAN Routing for D
- Page 95 and 96:
Continuous Data Protection4The tape
- Page 97 and 98:
Defining the Scope of CDPBecause tr
- Page 99 and 100:
True CDPFigure 41. The CDP engine m
- Page 101 and 102:
Information LifecycleManagement5The
- Page 103 and 104:
Tiered SAN ArchitecturesAlthough it
- Page 105 and 106:
Tiered SAN ArchitecturesFigure 43.
- Page 107 and 108:
Leveraging Storage VirtualizationLe
- Page 109 and 110:
Leveraging Storage VirtualizationOn
- Page 111 and 112:
Leveraging Storage VirtualizationVi
- Page 113 and 114:
Fabric-Based Storage ServicesThe Br
- Page 115 and 116:
Fabric-Based Storage ServicesBrocad
- Page 117 and 118:
Infrastructure LifecycleManagement6
- Page 119 and 120:
The Data Deletion DilemmaIf a track
- Page 121 and 122:
Physical Destruction of Storage Ass
- Page 123 and 124:
Extending Data Protectionto Remote
- Page 125 and 126:
The Proliferation of Distributed Da
- Page 127 and 128:
Centralizing Remote Data AssetsEven
- Page 129 and 130:
Centralizing Remote Data Assetsrequ
- Page 131 and 132:
Centralizing Remote Data AssetsFigu
- Page 133 and 134:
Part TwoThe following chapters are
- Page 135 and 136:
Foundation Products8This chapter pr
- Page 137 and 138:
Brocade DCX BackboneTable 4. Brocad
- Page 139 and 140:
Brocade 48000 DirectorBrocade 48000
- Page 141 and 142:
Brocade Mi10K DirectorBrocade Mi10K
- Page 143 and 144:
Brocade FC4-16IP iSCSI BladeBrocade
- Page 145 and 146:
Brocade 5300 SwitchBrocade 5300 Swi
- Page 147 and 148:
Brocade 300 SwitchBrocade 300 Switc
- Page 149 and 150:
Brocade Fibre Channel HBAsThe Broca
- Page 151 and 152:
Brocade SAN Health• Brocade SAN H
- Page 153 and 154:
Distance Products9Brocade has a num
- Page 155 and 156:
Brocade Edge M3000Brocade Edge M300
- Page 157 and 158:
Backup and DataProtection Products1
- Page 159 and 160:
Brocade Data Migration Manager Solu
- Page 161 and 162:
EMC RecoverPoint SolutionFigure 72.
- Page 163 and 164:
Branch Office and FileManagement Pr
- Page 165 and 166:
Brocade StorageXBrocade StorageXBro
- Page 167 and 168:
Brocade File InsightFigure 74. Over
- Page 169 and 170:
Advanced Fabric Servicesand Softwar
- Page 171 and 172:
Brocade Fabric OS• Measuring ISL
- Page 173 and 174:
Brocade Fabric OSIn addition, it is
- Page 175 and 176:
Brocade Fabric OSBrocade Extended F
- Page 177 and 178:
Brocade Enterprise Fabric Connectiv
- Page 179 and 180:
Brocade Fabric ManagerFigure 77. Br
- Page 181 and 182:
Brocade Web Toolsprocedures protect
- Page 183 and 184:
Solutions Products13In late 2007, B
- Page 185 and 186:
Brocade Virtual Tape Library Soluti
- Page 187 and 188:
The Storage NetworkingIndustry Asso
- Page 189 and 190:
Executive Director and Staffthe boa
- Page 191 and 192:
Technical Work Groupsticipation is
- Page 193 and 194:
Regional AffiliatesSNIA Storage Sec