003 Storage Array Technology
003 Storage Array Technology
Security Level:
Contents
1 Huawei Confidential
Hardware Platform — Next-Gen Innovation
Rear panel Front panel
Controller enclosures
High-end
Mid-range
Entry-level
2 U, 25 SAS SSDs
2 U, 2 controllers per controller
enclosure, 6 interface modules
2 U, 12 NL-SAS disks
2 Huawei Confidential
Standard Disk Enclosure
Power module
Fan module
Power module
2 U disk enclosure: 25 x 2.5-inch disks
4 U disk enclosure: 24 x 3.5-inch disks
Disk module
3 Huawei Confidential
High-Density Disk Enclosure
Power module
System subrack
Fan module
Disk module
Expansion module
4 Huawei Confidential
Hardware Redundancy Technology
Controlle
r
5 Huawei Confidential
Hardware Redundancy Technology Details
CPU Redundancy
At least two controllers in active-active or active passive mode are used.
In active-active mode, the two controllers are both working and monitoring each other. If one controller fails, the other one will take over
services from the failed controller.
In active-passive mode, one is working and the other is standby and monitors status. If the active controller fails, the standby controller will start
working and take over services from the failed one.
Power/Fan Redundancy
Typically the power and fan modules are frequently failed because of working in high voltage and high-speed spinning.
At least two power modules are configured and connect to the same circuit with load balancing. If one fails, the other one will increase the
power capacity for the entire system.
Two or more fan modules work for one system. If one fails, the other one still works properly to dispatch system heat.
Battery Redundancy
The write-back technology is usually used for better performance. With this technology, the writing acknowledge is sent back when data is just
written to storage cache.
However, if the system is suddenly powered off, the (dirty) data will be lost because the cache cannot store data without power.
Two or more batteries (backup battery units or BBUs) will be configured for the storage system. If the system is powered off, the batteries can
flush the cache data to disks for long-term storing.
Disk Redundancy
Disks are prone to failures in the storage system, so Redundant Arrays of Independent Disks (RAID) is a basic and mandatory technology for all
storage.
Based on the specific protection level and capacity requirement, RAID can be configured as RAID 0, RAID 1, RAID 10, RAID 5, RAID 6, or RAID TP.
If a disk fails, RAID will reconstruct the data with XOR based on RAID level, then the failed disk can be replaced with a new one.
6 Huawei Confidential
Storage Expansion Technology
Heavy load
Normal load
Light load
Scale-up: When a storage system runs out of space, more disk enclosures are added for capacity expansion.
Scale-out: Once the performance and/or capacity limits of the storage controllers are reached, the only option is to add new
controllers to the storage system, and the workload is balanced between controllers.
Scale-deep: Scale-deep is firstly introduced by HDS VSP storage systems and can integrate 3rd party (external) storage
systems for virtualization (addition of tier‐2 and tier‐3 performance and capacity).
Scale-in: Scale-in is firstly introduced by Huawei HVS storage systems, which apply internal technologies to increase overall
storage system performance.
7 Huawei Confidential
SAS Cascading for Scale-Up
SAS Cascading Principles:
Based on the built-in coffer disk or
external coffer disk mode, the SAS
cascading connection is different, to
make sure the storage controller can
access the coffer disk along the
short path.
The SAS cable should be connected
as loops, to optimize the path length
for each enclosure, also to make
sure each enclosure can have
redundant paths.
Typically, a maximum of eight
Built-in coffer disk enclosures can be connected to a
pair of SAS ports (depending on the
storage type and model), while two
is recommended.
External coffer disk
8 Huawei Confidential
Storage Controller Scale-Out
Controller enclosures are connected using IP switches. Each controller has a 2-port interface module that connects to two switches for
redundancy.
The management network uses daisy chains to manage all of the controllers and IP switches.
9 Huawei Confidential
Scale-Up vs. Scale-Out
The disk capacity is insufficient, and the With the workload growth of
Scenario controller performance is not a applications, the controller
bottleneck. performance becomes a bottleneck.
10 Huawei Confidential
Hardware Hot-Swapping Technology
11 Huawei Confidential
Power Failure Protection – Uninterrupted Power Supply
Uninterrupted power supplies (UPS) can provide power for system cache flushing or machinery component to cold
down.
Application server
E
1. The application server 3. Data is locked and 1. Some storage systems use none-
written to the
initiates a write
global cache of
volatile memory for cache
request to node C.
node C. protection in case of power
2. Node C applies for failures.
a stripe write lock
from the lock 2. The storage system will write the
server.
CPU CPU CPU data to the none-volatile memory
first, or back up the cache data in
Global cache
the none-volatile memory. If the
4. The data is divided into fragments and saved to the NVDIMM.
system is powered off
unexpectedly, the none-volatile
Storage Storage Storage memory still keeps the cache data
for flushing.
Node A Node B Node C 3. Huawei storage uses non-volatile
dual in-line memory module
Huawei OceanStor 9000 writing process (NVDIMM), EMC storage uses
non-volatile memory (NVRAM).
13 Huawei Confidential
Coffer Disk Technology
For Huawei OceanStor storage, coffer disks are used to
store three types of data: cache data requiring power
failure protection, OceanStor OS system data, and
system configuration information and logs. The
storage system has two kinds of coffer disks: built-in
Coffer disks coffer disk and external coffer disk.
The first four disks in the controller (for built-in mode)
or in the first disk enclosure (for external mode) are
coffer disk. Coffer disks are configured with RAID1,
Built-in BBU after storing the system data, other space is used for
the business data.
Coffer disks can be used to protect cache data. The
BBU can provide power for the cache and coffer disks
to ensure that the cache data can be completely
flushed to the coffer disks.
14 Huawei Confidential
Contents
15 Huawei Confidential
Pre-Copy Technology
The disk pre-copy technology enables the storage
system to monitor the disk status. When a
﹢
1
member disk in a RAID group is about to fail,
Normal status
The system monitors data on the disk is pre-copied to a hot spare disk,
the status of all disks. reducing data loss risks.
Data disks Hot spare disk
The disk status is determined by reading the
attribute of the self-monitoring, analysis, and
﹢
2
reporting technology (S.M.A.R.T.). When the disk
When one disk is
about to fail, the data is about to fail, the pre-copy technology enables
will be copies or data on the disk to be copied to and backed up
backed up to a hot
spare disk.
Suspected Hot spare disk
on the hot spare disk. By backing up data quickly
faulty disk to shorten or avoid long-time reconstruction after
the disk fails, the disk failure rate during
reconstruction is reduced and the product security
is improved.
﹢
After the disk is
replaced with a new Huawei RAID 2.0+ technology uses hot spare
disk, the data will be
copied to the new space instead of physical dedicated hot spare
disk.
New disk Hot spare disk disks, the copy/backup time will be reduced
remarkably, so that the multi-disk failure rate is
reduced during the pre-copy or copy-back period.
16 Huawei Confidential
Multipathing – Origination
Considering there is one LUN 0, there are two access paths to LUN 0, path 000 and path 100.
The following issues may occur:
X
0 0
0 Application abc 0 Application 0 abc
Application 0
0 0 Host/Server 0
Host/Server Host/Server
1 0 xyz
1 0 1 0
SPOF: If one path (for example, Confusion: The storage system Bandwidth waste: If the workload
path 000) is broken, the write recognizes two paths (path 000 is heavy, but all writes go through
request of the application to the and path 100), which have the path 000, the bandwidth of path
storage along path 000 will fail. same destination. Therefore, only 100 is idle and waste.
one data copy will be stored and
the other one will be discard.
17 Huawei Confidential
Multipathing – SPOF
Application Scenario
HBA HBA
Storage Storage
18 Huawei Confidential
Multipathing – SPOF
Multipathing
Multipathing
software
Server Server
Server Server Working mechanism:
software
19 Huawei Confidential
Multipathing – Load Balancing
Multipathing Multipathing
software Server software Server
Working mechanism:
Typical load balance
algorithms:
Round-robin: Dispatches I/Os
HBA HBA
to each path sequentially.
Least-I/O: Finds out the path
with the shortest I/O queue
then dispatches the I/Os to the
path.
LUN LUN LUN Least-load: Counts the load of
each path and dispatches I/Os
to the path with the lightest
load.
Storage
Load balancing
20 Huawei Confidential
Mainstream Multipathing Software
Storage vendors generally use three types of multipathing software:
1. Self-developed software, such as EMC PowerPath, HDS HDLM, and Huawei UltraPath
2. Plug-in adapter based on OS multipathing, such as IBM and HP
3. Native OS multipathing, such as MPIO
Comparison: Native OS multipathing software is simple to use and can meet almost all requirements. Vendors' self-developed multipathing has better
reliability and easier customization for advanced features.
21 Huawei Confidential
Thin-Provisioning Technology
Thin LUN Actual data Physical space 8 KB
32 MB
Pool
8 KB
32 MB
Space
allocation
8 KB 8 KB
32 MB
8 KB
Capacity
on write
8 KB 8 KB
1. Write
operatio 8 KB 32 MB
n
2. Space allocation
or optimization Data volume: 32 KB Data volume: 32 KB
according to the mapping Allocated space: 256 KB Allocated space: 128 MB
table
Technical principles Technical advantages
Capacity on write: When the allocated space is insufficient, Efficient allocation policy: The 64 KB granularity improves
new space is allocated with a 64 KB granularity by default. efficiency in allocating small data blocks.
Mapping table: Logical units and physical units (with a default Diversified reclamation mechanisms: supporting
64 KB granularity) are associated by a mapping table. reclamation by VMware VAAI commands, Symantec
Direct-on-time: redirecting I/Os from logical units to physical Storage Foundation commands, Windows Server 2012
units through a mapping table. commands, and full-zero page check reclamation
22 Huawei Confidential
Tiering Technology Overview
23 Huawei Confidential
Huawei SmartTier for Block
24 Huawei Confidential
Huawei SmartTier for File
NAS
Clients
25 Huawei Confidential
SSD Cache Technology Overview
Working principle
LUN/File System
SSDs are used as the secondary cache for RAM cache.
Read acceleration is available to LUNs and file systems.
Dedupe Meta SSD cache partitioning is supported.
Application scenario
RAM Cache Random small-I/O read-intensive applications, such as
Oracle OLTP, SQL server, exchange, and file service
Competitive advantages
SmartCache Dynamic expansion and reduction, SSD resource quota
management, flexible open policy
Read-only cache, SSDs without RAID protection, so
HDD SSD that capacity can be fully utilized
26 Huawei Confidential
Service Quality Assurance Technology Overview
NO YES
QoS Cache Partition
27 Huawei Confidential
Huawei SmartQoS Technology
Medium-priority High-priority Low-priority
applications applications applications Service Quality Control
– SmartQoS helps mission-critical services obtain storage
resources in a timely manner to realize their performance
goals.
Enables the optimum storage resources to serve the most important applications
28 Huawei Confidential
Huawei SmartPartition Overview
Host
concurrency Technical principles
Divides system cache resources into cache partitions of
Cache
different sizes.
Allocates cache partitions to different applications.
Adjusts the host concurrency and disk access concurrency
capabilities for each cache partition, and controls the
service quality of each application.
Benefits
Dedicated cache partitions for service isolation and high
reliability
Disk
concurrency Reserved cache resources for mission-critical applications,
improving service quality
Service 1 Service 2 Service 3 Service N Applicable when the storage system carries various
services at the same time
29 Huawei Confidential
Data Reduction Technology Overview
Saves capacity, power, maintenance, Inline compression and deduplication reduce the
and OPEX from end to end data written to SSDs, which prolongs SSD service
life
30 Huawei Confidential
Data Deduplication Mode
Post Processing Inline Deduplication Hardware Acceleration
(deduplication after storing) (deduplication before storing) (deduplication algorithm is implemented
using dedicated hardware, not using CPU
resources)
Deduplication
hardware
31 Huawei Confidential
Snapshot Technology – Overview
Rapid online data backup and restoration Development & Testing Repaired logical error
Zero backup and rollback window High space efficiency Zero data loss
32 Huawei Confidential
Snapshot Technology – Mechanism
Host write to D
A B C D A B C D A B C D1 D
Modified data
Old data
A B C D A B C D A B C D B D1 E1 E2
Deleted Modified New
data data data
33 Huawei Confidential
Continuous Data Protection Technology
Concept
Continuous data protection (CDP), also called continuous CDP example
backup or real-time backup, refers to backup of data by
automatically saving a copy of every change made to that data,
and allows the user or administrator to restore data to any point
LUN TP TP+1 TP+2 ... TP+N
in time.
In an ideal case of continuous data protection, the RPO= 0, RTO ≈
0. CDP CDP0 CDP1 CDP2 … CDPN
There are 2 types of CDP technology. True CDP-based solutions snapshot
Rollback Create
can provide fine granularities of restorable objects, then it can snapshot
duplicates
back up and roll back data in any point of time. The near-CDP can Readable and Snapshot Snapshot
Application scenarios
Data protection in seconds: CDP snapshots restore data on the
source LUN quickly.
Data analysis and testing: Duplicates can be created for the CDP
snapshots and mapped to hosts for data analysis and testing.
34 Huawei Confidential
Mirror Technology Overview
1. Redundant data
backups for
heterogeneous
storage systems High availability
protection for
2. Accelerated local LUNs
performance of
heterogeneous
storage systems
35 Huawei Confidential
Huawei HyperMirror Technology Mechanism
1. Create a mirror LUN.
Converts a local or external LUN into a
Host mirror LUN, creates a mirror copy, and adds
a mirror copy for the mirror LUN for
redundancy.
2. Perform synchronization.
Initial synchronization: Replicates all data
Mirror LUN from the mirror LUN to the new mirror copy
and writes data concurrently to both mirror
copies.
Incremental synchronization: Replicates data
increments from the mirror LUN to the
recovered mirror copy after it is recovered
A B from Splitting or Interruption.
3. Implement mirror copy splitting.
Mirror copy Mirror copy The mirror copy is unavailable after
splitting.
36 Huawei Confidential
LUN Clone Technology Overview
A clone is created as an image of a LUN at the current point in time. Splitting a
clone creates a complete physical copy of the image.
HyperClone can be used for data analysis and testing.
4
2
1
3
Process Slave LUN
Master LUN Slave LUN Master LUN
1
Activate the HyperClone 2 synchronization is
Data 3 splitting, the
After 4 slave LUN can be
The
feature and start data complete. The master master LUN and slave mapped to host for data
synchronization. LUN and slave LUN LUN are independent of analysis, testing, etc.
have the same data. each other.
37 Huawei Confidential
LUN Copy Technology Overview
HyperCopy allows a target LUN to
obtain the full physical data copy of a
Source Destination source LUN at the current time. The
LUN LUN target LUN can be read and written
immediately, regardless of whether the
data copy is complete.
38 Huawei Confidential
WORM Technology Overview
WORM: Write Once Read Many, write-once technology
Application Scenarios:
Financial securities (bills), government documents, legal
documents, and medical records.
Solution:
• Enterprise WORM (WORM-E)
• Regulatory Compliance WORM (WORM-C, SEC Rule
17a-4 & 17a-3)
WORM is widely adopted in archive solutions.
After Optical disc, tape library and disk storage (NAS) support
Write WORM.
39 Huawei Confidential
Multi-Tenancy Technology Overview
Storage Multi-tenancy efficiently separates the
administrator resource data of tenants and assigns the
management work of some resources to
tenants to make tenants manage resources in
their own virtual storage spaces.
40 Huawei Confidential
Huawei Full Stack Management
Database
VM VDI
41 Huawei Confidential
Storage Compatibility/Interoperability Overview
Storage is not a single system, it has to interact with other systems in
the data center, such as:
• Switches: FC / iSCSI
Application • Hosts: X86-64, Power
• HBA: QLogic, eMulex
• Hypervisor & OS: VMware, Hyper-V, KVM, Linux, Windows, AIX
• Applications: Oracle, SAP
• Others: Backup software, storage virtualization
Hosts Hypervisor Operation System
Storage interoperability/compatibility provides seamless resource
consolidation and cooperation among a large number of
heterogeneous storage resources by using standard interfaces.
Switch
42 Huawei Confidential
VMware Interoperability – VAAI
VMware vSphere® Storage APIs – Array Integration (VAAI) define a set of "storage primitives" that enable the ESXi host
to offload certain storage operations to the array, which reduces resource overhead on the ESXi hosts and can
significantly improve performance for storage-intensive operations, such as:
VAAI-Block:
• Hardware Assisted Locking/Atomic Test & Set
• Full Copy/XCOPY
• Write Same (ZERO)/Block Zero
• UNMAP
• Thin Provisioning
VAAI-NAS:
• Full File Clone
• Fast File Clone/Native Snapshot Support
• Extended Statistics
• Reserve Space
43 Huawei Confidential
VMware Interoperability – VASA
vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs) that enables vSphere vCenter to
recognize the capabilities of storage arrays. Such capabilities, including RAID, native thin provisioning and deduplication, are
made visible within vCenter.
VASA providers communicate with Virtual Center to indicate storage topology, capability
and state information which supports policy-based management, operations
management and DRS functionality. VASA providers help to identify trends in a VM's
storage capacity usage for troubleshooting, correlate events on the datastore and LUNs
with a VM's performance characteristics, and monitor health of storage.
44 Huawei Confidential
VMware Interoperability – vVol
vVol (Virtual Volume) is a provisioning feature for vSphere 6 that changes how virtual machines (VMs) are stored and
managed. vVols transforms SAN/NAS into VM-centric devices by making the virtual disk a native representation of the VM at
the array level, and enables app-centric, policy-based automation of SAN and NAS based services.
Benefits of vVol:
• Enables an administrator to apply a policy to a VM
which defines the various performance and service-
level agreement requirements, such as QoS,
replication or deduplication.
To use vVols, the storage hardware has to support the
vStorage APIs for Storage Awareness (VASA).
45 Huawei Confidential
VMware Interoperability – SRM
Site Recovery Manager (SRM) leverages VMware Infrastructure to deliver advanced disaster recovery management and
automation to ensure it is rapid, reliable, manageable, and affordable. VMware Site Recovery Manager integrates with third
party storage arrays and replication appliances to provide a complete integrated Business Continuity solution. This
integration is achieved through a unique Storage Replication Adapter.
Function of SRM:
• Planned Migration
• Disaster Recovery
46 Huawei Confidential
Contents
47 Huawei Confidential
Huawei Intelligent Data Storage Portfolio
Solutions
OceanProtect Data Protection
Solution
Data Management
Device Management Data Management Engine Intelligent O&M
Intelligent Storage
All-Flash Storage Hybrid Flash Storage Mass Data Storage HCI
OceanStor Dorado OceanStor Dorado OceanStor 18500/ OceanStor 6800 OceanStor Pacific FusionCube 1000
18000 8000 18800 Series Hypervisor/Data
OceanStor Dorado OceanStor Dorado OceanStor OceanStor OceanStor OceanStor 9000 FusionCube 1000 Cabinet
48 6000Huawei Confidential
5000 Dorado 3000 5300/5500/5600/5800 2600
Thank you. Bring digital to every person, home, and
organization for a fully connected,
intelligent world.