SlideShare a Scribd company logo
1 of 20
Download to read offline
Introduction to the SAS


Serial attached SCSI is a method
used to access computer
peripheral devices. It employs the
digital data transfer over the thin
cable. In business enterprise it is
used to acess the mass storage
devices.
What is SCSI

SCSI is the acronym of small
computer system interface. It
defines a logical standard to
which disk devices must adhere.
This standard called common
command set. It is a type of
parallel bus.
Introduction to SCSI



This interface is a set of standerd
for physically connecting and
transfer of data between
peripheral devices.
Basic component of
   SAS
1) Initiator.


2) Target.


3) Service delivary subsystem.


4) Expanders.
Initiator

It is a device that originate device
service and task management
system. It processing by the
target device. It is provided as on
board component in the
motherboard or as a host bus
adapter.
Target

A device containing logical unit
and target ports that receives
device service and task
management request. It could be
a hard disk or a disk array
system.
Service delivery
   subsystem

It is a part of a I/O system that
transmit information between
initiator and target. Typecally
cable connecting beteen these
devices.
Expanders


It is a part of device delivary
system and faciliate connection
between SAS devices.
Example of SAS



There are many different types of
SAS. These are SFF 8482, SFF
8484, SG_XPCIE8SAS_E_Z etc.
SAS Protocol
SAS uses point to point
architecture that data between
two different SCSI devices. It uses
differential signaling for achieving
reliable and high speed
communication. It inherits it’s
command set from parallel SCSI
and uses full duplex
communication in the fibre
channel. It uses SAS 2 protocol
it’s link rate is 6.2 Gb/s.
Cables of SAS
SAS support active cables, those
are thin cables with active
circuitry to reduce cable weight
and management. Active circuitry
have build in driver, repeaters and
equalizing filter. It removes the ISI
(inter symbol interference), it is a
type of distorted signal. Driver
and repeater increased the signal
to noise ratio by up raising the
near end cross talk (NEXT).
Topology is a arrangement of
links, nodes or computers. It may
also be called as the structure of
network. LAN is a type of physical
topology. SAS has different types
of topology. Mainly internal and
external. There are lots of other
also.
Internal Topology

In this topology RAID system use
SAS or SATA drivers. Each drive
has point to point connection with
the controllers. Maximum eight
drives are supported by
controllers. A full height HP smart
expender card support eight
internal drives.
External Topology

In this type of topology the
controller connecting to the
external storage enclosure. Each
controller port incorporate four
lanes and total maximum
throughput 2400 MB/s. The
storage enclosure contains
internal 36 port expanders.
Multi Node Cluster



SAS using this topology it is an
alternative to the fibre channel
local loop topology. It gives you a
high availability with no point of
failure.
Dual Path Dual Domain
  Architecture
T10 technological committee
SCSI defines as interconnection
of two or more SCSI devices.
When any part of data pathway
domains fails then data transfer
has stop because there is no
redundant pathway. But in this
architecture creates dual path
dual domain and redundant
pathway for storage.
Zoning

Zoning breaks topology into
different logical group for better
traffic management. It gives
unique ID in each expander PHY
to provide secure method for
managing SAS devices. All device
within zone group can interact
with each other.
SAS cable
SAS uses mini SAS 4X external
cable plug to connect to the end
devices with enclosure universal
port. Connector can attached with
the out of an enclosure or in port
of an enclosure. Connector have
icon to identify the type of
enclosure. It has a reverse key
allow them to accept SAS 2 cable
longer than 6 m.
Conclusion
SAS technology with different
signaling and active cable
continue to evolve and improve. If
you looking for high level
redundancy then dual domain
and dual path configuration helps
you. It increased the data
availability into the storage
network. Data availability is
essential for uninterrupted of
business operation.
THANK YOU

More Related Content

Viewers also liked

Supply Chain Analytic Solution
Supply Chain Analytic SolutionSupply Chain Analytic Solution
Supply Chain Analytic Solutionjsmith786
 
Intro to R for SAS and SPSS User Webinar
Intro to R for SAS and SPSS User WebinarIntro to R for SAS and SPSS User Webinar
Intro to R for SAS and SPSS User WebinarRevolution Analytics
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storagesagaroceanic11
 
INTRODUCTION TO SAS
INTRODUCTION TO SASINTRODUCTION TO SAS
INTRODUCTION TO SASBhuwanesh Rawat
 
Hard disk_
 Hard disk_ Hard disk_
Hard disk_Sucha Bee
 
Storage interface sata_pata
Storage interface sata_pataStorage interface sata_pata
Storage interface sata_pataPREMAL GAJJAR
 
Storage devices
Storage devicesStorage devices
Storage devicesConnor Hill
 
SATA Introduction
SATA IntroductionSATA Introduction
SATA IntroductionGene Chang
 
Disk Drives Interfaces
Disk Drives InterfacesDisk Drives Interfaces
Disk Drives InterfacesAmir Villas
 
Introduction to SAS
Introduction to SASIntroduction to SAS
Introduction to SASizahn
 
External Cards and Slots
External Cards and SlotsExternal Cards and Slots
External Cards and SlotsArif Samoon
 

Viewers also liked (17)

Storage School 1
Storage School 1Storage School 1
Storage School 1
 
SCSI commands
SCSI commandsSCSI commands
SCSI commands
 
Supply Chain Analytic Solution
Supply Chain Analytic SolutionSupply Chain Analytic Solution
Supply Chain Analytic Solution
 
Intro to R for SAS and SPSS User Webinar
Intro to R for SAS and SPSS User WebinarIntro to R for SAS and SPSS User Webinar
Intro to R for SAS and SPSS User Webinar
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storage
 
Chapter22
Chapter22Chapter22
Chapter22
 
INTRODUCTION TO SAS
INTRODUCTION TO SASINTRODUCTION TO SAS
INTRODUCTION TO SAS
 
Hard disk_
 Hard disk_ Hard disk_
Hard disk_
 
Storage interface sata_pata
Storage interface sata_pataStorage interface sata_pata
Storage interface sata_pata
 
San
SanSan
San
 
Storage devices
Storage devicesStorage devices
Storage devices
 
SATA Introduction
SATA IntroductionSATA Introduction
SATA Introduction
 
Disk Drives Interfaces
Disk Drives InterfacesDisk Drives Interfaces
Disk Drives Interfaces
 
Pci,usb,scsi bus
Pci,usb,scsi busPci,usb,scsi bus
Pci,usb,scsi bus
 
Introduction to SAS
Introduction to SASIntroduction to SAS
Introduction to SAS
 
External Cards and Slots
External Cards and SlotsExternal Cards and Slots
External Cards and Slots
 
Sas demo
Sas demoSas demo
Sas demo
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Introduction to the SAS

  • 1. Introduction to the SAS Serial attached SCSI is a method used to access computer peripheral devices. It employs the digital data transfer over the thin cable. In business enterprise it is used to acess the mass storage devices.
  • 2. What is SCSI SCSI is the acronym of small computer system interface. It defines a logical standard to which disk devices must adhere. This standard called common command set. It is a type of parallel bus.
  • 3. Introduction to SCSI This interface is a set of standerd for physically connecting and transfer of data between peripheral devices.
  • 4. Basic component of SAS 1) Initiator. 2) Target. 3) Service delivary subsystem. 4) Expanders.
  • 5. Initiator It is a device that originate device service and task management system. It processing by the target device. It is provided as on board component in the motherboard or as a host bus adapter.
  • 6. Target A device containing logical unit and target ports that receives device service and task management request. It could be a hard disk or a disk array system.
  • 7. Service delivery subsystem It is a part of a I/O system that transmit information between initiator and target. Typecally cable connecting beteen these devices.
  • 8. Expanders It is a part of device delivary system and faciliate connection between SAS devices.
  • 9. Example of SAS There are many different types of SAS. These are SFF 8482, SFF 8484, SG_XPCIE8SAS_E_Z etc.
  • 10. SAS Protocol SAS uses point to point architecture that data between two different SCSI devices. It uses differential signaling for achieving reliable and high speed communication. It inherits it’s command set from parallel SCSI and uses full duplex communication in the fibre channel. It uses SAS 2 protocol it’s link rate is 6.2 Gb/s.
  • 11. Cables of SAS SAS support active cables, those are thin cables with active circuitry to reduce cable weight and management. Active circuitry have build in driver, repeaters and equalizing filter. It removes the ISI (inter symbol interference), it is a type of distorted signal. Driver and repeater increased the signal to noise ratio by up raising the near end cross talk (NEXT).
  • 12. Topology is a arrangement of links, nodes or computers. It may also be called as the structure of network. LAN is a type of physical topology. SAS has different types of topology. Mainly internal and external. There are lots of other also.
  • 13. Internal Topology In this topology RAID system use SAS or SATA drivers. Each drive has point to point connection with the controllers. Maximum eight drives are supported by controllers. A full height HP smart expender card support eight internal drives.
  • 14. External Topology In this type of topology the controller connecting to the external storage enclosure. Each controller port incorporate four lanes and total maximum throughput 2400 MB/s. The storage enclosure contains internal 36 port expanders.
  • 15. Multi Node Cluster SAS using this topology it is an alternative to the fibre channel local loop topology. It gives you a high availability with no point of failure.
  • 16. Dual Path Dual Domain Architecture T10 technological committee SCSI defines as interconnection of two or more SCSI devices. When any part of data pathway domains fails then data transfer has stop because there is no redundant pathway. But in this architecture creates dual path dual domain and redundant pathway for storage.
  • 17. Zoning Zoning breaks topology into different logical group for better traffic management. It gives unique ID in each expander PHY to provide secure method for managing SAS devices. All device within zone group can interact with each other.
  • 18. SAS cable SAS uses mini SAS 4X external cable plug to connect to the end devices with enclosure universal port. Connector can attached with the out of an enclosure or in port of an enclosure. Connector have icon to identify the type of enclosure. It has a reverse key allow them to accept SAS 2 cable longer than 6 m.
  • 19. Conclusion SAS technology with different signaling and active cable continue to evolve and improve. If you looking for high level redundancy then dual domain and dual path configuration helps you. It increased the data availability into the storage network. Data availability is essential for uninterrupted of business operation.