Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

2/10/2011
12:59 PM
George Crump
George Crump
Commentary
50%
50%

Does Scale Out Storage Have A Dark Future?

Scale Out Storage, also called Clustered Storage or Grid Storage, are storage systems that claim to achieve near limitless scale and performance by adding nodes to a storage platform when you need more performance or capacity. The storage industry, not necessarily the user community, is stumbling over itself to have a product offering in this space. There is a lot to like about the scale out storage model but it does have its downsides.

Scale Out Storage, also called Clustered Storage or Grid Storage, are storage systems that claim to achieve near limitless scale and performance by adding nodes to a storage platform when you need more performance or capacity. The storage industry, not necessarily the user community, is stumbling over itself to have a product offering in this space. There is a lot to like about the scale out storage model but it does have its downsides.Scale out storage in general comes in two configurations. One is a tightly coupled cluster where data is written across the nodes. In other words a file is broken up into some number of segments depending on node count and practicality of segmentation. Then each segment of that file is written on some number of nodes. Also a parity of some sort is typically generated and you end up with basically a file level RAID protection. These scale out systems tend to be more focused on primary storage and deliver scalable performance. In theory as you add more nodes you should see better performance and the segmented file is delivered from all the nodes simultaneously.

The second type is the loosely coupled cluster where files stay intact and reside complete on one particular node in the cluster. Typically additional copies are written on other nodes for data protection. A master metadata index knows what nodes each file and its copies reside on. The user is simply pointing to a master mount point. This type of storage, while it can perform well, does not tend to get slotted into a high performance environment. Unlike the tightly coupled systems described above the performance of the node you are accessing is the key factor in what type of performance you get. It does however seem to be received well by cloud storage providers that are looking for competitive prices and capacity.

Both of these configurations offer a pay as you grow type of scalability that sounds appealing. Scale out storage makes a lot of sense for a wide range of applications but have done particularly well in file centric environments as well as storage for server virtualization.

A weakness of scale out storage may be the node itself. These nodes are typically off the shelf, 1U or 2U servers designed to hold storage. A simple configuration might be a two processor box with two or four cores and 4 drives for storage. As the Intel and AMD roadmaps continue to roll out we are seeing faster and faster CPUs not slower ones. Also the capacity per drive is becoming larger and larger. The concern, especially in the tightly coupled configuration, is too much CPU power per node and too much capacity. While you may be scaling processing power with storage capacity you may only need to scale capacity and you may end up with a lot of near idle processing.

As we discussed in our recent article "Top Criteria For MSP Storage" data centers are looking for ways to increase floor space efficiency. That means that every rack unit used has to provide the best possible balance of capacity and performance, something that scale out storage may struggle with as processing speeds continue to increase. There are steps that scale out storage solutions can take to increase this efficiency level. This also gives scale up storage solutions an opportunity to mix in some scale out techniques into their scale up systems to create that balance. We will explore how both sides of the aisle may address this in upcoming entries.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21196
PUBLISHED: 2021-04-09
Heap buffer overflow in TabStrip in Google Chrome on Windows prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21197
PUBLISHED: 2021-04-09
Heap buffer overflow in TabStrip in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.