Automated Performance Control in a Virtual Distributed Storage System

Total Page:16

File Type:pdf, Size:1020Kb

Automated Performance Control in a Virtual Distributed Storage System Automated Performance Control in a Virtual Distributed Storage System H. Howie Huang 1, Andrew S. Grimshaw Department of Computer Science University of Virginia [email protected] Abstract on the fact that large hard disks have been prolifically distributed on PCs at the edge of the network, thanks to Storage demand in large organizations has grown rapidly falling prices. We refer to storage on desktop rapidly in the last few decades. In this paper, we machines as desktop storage. The abundance of describe Storage@desk, a new virtual distributed desktop storage, unfortunately, does not lead to great storage system that utilizes a large number of utilization - a typical desktop machine in an exemplar distributed machines to provide storage services with organization contains hundreds of gigabytes with more quality of service guarantees. We present the than half left unused [1]. Further, resources available Storage@desk architecture and core components. The on desktop machines are in abundance: (1) dual-core machines on which Storage@desk relies exist in an CPUs are appearing on desktop machines with their environment that is unreliable and dynamic. We utilize CPUs having clock rates over 3 GHz; (2) RAM of 1GB replication to provide high levels of availability and or 2GB is not unusual; (3) 1 Gigabit Ethernet has reliability. Our evaluation reveals that Storage@desk become a common network interface on new PCs, achieves better read and write performance compared replacing fast Ethernet. In general, desktop users do not to CIFS. As Storage@desk serves clients and fully utilize the computing power, disk space, and applications on shared storage resources, it is crucial network bandwidth at all times [1-3], which presents an to ensure predictable storage access even when the opportunity to take advantage of the abundant yet idle workloads are unknown a priori. To this end, we take a resources. control theoretic approach for automated performance Storage@desk will not only provide a useful storage control in Storage@desk. Given a reference value, the service, but one with quality of service (QoS) feedback controller is able to effectively regulate guarantees in terms of capacity, life time, availability, service requests to virtual storage resources under reliability, and performance. As the machines on which various scenarios. Storage@desk relies exist in an environment that is unreliable and dynamic, we utilize replication to 1. Introduction provide high levels of availability and reliability. Because Storage@desk utilizes shared storage Storage demand in large organizations has grown resources, predictable storage access even when the rapidly in the last few decades. Over the years workloads are unknown a priori is challenging. We distributed storage – network-attached storage (NAS), take a control theoretic approach for automated and storage area network (SAN) – has emerged as a performance control in Storage@desk. Feedback standard practice to provide high performance, fault control has shown success on performance control of resilience, and data integrity. We refer to this as various computer systems, including replica managed storage. However, depending on the quality, management system [4], email server [5], web server the vendor, discounts, and the target market, managed [6], and real-time systems [7]. Given a reference value, storage remains expensive despite the hardware cost of the feedback controller can effectively regulate access storage falling every year. There has been a lot of bandwidth to virtual storage resources. interest in researching new methods to relieve the The remainder of this paper has the following increasing storage demand. In this paper, we present structure. We introduce the background materials in Storage@desk, a new virtual distributed storage Section 2. Storage@desk architecture and core system, which has the ability to harvest underutilized components are described in Section 3. We discuss the storage resources in the existing information evaluation results in Section 4. Finally, we present the infrastructure of large organizations. This idea is based related work and conclusion in Section 5 and 6, respectively. 1 2. Background applications (e.g., video-on-demand) demand high performance services of great urgency, while others Storage@desk is motivated by three key (e.g., text processing) may tolerate less perfect observations: strong demand for disk storage, abundant performance. How to achieve predictable performance yet idle resources on desktop machines, and various is a challenging task for two reasons. First, in essence performance requirements for storage services. Storage@desk is a virtual storage system shared by a large number of clients and applications. It would be 2.1 Strong demand for disk storage preferable to isolate one client from others; otherwise an I/O surge from one client would negatively affect Data play a critical role in enterprise and scientific others sharing the same storage resource. Second, the computing. According to a study from Berkeley [8], the workloads are generally unknown a priori . Without amount of new information produced worldwide is accurate information on access patterns, human estimated to grow about 30% a year since 1999, with 5 regulation is inherently slow in reaction to changes in million terabytes in 2002. More than 90% of that data the workload. To address this problem, we will design was estimated to be stored on magnetic media (e.g., a feedback controller for automated performance hard disks, tapes), and hard disks accounted for most control in Storage@desk. storage, nearly 2 million terabytes. As data volumes continue to explode, there is always a consistently 3 Storage@desk architecture strong demand for cost effective, massive-scale disk storage. Storage@desk achieves storage virtualization by utilizing the iSCSI protocol [11]. We choose iSCSI 2.2 Abundant yet idle resources on desktop because this IETF standard can transport the SCSI machines commands and data over TCP/IP networks. From the perspective of a client, Storage@desk storage appears Today, the advent of hard drive technology is as a virtual volume that consists of an array of fixed- capable of packing hundreds of gigabytes onto size blocks. Therefore, the clients can transparently inexpensive hard disks, and these large disks are access data in a uniform, standard-based fashion. A pervasive. The same Berkeley study estimated that client treats virtual volumes as locally-attached hard 90% of 9.9 million terabytes of disk storage shipped in drives, isolating from the distributed resource 2002, or 9 million terabytes, sits in PCs, workstations, management behind the scene. Once logging on to a and laptops. Clearly, PCs are holding the greatest virtual volume, the client can make partitions, create amount of storage resources even though those various file systems (e.g., NTFS, ext2, ext3), make resources are distributed and managed individually. directories and subdirectories, and perform file Unfortunately, the utilization of desktop storage is operations (e.g., create, copy, move, modify, delete). low. Our 2005 study [1] of 729 desktop machines In Storage@desk architecture presented in Fig. 1, revealed that on average 62% of a machine’s raw disk iSCSI servers (including controllers on them) capacity was unused. Previous research studies [9, 10] implement the iSCSI layer and serve the requests; showed that the unused portion of disk space from storage machines as resource providers save data on 4800 desktop machines was 49%, 50%, and 58% local hard drives; and one or more databases maintain respectively in 1998, 1999, and 2000. These numbers all the metadata in the system. indicate a clear uptrend of unused disk space on an Upon receiving a client request, the iSCSI server will average machine over the years. As this trend continues need to contact the databases for the necessary in the future, we see Storage@desk is a good metadata if they are not up to date. Otherwise, the complement to managed storage by making the best use iSCSI server may directly forward the request to the of unutilized desktop storage in large organizations. corresponding storage machines to read and write the blocks. 2.3 Various performance requirements for In this section, we present databases and metadata management in Section 3.1, storage machines in Storage Service Section 3.2, and iSCSI servers in Section 3.3. We discuss the feedback controller in Section 3.4. In an organization, different clients have theirs own performance requirements. Furthermore, a single client may have different performance requirements for multiple applications at various times. Some 2 Client Services and many physical chunks. The mapping table reflects Storage this relationship by mapping a replica of a virtual Machine (3.2) chunk to a physical chunk. The number of mappings iSCSI Server (3.3) Client for a virtual volume is the multiplication of the number Controller (3.4) Storage of virtual chunks and the replication degree. With the Machine mapping from the mapping table, an iSCSI server can iSCSI Server locate physical chunks on one or many storage Client Controller Storage machines to read and write blocks in a virtual volume. Machine iSCSI iSCSI iSCSI Server Volume Controller Storage Volume ID Name Replication Degree Virtual Chunks QoS Client Machine iSCSI Server Controller VolumeVolume Mapping DatabaseDatabase (3.1)(3.1) Volume Replica Virtual Chunk Machine Physical Chunk Fig. 1. Storage@desk architecture.
Recommended publications
  • Chapter 12: Mass-Storage Systems
    Chapter 12: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID Structure Disk Attachment Stable-Storage Implementation Tertiary Storage Devices Operating System Issues Performance Issues Objectives Describe the physical structure of secondary and tertiary storage devices and the resulting effects on the uses of the devices Explain the performance characteristics of mass-storage devices Discuss operating-system services provided for mass storage, including RAID and HSM Overview of Mass Storage Structure Magnetic disks provide bulk of secondary storage of modern computers Drives rotate at 60 to 200 times per second Transfer rate is rate at which data flow between drive and computer Positioning time (random-access time) is time to move disk arm to desired cylinder (seek time) and time for desired sector to rotate under the disk head (rotational latency) Head crash results from disk head making contact with the disk surface That’s bad Disks can be removable Drive attached to computer via I/O bus Busses vary, including EIDE, ATA, SATA, USB, Fibre Channel, SCSI Host controller in computer uses bus to talk to disk controller built into drive or storage array Moving-head Disk Mechanism Overview of Mass Storage Structure (Cont.) Magnetic tape Was early secondary-storage medium Relatively permanent and holds large quantities of data Access time slow Random access ~1000 times slower than disk Mainly used for backup, storage of infrequently-used data, transfer medium between systems Kept in spool and wound or rewound past read-write head Once data under head, transfer rates comparable to disk 20-200GB typical storage Common technologies are 4mm, 8mm, 19mm, LTO-2 and SDLT Disk Structure Disk drives are addressed as large 1-dimensional arrays of logical blocks, where the logical block is the smallest unit of transfer.
    [Show full text]
  • Chapter 16 Disk Storage, Basic File Structures, Hashing, and Modern Storage
    Chapter 16 Disk Storage, Basic File Structures, Hashing, and Modern Storage - Databases are stored as files of records stored on disks - Physical database file structures - Physical levels of three schema architecture 1 - The collection of data in a DB must be stored on some storage medium. The DBMS software can retrieve, update, and process this data as needed - Storage media forms a hierarchy 2 -primary, secondary, tertiary, etc.. - offline storage, archiving databases (larger capacity, less cost, slower access, not directly accessible by CPU) Memory Hierarchies and Storage Devices - Cache, static RAM (Prefetch, Pipeline) - Dynamic RAM (main memory( Secondary and Tertiary Storage -mass storage (magnetic disks, CD, DVD (measured in KB, MB, TB, PB - programs are in main memory (DRAM) -permanent databases reside in secondary storage - main memory buffers are used to read and write to secondary storage - Flash memory: non volatile, NAND and NOR flash based - Optical disks: CDs (700MB) and DVDs (4.5 – 15GB), Blue Ray (54GB) - Magnetic Tapes and Juke Boxes Depending upon the intended use and application requirements, data is kept in one or more levels of hierarchy 3 Storage Organization of Database -Large amount of data that must persist for a long period of time (called persistent data) - parts of this data are accessed and processed repeatedly during the storage period - transient data during the period of execution - most DBs are stored on secondary storage (magnetic disks) - DB is too large to fit in main memory - permanent loss on disk is less likely - less cost on disk than primary storage 4 5 6 - A range of cylinders have the same number of sectors per arc.
    [Show full text]
  • Olympus Optical Disc Archiving Systems & Discstor 900 Optical
    Olympus Optical Disc Archiving Systems & DiscStor 900 Optical Disc Storage System Solution Overview All Pro Solutions, Inc. | 1351 E. Black Street, Rock Hill, SC 29730 USA | Tel: +1.803.980.4141 | Web: www.allprosolutions.com | Email: [email protected] The Company – All Pro Solutions, Inc. – Leading manufacturer of automated disc duplicating, printing & publishing systems. – Started in 1996 manufacturing floppy disk duplication systems. – Family-owned and operated. – In South Carolina since 2009. – Provides services like document scanning, imaging, converting. – Expanded into data storage and archiving industry. – Whatever the problem, we find a solution. All Pro Solutions, Inc. | 1351 E. Black Street, Rock Hill, SC 29730 USA | Tel: +1.803.980.4141 | Web: www.allprosolutions.com | Email: [email protected] The Challenge Worldwide Corporate Data Growth Unstructured text Structured data Source: IDC The Digital Universe 2010 80% of Corporate Data is Unstructured File Data Active Less Active Inactive Hot Cold 10% Warm 20% 70% All Pro Solutions, Inc. | 1351 E. Black Street, Rock Hill, SC 29730 USA | Tel: +1.803.980.4141 | Web: www.allprosolutions.com | Email: [email protected] The Solution Blu-Ray Disc – The ideal media for long-term archival • Longevity • Capacity - Extendable • Security • Removability • Data Migration • Accessibility • Compliance • Compatibility • Green Technology • Power Consumption Networked Client Workstations LAN Primary Network Servers All Pro Solutions, Inc. | 1351 E. Black Street, Rock Hill, SC 29730 USA | Tel: +1.803.980.4141 | Web: www.allprosolutions.com | Email: [email protected] The Solution Blu-Ray Disc – The ideal media for long-term archival • Longevity • Capacity - Extendable • Security • Removability • Data Migration • Accessibility • Compliance • Compatibility • Green Technology • Power Consumption Networked Client Workstations Olympus Archiving System LAN DiscStor 900 Storage System Primary Network Servers All Pro Solutions, Inc.
    [Show full text]
  • Secure Data Storage – White Paper Storage Technologies 2008
    1 Secure Data Storage – White Paper Storage Technologies 2008 Secure Data Storage - An overview of storage technology - Long time archiving from extensive data supplies requires more then only big storage capacity to be economical. Different requirements need different solutions! A technology comparison repays. Author: Dr. Klaus Engelhardt Dr. K. Engelhardt 2 Secure Data Storage – White Paper Storage Technologies 2008 Secure Data Storage - An overview of storage technology - Author: Dr. Klaus Engelhardt Audit-compliant storage of large amounts of data is a key task in the modern business world. It is a mistake to see this task merely as a matter of storage technology. Instead, companies must take account of essential strategic and economic parameters as well as legal regulations. Often one single technology alone is not sufficient to cover all needs. Thus storage management is seldom a question of one solution verses another, but a combination of solutions to achieve the best possible result. This can frequently be seen in the overly narrow emphasis in many projects on hard disk-based solutions, an approach that is heavily promoted in advertising, and one that imprudently neglects the considerable application benefits of optical storage media (as well as those of tape-based solutions). This overly simplistic perspective has caused many professional users, particularly in the field of long-term archiving, to encounter unnecessary technical difficulties and economic consequences. Even a simple energy efficiency analysis would provide many users with helpful insights. Within the ongoing energy debate there is a simple truth: it is one thing to talk about ‘green IT’, but finding and implementing a solution is a completely different matter.
    [Show full text]
  • Archiving Online Data to Optical Disk
    ARCHIVING ONLINE DATA TO OPTICAL DISK By J. L. Porter, J. L. Kiesler, and D. A. Stedfast U.S. GEOLOGICAL SURVEY Open-File Report 90-575 Reston, Virginia 1990 U.S. DEPARTMENT OF THE INTERIOR MANUEL LUJAN, JR., Secretary U.S. GEOLOGICAL SURVEY Dallas L. Peck, Director For additional information Copies of this report can be write to: purchased from: Chief, Distributed Information System U.S. Geological Survey U.S. Geological Survey Books and Open-File Reports Section Mail Stop 445 Federal Center, Bldg. 810 12201 Sunrise Valley Drive Box 25425 Reston, Virginia 22092 Denver, Colorado 80225 CONTENTS Page Abstract ............................................................. 1 Introduction ......................................................... 2 Types of optical storage ............................................... 2 Storage media costs and alternative media used for data archival. ......... 3 Comparisons of storage media ......................................... 3 Magnetic compared to optical media ............................... 3 Compact disk read-only memory compared to write-once/read many media ................................... 6 Erasable compared to write-once/read many media ................. 7 Paper and microfiche compared to optical media .................... 8 Advantages of write-once/read-many optical storage ..................... 8 Archival procedure and results ........................................ 9 Summary ........................................................... 13 References ..........................................................
    [Show full text]
  • The Future of Data Storage Technologies
    International Technology Research Institute World Technology (WTEC) Division WTEC Panel Report on The Future of Data Storage Technologies Sadik C. Esener (Panel Co-Chair) Mark H. Kryder (Panel Co-Chair) William D. Doyle Marvin Keshner Masud Mansuripur David A. Thompson June 1999 International Technology Research Institute R.D. Shelton, Director Geoffrey M. Holdridge, WTEC Division Director and ITRI Series Editor 4501 North Charles Street Baltimore, Maryland 21210-2699 WTEC Panel on the Future of Data Storage Technologies Sponsored by the National Science Foundation, Defense Advanced Research Projects Agency and National Institute of Standards and Technology of the United States government. Dr. Sadik C. Esener (Co-Chair) Dr. Marvin Keshner Dr. David A. Thompson Prof. of Electrical and Computer Director, Information Storage IBM Fellow Engineering & Material Sciences Laboratory Research Division Dept. of Electrical & Computer Hewlett-Packard Laboratories International Business Machines Engineering 1501 Page Mill Road Corporation University of California, San Diego Palo Alto, CA 94304-1126 Almaden Research Center 9500 Gilman Drive Mail Stop K01/802 La Jolla, CA 92093-0407 Dr. Masud Mansuripur 650 Harry Road Optical Science Center San Jose, CA 95120-6099 Dr. Mark H. Kryder (Co-Chair) University of Arizona Director, Data Storage Systems Center Tucson, AZ 85721 Carnegie Mellon University Roberts Engineering Hall, Rm. 348 Pittsburgh, PA 15213-3890 Dr. William D. Doyle Director, MINT Center University of Alabama Box 870209 Tuscaloosa, AL 35487-0209 INTERNATIONAL TECHNOLOGY RESEARCH INSTITUTE World Technology (WTEC) Division WTEC at Loyola College (previously known as the Japanese Technology Evaluation Center, JTEC) provides assessments of foreign research and development in selected technologies under a cooperative agreement with the National Science Foundation (NSF).
    [Show full text]
  • Digital Preservation Guide: 3.5-Inch Floppy Disks Caralie Heinrichs And
    DIGITAL PRESERVATION GUIDE: 3.5-Inch Floppy Disks Digital Preservation Guide: 3.5-Inch Floppy Disks Caralie Heinrichs and Emilie Vandal ISI 6354 University of Ottawa Jada Watson Friday, December 13, 2019 DIGITAL PRESERVATION GUIDE 2 Table of Contents Introduction ................................................................................................................................................. 3 History of the Floppy Disk ......................................................................................................................... 3 Where, when, and by whom was it developed? 3 Why was it developed? 4 How Does a 3.5-inch Floppy Disk Work? ................................................................................................. 5 Major parts of a floppy disk 5 Writing data on a floppy disk 7 Preservation and Digitization Challenges ................................................................................................. 8 Physical damage and degradation 8 Hardware and software obsolescence 9 Best Practices ............................................................................................................................................. 10 Storage conditions 10 Description and documentation 10 Creating a disk image 11 Ensuring authenticity: Write blockers 11 Ensuring reliability: Sustainability of the disk image file format 12 Metadata 12 Virus scanning 13 Ensuring integrity: checksums 13 Identifying personal or sensitive information 13 Best practices: Use of hardware and software 14 Hardware
    [Show full text]
  • CS100: Introduction to Computer Science
    In-class Exercise: CS100: Introduction to n What is a flip-flop? n What are the properties of flip-flops? Computer Science n Draw a simple flip-flop circuit? Lecture 3: Data Storage -- Mass storage & representing information Review: bits, their storage and main memory Mass Storage or Secondary Storage n Bits n Magnetic disks n Boolean operations n CDs n Gates n DVDs n Flip-flops (store a single bit) n Magnetic tapes n Main memory (RAM) n Flash drives q Cell, Byte, Address Mass Storage or Secondary Storage Mass Storage Systems n On-line versus off-line n Magnetic Systems q Online - connected and readily available to the q Hard Disk machine q Floppy Disk q Offline - human intervention required q Tape n Typically larger than main memory n Optical Systems n Typically less volatile than main memory q CD n Typically slower than main memory q DVD n Flash Drives 1 Figure 1.9 A magnetic disk storage Magnetic Disks system n Floppy disk q Low capacity n 3.5 inch diskettes 1.44MB q A single plastic disk n Hard Disk system q High capacity systems q Multiple disks mounted on a spindle, multiple read/write heads move in unison n Cylinder: a set of tracks n Platter : a flat circular disk q Heads do not tough the surface of disks Measuring the Performance of Hard Disk Capacity of Hard Disk Systems Systems n (1) seek time n 5MB (1956 by IBM) q The time to move heads from one track to another n 20MB (1980s) n (2) rotation delay n 1 GB (1990s) q Half the time required for the disk to make a complete rotation n 20 GB – 768 GB (3/4) (2006) n (3) access time
    [Show full text]
  • Unit 5: Memory Organizations
    Memory Organizations Unit 5: Memory Organizations Introduction This unit considers the organization of a computer's memory system. The characteristics of the most important storage technologies are described in detail. Basically memories are classified as main memory and secondary memory. Main memory with many different categories are described in Lesson 1. Lesson 2 focuses the secondary memory including the details of floppy disks and hard disks. Lesson 1: Main Memory 1.1 Learning Objectives On completion of this lesson you will be able to : • describe the memory organization • distinguish between ROM, RAM, PROM, EEPROM and • other primary memory elements. 1.2 Organization Computer systems combine binary digits to form groups called words. The size of the word varies from system to system. Table 5.1 illustrates the current word sizes most commonly used with the various computer systems. Two decades ago, IBM introduced their 8-bit PC. This was Memory Organization followed a few years later by the 16-bit PC AT microcomputer, and already it has been replaced with 32- and 64-bit systems. The machine with increased word size is generally faster because it can process more bits of information in the same time span. The current trend is in the direction of the larger word size. Microcomputer main memories are generally made up of many individual chips and perform different functions. The ROM, RAM, Several types of semi- PROM, and EEPROM memories are used in connection with the conductor memories. primary memory of a microcomputers. The main memory generally store computer words as multiple of bytes; each byte consisting of eight bits.
    [Show full text]
  • ETERNUS DX60/DX80 Disk Storage System User Guide
    Preface Fujitsu would like to thank you for purchasing our ETERNUS DX60/DX80 Disk storage system. The ETERNUS DX60/DX80 Disk storage system is designed to be connected to a Fujitsu (PRIMEQUEST, PRIMERGY, or SPARC Enterprise) or other server. This guide introduces the user to the ETERNUS DX60/DX80 Disk storage system (referred to as just "ETERNUS DX60/DX80" in the remainder of this manual), and explains the regular checks and maintenance required. Please carefully review the information outlined in this manual. Third Edition October 2009 Applicable Environment The ETERNUS DX60/DX80 was designed and manufactured with user safety in mind. When using the ETERNUS DX60/DX80, follow the handling instructions, placement and cautionary notes listed in this guide. If used beyond the limits described, the users may be at risk of personal injury and/or material damage. Using this Manual The manuals provided with the ETERNUS DX60/DX80 contain important information regarding safe usage. Please read these manuals carefully before using the ETERNUS DX60/DX80. Pay special atten- tion to "ETERNUS DX60/DX80 Disk storage system Safety Precautions", and understand the contents thoroughly before connecting. Keep these manuals in a safe place for future reference. Fujitsu pays careful attention to the safe use of its products to prevent user injury and/or material damage. To use the ETERNUS DX60/DX80 properly, please follow the instructions in this man- ual. P3AM-3042-03ENZ0 ETERNUS DX60/DX80 Disk storage system User Guide 3 Copyright 2009 FUJITSU LIMITED Preface
    [Show full text]
  • Disk Storage Access with DB2 for Z/OS
    Redbooks Paper Paolo Bruni John Iczkovits Disk storage access with DB2 for z/OS Disk storage has changed rapidly over the past few years with the delivery of new functions and improved performance. DB2® has made many changes to keep pace and make use of the disk improvements: DB2 integrates with the storage management software and continues to deliver synergy with FICON® (fiber connector) channels and disk storage features. DB2 uses Parallel Access Volume and Multiple Allegiance features of the IBM® TotalStorage® Enterprise Storage Server® (ESS) and DS8000™. FlashCopy® V2 helps increase the availability of your data while running the CHECK INDEX SHRLEVEL(CHANGE) utility. DB2 integrates with z/OS® 1.5 and later to deliver the system point-in-time recovery capability, a solution applicable to recovery, disaster recovery, or environment cloning needs. ESS and DS8000 FlashCopy are used for DB2 BACKUP and RESTORE SYSTEM utilities, which implement the solution. Larger control interval sizes help performance with table space scans, and resolve some data integrity issues. Striping is an effective way of increasing sequential throughput by spreading control intervals across multiple devices. The MIDAW function, new with the z9™-109 server, improves FICON performance by reducing channel utilization and increasing throughput for parallel access streams. In this IBM Redpaper, we explore several of these features and the improved synergy in recent versions up to DB2 for z/OS Version 8. We cover the following topics: Disk hardware architecture Disk functions SMS DSNZPARMs relating to disk storage management Utilities and FlashCopy The MIDAW facility: improved channel architecture © Copyright IBM Corp.
    [Show full text]
  • Hard Disk Drive Specifications Models: 2R015H1 & 2R010H1
    Hard Disk Drive Specifications Models: 2R015H1 & 2R010H1 P/N:1525/rev. A This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein – which will be incorporated in revised editions of the publication. Maxtor may make changes or improvements in the product(s) described in this publication at any time and without notice. Copyright © 2001 Maxtor Corporation. All rights reserved. Maxtor®, MaxFax® and No Quibble Service® are registered trademarks of Maxtor Corporation. Other brands or products are trademarks or registered trademarks of their respective holders. Corporate Headquarters 510 Cottonwood Drive Milpitas, California 95035 Tel: 408-432-1700 Fax: 408-432-4510 Research and Development Center 2190 Miller Drive Longmont, Colorado 80501 Tel: 303-651-6000 Fax: 303-678-2165 Before You Begin Thank you for your interest in Maxtor hard drives. This manual provides technical information for OEM engineers and systems integrators regarding the installation and use of Maxtor hard drives. Drive repair should be performed only at an authorized repair center. For repair information, contact the Maxtor Customer Service Center at 800- 2MAXTOR or 408-922-2085. Before unpacking the hard drive, please review Sections 1 through 4. CAUTION Maxtor hard drives are precision products. Failure to follow these precautions and guidelines outlined here may lead to product failure, damage and invalidation of all warranties. 1 BEFORE unpacking or handling a drive, take all proper electro-static discharge (ESD) precautions, including personnel and equipment grounding. Stand-alone drives are sensitive to ESD damage. 2 BEFORE removing drives from their packing material, allow them to reach room temperature.
    [Show full text]