Data Center Virtualization and Cloud Computing Infrastructure

35
Data Center Virtualization and Cloud Computing Infrastructure Kh. Rashedul Arefin

Transcript of Data Center Virtualization and Cloud Computing Infrastructure

Page 1: Data Center Virtualization and Cloud Computing Infrastructure

Data Center Virtualization and Cloud Computing

Infrastructure

Kh. Rashedul Arefin

Page 2: Data Center Virtualization and Cloud Computing Infrastructure

TABLE OF CONTENTS

01ü VDI Definition and Typesü Components and Architecture of VDI

ü Operating System Virtualizationü Containerization

VDI and OS-Level Virtualization

02 ü Data Access Methodsü Storage Components

ü Enterprise Storage Systemsü Storage Virtualization

Storage Virtualization

Page 3: Data Center Virtualization and Cloud Computing Infrastructure

Virtual Desktop Infrastructure (VDI)

Ø Virtual Desktop Infrastructure (VDI) is a virtualization technology that hosts a Desktop Operating System on a Centralized Server in Data Center

Ø A Variation of Client-Server Computing Model

Ø Sometimes refered to as Server-Based Computing

Types

• Persistent• Non-persistend

Usage

• Remote Work• Flexibility / BYOD• Security• Task / Shift Duty

Benefits

• Mobility• Cost Savings• Security• Centralized

Management

Page 4: Data Center Virtualization and Cloud Computing Infrastructure

VDI Logical Architecture

Page 5: Data Center Virtualization and Cloud Computing Infrastructure

VDI Components and Architecture

Firewall & Load

BalancerWeb Portal

Connection Broker Monitoring

Virtual Desktops Hypervisors

Provisioning Services

Compute and Storage

Networks

Page 6: Data Center Virtualization and Cloud Computing Infrastructure

Provisioning of VDI

Page 7: Data Center Virtualization and Cloud Computing Infrastructure

Operating System (OS) Level Virtualization

Inserts a virtualization layer inside the Operating System

VM is often called VE, VPS or simply Container

Container is look like a real server

Container has its own set of process, file system, user accounts, network interface, IP Address, routing table, firewall rules and other personal settings

Share the same Operating System Kernel

Also called Single-OS image virtualization

Page 8: Data Center Virtualization and Cloud Computing Infrastructure

Hypervisor and Container Architecture

Page 9: Data Center Virtualization and Cloud Computing Infrastructure

Evolution of Container

cgroups•Isolates & Controls the resources for user spaces

namespaces

•Collection of processes that share same resources limitations•A Computer can have multiple namespaces •Each namespace is allocated resources enforced by Kernel

namespace isolation

•Its not new •Linux have many kinds of namespace isolations

cgroup isolation•Processes within a cgroup namespace are independent of processes of other namespace

Linux container (LXC)

•First implementation of today's Container•Create separate virtual environment with separate process and networking space (user space)

Docker•Most widely used container technology•Earlier version was built on top of LXC

Page 10: Data Center Virtualization and Cloud Computing Infrastructure

Architecture of Container

Page 11: Data Center Virtualization and Cloud Computing Infrastructure

Architecture of Container

Page 12: Data Center Virtualization and Cloud Computing Infrastructure

Benefits of Container Compare to VM

Containers are lightweight, hence can run more containers per host

Consume less resources

Compatibility issues (different application runs on different platform)

Share resources with underlying Host Machine with user space and process isolations

Container can start nearly instantly

Containers are portable and can regenerate a system environment with required software, irrespective of underlying Host Operating System

Page 13: Data Center Virtualization and Cloud Computing Infrastructure

Types of Storage

Primary

•Also referred as Memory•Directly accessed by CPU•Small capacity•Very fast•Volatile

Secondary

•Not directly accessible to CPU•Also known as Auxiliary Memory•Require I/O channel to transfer data to Primary Storage•Slower Access Time•More capacity than Primary Storage

Tertiary

•Refers to removable mass storage•Data Access Time is much longer•Lowest cost per data unit

Page 14: Data Center Virtualization and Cloud Computing Infrastructure

Data Access Methods•Simply a sequence of bytes•Hard Drive blocks can be mapped to a disk sector•Small Computer Systems Interface (SCSI)•Mainframe Storage Access•Advanced Technology Attachment (ATA)

Blocks•A set of contiguous data bytes•Also contain metadata•Network File System (NFS)•Common Internet File System (CIFS)Files•Similar structure to files•Highly structured•Open DataBase Connectivity (ODBC)•Java DataBase Connectivity (JDBC)•Structured Query Language (SQL)

Records

Page 15: Data Center Virtualization and Cloud Computing Infrastructure

Storage Components

ptg12380073

390 Data Center Virtualization Fundamentals

Q� Controllers: Manage the array hardware resources (such as disks) and coordinate theserver access to data contained in the device.

Q� Access ports: Interfaces that are used to exchange data with servers.

Q� Cache: RAM (random-access memory) or flash memory used to accelerate I/O oper-ations for stored data. It can be located at the controller or on expansion modules.

Q� Disk enclosures: Used for the physical accommodation of HDDs and SSDs. Usually,a disk enclosure gathers disk drives with similar characteristics.

Q� Redundant power supplies.

The left side of Figure 9-2 represents these components.

Redundant Power Sources

RedundantControllers

HardDrive

Disk Array

DiskEnclosures

AccessPorts

Disk Array

ConnectivityView

PhysicalView

Controller

Controller

Front-end Back-end

Figure 9-2 Disk Array Components

At the right side of Figure 9-2, you can visualize both types of disk array interconnec-tions: front-end (used for server access) and back-end (used for disk connection to the controller). Both ports support a great variety of communication protocols and physical media, as you will learn in the next sections.

With their highly redundant architecture and management features, disk arrays have become the workhorse of permanent storage in modern data centers. At the time of this writing, the main disk array vendors are EMC Corporation, Hitachi Data Systems (HDS), IBM, and NetApp Inc.

Tape Drives and Libraries

Magnetic tapes are a storage medium made of magnetizable coating on a long strip of plastic film. They are usually inserted into a motorized tape drive that can wind the tape

HDD

Disk Array

Tape Library

Connectivity

Protocol

Page 16: Data Center Virtualization and Cloud Computing Infrastructure

Enterprise Storage Systems - SAN

Page 17: Data Center Virtualization and Cloud Computing Infrastructure

SAN Zoning

Page 18: Data Center Virtualization and Cloud Computing Infrastructure

LUN Masking

Page 19: Data Center Virtualization and Cloud Computing Infrastructure

FLOGI

Page 20: Data Center Virtualization and Cloud Computing Infrastructure

FC Name Services

Page 21: Data Center Virtualization and Cloud Computing Infrastructure

Port Login

Page 22: Data Center Virtualization and Cloud Computing Infrastructure

Process Login

Page 23: Data Center Virtualization and Cloud Computing Infrastructure

SAN Multipathing

Page 24: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization

Storage made available to applications without concern of its physical location, underlying interfaces, its implementation

technology, platform and available resources

• Remote storage device appear as local deviceDistance• Multiple smaller volume appear as a large volumeSize• Data is spread over multiple physical disksSpread• Windows, Linux, Unix all use same storage deviceFile Systems• A SCSI disk connected to a computer without SCSI InterfaceVirtual Interface• High Availability, Disaster Recovery, Improved Performance, SharingAdvantages

Page 25: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

ptg12380073

392 Data Center Virtualization Fundamentals

Block-Based Access

Block-based storage devices provide direct access to data blocks that will be commonly controlled by a server. In that generic scenario, a server software piece called Logical Volume Manager (LVM) will normally create local volumes and perform I/O operations on the storage device on behalf of the server applications.

The methods of data block exchange between a computer and its storage device vary widely depending on the chosen components of a scenario. And as you will see in the next sections, they can be based on

Q� Proprietary or standard protocols

Q� Dedicated connections, shared buses, or storage area networks (SANs)

Small Computer Systems InterfaceThe set of standards that define the Small Computer Systems Interface (SCSI, pro-nounced scuzzy) were developed by the International Committee for Information Technology Standards (INCITS) Technical Committee T10. Originated from the work of Larry Boucher (from Shugart Associates), SCSI essentially defines how data is transferred between computers and peripheral devices. With that intention, SCSI describes com-mands, protocols, and physical interfaces aiming to provide compatibility between differ-ent vendors.

Before delving further into the details of the SCSI standards, allow me to take you for a walk down memory lane. The year is 1986, Run D.M.C is redefining pop music with “Walk This Way,” and SCSI-1 (or SCSI First Generation) is a recently ratified standard. Then, a typical SCSI implementation followed the physical topology illustrated in Figure 9-3.

LUN 0

LUN 1

LUN 0

LUN 1 LUN 2

Terminator

Initiator(ID = 7)

Target(ID = 5)

Target(ID = 0)

Target(ID = 6)

Ribbon Cable

SCSI Bus

LUN 0

LUN 1 LUN 2

HBA

Figure 9-3 SCSI Parallel Topology

Page 26: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

Page 27: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

Page 28: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

ptg12380073

402 Data Center Virtualization Fundamentals

In the next sections, I will outline some of these virtualization solutions, their character-istics, and the benefits they bring to the daily tasks of storage professionals. And because each vendor has different implementations for these solutions, in the next three sections I will aggregate their most common features using the level of data abstraction they act upon.

Note As an useful exercise, I recommend that you use the virtualization taxonomy explained in Chapter 1 to categorize each storage virtualization technology at the end of each section.

Virtualizing Storage Devices

Disk array virtualization can be currently deployed partitioning a single device or grouping several of them. Through partitioning, a physical disk array can be subdivided into logical devices, with assigned resources such as disks, cache, memory, and ports. Using the array as a pool of these resources, each virtual array partition can create exclu-sive LUNs or file systems to different departments, customers, or applications. Protecting data access between partitions and controlling hardware resources for each one of them, this style of virtualization encourages storage consolidation and resource optimization in multitenant data centers.

Storage virtualization also allows multiple physical arrays to work together as a single system, bringing advantages such as data redundancy and management consolidation. For example, array-based data replication illustrates how two distinct disk arrays can work in coordination to provide fault tolerance for the stored data transparently to hosts that might be accessing them.

There are two basic methods to deploy array-based replication, as Figure 9-7 illustrates.

Primary Array

1

2

3

4

SynchronousReplication

AsynchronousReplication

SecondaryArray

Primary Array

1

3

4

2

SecondaryArray

Figure 9-7 Synchronous Versus Asynchronous Replication

On the left side of Figure 9-7, both disk arrays are implementing synchronous replication. As the figure shows, this method of storage redundancy will always trace the following actions:

Page 29: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

ptg12380073

404 Data Center Virtualization Fundamentals

Figure 9-8 illustrates a generic tape library virtualization design.

BackupServer

Disk Array(“Virtual Tape Library”)

“Real” TapeLibrary

Figure 9-8 Virtual Tape Library

In the figure, a backup server is retrieving and sending data to the disk array, using the same processes and protocols it would deploy with a traditional tape library. Consequently, a disk array imports and exports streams of data to the tape library, acting as a “cache” mechanism for the latter.

The most common VTL vendors are IBM, FalconStor, and Oracle. Some of the available VTLs can reduce the number of stored data through a compression technique called data deduplication, which eliminates duplicate copies of the same data sequence. Through this feature, a redundant chunk of data is replaced by a small reference that points to the only-once stored chunk. In real-world scenarios, deduplication can obliterate up to 95 percent of stored data on both the VTL and tape library.

Virtualizing LUNs

Chances are that a discussion about storage virtualization will invariably bring up LUN virtualization as the key topic. Because LUNs usually represent the final deliverable ele-ment from the storage team to its main consumer (server team), their management has been under rigorous scrutiny since the origins of SCSI.

Here are some examples of the LUN management challenges faced by array administra-tors:

Q� LUNs are statically defined in a single disk array.

Q� The migration of LUNs to another disk array is a rather complicated task, and it gen-erally demands application interruption.

Q� Servers rarely utilize the requested size of their LUNs, raising capital and operationalcosts and severely decreasing device utilization.

Q� The resizing of a LUN is usually a disruptive operation.

In most LUN virtualization deployments, a virtualizer element is positioned between a host and its associated target disk array (in-path I/O interception). This virtualizer gener-

Page 30: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

ptg12380073

Chapter 9: Storage Evolution 405

ates a virtual LUN (vLUN) that proxies server I/O operations while hiding specialized data block processes that are occurring in the pool of disk arrays under its “jurisdiction.”

Figure 9-9 exemplifies how vLUNs can enhance block-based storage environments.

LUN

Virtualizer

vLUN

1TB

6TBUsing 1 TB

Thin-provisioning

ResourcePooling

OnlineMigration

LUN

Virtualizer

vLUN

1TBLUN

3TBLUN

2TB

6TB

Storage Pool Storage Pool

StoragePool (Site 1)

Virtualizer

vLUN

LUN2TB

LUN1TB

1TB

Storage Pool

LUNExtension

Virtualizer

vLUN

Virtualizer

vLUN

LUN LUN

StoragePool (Site 2)

WAN

Figure 9-9 Virtual LUN Applications

The upper-left corner of Figure 9-9 demonstrates how a virtualizer can deploy storage resource pooling, where a physical group of devices is treated as a single repository of data block resources. With this specific feature, a vLUN can be generated through the use of smaller LUNs distributed over different physical arrays. In general terms, storage resource pooling increases device utilization and consolidates storage management.

Thin-provisioning, represented in the upper-right corner of the figure, is a LUN virtu-alization feature that helps reduce the waste of block storage resources. With this tech-nique, although a server can detect a vLUN with a “full” size; only blocks that are present in the vLUN are actually saved on the storage pool. This feature brings the concept of oversubscription to data storage, consequently demanding special attention to the ratio between “declared” and actually used resources.

ptg12380073

Chapter 9: Storage Evolution 405

ates a virtual LUN (vLUN) that proxies server I/O operations while hiding specialized data block processes that are occurring in the pool of disk arrays under its “jurisdiction.”

Figure 9-9 exemplifies how vLUNs can enhance block-based storage environments.

LUN

Virtualizer

vLUN

1TB

6TBUsing 1 TB

Thin-provisioning

ResourcePooling

OnlineMigration

LUN

Virtualizer

vLUN

1TBLUN

3TBLUN

2TB

6TB

Storage Pool Storage Pool

StoragePool (Site 1)

Virtualizer

vLUN

LUN2TB

LUN1TB

1TB

Storage Pool

LUNExtension

Virtualizer

vLUN

Virtualizer

vLUN

LUN LUN

StoragePool (Site 2)

WAN

Figure 9-9 Virtual LUN Applications

The upper-left corner of Figure 9-9 demonstrates how a virtualizer can deploy storage resource pooling, where a physical group of devices is treated as a single repository of data block resources. With this specific feature, a vLUN can be generated through the use of smaller LUNs distributed over different physical arrays. In general terms, storage resource pooling increases device utilization and consolidates storage management.

Thin-provisioning, represented in the upper-right corner of the figure, is a LUN virtu-alization feature that helps reduce the waste of block storage resources. With this tech-nique, although a server can detect a vLUN with a “full” size; only blocks that are present in the vLUN are actually saved on the storage pool. This feature brings the concept of oversubscription to data storage, consequently demanding special attention to the ratio between “declared” and actually used resources.

ptg12380073

Chapter 9: Storage Evolution 405

ates a virtual LUN (vLUN) that proxies server I/O operations while hiding specialized data block processes that are occurring in the pool of disk arrays under its “jurisdiction.”

Figure 9-9 exemplifies how vLUNs can enhance block-based storage environments.

LUN

Virtualizer

vLUN

1TB

6TBUsing 1 TB

Thin-provisioning

ResourcePooling

OnlineMigration

LUN

Virtualizer

vLUN

1TBLUN

3TBLUN

2TB

6TB

Storage Pool Storage Pool

StoragePool (Site 1)

Virtualizer

vLUN

LUN2TB

LUN1TB

1TB

Storage Pool

LUNExtension

Virtualizer

vLUN

Virtualizer

vLUN

LUN LUN

StoragePool (Site 2)

WAN

Figure 9-9 Virtual LUN Applications

The upper-left corner of Figure 9-9 demonstrates how a virtualizer can deploy storage resource pooling, where a physical group of devices is treated as a single repository of data block resources. With this specific feature, a vLUN can be generated through the use of smaller LUNs distributed over different physical arrays. In general terms, storage resource pooling increases device utilization and consolidates storage management.

Thin-provisioning, represented in the upper-right corner of the figure, is a LUN virtu-alization feature that helps reduce the waste of block storage resources. With this tech-nique, although a server can detect a vLUN with a “full” size; only blocks that are present in the vLUN are actually saved on the storage pool. This feature brings the concept of oversubscription to data storage, consequently demanding special attention to the ratio between “declared” and actually used resources.

ptg12380073

Chapter 9: Storage Evolution 405

ates a virtual LUN (vLUN) that proxies server I/O operations while hiding specialized data block processes that are occurring in the pool of disk arrays under its “jurisdiction.”

Figure 9-9 exemplifies how vLUNs can enhance block-based storage environments.

LUN

Virtualizer

vLUN

1TB

6TBUsing 1 TB

Thin-provisioning

ResourcePooling

OnlineMigration

LUN

Virtualizer

vLUN

1TBLUN

3TBLUN

2TB

6TB

Storage Pool Storage Pool

StoragePool (Site 1)

Virtualizer

vLUN

LUN2TB

LUN1TB

1TB

Storage Pool

LUNExtension

Virtualizer

vLUN

Virtualizer

vLUN

LUN LUN

StoragePool (Site 2)

WAN

Figure 9-9 Virtual LUN Applications

The upper-left corner of Figure 9-9 demonstrates how a virtualizer can deploy storage resource pooling, where a physical group of devices is treated as a single repository of data block resources. With this specific feature, a vLUN can be generated through the use of smaller LUNs distributed over different physical arrays. In general terms, storage resource pooling increases device utilization and consolidates storage management.

Thin-provisioning, represented in the upper-right corner of the figure, is a LUN virtu-alization feature that helps reduce the waste of block storage resources. With this tech-nique, although a server can detect a vLUN with a “full” size; only blocks that are present in the vLUN are actually saved on the storage pool. This feature brings the concept of oversubscription to data storage, consequently demanding special attention to the ratio between “declared” and actually used resources.

Page 31: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

ptg12380073

Chapter 9: Storage Evolution 407

File Server Clients

Metadata Servers

LAN

NFS CIFS NFS CIFS

SAN

Storage Pool

Figure 9-10 File System Virtualization

Note Figure 9-10 depicts an out-of-band virtualization system because only control infor-mation is handled by the virtualization device (metadata servers).Adversely, virtualization systems that directly act upon the exchanged data are known as inband virtualizers.

Besides extending a consolidated file system to multiple different clients, a virtual file system can also leverage a performance boost through SAN block access. IBM TotalStorage SAN File System is an example of a virtual file system solution.

Virtualizing SANs

Considering that storage area networks are critical components in modern storage envi-ronments, it is no surprise that they can also benefit from virtualization features.

Cisco entered the Fibre Channel switch market in 2003 with its MDS 9000 directors and fabric switches series. Since then, the company has applied its experience and resources to enable multiple virtualization features within intelligent SANs.

In truth, this very subject characterizes the core content of the remaining chapters of Part III, “Virtualization in Storage Technologies”:

Page 32: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

Page 33: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

22

Chapter 22: Introduction to Storage and Storage Networking 621

Zone A

Zone B

FC

VSAN 2

Disk1

Host2Disk4

Host1

Disk2Disk3

Zone A

Zone B

Zone C

VSAN 3

Disk6

Disk5

Host4

Host3Zone B

Zone A

Zoneset 1

Zoneset 1

FC

FC

Figure 22-34 Inter-VSAN Topology

Internet Small Computer System Interface (iSCSI)IP and Small Computer System Interface over IP (iSCSI) storage refer to the block access of storage disks across devices connected using traditional Ethernet and TCP/IP networks. iSCSI is an IP-based storage networking standard for linking data storage facilities.

The iSCSI protocol enables transport of SCSI commands over TCP/IP networks. By trans-mitting SCSI commands over IP networks, iSCSI can facilitate block-level transfers over an intranet and the Internet. The iSCSI architecture is similar to a client-server architecture in which the client initiates an I/O request to the storage target. The TCP payload of an iSCSI packet contains iSCSI protocol data units (PDUs), all of which begin with one or more head-er segments followed by zero or more data segments. iSCSI uses TCP (typically TCP ports 860 and 3260) for the protocols itself, with higher-level names used to address the objects within the protocol.

Page 34: Data Center Virtualization and Cloud Computing Infrastructure

Storage Virtualization Techniques

Page 35: Data Center Virtualization and Cloud Computing Infrastructure