veritas confidential veritas storage foundation for networks 2004-08-02 mike dutch

50
VERITAS Confidential VERITAS Storage Foundation VERITAS Storage Foundation for Networks for Networks 2004-08-02 2004-08-02 Mike Dutch Mike Dutch

Upload: sheena-gregory

Post on 01-Jan-2016

220 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Storage FoundationVERITAS Storage Foundation for Networks for Networks

2004-08-022004-08-02

Mike DutchMike Dutch

Page 2: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

2

Storage Foundation for Oracle RAC

Storage Foundation for Databases

VERITAS Storage Foundation

File System Volume Manager

Storage Foundation

Storage Foundation for Networks

Page 3: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

3

What is VSFN?

• A network-based disk controller– Advantages of in-band and out-of-band virtualization– Leverages stability of proven virtualization technology

• Complements host-based volume management– Host focus on applications and installation policies– Network focus on decoupling and offloading– Storage focus on device optimization

• Part of storage foundation for utility computing

Page 4: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

4

What problems does VSFN solve?

• Freedom to choose disk storage hardware– Decouple technology for better business alignment– Customer is in stronger position to negotiate price

• Leverage current storage resources and skills– Single tool to centrally manage multi-vendor storage– Separate administration of servers and storage– Reduce or delay capital expenses

• Increase utilization by pooling storage across hosts • Increase utilization by not dedicating storage for snapshots• Reduce scheduling conflicts by sharing physical devices• Enable use of legacy/JBOD storage for more applications

Page 5: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

5

Software resides in MDS supervisors and operates in Advanced Services Modules

MDS 9500

SAN

Servers

Disk Arrays JBOD

Storage

Sample VSFN Configuration

Administrator Interface

Management Server

LAN

Page 6: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

6

Fibre Channel Switching Modules (16 or 32 ports) IP Storage Services Module (4/8 GbE ports)Advanced Services Module (32 ports)

Cisco MDS 9000 Family ModulesCisco MDS 9000 Family Modules

Cisco MDS 9506/9509 Multilayer Directors Cisco MDS 9216Cisco MDS 9216

Multilayer Fabric SwitchMultilayer Fabric Switch

• Supervisor + 16 ports built-in

• 0 or 1 module

• 16 to 48 ports

Storage network hardware

• Dual Supervisors

• 1 to 4/7 modules

• 16 to 128/224 ports 9500 Supervisor9500 SupervisorModuleModule

Caching ServicesCaching Services Module (no ports) Module (no ports)

Page 7: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

7

Cisco MDS 9509 Multilayer Director

Two Power supplies

8-port IP Storage Services Module

Two Advanced Services Modules(VSFN operates within each ASM)

Two Supervisor Modules

Two 16-port FC Switching Modules

Two 32-port FC Switching Modules

Page 8: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

8

Distributed processing

. . .

. . .

Imported

Bound

LUN 0

VE

Disk Group

1 2

Binding virtual targets to physical ASM ports tells the fabric which DPP will respond to VT requests.

In all cases, non-I/O requests aresent to the VS that imported the DG

If the HBA is attached to an ASM, the data is sent directly to the physical disks after “strategizing” with the VLUN Owner. Otherwise, the data is sent to the VO.

Each port is associated with a Data Path Processor (DPP)

Each ASM also contains a Control Plane Processor (CPP)

Bound

VSVO xP xP

Page 9: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

9

Data path

Host

DPP0Host (VEP)N-Port

DPP0Disk AccessN-PortVO Disk0 Disk1

Time

VLUN I/OStrategy

VLUN I/OStrategy

Disk I/OStrategie

s

Disk I/OStrategie

s

Disk I/OsDone

Disk I/OsDone

VLUN I/ODone

VLUN I/ODone

Write

Transfer Ready

Data Transfer

Status

Page 10: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

10

Key features of VSFN

• Centrally manage multi-vendor storage poolsto improve productivity and media utilization

• Simplify networked storage management with flexible and granular LUN configuration

• Optimize device sharing by virtualizing enclosures, ports, storage, and command sets

• Improve application availability via network-based dynamic multipathing, copy services, and non-disruptive intelligent switch failover

Page 11: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

11

Key opportunities

• Mergers and acquisitions– VSFN helps merge disparate infrastructures

• Cut the enterprise array tax– e.g., SRDF/TimeFinder licenses and dedicated BCVs– Meta LUN performance penalty

• Ongoing IT consolidation – VSFN enables transparent device migration

• Datacenter infrastructure servers– VSFN supports Windows without host software

Page 12: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

12

Where to Do Virtualization?

Storage Array Intelligent Switch Server

EVERYWHERE

Performance Intensive I/O Operations

Application Integration

Page 13: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

13

Why virtualize at multiple levels?

Optimize applications

Offload / decouple

Servers

Network

Optimize physical device

Storage

BreaksFixed capacityBounded performance

UnbreakableScalableAdaptable

Virtual

Physical

Page 14: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

14

Network

Storage virtualization

Mid-range

JBOD

Storage

Server

Page 15: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

15

Foundation for utility computing

. . .

. . .

HO

ST

HO

ST

NE

TW

OR

KN

ET

WO

RK

ST

OR

AG

ES

TO

RA

GE

• Support for DAS and SANSupport for DAS and SAN• Database & file system integrationDatabase & file system integration• Online storage provisioningOnline storage provisioning• Server-based dynamic multipathing Server-based dynamic multipathing • OS and enclosure-based namingOS and enclosure-based naming• Data mobility (PDC, …)Data mobility (PDC, …)• Service level automation (ISP, …)Service level automation (ISP, …)

• Commodity storage (JBOD/RAID)Commodity storage (JBOD/RAID)• CachingCaching• Vendor LUN configurationVendor LUN configuration• Array-specific copy servicesArray-specific copy services

• Virtual enclosures, targets, LUNsVirtual enclosures, targets, LUNs• Network-based RAID (0, 1, 0+1, 1+0)Network-based RAID (0, 1, 0+1, 1+0)• Network-based copy servicesNetwork-based copy services• Network dynamic multipathingNetwork dynamic multipathing• Highly available network servicesHighly available network services

. . .

Co

nso

lidat

ed M

anag

emen

t

Page 16: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

16

Common questions

• Why virtualize resources?• How does this help create a storage utility? • Don’t “exotic” switches cost more than servers?• Why do I need VSF if I already have VSFN?• Why do I need VSFN if I already have VSF?• Why virtualize in more than one place?• Why change VM for storage networks?

Page 17: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

17

Reduce costs

• Pool heterogeneous storage for flexible provisioning to heterogeneous servers

• Tier storage to align storage service levels with business objectives

• Leverage storage management skills across heterogeneous server and storage platforms

• Manage complexity while providing quality storage services in an affordable, manageable, and secure manner

Page 18: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

18

Increase revenues and profits

• Eliminate single points of failure to increase availability of revenue generating activities

• Insulate applications from disruptive storage events and the impact of errors or misdeeds

• Offload data intensive operations to the network, freeing application servers to provide more transactions and performance

• Increase the timeliness and marketability of information by frequently refreshing business intelligence data without restricting the IT architecture to specific storage platforms

Page 19: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

19

Complement strategic initiatives

• Enhance data protection with tiered storage and more affordable copy services

• Champion regulatory compliance directives with enhanced networked storage security and centralized control of corporate assets

• Encourage the rapid integration of disparate infrastructures after mergers and acquisitions

• Automate flexible data center wide storage management policies

Page 20: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

20

LUN Mapping

Virtual Targets

VLUN

Virtual Enclosure

DMP

DMP

Eliminate single points of failure

Access a virtual LUN from:• Multiple servers• Multiple HBA ports• Multiple virtual targets• Multiple virtual fabrics

Mirror a virtual LUN across:• Multiple enclosures• Multiple ports/enclosure

Service groups allow transparent recovery from network failures

Page 21: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

21

Service groups

• Automatic failover– ASM or software (VEC/VES/VSHA/vxconfigd) failures– ASM rebooted– All disk groups contained in service group disabled

• Data in a disabled disk group is unavailable• 99% of the time a disk group is disabled due to disk failure• Disk group is enabled when imported (reads private regions)

• Manual failover– Concurrent maintenance– Customer-initiated

Page 22: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

22

9i Real Application Cluster

Shared Virtual LUNwith SCSI-3 PGRShared Virtual LUNwith SCSI-3 PGR

Physical arrays/JBODwithout SCSI-3 PGR

Storage Foundation for Networks

HDS 7700E Unisys ESM700

Example: run RAC on legacy disk

Page 23: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

23

Example: off-host copy services

GOLD QoSS SILVER QoSSSnapshot

Resynch

OLTP BI Backup

Replication

Recovery Site

Page 24: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

24

Deployment guidelines• VSF and VSFN

– Most large heterogeneous environments

• VSF only– Single host– Multiple hosts access a single storage array– Host does not access storage over a storage network– Small configurations where storage management is not complex– VSFN not supported on storage network platform– Do not want to install and manage intelligent storage networks– Want to wait for intelligent storage networks to mature

• VSFN only– VSF not supported on OS platform

• old releases, unsupported platforms, NAS gateways• Still need to qualify configuration from a support perspective

– Do not want to install and manage VSF on host• Affinity to competitive host software• Service provider not allowed to touch client hosts• Flexible LUN management meets customer requirements

Page 25: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

25

Common management (GCS) capabilities

• Virtualization can be managed in a common way across heterogeneous servers and networks (and disks with xVM)

• Integrates with CommandCentral enterprise resource management

• Manage data center-wide policies(as opposed to single host policies)

• “Set and forget” physical device management

Page 26: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

26

VSF capabilities• Pool storage across multiple storage systems from multiple vendors• Tier storage to match storage capabilities with business requirements• Provide visibility into how application storage maps to physical device• Database and file system integration• Application-coordinated copy services • Host-based dynamic multipathing (virtual I/O path from the server)• Support for DAS (internal/external) and SAN• Online storage provisioning• Optimize use of resources (striping, re-size, re-layout, hot spot detection)• Online media protection (mirroring, hot sparing, hot relocation)• OS and enclosure-based volume naming• Data mobility

– Volume Replicator– Portable Data Containers

• Service level automation– Relocation policies (Quality of Storage Service)– Intelligent Storage Provisioning

Page 27: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

27

Capabilities added by host SAN-VM

• Offload configuration tasks from application hosts to management servers (separate management path from data and control paths)

• Increase media utilization by letting volumes from multiple hosts aggregate blocks ("use") the disks in the same disk group

• Offload data movement from application hosts (the VCs) to another server (the VSs or XCOPY engine or VSFN)

• Minimize application host upgrades (since features can be upgraded on VS rather than all the VCs that use the features

Page 28: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

28

SAN-VM technology

VolumeVolume

Disk GroupDisk Group

Volume

Storage Foundation Storage Foundation with SAN-VM

ManageAccess

ApplicationHost

Access

ApplicationHost

Access

ApplicationHost

Manage

ManagementHost

Page 29: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

29

VSFN capabilities• Common point between network-attached servers and storage• Simultaneous support for heterogeneous servers and storage• No hardware agenda• Create virtual devices (fabrics, enclosures, ports, logical units, SCSI command set) for

interoperability and leveraging current hardware• Common implementation of SCSI used by applications • Simulate errors for testing and audit readiness purposes• Create virtual devices to allow parallel use of physical resources• Insulate server administration from storage administration (enhanced security)• Free the application server from data intensive operations• Eliminating single points of failure (including service groups for transparent switch

failover)• Network-based RAID (0, 1, 0+1, 1+0) for availability and performance• Network-based dynamic multipathing • Flexible LUN configuration performed by administrator rather than the vendor• Integrated SAN Management• In the future: SAN file system

Page 30: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

30

Storage management software market

Storage Software Segment 2001 2002 2003 2004 2005 2006 2007

Replication 939.8 1,141.4 1,039.3 1,124.9 1,118.0 1,212.6 1,366.4

Core Storage Management/VM 976.3 1,025.7 864.3 886.2 907.6 954.8 1,029.2

Backup/Recovery/ Media Mgmt 1,971.1 1,763.9 1,590.9 1,655.0 1,583.0 1,613.8 1,634.9

HSM and Archiving 275.0 203.2 199.9 233.8 309.0 365.1 437.2

Device Resource Management 452.8 559.9 641.5 600.1 741.4 785.6 831.3

Storage Resource Management 218.7 230.9 305.2 508.8 466.6 577.0 708.4

Worldwide Revenue ($M) 4,833.7 4,925.0 4,641.1 5,008.8 5,125.6 5,508.9 6,007.4

Enterprise SRM

2002-2007 CAGR = 7.6% 2002-2007 CAGR = 4.1% 2002-2007 CAGR = 12.8%

Source: Gartner Dataquest April 2003 (Report #114628)April 2004 (Report #120422)

22.1%40.2%2003 Market Share:

Data Management

37.7%

Storage Infrastructure

Distributed Systems: 81.7%, Mainframe: 18.3%

Page 31: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

31

VSFN Routes To Market

MDS

MDS

AT

P P

artn

er/V

AR

/SI

EN

D U

SE

R

CIS

CO

Dis

trib

uto

r

OS

M

MDS

MDS

VSFN

(Support)

MDS/ASM

SmartNet

MDS, ASM, VSFN

(Support)

MDS/ASM

SmartNet

VE

RIT

AS

VSFN

(Support)

VSFN

(Support)

VSFN

(Support)

Page 32: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

32

Focus customers

Allianz

Banca Intesa BCI

Deutsche Bank

Downey Savings

Fairbanks Capital

HSBC

Lehman Brothers

Morgan Stanley

National Australian Bank

NYFIX

UBS

Bell Canada

Bell South

Partner Orange

SBC

Telcordia

Astra Zeneca

Glaxo

Novartis

Santa Clara Hospital

CGI

GVS

ITXC

T-Online

DMDC

DISA

SOCOM

Air Products

Cisco IT

Exxon

Wal-Mart

Page 33: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

33

VSFN 1.1 pricing

W SKUs for Basic Support (-000112) and Extended Support (1/2/3 years: -000212/ -000224/ -000236)

Page 34: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

34

VERITAS virtualization roadmap

2004

Storage Foundation™

1.1

2005

Storage Foundation™for Networks

4.0 4.1+

2.0

Highly available network-based virtualization

Network-based enhanced copy

services

Next generation

virtualization

Intelligent storage

management

. . .

. . .

Page 35: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

35

VSFN, Cisco roadmap

VSFN 1.0FEATURE

PATH

MAINTENANCE PATH

VSFN 1.11.1 FP1

VSFN 2.0

• RAID, sparing, relocation• Striping, re-size, re-layout• Dynamic multipathing in fabric• Split mirror snapshots• Virtual controller services• Global Configuration Services

VSFN (VERITAS)SAN-OS (Cisco)

• Service Groups

• Integrated SAN Management

• Online Help

• vxvm CLI

•Enh./Fixes

414.1481.2(1.4)

417.2031.3.1

519.3111.3.4

5xx.xxx2.0(1)

9/30/03 12/01/031.0 MP1

~110 Enh/Bug fixes

• Replication

• Instant Snapshot

• Consolidated Mgmt

• Non-disruptive migration

• Host toolkit/Stack int.

• Enhancements/Fixes

2005Internal: 11/10/03Announce: 11/24/03RTS: 2H04

• Midrange Disk Support• IPS Module qualification• Dual Fabric support• Enhancements/Fixes

1H04

Page 36: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

36

New capabilities in VSFN 1.1 FP1

IP Storage ServicesIP Storage Services Module (4/8 GbE ports) Module (4/8 GbE ports)

CX Thunder FAStT

iSCSI VLUN accessMid-range disk support

Additional Features in 1.1 FP1

• Optimize Volume Recovery

• Reduce Data Traffic Over ISL

Page 37: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

37

Intelligent switch A/P configuration

VLUN Control

Host VSAN Disk VSAN

xP

xP/VO VS/VES

Host DMP

VT2 VT3

VLUN

VLUN PLUN 1

VLUN PLUN 2

Data

Configuration

2

1

Active/Passive Disk Array

PLUN = LU in physical enclosure

VLUN = LU in virtual enclosure

Network DMP

Page 38: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

38

Dual fabric support

Page 39: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

39

Replication

SCSI SCSI SCSI

IP

Synchronous Asynchronous/Periodic Server or Network-based

Consistency Groups

Page 40: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

40

Instant snapshot

. . .

prepare

createclear

abort

reattach

Snapshot

• Split-mirror snapshots– Up to 32 mirrors / VLUN– Split after synchronization– Resynch original/replica

• Instant snapshots– Copy-on-write– Full data copy– Space-optimized

Page 41: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

41

Consolidated management

• Centrally manage all Storage Foundation products without disruption of environment

• Single point of administration – Enhanced scalability to manage large numbers of objects– Distributed and common CLI– Unified licensing model– Single sign-on support– Authorization and access control– Centralized package/patch distribution and updates

• Quick glance of data center storage environment • Single location to view all alerts and events

Page 42: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

42

Licensing changes for VSFN 2.0

• Currently license– Host ports, disk ports, fabric-level functionality– Restrict access from host ports to 32 * ASMs

• Can become issue for iSCSI hosts

– GCS1 manages a single fabric

• Proposed changes– License each ASM

• Options for RAID, Snapshot, Replication, Mobility

– GCS2 manages any number of fabrics– GCS2 manages all Storage Foundation products

Page 43: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

43

Non-disruptive migration

• Volume encapsulation / tunneling– Allow storage managed by Storage Foundation to be

managed by Storage Foundation for Networks– Allow storage management by Storage Foundation for

Networks to be managed by Storage Foundation– Data remains on original physical storage device

• LUN migration– Do not move data through application server– Data moved to a different physical storage device

Page 44: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

44

Host toolkit

• SAN management host agents

• Host dynamic multipathing for VLUNs

• VSS/VDS providers (Windows)

• Transparent and secure CLI for snapshots

Page 45: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

45

Host stack integration

• CommandCentral integration– CC 4.1 ships GCS2 Web GUI (for VxVM only)

• Storage Foundation– quiesce/resume support for VLUN snapshots– storage mapping for VLUNs/VLUN snapshots – volumes on physically separate VLUNs

• NBU integration– VxFIS, VxAQ, VxMS, and VxFI infrastructure

Page 46: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

46

Enhancement examples

• Enhanced DMP load balancing algorithms– Balanced path (A/A)– Round-robin (A/P C)– Single Active (A/P)– Minimum queue length (JBOD)– Priority-Based (customer policy)– Adaptive Priority (varying I/O loads)

• Enhance compatibility– Broaden qualified server environments– Broaden qualified storage devices– Support for evolving standards (SMI-S, FDMI, …)

• Bug fixes• Template-based allocation

Page 47: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

47

VSFN, Cisco Futures

• Fabric Application Interface Standard (FAIS)• Active/Active ASM HA• File Services• Temporal volumes (any point-in-time access)• Ongoing improvements and tighter integration

Page 48: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

48

VSFN, Brocade roadmap

VSFN 2.0 VSFN 2.1+

2005

Brocade SilkWorm AP7420Fabric Application Platform

Brocade SilkWorm 24000with Fabric Application blades

All VSFN platforms plan same content

(as hardware permits)

Page 49: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

49

VERITAS Storage Foundation™ for Networks, Brocade

Management Server

Redundant components for High Availability

ApplicationServers

Tiered Storage

Brocade SilkWorm AP7420Fabric Application Platform

VSFN

Future: 24000Fabric Application

Blade

Volume Server and GCS may be shared with VSF

Page 50: VERITAS Confidential VERITAS Storage Foundation  for Networks 2004-08-02 Mike Dutch

VERITAS Confidential

VERITAS Confidential and Proprietary Information

50

Why VERITAS?

• Market leadership in open systems software• Heterogeneous - No Hardware Agenda• Committed to utility computing