0% found this document useful (0 votes)
14 views50 pages

003 Storage Array Technology

Uploaded by

mobio jean
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views50 pages

003 Storage Array Technology

Uploaded by

mobio jean
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Storage Array Technology

Security Level:
Contents

1 Storage Array Components & Architecture

2 Storage Array Technologies

3 Huawei Storage Products

1 Huawei Confidential
Hardware Platform — Next-Gen Innovation
Rear panel Front panel
Controller enclosures

High-end

4 U, 28 interface 4 U, 4 controllers per controller enclosure


modules

Mid-range

2 U, 2 controllers per controller enclosure, 2 U, 36 NVMe SSDs (high density)


12 interface modules

Entry-level

2 U, 25 SAS SSDs
2 U, 2 controllers per controller
enclosure, 6 interface modules

2 U, 12 NL-SAS disks
2 Huawei Confidential
Standard Disk Enclosure

Disk module Disk module

Power module
Fan module

Expansion module Expansion module

Power module
2 U disk enclosure: 25 x 2.5-inch disks
4 U disk enclosure: 24 x 3.5-inch disks

Disk module

The disk enclosure and controller enclosure are integrated.


Power module The power button of the disk controller is invalid and does
not support power-on and power-off. The controller
enclosure delivers the power-on and power-off commands.
Expansion module

2 U 36-slot NVMe enclosure

3 Huawei Confidential
High-Density Disk Enclosure

Power module

System subrack

Fan module
Disk module

Expansion module

4 U high-density disk enclosure: 75 x 3.5-inch disks

4 Huawei Confidential
Hardware Redundancy Technology

 Storage devices are occasionally


affected by failures and disruptions
that are caused by network
Interface module connectivity issues, controller or
BBU module
general hardware failures. This is
called Single Point Of Failure (SPOF).
 A common approach to providing a
System Management highly available service is to use
subrack module redundant components. Redundancy
Power & Fan module
solutions are usually less expensive,
easier to implement, and easier to
manage.

Controlle
r

5 Huawei Confidential
Hardware Redundancy Technology Details
CPU Redundancy
 At least two controllers in active-active or active passive mode are used.
 In active-active mode, the two controllers are both working and monitoring each other. If one controller fails, the other one will take over
services from the failed controller.
 In active-passive mode, one is working and the other is standby and monitors status. If the active controller fails, the standby controller will start
working and take over services from the failed one.

Power/Fan Redundancy
 Typically the power and fan modules are frequently failed because of working in high voltage and high-speed spinning.
 At least two power modules are configured and connect to the same circuit with load balancing. If one fails, the other one will increase the
power capacity for the entire system.
 Two or more fan modules work for one system. If one fails, the other one still works properly to dispatch system heat.

Battery Redundancy
 The write-back technology is usually used for better performance. With this technology, the writing acknowledge is sent back when data is just
written to storage cache.
 However, if the system is suddenly powered off, the (dirty) data will be lost because the cache cannot store data without power.
 Two or more batteries (backup battery units or BBUs) will be configured for the storage system. If the system is powered off, the batteries can
flush the cache data to disks for long-term storing.

Disk Redundancy
 Disks are prone to failures in the storage system, so Redundant Arrays of Independent Disks (RAID) is a basic and mandatory technology for all
storage.
 Based on the specific protection level and capacity requirement, RAID can be configured as RAID 0, RAID 1, RAID 10, RAID 5, RAID 6, or RAID TP.
 If a disk fails, RAID will reconstruct the data with XOR based on RAID level, then the failed disk can be replaced with a new one.

6 Huawei Confidential
Storage Expansion Technology

Heavy load

Normal load

Light load

Initial Scale-up Scale-out Scale-deep Scale-in

Scale-up: When a storage system runs out of space, more disk enclosures are added for capacity expansion.
Scale-out: Once the performance and/or capacity limits of the storage controllers are reached, the only option is to add new
controllers to the storage system, and the workload is balanced between controllers.
Scale-deep: Scale-deep is firstly introduced by HDS VSP storage systems and can integrate 3rd party (external) storage
systems for virtualization (addition of tier‐2 and tier‐3 performance and capacity).
Scale-in: Scale-in is firstly introduced by Huawei HVS storage systems, which apply internal technologies to increase overall
storage system performance.

7 Huawei Confidential
SAS Cascading for Scale-Up
SAS Cascading Principles:
 Based on the built-in coffer disk or
external coffer disk mode, the SAS
cascading connection is different, to
make sure the storage controller can
access the coffer disk along the
short path.
 The SAS cable should be connected
as loops, to optimize the path length
for each enclosure, also to make
sure each enclosure can have
redundant paths.
 Typically, a maximum of eight
Built-in coffer disk enclosures can be connected to a
pair of SAS ports (depending on the
storage type and model), while two
is recommended.
External coffer disk
8 Huawei Confidential
Storage Controller Scale-Out

Controller enclosures are connected using IP switches. Each controller has a 2-port interface module that connects to two switches for
redundancy.
The management network uses daisy chains to manage all of the controllers and IP switches.

9 Huawei Confidential
Scale-Up vs. Scale-Out

Item Scale-Up Scale-Out

Component Disks Controllers

Mode SAS cascading Controller interconnection

The disk capacity is insufficient, and the With the workload growth of
Scenario controller performance is not a applications, the controller
bottleneck. performance becomes a bottleneck.

1. Simple: Add disks to the system. 1. Flexible expansion based on


2. Cost-effective: costs on disks and requirements
related enclosures, no other expense 2. Consolidated storage data pool,
Benefit
3. Silo building: The maintenance and easy and simple to manage
future evolution will be complex and 3. Higher CAPEX (per TB) than
may require data migration. scale-up

10 Huawei Confidential
Hardware Hot-Swapping Technology

 Some redundant hardware modules can


be replaced or added online (hot-
plugging/hot-swapping technology),
including I/O modules, fans, power
modules, and disks.
Handle bar
 Hot swapping is used whenever it is
desirable to repair a working system
without interrupting its operation. It may
simply be for convenience of avoiding the
delay and nuisance of shutting down and
then restarting complex equipment.
 Online expansion of I/O modules or disks
on the current system will also reduce the
costs in comparison to deploying a new
storage system.

11 Huawei Confidential
Power Failure Protection – Uninterrupted Power Supply

FC/IP Connection FC/IP Connection FC/IP Connection


Cache Cache
Cache
CPU CPU
CPU CPU
Back-end Bus Cache Battery
Back-end Bus
CPU CPU
Disk
Back-end Bus Built-in UPS
External UPS
 Unexpected power-off may cause the dirty data in the cache to lose, or even cause system hardware component
failures (such HDDs or fans in high-speed spinning).

 Uninterrupted power supplies (UPS) can provide power for system cache flushing or machinery component to cold
down.

 Huawei OceanStor storage uses BBUs for power failure protection.


12 Huawei Confidential
Power Failure Protection – Non-Volatile Memory

Application server
E
1. The application server 3. Data is locked and 1. Some storage systems use none-
written to the
initiates a write
global cache of
volatile memory for cache
request to node C.
node C. protection in case of power
2. Node C applies for failures.
a stripe write lock
from the lock 2. The storage system will write the
server.
CPU CPU CPU data to the none-volatile memory
first, or back up the cache data in
Global cache
the none-volatile memory. If the
4. The data is divided into fragments and saved to the NVDIMM.
system is powered off
unexpectedly, the none-volatile
Storage Storage Storage memory still keeps the cache data
for flushing.
Node A Node B Node C 3. Huawei storage uses non-volatile
dual in-line memory module
Huawei OceanStor 9000 writing process (NVDIMM), EMC storage uses
non-volatile memory (NVRAM).
13 Huawei Confidential
Coffer Disk Technology
 For Huawei OceanStor storage, coffer disks are used to
store three types of data: cache data requiring power
failure protection, OceanStor OS system data, and
system configuration information and logs. The
storage system has two kinds of coffer disks: built-in
Coffer disks coffer disk and external coffer disk.
 The first four disks in the controller (for built-in mode)
or in the first disk enclosure (for external mode) are
coffer disk. Coffer disks are configured with RAID1,
Built-in BBU after storing the system data, other space is used for
the business data.
 Coffer disks can be used to protect cache data. The
BBU can provide power for the cache and coffer disks
to ensure that the cache data can be completely
flushed to the coffer disks.

14 Huawei Confidential
Contents

1 Storage Array Components & Architecture

2 Storage Array Technologies

3 Huawei Storage Products

15 Huawei Confidential
Pre-Copy Technology
The disk pre-copy technology enables the storage
system to monitor the disk status. When a


1
member disk in a RAID group is about to fail,
Normal status
The system monitors data on the disk is pre-copied to a hot spare disk,
the status of all disks. reducing data loss risks.
Data disks Hot spare disk
The disk status is determined by reading the
attribute of the self-monitoring, analysis, and


2
reporting technology (S.M.A.R.T.). When the disk
When one disk is
about to fail, the data is about to fail, the pre-copy technology enables
will be copies or data on the disk to be copied to and backed up
backed up to a hot
spare disk.
Suspected Hot spare disk
on the hot spare disk. By backing up data quickly
faulty disk to shorten or avoid long-time reconstruction after
the disk fails, the disk failure rate during
reconstruction is reduced and the product security
is improved.


After the disk is
replaced with a new Huawei RAID 2.0+ technology uses hot spare
disk, the data will be
copied to the new space instead of physical dedicated hot spare
disk.
New disk Hot spare disk disks, the copy/backup time will be reduced
remarkably, so that the multi-disk failure rate is
reduced during the pre-copy or copy-back period.
16 Huawei Confidential
Multipathing – Origination
Considering there is one LUN 0, there are two access paths to LUN 0, path 000 and path 100.
The following issues may occur:

X
0 0
0 Application abc 0 Application 0 abc
Application 0

0 0 Host/Server 0
Host/Server Host/Server
1 0 xyz
1 0 1 0

SPOF: If one path (for example, Confusion: The storage system Bandwidth waste: If the workload
path 000) is broken, the write recognizes two paths (path 000 is heavy, but all writes go through
request of the application to the and path 100), which have the path 000, the bandwidth of path
storage along path 000 will fail. same destination. Therefore, only 100 is idle and waste.
one data copy will be stored and
the other one will be discard.

17 Huawei Confidential
Multipathing – SPOF

Without multipathing With multipathing


Function Eliminating single
point of failure
Server Server
Multipathing
software

Application Scenario
HBA HBA

Multipathing technology can be


used for eliminating single point of
failures on HBAs, network
connections, controllers, or others
LUN LUN LUN
LUN LUN LUN to keep business continuous if any
hardware component failed.

Storage Storage

18 Huawei Confidential
Multipathing – SPOF
Multipathing
Multipathing
software
Server Server
Server Server Working mechanism:
software

 The multipathing software will monitor


the I/O paths of HBAs, networking, and
controllers to detect the failed or
HBA HBA
HBA HBA
recovered path.
 Failover: When an I/O path failed, the
multipathing software will find out
another path on the current controller
(if the HBA or networking fails), or
LUN LUN LUN
LUN LUN LUN switch to another controller (if the
controller fails).
 Failback: When the I/O path is
recovered, the multipathing software
Storage
Storage
will switch the I/O path to the primary
one, then switch services to the
Failover Failback
controller (if the controller fails).

19 Huawei Confidential
Multipathing – Load Balancing
Multipathing Multipathing
software Server software Server
Working mechanism:
 Typical load balance
algorithms:
 Round-robin: Dispatches I/Os
HBA HBA
to each path sequentially.
 Least-I/O: Finds out the path
with the shortest I/O queue
then dispatches the I/Os to the
path.
LUN LUN LUN  Least-load: Counts the load of
each path and dispatches I/Os
to the path with the lightest
load.

Storage

Load balancing
20 Huawei Confidential
Mainstream Multipathing Software
Storage vendors generally use three types of multipathing software:
1. Self-developed software, such as EMC PowerPath, HDS HDLM, and Huawei UltraPath
2. Plug-in adapter based on OS multipathing, such as IBM and HP
3. Native OS multipathing, such as MPIO
Comparison: Native OS multipathing software is simple to use and can meet almost all requirements. Vendors' self-developed multipathing has better
reliability and easier customization for advanced features.

Windows Linux AIX VMware ESX Solaris

OS MPIO DM-Multipath MPIO NMP STMS

Huawei UltraPath UltraPath UltraPath PCM (based on MPIO) UltraPath UltraPath

EMC PowerPath PowerPath PowerPath PowerPath PowerPath

SDDDSM (based on MPIO) DM-Multipath SDDPCM (based on MPIO) NMP SDD


IBM
RDAC RDAC RDAC VERITAS DMP

SecurePath SecurePath SecurePath STMS


HP
DSM (based on MPIO) HP-DM HP-PCM (based on MPIO) NMP DMP

HDS HDLM HDLM HDLM HDLM HDLM

NetApp DSM (based on MPIO) DM-Multipath MPIO NMP STMS

Veritas DMP DMP DMP DMP DMP

21 Huawei Confidential
Thin-Provisioning Technology
Thin LUN Actual data Physical space 8 KB
32 MB
Pool
8 KB
32 MB
Space
allocation
8 KB 8 KB
32 MB
8 KB

Capacity
on write
8 KB 8 KB
1. Write
operatio 8 KB 32 MB
n
2. Space allocation
or optimization Data volume: 32 KB Data volume: 32 KB
according to the mapping Allocated space: 256 KB Allocated space: 128 MB
table
Technical principles Technical advantages
 Capacity on write: When the allocated space is insufficient,  Efficient allocation policy: The 64 KB granularity improves
new space is allocated with a 64 KB granularity by default. efficiency in allocating small data blocks.
 Mapping table: Logical units and physical units (with a default  Diversified reclamation mechanisms: supporting
64 KB granularity) are associated by a mapping table. reclamation by VMware VAAI commands, Symantec
 Direct-on-time: redirecting I/Os from logical units to physical Storage Foundation commands, Windows Server 2012
units through a mapping table. commands, and full-zero page check reclamation

22 Huawei Confidential
Tiering Technology Overview

Multiple Single Application


Data Lifecycle
Applications

A single application with a


Multiple applications Data lifecycle
clear distinction between
running on one storage management
hot and cold data
system

Meet performance and capacity requirements and reduce TCO

23 Huawei Confidential
Huawei SmartTier for Block

1. The storage administrator adds different


Tiered storage pools types of disks to storage pools and starts
SmartTier.

2. SmartTier identifies I/O activities on each


I/O monitoring data block based on a data relocation unit.

3. Block Access Rate Ranking identifies hot data


Block Access Rate Ranking and cold data.

4. The data relocation module relocates data


Data relocation among storage tiers.

24 Huawei Confidential
Huawei SmartTier for File
NAS
Clients

NFS SMB File monitoring Collects statistics (file size/name/type/


a-time/c-time/m-time/uid/gid).

Pre-analyzes file capacity distribution


OceanStor according to the file attributes to help
File access rate ranking administrators understand space usage
Policy conditions:
and determine better tiering policies.
• Time-based
(creation, access,
modification) Relocates files on SSD or HDD according
SSDs HDDs
• File names File relocation to the policies, automatically or
• File extensions manually.
• File owner or group
• Quota tree
• File size
• SSD utilization

25 Huawei Confidential
SSD Cache Technology Overview

 Working principle
LUN/File System
 SSDs are used as the secondary cache for RAM cache.
 Read acceleration is available to LUNs and file systems.
Dedupe Meta  SSD cache partitioning is supported.
 Application scenario
RAM Cache  Random small-I/O read-intensive applications, such as
Oracle OLTP, SQL server, exchange, and file service
 Competitive advantages
SmartCache  Dynamic expansion and reduction, SSD resource quota
management, flexible open policy
 Read-only cache, SSDs without RAID protection, so
HDD SSD that capacity can be fully utilized

26 Huawei Confidential
Service Quality Assurance Technology Overview

Mixed applications with OLTP and backup Specific performance


varied importance levels co-exist requirements

Ensures performance of Restricts the maximum Allows users to set maximum or


mission-critical services in a performance of some services to minimum performance goals for
multi-service system prevent traffic burst from the application
affecting the performance of
other services

Do you know exactly how to allocate storage resources to different services?

NO YES
QoS Cache Partition

Achieve specific performance goals for applications

27 Huawei Confidential
Huawei SmartQoS Technology
Medium-priority High-priority Low-priority
applications applications applications  Service Quality Control
– SmartQoS helps mission-critical services obtain storage
resources in a timely manner to realize their performance
goals.

 SLA-based Management of Storage Resources


– Monitors application performance and achieves performance
goals.
Performance

 Policy-based Performance Optimization


– Sets performance goals for mission-critical applications.
– Sets performance upper limits for low-priority applications,
preventing resource contention.
Application – Sets QoS policies and implements them at different intervals.

Enables the optimum storage resources to serve the most important applications

28 Huawei Confidential
Huawei SmartPartition Overview

SmartPartition partitions system cache resources and protects


the performance of mission-critical applications.

Host
concurrency Technical principles
 Divides system cache resources into cache partitions of
Cache
different sizes.
 Allocates cache partitions to different applications.
 Adjusts the host concurrency and disk access concurrency
capabilities for each cache partition, and controls the
service quality of each application.
Benefits
 Dedicated cache partitions for service isolation and high
reliability
Disk
concurrency  Reserved cache resources for mission-critical applications,
improving service quality
Service 1 Service 2 Service 3 Service N  Applicable when the storage system carries various
services at the same time

29 Huawei Confidential
Data Reduction Technology Overview

Saving OPEX Prolong SSD life

Saves capacity, power, maintenance, Inline compression and deduplication reduce the
and OPEX from end to end data written to SSDs, which prolongs SSD service
life

Improving all-flash storage efficiency and extending lifespan

Some types of data cannot be reduced


The types include but are not limited to:
 Compressed data and databases, encrypted data
 Pictures, audio, and videos
 PDF and XML data

30 Huawei Confidential
Data Deduplication Mode
Post Processing Inline Deduplication Hardware Acceleration
(deduplication after storing) (deduplication before storing) (deduplication algorithm is implemented
using dedicated hardware, not using CPU
resources)

Deduplication
hardware

31 Huawei Confidential
Snapshot Technology – Overview

Backup & Restoration Development & Testing Continuous data protection

Copy the snapshot


Activate a snapshot to backup space HyperSnap
Copy 1 Copy 2 Copy 3
Activate a snapshot
Fast rollback
Source Snapshot Backup
Source Snapshot

Rapid online data backup and restoration Development & Testing Repaired logical error

Zero backup and rollback window High space efficiency Zero data loss

32 Huawei Confidential
Snapshot Technology – Mechanism
Host write to D

Before snapshot After snapshot After data change

Source Snapshot Source Snapshot Source


Volume Mapping Table Volume Mapping Table Volume Copy-On-Write (COW)

A B C D A B C D A B C D1 D
Modified data
Old data

Data "D" is copied and relations in the mapping table are


modified

Before snapshot After snapshot After data change

Source Source Source


Volume/ Volume/ Volume/
Active Snapshot Active Snapshot Active Redirect-On-Write (ROW)
File System File System File System

A B C D A B C D A B C D B D1 E1 E2
Deleted Modified New
data data data

33 Huawei Confidential
Continuous Data Protection Technology

Concept
 Continuous data protection (CDP), also called continuous CDP example
backup or real-time backup, refers to backup of data by
automatically saving a copy of every change made to that data,
and allows the user or administrator to restore data to any point
LUN TP TP+1 TP+2 ... TP+N
in time.
 In an ideal case of continuous data protection, the RPO= 0, RTO ≈
0. CDP CDP0 CDP1 CDP2 … CDPN
 There are 2 types of CDP technology. True CDP-based solutions snapshot
Rollback Create
can provide fine granularities of restorable objects, then it can snapshot
duplicates
back up and roll back data in any point of time. The near-CDP can Readable and Snapshot Snapshot

only back up data in a specified interval. writable snapshot duplicate duplicate

Application scenarios
 Data protection in seconds: CDP snapshots restore data on the
source LUN quickly.
 Data analysis and testing: Duplicates can be created for the CDP
snapshots and mapped to hosts for data analysis and testing.
34 Huawei Confidential
Mirror Technology Overview

Protect data in heterogeneous storage High availability

1. Redundant data
backups for
heterogeneous
storage systems High availability
protection for
2. Accelerated local LUNs
performance of
heterogeneous
storage systems

Protect data in heterogeneous storage High availability due to doubled data


and improve performance copies

35 Huawei Confidential
Huawei HyperMirror Technology Mechanism
1. Create a mirror LUN.
Converts a local or external LUN into a
Host mirror LUN, creates a mirror copy, and adds
a mirror copy for the mirror LUN for
redundancy.
2. Perform synchronization.
 Initial synchronization: Replicates all data
Mirror LUN from the mirror LUN to the new mirror copy
and writes data concurrently to both mirror
copies.
 Incremental synchronization: Replicates data
increments from the mirror LUN to the
recovered mirror copy after it is recovered
A B from Splitting or Interruption.
3. Implement mirror copy splitting.
Mirror copy Mirror copy The mirror copy is unavailable after
splitting.
36 Huawei Confidential
LUN Clone Technology Overview
A clone is created as an image of a LUN at the current point in time. Splitting a
clone creates a complete physical copy of the image.
HyperClone can be used for data analysis and testing.

4
2
1
3
Process Slave LUN
Master LUN Slave LUN Master LUN

1
Activate the HyperClone 2 synchronization is
Data 3 splitting, the
After 4 slave LUN can be
The
feature and start data complete. The master master LUN and slave mapped to host for data
synchronization. LUN and slave LUN LUN are independent of analysis, testing, etc.
have the same data. each other.

37 Huawei Confidential
LUN Copy Technology Overview
HyperCopy allows a target LUN to
obtain the full physical data copy of a
Source Destination source LUN at the current time. The
LUN LUN target LUN can be read and written
immediately, regardless of whether the
data copy is complete.

After a full copy is


Full Copy generated for the initial
synchronization, the follow-
Full copy is the up incremental copies will
complete data only duplicate the changed
duplication from data from last copy.
the source LUN. Incremental
Copy

38 Huawei Confidential
WORM Technology Overview
WORM: Write Once Read Many, write-once technology

Application Scenarios:
Financial securities (bills), government documents, legal
documents, and medical records.
Solution:
• Enterprise WORM (WORM-E)
• Regulatory Compliance WORM (WORM-C, SEC Rule
17a-4 & 17a-3)
WORM is widely adopted in archive solutions.
After Optical disc, tape library and disk storage (NAS) support
Write WORM.

39 Huawei Confidential
Multi-Tenancy Technology Overview
Storage Multi-tenancy efficiently separates the
administrator resource data of tenants and assigns the
management work of some resources to
tenants to make tenants manage resources in
their own virtual storage spaces.

 Rights- and domain-based management


The storage administrator can allocate LUNs to tenants, and
assign and manage tenant administrators based on different
right privilege.
 Resource management
A storage administrator has full resource management
permissions. A tenant administrator can only manage
resources in its virtual storage space.
 Data protection
A tenant administrator can independently configure data
A storage administrator manages all resources in a storage
protection functions for resources in its virtual storage space
array and all tenants.
and totally independent to other tenant.
A tenant administrator can only manage resources in its
virtual storage space.

40 Huawei Confidential
Huawei Full Stack Management

Database
VM VDI

DeviceManager SmartConfig DME eService


• Web-based GUIs • 3-step host • Unified storage • Cloud-based remote AI
• Step-by-step guide for configuration management services
FCAPS management  Add a storage • Topology and data path • 24/7 monitoring
device. analytics • 5-min service ticket creation
 Set the IP • Long-term log and • All-round health check
address. performance storage and • Regular performance
 Set the capacity. analytics analytics

41 Huawei Confidential
Storage Compatibility/Interoperability Overview
Storage is not a single system, it has to interact with other systems in
the data center, such as:
• Switches: FC / iSCSI
Application • Hosts: X86-64, Power
• HBA: QLogic, eMulex
• Hypervisor & OS: VMware, Hyper-V, KVM, Linux, Windows, AIX
• Applications: Oracle, SAP
• Others: Backup software, storage virtualization
Hosts Hypervisor Operation System
Storage interoperability/compatibility provides seamless resource
consolidation and cooperation among a large number of
heterogeneous storage resources by using standard interfaces.

Switch

Huawei Storage Interoperability Navigator


IT Open Lab
Storage

42 Huawei Confidential
VMware Interoperability – VAAI

VMware vSphere® Storage APIs – Array Integration (VAAI) define a set of "storage primitives" that enable the ESXi host
to offload certain storage operations to the array, which reduces resource overhead on the ESXi hosts and can
significantly improve performance for storage-intensive operations, such as:

VAAI-Block:
• Hardware Assisted Locking/Atomic Test & Set
• Full Copy/XCOPY
• Write Same (ZERO)/Block Zero
• UNMAP
• Thin Provisioning

VAAI-NAS:
• Full File Clone
• Fast File Clone/Native Snapshot Support
• Extended Statistics
• Reserve Space

43 Huawei Confidential
VMware Interoperability – VASA

vStorage APIs for Storage Awareness (VASA) is a set of application program interfaces (APIs) that enables vSphere vCenter to
recognize the capabilities of storage arrays. Such capabilities, including RAID, native thin provisioning and deduplication, are
made visible within vCenter.

VASA providers communicate with Virtual Center to indicate storage topology, capability
and state information which supports policy-based management, operations
management and DRS functionality. VASA providers help to identify trends in a VM's
storage capacity usage for troubleshooting, correlate events on the datastore and LUNs
with a VM's performance characteristics, and monitor health of storage.

44 Huawei Confidential
VMware Interoperability – vVol
vVol (Virtual Volume) is a provisioning feature for vSphere 6 that changes how virtual machines (VMs) are stored and
managed. vVols transforms SAN/NAS into VM-centric devices by making the virtual disk a native representation of the VM at
the array level, and enables app-centric, policy-based automation of SAN and NAS based services.

Benefits of vVol:
• Enables an administrator to apply a policy to a VM
which defines the various performance and service-
level agreement requirements, such as QoS,
replication or deduplication.
To use vVols, the storage hardware has to support the
vStorage APIs for Storage Awareness (VASA).

45 Huawei Confidential
VMware Interoperability – SRM
Site Recovery Manager (SRM) leverages VMware Infrastructure to deliver advanced disaster recovery management and
automation to ensure it is rapid, reliable, manageable, and affordable. VMware Site Recovery Manager integrates with third
party storage arrays and replication appliances to provide a complete integrated Business Continuity solution. This
integration is achieved through a unique Storage Replication Adapter.

Function of SRM:
• Planned Migration
• Disaster Recovery

46 Huawei Confidential
Contents

1 Storage Array Components & Architecture

2 Storage Array Technologies

3 Huawei Storage Products

47 Huawei Confidential
Huawei Intelligent Data Storage Portfolio
Solutions
OceanProtect Data Protection
Solution

Disaster Recovery (DR) Solution Backup Solution Archiving Solution

Data Management
Device Management Data Management Engine Intelligent O&M

DeviceManager DME Storage eService

Intelligent Storage
All-Flash Storage Hybrid Flash Storage Mass Data Storage HCI

OceanStor Dorado OceanStor Dorado OceanStor 18500/ OceanStor 6800 OceanStor Pacific FusionCube 1000
18000 8000 18800 Series Hypervisor/Data

OceanStor Dorado OceanStor Dorado OceanStor OceanStor OceanStor OceanStor 9000 FusionCube 1000 Cabinet
48 6000Huawei Confidential
5000 Dorado 3000 5300/5500/5600/5800 2600
Thank you. Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2021 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.

You might also like