1 EMC Storage Integration with Vmware Vsphere Best Practices

Total Page:16

File Type:pdf, Size:1020Kb

1 EMC Storage Integration with Vmware Vsphere Best Practices Welcome to EMC Storage Integration with VMware vSphere Best Practices. Click the Notes tab to view text that augments the audio recording. Click the Supporting Materials tab to download a PDF version of this eLearning. Copyright © 1996, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, Data Domain, RSA, EMC Centera, EMC ControlCenter, EMC LifeLine, EMC OnCourse, EMC Proven, EMC Snap, EMC SourceOne, EMC Storage Administrator, Acartus, Access Logix, AdvantEdge, AlphaStor, ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Captiva, Catalog Solution, C‐Clip, Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, ClaimPack, ClaimsEditor, CLARiiON, ClientPak, Codebook Correlation Technology, Common Information Model, Configuration Intelligence, Configuresoft, Connectrix, CopyCross, CopyPoint, Dantz, DatabaseXtender, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, Document Sciences, Documentum, elnput, E‐Lab, EmailXaminer, EmailXtender, Enginuity, eRoom, Event Explorer, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony, Global File Virtualization, Graphic Visualization, Greenplum, HighRoad, HomeBase, InfoMover, Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix, ISIS, Max Retriever, MediaStor, MirrorView, Navisphere, NetWorker, nLayers, OnAlert, OpenScale, PixTools, Powerlink, PowerPath, PowerSnap, QuickScan, Rainfinity, RepliCare, RepliStor, ResourcePak, Retrospect, RSA, the RSA logo, SafeLine, SAN Advisor, SAN Copy, SAN Manager, Smarts, SnapImage, SnapSure, SnapView, SRDF, StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX, TimeFinder, UltraFlex, UltraPoint, UltraScale, Unisphere, VMAX, Vblock, Viewlets, Virtual Matrix, Virtual Matrix Architecture, Virtual Provisioning, VisualSAN, VisualSRM, Voyence, VPLEX, VSAM‐Assist, WebXtender, xPression, xPresso, YottaYotta, the EMC logo, and where information lives, are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. © Copyright 2013 EMC Corporation. All rights reserved. Published in the USA. Revision Date: November 2013 Revision Number: MR‐1WP‐EMCSTORVMWBP Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 1 This course covers the considerations and ramifications of implementing EMC storage arrays with a vSphere vCenter managed, ESXi host environment. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 2 Before addressing the considerations and best practices for implementation of storage in an ESXi environment, we must consider how resources are consumed on ESXi and their overall impact. Storage presentation is considered a single aspect of any ESXi configuration, but another key factor is the storage array connectivity infrastructure. There are many dependencies between all of these aspects, so it is important that we discuss how these seemingly unrelated topics can affect a storage deployment goal. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 3 In lesson one we will explore some of the general environment considerations needed for implementing a VMware solution. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 4 VMware offers a diverse product line so it is important to clarify what is expected in a vSphere offering. VMware features are governed by the license obtained. If a VMware feature or product is not licensed, it will not be supported. In EMC engagements, it is common to expect the ESXi host to have an Enterprise Plus license and support all the features of this license. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 5 I/Os are the major metric by which storage arrays, applications, and interconnect infrastructures are evaluated. These metrics are often documented in Service Level Agreements (SLA), which are goals that have been agreed to and must be achieved and maintained. As storage plays a very large part of any computing solution, there are many aspects that must be considered when implementing these SLAs and defining service requirements of the solution. Some of these considerations include, but are not restricted to: • Connectivity infrastructure • Physical cables • Protocols • Array type • Physical architecture Cache Buses Spinning or solid‐state drives Software enhancements • Disk connectivity interfaces: FC, SAS, SATA Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 6 Prior to focusing on storage array presentation, it is important to consider the storage presentation models supported by VMware. Presenting a virtual machine with local storage is a possibility in most deployments, but not a consideration of this course. When it is used, it can restrict some of the functionality expected in an Enterprise level deployment, e.g., a local storage datastore can only be accessed by one machine and is usually a single point of failure (SPOF) in the environment. Storage array presentation is the more preferred method of storage presentation in an Enterprise environment, as this model is typically designed to meet specific needs of an application specific workload or SLA. However, the final configuration of a solution is not restricted to a single type of configuration and most environments may be comprised of many different aspects both array based and local storage dependent upon the most suitable resolution of the solutions expectations. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 7 With any environment there are many factors affecting the infrastructure. Depending upon the considerations and their importance, the design could change radically from one originally envisioned. The design of any infrastructure is to achieve the highest possible success in meeting the majority of the demands expected. This means that compromise and segmentation of purpose are always factors in design along with the points listed here. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 8 The key points for LUN utilization are: • The choice of RAID level and disk type to match the specific workload proposed for the LUN • Each LUN should only contain a single VMFS datastore to segment workload characteristics of differing Virtual Machines and prevent resource contention. However, if multiple Virtual Machines do access the same VMFS datastore, using disk shares to prioritize virtual machine I/O is recommended. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 9 Any solution can produce various combinations of LUN presentation models. Both large and small LUNs can be presented. One reason to create fewer, larger LUNs is to provide more flexibility to create VMs without storage administrator involvement. Another reason is more flexibility for resizing virtual disks and snapshots and fewer VMFS datastores to manage. A reason to create smaller LUNs is to waste less storage space by building in storage overhead for growth and removing it from the global pool of storage in the array. Smaller LUNs may be preferred if there are many differing performance profiles required in the environment along with varied required RAID level support. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 10 One of the key concerns in any storage array architecture is latency. This always causes performance degradation and should be minimized as much as possible. There are many areas that introduce latency but there are some general rules that can be applied to start reducing the impact of latency. One of the first considerations is the use of Flash drives with the vSphere Flash Infrastructure for host swap files and the use of vSphere Flash Read Cache (vFRC). Another key consideration is the use of storage arrays that make use of vStorage APIs (vStorage APIs for Array Integration (VAAI)). This greatly enhances the performance of any infrastructure by off‐loading operations to native array tools and functionality and frees ESXi resources for other task processing. Copyright © 2013 EMC Corporation. All Rights Reserved. EMC Storage Integration with VMware vSphere Best Practices 11 The final, and possibly the most recognizable storage infrastructure consideration, is overall solution bandwidth. This refers not only to interconnectivity bandwidth, but internal array and server bus bandwidth,
Recommended publications
  • Using the EMC SRDF Adapter for Vmware Site Recovery Manager
    Using the EMC SRDF Adapter for VMware Site Recovery Manager Version 5.0 • SRDF Overview • Installing and Configuring the SRDF SRA • Initiating Test Site Failover Operations • Performing Site Failover/Failback Operations Drew Tonnesen September 2017 VMAX Engineering Copyright © 2017 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Technical Documentation and Advisories section on support.emc.com. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. EMC is now part of the Dell group of companies. Part number H10553.8 2 Using EMC SRDF Adapter for VMware vCenter Site Recovery Manager Contents Preface Chapter 1 Symmetrix Remote Data Facility Introduction ....................................................................................... 14 SRDF overview.................................................................................
    [Show full text]
  • EMC Secure Remote Services 3.18 Site Planning Guide
    EMC® Secure Remote Services Release 3.26 Site Planning Guide REV 01 Copyright © 2018 EMC Corporation. All rights reserved. Published in the USA. Published January 2018 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to Dell EMC Online Support (https://support.emc.com). 2 EMC Secure Remote Services Site Planning Guide CONTENTS Preface Chapter 1 Overview ESRS architecture........................................................................................ 10 ESRS installation options ...................................................................... 10 Other components ................................................................................ 11 Requirements for ESRS customers......................................................... 11 Supported devices.....................................................................................
    [Show full text]
  • Celerra NSX Data Sheet
    DATA SHEET EMC Celerra NSX Series IP Storage Reach new heights of availability and scalability with EMC Celerra NSX Meeting the information-sharing challenge Performance bottlenecks, security issues, and the high cost of data protection and management associated with deploying file servers using general-purpose operating systems become non-issues ® ® The Big Picture with the EMC Celerra NSX. NSX combines commodity CPUs with flexible and sophisticated Data Access in Real Time (DART) file-serving software into a purpose-built, scalable, clustered file server • Ensure no-compromise availability optimized for moving mission-critical data. through integrated advanced clustering, managed as a single device Unparalleled EMC Symmetrix® and CLARiiON® storage technologies, combined with Celerra’s • Receive advanced functionality at no extra impressive I/O system architecture, offer industry-leading availability, scalability, performance, cost with the most comprehensive suite of and ease of management. built-in features • Leverage EMC Celerra’s price/performance With Celerra NSX, you get distributed file services in a centrally managed information storage system. leadership to support large user commu- You can dynamically grow, share, and cost-effectively manage file systems with multi-protocol file nities with an intuitive, GUI-based, single access capabilities. And you take advantage of simultaneous support for NFS, CIFS, and iSCSI proto- point of management for up to eight file server nodes in an advanced clustering cols, concurrently, that
    [Show full text]
  • EMC Solutions Enabler Symmetrix Array Management CLI Version 6.5 Product Guide Contents
    EMC® Solutions Enabler Symmetrix® Array Management CLI Version 6.5 Product Guide P/N 300-002-939 REV A05 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com Copyright © 2005 - 2008 EMC Corporation. All rights reserved. Published March, 2008 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. 2 EMC Solutions Enabler Symmetrix Array Management CLI Version 6.5 Product Guide Contents Preface............................................................................................................................................................... 13 PART 1 Concepts and Procedures Chapter 1 Introduction SYMCLI introduction ........................................................................................................ 18 Symmetrix component overview..................................................................................... 19 Directors
    [Show full text]
  • H8716.2 EMC Symmetrix Vmaxe Storage System, Spec Sheet
    EMC SYMMETRIX VMAXe STORAGE SYSTEM EMC® Symmetrix® VMAXe™ with the Enginuity™ operating environment delivers a multi- controller, scale-out architecture with consolidation and efficiency for the enterprise. As the newest member of the Symmetrix series, VMAXe utilizes the same revolutionary EMC Virtual Matrix Architecture™ as EMC VMAX™ systems. SPECIFICATIONS ARCHITECTURE The Virtual Matrix Architecture enables IT departments to build storage systems that tran- scend the physical constraint of competing array architectures. The architecture allows scal- ing of system resources through common and fully redundant building blocks called VMAXe series engines. A single VMAXe engine provides the complete foundation for a high-availability storage array. Each VMAXe engine contains two Symmetrix VMAXe directors and redundant interfaces to the EMC Virtual Matrix™ interconnect. Each Symmetrix VMAXe director consolidates front-end, global memory, and back-end functions, enabling direct memory access to data for opti- mized I/O operations. Up to four VMAXe engines can be interconnected via a set of multiple active fabrics that provide scalable performance and high availability. VMAXe engines can be added non-disruptively to provide linear scale-out of Symmetrix system resources. A single-engine Symmetrix VMAXe can start with as little as 24 drives, scaling up to four engines supporting 1,080 drives for a maximum usable capacity of up to 1.5 petabytes. VMAXe engine one and VMAXe engine two can support up to 240 drives per engine. VMAXe engines three and four can support up to 300 drives per engine. A fully configured 1,080- drive system is comprised of four integrated system bays and three storage bays.
    [Show full text]
  • Using EMC SRDF Adapter for Vmware Site Recovery Manager
    Using EMC SRDF Adapter for VMware® Site Recovery Manager Best Practices Planning Abstract VMware Site Recovery Manager provides workflow and business continuity and disaster restart process management for VMware virtual infrastructure. The software leverages storage array replication and communicates to the replication management through a well-defined set of specifications. This white paper discusses the best practices for using VMware® Site Recovery Manager with EMC® SRDF® Adapter. September 2008 Abstract VMware Site Recovery Manager provides workflow and business continuity and disaster restart process management for VMware virtual infrastructure. The software leverages storage array replication and communicates to the replication management through a well-defined set of specifications. This white paper discusses the best practices for using VMware® Site Recovery Manager with EMC® SRDF® Adapter. Copyright © 2008 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names,
    [Show full text]
  • Proof, Not Promises: Creating the Trusted Cloud
    EMC’S VISION FOR TRUST IN THE CLOUD Proof, not Promises: Creating the Trusted Cloud EXECUTIVE SUMMARY Clouds and virtualization offer powerful new ways to manage and use digital information, but they also create new complexities for organizations in meeting the fundamental challenge of getting the right information to the right people over an infrastructure that they can trust. Why? Because clouds and virtualization irrevocably change the nature of control and visibility. Infrastructure becomes virtual, not physical. People access infrastructure from devices that are outside of IT’s direct control. Information moves with incredible speed across networks and the cloud, making it hard to know where sensitive information resides. And with an IT infrastructure that is virtual and shared via the cloud, organizations must learn new ways to achieve visibility into risks, threats, and compliance performance. The good news is forward-thinking businesses can clear these hurdles today. The formula for building trust in the cloud is to achieve control over and visibility into the cloud’s infrastructure, identities, and information. The technologies needed to establish this level of cloud control and visibility already exist. Organizations are applying these technologies in creative ways to build trusted clouds that can meet the most rigorous security and compliance requirements while delivering the flexibility, fluidity, and massive scale that hold such business promise for organizations worldwide. EMC PERSpecTIVE THE CHALLENGE Over the decades, IT architecture and platform strategies have evolved from mainframe to client-server to the Web. Still, one of the fundamental goals of IT organizations endures: that is, getting the right information to the right people over a trusted infrastructure so information can be leveraged for business advantage.
    [Show full text]
  • VNX - the STORAGE [R]EVOLUTION a COMPARATIVE APPROACH with OTHER STORAGE PLATFORMS Siva Shankari Chandrasekaran Systems Engineer Tata Consultancy Services
    VNX - THE STORAGE [R]EVOLUTION A COMPARATIVE APPROACH WITH OTHER STORAGE PLATFORMS Siva Shankari Chandrasekaran Systems Engineer Tata Consultancy Services Table of Contents Introduction ................................................................................................................................ 3 Various Data Access Solutions .................................................................................................. 4 Block Level Access................................................................................................................. 4 File Level Access ................................................................................................................... 4 Object-Based Access ............................................................................................................. 4 Various Storage Network Architectures ...................................................................................... 5 Direct Attached Storage ......................................................................................................... 5 Network Attached Storage ...................................................................................................... 6 Storage Area Network ...........................................................................................................11 Unified Storage Infrastructure ...................................................................................................15 What is VNX? ...........................................................................................................................16
    [Show full text]
  • Symmetrix Fundamentals
    Welcome to Symmetrix Fundamentals. Copyright © 1996, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, Data Domain, RSA, EMC Centera, EMC ControlCenter, EMC LifeLine, EMC OnCourse, EMC Proven, EMC Snap, EMC SourceOne, EMC Storage Administrator, Acartus, Access Logix, AdvantEdge, AlphaStor, ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Captiva, Catalog Solution, C-Clip, Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, ClaimPack, ClaimsEditor, CLARiiON, ClientPak, Codebook Correlation Technology, Common Information Model, Configuration Intelligence, Configuresoft, Connectrix, CopyCross, CopyPoint, Dantz, DatabaseXtender, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, Document Sciences, Documentum, elnput, E-Lab, EmailXaminer, EmailXtender, Enginuity, eRoom, Event Explorer, FarPoint, FirstPass, FLARE, FormWare,
    [Show full text]
  • EMC Secure Remote Services 3.18 Technical Description
    DRAFT EMC® Secure Remote Services Release 3.18 Technical Description REV 01 Copyright © 2016 EMC Corporation. All rights reserved. Published in the USA. Published December 2016 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to Dell EMC Online Support (https://support.emc.com). 2 EMC Secure Remote Services Technical Description CONTENTS Preface Chapter 1 EMC Secure Remote Services Introduction................................................................................................ 10 Description ................................................................................................. 11 Remote services benefits ...................................................................... 11 Solution security ..................................................................................
    [Show full text]
  • Application Discovery Manager Administration Guide Vcenter Application Discovery Manager 7.0.0
    Application Discovery Manager Administration Guide vCenter Application Discovery Manager 7.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-000996-00 Application Discovery Manager Administration Guide You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: [email protected] Copyright © 2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc. Contents About This Book 7 1 Overview 9 System Architecture 9 Distributed Appliance with Remote Database 11 Virtual Appliance Solution 11 Virtual Appliance Deployment 11 Mirrored Network Traffic 12 vCollector 12 Mixed Environment 12 Where To Go Next 13 Installation of New or Additional ADM Components 13 Licenses 13 Upgrading ADM 13 Migrating to a New Appliance 13 Security
    [Show full text]
  • Complementarity and Substitutability Of
    BORROW AND BUY: COMPLEMENTARITY AND SUBSTITUTABILITY OF ACQUIRERS’ ALLIANCES AND TECHNOLOGY ACQUISITIONS A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Paul Nary IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY AKS ZAHEER AND ASEEM KAUL, CO-ADVISERS JANUARY 2019 © Paul Nary, 2019 To my parents, who sacrificed so much to give me a better life. i ACKNOWLEDGEMENTS This long journey was only possible because I had the help, support, and love of so many wonderful people. I am grateful to have all of you in my life. I especially cannot possibly express enough gratitude to my parents, Michael and Djenelia, who never doubted me and always supported all of my choices, however imperfect they may have been. Coming to University of Minnesota turned out to be incredibly lucky. I am indebted to faculty members who convinced me to join this PhD program. I am also very fortunate to have convinced Aks Zaheer and Aseem Kaul to be my co-advisors, as I cannot imagine having a better, more complementary pair of mentors. I will always be thankful to them for teaching me all of the intricacies of the field, and setting such high standards for the quality of academic work. They patiently guided me through the process and allowed me to make my own choices, but made sure that I remained on the right trajectory. Throughout the entire experience, they only had my best interests at heart, and for that I will always be thankful. While I started working with Aseem Kaul in my first year, I would have never guessed that he would not only make such a fantastic adviser, but that he would also have a profound impact on my intellectual development as an academic.
    [Show full text]