ST Unit 2
ST Unit 2
ST Unit 2
Components
Storage Implementation
2 Networking Technologies ,Benefits
Components
transfer modes which allows for higher frequencies with a lower risk of data loss
" Defined standard
up to 8.4G
CHS/LBA translation methods for support drives
TECHNICAL PUBLICATIONS- An up thrust for
knowledge TECHNICAL PUBLICATIONS - An up thrust for knowiedge
Storage Networking Technologie
2-6
Management
InformationStorageand Information Storage and Management 2-7 Storage Natworking Technologies
Introduction to Parallel SCSI
2.3 2. SCSI devices are "smart" devices with their own control circuitry. They can
System Interface (SCSI).
SCSIis also referred to
as aSmall Computer "disconnect" themselves from the host adapter to process tasks on their own, thus
" Parallel interface
a computer bus and a set freeing up the bus for other transmissions.
Small Computer System Interface (SCSI) is transfer between of
" connectors and data computers and data 3. The bus can handle simultaneous reads and writes.
standards for physically
storage devices. Evolution and SCSI Interface:
" The SCSI standards defines protocols, commands, and electrical and optical
" SCSI-1 : It is basic SCSI version and approved by ANSI. It define cable length,
interfaces.
as 7 or 15 total devices. The SCSI
command and transfer modes, characteristics etc. It supported only by single
SCSI is a bus that supports as many
called the host adapter, functions as the
gateway between the SCSI bus and controler, ended transmission.
" SCSI-2 :It focus on improving performance and additional features of the SCSI-1
PC system bus. interface.
The SCSI bus does nos .,
. Each device on the bus has a controller built in.
directly with devices such as hard disks; instead, it talks to the controller that is SCSI Type Speed Bus width
" SCSI is normally implemented in host adapters, which provides a shared bus t Fast SCSI 10 MB/s
which peripheral devices attach. Fast Wide SCSI 20 MB/s 16
. SCSI1accommodated a maximum transfer speed of 5 MBps, at 5 Mhz on an 8-bit Ultra SCSI 20 MB/s
bus which means that it was a 'narrow' implementation
Wide Utra SCSI 40 MB/s 16
" In theSCSI cable, each bit of a data byte is given its own wire. A SCSI cable may
Ultra2 SCSI 40 MB/s
have 8 (narrOw SCSI) or 16 (wide SCSI) data lines, plus control lines to manage
device selection and data transmission. Wide Ultra2 SCSI 80 MB/s 16
" Communication on the SCSI bus Request Ultra 160 SCSI 160 MB/s 16
Client machine Server machine
takes place between a device that Ultra 320 SCSI 320 MB/s 16
initiates the transfer and (Initiator) Response (Target)
destination device. Serial Attached SCSI 3 Gb/s N/A
Fig. 2.3.1
shows SCSI Communication. Fig. 2.3.1
" At any time, communication is performed only between two devices, one initiator 2.3.1 SCSI-3 Architecture
that selects and controls the target device that
performs the requested operation. " Fig. 2.3.2 shows SCSI-3 architecture and it was approved and published as the
Clients called Initiators issue requests and Severs standard X.3.270-1996 by the ANSI.
called
initiator requests. SCSI commands sent in units called Targets respond
Blocks. Command Descriptor Blocks (CDB) is the data Command Descriptor " This architecture helps developers, hardware designers, and users to understand
the command parameters that are to structure used to contain and effectively utilize SCSI.
be handed by an initiator to a " SCSI architectural model consists of three components:
" Some of the target.
features of the SCSI interface are list
1. The original SCSI standard below : 1. SCSI-3 command protocol : It contains primary commands which are common to
new standards support
supports up to 7 devices on a single host all devices as well as device-specific commands that are unique to a given class of
lengths of up to 12 meters. high-speed operation with up to 16 devicesadapter, bu!
and bus
devices.
2. Transport layer protocols : These are a standard set of rules by which devices
communicate and share informnation.
2. SCSI Transport Protocol Layer (STPL) : It is used for communication between an The CDB consists of a
one-byte operation code followed by some
initiator and targets. It contains the services and protocols for communication. command-specific paramneters. The parameters need not be a full byte long, and
3. Interconnect layer : This layer facilitates data transfer between the initiator and the parameter length varies from one command to another
targets. The interconnect layer is also known as the service delivery subsystem The CDB defines the operation to be performed by the
device server.
and comprises the services, signalling mechanisms, and inter-connects for data For all commands, if the logical unit detects an invalid
transfer. parameter in the CDB, then
the logical unit shall complete the command without
information.
altering the media
2.3.3 Difference between SCSI and IDE
All CDBs shall have an OPERATION CODE as the first byte
SCSI IDE Operation code:
Data transfer speed is 320 MB/S Data transfer speed is 100, 133 and 150 MB/s Operation code consists of command and group code. Fig. 2.4.2 shows operation
code.
It supports 16 devices It supports 2 devices
Performance is high Performance is moderate to low Bit
Itsupports internal and external connectivity 7 6 5 4 3
It supports internal connectivity 2 1
Ease of Configuration is high
Ease of Configuration is low Group code Command code
2.4 SCSI Comnmand Model Fig. 2.4.2 Operation code
" In SCSI standards for
transferring data between computers and
often computer storage,
The three-bit GROUP CODE field provides for eight groups of
command codes.
(CDB). commands are sent in a Commandperipheral deyD The five-bit COMMAND CODE field provides for thirty-two command
codes in
Descriptor each group. A total of 256 possible operation codes exist.
TECHNICAL PUBLICATIONS - An up
thrust for knowledge TECHNICAL PUBLICATIONS- An up thrust for knowledge
2-12
Storage NetworKing Technologia.
Management
and Information Storage and Management
InformationStorage 2-13 Storage Networking Technologies
below:
commandsare listed
SCSI
" Common Remarks SANs are primarily used to enhance storage devices, such as disk arrays, tape
Command
libraries, and accessible to servers so that the devices appear like locally attached
Read data fromn a
device devices to the operating system.
READ
Writes data to a
device " SAN systems provide a simple, untyped, fixed-size (block), memory-like interface
WRITE
Returns basic information for manipulating nonvolatile magnetic media. SAN is used when multiple servers
INQUIRY
need access to the same data (example : databases).
numbers
Lists the logical unit A SAN is a high-speed network of storage devices, separate from the local area
REPORTS LUNS
whether it is ready for data transfer
TEST UNIT READY Oueries the device to check network that also connects those storage devices with servers. It provides
from log pages block-level storage that can be accessed by the applications running on any and all
LOG SENSE
Returns current information servers connected to the SAN. SAN storage devices can include tape ibraries and
pages of a SCSI target device
LOG SELECT Used to modify data in the log more
commonly, disk-based devices, like RAID hardware.
mode pages
MODE SENSE Returns current device parameters from A storage area network is designed for managing very large amounts of network
page storage. For large organizations with many servers that need access to the same
MODE SELECT Sets device parameters on a mode
data, SAN offers better performance and flexibility than DAS or NAS.
" Storage area network is defined as a set of interconnected devices and servers that
2.5 Storage Area Networks are connected to a common communication and data transfer infrastructure such
" SAN stands for storage area network. A
storage area network is a dedicated as fiber channel. The purpose of the SAN is to allow multiple servers access to a
storage. ig. 2.5.1
network that provides access to consolidated, block level data pool of storage in which any server can potentially access any storage unit.
shows storage area network. A SAN is a network designed to transfer data from servers to targets and it is
alternative to directly attached target architecture, or to a DAS architecture, where
Client LAN /WAN the storage is connected to the servers on general purpose networks.
A SAN can be considered as an extended and shared storage bus within a data
center, consisting of various storage devices and specific interfaces (eg.fibre
channel ) rather than the Ethernet. SANs provide high-bandwidth block storage
access over long distance via extended fiber channel links.
Server
SAN features
TECHNICAL PUBLICATIONS - An up thrust for knowledge TECHNICAL PUBLICATIONS- An up thrst for knowiedge
Storage Networking Technologi
2-14
Management Information Storage and Management 2-15
Information Storage and Storage Networking Technologies
technologies. This allowe
LAN/WAN, it can use a variety of 2.6.1 Fibre Channel Architecture
8. Scalability like a data replication be
operations, file migration and
relocation of backup data, Fibre channel transfers digital data between sources and users of
systems. inforrmation. This
digital data represents different types of information like programs, files, graphics,
2.6 Fibre Channel videos and sound. Each having its own structure, protocol, connectivity, measures
chan of performance and reliability requirernents. Fig. 2.6.1 shows
transmission technology used sa peripheral network connection
" Fibre channel is a high-speed serial, data communicat example.
or networkbackbone. It is a 100 MB/sec, full-duplex,
technology.
protocols like internet protocol and SCSI Client machine Client machine Client mnachine
" FC supports several common transport
operates over copper and fiber optic cables at distances of up to 10 kilometers.
Fabric
which is based on a series of ANC
. Fibre channel is a multi-layered network, Dort
standards that define characteristics and functions for mnoving data acrOss A
network. These standards incude definitions of physical interfaces. Example. Storage devices
include : Cabling, distances, and signaling; data encoding and link controls; dab Printer
delivery in terms of frames; flow control and classes of service; common services Server
and protocol interfaces.
" Fibre charnel architecture includes a significant amount of hardware processing to Node port
deliver high performance.
" Fibre channel uses a serial data transport scheme, similar to other comnputer
networks, which stream packets (frames) of bits, one behind the other, in a single Fig. 2.6.1 Network connection
data line to achieve high data rates.
" Fibre channel is designed to transport many protocols, such as FDDI, serial HIPPI,
FC offers a layer 2 transport services, and uses layer 3 services to provide it, and
to map upper layer protocols like SCSI, HIPPI, IP or others.
SCSI,IPL.
1. FCO defines the physical interface (data rates, connectors, media, distances, power
" Why use Fibre Channel for SAN ? and so on). This also includes electrical and optical characteristics, transmission rates,
" Fibre charnel is the leading technology for and other physical components of the standard.
implementing SANs today because it
meeting the requirements of today's applications. FC is fast, 2. FC1 deals with encoding/decoding of bits on the physical interface and low level
speed of up to 1 Gbps with 2, 4 and 10 Gbps in the works. currently supports
it
signaling. Every 8 bits of data are encoded into a 10 bit transmission character.
It allows storage devices to be accessed by all 3. FC2 defines framing and classes of services. FC-2 is called the signaling protocol
servers on the SAN thus
reliability. It supports several different topologies. The topologies haveimproving level. It is responsible to break the data to be transmitted into frame size, and
levels of cost to capabilities tradeoffs, thus varying reassemble the frames after transport. It specifies the framing rules of the data to be sent
small, reliable setup and scale up as needed. allowing organization to start with a from one port to another, ways for controlling the three service classes, and controlling
In general fibre channel provides speed, the sequence in which the data is transferred.
reliability, distance, and
at a low cost. It guarantees
any protocol or bandwidth and delivery while being connectivity; al
able to handle
4. FC3 provides common services like multicasting or possibly encryption.
topology. 5. FC4 maps upper layer protocols onto fiber channel. This layer defines the
application interfaces that can be run over fibre channel. Both network and channel
protocols can concurrently run over the same physical interface providing seamless
integration of starndards
TECHNICAL PUBLICATIONS- An up thrust for TECHNICAL PUBLICATIONS- An up thrust for knowledge
knowledge
2-16 Storage Networking Technolooio.
Information Storage and Menagement Information Storage and Management 2-17 Storage Networking Technologies
FC-SAN
2.7 Components of Outer
storage and network infrastructure. jacket Strength
component of SAN is server, node ports, cabling, These member
" Basic key elements are
componernts consists of some management software.
storage array
interconnecting device and SAN Cladding glass
1. Node Port library. These all devices
hosts, storage and tape Core glass
" Fibre channel consists of destination Dork
one or more source or
called as nodes. Every node is
information transfer. For communicating with other node, physical interface : Inner Fiber
ports
required for every node port. These and Transmit data
Coating
of an HBA Port 0
are integral components Receive data Fig. 2.7.2 Single mode
storage front adapters.
data
" Node port operates in full duplex
Port 1 Cladding glass
transmit
transmission mode. It also uses
link and a receive link for communication Port 2
with other device. Fig. 2.7.1 shows the
nodes, ports and links. Fig. 2.7.1 Node Core glass
" A node may be a workstation, disk drive
Fig. 2.7.3 Multimode cable
or disk array, a medical scanning instrument, etc. Each node can have more than
one port. A port can be an adapter including a part of software in the host: The index of refraction between the core and cladding of single mode changes less
sometimes it is difficult to say exactly where a port ends and the node begins. than it does for multimode fiber, creating little dispersion.
Some parts of software may be shared by several ports. Fig. 2.7.4 shows standard connector.
2. Cabling A fiber-optic cable connector that
SC
" Fiber optic cable is used for implementation. For back end connectivity and shorter uses push-pull latching
distance copper cable can be used. The mode of a fiber refers to the number of mechanism similar to common
paths for the light rays within the cable. Fiber optical cable are of two types audio and video cables. For
a. Single mode fibers are capable of carrying only one signal of a specific bi-directional transmission, two fiber La
wavelength. Single mode fiber allows propagation of light ray by only one path. cables and two SC connectors (Dual
Intermodal dispersion does not present. Fig. 2.7.2 shows single model fiber. Due Fig. 2.7.4 SC Connector
SC) are used.
to little signal dispersion, single mode fiber is widely used for long-distance
SC connectors are used with single-mode and multimode fiber-optic cables. They
transmission. Optical media converters are used to do the fiber to fiber conversion
to connect two different transmission modes, making single mode offer low cost, simplicity and durability. LC connectors are used with single-mode
fiber efficiernt in and multimode fiber-optic cables. Two simplex SC connectors can be clipped
long-distance transmission. Fig. 2.7.2 shows single mode. together by a reusable duplex holding clip to create a duplex SC connector.
b. Multimode fiber allows multiple paths for accurate
weakens the signal, reducing the length and speed
light ray to propagate. This strateg) " The LCconnectors are constructed with a plastic housing and provide for
Intermodal dispersion exists. Multimode fiber transmits the data signal can travel. alignment via their ceramic ferrules. LC connectors have a locking tab. LC
multimode paths for its larger core. Those multimode fibers signals throug connectors are rated for 500 mating cycles.
distortion at the receiving end in long-distance can cause signa
unclear and incomplete. Fig. 2.7.3 shows transmission, making signa
multimode cable.
TECHNICAL PUBLICATIONS- An up thrust for knowiedge
TECHNICAL PUBLICATIONS- An up thrust for
knowledge
Storage Networking Technologji
2-18
Management Information Storage and Management 2-19 Storage Networking Technologies
and
rmationStorage
Interconnectdevice interconnectingdevices, " Using specialized algorithms, several drives are grouped to
provide common
directors as FC-AL. levels, define
SAN uses hub, switchand communication device used in Star topology pooled storage. These RAID algorithms, commonly known as RAID
" physical connected with hub,
is
a. Hub : Hub for connecting nodes.
Device
routing for a Fibre Channel
h shares the characteristics of the particular grouping
and replication features
hub device
bandwidth. Ahub
provides centralized
devices directly
together, each device is connected arbitrale " Most storage arrays provide additional data protection
such as snapshots, internal copies and remote mirroring
loop. Instead of
connecting connection from device to device. Fig. 275
hubcompletes the SAN management software
2ort on a hub. The connections, storage elements and
hub with device. " SAN management software organizes the
s system. SAN management software does this
Hub computer systems in a SAN storage
so that data transfer is secure and robust.
planning and monitoring of storage
" SAN management software can also help with mid-sized businesses
systems. The software can be provided for large enterprises,
commercial product or as
and small companies. The software may be offered as a
solution.
Disk Tape an open-source or free
Cient Server aray library device discovery, allocation, RAID
machine
" The management applications (zoning, environment of distributed systems.
Fig. 2.7.5 hub subsystems and others) manage the complex
and improve the quality of
These applications can significantly reduce the cost
hub port has a port bypass cirguit
. The mn advantage of a hub is that each responding, it closes the PBC
enterprise information services.
PBO Ea port detects that a device is absent or not connection
allowing the loop to remain intact. This prevents a
failing device or 2.8 FC Connectivity
from bringing down the entire loop. area networks today is Fibre Channel.
the The primary technology used in storage
b. Switch : Switch is more intelligent than hub and they do not share Fibre Channel Topologies defines three configurations :
bandwidth SAN Switches can connect both servers and storage devices and thus
a. Point-to-point
provide the connection points for the fabric of the SAN. They are the medium
through which servers and storage devices communicate to each other. As such, b. Fibre Channel Arbitrated Loop (FC-AL)
they have physical ports used to interconnect servers, storage devices and other c. Switched Fibre Channel Fabrics (FC-SW)
switches. FC terminology includes the concept of port typing. For smaller SANS,
the standard SAN switches are called modular switches and can typically suppot 2.8.1 Point-to-Point
8 or 16 ports. Sometimes modular switches are interconnected to create a Point-to-point fibre channel is a simple
fault-tolerant fabric. For larger SAN fabrics, director-class switches provide a way to connect two and only two
larger port capacity (64 to 128 ports per switch) and built-in fault tolerance. devices directly together, as shown in
" The fiber channel standards specify electrical and optical transmission media, as channel
Fig. 2.8.1 below. It is the fibre Host Storage
well as conventions for signaling and transmission/functional protocols. Optcal equivalent of Direct Attached Storage configuration
Fig. 2.8.1 Point to point
medium (with SC, LC, and MT-RJ connectors) supports reliable signaling ove (DAS). other device's
long distances. connectionis directly linked by a Fibre to the
" One device's "ransmit"
Storage arrays "receive" connection, and vice versa.
Storage arrays rarely provide hosts direct access to configuration.
storage array uses RAID individual drives. Instead, Point-to-point is not a scalable enterprise
technology to RAID uses offers limited connectivity.
group a set of drives.
independent drives to provide capacity, performance " Point to point configuration
and redundancy.
thrust for knowledge
TECHNICAL PUBLICATIONS - An up
TECHNICAL - An
Storage Networking Technologies
2-18
end
Management Information Storage and Management 2-19 Storage Networking Technologies
InformationStorage
interconnecting devices.
3. Interconnect device
directors as Using specialized algorithms, several drives are grouped to provide comnon
usedin FC-AL. Star
switch and
SAN uses hub, physical communication device connected with hub, shares topology usey pooled storage. These RAID algorithms, commonly known as RAID levels, define
the characteristics of the particular grouping
Hub : Hub is connecting nodes.
Device
Channel the
routing for a Fibre
a.
N_Port
FC-1 Signalling, encode/decode including 8b/10b
FC switched
NPort FPort/
fabric
Port
E Port FC -0 Lasers, cables, connectors, data rates(x Gbps)
E Port Fig. 2.10.1 Fibre channel protocol stack
3. FC-2 is called the signaling protocol level. It is responsible to break the data to be
F Port transmitted into frame size, and reassemble the frames after transport. It specifies
NPort
the framing rules of the data to be sent.
FL Port
4. FC3 Layer : FC-3 provides the Fibre Channel Generic Services (FC-GS) that is
required for fabric management. Specifications exist here but are rarely
NL Port NL Port impiemented.
5. FC-4 : This layer defines the application interfaces that can be run over fibre
NL Port NL Port channel. Both network and channel protocols can concurrently run over the same
Fig. 2.9.1 Port in fabric
physical interface providing seamless integration of standards.
2.10 Fibre Channel Architecture " Node ports are N_port and 1-239 0-255 0-255
" Fig. 2.10.1 shows fibre channel protocol stack. NL_port in a public loop and
1. FC-O Layer : It defines the physical NL_port in a private loop. |ldentifies the ldentifies the Identifies the
transmission medium and specifies which Fig. 2.10.2 shows 24 bit FC
switch number switch port N_port
physical signals are used to trarnsmit the bits 0 and 1.
address of N_port. Fig. 2.10.2 Bit FC address ofN_port
2. FC-1 defines all transmission
protocols
rules, special characters and error control.including8 serial encoding and decodiig The 24-bit field is composed of three bytes :
10 bit Every bits of data are erncoded nto a
transmission character. 1. First byte (Domain ID) : This is the address of the FC switch or director. It is
unique to the fabric. There are theoretically (256 - # reserved addresses) = 239
switches possible in a SAN fabric.
Ntindiypeviduapon
of the address is 2-25
Storage Networking Technologies
Second byte (Area ID) : This part 3rd byte. Identifies
2.
The Area ID is very similar to the Start of Frame Frame Header
switch ports. Data Field CRC End of Frarne
a switch. [4 Bytes] (24 Bytes]
that is connected to [O to 2112 Bytes] [4 Bytes]
identify a single FC object on the [4 Bytes]
: This address is used to Fig. 2.10.3 Frame format of FC
3. Third byte (Port ID) addresses for identifying attached
N_Ports. 1. Start of Frame
frame
: SOF acts as a delimiter. It is one type of
SAN fabric. It provides 256 simple calculation flag and indicates
" To arrive at the
number of available addresses
is a based on: whether the frarme is the first frame ina sequence of
frame.
Domainx Area x Ports 2. Frame Header: It contains addressing information of the frame. Header
addresses available
256 x 256 = 15,663,104 information can includes source ID, destination ID, sequence number etc. The
This means that there are 239 x frame header is used to control link applications, control device protocol
and detect missing or out of order franmes.
transfers,
2.10.1.1 World Wide Names
addresses that identify them in an Do
Nodes and ports have unique 64-bit 3. The 4 bytes Cyclic Redundancy Check (CRC) precedes the EOF delimiter. CRC is
assigned by the manufacturer with
topology. These addresses are committee.
used to verify the integrity of the frame header and payload fields. This helps
vendor-specific portion defined by the IEEE standards detect errors in a frame.
2. The time to set up and terminate a connection may take much longer than the No guarantee of
amount of time required to transfer an information block. Delivery of frame Order delivery No guarantee of order
order
3. During connections,bandwidth is wasted when the links are idle while devices are
performing other tasks. Frame acknowledgement Acknowledged Acknowledged Not acknowledged
b. Class-2 service : This service is connectionless and based on a frame-switched Moderate High
Utilization of bandwidth Poor
mode of operation where switching is performed for each frame. In Class-2, frames can
be multiplexed between a source device and one or more destination devices. Support for multiplexing No Yes Yes
Fabric login
" Login types of three types : Port login, Process login and
" Port login : Port login is also known as PLOGI. It is used to establish a session
between two N_Ports and is necessary before any upper level commands or Storage array
operations can be performed. During port login, two N_Ports (devices) swap
service parameters and make themselves knoWn to each other.
" Process login is also known as PRLI. Process login is used to set up the
environment between related processes on an originating N_Port and a responding
N_Port. Fig. 2.12.1 Zoning
Fabric login : Performed between an N_Portand an F_Port. To log on to the fabric, Zoning provides access control in the SAN topology. Zoning defines which HBAs
a node sends a FLOGI frame with the WWNN and WWPN parameters to the can connect to which targets. When you configure a SAN by using zoning the
login service at the predefined FC address FFFFFE (Fabric Login Server). In turm, devices outside a zone are not visible to the devices inside the zone.
the switch accepts the login and returns an Accept (ACC) frame with the assigned
FC address for the node. Immediately after the FLOGI, the N_Port Zoning has the following effects :
registers itself 1. Reduces the number of targets and LUNs presented to a host.
with the local Name Server on the switch, indicatng its WWNN,
WWPN, port 2. Controls and isolates paths in a fabric.
type, class of service, assigned FC address and so on. After the N Port has logged
in, it can query the name server database for
information about all other logged in 3. It can be used to separate different environments, for example, a test from a
ports. production environment.
Reasons for zoning
2.12 Zoning 1. Zoning reduces or eliminates cross talk between initiator HBAs.
FC or FCoE port
" SAN zoning is a method of arranging 2. Zoning reduces the number of available paths to a particular
over the physical configuration of the Fibre Channel devices into logical groups and reduces the number of paths between a host and a particular LUN that is
fabric. SAN zoning may be utilized to
visible.
Fig. 2.13.1 (b) Full mesh Fig. 2.13.3 Single core topology
. Full mesh topology : In this topology, every switch is connected to every other 2.13.3 Benefit and Limitation of Core-edge Fabric Topology
switch. This type of topology is suitable when the number of switches involved js Benefits:
small. Even number of switches is used while designing fullmesh topology. 1. It provides one hop storage access to all storage.
" In a partial mesh topology, several hops or 1SLs may be required for the traffic to 2. Used in larger environment.
reach its destination. Hosts and storage can be located anywhere in the fabric, and
storage can be localized to a director or a switch in both mesh topologies. Odd 3. The servers and storage are on different switches, this topology provides ease of
numbers of switches are used while designing partial mesh topology. managemnent as well as good performance.
Limitations : Storage and core connections are in contention for expansion. In
2.13.2 Core-Edge Fabric other words, this topology allows for only minimal growth.
" Core-Edge is a reference topology widely used in the layout of SAN fabric. 2.14 Network Atached Storage
" Hosts are attached to smaller port count 'edge' switches, which are attached to the
" NAS stands for Network Attached Storage. NAS is a file level computer data
core switch via ISLs. This topology can grow to hundreds of ports while ensuring
that hosts only have to traverse two switches to access their storage. storage server connected to a computer network providing data access to a
by its
Hosts that
require lower latency or higher throughput can be connected directly to the core heterogeneous group of clients. It is specialized for serving files either
switch. hardware, software, or configuration.
file-based storage
" The edge tier NAS devices are storage arrays or gateways that support
contains switches and offers an inexpensive approach to CiFS, and are typically connected via an IP network.
more hosts in a fabric. Fig. 2.13.2 shows adau's Protocols such as NFS and
single core topology.
TECHNICAL PUBLICATIONS- An up thrust for knowledge TECHNICAL PUBLICATIONS- An up thrust for knowledge
Storage Nel
2-34 lbgies laformation Storage and Management
Management 2-35 Storage Networking Technologies
Storage and connectivity,
Information
methodologies for storage configurability. either 2.15 Benefits of NAS
support two further
Most NAS
devices will provide even
fabric attach, which
direct attach or
1. NAS Support NFS and CIFS file system.
utilization options. and hierarchical interface. NAS 2. Entry level NAS systens are quite inexpensive.
typed, variable-size
provide a richer, magnetic media, usually through
a 2 NAS ensure security and user authentication.
NAS systems interface with non-volatile
systems internally ensure data reliability. A Tt helps for easy and fast communication.
SAN-like interface to
contain u
file system. NAS Systems
network between client and
as much metadata a 5. NAS appliances already include integrated mechanisrns for backup, data
" NAS places a interprets metadata, so they do not send the synchronization and data replication.
file sys-tem that trusted less, mainly operating
network. NAS systems have traditionally these clients. A Simple to administrate, even remotely, i.e. from another location.
the but not the users
of
systems of their clients within the server but can exist
7 NAS device may support one or more RAID levels to
make sure that individual
be located
device does not need to networked NAS devi disk failures do not result in loss of data.
"A NAS
LAN and can be made up of multiple
anywhere in a hard disks, often arranged into logical, 8. NAS is a much simpler and less expensive technology.
contain one or more
NAS systems usually RAID arrays.
redundant storage containers or server-centric SvSto 2.16 Network File Sharing
any of the activities that a server in a
" NAS does not provide NAS allowe
such as e-mail, authentication or file management. uilizos
.A file can be informally defined as a collection of data, which can be logically
typically provides, network that already viewed as a stream of bytes.
to be added to a
more hard disk storage space upgrades.
down for maintenance and Afile is the smallest unit of storage in the UNDXfle system.
servers without shutting them arranged into logical
NAS systems contain one or more hard disks, often The file system has a hierarchical structure with its highest level directory called
" RAID arrays root (denoted by ). Immediately below the root level directory are several
redundant storage containers or
subdirectories, most of which contain system files.
NAS Devices
2.14.1 General Purpose Servers vs 2.16.1 Accessing a File System
function. It supports operation like
" NAS device is optimized for file serving
storing, retrieving and accessing file for client
and application. File system is mounted before use of it. During boot process, OS mounts a local
purpose server runs on any file system.
" NAS device is dedicated to file serving. General to
operating system. The mount system call connects the file system in a specified section of a disk
system hierarchy, and the unmount system call disconnects a file
the existing file
" NAS device has a real time OS and it uses open standard protocol.
single hardware system from the hierarchy.
" Like traditional file servers, NAS follows a client/server design. A access data in a disk section as a file
head, acts as the interface between the The mount system call allows users to
device, often called the NAS box or NAS
NAS and network clients. system instead of a sequence of disk blocks.
" File systems created on other
devices can be atached to the original directory
These NAS devices require no monitor, keyboard or mouse. They generally run an mount is established, users are
hierarchy using the mount mechanism. When
embedded operating system rather than a full-featured NOS. One or more disk
unaware of crossing mount points.
drives can be attached to many NAS systems to increase total capacity. Clients structure called the mount table that allows
always connect to the NAS head, however, rather than to the individual storage Kernel maintains a system-wide data
single directory hierarchy.
devices. multiple file systems to be accessed via a in a collection.
lists files and subdirectories
Drectory is a data structure that
entries one for each ile.
Directory structure contains a list of
up thrust for knowledge
TECHNICAL PUBLICATIONS - An
TECHNICAL PUBLICATIONS - An up thrust for knowledge
Information Storage and
Menagement
2-36
yTecnnologiss Information Storage and Management
2-37
Storage Networking Technologies
The root file system has
directory /. " Network File Systen (NFS) is
The root is identified by the
subdirectories. UNDX and
Linux based file system uses slash (/) for
specifyingseveralroot and Common Internet File
protocol.
standard for
Systern (CIFS) isUNIX client-server file sharing protocol
standard
directory. Iroot Windows
operating system
contain The NFS client maintains a cache of file and
"A directory can
settings will not ensure that files created or directory
modified on one attributes.
A The
any number of files.
directory can also contain on another system within a minute of file
creation or systern will be default
visible
subdirectories. Because a Network file system is common distributed
fle
modification.
directory is nothing more bin etc dev Usr
vmunix . Email and FTP is used for sending sharing system.
than a special kind of file, information
protocols will not support true file sharing. to remote users. But
these two
directories also have
Passwd local
Domain
to map the host name to network address translation forName Systen (DNS) is used
names. Passwd
the Email and FIP. The DNS is a hierarchical the internet. DNS
replace
" Fig. 2.16.1 shows UNDX Fig. 2.16.1 UNIX directory structure Industry is moving towards the new technology. Sonaming
distributed
system.
directory structure. new protocol called
leaf nodes Iightweight Directory Access Protocol (LDAP) is used for secure
The tree consists of files and directories, with the files at the naming service. distributed
about the files and other directories L.
directory contains name information
IDAP allows user to search for an individual
resides in it.
located.
without knowing where they are
2.16.2 Network File Sharing An
LDAP directory can be distributed among many
servers. Each server can have
a replicated version of the total directory that is
. Files are shared between numbers of users. File protection, naming and sharing is synchronized periodically.
e An LDAP server is called a Directory System Agent. An
issue for ile sharing. Directory structure may be allows files to be shared by LDAP server that receives
users. Sharing must be done through a protection scheme. a request from a user takes responsibility for the request, passing it to
other DSAs
as necessary, but ensuring a single coordinated response for the user.
" Afile is logically a container for data. Users may create a file and store data by
writing it to the file. UNDX file does not contain the end of mark. File size is not 2.17 Components of NAS
stored in the file and even its name.
" In UNDX operating system, file owner can perform all operation on a file. Group " NAS Consists of following components :
1, CPU and memnory
member can execute one subset of those operations and other than the group user
can execute another subset of operations. 2. NIC
iNetwork Network
interface i
Tinterfacei
NAS
Fig. 2.19.1 Integrated
Ethernet Ethernet
2.19.2 Gateway NAS switch LAN
allows the NAS gateway to use shared, nonproprietary storage, which provides FC
the flexibility for an effective and scalable storage strategy. Fiber
. When deploying NAS gatewas, it is important to select the right shared storage channel
Switch
platform to house your organization's data.
FO
" Fig. 2.192 shows NSA gateway.
" Afront end to disk storage that is highly scalable. A NAS gateway functions like
a diskless file server with urnlimited storage. Unlike the traditional NAS device.
which contains the file sharing protocol for access, the file system for storage and
the disks themselves, a NAS gateway contains only the file sharing protocol and
the file system.
RAID array RAID array
Irtegrated network
FC Fig. 2.19.2 (b)
Switch
atached siorage
Fibre " The front end of the NAS gateway connects to the LAN over Ethernet. The back
channel end connects to a RAID array via Fibre Channel or to a Fibre Channel switch, in
SAN which case the NAS gateway becomes a front end to a storage area network.
UNDX system client
Windows operating Gateway NAS Connectivity
systerns client Communications between the NAS gateway and the storage system in a gateway
solution is achieved through a traditional FC SAN.
Fig. 2.19.2 (a) Gateway NAS
1o deploy a gateway NAS solution, factors, such as multiple paths for data,
redundant fabrics, and load distribution must be considered.
TECHNICAL PUBLICATIONS- An up thrust for knowledge TECHNICAL PUBLICATIONS - An up thrust for knowiedge
Management
2-42
NAS
nologies Information Storage and Management
2-43
Infometion Storage and
Integrated NAS and Gateway 2.20.1 NFS Storage Networking Technologies
2.19.3 Difference between Gateway NAS
" Network File System (NSF) is
system independentdeveloped by Sun
Integrated NAS Gateway NAS uses both Fibre Channel and distributed file
Storage
Networking will
modification
Technologleg file the NAS latency or
svsterm modified, directory,
system CIES request file-sha affect
of
protocol. appliance
native connections. sources
one to IP
or protocol with Active
overwriting. are
on creation a significant
modifiedsystem. sharing was and integrity contents associated
: LDAP,
this andembedded restore
file sharing knowledge
file use from directory most
or of OSs data issues as
network. automatically
created
minute a systems server users the such requestNAS distances.
for
file is in ensure Performance
latency are
thrust
distributed (CIFS) used or of
a and
prevent service
performance up
2-44 files a Clientover file one of
metadata An
within System
also to and Advantages -
that System workstation features
to
can When is directory switches access. long PUBLICATION
protocol.
systemns is congestion
bandwidth
ensure common CIFS locking and NAS and over
system : NAS base CIFS.
File File following tolerance notification andlookup transfer TECHNICAL
server 2000. a
not
Management application in record Affecting and
be is lnternet
visible
another Internet
usedWindows
protocol. Network
network, affect with
environment. router and data
will system hopes Directory NES data
from
theand fault server
isnotified. only
typically that AuthenticationRetransmissionApplication
3.
settings Commonservices provides change of utilized in of
and on file Common client/server file TCPsupports factors readsharing
in IP
Factors performance. Numbers Small-block
Storage Network uses uses uses NAS or Applications
: Limited
default access
is protocol File Other NIS Over File
The CIFS CIFS It It It NAS a File
Information 1. 5.
2.20.2 a. b. c. d. 2.21 in 2. 4. 2.22
" " " " " 1. 2 3.
Information Storage and Management 2-46 Storage Networking Technologa
Elimination of network setup complications.
Storage capacity expansion.
" Data security and fault tolerance.
Q.4 Define SATA.
Ans. : Serial ATA is a standard for connecting and transferring data from
drives to computer systems. It provides point-to-point connectivity. hard disk
Q5 What is Fibre channel ?
Ans. : Fibre channel is a high speed network technology that runs on
optical fiber cables and serial copper cables. high speed
Q.6 What is SAN management software ?
Ans. : SAN management software organizes the connections, storage
elements and
computer systems in a SAN storage system. SAN management software does this so
that data transfer is secure and robust. SAN
management software can also help with
plarning and monitoring of storage systems. The software can be provided for large
enterprises, mid-sized businesses and small comparies. The software may be ofered as
a commercial product or as an open-source or free
solution.
Q.7 Define Zoning.
Ans. : SAN zoning is a method of arranging Fibre
Channel
over the physical configuration of the fabric. SAN zoning devices into logical groups
may be utilized to
compartmentalization of data for security purposes. Each device in a SANimplement
may be
placed into multiple zones.
0.8 List characteristics of Zones.
Ans. : Characteristics of zones are :
1. Zone can vary in size.
2. Devices can belong to more than one Zone.
3. Members in a zone can access each other
Q.9 List the components of NAS.
Ans. : NAS components are CPU and memory ,
CIFS, Storage protocol. NIC, perating system , NFS and
TECHNICAL PUBLICATIONS - An up
thrust for knowledge