Você está na página 1de 69

STORAGE

By: Samiran Mondal

1/27/2014

AGENDA

DAS,SAN,NAS. SAN Component RAID Group VRAID Mirroring Snapshot Replication Backup

1/27/2014

Direct Attached Storage (DAS)

Storage is dedicated to individual server SAS, iSCSI, FC Advantages Dedicated storage resource Low cost

1/27/2014

DAS Problem

.Storage lost when server is replaced .Data migration required .Under utilized storage cant be shared .Storage must be managed as individual entities .Non centralized management and data protection

1/27/2014

Storage Networking Alternatives


NAS Appliance
Client

Array

Array

Array

Unix
AS/400

LAN TCP/IP Filesystem Protocol


NFS/ CIFS/ HTTP

FC Switch
Servers Client LAN/ TCPIP

Windows

NAS

Clients

SAN

1/27/2014

Network Attached Storage

1/27/2014

What is SAN ?

A Storage Area Network (SAN) is a dedicated high speed network of directly connected storage devices designed to move data to an Independent host or distributed hosts

IPStor Client
Sun Cobalt LX50 Sun Blade 1000 Sun Blade 1000 maXXan41 maXXan42

maXXan SA100f

maXXan43 maXXan44

FC switch

Brocade 3800 SANBox2-16

Sun StorEdge disk array


9970 3510 6120

local

remote

1/27/2014

Inside SAN

Protocol Converter FC IP

FC

IP

Bridge
ATM

SCSI

SSA

SAN-WAN-SAN

HUB

Switches

FC-AL loop implemented as star

Any-to-Any switched Fabric

1/27/2014

SAN vs NAS

SAN More involved network design performance High IT skill requirement More complex to install More expensive Highly Scaleable Block level I/O Better performance NAS Easy addition to existing network Less expensive Difficult to scale Handles File I/O for NFS, CIFS Reasonable

1/27/2014

1/27/2014

10

What is Virtualisation

Is an abstraction over the real object An entity which doesn't exist by itself; but act upon a real object

1/27/2014

11

Storage Virtualization

Refers to the process of dividing and aggregating available storage devices according to their capacity, into "virtual volumes, without regard for the physical layout or the topology of the actual storage elements (i.e., disk drives, RAID subsystems etc)

Virtual volumes are presented to their client's operating systems as abstraction of the physical devices and are used by these operating systems as if they were distinct disk drives or separate storage subsystems.

1/27/2014

12

Need for storage virtualization


Dynamic data/storage relocation Improved performance Better mechanism for backing up data Data protection at different levels, according to the requirement

1/27/2014

13

Virtualization

Hosts

Host

SAN Today

SAN Tomorrow

Disk Storage Disk Storage

1/27/2014

14

Virtualization Products

RAID Multi Device Drivers Volume Manager Clustered Volume Manager NAS and SAN related software

1/27/2014

15

IO

Database Application Filesystem API File I/O to IP

Database Application Block I/O Block I/O to FCP

Database Application Block I/O Block I/O to IP

IP Networks Protocols (NFS, CIFS)

FC Network Protocol (SCSI)

IP Networks Protocol (iSCSI)

IP to File I/O

FCP to Block I/O

I/P to Block I/O

File I/O to Block I/O


Pooled Storage

Polled Storage

Polled Storage

1/27/2014

16

Mirroring-Synchronous

CLIENT

Data blocks sent from Client

All SCSI writes are written to both SAN Resources Write process is synchronous

server Data blocks written to two different SAN Resources

server requires acknowledgement from both sides of mirror


Response time as slow as slowest disks No interruption to processing if one side fails

SAN Resource SAN Resource

PRIMARY

MIRROR

1/27/2014

17

Mirroring-Asynchronous

CLIENT Data blocks sent from Client server Data blocks written to cache and applications acknowledged Data blocks written to disk

All SCSI writes are written to a mirror "cache" area on disk

Applications are acknowledged when data is written to cache area


Blocks moved from cache area to main drives as secondary process Response time of mirror disk does not matter

Mirror side can be at great distance from primary


No interruption to processing if one side fails

SAN Resource

SAN Resource

PRIMARY

MIRROR
18

1/27/2014

Snapshot Copy
How does it work?

An existing SAN Resource is selected for a snapshot copy or "disk cloning" Server takes a snapshot of the SAN Resource in order to create a point-in-time image

Snapshot uses copy-on-write method Point-in-time is used to insure data integrity


Snapshot image is copied to another SAN Resource

Can be on the same or different storage device


End result is 100% same size copy of original Designated scratch area is used to store data changes while the copy process is ongoing

Can be on same or different storage device

1/27/2014

19

Snapshot Copy

server Processing with Clients continues

SNAP! Virtual Drive

Can be assigned to other Clients independently Copy

Point-in-Time Image Scratch area

1/27/2014

20

Replication

Copies data from one server to another over any IP connection Designed as a disaster recovery application Does not require same storage device on each side Works in conjunction with Snapshot Agents

1/27/2014

21

Replication

How does it work


3 1 Deltas 3 4

snapshot
2 Primary server Diff Map A Replication server Storage media

Diff Map B

1. Primary initiates a snapshot to capture an instance of the deltas on the primary. This is an image frozen in time, called differential Map A.

2. After the first snap, the Primary begins recording all new changes in a new differential map, Map B. 3. The contents of Map A are sent to the Replication server and written to the storage media.

4. When the replication process is acknowledged, the Primary destroys Diff Map A. 5. At the next replication, Diff Map B is snapped and becomes Map A. A new Map B is then created to record new changes.

1/27/2014

22

Backup methods

Direct tape attachment to host LAN Backup LAN Free Backup Tape Library virtualization

1/27/2014

23

Zero Impact Backup

Backup software runs on the server only Requires backup software that recognizes device interfaces No software required on application servers Perform snapshot-based copies directly from disk to tape Extremely high speed backups Point-in-time data consistency Can integrate with Database Agents for transactional integrity

1/27/2014

24

Zero Impact Backup Topology

App Server

App Server

App Server

1. Backup software
sees virtual drives as raw devices. Backup job is started on raw device interface(s) - a device open request is issued. 2. Application takes a snapshot of the virtual drive(s) 3. Using the snapshot image, application copies entire virtual drive(s) from disk to tape.
= virtual drives

SWITCH Server Backup Software 3 DISK TAPE 2

1/27/2014

25

Data Protection Mechanism

RAID
Striping is a fundamental concept in RAID A method of concatenation multiple drives into one logical storage unit Multiple Levels Each level has cost/performance/fault tolerance benefits May be implemented by software or hardware Hardware is best for overall system performance

1/27/2014

26

RAID-0 Stripping

Advantages High data transfer rate Low cost

Disadvantages No redundancy if drive fails Data is lost

Applications Video Production & Editing Picture Editing Any Application requiring High-Bandwidth

1/27/2014

27

RAID 1 Mirroring

Advantages Reliability Availability No rebuild of data is necessary upon failure

Disadvantages High cost of additional drives

Applications Accounting Financial Any Application requiring very high availability

1/27/2014

28

RAID 10 Mirroring and Stripping

Advantages Same fault tolerance as RAID 1 High I/O rates, approaching RAID 0
.. 5 4 3 2 1 0 ..

Disadvantages Expensive

Raid engine

0 3

1 4

2 5

Applications Database Server requiring high performance and fault tolerance


2 5

0 3

0 3

1 4

1 4

2 5

1/27/2014

29

RAID 3 Parity Drive

Advantages High data transfer rate For long sequential records Reliability Availability

Disadvantages Not good for short records Not good for random I/O Write bottleneck

Applications Video production and live streaming Any application requiring high throughput

1/27/2014

30

RAID 5 Distributed Parity Stripe

Advantages Short records or random I/O Many concurrent I/O Reliability Availability

Disadvantages Not good for long records Writes are demanding Cache used to improve writes

Applications File and application servers Database servers Intranet servers

1/27/2014

31

RAID 6 Double distributed Parity

Same as RAID 5 and differences are here there will be Two parity disk, minimum 4 disk to create RAID 6 and it Can sustain double disk failure

1/27/2014

32

RAID Comparison Chart

RAID 0: Fastest and most efficient level but offers no fault tolerance RAID 1 or 10 : Performance-critical, fault tolerant environments, but requires 2X storage RAID 3: data intensive environments which access long sequential records, does not allow multiple I/O operations to be overlapped RAID 5: Best choice for multi-user environments which are not write performance sensitive. RAID 6: provides better data protection than RAID 5 and cheaper than RAID1 or 10

1/27/2014

33

Traditional RAID and VRAID

SCSI Bus 1

SCSI Bus 2

SCSI Bus 3

SCSI Bus 4

SCSI Bus 5

SCSI Bus 6

RAID

RAID 5 Volume

Tedious, manual volume placement and management

RAID 0 Volume

RAID 1 Volume

Vraid

Logical

Vraid 5 Virtual Disk

Vraid 0 Virtual Disk

Vraid 1 Virtual Disk

Physical

1/27/2014

34

Traditional Disk Array Approach

RAID Controller
Spare Spare

RAID Level (0 or 1 or 5)

1/27/2014

35

Traditional Disk Array Approach

Host presentation

0 1 2
RAID Controller
Spare

LUN 0 LUN 1

Spare

LUN 2 RAID Level

1/27/2014

36

Traditional Disk Array Approach

Host presentation

0 1 2 3 4 5 6 7
RAID Controller
LUN 6 LUN 7 LUN 5 LUN 4 LUN 0 LUN 1
Spare

LUN 3

Spare

LUN 2

1/27/2014

37

Where is the I/O Bottleneck ?


Is it todays disk controllers? Is it cache? Is it Fibre Switches? Is it HBAs? Is it the Disk Drive? YES Its still the drive.

HOW does HP overcome this Bottleneck ?????? VIRTUALIZATION


1/27/2014 38

Virtualization How we do it
Linux W2K cluster HP-UX TRU64 OVMS Solaris AIX Netware LUNs
100GB 200GB

SAN Fabric

SAN Fabric

100GB

200GB

Virtual Disks

1-16 Disk Groups 8-240 disks per disk group

Disk Group 1

Up to 1024 Virtual Disks (LUNs)

Un-grouped disks
1/27/2014 39

Virtualization How we do it
Linux W2K cluster HP-UX TRU64 OVMS Solaris AIX Netware LUNs
100GB 200GB

SAN Fabric

SAN Fabric

100GB

200GB

Virtual Disks Add disks to a Disk Group non disruptively VDisk re-levels across the extra spindles

Disk Group 1

Un-grouped disks
1/27/2014 40

Virtualization How we do it
Linux W2K cluster HP-UX TRU64 OVMS Solaris AIX Netware LUNs
100GB 200GB

SAN Fabric

SAN Fabric

100GB

200GB

Virtual Disks Add disks to a Disk Group non disruptively LUN re-levels across the extra spindles

Disk Group 1

Un-grouped disks
1/27/2014 41

Virtualization How we do it
Linux W2K cluster HP-UX TRU64 OVMS Solaris AIX Netware LUNs
100GB 200GB

SAN Fabric

SAN Fabric

100GB

200GB

Virtual Disks Remove disks non disruptively from the Disk Group

Disk Group 1

Un-grouped disks
1/27/2014 42

SAS Drive

SAS Serial Attached SCSI A serial communication protocol designed for transfer of SCSI commands and data to and from devices over point-to-point interconnections
Key Benefits New roadmap with industry-wide acceptance Significant performance enhancements 3-Gbps SAS x4 wide ports Cost equivalent to parallel SCSI Freedom from 15 drive maximum per SCSI channel

1/27/2014

43

iSCSI

iSCSI - internet Small Computer System Interface A network protocol that enables transmission of SCSI commands and data over an IP-based network usually via an Ethernet interface

Key Benefits: Low cost Less complexity Extensive knowledge base expertise in every IT organization Flexible configuration topologies Extensive reach with no distance limitations Future performance 1Gb/s today with roadmap for 10Gb/s and beyond
1/27/2014 44

Fiber Channel

FC Fibre Channel
A serial networking interface that supports the transmission of upper level protocols including SCSI command sets and data over fiber optic or copper cables

Key Benefits
Scalable supports up to 16 million addresses. Distance 10,000 meters maximum cabling length High bandwidth low latency and high IOPs Investment protection auto-negotiating link speeds allowing for seamless integration into an existing 1Gb/s or 2 Gb/s environment Congestion free with credit-based flow control delivering data as fast as the destination buffer is able to receive it.45

1/27/2014

1/27/2014

46

SAN Topology

Point to point Between two nodes (host bus adapters = NICs) All bandwidth available Arbitrated loop (FC-AL f-kal) Storage devices are all on a logical loop Bandwidth is shared (up to 126 devices) Logical loop topologies can be realised using hubs Switched aka switching fabric Allows multiple simultaneous connections ( potentially more bandwidth) Frames can be circuit switched or routed Support for 16 million devices
1/27/2014 47

Topology
Node A Node B

Point-to-Point Topology

Array Array Array Array Array

Array

Array

Array

MultiSwitch Single Fabric


1/27/2014

Single Switch Fabric

48

Topology wise Limitations

Topology Point to Point Arbitrated Loop Switched Fabric

Number of Devices 2 Up to 126 Up to 16 million

1/27/2014

49

Brocade Switch Explorer

1/27/2014

50

Brocade Switch Options

1/27/2014

51

Switch Port Admin

1/27/2014

52

Brocade switch Network configuration

1/27/2014

53

Zoning

Zoning allows you to define specific groups of fabric-connected devices to ensure that the access between them is controlled. Be aware that devices that are not configured in a zone will not be accessible. Zoning enables you to partition a storage area network (SAN) into logical groups of devices that can access each other. For example, you could partition a SAN into two zones, winzone and unixzone, so that the Windows servers and storage do not interact with UNIX servers and storage. Zones can be configured dynamically. They can vary in size, depending on the number of fabric-connected devices, and devices can belong to more than one zone. Because zone members can access only other members of the same zone, a device not included in a zone is not available to members of that zone. When using a mixed fabric that is, a fabric containing two or more switches running different fabric operating systems you should use the switch with the highest Fabric OS level to perform zoning tasks. When zone or Fabric Assist (FA) zone members are specified by fabric location only (domain, area), or by device name only (node name or port WWN), zone boundaries are enforced at the hardware level and the zone is referred to as a hard zone. When zone members are specified by fabric location (domain, area) and other members of the same zone are specified by device name (node name or port WWN), zone enforcement depends on Name Server lookups, and the zone is referred to as a soft zone.

1/27/2014

54

Zone admin

1/27/2014

55

Zoning Steps

Define zone aliases to establish groupings. Add zone members. Place zones into one or more zone configurations. Enable one of the zone configurations (only one can be enabled at a time).

1/27/2014

56

Default Zoning

We have to set default mode otherwise every member Will talk to each other and that will be a chaos/Broadcast /RSCN
1/27/2014 57

Alias Tab

1/27/2014

58

Creating Alias

1/27/2014

59

Adding members to alias

1/27/2014

60

Adding members

1/27/2014

61

Zoning config

1/27/2014

62

Creating new zone

1/27/2014

63

Zoning contd..

1/27/2014

64

Saving zone database

1/27/2014

65

Zone config contd..

1/27/2014

66

Which configuration to enable

1/27/2014

67

Saving zone config

1/27/2014

68

EVA 4000 - Architecture


Management Server (Win)

Fabric 1

Fabric 2

2 HSV Controllers

HSV200 controller 1

HSV200 controller 2

1 to 4 Disk enclosures 8 to 56 FC Disks

1/27/2014

69

Você também pode gostar