0% found this document useful (0 votes)
115 views

SAN Module2

The document discusses a lecture on storage area networks. It covers 5 modules: 1) introduction to storage systems and intelligent storage, 2) storage networking technologies and virtualization, 3) backup, archive and replication, 4) cloud computing, and 5) securing and managing storage infrastructure. The lecture will evaluate storage architectures, emerging technologies like IP-SAN, and key challenges in managing information and different storage networking technologies. It will also describe backup/recovery topologies and illustrate storage infrastructure and management activities.

Uploaded by

Varnitha Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views

SAN Module2

The document discusses a lecture on storage area networks. It covers 5 modules: 1) introduction to storage systems and intelligent storage, 2) storage networking technologies and virtualization, 3) backup, archive and replication, 4) cloud computing, and 5) securing and managing storage infrastructure. The lecture will evaluate storage architectures, emerging technologies like IP-SAN, and key challenges in managing information and different storage networking technologies. It will also describe backup/recovery topologies and illustrate storage infrastructure and management activities.

Uploaded by

Varnitha Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 161

An Autonomous Institute

Affiliated to VTU, Belagavi,


Approved by AICTE, New Delhi,
Recognized by UGC with 2(f) & 12(B)
Accredited by NBA & NAAC

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


SUBJECT CODE : 17CS754
SUBJECT NAME:STORAGE AREA NETWORK
LECTURE PRESENTATION MODULE – 2

FACULTY
. : Prof. THANU KURIAN, Asst. Prof, Dept. of CSE

An Autonomous Institution ,Affiliated to Visvesvaraya Technological University, Belagavi. Approved By AICTE, New Delhi. Recognized by UGC with 2(f) & 12(B)
status. Accredited by NBA and NAAC.
Syllabus
Module 1:Storage System Introduction to evolution of storage
architecture, key data center elements, virtualization, and cloud
computing. Key data center elements – Host (or compute),
connectivity, storage, and application in both classic and virtual
environments. RAID implementations, techniques, and levels along
with the impact of RAID on application performance.Components of
intelligent storage systems and virtual storage provisioning and
intelligent storage system implementations.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 2
Module 2 Storage Networking Technologies and
Virtualization

Fibre Channel SAN components, connectivity options, and


topologies including access protection mechanism ‘zoning”, FC
protocol stack, addressing and operations, SAN-based virtualization
and VSAN technology, iSCSI and FCIP protocols for storage access
over IP network, Converged protocol FCoE and its components,
Network Attached Storage (NAS) - components, protocol and
operations, File level storage virtualization, Object based storage
and unified storage platform.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 3
Module 3:Backup, Archive, and Replication This unit
focuses on information availability and business continuity
solutions in both virtualized and non-virtualized
environments. Business continuity terminologies, planning
and solutions, Clustering and multipathing architecture to
avoid single points of failure, Backup and recovery -
methods, targets and topologies, Data deduplication and
backup in
virtualized environment, Fixed content and data archive,
Local replication in classic and virtual environments,
Remote replication in classic and virtual environments,
Three-site remote replication and continuous data protection

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 4
Module 4:Cloud Computing Characteristics and benefits This
unit focuses on the business drivers, definition, essential
characteristics, and phases of journey to the Cloud. ,Business
drivers for Cloud computing, Definition of Cloud computing,
Characteristics of Cloud computing, Steps involved in
transitioning from Classic data center to Cloud computing
environment Services and deployment models, Cloud
infrastructure components, Cloud migration considerations

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 5
Module 5:Securing and Managing Storage Infrastructure
This chapter focuses on
framework and domains of storage security along with
covering security.
implementation at storage networking. Security threats, and
countermeasures in various domains Security solutions for FC-
SAN, IP-SAN and NAS environments, Security in virtualized
and cloud environments, Monitoring and managing various
information infrastructure components in classic and virtual
environments, Information lifecycle management (ILM) and
storage tiering,

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 6
COURSE OBJECTIVES
After studying this course, students will be able to:
✔ Evaluate storage architectures,
✔ Define backup, recovery, disaster recovery, business continuity, and replication
✔ Examine emerging technologies including IP-SAN
✔ Understand logical and physical components of a storage infrastructure
✔ Identify components of managing and monitoring the data center
✔ Define information security and identify different storage virtualization
technologies

COURSE OUTCOMES
C405.4.1 Analyse the various RAID and Intelligent Storage System
C405.4.2 Identify key challenges in managing information and analyze different
storage
networking technologies
C405.4.3 Describe the backup/recovery topologies..
C405.4.4 Realize strong virtualization concepts .
C405.4.5 Illustrate the storage infrastructure and management activities.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 7
Recalling Module 1

• Key data center elements


• Virtualization
• Cloud computing.
• RAID implementations
• Components of intelligent storage
systems
• Virtual storage provisioning

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 8
Storage Technologies
With the advent of the Internet, Big Data, corporate intranets, e-
mail, e-commerce, business-to-business (B2B), ERP (Enterprise
Resource Planning), Customer Resource Management (CRM),
data warehousing, CAD/CAM, rich media streaming, voice/video/
data convergence, and many other real time applications, the
demands on the enterprise storage capacity has grown by leaps
and bounds.
The data itself is as important to a business’s successful
operation as its personnel and systems.
The need to protect this strategic asset has far exceeded the
capabilities of a tape backup. Tape access and capacities can
simply not address the growing demands.
Growing data stores meant having to implement tape libraries.
Even then, there are inherent issues with tape media that could
only be addressed
Extracted fromwith either supplemental storage or
https://vmarena.com/storage-network-technologies/
replacement of the media altogether.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 9
Storage network technology has developed in the following
three main configurations: Direct Attached Storage (DAS),
Network Attached Storage (NAS), and Storage Area
Networks (SAN).
Direct Attached Storage (DAS)
DAS is the traditional method of locally attaching storage
devices to servers via a direct communication path
between the server and storage devices.
Network Attached Storage (NAS)
NAS is a file-level access storage architecture with storage
elements attached directly to a LAN. It provides file access
to het erogeneous computer systems.
Storage Area Networks (SANs)
Like DAS, a SAN is connected behind the servers. SANs
provide block-level access to shared data storage. Block
level access refers to the specific blocks of data on a storage
device as opposed
Extracted to file level access.
from https://vmarena.com/storage-network-technologies/
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Contents
• What is SAN?
• Introduction to storage networking technology
• Evolution of Fiber Channel SAN
• What is Fiber Channel?
• Fibre Channel SAN components
• Connectivity options
• Fiber Channel Topologies including access protection mechanism ‘zoning’
• FC protocol stack
• Addressing and operations
• SAN-based virtualization and VSAN technology
• iSCSI and FCIP protocols for storage
• Access over IP network
• Converged protocol FCoE and its components
• Priority Based Flow Control
• Network Attached Storage (NAS) - components, protocol and operations
• File level storage virtualization
• Object based storage and unified storage platform

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
What is a SAN?
Array

• Dedicated storage network


• Organized connections among:
Storage
Switches
Communication devices
Server
Systems
• Secure
• Robust

Servers
Storage
Figure 2.1:A SAN Network

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Networks (SAN) - 12
Evolution of Fiber Channel SAN
Servers

HU
B
Switches
Switches

Storage Servers Storage Servers

Interconnect
SAN Islands
ed Arrays Storage
FC
SANs
Arbitrated Enterprise SANs
FC
Loop FC Switched Fabric
Switched
Figure 2.2:Evolution
Fabric of Fiber Channel SAN

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 13
Storage Area Networks (SAN) - 13
What is Fiber Channel SAN(FC SAN)?

• A network of servers and shared storage devices


• High speed networking technology used to connect
data storage to server
• Servers and storage are end points or devices in the
SAN(called nodes)

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) 14
- 14 status |Accredited by NBA and NAAC
Fibre Channel SAN components

• Node ports
• Cables and Connectors
• Interconnecting Devices
• SAN Management
Software HB
HB
Switches
A

SAN-attached Server
SAN
Arrays
Figure 2.3:Fiber Channel SAN Components

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Networks (SAN) - 15
Node Ports

• In fibre channel, devices such as hosts, storage and tape


libraries are all referred to as nodes.
• Each node is a source or destination of information for one
or more nodes.
• Each node requires one or more ports to provide a physical
interface for communicating with other nodes.
• These ports are integral components of an HBA and the
storage front-end adapters.
• A port operates in full-duplex data transmission mode with
a transmit (Tx) link and a receive (Rx) link

16
Nodes, Ports, & Links

HB
A
Tx
Port
Rx
0
Link
Port
0
Port
Port
11

Port
Port
n
n
Figure 2.4:Nodes,Ports and links
Node

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 17
Networks (SAN) - 17
Cables and Connectors

• SAN implementations use optical fiber cabling.


• Copper can be used for shorter distances for back-end
connectivity, as it provides a better signal-to-noise ratio for
distances up to 30 meters.
• Optical fiber cables carry data in the form of light.
• There are two types of optical cables,
• Multi-mode
• Single-mode.
Multi-mode fiber (MMF) cable carries multiple beams of light
projected at
different angles simultaneously onto the core of the cable.
Single-mode fiber (SMF) carries a single ray of light projected at
the center of the core.

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 18
Networks (SAN) - 18
Multi-mode fiber and single-mode fiber

Figure 2-5:Multi-mode fiber and single-mode fiber

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 19
Multi-mode fiber and single-mode fiber

• In an MMF transmission, multiple light beams traveling inside


the cable tend to disperse and collide.
• This collision weakens the signal strength after it travels a certain
distance — a process known as modal dispersion.
• An MMF cable is usually used for distances of up to 500 meters
because of signal degradation (attenuation) due to modal
dispersion.
• In an SMF transmission, a single light beam travels in a straight
line through the core of the fiber.
• The small core and the single light wave limits modal dispersion.
• Among all types of fibre cables, single-mode provides minimum
signal attenuation over maximum distance (up to 10 km).

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 20
Cables and Connectors

• Standard connector (SC) and a Lucent


connector (LC) are two commonly
used connectors for fiber optic cables.
• An SC is used for data transmission
speeds up to 1 Gb/s, whereas an LC is
used for speeds up to 4 Gb/s.
• A Straight Tip (ST) is a fiber optic
connector with a plug and a socket
that is locked with a half-twisted
bayonet lock

Figure 2.6: SC, LC, and ST connectors

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 21
Networks (SAN) - 21
Connectivity Devices
• Basis for SAN communication
– Hubs, Switches and Directors

HB Switches Arrays
Server A

Figure 2.7:Connectivity Devices

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 22
Networks (SAN) - 22
Hubs, Switches and Directors
• Hubs are used as communication devices in FC-AL
implementations. Hubs physically connect nodes in a logical
loop or a physical star topology.
• All the nodes must share the bandwidth because data travels
through all the connection points.
• No longer used
• Switches are more intelligent than hubs and directly route data
from one physical port to another.
• Therefore, nodes do not share the bandwidth. Instead, each
node
• has a dedicated communication path, resulting in bandwidth
aggregation.
• Directors are larger than switches and are deployed for data
center implementations.
• The function of directors is similar to that of FC switches, but
directors
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 23
Storage Resources

• Storage Array
– Provides storage consolidation and
centralization
• Features of an array
– High Availability/Redundancy
– Performance
Server Switches Arrays
– Business Continuity HBA
– Multiple host connect

Figure 2.8:Storage Resources

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 24
Networks (SAN) - 24
SAN Management Software
• A suite of tools used in a SAN to manage
the interface between host and storage
arrays.
• Provides integrated management of SAN
environment from one console.
• Key management functions
• Mapping of storage devices,switches,servers
• Monitoring and generating alerts for
discovered devices
• Zoning

Figure 2.9:SAN management software

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) 25
- 25 status |Accredited by NBA and NAAC
Fiber Channel Connectivity options

• Point to Point
• Arbitrated Loop (FC-AL)
• Fabric Channel Switched
Fabric

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 26
Point to Point
• Simplest
• Two devices are connected
directly to each other
• Provides a dedicated
connection for data
transmission between
nodes.
• However, the point-to-point
configuration offers limited
connectivity, as only two
devices can communicate
with each other at a given
time.
Figure 2.12:Point to Point
• Moreover, it cannot be
scaled to accommodate a
large number of network
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 27
FC-AL(Fiber Channel Arbitrary
Loop)
• Devices are attached to a shared loop
• Devices on the loop must “arbitrate”
to gain control of the loop.
• At any given time, only one device
can perform I/O operations on the
loop
• FC-AL can be implemented without
any interconnecting devices by
directly connecting one device to
another in a ring through cables
• FC-AL implementations may also use Figure 2.13:Fibre Channel arbitrated loop
hubs whereby the arbitrated loop is
physically connected in a star
topology
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 28
FC-AL limitations :
• FC-AL shares the bandwidth in the loop. Only one device can perform
I/O operations at a time.
• Because each device in a loop has to wait for its turn to process an I/O
request, the speed of data transmission is low in an FC-AL topology.
• FC-AL uses 8-bit addressing. It can support up to 127 devices on a loop.
• Adding or removing a device results in loop re-initialization, which
can
cause a momentary pause in loop traffic

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 29
FC-AL Transmission
When a node in the FC-AL topology attempts to transmit data, the node sends an
arbitration (ARB) frame to each node on the loop.
If two nodes simultaneously attempt to gain control of the loop, the node with the highest
priority is allowed to communicate with another node
When the initiator node receives the ARB request it sent, it gains control of the
loop. The initiator then transmits data to the node with which it has established a virtual
connection

Node A want to communicate with Node B


1. High priority initiator, Node A inserts the ARB frame in the loop.
2. ARB frame is passed to the next node (Node D) in the loop.
3. Node D receives high priority ARB, therefore remains idle.
4. ARB is forwarded to next node (Node C) in the loop.
5. Node C receives high priority ARB, therefore remains idle.
6. ARB is forwarded to next node (Node B) in the loop.
7. Node B receives high priority ARB, therefore remains idle and
8. ARB is forwarded to next node (Node A) in the loop.
9. Node A receives ARB back; now it gains control of the loop and can start communicating
with target Noq

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 30
FC-AL Transmission

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 31
Fibre Channel Switched Fabric

• Fibre Channel switched fabric (FC-SW) network provides


interconnected devices a dedicated bandwidth, and
scalability.
• The addition or removal of a device in a switched fabric is
minimally disruptive; it does not affect the ongoing traffic
between other devices
• FC-SW is also referred to as fabric connect
• Each switch in a fabric contains a unique domain identifier,
which is part of the fabric’s addressing scheme.
• In FC-SW, nodes do not share a loop; instead, data is
transferred through a dedicated path between the nodes.
Each port in a fabric has a unique 24-bit fibre channel
address for communication.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 32
Fibre Channel switched fabric

Figure 2.15:Fibre Channel switched fabric


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 33
• Link between any two switches-inter switch link(ISL)
• ISL enable switches to be connected together to form a
single larger fabric
• Using ISL a switched fabric can be expanded to
connect a large number of nodes.
• When the number of tiers in a fabric increases, the
distance that a fabric management message must
travel to reach each switch in the fabric also increases.
• The increase in the distance also increases the time
taken to propagate and complete a fabric
reconfiguration event, such as the addition of a new
switch, increases

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 34
Tiered structure of FC-SW
topology

Figure 2-16: Tiered structure of FC-SW topology

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 35
FC-SW Transmission
• FC-SW uses switches that are
intelligent devices.
• They can switch data traffic from
an initiator node to a target node
directly through switch ports.
• Frames are routed between
source and destination by the
fabric.
• As shown in Figure 2-17, if node
B wants to communicate with
node D, Nodes should
individually login first and then
transmit data via the FC-SW. This
link is considered a dedicated
connection between the initiator
and the target.
Figure 2.17:Data transmission in FC-SW topology
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 36
Switched Fabric Ports
Ports are the basic building blocks of an FC network. Ports on the
switch can be one of the following types:
N_port: An end point in the fabric. This port is also known as the
node port. Typically, it is a host port (HBA) or a storage array port
that is connected to a switch in a switched fabric.
NL_port: A node port that supports the arbitrated loop topology. This
port is also known as the node loop port.
E_port: An FC port that forms the connection between two FC
switches. This port is also known as the expansion port. The E_port
on an FC switch connects to the E_port of another FC switch in the
fabric through a link, which is called an Inter-Switch Link (ISL).

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 37
F_port: A port on a switch that connects an N_port. It is also
known as a fabric port and cannot participate in FC-AL.
FL_port: A fabric port that participates in FC-AL.
G_port: A generic port that can operate as an E_port or an F_port
and determines its functionality automatically during
initialization.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 38
Fibre Channel Ports

Figure 2.18:Fibre Channel ports


39
Fiber Channel Protocol Stack

Figure 2.19:Fibre Channel ports extracted from https://www.mycloudwiki.com/san/fc-san-protocols

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 40
FC-4 Upper Layer Protocol
• FC-4 is the uppermost layer in the FCP stack.
• This layer defines the application interfaces and the way Upper Layer Protocols (ULPs) are mapped to
the lower FC layers
FC-2 Transport Layer
• The FC-2 layer provides Fibre Channel addressing, structure, and organization of data (frames,
sequences, and exchanges).
• It also defines fabric services, classes of service, flow control, and routing.
FC-1 Transmission Protocol
Includes serial encoding(prior to transmission) and decoding (upon receipt) rules, special characters
used, and error control.
FC-0 Physical Interface
• FC-0 is the lowest layer in the FCP stack.
• This layer defines the physical interface, media, and transmission of raw bits.
• The FC-0 specification includes cables, connectors, and optical and electrical parameters for a variety
of data rates.
• The FC transmission can use both electrical and optical media.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 41
Fiber Channel Addressing
An FC address is dynamically assigned when a port logs on to the
fabric.
• The first field of the FC address of an N_port contains the domain
ID of the switch .
• Domain ID is a unique number provided to each switch in the fabric.
This is an 8-bit field
• The area ID is used to identify a group of switch ports.
Eg:port card
• The last field in the FC address identifies the port within the group.

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 42
Networks (SAN) - 42
Fiber Channel Addressing

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 43
World Wide Names
• Each device in the FC environment is assigned
a 64-bit unique identifier called the World
Wide Name (WWN)
• Static to the port.
– Used to physically identify a port or node
within the SAN
• WWNs are burned into the hardware or
assigned through software

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 44
Networks (SAN) - 44
World Wide Names: Example

World Wide Name – Array


5 0 0 6 0 1 6 0 0 0 6 0 0 1 B 2
0101 0000 0000 0110 0000 0001 0110 0000 0000 0000 0110 0000 0000 0001 1011 0010

Company ID Port Model seed


24 bits 32 bits

World Wide Name - HBA


1 0 0 0 0 0 0 0 c 9 2 0 d c 4 0
Reserved Company OUI Company Specific
12 bits 24 bits 24 bits

Figure 2.20:World wide names example


Approved by AICTE |Affiliated to VTU | Recognized byStorage
UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 45
Networks (SAN) - 45
Zoning is an FC Switch function that enables node ports
within the fabric to be logically segmented into groups
Servers
and to communicate with each other within the group

Arrays

Figure 2.21:Zoning
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)Storage
status |Accredited by NBA and NAAC 46
Area Networks (SAN) - 46
• Whenever a change takes place in the name server database, the
fabric controller sends a Registered State Change
Notification(RSCN) to all the nodes impacted by the change
• If zoning is not configured, the fabric controller sends an RSCN
to all the nodes in the fabric.
• Zoning helps in limiting the number of RSCNs in the fabric, a
fabric sends RSCN to only those nodes in a zone where change
has occurred.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 47
• Zone sets comprise a group of zones that can be activated
or deactivated as a single entity in a fabric.
• Multiple zone sets can be defined in a fabric, but only one
zone set per fabric can be active at a time.
• Members are nodes within SAN that can be included in a
zone.
Eg:switch ports,HBA ports,storage device ports
• Zone sets are also referred to as zone configurations.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 48
Zoning Components

Zones Sets Zone


Set

Zones Zon Zon Zon


e e e

Members
Membe Membe Membe Membe Membe Membe
r r r r r r

Figure 2.22:Zoning Components


Approved by AICTE |Affiliated to VTU | Recognized byStorage
UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 49
Networks (SAN) - 49
Types of Zoning

Zoning can be categorized into three types:


Port zoning:
• Uses physical addresses of the switch ports to define zones.
• Zone members are the port id(switch domain ID and port
number)
• To move node to another switch port, zoning must be modified
• Port zoning is also called hard zoning.
WWN zoning:
• It uses World Wide Names to define zones.
• Zone members are the unique WWN addresses of HBA and its
targets(storage devices)
• Flexible-can move nodes to another switch port without effecting
zone configuration as WWN is static to node port
• WWN zoning is also referred to as soft zoning.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 50
Mixed zoning:
• It combines the qualities of both WWN zoning and
port zoning.
• Using mixed zoning enables a specific port to be tied
to the WWN of a node

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 51
Types of
Zoning

Figure 6-20: Types of zoning

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 52
FC SAN Topologies

Fabric design follows standard topologies to connect devices


Mesh Topology
Each switch is directly connected to other switches by using ISLs.
• Full mesh or
• Partial mesh.

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 53
Networks (SAN) - 53
Full Mesh
• In a full mesh, every switch is connected to every other switch
in the topology.
• Full mesh topology may be appropriate when the number of
switches involved is small.
• A maximum of one ISL or hop is required for host-to-storage
traffic
Partial Mesh
• Several hops or ISLs may be required for the traffic to reach its
destination
• More scalability
• Traffic management might be complicated without proper
placement of host and storage devices

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 54
Mesh Topology

Figure 2.26:Mesh topology


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 55
Full Mesh Benefits

• Benefits
– All storage/servers are a maximum of one ISL hop
away.
– Hosts and storage may be located anywhere in the
fabric.
– Multiple paths for data using the Fabric Shortest
Path First (FSPF) algorithm.
– Fabric management made simpler.

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 56
Networks (SAN) - 56
Core-Edge Fabric

Has two types of switch tiers


– Edge Tier
– Comprises switches and offers an inexpensive approach to adding more hosts in a fabric.
– Each switch at the edge tier is attached to a switch at the core tier
– Core tier
– Comprises enterprise directors that ensure high fabric availability.
– All traffic has to either traverse through or terminate at this tier.
– All storage devices are connected to the core tier,enabling host to storage traffic to traverse
only one ISL.
– In core edge topology,edge tier switches are not connected to each
other
– Increases connectivity within SAN, conserving overall port utilization
– If fabric expansion is required, additional edge switches are
connected to the core or by adding more switches/directors at the core
tier.
– Based on the number of core tier switches there are different
variations
Approved by AICTE |Affiliated to VTU | Recognized byStorage
UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 57
Networks (SAN) - 57
Single Core Topology

Figure 2.23:Single core topology


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 58
Dual Core Topology

Figure 2.24:Dual core topology


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 59
Compound Core Edge

Topology

Figure 2.24:Compound core edge topology


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 60
Core-Edge Benefits

• Simplifies propagation of fabric data.


– One ISL hop access to all storage in the fabric.
• Efficient design based on node type.
– Traffic management and predictability.
• Easier calculation of ISL loading and traffic
patterns.
• Can be scaled to larger environments by adding
more switches

Approved by AICTE |Affiliated to VTU | Recognized byStorage


UGC Area
with 2(f) & 12(B) status |Accredited by NBA and NAAC 61
Networks (SAN) - 61
Comprehensive Questions
1. Which FC layer is responsible for exchange/frame and
sequence management?
a) Layer 0
b) Layer 1
c) Layer 2
d) Layer 4 (ULP)
2. Which of the following enforces access control in SAN/FC
switches?
a) Zoning
b) Trunking
c) Flow control
d) Class of service

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 62
3. What is the significance E-Port?

a) Creates an arbitrated loop


b) Extends the fabric by connecting to other fabrics
c) Represents un-initialized state of a port
d) Represents port with disconnected FC link

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 63
Block Level Storage Virtualisation

• Aggregates block storage devices(LUNs) and enables


provisioning of virtual storage volumes, independent of
underlying physical storage.
• Abstracts identity of physical storage devices and creates a
storage pool from heterogenous devices
• Maps virtual volumes to LUNs
• Advantages
• Non disruptive data migration
• Consolidates heterogenous arrays
• Enables extending storage volumes
• In traditional SAN,LUN migration from one array to
another was offline event,now virtualisation layer takes
care

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 64
Virtualization in SAN

Figure 2.27:Block level storage virtualisation


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 65
Virtual SAN(VSAN)
• Virtual SAN(also called virtual fabric) is a logical fabric on an
FCSAN,which enable communication among a group of nodes
regardless of their physical location in the fabric
• Group of hosts /storage ports communicate using a virtual
topology
• Multiple VSAN may be created on a single physical SAN
• Each VSAN acts as independent fabric with its own set of
fabric services-name server,zoning etc
• Provides security,scalability,availability and manageability
• Event traffic disruptions are contained within that VSAN,not
propagated to otherVSANs
• Easy,flexible,less expensive
• Configuration is easy

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 66
Virtualization in SAN

Figure 2.28:Federation of block storage across data centers


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 67
Comprehensive Questions

What is a benefit of block-level storage virtualization?

a.Enables users to perform nondisruptive data migrations


b.Enables users to automatically perform zoning changes
c.Reduces application downtime during backups
d.Enables hosts to perform online path management

68
IP SAN and FCoE
• FC SAN advantages comes with additional cost of buying FC
components-FC HBA and switches
• Organisations have an existing Internet Protocol(IP) based
infrastructure, which could be leveraged for storage networking
• Transporting block I/O over IP network-IPSAN
• Economical
Two protocols that leverage IP as transport mechanism
• Internet SCSI(iSCSI)
• Fiber Channel over IP(FCIP)

Figure 2.29:iSCSI Implementation


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 69
iSCSI
• iSCSI is an IP-based protocol that establishes and manages
connections between storage, hosts, and bridging devices over IP
• iSCSI carries block-level data over IP-based networks, including
Ethernet networks and the Internet.
• iSCSI is built on the SCSI protocol by encapsulating SCSI commands
and data in order to allow these encapsulated commands and data
blocks to be transported using TCP/IP packets

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 70
Components of iSCSI
▪ An initiator (host), target (storage or iSCSI gateway), and an IP-
based network are the key iSCSI components.
▪ If an iSCSI-capable storage array is deployed, then a host with
the iSCSI initiator can directly communicate with the storage
array over an IP network.
▪ Implementation that uses existing FC array, iSCSI gateway is
used

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 71
Figure 2.29:iSCSI Implementation
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 72
Components of iSCSI
▪ iSCSI initiator routes SCSI commands over IP network
▪ Most servers have embedded NICs + software initiator for
iSCSI functionality
▪ Standard NIC provides IP function
▪ Encapsulation of SCSI into IP packet and decapsulation
–done by the host CPU
▪ TOE(TCP offload Engine) NIC-Allevates this burden
▪ Offloads TCP management from the host and leaves only
iSCSI functionality to host processor

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 73
iSCSI Topologies

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 74
Native iSCSI Connectivity
• Does not have FC components
• Array has one or more iSCSI port configured with an IP address
and is connected to a standard ethernet switch
• After initiator logs in it can access the available LUNs on the
storage array.
• A single port can serve multiple hosts or initiators

Figure:2.30Native iSCSI Connectivity extracted from https://www.slideserve.com/lela/ip-


san

75
Bridged iSCSI
• A bridged Connectivity
iSCSI implementation includes FC components in its
configuration
• The array does not have any native iSCSI capabilities—that is, it does
not have any Ethernet ports. Therefore, an external device, called a
bridge, router, gateway, or a multi-protocol router, must be used to
bridge the communication from the IP network to the FC SAN.
• These devices can be a stand-alone unit, or in many cases are
integrated with an existing FC switch

Figure 2.31 extracted from https://www.slideserve.com/lela/ip-san


76
Combining FC and Native iSCSI
connectivity
• Combination of FC and native iSCSI
• Storage array comes with both FC and iSCSI ports that
enable iSCSI and FC connectivity in same environment

Figure 2.32:Extracted from :https://www.slideserve.com/lela/ip-san


77
iSCSI Protocol Stack

Figure 2.33:iSCSI Protocol stack

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 78
iSCSI Protocol Stack
• SCSI is the command protocol that works at the application
layer of the OSI model.
• The initiators and targets use SCSI commands and
responses to talk to each other.
• iSCSI is the session-layer protocol that initiates a reliable
session between a device that recognizes SCSI commands
and TCP/IP.
• The iSCSI session-layer interface is responsible for handling
login, authentication, target discovery, and session
management. TCP is used with iSCSI at the transport layer
to provide reliable service.
• TCP is used to control message flow, windowing, error
recovery, and retransmission

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 79
iSCSI PDU
• Protocol Data Unit(PDU)-Basic information unit
• iSCSI initiators and targets communicate with each
other using iSCSI PDUs
• Contains one or more header segments followed by
zero or more data segments
• It is then encapsulated into an IP packet to facilitate
transport

Figure 2.34:iSCSI PDU encapsulated in an IP packet

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 80
iSCSI Protocol Stack

• The IP Header provides packet-routing information that is used


to move the packet across a network.
• The TCP header contains the information needed to guarantee
the packet’s delivery to the target.
• The iSCSI header describes how to extract SCSI commands
and data for the target.
• iSCSI adds an optional CRC, known as the digest, beyond the
TCP checksum and Ethernet CRC to ensure datagram integrity.
• The header and the data digests are optionally used in the PDU
to validate integrity, data placement, and correct operation

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 81
Alignment of iSCSI PDUs with IP Packets

• Each iSCSI PDU does not


correspond in a 1:1 relationship
with an IP packet.
• Depending on its size, an iSCSI
PDU can span an IP packet or
even coexist with another PDU
in the same packet.
• To achieve 1:1 relationship
between IP packet and iSCSI PDU,
the Maximum Transmission
Unit(MTU) size of IP packet is
modified.
Figure 2.35:Alignment of iSCSI PDUs with IP packets
• This eliminates fragmentation of
IP packets and improves
transmission efficiency

82
iSCSI Discovery

▪ An initiator must discover the location of its targets on the network and
the names of the targets available to it before it can establish a session.
▪ This discovery can take place in two ways: SendTargets discovery or
internet Storage Name Service (iSNS).
▪ In SendTargets discovery, the initiator issues the SendTargets command,
and the target network portal responds with the names and addresses
of the targets available to the host.
▪ internet Storage Name Service (iSNS) enables automatic discovery of
iSCSI devices on an IP network
▪ The initiators and targets can be configured to automatically register
themselves with the iSNS server. Whenever an initiator wants to know
the targets that it can access, it can query the iSNS server for a list of
available targets.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 83
iSCSI Discovery

Figure 2.36:iSCSI Discovery

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 84
iSCSI Names

A unique world wide iSCSI ID is used to identify initiators and


targets within iSCSI network
Two types of iSCSI names
1)iSCSI Qualified Name(IQN)
An organisation must own a registered domain name to
generate iSCSI Qualified Names
Other organisations should not use the same domain name
Eg:iqn.2008.02.com:example:optional string
2)Extended Unique Identifier(EUI)
Globally Unique ID based on IEEE EU-64 standard
Eg:eui.03000732A32598D26

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 85
iSCSI Session

• An iSCSI session is established between initiator and a


target.
• Session is identified by a session ID(SSID) which
includes part of an initiator ID and target ID
• Session can be intended for
• Discovery of available targets by initiators and
location of a specific target
• Normal operation of iSCSI(transfer of data between
initiator and target)

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 86
iSCSI Session

Figure 2.37:iSCSI Session

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 87
iSCSI Session
• There can be more TCP connections within each session
• Session is established via iSCSI login process
• Login process is started when initiator establishes a TCP
connection with required target via a specific target protocol ID
• Authentication during login process
• After login ,SCSI transaction-initiator sends SCSI commands and
data to various LUNs by encapsulating them in iSCSI PDU
• Final phase-Connection termination phase, logout procedure

Figure 2.37:iSCSI Session

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 88
iSCSI Command Sequencing
• iSCSI communication between initiators and targets is based on the request response
command sequences.
• A command sequence may generate multiple PDUs.
• A command sequence number (CmdSN) within an iSCSI session is used to number all
initiator-to-target command PDUs belonging to the session.
• This number is used to ensure that every command is delivered in the same order in
which it is transmitted, regardless of the TCP connection that carries the command in the
session.
• Command sequencing begins with the first login command and the CmdSN is
incremented by one for each subsequent command.
• The iSCSI target layer is responsible for delivering the commands to the SCSI layer in the
order of their CmdSN.
• This ensures the correct order of data and commands at a target even when there are
multiple TCP connections between an initiator and the target using portal groups.
• Similar to command numbering, a status sequence number (StatSN) is used to sequentially
number status responses, as shown in Figure 2-38.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 89
iSCSI Command Sequencing

Figure 2.38:Command and status sequence number

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 90
iSCSI Command Sequencing

• A target sends the request-to-transfer (R2T) PDUs to the


initiator when it is ready to accept data.
• Data sequence number (DataSN) is used to ensure in-order
delivery of data within the same command.
• Each of these sequence numbers is stored locally as an
unsigned 32-bit integer counter defined by iSCSI.
• These numbers are communicated between the initiator
and target in the appropriate iSCSI PDU fields during
command, status, and data exchanges

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 91
Comprehensive
Questions
1. iSCSI is mapping of
a) SCSI over TCP/IP
b) IP over SCSI
c) FC over IP
d) None of the mentioned
2. Discovery session in iSCSI is used for:
a) Discovering iSCSI targets and their TargetAddresses
b) Probing Luns on iSCSI targets
c) Probing New Luns
d) None of the mentioned
3. I/O requests to disk storage on a SAN are called
a) File I/Os
b) SAN I/Os
c) Block I/Os
d) Disk I/Os

92
Comprehensive
4. What will beQuestions
used by SAN to provide connectivity between hosts and
storage?
a. FC
b. iSCSI
c. FC or iSCSI
d. SCSI
5.What are the major benefits of SAN?
a. Centralized backup
b. Storage consolidation
c. LAN-less backup
d. Share resources
e. All of the above
6. Which of the following is sequential access storage device?
a. Hard Disk
b. CD-ROM
c. Tape Cartridge
d. Main Memory

93
Comprehensive
7) iSCSI targetsQuestions
can be discovered by
a) SendTargets
b) Static configuration
c) using SLP/iSNS
d) All of the mentioned
8). Which of the following is false?
a) iSCSI requires login from initiator to target
b) There can be multiple paths between initiator and target
c) Data integrity is ensured using digests
d) None of the mentioned

94
FCIP
.FCIP is a tunneling protocol that enables
distributed FC SAN islands to be transparently
interconnected over existing IP-based local,
metropolitan, and wide-area networks.

As a result, organizations now have a better way to


protect, store, and move their data while
leveraging investments in existing technology.

Extensively used in disaster recovery


implementation in which data is duplicated to a
storage located at a remote site
95
FCIP Protocol Stack

Figure 2.39:FCIP Protocol stack

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 96
FCIP Protocol Stack
• Applications generate SCSI commands and data, which are
processed by various layers of protocol stack.
• Upper layer protocol SCSI includes the SCSI driver program that
executes read and write commands
• Below SCSI layer, the Fiber Channel Protocol layer, is simply a
Fiber Channel Frame whose payload is SCSI
• FCP layer rides on top of the Fiber Channel Transport layer.This
enables the FC frames to run natively within a SAN fabric
environment.
• In addition the FC frames can be encapsulated into the IP
packet and sent to a remote SAN over the IP.
• The FCIP layer encapsulates the Fiber Channel frames into the
IP payload and passes them to the TCP layer.
• TCP and IP are used for transporting the encapsulated
information across Ethernet,wireless of other media that
supports TCP/IP traffic
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 97
FCIP Encapsulation

Figure 2.40:FCIP Encapsulation

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 98
FCIP Encapsulation

• Encapsulation of FC frame into an IP packet could cause the


IP packet to be fragmented when the data link cannot
support the MTU size of an IP packet.
• When IP packet is fragmented, the required parts of header
must be copied by all fragments

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 99
FCIP Topology

Figure 2.40:FCIP Topology

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
FCIP Topology

• FCIP gateway at one end of the IP network encapsulates


the FC frame into IP packet
• Gateway at the other end removes the IP wrapper and
se3nds the FC data to the layer 2 fabric
• An IP address is assigned to the port on the gateway
which is connected to the IP network

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
FCIP Performance and security
• From the perspective of performance, multiple paths to
multiple FCIP gateways from different switches in the layer 2
fabric eliminates single points of failure and provides
increased bandwidth.
• In a scenario of extended distance, the IP network may be a
bottleneck if sufficient bandwidth is not available
• Security is also a consideration in an FCIP solution because
the data is transmitted over public IP channels.
• Various security options are available to protect the data
based on the router’s support. IPSec is one such security
measure that can be implemented in the FCIP environment

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Converged Protocol FCoE
• Data centers have multiple n/w to handle various types of I/O
traffic-Ethernet n/w for TCP/IP communication, FC n/w for FC
communication etc
• To support multiple n/w, servers in data centers are equipped with
multiple n/w interfaces-ethernets and FC cards/adapters
• Fibre Channel over Ethernet (FCoE) protocol provides consolidation
of LAN and SAN traffic over a single physical interface infrastructure.
• FCoE helps organizations address the challenges of having multiple
discrete network infrastructures.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
I/O Consolidation Using FCoE
Infrastructure before FCoE deployment

Figure 2.41:Infrastructure before using FCoE


Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Data Center Infrastructure
After using FCoE

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Components of an FCoE Network

Key physical components required to implement FCoE


in a data center are:
• Converged Network Adapter (CNA)
• Cables
• FCoE switches

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Converged network adapter

• Provides functionality of both


FC Based SAN standard NIC and an FC HBA in a
single adapter.
• Eliminates the need for separate
adapters and cables for FC and
ethernet communication reducing the
number of server slots and ports.
• CNA contains separate modules for
10Gigabit ethernet, FC and FCoE
• Application Specific IC encapsulates
FC frame into ethernet frames
• One end of ASIC connected to 10GbE
and FC ASIC for server connectivity
Ethernet Based LAN • Other end provides 10GbE interface to
connect to FCoE switch
Figure 2.42:Converged Network Adapter

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Cables

• Two options are available for FCoE cabling: Copper based Twinax
and standard fiber optical cables.
• A Twinax cable is composed of two pairs of copper cables covered
with a shielded casing.
• The Twinax cable can transmit data at the speed of 10 Gbps over
shorter distances up to 10 meters.
• Twinax cables require less power and are less expensive than fiber
optic cables.
• The Small Form Factor Pluggable Plus (SFP+) connector is the
primary connector used for FCoE links and can be used with both
optical and copper cables.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
FCoE Switches
• Has both ethernet switch and FC switch
functionalities.
• Has a Fiber Channel Forwarder(FCF),
Ethernet bridge and set of ethernet ports
and optical FC ports
• FCF encapsulates FC frames into FCoE
frames and decapsulate FCoE frames
received from ethernet bridge, to FC frames

Figure 2.43:FCoE switch generic architecture

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
FCoE Frame Structure • First 48 bits specify destination
MAC address
• Next 48 bits source MAC
address
• 32 bit IEEE 802.1Q Tag supports
creation of multiple virtual
networks(VLANs) across a
single physical infrastructure
• Ethertype indicates which
protocol is encapsulated in the
frame
• 4 bits version
• 110 bits reserved
• SOF(Start of Frame)-8 bits
• Frame
• EOF(End of Frame)- 8 bits
Figure 2.44 extracted from https://en.wikipedia.org/wiki/Fibre_Channel_over_Ethernet
• 32 bit Frame Check Sequence 11
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC
FCoE Frame Mapping
Mapping of FC frames to the ethernet

Figure 2.45:FCoE Frame Mapping

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
FCoE Enabling Technologies

• Converged Enhanced Ethernet (CEE), or lossless Ethernet, provides a new


specification to the existing Ethernet standard that eliminates the lossy
nature of Ethernet. This makes 10 Gb Ethernet a viable storage networking
option, similar to FC.
Lossless Ethernet requires certain functionalities. They are:
• Priority-based flow control
• Enhanced transmission selection
• Congestion Notification
• Data center bridging exchange protocol

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
Priority-Based Flow Control (PFC)
• Traditional FC manages congestion through the use of a link-level, credit-
based flow control that guarantees no loss of frames.
• Typical Ethernet, coupled with TCP/IP, uses a packet drop flow control
mechanism.
• The packet drop fl ow control is not lossless. This challenge is eliminated
by using an IEEE 802.3x Ethernet PAUSE control frame to create a lossless
Ethernet.
• A receiver can send a PAUSE request to a sender when the receiver’s
buffer is filling up.
• Upon receiving a PAUSE frame, the sender stops transmitting frames,
which guarantees no loss of frames.
• The downside of using the Ethernet PAUSE frame is that it operates on
the entire link, which might be carrying multiple traffic flows.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
Priority Based Flow Control

Figure 2.46:PriorityBased Flow control

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
Enhanced Transmission Selection

• Allocates bandwidth to different traffic classes LAN,SAN


and IPC

• When a particular class of traffic does not use its allocated


bandwidth,ETS enables other classes to use available
bandwidth

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
Enhanced Transmission Selection

• Provides a mechanism for detecting congestion and


notifying the source
• Enables a switch to send a signal to other ports that need to
stop/slow down their transmission

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
What is NAS ?

Client
s

Application Print
Server Server
Figure 2.47:NAS
NAS
Device
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 117 |Accredited by NBA and NAAC
11
What is NAS ?
• A NAS device is a dedicated, high-performance, high-speed, single-
purpose file serving and storage system
• A client may request a file by specifying name, location or other
attributes.
• NAS device uses its own operating system and hardware, software
components to meet specific file service needs
• NAS OS keeps track of location of files on disk volume, coverts file I/
O into block level I/O to retrieve data.
• NAS uses network and file-sharing protocols to perform filing and
storage functions.
• These protocols include TCP/IP for data transfer and CIFS and NFS
for remote file service.

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
General Purpose Servers vs. NAS Devices
• A NAS device is optimized
for file-serving functions
such as storing, retrieving,
and accessing files for
File
applications and clients.
Application
s Syste • As shown in Figure , a
Print m
Operating
Drivers System general-purpose server can
File Network be used to host any
Syste
m
Operating application, as it runs a
System
Network
generic operating system.
• Unlike a general-purpose
server, a NAS device is
Single
Function
NAS
dedicated to file-serving.
Devic • It has a real-time operating
e
system dedicated to file
serving

General Purpose
Servers
(Windows or
UNIX)
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 119 |Accredited by NBA and NAAC
11
Benefits of NAS
• Support comprehensive access to information
• one to many and many to one
• Improves efficiency
• Eliminates bottle neck, specialized OS
• Improved flexibility
• Supports clients on UNIX and Windows
• Centralizes storage
• Simplifies management
• Centralised console
• Scalability
• High availability – through efficient replication and recovery
• Provides security integration to environment (user authentication
and authorization)

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Components of NAS

• NAS Head includes:


• CPU and memory
• One or more Network
Interface Cards to
NF Network Interface provide connectivity to
UNIX S
NAS Head client network
NF CIF
I S S
• An optimised OS for
P
NAS Device
managing NAS
OS functionality
Storage Interface
CIF
S

Window
s Storage
Array

Figure 2.48:Components of NAS

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 121 |Accredited by NBA and NAAC
12
• Converts file-level requests into block storage
requests and vice -versa
• Two common NAS file sharing protocols are:
• CIFS – Common Internet File System protocol
• Traditional Microsoft environment file
sharing protocol, based upon the Server
Message Block protocol
• NFS – Network File System protocol
• Traditional UNIX environment file sharing
protocol

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Network File System
• Client/server protocol for file sharing commonly used in UNIX
systems
• Based on connectionless UDP
• Uses RPC mechanisms over TCP protocol
• NFS provides a set of RPCs to access a remote file system
• Searching files and directories
• Opening,reading,writing to and closing a file
• Changing file attributes
• Modifying file links and directories
• NFS is a stateless protocol,does not maintain any tabole to store
information about open files and associated pointers

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Network File System
• NFS Version 2(NFSv2) uses UDP to provide a sateless network
connection between client and server
• NFS version 3(NFS v3) uses TCP and UDP
• NFS v4 uses TCP, based on a stateful protocol design
• Offers enhanced security

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Common Internet File System
• Client server application protocol that enables client
programs to make requests for files and services on
remote computers over TCP/IP
• Developed by Microsoft in 1996
• An enhanced version of the Server Message Block
(SMB) protocol
• Stateful Protocol
• Can automatically restore connections and reopen
files that were open prior to interruption
• Operates at the Application/Presentation layer of the
OSI model
• Most commonly used with Microsoft operating systems,
but is platform-independent
• CIFS runs over TCP/IP and uses DNS (Domain Naming
Service) for name resolution

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
NAS I/O Operation

Application Storage
Interface
3
Operating System Network
Protocol Block I/O
to
storage
I/O Redirect NAS Operating System device

NFS / NFS / Storage


CIFS CIFS Array
TCP/IP TCP/IP
Stack 1 Stack
Network Network
Interface Interface
4
Clien IP NAS
t Netwo Devic
rk e
Figure 2.48:NAS I/O

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 126 |Accredited by NBA and NAAC
12
NAS I/O Operation
1. Client packages I/O request into TCP/IP and forwards it
through network
2. NAS device receives this request from the network
3. NAS device converts I/O request into a physical storage
request, block level I/O and performs the operation on
physical storage
4. When the NAS device receives the data from storage, it
processes and repackages data into appropriate file protocol
response
5. NAS device packages this response into TCP/IP again and
forwards this to client through the network

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
NAS Implementations
• An integrated NAS device has all the
components of NAS, such as the NAS head and
storage, in a single enclosure, or frame.
Integrated NAS • A gateway NAS device consists of an
independent NAS head and one or more storage
arrays.
I • The NAS head performs the same functions that
P
it does in the integrated solution; while the
storage is shared with other applications that
require block-level I/O.
NAS Device • The gateway NAS is the most scalable because
NAS heads and storage arrays can be
independently scaled up when required
NAS Gateway

I FC
P SAN

NAS Head
Figure 2.49 :Integrated and Gateway NAS
connectivity Storage Array
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 128 |Accredited by NBA and NAAC
12
Comprehensive Questions
1. NFS & CIFS are
a) Filesystems
b) Operating systems
c) Transport protocols
d) File access protocols
2. Using file access protocols, data residing on which of
the following can be accessed:
a) Local disk
b) Remote disk
c) Both
d) Neither

12
3. A NAS solution is most appropriate for what type of
data environment
a) Secured Access
b) Shared access
c) Remote access
d) Parallel access
4. Identify a network file protocol in the below
mentioned set.
a) FC
b) CIFS
c) SCSI
d) NAS

13
File Level Storage Virtualisation
• Eliminates dependencies between data accessed and physical
location of files
• Common in NAS
• Provides non-disruptive file mobility

13
File Level Storage Virtualisation

• Each host knows where • Application independent


each file resources are of location
located • Logical pool of storage
• File bound to NAS device • Uses logical path to access
• Moving files not easy, files
makes files inaccessible • Moving files easy, still
accessible
13
Object-Based and Unified Storage

• Object based storage store file data in a form of objects


based on its content and other attributes rather than name
and location
• Object based storage devices organises and stores
unstructured data-movies,graphics,office documents as
objects
• OSD uses flat address space to store data-no hierarchy of
directory and files, so large number of objects can be
stored

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 13
Object-Based Storage Devices

Figure 2.52:Hierarchical file system versus flat address


space 13
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC
Object-Based Storage Devices

Figure 2.53:Object
• An object Structure
might contain user data, related metadata
(size, date, ownership, and so on), and other attributes of
data (retention, access pattern, and so on)
• Each object is identified by unique ID-object ID
• Object ID generated using specialised algorithms

13
Key Components of OSD
• Nodes
• Private network
• Storage

Figure 2.56:Key components of


OSD
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 13
Key Components of OSD

Nodes are servers that runs the OSD operating


environment and provides services to store, retrieve and
manage data in the system
• OSD node 2 key services
• Metadata service
• Responsible for generating object ID from
content of file
• Mapping of object ID and file system namespace
• Storage service
• Manages set of disks on which user data is stored
OSD nodes connect storage via an internal network
• Application server accesses nodes to store and retrieve
data via an external network
• OSD uses low cost and high density disk drives to store
objects
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 13
Process of Storing object in OSD

Figure 2.57:Process of storing object in


OSD 13
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC
Process of Retrieving object in
OSD

Figure 2.58:Process of retrieving object in


OSD 13
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC
Object-Based Storage
• Architecture
A smarter approach to manage
unstructured data based on its contents
rather than based on metadata-name,
location
• I/O in traditional block access passes
through various layers
• I/O generated by an application passes
through the file system
• File system :2 components
• User component: Performs functions
such as hierarchy management,
naming, user control.
• Storage components: Maps the files to
the physical location on the disk drive.

Figure 2.54:Object Based Storage


Architecture
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
• When an application accesses data stored in OSD, request is sent to
the file system user component, which communicates with OSD
interfaces, which send request to the storage device
• Storage device has the OSD storage component which manages the
access to the object on the storage devices
• After object is stored, OSD sends an ACK to the application server

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Benefits of Object Based Storage

Security and reliability


• OSD uses specialised algorithms to create object with strong data
encryption
• In OSD, request authentication is performed at storage device
rather than with external authentication mechanism
Platform Independence
• Objects are abstract containers of data
• This allows objects to be shared across heterogenous platforms
Scalability
• Due to flat address space, object based storage can handle large
amounts of data
Manageability
• Intelligence to manage and protect objects
• Self healing capability to protect and replicate objects

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Use Cases for Object Based Storage

• Data Archival Solution


• Cloud Based Storage

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Content Addressed Storage

• Fast Access to fixed content by assigning permanent place in disk


• Object based storage device designed for secure online storage and
retrieval of fixed content
• CAS stores user data and its attributes as object.
• Object is assigned a globally unique address Content Address(CA)
which is derived from objects binary representation

Data access in CAS


• Application server access CAS device via CAS API running on app
server.
• CAS stores data similar to other OSD systems

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Features
Content Authenticity
• Through content address
• Unique content address to each object
• Validated at regular intervals
Content Integrity
• Assures data is not altered
• Hashing algorithm
• If altered, generates new address
Location Independence
• Location of stored data is irrelevant to application that
requests data
Single Instance Storage
• Guarantees storage of only single instance of an object
• When new object is written , CAS is polled to see object is
already available with same address. If so not stored, only
pointer

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Features

Retention enforcement
• After object is stored in CAS ,retension policy is defined, CAS
does not make object available for deletion until policy
expires
Data protection
• Ensures data stored on CAS is available even if disk/node fails
• Object split into parts and parity is generated and stored in
different nodes
Fast record retrieval
• Stores all objects in disks
Load Balancing
• Distributes objects across multiple nodes to provide
maximum throughput and availability

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Features

Scalability
• Allows addition of more nodes without overhead
Event notification
• Continuously monitors the state of the system and raises an
alert for any event that requires admin attention
Self diagnosis and repair
• Automatically detects and repairs corrupted objects
Audit Trails
• Keep track of management activities and any access or
disposition of data

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
CAS Use cases

• Healthcare solution
• Finance Solution

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Unified Storage
• Consolidates block, file and object access into one storage
solution
• Supports multiple protocols CIFS, NFS, iSCSI, FC, FCoE…
• Components of Unified Storage
• Storage Controller
• NAS Head
• OSD Node
• Storage
Storage Controller
• Provides block level access to application servers
through iSCSI, FC or FCoE protocols
• Manages back-end storage pool
• Configures LUNs and present them to application servers,
NAS heads and OSD nodes

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Unified Storage
NAS Head

• Dedicated file server that provides file access to NAS clients


• Connected to storage via storage controller
• OSD Node Accesses storage through storage controller using
FC or FCoE connection

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Data Access from Unified
Storage
• In unified storage system,block,file and object requests to the
storage travel through different I/O paths
Block I/O Requests
• Application servers connected to an FC,iSCSI,or FCoE port on
storage controller.
• Server sends a block request over FC,iSCSI or FCoE
connection
File I/O Request
• NAS clients, sends a file request to NAS Head using NFS of
CIFS protocol.
• NAS head receives request, converts it to block request and
forwards to storage controller.
• Upon Receiving block data from storage controller, NAS
Head converts block request back to file request and sends to
clients

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Data Access from Unified
Storage
Object I/O Request
• Web application services sends object request through REST/
SOAP protocols to OSD node.
• OSD node converts it into block request and sends it to disk
through storage controller

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Components of Unified Storage

Figure 2.59:Components of Unified


Storage
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Self Assesment Questions

1.NFS stands for


a) Null File System
b) New File System
c) Network File System
d) Netware File Server
2.CIFS runs over the following protocols:
a) TCP/IP
b) FTP
c) SNMP
d) DNS
3. CIFS is
a) Common Internet File System
b) Common Interface File Server
c) Common Internet File Server
d) Common Interface File System

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
NPTEL LINKS

• NAS and SAN,Fiber Channel Protocols https://www.youtube.com/watch?v=YkP9YGrv4GM


• NAS,NFS https://www.youtube.com/watch?v=StNUsWO5RbA

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Certainity Based Marking
1.For long term storage (archival) of data which of the following storage devices is
generally used
a) Hard Disk
b) CD Rom
c) Floppy Disk
d) Tape Cartridges
2.Storage management comprises of
a) SAN Management
b) Data protection
c) Disk operation
d) All of the mentioned
3. File access protocols operate in which layer of the OSI model
a) Application
b) Session
c) Transport
d) None of the mentioned

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
University Questions with raised RBT
1. Which threelevel
statements describe differences between Storage Area
Network (SAN) and Network Attached Storage (NAS) solutions? Choose
three.
a. SAN is generally more expensive but provides higher performance
b. NAS uses TCP/IP for communication between hosts and the NAS
server
c. NAS requires additional hardware on a host: a host bus adapter for
connectivity
d. SAN uses proprietary protocols for communication between hosts
and the SAN fabric
2. Explain the disadvantages of NAS.
3. What are the advantages of FCP?
4. Which is the layer in Fiber Channel Protocol contains the basic rules
for sending the data across the FC network?
5. What is iSCSI session?

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Self assessment Questions Link

https://forms.office.com/Pages/ResponsePage.
aspx?id=TwEM7vB2UEy6eTUVeQV7lhi1Zpd1-
upBiikXP2hSUrRUNDE1QU5MWEdOUVlUME0wU1RDNlVORFZQU
y4u

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Case Study

• Mounting remote file system in NFS


• Caching in NFS

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Innovative Links

• FCoE Tutorial https://www.youtube.com/watch?v=Hd9RQeuXWmk

• Fiber Channel Basics https://www.youtube.com/watch?v=mHLkD5yTujo

• iSCSI Tutorial https://www.youtube.com/watch?v=ZX5bj0lnZ4Y

• Storage Basics https://www.youtube.com/watch?v=XG5cg74UxKs

• NAS vs SAN https://www.youtube.com/watch?v=3yZDDr0JKVc

16
Text Books:
1. Information Storage and Management, Author :EMC Education Services,
Publisher:
Wiley ISBN: 9781118094839
2. Storage Virtualization, Author: Clark Tom, Publisher: Addison Wesley
Publishing Company ISBN : 9780321262516

Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 16

You might also like