storage primer
DESCRIPTION
Storage basics, SAN, NAS, data protection, securityTRANSCRIPT
![Page 1: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/1.jpg)
Storage Primer
Sriram Ranganathachari
![Page 2: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/2.jpg)
What is Storage ?
• Primary storage disk or RAM• Secondary storage tape or Disk
Storage can be online, nearline or offline• Online – Random-access, low wait time – disk• Nearline – Random-access, some wait time – disk• Offline – Sequential-access, long wait time – tape
Offline and nearline storage• File restore• Image restore• Data archiving
![Page 3: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/3.jpg)
Ethernet
Evolution of StorageP
erfo
rman
ce/R
elia
bili
ty/M
anag
emen
t
Time/Complexity
Storage Today
Internal Storage
Direct-Attach Storage(DAS)
Network-Attached Storage(NAS)
Storage Area Network(SAN)
![Page 4: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/4.jpg)
Need For the Invention of SAN• Storage market Demand was growing and the traditional Server Attached
Storage called DAS was not able to meet the High end Requirements .• Rapid storage growth is causing new types of problems for data center
managers• Advantages of SAN
– Staff and skill shortages– Providing investment protection while at the same time storage prices
drop– Server, storage and data consolidations are often planned, or worse are
in parallel– Enterprise SAN and Storage Management is required– Investment justification with limited fiscal resources
![Page 5: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/5.jpg)
Disadvantages of SCSI
Number of devices that can be attached on aSingle bus is very limited
To reconfigure one device all the devices in the string must be brought offline .
Distance limitation due to cable length . Speed limitations Sharing is possible by Multi-Drop Configuration
BUT :All devices can not transfer data at the same
time Uses ArbitrationDuring Arbitration – No Data Transfer
![Page 6: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/6.jpg)
RAID
![Page 7: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/7.jpg)
Advantages of SAN over SCSI Removes traditional Server-Storage connection High Speed of Communication Can connect Devices up to 10 Km Number of devices that can be connected is
very high (16 million ) Improved backup and recovery LAN free and server free data movement Centralized management Disk Storage can be expanded without
disrupting the servers
![Page 8: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/8.jpg)
Some more benefits
• Increased disk utilization• Deferring disk procurement• Reduce data center
rack/floor space• Tape procurement deferral• New DR capabilities• Improved DR capabilities• On-line recoverability
options• Staff Utilization for Server
Management• TB-per-DBA ratio decline• Mgmt costs as a % of storage
costs• Improved overall availability• Increased life of current disk• Reduction of UNIX & NT
Servers• LAN/WAN performance• Improve/Protect critical data
• Increase I/O performance, bulk data movement
• Reduced Storage Maint.• Reduce backup servers• Reduce/eliminate batch,
backup windows• Non-disruptive scalability• Avoid Data Area Network
growth• Impact new/migrating apps • Impact to applications
development, testing• Extending Life of Servers• Reduce CPU Load on Servers• Support Server Clustering• Secondary Security Services• Vendor Consolidation• Storage On-Demand
![Page 9: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/9.jpg)
Fundamental difference between SAN and NAS
SAN
A SAN is a shared "network" of storage
• Block access to LUNs
• Online and offline storage
• SAN device = storage array
Protocol:
SCSI over Fibre ChannelSCSI over IP/Ethernet (iSCSI)
and FC
NAS
NAS is a file system shared over a network
• File access to data
• Online storage only
• NAS device = File server or "filer"
Protocol:
NFS, CIFS over IP over Ethernet
![Page 10: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/10.jpg)
What is Fibre Channel ?
• Fibre Channel is serial interconnection technology that was developed to bring together elements from the channel and networking technology .
• It Provides : Reliable High Speed Communication Data transport over longer distances Low Overhead communication
![Page 11: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/11.jpg)
What is SAN
• SAN is dedicated network behind the servers , based on Fibre Channel architecture .
![Page 12: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/12.jpg)
How SAN works
• The data from a host server is converted into optical light pulses by a “host bus adapter” in the server, the pulses are transmitted over fiber-optic cables, through a switched network, to an intelligent storage array, which uses advanced raid protected disk drives to store the data safely.
• The act of using a network to create a shared pool of storage devices is what makes a SAN different from the way data was normally stored on computers. The network is used to move data between various storage devices, allows for data sharing between different servers, and provides a fast medium for backing up and restoring data.
• Devices in a SAN are usually bunched closely together in a single room, but the network allows the devices to be connected over long distances. The ability to spread everything out over long distances makes a SAN very useful to large companies with many offices.
![Page 13: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/13.jpg)
SAN implementation
![Page 14: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/14.jpg)
Who should buy SAN
• Database servers: Oracle, Sybase, SQL, DB2, Informix, and other database servers
• File servers: Using SAN-based storage for file servers lets you expand file
server resources quickly, makes them run better, and enables you to manage your file-based NAS storage through the SAN.
• Backup servers: SAN-based backup is dramatically faster than LAN-based backup.
• Voice/video servers: Voice and video servers tend to push large amounts of data very quickly.
• Mail servers: Using SAN-based storage for mail servers enables quick restoration of data in case of corruption or viruses.
• High-performance application servers: Applications such as document management, customer relationship management, billing, data warehouses, and other high-performance and critical applications all benefit by what a SAN can provide.
![Page 15: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/15.jpg)
SAN Segments
PARTS– Host Layer- HBA, Drivers,
Pathing sofware, OS– Fabric Layer- Hubs and
switches, fabric os, cabling– Storage Layer- Tapes and
disks, advanced storage software
PLAYERS :– EMC, IBM,HITACHI,
NetApp,Sun, HP, Veritas etc
![Page 16: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/16.jpg)
SAN ComponentsHBA
CARD
Tape Library
Fibre Cables
Storage Arrays
![Page 17: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/17.jpg)
Naming and Addressing Scheme
• WWN : World Wide Name A Unique 64 bit Address Assigned to the Node
by manufacturer
• WWPN : World Wide Port Name A unique 64 Bit Address assigned to the N_Port
![Page 18: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/18.jpg)
SAN Topologies
Point to PointArbitrated LoopSwitched Fabric
![Page 19: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/19.jpg)
Point to Point Topology
Direct Connection between two N_Ports
No Sharing of Media Allows Devices to use Full Bandwidth Before the transmission two N_Ports
perform a Login to assign the N_Port Address
![Page 20: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/20.jpg)
Point to Point Connection
![Page 21: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/21.jpg)
Arbitrated Loop Topology
A loop of 127 Ports ( 126 NL_Port , 1FL_Port )
The Bandwidth is shared by the Active Nodes
Media Access is gained through an Arbitration Protocol
Can Connect Ports up to a distance of 10 Km
![Page 22: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/22.jpg)
Arbitrated Loop
![Page 23: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/23.jpg)
Array Array Array Array
Array Array Array Array
Multi Switch Single FabricSingle Switch Fabric
FC - Switched
![Page 24: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/24.jpg)
Number of Hosts
Lowest Acquisition Cost
HighestAvailability
Least Complexity
256–1024
64–256
8–64
Deployment: Switches vs. Directors
Director
Director
SwitchSwitchSwitch
Switch
Director
Director
Switch
Director
Switch
Director
![Page 25: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/25.jpg)
Ports
•N_Port Node Point-to-point or fabric•NL_Port Node Node connected to an
arbitrated loop•F_Port Fabric Fabric port•FL_Port Fabric Fabric connected to an
arbitrated loop•L_Port Loop Hub port on an arbitrated
loop•T_Port Fabric Trunk port between
switches•E_Port Fabric Inter-switch Link
connection•G_Port Fabric Unused switch port
![Page 26: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/26.jpg)
IP Storage
![Page 27: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/27.jpg)
iSCSI• Enables access of DAS over IP Infrastructure• Optimal utilization of resource• Virtualized Storage• To enable FC based storage to be accessed
through IP infrastructure• Block level storage from SAN accessed through
iSCSI• IP Based Storage Protocol
![Page 28: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/28.jpg)
![Page 29: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/29.jpg)
![Page 30: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/30.jpg)
ZONINGDefinition :Zoning is a logical separation of traffic between host and resources
Advantages of Zoning
· Data Integrity · Security · Shorter boot-up
Types of Zoning :
Soft zoning or name server zoning : done using a name server databases in the SAN director. Zoning is via port numbers and WWN numbers.
Hard zoning : Uses a routing table in the director, which assigns devices to zones only by WWN. This is more limited since it doesn't take the port number into consideration, which makes it harder to shift devices between ports.
![Page 31: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/31.jpg)
![Page 32: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/32.jpg)
ISL - Distance and Cables
• Operating distances decrease when moving from 1Gbps to 2Gbps
• Media options– Multi-mode– Single-mode– DWDM
• ISL design parameters– Capacity– Distance
• Signal loss• Throughput• Power
Fibre Optic Glass
Filament Core
Port Speed Operating Distance
50 micronMultimode
1Gbps2Gbps
500m300m
62.5 micronMultimode
1gbps2Gbps
~300m~150m
9 micronSingle mode
1Gbps2Gbps
>10km>10km
Multi-mode 1Gb=500m 2Gb=300m
Single-mode > 10Km
DWDM < 200Km
![Page 33: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/33.jpg)
DWDM
• Data are carried at different wavelengths over fiber links
• Different data formats can be transmitted together (e.g. IP, ESCON SRDF, Fibre Channel SRDF)
• DWDM topologies include Point-to-Point and Ring configurations
Transmission on fibre
CombiningSignals
SeparatingSignals
Transmitters Receivers
![Page 34: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/34.jpg)
LUN
• A LUN refers to the individual piece in the storage system that is being accessed. Each disk in an array, for example, has a LUN. Disk partitions may also be assigned a LUN
![Page 35: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/35.jpg)
Data Protection
• Backup Strategy• Recovery Method• ILM / HSM • DRP / BCP
![Page 36: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/36.jpg)
Some terminologies
• Recovery Time Objective: (RTO) The amount of time that it takes to get your systems back online.
• Recovery Point Objective: (RPO)This is the last consistent data transaction prior to the disaster. If you had a disaster, how much data would be lost? \
• The Disaster Recovery plan (DR) focuses on getting your business back up and running after a major outage
• The Business Continuance plan (BCP) focuses on keeping your business running DURING the disaster.
![Page 37: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/37.jpg)
Replication
Asynchronized :• Does not affect
application performance • Bandwidth determines
how up to date your data stays
• Database is consistent if solution uses sequencing
• Great long distance solution
• Site failure – transactions are rolled back or rolled forward
Synchronized :• Low or no transaction
Loss• Database is always
consistent• Site failure - same
application recovery as power failure
• Bad for long distance, affects application performance, requires massive pipes
Snapshots: Instant data copy (Software based/Hardware based)Data Replication:Sync, Async, Bulk Copy/AdaptiveData Replication Method: Hardware, Software
![Page 38: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/38.jpg)
Some Popular Replication Tools
• EMC Clariion Snap View – Local Mirror View – Remote
• EMC Symmetrix Time Finder – LocalSRDF - Remote
• IBM Total Storage Flash Copy – Local Volume Copy
PPRC - Remote
• Hitachi Data Systems True Copy
![Page 39: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/39.jpg)
SAN Security
![Page 40: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/40.jpg)
Security - Controlling Access to the SAN
• Physical layout– Foundation of a secure
network
• Location planning– Location of H/W and S/W
components– Identify Data Center
components– Data Center location for
management applications
– Disaster Planning
![Page 41: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/41.jpg)
Fabric Security - Zoning
• Zone– Controlled at the switch layer– List of nodes that are made
aware of each other– A port or a node can be
members of multiple zones• Zone Set
– A collection of zones– Also called zone config
• Single HBA Zoning– A separate zone for each HBA– Makes zone management
easier when replacing HBAs
• Types of zones:– Port Zoning (Hard Zoning)
• Port-to-Port traffic• Ports can be members of more
than one zone• Each HBA only “sees” the ports
in the same zone• If a cable is moved to a different
port, zone has to be modified– WWN based Zoning (Soft Zoning)
• Access is controlled using WWN• WWNs defined as part of a zone
“see” each other regardless of the switch port they are plugged into
• HBA replacement requires the zone to be modified
– Hybrid zones (Mixed Zoning)• Contain ports and WWNs
![Page 42: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/42.jpg)
Zoning - Hard vs. Soft Zoning
– Flexibility– Reconfiguration– Troubleshooting
Port Zoning
WWPN Zoning
– More Secure– Simplified HBA
replacement
– Reconfiguration
– “Spoofing” – HBA replacement
Advantages Disadvantages
![Page 43: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/43.jpg)
Fabric Security - Vendor Specific Access Control
• Most vendors have proprietary access control mechanisms
• These mechanisms are not governed by the Fibre Channel standard
• Examples of vendor features:– McDATA
• Port Binding • SANtegrity
– Brocade• Secure FabricOS
![Page 44: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/44.jpg)
Security: Volume Access Control (LUN Masking)
• Restricts volume access to specific hosts and/or host clusters
• Policies set based on functions performed by the host
• Servers can only access volumes that they are permitted to access
• Access controlled in the Storage Array - not in the fabric– Makes distributed
administration secure • Tools to manage masking
– GUI– Command Line
![Page 45: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/45.jpg)
Backup
• Backup is the process of saving your data so that it can be restored in case of problems such as system failure or data corruption.
• Backup Window: Time• Backup Policy: Full, Incremental, Differential • Backup Rotation: Daily, Weekly, Monthly • Backup Method: Network, SAN, Disk to tape,
Disk to Disk,
![Page 46: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/46.jpg)
Individual Backup Centralized Backup on LAN
Disk to Disk Backup Tiered Backup
![Page 47: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/47.jpg)
Some Popular Backup Softwares
• Veritas Netbackup• IBM Tivoli Storage• EMC Legato Networker• HP OmniBack• Veritas BackupExec• CA Brighstor Arcserve
![Page 48: Storage Primer](https://reader033.vdocuments.us/reader033/viewer/2022061219/54ba12c74a79596f118b46fb/html5/thumbnails/48.jpg)
Common storage terms
• CIFS – Common Internet File System – A NAS protocol• DAS – Direct-attached storage• FCIP - SCSI over FC tunneled through IP• HBA – Host bus adapter• iFCP - SCSI over FC translated to IP• iSCSI - SCSI over IP (often over Ethernet)• JBOD – Just a bunch of disks• LAN - Local area network• LUN - Logical unit number – The basic unit of block storage• MTBF - Mean time between failures• MTTF - Mean time to failure• NAS – Network attached storage• NFS – Network File System – A NAS protocol• RAID – Redundant array of independent disks• SAN - Storage area network• SCSI – Small Computer Systems Interface