AX 100 Piranha Customer Presentation Nov 2004 Dell

  • Slides: 11
Download presentation
AX 100 (“Piranha”) Customer Presentation Nov, 2004 Dell Confidential

AX 100 (“Piranha”) Customer Presentation Nov, 2004 Dell Confidential

D|E AX 100 Software Suite Target Audience • Need for Low Cost Solution –

D|E AX 100 Software Suite Target Audience • Need for Low Cost Solution – Entry Level Price Point • Need for Ease of Use – Single Management web-GUI • Need to achieve Continuous Availability – Continuity of Service solution via Path Failover • Need for Simplified Install – 4 Steps to complete installation • Need for Integrated Solution – Software / Switch / HBA Dell Confidential Enterprise Systems

Configurations • Supported OS’s: W 2 K & W 2 K 3, Linux, Netware

Configurations • Supported OS’s: W 2 K & W 2 K 3, Linux, Netware – Solaris in Release 16 (Targeted August) • HBA’s: QLA 200, LP 982, QLA 2340 • Switches: Brocade 2352 • SAN configurations Dell Confidential – – “Default zoning” to facilitate customer installable SANs – Support for “One hop” “Share Nothing” – Piranhas & CX’s can be in same SAN, but each host must be zoned to one type of array only Enterprise Systems

Navisphere Express • Manage disk arrays • Expand disk array • Assign and remove

Navisphere Express • Manage disk arrays • Expand disk array • Assign and remove hosts • Monitor system and subsystem states • View server details • Manage connections • Manage snapshots • View software versions and upgrade new software Back Dell Confidential Enterprise Systems

4 Steps to Initialize the AX 100 After auto-detection, select the system to be

4 Steps to Initialize the AX 100 After auto-detection, select the system to be initialized Click “Next” Enter the IP address of the storage processors and storage domain information Note: This system is single SP – No IP for SP “B” Dell Confidential Enterprise Systems

4 Steps to Initialize the AX 100 Provide a Name Allows set security policy

4 Steps to Initialize the AX 100 Provide a Name Allows set security policy at time of installation Passwords can be set at a later time if necessary Prior to “Finish” a confirmation appears for verification. You have successfully Installed your AX 100 Back Dell Confidential Enterprise Systems

Guided Volume Management • 3 steps to create a “Disk Array” • Displays available

Guided Volume Management • 3 steps to create a “Disk Array” • Displays available disk for use • RAID 5 support Back Dell Confidential Enterprise Systems

Snap. View/Express Fast, Economical Pointer-Based Copies for Backup • Eliminate backup window issues –

Snap. View/Express Fast, Economical Pointer-Based Copies for Backup • Eliminate backup window issues – – Production Server Creates snapshot of production for backup purposes Applications stay online during backup • Moderate service levels at best economics for backup and recovery – – – Fast snapshots from production volume Takes a fraction of production space Remains “connected” to the production volume • Creates snapshots instantly and are immediately available – – – Stores changed data from a defined point in time Production Information Backup Snapshot 1: 00 a. m. Backup Server Utilizes production for unchanged data Available for backup and other purposes Dell Confidential Pointer-based “copy” Enterprise Systems

Automatic Path Failover • Automatic detection of inoperative paths • Redistribute I/O requests to

Automatic Path Failover • Automatic detection of inoperative paths • Redistribute I/O requests to active paths • Failover is transparent to applications • Automatic detection of restored paths Intel Server Apps e-mail Apps Power. Path Query e-mail e-mail Query Billing G/L Query Billing e-mail G/L AIX 100 Back Dell Confidential Enterprise Systems

Proven Power Dell Confidential Enterprise Systems

Proven Power Dell Confidential Enterprise Systems

Dell | EMC Entry Array Comparisons AX 100 SC CX 300 Max LUNs 256

Dell | EMC Entry Array Comparisons AX 100 SC CX 300 Max LUNs 256 512 Max LUN Size 2 TB Max LUNs per RAID Group 128 128 Max LUNs per Storage Group 256 256 8 8 256 12 12 16 4 4 60 Max Drives 12 12 60 Min Drives 4 3 5 16 8 -- Max front-end Ports per SP 2 FC Max back-end Ports per SP 12 SATA 2 FC 1 1 3 512 MB 1 GB TBD 256 MB 473 MB Max Storage Groups Max Drives per RAID Group Max RAID Groups Max host ports per array Max Inter-switch Links (ISL hops) Physical Memory size(s) per SP Max Cache Size Dell Confidential Enterprise Systems