Storage Primer

Post on 17-Jan-2015

9.129 views 6 download

Tags:

description

Storage basics, SAN, NAS, data protection, security

Transcript of Storage Primer

Storage Primer

Sriram Ranganathachari

What is Storage ?

• Primary storage disk or RAM• Secondary storage tape or Disk

Storage can be online, nearline or offline• Online – Random-access, low wait time – disk• Nearline – Random-access, some wait time – disk• Offline – Sequential-access, long wait time – tape

Offline and nearline storage• File restore• Image restore• Data archiving

Ethernet

Evolution of StorageP

erfo

rman

ce/R

elia

bili

ty/M

anag

emen

t

Time/Complexity

Storage Today

Internal Storage

Direct-Attach Storage(DAS)

Network-Attached Storage(NAS)

Storage Area Network(SAN)

Need For the Invention of SAN• Storage market Demand was growing and the traditional Server Attached

Storage called DAS was not able to meet the High end Requirements .• Rapid storage growth is causing new types of problems for data center

managers• Advantages of SAN

– Staff and skill shortages– Providing investment protection while at the same time storage prices

drop– Server, storage and data consolidations are often planned, or worse are

in parallel– Enterprise SAN and Storage Management is required– Investment justification with limited fiscal resources

Disadvantages of SCSI

Number of devices that can be attached on aSingle bus is very limited

To reconfigure one device all the devices in the string must be brought offline .

Distance limitation due to cable length . Speed limitations Sharing is possible by Multi-Drop Configuration

BUT :All devices can not transfer data at the same

time Uses ArbitrationDuring Arbitration – No Data Transfer

RAID

Advantages of SAN over SCSI Removes traditional Server-Storage connection High Speed of Communication Can connect Devices up to 10 Km Number of devices that can be connected is

very high (16 million ) Improved backup and recovery LAN free and server free data movement Centralized management Disk Storage can be expanded without

disrupting the servers

Some more benefits

• Increased disk utilization• Deferring disk procurement• Reduce data center

rack/floor space• Tape procurement deferral• New DR capabilities• Improved DR capabilities• On-line recoverability

options• Staff Utilization for Server

Management• TB-per-DBA ratio decline• Mgmt costs as a % of storage

costs• Improved overall availability• Increased life of current disk• Reduction of UNIX & NT

Servers• LAN/WAN performance• Improve/Protect critical data

• Increase I/O performance, bulk data movement

• Reduced Storage Maint.• Reduce backup servers• Reduce/eliminate batch,

backup windows• Non-disruptive scalability• Avoid Data Area Network

growth• Impact new/migrating apps • Impact to applications

development, testing• Extending Life of Servers• Reduce CPU Load on Servers• Support Server Clustering• Secondary Security Services• Vendor Consolidation• Storage On-Demand

Fundamental difference between SAN and NAS

SAN

A SAN is a shared "network" of storage

• Block access to LUNs

• Online and offline storage

• SAN device = storage array

Protocol:

SCSI over Fibre ChannelSCSI over IP/Ethernet (iSCSI)

and FC

NAS

NAS is a file system shared over a network

• File access to data

• Online storage only

• NAS device = File server or "filer"

Protocol:

NFS, CIFS over IP over Ethernet

What is Fibre Channel ?

• Fibre Channel is serial interconnection technology that was developed to bring together elements from the channel and networking technology .

• It Provides : Reliable High Speed Communication Data transport over longer distances Low Overhead communication

What is SAN

• SAN is dedicated network behind the servers , based on Fibre Channel architecture .

How SAN works

• The data from a host server is converted into optical light pulses by a “host bus adapter” in the server, the pulses are transmitted over fiber-optic cables, through a switched network, to an intelligent storage array, which uses advanced raid protected disk drives to store the data safely.

• The act of using a network to create a shared pool of storage devices is what makes a SAN different from the way data was normally stored on computers. The network is used to move data between various storage devices, allows for data sharing between different servers, and provides a fast medium for backing up and restoring data.

• Devices in a SAN are usually bunched closely together in a single room, but the network allows the devices to be connected over long distances. The ability to spread everything out over long distances makes a SAN very useful to large companies with many offices.

SAN implementation

Who should buy SAN

• Database servers: Oracle, Sybase, SQL, DB2, Informix, and other database servers

• File servers: Using SAN-based storage for file servers lets you expand file

server resources quickly, makes them run better, and enables you to manage your file-based NAS storage through the SAN.

• Backup servers: SAN-based backup is dramatically faster than LAN-based backup.

• Voice/video servers: Voice and video servers tend to push large amounts of data very quickly.

• Mail servers: Using SAN-based storage for mail servers enables quick restoration of data in case of corruption or viruses.

• High-performance application servers: Applications such as document management, customer relationship management, billing, data warehouses, and other high-performance and critical applications all benefit by what a SAN can provide.

SAN Segments

PARTS– Host Layer- HBA, Drivers,

Pathing sofware, OS– Fabric Layer- Hubs and

switches, fabric os, cabling– Storage Layer- Tapes and

disks, advanced storage software

PLAYERS :– EMC, IBM,HITACHI,

NetApp,Sun, HP, Veritas etc

SAN ComponentsHBA

CARD

Tape Library

Fibre Cables

Storage Arrays

Naming and Addressing Scheme

• WWN : World Wide Name A Unique 64 bit Address Assigned to the Node

by manufacturer

• WWPN : World Wide Port Name A unique 64 Bit Address assigned to the N_Port

SAN Topologies

Point to PointArbitrated LoopSwitched Fabric

Point to Point Topology

Direct Connection between two N_Ports

No Sharing of Media Allows Devices to use Full Bandwidth Before the transmission two N_Ports

perform a Login to assign the N_Port Address

Point to Point Connection

Arbitrated Loop Topology

A loop of 127 Ports ( 126 NL_Port , 1FL_Port )

The Bandwidth is shared by the Active Nodes

Media Access is gained through an Arbitration Protocol

Can Connect Ports up to a distance of 10 Km

Arbitrated Loop

Number of Hosts

Lowest Acquisition Cost

HighestAvailability

Least Complexity

256–1024

64–256

8–64

Deployment: Switches vs. Directors

Director

Director

SwitchSwitchSwitch

Switch

Director

Director

Switch

Director

Switch

Director

Ports

•N_Port Node Point-to-point or fabric•NL_Port Node Node connected to an

arbitrated loop•F_Port Fabric Fabric port•FL_Port Fabric Fabric connected to an

arbitrated loop•L_Port Loop Hub port on an arbitrated

loop•T_Port Fabric Trunk port between

switches•E_Port Fabric Inter-switch Link

connection•G_Port Fabric Unused switch port

IP Storage

iSCSI• Enables access of DAS over IP Infrastructure• Optimal utilization of resource• Virtualized Storage• To enable FC based storage to be accessed

through IP infrastructure• Block level storage from SAN accessed through

iSCSI• IP Based Storage Protocol

ZONINGDefinition :Zoning is a logical separation of traffic between host and resources

Advantages of Zoning

· Data Integrity · Security · Shorter boot-up

Types of Zoning :

Soft zoning or name server zoning : done using a name server databases in the SAN director. Zoning is via port numbers and WWN numbers. 

Hard zoning : Uses a routing table in the director, which assigns devices to zones only by WWN. This is more limited since it doesn't take the port number into consideration, which makes it harder to shift devices between ports.

ISL - Distance and Cables

• Operating distances decrease when moving from 1Gbps to 2Gbps

• Media options– Multi-mode– Single-mode– DWDM

• ISL design parameters– Capacity– Distance

• Signal loss• Throughput• Power

Fibre Optic Glass

Filament Core

Port Speed Operating Distance

50 micronMultimode

1Gbps2Gbps

500m300m

62.5 micronMultimode

1gbps2Gbps

~300m~150m

9 micronSingle mode

1Gbps2Gbps

>10km>10km

Multi-mode 1Gb=500m 2Gb=300m

Single-mode > 10Km

DWDM < 200Km

DWDM

• Data are carried at different wavelengths over fiber links

• Different data formats can be transmitted together (e.g. IP, ESCON SRDF, Fibre Channel SRDF)

• DWDM topologies include Point-to-Point and Ring configurations

Transmission on fibre

CombiningSignals

SeparatingSignals

Transmitters Receivers

LUN

• A LUN refers to the individual piece in the storage system that is being accessed. Each disk in an array, for example, has a LUN. Disk partitions may also be assigned a LUN

Data Protection

• Backup Strategy• Recovery Method• ILM / HSM • DRP / BCP

Some terminologies

• Recovery Time Objective: (RTO) The amount of time that it takes to get your systems back online.

• Recovery Point Objective: (RPO)This is the last consistent data transaction prior to the disaster. If you had a disaster, how much data would be lost? \

• The Disaster Recovery plan (DR) focuses on getting your business back up and running after a major outage

• The Business Continuance plan (BCP) focuses on keeping your business running DURING the disaster.

Replication

Asynchronized :• Does not affect

application performance • Bandwidth determines

how up to date your data stays

• Database is consistent if solution uses sequencing

• Great long distance solution

• Site failure – transactions are rolled back or rolled forward

Synchronized :• Low or no transaction

Loss• Database is always

consistent• Site failure - same

application recovery as power failure

• Bad for long distance, affects application performance, requires massive pipes

Snapshots: Instant data copy (Software based/Hardware based)Data Replication:Sync, Async, Bulk Copy/AdaptiveData Replication Method: Hardware, Software

Some Popular Replication Tools

• EMC Clariion Snap View – Local Mirror View – Remote

• EMC Symmetrix Time Finder – LocalSRDF - Remote

• IBM Total Storage Flash Copy – Local Volume Copy

PPRC - Remote

• Hitachi Data Systems True Copy

SAN Security

Security - Controlling Access to the SAN

• Physical layout– Foundation of a secure

network

• Location planning– Location of H/W and S/W

components– Identify Data Center

components– Data Center location for

management applications

– Disaster Planning

Fabric Security - Zoning

• Zone– Controlled at the switch layer– List of nodes that are made

aware of each other– A port or a node can be

members of multiple zones• Zone Set

– A collection of zones– Also called zone config

• Single HBA Zoning– A separate zone for each HBA– Makes zone management

easier when replacing HBAs

• Types of zones:– Port Zoning (Hard Zoning)

• Port-to-Port traffic• Ports can be members of more

than one zone• Each HBA only “sees” the ports

in the same zone• If a cable is moved to a different

port, zone has to be modified– WWN based Zoning (Soft Zoning)

• Access is controlled using WWN• WWNs defined as part of a zone

“see” each other regardless of the switch port they are plugged into

• HBA replacement requires the zone to be modified

– Hybrid zones (Mixed Zoning)• Contain ports and WWNs

Zoning - Hard vs. Soft Zoning

– Flexibility– Reconfiguration– Troubleshooting

Port Zoning

WWPN Zoning

– More Secure– Simplified HBA

replacement

– Reconfiguration

– “Spoofing” – HBA replacement

Advantages Disadvantages

Fabric Security - Vendor Specific Access Control

• Most vendors have proprietary access control mechanisms

• These mechanisms are not governed by the Fibre Channel standard

• Examples of vendor features:– McDATA

• Port Binding • SANtegrity

– Brocade• Secure FabricOS

Security: Volume Access Control (LUN Masking)

• Restricts volume access to specific hosts and/or host clusters

• Policies set based on functions performed by the host

• Servers can only access volumes that they are permitted to access

• Access controlled in the Storage Array - not in the fabric– Makes distributed

administration secure • Tools to manage masking

– GUI– Command Line

Backup

• Backup is the process of saving your data so that it can be restored in case of problems such as system failure or data corruption.

• Backup Window: Time• Backup Policy: Full, Incremental, Differential • Backup Rotation: Daily, Weekly, Monthly • Backup Method: Network, SAN, Disk to tape,

Disk to Disk,

Individual Backup Centralized Backup on LAN

Disk to Disk Backup Tiered Backup

Some Popular Backup Softwares

• Veritas Netbackup• IBM Tivoli Storage• EMC Legato Networker• HP OmniBack• Veritas BackupExec• CA Brighstor Arcserve

Common storage terms

• CIFS – Common Internet File System – A NAS protocol• DAS – Direct-attached storage• FCIP - SCSI over FC tunneled through IP• HBA – Host bus adapter• iFCP - SCSI over FC translated to IP• iSCSI - SCSI over IP (often over Ethernet)• JBOD – Just a bunch of disks• LAN - Local area network• LUN - Logical unit number – The basic unit of block storage• MTBF - Mean time between failures• MTTF - Mean time to failure• NAS – Network attached storage• NFS – Network File System – A NAS protocol• RAID – Redundant array of independent disks• SAN - Storage area network• SCSI – Small Computer Systems Interface