Storage Essentials Merlin Ran Weibo: merlinran Mail: merlinran@163.com
Agenda <ul><li>From DAS to SAN </li></ul><ul><li>SAN Concepts & Protocols </li></ul><ul><li>RAID Levels </li></ul><ul><li>...
Direct-Attached Storage <ul><li>Servers with unused storage </li></ul><ul><ul><li>Uncontrolled storage growth </li></ul></...
Deploying a SAN <ul><li>Increases storage utilization </li></ul><ul><ul><li>Scale servers separately from storage </li></u...
SAN Concepts & Protocols <ul><li>Drive types: IDE/ATA / SATA / SCSI / SAS / FC </li></ul><ul><li>Fibre Channel </li></ul><...
Host Fabric Storage Array HBA Initiator Target WWPN  50:06:01:6A:C6:E0:52:3B   WWPN  10:00:00:05:33:76:4C:BC   WWNN  50:06...
FC Protocol Stack
IP SAN Protocols <ul><li>iSCSI </li></ul><ul><li>Storage access through IP network </li></ul><ul><li>FCIP </li></ul><ul><l...
 
RAID Levels
<ul><li>Read Perf ++ </li></ul><ul><li>Write Perf ++ </li></ul><ul><li>No Protection </li></ul><ul><li>Higher DL Risk </li...
RAID 1  Mirror <ul><li>Read Perf + </li></ul><ul><li>Write Perf . </li></ul><ul><li>High Protection </li></ul><ul><li>2 Dr...
RAID 10  Stripe of Mirrors <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf + </li></ul><ul><li>High Protection </li></ul...
RAID 01  Mirror of Stripes <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf + </li></ul><ul><li>Lower Protection than R10...
RAID 4  Dedicated Parity 1 4 7 2 5 8 <ul><li>Read Perf + </li></ul><ul><li>Write Perf -- </li></ul><ul><li>Low Protection ...
RAID 5  Distributed Parity P 6 9 1 4 7 P 2 5 P 10 3 P 8 <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf - </li></ul><ul>...
RAID 6  Double Parity P 4 6 1 3 P P 2 P P P P 5 <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf - </li></ul><ul><li>High...
Disk Array Basics
Example: EMC ClARiiON
Example: EMC Symmetrix DMX
The Host Side <ul><li>LUN Discovery </li></ul><ul><ul><ul><li>cfgmgr/ioscan/devfsadm/reboot </li></ul></ul></ul><ul><li>Mu...
Application Database File System LVM SCSI Driver FC Driver
Appliances <ul><li>Network Attached Storage </li></ul><ul><li>Content Addressable Storage </li></ul><ul><li>Virtual Tape L...
Business Continuity Business  Considerations Technical  Considerations Recovery Point Objectives PRIMARY DECISION DRIVERS ...
Protecting Information Is a Business Decision <ul><li>Recovery point objective (RPO):  </li></ul><ul><ul><li>How recent is...
Typical Service Levels by Replication Technology EVENT Tape Vaulting Daily Tape Backup Asynchronous Disk Mirroring Synchro...
Server network HPC Today’s Storage Networking Technologies <ul><li>Direct-attached storage </li></ul><ul><ul><li>Servers w...
Thank You
Upcoming SlideShare
Loading in...5
×

Storage essentials (by Merlin Ran)

1,092

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,092
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
74
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Direct-attached storage architecture has distinct limitations. Only one server can use the storage attached to it. Storage that goes unused becomes a “stranded” or underused resource. If an application is saturating one server, you cannot deploy another server to share the burden because the application data is only available on the direct-attached server.
  • Note to Presenter: View in Slide Show mode for animation. Deploying a SAN lets you share storage. By consolidating with a SAN, you can reduce your total cost of ownership and eliminate needless duplication and resynchronization of files. SANs provide greater storage usage through consolidation. You can easily allocate storage to servers as needed. And, as we’ll see on the next slide, a SAN makes backup easier and more efficient.
  • RAID 3?
  • Note to Presenter: View in Slide Show mode for animation. The key to determining the best replication solution for a particular use case is a thorough understanding of service levels. Specifically, you need to balance business requirements for performance, functionality, availability, and economics against capacity needs, bandwidth requirements, and overall total cost of ownership. Every solution has benefits and risks, and you probably want to balance all of these factors in order to decide on the best solution—whether it be for daily backup and recovery or remote data replication for application consistency and disaster recovery and restart. In the end, the need typically is around assuring application consistency and recovery. Application consistency and recovery is important for sustaining business operations—and, not surprisingly, are the top replication and disaster recovery challenges EMC hears from both customers and analysts.
  • When EMC or its partners talk about remote replication, they usually mean between storage at two locations. The source and target are physically separated to reduce the risks associated with co-location. Remote replicated systems could be across a campus, across a town, or across the globe. Their physical distance and technology selected can affect how quickly you recover from a disruption and how much data is lost. Organizations normally set requirements for how much lost data and how much time to come back online is acceptable. Recovery point objective (RPO) is the point in time to which critical data must be restored following an interruption before its loss severely impacts the organization. Note to Presenter: Click now in Slide Show mode for animation. Recovery time objective (RTO) is the amount of time that it takes to recover the data and restart business services—including critical applications central to business operations—from recovered data before the absence of the data or applications severely impacts the organization. The bottom line is that replication is appropriate for all types of data, and the RPO and RTO you target are going to affect your implementation.
  • Not surprisingly, different replication technologies yield different RPO and RTO results. And, though zero RPOs and RPOs may seem ideal, each approach and its corresponding technologies has its place depending on the business need. Let’s take a look at a few of these typical service levels for different replication technologies. Tape vaulting (or offsite tape storage) takes the most time since physical tape needs to be retrieved from a storage facility and tape fed back into the infrastructure. Tape vaulting may be appropriate for small businesses or for remote or branch offices of larger organizations where data may be retained for analytical purposes or for archiving requirements to meet compliance requirements. Full backups are another common practice, but with exponential data growth, it has become a challenge as organizations grapple with how to recovery quickly. Recovery from tape can take days; fortunately, recovery from disk can be done in much fewer than 24 hours—often around 8 to 10 hours or better. Continuous asynchronous disk mirroring provides near zero RPO but still may not be appropriate for those situations with the most stringent recovery requirements. Synchronous disk mirroring replication, which provides zero RPO, may be preferred for business-critical application and data protection in larger enterprises, but is only as good as the last copy. Continuous protection provides the benefits of zero RPO but through point-in-time bookmarks—meaning as good as the last of many copies chosen as the recovery point. Many small-to-midsize companies rely on tape for both replication and disaster recovery—or better yet, on disk-based backup. However, many organizations need the small RPO and RTO delivered by asynchronous and synchronous replication technologies—or continuous protection—to be competitive.
  • Storage essentials (by Merlin Ran)

    1. 1. Storage Essentials Merlin Ran Weibo: merlinran Mail: merlinran@163.com
    2. 2. Agenda <ul><li>From DAS to SAN </li></ul><ul><li>SAN Concepts & Protocols </li></ul><ul><li>RAID Levels </li></ul><ul><li>Disk Array Basics </li></ul><ul><li>The Host Side </li></ul><ul><li>Appliances </li></ul><ul><li>Business Continuity </li></ul>
    3. 3. Direct-Attached Storage <ul><li>Servers with unused storage </li></ul><ul><ul><li>Uncontrolled storage growth </li></ul></ul><ul><ul><li>Storage dedicated to one server </li></ul></ul><ul><li>HA difficulties </li></ul><ul><li>Backup is decentralized </li></ul><ul><ul><li>Backup requires network bandwidth </li></ul></ul><ul><ul><li>Backup requires downtime </li></ul></ul><ul><ul><li>Recovery from tape is time-consuming </li></ul></ul>Direct-Attached Storage UNIX Windows
    4. 4. Deploying a SAN <ul><li>Increases storage utilization </li></ul><ul><ul><li>Scale servers separately from storage </li></ul></ul><ul><ul><li>Storage on demand </li></ul></ul><ul><ul><li>Improves storage utilization </li></ul></ul><ul><li>Increases flexibility </li></ul><ul><ul><li>Leverage storage replicas for testing and backup </li></ul></ul><ul><li>Provides higher availability </li></ul><ul><ul><li>Eliminate downtime caused by backups </li></ul></ul><ul><ul><li>Drastically reduce recovery time </li></ul></ul><ul><li>Delivers highest performance </li></ul>Eliminate “islands of storage” within physical servers using a SAN Easily allocate more storage UNIX Windows Fibre Channel
    5. 5. SAN Concepts & Protocols <ul><li>Drive types: IDE/ATA / SATA / SCSI / SAS / FC </li></ul><ul><li>Fibre Channel </li></ul><ul><li>Fabric </li></ul><ul><li>Host Bus Adapter </li></ul><ul><li>Initiator/Target </li></ul><ul><li>Zoning </li></ul><ul><li>Logical Unit Number </li></ul><ul><li>LUN masking </li></ul><ul><li>World Wide Name </li></ul>
    6. 6. Host Fabric Storage Array HBA Initiator Target WWPN 50:06:01:6A:C6:E0:52:3B WWPN 10:00:00:05:33:76:4C:BC WWNN 50:06:01:60:C6:E0:52:3B WWPN 50:01:10:A0:00:85:65:8D LUN Zone 1
    7. 7. FC Protocol Stack
    8. 8. IP SAN Protocols <ul><li>iSCSI </li></ul><ul><li>Storage access through IP network </li></ul><ul><li>FCIP </li></ul><ul><li>Connect SAN islands through WAN </li></ul><ul><li>FCoE </li></ul><ul><li>Ethernet wins the data center </li></ul>
    9. 10. RAID Levels
    10. 11. <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf ++ </li></ul><ul><li>No Protection </li></ul><ul><li>Higher DL Risk </li></ul>RAID 0 Stripping 1 3 5 2 4 6
    11. 12. RAID 1 Mirror <ul><li>Read Perf + </li></ul><ul><li>Write Perf . </li></ul><ul><li>High Protection </li></ul><ul><li>2 Drives </li></ul>1 2 3 1 2 3
    12. 13. RAID 10 Stripe of Mirrors <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf + </li></ul><ul><li>High Protection </li></ul><ul><li>Drives in Pairs </li></ul>1 4 7 2 5 8 3 6 9 1 4 7 2 5 8 3 6 9
    13. 14. RAID 01 Mirror of Stripes <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf + </li></ul><ul><li>Lower Protection than R10 </li></ul><ul><li>Drives in Pairs </li></ul>1 4 7 2 5 8 3 6 9 1 4 7 2 5 8 3 6 9
    14. 15. RAID 4 Dedicated Parity 1 4 7 2 5 8 <ul><li>Read Perf + </li></ul><ul><li>Write Perf -- </li></ul><ul><li>Low Protection </li></ul><ul><li>Write Penalty on Parity Disk </li></ul><ul><li>Employed by NetApp --- WAFL </li></ul>3 6 9 P P P
    15. 16. RAID 5 Distributed Parity P 6 9 1 4 7 P 2 5 P 10 3 P 8 <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf - </li></ul><ul><li>Low Protection </li></ul>
    16. 17. RAID 6 Double Parity P 4 6 1 3 P P 2 P P P P 5 <ul><li>Read Perf ++ </li></ul><ul><li>Write Perf - </li></ul><ul><li>High Protection </li></ul><ul><li>Complex Algorithm </li></ul>7
    17. 18. Disk Array Basics
    18. 19. Example: EMC ClARiiON
    19. 20. Example: EMC Symmetrix DMX
    20. 21. The Host Side <ul><li>LUN Discovery </li></ul><ul><ul><ul><li>cfgmgr/ioscan/devfsadm/reboot </li></ul></ul></ul><ul><li>Multipath </li></ul><ul><ul><ul><li>PowerPath/PVLinks/VxDMP/Native MPIO… </li></ul></ul></ul><ul><li>Logical Volume Manager </li></ul><ul><li>File System </li></ul>
    21. 22. Application Database File System LVM SCSI Driver FC Driver
    22. 23. Appliances <ul><li>Network Attached Storage </li></ul><ul><li>Content Addressable Storage </li></ul><ul><li>Virtual Tape Library </li></ul><ul><li>… </li></ul>
    23. 24. Business Continuity Business Considerations Technical Considerations Recovery Point Objectives PRIMARY DECISION DRIVERS Cost Recovery Time Objectives Performance Bandwidth Capacity Consistency and Recovery Functionality, Availability
    24. 25. Protecting Information Is a Business Decision <ul><li>Recovery point objective (RPO): </li></ul><ul><ul><li>How recent is the point in time for your recovery? </li></ul></ul><ul><li>Recovery time objective (RTO): </li></ul><ul><ul><li>How fast can you restart a failed application? </li></ul></ul><ul><li>(RPO+RTO = Acceptable Business Risk) </li></ul>EVENT TIME RTO RPO MIN MIN DAYS DAYS SEC SEC HRS HRS
    25. 26. Typical Service Levels by Replication Technology EVENT Tape Vaulting Daily Tape Backup Asynchronous Disk Mirroring Synchronous Disk Mirroring Continuous Protection Daily Disk Backup RPO (Hours of lost transactions) RTO (Hours required to resume business) -36 -24 -12 0 12 24 36 48 60 72
    26. 27. Server network HPC Today’s Storage Networking Technologies <ul><li>Direct-attached storage </li></ul><ul><ul><li>Servers with unused storage, uncontrolled growth </li></ul></ul><ul><ul><li>Storage dedicated to one server </li></ul></ul><ul><ul><li>Decentralized backup </li></ul></ul><ul><li>Fibre Channel SANs </li></ul><ul><ul><li>Eliminates islands of storage </li></ul></ul><ul><ul><li>Increases utilization and availability </li></ul></ul><ul><ul><li>Highest performance levels </li></ul></ul><ul><li>FCIP/iFCP </li></ul><ul><ul><li>Connects geographically dispersed SANs </li></ul></ul><ul><ul><li>Low cost and easy to deploy for disaster recovery solutions </li></ul></ul><ul><li>iSCSI/NAS </li></ul><ul><ul><li>Consolidates small or isolated servers </li></ul></ul><ul><ul><li>Offers low-cost server attachment </li></ul></ul><ul><ul><li>NAS is ideal for files and unstructured data </li></ul></ul><ul><li>Infiniband </li></ul><ul><ul><li>Low latency, high bandwidth </li></ul></ul><ul><ul><li>Ideal for high-performance computing (HPC) </li></ul></ul><ul><li>Fibre Channel over Ethernet </li></ul><ul><ul><li>Converges LAN and SAN traffic on single link </li></ul></ul><ul><ul><li>Lowers operational costs (cabling and CNAs ) </li></ul></ul><ul><ul><li>Scalability for virtual environments </li></ul></ul>Rack-mounted servers with converged network adapters Remote/isolated servers Disaster recovery site <ul><li>FCoE </li></ul><ul><li>Infiniband </li></ul><ul><li>Direct-attached storage </li></ul><ul><li>Fibre Channel SANs </li></ul><ul><li>iSCSI/NAS </li></ul><ul><li>FCIP/iFCP </li></ul>Mainframe Networked storage Servers VMware
    27. 28. Thank You
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×