Escolar Documentos
Profissional Documentos
Cultura Documentos
1/27/2014
AGENDA
DAS,SAN,NAS. SAN Component RAID Group VRAID Mirroring Snapshot Replication Backup
1/27/2014
Storage is dedicated to individual server SAS, iSCSI, FC Advantages Dedicated storage resource Low cost
1/27/2014
DAS Problem
.Storage lost when server is replaced .Data migration required .Under utilized storage cant be shared .Storage must be managed as individual entities .Non centralized management and data protection
1/27/2014
Array
Array
Array
Unix
AS/400
FC Switch
Servers Client LAN/ TCPIP
Windows
NAS
Clients
SAN
1/27/2014
1/27/2014
What is SAN ?
A Storage Area Network (SAN) is a dedicated high speed network of directly connected storage devices designed to move data to an Independent host or distributed hosts
IPStor Client
Sun Cobalt LX50 Sun Blade 1000 Sun Blade 1000 maXXan41 maXXan42
maXXan SA100f
maXXan43 maXXan44
FC switch
local
remote
1/27/2014
Inside SAN
Protocol Converter FC IP
FC
IP
Bridge
ATM
SCSI
SSA
SAN-WAN-SAN
HUB
Switches
1/27/2014
SAN vs NAS
SAN More involved network design performance High IT skill requirement More complex to install More expensive Highly Scaleable Block level I/O Better performance NAS Easy addition to existing network Less expensive Difficult to scale Handles File I/O for NFS, CIFS Reasonable
1/27/2014
1/27/2014
10
What is Virtualisation
Is an abstraction over the real object An entity which doesn't exist by itself; but act upon a real object
1/27/2014
11
Storage Virtualization
Refers to the process of dividing and aggregating available storage devices according to their capacity, into "virtual volumes, without regard for the physical layout or the topology of the actual storage elements (i.e., disk drives, RAID subsystems etc)
Virtual volumes are presented to their client's operating systems as abstraction of the physical devices and are used by these operating systems as if they were distinct disk drives or separate storage subsystems.
1/27/2014
12
Dynamic data/storage relocation Improved performance Better mechanism for backing up data Data protection at different levels, according to the requirement
1/27/2014
13
Virtualization
Hosts
Host
SAN Today
SAN Tomorrow
1/27/2014
14
Virtualization Products
RAID Multi Device Drivers Volume Manager Clustered Volume Manager NAS and SAN related software
1/27/2014
15
IO
IP to File I/O
Polled Storage
Polled Storage
1/27/2014
16
Mirroring-Synchronous
CLIENT
All SCSI writes are written to both SAN Resources Write process is synchronous
PRIMARY
MIRROR
1/27/2014
17
Mirroring-Asynchronous
CLIENT Data blocks sent from Client server Data blocks written to cache and applications acknowledged Data blocks written to disk
SAN Resource
SAN Resource
PRIMARY
MIRROR
18
1/27/2014
Snapshot Copy
How does it work?
An existing SAN Resource is selected for a snapshot copy or "disk cloning" Server takes a snapshot of the SAN Resource in order to create a point-in-time image
1/27/2014
19
Snapshot Copy
1/27/2014
20
Replication
Copies data from one server to another over any IP connection Designed as a disaster recovery application Does not require same storage device on each side Works in conjunction with Snapshot Agents
1/27/2014
21
Replication
snapshot
2 Primary server Diff Map A Replication server Storage media
Diff Map B
1. Primary initiates a snapshot to capture an instance of the deltas on the primary. This is an image frozen in time, called differential Map A.
2. After the first snap, the Primary begins recording all new changes in a new differential map, Map B. 3. The contents of Map A are sent to the Replication server and written to the storage media.
4. When the replication process is acknowledged, the Primary destroys Diff Map A. 5. At the next replication, Diff Map B is snapped and becomes Map A. A new Map B is then created to record new changes.
1/27/2014
22
Backup methods
Direct tape attachment to host LAN Backup LAN Free Backup Tape Library virtualization
1/27/2014
23
Backup software runs on the server only Requires backup software that recognizes device interfaces No software required on application servers Perform snapshot-based copies directly from disk to tape Extremely high speed backups Point-in-time data consistency Can integrate with Database Agents for transactional integrity
1/27/2014
24
App Server
App Server
App Server
1. Backup software
sees virtual drives as raw devices. Backup job is started on raw device interface(s) - a device open request is issued. 2. Application takes a snapshot of the virtual drive(s) 3. Using the snapshot image, application copies entire virtual drive(s) from disk to tape.
= virtual drives
1/27/2014
25
RAID
Striping is a fundamental concept in RAID A method of concatenation multiple drives into one logical storage unit Multiple Levels Each level has cost/performance/fault tolerance benefits May be implemented by software or hardware Hardware is best for overall system performance
1/27/2014
26
RAID-0 Stripping
Applications Video Production & Editing Picture Editing Any Application requiring High-Bandwidth
1/27/2014
27
RAID 1 Mirroring
1/27/2014
28
Advantages Same fault tolerance as RAID 1 High I/O rates, approaching RAID 0
.. 5 4 3 2 1 0 ..
Disadvantages Expensive
Raid engine
0 3
1 4
2 5
0 3
0 3
1 4
1 4
2 5
1/27/2014
29
Advantages High data transfer rate For long sequential records Reliability Availability
Disadvantages Not good for short records Not good for random I/O Write bottleneck
Applications Video production and live streaming Any application requiring high throughput
1/27/2014
30
Advantages Short records or random I/O Many concurrent I/O Reliability Availability
Disadvantages Not good for long records Writes are demanding Cache used to improve writes
1/27/2014
31
Same as RAID 5 and differences are here there will be Two parity disk, minimum 4 disk to create RAID 6 and it Can sustain double disk failure
1/27/2014
32
RAID 0: Fastest and most efficient level but offers no fault tolerance RAID 1 or 10 : Performance-critical, fault tolerant environments, but requires 2X storage RAID 3: data intensive environments which access long sequential records, does not allow multiple I/O operations to be overlapped RAID 5: Best choice for multi-user environments which are not write performance sensitive. RAID 6: provides better data protection than RAID 5 and cheaper than RAID1 or 10
1/27/2014
33
SCSI Bus 1
SCSI Bus 2
SCSI Bus 3
SCSI Bus 4
SCSI Bus 5
SCSI Bus 6
RAID
RAID 5 Volume
RAID 0 Volume
RAID 1 Volume
Vraid
Logical
Physical
1/27/2014
34
RAID Controller
Spare Spare
RAID Level (0 or 1 or 5)
1/27/2014
35
Host presentation
0 1 2
RAID Controller
Spare
LUN 0 LUN 1
Spare
1/27/2014
36
Host presentation
0 1 2 3 4 5 6 7
RAID Controller
LUN 6 LUN 7 LUN 5 LUN 4 LUN 0 LUN 1
Spare
LUN 3
Spare
LUN 2
1/27/2014
37
Virtualization How we do it
Linux W2K cluster HP-UX TRU64 OVMS Solaris AIX Netware LUNs
100GB 200GB
SAN Fabric
SAN Fabric
100GB
200GB
Virtual Disks
Disk Group 1
Un-grouped disks
1/27/2014 39
Virtualization How we do it
Linux W2K cluster HP-UX TRU64 OVMS Solaris AIX Netware LUNs
100GB 200GB
SAN Fabric
SAN Fabric
100GB
200GB
Virtual Disks Add disks to a Disk Group non disruptively VDisk re-levels across the extra spindles
Disk Group 1
Un-grouped disks
1/27/2014 40
Virtualization How we do it
Linux W2K cluster HP-UX TRU64 OVMS Solaris AIX Netware LUNs
100GB 200GB
SAN Fabric
SAN Fabric
100GB
200GB
Virtual Disks Add disks to a Disk Group non disruptively LUN re-levels across the extra spindles
Disk Group 1
Un-grouped disks
1/27/2014 41
Virtualization How we do it
Linux W2K cluster HP-UX TRU64 OVMS Solaris AIX Netware LUNs
100GB 200GB
SAN Fabric
SAN Fabric
100GB
200GB
Virtual Disks Remove disks non disruptively from the Disk Group
Disk Group 1
Un-grouped disks
1/27/2014 42
SAS Drive
SAS Serial Attached SCSI A serial communication protocol designed for transfer of SCSI commands and data to and from devices over point-to-point interconnections
Key Benefits New roadmap with industry-wide acceptance Significant performance enhancements 3-Gbps SAS x4 wide ports Cost equivalent to parallel SCSI Freedom from 15 drive maximum per SCSI channel
1/27/2014
43
iSCSI
iSCSI - internet Small Computer System Interface A network protocol that enables transmission of SCSI commands and data over an IP-based network usually via an Ethernet interface
Key Benefits: Low cost Less complexity Extensive knowledge base expertise in every IT organization Flexible configuration topologies Extensive reach with no distance limitations Future performance 1Gb/s today with roadmap for 10Gb/s and beyond
1/27/2014 44
Fiber Channel
FC Fibre Channel
A serial networking interface that supports the transmission of upper level protocols including SCSI command sets and data over fiber optic or copper cables
Key Benefits
Scalable supports up to 16 million addresses. Distance 10,000 meters maximum cabling length High bandwidth low latency and high IOPs Investment protection auto-negotiating link speeds allowing for seamless integration into an existing 1Gb/s or 2 Gb/s environment Congestion free with credit-based flow control delivering data as fast as the destination buffer is able to receive it.45
1/27/2014
1/27/2014
46
SAN Topology
Point to point Between two nodes (host bus adapters = NICs) All bandwidth available Arbitrated loop (FC-AL f-kal) Storage devices are all on a logical loop Bandwidth is shared (up to 126 devices) Logical loop topologies can be realised using hubs Switched aka switching fabric Allows multiple simultaneous connections ( potentially more bandwidth) Frames can be circuit switched or routed Support for 16 million devices
1/27/2014 47
Topology
Node A Node B
Point-to-Point Topology
Array
Array
Array
48
1/27/2014
49
1/27/2014
50
1/27/2014
51
1/27/2014
52
1/27/2014
53
Zoning
Zoning allows you to define specific groups of fabric-connected devices to ensure that the access between them is controlled. Be aware that devices that are not configured in a zone will not be accessible. Zoning enables you to partition a storage area network (SAN) into logical groups of devices that can access each other. For example, you could partition a SAN into two zones, winzone and unixzone, so that the Windows servers and storage do not interact with UNIX servers and storage. Zones can be configured dynamically. They can vary in size, depending on the number of fabric-connected devices, and devices can belong to more than one zone. Because zone members can access only other members of the same zone, a device not included in a zone is not available to members of that zone. When using a mixed fabric that is, a fabric containing two or more switches running different fabric operating systems you should use the switch with the highest Fabric OS level to perform zoning tasks. When zone or Fabric Assist (FA) zone members are specified by fabric location only (domain, area), or by device name only (node name or port WWN), zone boundaries are enforced at the hardware level and the zone is referred to as a hard zone. When zone members are specified by fabric location (domain, area) and other members of the same zone are specified by device name (node name or port WWN), zone enforcement depends on Name Server lookups, and the zone is referred to as a soft zone.
1/27/2014
54
Zone admin
1/27/2014
55
Zoning Steps
Define zone aliases to establish groupings. Add zone members. Place zones into one or more zone configurations. Enable one of the zone configurations (only one can be enabled at a time).
1/27/2014
56
Default Zoning
We have to set default mode otherwise every member Will talk to each other and that will be a chaos/Broadcast /RSCN
1/27/2014 57
Alias Tab
1/27/2014
58
Creating Alias
1/27/2014
59
1/27/2014
60
Adding members
1/27/2014
61
Zoning config
1/27/2014
62
1/27/2014
63
Zoning contd..
1/27/2014
64
1/27/2014
65
1/27/2014
66
1/27/2014
67
1/27/2014
68
Fabric 1
Fabric 2
2 HSV Controllers
HSV200 controller 1
HSV200 controller 2
1/27/2014
69