EXCLUSIVE: Dell EqualLogic PS5000XV

Editor's Choice
Price
£23,710

The appliance uses three watermarks where the minimum size is 10 per cent of the virtual volume. When the volume is 95 per cent full the system starts throttling back I/O performance to provide administrators enough time to increase the volume size. Once you reach the critical watermark the volume will be placed offline.

The management console is well designed, making key functions such as group, storage pool and volume creation that much easier. Usefully, you can view all groups from the same console and selecting a member appliance enables you to see details of its hardware components. As you add more members to your groups existing data will be automatically distributed across them all and removing one will cause resident data to be moved to remaining members before it is released. Access restrictions are also configured during volume creation, where you can limit iSCSI access by CHAP authentication, IP address or initiator name.

Volume snapshots provide point in time backup copies and are set up during volume creation. You decide how much space should be set aside for them and at any time you can promote snapshots as new volumes. A thin provisioned volume will have its snapshots and replicas thinly provisioned as well and you can also swap on the fly between classic and thin provisioned volumes as well.

Dell's replication technology offers fault tolerance and disaster recovery as snapshots of selected volumes are stored in other groups called replication partners. During setup you can choose one-way replication to another group, bi-directional replication between groups or designate one group as a central location to which multiple groups can be replicated. If a volume gets lost or damaged you just clone a copy of the replicated volume and promote it as a new volume.

Advertisement
Advertisement - Article continues below

For testing we connected the test appliance to the lab's Gigabit network using all three ports on the primary controller and created a fourteen drive RAID-10 member array with two drives as hot-standbys. Within this we created three 50GB partitions and limited target access to our test servers by their IP addresses. All servers were running Windows Server 2003 R2 along with the latest version of Microsoft's freely available iSCSI initiator.

Starting with a Boston Supermicro dual 3GHz Xeon 5160 server we logged on to the first virtual volume and ran Iometer configured with four disk workers, 64KB sequential read transfer requests and 100 outstanding I/Os, where it reported a very impressive raw read throughput of 113MB/sec. With a second Boston dual 3GHz Xeon 5160 server logged onto the second volume we saw Iometer report a cumulative throughput of 225MB/sec.

Adding a third server logged in to another dedicated volume caused a minor amount of contention with each Iometer instance dropping to between 96MB/sec and 98MB/sec. Nevertheless, this panned out to a cumulative throughput of 292MB/sec - only a shade off Dell's claimed sustained maximum bandwidth of 300MB/sec.

The addition of the thin provisioning and replication features gives Dell's PS family of iSCSI appliances what it needs to make it a viable proposition in the enterprise. The PS5000XV clearly shows the potential of iSCSI at this level and its combination of a high storage capacity, quality fault tolerance, top performance and ease of expansion makes IP SANs much more appealing than costly and complex FC SANs.

Verdict

Dell's newly acquired EqualLogic family of appliances offers a quality range of IP SAN features and the PS5000XV has expansion and high performance at the top of the agenda.

Chassis: 3U rack chassis

Hard disks: 16 x 146GB Seagate Cheetah 15K.5 SAS hard disks in hot-swap carriers

RAID levels: Supports RAID5, 10 and 50

PSU: 2 x 450W hot-plug power supplies

CPU: 2 x controller units each (650MHz Broadcom BCM1250 dual-core 64-bit MIPS processors)

Memory: 2GB cache memory, 256MB CompactFlash cards

Ports: RJ-45 serial port, 3 x 1000BaseT Gigabit

Other: Battery backup pack

Management: CLI and web browser management

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

4 Nov 2019
Visit/strategy/28115/the-pros-and-cons-of-net-neutrality
Business strategy

The pros and cons of net neutrality

4 Nov 2019
Visit/domain-name-system-dns/34842/microsoft-embraces-dns-over-https-to-secure-the-web
Domain Name System (DNS)

Microsoft embraces DNS over HTTPS to secure the web

19 Nov 2019
Visit/social-media/34844/can-wikipedia-founders-social-network-really-challenge-facebook
social media

Can Wikipedia founder's social network really challenge Facebook?

19 Nov 2019