Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

Storage

404 vues

Publié le

  • Soyez le premier à commenter

Storage

  1. 1. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Copyright 2016 FUJITSU LIMITED Storage Basic Concepts SAN Storage
  2. 2. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Objective Copyright 2016 FUJITSU LIMITED1  What is storage  Types of Storage  Storage Vendors  Types of Disks  RAID Technology  SAN Switches & FC Cables  Hardware parts  Technical words  What is Zoning
  3. 3. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS What is Storage? Storage is the place where data is held in an electromagnetic or optical form for access by a computer processor. Computer understands Binary language (0 and 1). As such they store information in that form as well. 1Bit = 0 or 1 8 Bits = 1 Byte 1024 Bytes = 1KB (Kilo Byte) 1024 KB = 1MB (Mega Byte) 1024 MB = 1GB (Giga Byte) 1024 GB = 1TB (Tera Byte) 1024 TB = 1PB (Peta Byte) 1024 PB = 1EB (Exa Byte) 1024 EB = 1ZB (Zetta Byte) 1024 ZB = 1YB (Yotta Byte)
  4. 4. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS 3 Copyright 2016 FUJITSU LIMITED Types of Storage DAS – Direct Attached Storage NAS – Network Attached Storage SAN – Storage Area Network
  5. 5. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Direct Attached Storage: DAS is digital storage that is attached directly to a computer or a server. DAS Limitations: • Difficult to Manage • Poor Scalability • Poor capacity utilization • Limited Availability DAS – Direct Attached Storage
  6. 6. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS NAS – Network Attached Storage NAS (Network-attached storage): It is file-level computer data storage connected to a computer network providing data access to heterogeneous clients. Advantages of NAS: * High Availability * Redundancy * Scalability Disadvantages: * Performance of the NAS will depend upon the amount of bandwidth available.
  7. 7. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS SAN- Storage Area Network Advantages of SAN: * High Availability * Redundancy * Scalability * High Performance Disadvantages: * Very Expensive * Complex to manage SAN (Storage Area Network): It is a specialized, high speed network that provides block-level network access to storage
  8. 8. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Storage Vendors EMC NetApp IBM HP Hitachi Fujitsu Dell Oracle 0% 5% 10% 15% 20% 25% 30% 35% 40% EMC Netapp HPE IBM Others
  9. 9. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Types of Disks • HDD • ATA • IDE • SATA • SCSI • SSD • FC
  10. 10. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS RAID Technology RAID (Redundant Array of Inexpensive Disk) is a data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both. Types of RAID: RAID 0 – striping RAID 1 – mirroring RAID 5 – striping with parity RAID 6 – striping with double parity RAID 10 – combining mirroring and striping
  11. 11. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS SAN Switches & Fiber Channel SAN Switch: It is device that connects servers and shared pools of storage devices and is dedicated to moving storage traffic. Fibre Channel, or FC, is a high-speed network technology (commonly running at 1, 2, 4, 8, 16, 32, and 128 gigabit per second rates) primarily used to connect computer data storage to servers. Fibre Channel is mainly used in storage area networks (SAN) in commercial data centers.
  12. 12. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Major Hardware Parts in Storage Box  PDU’s (power distribute Units)  Controllers  Disk Enclosures  FE (Front End ports)  BE (Back End Ports)  Physical Disks  FC / iSCSI Cables  Blowers  LED’s 11 Copyright 2016 FUJITSU LIMITED
  13. 13. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Hardware parts Description  PDU’s :- PDU’s provide the power to storage box.  Controllers :- It controls & manages all the attributes in storage box.  Disk Enclosures :- DE contains the bays to load the physical drives.  FE Ports :- By using FE ports we can connect Host / Fabric.  BE Ports :- BE ports will use to connect the Enclosures / Disks.  Physical disks :- Physical Disk refers to an actual physical HDD (or array in a hardware RAID setup), whereas Logical Disk refers to a Volume that has been created on that disk.  FC / Iscsi cables :- These are used to connect SAN devices. 12 Copyright 2016 FUJITSU LIMITED
  14. 14. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Hardware Parts continuation  Blowers :- Blowers will use to reduce the heat in devices.  LED’s :- Light Emitting Diode is a semiconductor light source, often used as an indicator light in electronic devices. 13 Copyright 2016 FUJITSU LIMITED
  15. 15. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Technical words in SAN Array :-Array is nothing but grouping number of hard disks to provide a huge storage is called array.  Disk Group :- A disk group ties together multiple hard disks to allow for one or multiple volumes across a RAID configuration on these disks. When a RAID is created, all of the included disks are recognized as one data partition  Provisioning :- Provisioning is nothing but assign the storage to host on request. we have 2 types of Provisioning in storage i) Thin Provisioning ii) Thick Provisioning 14 Copyright 2016 FUJITSU LIMITED
  16. 16. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Technical words in SAN  LUN:- Logical Unit Number LUNs are a logical abstraction between a physical disk device and applications. And is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.  Trace Pass:- Trace pass is nothing but change the ownership of LUN’s in controllers. 15 Copyright 2016 FUJITSU LIMITED
  17. 17. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Technical words in SAN  WWN’S :- Associating a world wide name (WWN) to a logical unit number (LUN) within a storage array is a way of implementing data security in the SAN. Each HBA in your servers connected to the SAN has a WWN. Within the storage array, you can assign the WWN to a particular LUN so that even if zoning is not implemented in the SAN fabric, only that particular HBA will have access to that specific LUN. This is sometimes referred to as "LUN masking.“  Cache :- Cache is nothing but temporary storage in controller.  Hot Spare:- A hot spare is a backup device that is usually in standby mode but becomes immediately available if a primary device / Disk component fails. 16 Copyright 2016 FUJITSU LIMITED
  18. 18. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Zoning  What is zoning ? zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users. There are two types zoning :- i) Hard Zoning ii) Soft Zoning Hard Zoning :- If we create the zoning by using switch port number & Domain ID that is called hard zoning. Soft Zoning :- If we create the zoning by using Host WWN’s & Array WWN’s that is called Soft zoning. 17 Copyright 2016 FUJITSU LIMITED
  19. 19. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Technical Words at Fabric  Alias  Zone  Zoneconfig  Flogi  Plogi 18 Copyright 2016 FUJITSU LIMITED
  20. 20. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Copyright 2016 FUJITSU LIMITED19

×