Hybrid Storage Solutions
Hybrid Storage Solutions
OR
• It is a technology that transform hardware into software.
Virtualization
• Virtualization is the process of using special software on physical machine
to create virtual machines.
• This special software is called “Hypervisor”.
• For example, if you were to partition a basic hard drive to create two hard
drives, then they would be two ‘virtualized hard drives,’ as the hardware is
technically a single hard drive that was digitally separated into two
• A virtual machine is called Guest and physical machine is called Host.
• We can create and run many virtual machines a we like as log as
CPU,RAM and other resources allow.
• All the virtual machines share the same resources of the host, yet each
virtual machine works independently.
• A virtual machine is little more than a file sitting on a hard drive, but to
users a virtual machine appears and acts no differently from a physical
computer but also a different type CPU storage drive or NIC than its host.
Differences
• Firmware usually Firmware is a term for a piece of software that is
installed on a hardware of the device in order to make it run properly.
• The firmware, once installed, is usually changed infrequently and only
through updates from the manufacturer.
• Ex: BIOS check of system, firmware in storage devices (hard disks, DVD
drives, flash storage) , television remote control is an example of an
engineered product that contains firmware. The firmware monitors the
buttons, controls the LEDs,
• Type 1: which run directly on top of host’s hardware that’s why they are
called “Bare Metal” hypervisor. They control the hardware and virtual
machines. Firmware is installed directly on hardware of system.
•
• Storage Virtualization
• In Storage virtualization the servers are in an array which are managed with
a centralized virtual storage system. Storage virtualization is generally
classified into two categories ie.
• Block – It replaces controllers and takes over at the disk level & works
before the file system exists.
• File – The server that uses the storage must have the software installed on
it in order to enable file-level usage.
• Data Virtualization
• Data virtualization enables to decrease the data errors and workloads. It
also enables to simply manipulate data, where is it physically located and
how is it formatted.
• Desktop Virtualization
• Desktop virtualization lets you run multiple desktop operating systems,
each in its own VM on the same computer.
• There are two types of desktop virtualization:
• Virtual desktop infrastructure (VDI) runs multiple desktops in VMs on a
central server and streams them to users who log in on thin client devices.
In this way, VDI lets an organization provide its users access to variety of
OSs from any device, without installing OSs on any device.
• Local desktop virtualization runs a hypervisor on a local computer,
enabling the user to run one or more additional OSs on that computer and
switch from one OS to another as needed without changing anything about
the primary OS.
• Application virtualization
• Application virtualization runs application software without installing it
directly on the user’s OS. This differs from complete desktop virtualization
(mentioned above) because only the application runs in a virtual
environment—the OS on the end user’s device runs as usual. There are
three types of application virtualization:
• Local application virtualization: The entire application runs on the
endpoint device but runs in a runtime environment instead of on the native
hardware.
• Application streaming: The application lives on a server which sends
small components of the software to run on the end user's device when
needed.
• Server-based application virtualization: The application runs entirely on
a server that sends only its user interface to the client device.
• Memory Virtualization
• Memory Virtualization is the process of aggregating & pooling the
complete Random-Access Memory (RAM) resources from the network
grid or cluster into a single memory pool. It provides a greater memory
capacity and the disk drive also serves as an extension of the main memory.
• Implementations
• Application-level integration: Applications running on connected
computers directly connected to the memory pool through an API or the
file system.
• Operating System Level Integration – The operating system first
connects to the memory pool, and makes that pooled memory available to
applications.
• Server virtualization
• Server virtualization is the process of dividing a physical server into
multiple unique and isolated virtual servers by means of a software
application. Each virtual server can run its own operating systems
independently.
• Key Benefits of Server Virtualization:
• Higher server ability
• Cheaper operating costs
• Eliminate server complexity
• Increased application performance
• Deploy workload quicker
Types of Server Virtualization
• Full Virtualization – In it, the complete simulation of the actual hardware takes
place to allow software to run an unmodified guest OS. Example : VMWare ESX
server uses this method
• Advantages:
• No modification to Guest operating system required.
• Limitations:
• Complex
• Slower due to emulation
• Installation of new device driver difficult.
• Advantages:
• No modification to guest operating system required.
• Very less hypervisor overhead
• Limitations:
• Hardware support Required
• Data center virtualization:
• Data center virtualization
abstracts most of a data center’s
hardware into software,
effectively enabling an
administrator to divide a single
physical data center into multiple
virtual data centers for different
clients.
• Each client can access its own
infrastructure as a service (IaaS),
which would run on the same
underlying physical hardware.
Virtual data centers offer an easy
on-ramp into cloud-based
computing, letting a company
quickly set up a complete data
center environment without
purchasing infrastructure
hardware.
Backup and Recovery
Backup and Recovery
• Data backup and recovery is the process of backing
up your data in the event of a loss and setting up secure
systems that allow you to recover your data as a result.
Disadvantage :
• Usually requires more media space than either differential or
incremental.
• Takes a long time to recover the full backup to a new disk.
• Incremental Backup: This operation results in the copying of only
that data that has changed since your last backup operation.
• A backup application will record and keep track of the time and
date that all backup operations occur.
• Disadvantage:
– Much more difficult to manage
• Differential Backup: Similar to an incremental type, this backup
will copy all changed data from a previous episode but every time it
runs, it continues to copy all the data changed since the stated
previous full backup (not necessarily full backup).
▪ Thumb drives
- Inexpensive, quick, larger storage capacity than CDs/DVDs,
months to years of storage
▪ Network storage
- complete external storage, access from any computer
with internet connection, very secure, large-capacity and
long-term storage, expensive
After backup
▪ Complete a data restore
- Run a restore to return backed-up files to their original
locations. Do this on a regular basis to ensure the system
is actually working.
➢ Cloud backups
• Mostly, these appliances sit idle and are used for the
purpose of creating backups. They perform diligently
when accessed to restore data.
• Cons:
• Proximity Risk
• High Security Risk
• Cost to scale and manage
• Cloud backups — With the accelerating cloud
adoption, backups in the cloud are not a new concept.
• Cons:
• Rely on third party
• Risk of cloud outages
• Hybrid backup solutions —Hybrid backup solutions
combine both on-premises and cloud based backup
technologies.
• Public cloud:
– Resources on demand
– No capital expenditure required
– No infrastructure management