SlideShare a Scribd company logo
BITS Pilani
Pilani Campus
Data Storage Technologies
& Networks
Dr. Virendra Singh Shekhawat
Department of Computer Science and Information Systems
BITS Pilani, Pilani Campus
Topics
• SAN Components
– Addressing
– Zoning
– Multi-pathing
– Trunking
– LUN Masking
• FC-SAN Performance Issues
2
BITS Pilani, Pilani Campus
SAN Addressing[1]
• World Wide Names (WWNs)
– unique World Wide Name per N-port (also
referred as WWPNs)
– Devices may have a WWN (independent of the
adapters/ports)
– Defined and maintained by IEEE
– 64-bit long
– 24-bit port addresses may be used locally to
reduce overhead.
3
BITS Pilani, Pilani Campus
SAN Addressing[2]
• 24-bit addressing - in a switched fabric
– Assigned by switch
– At login, each WWN is assigned (mapped) to a 24-bit
address by Simple Name Service (SNS)
• SNS is a component of the fabric OS – acts as a
registry/database
• Address format:
– Domain address (bits 23-16) identifies the switch
• Some addresses are reserved e.g. broadcast
• 239 possible address.
– Area address (bits 15-8) identifies a group of F-ports,
– Port address (bits 7-0) identifies a specific N-port
• Total addressible ports: 239x256x256
4
BITS Pilani, Pilani Campus
SAN-Addressing[3]
• 24-bit addressing - in an AL
– Obtained at loop initiation time and re-assigned at
login to the switch
– Address Format:
• Fabric loop address (bits 23-8) identifies the loop
– All 0s denotes a private loop i.e., not connected to any fabric
• Port address (bits 7-0) identifies a specific NL-port
– Only 126 addresses are usable (for NL-ports):
– 8B/10B encoding is used for signal balancing
– Out of the 256 bit patterns only 134 have neutral running
disparity – 7 are reserved for FC protocol usage; 1 for an FL-port
(so that the loop can be on the fabric)
5
BITS Pilani, Pilani Campus
SAN Routing
• Routing
– Analogous to switching in a LAN
– Goal:
• Keep a single path (bet. Any two ports) alive – no redundant paths or
loops
• Additional paths are held in reserve – may be used in case of failures.
– Fabric Shortest Path First (FSPF) protocol –
• Cost: hop count
• Link state protocol
• Link state database (or topology database) kept in switches
• Updated/Initialized when switch is turned on or new ISL comes up or
an ISL fails
– Switches use additional logic when hop count is same.
• Round Robin is often used for load sharing
6
BITS Pilani, Pilani Campus
SAN Zoning
• Zoning Controls device visibility in a SAN fabric
– Without zoning, initiator will probe and discover all
devices on the SAN fabric
• Zoning allows fabric segmentation
– Storage (traffic) isolation
• e.g. Scenario: Windows systems claim all visible storage
• Similar to Virtual LANs
– Broadcast isolation: each VLAN is a separate broadcast domain
– Zoning can be done based on WWN and Port
7
BITS Pilani, Pilani Campus
Zoning: Example
8
BITS Pilani, Pilani Campus
SAN Zoning
• Hardware Zoning: (1-1, 1-*, *-*)
– Based on ports connected to fabric switches
(switches-internal port numbering is used)
– A port may belong to multiple zones
– Advantage:
• Implemented into a routing engine by filtering – i.e. no
performance overhead
– Disadvantage:
• Device connections are tied to (physical) ports
9
BITS Pilani, Pilani Campus
SAN Zoning
• Software Zoning:
– Based on WWN – managed by the OS in the switch
– Number of members in a zone limited by memory
available
– A node may belong to more than one zone.
– More than one sets of zones can be defined in a
switch but only one set is active at a time
• Zone sets can be changed without bringing switch down
– Less secure :
• SZ is implemented using SNS
– Device may connect directly to switch without going through SNS
• WWN spoofing
• WWN numbers can be probed
10
BITS Pilani, Pilani Campus
SAN- Frame Filtering
• Process of inspecting each frame (i.e. header
information) at hardware level for access control
• Usually implemented as an ASIC with choice and
configuration of filter that can be done at switch
initialization/boot time.
– Allows zoning to be implemented with access control
performed at wire speed
– Port level Zoning, WWN level Zoning, Device level
Zoning, LUN level Zoning, and Protocol level Zoning can
be implemented using Frame Filtering
11
BITS Pilani, Pilani Campus
SAN-Trunking
• Grouping of ISLs into a trunk i.e. a logical link
– aka Port Channel/ISL trunk
• Useful for load sharing in the presence of zoning
– i.e. zoning need not restrict ISL usage
• Supports in-order, end-to-end transmission of
frames
– Re-ordering done by the switch as required
12
BITS Pilani, Pilani Campus
SAN-Multipathing
• Provide multiple paths between a host and a device (LUN).
– Redundancy for improved reliability and/or higher bandwidth for
improved availability / performance
• Channel subsystem of the kernel in switch OS handles multi-
pathing at software level
– Usually Separate device driver is used with following capabilities:
• Enhanced Data Availability
• Automatic path failover and recovery to alternative path
• Dynamic Load balancing
• Path selection policies
• Failures handled:
– Device Bus adapters, External SCSI cables, fibre connection cable,
host interface adapters
• Additional software needed for ensuring that the host sees a
single device.
13
BITS Pilani, Pilani Campus
SAN- LUN Masking
• LUN Masking
– Which servers (HBAs) can see which LUNs
– Performed on the storage array using WWPN of
host’s HBA in FC-SAN
• Zoning vs. Masking
– Zoning takes place at SAN switches where as LUN
masking takes place on the storage array
– LUN masking provides more detailed security than
zoning. How?
14
BITS Pilani, Pilani Campus
FC-SAN Performance Issues
• Hop-Count and Latency
• Over-subscription
– Device Over-subscription: Number of Computers that
need to access a storage device
– ISL Over-subscription: Total bandwidth requirements of
all end-to-end connections that are likely over an ISL
• Over-subscription will result in
– Congestion – Delayed Deliveries
– Blocking – Failed Deliveries
• Fan-out, Fan-in:
– Ratio of server-ports to a single storage port (Fan-out)
and Ratio of storage-ports to a single server-port (Fan-in)
15
BITS Pilani, Pilani Campus
Thank You!
16

More Related Content

What's hot

MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guide
seolangit4
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
Dmitry Figol
 
IPv6 Addressing
IPv6 AddressingIPv6 Addressing
IPv6 Addressing
Irsandi Hasan
 
5G NR parameters
5G NR parameters5G NR parameters
5G NR parameters
Sasi Reddy
 
MINI-LINK PT_Node GUI Descriptions.pdf
MINI-LINK PT_Node GUI Descriptions.pdfMINI-LINK PT_Node GUI Descriptions.pdf
MINI-LINK PT_Node GUI Descriptions.pdf
freedman701
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
Damien Magoni
 
Mikrotik load balansing
Mikrotik load balansingMikrotik load balansing
Mikrotik load balansing
Кирилл Кекер
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
Jhoni Guerrero
 
Study of 5G FAPI Specification
Study of 5G FAPI SpecificationStudy of 5G FAPI Specification
Study of 5G FAPI Specification
ImamNurBaniYusuf
 
Advances in Verification - Workshop at BMS College of Engineering
Advances in Verification - Workshop at BMS College of EngineeringAdvances in Verification - Workshop at BMS College of Engineering
Advances in Verification - Workshop at BMS College of Engineering
Ramdas Mozhikunnath
 
Router commands
Router commandsRouter commands
Router commands
Laura Lahbib
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
3G4G
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
ThousandEyes
 
Mikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW ManagementMikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW Management
gopartheredbuff
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!
Niasta Learning
 
IPv6
IPv6IPv6
Data transfer and manipulation
Data transfer and  manipulationData transfer and  manipulation
Data transfer and manipulation
PreethaPreetha5
 
IOS Zone based Firewall
IOS Zone based FirewallIOS Zone based Firewall
IOS Zone based Firewall
Netwax Lab
 
Telecom self organizing network
Telecom self organizing networkTelecom self organizing network
Telecom self organizing network
Pankaj Chomal
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
P1Security
 

What's hot (20)

MikroTik User Guide
MikroTik User GuideMikroTik User Guide
MikroTik User Guide
 
Routing Protocol EIGRP
Routing Protocol EIGRPRouting Protocol EIGRP
Routing Protocol EIGRP
 
IPv6 Addressing
IPv6 AddressingIPv6 Addressing
IPv6 Addressing
 
5G NR parameters
5G NR parameters5G NR parameters
5G NR parameters
 
MINI-LINK PT_Node GUI Descriptions.pdf
MINI-LINK PT_Node GUI Descriptions.pdfMINI-LINK PT_Node GUI Descriptions.pdf
MINI-LINK PT_Node GUI Descriptions.pdf
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
Mikrotik load balansing
Mikrotik load balansingMikrotik load balansing
Mikrotik load balansing
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
 
Study of 5G FAPI Specification
Study of 5G FAPI SpecificationStudy of 5G FAPI Specification
Study of 5G FAPI Specification
 
Advances in Verification - Workshop at BMS College of Engineering
Advances in Verification - Workshop at BMS College of EngineeringAdvances in Verification - Workshop at BMS College of Engineering
Advances in Verification - Workshop at BMS College of Engineering
 
Router commands
Router commandsRouter commands
Router commands
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Mikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW ManagementMikrotik Hotspot With Queue Tree BW Management
Mikrotik Hotspot With Queue Tree BW Management
 
F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!F5 LTM Course by NIASTA Learning!
F5 LTM Course by NIASTA Learning!
 
IPv6
IPv6IPv6
IPv6
 
Data transfer and manipulation
Data transfer and  manipulationData transfer and  manipulation
Data transfer and manipulation
 
IOS Zone based Firewall
IOS Zone based FirewallIOS Zone based Firewall
IOS Zone based Firewall
 
Telecom self organizing network
Telecom self organizing networkTelecom self organizing network
Telecom self organizing network
 
Philippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1securityPhilippe Langlois - LTE Pwnage - P1security
Philippe Langlois - LTE Pwnage - P1security
 

Similar to M4 san features-4.3.1

M4 fc stack-4.1.1
M4 fc stack-4.1.1M4 fc stack-4.1.1
M4 fc stack-4.1.1
MrudulaJoshi10
 
M2 242-scsi-bus rl-2.4.2
M2 242-scsi-bus rl-2.4.2M2 242-scsi-bus rl-2.4.2
M2 242-scsi-bus rl-2.4.2
MrudulaJoshi10
 
M4 fc san-4.2.1
M4 fc san-4.2.1M4 fc san-4.2.1
M4 fc san-4.2.1
MrudulaJoshi10
 
NETWORKERS HOME Cisco UCS PPT .
NETWORKERS HOME Cisco UCS PPT .NETWORKERS HOME Cisco UCS PPT .
NETWORKERS HOME Cisco UCS PPT .
networkershome
 
Unit 2 new
Unit 2 newUnit 2 new
Unit 2 new
PRABU M
 
M3 nfs fs-3.2.1
M3 nfs fs-3.2.1M3 nfs fs-3.2.1
M3 nfs fs-3.2.1
MrudulaJoshi10
 
M2 241-buses rl-2.4.1
M2 241-buses rl-2.4.1M2 241-buses rl-2.4.1
M2 241-buses rl-2.4.1
MrudulaJoshi10
 
Predstavitev osnov klasičnih pomnilniških sistemov - disk
Predstavitev osnov klasičnih pomnilniških sistemov - diskPredstavitev osnov klasičnih pomnilniških sistemov - disk
Predstavitev osnov klasičnih pomnilniških sistemov - disk
Klemen Bacak
 
M2 212-unix fs-rl_2.1.2
M2 212-unix fs-rl_2.1.2M2 212-unix fs-rl_2.1.2
M2 212-unix fs-rl_2.1.2
MrudulaJoshi10
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
Cisco Canada
 
Ec305.13 buses mgl
Ec305.13 buses mglEc305.13 buses mgl
Ec305.13 buses mgl
Д. Ганаа
 
Ec305.13 buses mgl
Ec305.13 buses mglEc305.13 buses mgl
Ec305.13 buses mgl
Д. Ганаа
 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011
kongara
 
IP storage
IP storageIP storage
IP storage
Priyanka Patil
 
IX Best Practices by Tay Chee Yong
IX Best Practices by Tay Chee YongIX Best Practices by Tay Chee Yong
IX Best Practices by Tay Chee Yong
MyNOG
 
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PROIDEA
 
M4 f co-e_4.4.2
M4 f co-e_4.4.2M4 f co-e_4.4.2
M4 f co-e_4.4.2
MrudulaJoshi10
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.ppt
birhanugebisa1
 
CCNA Training in Bangalore | Best Networking course in Bangalore
CCNA Training in Bangalore | Best Networking course in BangaloreCCNA Training in Bangalore | Best Networking course in Bangalore
CCNA Training in Bangalore | Best Networking course in Bangalore
TIB Academy
 
EE 281-SAN DECODED PRESENTATION
EE 281-SAN DECODED PRESENTATIONEE 281-SAN DECODED PRESENTATION
EE 281-SAN DECODED PRESENTATION
ABHASH MALVIYA
 

Similar to M4 san features-4.3.1 (20)

M4 fc stack-4.1.1
M4 fc stack-4.1.1M4 fc stack-4.1.1
M4 fc stack-4.1.1
 
M2 242-scsi-bus rl-2.4.2
M2 242-scsi-bus rl-2.4.2M2 242-scsi-bus rl-2.4.2
M2 242-scsi-bus rl-2.4.2
 
M4 fc san-4.2.1
M4 fc san-4.2.1M4 fc san-4.2.1
M4 fc san-4.2.1
 
NETWORKERS HOME Cisco UCS PPT .
NETWORKERS HOME Cisco UCS PPT .NETWORKERS HOME Cisco UCS PPT .
NETWORKERS HOME Cisco UCS PPT .
 
Unit 2 new
Unit 2 newUnit 2 new
Unit 2 new
 
M3 nfs fs-3.2.1
M3 nfs fs-3.2.1M3 nfs fs-3.2.1
M3 nfs fs-3.2.1
 
M2 241-buses rl-2.4.1
M2 241-buses rl-2.4.1M2 241-buses rl-2.4.1
M2 241-buses rl-2.4.1
 
Predstavitev osnov klasičnih pomnilniških sistemov - disk
Predstavitev osnov klasičnih pomnilniških sistemov - diskPredstavitev osnov klasičnih pomnilniških sistemov - disk
Predstavitev osnov klasičnih pomnilniških sistemov - disk
 
M2 212-unix fs-rl_2.1.2
M2 212-unix fs-rl_2.1.2M2 212-unix fs-rl_2.1.2
M2 212-unix fs-rl_2.1.2
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Ec305.13 buses mgl
Ec305.13 buses mglEc305.13 buses mgl
Ec305.13 buses mgl
 
Ec305.13 buses mgl
Ec305.13 buses mglEc305.13 buses mgl
Ec305.13 buses mgl
 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011
 
IP storage
IP storageIP storage
IP storage
 
IX Best Practices by Tay Chee Yong
IX Best Practices by Tay Chee YongIX Best Practices by Tay Chee Yong
IX Best Practices by Tay Chee Yong
 
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aqPLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
PLNOG 8: Peter Ashwood-Smith - Shortest Path Bridging IEEE 802.1aq
 
M4 f co-e_4.4.2
M4 f co-e_4.4.2M4 f co-e_4.4.2
M4 f co-e_4.4.2
 
chapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.pptchapter 1 &2 RIPv1&2.ppt
chapter 1 &2 RIPv1&2.ppt
 
CCNA Training in Bangalore | Best Networking course in Bangalore
CCNA Training in Bangalore | Best Networking course in BangaloreCCNA Training in Bangalore | Best Networking course in Bangalore
CCNA Training in Bangalore | Best Networking course in Bangalore
 
EE 281-SAN DECODED PRESENTATION
EE 281-SAN DECODED PRESENTATIONEE 281-SAN DECODED PRESENTATION
EE 281-SAN DECODED PRESENTATION
 

More from MrudulaJoshi10

M4 rdma 4.5.1
M4 rdma 4.5.1M4 rdma 4.5.1
M4 rdma 4.5.1
MrudulaJoshi10
 
M3 smb cifs-protocol_3.3.1
M3 smb cifs-protocol_3.3.1M3 smb cifs-protocol_3.3.1
M3 smb cifs-protocol_3.3.1
MrudulaJoshi10
 
M3 nfs fs-_performance_3.2.2
M3 nfs fs-_performance_3.2.2M3 nfs fs-_performance_3.2.2
M3 nfs fs-_performance_3.2.2
MrudulaJoshi10
 
M3 nas architecture-3.1.1
M3 nas architecture-3.1.1M3 nas architecture-3.1.1
M3 nas architecture-3.1.1
MrudulaJoshi10
 
M2 231-io tech-rl_2.3.1
M2 231-io tech-rl_2.3.1M2 231-io tech-rl_2.3.1
M2 231-io tech-rl_2.3.1
MrudulaJoshi10
 
M2 221-ssd fs-rl_2.2.1
M2 221-ssd fs-rl_2.2.1M2 221-ssd fs-rl_2.2.1
M2 221-ssd fs-rl_2.2.1
MrudulaJoshi10
 
M2 211-unix fs-rl_2.1.1
M2 211-unix fs-rl_2.1.1M2 211-unix fs-rl_2.1.1
M2 211-unix fs-rl_2.1.1
MrudulaJoshi10
 
M1 rl 1.4.1
M1 rl 1.4.1M1 rl 1.4.1
M1 rl 1.4.1
MrudulaJoshi10
 
M1 rl 1.3.1
M1 rl 1.3.1M1 rl 1.3.1
M1 rl 1.3.1
MrudulaJoshi10
 
M1 rl 1.2.1
M1 rl 1.2.1M1 rl 1.2.1
M1 rl 1.2.1
MrudulaJoshi10
 
M1 rl 1.1.1
M1 rl 1.1.1M1 rl 1.1.1
M1 rl 1.1.1
MrudulaJoshi10
 

More from MrudulaJoshi10 (11)

M4 rdma 4.5.1
M4 rdma 4.5.1M4 rdma 4.5.1
M4 rdma 4.5.1
 
M3 smb cifs-protocol_3.3.1
M3 smb cifs-protocol_3.3.1M3 smb cifs-protocol_3.3.1
M3 smb cifs-protocol_3.3.1
 
M3 nfs fs-_performance_3.2.2
M3 nfs fs-_performance_3.2.2M3 nfs fs-_performance_3.2.2
M3 nfs fs-_performance_3.2.2
 
M3 nas architecture-3.1.1
M3 nas architecture-3.1.1M3 nas architecture-3.1.1
M3 nas architecture-3.1.1
 
M2 231-io tech-rl_2.3.1
M2 231-io tech-rl_2.3.1M2 231-io tech-rl_2.3.1
M2 231-io tech-rl_2.3.1
 
M2 221-ssd fs-rl_2.2.1
M2 221-ssd fs-rl_2.2.1M2 221-ssd fs-rl_2.2.1
M2 221-ssd fs-rl_2.2.1
 
M2 211-unix fs-rl_2.1.1
M2 211-unix fs-rl_2.1.1M2 211-unix fs-rl_2.1.1
M2 211-unix fs-rl_2.1.1
 
M1 rl 1.4.1
M1 rl 1.4.1M1 rl 1.4.1
M1 rl 1.4.1
 
M1 rl 1.3.1
M1 rl 1.3.1M1 rl 1.3.1
M1 rl 1.3.1
 
M1 rl 1.2.1
M1 rl 1.2.1M1 rl 1.2.1
M1 rl 1.2.1
 
M1 rl 1.1.1
M1 rl 1.1.1M1 rl 1.1.1
M1 rl 1.1.1
 

Recently uploaded

Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
Yasser Mahgoub
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
ycwu0509
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
Paris Salesforce Developer Group
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
harshapolam10
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
edwin408357
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
nedcocy
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 

Recently uploaded (20)

Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 08 Doors and Windows.pdf
 
morris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdfmorris_worm_intro_and_source_code_analysis_.pdf
morris_worm_intro_and_source_code_analysis_.pdf
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
AI + Data Community Tour - Build the Next Generation of Apps with the Einstei...
 
SCALING OF MOS CIRCUITS m .pptx
SCALING OF MOS CIRCUITS m                 .pptxSCALING OF MOS CIRCUITS m                 .pptx
SCALING OF MOS CIRCUITS m .pptx
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Engineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdfEngineering Standards Wiring methods.pdf
Engineering Standards Wiring methods.pdf
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
一比一原版(爱大毕业证书)爱荷华大学毕业证如何办理
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 

M4 san features-4.3.1

  • 1. BITS Pilani Pilani Campus Data Storage Technologies & Networks Dr. Virendra Singh Shekhawat Department of Computer Science and Information Systems
  • 2. BITS Pilani, Pilani Campus Topics • SAN Components – Addressing – Zoning – Multi-pathing – Trunking – LUN Masking • FC-SAN Performance Issues 2
  • 3. BITS Pilani, Pilani Campus SAN Addressing[1] • World Wide Names (WWNs) – unique World Wide Name per N-port (also referred as WWPNs) – Devices may have a WWN (independent of the adapters/ports) – Defined and maintained by IEEE – 64-bit long – 24-bit port addresses may be used locally to reduce overhead. 3
  • 4. BITS Pilani, Pilani Campus SAN Addressing[2] • 24-bit addressing - in a switched fabric – Assigned by switch – At login, each WWN is assigned (mapped) to a 24-bit address by Simple Name Service (SNS) • SNS is a component of the fabric OS – acts as a registry/database • Address format: – Domain address (bits 23-16) identifies the switch • Some addresses are reserved e.g. broadcast • 239 possible address. – Area address (bits 15-8) identifies a group of F-ports, – Port address (bits 7-0) identifies a specific N-port • Total addressible ports: 239x256x256 4
  • 5. BITS Pilani, Pilani Campus SAN-Addressing[3] • 24-bit addressing - in an AL – Obtained at loop initiation time and re-assigned at login to the switch – Address Format: • Fabric loop address (bits 23-8) identifies the loop – All 0s denotes a private loop i.e., not connected to any fabric • Port address (bits 7-0) identifies a specific NL-port – Only 126 addresses are usable (for NL-ports): – 8B/10B encoding is used for signal balancing – Out of the 256 bit patterns only 134 have neutral running disparity – 7 are reserved for FC protocol usage; 1 for an FL-port (so that the loop can be on the fabric) 5
  • 6. BITS Pilani, Pilani Campus SAN Routing • Routing – Analogous to switching in a LAN – Goal: • Keep a single path (bet. Any two ports) alive – no redundant paths or loops • Additional paths are held in reserve – may be used in case of failures. – Fabric Shortest Path First (FSPF) protocol – • Cost: hop count • Link state protocol • Link state database (or topology database) kept in switches • Updated/Initialized when switch is turned on or new ISL comes up or an ISL fails – Switches use additional logic when hop count is same. • Round Robin is often used for load sharing 6
  • 7. BITS Pilani, Pilani Campus SAN Zoning • Zoning Controls device visibility in a SAN fabric – Without zoning, initiator will probe and discover all devices on the SAN fabric • Zoning allows fabric segmentation – Storage (traffic) isolation • e.g. Scenario: Windows systems claim all visible storage • Similar to Virtual LANs – Broadcast isolation: each VLAN is a separate broadcast domain – Zoning can be done based on WWN and Port 7
  • 8. BITS Pilani, Pilani Campus Zoning: Example 8
  • 9. BITS Pilani, Pilani Campus SAN Zoning • Hardware Zoning: (1-1, 1-*, *-*) – Based on ports connected to fabric switches (switches-internal port numbering is used) – A port may belong to multiple zones – Advantage: • Implemented into a routing engine by filtering – i.e. no performance overhead – Disadvantage: • Device connections are tied to (physical) ports 9
  • 10. BITS Pilani, Pilani Campus SAN Zoning • Software Zoning: – Based on WWN – managed by the OS in the switch – Number of members in a zone limited by memory available – A node may belong to more than one zone. – More than one sets of zones can be defined in a switch but only one set is active at a time • Zone sets can be changed without bringing switch down – Less secure : • SZ is implemented using SNS – Device may connect directly to switch without going through SNS • WWN spoofing • WWN numbers can be probed 10
  • 11. BITS Pilani, Pilani Campus SAN- Frame Filtering • Process of inspecting each frame (i.e. header information) at hardware level for access control • Usually implemented as an ASIC with choice and configuration of filter that can be done at switch initialization/boot time. – Allows zoning to be implemented with access control performed at wire speed – Port level Zoning, WWN level Zoning, Device level Zoning, LUN level Zoning, and Protocol level Zoning can be implemented using Frame Filtering 11
  • 12. BITS Pilani, Pilani Campus SAN-Trunking • Grouping of ISLs into a trunk i.e. a logical link – aka Port Channel/ISL trunk • Useful for load sharing in the presence of zoning – i.e. zoning need not restrict ISL usage • Supports in-order, end-to-end transmission of frames – Re-ordering done by the switch as required 12
  • 13. BITS Pilani, Pilani Campus SAN-Multipathing • Provide multiple paths between a host and a device (LUN). – Redundancy for improved reliability and/or higher bandwidth for improved availability / performance • Channel subsystem of the kernel in switch OS handles multi- pathing at software level – Usually Separate device driver is used with following capabilities: • Enhanced Data Availability • Automatic path failover and recovery to alternative path • Dynamic Load balancing • Path selection policies • Failures handled: – Device Bus adapters, External SCSI cables, fibre connection cable, host interface adapters • Additional software needed for ensuring that the host sees a single device. 13
  • 14. BITS Pilani, Pilani Campus SAN- LUN Masking • LUN Masking – Which servers (HBAs) can see which LUNs – Performed on the storage array using WWPN of host’s HBA in FC-SAN • Zoning vs. Masking – Zoning takes place at SAN switches where as LUN masking takes place on the storage array – LUN masking provides more detailed security than zoning. How? 14
  • 15. BITS Pilani, Pilani Campus FC-SAN Performance Issues • Hop-Count and Latency • Over-subscription – Device Over-subscription: Number of Computers that need to access a storage device – ISL Over-subscription: Total bandwidth requirements of all end-to-end connections that are likely over an ISL • Over-subscription will result in – Congestion – Delayed Deliveries – Blocking – Failed Deliveries • Fan-out, Fan-in: – Ratio of server-ports to a single storage port (Fan-out) and Ratio of storage-ports to a single server-port (Fan-in) 15
  • 16. BITS Pilani, Pilani Campus Thank You! 16