SlideShare a Scribd company logo
1 of 16
VSAN
Virtual Storage Area Network
VSAN
• A virtual storage area network (VSAN) is a logical partition in a physical storage
area network (SAN).
• Subscribers can be added or relocated without the need for changing the
physical layout.
• A virtual SAN appliance allows unused storage capacity on virtual servers to be
pooled and accessed by virtual servers as needed.
• VSANs allow traffic to be isolated within specific portions of a storage area
network so that if a problem occurs in one logical partition, it can be handled
with a minimum of disruption to the rest of the network.
EXAMPLE
Introduction
• Common storage architecture :
 DAS - Direct Attached Storage
• Storage device was directly attached to a
server or workstation, without a storage
network in between.
 NAS - Network Attached Storage
• File-level computer data storage
connected to a computer network
providing data access to heterogeneous
clients.
 SAN - Storage Area Network
• Attach remote storage devices to servers
in such a way that the devices appear as
locally attached to the operating system.
Introduction
• Desirable properties of storage virtualization:
 Manageability
• Storage resource should be easily configured and deployed.
 Availability
• Storage hardware failures should not affect the application.
 Scalability
• Storage resource can easily scale up and down.
 Security
• Storage resource should be securely isolated.
Where To Be Virtualized
• Different approaches :
 Host-based approach
• Implemented as a software
running on host systems.
 Network-based approach
• Implemented on network devices.
 Storage-based approach
• Implemented on storage target
subsystem.
Host-based Virtualization
• Host-based approach
 File level
• Run virtualized file system on the
host to map files into data blocks,
which distributed among several
storage devices.
 Block level
• Run logical volume management
software on the host to intercept I/O
requests and redirect them to
storage devices.
 Provide services
• Software RAID
Sub-file
1
Sub-file
2
Sub-file
3
Block 1 Block 2 Block 1 Block 2 Block 1
Network-based Virtualization
• Network-based approach
 File level
• Seldom implement file level
virtualization on network device.
 Block level
• Run software on dedicated
appliances or intelligent switches
and routers.
 Provide services
• Multi-path
• Storage pooling
Block 1 Block 2 Block 1 Block 2 Block 1
Storage-based Virtualization
• Storage-based approach
 File level
• Run software on storage device to
provide file based data storage
services to host through network.
 Block level
• Embeds the technology in the target
storage devices.
 Provide services
• Storage pooling
• Replication and RAID
• Data sharing and tiering Sub-file
1
Sub-file
2
Sub-file
3
Sub-file
1.bak
Sub-file
2.bak
Block 1 Block 1 Block 1
Block 1 Block 1 Block 1
Replica Replica Replica
Implementation
In-band Virtualization
• Implementation methods :
 In-band
• Also known as symmetric,
virtualization devices actually sit in
the data path between the host
and storage.
• Hosts perform IO to the virtualized
device and never interact with the
actual storage device.
 Pros
• Easy to implement
 Cons
• Bad scalability & Bottle neck
Data Data Data
Control
Message
Control
Message
Control
Message
Control
Message
Control
Message
Control
Message
Out-of-band Virtualization
• Implementation methods :
 Out-of-band
• Also known as asymmetric,
virtualization devices are
sometimes called metadata
servers.
• Require additional software in the
host which knows the first request
location of the actual data.
 Pros
• Scalability & Performance
 Cons
• Hard to implement
Control
Message
Control
Message
Control
Message
Control
Message
Control
Message
Control
Message
Data Data Data
Benefits of SAN
• Enhanced application availability
• Higher application performance
• Centralized and consolidated storage
• Data transfer and vaulting to remote sites
• Simplified centralized management
• https://www.youtube.com/watch?v=g8S3UT_vvUo

More Related Content

Similar to VSAN My.pptx

Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingRutuja751147
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
 
ServerVirtualization.pptx
ServerVirtualization.pptxServerVirtualization.pptx
ServerVirtualization.pptxSatyajeetGaur3
 
Lecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxLecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxUbaidURRahman78
 
Storage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsStorage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsMichael Hudak
 
Storage virtualization on storage devices
Storage virtualization on storage devicesStorage virtualization on storage devices
Storage virtualization on storage devicesShubham_Indrawat
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdfSamiksha880257
 
CC Module 5.pptx
CC Module 5.pptxCC Module 5.pptx
CC Module 5.pptxAmmuLiki
 
Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds Orgad Kimchi
 
CloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWestCloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWestke4qqq
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveAugusto Ciuffoletti
 
Nexenta Powered by Apache CloudStack from Iliyas Shirol
Nexenta Powered by Apache CloudStack from Iliyas ShirolNexenta Powered by Apache CloudStack from Iliyas Shirol
Nexenta Powered by Apache CloudStack from Iliyas ShirolRadhika Puthiyetath
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareDuncan Epping
 
Need_Of_Virtualization.ppt
Need_Of_Virtualization.pptNeed_Of_Virtualization.ppt
Need_Of_Virtualization.ppt9260SahilPatil
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services OverviewMichael Fork
 
State of the Container Ecosystem
State of the Container EcosystemState of the Container Ecosystem
State of the Container EcosystemVinay Rao
 
Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015VMUG IT
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingnajihah91
 

Similar to VSAN My.pptx (20)

Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud Computing
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
ServerVirtualization.pptx
ServerVirtualization.pptxServerVirtualization.pptx
ServerVirtualization.pptx
 
Lecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptxLecture5_ServerVirtualization.pptx
Lecture5_ServerVirtualization.pptx
 
Storage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows EnfironmentsStorage for Microsoft®Windows Enfironments
Storage for Microsoft®Windows Enfironments
 
Storage virtualization on storage devices
Storage virtualization on storage devicesStorage virtualization on storage devices
Storage virtualization on storage devices
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
CC Module 5.pptx
CC Module 5.pptxCC Module 5.pptx
CC Module 5.pptx
 
Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds
 
CloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWestCloudStack - LinuxFest NorthWest
CloudStack - LinuxFest NorthWest
 
Unit11
Unit11Unit11
Unit11
 
Monitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspectiveMonitoring a virtual network infrastructure - An IaaS perspective
Monitoring a virtual network infrastructure - An IaaS perspective
 
Nexenta Powered by Apache CloudStack from Iliyas Shirol
Nexenta Powered by Apache CloudStack from Iliyas ShirolNexenta Powered by Apache CloudStack from Iliyas Shirol
Nexenta Powered by Apache CloudStack from Iliyas Shirol
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
 
Need_Of_Virtualization.ppt
Need_Of_Virtualization.pptNeed_Of_Virtualization.ppt
Need_Of_Virtualization.ppt
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services Overview
 
State of the Container Ecosystem
State of the Container EcosystemState of the Container Ecosystem
State of the Container Ecosystem
 
Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

VSAN My.pptx

  • 2.
  • 3. VSAN • A virtual storage area network (VSAN) is a logical partition in a physical storage area network (SAN). • Subscribers can be added or relocated without the need for changing the physical layout. • A virtual SAN appliance allows unused storage capacity on virtual servers to be pooled and accessed by virtual servers as needed. • VSANs allow traffic to be isolated within specific portions of a storage area network so that if a problem occurs in one logical partition, it can be handled with a minimum of disruption to the rest of the network.
  • 5.
  • 6. Introduction • Common storage architecture :  DAS - Direct Attached Storage • Storage device was directly attached to a server or workstation, without a storage network in between.  NAS - Network Attached Storage • File-level computer data storage connected to a computer network providing data access to heterogeneous clients.  SAN - Storage Area Network • Attach remote storage devices to servers in such a way that the devices appear as locally attached to the operating system.
  • 7. Introduction • Desirable properties of storage virtualization:  Manageability • Storage resource should be easily configured and deployed.  Availability • Storage hardware failures should not affect the application.  Scalability • Storage resource can easily scale up and down.  Security • Storage resource should be securely isolated.
  • 8. Where To Be Virtualized • Different approaches :  Host-based approach • Implemented as a software running on host systems.  Network-based approach • Implemented on network devices.  Storage-based approach • Implemented on storage target subsystem.
  • 9. Host-based Virtualization • Host-based approach  File level • Run virtualized file system on the host to map files into data blocks, which distributed among several storage devices.  Block level • Run logical volume management software on the host to intercept I/O requests and redirect them to storage devices.  Provide services • Software RAID Sub-file 1 Sub-file 2 Sub-file 3 Block 1 Block 2 Block 1 Block 2 Block 1
  • 10. Network-based Virtualization • Network-based approach  File level • Seldom implement file level virtualization on network device.  Block level • Run software on dedicated appliances or intelligent switches and routers.  Provide services • Multi-path • Storage pooling Block 1 Block 2 Block 1 Block 2 Block 1
  • 11. Storage-based Virtualization • Storage-based approach  File level • Run software on storage device to provide file based data storage services to host through network.  Block level • Embeds the technology in the target storage devices.  Provide services • Storage pooling • Replication and RAID • Data sharing and tiering Sub-file 1 Sub-file 2 Sub-file 3 Sub-file 1.bak Sub-file 2.bak Block 1 Block 1 Block 1 Block 1 Block 1 Block 1 Replica Replica Replica
  • 13. In-band Virtualization • Implementation methods :  In-band • Also known as symmetric, virtualization devices actually sit in the data path between the host and storage. • Hosts perform IO to the virtualized device and never interact with the actual storage device.  Pros • Easy to implement  Cons • Bad scalability & Bottle neck Data Data Data Control Message Control Message Control Message Control Message Control Message Control Message
  • 14. Out-of-band Virtualization • Implementation methods :  Out-of-band • Also known as asymmetric, virtualization devices are sometimes called metadata servers. • Require additional software in the host which knows the first request location of the actual data.  Pros • Scalability & Performance  Cons • Hard to implement Control Message Control Message Control Message Control Message Control Message Control Message Data Data Data
  • 15. Benefits of SAN • Enhanced application availability • Higher application performance • Centralized and consolidated storage • Data transfer and vaulting to remote sites • Simplified centralized management