Osnove: DAS,Trdi disk, SCSI protokol
SAN in NAS
-s protokoli, ki nastopajo v okoljih
-z napravami, katere nastopajo pri izgradnji tako osnovnih in enostavnih, kot tudi kompleksnih okolji
-topologije
Strežniki
Povezljivost
Krmilniki in gonilniki
Diskovna polja
RAID
IOPS (teorija)
Razno
Router4 needs to have static routes configured for the known subnets in the network. A default route can also be used to simplify the configuration by sending all unknown traffic to a default gateway. The default route acts as a "gateway of last resort" and should not be used if specific routes are already defined.
A router is a networking device that connects different networks and selects the best path to forward packets between them. It operates at the network layer and uses routing tables to determine the best path. Major router vendors include Cisco, Juniper, and Huawei. Routers have different types of ports including LAN ports to connect to local networks, WAN ports to connect between routers, and administrative ports for management. Routers also run an operating system like Cisco IOS to perform routing functions.
This document discusses networking hardware concepts and components. It describes common networking topologies like star, bus, ring and mesh. It also covers common networking standards for wired connections like Ethernet, Token Ring and FDDI as well as wireless standards like 802.11a, 802.11b, and 802.11g. Finally, it discusses the hardware components needed to create both wired and wireless networks, including hubs, switches, routers and network interface cards.
iSCSI allows storage devices to be accessed over IP networks rather than direct attaching via SCSI cables. It works by encapsulating SCSI commands and data within TCP packets. Key points:
- iSCSI targets export storage as logical units (LUNs) over iSCSI. Initiators can then access these LUNs remotely over IP networks.
- This allows centralized storage consolidation and disaster recovery mirroring between data centers connected via IP.
- Security features include CHAP authentication of initiators and targets as well as logical/physical network isolation of iSCSI traffic.
- Challenges include the different performance characteristics of SCSI versus TCP/IP networks, such as higher delays over WAN
The document discusses cabling and network topology. It describes different types of network topologies like bus, ring, star, mesh and point-to-point. It also discusses different types of cabling used in networks like coaxial cable, twisted pair cable, fiber optic cable and other cables. It provides details on IEEE standards for networking technologies and cabling.
This document provides an overview of SCSI drives and file systems. It describes SCSI interfaces and cables, how SCSI devices are connected in a daisy chain configuration, and SCSI standards including SCSI-1, SCSI-2, and SCSI-3. It also summarizes the FAT and NTFS file systems used in Windows, how they allocate disk space and store file information differently, and the advantages of NTFS. The document concludes with a brief explanation of how disk compression works to save space.
1) A router connects two or more networks and allows communication between them. It routes traffic between different subnets like a local network and the internet.
2) Proper configuration of a router is needed for networking and internet access. This involves settings like IP addresses, default gateways, and DNS servers for the router and connected devices.
3) Configuring a router typically involves accessing a web-based administrative panel to set up the WAN connection, local network, wireless access point, security, and other options like DHCP server settings.
Router4 needs to have static routes configured for the known subnets in the network. A default route can also be used to simplify the configuration by sending all unknown traffic to a default gateway. The default route acts as a "gateway of last resort" and should not be used if specific routes are already defined.
A router is a networking device that connects different networks and selects the best path to forward packets between them. It operates at the network layer and uses routing tables to determine the best path. Major router vendors include Cisco, Juniper, and Huawei. Routers have different types of ports including LAN ports to connect to local networks, WAN ports to connect between routers, and administrative ports for management. Routers also run an operating system like Cisco IOS to perform routing functions.
This document discusses networking hardware concepts and components. It describes common networking topologies like star, bus, ring and mesh. It also covers common networking standards for wired connections like Ethernet, Token Ring and FDDI as well as wireless standards like 802.11a, 802.11b, and 802.11g. Finally, it discusses the hardware components needed to create both wired and wireless networks, including hubs, switches, routers and network interface cards.
iSCSI allows storage devices to be accessed over IP networks rather than direct attaching via SCSI cables. It works by encapsulating SCSI commands and data within TCP packets. Key points:
- iSCSI targets export storage as logical units (LUNs) over iSCSI. Initiators can then access these LUNs remotely over IP networks.
- This allows centralized storage consolidation and disaster recovery mirroring between data centers connected via IP.
- Security features include CHAP authentication of initiators and targets as well as logical/physical network isolation of iSCSI traffic.
- Challenges include the different performance characteristics of SCSI versus TCP/IP networks, such as higher delays over WAN
The document discusses cabling and network topology. It describes different types of network topologies like bus, ring, star, mesh and point-to-point. It also discusses different types of cabling used in networks like coaxial cable, twisted pair cable, fiber optic cable and other cables. It provides details on IEEE standards for networking technologies and cabling.
This document provides an overview of SCSI drives and file systems. It describes SCSI interfaces and cables, how SCSI devices are connected in a daisy chain configuration, and SCSI standards including SCSI-1, SCSI-2, and SCSI-3. It also summarizes the FAT and NTFS file systems used in Windows, how they allocate disk space and store file information differently, and the advantages of NTFS. The document concludes with a brief explanation of how disk compression works to save space.
1) A router connects two or more networks and allows communication between them. It routes traffic between different subnets like a local network and the internet.
2) Proper configuration of a router is needed for networking and internet access. This involves settings like IP addresses, default gateways, and DNS servers for the router and connected devices.
3) Configuring a router typically involves accessing a web-based administrative panel to set up the WAN connection, local network, wireless access point, security, and other options like DHCP server settings.
SCSI (Small Computer System Interface) is a hardware interface and protocol standard that allows multiple peripheral devices to be connected to a host computer. Some key points:
- SCSI originated from SASI and was later standardized. It defines connections, commands, and protocols for devices to communicate.
- Devices have roles as initiators that request operations or targets that perform operations. A host adapter connects the SCSI bus to the computer.
- SCSI supports various bus widths, speeds, and signaling methods over several generations to improve performance and reliability over longer distances.
- Features like command queuing and tagging allow efficient handling of multiple concurrent requests between devices.
The document discusses configuring and securing a switch for use in a network. It describes summarizing Ethernet operations, switch forwarding methods, and configuring a switch through the Cisco IOS including security features like passwords, SSH, and port security. The objectives are to understand Ethernet, how switches forward frames, and configure a switch for a voice, video and data network with basic security.
PDF version slides from our talk at Navaja Negra & Conecta CON 5th Edition: Destroying Router Security.
Authors:
- José Antonio Rodríguez García
- Álvaro Folgado Rueda
- Iván Sanz de Castro
Shak larry-jeder-perf-and-tuning-summit14-part1-finalTommy Lee
This document provides an overview and agenda for a performance analysis and tuning presentation focusing on Red Hat Enterprise Linux evolution, NUMA scheduling improvements, and use of cgroups/containers for resource management. Key points include how RHEL has incorporated features like tuned profiles, transparent hugepages, automatic NUMA balancing, and how cgroups can guarantee quality of service and enable dynamic resource allocation for multi-application environments. Performance results are shown for databases and SPEC benchmarks utilizing these features.
iSCSI: Internet Small Computer System InterfaceManoj Singh
iSCSI allows SCSI commands to be sent over IP networks, extending storage networks beyond local LANs. It uses standard IP networking and requires less expertise than Fibre Channel. Key benefits include low cost by using existing network infrastructure, excellent performance as a cheaper alternative to Fibre Channel, no distance limitations, interoperability, and security features. iSCSI is recommended for budget-constrained or geographically distributed organizations and those using server virtualization.
This document discusses the evolution of CPUs from early 8-bit processors through modern Pentium and AMD chips. It covers key aspects like packaging, speeds, features added over time, and how CPUs have become more powerful with each generation. Early CPUs included the 8088, 80286, 80386, and 80486, while modern CPUs discussed are Pentium, Pentium Pro, Pentium II, Celeron, AMD K6, and Pentium III/IV chips. The document provides details on internal workings, specifications, and packaging of different CPU models over the years.
CCNA Training in Bangalore | Best Networking course in BangaloreTIB Academy
At TIB Academy, you will get the best CCNA training in Bangalore. To clear Cisco CCNA Certification, you need to be very good in basic networking concepts like network topology and network layers. So, enroll in our Networking Course immediately to get the best CCNA training and certification assistance
Shak larry-jeder-perf-and-tuning-summit14-part2-finalTommy Lee
This document provides an overview of performance analysis and tuning techniques in Red Hat Enterprise Linux (RHEL). It discusses the tuned profile packages and how they optimize systems for different workloads. Specific topics covered include disk I/O tuning, memory tuning, network performance tuning, and power management techniques. A variety of Linux performance analysis tools are also introduced, including tuned, turbostat, netsniff-ng, and Performance Co-Pilot.
USB was developed in the mid-1990s to standardize connections between computers and peripherals like keyboards, mice, cameras and drives. It has several key features including being low cost, using a single connector type, and allowing for hot plugging of devices. USB operates using a star topology with a host controller connecting devices and hubs. Communication between devices and the host occurs through pipes that associate endpoints to software. Data is transmitted using a token phase, data phase and handshake phase over differential signal lines with encoding and error checking handled by the physical layer.
This document summarizes input/output techniques discussed in Chapter 7 of William Stallings' Computer Organization and Architecture textbook. It describes three main techniques for inputting a block of data: programmed I/O, interrupt-driven I/O, and direct memory access (DMA). Programmed I/O involves the CPU directly controlling and waiting for I/O operations. Interrupt-driven I/O allows an I/O module to interrupt the CPU when an operation is complete. DMA allows an I/O module to directly transfer data between a device and memory without CPU involvement. The document also discusses I/O modules, addressing I/O devices, and industry standard interfaces like FireWire and InfiniBand
This document provides an overview of the different working modes of a router and how to configure them. It discusses the following modes: user mode, privilege mode, global configuration mode, interface configuration mode, line configuration mode, and sub-interface mode. It also provides examples of how to set the router name and clock, configure passwords, and set interfaces in these different modes. The document is intended for training purposes and reproducing or distributing it without authorization is prohibited.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
The document outlines the steps to add a second LAN to an existing network in Packet Tracer, including:
- Adding a switch, two PCs, and a server to the new LAN
- Configuring the switch, server, and router interfaces with static IP addresses
- Setting up DHCP, DNS, and HTTP services on the server to provide IP addresses, domain name resolution, and a web page for the new LAN
- Testing connectivity between the new LAN components and the existing LAN to validate the new network configuration
Network Implementation and Support Lesson 06 Disks and Data Storage - Eric ...Eric Vanderburg
This document discusses disk and data storage, including hard disk drives, basic and dynamic disks, dynamic volumes like simple, spanned and striped volumes. It describes the disk management tool and various disk status descriptions. It also covers the diskpart and chkdsk command line tools as well as RAID levels 0 through 5.
Video: http://joyent.com/blog/linux-performance-analysis-and-tools-brendan-gregg-s-talk-at-scale-11x ; This talk for SCaLE11x covers system performance analysis methodologies and the Linux tools to support them, so that you can get the most out of your systems and solve performance issues quickly. This includes a wide variety of tools, including basics like top(1), advanced tools like perf, and new tools like the DTrace for Linux prototypes.
The document provides a historical overview of Linux and embedded systems. It discusses the origins and development of Unix, GNU, and Linux. Key points include:
- Unix was first created at Bell Labs in 1969 and was highly portable due to being written in C. This led to its widespread use.
- Richard Stallman founded the GNU project in 1983 to create a free Unix-like operating system. GNU created many important tools but lacked the kernel.
- Linus Torvalds developed the Linux kernel in 1991, combining it with GNU tools to create a free open-source operating system similar to Unix.
- Today Linux is widely used in embedded systems, having been ported to architectures like ARM, M
Tuned is a tool that dynamically tunes Linux system settings for optimal performance based on usage profiles. It was created to allow systems to be tuned for peak performance during high workload times while saving power during idle periods. Tuned includes several predefined profiles that adjust settings for common use cases like high throughput, low latency, or power saving. New in Red Hat Enterprise Linux 7, Tuned is installed by default and will automatically select an initial profile based on system type. It also includes additional tuning capabilities and monitoring plugins for even more dynamic optimization of subsystems.
Business-critical applications on VMware vSphere 6, VMware Virtual SAN, and V...Principled Technologies
The document summarizes performance testing of VMware vSphere 6, VMware Virtual SAN, and VMware NSX running business-critical applications. In single-site testing, the solution delivered over 189,000 IOPS and 5ms average read latency under heavy workload. In two-site testing, it live migrated all VMs between sites in under 9 minutes with no downtime or performance degradation for applications. The software-defined datacenter solution provided reliable performance and business continuity for critical workloads.
SCSI (Small Computer System Interface) is a hardware interface and protocol standard that allows multiple peripheral devices to be connected to a host computer. Some key points:
- SCSI originated from SASI and was later standardized. It defines connections, commands, and protocols for devices to communicate.
- Devices have roles as initiators that request operations or targets that perform operations. A host adapter connects the SCSI bus to the computer.
- SCSI supports various bus widths, speeds, and signaling methods over several generations to improve performance and reliability over longer distances.
- Features like command queuing and tagging allow efficient handling of multiple concurrent requests between devices.
The document discusses configuring and securing a switch for use in a network. It describes summarizing Ethernet operations, switch forwarding methods, and configuring a switch through the Cisco IOS including security features like passwords, SSH, and port security. The objectives are to understand Ethernet, how switches forward frames, and configure a switch for a voice, video and data network with basic security.
PDF version slides from our talk at Navaja Negra & Conecta CON 5th Edition: Destroying Router Security.
Authors:
- José Antonio Rodríguez García
- Álvaro Folgado Rueda
- Iván Sanz de Castro
Shak larry-jeder-perf-and-tuning-summit14-part1-finalTommy Lee
This document provides an overview and agenda for a performance analysis and tuning presentation focusing on Red Hat Enterprise Linux evolution, NUMA scheduling improvements, and use of cgroups/containers for resource management. Key points include how RHEL has incorporated features like tuned profiles, transparent hugepages, automatic NUMA balancing, and how cgroups can guarantee quality of service and enable dynamic resource allocation for multi-application environments. Performance results are shown for databases and SPEC benchmarks utilizing these features.
iSCSI: Internet Small Computer System InterfaceManoj Singh
iSCSI allows SCSI commands to be sent over IP networks, extending storage networks beyond local LANs. It uses standard IP networking and requires less expertise than Fibre Channel. Key benefits include low cost by using existing network infrastructure, excellent performance as a cheaper alternative to Fibre Channel, no distance limitations, interoperability, and security features. iSCSI is recommended for budget-constrained or geographically distributed organizations and those using server virtualization.
This document discusses the evolution of CPUs from early 8-bit processors through modern Pentium and AMD chips. It covers key aspects like packaging, speeds, features added over time, and how CPUs have become more powerful with each generation. Early CPUs included the 8088, 80286, 80386, and 80486, while modern CPUs discussed are Pentium, Pentium Pro, Pentium II, Celeron, AMD K6, and Pentium III/IV chips. The document provides details on internal workings, specifications, and packaging of different CPU models over the years.
CCNA Training in Bangalore | Best Networking course in BangaloreTIB Academy
At TIB Academy, you will get the best CCNA training in Bangalore. To clear Cisco CCNA Certification, you need to be very good in basic networking concepts like network topology and network layers. So, enroll in our Networking Course immediately to get the best CCNA training and certification assistance
Shak larry-jeder-perf-and-tuning-summit14-part2-finalTommy Lee
This document provides an overview of performance analysis and tuning techniques in Red Hat Enterprise Linux (RHEL). It discusses the tuned profile packages and how they optimize systems for different workloads. Specific topics covered include disk I/O tuning, memory tuning, network performance tuning, and power management techniques. A variety of Linux performance analysis tools are also introduced, including tuned, turbostat, netsniff-ng, and Performance Co-Pilot.
USB was developed in the mid-1990s to standardize connections between computers and peripherals like keyboards, mice, cameras and drives. It has several key features including being low cost, using a single connector type, and allowing for hot plugging of devices. USB operates using a star topology with a host controller connecting devices and hubs. Communication between devices and the host occurs through pipes that associate endpoints to software. Data is transmitted using a token phase, data phase and handshake phase over differential signal lines with encoding and error checking handled by the physical layer.
This document summarizes input/output techniques discussed in Chapter 7 of William Stallings' Computer Organization and Architecture textbook. It describes three main techniques for inputting a block of data: programmed I/O, interrupt-driven I/O, and direct memory access (DMA). Programmed I/O involves the CPU directly controlling and waiting for I/O operations. Interrupt-driven I/O allows an I/O module to interrupt the CPU when an operation is complete. DMA allows an I/O module to directly transfer data between a device and memory without CPU involvement. The document also discusses I/O modules, addressing I/O devices, and industry standard interfaces like FireWire and InfiniBand
This document provides an overview of the different working modes of a router and how to configure them. It discusses the following modes: user mode, privilege mode, global configuration mode, interface configuration mode, line configuration mode, and sub-interface mode. It also provides examples of how to set the router name and clock, configure passwords, and set interfaces in these different modes. The document is intended for training purposes and reproducing or distributing it without authorization is prohibited.
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
This document provides an overview of basic switching concepts and Cisco switch configuration. It explains Ethernet and how switches work to segment networks and reduce collisions. Switches operate at the data link layer and learn MAC addresses to forward frames efficiently. The document discusses switch configuration using commands like hostname, interface, duplex, and port security. It compares switching methods like store-and-forward and cut-through forwarding. The summary reiterates how switches divide collision domains to improve performance over shared-medium Ethernet.
The document outlines the steps to add a second LAN to an existing network in Packet Tracer, including:
- Adding a switch, two PCs, and a server to the new LAN
- Configuring the switch, server, and router interfaces with static IP addresses
- Setting up DHCP, DNS, and HTTP services on the server to provide IP addresses, domain name resolution, and a web page for the new LAN
- Testing connectivity between the new LAN components and the existing LAN to validate the new network configuration
Network Implementation and Support Lesson 06 Disks and Data Storage - Eric ...Eric Vanderburg
This document discusses disk and data storage, including hard disk drives, basic and dynamic disks, dynamic volumes like simple, spanned and striped volumes. It describes the disk management tool and various disk status descriptions. It also covers the diskpart and chkdsk command line tools as well as RAID levels 0 through 5.
Video: http://joyent.com/blog/linux-performance-analysis-and-tools-brendan-gregg-s-talk-at-scale-11x ; This talk for SCaLE11x covers system performance analysis methodologies and the Linux tools to support them, so that you can get the most out of your systems and solve performance issues quickly. This includes a wide variety of tools, including basics like top(1), advanced tools like perf, and new tools like the DTrace for Linux prototypes.
The document provides a historical overview of Linux and embedded systems. It discusses the origins and development of Unix, GNU, and Linux. Key points include:
- Unix was first created at Bell Labs in 1969 and was highly portable due to being written in C. This led to its widespread use.
- Richard Stallman founded the GNU project in 1983 to create a free Unix-like operating system. GNU created many important tools but lacked the kernel.
- Linus Torvalds developed the Linux kernel in 1991, combining it with GNU tools to create a free open-source operating system similar to Unix.
- Today Linux is widely used in embedded systems, having been ported to architectures like ARM, M
Tuned is a tool that dynamically tunes Linux system settings for optimal performance based on usage profiles. It was created to allow systems to be tuned for peak performance during high workload times while saving power during idle periods. Tuned includes several predefined profiles that adjust settings for common use cases like high throughput, low latency, or power saving. New in Red Hat Enterprise Linux 7, Tuned is installed by default and will automatically select an initial profile based on system type. It also includes additional tuning capabilities and monitoring plugins for even more dynamic optimization of subsystems.
Business-critical applications on VMware vSphere 6, VMware Virtual SAN, and V...Principled Technologies
The document summarizes performance testing of VMware vSphere 6, VMware Virtual SAN, and VMware NSX running business-critical applications. In single-site testing, the solution delivered over 189,000 IOPS and 5ms average read latency under heavy workload. In two-site testing, it live migrated all VMs between sites in under 9 minutes with no downtime or performance degradation for applications. The software-defined datacenter solution provided reliable performance and business continuity for critical workloads.
Veeam Backup and Replication: OverviewDudley Smith
Veeam Backup and Replication is a backup software that provides features such as VMware vStorage API backup and replication, support for VMware ESX/ESXi, native vSphere and vStorage support, Veeam vPower, Veeam Backup Enterprise Manager, guest OS and VM file recovery, Windows VSS support, file indexing and search, incremental and reversed incremental backup, granular backup options, data de-duplication and compression, reporting, direct SAN access, virtual appliance, and network backup capabilities.
Veeam Backup & Replication Tips and TricksVeeam Software
VMworld 2012
Featured speakers:
- Anton Gostev, Veeam Software, @Gostev
- Doug Hazelman, Veeam Software, @VMDoug
Learn more about Veeam Backup & Replication - http://www.veeam.com/vmware-esx-backup.html
Veeam® Backup & Replication™ provides powerful, easy to use, and affordable data protection for virtualized applications and data on VMware vSphere. It unifies backup and replication in a single solution, and its patented vPower® technology leverages virtualization to reinvent data protection. There are no agents to manage, no need to babysit backup jobs, and you can verify the recoverability of every backup, every time. Veeam Backup & Replication supports vSphere 5.1.
Using EMC VNX storage with VMware vSphereTechBookEMC
This document provides an overview of using EMC VNX storage with VMware vSphere. It covers topics such as VNX technology and management tools, installing vSphere on VNX, configuring storage access, provisioning storage, cloning virtual machines, backup and recovery options, data replication solutions, data migration, and monitoring. Configuration steps and best practices are also discussed.
TechBook: Using EMC VNX Storage with VMware vSphereEMC
This EMC Engineering TechBook describes how VMware vSphere works with the EMC VNX series. The content in this TechBook is intended for storage administrators, system administrators, and VMware vSphere administrators.
Direct Attached Storage - Information Storage and Management.pptxMithun B N
This ppt contains slides on DAS.
Direct – Attached storage (DAS) is a an architecture where storage connects directly to servers. Applications access data from DAS using block-level access protocols. DAS is ideal for localized data access and sharing in environments that have a small number of servers.
This presentation gives an overview of physical storage technologies and the various ways of accessing storage on a computer or a server. Presented at School of Engineering and Applied Science, Ahmedabad University as a part of Software Engineering course.
Storage Area Network (SAN) is a dedicated, high-speed network that connects servers to storage devices like disks, disk arrays, and tapes. A SAN provides centralized storage that can be accessed by multiple servers, providing high capacity, high availability, and scalability compared to Direct Attached Storage. Fiber Channel is commonly used as the networking technology for SANs, allowing blocks of data to be accessed by servers over the high-speed SAN fabric.
Storage Area Network (SAN) is a dedicated, high-speed network that connects servers to storage devices like disks, disk arrays, and tapes. A SAN provides centralized storage that can be accessed by multiple servers, providing high capacity, high availability, and scalability compared to Direct Attached Storage. Fiber Channel is commonly used as the networking technology for SANs, allowing blocks of data to be accessed by servers over the high-speed SAN fabric.
The document provides an overview of wireless networks and wireless communication technologies. It discusses the key elements of a wireless network including wireless hosts, base stations, wireless links, infrastructure and ad hoc modes. It also covers wireless link characteristics such as signal attenuation, interference and multipath propagation. Finally, it introduces common wireless network standards and protocols including IEEE 802.11 wireless LANs, wireless network characteristics such as the hidden terminal problem, and wireless multiple access protocols.
This was the overview for the basics of the OSI model and the concepts around networking for an NIU course I taught on networking. Another instructor also named Steve taught the course previously, and much of the presentation was based on his work but I can't remember what was modified. It was meant for educators without a deep technical background. .
• Storage Basics and Terms
• Introduction to SANs
• SAN Connectivity—Fibre Channel
• SAN Applications
• SAN—Current Developments
• Cisco Storage Networking Partnerships
This chapter reviews basic switching concepts as a refresher for the CCNP SWITCH certification, including hubs and switches, bridges and switches, the evolution of switches, broadcast domains, MAC addresses, Ethernet frame formats, basic switching functions, VLANs, spanning tree protocol, trunking, port channels, and multilayer switching. It provides objectives for topics that will be covered in more depth in later chapters.
Building Storage for Clouds (ONUG Spring 2015)Howard Marks
The document discusses storage options for clouds, including:
1) Clouds need storage for compute instances and bulk storage tiers, with options like block, file, and object storage.
2) Shared storage provides flexibility, centralized caching, and evolving services like snapshots and replication.
3) Storage area networks, file storage, object storage, and different protocols like iSCSI, Fibre Channel, and NAS are introduced.
The document provides an overview of WiFi networks and various IEEE 802.11 standards. It discusses basic WiFi concepts and deployment issues. It then summarizes several key WiFi versions including 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ad and how each standard improved data rates and functionality compared to previous versions through techniques like channel bonding and MIMO.
This document provides an overview of storage technologies, including direct attached storage (DAS), network attached storage (NAS), iSCSI, and storage area networks (SAN). It defines key components like RAID controllers and host bus adapters, compares internal and external storage, and describes protocols like Fibre Channel and iSCSI. The benefits of SANs are consolidated storage and reduced costs. Fibre Channel is designed for high performance while iSCSI offers moderate performance at a lower cost.
The document discusses different types of storage networks including direct attached storage (DAS), network attached storage (NAS), storage area networks (SANs) using Fibre Channel (FC) or iSCSI, and Fibre Channel over Ethernet (FCoE). DAS connects storage directly to servers but has limitations. NAS uses a traditional LAN to share storage files between servers but has performance limitations. SANs allow block-level access to centralized storage using high-speed FC networks or iSCSI over Ethernet. FCoE encapsulates FC frames in Ethernet to converge network traffic.
This document provides an overview of the IEEE 802.11 WiFi standard in 3 parts. Part 1 discusses advantages and disadvantages of WiFi networks. Part 2 describes the physical layer specifications including spectrum, modulation techniques, and OFDM. Part 3 covers the media access control layer and protocols like CSMA/CA, RTS/CTS, and acknowledgments that provide reliability. The document is intended for teaching purposes and draws from various academic sources.
Storage devices are used to store data outside of a computer's main memory. There are different types of storage including primary storage like RAM and cache that is directly accessible by the CPU. Secondary storage like hard disks requires accessing through input/output channels. Tertiary storage uses robotic mechanisms to store data offline. Linux uses disk partitioning to organize storage across physical disks using schemes like MBR and GPT. Logical volumes and RAID provide additional abstraction and redundancy. Network storage solutions like NAS export file systems over a network while SANs export block storage using protocols like Fibre Channel and iSCSI.
This document provides an overview of local area networks (LANs) and discusses various LAN topics including common topologies (bus, ring, star), frame transmission methods, the roles of hubs and switches, and how bridges and routers can be used to interconnect multiple LANs. It describes the three main layers (physical, media access control, logical link control) of the IEEE 802 LAN protocol architecture and compares it to the OSI model. Key concepts covered include shared medium access, the functions of bridges and switches, and how layer 2 switches improved upon earlier hub technologies to increase network capacity and performance.
This document provides an introduction and comparison of common audio networking protocols: AVB/TSN, CobraNet, and Dante. It begins with an overview of networking basics using the OSI model. It then reviews each protocol, covering their technical capabilities, setup requirements, and strengths. Key points include AVB/TSN requiring certified switches but providing plug-and-play installation and excellent sync at 1-5ms latency. CobraNet is tried-and-true but has declining adoption and requires a dedicated network. Dante has wide adoption, works on standard networks, and offers flexible routing and redundancy at <0.15-5ms latency. The document concludes that the goal is meeting user needs, and any protocol can suffice
This document discusses various networking devices and their functions:
Layer 1 devices like repeaters and hubs extend signal distances or recreate signals on multiple ports. Layer 2 switches and bridges operate at the data link layer, using MAC addresses to determine packet forwarding. Layer 3 devices like routers use network layer addresses and can connect different network types. MPLS assigns "labels" to packets for efficient forwarding through label switching routers.
This document provides an overview of various data storage technologies including RAID, DAS, NAS, and SAN. It discusses RAID levels like RAID 0, 1, 5 which provide data striping and redundancy. Direct attached storage (DAS) connects directly to servers but cannot be shared, while network attached storage (NAS) uses file sharing protocols over IP networks. Storage area networks (SAN) use dedicated storage networks like Fibre Channel and iSCSI to provide block-level access to consolidated storage. The key is choosing the right solution based on capacity, performance, scalability, availability, data protection needs, and budget.
The IEEE 802 is a family of IEEE standards dealing with Local Area Networks and Metropolitan Area Networks. The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC).
The most widely used standards are for the Bridging and Virtual Bridged LANs (802.1), Ethernet family (802.3), Token Ring (802.5) and Wireless LAN (802.11).
Similar to Predstavitev osnov klasičnih pomnilniških sistemov - disk (20)
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
2. AGENDA
• Osnove: DAS,Trdi disk, SCSI protokol
• SAN in NAS
– S protokoli, ki nastopajo v okoljih
– Z napravami, katere nastopajo pri izgradnji tako osnovnih in enostavnih, kot tudi
kompleksnih okolji
– Topologije
• Strežniki
• Povezljivost
• Krmilniki in gonilniki
• Diskovna polja
• RAID
• IOPS (teorija)
• Razno
3. DAS – Direct Attached Storage
HDD & Communications
4. Direct Attached Storage or DAS is a dedicated digital storage
device attached directly to a server or PC via a cable trough one
of the main protocols used for DAS connections:
– ATA (Advanced Technology Attachment)
– SATA (Serial Advanced Technology Attachment
– SCSI (Small Computer System Interface)
– SAS (Serial Attached SCSI)
– FC (Fibre Channel) are the main protocols used for DAS connections.
• Hard disk / HDD / DASD / is the building block of all storage
systems!
DAS creates data islands, because data cannot be shared with other servers.
What is DAS?
5. Anatomy of a Hard disks
“Platter” – A circular piece
of magnetic material
Track 0
Track 1
“Tracks” – Platters divided
into concentric circles
Platter1,track0
Platter2,track0
Platter3,track0
Cylinder 0
Disk Controller.
Does operations like read, write etc..
Read/Write Head 0
Read/Write data from Hardisk ?
Read Cylinder
0,head 0,
sector 0.
CHS Addressing
7. Communicating with your Hardisk
Various communication standards exist to talk to our
Harddisks:
Communication Requirements SCSI Specification
Speaker/Listener Initiator/Target
Voice/Language SCSI Commands
Medium SCSI Bus
Addressing SCSI ID
8. Application Word, e-mail, Web, ERP, TSM
I/O request Open, Read, Write, Close
Block
I/O
request
Servicing
block I/O
request
File systems
(UFS, NTFS, JFS)
"RAW" files
(DBMS: DB2, Oracle)
Logical
layer
Application
layer
OS
layer
HBA
External
storage
Physical
layer
Adapter drivers
Host bus adapter
SAN
FC
Volume manager
Device drivers
J
B
O
D
BUS
RAID
request
File I/O
File I/O and block I/O: Local system
10. SCSI Communication in Action
OS:
CPU
Bus Adapter:
Initiator
HBA: Give me Block 1, From
Disk 0
Target Disk0
ID 0
Hey, Disk 0, I Need your attention
Ok Bus, You have my attention
Thanks, READ LBA 2 for me
Ok, Here is LBA 2 Data: “Hello”
Converts LBA 2 –> CHS 0/0/1
CPU: Your data
“Hello”
CPU: Give me Block 1, from disk0
OS: your data,
”Hello”
15. Storage area network components
Servers with FC/iSCSI HBAs
Storage systems
FC / FCoE / iSCSI / IB
Switches / Directors
FC / FCoE / iSCSI / IB
16. What is Fibre Channel?
• Fibre Channel is a high-speed communications method
for attaching devices to a server (host) or groups of
hosts.
– Supports very high speed -1Gb/sec,2Gb/sec,4Gb/sec, 8Gb/sec
and 16Gb/sec (depending on hardware)
– Used mainly to connect to storage devices
• Serial SCSI rather than Parallel SCSI commands
• Can support non-Fibre Channel devices through gateways
– Also supports IP over fibre
– Uses light to carry signals
– Supports highly reliable connections
– Has very little signal interference
17. FC topologies: Introduction
• Fibre Channel uses three topologies:
– Point-to-point
• Two devices are connected back to back
• This is the simplest topology, with limited connectivity
– Arbitrated loop
• All devices are in a loop or ring
– Similar to token ring or Fiber Distributed Data Interface (FDDI)
networking
– Switched (fabric)
• All devices or loops of devices are connected to Fibre
Channel switches
– Similar conceptually to modern Ethernet implementations
18. Worldwide name
• A unique identifier for each Fibre Channel device
– This is similar to the way each Ethernet card has a unique MAC
address
• Each device in the SAN is identified by a unique node
world wide node name (WWNN) containing:
– A vendor identifier field, which is defined and maintained by the
IEEE
– A vendor-specific information field defined by the vendor
• Each N_Port will have its own world wide port name
(WWPN)
19. Point-to-point topology
• A point-to-point topology consists of:
– Two Fibre Channel devices connected directly together
• Characteristics of point-to-point topology
– The transmit fiber of one device goes to the receive fiber of the
other
device, and vice versa
– There is no sharing of the media
• This allows the devices to enjoy the total bandwidth of the link
– A simple link initialization is required of the two devices before
communication can begin
Storage system
20. Arbitrated loop topology
• The most complex Fibre Channel topology
– It is a cost-effective way to connect up to 127 ports in a single network
• Characteristics of arbitrated loop topology
– The media is shared among the devices, limiting each device’s access
– Arbitrated loop is not a token-passing scheme
– When a device is ready to transmit data:
• It first must arbitrate and gain control of the loop.
• Once this happens, there essentially exists point-to-point communication between
this device and one other device
• All other devices in between simply repeat the data
Storage system
21. Switched topology
• Used to connect many devices in a cross-point switched
configuration
– Each Fibre Channel device (or loop) connects to a switch or director
• Characteristics of the switched topology
– Benefit is that many devices can communicate at the same time
• The media is not shared
– Of course, it also requires the purchase of a switch or a director
Storage system
Switch/Director
23. Switch cascading - ISL
• Interconnection of Fibre Channel switches
• Seamlessly extends a single switch Fabric
– Increases connectivity
– Allows easy Fabric growth
– Increases distance
• Inter Switch Links (ISL)
Completely automatic
• Fully Distributed Name
Service
Saturn1
Saturn1 Saturn1
Saturn1
Saturn1 Saturn1
Saturn1
Saturn1 Saturn1
24. A, E
B
C
D
A 2.0 Gb
B 1.5 Gb
C 0.5 Gb
D 1.0 Gb
E 2.0 Gb
A 2.0 Gb
B 1.5 Gb
C 0.5 Gb
D 1.0 Gb
E 2.0 Gb
A 2.0 Gb
B 1.5 Gb
C 0.5 Gb
D 1.0 Gb
E 2.0 Gb
A 2.0 Gb
B 1.5 Gb
C 0.5 Gb
D 1.0 Gb
E 2.0 Gb
Individual 2 Gb links
Congestion
Single
8 Gb trunk
Interswitch link trunking
25. Trunking: Improved performance
• How trunking improves performance:
– Frames are stripped across links
– Maintains in order delivery
– Prevents single ISL bandwidth saturation (“hot spot”)
1
1
1
2
2
3
2
3
3
4
4
4
5
5
6
6
2G 2G 2G
2G 2G 2G
Frames on the trunk
Frames
can use
any link
Frames
arrive
in-order
Trunks can be
1, 2,3 or 4
links “wide”
27. Sample mesh topologies: 16-port
switches
42 Ports Available - 1 Hop Max
52 Ports Available – 1 Hop Max
82 Ports Available – 2 Hop Max
104 Ports Available – 2 Hops Max
28. Zoning overview
• Zoning allows for finer segmentation of the SAN.
• With zoning you can:
– Configure barriers between different environments/configurations
– Provide logical subsets of closed
user groups within the fabric
– Provide security
– Improve availability
– Prevent interference
– Provide temporary access among
devices for specific purposes,
such as backup
29. When to use zoning
• When needed, zoning should be used for improving:
• Interoperability
– Separate HBA zones provide good fault isolation
– Separate OS zones provide good fault isolation
– Interoperability zones should be periodically reevaluated.
• Security
– Zoning is designed to
support discrete
environments
30. Software zoning
Server A Server B Server C
1 2 3
4 5 6 7
Tape-A
Tape-B
Storage
Area
Network
Matthew, Max, EllenZone_3
Robyn, EllenZone_2
Alex, Ben, SamZone_1
AliasesZone Name
Alex Robyn Matthew
Ben
Sam
Ellen
50:05:76:ab:cd:22:03:65Robyn
50:05:76:ab:cd:02:05:94Max
50:05:76:ab:cd:20:08:90Ellen
50:05:76:ab:cd:20:09:91Ben
50:05:76:ab:cd:23:05:93Sam
50:05:76:ab:cd:24:05:94Matthew
50:05:76:ab:cd:12:06:92Alex
WWPNAlias
DS5000-A
DS5000-B
Max
31. • Fibre Channel over copper cable
– Distance limit of approximately 13 to 30 meters over twisted pair.
Media: Cable options
Media type Speed (MB/s) Transmitter Distance
1310nm LW 2m to 10km
1550nm LW 2m to 50km
1310nm LW 2m to 10km
1550nm LW 2m to 50km
400 1310nm LW 2m to 2km
800 1310nm LW 2m to 10km
1310nm LW 0.5m to 10km
1490nm LW 0.5m to 2km
100 0.5m to 300m
200 0.5m to 300m
400 0.5m to 150m
800 0.5m to 150m
1600 0.5m to 100m
100
200
850nm SW
1600
Single-mode fiber
Multimode fiber
32. What is iSCSI?
• iSCSI - Internet SCSI (Small Computer System Interface),
SCSI commands sent across a network in TCP/IP packets. It
was developed as a storage networking standard for linking
data storage facilities.
iSCSI storage system
The iSCSI Expansion card offers a connection to an iSCSI
storage device, via iSCSI host connections, to leverage the
available standard Ethernet infrastructure to offer storage area
network (SAN) solutions
34. Application
I/O request
File system
Logical layer
Physical layer
Server1
File
I/O
Device
Drivers iSCSI
client
Block I/O
Block
I/O
HBA
driver
TCP/IPHBA
NIC
IP
network
iSCSI Storage System
Other
servers
iSCSI
adapter
iSCSI driver
TCP/IP
GbE
Server1
Server2
Server3
Server1
Local
Block
I/O
iSCSI architecture: IP SAN storage
35. What is Fibre Channel over
Ethernet
• FCoE
– Unified IO out of the chassis
– Single CNA that handles Ethernet and FC traffic
– Reduced cables from chassis to top of rack switch
– Fewer switch modules in the chassis
– Simplify IO Management
• Increased performance
• Power and cooling savings
• Investment Protection
– Seamless integration into existing network infrastructure (LAN & SAN)
– Leverage existing Fibre Channel SAN and Storage infrastructure
• Seamless management integration
Fibre
Channel
Ethernet
36. Converged architecture: FCoE
• Traditional FC and Ethernet transport uses separate
expansion cards I/O modules
• In converged architecture, Fibre Channel traffic is
encapsulated into FCoE frames
• Disadvantage of FCoE – protocol does not route
Traditional Fibre Channel and Ethernet Converged Fibre Channel and Ethernet
37. SAS – Serial attached SCSI
• SAS provides smaller form factor, longer cabling distances,
SCSI compatibility, and greater addressability
• SAS replaced Ultra320 SCSI in SCSI and RAID controllers
– Full duplex, dual port, point-to-point connections
• Higher bandwidth
– SAS 3.0: 8 ports; supports up to 12 Gbps per port
• Wide port (4-ports): 48 Gbps
• Two wide ports (8-ports): 96 Gbps
• PCI-E implementation to speed up access
• Greater drive support
– SCSI-based products: 14 drives per channel
– SAS-based products: 144 drives per 4 ports
38. Serial Attached SCSI: Disk
attachment
SAS wide ports
Each SAS port includes
four full duplex links or
lanes within a single
connector, as shown,
with each lane running
a speed of 3, 6 or 12
Gbps.
39. SAS connectivity module or
„switch“
• Supports 2 Blade servers SAS
Connectivity Module
– Lenovo BladeCenter
– HP Bladesystem c-class
• Support for both booting and
data access
• Simplifies a blade environment
by consolidating OS
initialization across multiple
servers
• Great for close-
quarter SANs
SAS Connectivity Benefits
Shared direct-attached
– Up to four hosts
• High performance
• Fast out-of-the box deployment
• Reduced complexity
• Consolidation for lower TCO
• Scalability with future SAS SAN
support
41. File systems & file-sets within NAS
• File shares are exports to the user or
application
• User files are organized and stored in file
systems
– File system is local to the NAS system
• File-sets allow for breaking down the file
system space in smaller manageable units
– Certain operations can be configured
for file-sets such as replication,
snapshots, and quota-management
• Pools allow placement and migration of
files to different cost storage devices
41
NAS System
File-set
(optional)
File System
Pool
(optional)
Share
NFS, CIFS, HTTP, FTP, …
Share
Storage Storage
Pool
(optional)
Pool
(optional)
File-set
(optional)
File-set
(optional)
42. Data Transfer: Block versus File
The key to understanding the difference between block and
file data is the file system owner
STORAGE
APPLICATION
Storage Area Network
(SAN)
FC, iSCSI, FCoE or IB
NETWORK
FILE SYSTEM
STORAGE
APPLICATION
FILE SYSTEM
Direct Attached Storage
(DAS)
STORAGE
NETWORK
APPLICATION
FILE SYSTEM
Network Attached Storage
(NAS)
IP: CIFS, NFS, FTP...
44. Fibre Channel
• Fibre Channel is a serial data transfer interface
– Copper Wire Connection
– Optical Fiber Connection
• High-speed is obtained through:
– Mapping networking and I/O protocols to Fibre Channel constructs
– Encapsulating them and transporting them within Fibre Channel
frames
Fibre Channel
Switch
Windows
Host
Linux
Host
Storage
Host Bus Adapters
45. Host Bus Adapter (HBA)
• Manages the transfer of information
A Host Bus Adapter is an I/O
adapter that sits between the
host computer's bus and the
Fibre Channel loop
• Minimizes the impact on host processor performance
Performs many low-level
interface functions
automatically
• Fibre Channel
• iSCSI
• FICON
• SCSI
Multiple Technologies
• Load balance
• Fail-over
• SAN administration
• Storage management
The HBA enables a range of
high-availability and storage
management capabilities
46. Fibre Channel Addressing
• Fibre Channel Addresses are required to route the frames from
source to target
• 24 bits (3 bytes) physical addresses are assigned when a Fibre
Channel node is connected to the switch (or loop in the case of FC-
AL)
Target
Source
FC Initiator:
HBA
FC Responder:
SP Ports
FC Switch
48. Switched Fabric Topology
• Switched Fabric is a Fibre Channel topology where many
devices connect with each other via Fibre Channel switches
– This topology allows for the most number of connections with a
theoretical 16 million devices per Fabric
• Frames are routed between source and destination by the
Fabric
Fibre Channel
Switch
49. • Always put ONLY one
HBA in a zone with
Storage ports
• Each HBA port can only
talk to Storage ports in the
same zone
• HBAs & Storage Ports
may be members of more
than one zone
• HBA ports are isolated
from each other to avoid
potential problems
associated with the SCSI
discovery process
Single Initiator Zoning
Single Emulex HBA zoned to two VNX ports
50. Active/Passive Arrays: Failover
Mechanism
• Two types of path failover:
– Array-initiated LUN trespass
• Typical cause: an SP fails or
needs to reboot
• PowerPath logs a follow-over
– Host-initiated LUN trespass
• PowerPath detects a path failure,
e.g. due to a cable break, port
failure etc.
• PowerPath initiates a trespass,
and logs the event
Fabric A Fabric B
SP-A
PassiveActive
SP-B
Trespass
Host
51. Active/Active Mode (ALUA)
• Asymmetric Logical Unit Access
(ALUA)
– Asymmetric accessibility to logical
units through various ports
• Request forwarding
implementation
• Communication method to
pass IO’s between SP’s
• Software on the controller
forwards requests to the other
controller
• Not an Active-Active Array model!
– I/Os are not serviced by both SPs
for a given LUN
– I/Os are redirected to the SP
owning the LUN
Front-End Fault Masking
Back-End Fault Masking
52. LUN
LUN
LUN
Symmetrical Active-Active: Overview
• Only one SP serves IOs via a given LUN
• The remaining SP is acting as standby
• SP trespasses LUN when paths fail and
host software adjusts to new path
• LUN is presented across both SP-
paths via internal links
• Only one SP is actively processing IO
to the backend
• Host initiates trespass when path fails
• Both SPs serve IOs to and from a given
LUN
• If path fails, no disruption to LUN
• The performance is now improved up
to 2X
• Classic LUNs only!
LUN
CX: Active-Passive Active-Active
(Symmetrical)
VNX: Active-Active
(ALUA)
53. Asymmetric LUN Access: VNX
SP reports SCSI descriptor:
– TARGET_PORT_GROUPS
• Active/Optimized
• Active/Non-
Optimized
SPA SPB
I/O resumes to LUN
through alternate SP
after short delay
SPA SPB
Optimized Path
Non-optimized Path
ALUA masks
the failure and
trespasses
LUN
Owned
by SPA
Owned
by SPB
54. SPA SPB
Owned
by SPA
Symmetric LUN Access: VNX with
MCx
SPA SPB
• Both SPs send and receive
Active/Optimized
• Classic LUNs ONLY (OE R5.33)
Optimized Path
Non-optimized Path
Owned
by SPA
I/O continues through
remaining SP and
paths with NO delay
55. SPA SPB
LUN Parallel Access Locking Service
• Required for Active-Active access
LUN
Lock
Lock
•Write I/O operation acquires a lock on LBA address on both SPs
•Lock requests sent over CMI
•Lock requests are smaller/quicker than the entire I/O
CMI
56. • Lower risk with increased availability within data
centers
• Improved Availability
– All Paths are Active
– No trespass during path failure
– No trespass during NDU
• No setup on VNX or Host side
• Improved Performance
– All Paths serving I/O
– Up to 2X Improvement
VNX with Symmetric / Active-Active
Benefits
•Eliminate application timeouts
•Improve application throughput
•Multi-path load balancing
LUN
58. Fundamental Disk Performance -
“Spinning Rust”
• Drive technology really not changed much since original IBM RAMAC drive
in 1955
– An arm with a read/write head moving across a platter(s) of magnetic sectors.
• Spinning rotational drive medium dictated by two factors
– Seek time
• Time taken for head to move from current track to required track
• Dictated by the generation of drive, and the form factor (3.5” vs 2.5”)
– Rotational latency
• Time taken for drive to spin the platter so the required sector is under the
head
• Dictated by the RPM of the drive
• Average latency = ½ end to end seek time + ½ single rotation time
59. Nearline SAS / SATA - 7,200RPM
• SAS vs SATA
– SAS drives – dual ported – access through two separate intefaces
– SATA drives – single ported – access through one interface only
• Nearline as a term was originally used to describe tape, "near-online“
• Consumer grade SATA drive technology, but high capacity.
– Consumer grade, and highest density
= lowest reliability
= highest RAID protection needed
– Generally LFF (3.5”) - currently up to 4TB
– Some SFF (2.5”) - currently up to 1TB
• Performance, per 7.2K drive, we'd normally expect around :
– 100-150 IOPS
– 100-180 MB/s
60. Enterprise SAS – 10,000 / 15,000 RPM
• Enterprise grade SAS drives, but lower capacity.
– Industry has moved to mainly SFF 2.5”
• Fundamentally different class to NL-SAS / SATA
– Not only in terms of RPM
– Better reliability, firmware, and technology
• 10K RPM
– Mid-speed, closer to NL-SAS in capacity (currently 1.2TB)
– 200-300 IOPS
– 120-200 MB/s
• 15K RPM
– Fastest HDD, lowest capacity (currently 300GB)
– 300-400 IOPS (some latest generations with short-stroking ~=500
IOPS!)
– 150-200 MB/s
61. Flash drives
In the last 10 years:
CPU Speed: increased roughly 8-10x
DRAM Speed: increased roughly 7-9x
Network Speed: increased roughly 100x
Bus Speed: increased roughly 20x
Disk speed: increased only 1.2x
Flash memory is constantly-powered nonvolatile memory that can be
erased and reprogrammed.
Flash memory’s name comes from the erasure technique used where a
section of memory cells are erased in a single action or "flash.“
What is Flash Memory?
62. I/O wait with classic HDD
Time
I/O Serviced by Disk
1. Issue I/O request (~ 100 μs)
2. Wait for I/O to be serviced (~ 5,000 μs)
3. Process I/O (~ 100 μs)
• Time to process 1 I/O request = 200 μs + 5,000 μs = 5,200 μs
• CPU Utilization = Wait time / Processing time = 200 / 5,200 = ~4%
Processing
~100µs ~100µs
Waiting
~5000 µs
CPU State
1 I/O Request
63. Time
I/O Serviced by Flash
1. Issue I/O request (~ 100 μs)
2. Wait for I/O to be serviced (~ 200 μs)
3. Process I/O (~ 100 μs)
• Time to process 1 I/O request = 200 μs + 200 μs = 400 μs
• CPU Utilization = Wait time / Processing time = 200 / 400 = ~50%
Processing
~100µs ~100µs
Waiting
~200 µs
CPU State
1 I/O Request
12X Application
benefit by only
changing storage
latency!
I/O wait with Flash / SDD
65. What is Raid?
RAID means Redundant Array of Independent Disks.
It is also called Redundant Array of Inexpensive Disks.
66. Importance of RAID
1. Reliability
2. Real-time data recovery with uninterrupted access when a
hard drive fails
3. System uptime and network availability and protection from
loss Protection against data loss
4. Multiple drives working together increase system
performance
68. Data Redundancy
Redundancy gives us the ability to have a
drive fail without losing valuable data
There are Two Type of Data Redundancy:
Disk Mirroring
&
Data Parity
69. RAID Protection Comparison
RAID-0
– Striping / concatenation
– No protection against drive loss
– Capacity = SUM(drive capacitites)
RAID-1
– Mirroring between two drives
– Protects against one drive loss
– Capacity = capacity of single drive
RAID-10
– Mirroring between two sets of striped
drives
– Protects against up to half the
mirrored set
– Capacity = half capacity of all drives
RAID-5
– Rotating XOR parity
– Protects against one drive loss
– Capacity = SUM(num of drives -1)
RAID-6
– Rotating double XOR parity
– Protects against two drive losses
– Capacity = SUM(num of drives -2)
70. RAID-0
Data are stripped on all disks
Offer performances
No redundancy
2 disks minimum, maximum depending of RAID
controller
Data are split depending of stripe size
(16/32/64/128KB)
controller
71. RAID-1
Data mirrored (duplicated) on second hard
disk
Offer redundancy
Equivalent of one disk space lost for
redundancy
Only on 2 disks
Support one disk failure
Controller
72. Stripes data and parity to generate redundancy.
The parity is distributed through the stripe of the
disk array.
both parity and data are striped across a set of
separate disks.
Data chunks are much larger than the average I/O
size, but are still resizable.
Disks are able to satisfy requests independently
RAID-5
73. RAID-6
Data is striped across all disks (minimum of
four)
A two parity blocks for each data block (p and
q in the diagram) is written on the same stripe.
If one physical disk fails, the data from the
failed disk can be rebuilt onto a replacement
disk.
Provides for faster rebuilding of data from a
failed disk.
74. RAID 10
It uses RAID-1mirroring and
RAID-0 striping, and has both
security and sequential
performance.
It is a striped RAID-0 array
whose segments are
mirrored RAID-1.
It is similar in performance to
RAID 0+1, but with better
fault tolerance and rebuild
performance.
It has the same fault
tolerance as RAID-1 with the
same overhead for fault
tolerance as mirroring alone.
75. RAID penalty
Determining which type of RAID to use when building a
storage solution will largely depend on two things; capacity and
performance.
We measure disk performance in IOPS or Input/Output per
second. One read request or one write request = 1 I/O. Each
disk in you storage system can provide a certain amount of IO
based off of the rotational speed, average latency and average
seek time.
76. RAID Performance Comparison
Random Performance is dictated by the overheads on writes
RAID-5 and 6 will give best capacity usage, and failure protection
– Write penalty is 4x for RAID-5 or 6x for RAID-6
– So you need to consider this when creating your arrays.
NL-SAS being “consumer” grade and most liable to failure
– Typically needs RAID-6
– Catch 22 – worst performing drive, needs worst overhead RAID!
80. Terminology
• Block: Leverages Small Computer System Interface (SCSI) commands to
read-write specific blocks
– Common SCSI access methods include Fiber Channel (FC), Serial
Attached SCSI (SAS), Internet Small Computer System Interface
(iSCSI), Fiber Channel over Ethernet (FCoE) and InfiniBand (IB)
• NAS: reads/writes files
• File Server: A storage server dedicated (primarily) to serving file-based
workloads
• NAS Gateway: A server that provides network-based storage virtualization
– Provides protocol translation from host-based CIFS/NFS to Storage
Area Network (SAN) based block
– Examples: NetApp V Series; EMC VNX/Celerra; OnStor (LSI); HP
P4000 Unified Gateway, IBM SONAS;
• Unified Storage – a single logical, centrally managed storage platform that
serves both block (FC, iSCSI, FCoE, SAS, IB) and file-based (CIFS, NFS,
HTTP, FTP, WebDAV etc.) workloads
– Examples: EMC VNX &VNXe; NetApp FAS series; IBM Storwize V7000
Unified80