Air Force bases combine storage-area networks

The two bases that form the Air Force's 45th Space Wing are separated by about 25 miles in Florida's "hurricane alley."

However, that distance and rough weather will soon stop adversely affecting the group's data storage and backup capabilities as it moves to a consolidated storage-area network (SAN).

Patrick Air Force Base and Cape Canaveral Air Force Station, like so many other organizations, were server-centric in terms of data storage, said Glenn Exline, manager of advanced technologies at the 45th Space Wing.

"Every time we needed more storage on a network, we'd throw another server at it," but that leads to increased overhead and vulnerabilities, Exline said. "By decreasing the number of servers, you decrease the number of potential access points and the need for more security patches and updates."

The 45th Space Wing now operates clustered servers and dual-fabric SANs at each location. The clusters maintain service continuity in the case of server failure, and the SANs facilitate backup. Within the next four months, however, the SANs will be combined, he said.

The 45th Space Wing handles support for all unmanned vehicles launched from Cape Canaveral. The group also manages range operations including telemetry, safety, weather and radar.

The wing, which began 18 months ago with 82 servers, is now down to 50 and that number will dwindle to 35 when the consolidated SAN is operational, Exline said, adding that the benefits of consolidation, such as increased storage capacity and system uptime, began almost immediately.

The wing's SAN environment includes Brocade Communication Systems' SilkWorm 3800 switches, Computer Associates International Inc.'s BrightStor SAN Manager and Enterprise Backup, EMC Corp.'s Clariion storage arrays, Dell Computer Corp.'s PowerEdge 2650 servers, and Exabyte Corp.'s X80-FC tape libraries. The equipment was procured at a total cost of $1.3 million, Exline said.

The Air Force is looking to add some advanced security features from Brocade. The company's Secure Fabric OS is a stand-alone product that runs on its switches and features policy-based access control to the entire SAN, strong authentication and encryption, and configuration management, said Kamy Kavianian, director of product marketing for network security at Brocade.

***

SAN payback

The Air Force's 45th Space Wing is already reaping the benefits of a phased network storage consolidation. Under the system, the Air Force has:

* Increased storage capacity by 600 percent.

* Increased system uptime.

* Reduced the backup window from 14 hours to about two hours.

* Reduced off-site tape storage from 120 tapes to 50 tapes.

* Centralized storage management for efficiency and for enhanced disaster preparedness and recovery capabilities.

RELATE LINKS

"Don't let downtime get you down" [Federal Computer Week, June 16, 2003]

"Center explores upper reaches of SANs" [Federal Computer Week, Dec. 9, 2002]

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group