Professional Documents
Culture Documents
2-5 - Storage - Network - Architecture - Copie
2-5 - Storage - Network - Architecture - Copie
Foreword
With the development of host, disk, and network technologies, the storage
system architecture evolves, and the storage network architecture also
develops to meet service requirements. This lesson introduces the storage
network architecture.
2 Huawei Confidential
Objectives
3 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
4 Huawei Confidential
DAS
Server Server
CPU CPU
RAM
RAM
Disk
Disk
SCSI card
RAID SCSI card
Controller
JBOD
5 Huawei Confidential
Challenges for DAS
Challenges Description
Limited distance.
Inconvenient
The system needs to be powered off during maintenance.
Maintenance
6 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed architecture
7 Huawei Confidential
NAS
Network-attached storage (NAS) connects storage devices to the
live network and provides data and file services.
The most commonly used network sharing protocols for NAS are
Common Internet File System (CIFS) and Network File System Benefits:
(NFS). Improved efficiency
OS: Windows Improved flexibility
Centralized storage
Simplified management
OS: Linux High scalability
High availability
Security (user
Switch NAS device authentication and
OS: MAC OS authorization)
8 Huawei Confidential
General-Purpose Server and NAS Devices
File system
Application
OS
Printer driver
Network
File system
OS
Network Uni-functional
NAS device
General-purpose server
(Windows or UNIX)
9 Huawei Confidential
NAS Protocols
Enterprise Enterprise
office office • NFS
• CIFS
IP IP IP IP
• FTP
Linux Windows
• HTTP
IP IP IP IP
• NDMP
NFS CIFS
FS
CACHE
POOL
10 Huawei Confidential
Working Principles of NFS
POR TMAP
Client Server Port mapping
1. RPC request
table
Request
RPC
Registration
NFS share
information
11 Huawei Confidential
Typical Application of NFS: Shared Storage for Cloud
Computing
Cloud computing uses the NFS server as the internal shared storage.
Converged storage
NFS client
External IP network
network Cloud computing server
NFS server
Cloud computing server
12 Huawei Confidential
Working Principles of CIFS
Client Server
SMB NEGOTIATE Request
Protocol Protocol
SMB NEGOTIATE Response negotiation handshake
13 Huawei Confidential
Typical Application of CIFS: File Sharing Service
The file sharing service applies to scenarios such as enterprise file servers and
Enterprise office
media assets.
IP Windows IP IP Management
NAS service
LAN
DNS
Authentication flow
AD server Management flow
Data flow
14 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
IP SAN Technologies
▫ FC SAN Technologies
4. Distributed Architecture
15 Huawei Confidential
NIC + Initiator Software
NIC
Internal bus
Storage device Ethernet
16 Huawei Confidential
TOE NIC + Initiator Software
The initiator software
implements the
functions of the iSCSI
layer, which consumes
host resources.
The TOE NIC implements
TCP/IP conversion, which
TOE NIC does not consume host
resources.
TCP/IP-based IP SAN
Ethernet connection
Internal bus
Storage device Ethernet
17 Huawei Confidential
iSCSI HBA
TCP/IP-based IP SAN
Ethernet connection
Internal bus
18 Huawei Confidential
Logical Port
Logical ports are created based on bond ports, VLAN ports, or Ethernet ports. The logical ports
are virtual ports that carry host services.
A unique IP address is allocated to each logical port for carrying its services.
No. Description
Logical port
Indicates that multiple Ethernet ports are 4
1
bonded to form a bond port.
One to One to
5
Indicates that an Ethernet port is added many many
2
to multiple VLANs.
Indicates that a bond port is added to One to
3
One to
3 Bond port VLAN
multiple VLANs. many many
Indicates that a bond port is used to
4
create multiple logical ports.
Many to One to
2
Indicates that a VLAN port is used to one many 6
5
create multiple logical ports. 1
19 Huawei Confidential
VLAN Configuration
VLAN is a technology that logically divides a physical LAN into multiple broadcast
domains.
Ethernet ports or bond ports in a storage system can be added to multiple independent
VLANs. You can configure different services in different VLANs to ensure the security
and reliability of service data.
Ethernet port
Bond port
P0 P1 P2 P3 Storage device
Adding ports to VLANs
20 Huawei Confidential
IP Address Failover
IP address failover indicates that a logical IP address fails over from a faulty port to an available
port. In this way, services are switched from the faulty port to the available port without
interruption. The faulty port can take over services back after being recovered.
During the IP address failover, services are switched from the faulty port to the available port,
ensuring service continuity and improving reliability of paths for accessing file systems. This
process is transparent to users.
The essence is a service switchover between ports. The ports can be Ethernet ports, bond ports, or
VLAN ports.
21 Huawei Confidential
Ethernet Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can create logical ports based on
Ethernet ports.
When the Ethernet port that corresponds to a logical port fails, the system will:
22 Huawei Confidential
Bond Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can bond multiple Ethernet ports to
form a bond port.
When the Ethernet ports that are used to create the bond port fails, the system will:
can take over services again. Ethernet port B Ethernet port B Ethernet port D
Bond Port A Bond Port A Bond Port A
23 Huawei Confidential
VLAN-based IP Address Failover
You can create VLANs to isolate different services.
When an Ethernet port on a VLAN fails, the system will:
24 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
FC SAN Technologies
4. Distributed Architecture
25 Huawei Confidential
FC HBA
Fibre Channel
FC SAN
protocol-based
Internal bus
26 Huawei Confidential
FC Network
27 Huawei Confidential
Zoning
Server 1 Server 2
Storage 1 Storage 2
28 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
▫ FC SAN Technologies
Comparison Between IP SAN and FC SAN
4. Distributed Architecture
29 Huawei Confidential
IP SAN and FC SAN
iSCSI
FC FC
IP
SCSI
IP
FC FC
iSCSI
30 Huawei Confidential
Comparison Between IP SAN and FC SAN
Item IP SAN FC SAN
Dedicated Fibre Channel networks and
Network architecture Existing IP networks
HBAs
Transmission Limited by the maximum transmission
Not limited theoretically
distance distance of optical fibers
Management and Complicated technologies and
As simple as operating IP devices
maintenance management
Compatibility Compatible with all IP network devices Poor compatibility
High purchase (Fibre Channel switches,
Lower purchase and maintenance costs HBAs, Fibre Channel disk arrays, and so
Cost than FC SAN, higher return on on) and maintenance (staff training,
investment (ROI) system configuration and supervision,
and so on) costs
Disaster recovery Local and remote DR available based High hardware and software costs for
(DR) on existing networks at a low cost DR
Security Relatively low Relatively high
31 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
32 Huawei Confidential
Distributed Storage Networking
Node 1
Frontend service
network
Node 2
Node 3
Management
network
Node 4
Node 5
Backend storage network
33 Huawei Confidential
Networking Overview
Frontend service/Tenant network
The front-end service/tenant network is used to interconnect the distributed storage with the customer network. It
provides the tenant UI for tenant users to complete operations such as resource application and usage query, and
processes service requests sent by tenant clients or APIs.
Management network
The management network is used to interconnect with the customer's maintenance network. It provides a management
UI for the system administrator to perform service operations such as system configuration, tenant management,
resource management, and service provisioning, as well as maintenance operations such as alarm, performance, and
topology management. In addition, the Mgmt ports of all physical nodes can be aggregated to provide remote device
maintenance capabilities, such as remotely logging in to the virtual KVM of a device and viewing hardware running data
such as temperature and voltage.
34 Huawei Confidential
Network Planes
Management Management
Private client node Standard protocol node
access mode FSM access mode FSM
OSD OSD
Third-place Third-place
DR site quorum DR site quorum Management plane:
server server Storage plane:
Replication plane:
Arbitration plane:
Service plane:
35 Huawei Confidential
Networking Rules
Nodes must be placed in a cabinet from bottom to top.
A deployment solution is usually chosen based on project requirements. The
total power consumption and weight of the storage nodes, switches, and KVM
in a cabinet must be calculated and the number of nodes that can be housed by
a cabinet must be determined based on the equipment room conditions.
In typical configuration, nodes and switches in the base cabinet are connected
through network cables and SFP+ cables, and nodes in an expansion cabinet
connect to switches in the base cabinet through network cables and optical
fibers.
36 Huawei Confidential
Quiz
1. Which of the following are included in distributed storage networking?
A. Management network
B. iSCSI
C. CIFS
D. NFS
37 Huawei Confidential
Summary
DAS
NAS IP SAN
Storage network
architecture evolution
SAN FC SAN
Comparison between
Distributed architecture
IP SAN and FC SAN
38 Huawei Confidential
More Information
39 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
40 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.