SlideShare ist ein Scribd-Unternehmen logo
1 von 20
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Copyright 2016 FUJITSU LIMITED
Storage Basic Concepts
SAN Storage
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Objective
Copyright 2016 FUJITSU LIMITED1
 What is storage
 Types of Storage
 Storage Vendors
 Types of Disks
 RAID Technology
 SAN Switches & FC Cables
 Hardware parts
 Technical words
 What is Zoning
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
What is Storage?
Storage is the place where data is held in an electromagnetic or optical form for access
by a computer processor.
Computer understands Binary language (0 and 1). As such they store information
in that form as well.
1Bit = 0 or 1
8 Bits = 1 Byte
1024 Bytes = 1KB (Kilo Byte)
1024 KB = 1MB (Mega Byte)
1024 MB = 1GB (Giga Byte)
1024 GB = 1TB (Tera Byte)
1024 TB = 1PB (Peta Byte)
1024 PB = 1EB (Exa Byte)
1024 EB = 1ZB (Zetta Byte)
1024 ZB = 1YB (Yotta Byte)
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS 3 Copyright 2016 FUJITSU LIMITED
Types of Storage
DAS – Direct Attached Storage
NAS – Network Attached Storage
SAN – Storage Area Network
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Direct Attached Storage:
DAS is digital storage that is
attached directly to a computer
or a server.
DAS Limitations:
• Difficult to Manage
• Poor Scalability
• Poor capacity utilization
• Limited Availability
DAS – Direct Attached Storage
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
NAS – Network Attached Storage
NAS (Network-attached storage):
It is file-level computer data storage
connected to a computer network
providing data access to
heterogeneous clients.
Advantages of NAS:
* High Availability
* Redundancy
* Scalability
Disadvantages:
* Performance of the NAS will
depend upon the amount of
bandwidth available.
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
SAN- Storage Area Network
Advantages of SAN:
* High Availability
* Redundancy
* Scalability
* High Performance
Disadvantages:
* Very Expensive
* Complex to manage
SAN (Storage Area Network):
It is a specialized, high speed network
that provides block-level network
access to storage
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Storage Vendors
EMC
NetApp
IBM
HP
Hitachi
Fujitsu
Dell
Oracle
0%
5%
10%
15%
20%
25%
30%
35%
40%
EMC Netapp HPE IBM Others
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Types of Disks
• HDD
• ATA
• IDE
• SATA
• SCSI
• SSD
• FC
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
RAID Technology
RAID (Redundant Array of Inexpensive Disk) is a data storage virtualization technology that
combines multiple physical disk drive components into a single logical unit for the purposes of data
redundancy, performance improvement, or both.
Types of RAID:
RAID 0 – striping
RAID 1 – mirroring
RAID 5 – striping with parity
RAID 6 – striping with double parity
RAID 10 – combining mirroring and striping
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
SAN Switches & Fiber Channel
SAN Switch: It is device that connects servers and shared pools
of storage devices and is dedicated to moving storage traffic.
Fibre Channel, or FC, is a high-speed network technology
(commonly running at 1, 2, 4, 8, 16, 32, and 128 gigabit per
second rates) primarily used to connect computer data storage to
servers.
Fibre Channel is mainly used in storage area networks (SAN) in
commercial data centers.
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Major Hardware Parts in Storage Box
 PDU’s (power distribute Units)
 Controllers
 Disk Enclosures
 FE (Front End ports)
 BE (Back End Ports)
 Physical Disks
 FC / iSCSI Cables
 Blowers
 LED’s
11 Copyright 2016 FUJITSU LIMITED
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Hardware parts Description
 PDU’s :- PDU’s provide the power to storage box.
 Controllers :- It controls & manages all the attributes in storage box.
 Disk Enclosures :- DE contains the bays to load the physical drives.
 FE Ports :- By using FE ports we can connect Host / Fabric.
 BE Ports :- BE ports will use to connect the Enclosures / Disks.
 Physical disks :- Physical Disk refers to an actual physical HDD (or array
in a hardware RAID setup), whereas Logical Disk refers to a Volume that
has been created on that disk.
 FC / Iscsi cables :- These are used to connect SAN devices.
12 Copyright 2016 FUJITSU LIMITED
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Hardware Parts continuation
 Blowers :- Blowers will use to reduce the heat in devices.
 LED’s :- Light Emitting Diode is a semiconductor light source,
often used as an indicator light in electronic devices.
13 Copyright 2016 FUJITSU LIMITED
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Technical words in SAN
Array :-Array is nothing but grouping number of hard disks to
provide a huge storage is called array.
 Disk Group :- A disk group ties together multiple hard disks to
allow for one or multiple volumes across a RAID configuration
on these disks. When a RAID is created, all of the included
disks are recognized as one data partition
 Provisioning :- Provisioning is nothing but assign the storage to
host on request.
we have 2 types of Provisioning in storage
i) Thin Provisioning
ii) Thick Provisioning
14 Copyright 2016 FUJITSU LIMITED
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Technical words in SAN
 LUN:- Logical Unit Number
LUNs are a logical abstraction between a physical disk
device and applications. And is a unique identifier for designating
an individual or collection of physical or virtual storage devices
that execute input/output commands with a host computer, as
defined by the Small System Computer Interface (SCSI)
standard.
 Trace Pass:- Trace pass is nothing but change the ownership of
LUN’s in controllers.
15 Copyright 2016 FUJITSU LIMITED
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Technical words in SAN
 WWN’S :-
Associating a world wide name (WWN) to a logical unit
number (LUN) within a storage array is a way of implementing
data security in the SAN. Each HBA in your servers connected to
the SAN has a WWN. Within the storage array, you can assign
the WWN to a particular LUN so that even if zoning is not
implemented in the SAN fabric, only that particular HBA will have
access to that specific LUN. This is sometimes referred to as
"LUN masking.“
 Cache :- Cache is nothing but temporary storage in controller.
 Hot Spare:- A hot spare is a backup device that is usually in
standby mode but becomes immediately available if a primary
device / Disk component fails.
16 Copyright 2016 FUJITSU LIMITED
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Zoning
 What is zoning ?
zoning is the allocation of resources for device load balancing
and for selectively allowing access to data only to certain users.
There are two types zoning :- i) Hard Zoning
ii) Soft Zoning
Hard Zoning :- If we create the zoning by using switch port
number & Domain ID that is called hard zoning.
Soft Zoning :- If we create the zoning by using Host WWN’s &
Array WWN’s that is called Soft zoning.
17 Copyright 2016 FUJITSU LIMITED
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS
Technical Words at Fabric
 Alias
 Zone
 Zoneconfig
 Flogi
 Plogi
18 Copyright 2016 FUJITSU LIMITED
CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Copyright 2016 FUJITSU LIMITED19

Weitere ähnliche Inhalte

Was ist angesagt?

Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)
sandeepgodfather
 
ZFS
ZFSZFS
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
aleyeldean
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
sagaroceanic11
 

Was ist angesagt? (20)

vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
 
VMware vSphere Networking deep dive
VMware vSphere Networking deep diveVMware vSphere Networking deep dive
VMware vSphere Networking deep dive
 
CDW: SAN vs. NAS
CDW: SAN vs. NASCDW: SAN vs. NAS
CDW: SAN vs. NAS
 
Storage basics
Storage basicsStorage basics
Storage basics
 
NAS Concepts
NAS ConceptsNAS Concepts
NAS Concepts
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
ZFS
ZFSZFS
ZFS
 
Netapp Storage
Netapp StorageNetapp Storage
Netapp Storage
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
 
SAN
SANSAN
SAN
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
 
Storage Managment
Storage ManagmentStorage Managment
Storage Managment
 
Presentation v mware virtual san 6.0
Presentation   v mware virtual san 6.0Presentation   v mware virtual san 6.0
Presentation v mware virtual san 6.0
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
Understanding nas (network attached storage)
Understanding nas (network attached storage)Understanding nas (network attached storage)
Understanding nas (network attached storage)
 
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017
 

Ähnlich wie Storage

Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storage
sagaroceanic11
 
Sun storage tek 2500 series disk array technical presentation
Sun storage tek 2500 series disk array technical presentationSun storage tek 2500 series disk array technical presentation
Sun storage tek 2500 series disk array technical presentation
xKinAnx
 
Building a Distributed Block Storage System on Xen
Building a Distributed Block Storage System on XenBuilding a Distributed Block Storage System on Xen
Building a Distributed Block Storage System on Xen
The Linux Foundation
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown Donuts
David Pechon
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
ssuserec8a711
 

Ähnlich wie Storage (20)

Ip san-best-practices-en
Ip san-best-practices-enIp san-best-practices-en
Ip san-best-practices-en
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Introduction to Storage.ppt
Introduction to Storage.pptIntroduction to Storage.ppt
Introduction to Storage.ppt
 
Storage Area Network (SAN session Day-2)
Storage Area Network (SAN session Day-2)Storage Area Network (SAN session Day-2)
Storage Area Network (SAN session Day-2)
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storage
 
Sun storage tek 2500 series disk array technical presentation
Sun storage tek 2500 series disk array technical presentationSun storage tek 2500 series disk array technical presentation
Sun storage tek 2500 series disk array technical presentation
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
Storage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 NotesStorage Area Networks Unit 2 Notes
Storage Area Networks Unit 2 Notes
 
Building a Distributed Block Storage System on Xen
Building a Distributed Block Storage System on XenBuilding a Distributed Block Storage System on Xen
Building a Distributed Block Storage System on Xen
 
Spinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSpinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still Counts
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown Donuts
 
San Presentation
San PresentationSan Presentation
San Presentation
 
Storage Area Network
Storage Area NetworkStorage Area Network
Storage Area Network
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Cisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesCisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologies
 
Storage Networking and Overview ppt.pdf
Storage Networking and Overview ppt.pdfStorage Networking and Overview ppt.pdf
Storage Networking and Overview ppt.pdf
 
SAN and NAS Concepts - Eric Vanderburg - JurInnov
SAN and NAS Concepts - Eric Vanderburg - JurInnovSAN and NAS Concepts - Eric Vanderburg - JurInnov
SAN and NAS Concepts - Eric Vanderburg - JurInnov
 
Storage Primer
Storage PrimerStorage Primer
Storage Primer
 
Challenges in Managing IT Infrastructure
Challenges in Managing IT InfrastructureChallenges in Managing IT Infrastructure
Challenges in Managing IT Infrastructure
 

Storage

  • 1. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Copyright 2016 FUJITSU LIMITED Storage Basic Concepts SAN Storage
  • 2. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Objective Copyright 2016 FUJITSU LIMITED1  What is storage  Types of Storage  Storage Vendors  Types of Disks  RAID Technology  SAN Switches & FC Cables  Hardware parts  Technical words  What is Zoning
  • 3. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS What is Storage? Storage is the place where data is held in an electromagnetic or optical form for access by a computer processor. Computer understands Binary language (0 and 1). As such they store information in that form as well. 1Bit = 0 or 1 8 Bits = 1 Byte 1024 Bytes = 1KB (Kilo Byte) 1024 KB = 1MB (Mega Byte) 1024 MB = 1GB (Giga Byte) 1024 GB = 1TB (Tera Byte) 1024 TB = 1PB (Peta Byte) 1024 PB = 1EB (Exa Byte) 1024 EB = 1ZB (Zetta Byte) 1024 ZB = 1YB (Yotta Byte)
  • 4. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS 3 Copyright 2016 FUJITSU LIMITED Types of Storage DAS – Direct Attached Storage NAS – Network Attached Storage SAN – Storage Area Network
  • 5. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Direct Attached Storage: DAS is digital storage that is attached directly to a computer or a server. DAS Limitations: • Difficult to Manage • Poor Scalability • Poor capacity utilization • Limited Availability DAS – Direct Attached Storage
  • 6. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS NAS – Network Attached Storage NAS (Network-attached storage): It is file-level computer data storage connected to a computer network providing data access to heterogeneous clients. Advantages of NAS: * High Availability * Redundancy * Scalability Disadvantages: * Performance of the NAS will depend upon the amount of bandwidth available.
  • 7. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS SAN- Storage Area Network Advantages of SAN: * High Availability * Redundancy * Scalability * High Performance Disadvantages: * Very Expensive * Complex to manage SAN (Storage Area Network): It is a specialized, high speed network that provides block-level network access to storage
  • 8. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Storage Vendors EMC NetApp IBM HP Hitachi Fujitsu Dell Oracle 0% 5% 10% 15% 20% 25% 30% 35% 40% EMC Netapp HPE IBM Others
  • 9. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Types of Disks • HDD • ATA • IDE • SATA • SCSI • SSD • FC
  • 10. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS RAID Technology RAID (Redundant Array of Inexpensive Disk) is a data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both. Types of RAID: RAID 0 – striping RAID 1 – mirroring RAID 5 – striping with parity RAID 6 – striping with double parity RAID 10 – combining mirroring and striping
  • 11. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS SAN Switches & Fiber Channel SAN Switch: It is device that connects servers and shared pools of storage devices and is dedicated to moving storage traffic. Fibre Channel, or FC, is a high-speed network technology (commonly running at 1, 2, 4, 8, 16, 32, and 128 gigabit per second rates) primarily used to connect computer data storage to servers. Fibre Channel is mainly used in storage area networks (SAN) in commercial data centers.
  • 12. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Major Hardware Parts in Storage Box  PDU’s (power distribute Units)  Controllers  Disk Enclosures  FE (Front End ports)  BE (Back End Ports)  Physical Disks  FC / iSCSI Cables  Blowers  LED’s 11 Copyright 2016 FUJITSU LIMITED
  • 13. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Hardware parts Description  PDU’s :- PDU’s provide the power to storage box.  Controllers :- It controls & manages all the attributes in storage box.  Disk Enclosures :- DE contains the bays to load the physical drives.  FE Ports :- By using FE ports we can connect Host / Fabric.  BE Ports :- BE ports will use to connect the Enclosures / Disks.  Physical disks :- Physical Disk refers to an actual physical HDD (or array in a hardware RAID setup), whereas Logical Disk refers to a Volume that has been created on that disk.  FC / Iscsi cables :- These are used to connect SAN devices. 12 Copyright 2016 FUJITSU LIMITED
  • 14. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Hardware Parts continuation  Blowers :- Blowers will use to reduce the heat in devices.  LED’s :- Light Emitting Diode is a semiconductor light source, often used as an indicator light in electronic devices. 13 Copyright 2016 FUJITSU LIMITED
  • 15. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Technical words in SAN Array :-Array is nothing but grouping number of hard disks to provide a huge storage is called array.  Disk Group :- A disk group ties together multiple hard disks to allow for one or multiple volumes across a RAID configuration on these disks. When a RAID is created, all of the included disks are recognized as one data partition  Provisioning :- Provisioning is nothing but assign the storage to host on request. we have 2 types of Provisioning in storage i) Thin Provisioning ii) Thick Provisioning 14 Copyright 2016 FUJITSU LIMITED
  • 16. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Technical words in SAN  LUN:- Logical Unit Number LUNs are a logical abstraction between a physical disk device and applications. And is a unique identifier for designating an individual or collection of physical or virtual storage devices that execute input/output commands with a host computer, as defined by the Small System Computer Interface (SCSI) standard.  Trace Pass:- Trace pass is nothing but change the ownership of LUN’s in controllers. 15 Copyright 2016 FUJITSU LIMITED
  • 17. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Technical words in SAN  WWN’S :- Associating a world wide name (WWN) to a logical unit number (LUN) within a storage array is a way of implementing data security in the SAN. Each HBA in your servers connected to the SAN has a WWN. Within the storage array, you can assign the WWN to a particular LUN so that even if zoning is not implemented in the SAN fabric, only that particular HBA will have access to that specific LUN. This is sometimes referred to as "LUN masking.“  Cache :- Cache is nothing but temporary storage in controller.  Hot Spare:- A hot spare is a backup device that is usually in standby mode but becomes immediately available if a primary device / Disk component fails. 16 Copyright 2016 FUJITSU LIMITED
  • 18. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Zoning  What is zoning ? zoning is the allocation of resources for device load balancing and for selectively allowing access to data only to certain users. There are two types zoning :- i) Hard Zoning ii) Soft Zoning Hard Zoning :- If we create the zoning by using switch port number & Domain ID that is called hard zoning. Soft Zoning :- If we create the zoning by using Host WWN’s & Array WWN’s that is called Soft zoning. 17 Copyright 2016 FUJITSU LIMITED
  • 19. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Technical Words at Fabric  Alias  Zone  Zoneconfig  Flogi  Plogi 18 Copyright 2016 FUJITSU LIMITED
  • 20. CONFIDENTIAL MATERIAL / RESTRICTED ACCESSCONFIDENTIAL MATERIAL / RESTRICTED ACCESS Copyright 2016 FUJITSU LIMITED19

Hinweis der Redaktion

  1. 0