What it means
Configurable for
Primary or Remote
Volume
Volume characteristic
The data protection level indicates the number and
configuration of data copies created on storage systems
in the cluster.
There are six levels of data protection
•
Network RAID-0 (None)
•
Network RAID-5 (Single Parity)
•
Network RAID-6 (Dual Parity)
•
Network RAID-10 (2–Way Mirror)
•
Network RAID-10+1 (3–Way Mirror)
•
Network RAID-10+2 (4–Way Mirror)
The default value = Network RAID-10. For information
about the data protection levels, see “
Planning data
protection
” on page 190.
Both
Data Protection Level
•
Primary volumes are used for data storage.
•
Remote volumes are used for configuring Remote
Copy for business continuance, backup and recovery,
or data mining/migration.
Default value = Primary
Both
Type
•
Fully provisioned volumes are the same size on the
SAN as the size presented to the application server.
•
Thinly provisioned volumes have less space reserved
on the SAN than the size presented to the application
server. As data is stored on the volume, the SAN/iQ
software automatically increases the amount of space
allocated on the SAN.
The default value = Full for the following data protection
levels.
•
Network RAID-0 (None)
•
Network RAID-10 (2–Way Mirror)
•
Network RAID-10+1 (3–Way Mirror)
•
Network RAID-10+2 (4–Way Mirror)
The default value = Thin for the following data protection
levels.
•
Network RAID-5 (Single Parity)
•
Network RAID-6 (Dual Parity)
Thin provisioning is the best practice configuration for
Network RAID-5 and Network RAID-6 volumes.
NOTE:
The SAN/iQ software allocates space as needed.
However, thin provisioning carries the risk that, if
all warnings are ignored, an application server will
fail a write because the SAN has run out of disk
space.
Primary
Provisioning
P4000 SAN Solution user guide
207
Summary of Contents for StorageWorks P4000 Series
Page 24: ...24 ...
Page 38: ...Getting started 38 ...
Page 52: ...Working with storage systems 52 ...
Page 78: ...Storage Configuration Disk RAID and Disk Management 78 ...
Page 110: ...Managing the network 110 ...
Page 120: ...Administrative users and groups 120 ...
Page 232: ...Using snapshots 232 ...
Page 256: ...Working with scripting 256 ...
Page 268: ...Controlling server access to volumes 268 ...
Page 298: ...Registering advanced features 298 ...
Page 322: ...Replacing disks reference 322 ...
Page 324: ...Third party licenses 324 ...