Tip

Design concepts for storage networks: In-band ESCOM

This column concludes the series on storage networking architectures by defining the "in-band ESCOM" model which can be looked at as a combination of four of the previously defined models. By combining components

Requires Free Membership to View

of the telecom, ESCON and 'in-band' models, a new model emerges. The first two terms, 'ESCON' and 'telecom', are combined to coin a new term, 'ESCOM', which when used in conjunction with 'in-band' forms the 'in-band ESCOM' model.

The telecom architecture forms the outer layer of this model. Servers are connected to this model based upon the strengths they may draw from today's networking models. Quality of Service (QoS), advanced routing protocols, management consoles and advanced networking protocols all come bundled with today's networking architectures. But maybe most important, this model also offers established security methodologies that will become increasingly important in the emerging enterprise storage infrastructure.

The "in-band" appliance creates a new layer between the telecom and ESCON architectures while interconnecting them as well. This appliance serves three major purposes. First, it minimizes one of the telecom's main drawbacks in a storage network, the routing tables. Since all storage traffic may be routed to this device (which can control all storge devices), it simplifies the increasingly complexity found in a large telecom model. Second, it allows all storage to be configured and discovered by the in-band appliance. All storage devices may now be connected to the ESCON model, minimizing or eliminating the current LUN masking and zoning headaches SAN administrators currently face. Finally, it allows organizations to keep their existing infrastructure in place and gradually grow into this environment.

The final piece of this puzzle, the ESCON architecture, serves as the foundational layer to which all storage and tape devices are connected. The ESCON architecture boasts high availability and reliability in conjunction with simplicity of management without introducing the routing, security and management headaches found in the telecom model as this level in the SAN.

This "in-band ESCOM" model presents a powerful new model of connecting disparate storage devices, networking protocols, and operating systems. It offers the appropriate levels of scalability, flexibility, simplicity and security at the different points in the SAN infrastructure. But as important, it allows for the decoupling of various computing disciplines, namely storage administration, network administration and performance monitoring, each highly technical in their own right. With the increasing likelihood that network based virtualization will arise, this model is sure to follow as companies look to use what they have in a manner that both lowers costs and makes the best use of their existing resources.

Read Part I: Design concepts for storage networks

Do you want to see more articles by Jerome Wendt or insights from noted industry observers? Visit the complete Bits & Bytes column library.

About the author


Jerome Wendt is a independent writer and storage analyst specializing in Open Systems storage and storage area network technologies. He currently manages storage and explores new storage technologies for a large organization in this capacity. Jerome may be reached at jerome.wendt@worldnet.att.net.


This was first published in July 2003

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.