SlideShare a Scribd company logo
Information Storage and
Management
Storing, Managing, and Protecting Digital Information
Ali Broumandnia, Broumandnia@gmail.com 1
Section II
Storage Networking Technologies
and Virtualization
In This Section:
• Chapter 5: Direct-Attached Storage and Introduction to SCSI
• Chapter 6: Storage Area Networks
• Chapter 7: Network-Attached Storage
• Chapter 8: IP SAN
• Chapter 9: Content-Addressed Storage
• Chapter 10: Storage VirtualizationAli Broumandnia, Broumandnia@gmail.com 2
Chapter 10
Storage Virtualization
• 10.1 Forms of Virtualization
• 10.2 SNIA Storage Virtualization Taxonomy
• 10.3 Storage Virtualization Configurations
• 10.4 Storage Virtualization Challenges
• 10.5 Types of Storage Virtualization
• 10.6 Concepts in Practice
• Summary
Ali Broumandnia, Broumandnia@gmail.com 3
Key Concepts:
• Memory Virtualization
• Network Virtualization
• Server Virtualization
• Storage Virtualization
• In-Band and Out-of-Band Implementations
• Block-Level and File-Level Virtualization
Ali Broumandnia, Broumandnia@gmail.com 4
Virtualization is the technique of masking or abstracting physical
resources, which simplifies the infrastructure and accommodates the
increasing pace of business and technological changes. It increases the
utilization and capability of IT resources, such as servers, networks, or
storage devices, beyond their physical limits. Virtualization simplifies
resource management by pooling and sharing resources for maximum
utilization and makes them appear as logical resources with enhanced
capabilities.
Ali Broumandnia, Broumandnia@gmail.com 5
10.1 Forms of Virtualization
Virtualization has existed in the IT industry for several years and
in different forms, including memory virtualization, network
virtualization, server virtualization, and storage virtualization.
• Memory Virtualization
• Network Virtualization
• Server Virtualization
• Storage Virtualization
Ali Broumandnia, Broumandnia@gmail.com 6
10.1.1 Memory Virtualization
Virtual memory makes an application appear as if it has its own
contiguous logical memory independent of the existing physical
memory resources. Since the beginning of the computer industry,
memory has been and continues to be an expensive component of a
host. It determines both the size and the number of applications that
can run on a host. With technological advancements, memory
technology has changed and the cost of memory has decreased. Virtual
memory managers (VMMs) have evolved, enabling multiple
applications to be hosted and processed simultaneously. In a virtual
memory implementation, a memory address space is divided into
contiguous blocks of fixed-size pages. A process known as paging
saves inactive memory pages onto the disk and brings them back to
physical memory when required.
Ali Broumandnia, Broumandnia@gmail.com 7
10.1.2 Network Virtualization
Network virtualization creates virtual networks whereby each
application sees its own logical network independent of the physical
network. A virtual LAN (VLAN) is an example of network virtualization
that provides an easy, flexible, and less expensive way to manage
networks. VLANs make large networks more manageable by enabling a
centralized configuration of devices located in physically diverse
locations.
Ali Broumandnia, Broumandnia@gmail.com 8
Virtual SAN (VSAN)
A virtual SAN/virtual fabric is a recent evolution of SAN and conceptually,
functions in the same way as a VLAN. In a VSAN, a group of hosts or
storage ports communicate with each other using a virtual topology defined
on the physical SAN. VSAN technology enables users to build one or more
Virtual SANs on a single physical topology containing switches and ISLs.
This technology improves storage area network (SAN) scalability,
availability, and security. These benefits are derived from the separation of
Fibre Channel services in each VSAN and isolation of traffic between
VSANs. Some of the features of VSAN are:
Ali Broumandnia, Broumandnia@gmail.com 9
• Fibre Channel ID (FC ID) of a host in a VSAN can be assigned
to a host in another VSAN, thus improving scalability of SAN.
• Every instance of a VSAN runs all required protocols such as
FSPF, domain manager, and zoning.
• Fabric-related configurations in one VSAN do not affect the
traffic in another VSAN.
• Events causing traffic disruptions in one VSAN are contained
within that VSAN and are not propagated to other VSANs.
Ali Broumandnia, Broumandnia@gmail.com 10
10.1.3 Server Virtualization
Server virtualization enables multiple operating systems and
applications to run simultaneously on different virtual machines
created on the same physical server (or group of servers). Virtual
machines provide a layer of abstraction between the operating
system and the underlying hardware. Within a physical server, any
number of virtual servers can be established; depending on
hardware capabilities (see Figure 10-1).
Ali Broumandnia, Broumandnia@gmail.com 11
Ali Broumandnia, Broumandnia@gmail.com 12
10.1.4 Storage Virtualization
Storage virtualization is the process of presenting a logical view of the
physical storage resources to a host. This logical storage appears and
behaves as physical storage directly connected to the host. Throughout the
evolution of storage technology, some form of storage virtualization has
been implemented. Some examples of storage virtualization are host-
based volume management, LUN creation, tape storage virtualization, and
disk addressing (CHS to LBA). The key benefits of storage virtualization
include increased storage utilization, adding or deleting storage without
affecting an application’s availability, and nondestructive data migration.
Figure 10-2 illustrates a virtualized storage environment. At the top are
four servers, each of which has one virtual volume assigned, which is
currently in use by an application.
Ali Broumandnia, Broumandnia@gmail.com 13
Ali Broumandnia, Broumandnia@gmail.com 14
10.2 SNIA Storage Virtualization Taxonomy
The SNIA (Storage Networking Industry Association) storage
virtualization taxonomy (see Figure 10-3) provides a systematic
classification of storage virtualization, with three levels defining
what, where, and how storage can be virtualized.
Ali Broumandnia, Broumandnia@gmail.com 15
Ali Broumandnia, Broumandnia@gmail.com 16
The first level of the storage virtualization taxonomy addresses “what” is
created. It specifies the types of virtualization: block virtualization, file
virtualization, disk virtualization, tape virtualization, or any other device
virtualization. Block-level and file-level virtualization are the core focus areas
covered later in this chapter.
The second level describes “where” the virtualization can take place. This
requires a multilevel approach that characterizes virtualization at all three levels
of the storage environment:
• Server
• storage network
• Storage
as shown in Figure 10-4.Ali Broumandnia, Broumandnia@gmail.com 17
Ali Broumandnia, Broumandnia@gmail.com 18
10.3 Storage Virtualization
Configurations
Storage virtualization at the network is implemented using either the in-
band or the out-of-band methodology. In an out-of-band implementation,
the virtualized environment configuration is stored external to the data
path. As shown in Figure 10-5(a), the configuration is stored on the
virtualization appliance configured external to the storage network that
carries the data. This configuration is also called split-path because the
control and data paths are split (the control path runs through the
appliance, the data path does not). This configuration enables the
environment to process data at a network speed with only minimal
latency added for translation of the virtual configuration to the physical
storage.
Ali Broumandnia, Broumandnia@gmail.com 19
Ali Broumandnia, Broumandnia@gmail.com 20
10.4 Storage Virtualization Challenges
Storage networking and feature-rich intelligent storage arrays have
addressed and provided specific solutions to business problems. As an
enabler, virtualization should add value to the existing solution, but
introducing virtualization into an environment adds new challenges. The
storage virtualization solution must be capable of addressing issues such
as scalability, functionality, manageability, and support.
• Scalability
• Functionality
• Manageability
• SupportAli Broumandnia, Broumandnia@gmail.com 21
10.5 Types of Storage Virtualization
Virtual storage is about providing logical storage to hosts and
applications independent of physical resources. Virtualization can be
implemented in both SAN and NAS storage environments. In a SAN,
virtualization is applied at the block level, whereas in NAS, it is applied
at the file level.
• Block-Level Storage Virtualization
• File-Level Virtualization
Ali Broumandnia, Broumandnia@gmail.com 22
10.5.1 Block-Level Storage Virtualization
Block-level storage virtualization provides a translation layer in the SAN,
between the hosts and the storage arrays, as shown in Figure 10-6.
Instead of being directed to the LUNs on the individual storage arrays,
the hosts are directed to the virtualized LUNs on the virtualization device.
The virtualization device translates between the virtual LUNs and the
physical LUNs on the individual arrays. This facilitates the use of arrays
from different vendors simultaneously, without any interoperability
issues. For a host, all the arrays appear like a single target device and
LUNs can be distributed or even split across multiple arrays.
Ali Broumandnia, Broumandnia@gmail.com 23
Ali Broumandnia, Broumandnia@gmail.com 24
10.5.2 File-Level Virtualization
File-level virtualization addresses the NAS challenges by eliminating the
dependencies between the data accessed at the file level and the location
where the files are physically stored. This provides opportunities to
optimize storage utilization and server consolidation and to perform
nondestructive file migrations. Figure 10-7 illustrates a NAS environment
before and after the implementation of file-level virtualization.
Ali Broumandnia, Broumandnia@gmail.com 25
Ali Broumandnia, Broumandnia@gmail.com 26
10.6 Concepts in Practice
EMC Invista and Rainfinity are EMC product implementations of
block-level and file-level virtualization, respectively. These
virtualization solutions offer improvements over traditional
device-level controls in the area of capacity utilization, storage tier
management, performance optimization, and data protection.
Ali Broumandnia, Broumandnia@gmail.com 27
10.6.1 EMC Invista
EMC Invista is an out of band SAN-based block-level storage
virtualization solution. It uses intelligent SAN switches with
customized hardware to virtualize physical storage in a logical
presentation. These switches are capable of handling data
operations at network speed. These switches are capable of
handling data operations at network speed. They use specialized
software to examine the port, logical volume, and offset to which
the I/O is sent and can control the target path of I/O s to the
storage devices. Invista is physically located between the
production hosts and the storage arrays, as shown in Figure 10-8.Ali Broumandnia, Broumandnia@gmail.com 28
Ali Broumandnia, Broumandnia@gmail.com 29
Invista Components
Figure 10-9 shows the hardware components of an Invista instance.
Ali Broumandnia, Broumandnia@gmail.com 30
Invista Operation
When an I/O request from a host arrives at the DPC, it handles the
I/O and maps it to the appropriate virtual target (or initiator), as
shown in Figure 10-10.
Ali Broumandnia, Broumandnia@gmail.com 31
Invista Advantages
EMC Invista provides block-level storage virtualization in
heterogeneous storage environments. It also supports dynamic
volume mobility for volume extension and data migration between
different storage tiers without any downtime. Invista supports local
and remote replication functionality; and it integrates with the
existing SAN infrastructure and uses the full fabric bandwidth for
high-speed I/O processing. Invista provides separate data and
control paths for easy management and faster I/O processing.
Ali Broumandnia, Broumandnia@gmail.com 32
10.6.2 Rainfinity
Rainfinity is a dedicated hardware/software solution for file-level
virtualization. The Rainfinity Global File Virtualization (GFV)
appliance (see Figure 10-11) provides an abstraction of file-based
storage transparently to users. Files can be moved from one file
server to another even when clients are reading and writing their
data.
• Rainfinity Components
• Rainfinity Operations
• Global Namespace Management
• Rainfinity AdvantagesAli Broumandnia, Broumandnia@gmail.com 33
Ali Broumandnia, Broumandnia@gmail.com 34
Summary
Virtualization provides flexibility while easing management of the
existing infrastructure. Virtualization enables users to optimally
utilize current processes, technologies, and systems. It allows for the
addition, modification, or replacement of physical resources without
affecting application availability. Virtualization technology offers
high security and data integrity, which are mandatory for centralized
computing environments. It also reduces performance degradation
issues and unplanned downtime due to faults, and ensures increased
availability of hardware resources. This chapter detailed the different
forms of virtualization and their benefits.
Ali Broumandnia, Broumandnia@gmail.com 35
It also covered block-level and file-level storage virtualization and
provided associated product examples, explaining their processes. The
data mobility features in virtualization ensure uninterrupted storage
operation and prevent application outages due to any resource conflict or
unavailability. Resources and data are still vulnerable to natural disasters
and other planned and unplanned outages, which can affect data
availability. The next chapter covers business continuity and describes
disaster recovery solutions that ensure high availability and uninterrupted
business operations.
Ali Broumandnia, Broumandnia@gmail.com 36

More Related Content

What's hot

directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mounting
rajshreemuthiah
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
Uzair Khan
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
Student
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
Mehul Jariwala
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
hktripathy
 
Case study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash BadoneCase study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash Badone
Akash Badone
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
Shashi soni
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
Jacob Zvirikuzhe
 
Virtualization
VirtualizationVirtualization
Virtualization
Utkarsh Soni
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
Prateek Soni
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architectureAdeel Javaid
 
What is difference between dbms and rdbms
What is difference between dbms and rdbmsWhat is difference between dbms and rdbms
What is difference between dbms and rdbms
Afrasiyab Haider
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
Gokulnath S
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
Ashok Kumar
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)Krishna Kahar
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
JAINIK PATEL
 
Failover cluster
Failover clusterFailover cluster
Failover cluster
Chinmoy Jena
 
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Majid Hajibaba
 

What's hot (20)

directory structure and file system mounting
directory structure and file system mountingdirectory structure and file system mounting
directory structure and file system mounting
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Case study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash BadoneCase study of amazon EC2 by Akash Badone
Case study of amazon EC2 by Akash Badone
 
What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...What is Virtualization and its types & Techniques.What is hypervisor and its ...
What is Virtualization and its types & Techniques.What is hypervisor and its ...
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Distributed deadlock
Distributed deadlockDistributed deadlock
Distributed deadlock
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
What is difference between dbms and rdbms
What is difference between dbms and rdbmsWhat is difference between dbms and rdbms
What is difference between dbms and rdbms
 
Implementation levels of virtualization
Implementation levels of virtualizationImplementation levels of virtualization
Implementation levels of virtualization
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Failover cluster
Failover clusterFailover cluster
Failover cluster
 
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
Cloud Computing Principles and Paradigms: 9 aneka-integration of private and ...
 

Similar to Chapter 10

VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage Architecture
Gridstore
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
Jamie Shoup
 
Virtualization
VirtualizationVirtualization
Virtualization
Ajay Chawda
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
HTS Hosting
 
Virtualization
VirtualizationVirtualization
Virtualization
Kingston Smiler
 
186508162-VIRTUALIZATION.pptx
186508162-VIRTUALIZATION.pptx186508162-VIRTUALIZATION.pptx
186508162-VIRTUALIZATION.pptx
son2483
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
Mohammed Sajjad Ali
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization IntroductionStephen Foskett
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
Hitesh Mohapatra
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 
Introducción a CloudStack
Introducción a CloudStackIntroducción a CloudStack
Introducción a CloudStack
Hollman Enciso
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
XanGwaps
 
Linux virtualization in a nutshell
Linux virtualization in a nutshellLinux virtualization in a nutshell
Linux virtualization in a nutshell
pv_narayanan
 
How to Ensure Next-Generation Services
How to Ensure Next-Generation ServicesHow to Ensure Next-Generation Services
How to Ensure Next-Generation Services
Fluke Networks
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
ROSHNI PRADHAN
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
Ravindra Dastikop
 

Similar to Chapter 10 (20)

Vmware san connectivity
Vmware san connectivityVmware san connectivity
Vmware san connectivity
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
Gridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage ArchitectureGridstore's Software-Defined-Storage Architecture
Gridstore's Software-Defined-Storage Architecture
 
Sneak peak of Cloud Computing
Sneak peak of Cloud ComputingSneak peak of Cloud Computing
Sneak peak of Cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Virtualization
VirtualizationVirtualization
Virtualization
 
186508162-VIRTUALIZATION.pptx
186508162-VIRTUALIZATION.pptx186508162-VIRTUALIZATION.pptx
186508162-VIRTUALIZATION.pptx
 
Cloud Infrastructure Mechanisms
Cloud Infrastructure MechanismsCloud Infrastructure Mechanisms
Cloud Infrastructure Mechanisms
 
lect 1TO 5.pptx
lect 1TO 5.pptxlect 1TO 5.pptx
lect 1TO 5.pptx
 
Storage Virtualization Introduction
Storage Virtualization IntroductionStorage Virtualization Introduction
Storage Virtualization Introduction
 
Virtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud ComputingVirtualization: A Key to Efficient Cloud Computing
Virtualization: A Key to Efficient Cloud Computing
 
Virtulization
VirtulizationVirtulization
Virtulization
 
Introducción a CloudStack
Introducción a CloudStackIntroducción a CloudStack
Introducción a CloudStack
 
13
1313
13
 
virtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptxvirtualization-220403085202_Chapter1.pptx
virtualization-220403085202_Chapter1.pptx
 
Linux virtualization in a nutshell
Linux virtualization in a nutshellLinux virtualization in a nutshell
Linux virtualization in a nutshell
 
How to Ensure Next-Generation Services
How to Ensure Next-Generation ServicesHow to Ensure Next-Generation Services
How to Ensure Next-Generation Services
 
1 virtualization
1 virtualization1 virtualization
1 virtualization
 
cloud virtualization technology
 cloud virtualization technology  cloud virtualization technology
cloud virtualization technology
 

More from Ali Broumandnia

Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
Ali Broumandnia
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
Ali Broumandnia
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
Ali Broumandnia
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
Ali Broumandnia
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Ali Broumandnia
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
Ali Broumandnia
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
Ali Broumandnia
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Ali Broumandnia
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Ali Broumandnia
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Ali Broumandnia
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Ali Broumandnia
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
Ali Broumandnia
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
Ali Broumandnia
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Ali Broumandnia
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
Ali Broumandnia
 

More from Ali Broumandnia (15)

Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 

Recently uploaded

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 

Recently uploaded (20)

Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 

Chapter 10

  • 1. Information Storage and Management Storing, Managing, and Protecting Digital Information Ali Broumandnia, Broumandnia@gmail.com 1
  • 2. Section II Storage Networking Technologies and Virtualization In This Section: • Chapter 5: Direct-Attached Storage and Introduction to SCSI • Chapter 6: Storage Area Networks • Chapter 7: Network-Attached Storage • Chapter 8: IP SAN • Chapter 9: Content-Addressed Storage • Chapter 10: Storage VirtualizationAli Broumandnia, Broumandnia@gmail.com 2
  • 3. Chapter 10 Storage Virtualization • 10.1 Forms of Virtualization • 10.2 SNIA Storage Virtualization Taxonomy • 10.3 Storage Virtualization Configurations • 10.4 Storage Virtualization Challenges • 10.5 Types of Storage Virtualization • 10.6 Concepts in Practice • Summary Ali Broumandnia, Broumandnia@gmail.com 3
  • 4. Key Concepts: • Memory Virtualization • Network Virtualization • Server Virtualization • Storage Virtualization • In-Band and Out-of-Band Implementations • Block-Level and File-Level Virtualization Ali Broumandnia, Broumandnia@gmail.com 4
  • 5. Virtualization is the technique of masking or abstracting physical resources, which simplifies the infrastructure and accommodates the increasing pace of business and technological changes. It increases the utilization and capability of IT resources, such as servers, networks, or storage devices, beyond their physical limits. Virtualization simplifies resource management by pooling and sharing resources for maximum utilization and makes them appear as logical resources with enhanced capabilities. Ali Broumandnia, Broumandnia@gmail.com 5
  • 6. 10.1 Forms of Virtualization Virtualization has existed in the IT industry for several years and in different forms, including memory virtualization, network virtualization, server virtualization, and storage virtualization. • Memory Virtualization • Network Virtualization • Server Virtualization • Storage Virtualization Ali Broumandnia, Broumandnia@gmail.com 6
  • 7. 10.1.1 Memory Virtualization Virtual memory makes an application appear as if it has its own contiguous logical memory independent of the existing physical memory resources. Since the beginning of the computer industry, memory has been and continues to be an expensive component of a host. It determines both the size and the number of applications that can run on a host. With technological advancements, memory technology has changed and the cost of memory has decreased. Virtual memory managers (VMMs) have evolved, enabling multiple applications to be hosted and processed simultaneously. In a virtual memory implementation, a memory address space is divided into contiguous blocks of fixed-size pages. A process known as paging saves inactive memory pages onto the disk and brings them back to physical memory when required. Ali Broumandnia, Broumandnia@gmail.com 7
  • 8. 10.1.2 Network Virtualization Network virtualization creates virtual networks whereby each application sees its own logical network independent of the physical network. A virtual LAN (VLAN) is an example of network virtualization that provides an easy, flexible, and less expensive way to manage networks. VLANs make large networks more manageable by enabling a centralized configuration of devices located in physically diverse locations. Ali Broumandnia, Broumandnia@gmail.com 8
  • 9. Virtual SAN (VSAN) A virtual SAN/virtual fabric is a recent evolution of SAN and conceptually, functions in the same way as a VLAN. In a VSAN, a group of hosts or storage ports communicate with each other using a virtual topology defined on the physical SAN. VSAN technology enables users to build one or more Virtual SANs on a single physical topology containing switches and ISLs. This technology improves storage area network (SAN) scalability, availability, and security. These benefits are derived from the separation of Fibre Channel services in each VSAN and isolation of traffic between VSANs. Some of the features of VSAN are: Ali Broumandnia, Broumandnia@gmail.com 9
  • 10. • Fibre Channel ID (FC ID) of a host in a VSAN can be assigned to a host in another VSAN, thus improving scalability of SAN. • Every instance of a VSAN runs all required protocols such as FSPF, domain manager, and zoning. • Fabric-related configurations in one VSAN do not affect the traffic in another VSAN. • Events causing traffic disruptions in one VSAN are contained within that VSAN and are not propagated to other VSANs. Ali Broumandnia, Broumandnia@gmail.com 10
  • 11. 10.1.3 Server Virtualization Server virtualization enables multiple operating systems and applications to run simultaneously on different virtual machines created on the same physical server (or group of servers). Virtual machines provide a layer of abstraction between the operating system and the underlying hardware. Within a physical server, any number of virtual servers can be established; depending on hardware capabilities (see Figure 10-1). Ali Broumandnia, Broumandnia@gmail.com 11
  • 13. 10.1.4 Storage Virtualization Storage virtualization is the process of presenting a logical view of the physical storage resources to a host. This logical storage appears and behaves as physical storage directly connected to the host. Throughout the evolution of storage technology, some form of storage virtualization has been implemented. Some examples of storage virtualization are host- based volume management, LUN creation, tape storage virtualization, and disk addressing (CHS to LBA). The key benefits of storage virtualization include increased storage utilization, adding or deleting storage without affecting an application’s availability, and nondestructive data migration. Figure 10-2 illustrates a virtualized storage environment. At the top are four servers, each of which has one virtual volume assigned, which is currently in use by an application. Ali Broumandnia, Broumandnia@gmail.com 13
  • 15. 10.2 SNIA Storage Virtualization Taxonomy The SNIA (Storage Networking Industry Association) storage virtualization taxonomy (see Figure 10-3) provides a systematic classification of storage virtualization, with three levels defining what, where, and how storage can be virtualized. Ali Broumandnia, Broumandnia@gmail.com 15
  • 17. The first level of the storage virtualization taxonomy addresses “what” is created. It specifies the types of virtualization: block virtualization, file virtualization, disk virtualization, tape virtualization, or any other device virtualization. Block-level and file-level virtualization are the core focus areas covered later in this chapter. The second level describes “where” the virtualization can take place. This requires a multilevel approach that characterizes virtualization at all three levels of the storage environment: • Server • storage network • Storage as shown in Figure 10-4.Ali Broumandnia, Broumandnia@gmail.com 17
  • 19. 10.3 Storage Virtualization Configurations Storage virtualization at the network is implemented using either the in- band or the out-of-band methodology. In an out-of-band implementation, the virtualized environment configuration is stored external to the data path. As shown in Figure 10-5(a), the configuration is stored on the virtualization appliance configured external to the storage network that carries the data. This configuration is also called split-path because the control and data paths are split (the control path runs through the appliance, the data path does not). This configuration enables the environment to process data at a network speed with only minimal latency added for translation of the virtual configuration to the physical storage. Ali Broumandnia, Broumandnia@gmail.com 19
  • 21. 10.4 Storage Virtualization Challenges Storage networking and feature-rich intelligent storage arrays have addressed and provided specific solutions to business problems. As an enabler, virtualization should add value to the existing solution, but introducing virtualization into an environment adds new challenges. The storage virtualization solution must be capable of addressing issues such as scalability, functionality, manageability, and support. • Scalability • Functionality • Manageability • SupportAli Broumandnia, Broumandnia@gmail.com 21
  • 22. 10.5 Types of Storage Virtualization Virtual storage is about providing logical storage to hosts and applications independent of physical resources. Virtualization can be implemented in both SAN and NAS storage environments. In a SAN, virtualization is applied at the block level, whereas in NAS, it is applied at the file level. • Block-Level Storage Virtualization • File-Level Virtualization Ali Broumandnia, Broumandnia@gmail.com 22
  • 23. 10.5.1 Block-Level Storage Virtualization Block-level storage virtualization provides a translation layer in the SAN, between the hosts and the storage arrays, as shown in Figure 10-6. Instead of being directed to the LUNs on the individual storage arrays, the hosts are directed to the virtualized LUNs on the virtualization device. The virtualization device translates between the virtual LUNs and the physical LUNs on the individual arrays. This facilitates the use of arrays from different vendors simultaneously, without any interoperability issues. For a host, all the arrays appear like a single target device and LUNs can be distributed or even split across multiple arrays. Ali Broumandnia, Broumandnia@gmail.com 23
  • 25. 10.5.2 File-Level Virtualization File-level virtualization addresses the NAS challenges by eliminating the dependencies between the data accessed at the file level and the location where the files are physically stored. This provides opportunities to optimize storage utilization and server consolidation and to perform nondestructive file migrations. Figure 10-7 illustrates a NAS environment before and after the implementation of file-level virtualization. Ali Broumandnia, Broumandnia@gmail.com 25
  • 27. 10.6 Concepts in Practice EMC Invista and Rainfinity are EMC product implementations of block-level and file-level virtualization, respectively. These virtualization solutions offer improvements over traditional device-level controls in the area of capacity utilization, storage tier management, performance optimization, and data protection. Ali Broumandnia, Broumandnia@gmail.com 27
  • 28. 10.6.1 EMC Invista EMC Invista is an out of band SAN-based block-level storage virtualization solution. It uses intelligent SAN switches with customized hardware to virtualize physical storage in a logical presentation. These switches are capable of handling data operations at network speed. These switches are capable of handling data operations at network speed. They use specialized software to examine the port, logical volume, and offset to which the I/O is sent and can control the target path of I/O s to the storage devices. Invista is physically located between the production hosts and the storage arrays, as shown in Figure 10-8.Ali Broumandnia, Broumandnia@gmail.com 28
  • 30. Invista Components Figure 10-9 shows the hardware components of an Invista instance. Ali Broumandnia, Broumandnia@gmail.com 30
  • 31. Invista Operation When an I/O request from a host arrives at the DPC, it handles the I/O and maps it to the appropriate virtual target (or initiator), as shown in Figure 10-10. Ali Broumandnia, Broumandnia@gmail.com 31
  • 32. Invista Advantages EMC Invista provides block-level storage virtualization in heterogeneous storage environments. It also supports dynamic volume mobility for volume extension and data migration between different storage tiers without any downtime. Invista supports local and remote replication functionality; and it integrates with the existing SAN infrastructure and uses the full fabric bandwidth for high-speed I/O processing. Invista provides separate data and control paths for easy management and faster I/O processing. Ali Broumandnia, Broumandnia@gmail.com 32
  • 33. 10.6.2 Rainfinity Rainfinity is a dedicated hardware/software solution for file-level virtualization. The Rainfinity Global File Virtualization (GFV) appliance (see Figure 10-11) provides an abstraction of file-based storage transparently to users. Files can be moved from one file server to another even when clients are reading and writing their data. • Rainfinity Components • Rainfinity Operations • Global Namespace Management • Rainfinity AdvantagesAli Broumandnia, Broumandnia@gmail.com 33
  • 35. Summary Virtualization provides flexibility while easing management of the existing infrastructure. Virtualization enables users to optimally utilize current processes, technologies, and systems. It allows for the addition, modification, or replacement of physical resources without affecting application availability. Virtualization technology offers high security and data integrity, which are mandatory for centralized computing environments. It also reduces performance degradation issues and unplanned downtime due to faults, and ensures increased availability of hardware resources. This chapter detailed the different forms of virtualization and their benefits. Ali Broumandnia, Broumandnia@gmail.com 35
  • 36. It also covered block-level and file-level storage virtualization and provided associated product examples, explaining their processes. The data mobility features in virtualization ensure uninterrupted storage operation and prevent application outages due to any resource conflict or unavailability. Resources and data are still vulnerable to natural disasters and other planned and unplanned outages, which can affect data availability. The next chapter covers business continuity and describes disaster recovery solutions that ensure high availability and uninterrupted business operations. Ali Broumandnia, Broumandnia@gmail.com 36