SlideShare uma empresa Scribd logo
1 de 23
© 2009 EMC Corporation. All rights reserved.
EMC Proven Professional
The #1 Certification Program in the information storage
and management industry
Content Addressed Storage
Chapter 9
Section 2 : Storage Networking Technologies and Virtualization
© 2009 EMC Corporation. All rights reserved.
Chapter Objectives
Upon completion of this chapter, you will be able to:
o Describe CAS, fixed content and archives, traditional storage
solutions for archive
o Describe the features and benefits of a CAS based storage
strategy
o List the physical and logical elements of CAS
o Describe the storage and retrieval process for CAS data objects
o Describe the best suited operational environments for CAS
solutions
© 2009 EMC Corporation. All rights reserved.
Lesson: CAS Overview
Upon completion of this lesson, you be able to:
o Define fixed content
o Describe traditional archival solutions and its shortcoming
o Define Content Addressed Storage (CAS)
o List benefits of CAS
© 2009 EMC Corporation. All rights reserved.
What are Fixed Content and Archives
Electronic Documents
•Contracts, claims, etc.
•E-mail and attachments
•Financial spread sheets
•CAD/CAM designs
•Presentations
Digital Records
•Documents
– Checks, securities trades
– Historical preservation
•Photographs
– Personal / professional
•Surveys
– Seismic, astronomic,
geographic
Digital Assets Retained For Active Reference And Value
Leverage
Historical Value
Improve
Service Levels
Generate
New Revenues
Rich Media
•Medical
– X-rays, MRIs, CTI
•Video
– News / media, movies
– Security surveillance
•Audio
– Voicemail
– Radio
© 2009 EMC Corporation. All rights reserved.
Challenges of Storing Fixed Content
o Fixed content is growing at more than 90% annually
o Significant amount of newly created information falls into this category
o New regulations require retention and data protection
o Often, long-term preservation is required (years-decades)
o Simultaneous multi-user online access is preferable to offline
storage
o Need faster access to fixed content
o Need for location independent data, enabling technology
refresh and migration
o Traditional storage methods are inadequate
© 2009 EMC Corporation. All rights reserved.
Traditional storage solutions for Archive
o Three categories of archival solution are:
o Online, nearline, and offline based on the means of access
o Traditional archival solution were offline
o Traditional archival process used optical disks and tapes as media for
archival
o An archive is often stored on a Write Once Read Many (WORM) device,
such as a CD-ROM
© 2009 EMC Corporation. All rights reserved.
Shortcomings of Traditional Archiving Solutions
o Tape is slow, and standards are always changing
o Optical is expensive, and requires vast amounts of media
o Recovering files from tape and optical is often time consuming
o Data on tape and optical is subject to media degradation
o Both solution require sophisticated media management
CAS has emerged as an alternative to traditional
archiving solutions
© 2009 EMC Corporation. All rights reserved.
What is Content Addressed Storage (CAS)
o Object-oriented, location-independent approach to data
storage
o Repository for the “Objects”
o Access mechanism to interface with repository
o Globally unique identifiers provide access to objects
© 2009 EMC Corporation. All rights reserved.
Benefits of CAS
o Content authenticity
o Content integrity
o Location independence
o Single-instance storage (SiS)
o Retention enforcement
o Record-level protection and disposition
o Technology independence
o Fast record retrieval
Additional Task
Research on role of CAS in ILM
Strategy
© 2009 EMC Corporation. All rights reserved.
Lesson Summary
Key points covered in this lesson:
o CAS Definition
o Challenges of Storing Fixed Content
o Shortcomings of Traditional Archiving Solutions
o Benefits of CAS
© 2009 EMC Corporation. All rights reserved.
Lesson: CAS Architecture
Upon completion of this lesson, you will be able to:
o Describe CAS architecture
o Describe Physical and logical elements of CAS
o Describe data storage and retrieval process in CAS
environment
o CAS examples
© 2009 EMC Corporation. All rights reserved.
Physical Elements of CAS
o Storage devices (CAS Based)
o Storage node
o Access node
o Servers (to which storage devices
get connected)
o Client
Server
Private
LAN
Storage
Nodes
Access
Nodes
CAS System
IP
API
© 2009 EMC Corporation. All rights reserved.
CAS Terminology
o Application Programming Interface (API)
o A set of function calls that enables communication
between applications or between an application and
an operating system
o BLOB (Binary Large Object)
o The actual data without the descriptive information
(metadata)
o The Distinct Bit Sequence (DBS) of user data
represents the actual content of a file and is
independent of the filename and physical location
API
© 2009 EMC Corporation. All rights reserved.
CAS Terminology (Cont)
o C-Clip
o A package containing the user's data and associated
metadata
o C-Clip ID (C-Clip handle or C-Clip reference) is the CA that
the system returns to the client application
o Content Address (CA)
o An identifier that uniquely addresses the content of a file
and not its location. Unlike location-based addresses,
content addresses are inherently stable and, once
calculated, they never change and always refer to the same
content
o C-Clip Descriptor File (CDF)
o The additional XML file that the system creates when
making a C-Clip. This file includes the content addresses for
all referenced BLOBs and associated metadata
© 2009 EMC Corporation. All rights reserved.
API
How CAS Stores a Data Object
Unique Content
Address is calculated
Client presents data
to API to be archived CAS System
Client
Application Server
CDF
C-Clip
(Object)
Object is sent
to CAS System via
CAS API over IP
© 2009 EMC Corporation. All rights reserved.
API
How CAS Stores a Data Object
Unique Content
Address is calculated
Client presents data
to API to be archived CAS System
Client
Application Server Object is sent
to CAS System via
CAS API over IP Object
CAS System validates
the Content Address
and stores the object
Acknowledgement
returned to
application
Clip ID is retained and
stored for future use
© 2009 EMC Corporation. All rights reserved.
Application Server
Client
CAS System
Object is needed by
an application
1
CAS authenticates
the request and
delivers the object
4
Application finds
Content Address of
object to be retrieved
2 Retrieval request is
sent to the CAS System via
CAS API over IP
3
How CAS Retrieves a Data Object
API
C-Clip ID
© 2009 EMC Corporation. All rights reserved.
CAS Features
o Features available with most CAS systems are:
o Integrity checking
o Data protection
o Local replication
o Remote replication
o Load balancing
o Scalability
o Self-diagnosis and repair
o Report generation and event notification
o Fault tolerance
o Through the use of redundant components and data protection schemes
o Audit trails
o Documentation of management activities, access and disposition of data
© 2009 EMC Corporation. All rights reserved.
Example 1: CAS Healthcare Solution
o Each X-ray image ranges from about 15MB to over 1GB
o Patient record is stored online for a period of 60-90 days
o Beyond 90 days patient records are archived
Data Stored
on CAS
Patient Studies
Stored locally for
Short-Term Use
(60 Days)
Hospital
CAS SystemApplication
Server
API
© 2009 EMC Corporation. All rights reserved.
Example 2: CAS Financial Solution
o Check image size is about 25KB
o Check imaging service provider may process 50–90 million
check images per month
o Checks are stored online for a period of 60 days
o Beyond 60 days data is archived
Bank
CAS SystemApplication Server
API
© 2009 EMC Corporation. All rights reserved.
Lesson Summary
Key points covered in this lesson:
o CAS architecture
o Physical and logical elements of CAS
o CAS storage and retrieval process
o CAS solution examples
© 2009 EMC Corporation. All rights reserved.
Chapter Summary
Key points covered in this chapter:
o Benefits of CAS based storage strategy
o Overview of physical and logical elements of CAS
o Storing and retrieving data from CAS
o CAS application examples
© 2009 EMC Corporation. All rights reserved.
#1 IT
company
For more information visit http://education.EMC.com

Mais conteúdo relacionado

Mais procurados

Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Meghaj Mallick
 
Homogeneous ddbms
Homogeneous ddbmsHomogeneous ddbms
Homogeneous ddbmsPooja Dixit
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Gyanmanjari Institute Of Technology
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And AuthenticationSudeb Das
 
IT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureIT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureMadhu Amarnath
 
Data link layer
Data link layerData link layer
Data link layersbkbca
 
Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and AdministratorA. S. M. Shafi
 
Swap-space Management
Swap-space ManagementSwap-space Management
Swap-space ManagementAgnas Jasmine
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed databaseSonia Panesar
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxSaqibAhmedKhan4
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distributionRiya Choudhary
 

Mais procurados (20)

Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.Concurrency Control in Distributed Database.
Concurrency Control in Distributed Database.
 
Homogeneous ddbms
Homogeneous ddbmsHomogeneous ddbms
Homogeneous ddbms
 
CNS - Chapter1
CNS - Chapter1CNS - Chapter1
CNS - Chapter1
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Database Security
Database SecurityDatabase Security
Database Security
 
Distributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query ProcessingDistributed DBMS - Unit 6 - Query Processing
Distributed DBMS - Unit 6 - Query Processing
 
Distributed DBMS - Unit 1 - Introduction
Distributed DBMS - Unit 1 - IntroductionDistributed DBMS - Unit 1 - Introduction
Distributed DBMS - Unit 1 - Introduction
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Database Security And Authentication
Database Security And AuthenticationDatabase Security And Authentication
Database Security And Authentication
 
IT6801-Service Oriented Architecture
IT6801-Service Oriented ArchitectureIT6801-Service Oriented Architecture
IT6801-Service Oriented Architecture
 
Data link layer
Data link layerData link layer
Data link layer
 
Database User and Administrator
Database User and AdministratorDatabase User and Administrator
Database User and Administrator
 
Swap-space Management
Swap-space ManagementSwap-space Management
Swap-space Management
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed database
 
Database Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptxDatabase Security, Threats & Countermeasures.pptx
Database Security, Threats & Countermeasures.pptx
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
DBMS - RAID
DBMS - RAIDDBMS - RAID
DBMS - RAID
 

Semelhante a Chapter 9

Presentation atmos architecture overview
Presentation   atmos architecture overviewPresentation   atmos architecture overview
Presentation atmos architecture overviewxKinAnx
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfTony Pearson
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksVaidas Brundza
 
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 IDT Replaces On-Premises Appliances with Primary Backup on AWS IDT Replaces On-Premises Appliances with Primary Backup on AWS
IDT Replaces On-Premises Appliances with Primary Backup on AWSAmazon Web Services
 
Se training storage grid webscale technical overview
Se training   storage grid webscale technical overviewSe training   storage grid webscale technical overview
Se training storage grid webscale technical overviewsolarisyougood
 
Oracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle CloudOracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle Cloudpasalapudi
 
Oracle Cloud Infraestructure Update
Oracle Cloud Infraestructure UpdateOracle Cloud Infraestructure Update
Oracle Cloud Infraestructure UpdateRaphaelCampelo
 
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018Snowy Chen
 
Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)Simeon Warner
 
S016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dS016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dTony Pearson
 
Storage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyStorage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyEMC
 
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_033020100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330glorykim
 
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_033020100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330광영 김
 
NetApp Se training storage grid webscale technical overview
NetApp Se training   storage grid webscale technical overviewNetApp Se training   storage grid webscale technical overview
NetApp Se training storage grid webscale technical overviewsolarisyougood
 
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bS104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bTony Pearson
 
S100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cS100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cTony Pearson
 
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...Amazon Web Services
 

Semelhante a Chapter 9 (20)

Presentation atmos architecture overview
Presentation   atmos architecture overviewPresentation   atmos architecture overview
Presentation atmos architecture overview
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Rapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdfRapid_Recovery-T75-v2204j.pdf
Rapid_Recovery-T75-v2204j.pdf
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area Networks
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 IDT Replaces On-Premises Appliances with Primary Backup on AWS IDT Replaces On-Premises Appliances with Primary Backup on AWS
IDT Replaces On-Premises Appliances with Primary Backup on AWS
 
Se training storage grid webscale technical overview
Se training   storage grid webscale technical overviewSe training   storage grid webscale technical overview
Se training storage grid webscale technical overview
 
Oracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle CloudOracle E-Business Suite On Oracle Cloud
Oracle E-Business Suite On Oracle Cloud
 
Oci meetup v1
Oci meetup v1Oci meetup v1
Oci meetup v1
 
Oracle Cloud Infraestructure Update
Oracle Cloud Infraestructure UpdateOracle Cloud Infraestructure Update
Oracle Cloud Infraestructure Update
 
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
Frank kramer ibm-data_management-for-adas-scale-usergroup-sin-032018
 
Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)Oxford Common File Layout (OCFL)
Oxford Common File Layout (OCFL)
 
S016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710dS016825 ibm-cos-nola-v1710d
S016825 ibm-cos-nola-v1710d
 
Storage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technologyStorage networking fcf_co_eiscsivsn_technology
Storage networking fcf_co_eiscsivsn_technology
 
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_033020100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
 
20100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_033020100401 정영임 da 전략 tft_0330
20100401 정영임 da 전략 tft_0330
 
NetApp Se training storage grid webscale technical overview
NetApp Se training   storage grid webscale technical overviewNetApp Se training   storage grid webscale technical overview
NetApp Se training storage grid webscale technical overview
 
S104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809bS104876 ibm-cos-jburg-v1809b
S104876 ibm-cos-jburg-v1809b
 
S100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804cS100299 ibm-cos-orlando-v1804c
S100299 ibm-cos-orlando-v1804c
 
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
(BAC307) The Cold Data Playbook: Building the Ultimate Archive Solution in Am...
 

Último

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Último (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Chapter 9

  • 1. © 2009 EMC Corporation. All rights reserved. EMC Proven Professional The #1 Certification Program in the information storage and management industry Content Addressed Storage Chapter 9 Section 2 : Storage Networking Technologies and Virtualization
  • 2. © 2009 EMC Corporation. All rights reserved. Chapter Objectives Upon completion of this chapter, you will be able to: o Describe CAS, fixed content and archives, traditional storage solutions for archive o Describe the features and benefits of a CAS based storage strategy o List the physical and logical elements of CAS o Describe the storage and retrieval process for CAS data objects o Describe the best suited operational environments for CAS solutions
  • 3. © 2009 EMC Corporation. All rights reserved. Lesson: CAS Overview Upon completion of this lesson, you be able to: o Define fixed content o Describe traditional archival solutions and its shortcoming o Define Content Addressed Storage (CAS) o List benefits of CAS
  • 4. © 2009 EMC Corporation. All rights reserved. What are Fixed Content and Archives Electronic Documents •Contracts, claims, etc. •E-mail and attachments •Financial spread sheets •CAD/CAM designs •Presentations Digital Records •Documents – Checks, securities trades – Historical preservation •Photographs – Personal / professional •Surveys – Seismic, astronomic, geographic Digital Assets Retained For Active Reference And Value Leverage Historical Value Improve Service Levels Generate New Revenues Rich Media •Medical – X-rays, MRIs, CTI •Video – News / media, movies – Security surveillance •Audio – Voicemail – Radio
  • 5. © 2009 EMC Corporation. All rights reserved. Challenges of Storing Fixed Content o Fixed content is growing at more than 90% annually o Significant amount of newly created information falls into this category o New regulations require retention and data protection o Often, long-term preservation is required (years-decades) o Simultaneous multi-user online access is preferable to offline storage o Need faster access to fixed content o Need for location independent data, enabling technology refresh and migration o Traditional storage methods are inadequate
  • 6. © 2009 EMC Corporation. All rights reserved. Traditional storage solutions for Archive o Three categories of archival solution are: o Online, nearline, and offline based on the means of access o Traditional archival solution were offline o Traditional archival process used optical disks and tapes as media for archival o An archive is often stored on a Write Once Read Many (WORM) device, such as a CD-ROM
  • 7. © 2009 EMC Corporation. All rights reserved. Shortcomings of Traditional Archiving Solutions o Tape is slow, and standards are always changing o Optical is expensive, and requires vast amounts of media o Recovering files from tape and optical is often time consuming o Data on tape and optical is subject to media degradation o Both solution require sophisticated media management CAS has emerged as an alternative to traditional archiving solutions
  • 8. © 2009 EMC Corporation. All rights reserved. What is Content Addressed Storage (CAS) o Object-oriented, location-independent approach to data storage o Repository for the “Objects” o Access mechanism to interface with repository o Globally unique identifiers provide access to objects
  • 9. © 2009 EMC Corporation. All rights reserved. Benefits of CAS o Content authenticity o Content integrity o Location independence o Single-instance storage (SiS) o Retention enforcement o Record-level protection and disposition o Technology independence o Fast record retrieval Additional Task Research on role of CAS in ILM Strategy
  • 10. © 2009 EMC Corporation. All rights reserved. Lesson Summary Key points covered in this lesson: o CAS Definition o Challenges of Storing Fixed Content o Shortcomings of Traditional Archiving Solutions o Benefits of CAS
  • 11. © 2009 EMC Corporation. All rights reserved. Lesson: CAS Architecture Upon completion of this lesson, you will be able to: o Describe CAS architecture o Describe Physical and logical elements of CAS o Describe data storage and retrieval process in CAS environment o CAS examples
  • 12. © 2009 EMC Corporation. All rights reserved. Physical Elements of CAS o Storage devices (CAS Based) o Storage node o Access node o Servers (to which storage devices get connected) o Client Server Private LAN Storage Nodes Access Nodes CAS System IP API
  • 13. © 2009 EMC Corporation. All rights reserved. CAS Terminology o Application Programming Interface (API) o A set of function calls that enables communication between applications or between an application and an operating system o BLOB (Binary Large Object) o The actual data without the descriptive information (metadata) o The Distinct Bit Sequence (DBS) of user data represents the actual content of a file and is independent of the filename and physical location API
  • 14. © 2009 EMC Corporation. All rights reserved. CAS Terminology (Cont) o C-Clip o A package containing the user's data and associated metadata o C-Clip ID (C-Clip handle or C-Clip reference) is the CA that the system returns to the client application o Content Address (CA) o An identifier that uniquely addresses the content of a file and not its location. Unlike location-based addresses, content addresses are inherently stable and, once calculated, they never change and always refer to the same content o C-Clip Descriptor File (CDF) o The additional XML file that the system creates when making a C-Clip. This file includes the content addresses for all referenced BLOBs and associated metadata
  • 15. © 2009 EMC Corporation. All rights reserved. API How CAS Stores a Data Object Unique Content Address is calculated Client presents data to API to be archived CAS System Client Application Server CDF C-Clip (Object) Object is sent to CAS System via CAS API over IP
  • 16. © 2009 EMC Corporation. All rights reserved. API How CAS Stores a Data Object Unique Content Address is calculated Client presents data to API to be archived CAS System Client Application Server Object is sent to CAS System via CAS API over IP Object CAS System validates the Content Address and stores the object Acknowledgement returned to application Clip ID is retained and stored for future use
  • 17. © 2009 EMC Corporation. All rights reserved. Application Server Client CAS System Object is needed by an application 1 CAS authenticates the request and delivers the object 4 Application finds Content Address of object to be retrieved 2 Retrieval request is sent to the CAS System via CAS API over IP 3 How CAS Retrieves a Data Object API C-Clip ID
  • 18. © 2009 EMC Corporation. All rights reserved. CAS Features o Features available with most CAS systems are: o Integrity checking o Data protection o Local replication o Remote replication o Load balancing o Scalability o Self-diagnosis and repair o Report generation and event notification o Fault tolerance o Through the use of redundant components and data protection schemes o Audit trails o Documentation of management activities, access and disposition of data
  • 19. © 2009 EMC Corporation. All rights reserved. Example 1: CAS Healthcare Solution o Each X-ray image ranges from about 15MB to over 1GB o Patient record is stored online for a period of 60-90 days o Beyond 90 days patient records are archived Data Stored on CAS Patient Studies Stored locally for Short-Term Use (60 Days) Hospital CAS SystemApplication Server API
  • 20. © 2009 EMC Corporation. All rights reserved. Example 2: CAS Financial Solution o Check image size is about 25KB o Check imaging service provider may process 50–90 million check images per month o Checks are stored online for a period of 60 days o Beyond 60 days data is archived Bank CAS SystemApplication Server API
  • 21. © 2009 EMC Corporation. All rights reserved. Lesson Summary Key points covered in this lesson: o CAS architecture o Physical and logical elements of CAS o CAS storage and retrieval process o CAS solution examples
  • 22. © 2009 EMC Corporation. All rights reserved. Chapter Summary Key points covered in this chapter: o Benefits of CAS based storage strategy o Overview of physical and logical elements of CAS o Storing and retrieving data from CAS o CAS application examples
  • 23. © 2009 EMC Corporation. All rights reserved. #1 IT company For more information visit http://education.EMC.com

Notas do Editor

  1. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  2. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage - The objectives for this chapter are shown here. Please take a moment to read them.
  3. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage - The objectives for this lesson are shown here. Please take a moment to read them.
  4. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  5. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  6. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  7. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  8. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  9. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  10. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  11. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  12. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  13. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  14. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  15. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  16. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  17. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  18. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  19. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  20. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  21. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  22. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -
  23. Copyright © 2009 EMC Corporation. Do not Copy - All Rights Reserved. Content Addressed Storage -