PRO+ Premium Content/Storage

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 8 October 2006

New Ethernet protocols could challenge iSCSI

iSCSI is the user favorite for block-based Ethernet storage. But there are two competing Ethernet protocols--ATA over Ethernet (AoE) and Storage over IP (SoIP)--that may be able to gather enough momentum with home and small business users to overtake iSCSI in the enterprise. AoE and SoIP offer higher speeds without the performance overhead associated with TCP. AoE doesn't use IP at all, but rather the native Ethernet protocol, thus avoiding IP overhead. SoIP works with the User Datagram Protocol (UDP); it gives users the flexibility to assign an IP address to individual storage targets so UDP can communicate with multiple targets concurrently and stripe data across multiple disks for better performance. "Unlike TCP, which puts data in order, UDP can use two additional IP commands--broadcast and multicast," says Ryan Malone, senior director of marketing at Zetera, Irvine, CA. "This allows us to take advantage of UDP's ability to talk to a bunch of IP addresses at the same time." Zetera and Coraid have taken different approaches ...

Access this PRO+ Content for Free!

Features in this issue

  • Survey Says: Users name their 10GbE price

  • The right way to provision storage

    Provisioning storage is still mostly a manual job, but solid planning, including the right interested parties and some improved tools, can help ease the chore. Follow these provisioning best practices to gain greater performance and higher disk utilization.

  • Long-term archiving

    With some legislative requirements mandating data be kept for as long as 70 years, your organization needs an archiving plan that defines what data needs to be kept and why. But don't overlook how you'll restore old data when it needs to be accessed.

  • How to manage encryption keys

    Encryption is an effective way to secure data. But managing encryption keys can be a major undertaking. While there are no encompassing key management tools available yet, some apps can help you keep track of proliferating encryption keys.

Columns in this issue