Solved

HP SAN

Posted on 2012-12-24
5
256 Views
Last Modified: 2012-12-26
I need information or list of questions to ask vendor that installed our medical Imaging (PACS) on How their SAN is configured for optimization that would provide optimal performance.

Medical Imaging department is not satisfied with their system and it has been a chronic issue.

Back end bottleneck have been identified as database, application and SAN. No Network latency. All have been shown to be related to application delays.
0
Comment
Question by:YRMC_Infrastructure
  • 2
  • 2
5 Comments
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
ID: 38719281
have you accurate measurements of all the particulars ? They need hard figures not 'it seems slow'. Where exactly are the bottlenecks? Unless you can answer these questions then contacting the vendor will be a waste of time as they will ask for the same details.
0
 

Author Comment

by:YRMC_Infrastructure
ID: 38719676
I am attaching our finding for review and suggesting on how to come up with a tacticle approach with the PACS vendor.
Analysis.doc
0
 
LVL 55

Accepted Solution

by:
andyalder earned 500 total points
ID: 38720029
One would assume that you have less disk IOPS available than before since computers are 4 times as fast as 3 years ago but disks are the same speed as before. What were the specs of the old systems including disk layout and what do you have now in place of it? Presumably people weren't complaining about poor preformance previously.
0
 
LVL 78

Expert Comment

by:David Johnson, CD, MVP
ID: 38720258
connection resets - check the cabling.  Run a performance test on the SAN, are you storing the images in a database? if so then check the database performance. Solarwinds has a lot of free trial programs that can assist you.
0
 
LVL 55

Expert Comment

by:andyalder
ID: 38721395
Please ask admin to unaccept answer, you haven't given us enough info yet and I was simply asking for more spec on your old and new system.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
How to update Firmware and Bios in Dell Equalogic PS6000 Arrays and Hard Disks firmware update.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now