SlideShare a Scribd company logo
1 of 36
Information Storage and
Management
Storing, Managing, and Protecting Digital Information
Ali Broumandnia, Broumandnia@gmail.com 1
Section II
Storage Networking Technologies
and Virtualization
In This Section:
• Chapter 5: Direct-Attached Storage and Introduction to SCSI
• Chapter 6: Storage Area Networks
• Chapter 7: Network-Attached Storage
• Chapter 8: IP SAN
• Chapter 9: Content-Addressed Storage
• Chapter 10: Storage VirtualizationAli Broumandnia, Broumandnia@gmail.com 2
Chapter 10
Storage Virtualization
• 10.1 Forms of Virtualization
• 10.2 SNIA Storage Virtualization Taxonomy
• 10.3 Storage Virtualization Configurations
• 10.4 Storage Virtualization Challenges
• 10.5 Types of Storage Virtualization
• 10.6 Concepts in Practice
• Summary
Ali Broumandnia, Broumandnia@gmail.com 3
Key Concepts:
• Memory Virtualization
• Network Virtualization
• Server Virtualization
• Storage Virtualization
• In-Band and Out-of-Band Implementations
• Block-Level and File-Level Virtualization
Ali Broumandnia, Broumandnia@gmail.com 4
Virtualization is the technique of masking or abstracting physical
resources, which simplifies the infrastructure and accommodates the
increasing pace of business and technological changes. It increases the
utilization and capability of IT resources, such as servers, networks, or
storage devices, beyond their physical limits. Virtualization simplifies
resource management by pooling and sharing resources for maximum
utilization and makes them appear as logical resources with enhanced
capabilities.
Ali Broumandnia, Broumandnia@gmail.com 5
10.1 Forms of Virtualization
Virtualization has existed in the IT industry for several years and
in different forms, including memory virtualization, network
virtualization, server virtualization, and storage virtualization.
• Memory Virtualization
• Network Virtualization
• Server Virtualization
• Storage Virtualization
Ali Broumandnia, Broumandnia@gmail.com 6
10.1.1 Memory Virtualization
Virtual memory makes an application appear as if it has its own
contiguous logical memory independent of the existing physical
memory resources. Since the beginning of the computer industry,
memory has been and continues to be an expensive component of a
host. It determines both the size and the number of applications that
can run on a host. With technological advancements, memory
technology has changed and the cost of memory has decreased. Virtual
memory managers (VMMs) have evolved, enabling multiple
applications to be hosted and processed simultaneously. In a virtual
memory implementation, a memory address space is divided into
contiguous blocks of fixed-size pages. A process known as paging
saves inactive memory pages onto the disk and brings them back to
physical memory when required.
Ali Broumandnia, Broumandnia@gmail.com 7
10.1.2 Network Virtualization
Network virtualization creates virtual networks whereby each
application sees its own logical network independent of the physical
network. A virtual LAN (VLAN) is an example of network virtualization
that provides an easy, flexible, and less expensive way to manage
networks. VLANs make large networks more manageable by enabling a
centralized configuration of devices located in physically diverse
locations.
Ali Broumandnia, Broumandnia@gmail.com 8
Virtual SAN (VSAN)
A virtual SAN/virtual fabric is a recent evolution of SAN and conceptually,
functions in the same way as a VLAN. In a VSAN, a group of hosts or
storage ports communicate with each other using a virtual topology defined
on the physical SAN. VSAN technology enables users to build one or more
Virtual SANs on a single physical topology containing switches and ISLs.
This technology improves storage area network (SAN) scalability,
availability, and security. These benefits are derived from the separation of
Fibre Channel services in each VSAN and isolation of traffic between
VSANs. Some of the features of VSAN are:
Ali Broumandnia, Broumandnia@gmail.com 9
• Fibre Channel ID (FC ID) of a host in a VSAN can be assigned
to a host in another VSAN, thus improving scalability of SAN.
• Every instance of a VSAN runs all required protocols such as
FSPF, domain manager, and zoning.
• Fabric-related configurations in one VSAN do not affect the
traffic in another VSAN.
• Events causing traffic disruptions in one VSAN are contained
within that VSAN and are not propagated to other VSANs.
Ali Broumandnia, Broumandnia@gmail.com 10
10.1.3 Server Virtualization
Server virtualization enables multiple operating systems and
applications to run simultaneously on different virtual machines
created on the same physical server (or group of servers). Virtual
machines provide a layer of abstraction between the operating
system and the underlying hardware. Within a physical server, any
number of virtual servers can be established; depending on
hardware capabilities (see Figure 10-1).
Ali Broumandnia, Broumandnia@gmail.com 11
Ali Broumandnia, Broumandnia@gmail.com 12
10.1.4 Storage Virtualization
Storage virtualization is the process of presenting a logical view of the
physical storage resources to a host. This logical storage appears and
behaves as physical storage directly connected to the host. Throughout the
evolution of storage technology, some form of storage virtualization has
been implemented. Some examples of storage virtualization are host-
based volume management, LUN creation, tape storage virtualization, and
disk addressing (CHS to LBA). The key benefits of storage virtualization
include increased storage utilization, adding or deleting storage without
affecting an application’s availability, and nondestructive data migration.
Figure 10-2 illustrates a virtualized storage environment. At the top are
four servers, each of which has one virtual volume assigned, which is
currently in use by an application.
Ali Broumandnia, Broumandnia@gmail.com 13
Ali Broumandnia, Broumandnia@gmail.com 14
10.2 SNIA Storage Virtualization Taxonomy
The SNIA (Storage Networking Industry Association) storage
virtualization taxonomy (see Figure 10-3) provides a systematic
classification of storage virtualization, with three levels defining
what, where, and how storage can be virtualized.
Ali Broumandnia, Broumandnia@gmail.com 15
Ali Broumandnia, Broumandnia@gmail.com 16
The first level of the storage virtualization taxonomy addresses “what” is
created. It specifies the types of virtualization: block virtualization, file
virtualization, disk virtualization, tape virtualization, or any other device
virtualization. Block-level and file-level virtualization are the core focus areas
covered later in this chapter.
The second level describes “where” the virtualization can take place. This
requires a multilevel approach that characterizes virtualization at all three levels
of the storage environment:
• Server
• storage network
• Storage
as shown in Figure 10-4.Ali Broumandnia, Broumandnia@gmail.com 17
Ali Broumandnia, Broumandnia@gmail.com 18
10.3 Storage Virtualization
Configurations
Storage virtualization at the network is implemented using either the in-
band or the out-of-band methodology. In an out-of-band implementation,
the virtualized environment configuration is stored external to the data
path. As shown in Figure 10-5(a), the configuration is stored on the
virtualization appliance configured external to the storage network that
carries the data. This configuration is also called split-path because the
control and data paths are split (the control path runs through the
appliance, the data path does not). This configuration enables the
environment to process data at a network speed with only minimal
latency added for translation of the virtual configuration to the physical
storage.
Ali Broumandnia, Broumandnia@gmail.com 19
Ali Broumandnia, Broumandnia@gmail.com 20
10.4 Storage Virtualization Challenges
Storage networking and feature-rich intelligent storage arrays have
addressed and provided specific solutions to business problems. As an
enabler, virtualization should add value to the existing solution, but
introducing virtualization into an environment adds new challenges. The
storage virtualization solution must be capable of addressing issues such
as scalability, functionality, manageability, and support.
• Scalability
• Functionality
• Manageability
• SupportAli Broumandnia, Broumandnia@gmail.com 21
10.5 Types of Storage Virtualization
Virtual storage is about providing logical storage to hosts and
applications independent of physical resources. Virtualization can be
implemented in both SAN and NAS storage environments. In a SAN,
virtualization is applied at the block level, whereas in NAS, it is applied
at the file level.
• Block-Level Storage Virtualization
• File-Level Virtualization
Ali Broumandnia, Broumandnia@gmail.com 22
10.5.1 Block-Level Storage Virtualization
Block-level storage virtualization provides a translation layer in the SAN,
between the hosts and the storage arrays, as shown in Figure 10-6.
Instead of being directed to the LUNs on the individual storage arrays,
the hosts are directed to the virtualized LUNs on the virtualization device.
The virtualization device translates between the virtual LUNs and the
physical LUNs on the individual arrays. This facilitates the use of arrays
from different vendors simultaneously, without any interoperability
issues. For a host, all the arrays appear like a single target device and
LUNs can be distributed or even split across multiple arrays.
Ali Broumandnia, Broumandnia@gmail.com 23
Ali Broumandnia, Broumandnia@gmail.com 24
10.5.2 File-Level Virtualization
File-level virtualization addresses the NAS challenges by eliminating the
dependencies between the data accessed at the file level and the location
where the files are physically stored. This provides opportunities to
optimize storage utilization and server consolidation and to perform
nondestructive file migrations. Figure 10-7 illustrates a NAS environment
before and after the implementation of file-level virtualization.
Ali Broumandnia, Broumandnia@gmail.com 25
Ali Broumandnia, Broumandnia@gmail.com 26
10.6 Concepts in Practice
EMC Invista and Rainfinity are EMC product implementations of
block-level and file-level virtualization, respectively. These
virtualization solutions offer improvements over traditional
device-level controls in the area of capacity utilization, storage tier
management, performance optimization, and data protection.
Ali Broumandnia, Broumandnia@gmail.com 27
10.6.1 EMC Invista
EMC Invista is an out of band SAN-based block-level storage
virtualization solution. It uses intelligent SAN switches with
customized hardware to virtualize physical storage in a logical
presentation. These switches are capable of handling data
operations at network speed. These switches are capable of
handling data operations at network speed. They use specialized
software to examine the port, logical volume, and offset to which
the I/O is sent and can control the target path of I/O s to the
storage devices. Invista is physically located between the
production hosts and the storage arrays, as shown in Figure 10-8.Ali Broumandnia, Broumandnia@gmail.com 28
Ali Broumandnia, Broumandnia@gmail.com 29
Invista Components
Figure 10-9 shows the hardware components of an Invista instance.
Ali Broumandnia, Broumandnia@gmail.com 30
Invista Operation
When an I/O request from a host arrives at the DPC, it handles the
I/O and maps it to the appropriate virtual target (or initiator), as
shown in Figure 10-10.
Ali Broumandnia, Broumandnia@gmail.com 31
Invista Advantages
EMC Invista provides block-level storage virtualization in
heterogeneous storage environments. It also supports dynamic
volume mobility for volume extension and data migration between
different storage tiers without any downtime. Invista supports local
and remote replication functionality; and it integrates with the
existing SAN infrastructure and uses the full fabric bandwidth for
high-speed I/O processing. Invista provides separate data and
control paths for easy management and faster I/O processing.
Ali Broumandnia, Broumandnia@gmail.com 32
10.6.2 Rainfinity
Rainfinity is a dedicated hardware/software solution for file-level
virtualization. The Rainfinity Global File Virtualization (GFV)
appliance (see Figure 10-11) provides an abstraction of file-based
storage transparently to users. Files can be moved from one file
server to another even when clients are reading and writing their
data.
• Rainfinity Components
• Rainfinity Operations
• Global Namespace Management
• Rainfinity AdvantagesAli Broumandnia, Broumandnia@gmail.com 33
Ali Broumandnia, Broumandnia@gmail.com 34
Summary
Virtualization provides flexibility while easing management of the
existing infrastructure. Virtualization enables users to optimally
utilize current processes, technologies, and systems. It allows for the
addition, modification, or replacement of physical resources without
affecting application availability. Virtualization technology offers
high security and data integrity, which are mandatory for centralized
computing environments. It also reduces performance degradation
issues and unplanned downtime due to faults, and ensures increased
availability of hardware resources. This chapter detailed the different
forms of virtualization and their benefits.
Ali Broumandnia, Broumandnia@gmail.com 35
It also covered block-level and file-level storage virtualization and
provided associated product examples, explaining their processes. The
data mobility features in virtualization ensure uninterrupted storage
operation and prevent application outages due to any resource conflict or
unavailability. Resources and data are still vulnerable to natural disasters
and other planned and unplanned outages, which can affect data
availability. The next chapter covers business continuity and describes
disaster recovery solutions that ensure high availability and uninterrupted
business operations.
Ali Broumandnia, Broumandnia@gmail.com 36

More Related Content

What's hot (20)

CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Virtual machines and their architecture
Virtual machines and their architectureVirtual machines and their architecture
Virtual machines and their architecture
 
Distributed Database
Distributed DatabaseDistributed Database
Distributed Database
 
5. scm
5. scm5. scm
5. scm
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
CS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question BankCS8791 Cloud Computing - Question Bank
CS8791 Cloud Computing - Question Bank
 
Google App Engine
Google App EngineGoogle App Engine
Google App Engine
 
Learning by analogy
Learning by analogyLearning by analogy
Learning by analogy
 
Adbms 16 object definition language
Adbms 16 object definition languageAdbms 16 object definition language
Adbms 16 object definition language
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
 
Query trees
Query treesQuery trees
Query trees
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
 
Cloud computing architectures
Cloud computing architecturesCloud computing architectures
Cloud computing architectures
 
Lec # 1 chapter 2
Lec # 1 chapter 2Lec # 1 chapter 2
Lec # 1 chapter 2
 
Database , 4 Data Integration
Database , 4 Data IntegrationDatabase , 4 Data Integration
Database , 4 Data Integration
 
Coda file system
Coda file systemCoda file system
Coda file system
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 

Similar to Chapter 10

VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud ComputingJamie Shoup
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
186508162-VIRTUALIZATION.pptx
186508162-VIRTUALIZATION.pptx186508162-VIRTUALIZATION.pptx
186508162-VIRTUALIZATION.pptxson2483
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization IntroductionStephen Foskett
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingHitesh Mohapatra
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 
Introducción a CloudStack
Introducción a CloudStackIntroducción a CloudStack
Introducción a CloudStackHollman Enciso
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxXanGwaps
 
Linux virtualization in a nutshell
Linux virtualization in a nutshellLinux virtualization in a nutshell
Linux virtualization in a nutshellpv_narayanan
 
How to Ensure Next-Generation Services
How to Ensure Next-Generation ServicesHow to Ensure Next-Generation Services
How to Ensure Next-Generation ServicesFluke Networks
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology Ravindra Dastikop
 

Similar to Chapter 10 (20)

Vmware san connectivity
Vmware san connectivityVmware san connectivity
Vmware san connectivity
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage Architecture
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Virtualization
VirtualizationVirtualization
Virtualization
 
186508162-VIRTUALIZATION.pptx
186508162-VIRTUALIZATION.pptx186508162-VIRTUALIZATION.pptx
186508162-VIRTUALIZATION.pptx
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization Introduction
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Virtulization
VirtulizationVirtulization
Virtulization
 
Introducción a CloudStack
Introducción a CloudStackIntroducción a CloudStack
Introducción a CloudStack
 
13
1313
13
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Linux virtualization in a nutshell
Linux virtualization in a nutshellLinux virtualization in a nutshell
Linux virtualization in a nutshell
 
How to Ensure Next-Generation Services
How to Ensure Next-Generation ServicesHow to Ensure Next-Generation Services
How to Ensure Next-Generation Services
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 

More from Ali Broumandnia (15)

Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 

Chapter 10

  • 1. Information Storage and Management Storing, Managing, and Protecting Digital Information Ali Broumandnia, Broumandnia@gmail.com 1
  • 2. Section II Storage Networking Technologies and Virtualization In This Section: • Chapter 5: Direct-Attached Storage and Introduction to SCSI • Chapter 6: Storage Area Networks • Chapter 7: Network-Attached Storage • Chapter 8: IP SAN • Chapter 9: Content-Addressed Storage • Chapter 10: Storage VirtualizationAli Broumandnia, Broumandnia@gmail.com 2
  • 3. Chapter 10 Storage Virtualization • 10.1 Forms of Virtualization • 10.2 SNIA Storage Virtualization Taxonomy • 10.3 Storage Virtualization Configurations • 10.4 Storage Virtualization Challenges • 10.5 Types of Storage Virtualization • 10.6 Concepts in Practice • Summary Ali Broumandnia, Broumandnia@gmail.com 3
  • 4. Key Concepts: • Memory Virtualization • Network Virtualization • Server Virtualization • Storage Virtualization • In-Band and Out-of-Band Implementations • Block-Level and File-Level Virtualization Ali Broumandnia, Broumandnia@gmail.com 4
  • 5. Virtualization is the technique of masking or abstracting physical resources, which simplifies the infrastructure and accommodates the increasing pace of business and technological changes. It increases the utilization and capability of IT resources, such as servers, networks, or storage devices, beyond their physical limits. Virtualization simplifies resource management by pooling and sharing resources for maximum utilization and makes them appear as logical resources with enhanced capabilities. Ali Broumandnia, Broumandnia@gmail.com 5
  • 6. 10.1 Forms of Virtualization Virtualization has existed in the IT industry for several years and in different forms, including memory virtualization, network virtualization, server virtualization, and storage virtualization. • Memory Virtualization • Network Virtualization • Server Virtualization • Storage Virtualization Ali Broumandnia, Broumandnia@gmail.com 6
  • 7. 10.1.1 Memory Virtualization Virtual memory makes an application appear as if it has its own contiguous logical memory independent of the existing physical memory resources. Since the beginning of the computer industry, memory has been and continues to be an expensive component of a host. It determines both the size and the number of applications that can run on a host. With technological advancements, memory technology has changed and the cost of memory has decreased. Virtual memory managers (VMMs) have evolved, enabling multiple applications to be hosted and processed simultaneously. In a virtual memory implementation, a memory address space is divided into contiguous blocks of fixed-size pages. A process known as paging saves inactive memory pages onto the disk and brings them back to physical memory when required. Ali Broumandnia, Broumandnia@gmail.com 7
  • 8. 10.1.2 Network Virtualization Network virtualization creates virtual networks whereby each application sees its own logical network independent of the physical network. A virtual LAN (VLAN) is an example of network virtualization that provides an easy, flexible, and less expensive way to manage networks. VLANs make large networks more manageable by enabling a centralized configuration of devices located in physically diverse locations. Ali Broumandnia, Broumandnia@gmail.com 8
  • 9. Virtual SAN (VSAN) A virtual SAN/virtual fabric is a recent evolution of SAN and conceptually, functions in the same way as a VLAN. In a VSAN, a group of hosts or storage ports communicate with each other using a virtual topology defined on the physical SAN. VSAN technology enables users to build one or more Virtual SANs on a single physical topology containing switches and ISLs. This technology improves storage area network (SAN) scalability, availability, and security. These benefits are derived from the separation of Fibre Channel services in each VSAN and isolation of traffic between VSANs. Some of the features of VSAN are: Ali Broumandnia, Broumandnia@gmail.com 9
  • 10. • Fibre Channel ID (FC ID) of a host in a VSAN can be assigned to a host in another VSAN, thus improving scalability of SAN. • Every instance of a VSAN runs all required protocols such as FSPF, domain manager, and zoning. • Fabric-related configurations in one VSAN do not affect the traffic in another VSAN. • Events causing traffic disruptions in one VSAN are contained within that VSAN and are not propagated to other VSANs. Ali Broumandnia, Broumandnia@gmail.com 10
  • 11. 10.1.3 Server Virtualization Server virtualization enables multiple operating systems and applications to run simultaneously on different virtual machines created on the same physical server (or group of servers). Virtual machines provide a layer of abstraction between the operating system and the underlying hardware. Within a physical server, any number of virtual servers can be established; depending on hardware capabilities (see Figure 10-1). Ali Broumandnia, Broumandnia@gmail.com 11
  • 13. 10.1.4 Storage Virtualization Storage virtualization is the process of presenting a logical view of the physical storage resources to a host. This logical storage appears and behaves as physical storage directly connected to the host. Throughout the evolution of storage technology, some form of storage virtualization has been implemented. Some examples of storage virtualization are host- based volume management, LUN creation, tape storage virtualization, and disk addressing (CHS to LBA). The key benefits of storage virtualization include increased storage utilization, adding or deleting storage without affecting an application’s availability, and nondestructive data migration. Figure 10-2 illustrates a virtualized storage environment. At the top are four servers, each of which has one virtual volume assigned, which is currently in use by an application. Ali Broumandnia, Broumandnia@gmail.com 13
  • 15. 10.2 SNIA Storage Virtualization Taxonomy The SNIA (Storage Networking Industry Association) storage virtualization taxonomy (see Figure 10-3) provides a systematic classification of storage virtualization, with three levels defining what, where, and how storage can be virtualized. Ali Broumandnia, Broumandnia@gmail.com 15
  • 17. The first level of the storage virtualization taxonomy addresses “what” is created. It specifies the types of virtualization: block virtualization, file virtualization, disk virtualization, tape virtualization, or any other device virtualization. Block-level and file-level virtualization are the core focus areas covered later in this chapter. The second level describes “where” the virtualization can take place. This requires a multilevel approach that characterizes virtualization at all three levels of the storage environment: • Server • storage network • Storage as shown in Figure 10-4.Ali Broumandnia, Broumandnia@gmail.com 17
  • 19. 10.3 Storage Virtualization Configurations Storage virtualization at the network is implemented using either the in- band or the out-of-band methodology. In an out-of-band implementation, the virtualized environment configuration is stored external to the data path. As shown in Figure 10-5(a), the configuration is stored on the virtualization appliance configured external to the storage network that carries the data. This configuration is also called split-path because the control and data paths are split (the control path runs through the appliance, the data path does not). This configuration enables the environment to process data at a network speed with only minimal latency added for translation of the virtual configuration to the physical storage. Ali Broumandnia, Broumandnia@gmail.com 19
  • 21. 10.4 Storage Virtualization Challenges Storage networking and feature-rich intelligent storage arrays have addressed and provided specific solutions to business problems. As an enabler, virtualization should add value to the existing solution, but introducing virtualization into an environment adds new challenges. The storage virtualization solution must be capable of addressing issues such as scalability, functionality, manageability, and support. • Scalability • Functionality • Manageability • SupportAli Broumandnia, Broumandnia@gmail.com 21
  • 22. 10.5 Types of Storage Virtualization Virtual storage is about providing logical storage to hosts and applications independent of physical resources. Virtualization can be implemented in both SAN and NAS storage environments. In a SAN, virtualization is applied at the block level, whereas in NAS, it is applied at the file level. • Block-Level Storage Virtualization • File-Level Virtualization Ali Broumandnia, Broumandnia@gmail.com 22
  • 23. 10.5.1 Block-Level Storage Virtualization Block-level storage virtualization provides a translation layer in the SAN, between the hosts and the storage arrays, as shown in Figure 10-6. Instead of being directed to the LUNs on the individual storage arrays, the hosts are directed to the virtualized LUNs on the virtualization device. The virtualization device translates between the virtual LUNs and the physical LUNs on the individual arrays. This facilitates the use of arrays from different vendors simultaneously, without any interoperability issues. For a host, all the arrays appear like a single target device and LUNs can be distributed or even split across multiple arrays. Ali Broumandnia, Broumandnia@gmail.com 23
  • 25. 10.5.2 File-Level Virtualization File-level virtualization addresses the NAS challenges by eliminating the dependencies between the data accessed at the file level and the location where the files are physically stored. This provides opportunities to optimize storage utilization and server consolidation and to perform nondestructive file migrations. Figure 10-7 illustrates a NAS environment before and after the implementation of file-level virtualization. Ali Broumandnia, Broumandnia@gmail.com 25
  • 27. 10.6 Concepts in Practice EMC Invista and Rainfinity are EMC product implementations of block-level and file-level virtualization, respectively. These virtualization solutions offer improvements over traditional device-level controls in the area of capacity utilization, storage tier management, performance optimization, and data protection. Ali Broumandnia, Broumandnia@gmail.com 27
  • 28. 10.6.1 EMC Invista EMC Invista is an out of band SAN-based block-level storage virtualization solution. It uses intelligent SAN switches with customized hardware to virtualize physical storage in a logical presentation. These switches are capable of handling data operations at network speed. These switches are capable of handling data operations at network speed. They use specialized software to examine the port, logical volume, and offset to which the I/O is sent and can control the target path of I/O s to the storage devices. Invista is physically located between the production hosts and the storage arrays, as shown in Figure 10-8.Ali Broumandnia, Broumandnia@gmail.com 28
  • 30. Invista Components Figure 10-9 shows the hardware components of an Invista instance. Ali Broumandnia, Broumandnia@gmail.com 30
  • 31. Invista Operation When an I/O request from a host arrives at the DPC, it handles the I/O and maps it to the appropriate virtual target (or initiator), as shown in Figure 10-10. Ali Broumandnia, Broumandnia@gmail.com 31
  • 32. Invista Advantages EMC Invista provides block-level storage virtualization in heterogeneous storage environments. It also supports dynamic volume mobility for volume extension and data migration between different storage tiers without any downtime. Invista supports local and remote replication functionality; and it integrates with the existing SAN infrastructure and uses the full fabric bandwidth for high-speed I/O processing. Invista provides separate data and control paths for easy management and faster I/O processing. Ali Broumandnia, Broumandnia@gmail.com 32
  • 33. 10.6.2 Rainfinity Rainfinity is a dedicated hardware/software solution for file-level virtualization. The Rainfinity Global File Virtualization (GFV) appliance (see Figure 10-11) provides an abstraction of file-based storage transparently to users. Files can be moved from one file server to another even when clients are reading and writing their data. • Rainfinity Components • Rainfinity Operations • Global Namespace Management • Rainfinity AdvantagesAli Broumandnia, Broumandnia@gmail.com 33
  • 35. Summary Virtualization provides flexibility while easing management of the existing infrastructure. Virtualization enables users to optimally utilize current processes, technologies, and systems. It allows for the addition, modification, or replacement of physical resources without affecting application availability. Virtualization technology offers high security and data integrity, which are mandatory for centralized computing environments. It also reduces performance degradation issues and unplanned downtime due to faults, and ensures increased availability of hardware resources. This chapter detailed the different forms of virtualization and their benefits. Ali Broumandnia, Broumandnia@gmail.com 35
  • 36. It also covered block-level and file-level storage virtualization and provided associated product examples, explaining their processes. The data mobility features in virtualization ensure uninterrupted storage operation and prevent application outages due to any resource conflict or unavailability. Resources and data are still vulnerable to natural disasters and other planned and unplanned outages, which can affect data availability. The next chapter covers business continuity and describes disaster recovery solutions that ensure high availability and uninterrupted business operations. Ali Broumandnia, Broumandnia@gmail.com 36