SAN Module2
SAN Module2
FACULTY
. : Prof. THANU KURIAN, Asst. Prof, Dept. of CSE
An Autonomous Institution ,Affiliated to Visvesvaraya Technological University, Belagavi. Approved By AICTE, New Delhi. Recognized by UGC with 2(f) & 12(B)
status. Accredited by NBA and NAAC.
Syllabus
Module 1:Storage System Introduction to evolution of storage
architecture, key data center elements, virtualization, and cloud
computing. Key data center elements – Host (or compute),
connectivity, storage, and application in both classic and virtual
environments. RAID implementations, techniques, and levels along
with the impact of RAID on application performance.Components of
intelligent storage systems and virtual storage provisioning and
intelligent storage system implementations.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 2
Module 2 Storage Networking Technologies and
Virtualization
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 3
Module 3:Backup, Archive, and Replication This unit
focuses on information availability and business continuity
solutions in both virtualized and non-virtualized
environments. Business continuity terminologies, planning
and solutions, Clustering and multipathing architecture to
avoid single points of failure, Backup and recovery -
methods, targets and topologies, Data deduplication and
backup in
virtualized environment, Fixed content and data archive,
Local replication in classic and virtual environments,
Remote replication in classic and virtual environments,
Three-site remote replication and continuous data protection
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 4
Module 4:Cloud Computing Characteristics and benefits This
unit focuses on the business drivers, definition, essential
characteristics, and phases of journey to the Cloud. ,Business
drivers for Cloud computing, Definition of Cloud computing,
Characteristics of Cloud computing, Steps involved in
transitioning from Classic data center to Cloud computing
environment Services and deployment models, Cloud
infrastructure components, Cloud migration considerations
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 5
Module 5:Securing and Managing Storage Infrastructure
This chapter focuses on
framework and domains of storage security along with
covering security.
implementation at storage networking. Security threats, and
countermeasures in various domains Security solutions for FC-
SAN, IP-SAN and NAS environments, Security in virtualized
and cloud environments, Monitoring and managing various
information infrastructure components in classic and virtual
environments, Information lifecycle management (ILM) and
storage tiering,
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 6
COURSE OBJECTIVES
After studying this course, students will be able to:
✔ Evaluate storage architectures,
✔ Define backup, recovery, disaster recovery, business continuity, and replication
✔ Examine emerging technologies including IP-SAN
✔ Understand logical and physical components of a storage infrastructure
✔ Identify components of managing and monitoring the data center
✔ Define information security and identify different storage virtualization
technologies
COURSE OUTCOMES
C405.4.1 Analyse the various RAID and Intelligent Storage System
C405.4.2 Identify key challenges in managing information and analyze different
storage
networking technologies
C405.4.3 Describe the backup/recovery topologies..
C405.4.4 Realize strong virtualization concepts .
C405.4.5 Illustrate the storage infrastructure and management activities.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 7
Recalling Module 1
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 8
Storage Technologies
With the advent of the Internet, Big Data, corporate intranets, e-
mail, e-commerce, business-to-business (B2B), ERP (Enterprise
Resource Planning), Customer Resource Management (CRM),
data warehousing, CAD/CAM, rich media streaming, voice/video/
data convergence, and many other real time applications, the
demands on the enterprise storage capacity has grown by leaps
and bounds.
The data itself is as important to a business’s successful
operation as its personnel and systems.
The need to protect this strategic asset has far exceeded the
capabilities of a tape backup. Tape access and capacities can
simply not address the growing demands.
Growing data stores meant having to implement tape libraries.
Even then, there are inherent issues with tape media that could
only be addressed
Extracted fromwith either supplemental storage or
https://vmarena.com/storage-network-technologies/
replacement of the media altogether.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 9
Storage network technology has developed in the following
three main configurations: Direct Attached Storage (DAS),
Network Attached Storage (NAS), and Storage Area
Networks (SAN).
Direct Attached Storage (DAS)
DAS is the traditional method of locally attaching storage
devices to servers via a direct communication path
between the server and storage devices.
Network Attached Storage (NAS)
NAS is a file-level access storage architecture with storage
elements attached directly to a LAN. It provides file access
to het erogeneous computer systems.
Storage Area Networks (SANs)
Like DAS, a SAN is connected behind the servers. SANs
provide block-level access to shared data storage. Block
level access refers to the specific blocks of data on a storage
device as opposed
Extracted to file level access.
from https://vmarena.com/storage-network-technologies/
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Contents
• What is SAN?
• Introduction to storage networking technology
• Evolution of Fiber Channel SAN
• What is Fiber Channel?
• Fibre Channel SAN components
• Connectivity options
• Fiber Channel Topologies including access protection mechanism ‘zoning’
• FC protocol stack
• Addressing and operations
• SAN-based virtualization and VSAN technology
• iSCSI and FCIP protocols for storage
• Access over IP network
• Converged protocol FCoE and its components
• Priority Based Flow Control
• Network Attached Storage (NAS) - components, protocol and operations
• File level storage virtualization
• Object based storage and unified storage platform
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
What is a SAN?
Array
Servers
Storage
Figure 2.1:A SAN Network
HU
B
Switches
Switches
Interconnect
SAN Islands
ed Arrays Storage
FC
SANs
Arbitrated Enterprise SANs
FC
Loop FC Switched Fabric
Switched
Figure 2.2:Evolution
Fabric of Fiber Channel SAN
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 13
Storage Area Networks (SAN) - 13
What is Fiber Channel SAN(FC SAN)?
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) 14
- 14 status |Accredited by NBA and NAAC
Fibre Channel SAN components
• Node ports
• Cables and Connectors
• Interconnecting Devices
• SAN Management
Software HB
HB
Switches
A
SAN-attached Server
SAN
Arrays
Figure 2.3:Fiber Channel SAN Components
16
Nodes, Ports, & Links
HB
A
Tx
Port
Rx
0
Link
Port
0
Port
Port
11
Port
Port
n
n
Figure 2.4:Nodes,Ports and links
Node
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 19
Multi-mode fiber and single-mode fiber
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 20
Cables and Connectors
HB Switches Arrays
Server A
• Storage Array
– Provides storage consolidation and
centralization
• Features of an array
– High Availability/Redundancy
– Performance
Server Switches Arrays
– Business Continuity HBA
– Multiple host connect
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) 25
- 25 status |Accredited by NBA and NAAC
Fiber Channel Connectivity options
• Point to Point
• Arbitrated Loop (FC-AL)
• Fabric Channel Switched
Fabric
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 26
Point to Point
• Simplest
• Two devices are connected
directly to each other
• Provides a dedicated
connection for data
transmission between
nodes.
• However, the point-to-point
configuration offers limited
connectivity, as only two
devices can communicate
with each other at a given
time.
Figure 2.12:Point to Point
• Moreover, it cannot be
scaled to accommodate a
large number of network
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 27
FC-AL(Fiber Channel Arbitrary
Loop)
• Devices are attached to a shared loop
• Devices on the loop must “arbitrate”
to gain control of the loop.
• At any given time, only one device
can perform I/O operations on the
loop
• FC-AL can be implemented without
any interconnecting devices by
directly connecting one device to
another in a ring through cables
• FC-AL implementations may also use Figure 2.13:Fibre Channel arbitrated loop
hubs whereby the arbitrated loop is
physically connected in a star
topology
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 28
FC-AL limitations :
• FC-AL shares the bandwidth in the loop. Only one device can perform
I/O operations at a time.
• Because each device in a loop has to wait for its turn to process an I/O
request, the speed of data transmission is low in an FC-AL topology.
• FC-AL uses 8-bit addressing. It can support up to 127 devices on a loop.
• Adding or removing a device results in loop re-initialization, which
can
cause a momentary pause in loop traffic
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 29
FC-AL Transmission
When a node in the FC-AL topology attempts to transmit data, the node sends an
arbitration (ARB) frame to each node on the loop.
If two nodes simultaneously attempt to gain control of the loop, the node with the highest
priority is allowed to communicate with another node
When the initiator node receives the ARB request it sent, it gains control of the
loop. The initiator then transmits data to the node with which it has established a virtual
connection
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 30
FC-AL Transmission
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 31
Fibre Channel Switched Fabric
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 34
Tiered structure of FC-SW
topology
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 35
FC-SW Transmission
• FC-SW uses switches that are
intelligent devices.
• They can switch data traffic from
an initiator node to a target node
directly through switch ports.
• Frames are routed between
source and destination by the
fabric.
• As shown in Figure 2-17, if node
B wants to communicate with
node D, Nodes should
individually login first and then
transmit data via the FC-SW. This
link is considered a dedicated
connection between the initiator
and the target.
Figure 2.17:Data transmission in FC-SW topology
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 36
Switched Fabric Ports
Ports are the basic building blocks of an FC network. Ports on the
switch can be one of the following types:
N_port: An end point in the fabric. This port is also known as the
node port. Typically, it is a host port (HBA) or a storage array port
that is connected to a switch in a switched fabric.
NL_port: A node port that supports the arbitrated loop topology. This
port is also known as the node loop port.
E_port: An FC port that forms the connection between two FC
switches. This port is also known as the expansion port. The E_port
on an FC switch connects to the E_port of another FC switch in the
fabric through a link, which is called an Inter-Switch Link (ISL).
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 37
F_port: A port on a switch that connects an N_port. It is also
known as a fabric port and cannot participate in FC-AL.
FL_port: A fabric port that participates in FC-AL.
G_port: A generic port that can operate as an E_port or an F_port
and determines its functionality automatically during
initialization.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 38
Fibre Channel Ports
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 40
FC-4 Upper Layer Protocol
• FC-4 is the uppermost layer in the FCP stack.
• This layer defines the application interfaces and the way Upper Layer Protocols (ULPs) are mapped to
the lower FC layers
FC-2 Transport Layer
• The FC-2 layer provides Fibre Channel addressing, structure, and organization of data (frames,
sequences, and exchanges).
• It also defines fabric services, classes of service, flow control, and routing.
FC-1 Transmission Protocol
Includes serial encoding(prior to transmission) and decoding (upon receipt) rules, special characters
used, and error control.
FC-0 Physical Interface
• FC-0 is the lowest layer in the FCP stack.
• This layer defines the physical interface, media, and transmission of raw bits.
• The FC-0 specification includes cables, connectors, and optical and electrical parameters for a variety
of data rates.
• The FC transmission can use both electrical and optical media.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 41
Fiber Channel Addressing
An FC address is dynamically assigned when a port logs on to the
fabric.
• The first field of the FC address of an N_port contains the domain
ID of the switch .
• Domain ID is a unique number provided to each switch in the fabric.
This is an 8-bit field
• The area ID is used to identify a group of switch ports.
Eg:port card
• The last field in the FC address identifies the port within the group.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 43
World Wide Names
• Each device in the FC environment is assigned
a 64-bit unique identifier called the World
Wide Name (WWN)
• Static to the port.
– Used to physically identify a port or node
within the SAN
• WWNs are burned into the hardware or
assigned through software
Arrays
Figure 2.21:Zoning
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)Storage
status |Accredited by NBA and NAAC 46
Area Networks (SAN) - 46
• Whenever a change takes place in the name server database, the
fabric controller sends a Registered State Change
Notification(RSCN) to all the nodes impacted by the change
• If zoning is not configured, the fabric controller sends an RSCN
to all the nodes in the fabric.
• Zoning helps in limiting the number of RSCNs in the fabric, a
fabric sends RSCN to only those nodes in a zone where change
has occurred.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 47
• Zone sets comprise a group of zones that can be activated
or deactivated as a single entity in a fabric.
• Multiple zone sets can be defined in a fabric, but only one
zone set per fabric can be active at a time.
• Members are nodes within SAN that can be included in a
zone.
Eg:switch ports,HBA ports,storage device ports
• Zone sets are also referred to as zone configurations.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 48
Zoning Components
Members
Membe Membe Membe Membe Membe Membe
r r r r r r
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 50
Mixed zoning:
• It combines the qualities of both WWN zoning and
port zoning.
• Using mixed zoning enables a specific port to be tied
to the WWN of a node
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 51
Types of
Zoning
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 52
FC SAN Topologies
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 54
Mesh Topology
• Benefits
– All storage/servers are a maximum of one ISL hop
away.
– Hosts and storage may be located anywhere in the
fabric.
– Multiple paths for data using the Fabric Shortest
Path First (FSPF) algorithm.
– Fabric management made simpler.
Topology
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 62
3. What is the significance E-Port?
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 63
Block Level Storage Virtualisation
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 64
Virtualization in SAN
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 66
Virtualization in SAN
68
IP SAN and FCoE
• FC SAN advantages comes with additional cost of buying FC
components-FC HBA and switches
• Organisations have an existing Internet Protocol(IP) based
infrastructure, which could be leveraged for storage networking
• Transporting block I/O over IP network-IPSAN
• Economical
Two protocols that leverage IP as transport mechanism
• Internet SCSI(iSCSI)
• Fiber Channel over IP(FCIP)
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 70
Components of iSCSI
▪ An initiator (host), target (storage or iSCSI gateway), and an IP-
based network are the key iSCSI components.
▪ If an iSCSI-capable storage array is deployed, then a host with
the iSCSI initiator can directly communicate with the storage
array over an IP network.
▪ Implementation that uses existing FC array, iSCSI gateway is
used
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 71
Figure 2.29:iSCSI Implementation
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 72
Components of iSCSI
▪ iSCSI initiator routes SCSI commands over IP network
▪ Most servers have embedded NICs + software initiator for
iSCSI functionality
▪ Standard NIC provides IP function
▪ Encapsulation of SCSI into IP packet and decapsulation
–done by the host CPU
▪ TOE(TCP offload Engine) NIC-Allevates this burden
▪ Offloads TCP management from the host and leaves only
iSCSI functionality to host processor
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 73
iSCSI Topologies
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 74
Native iSCSI Connectivity
• Does not have FC components
• Array has one or more iSCSI port configured with an IP address
and is connected to a standard ethernet switch
• After initiator logs in it can access the available LUNs on the
storage array.
• A single port can serve multiple hosts or initiators
75
Bridged iSCSI
• A bridged Connectivity
iSCSI implementation includes FC components in its
configuration
• The array does not have any native iSCSI capabilities—that is, it does
not have any Ethernet ports. Therefore, an external device, called a
bridge, router, gateway, or a multi-protocol router, must be used to
bridge the communication from the IP network to the FC SAN.
• These devices can be a stand-alone unit, or in many cases are
integrated with an existing FC switch
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 78
iSCSI Protocol Stack
• SCSI is the command protocol that works at the application
layer of the OSI model.
• The initiators and targets use SCSI commands and
responses to talk to each other.
• iSCSI is the session-layer protocol that initiates a reliable
session between a device that recognizes SCSI commands
and TCP/IP.
• The iSCSI session-layer interface is responsible for handling
login, authentication, target discovery, and session
management. TCP is used with iSCSI at the transport layer
to provide reliable service.
• TCP is used to control message flow, windowing, error
recovery, and retransmission
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 79
iSCSI PDU
• Protocol Data Unit(PDU)-Basic information unit
• iSCSI initiators and targets communicate with each
other using iSCSI PDUs
• Contains one or more header segments followed by
zero or more data segments
• It is then encapsulated into an IP packet to facilitate
transport
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 80
iSCSI Protocol Stack
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 81
Alignment of iSCSI PDUs with IP Packets
82
iSCSI Discovery
▪ An initiator must discover the location of its targets on the network and
the names of the targets available to it before it can establish a session.
▪ This discovery can take place in two ways: SendTargets discovery or
internet Storage Name Service (iSNS).
▪ In SendTargets discovery, the initiator issues the SendTargets command,
and the target network portal responds with the names and addresses
of the targets available to the host.
▪ internet Storage Name Service (iSNS) enables automatic discovery of
iSCSI devices on an IP network
▪ The initiators and targets can be configured to automatically register
themselves with the iSNS server. Whenever an initiator wants to know
the targets that it can access, it can query the iSNS server for a list of
available targets.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 83
iSCSI Discovery
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 84
iSCSI Names
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 85
iSCSI Session
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 86
iSCSI Session
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 87
iSCSI Session
• There can be more TCP connections within each session
• Session is established via iSCSI login process
• Login process is started when initiator establishes a TCP
connection with required target via a specific target protocol ID
• Authentication during login process
• After login ,SCSI transaction-initiator sends SCSI commands and
data to various LUNs by encapsulating them in iSCSI PDU
• Final phase-Connection termination phase, logout procedure
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 88
iSCSI Command Sequencing
• iSCSI communication between initiators and targets is based on the request response
command sequences.
• A command sequence may generate multiple PDUs.
• A command sequence number (CmdSN) within an iSCSI session is used to number all
initiator-to-target command PDUs belonging to the session.
• This number is used to ensure that every command is delivered in the same order in
which it is transmitted, regardless of the TCP connection that carries the command in the
session.
• Command sequencing begins with the first login command and the CmdSN is
incremented by one for each subsequent command.
• The iSCSI target layer is responsible for delivering the commands to the SCSI layer in the
order of their CmdSN.
• This ensures the correct order of data and commands at a target even when there are
multiple TCP connections between an initiator and the target using portal groups.
• Similar to command numbering, a status sequence number (StatSN) is used to sequentially
number status responses, as shown in Figure 2-38.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 89
iSCSI Command Sequencing
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 90
iSCSI Command Sequencing
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 91
Comprehensive
Questions
1. iSCSI is mapping of
a) SCSI over TCP/IP
b) IP over SCSI
c) FC over IP
d) None of the mentioned
2. Discovery session in iSCSI is used for:
a) Discovering iSCSI targets and their TargetAddresses
b) Probing Luns on iSCSI targets
c) Probing New Luns
d) None of the mentioned
3. I/O requests to disk storage on a SAN are called
a) File I/Os
b) SAN I/Os
c) Block I/Os
d) Disk I/Os
92
Comprehensive
4. What will beQuestions
used by SAN to provide connectivity between hosts and
storage?
a. FC
b. iSCSI
c. FC or iSCSI
d. SCSI
5.What are the major benefits of SAN?
a. Centralized backup
b. Storage consolidation
c. LAN-less backup
d. Share resources
e. All of the above
6. Which of the following is sequential access storage device?
a. Hard Disk
b. CD-ROM
c. Tape Cartridge
d. Main Memory
93
Comprehensive
7) iSCSI targetsQuestions
can be discovered by
a) SendTargets
b) Static configuration
c) using SLP/iSNS
d) All of the mentioned
8). Which of the following is false?
a) iSCSI requires login from initiator to target
b) There can be multiple paths between initiator and target
c) Data integrity is ensured using digests
d) None of the mentioned
94
FCIP
.FCIP is a tunneling protocol that enables
distributed FC SAN islands to be transparently
interconnected over existing IP-based local,
metropolitan, and wide-area networks.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 96
FCIP Protocol Stack
• Applications generate SCSI commands and data, which are
processed by various layers of protocol stack.
• Upper layer protocol SCSI includes the SCSI driver program that
executes read and write commands
• Below SCSI layer, the Fiber Channel Protocol layer, is simply a
Fiber Channel Frame whose payload is SCSI
• FCP layer rides on top of the Fiber Channel Transport layer.This
enables the FC frames to run natively within a SAN fabric
environment.
• In addition the FC frames can be encapsulated into the IP
packet and sent to a remote SAN over the IP.
• The FCIP layer encapsulates the Fiber Channel frames into the
IP payload and passes them to the TCP layer.
• TCP and IP are used for transporting the encapsulated
information across Ethernet,wireless of other media that
supports TCP/IP traffic
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 97
FCIP Encapsulation
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 98
FCIP Encapsulation
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 99
FCIP Topology
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
FCIP Topology
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
FCIP Performance and security
• From the perspective of performance, multiple paths to
multiple FCIP gateways from different switches in the layer 2
fabric eliminates single points of failure and provides
increased bandwidth.
• In a scenario of extended distance, the IP network may be a
bottleneck if sufficient bandwidth is not available
• Security is also a consideration in an FCIP solution because
the data is transmitted over public IP channels.
• Various security options are available to protect the data
based on the router’s support. IPSec is one such security
measure that can be implemented in the FCIP environment
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Converged Protocol FCoE
• Data centers have multiple n/w to handle various types of I/O
traffic-Ethernet n/w for TCP/IP communication, FC n/w for FC
communication etc
• To support multiple n/w, servers in data centers are equipped with
multiple n/w interfaces-ethernets and FC cards/adapters
• Fibre Channel over Ethernet (FCoE) protocol provides consolidation
of LAN and SAN traffic over a single physical interface infrastructure.
• FCoE helps organizations address the challenges of having multiple
discrete network infrastructures.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
I/O Consolidation Using FCoE
Infrastructure before FCoE deployment
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Components of an FCoE Network
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Converged network adapter
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
Cables
• Two options are available for FCoE cabling: Copper based Twinax
and standard fiber optical cables.
• A Twinax cable is composed of two pairs of copper cables covered
with a shielded casing.
• The Twinax cable can transmit data at the speed of 10 Gbps over
shorter distances up to 10 meters.
• Twinax cables require less power and are less expensive than fiber
optic cables.
• The Small Form Factor Pluggable Plus (SFP+) connector is the
primary connector used for FCoE links and can be used with both
optical and copper cables.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
FCoE Switches
• Has both ethernet switch and FC switch
functionalities.
• Has a Fiber Channel Forwarder(FCF),
Ethernet bridge and set of ethernet ports
and optical FC ports
• FCF encapsulates FC frames into FCoE
frames and decapsulate FCoE frames
received from ethernet bridge, to FC frames
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 10
FCoE Frame Structure • First 48 bits specify destination
MAC address
• Next 48 bits source MAC
address
• 32 bit IEEE 802.1Q Tag supports
creation of multiple virtual
networks(VLANs) across a
single physical infrastructure
• Ethertype indicates which
protocol is encapsulated in the
frame
• 4 bits version
• 110 bits reserved
• SOF(Start of Frame)-8 bits
• Frame
• EOF(End of Frame)- 8 bits
Figure 2.44 extracted from https://en.wikipedia.org/wiki/Fibre_Channel_over_Ethernet
• 32 bit Frame Check Sequence 11
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC
FCoE Frame Mapping
Mapping of FC frames to the ethernet
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
FCoE Enabling Technologies
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
Priority-Based Flow Control (PFC)
• Traditional FC manages congestion through the use of a link-level, credit-
based flow control that guarantees no loss of frames.
• Typical Ethernet, coupled with TCP/IP, uses a packet drop flow control
mechanism.
• The packet drop fl ow control is not lossless. This challenge is eliminated
by using an IEEE 802.3x Ethernet PAUSE control frame to create a lossless
Ethernet.
• A receiver can send a PAUSE request to a sender when the receiver’s
buffer is filling up.
• Upon receiving a PAUSE frame, the sender stops transmitting frames,
which guarantees no loss of frames.
• The downside of using the Ethernet PAUSE frame is that it operates on
the entire link, which might be carrying multiple traffic flows.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
Priority Based Flow Control
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
Enhanced Transmission Selection
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
Enhanced Transmission Selection
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
What is NAS ?
Client
s
Application Print
Server Server
Figure 2.47:NAS
NAS
Device
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 117 |Accredited by NBA and NAAC
11
What is NAS ?
• A NAS device is a dedicated, high-performance, high-speed, single-
purpose file serving and storage system
• A client may request a file by specifying name, location or other
attributes.
• NAS device uses its own operating system and hardware, software
components to meet specific file service needs
• NAS OS keeps track of location of files on disk volume, coverts file I/
O into block level I/O to retrieve data.
• NAS uses network and file-sharing protocols to perform filing and
storage functions.
• These protocols include TCP/IP for data transfer and CIFS and NFS
for remote file service.
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 11
General Purpose Servers vs. NAS Devices
• A NAS device is optimized
for file-serving functions
such as storing, retrieving,
and accessing files for
File
applications and clients.
Application
s Syste • As shown in Figure , a
Print m
Operating
Drivers System general-purpose server can
File Network be used to host any
Syste
m
Operating application, as it runs a
System
Network
generic operating system.
• Unlike a general-purpose
server, a NAS device is
Single
Function
NAS
dedicated to file-serving.
Devic • It has a real-time operating
e
system dedicated to file
serving
General Purpose
Servers
(Windows or
UNIX)
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 119 |Accredited by NBA and NAAC
11
Benefits of NAS
• Support comprehensive access to information
• one to many and many to one
• Improves efficiency
• Eliminates bottle neck, specialized OS
• Improved flexibility
• Supports clients on UNIX and Windows
• Centralizes storage
• Simplifies management
• Centralised console
• Scalability
• High availability – through efficient replication and recovery
• Provides security integration to environment (user authentication
and authorization)
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Components of NAS
Window
s Storage
Array
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 121 |Accredited by NBA and NAAC
12
• Converts file-level requests into block storage
requests and vice -versa
• Two common NAS file sharing protocols are:
• CIFS – Common Internet File System protocol
• Traditional Microsoft environment file
sharing protocol, based upon the Server
Message Block protocol
• NFS – Network File System protocol
• Traditional UNIX environment file sharing
protocol
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Network File System
• Client/server protocol for file sharing commonly used in UNIX
systems
• Based on connectionless UDP
• Uses RPC mechanisms over TCP protocol
• NFS provides a set of RPCs to access a remote file system
• Searching files and directories
• Opening,reading,writing to and closing a file
• Changing file attributes
• Modifying file links and directories
• NFS is a stateless protocol,does not maintain any tabole to store
information about open files and associated pointers
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Network File System
• NFS Version 2(NFSv2) uses UDP to provide a sateless network
connection between client and server
• NFS version 3(NFS v3) uses TCP and UDP
• NFS v4 uses TCP, based on a stateful protocol design
• Offers enhanced security
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
Common Internet File System
• Client server application protocol that enables client
programs to make requests for files and services on
remote computers over TCP/IP
• Developed by Microsoft in 1996
• An enhanced version of the Server Message Block
(SMB) protocol
• Stateful Protocol
• Can automatically restore connections and reopen
files that were open prior to interruption
• Operates at the Application/Presentation layer of the
OSI model
• Most commonly used with Microsoft operating systems,
but is platform-independent
• CIFS runs over TCP/IP and uses DNS (Domain Naming
Service) for name resolution
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
NAS I/O Operation
Application Storage
Interface
3
Operating System Network
Protocol Block I/O
to
storage
I/O Redirect NAS Operating System device
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 126 |Accredited by NBA and NAAC
12
NAS I/O Operation
1. Client packages I/O request into TCP/IP and forwards it
through network
2. NAS device receives this request from the network
3. NAS device converts I/O request into a physical storage
request, block level I/O and performs the operation on
physical storage
4. When the NAS device receives the data from storage, it
processes and repackages data into appropriate file protocol
response
5. NAS device packages this response into TCP/IP again and
forwards this to client through the network
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 12
NAS Implementations
• An integrated NAS device has all the
components of NAS, such as the NAS head and
storage, in a single enclosure, or frame.
Integrated NAS • A gateway NAS device consists of an
independent NAS head and one or more storage
arrays.
I • The NAS head performs the same functions that
P
it does in the integrated solution; while the
storage is shared with other applications that
require block-level I/O.
NAS Device • The gateway NAS is the most scalable because
NAS heads and storage arrays can be
independently scaled up when required
NAS Gateway
I FC
P SAN
NAS Head
Figure 2.49 :Integrated and Gateway NAS
connectivity Storage Array
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B)
Network-Attached status
Storage - 128 |Accredited by NBA and NAAC
12
Comprehensive Questions
1. NFS & CIFS are
a) Filesystems
b) Operating systems
c) Transport protocols
d) File access protocols
2. Using file access protocols, data residing on which of
the following can be accessed:
a) Local disk
b) Remote disk
c) Both
d) Neither
12
3. A NAS solution is most appropriate for what type of
data environment
a) Secured Access
b) Shared access
c) Remote access
d) Parallel access
4. Identify a network file protocol in the below
mentioned set.
a) FC
b) CIFS
c) SCSI
d) NAS
13
File Level Storage Virtualisation
• Eliminates dependencies between data accessed and physical
location of files
• Common in NAS
• Provides non-disruptive file mobility
13
File Level Storage Virtualisation
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 13
Object-Based Storage Devices
Figure 2.53:Object
• An object Structure
might contain user data, related metadata
(size, date, ownership, and so on), and other attributes of
data (retention, access pattern, and so on)
• Each object is identified by unique ID-object ID
• Object ID generated using specialised algorithms
13
Key Components of OSD
• Nodes
• Private network
• Storage
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Benefits of Object Based Storage
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Use Cases for Object Based Storage
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Content Addressed Storage
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Features
Content Authenticity
• Through content address
• Unique content address to each object
• Validated at regular intervals
Content Integrity
• Assures data is not altered
• Hashing algorithm
• If altered, generates new address
Location Independence
• Location of stored data is irrelevant to application that
requests data
Single Instance Storage
• Guarantees storage of only single instance of an object
• When new object is written , CAS is polled to see object is
already available with same address. If so not stored, only
pointer
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Features
Retention enforcement
• After object is stored in CAS ,retension policy is defined, CAS
does not make object available for deletion until policy
expires
Data protection
• Ensures data stored on CAS is available even if disk/node fails
• Object split into parts and parity is generated and stored in
different nodes
Fast record retrieval
• Stores all objects in disks
Load Balancing
• Distributes objects across multiple nodes to provide
maximum throughput and availability
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Features
Scalability
• Allows addition of more nodes without overhead
Event notification
• Continuously monitors the state of the system and raises an
alert for any event that requires admin attention
Self diagnosis and repair
• Automatically detects and repairs corrupted objects
Audit Trails
• Keep track of management activities and any access or
disposition of data
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
CAS Use cases
• Healthcare solution
• Finance Solution
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Unified Storage
• Consolidates block, file and object access into one storage
solution
• Supports multiple protocols CIFS, NFS, iSCSI, FC, FCoE…
• Components of Unified Storage
• Storage Controller
• NAS Head
• OSD Node
• Storage
Storage Controller
• Provides block level access to application servers
through iSCSI, FC or FCoE protocols
• Manages back-end storage pool
• Configures LUNs and present them to application servers,
NAS heads and OSD nodes
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 14
Unified Storage
NAS Head
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Data Access from Unified
Storage
• In unified storage system,block,file and object requests to the
storage travel through different I/O paths
Block I/O Requests
• Application servers connected to an FC,iSCSI,or FCoE port on
storage controller.
• Server sends a block request over FC,iSCSI or FCoE
connection
File I/O Request
• NAS clients, sends a file request to NAS Head using NFS of
CIFS protocol.
• NAS head receives request, converts it to block request and
forwards to storage controller.
• Upon Receiving block data from storage controller, NAS
Head converts block request back to file request and sends to
clients
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Data Access from Unified
Storage
Object I/O Request
• Web application services sends object request through REST/
SOAP protocols to OSD node.
• OSD node converts it into block request and sends it to disk
through storage controller
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Components of Unified Storage
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
NPTEL LINKS
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Certainity Based Marking
1.For long term storage (archival) of data which of the following storage devices is
generally used
a) Hard Disk
b) CD Rom
c) Floppy Disk
d) Tape Cartridges
2.Storage management comprises of
a) SAN Management
b) Data protection
c) Disk operation
d) All of the mentioned
3. File access protocols operate in which layer of the OSI model
a) Application
b) Session
c) Transport
d) None of the mentioned
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
University Questions with raised RBT
1. Which threelevel
statements describe differences between Storage Area
Network (SAN) and Network Attached Storage (NAS) solutions? Choose
three.
a. SAN is generally more expensive but provides higher performance
b. NAS uses TCP/IP for communication between hosts and the NAS
server
c. NAS requires additional hardware on a host: a host bus adapter for
connectivity
d. SAN uses proprietary protocols for communication between hosts
and the SAN fabric
2. Explain the disadvantages of NAS.
3. What are the advantages of FCP?
4. Which is the layer in Fiber Channel Protocol contains the basic rules
for sending the data across the FC network?
5. What is iSCSI session?
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Self assessment Questions Link
https://forms.office.com/Pages/ResponsePage.
aspx?id=TwEM7vB2UEy6eTUVeQV7lhi1Zpd1-
upBiikXP2hSUrRUNDE1QU5MWEdOUVlUME0wU1RDNlVORFZQU
y4u
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Case Study
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 15
Innovative Links
16
Text Books:
1. Information Storage and Management, Author :EMC Education Services,
Publisher:
Wiley ISBN: 9781118094839
2. Storage Virtualization, Author: Clark Tom, Publisher: Addison Wesley
Publishing Company ISBN : 9780321262516
Approved by AICTE |Affiliated to VTU | Recognized by UGC with 2(f) & 12(B) status |Accredited by NBA and NAAC 16