News
1/12/2010
10:13 AM
George Crump
George Crump
Commentary
50%
50%

Introduction To Automated Tiering

The concept of multiple tiers of storage has been around for almost as long as there has been storage, but the subject became more discussed in early 2000 when Serial Advanced Technology Attachment (SATA) hard drives began to come to market. They were higher capacity and less expensive than their fibre channel counterparts but not as fast. The question that still plagues storage managers is how to get data to them.

The concept of multiple tiers of storage has been around for almost as long as there has been storage, but the subject became more discussed in early 2000 when Serial Advanced Technology Attachment (SATA) hard drives began to come to market. They were higher capacity and less expensive than their fibre channel counterparts but not as fast. The question that still plagues storage managers is how to get data to them.The need for data movement between tiers of storage has increased as Solid State Disk (SSD) based storage systems have become more mainstream. Now there is a high performance tier in addition to a low cost tier. Thanks to Flash technology SSDs offer enough capacity at a lower price point with amazing performance. The technology, unlike SATA, is not less expensive than fibre drives but it does deliver significant performance advantages. To maximize the SSD investment however requires that they are kept at near 100% capacity utilization but only being utilized by the most active data set. If you are paying a premium for high performance capacity, then you want to make sure that capacity is being fully and correctly utilized.

Even mechanical drives are advancing. The common fiber channel interface on drives is being replaced by Serial Attached SCSI (SAS) interfaces. This new interface standard should offer improved performance, availability and further lower drive costs when using mechanical drives for primary storage.

A new tier of storage is a cloud storage based archive. As we discuss in our Cloud Archive White Paper, using cloud storage as a final resting point for the data set may be a natural extension to an internal disk based archive. Cloud storage is moving beyond the discussion phase and into real deployments. Cloud archive storage is the inverse of SSD. Access to this storage is slower but its capacity is near limitless. Retrieval will be much slower. Ideally the only data you put into the cloud archive is data that you don't think you will need for a long period of time. Understanding your data or having systems that do becomes critical.

The challenge to these distinct tiers or classes of storage is how to move data between them. In the past ILM (Information Lifecycle Management) and HSM (Hierarchical Storage Management) were the proposed solutions. To some extent what held back adoption of these technologies was the complexity of implementation. There was client or server side agents that needed to be developed and implemented for each of the major platforms or operating systems. Each platform had its own file system intricacies to work through and most file systems did not know how to handle data that was moved on them.

Automated tiering takes the data movement decision away from the server or client and places it closer to the storage. This removes the need to develop multiple agents to support multiple file systems and as a result should make data movement more seamless. Automated tiering however can be implemented in several methods; through file virtualization, storage virtualization, smart storage controllers or a cache-like implementation. The granularity of the movement varies between LUN, file or block level migration.

The promise of automated tiering is that it will remove one of the challenges and time consuming tasks from storage managers; data placement. For many organizations it may be the only practical way to fully leverage all the new tiers of storage. We will take a detailed look at the methods and the companies that provide them in a series of upcoming entries.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Five Things Every Business Executive Should Know About Cybersecurity
Don't get lost in security's technical minutiae - a clearer picture of what's at stake can help align business imperatives with technology execution.
Flash Poll
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Dark Reading Strategic Security Report: The Impact of Enterprise Data Breaches
Social engineering, ransomware, and other sophisticated exploits are leading to new IT security compromises every day. Dark Reading's 2016 Strategic Security Survey polled 300 IT and security professionals to get information on breach incidents, the fallout they caused, and how recent events are shaping preparations for inevitable attacks in the coming year. Download this report to get a look at data from the survey and to find out what a breach might mean for your organization.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Security researchers are finding that there's a growing market for the vulnerabilities they discover and persistent conundrum as to the right way to disclose them. Dark Reading editors will speak to experts -- Veracode CTO and co-founder Chris Wysopal and HackerOne co-founder and CTO Alex Rice -- about bug bounties and the expanding market for zero-day security vulnerabilities.