SlideShare a Scribd company logo
1 of 38
Download to read offline
The Efficient Use of Cyberinfrastructure
             to Enable Data Analysis Collaboration

             Summit ’09                                 October 15, 2009
                                                             Dave Fellinger
                                                                       CTO
                                                               © 2009 DataDirect Networks, Inc. All Rights Reserved.
© 2008 DataDirect Networks, Inc. All Rights Reserved.
Company Data at a Glance
• Fast Growing Data Infrastructure Provider for Companies who
  Demand Extreme Performance for their Large Content Files and
  Unstructured Data
   • Integrated Portfolio of Extreme Storage Platforms, Intuitive
     Storage Management Software and Consulting Services
   • Over 10 Years of Stability and Experience
   • Over $130M in Annual Revenue
         • Growing, Profitable and Hiring
   • Over 200 Petabytes Installed Worldwide
         • Clients include XBOX LIVE, Slide & Saudi Aramco
   • Global Partners include IBM, Sony and Dell
   • Expanding Globally, with Established Offices
         • Europe, India, Australia, Asia Pacific and Japan



     “DDN could find itself a market leading provider for the Internet computing era
     in the same way that EMC did in the transactional era and NetApp did in the
     distributed era”
© 2009 DataDirect Networks, Inc. All Rights Reserved.
Storage Designed for the Most
Extreme Environments in the World
 • Sites That Have Zero Tolerance For Data Latency
 • Sites That Demand Sub-Millisecond Application Response Times
 • Sites that Stream Extreme HD Content on a Massive Scale
 • Sites with Our Systems Delivering Over 100 Gigabytes Per Second of
   Consistent Throughput
 • Sites that Research International Scientific Data
 • The Most Sophisticated and Demanding High Performance Computing
   Environments
        • Powering 8 of the Top 10 and
        • Powering 50 of the Top 100
          Supercomputer Sites




© 2009 DataDirect Networks, Inc. All Rights Reserved.
Data Distribution Evolution

         • The Problem
                • A large number of sites need simultaneous
                  access to local data for detailed analysis.


         • The Solution
                • Utilize a simplified object based file system to
                  provide simultaneous synchronous instances
                  of data based on policy.


© 2009 DataDirect Networks, Inc. All Rights Reserved.
Data Distribution Today

         • The “Library Method”
                • Large data warehouses are queried for data in
                  an iterative manner.


         • MODIS as an example.
                • All MODIS image data is stored at NASA
                  Goddard on both disk and tape.
                • Inquiries generally spawn additional inquires
                  requiring time, study, and network bandwidth.
© 2009 DataDirect Networks, Inc. All Rights Reserved.
How is it Done Today?
   URL explosion in objects

   Map Objects to individual file systems                                                            Hundreds or thousands of building
                                                                                                     blocks like this
   Within file system files and folders are
   named 1, 2, 3, 4…. for hashing and rapid                                                          No common management framework
   index lookups                                                              Database
                                                                                                     Huge investment in custom engineering
   Must manage # of files per folder, # of                                                           to cobble together a global namespace
   folders in each file system
                                                                                                     Heavy reliance on expensive CDNs
   Multiple IOPS to get a file limits # of file
   reads per second and increases latency                                                            Internally developed replication schemes



                                                                                                        LAN
      NFS/HTTP/CIFS          NFS/HTTP/CIFS              NFS/HTTP/CIFS       NFS/HTTP/CIFS                              NFS/HTTP/CIFS       NFS/HTTP/CIFS

      NFS/HTTP/CIFS          NFS/HTTP/CIFS              NFS/HTTP/CIFS       NFS/HTTP/CIFS                              NFS/HTTP/CIFS       NFS/HTTP/CIFS

      Local File System     Local File System           Local File System   Local File System                          Local File System   Local File System

      Local File System     Local File System           Local File System   Local File System                          Local File System   Local File System


                    RAID                                             RAID                                                           RAID
                     Disk                                             Disk                                                           Disk

© 2009 DataDirect Networks, Inc. All Rights Reserved.                                           DataDirect Networks Confidential: Internal Use Only
Multi-site Content Delivery




              SITE A                                    SITE C

                                                                                                SITE D



                                                                                                         Database
                  SITE B                                                                                 Tracking
                                                                                                         File
                                                                                                         Locations
       Replication Software (x10)

       Administrator (x5)

       Storage/File System(s)
                                                                                   SITE E
       RAID/LUNs/Fibre Channel (x10 – Thousands)
© 2009 DataDirect Networks, Inc. All Rights Reserved.            DataDirect Networks Confidential: Internal Use Only
What’s within each site?
Complexity!
                                                   • Lots of things to manage
                                                   • No automation or coordination
      Hundreds of filers                           • Must maintain a path to find every file
                                                   • Provisioning more capacity increases complexity

                                                          Dozens – Hundreds of File Systems!
                                                                                                          Multiple File
                                                                                                          Servers




                                                                                        Fibre Channel
                                                                                        Switching,
                                                                                        Cables, SFPs




                                                                             Multiple
                                                                             RAIDs




© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
DDN’s Cloud Storage Initiative


   !    Take a clean look at the issues of massively scalable
        file storage & distribution

   !    Understand best practices from leading edge
        customers

   !    Develop a tailored solution
          –    Work with key users every step of the way
          –    Eliminate the need for complex multi-vendor integration
          –    Minimize customers having to write custom code
          –    Focus on file reads per second rather than IOPs



© 2009 DataDirect Networks, Inc. All Rights Reserved.   DataDirect Networks Confidential: Internal Use Only9
Scalable File Delivery
with WOS Clouds
                                                          • Single Management Point
                                                          • Single Namespace for Billions of Files
                                                          • Fully Automated, Load Balancing & Self Healing
                                                          • Automated Best-Path File Retrieval
                                                          • Multi-site Policy-Based Replication
                                                          • Add Capacity Online in Seconds
                                                          • Easy!




             Network
             Connection


                          WOS Nodes

                                                        Database
          Administrator                                 Storing WOS
                                                        Object IDs

© 2009 DataDirect Networks, Inc. All Rights Reserved.                                      DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 1


                                                                Users
                                                                Users




                                      Customer
                                     Application
                                       Servers
                                                        WOS-B     WOS-LIB     WOS-LIB



      Gigabit
      Ethernet
      Network




                                                                WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                   DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 2

                                                                                                    User uploads a
                                                                                                     User uploads a
                                                                                                    file to application
                                                                                                     file to application
                                                                  Users
                                                                  Users                             server.
                                                                                                     server.




                                      Customer
                                     Application
                                       Servers
                                                        WOS-LIB     WOS-LIB     WOS-LIB



      Gigabit
      Ethernet
      Network




                                                                  WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 3


                                                                  Users
                                                                  Users




                                      Customer                                                    Application makes
                                                                                                  Application makes
                                     Application                                                  a call to the WOS-
                                                                                                  a call to the WOS-
                                       Servers                                                    LIB to store (PUT)
                                                                                                  LIB to store (PUT)
                                                        WOS-LIB     WOS-LIB     WOS-LIB
                                                                                                  a new object
                                                                                                  a new object

      Gigabit
      Ethernet
      Network




                                                                  WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 4


                                                                  Users
                                                                  Users




                                      Customer                                                 WOS-LIB stores the object
                                                                                                WOS-LIB stores the object
                                     Application                                               on a node. Subsequent
                                                                                                on a node. Subsequent
                                       Servers                                                 objects are automatically
                                                                                                objects are automatically
                                                        WOS-LIB     WOS-LIB     WOS-LIB        load balanced across the
                                                                                                load balanced across the
                                                                                               cluster.
                                                                                                cluster.
      Gigabit
      Ethernet
      Network




                                                                  WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 5


                                                                  Users
                                                                  Users




                                      Customer
                                     Application
                                       Servers
                                                        WOS-LIB     WOS-LIB     WOS-LIB


                               If the storage
                                If the storage
      Gigabit                  policy specifies
                                policy specifies
      Ethernet                 replication, the
                                replication, the
      Network                  object is replicated
                                object is replicated
                               to another node.
                                to another node.




                                                                  WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 6


                                                                  Users
                                                                  Users



                                                                                                       WOS-LIB returns a unique
                                                                                                       WOS-LIB returns a unique
                                      Customer                                OID = 5718a36143521602   Object ID which the
                                                                                                       Object ID which the
                                     Application
                                                                                                       application stores in lieu of
                                                                                                       application stores in lieu of
                                       Servers
                                                        WOS-LIB     WOS-LIB       WOS-LIB              a file path.
                                                                                                       a file path.


      Gigabit
      Ethernet
      Network




                                                                  WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 7


                                                                  Users
                                                                  Users
           A User needs
            A User needs
           the stored file.
            the stored file.


                                      Customer
                                     Application
                                       Servers
                                                        WOS-LIB     WOS-LIB     WOS-LIB



      Gigabit
      Ethernet
      Network




                                                                  WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 8


                                                                  Users
                                                                  Users
      Application makes a
       Application makes a
      call to WOS-LIB to
       call to WOS-LIB to
      read (GET) the
       read (GET) the
      object. The unique
       object. The unique
      Object ID is passed Customer
       Object ID is passed
      to WOS-LIB.
       to WOS-LIB.       Application
                           Servers
                                                        WOS-LIB     WOS-LIB     WOS-LIB



      Gigabit
      Ethernet
      Network




                                                                  WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 9


                                                                          Users
                                                                          Users
   WOS-LIB automatically
   WOS-LIB automatically
   determines what
   determines what
   node(s) have the
   node(s) have the
   requested object,
   requested object,
   retrieves the object,
   retrieves the object,
   and returns it to the Customer
   and returns it to the
   application.
   application.          Application
                          Servers
                                                           WOS-LIB               WOS-LIB     WOS-LIB
                                                        OID = 5718a36143521602


      Gigabit
      Ethernet
      Network




                                                                           WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                                  DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 10


                                                                                 Users
                                                                                 Users
   WOS-LIB automatically
   WOS-LIB automatically
   determines what
   determines what
   node(s) have the
   node(s) have the
   requested object,
   requested object,
   retrieves the object,
   retrieves the object,
   and returns it to the Customer
   and returns it to the
   application.
   application.          Application
                          Servers
                                                                 WOS-LIB              WOS-LIB     WOS-LIB
                                                             OID = 5718a36143521602


      Gigabit
      Ethernet
      Network

                                                        OID = 5718a36143521602




                                                                                 WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                                       DataDirect Networks Confidential: Internal Use Only
WOS Puts & Gets - 11

        Application returns
         Application returns
        file to user.
         file to user.
                                                                  Users
                                                                  Users




                                      Customer
                                     Application
                                       Servers
                                                        WOS-LIB     WOS-LIB     WOS-LIB



      Gigabit
      Ethernet
      Network




                                                                  WOS Cluster
© 2009 DataDirect Networks, Inc. All Rights Reserved.                     DataDirect Networks Confidential: Internal Use Only
WOS Zones and Replication
Global Content Distribution - 1


                                                        Zones are logical groups of WOS
                                                        nodes in which you scope
                                                        replication, or data protection
               Zone “West”                              policies.

                                                        In this example, we have two                        Zone “East”
                                                        zones which also map to
                                                        geographic data centers.

                                                        These data centers both serve the
                                                        public internet.

         Data Protection via Replication
                                                             High Spe
                                                                        ed WAN
                                                                                 Connecti
                                                                                          o   n
  User Defined Object
  User Defined Object                                                                                  Data Protection via Replication
  Storage Policies:
  Storage Policies:
  Wild: West=2, East=0
  Wild: West=2, East=0
  Wallstreet: East=2, West=0
  Wallstreet: East=2, West=0
  Safe: West=1, East=1
  Safe: West=1, East=1


© 2009 DataDirect Networks, Inc. All Rights Reserved.                              DataDirect Networks Confidential: Internal Use Only
WOS Zones and Replication
Global Content Distribution - 2



                                                        Objects stored utilizing the “Wild”
               Zone “West”                              policy will result in objects being
                                                        stored on two distinct nodes within
                                                        the “West” zone.                                    Zone “East”
                                                        The server performing the store
                                                        action can be anywhere on the
                                                        network, including the “East” zone


         Data Protection via Replication
                                                             High Spe
                                                                        ed WAN
                                                                                 Connecti
                                                                                          o   n
  User Defined Object
  User Defined Object                                                                                  Data Protection via Replication
  Storage Policies:
  Storage Policies:
  Wild: West=2, East=0
  Wild: West=2, East=0
  Wallstreet: East=2, West=0
  Wallstreet: East=2, West=0
  Safe: West=1, East=1
  Safe: West=1, East=1


© 2009 DataDirect Networks, Inc. All Rights Reserved.                              DataDirect Networks Confidential: Internal Use Only
WOS Zones and Replication
Global Content Distribution - 3


                                                        Objects stored utilizing the
                                                        “Safe” policy will result in object
               Zone “West”                              replicas being stored on one
                                                        node in the “West” zone and
                                                        one node in the “East” zone.
                                                                                                          Zone “East”
                                                        Again, the server performing the
                                                        store action via the WOS-LIB
                                                        can be anywhere on the
                                                        network.

         Data Protection via Replication
                                                           High Spe
                                                                      ed WAN
                                                                               Connecti
                                                                                        o   n
  User Defined Object
  User Defined Object                                                                                Data Protection via Replication
  Storage Policies:
  Storage Policies:
  Wild: West=2, East=0
  Wild: West=2, East=0
  Wallstreet: East=2, West=0
  Wallstreet: East=2, West=0
  Safe: West=1, East=1
  Safe: West=1, East=1


© 2009 DataDirect Networks, Inc. All Rights Reserved.                            DataDirect Networks Confidential: Internal Use Only
WOS Zones and Replication
Global Content Distribution - 4


                                                        The “West” and “East” zones
                                                        utilize replication on high
               Zone “West”                              performance WOS nodes for
                                                        the most demanding service
                                                        environments.                                     Zone “East”
                                                        What if you wanted an extra
                                                        object copy for Disaster
                                                        Recovery?


         Data Protection via Replication
                                                           High Spe
                                                                      ed WAN
                                                                               Connecti
                                                                                        o   n
  User Defined Object
  User Defined Object                                                                                Data Protection via Replication
  Storage Policies:
  Storage Policies:
  Wild: West=2, East=0
  Wild: West=2, East=0
  Wallstreet: East=2, West=0
  Wallstreet: East=2, West=0
  Safe: West=1, East=1
  Safe: West=1, East=1


© 2009 DataDirect Networks, Inc. All Rights Reserved.                            DataDirect Networks Confidential: Internal Use Only
WOS Zones and Replication
Global Content Distribution - 5
                                                                                          Zone “DR”

                                                                            AN
                                                                       dW
                                                                  ee
                                                                Sp
                                                        H   igh
                                                                                                                          Hi
                                                                                     Data Protection via Replication           gh
                                                                                                                                  S

               Zone “West”
                                                                                                                                      pe
                                                                                                                                        ed
                                                                                                                                             W
                                                                                                                                                 AN




                                                                                                                                                      Zone “East”
                                                                                 The “DR” zone utilizes high
                                                                                 capacity WOS nodes.




         Data Protection via Replication
                                                                                    High Spe
                                                                                               ed WAN
                                                                                                        Connecti
                                                                                                                 o   n
  User Defined Object
  User Defined Object                                                                                                                        Data Protection via Replication
  Storage Policies:
  Storage Policies:
  Wild: West=2, East=0
  Wild: West=2, East=0
  Wallstreet: East=2, West=0
  Wallstreet: East=2, West=0
  Safe: West=1, East=1
  Safe: West=1, East=1
  CYA: West=1, East=1, DR=1

© 2009 DataDirect Networks, Inc. All Rights Reserved.                                                     DataDirect Networks Confidential: Internal Use Only
WOS Zones and Replication
Global Content Distribution - 6
                                                                                            Zone “DR”

                                                                            AN
                                                                       dW
                                                                  ee
                                                                Sp
                                                        H   igh
                                                                                                                            Hi
                                                                                       Data Protection via Replication           gh
                                                                                                                                    S

               Zone “West”
                                                                                                                                        pe
                                                                                                                                          ed
                                                                                                                                               W
                                                                                                                                                   AN




                                                                                 Objects stored utilizing the “CYA”                                     Zone “East”
                                                                                 storage policy will result in object
                                                                                 replicas on both coasts as well as
                                                                                 a copy in the “DR” zone.


         Data Protection via Replication
                                                                                      High Spe
                                                                                                 ed WAN
                                                                                                          Connecti
                                                                                                                   o   n
  User Defined Object
  User Defined Object                                                                                                                          Data Protection via Replication
  Storage Policies:
  Storage Policies:
  Wild: West=2, East=0
  Wild: West=2, East=0
  Wallstreet: East=2, West=0
  Wallstreet: East=2, West=0
  Safe: West=1, East=1
  Safe: West=1, East=1
  CYA: West=1, East=1, DR=1

© 2009 DataDirect Networks, Inc. All Rights Reserved.                                                       DataDirect Networks Confidential: Internal Use Only
WOS Zones and Replication
Global Content Distribution - 7
                                                                                          Zone “DR”

                                                                            AN
                                                                       dW
                                                                  ee
                                                                Sp
                                                        H   igh
                                                                                                                          Hi
                                                                                     Data Protection via Replication           gh
                                                                                                                                  S

               Zone “West”
                                                                                                                                      pe
                                                                                                                                        ed
                                                                                                                                             W
                                                                                                                                                 AN




                                                                                 Regardless of replication                                            Zone “East”
                                                                                 policy, any object (OID)
                                                                                 can be accessed from
                                                                                 any zone, whether the
                                                                                 object resides in that
         Data Protection via Replication
                                                                                 zone or not!
                                                                                    High Spe
                                                                                               ed WAN
                                                                                                        Connecti
                                                                                                                 o   n
  User Defined Object
  User Defined Object                                                                                                                        Data Protection via Replication
  Storage Policies:
  Storage Policies:
  Wild: West=2, East=0
  Wild: West=2, East=0
  Wallstreet: East=2, West=0
  Wallstreet: East=2, West=0
  Safe: West=1, East=1
  Safe: West=1, East=1
  CYA: West=1, East=1, DR=1

© 2009 DataDirect Networks, Inc. All Rights Reserved.                                                     DataDirect Networks Confidential: Internal Use Only
Data Protection: Drive and Node
Failure Handling - 1

              • Replication requires at least two copies of each
                object to be stored for a given OID.
              • With replication, for maximum performance,
                individual objects are stored within 1 disk unit.




© 2009 DataDirect Networks, Inc. All Rights Reserved.   DataDirect Networks Confidential: Internal Use Only
Data Protection: Drive and Node
Failure Handling - 2
            • Upon disk drive failure, all objects stored on the
              failed drive are noted to be out of policy
              compliance and recovery begins.
            • Affected objects are copied in parallel to bring the
              cluster back into full policy compliance.



                                                        !




© 2009 DataDirect Networks, Inc. All Rights Reserved.       DataDirect Networks Confidential: Internal Use Only
Data Protection: Drive and Node
Failure Handling - 3

              • Upon disk drive failure, all objects stored on the
                failed drive are noted to be out of policy
                compliance and recovery begins.
              • Affected objects are copied in parallel to bring the
                cluster back into full policy compliance.



                                                        !




© 2009 DataDirect Networks, Inc. All Rights Reserved.       DataDirect Networks Confidential: Internal Use Only
Data Protection: Drive and Node
Failure Handling - 4

             • Policy restoration occurs on a per object basis,
               NOT per node, hence only objects that resided on
               the failed node will be replicated.
             • When the failed node is replaced or returns online,
               it simply becomes additional cluster capacity.




© 2009 DataDirect Networks, Inc. All Rights Reserved.   DataDirect Networks Confidential: Internal Use Only
Data Protection: Drive and Node
Failure Handling - 5
            • Upon node failure, recovery of all objects stored
              on the failed node begins.
            • Affected objects are copied in parallel and
              distributed to surviving nodes to bring the cluster
              back into full policy compliance.




© 2009 DataDirect Networks, Inc. All Rights Reserved.   DataDirect Networks Confidential: Internal Use Only
Data Protection: Drive and Node
Failure Handling - 6

               • Upon node failure, recovery of all objects stored
                 on the failed node begins.
               • Affected objects are copied in parallel and
                 distributed to surviving nodes to bring the cluster
                 back into full policy compliance.




© 2009 DataDirect Networks, Inc. All Rights Reserved.   DataDirect Networks Confidential: Internal Use Only
Data Protection: Drive and Node
Failure Handling - 7

              • Policy restoration occurs on a per object basis,
                NOT per disk drive hence only used object space
                will be replicated.
              • When the failed disk drive is replaced, the
                replacement simply becomes additional capacity.




© 2009 DataDirect Networks, Inc. All Rights Reserved.   DataDirect Networks Confidential: Internal Use Only
Data Distribution Evolution

         • The “Push Method”
                • Data is automatically replicated based on
                  policy to scientists with specific requirements.
         • ATLAS as an example;
                • The LHC at CERN produces more than 1TB
                  per day.
                • Relevant data is replicated to over 300 sites in
                  the US and Canada for analysis.
                • Replication is based on specific interest and is
                  fully automated.
© 2009 DataDirect Networks, Inc. All Rights Reserved.
Conclusion

         • To enable multi-point scientific study data must have
           attributes of location (site) as well as traditional
           ACLs.

         • File systems distributing data must have redundant
           automation to enable replication over geographies.

         • Data distribution methods must be simplified to
           reduce latency, maximize network efficiency allowing
           improved processing efficiency.

© 2009 DataDirect Networks, Inc. All Rights Reserved.
Thank You




                                                               Dave Fellinger
                                                        dfellinger@ddn.com

                                                                    © 2009 DataDirect Networks, Inc. All Rights Reserved.
© 2009 DataDirect Networks, Inc. All Rights Reserved.

More Related Content

What's hot

Hadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
Hadoop World 2011: HDFS Federation - Suresh Srinivas, HortonworksHadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
Hadoop World 2011: HDFS Federation - Suresh Srinivas, HortonworksCloudera, Inc.
 
Sun storage tek 6140 customer presentation
Sun storage tek 6140 customer presentationSun storage tek 6140 customer presentation
Sun storage tek 6140 customer presentationxKinAnx
 
Intro to GlusterFS Webinar - August 2011
Intro to GlusterFS Webinar - August 2011Intro to GlusterFS Webinar - August 2011
Intro to GlusterFS Webinar - August 2011GlusterFS
 
Webinar Sept 22: Gluster Partners with Redapt to Deliver Scale-Out NAS Storage
Webinar Sept 22: Gluster Partners with Redapt to Deliver Scale-Out NAS StorageWebinar Sept 22: Gluster Partners with Redapt to Deliver Scale-Out NAS Storage
Webinar Sept 22: Gluster Partners with Redapt to Deliver Scale-Out NAS StorageGlusterFS
 
Setting up Storage Features in Windows Server 2012
Setting up Storage Features in Windows Server 2012Setting up Storage Features in Windows Server 2012
Setting up Storage Features in Windows Server 2012Lai Yoong Seng
 
Private cloud virtual reality to reality a partner story daniel mar_technicom
Private cloud virtual reality to reality a partner story daniel mar_technicomPrivate cloud virtual reality to reality a partner story daniel mar_technicom
Private cloud virtual reality to reality a partner story daniel mar_technicomMicrosoft Singapore
 
Expanding dr with_zfssa_110810
Expanding dr with_zfssa_110810Expanding dr with_zfssa_110810
Expanding dr with_zfssa_110810rjmurphyslideshare
 
Panzura Global Storage System
Panzura Global Storage SystemPanzura Global Storage System
Panzura Global Storage SystemPanzura
 
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012Amazon Web Services
 
Gluster Webinar: Introduction to GlusterFS
Gluster Webinar: Introduction to GlusterFSGluster Webinar: Introduction to GlusterFS
Gluster Webinar: Introduction to GlusterFSGlusterFS
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell
 
VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualizationSisimon Soman
 
Novell File Management Suite for Microsoft Active Directory Environments
Novell File Management Suite for Microsoft Active Directory EnvironmentsNovell File Management Suite for Microsoft Active Directory Environments
Novell File Management Suite for Microsoft Active Directory EnvironmentsNovell
 
SANsymphony V
SANsymphony VSANsymphony V
SANsymphony VTTEC
 
IBM Tivoli Storage Productivit Center overview and update
IBM Tivoli Storage Productivit Center overview and updateIBM Tivoli Storage Productivit Center overview and update
IBM Tivoli Storage Productivit Center overview and updateTony Pearson
 
Ibm total storage san file system as an infrastructure for multimedia servers...
Ibm total storage san file system as an infrastructure for multimedia servers...Ibm total storage san file system as an infrastructure for multimedia servers...
Ibm total storage san file system as an infrastructure for multimedia servers...Banking at Ho Chi Minh city
 

What's hot (19)

Hadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
Hadoop World 2011: HDFS Federation - Suresh Srinivas, HortonworksHadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
Hadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
 
Sun storage tek 6140 customer presentation
Sun storage tek 6140 customer presentationSun storage tek 6140 customer presentation
Sun storage tek 6140 customer presentation
 
Intro to GlusterFS Webinar - August 2011
Intro to GlusterFS Webinar - August 2011Intro to GlusterFS Webinar - August 2011
Intro to GlusterFS Webinar - August 2011
 
Webinar Sept 22: Gluster Partners with Redapt to Deliver Scale-Out NAS Storage
Webinar Sept 22: Gluster Partners with Redapt to Deliver Scale-Out NAS StorageWebinar Sept 22: Gluster Partners with Redapt to Deliver Scale-Out NAS Storage
Webinar Sept 22: Gluster Partners with Redapt to Deliver Scale-Out NAS Storage
 
Setting up Storage Features in Windows Server 2012
Setting up Storage Features in Windows Server 2012Setting up Storage Features in Windows Server 2012
Setting up Storage Features in Windows Server 2012
 
Private cloud virtual reality to reality a partner story daniel mar_technicom
Private cloud virtual reality to reality a partner story daniel mar_technicomPrivate cloud virtual reality to reality a partner story daniel mar_technicom
Private cloud virtual reality to reality a partner story daniel mar_technicom
 
Expanding dr with_zfssa_110810
Expanding dr with_zfssa_110810Expanding dr with_zfssa_110810
Expanding dr with_zfssa_110810
 
Panzura Global Storage System
Panzura Global Storage SystemPanzura Global Storage System
Panzura Global Storage System
 
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
AWS Partner Presentation – Panzura – AWS Cloud Storage for the Enterprise 2012
 
Ibm 23sept2010
Ibm 23sept2010Ibm 23sept2010
Ibm 23sept2010
 
Gluster Webinar: Introduction to GlusterFS
Gluster Webinar: Introduction to GlusterFSGluster Webinar: Introduction to GlusterFS
Gluster Webinar: Introduction to GlusterFS
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualization
 
Dnssec
DnssecDnssec
Dnssec
 
Novell File Management Suite for Microsoft Active Directory Environments
Novell File Management Suite for Microsoft Active Directory EnvironmentsNovell File Management Suite for Microsoft Active Directory Environments
Novell File Management Suite for Microsoft Active Directory Environments
 
Hadoop on VMware
Hadoop on VMwareHadoop on VMware
Hadoop on VMware
 
SANsymphony V
SANsymphony VSANsymphony V
SANsymphony V
 
IBM Tivoli Storage Productivit Center overview and update
IBM Tivoli Storage Productivit Center overview and updateIBM Tivoli Storage Productivit Center overview and update
IBM Tivoli Storage Productivit Center overview and update
 
Ibm total storage san file system as an infrastructure for multimedia servers...
Ibm total storage san file system as an infrastructure for multimedia servers...Ibm total storage san file system as an infrastructure for multimedia servers...
Ibm total storage san file system as an infrastructure for multimedia servers...
 

Viewers also liked

Cybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for scienceCybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for scienceCybera Inc.
 
Cybera -Projects 2010
Cybera -Projects 2010Cybera -Projects 2010
Cybera -Projects 2010Cybera Inc.
 
Cybera - Staff Meeting
Cybera - Staff MeetingCybera - Staff Meeting
Cybera - Staff MeetingCybera Inc.
 
CANARIE: Network Enabled Platforms
CANARIE: Network Enabled PlatformsCANARIE: Network Enabled Platforms
CANARIE: Network Enabled PlatformsCybera Inc.
 
GeoCENS OGC Standards and Sensor Web Enablement presented at GeoCENS Banff Se...
GeoCENS OGC Standards and Sensor Web Enablement presented at GeoCENS Banff Se...GeoCENS OGC Standards and Sensor Web Enablement presented at GeoCENS Banff Se...
GeoCENS OGC Standards and Sensor Web Enablement presented at GeoCENS Banff Se...Cybera Inc.
 
GeoChronos: A Platform for Earth Observation Scientists
GeoChronos: A Platform for Earth Observation ScientistsGeoChronos: A Platform for Earth Observation Scientists
GeoChronos: A Platform for Earth Observation ScientistsCybera Inc.
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersAventis Systems, Inc.
 
ASFWS 2012 - Mimikatz par Benjamin Delpy
ASFWS 2012 - Mimikatz par Benjamin DelpyASFWS 2012 - Mimikatz par Benjamin Delpy
ASFWS 2012 - Mimikatz par Benjamin DelpyCyber Security Alliance
 
Payroll Funding - Cash Flow funding for the Recruitment industry
Payroll Funding - Cash Flow funding for the Recruitment industryPayroll Funding - Cash Flow funding for the Recruitment industry
Payroll Funding - Cash Flow funding for the Recruitment industryDanny Marlow
 
2014 brochure Benfante raccolta e riciclo
2014 brochure Benfante raccolta e riciclo2014 brochure Benfante raccolta e riciclo
2014 brochure Benfante raccolta e riciclobenfante-recycling
 
Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...
Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...
Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...Angeloluca Barba
 
OMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensOMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensartisriva
 
ESXi on Dell internal dual SD module
ESXi on Dell internal dual SD moduleESXi on Dell internal dual SD module
ESXi on Dell internal dual SD moduleDavid Pasek
 
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Darius Whelan
 
Bando Concorso Vice Direttori Vigili del Fuoco 2014
Bando Concorso Vice Direttori Vigili del Fuoco 2014Bando Concorso Vice Direttori Vigili del Fuoco 2014
Bando Concorso Vice Direttori Vigili del Fuoco 2014Concorsando.it
 

Viewers also liked (20)

Cybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for scienceCybera - Clouds & other computational frameworks for science
Cybera - Clouds & other computational frameworks for science
 
Cybera -Projects 2010
Cybera -Projects 2010Cybera -Projects 2010
Cybera -Projects 2010
 
Cybera - Staff Meeting
Cybera - Staff MeetingCybera - Staff Meeting
Cybera - Staff Meeting
 
CANARIE: Network Enabled Platforms
CANARIE: Network Enabled PlatformsCANARIE: Network Enabled Platforms
CANARIE: Network Enabled Platforms
 
GeoCENS OGC Standards and Sensor Web Enablement presented at GeoCENS Banff Se...
GeoCENS OGC Standards and Sensor Web Enablement presented at GeoCENS Banff Se...GeoCENS OGC Standards and Sensor Web Enablement presented at GeoCENS Banff Se...
GeoCENS OGC Standards and Sensor Web Enablement presented at GeoCENS Banff Se...
 
Orchestration
OrchestrationOrchestration
Orchestration
 
GeoChronos: A Platform for Earth Observation Scientists
GeoChronos: A Platform for Earth Observation ScientistsGeoChronos: A Platform for Earth Observation Scientists
GeoChronos: A Platform for Earth Observation Scientists
 
BCNet - Peering
BCNet - PeeringBCNet - Peering
BCNet - Peering
 
Why Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen ServersWhy Government Agencies Should Consider Dell 13th Gen Servers
Why Government Agencies Should Consider Dell 13th Gen Servers
 
ASFWS 2012 - Mimikatz par Benjamin Delpy
ASFWS 2012 - Mimikatz par Benjamin DelpyASFWS 2012 - Mimikatz par Benjamin Delpy
ASFWS 2012 - Mimikatz par Benjamin Delpy
 
Dell ah br
Dell ah brDell ah br
Dell ah br
 
Payroll Funding - Cash Flow funding for the Recruitment industry
Payroll Funding - Cash Flow funding for the Recruitment industryPayroll Funding - Cash Flow funding for the Recruitment industry
Payroll Funding - Cash Flow funding for the Recruitment industry
 
2014 brochure Benfante raccolta e riciclo
2014 brochure Benfante raccolta e riciclo2014 brochure Benfante raccolta e riciclo
2014 brochure Benfante raccolta e riciclo
 
Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...
Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...
Sistema Paese Italia e Cyber Security : un nuovo scenario di interazione tra ...
 
OMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokensOMCI8.2.1 support for newly added bios tokens
OMCI8.2.1 support for newly added bios tokens
 
ESXi on Dell internal dual SD module
ESXi on Dell internal dual SD moduleESXi on Dell internal dual SD module
ESXi on Dell internal dual SD module
 
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
Slides by Dr Louise Crowley at Copyright Law for Digital Teaching and Learnin...
 
Bando Concorso Vice Direttori Vigili del Fuoco 2014
Bando Concorso Vice Direttori Vigili del Fuoco 2014Bando Concorso Vice Direttori Vigili del Fuoco 2014
Bando Concorso Vice Direttori Vigili del Fuoco 2014
 
Champion Hr NDA
Champion Hr NDAChampion Hr NDA
Champion Hr NDA
 
API Design Tour: Dell
API Design Tour: DellAPI Design Tour: Dell
API Design Tour: Dell
 

Similar to Efficient Use of Cyberinfrastructure

Deduplication and single instance storage
Deduplication and single instance storageDeduplication and single instance storage
Deduplication and single instance storageInterop
 
SNW Pres City Of Safford 101209 Lr
SNW Pres City Of Safford 101209 LrSNW Pres City Of Safford 101209 Lr
SNW Pres City Of Safford 101209 LrEric Herzog
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsTony Pearson
 
Hadoop Backup and Disaster Recovery
Hadoop Backup and Disaster RecoveryHadoop Backup and Disaster Recovery
Hadoop Backup and Disaster RecoveryCloudera, Inc.
 
Future of cloud storage
Future of cloud storageFuture of cloud storage
Future of cloud storageGlusterFS
 
Introduction to hadoop and hdfs
Introduction to hadoop and hdfsIntroduction to hadoop and hdfs
Introduction to hadoop and hdfsTrendProgContest13
 
Personal storage to enterprise storage system journey
Personal storage to enterprise storage system journeyPersonal storage to enterprise storage system journey
Personal storage to enterprise storage system journeySoumen Sarkar
 
Gluster open stack dev summit 042011
Gluster open stack dev summit 042011Gluster open stack dev summit 042011
Gluster open stack dev summit 042011Open Stack
 
IBM SONAS and the Cloud Storage Taxonomy
IBM SONAS and the Cloud Storage TaxonomyIBM SONAS and the Cloud Storage Taxonomy
IBM SONAS and the Cloud Storage TaxonomyTony Pearson
 
S104873 nas-sizing-jburg-v1809d
S104873 nas-sizing-jburg-v1809dS104873 nas-sizing-jburg-v1809d
S104873 nas-sizing-jburg-v1809dTony Pearson
 
Cloud storage slides
Cloud storage slidesCloud storage slides
Cloud storage slidesEvan Powell
 
Spectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSpectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSandeep Patil
 
Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Trishali Nayar
 
Consolidating File Servers into the Cloud
Consolidating File Servers into the CloudConsolidating File Servers into the Cloud
Consolidating File Servers into the CloudBuurst
 
Ibm total storage san file system as an infrastructure for multimedia servers...
Ibm total storage san file system as an infrastructure for multimedia servers...Ibm total storage san file system as an infrastructure for multimedia servers...
Ibm total storage san file system as an infrastructure for multimedia servers...Banking at Ho Chi Minh city
 
Hadoop on Azure, Blue elephants
Hadoop on Azure,  Blue elephantsHadoop on Azure,  Blue elephants
Hadoop on Azure, Blue elephantsOvidiu Dimulescu
 
S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5Tony Pearson
 
DFS PPT.pptx
DFS PPT.pptxDFS PPT.pptx
DFS PPT.pptxVMahesh5
 

Similar to Efficient Use of Cyberinfrastructure (20)

Deduplication and single instance storage
Deduplication and single instance storageDeduplication and single instance storage
Deduplication and single instance storage
 
SNW Pres City Of Safford 101209 Lr
SNW Pres City Of Safford 101209 LrSNW Pres City Of Safford 101209 Lr
SNW Pres City Of Safford 101209 Lr
 
Inexpensive storage
Inexpensive storageInexpensive storage
Inexpensive storage
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged Environments
 
Hadoop Backup and Disaster Recovery
Hadoop Backup and Disaster RecoveryHadoop Backup and Disaster Recovery
Hadoop Backup and Disaster Recovery
 
Future of cloud storage
Future of cloud storageFuture of cloud storage
Future of cloud storage
 
Introduction to hadoop and hdfs
Introduction to hadoop and hdfsIntroduction to hadoop and hdfs
Introduction to hadoop and hdfs
 
Personal storage to enterprise storage system journey
Personal storage to enterprise storage system journeyPersonal storage to enterprise storage system journey
Personal storage to enterprise storage system journey
 
Gluster open stack dev summit 042011
Gluster open stack dev summit 042011Gluster open stack dev summit 042011
Gluster open stack dev summit 042011
 
IBM SONAS and the Cloud Storage Taxonomy
IBM SONAS and the Cloud Storage TaxonomyIBM SONAS and the Cloud Storage Taxonomy
IBM SONAS and the Cloud Storage Taxonomy
 
S104873 nas-sizing-jburg-v1809d
S104873 nas-sizing-jburg-v1809dS104873 nas-sizing-jburg-v1809d
S104873 nas-sizing-jburg-v1809d
 
Cloud storage slides
Cloud storage slidesCloud storage slides
Cloud storage slides
 
Spectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSpectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN Caching
 
Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...
 
Consolidating File Servers into the Cloud
Consolidating File Servers into the CloudConsolidating File Servers into the Cloud
Consolidating File Servers into the Cloud
 
Nas fundamentals
Nas fundamentalsNas fundamentals
Nas fundamentals
 
Ibm total storage san file system as an infrastructure for multimedia servers...
Ibm total storage san file system as an infrastructure for multimedia servers...Ibm total storage san file system as an infrastructure for multimedia servers...
Ibm total storage san file system as an infrastructure for multimedia servers...
 
Hadoop on Azure, Blue elephants
Hadoop on Azure,  Blue elephantsHadoop on Azure,  Blue elephants
Hadoop on Azure, Blue elephants
 
S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5S ss0885 spectrum-scale-elastic-edge2015-v5
S ss0885 spectrum-scale-elastic-edge2015-v5
 
DFS PPT.pptx
DFS PPT.pptxDFS PPT.pptx
DFS PPT.pptx
 

More from Cybera Inc.

Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
 
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
 
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCybera Inc.
 
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
 
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cybera Inc.
 
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCybera Inc.
 
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to DataCybera Inc.
 
Do Universities Dream of Big Data
Do Universities Dream of Big DataDo Universities Dream of Big Data
Do Universities Dream of Big DataCybera Inc.
 
Predicting the Future With Microsoft Bing
Predicting the Future With Microsoft BingPredicting the Future With Microsoft Bing
Predicting the Future With Microsoft BingCybera Inc.
 
Analytics 101: How to not fail at analytics
Analytics 101: How to not fail at analyticsAnalytics 101: How to not fail at analytics
Analytics 101: How to not fail at analyticsCybera Inc.
 
Are MOOC's past their peak?
Are MOOC's past their peak?Are MOOC's past their peak?
Are MOOC's past their peak?Cybera Inc.
 
Opening the doors of the laboratory
Opening the doors of the laboratoryOpening the doors of the laboratory
Opening the doors of the laboratoryCybera Inc.
 
Open City - Edmonton
Open City - EdmontonOpen City - Edmonton
Open City - EdmontonCybera Inc.
 
Unlocking the power of healthcare data
Unlocking the power of healthcare dataUnlocking the power of healthcare data
Unlocking the power of healthcare dataCybera Inc.
 
Checking in on Healthcare Data Analytics
Checking in on Healthcare Data AnalyticsChecking in on Healthcare Data Analytics
Checking in on Healthcare Data AnalyticsCybera Inc.
 
Open access and open data: international trends and strategic context
Open access and open data: international trends and strategic contextOpen access and open data: international trends and strategic context
Open access and open data: international trends and strategic contextCybera Inc.
 

More from Cybera Inc. (20)

Cyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and DemocracyCyber Summit 2016: Technology, Education, and Democracy
Cyber Summit 2016: Technology, Education, and Democracy
 
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCyber Summit 2016: Understanding Users' (In)Secure Behaviour
Cyber Summit 2016: Understanding Users' (In)Secure Behaviour
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCyber Summit 2016: Research Data and the Canadian Innovation Challenge
Cyber Summit 2016: Research Data and the Canadian Innovation Challenge
 
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big Data
 
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
Cyber Summit 2016: Privacy Issues in Big Data Sharing and Reuse
 
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...
 
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...
 
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing Data
 
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...
 
Privacy, Security & Access to Data
Privacy, Security & Access to DataPrivacy, Security & Access to Data
Privacy, Security & Access to Data
 
Do Universities Dream of Big Data
Do Universities Dream of Big DataDo Universities Dream of Big Data
Do Universities Dream of Big Data
 
Predicting the Future With Microsoft Bing
Predicting the Future With Microsoft BingPredicting the Future With Microsoft Bing
Predicting the Future With Microsoft Bing
 
Analytics 101: How to not fail at analytics
Analytics 101: How to not fail at analyticsAnalytics 101: How to not fail at analytics
Analytics 101: How to not fail at analytics
 
Are MOOC's past their peak?
Are MOOC's past their peak?Are MOOC's past their peak?
Are MOOC's past their peak?
 
Opening the doors of the laboratory
Opening the doors of the laboratoryOpening the doors of the laboratory
Opening the doors of the laboratory
 
Open City - Edmonton
Open City - EdmontonOpen City - Edmonton
Open City - Edmonton
 
Unlocking the power of healthcare data
Unlocking the power of healthcare dataUnlocking the power of healthcare data
Unlocking the power of healthcare data
 
Checking in on Healthcare Data Analytics
Checking in on Healthcare Data AnalyticsChecking in on Healthcare Data Analytics
Checking in on Healthcare Data Analytics
 
Open access and open data: international trends and strategic context
Open access and open data: international trends and strategic contextOpen access and open data: international trends and strategic context
Open access and open data: international trends and strategic context
 

Recently uploaded

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Recently uploaded (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

Efficient Use of Cyberinfrastructure

  • 1. The Efficient Use of Cyberinfrastructure to Enable Data Analysis Collaboration Summit ’09 October 15, 2009 Dave Fellinger CTO © 2009 DataDirect Networks, Inc. All Rights Reserved. © 2008 DataDirect Networks, Inc. All Rights Reserved.
  • 2. Company Data at a Glance • Fast Growing Data Infrastructure Provider for Companies who Demand Extreme Performance for their Large Content Files and Unstructured Data • Integrated Portfolio of Extreme Storage Platforms, Intuitive Storage Management Software and Consulting Services • Over 10 Years of Stability and Experience • Over $130M in Annual Revenue • Growing, Profitable and Hiring • Over 200 Petabytes Installed Worldwide • Clients include XBOX LIVE, Slide & Saudi Aramco • Global Partners include IBM, Sony and Dell • Expanding Globally, with Established Offices • Europe, India, Australia, Asia Pacific and Japan “DDN could find itself a market leading provider for the Internet computing era in the same way that EMC did in the transactional era and NetApp did in the distributed era” © 2009 DataDirect Networks, Inc. All Rights Reserved.
  • 3. Storage Designed for the Most Extreme Environments in the World • Sites That Have Zero Tolerance For Data Latency • Sites That Demand Sub-Millisecond Application Response Times • Sites that Stream Extreme HD Content on a Massive Scale • Sites with Our Systems Delivering Over 100 Gigabytes Per Second of Consistent Throughput • Sites that Research International Scientific Data • The Most Sophisticated and Demanding High Performance Computing Environments • Powering 8 of the Top 10 and • Powering 50 of the Top 100 Supercomputer Sites © 2009 DataDirect Networks, Inc. All Rights Reserved.
  • 4. Data Distribution Evolution • The Problem • A large number of sites need simultaneous access to local data for detailed analysis. • The Solution • Utilize a simplified object based file system to provide simultaneous synchronous instances of data based on policy. © 2009 DataDirect Networks, Inc. All Rights Reserved.
  • 5. Data Distribution Today • The “Library Method” • Large data warehouses are queried for data in an iterative manner. • MODIS as an example. • All MODIS image data is stored at NASA Goddard on both disk and tape. • Inquiries generally spawn additional inquires requiring time, study, and network bandwidth. © 2009 DataDirect Networks, Inc. All Rights Reserved.
  • 6. How is it Done Today? URL explosion in objects Map Objects to individual file systems Hundreds or thousands of building blocks like this Within file system files and folders are named 1, 2, 3, 4…. for hashing and rapid No common management framework index lookups Database Huge investment in custom engineering Must manage # of files per folder, # of to cobble together a global namespace folders in each file system Heavy reliance on expensive CDNs Multiple IOPS to get a file limits # of file reads per second and increases latency Internally developed replication schemes LAN NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS NFS/HTTP/CIFS Local File System Local File System Local File System Local File System Local File System Local File System Local File System Local File System Local File System Local File System Local File System Local File System RAID RAID RAID Disk Disk Disk © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 7. Multi-site Content Delivery SITE A SITE C SITE D Database SITE B Tracking File Locations Replication Software (x10) Administrator (x5) Storage/File System(s) SITE E RAID/LUNs/Fibre Channel (x10 – Thousands) © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 8. What’s within each site? Complexity! • Lots of things to manage • No automation or coordination Hundreds of filers • Must maintain a path to find every file • Provisioning more capacity increases complexity Dozens – Hundreds of File Systems! Multiple File Servers Fibre Channel Switching, Cables, SFPs Multiple RAIDs © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 9. DDN’s Cloud Storage Initiative ! Take a clean look at the issues of massively scalable file storage & distribution ! Understand best practices from leading edge customers ! Develop a tailored solution – Work with key users every step of the way – Eliminate the need for complex multi-vendor integration – Minimize customers having to write custom code – Focus on file reads per second rather than IOPs © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only9
  • 10. Scalable File Delivery with WOS Clouds • Single Management Point • Single Namespace for Billions of Files • Fully Automated, Load Balancing & Self Healing • Automated Best-Path File Retrieval • Multi-site Policy-Based Replication • Add Capacity Online in Seconds • Easy! Network Connection WOS Nodes Database Administrator Storing WOS Object IDs © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 11. WOS Puts & Gets - 1 Users Users Customer Application Servers WOS-B WOS-LIB WOS-LIB Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 12. WOS Puts & Gets - 2 User uploads a User uploads a file to application file to application Users Users server. server. Customer Application Servers WOS-LIB WOS-LIB WOS-LIB Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 13. WOS Puts & Gets - 3 Users Users Customer Application makes Application makes Application a call to the WOS- a call to the WOS- Servers LIB to store (PUT) LIB to store (PUT) WOS-LIB WOS-LIB WOS-LIB a new object a new object Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 14. WOS Puts & Gets - 4 Users Users Customer WOS-LIB stores the object WOS-LIB stores the object Application on a node. Subsequent on a node. Subsequent Servers objects are automatically objects are automatically WOS-LIB WOS-LIB WOS-LIB load balanced across the load balanced across the cluster. cluster. Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 15. WOS Puts & Gets - 5 Users Users Customer Application Servers WOS-LIB WOS-LIB WOS-LIB If the storage If the storage Gigabit policy specifies policy specifies Ethernet replication, the replication, the Network object is replicated object is replicated to another node. to another node. WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 16. WOS Puts & Gets - 6 Users Users WOS-LIB returns a unique WOS-LIB returns a unique Customer OID = 5718a36143521602 Object ID which the Object ID which the Application application stores in lieu of application stores in lieu of Servers WOS-LIB WOS-LIB WOS-LIB a file path. a file path. Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 17. WOS Puts & Gets - 7 Users Users A User needs A User needs the stored file. the stored file. Customer Application Servers WOS-LIB WOS-LIB WOS-LIB Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 18. WOS Puts & Gets - 8 Users Users Application makes a Application makes a call to WOS-LIB to call to WOS-LIB to read (GET) the read (GET) the object. The unique object. The unique Object ID is passed Customer Object ID is passed to WOS-LIB. to WOS-LIB. Application Servers WOS-LIB WOS-LIB WOS-LIB Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 19. WOS Puts & Gets - 9 Users Users WOS-LIB automatically WOS-LIB automatically determines what determines what node(s) have the node(s) have the requested object, requested object, retrieves the object, retrieves the object, and returns it to the Customer and returns it to the application. application. Application Servers WOS-LIB WOS-LIB WOS-LIB OID = 5718a36143521602 Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 20. WOS Puts & Gets - 10 Users Users WOS-LIB automatically WOS-LIB automatically determines what determines what node(s) have the node(s) have the requested object, requested object, retrieves the object, retrieves the object, and returns it to the Customer and returns it to the application. application. Application Servers WOS-LIB WOS-LIB WOS-LIB OID = 5718a36143521602 Gigabit Ethernet Network OID = 5718a36143521602 WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 21. WOS Puts & Gets - 11 Application returns Application returns file to user. file to user. Users Users Customer Application Servers WOS-LIB WOS-LIB WOS-LIB Gigabit Ethernet Network WOS Cluster © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 22. WOS Zones and Replication Global Content Distribution - 1 Zones are logical groups of WOS nodes in which you scope replication, or data protection Zone “West” policies. In this example, we have two Zone “East” zones which also map to geographic data centers. These data centers both serve the public internet. Data Protection via Replication High Spe ed WAN Connecti o n User Defined Object User Defined Object Data Protection via Replication Storage Policies: Storage Policies: Wild: West=2, East=0 Wild: West=2, East=0 Wallstreet: East=2, West=0 Wallstreet: East=2, West=0 Safe: West=1, East=1 Safe: West=1, East=1 © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 23. WOS Zones and Replication Global Content Distribution - 2 Objects stored utilizing the “Wild” Zone “West” policy will result in objects being stored on two distinct nodes within the “West” zone. Zone “East” The server performing the store action can be anywhere on the network, including the “East” zone Data Protection via Replication High Spe ed WAN Connecti o n User Defined Object User Defined Object Data Protection via Replication Storage Policies: Storage Policies: Wild: West=2, East=0 Wild: West=2, East=0 Wallstreet: East=2, West=0 Wallstreet: East=2, West=0 Safe: West=1, East=1 Safe: West=1, East=1 © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 24. WOS Zones and Replication Global Content Distribution - 3 Objects stored utilizing the “Safe” policy will result in object Zone “West” replicas being stored on one node in the “West” zone and one node in the “East” zone. Zone “East” Again, the server performing the store action via the WOS-LIB can be anywhere on the network. Data Protection via Replication High Spe ed WAN Connecti o n User Defined Object User Defined Object Data Protection via Replication Storage Policies: Storage Policies: Wild: West=2, East=0 Wild: West=2, East=0 Wallstreet: East=2, West=0 Wallstreet: East=2, West=0 Safe: West=1, East=1 Safe: West=1, East=1 © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 25. WOS Zones and Replication Global Content Distribution - 4 The “West” and “East” zones utilize replication on high Zone “West” performance WOS nodes for the most demanding service environments. Zone “East” What if you wanted an extra object copy for Disaster Recovery? Data Protection via Replication High Spe ed WAN Connecti o n User Defined Object User Defined Object Data Protection via Replication Storage Policies: Storage Policies: Wild: West=2, East=0 Wild: West=2, East=0 Wallstreet: East=2, West=0 Wallstreet: East=2, West=0 Safe: West=1, East=1 Safe: West=1, East=1 © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 26. WOS Zones and Replication Global Content Distribution - 5 Zone “DR” AN dW ee Sp H igh Hi Data Protection via Replication gh S Zone “West” pe ed W AN Zone “East” The “DR” zone utilizes high capacity WOS nodes. Data Protection via Replication High Spe ed WAN Connecti o n User Defined Object User Defined Object Data Protection via Replication Storage Policies: Storage Policies: Wild: West=2, East=0 Wild: West=2, East=0 Wallstreet: East=2, West=0 Wallstreet: East=2, West=0 Safe: West=1, East=1 Safe: West=1, East=1 CYA: West=1, East=1, DR=1 © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 27. WOS Zones and Replication Global Content Distribution - 6 Zone “DR” AN dW ee Sp H igh Hi Data Protection via Replication gh S Zone “West” pe ed W AN Objects stored utilizing the “CYA” Zone “East” storage policy will result in object replicas on both coasts as well as a copy in the “DR” zone. Data Protection via Replication High Spe ed WAN Connecti o n User Defined Object User Defined Object Data Protection via Replication Storage Policies: Storage Policies: Wild: West=2, East=0 Wild: West=2, East=0 Wallstreet: East=2, West=0 Wallstreet: East=2, West=0 Safe: West=1, East=1 Safe: West=1, East=1 CYA: West=1, East=1, DR=1 © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 28. WOS Zones and Replication Global Content Distribution - 7 Zone “DR” AN dW ee Sp H igh Hi Data Protection via Replication gh S Zone “West” pe ed W AN Regardless of replication Zone “East” policy, any object (OID) can be accessed from any zone, whether the object resides in that Data Protection via Replication zone or not! High Spe ed WAN Connecti o n User Defined Object User Defined Object Data Protection via Replication Storage Policies: Storage Policies: Wild: West=2, East=0 Wild: West=2, East=0 Wallstreet: East=2, West=0 Wallstreet: East=2, West=0 Safe: West=1, East=1 Safe: West=1, East=1 CYA: West=1, East=1, DR=1 © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 29. Data Protection: Drive and Node Failure Handling - 1 • Replication requires at least two copies of each object to be stored for a given OID. • With replication, for maximum performance, individual objects are stored within 1 disk unit. © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 30. Data Protection: Drive and Node Failure Handling - 2 • Upon disk drive failure, all objects stored on the failed drive are noted to be out of policy compliance and recovery begins. • Affected objects are copied in parallel to bring the cluster back into full policy compliance. ! © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 31. Data Protection: Drive and Node Failure Handling - 3 • Upon disk drive failure, all objects stored on the failed drive are noted to be out of policy compliance and recovery begins. • Affected objects are copied in parallel to bring the cluster back into full policy compliance. ! © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 32. Data Protection: Drive and Node Failure Handling - 4 • Policy restoration occurs on a per object basis, NOT per node, hence only objects that resided on the failed node will be replicated. • When the failed node is replaced or returns online, it simply becomes additional cluster capacity. © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 33. Data Protection: Drive and Node Failure Handling - 5 • Upon node failure, recovery of all objects stored on the failed node begins. • Affected objects are copied in parallel and distributed to surviving nodes to bring the cluster back into full policy compliance. © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 34. Data Protection: Drive and Node Failure Handling - 6 • Upon node failure, recovery of all objects stored on the failed node begins. • Affected objects are copied in parallel and distributed to surviving nodes to bring the cluster back into full policy compliance. © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 35. Data Protection: Drive and Node Failure Handling - 7 • Policy restoration occurs on a per object basis, NOT per disk drive hence only used object space will be replicated. • When the failed disk drive is replaced, the replacement simply becomes additional capacity. © 2009 DataDirect Networks, Inc. All Rights Reserved. DataDirect Networks Confidential: Internal Use Only
  • 36. Data Distribution Evolution • The “Push Method” • Data is automatically replicated based on policy to scientists with specific requirements. • ATLAS as an example; • The LHC at CERN produces more than 1TB per day. • Relevant data is replicated to over 300 sites in the US and Canada for analysis. • Replication is based on specific interest and is fully automated. © 2009 DataDirect Networks, Inc. All Rights Reserved.
  • 37. Conclusion • To enable multi-point scientific study data must have attributes of location (site) as well as traditional ACLs. • File systems distributing data must have redundant automation to enable replication over geographies. • Data distribution methods must be simplified to reduce latency, maximize network efficiency allowing improved processing efficiency. © 2009 DataDirect Networks, Inc. All Rights Reserved.
  • 38. Thank You Dave Fellinger dfellinger@ddn.com © 2009 DataDirect Networks, Inc. All Rights Reserved. © 2009 DataDirect Networks, Inc. All Rights Reserved.