SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
IP SAN Best Practices
A Dell Technical White Paper




PowerVault MD3200i Storage Arrays
PowerVault™ MD3200i: IP SAN Best Practices




THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR
IMPLIED WARRANTIES OF ANY KIND.

© 2010 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without
the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell.

Dell, the DELL logo, the DELL badge, PowerConnect, and PowerVault are trademarks of Dell Inc. Other
trademarks and trade names may be used in this document to refer to either the entities claiming the
marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade
names other than its own.



June 2010




                                                                                                  Page ii
PowerVault™ MD3200i: IP SAN Best Practices




Contents
  Introduction ............................................................................................................. 2
  iSCSI Overview .......................................................................................................... 2
  IP SAN Design ............................................................................................................ 2
  Best Practices - Implementation ..................................................................................... 3
    Redundancy ........................................................................................................... 3
  Security ................................................................................................................... 5
  IP SAN Network Infrastructure ....................................................................................... 5
  IP SAN Optimization .................................................................................................... 7
  Summary ................................................................................................................. 9




Figures

Figure 1.     Fully Redundant MD3200i Configuration ............................................................... 4

Figure 2.     MD3200i Controller Configuration ....................................................................... 8




                                                                                                                        Page 1
PowerVault™ MD3200i: IP SAN Best Practices


Introduction

The intent of this document is to provide guidance for optimizing an IP SAN environment utilizing the
Dell MD3200i storage array. The best practices within this document are recommendations to provide a
fault tolerant, high performance environment to maximize the capabilities of an MD3200i SAN. The
recommendations may be applied according to the requirements of the environment in which the
installed storage array or arrays are utilized, and not all best practices may be applicable to all
installations. The best practices in this paper are focused on Dell Inc. technology based solutions.



iSCSI Overview

iSCSI is a block-level storage protocol that lets users create a storage network using Ethernet. iSCSI
uses Ethernet as a transport for data from servers to storage devices or storage-area networks.
Because iSCSI uses Ethernet, it doesn't suffer from some of the complexity and distance limitations that
encumber other storage protocols.

The iSCSI protocol puts standard SCSI commands into TCP and sends those SCSI commands over
standard Ethernet. An iSCSI SAN consists of servers - with an iSCSI host bus adapter (HBA) or network
interface card (NIC) - disk arrays and tape libraries. Unlike other SAN technologies, iSCSI uses standard
Ethernet switches, routers and cables, and the same Ethernet protocol deployed for communications
traffic on LANs (TCP/IP). It can take advantage of the same type of switching, routing and cabling
technology used for a LAN.

Because iSCSI uses SCSI commands, relying on Ethernet only to transport the SCSI commands, operating
systems see iSCSI-connected devices as SCSI devices and are largely unaware that the SCSI device
resides across the room or across town.

Most components inside these iSCSI devices are very familiar to network professionals, including RAID
controllers and SCSI or Fibre Channel drives. The only added feature is the iSCSI protocol, which can
be run on standard NICs in software or on specialized iSCSI silicon or HBAs that off-load the TCP/IP and
iSCSI protocol.

ISCSI is built using two of the most widely adopted protocols for storage (SCSI) and networking (TCP).
Both technologies have undergone years of research, development and integration. IP networks also
provide the utmost in manageability, interoperability and cost effectiveness.


IP SAN Design

For an IP SAN, the network infrastructure consists of one or more network switches or equivalent
network equipment (routers, switches, etc.). For the purpose of this paper, it is assumed that the
network has at least one switching or routing device. While it is possible to connect an MD3200i array
to hosts without utilizing a network, directly connecting hosts to arrays is not within the scope of this
paper. An IP SAN therefore consists of one or more hosts, connected to one or more storage arrays
through an IP network, utilizing at least one switch in the network infrastructure.




                                                                                                    Page 2
PowerVault™ MD3200i: IP SAN Best Practices


There are several factors that need to be kept in mind when designing an IP SAN. The importance of
these factors will depend on the specific implementation of the IP SAN. These factors include and are
not limited to:

1. Redundancy: If data availability is required at all times, a fault tolerant IP SAN should be
   considered
2. Security: Depending on your IP-SAN implementation, different security mechanisms can be taken
   into consideration. This includes dedicated networks, CHAP, array passwords, etc.
3. Network Infrastructure: Components of the network infrastructure like NICs, HBAs, switches,
   cabling, routing, etc. can affect IP SAN performance and maintainability
4. Optimization: Depending on the application, various elements of your IP SAN can be tuned for
   improved performance. Some of these include the ability to use hardware offload engines, jumbo
   frames, etc.


Best Practices - Implementation

There are many ways to implement an IP SAN based on need, available resources and intended
application. For instance one important but easily overlooked item that can improve the manageability
of your IP SAN implementation is to assign a consistent and representative naming scheme to the
storage arrays. This is especially useful if the SAN has more than one storage array attached. The
“blink array” feature of the MD Storage Manager can be used to correctly identify each array
physically.

Some of the general implementation guidelines will be described below. However, one should note that
these are general guidelines and may not benefit all applications.

Redundancy

Redundancy in general is having a second set of hardware and communication paths so that if one piece
of hardware on one path breaks down there is a second path that can be utilized. In an IP SAN this can
be done with a second controller in the Array and by using two different switches for the iSCSI
network. The diagram below is a simplified diagram of doing this with a Dell PowerVault MD3200i; the
descriptions following provide further discussion of the benefits in doing this.




                                                                                                Page 3
PowerVault™ MD3200i: IP SAN Best Practices




                     Figure 1.       Fully Redundant MD3200i Configuration


Physical Network Infrastructure: A fully redundant IP SAN is characterized by multiple physically
independent iSCSI data paths between the hosts and the array. Each data path should be on a separate
subnet.

iSCSI configuration: In the case of an iSCSI target like the MD3200i, it is recommended to establish
multiple sessions to the storage subsystem from each host. It is recommended to set up one session per
port from each of the network cards to each RAID controller module. This method allows one session
to restart if a link goes down while not affecting any of the other links.

RAID: An appropriate RAID level should be chosen based on your applications. RAID 1 or higher provide
some level of redundancy that will be useful in the case of failed physical disks. Each RAID level works
best with certain applications and this should be taken into consideration while configuring the
MD3200i.


                                                                                                  Page 4
PowerVault™ MD3200i: IP SAN Best Practices


Power: Each redundant component of the data path should be on a separate power source. This will
ensure that even if one component fails due to a power issue, the alternative path will continue to
work. In the same way two power supplies of the MD3200i should be connected to separate power
sources.


Security

The optimal way of ensuring data security on an IP SAN is by implementing an isolated physically
independent network for the iSCSI data traffic. Besides better security, another benefit of having an
isolated network dedicated for storage traffic is the avoidance of network traffic congestion with other
non-storage traffic using the network.

VLAN: If physically isolated iSCSI networks are not feasible then VLANs can help to separate iSCSI
traffic from the general traffic in the network. It is recommended you turn on VLAN Tagging. The
MD3200i array supports VLAN tagging. A port can either transmit all tagged IP packets or all non-
tagged IP packets.

Note: VLAN must be enabled throughout the entire iSCSI SAN from the NICS, Switches, and iSCSI ports,
otherwise, behavior may be inconsistent. To simplify troubleshooting initial deployments, make sure all
NICs, switches, and MD3200i storage arrays are fully operational before enabling the VLAN feature
solution wide.

CHAP: To have secure access between your host and array, target and mutual CHAP authentication
should be enabled on the host(s) and storage array(s). Standard CHAP password guidelines should be
followed for best security.

It is highly recommended to set a password on all devices that are a part of your IP SAN. It is advisable
to use a strong password that meets standard IT guidelines.


IP SAN Network Infrastructure

Some of the general implementation guidelines will be described below. However, one should note that
these are general guidelines and may not benefit some applications.

General Network Practices: Make sure the category rating for the cables used are gigabit Ethernet
compliant (CAT5e, CAT6). Design your network to have the least amount of hops between the array(s)
and the host(s). This will greatly reduce your failure points, simplify your manageability, and reduce
latency and complexity of your network architecture (particularly in the area of redundancy). Managed
switches are recommended because they provide advanced features to help you optimize and maintain
your network for your application. It is recommend you use auto-negotiation only, since gigabit
Ethernet networks are designed to always have auto-negotiation enabled. If a particular application
requires a specific speed/duplex mode, this must be done by changing the advertisement options of
the switch.

Spanning-Tree Protocol: It is recommended that you disable spanning-tree protocol (STP) on the
switch ports that connect end nodes (iSCSI initiators and storage array network interfaces). If you still
decide to enable STP on those switch ports, then you should turn on the STP FastPort feature on the


                                                                                                    Page 5
PowerVault™ MD3200i: IP SAN Best Practices


ports in order to allow immediate transition of the ports into forwarding state. (Note: FastPort
immediately transitions the port into STP forwarding mode upon linkup. The port still participates in
STP. So if the port is to be a part of the loop, the port eventually transitions into STP blocking mode.)

Note: PowerConnect Switches default to RSTP (Rapid Spanning Tree Protocol) an evolution in STP that
provides for faster Spanning tree convergence and is preferable to STP

Note: The use of Spanning-Tree for a single-cable connection between switches or the use of trunking
for multiple-cable connections between switches is encouraged.

TCP Congestion avoidance: TCP Congestion Avoidance is an end to end flow control protocol that will
limit the amount of data sent between a TCP sender and a TCP transmitter. This protocol uses a
sliding window to size the data being sent to the TCP receiver. This protocol starts with a small
segment size and keeps increasing with each acked segment sent, until a segment is dropped. Once it
is dropped, TCP starts this over again.

Ether Flow Control: Dell recommends that you enable Flow Control on the switch ports that handle
iSCSI traffic. In addition, if a server is using a software iSCSI initiator and NIC combination to handle
iSCSI traffic, you must also enable Flow Control on the NICs to obtain the performance benefit. On
many networks, there can be an imbalance in the network traffic between the devices that send
network traffic and the devices that receive the traffic. This is often the case in SAN configurations in
which many hosts (initiators) are communicating with storage devices. If senders transmit data
simultaneously, they may exceed the throughput capacity of the receiver. When this occurs, the
receiver may drop packets, forcing senders to retransmit the data after a delay. Although this will not
result in any loss of data, latency will increase because of the retransmissions, and I/O performance
will degrade.

Note: PowerConnect Switches default to Flow Control being off. The MD3200i will auto-configure to
the switch when Flow control is turned on.

Unicast Storm Control: A traffic “storm” occurs when a large outpouring of packets creates excessive
network traffic that degrades network performance. Many switches have traffic storm control features
that prevent ports from being disrupted by broadcast, multicast, or unicast traffic storms on physical
interfaces. These features typically work by discarding network packets when the traffic on an
interface reaches a percentage of the overall load (usually 80 percent, by default).

Because iSCSI traffic is unicast traffic and can typically utilize the entire link, it is recommended that
you disable unicast storm control on switches that handle iSCSI traffic. However, the use of broadcast
and multicast storm control is encouraged. See your switch documentation for information on disabling
unicast storm control

Jumbo Frames: Dell recommends that you enable Jumbo Frames on the switch ports that handle iSCSI
traffic. In addition, if a host is using a software iSCSI initiator and NIC combination to handle iSCSI
traffic, you must also enable Jumbo Frames on the NICs to obtain the performance benefit (or reduced
CPU overhead) and ensure consistent behavior.

Note: Jumbo Frames must be enabled throughout the entire iSCSI SAN from the NICS, Switches, and
array ports, otherwise, behavior may be inconsistent. To simplify troubleshooting initial deployments,



                                                                                                    Page 6
PowerVault™ MD3200i: IP SAN Best Practices


make sure the NICs, switches, and MD3200i storage arrays are fully operational before enabling jumbo
frames.


IP SAN Optimization

When designing your IP SAN you have to look at various factors in your network and the actual
application you are using. There are some general rules that can be used when designing your IP SAN.
In order to maximize the data throughput of your storage arrays, all data ports need to be utilized. If
your application is IO intensive, utilizing iSCSI offload NICs is recommended. Consider manually
balancing your virtual disk ownership so that no single controller is processing an excessive amount of
I/O relative to the other controller.

The MD3200i supports active/active controllers, with each controller being able to simultaneous
process IO. The asymmetric design of the controllers means that a virtual disk (LUN) is owned by a
controller and all IO access to the virtual disk is only possible through the owning controller. To take
advantage of both the controllers for IO access, virtual disks can be distributed among the controllers.
Virtual disk ownership can be modified to balance IO access so as to balance utilization of both
controllers. With a host configured for redundant access, if a host loses IO access to a virtual disk
through its owning controller, the failover drive will execute ownership transfer from one controller to
the other and resume IO access through the new owning controller.




                                                                                                  Page 7
PowerVault™ MD3200i: IP SAN Best Practices


The following figure illustrates the active/active asymmetric architecture of the MD3200i. The
configuration consists of two virtual disks (Virtual Disk 0 and Virtual Disk 1), with Virtual Disk 0 owned
by Controller 0 and Virtual Disk 1 owned by Controller 1. Virtual Disk 0 is assigned to Host 1 and Virtual
Disk 1 assigned to Host 2.




                                          Host 1                       Host 2

                                     iSCSI Initiator              iSCSI Initiator
                                     P0   P1 P2 P3                P0    P1 P2 P3




                                     IP Network                 IP Network
                                          1                          2




                                      P0 P1 P2 P3               P0 P1 P2 P3
                                          Controller 0          Controller 1


                                                           MD3200i
                                          Virtual Disk 0             Virtual Disk 1




                         Figure 2.           MD3200i Controller Configuration



Virtual disk ownership defined by the asymmetric architecture ensures that Host 1 accesses Virtual Disk
0 through Controller 0 and Host 2 accesses Virtual Disk 1 through Controller 1

Bandwidth Aggregation: With the MD3200i you can have two Ethernet ports from one host connected
to one controller and the bandwidth will be aggregated. Set up the MD3200i iSCSI driver with a Round
Robin Queue, this will aggregate all the packets being sent to that controller placing them on each link
therefore doubling the available bandwidth.

Examine your network architecture to ensure there is no bottleneck in the network between the host
and array. There are some things we talked about under security that also will help to optimize your IP
SAN. Using separate switches to physically isolate the iSCSI data traffic, and using VLANs with FastPort
turned on.

Layer 2 Optimization: When setting up the VLAN through your network, VLAN tagging can be helpful in
routing the iSCSI Data Traffic through your network. You can then set priority within the VLAN, but you
have to look at all your traffic to determine priorities. If for example your VOIP traffic runs through the


                                                                                                    Page 8
PowerVault™ MD3200i: IP SAN Best Practices


same VLAN you need to ensure that voice quality is not hurt, plus you need to look at general internet
traffic versus iSCSI and VOIP.

Layer 3 Optimization: Differentiated Services (DiffServ) gives a good method for managing your
traffic. Some switches have a proprietary implementation of this that is called Quality of Service (QoS).
DiffServ uses the Differentiated Services Code Point (DSCP) to distinguish between service levels of
each IP connection. These service level agreements are on a Per Hop Basis (PHB), as such within the
internal corporate network traffic flows can be predictable but once a WAN link leaves the company
the Service agreements are no longer valid. There are four levels normally used with DiffServ.

1.   Default PHB—which is typically best-effort traffic
2.   Expedited Forwarding (EF) PHB—for low-loss, low-latency traffic
3.   Assured Forwarding (AF)—behavior group
4.   Class Selector PHBs - which are defined to maintain backward compatibility with the IP Precedence
     field.

In order to choose what service level to use you have to examine the needs of the applications
connected to the Array. For instance if you have your hosts set up to iSCSI boot, or are using
Virtualization to “hide” the array and the guest OS is booting off a C: drive that is actually on the array
you must select EF as the data must get there and if there is much delay the host will lock up. On the
other land you may want all your traffic coming in from the WWW set to the lowest possible class of AF
so it doesn’t affect your critical data.



Summary

An IP SAN is a flexible, easy to deploy and use storage solution for businesses of all sizes. By following
the practices recommended in this whitepaper and using regular IT best practices you can have a highly
reliable, flexible data storage solution. Remember it is important to design and build out your
corporate network with the IP SAN in mind, as your data needs grow so will your data traffic. By
following the recommendations in this white paper you will be in a much better position to deal with
those changes.




                                                                                                    Page 9

Weitere ähnliche Inhalte

Was ist angesagt?

The latest isr 4000 model comparison
The latest isr 4000 model comparisonThe latest isr 4000 model comparison
The latest isr 4000 model comparisonIT Tech
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRCisco Canada
 
NFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesNFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesCisco Canada
 
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsTechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsRobb Boyd
 
Cisco MDS Main Session EMC World 2015
Cisco MDS Main Session EMC World 2015Cisco MDS Main Session EMC World 2015
Cisco MDS Main Session EMC World 2015ldangelo0772
 
TechWiseTV Workshop: Extending Intent-Based Networking to IoT
TechWiseTV Workshop: Extending Intent-Based Networking to IoTTechWiseTV Workshop: Extending Intent-Based Networking to IoT
TechWiseTV Workshop: Extending Intent-Based Networking to IoTRobb Boyd
 
TechWiseTV Workshop: Cisco UCS C4200
TechWiseTV Workshop: Cisco UCS C4200TechWiseTV Workshop: Cisco UCS C4200
TechWiseTV Workshop: Cisco UCS C4200Robb Boyd
 
Cisco isr 4000 platform comparison & benefits of migrating to cisco 4000 ...
Cisco isr 4000 platform comparison & benefits of migrating to cisco 4000 ...Cisco isr 4000 platform comparison & benefits of migrating to cisco 4000 ...
Cisco isr 4000 platform comparison & benefits of migrating to cisco 4000 ...IT Tech
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewallAnwesh Dixit
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideIT Tech
 
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...Robb Boyd
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9Irsandi Hasan
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Canada
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and RealitySwiss IPv6 Council
 
Brkarc 2035-cat-9 k
Brkarc 2035-cat-9 kBrkarc 2035-cat-9 k
Brkarc 2035-cat-9 knasiapsi
 
Cisco A9K-8T-L
Cisco A9K-8T-LCisco A9K-8T-L
Cisco A9K-8T-Lsavomir
 
Cisco ucs s3260 the new storage building blocks
Cisco ucs s3260 the new storage building blocksCisco ucs s3260 the new storage building blocks
Cisco ucs s3260 the new storage building blocksIT Tech
 

Was ist angesagt? (20)

The latest isr 4000 model comparison
The latest isr 4000 model comparisonThe latest isr 4000 model comparison
The latest isr 4000 model comparison
 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XR
 
NFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesNFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch services
 
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design ConsiderationsTechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
TechWiseTV Workshop: Cisco Catalyst 9600: Deep Dive and Design Considerations
 
Cisco MDS Main Session EMC World 2015
Cisco MDS Main Session EMC World 2015Cisco MDS Main Session EMC World 2015
Cisco MDS Main Session EMC World 2015
 
TechWiseTV Workshop: Extending Intent-Based Networking to IoT
TechWiseTV Workshop: Extending Intent-Based Networking to IoTTechWiseTV Workshop: Extending Intent-Based Networking to IoT
TechWiseTV Workshop: Extending Intent-Based Networking to IoT
 
TechWiseTV Workshop: Cisco UCS C4200
TechWiseTV Workshop: Cisco UCS C4200TechWiseTV Workshop: Cisco UCS C4200
TechWiseTV Workshop: Cisco UCS C4200
 
Cisco isr 4000 platform comparison & benefits of migrating to cisco 4000 ...
Cisco isr 4000 platform comparison & benefits of migrating to cisco 4000 ...Cisco isr 4000 platform comparison & benefits of migrating to cisco 4000 ...
Cisco isr 4000 platform comparison & benefits of migrating to cisco 4000 ...
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewall
 
SunGard Cloud - Infrastructure as a Service - IaaS
SunGard Cloud - Infrastructure as a Service - IaaSSunGard Cloud - Infrastructure as a Service - IaaS
SunGard Cloud - Infrastructure as a Service - IaaS
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guide
 
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
TechWiseTV Workshop: Cisco Catalyst 9500 Series High-Performance Switch Archi...
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9CCNA RS_ITN - Chapter 9
CCNA RS_ITN - Chapter 9
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
 
IPv6 Security - Myths and Reality
IPv6 Security - Myths and RealityIPv6 Security - Myths and Reality
IPv6 Security - Myths and Reality
 
Brkarc 2035-cat-9 k
Brkarc 2035-cat-9 kBrkarc 2035-cat-9 k
Brkarc 2035-cat-9 k
 
Cisco A9K-8T-L
Cisco A9K-8T-LCisco A9K-8T-L
Cisco A9K-8T-L
 
Cisco ucs s3260 the new storage building blocks
Cisco ucs s3260 the new storage building blocksCisco ucs s3260 the new storage building blocks
Cisco ucs s3260 the new storage building blocks
 

Andere mochten auch

Analyst : Enterprise Strategy Group: Addressing NAS Backup and Recovery Chall...
Analyst : Enterprise Strategy Group: Addressing NAS Backup and Recovery Chall...Analyst : Enterprise Strategy Group: Addressing NAS Backup and Recovery Chall...
Analyst : Enterprise Strategy Group: Addressing NAS Backup and Recovery Chall...EMC
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)sagaroceanic11
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NASSpiceworks
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-sanAshwin Pawar
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)sandeepgodfather
 

Andere mochten auch (6)

Analyst : Enterprise Strategy Group: Addressing NAS Backup and Recovery Chall...
Analyst : Enterprise Strategy Group: Addressing NAS Backup and Recovery Chall...Analyst : Enterprise Strategy Group: Addressing NAS Backup and Recovery Chall...
Analyst : Enterprise Strategy Group: Addressing NAS Backup and Recovery Chall...
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)
 

Ähnlich wie Ip san-best-practices-en

Dedicated Networks For IP Storage
Dedicated Networks For IP StorageDedicated Networks For IP Storage
Dedicated Networks For IP StorageEMC
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
SAN overview.pptx
SAN overview.pptxSAN overview.pptx
SAN overview.pptxMugabo4
 
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...MongoDB
 
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxAdvanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxService Solutions Pvt. Ltd. (SSL)
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPEMichelle Holley
 
Data center Trends with Oracle
Data center Trends with OracleData center Trends with Oracle
Data center Trends with OracleFran Navarro
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdfSamiksha880257
 
iSCSI and CLEAR-Flow
iSCSI and CLEAR-FlowiSCSI and CLEAR-Flow
iSCSI and CLEAR-FlowMUK Extreme
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:Cisco Canada
 
Industry Brief: Streamlining Server Connectivity: It Starts at the Top
Industry Brief: Streamlining Server Connectivity: It Starts at the TopIndustry Brief: Streamlining Server Connectivity: It Starts at the Top
Industry Brief: Streamlining Server Connectivity: It Starts at the TopIT Brand Pulse
 
Sun storage tek 2500 series disk array technical presentation
Sun storage tek 2500 series disk array technical presentationSun storage tek 2500 series disk array technical presentation
Sun storage tek 2500 series disk array technical presentationxKinAnx
 
Huawei Innovative ICT Solutions, CeBIT
Huawei Innovative ICT Solutions, CeBITHuawei Innovative ICT Solutions, CeBIT
Huawei Innovative ICT Solutions, CeBITHuawei Enterprise
 

Ähnlich wie Ip san-best-practices-en (20)

Dedicated Networks For IP Storage
Dedicated Networks For IP StorageDedicated Networks For IP Storage
Dedicated Networks For IP Storage
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Storage
StorageStorage
Storage
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
SAN overview.pptx
SAN overview.pptxSAN overview.pptx
SAN overview.pptx
 
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
MongoDB World 2019: Implementation and Operationalization of MongoDB Sharding...
 
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptxAdvanced Design and Optimization of Data Center Interconnection Networks.pptx
Advanced Design and Optimization of Data Center Interconnection Networks.pptx
 
DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
 DataCore Software with Cisco UCS Complete Unification of the Data Center Ser... DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
DataCore Software with Cisco UCS Complete Unification of the Data Center Ser...
 
Building the SD-Branch using uCPE
Building the SD-Branch using uCPEBuilding the SD-Branch using uCPE
Building the SD-Branch using uCPE
 
Data center Trends with Oracle
Data center Trends with OracleData center Trends with Oracle
Data center Trends with Oracle
 
En35793797
En35793797En35793797
En35793797
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
iSCSI and CLEAR-Flow
iSCSI and CLEAR-FlowiSCSI and CLEAR-Flow
iSCSI and CLEAR-Flow
 
NOTES
NOTESNOTES
NOTES
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
SAP HANA Cloud Security
SAP HANA Cloud SecuritySAP HANA Cloud Security
SAP HANA Cloud Security
 
Industry Brief: Streamlining Server Connectivity: It Starts at the Top
Industry Brief: Streamlining Server Connectivity: It Starts at the TopIndustry Brief: Streamlining Server Connectivity: It Starts at the Top
Industry Brief: Streamlining Server Connectivity: It Starts at the Top
 
Sun storage tek 2500 series disk array technical presentation
Sun storage tek 2500 series disk array technical presentationSun storage tek 2500 series disk array technical presentation
Sun storage tek 2500 series disk array technical presentation
 
Huawei Innovative ICT Solutions, CeBIT
Huawei Innovative ICT Solutions, CeBITHuawei Innovative ICT Solutions, CeBIT
Huawei Innovative ICT Solutions, CeBIT
 

Kürzlich hochgeladen

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Kürzlich hochgeladen (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

Ip san-best-practices-en

  • 1. IP SAN Best Practices A Dell Technical White Paper PowerVault MD3200i Storage Arrays
  • 2. PowerVault™ MD3200i: IP SAN Best Practices THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS PROVIDED AS IS, WITHOUT EXPRESS OR IMPLIED WARRANTIES OF ANY KIND. © 2010 Dell Inc. All rights reserved. Reproduction of this material in any manner whatsoever without the express written permission of Dell Inc. is strictly forbidden. For more information, contact Dell. Dell, the DELL logo, the DELL badge, PowerConnect, and PowerVault are trademarks of Dell Inc. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. June 2010 Page ii
  • 3. PowerVault™ MD3200i: IP SAN Best Practices Contents Introduction ............................................................................................................. 2 iSCSI Overview .......................................................................................................... 2 IP SAN Design ............................................................................................................ 2 Best Practices - Implementation ..................................................................................... 3 Redundancy ........................................................................................................... 3 Security ................................................................................................................... 5 IP SAN Network Infrastructure ....................................................................................... 5 IP SAN Optimization .................................................................................................... 7 Summary ................................................................................................................. 9 Figures Figure 1. Fully Redundant MD3200i Configuration ............................................................... 4 Figure 2. MD3200i Controller Configuration ....................................................................... 8 Page 1
  • 4. PowerVault™ MD3200i: IP SAN Best Practices Introduction The intent of this document is to provide guidance for optimizing an IP SAN environment utilizing the Dell MD3200i storage array. The best practices within this document are recommendations to provide a fault tolerant, high performance environment to maximize the capabilities of an MD3200i SAN. The recommendations may be applied according to the requirements of the environment in which the installed storage array or arrays are utilized, and not all best practices may be applicable to all installations. The best practices in this paper are focused on Dell Inc. technology based solutions. iSCSI Overview iSCSI is a block-level storage protocol that lets users create a storage network using Ethernet. iSCSI uses Ethernet as a transport for data from servers to storage devices or storage-area networks. Because iSCSI uses Ethernet, it doesn't suffer from some of the complexity and distance limitations that encumber other storage protocols. The iSCSI protocol puts standard SCSI commands into TCP and sends those SCSI commands over standard Ethernet. An iSCSI SAN consists of servers - with an iSCSI host bus adapter (HBA) or network interface card (NIC) - disk arrays and tape libraries. Unlike other SAN technologies, iSCSI uses standard Ethernet switches, routers and cables, and the same Ethernet protocol deployed for communications traffic on LANs (TCP/IP). It can take advantage of the same type of switching, routing and cabling technology used for a LAN. Because iSCSI uses SCSI commands, relying on Ethernet only to transport the SCSI commands, operating systems see iSCSI-connected devices as SCSI devices and are largely unaware that the SCSI device resides across the room or across town. Most components inside these iSCSI devices are very familiar to network professionals, including RAID controllers and SCSI or Fibre Channel drives. The only added feature is the iSCSI protocol, which can be run on standard NICs in software or on specialized iSCSI silicon or HBAs that off-load the TCP/IP and iSCSI protocol. ISCSI is built using two of the most widely adopted protocols for storage (SCSI) and networking (TCP). Both technologies have undergone years of research, development and integration. IP networks also provide the utmost in manageability, interoperability and cost effectiveness. IP SAN Design For an IP SAN, the network infrastructure consists of one or more network switches or equivalent network equipment (routers, switches, etc.). For the purpose of this paper, it is assumed that the network has at least one switching or routing device. While it is possible to connect an MD3200i array to hosts without utilizing a network, directly connecting hosts to arrays is not within the scope of this paper. An IP SAN therefore consists of one or more hosts, connected to one or more storage arrays through an IP network, utilizing at least one switch in the network infrastructure. Page 2
  • 5. PowerVault™ MD3200i: IP SAN Best Practices There are several factors that need to be kept in mind when designing an IP SAN. The importance of these factors will depend on the specific implementation of the IP SAN. These factors include and are not limited to: 1. Redundancy: If data availability is required at all times, a fault tolerant IP SAN should be considered 2. Security: Depending on your IP-SAN implementation, different security mechanisms can be taken into consideration. This includes dedicated networks, CHAP, array passwords, etc. 3. Network Infrastructure: Components of the network infrastructure like NICs, HBAs, switches, cabling, routing, etc. can affect IP SAN performance and maintainability 4. Optimization: Depending on the application, various elements of your IP SAN can be tuned for improved performance. Some of these include the ability to use hardware offload engines, jumbo frames, etc. Best Practices - Implementation There are many ways to implement an IP SAN based on need, available resources and intended application. For instance one important but easily overlooked item that can improve the manageability of your IP SAN implementation is to assign a consistent and representative naming scheme to the storage arrays. This is especially useful if the SAN has more than one storage array attached. The “blink array” feature of the MD Storage Manager can be used to correctly identify each array physically. Some of the general implementation guidelines will be described below. However, one should note that these are general guidelines and may not benefit all applications. Redundancy Redundancy in general is having a second set of hardware and communication paths so that if one piece of hardware on one path breaks down there is a second path that can be utilized. In an IP SAN this can be done with a second controller in the Array and by using two different switches for the iSCSI network. The diagram below is a simplified diagram of doing this with a Dell PowerVault MD3200i; the descriptions following provide further discussion of the benefits in doing this. Page 3
  • 6. PowerVault™ MD3200i: IP SAN Best Practices Figure 1. Fully Redundant MD3200i Configuration Physical Network Infrastructure: A fully redundant IP SAN is characterized by multiple physically independent iSCSI data paths between the hosts and the array. Each data path should be on a separate subnet. iSCSI configuration: In the case of an iSCSI target like the MD3200i, it is recommended to establish multiple sessions to the storage subsystem from each host. It is recommended to set up one session per port from each of the network cards to each RAID controller module. This method allows one session to restart if a link goes down while not affecting any of the other links. RAID: An appropriate RAID level should be chosen based on your applications. RAID 1 or higher provide some level of redundancy that will be useful in the case of failed physical disks. Each RAID level works best with certain applications and this should be taken into consideration while configuring the MD3200i. Page 4
  • 7. PowerVault™ MD3200i: IP SAN Best Practices Power: Each redundant component of the data path should be on a separate power source. This will ensure that even if one component fails due to a power issue, the alternative path will continue to work. In the same way two power supplies of the MD3200i should be connected to separate power sources. Security The optimal way of ensuring data security on an IP SAN is by implementing an isolated physically independent network for the iSCSI data traffic. Besides better security, another benefit of having an isolated network dedicated for storage traffic is the avoidance of network traffic congestion with other non-storage traffic using the network. VLAN: If physically isolated iSCSI networks are not feasible then VLANs can help to separate iSCSI traffic from the general traffic in the network. It is recommended you turn on VLAN Tagging. The MD3200i array supports VLAN tagging. A port can either transmit all tagged IP packets or all non- tagged IP packets. Note: VLAN must be enabled throughout the entire iSCSI SAN from the NICS, Switches, and iSCSI ports, otherwise, behavior may be inconsistent. To simplify troubleshooting initial deployments, make sure all NICs, switches, and MD3200i storage arrays are fully operational before enabling the VLAN feature solution wide. CHAP: To have secure access between your host and array, target and mutual CHAP authentication should be enabled on the host(s) and storage array(s). Standard CHAP password guidelines should be followed for best security. It is highly recommended to set a password on all devices that are a part of your IP SAN. It is advisable to use a strong password that meets standard IT guidelines. IP SAN Network Infrastructure Some of the general implementation guidelines will be described below. However, one should note that these are general guidelines and may not benefit some applications. General Network Practices: Make sure the category rating for the cables used are gigabit Ethernet compliant (CAT5e, CAT6). Design your network to have the least amount of hops between the array(s) and the host(s). This will greatly reduce your failure points, simplify your manageability, and reduce latency and complexity of your network architecture (particularly in the area of redundancy). Managed switches are recommended because they provide advanced features to help you optimize and maintain your network for your application. It is recommend you use auto-negotiation only, since gigabit Ethernet networks are designed to always have auto-negotiation enabled. If a particular application requires a specific speed/duplex mode, this must be done by changing the advertisement options of the switch. Spanning-Tree Protocol: It is recommended that you disable spanning-tree protocol (STP) on the switch ports that connect end nodes (iSCSI initiators and storage array network interfaces). If you still decide to enable STP on those switch ports, then you should turn on the STP FastPort feature on the Page 5
  • 8. PowerVault™ MD3200i: IP SAN Best Practices ports in order to allow immediate transition of the ports into forwarding state. (Note: FastPort immediately transitions the port into STP forwarding mode upon linkup. The port still participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP blocking mode.) Note: PowerConnect Switches default to RSTP (Rapid Spanning Tree Protocol) an evolution in STP that provides for faster Spanning tree convergence and is preferable to STP Note: The use of Spanning-Tree for a single-cable connection between switches or the use of trunking for multiple-cable connections between switches is encouraged. TCP Congestion avoidance: TCP Congestion Avoidance is an end to end flow control protocol that will limit the amount of data sent between a TCP sender and a TCP transmitter. This protocol uses a sliding window to size the data being sent to the TCP receiver. This protocol starts with a small segment size and keeps increasing with each acked segment sent, until a segment is dropped. Once it is dropped, TCP starts this over again. Ether Flow Control: Dell recommends that you enable Flow Control on the switch ports that handle iSCSI traffic. In addition, if a server is using a software iSCSI initiator and NIC combination to handle iSCSI traffic, you must also enable Flow Control on the NICs to obtain the performance benefit. On many networks, there can be an imbalance in the network traffic between the devices that send network traffic and the devices that receive the traffic. This is often the case in SAN configurations in which many hosts (initiators) are communicating with storage devices. If senders transmit data simultaneously, they may exceed the throughput capacity of the receiver. When this occurs, the receiver may drop packets, forcing senders to retransmit the data after a delay. Although this will not result in any loss of data, latency will increase because of the retransmissions, and I/O performance will degrade. Note: PowerConnect Switches default to Flow Control being off. The MD3200i will auto-configure to the switch when Flow control is turned on. Unicast Storm Control: A traffic “storm” occurs when a large outpouring of packets creates excessive network traffic that degrades network performance. Many switches have traffic storm control features that prevent ports from being disrupted by broadcast, multicast, or unicast traffic storms on physical interfaces. These features typically work by discarding network packets when the traffic on an interface reaches a percentage of the overall load (usually 80 percent, by default). Because iSCSI traffic is unicast traffic and can typically utilize the entire link, it is recommended that you disable unicast storm control on switches that handle iSCSI traffic. However, the use of broadcast and multicast storm control is encouraged. See your switch documentation for information on disabling unicast storm control Jumbo Frames: Dell recommends that you enable Jumbo Frames on the switch ports that handle iSCSI traffic. In addition, if a host is using a software iSCSI initiator and NIC combination to handle iSCSI traffic, you must also enable Jumbo Frames on the NICs to obtain the performance benefit (or reduced CPU overhead) and ensure consistent behavior. Note: Jumbo Frames must be enabled throughout the entire iSCSI SAN from the NICS, Switches, and array ports, otherwise, behavior may be inconsistent. To simplify troubleshooting initial deployments, Page 6
  • 9. PowerVault™ MD3200i: IP SAN Best Practices make sure the NICs, switches, and MD3200i storage arrays are fully operational before enabling jumbo frames. IP SAN Optimization When designing your IP SAN you have to look at various factors in your network and the actual application you are using. There are some general rules that can be used when designing your IP SAN. In order to maximize the data throughput of your storage arrays, all data ports need to be utilized. If your application is IO intensive, utilizing iSCSI offload NICs is recommended. Consider manually balancing your virtual disk ownership so that no single controller is processing an excessive amount of I/O relative to the other controller. The MD3200i supports active/active controllers, with each controller being able to simultaneous process IO. The asymmetric design of the controllers means that a virtual disk (LUN) is owned by a controller and all IO access to the virtual disk is only possible through the owning controller. To take advantage of both the controllers for IO access, virtual disks can be distributed among the controllers. Virtual disk ownership can be modified to balance IO access so as to balance utilization of both controllers. With a host configured for redundant access, if a host loses IO access to a virtual disk through its owning controller, the failover drive will execute ownership transfer from one controller to the other and resume IO access through the new owning controller. Page 7
  • 10. PowerVault™ MD3200i: IP SAN Best Practices The following figure illustrates the active/active asymmetric architecture of the MD3200i. The configuration consists of two virtual disks (Virtual Disk 0 and Virtual Disk 1), with Virtual Disk 0 owned by Controller 0 and Virtual Disk 1 owned by Controller 1. Virtual Disk 0 is assigned to Host 1 and Virtual Disk 1 assigned to Host 2. Host 1 Host 2 iSCSI Initiator iSCSI Initiator P0 P1 P2 P3 P0 P1 P2 P3 IP Network IP Network 1 2 P0 P1 P2 P3 P0 P1 P2 P3 Controller 0 Controller 1 MD3200i Virtual Disk 0 Virtual Disk 1 Figure 2. MD3200i Controller Configuration Virtual disk ownership defined by the asymmetric architecture ensures that Host 1 accesses Virtual Disk 0 through Controller 0 and Host 2 accesses Virtual Disk 1 through Controller 1 Bandwidth Aggregation: With the MD3200i you can have two Ethernet ports from one host connected to one controller and the bandwidth will be aggregated. Set up the MD3200i iSCSI driver with a Round Robin Queue, this will aggregate all the packets being sent to that controller placing them on each link therefore doubling the available bandwidth. Examine your network architecture to ensure there is no bottleneck in the network between the host and array. There are some things we talked about under security that also will help to optimize your IP SAN. Using separate switches to physically isolate the iSCSI data traffic, and using VLANs with FastPort turned on. Layer 2 Optimization: When setting up the VLAN through your network, VLAN tagging can be helpful in routing the iSCSI Data Traffic through your network. You can then set priority within the VLAN, but you have to look at all your traffic to determine priorities. If for example your VOIP traffic runs through the Page 8
  • 11. PowerVault™ MD3200i: IP SAN Best Practices same VLAN you need to ensure that voice quality is not hurt, plus you need to look at general internet traffic versus iSCSI and VOIP. Layer 3 Optimization: Differentiated Services (DiffServ) gives a good method for managing your traffic. Some switches have a proprietary implementation of this that is called Quality of Service (QoS). DiffServ uses the Differentiated Services Code Point (DSCP) to distinguish between service levels of each IP connection. These service level agreements are on a Per Hop Basis (PHB), as such within the internal corporate network traffic flows can be predictable but once a WAN link leaves the company the Service agreements are no longer valid. There are four levels normally used with DiffServ. 1. Default PHB—which is typically best-effort traffic 2. Expedited Forwarding (EF) PHB—for low-loss, low-latency traffic 3. Assured Forwarding (AF)—behavior group 4. Class Selector PHBs - which are defined to maintain backward compatibility with the IP Precedence field. In order to choose what service level to use you have to examine the needs of the applications connected to the Array. For instance if you have your hosts set up to iSCSI boot, or are using Virtualization to “hide” the array and the guest OS is booting off a C: drive that is actually on the array you must select EF as the data must get there and if there is much delay the host will lock up. On the other land you may want all your traffic coming in from the WWW set to the lowest possible class of AF so it doesn’t affect your critical data. Summary An IP SAN is a flexible, easy to deploy and use storage solution for businesses of all sizes. By following the practices recommended in this whitepaper and using regular IT best practices you can have a highly reliable, flexible data storage solution. Remember it is important to design and build out your corporate network with the IP SAN in mind, as your data needs grow so will your data traffic. By following the recommendations in this white paper you will be in a much better position to deal with those changes. Page 9