SlideShare ist ein Scribd-Unternehmen logo
1 von 33
SAN Introduction – Day2
Agenda
 Thin and Thick Provisioning
 Deduplication
 High Availability
 Virtualization
 LUN assignment
 Networking
 Zoning
2
Thin Provisioning
Definition-:A thin-provisioned volume is
a volume for which storage is not set
aside up-front. Instead, the storage for
the volume is allocated as it is needed.
Thick Provisioning
Definition-: In virtual storage,
thick provisioning is a type of
storage allocation in which the
amount of storage capacity on a
volume is pre-allocated on
physical storage (aggregate) at
the time the volume is created.
NetApp Deduplication
Deduplication refers to the elimination
of redundant data in the storage. In
the deduplication process, duplicate
data is deleted, leaving only one copy
of the data to be stored. However,
indexing of all data is still retained
should that data ever be required. De-
duplication is able to reduce the
required storage capacity since only
the unique data is stored.
Introduction
of
Storage Area Network
High Availability
High availability means the
amount of time the network
services and data are accessible.
In many enterprises ensuring
data availability at any time and
at any place is the highest
priority.
Benefits of HA
Data access at anytime
Nondisruptive OS upgrade and hardware upgrade
The nondisruptive upgrade method can be used to replace or upgrade the following components
1.The storage system
2.Motherboard
3.Adapters
4.Nonvolaile RAM(NVRAM)
5.Disks
6.Other network interface components
Multi-Tenancy; What is it?
Shared infrastructure: hardware and
software
Administrative isolation and control
Supporting multiple “tenants” (users,
customers, etc.) from single shared
infrastructure while keeping all data isolated
and secure
Customers concerned with security and
privacy require secure multi-tenancy
– Government agencies
– Financial companies
– Service Providers
– Etc.
14
Secure Multi-tenancy for virtualized environments
Solution
The only validated solution to support end
to end multitenancy across application and
data
Data is securely isolated from virtual server,
network, to virtual storage
Introducing MultiStore
Creates multiple system partitions (vFiler units)
on a single NetApp storage system.
Each vFiler unit is secure (Data owned by one
vFiler unit can’t be accessed by any other vFiler
unit though they are hosted on a same physical
storage system)
16
Multistore and Vfiler
A logical partition of N/W and storage resource in Data ONTAP called multistore and it provides a
secure storage consolidation solution.
When enabled, the Multistore license creates a logical unit called vFiler0 which contains all of the
storage and network resources of the physical FAS unit. Additional vFilers can then be created
with storage and network resources assigned specifically to them.
What is Vfiler ?
A lightweight Instance of Data ONTAP Multi protocol server and all the system resource are shared
b/w Vfiler units.
-Storage units in the vfilers are Flexvols and Qtrees
-Network Units are IP Address, VLAN, VIFs, aliases and IPspaces
-Vfiler units are not hypervisors –vfiler resource cannot be accessed and discovered by any other
vfiler units
Multi store configuration:
Up to 65 secure partitions (vFiler units) on a single
storage system (64+vfiler0)
IP Storage based (NFS,CIFS & iSCSI servers)
Additional storage and n/w resource can be moved,
added or deleted
NFS, CIFS, iSCSI, HTTP, NDMP, FTP, SSH and SFTP
protocols are supported
-Protocols can be enabled / disabled per vFiler
-Destroying a vFiler does not destroy data
What Makes MultiStore Secure?
– IPspaces
– Administrative separation
– Protocol separation
– Storage separation
An IPspace has a dedicated routing table
Each physical interface (Ethernet port) or logical interface (VLAN) is bound to a single Ipspace
A single IPspace may have multiple physical & logical interfaces bound to it
Each customer has a unique IPspace
Use of VLANs or VIFs is a best practice with IPspaces
File Services Consolidation
Application Hosting
Always-On Data Mobility
No planned downtime for-:
Storage capacity expansion
Scheduled maintenance outages
Software Upgrades
FC Switch
Fabric Address
MAC address in networking is 48 bit like in SAN fabric address is 24 bit address.
01:EF:03:12:08:ef (12*4=48 bit MAC for NIC)
Fabric Address(24bit)-:
Domain ID : Area ID : ALPA
8 bit 8 bit 8 bit
We have decimal numbers -0 -9
Hexadecimal-0-9,A,B,C,D,E,F,10 to 1F,20 to 2F,F0-FF
Fabric Address
26
01-EF address are used for addressing and F0 and FF are reserved.
EF= E * 161 + F * 160
=14 * 16 + 15 * 1
=239
So we can connect 239 switches in a single fabric but domain ID will be different for each switch
Area- 8 bit address given to each port so 28 = 256 (Max) ports
First port address is 0 and last is EF
Example-16 ports, 32 ports ..etc.
ALPA- Arbitrated loop physical address 8 bit address.
Single port with multiple servers can be connected.
Fiber channel switch port interface
Switch Ports
E_Port :- Expansion port, two switches to make a
fabric
F_Port :- A fabric port to which an N-port attaches
FL_port :- A fabric loop port which a loop attaches
Device Ports
N_Port :- Port designator for direct fabric attached
devices.
NL_Port :- Device that is attached to the loop (host
and storage)
Fabric Address for Initiator & Target
NETWORKING
Why FC is used in FC SAN?
Advantage-:
-FC carries multiple protocols and it also carries FC
-Existing protocol can carry through FC
-Carrying SCSI data through FCP called SCSI—FCP
-Carrying IP data over FC called FCIP
-Large connectivity (16 millions devices)
-High performance and speed (16gb/sec)
-Low latency (Latency in SAN Microseconds)
Disadvantage-:Costly
FC LAYERS
 FC0-Physical layer –understanding of physical components
 FC1- 8b/10bEncoding and Decoding –Internal
 FC2-Data delivery –Fragmentation
 FC3-Common services –Advance components
 FC4-ULP mapping (Upper level protocol mapping)
31
ZONING
Zoning= Opening a path between the N-ports
How can we open the path?
Zone can be implemented by-:
1.WWN zoning (Soft Zoning)
2.Port zoning (Hard Zoning)
Storage Area Network (SAN session Day-2)

Weitere ähnliche Inhalte

Was ist angesagt?

Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 

Was ist angesagt? (20)

NAS - Network Attached Storage
NAS - Network Attached StorageNAS - Network Attached Storage
NAS - Network Attached Storage
 
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data CenterFibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
Fibre Channel over Ethernet (FCoE), iSCSI and the Converged Data Center
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
IBM general parallel file system - introduction
IBM general parallel file system - introductionIBM general parallel file system - introduction
IBM general parallel file system - introduction
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Cloud Resource Management
Cloud Resource ManagementCloud Resource Management
Cloud Resource Management
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Nfs
NfsNfs
Nfs
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
NAS Concepts
NAS ConceptsNAS Concepts
NAS Concepts
 
Introduction to CloudStack
Introduction to CloudStack Introduction to CloudStack
Introduction to CloudStack
 
iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)iSCSI (Internet Small Computer System Interface)
iSCSI (Internet Small Computer System Interface)
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
Introduction to Storage technologies
Introduction to Storage technologiesIntroduction to Storage technologies
Introduction to Storage technologies
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
Memory virtualization
Memory virtualizationMemory virtualization
Memory virtualization
 

Ähnlich wie Storage Area Network (SAN session Day-2)

Introduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer versionIntroduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer version
TinaBregovi
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
ssuserec8a711
 

Ähnlich wie Storage Area Network (SAN session Day-2) (20)

final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Nas fundamentals
Nas fundamentalsNas fundamentals
Nas fundamentals
 
Kiến trúc mạng cho hệ thống VDI - Mr Nguyễn Phạm Vĩnh Khương
Kiến trúc mạng cho hệ thống VDI - Mr Nguyễn Phạm Vĩnh KhươngKiến trúc mạng cho hệ thống VDI - Mr Nguyễn Phạm Vĩnh Khương
Kiến trúc mạng cho hệ thống VDI - Mr Nguyễn Phạm Vĩnh Khương
 
Storage Primer
Storage PrimerStorage Primer
Storage Primer
 
Storage
StorageStorage
Storage
 
IBM System p Virtualisation.ppt
IBM System p Virtualisation.pptIBM System p Virtualisation.ppt
IBM System p Virtualisation.ppt
 
Netapp Deduplication concepts
Netapp Deduplication conceptsNetapp Deduplication concepts
Netapp Deduplication concepts
 
Introduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer versionIntroduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer version
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Hitachi NAS Platform 4000 Series Datasheet
Hitachi NAS Platform 4000 Series DatasheetHitachi NAS Platform 4000 Series Datasheet
Hitachi NAS Platform 4000 Series Datasheet
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged Environments
 
Simple Virtualization Overview
Simple Virtualization OverviewSimple Virtualization Overview
Simple Virtualization Overview
 
Introduction to IPFS & Filecoin
Introduction to IPFS & FilecoinIntroduction to IPFS & Filecoin
Introduction to IPFS & Filecoin
 
Emc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshopEmc vnx2 technical deep dive workshop
Emc vnx2 technical deep dive workshop
 
Emc
EmcEmc
Emc
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
Huawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS OverviewHuawei Symantec Oceanspace N8000 clustered NAS Overview
Huawei Symantec Oceanspace N8000 clustered NAS Overview
 
T1-9-2.ppt
T1-9-2.pptT1-9-2.ppt
T1-9-2.ppt
 
iSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini bandiSCSi , FCSAN ,FC protocol stack and Infini band
iSCSi , FCSAN ,FC protocol stack and Infini band
 
Nutanix - Expert Session - Metro Availability
Nutanix -  Expert Session - Metro AvailabilityNutanix -  Expert Session - Metro Availability
Nutanix - Expert Session - Metro Availability
 

Mehr von Saroj Sahu

Mehr von Saroj Sahu (20)

How to shutdown the Netapp SAN 8.3 and 9.2 version
How to shutdown the Netapp SAN 8.3 and 9.2 versionHow to shutdown the Netapp SAN 8.3 and 9.2 version
How to shutdown the Netapp SAN 8.3 and 9.2 version
 
How to Shutdown Netapp Cluster Mode Storage System with Multi-Node Cluster (6...
How to Shutdown Netapp Cluster Mode Storage System with Multi-Node Cluster (6...How to Shutdown Netapp Cluster Mode Storage System with Multi-Node Cluster (6...
How to Shutdown Netapp Cluster Mode Storage System with Multi-Node Cluster (6...
 
Autosupport email sending failed issue netapp cluster mode-
Autosupport email sending failed issue netapp cluster mode-Autosupport email sending failed issue netapp cluster mode-
Autosupport email sending failed issue netapp cluster mode-
 
How to assign the disks in Netapp storage cluster mode 8.X
How to assign the disks in Netapp storage cluster mode 8.XHow to assign the disks in Netapp storage cluster mode 8.X
How to assign the disks in Netapp storage cluster mode 8.X
 
How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3 How to assign unowned disk in the netapp cluster 8.3
How to assign unowned disk in the netapp cluster 8.3
 
Use of administrative privilege levels in netapp cluster 8.x
Use of administrative privilege levels in netapp cluster 8.xUse of administrative privilege levels in netapp cluster 8.x
Use of administrative privilege levels in netapp cluster 8.x
 
Different type of shells In Netapp Cluster mode 8.X and how to access them t...
Different type of shells In Netapp Cluster mode 8.X  and how to access them t...Different type of shells In Netapp Cluster mode 8.X  and how to access them t...
Different type of shells In Netapp Cluster mode 8.X and how to access them t...
 
How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)How to access the Netapp cluster mode 8.2 through CLI (command mode)
How to access the Netapp cluster mode 8.2 through CLI (command mode)
 
How to shut down Netapp san 9.2 cluster mode version1
How to shut down Netapp san 9.2 cluster mode version1How to shut down Netapp san 9.2 cluster mode version1
How to shut down Netapp san 9.2 cluster mode version1
 
Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...Unable to access the net app cluster mode 9.2 san through gui after power mai...
Unable to access the net app cluster mode 9.2 san through gui after power mai...
 
Volume migration from one aggregate to other without impacting the applicatio...
Volume migration from one aggregate to other without impacting the applicatio...Volume migration from one aggregate to other without impacting the applicatio...
Volume migration from one aggregate to other without impacting the applicatio...
 
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
Uable to do ssh from the RedHat Linux machine to Netapp filer 7 mode storage ...
 
How to work seamlessly in your vm without pressing host key again and again
How to work seamlessly in your vm without pressing host key again and againHow to work seamlessly in your vm without pressing host key again and again
How to work seamlessly in your vm without pressing host key again and again
 
Deleting a vserver in Netapp cluster mode
Deleting a vserver in Netapp cluster mode  Deleting a vserver in Netapp cluster mode
Deleting a vserver in Netapp cluster mode
 
How to enable efficiency (deduplication and compression in netapp cluster mod...
How to enable efficiency (deduplication and compression in netapp cluster mod...How to enable efficiency (deduplication and compression in netapp cluster mod...
How to enable efficiency (deduplication and compression in netapp cluster mod...
 
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...How to see the event and audit logs through ( gui and cli) in cluster ontap n...
How to see the event and audit logs through ( gui and cli) in cluster ontap n...
 
How to see the log files through ( gui and cli) in cluster ontap netapp stora...
How to see the log files through ( gui and cli) in cluster ontap netapp stora...How to see the log files through ( gui and cli) in cluster ontap netapp stora...
How to see the log files through ( gui and cli) in cluster ontap netapp stora...
 
Snapshot technology Netapp storage
Snapshot technology Netapp storageSnapshot technology Netapp storage
Snapshot technology Netapp storage
 
SAN High availability (Netapp Storage)
SAN High availability (Netapp Storage) SAN High availability (Netapp Storage)
SAN High availability (Netapp Storage)
 
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
3PAR: HOW TO CHANGE THE IP ADDRESS OF HP 3PAR SAN
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Storage Area Network (SAN session Day-2)

  • 2. Agenda  Thin and Thick Provisioning  Deduplication  High Availability  Virtualization  LUN assignment  Networking  Zoning 2
  • 3. Thin Provisioning Definition-:A thin-provisioned volume is a volume for which storage is not set aside up-front. Instead, the storage for the volume is allocated as it is needed.
  • 4. Thick Provisioning Definition-: In virtual storage, thick provisioning is a type of storage allocation in which the amount of storage capacity on a volume is pre-allocated on physical storage (aggregate) at the time the volume is created.
  • 5. NetApp Deduplication Deduplication refers to the elimination of redundant data in the storage. In the deduplication process, duplicate data is deleted, leaving only one copy of the data to be stored. However, indexing of all data is still retained should that data ever be required. De- duplication is able to reduce the required storage capacity since only the unique data is stored.
  • 6.
  • 8.
  • 9.
  • 10. High Availability High availability means the amount of time the network services and data are accessible. In many enterprises ensuring data availability at any time and at any place is the highest priority.
  • 11.
  • 12.
  • 13. Benefits of HA Data access at anytime Nondisruptive OS upgrade and hardware upgrade The nondisruptive upgrade method can be used to replace or upgrade the following components 1.The storage system 2.Motherboard 3.Adapters 4.Nonvolaile RAM(NVRAM) 5.Disks 6.Other network interface components
  • 14. Multi-Tenancy; What is it? Shared infrastructure: hardware and software Administrative isolation and control Supporting multiple “tenants” (users, customers, etc.) from single shared infrastructure while keeping all data isolated and secure Customers concerned with security and privacy require secure multi-tenancy – Government agencies – Financial companies – Service Providers – Etc. 14
  • 15. Secure Multi-tenancy for virtualized environments Solution The only validated solution to support end to end multitenancy across application and data Data is securely isolated from virtual server, network, to virtual storage
  • 16. Introducing MultiStore Creates multiple system partitions (vFiler units) on a single NetApp storage system. Each vFiler unit is secure (Data owned by one vFiler unit can’t be accessed by any other vFiler unit though they are hosted on a same physical storage system) 16
  • 17. Multistore and Vfiler A logical partition of N/W and storage resource in Data ONTAP called multistore and it provides a secure storage consolidation solution. When enabled, the Multistore license creates a logical unit called vFiler0 which contains all of the storage and network resources of the physical FAS unit. Additional vFilers can then be created with storage and network resources assigned specifically to them. What is Vfiler ? A lightweight Instance of Data ONTAP Multi protocol server and all the system resource are shared b/w Vfiler units. -Storage units in the vfilers are Flexvols and Qtrees -Network Units are IP Address, VLAN, VIFs, aliases and IPspaces -Vfiler units are not hypervisors –vfiler resource cannot be accessed and discovered by any other vfiler units
  • 18. Multi store configuration: Up to 65 secure partitions (vFiler units) on a single storage system (64+vfiler0) IP Storage based (NFS,CIFS & iSCSI servers) Additional storage and n/w resource can be moved, added or deleted NFS, CIFS, iSCSI, HTTP, NDMP, FTP, SSH and SFTP protocols are supported -Protocols can be enabled / disabled per vFiler -Destroying a vFiler does not destroy data
  • 19. What Makes MultiStore Secure? – IPspaces – Administrative separation – Protocol separation – Storage separation An IPspace has a dedicated routing table Each physical interface (Ethernet port) or logical interface (VLAN) is bound to a single Ipspace A single IPspace may have multiple physical & logical interfaces bound to it Each customer has a unique IPspace Use of VLANs or VIFs is a best practice with IPspaces
  • 20.
  • 23. Always-On Data Mobility No planned downtime for-: Storage capacity expansion Scheduled maintenance outages Software Upgrades
  • 25. Fabric Address MAC address in networking is 48 bit like in SAN fabric address is 24 bit address. 01:EF:03:12:08:ef (12*4=48 bit MAC for NIC) Fabric Address(24bit)-: Domain ID : Area ID : ALPA 8 bit 8 bit 8 bit We have decimal numbers -0 -9 Hexadecimal-0-9,A,B,C,D,E,F,10 to 1F,20 to 2F,F0-FF
  • 26. Fabric Address 26 01-EF address are used for addressing and F0 and FF are reserved. EF= E * 161 + F * 160 =14 * 16 + 15 * 1 =239 So we can connect 239 switches in a single fabric but domain ID will be different for each switch Area- 8 bit address given to each port so 28 = 256 (Max) ports First port address is 0 and last is EF Example-16 ports, 32 ports ..etc. ALPA- Arbitrated loop physical address 8 bit address. Single port with multiple servers can be connected.
  • 27. Fiber channel switch port interface Switch Ports E_Port :- Expansion port, two switches to make a fabric F_Port :- A fabric port to which an N-port attaches FL_port :- A fabric loop port which a loop attaches Device Ports N_Port :- Port designator for direct fabric attached devices. NL_Port :- Device that is attached to the loop (host and storage)
  • 28. Fabric Address for Initiator & Target
  • 29. NETWORKING Why FC is used in FC SAN? Advantage-: -FC carries multiple protocols and it also carries FC -Existing protocol can carry through FC -Carrying SCSI data through FCP called SCSI—FCP -Carrying IP data over FC called FCIP -Large connectivity (16 millions devices) -High performance and speed (16gb/sec) -Low latency (Latency in SAN Microseconds) Disadvantage-:Costly
  • 30. FC LAYERS  FC0-Physical layer –understanding of physical components  FC1- 8b/10bEncoding and Decoding –Internal  FC2-Data delivery –Fragmentation  FC3-Common services –Advance components  FC4-ULP mapping (Upper level protocol mapping)
  • 31. 31
  • 32. ZONING Zoning= Opening a path between the N-ports How can we open the path? Zone can be implemented by-: 1.WWN zoning (Soft Zoning) 2.Port zoning (Hard Zoning)