HCIA-Storage V4.5 Training Material SESION 2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 282

Intelligent Storage Components

Foreword

 This chapter describes the components of the storage system, including the
controller enclosure, disk enclosure, disks, interface modules, and
connection modes between enclosures and their respective working
principles.

1 Huawei Confidential
Objectives

Upon completion of this course, you will understand:


 Storage product forms
 Functions and components of controller enclosures and disk enclosures
 Working principles of HDDs and SSDs
 Cables and interface modules for connecting storage enclosures and the
connection methods

2 Huawei Confidential
Contents

1. Controller Enclosure

2. Disk Enclosure

3. Expansion Module

4. Disk

5. Interface Module

3 Huawei Confidential
Storage Product Form

2 U, disk and 4 U, disk and Integrated bay


controller integration controller separation

Note: Huawei OceanStor Dorado V6 is used as the example.

4 Huawei Confidential
Controller Enclosure
 The controller enclosure uses a modular design and consists of a system subrack,
controllers (with built-in fan modules), BBUs, power modules, management modules,
and interface modules. Management
Power Module Module
Interface
Module

System Subrack

Controller

5 Huawei Confidential
Front View of a Controller Enclosure
Icon Description

Enclosure ID indicator

Enclosure location indicator


1. Blinking blue: The controller
enclosure is being located.
2U controller enclosure (disk and controller integration) 2. Off: The controller enclosure is
not located.
Enclosure alarm indicator
1. Steady amber: An alarm is
reported by the controller
enclosure.
2. Off: The controller enclosure is
working properly.

Power indicator/Power button


4U controller enclosure (disk and controller separation)

Note: Huawei OceanStor Dorado V6 is used as the example.

6 Huawei Confidential
Rear View of a Controller Enclosure
1 2 3 4 5

No. Description
1 Management port
2 Maintenance port
6 7 3 Serial port
4 Interface module
5 Power-BBU module
6 SAS expansion port
7 Interface module
8 Management module
9 Power module
8 9

7 Huawei Confidential
Controller
 A controller is the core component of a storage system. It processes storage
services, receives configuration management commands, saves configuration
data, connects to disks, and saves critical data to coffer disks.

Controller enclosure
FE FE

Controller Controller
Cache Cache

CPU CPU

BE BE

Disk
enclosure
Cache data

8 Huawei Confidential
BBU and Fan Module

BBU latch Fan latch

Fan module

Running/Alarm Running/Alarm
indicator of the BBU indicator of the fan
BBU Front view

9 Huawei Confidential
Coffer Disk

2.5-inch coffer disk Palm-sized NVMe coffer SSD

Alarm/Location indicator Alarm/Location indicator


Running indicator Running indicator

Latch Latch

Handle Handle

Disk Disk

Label Label

Note: Huawei OceanStor Dorado V6 is used as the example.

10 Huawei Confidential
Power Module
 The AC power module supplies power to the controller enclosure, allowing the
enclosure to operate normally at maximum power. Running/
Alarm
Handle indicator Latch

Power socket
Note: Huawei OceanStor Dorado V6 is used as the example.

11 Huawei Confidential
Contents

1. Controller Enclosure

2. Disk Enclosure

3. Expansion Module

4. Disk

5. Interface Module

12 Huawei Confidential
Disk Enclosure
 The disk enclosure uses a modular design and consists of a system subrack,
expansion modules, power modules, and disks.
Power
Module
Expansion
Module

System Subrack

Disk Drive
Module

13 Huawei Confidential
Front View of a Disk Enclosure
Icon Description

ID indicator of the disk enclosure

Location indicator of the disk enclosure


1. Blinking blue: The disk enclosure is being located.
2. Off: The disk enclosure is not located.
2 U 25-slot SAS disk enclosure
Alarm indicator of the disk enclosure
1. Steady yellow: An alarm is reported by the disk
enclosure.
2. Off: The disk enclosure is working properly.
Power indicator of the disk enclosure
1. Steady green: The disk enclosure is powered on.
2 U 36-slot smart NVMe disk enclosure 2. Off: The disk enclosure is powered off.
Power indicator/Power button
1. The disk enclosure is powered on and off with the
controller enclosure. The power button on the disk
Note: This slide shows the front views of a 2 U SAS enclosure is invalid and cannot be used to power
disk enclosure and a 2 U smart NVMe disk enclosure on or off the disk enclosure separately.
of Huawei OceanStor Dorado V6.

14 Huawei Confidential
Rear View of a Disk Enclosure
4
No. Description
1 Serial port
2 Mini SAS HD expansion port
3 ID display
4 Expansion module
1 2 3 5
5 Power module
2 U SAS disk enclosure 6 Onboard expansion port
7 Onboard management port
8 Power module

Note: This slide shows the rear


views of the 2 U smart SAS and
6 7 8
smart NVMe disk enclosures of
2 U smart NVMe disk enclosure Huawei OceanStor Dorado V6.

15 Huawei Confidential
Contents

1. Controller Enclosure

2. Disk Enclosure

3. Expansion Module

4. Disk

5. Interface Module

16 Huawei Confidential
Expansion Module

Expansion module of a 2 U SAS disk enclosure


Connects to a controller enclosure through expansion ports

Expansion module of a 2 U smart NVMe disk enclosure


Connects to a controller enclosure through expansion ports

17 Huawei Confidential
CE Switch
Rear view

48 x 10GE electrical ports 4 x 60 Gbit/s optical ports

Console

Front view

USB port FAN1 FAN2 PWR1 PWR2

Two Ethernet management ports (combo)

Note: Huawei CE6800 series switches are used as an example.

18 Huawei Confidential
Fibre Channel Switch

Management ports
(serial port and
Ethernet port) USB port 24 Fibre Channel ports Power socket

Three link
aggregation groups

Note: Huawei SNS2124 is used as an example.

19 Huawei Confidential
Device Cables

1. Serial cable 2. Mini SAS HD 3. Mini SAS HD 4. AOC cable


electrical cable optical cable

5. 100G 6. 25G SFP28 7. FDR cable 8. MPO-4*DLC 9. Optical fiber


QSFP28 cable cable optical fiber

20 Huawei Confidential
Contents

1. Controller Enclosure

2. Disk Enclosure

3. Expansion Module

4. Disk
 HDD
 SSD

5. Interface Module

21 Huawei Confidential
Disk Type
IDE
SCSI
SATA
1.8-inch SAS Interface
2.5-inch FC type
3.5-inch Dimensions
NVMe
5.25-inch ... Enterprise-class
Application
... scenario Desktop-class
...
What are the types of disks?

HDD
SSD Structure
...

22 Huawei Confidential
HDD Structure
 An HDD consists of platters, an actuator arm, read/write heads, a spindle, a
port, and control circuits.
Platter
Actuator arm

Spindle

Control circuit

Port
Read/write head

23 Huawei Confidential
HDD Working Principles

Basic
operation The platter is
driven by a motor.
Platter
Landing zone

Spindle Magnetic data


R/W Head

The distance between the


The head flies head and the disk is small.
over the platter.

24 Huawei Confidential
Data Organization on a Disk
Sector Track
Head

Cylinder

Actuator
Platter arm

Motor
Motor

25 Huawei Confidential
Disk Capacity and Cache
 Disk capacity
 Disk capacity = Number of cylinders x Number of heads x Number of sectors x 512
bytes. The unit is MB or GB. The disk capacity is determined by the capacity of a
single platter and the number of platters.
 Cache
 Because the processing speed of a CPU is much faster than that of a disk, the CPU
must wait until the disk completes a read/write operation before issuing a new
command. To solve this problem, a cache is added to the disk to improve the
read/write speed.

26 Huawei Confidential
Factors Relevant to Disk Performance

Primary factor that determines the


Rotation speed throughput in the case of sequential I/Os

Primary factor that affects the random I/O


Seek speed performance

Single platter
Indirect factor for disk performance
capacity

The least important factor for disk


Port speed performance

27 Huawei Confidential
Average Access Time
 The average access time is determined by:
 Average seek time
 Average latency time

Seek time Latency Wait time

Disc

Data Block

Seek

Tracks

28 Huawei Confidential
Data Transfer Rate
 The date transfer rate is determined by:
 Internal transfer rate
 External transfer rate/Interface transfer rate

Disk Disc

Seek

Tracks
External
Internal

29 Huawei Confidential
Disk IOPS and Transmission Bandwidth
 IOPS
 Input/Output operations per second (IOPS) is a key indicator to measure disk
performance.
 IOPS is calculated by the seek time, rotation latency, and data transmission time.

 Transmission bandwidth (throughput)


 Indicates the amount of data that is successfully transmitted in a unit time, that is,
the speed at which data streams are transmitted. For example, if it takes 10s to write
10,000 files of 1 KB size, the transmission bandwidth is only 1 MB/s; if it takes 0.1s to
write a 10 MB file, the transmission bandwidth is 100 MB/s.

30 Huawei Confidential
Parallel and Serial Transmission
 For example, the methods for transmitting numbers 1 to 8 are as follows:

Parallel transmission Serial transmission

1
2
3 8 7 6 5 4 3 2 1
Transmit 4 Receive Transmit Receive
end 5 end end end
6
7
8

Multiple lines are connected between two ends, Only one line is connected between two ends. Eight
and one number is transmitted on each line. numbers are sent on this line in sequence. The receive
end has all numbers after eight transmissions.

31 Huawei Confidential
Disk Port Technology
 A disk must provide a simple port for users to access its data. Generally, disks
provide the following physical ports:
IDE port
Used for the ATA
instruction system
SATA port
Disk
Ports Parallel SCSI port

Used for the SCSI


Serial SCSI (SAS) port
instruction system

Fibre Channel port

32 Huawei Confidential
IDE Disk Port
 The integrated drive electronics (IDE) port is also called the parallel ATA port.
 ATA stands for Advanced Technology Attachment.
 The ATA disk is also called the IDE disk.
 The ATA port uses the parallel ATA technology.

33 Huawei Confidential
SATA Port
 SATA is short for serial ATA.
 SATA ports use serial transmission and provide a higher rate than IDE ports.
 SATA uses a point-to-point architecture and supports hot swap.

SATA Version Line Code Transfer Rate Throughput


1.0 8b/10b 1.5 Gbit/s 150 MB/s
2.0 8b/10b 3 Gbit/s 300 MB/s
Power 3.0 8b/10b 6 Gbit/s 600 MB/s

SATA Port

34 Huawei Confidential
SCSI Port
 SCSI is short for Small Computer System Interface.

35 Huawei Confidential
SAS Port
 SAS is short for Serial Attached SCSI.
 SAS is a point-to-point, full-duplex, and dual-port interface.
 SAS is backward compatible with SATA.
 Rate: 600 Mbit/s per channel
 SAS features high performance, high reliability, and powerful scalability.

36 Huawei Confidential
Fibre Channel Port
 Fibre Channel disks use the Fibre Channel arbitrated loop (FC-AL).
 FC-AL is a dual-port serial storage interface based on the SCSI protocol.
 FC-AL supports full-duplex mode.
 Fibre Channel provides a universal hardware transmission platform for upper-layer protocols
(SCSI and IP). It is a serial data transmission interface that features high speed, high reliability,
low latency, and high throughput.

40-pin Male FC-SCA II Connector

37 Huawei Confidential
Contents

1. Controller Enclosure

2. Disk Enclosure

3. Expansion Module

4. Disk
 HDD
 SSD

5. Interface Module

38 Huawei Confidential
SSD Overview
 Compared to HDDs, SSDs have absolute advantages in terms of performance, reliability,
power consumption, and portability. SSDs have been widely used in various industries.
 SSD characteristics:
 Uses NAND flash to save data, providing a faster speed than HDDs.
 Has no mechanical structure inside, so it consumes less power, dissipates less heat, and
generates less noise.
 Its service life is determined by the number of program/erase (P/E) cycles.

39 Huawei Confidential
SSD Architecture
 An SSD consists of a control unit and a storage unit (mainly flash memory
chips).
 Control unit: SSD controller, host interface, and DRAM
 Storage unit: NAND flash

RAM

Flash Flash
SSD Controller ...
Pkg Pkg
Processor
Host Host NAND Flash Flash
interface flash Pkg Pkg ...
Interconnect logic Buffer interface
manager

40 Huawei Confidential
NAND Flash
 Internal storage units in NAND flash Page 0 Page 0
Page 1 Page 1
include:

...
...
Page P Page P
 LUNs, planes, blocks, pages, and cells Block 0 Block 1

Page 0 Page 0
Operations on the NAND flash include

Logical Unit 0

Page 1 Page 1

...
...
erase, program, and read. Page P Page P
Block 2 Block 3
 NAND flash is a non-volatile medium. A

...
...
block must be erased before new data is Page 0 Page 0
Page 1 Page 1
written to it. A program/erase (P/E) cycle

...
...
Page P Page P
is the process of erasing a block and then Block B Block B+1

Page Register
writing it again. Page Register
Plane Plane
Address 0 Address 1

41 Huawei Confidential
SLC, MLC, TLC, and QLC
1111
111 1110
11 110 1101
1100
1 101 1011
10 100
1010
1001
1000
011 0111
01 010 0110
0101
0 001 0100
00 000
0011
0010
0001
0000

SLC-1bit MLC-2bit TLC-3bit QLC-4bit


SLC MLC TLC QLC
1. Supports 50,000 to 100,000 1. Supports about 3,000 P/E cycles. 1. Provides higher data density and 1. The capacity is further
P/E cycles, providing the 2. The speed is slower than that of supports only several hundred to improved by 33%.
best reliability. SLC. 1,000 P/E cycles. 2. The performance and life
2. The storage capacity is 3. The storage capacity is relatively 2. The reliability and performance cycle are further reduced.
small. large. are low.
3. The cost is the highest. 4. The price is relatively low. 3. Generally used in personal
devices due to the cost
advantage, but cannot meet the
requirements of enterprise
products.

42 Huawei Confidential
Flash Chip Data Relationship

Plane Die
1478 blocks 2 planes

Cell Page Block

146688 cells 768 pages


...

... ... ...

...
... ...

Page is the minimum read/write unit, and block is the minimum program/erase unit.

43 Huawei Confidential
Address Mapping Management
Logical block address (LBA) No. 26, XX Road, Binjiang District, Hangzhou City,
Zhejiang Province, People's Republic of China

Physical block address (PBA) 120º 12' east longitude, 30º 16' north latitude

HDD: The relationship between LBA and PBA is fixed.


 Overwrite
The Flash Translation
Layer (FTL) is responsible
SSD: The relationship between LBA and PBA is not fixed. for the conversion
 Non-overwrite: A block must be erased before new data is between the LBA and PBA.
written to it. New data and old data are at different
locations.

44 Huawei Confidential
FTL

Sector
0
Sector
2
Sector 3 Main controller
FTL mapping table: saved in the Sector
1
internal SRAM/DRAM, external
Sector 2 DRAM, or NAND flash. Sector
4
Sector Sector
Sector 0 Sector 1 3 5

OS sector (512 FTL mapping Data is stored in the


bytes). File systems operation. The main NAND physical
read/write data in the controller maps the addresses based on
unit of 512 bytes. addresses based on the mapping table.
the mapping table.

45 Huawei Confidential
Data Write Process on an SSD (1)
 The following uses eight channels as an example to demonstrate how the host writes data to the
SSD.
Channel 0 block Channel 1 block Channel 2 block Channel 3 block
Writes 4 KB
of data

Writes 16 KB
of data
4 KB
SSD controller

Channel 4 block Channel 5 block Channel 6 block Channel 7 block

46 Huawei Confidential
Data Write Process on an SSD (2)
 When the SSD is full, old data must be deleted to release space for new data. When a user
deletes and writes data, data in some blocks becomes invalid or aged.
Channel 0 block Channel 1 block Channel 2 block Channel 3 block

SSD controller

Channel 4 block Channel 5 block Channel 6 block Channel 7 block

47 Huawei Confidential
Data Read Process on an SSD
Reads 4 KB Channel 0 block Channel 1 block Channel 2 block Channel 3 block
of data

Reads 32 KB
of data 4 KB
SSD controller

Channel 4 block Channel 5 block Channel 6 block Channel 7 block

48 Huawei Confidential
SSD Performance Advantages
SSD Performance Advantages Power consumption under 100,000 read IOPS

I/O I/O

IP/FC SAN
Seek time
Mechanical latency
2 SSDs 250 HDDs
Power (W)

4000
About 400-fold
2000

VS
HDD storage system SSD storage system SSD FC HDD

49 Huawei Confidential
Use of SSDs in Storage Systems
 Class A applications: high-concurrency applications featuring random reads and writes, such as databases
 Class B applications: large files, images, and streaming media featuring sequential reads and writes

 Class C applications: data backup or rarely used applications

Access frequency
A SSD media
FC/SAS disk
SATA/NL-SAS/Tape

C
Data distribution

50 Huawei Confidential
Contents

1. Controller Enclosure

2. Disk Enclosure

3. Expansion Module

4. Disk

5. Interface Module

51 Huawei Confidential
GE Interface Modules

GE electrical interface module 40GE interface module 100GE interface module

52 Huawei Confidential
SAS Expansion Module and RDMA Interface Module

25 Gbit/s RDMA 100 Gbit/s RDMA 12 Gbit/s SAS


interface module interface module expansion module

53 Huawei Confidential
SmartIO Interface Module

54 Huawei Confidential
PCIe and 56 Gbit/s IB Interface Modules

PCIe interface module 56 Gbit/s InfiniBand interface module

55 Huawei Confidential
Fibre Channel and FCoE Interface Modules
Power Power
indicator/Hot indicator/Hot Handle
Handle swap button
swap button

16 Gbit/s Fibre
Channel port 10 Gbit/s
FCoE port

Link/Speed
indicator of
the port Link/Speed
indicator of a 10
Gbit/s FCoE port

16 Gbit/s Fibre Channel interface module 10 Gbit/s FCoE interface module

56 Huawei Confidential
Quiz
1. What are the types of SSDs?
A. SLC

B. MLC

C. TLC

D. QLC

2. Which of the following can be used to measure the performance of an HDD?


A. Disk capacity

B. Rotation speed

C. Data transfer rate

D. Average access time

57 Huawei Confidential
Summary

Controller

Controller enclosure Coffer disk

Disk enclosure BBU

Expansion module
Expansion module
Intelligent storage components Device cables

HDD
Disk
SSD
Interface module

58 Huawei Confidential
More Information

Enterprise Huawei
Technical Enterprise
Support App Service App

59 Huawei Confidential
Recommendations

 Huawei official websites


 Enterprise business: https://e.huawei.com/en/
 Technical support: https://support.huawei.com/enterprise/en/index.html
 Online learning: https://www.huawei.com/en/learning
 Popular tools
 HedEx Lite
 Network Document Tool Center
 Information Query Assistant

60 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
RAID Technologies
Foreword

 This course introduces technologies of traditional RAID and RAID 2.0+. The
evolution of RAID technologies aims at data protection and performance
improvement.

1 Huawei Confidential
Objectives

After completing this course, you will be able to understand:


 Common RAID levels
 Different levels of data protection provided by different RAID levels
 Working principles of RAID 2.0+
 Dynamic RAID and RAID-TP

2 Huawei Confidential
Contents

1. Traditional RAID

2. RAID 2.0+

3. Other RAID Technologies

3 Huawei Confidential
Background
 Problems in traditional computer systems must be addressed.

Instructions
processed per
second
CPU > 1 million Disks become the system performance bottleneck.

Operations on disks are limited, making it impossible to


RAM > 100,000 provide large capacities.

Data is stored on individual disks, making it impossible


< 300 to provide consistent high data reliability.
Disk

4 Huawei Confidential
What Is RAID?
 Redundant Array of Independent Disks (RAID) combines multiple physical disks into one
logical disk in different ways, for the purposes of read/write performance and data
security improvement.
 Implementations: hardware RAID and software RAID.

How large is
a logical disk?

Logical disk

Physical Physical Physical Physical


disk disk disk disk

5 Huawei Confidential
Data Organization Forms
 Disk striping: Space in each disk is divided into multiple strips of a specified size. Data is
also divided into blocks based on strip size when data is being written.
 Strip: A strip consists of one or more consecutive sectors in a disk, and multiple strips
form a stripe.
 Stripe: A stripe consists of strips of the same location or ID on multiple disks in the
same array.

Disk 1 Disk 2 Disk 3


D6 D7 D8 Stripe 2 Depth of a stripe

D3 D4 D5 Stripe 1

D0 D1 D2 Stripe 0
Data strips in Data strips in Data strips in
a disk a disk a disk

6 Huawei Confidential
Data Protection Techniques
 Mirroring: Data copies are stored on another redundant disk.
 Exclusive or (XOR)
 XOR is widely used in digital electronics and computer science.
 XOR is a logical operation that outputs true only when inputs differ (one is true, the other is
false).
 0 ⊕ 0 = 0, 0 ⊕ 1 = 1, 1 ⊕ 0 = 1, 1 ⊕ 1 = 0

Physical disk 1 Physical disk 2 Parity disk

1 1 0
0 1 1
0 0 0

XOR for redundant backup

7 Huawei Confidential
Common RAID Levels and Classification Criteria
 RAID levels use different combinations of data organization forms and data
protection techniques.

Consists of block-level striping with


RAID 6 double distributed parity.
Consists of striping, but
no mirroring or parity. RAID 0

RAID 0 is implemented after RAID


RAID 10
Consists of data mirroring, Common RAID levels 1 is implemented.
without parity or striping. RAID 1

RAID 0 is implemented after RAID


RAID 50
5 is implemented.
Consists of byte-level striping
RAID 3
with dedicated parity.

Consists of block-level striping RAID 5


with distributed parity.

8 Huawei Confidential
How Does RAID 0 Work
Write data to D 2, Read data from D 2,
D 3... D 3...
Write data to D 1. Read data from D 1.

D0 Write data to D 0. Read data from D 0.

D5 D 0, D 1, D 2, D 3, D 4, D 5
D4

D3
Physical disk 1 Physical disk 2
D2 D6
D4 D5 Stripe 2
D1
D2 D3 Stripe 1
D0
D0 D1 Stripe 0

Logical disk Data strips in a disk Data strips in a disk


Stripping without error check

Just a Bundle Of Disks (JBOD)

9 Huawei Confidential
How Does RAID 1 Work

Write data to and read data from D 2.


Write data to and read data from D 1.
Write data to and read data from D 0.

D2 D 0, D 1, and D 2 pass through a mirror.

D1

Physical disk 1 Physical disk 2


D0
D2 D2

D1 D1
Logical disk D0 D0

Disk array with mirroring

10 Huawei Confidential
How Does RAID 3 Work
Write data to C.
Write data to B.
Read data.
Write data to A.

C
A 0, A 1, A 2, B 0, B 1, B 2, C 0, C 1, C 2

Physical disk 1 Physical disk 2 Physical disk 3 Parity disk

A C0 C1 C2 P3

B0 B1 B2 P2

A0 A1 A2 P1
Logical disk

Note: A write penalty occurs when just a small amount of new data needs to be written to one or two disks.

11 Huawei Confidential
How Does RAID 5 Work

Write data.
Read data.
D5
D 0, D 1, D 2, D 3, D 4, D 5
D4

D3

D2
Physical disk 1 Physical disk 2 Physical disk 3
D1
P2 D4 D5
D0
D2 P1 D3

D0 D1 P0
Logical disk

Independent disk structure with distributed parity check codes

12 Huawei Confidential
RAID 6
 RAID 6
 Requires at least N + 2 (N > 2) disks and provides extremely high data reliability and
availability.
 Common RAID 6 technologies:
 RAID 6 P+Q
 RAID 6 DP

13 Huawei Confidential
How Does RAID 6 P+Q Work?
 P and Q parity data is calculated. A maximum of two data blocks that are lost can be recovered
using P and Q parity data. Formulas for calculating P and Q parity data are as follows:
 P = D 0 ⊕ D 1 ⊕ D 2...
 Q = (α * D 0) ⊕ (β * D 1) ⊕ (γ * D 2)...

Physical disk 1 Physical disk 2 Physical disk 3 Physical disk 4 Physical disk 5

P1 Q1 D0 D1 D2 Stripe 0

D3 P2 Q2 D4 D5 Stripe 1

D6 D7 P3 Q3 D8 Stripe 2

D9 D 10 D 11 P4 Q4 Stripe 3

Q5 D 12 D 13 D 14 P5 Stripe 4

14 Huawei Confidential
How Does RAID 6 DP Work?
 Double parity (DP) adds another disk in addition to the horizontal XOR parity disk used in RAID 4 to store
diagonal XOR parity data.
 P0 to P3 in the horizontal parity disk represent the horizontal parity data for respective disks.
 For example, P0 = D0 XOR D1 XOR D2 XOR D3
 DP 0 to DP 3 in the diagonal parity disk represent the diagonal parity data for respective data disks and the
horizontal parity disk.
 For example, DP 0 = D 0 XOR D 5 XOR D 10 XOR D 15

Physical Physical Physical Physical Horizontal Diagonal


disk 1 disk 2 disk 3 disk 4 parity disk parity disk
D0 D1 D2 D3 P0 DP 0 Stripe 0
D4 D5 D6 D7 P1 DP 1 Stripe 1

D8 D9 D 10 D 11 P2 DP 2 Stripe 2

D 12 D 13 D 14 D 15 P3 DP 3 Stripe 3

15 Huawei Confidential
How Does RAID 10 Work?
 RAID 10 consists of nested RAID 1 + RAID 0 levels and allows disks to be mirrored
(RAID 1) and then striped (RAID 0). RAID 10 is also a widely used RAID level.

User data D 0, D 1, D 2, D 3, D 4, D 5

Disk mirror Disk mirror

D4 D4 D5 D5
D2 D2 D3 D3
D0 D0 D1 D1

Physical disk 1 Physical disk 2 Physical disk 3 Physical disk 4


RAID 1 RAID 1
RAID 0

16 Huawei Confidential
How Does RAID 50 Work?
 RAID 50 consists of nested RAID 5 + RAID 0 levels. RAID 0 is implemented after RAID 5
is implemented.

D 0, D 1, D 2, D 3, D 4, D 5, D 6, D 7...

D 0, D 1, D 4, D 5, D 8, D 9 D 2, D 3, D 6, D 7, D 10, D 11

P4 D8 D9 P5 D 10 D 11 Stripe 2

D4 P2 D5 D6 P3 D7 Stripe 1

D0 D1 P0 D2 D3 P1 Stripe 0
Physical Physical Physical Physical Physical Physical
disk 1 disk 2 disk 3 disk 4 disk 5 disk 6

RAID 5 RAID 5
RAID 0

17 Huawei Confidential
Contents

1. Traditional RAID

2. RAID 2.0+

3. Other RAID Technologies

18 Huawei Confidential
RAID Evolution

Hot
spare

Traditional RAID LUN virtualization Block virtualization

19 Huawei Confidential
How Does RAID 2.0+ Work?
Extent
LUN Extent
Extent

Extent ... ... Hot spare


space

CKG ... ...

CK ... ... ... ... ... ...

Disk
Disk 0 Disk 1 Disk k Disk n

20 Huawei Confidential
Reconstruction
Traditional RAID (many-to-one) RAID 2.0+ (many-to-many)
01 02 03 51 52 53 CKG 0 (RAID 5)
HDD 0 HDD 5
HDD 0 04 05 06 HDD 5 54 55 56
Hot spare 07 08 09 57 58 59

HDD 1 HDD 6 RAID 5 (4 + 1) 11 12 13 61 62 63

HDD 1 14 15 16 HDD 6 64 65 66
17 18 19 67 68 69 CKG 1 (RAID 5)

HDD 2 HDD 7 21 22 23 71 72 73
HDD 2 24 25 26 HDD 7 74 75 76
27 28 29 77 78 79
HDD 3 HDD 8 31 32 33 81 82 83
HDD 3 34 35 36 HDD 8 84 85 86 CKG 2 (RAID 5)
37 38 39 87 88 89 52 13 63 74 85
HDD 4 HDD 9
41 42 43 91 92 93
Hot spare disk HDD 4 44 45 46 HDD 9 94 95 96 Unused CK
Hot spare
47 48 49 97 98 99 block space

21 Huawei Confidential
Logical Objects
Storage pool LUNs that can be
Chunk CKG Extent Volume
consisting of viewed on the host
physical disks

Tiered

Not tiered

A CKG is
divided into Not tiered
Multiple types of Space provided by each Chunks from spaces of a
Several extents
disks are added to disk is divided into fine- different disks smaller LUNs can be created quickly.
form one volume.
a storage pool. grained chunks. form a CKG. granularity.

22 Huawei Confidential
Disk Domain
 A disk domain is a combination of disks (which can be all disks in the array). After the disks are
combined and reserved for hot spare capacity, it provides storage resources for the storage pool.

Physical disks Disk domain #1

Tiers

High-performance tier

Performance tier

Disk domain #2
Capacity tier

23 Huawei Confidential
Storage Pool and Tier
 A storage pool is a storage resource container. The storage resources used by application servers are all from
storage pools.
 A storage tier is a collection of storage media providing the same performance level in a storage pool.
Different storage tiers manage storage media of different performance levels and provide storage space for
applications that have different performance requirements.

Storage Supported
Tier Type Application
Tier Disk Type RAID Level RAID Policy
High- Best for storage of data that is RAID 1 1D + 1D, 1D + 1D + 1D + 1D
Tier 0 performance SSD frequently accessed with high
tier performance and price. 2D + 2D or 4D + 4D, which is automatically
RAID 10
selected by a storage system.
Best for storage of data that is less
Performance frequently accessed with relatively RAID 3 2D + 1P, 4D + 1P, 8D + 1P
Tier 1 SAS
tier high performance and moderate RAID 5 2D + 1P, 4D + 1P, 8D + 1P
price.
(2D + 1P) x 2, (4D + 1P) x 2, or (8D + 1P) x
Best for storage of mass data that RAID 50
2
is infrequently accessed with low
Tier 2 Capacity tier NL-SAS RAID 6 2D + 2P, 4D + 2P, 8D + 2P, 16D + 2P
performance and price, and large
capacity per disk.

24 Huawei Confidential
Disk Group
A disk group (DG) is a set of disks of the same type in a disk domain. The disk
type can be SSD, SAS, or NL-SAS.

SSD

Disk type

SAS NL-SAS

25 Huawei Confidential
Logical Drive
A logical drive (LD) is a disk that is managed by a storage system and corresponds
to a physical disk.

LD 0 LD 1 LD 2 LD 3

Disk 0 Disk 1 Disk 2 Disk 3

26 Huawei Confidential
Chunk
A chunk (CK) is a disk space of a specified size allocated from a storage pool. It is
the basic unit of a RAID array.

Chunk Chunk

HDD 0 HDD 1 HDD 2 HDD 3 HDD 4

27 Huawei Confidential
Chunk Group
A chunk group (CKG) is a logical storage unit that consists of CKs from different
disks in the same DG based on the RAID algorithm. It is the minimum unit for
allocating resources from a disk domain to a storage pool.

CKG CKG

Disk Disk
CK
DG DG

28 Huawei Confidential
Extent
Each CKG is divided into logical storage spaces of a fixed and adjustable size called
extents. Extent is the minimum unit (granularity) for migration and statistics of
hot data. It is also the minimum unit for space application and release in a storage
pool.
LUN 0 (thick)

Extent
CKG

LUN 1 (thick)

29 Huawei Confidential
Grain
When a thin LUN is created, extents are divided into blocks of a fixed size, called
grains. A thin LUN allocates storage space by grains. Logical block addresses
(LBAs) in a grain are consecutive.

LUN (thin)

Extent Grain
CKG

30 Huawei Confidential
Volume and LUN
 A volume is an internal management object in a storage system.
 A LUN is a storage unit that can be directly mapped to a host for data reads and writes.
A LUN is the external embodiment of a volume.

Server

LUN

Volume Storage

31 Huawei Confidential
Contents

1. Traditional RAID

2. RAID 2.0+

3. Other RAID Technologies

32 Huawei Confidential
Huawei Dynamic RAID Algorithm
Common RAID algorithm Huawei dynamic RAID algorithm
 When a block in a RAID array fails, recover the data in the faulty  When a block in a RAID array fails, recover and migrate the data in
block, migrate all the data in the RAID array, and then shield the the faulty block, shield the faulty block, and reconstruct a new
RAID array. RAID array using remaining blocks.

 Result: A large amount of available flash memory space is wasted.  Benefit: The flash memory space is fully and effectively used.

4. Shield and obsolete the faulty RAID array, which wastes space. 4. Reconstruct a new RAID array using remaining blocks to store data.

ch 0 ch 1 ch n-1 ch n ch P ch 0 ch 1 ch n-1 ch n ch P
PBA 0 16 17 ...
… 100 60 P0 PBA 0 16 17 ... 100 60
60 PPm+2
0
1. A block in a RAID array fails.
1. A block in a RAID array fails.
PBA 1 101 160 … 10 11 P1 PBA 1 101 160 ... 10 11 P1

PBA m 3000 1280 … n n+1 Pm PBA m 3000 1280 ... n n+1 Pm

2. Create a new RAID array to store the data of the RAID array where a block fails. 2. Create a new RAID array to store the data in the faulty block.

PBA m+1 P m+1 PBA m+1 P m+1


3. Recover the data in the faulty block using the RAID 3. Recover the data in the faulty block using the RAID
algorithm and migrate all the data in the RAID array. algorithm and migrate the data.

33 Huawei Confidential
RAID-TP
 RAID protection is essential to a storage system for consistent high reliability and performance. However, the
reliability of RAID protection is challenged by uncontrollable RAID array construction time due to drastic
increase in capacity.
 RAID-TP achieves the optimal performance, reliability, and capacity utilization.

Tolerates failures of up to three disks RAID-TP


with zero service interruptions.

Traditional
RAID

Huawei RAID-TP: • Greatly reduces reconstruction time.


• Tolerates failures of up to three disks. • Effectively copes with data protection challenges in
the era of large-capacity disks.

34 Huawei Confidential
Quiz

1. What is the difference between a strip and stripe?

2. Which RAID level would you recommend if a user focuses on reliability and
random write performance?

3. Is it true or false that data access will remain unaffected when any disk in a RAID
10 array fails?

35 Huawei Confidential
Summary

RAID 0, RAID 1, RAID 3, RAID 5 and RAID 6


Traditional RAID
RAID 10 and RAID 50

RAID Technologies RAID 2.0+ RAID 2.0+

Dynamic RAID
Other RAID
technologies
RAID-TP

36 Huawei Confidential
More Information

Enterprise Huawei
Technical Enterprise
Support App Service App

37 Huawei Confidential
Recommendations

 Huawei official websites


 Enterprise business: https://e.huawei.com/en/
 Technical support: https://support.huawei.com/enterprise/en/index.html
 Online learning: https://www.huawei.com/en/learning

 Popular tools
 HedEx Lite
 Network Document Tool Center
 Information Query Assistant

38 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Common Storage Protocols
Foreword

 A protocol is a set of conventions that both communication computers


must comply with. For example, how to set up a connection and how to
identify each other.
 A protocol not only defines the language used for communication, but also
specifies the hardware, transmission medium, transmission protocol, and
interface technology. This course describes the definitions and principles of
different storage protocols.

1 Huawei Confidential
Objectives

Through this course, you are expected to:


 Learn about common protocols used in storage systems.
 Understand the working principles and features of the protocols.

2 Huawei Confidential
Contents

1. SCSI

2. iSCSI, Fibre Channel (FC), and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and (InfiniBand) IB

6. CIFS, NFS, and NDMP

3 Huawei Confidential
SCSI Protocol
 Small Computer System Interface (SCSI) is a huge
protocol system evolved from SCSI-1 > SCSI-2 > SCSI device instruction set
(SBC/SSC)
SCSI-3.
 The SCSI protocol defines a model and a necessary
instruction set for different devices to exchange SCSI system model
information by using the framework. (SAM/SPC)

 The SCSI protocol is irrelevant to transmission


media, that is, it can be implemented on various
SCSI link implementation
media, and even virtual media. (FCP/SAS/iSCSI)

4 Huawei Confidential
SCSI Evolution
SCSI-1
 Launched within 1983 to
1985.
SCSI-1  Supports synchronous and
asynchronous modes. SCSI-2
 Supports up to seven 8-bit
devices.  Launched within 1988 to
 Provides up to 5 Mbit/s speed. 1994.
 Uses 50-pin cables that span  Compatible with SCSI-1.
6 m at most. Supports 16-bit
SCSI-3

 Out of use. bandwidth.


Provides up to 20 Mbit/s
SCSI-2

 Standardized in 1993.
speed.  Compatible with SCSI-1 and
SCSI-2.
 Becomes a standard system.
 Supports various media such
SCSI-3 as FCP and IEEE1394.

5 Huawei Confidential
SCSI Logical Topology
Initiator
Initiator 1 Initiator 2

SDS

Target
Target 1 Target 2 Target 3

LUN 0

LUN 2

LUN 5
LUN namespace Target device

6 Huawei Confidential
SCSI Initiator Model
 Generally, the SCSI system of a host works in the initiator mode. The SCSI
architecture on Windows, Linux, AIX, Solaris, and BSD contains the architecture
layer (middle layer), device layer, and transport layer.

SCSI device driver layer

SCSI middle layer

SCSI link layer

7 Huawei Confidential
SCSI Target Model
 Based on the SCSI architecture, a target is divided into
three layers: port layer, middle layer, and device layer.
Port layer
 The most important part is the middle layer, at which
LUN namespaces, link ports, target devices, tasks, task
sets, and sessions are managed and maintained based Middle layer
on SAM/SPC specifications.
 Drivers at the port layer are dynamically loaded in the
Device layer
form of registration. Drivers at the device layer are also
dynamically loaded.

8 Huawei Confidential
SCSI Protocol and Storage System
 The SCSI protocol is the basic protocol used for communication between hosts
and storage devices.
 DAS uses the SCSI protocol to achieve interconnection between hosts and
storage devices.
SCSI bus

Host adapter Data/Address bus


SCSI ID 7

Control signal
SCSI array SCSI array
ID 0 ID 5

LUN 0 LUN 1 LUN 0


LUN 2 LUN 1

9 Huawei Confidential
SCSI Protocol Addressing

Bus
number Differentiates SCSI buses.

Device Differentiates devices


ID on SCSI buses.

Logical
Differentiates sub-devices
unit
number in SCSI devices.

10 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and IB

6. CIFS, NFS, and NDMP

11 Huawei Confidential
Emergence of iSCSI

SCSI allows a small number of


devices to be connected.
The distance between devices is
limited.

IP-network-based SCSI: iSCSI

12 Huawei Confidential
iSCSI

SCSI applications (file systems and databases)

SCSI block SCSI flow Other SCSI SCSI commands, responses, and data
instructions instructions instructions

SCSI instructions, data, and status


Receives SCSI data, generates iSCSI
protocol data, and encapsulates
iSCSI
the data into iSCSI PDUs.

TCP Encapsulates iSCSI PDUs into


TCP/IP packets for transmission
and reception.
IP
Converts bit streams and transmits
Ethernet them over physical links.
iSCSI protocol stack

13 Huawei Confidential
iSCSI Initiator and Target
 Initiator iSCSI
 The SCSI layer generates command descriptor blocks (CDBs) Initiator Target

and transfers them to the iSCSI layer. SCSI SCSI


 The iSCSI layer generates iSCSI protocol data units (PDUs)
and sends them to the target over an IP network. iSCSI iSCSI
 Target
 The iSCSI layer receives PDUs and sends CDBs to the SCSI TCP TCP
layer.
 The SCSI layer interprets CDBs and gives responses when IP IP
necessary.

Link Link

14 Huawei Confidential
iSCSI Architecture
 iSCSI nodes encapsulate SCSI instructions and data into iSCSI packets and send the packets to the
TCP/IP layer, where the packets are encapsulated into IP packets to be transmitted over an IP
network.
iSCSI node iSCSI node
IP address IP address
of the of the iSCSI
network network Target
port port

iSCSI IP network
Initiator

IP address
IP address
of the
of the iSCSI
network
network Target
port
port

15 Huawei Confidential
Relationships Between iSCSI and SCSI, TCP and IP
Initiator Function Target

SCSI application SCSI commands, responses, and SCSI application


protocol data protocol

Receives SCSI data, generates iSCSI


protocol data, and encapsulates
iSCSI protocol the data into iSCSI PDUs. iSCSI protocol

Encapsulates iSCSI PDUs into


TCP/IP protocol TCP/IP packets for transmission TCP/IP protocol
stack and reception. stack
Performs 8-bit/10-bit encoding, as
well as transmits and receives
NIC driver data. NIC driver

Performs 0/1 code stream


transmission.
Physical Physical

16 Huawei Confidential
FC in Storage
 FC can be referred to as the FC protocol, FC network, or FC interconnection. As FC delivers high
performance, it is gradually used for front-end host access on point-to-point and switch-based
networks.
 FC brings the following advantages to the storage network:
 The scalability is improved.
 The transmission distance is increased. Initiator
Host Initiator
 Security problems are solved.

FC switch FC switch

Target Target Disk Disk


Storage
enclosure enclosure

17 Huawei Confidential
FC Protocol Structure

Upper-layer protocol
SCSI-3 IP ATM

FC-4 IPI-3 SCSI-3 FC-LE


Command Command Link
FC-ATM
set mapping set mapping encapsulation

FC-3 General equipment

FC-2 Structure protocol FC-AL FC-AL2


FC-PH
FC-1 Coding/Decoding FC-PH2
FC-0 FC-PH3 Copper cables and optical cables,
Physical conversion
8-bit/10-bit encoding

18 Huawei Confidential
FC Topology
Point-to-point FC-AL FC switching network

Most widely used technology


Only two devices can Up to 127 devices
be connected. Up to 16 million devices
can be connected. can be connected.
(Direct connection)

19 Huawei Confidential
Seven Types of Ports for the FC Protocol
 On an FC network, there are seven types of ports.

FC terminal N F FC switch F N FC terminal

FL
Fabric device Fabric device
FC FC
terminal terminal
NL NL
Open ring device Open ring device
FC-AL device

L L L
FC FC FC
terminal terminal terminal
Private ring device Private ring device Private ring device

20 Huawei Confidential
FC Adapter
 The FC host bus adapter (HBA) supports FC network applications and provides
high-bandwidth and high-performance storage network solutions.

21 Huawei Confidential
FCoE Protocol
 The FCoE protocol is used to transmit FC signals over lossless enhanced
Ethernet infrastructure.
 FCoE encapsulates FC data frames in Ethernet frames and allows service traffic
on a LAN and SAN to be transmitted over the same Ethernet.
Ethernet data link
layer frame

 Service flow IP address

 Block storage FCoE

 VoIP call

 Video stream VoIP

22 Huawei Confidential
Comparison Between FC and FCoE
 FCoE: defines the mapping from FC to
IEEE 802.3 Ethernet, and uses the physical
FC-4 FC-4
layer and data link layer of the Ethernet
FC-3 FC levels
FC-3 (No changes)
and the network layer, service layer, and FC-2V FC-2V
protocol layer of FC. FC-2 FC-2M
FC_BB_E
FCoE entity Mapping
FC-2P
 FCoE retains the protocol stack above FC-
FC-1 MAC IEEE
2 and replaces FC-0 and FC-1 with the FC-0 PHY
802.3
Layers

link layer of the Ethernet. FCoE protocol stack

23 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and IB

6. CIFS, NFS, and NDMP

24 Huawei Confidential
Background of SAS
• The parallel bus has been developed to the peak and the bandwidth limit is
reached.
• Serial buses such as FC, IB, and the Ethernet have the following disadvantages for
storage applications:
- FC: It is expensive, and applicable to complex networking and long-distance
scenarios.
- IB: It is expensive, and the networking is complex.
- iSCSI: The latency is high, and the transmission rate is low.

SCSI in serial mode: SAS

25 Huawei Confidential
What is SAS
 SAS is the serial standard of the SCSI bus protocol.
 SAS uses the serial technology to achieve higher transmission rate and better scalability, and is
compatible with SATA disks.
 SAS adopts the point-to-point architecture to achieve a transmission rate of up to 3 Gbit/s, 6
Gbit/s, 12 Gbit/s, or higher. The full-duplex mode is supported.

26 Huawei Confidential
SAS Protocol Layers
SCSI application layer ATA application layer Management application layer Application layer

SSP transport layer STP transport layer SMP transport layer Transmission layer

SAS port layer Port layer

SSP link layer STP link layer SMP link layer


Link layer
SAS link layer

SAS phy layer PHY layer

SAS physical layer Physical layer

27 Huawei Confidential
Highlights of SAS
 Provides the serial communication mode to allow multiple data channels to communicate with devices at full
speed.
 Binds multiple narrow ports to form a wide port.
 Uses expanders to expand interfaces, providing excellent scalability.
Expander
 Works in full-duplex mode. Server
SAS Expander
RAID Expander
Controller Wide Expander
Link

Expander

SAS
Read data
RAID Expander
Controller Commands

28 Huawei Confidential
Scalability of SAS
 SAS uses expanders to expand interfaces. One SAS domain supports a maximum
of 16,384 disk devices. 1
Expander

Expander

Expander

SASRAID
Expander
Controller
1

Expander

Expander

128
128

29 Huawei Confidential
Cable Connection Principles of SAS
 Generally, a SAS cable has four channels, each of which supports 12 Gbit/s bandwidth.
 SAS devices are connected in the form of a loop (also called a chain).
 A cable supports 4 x 12 Gbit/s bandwidth, which limits the number of disks in the loop.
 A maximum of 168 disks are supported in a loop. That is, a loop consists of a maximum
of seven disk enclosures with 24 disk slots each.

SAS cable connectors:

Mini SAS

High-density mini SAS

30 Huawei Confidential
SATA
 SATA is short for Serial ATA, which is a kind of computer bus used for data transmission between
the main board and storage devices (disks and CD-ROM drives).
 Instead of simple PATA improvement, the bus structure is brand new.
 A SATA bus uses embedded clock signals and has better error correction capability.
 SATA has better anti-interference capability than PATA.
 SATA, designed for entry-level applications, is not as powerful as SCSI in terms of big data throughput or
multi-thread transmission.

Serial
SAS SATA transmission

Serial
SCSI transmission PATA

31 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and IB

6. CIFS, NFS, and NDMP

32 Huawei Confidential
PCIe
 PCIe is short for PCI Express, which is a high-performance and high-bandwidth serial
communication interconnection standard. It was first proposed by Intel and then
developed by the Peripheral Component Interconnect Special Interest Group (PCI-SIG)
to replace the bus-based communication architecture, such as PCI, PCI Extended (PCI-X),
and Accelerated Graphics Port (AGP).

33 Huawei Confidential
Why PCIe

PCIe is used to obtain significantly improved system throughput,


scalability, and flexibility at lower production costs, which are almost
impossible to achieve using the traditional bus-based interconnection.

High-performance and high-bandwidth serial interconnection standard:


PCIe

34 Huawei Confidential
PCIe Protocol Structure
 PCIe device layers include the physical layer, data link layer, transaction layer,
and application layer. PCIe Device

 Physical layer AP

 Data link layer


 Transaction layer Transaction

 Application layer Physical Data link

Logical sub-block
Physical

Electrical sub-block

Tx Rx

35 Huawei Confidential
NVMe
 NVMe is short for Non-Volatile Memory Express.
 The NVMe standard is oriented to PCIe SSDs. Direct connection of the native PCIe channel to the
CPU can avoid the latency caused by the communication between the external controller (PCH) of
the SATA and SAS interface and the CPU.
 PCIe is an interface form and a bus standard, and NVMe is a standard interface protocol
customized for PCIe SSDs.

36 Huawei Confidential
NVMe Protocol Stack
App Reduced interaction: The number of
communication interactions is reduced from 4 to 2,
reducing the latency.
Block Layer
Controller SSD
1. Transfer command
Controller
SCSI
Initiator NVMe 2. Ready to transfer
SAS
3. Transfer data

SAS 4. Response feedback

1. NVMe write command


Target
SAS NVMe
NVMe 2. NVMe write finished

SCSI

The average I/O latency when NVMe is used


SAS Protocol Stack NVMe Protocol Stack
is less than that when SAS 3.0 is used.

37 Huawei Confidential
Advantages and Application of NVMe
IOPS
Over Fabric
Fusion Server End-to-end 100GE

FC NVMe-oF
CloudEngine

100GE NVMe-oF
CE8800 End-to-end hardware Reduced by 50%
uninstallation Latency
NVMe-oF protocol
Huawei
OceanStor
FC NVMe-oF
Dorado
Reduced by 66%
TCO
End-to-end DIF
Data integrity protection
NVMe SSD
FC NVMe-oF

38 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and IB

6. CIFS, NFS, and NDMP

39 Huawei Confidential
RDMA
 RDMA is short for Remote Direct
Memory Access, which is a method of
Traditional mode RDMA mode
transferring data in a buffer between
application software on two servers over APP Buffer App Buffer

a network.
OS
TCP/IP Buffer
 Low latency OS TCP/IP

Driver Buffer
 High throughput
 Low CPU and OS resource occupancy Buffer
RDMA
Buffer
Adapter Adapter

40 Huawei Confidential
RDMA Bearer Network
Software RDMA application/ULP
RDMA API (Verbs)

RDMA software stack


Typical hardware

IB transport protocol IB transport protocol IB transport protocol iWARP protocol

UDP TCP
IB network layer IB network layer
IP IP

IB link layer Ethernet link layer Ethernet link layer Ethernet link layer

IB RoCEv1 RoCEv2 iWARP

Ethernet/IP Ethernet/IP Ethernet/IP


IB management
management management management

Content defined by IBTA


Content defined by IEEE/IETF

41 Huawei Confidential
IB
 Overview:
 The IB technology is specifically designed for server connections, and is widely used for
communication between servers (for example, replication and distributed working), between a
server and a storage device (for example, SAN and DAS), and between a server and a network
(for example, LAN, WAN, and the Internet).

 Highlights:
 Standard-protocol-based
 High bandwidth and low latency
 RDMA
 Transmission uninstallation

42 Huawei Confidential
IB Architecture
 IB defines a series of devices for system communication, including channel
adapters, switches, and routers.
FCP
TCA

Host interconnect
Host
CPU HCA Switch Router
controller

CPU System main TCA TCA


storage
SCSI Gbit
CPU Ethernet

43 Huawei Confidential
IB in Storage
Converged storage

Distributed storage
Server
Initiator
Back-end IB Back-end IB
switch switch Switch cascading
FCoE FC TOE 10GE IB
Back-end network

Target Front-end network


Frontend
Storage controller ...
Node Node Node Node
Initiator Backend 1 2 3 n

SAS SAS Distributed cluster

Target
Front-end IB Client
Disk Front-end IB
switch switch

44 Huawei Confidential
IB Layers

Application layer

Transmission layer Sends, receives, and reassembles data


packet segments.

Network layer Provides addressing and routing.

Provides data packet design and point-to-


Link layer
point connection for local subsystems.

Physical layer Determines the connection rate.

45 Huawei Confidential
IB Interface
 There are two types of channel adapters (CAs):
 Host channel adapter (HCA), for example, Mellanox
 Target channel adapter (TCA), an I/O interface used for IB switches and storage
systems
IB connectors:
CA 10 Gb/s to 40 Gb/s

46 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA

6. CIFS, NFS, and NDMP

47 Huawei Confidential
CIFS Protocol
 In 1996, Microsoft renamed SMB to CIFS and added many new functions. Now,
CIFS includes SMB1, SMB2, and SMB3.0.
 CIFS uses the C/S mode and basic network protocols including TCP/IP and
IPX/SPX.

Redefined

Named as SMB CIFS Defined SMB2 SMB2.2 => SMB3.0

1988 1992 1996 2000 2007 2009 2012 2020

IBM Realized Samba Added new features


Defined SMB2.1

48 Huawei Confidential
NFS Protocol
 NFS is short for Network File System. The network file sharing protocol is
defined by the IETF and widely used in the Linux/Unix environment.
 NFS works based on the client/server architecture. The servers provide the
clients with access to shared file systems. NFS enables clients using different
operating systems to share files over a network.

NFSv1 NFSv2 NFSv3 NFSv4.0 NFSv4.1 NFSv4.2

1990 2000 2010 2020

49 Huawei Confidential
NDMP Protocol
 NDMP protocol is designed for the data
backup system of NAS devices. It enables NAS
2-way
devices to directly send data to the connected
networking Production Production Backup
system A system N server disk devices or the backup servers on the
network for backup, without any backup
NAS storage
system Tape library client agent required.
 There are two networking modes for NDMP
 2-way
3-way  3-way
networking Production Production Backup
system A system N server

NAS storage FC
system A Ethernet

NAS storage system A Backup data flow


Tape library
Control flow

50 Huawei Confidential
Quiz
1. Which networks are included in FC topologies?
A. Arbitrated loop network

B. Point-to-point network

C. Switching network

D. Dual-switching network

2. Which PCIe versions are available currently?


A. PCIe 1.0

B. PCIe 2.0

C. PCIe 3.0

D. PCIe 4.0

51 Huawei Confidential
Quiz
3. Which of the following are file sharing protocols?
A. HTTP protocol

B. iSCSI protocol

C. NFS protocol

D. CIFS protocol

4. Which NFS versions are available currently?


A. NFSv1

B. NFSv2

C. NFSv3

D. NFSv4

52 Huawei Confidential
Quiz

5. Which processes are involved when the CIFS protocol is used?


A. Protocol handshake

B. Security authentication

C. Connection to the share

D. File operation

E. Disconnection

53 Huawei Confidential
Summary

SCSI

iSCSI, Fibre Channel (FC), and FCoE

SAS and SATA


Common Storage Protocols
PCIe and NVMe

RDMA: RoCE, IB, and iWARP

CIFS, NFS, and NDMP

54 Huawei Confidential
More Information

Enterprise Huawei
technical enterprise
support App business App

55 Huawei Confidential
Recommendations

 Huawei official websites


 Enterprise business: https://e.huawei.com/en/
 Technical support: https://support.huawei.com/enterprise/en/index.html
 Online learning: https://www.huawei.com/en/learning

 Popular tools
 HedEx Lite
 Network Document Tool Center
 Information Query Assistant

56 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Storage System Architecture Evolution
Foreword

 With the development of cloud computing and big data, the storage
architecture changes from scattered to centralized, and gradually evolves
to network-based, virtualized, and massive cloud storage. Storage not only
needs to provide routine services such as data management, data
replication, snapshot, mirroring, and migration, but also needs to enable
functions such as data disaster recovery, data consistency, virtualized
convergence, elastic computing, and resource expansion. These services and
functions depend on a good storage system architecture.

1 Huawei Confidential
Objectives

On completion of this course, you will be able to know:


 Storage architecture evolution and expansion methods
 Huawei storage product architecture

2 Huawei Confidential
Contents

1. Storage System Architecture Evolution

2. Storage System Expansion Methods

3. Huawei Storage Product Architecture

3 Huawei Confidential
Storage System Architecture Evolution

Single controller Dual controllers Multiple controllers Distributed


architecture

4 Huawei Confidential
Single-controller Storage

SCSI interface
Logical disks are presented to hosts as LUNs.

SCSI

Terminator
controller

Controller
OS

Host Single-controller storage

5 Huawei Confidential
Dual-controller Storage
Services are running on Services are running on
only one controller. both controllers.

Controller A Controller B Controller A Controller B

Active-Standby Active-Active

6 Huawei Confidential
Mid-range Storage Architecture Evolution
Fixed storage Dual-controller Flexible hardware Flexible software
system active-active component function
configuration redundancy configuration configuration
configuration

Limited Fibre Channel The single-controller Fast Ethernet (FE) Unified storage that
interfaces are and dual-controller interface module are supports both SAN
provided, and the active-passive supported, greatly and NAS protocols has
flexibility is poor. architecture gradually improving flexibility become a hotspot.
Capacity expansion evolve to the active- and scalability. Users can flexibly
can be implemented active architecture. The number of ports configure multi-
only by cascading disk can be selected as protocol services as
enclosures. required. required.

7 Huawei Confidential
Multi-controller Storage

Controller A Controller B Controller C Controller D

SAS controller SAS controller SAS controller SAS controller

SAS expander SAS expander

Disk Disk
enclosures enclosures

8 Huawei Confidential
Mission-Critical Storage Architecture Evolution
Bus Hi-Star Direct-connection Virtual matrix
architecture architecture architecture architecture

Scale-up multi- Switch-based Front-end interfaces Scale-out expansion


controller architecture connection of front- and back-end disk mode, full switching
based on bus end interfaces, back- interfaces directly mode, x86 platform,
interconnection and end disk interfaces, connected to cache and loose coupling
upgrade by using and cache modules, resources to avoid
more powerful CPUs, and back-end Fibre latency caused by bus
interface modules, Channel connection and switch connection
memory, and
protocols

9 Huawei Confidential
Storage Software Technology Evolution
Improved data Simplified data Improved space Optimized service
reliability management utilization performance

Emergence of Storage devices are Tiered storage Performance is


snapshot, clone, and flexibly managed by promotes storage optimized according
data replication centralized space utilization and to service types.
(synchronous and management service efficiency. The Resources are properly
asynchronous) software. Thin data deduplication allocated according to
technologies provisioning technology reduces service importance.
technology resolves maintenance and Storage resources are
the conflict between capacity expansion balanced and shared
resource investment costs. flexibly and globally.
and optimal use.

10 Huawei Confidential
Distributed Storage Technology Evolution
Automatic metadata extension

Giga+ indexing

Hadoop FS
Universal hardware Universal hardware Metadata separation Public cloud storage
Customized hardware Software-defined Software-defined Metadata extension
Scale-up Scale-up Scale-out EC Coding
Integrated Parallel cluster file Huawei
GoogleFS Azure Storage
box system OceanStor 100D
General purpose Scientific computing Analysis scenario Facebook
Facebook F4
Haystack
Social scenario Warm storage
MooseFS NoSQL
Small files

199x 2000 2008 to 2011 2014


2003
EMC PVFS Facebook/Microsoft/Huawei Facebook
Google
NetApp Lustre

11 Huawei Confidential
Distributed Storage Architecture
iSCSI S3/Swift client
VBS
initiator
HDFS client

Compute node Compute node

VBS EDS-F EDS-F EDS-F OBJ OBJ OBJ


service service service
EDS-B EDS-B EDS-B HDFS HDFS HDFS
Block Block Block service
OBJ OBJ OBJ
service service
service service service index index index
Index Index Index Index Index Index

Storage pool (block) Storage pool (HDFS) Storage pool (object)


MDC MDC MDC

OSD OSD OSD OSD OSD OSD OSD OSD OSD

CM CM CM

Server node Server node Server node Server node Server node Server node Server node Server node Server node

Note: Huawei OceanStor 100D is used as an example to describe the distributed storage architecture.

12 Huawei Confidential
Contents

1. Storage Architecture Evolution

2. Storage System Expansion Methods

3. Huawei Storage Product Architecture

13 Huawei Confidential
Scale-up and Scale-out
 With the continued development of enterprise information systems and the ever-increasing expansion in the
scale of services, service data keeps increasing. The initial configuration of storage systems is often not
enough to meet these demands. Storage system capacity expansion has become the major concern of system
administrators. There are two capacity expansion methods: scale-up and scale-out. The following uses Huawei
storage products as an example to describe the two methods.
Storage
Devices (enclosures and disks) Storage controllers
controllers

Storage Storage
controllers controllers

Scale-out Switch Fabric


Storage
Scale-up controllers Storage
controllers

Scale-up architecture

Scale-out architecture

14 Huawei Confidential
SAS Disk Enclosure Scale-up Networking Principles
Adding a 2 U SAS disk enclosure to
an existing loop
Controller
enclosure

2 U SAS disk
enclosure 0

2 U SAS disk
enclosure 1

15 Huawei Confidential
Smart Disk Enclosure Scale-up Networking Principles
Adding a 2 U smart disk enclosure
to an existing loop
Controller
enclosure

Smart disk
enclosure 0

Smart disk
enclosure 1

16 Huawei Confidential
PCIe Scale-out and IP Scale-out
 PCIe scale-out runs on the PCIe protocol while IP scale-out works based on the IP protocol.

Large Mission-critical storage


enterprises Functions first
PCIe scale-out

Mid-range storage
Medium Functions and prices
enterprises balanced
IP scale-out

Entry-level storage
Small enterprises Price first
IP scale-out

17 Huawei Confidential
Scale-out Technologies Used by Huawei Storage Systems
OceanStor OS

XNET

XNET-PCIe XNET RDMA XNET UDP

iWARP
UDP
IB
PCIE DRV transport TCP

IP

PCIe IB ETH

18 Huawei Confidential
Scale-out Networking
Connects to the user's management network

Controller enclosure
0 (original)

Connects to the user's


management network

Controller enclosure
1 (new)

The figure shows the scale-out


networking of Huawei solid-state
storage Huawei OceanStor Dorado
5000 V6 and 6000 V6.
Four-controller direct connection

19 Huawei Confidential
Local Write Process

1 2

SAN

1
LUN 2 PCIe switched network
4

Engine 0 Engine 1 Engine 2 Engine 3


3 5

20 Huawei Confidential
Non-local Write Process

1 4

SAN

1 4

LUN
2 PCIe switched network
3
6

Engine 0 Engine 1 Engine 2 Engine 3


5 7

21 Huawei Confidential
Local Read Process

1 2

SAN

2
LUN PCIe switched network
5

8
Engine 0 Engine 1 Engine 2 Engine 3
3 4 6 7

22 Huawei Confidential
Non-local Read Process

1 4

SAN

1 4

2 PCIe switched network


LUN
3
7

10
Engine 0 Engine 1 Engine 2 Engine 3
5 6 8 9

23 Huawei Confidential
Contents

1. Storage Architecture Evolution

2. Storage System Expansion Methods

3. Huawei Storage Product Architecture

24 Huawei Confidential
Hardware Architecture with Two Controllers
Interface .. Interface Interface Interface
.. Service subsystem
module A0 . module A7 module B7 module B0
.
PCIe 3.0 x8 PCIe 3.0 x8

Fan module 0 PCIe 3.0 Fan module 0


Fan module 1
Control x8 Control
Fan module 1
module A module B
Fan module 2 Fan module 2

Management
Management Management subsystem
interface module A interface module B

12 V
12 V
Power Power Electromechanical
BBU 0 BBU 1 BBU 2 BBU 3
supply 0 supply 1 subsystem

Service channel
Manage channel
Power supply

25 Huawei Confidential
Hardware Architecture with Multiple Controllers
Interface ... Interface Interface ... Interface
module A0 module A5 module B5 PCIe 3.0 x8 module B0
PCIe 3.0 x8

Fan module 0 PCIe 3.0 x8 Fan module 0


Control Control Service subsystem
Fan module 1 Fan module 1
module C module D
Fan module 2 Fan module 2

... ...
Interface Interface Interface Interface
module A0 module A5 module B5 module B0
PCIe 3.0 x8 PCIe 3.0 x8

Fan module 0 PCIe 3.0 x8 Fan module 0


Control Control
Fan module 1 Fan module 1
module A module B
Fan module 2 Fan module 2

Management
Management Management
subsystem
interface module A interface module B

12 V
12 V
Electromechanical
Power Power Power Power
BBU 0 BBU 1 BBU 2 BBU 3 subsystem
supply 0 supply 1 supply 2 supply 3

26 Huawei Confidential
Full-mesh Architecture
Host I/O
Network adapter Network adapter
Fully-shared FIMs
 Each front-end interconnect I/O module (FIM)
connects to all four controllers through PCIe ports
in a controller enclosure. This module can
FIM FIM FIM FIM simultaneously access the four controllers with
multi-channel technology in active-active mode.

Full interconnection among controllers


192 192  The controllers in a controller enclosure are fully
cores core interconnected using the passive backplane.
s  100 Gbit/s RDMA shared interface modules are
used for expansion across controller enclosures,
BIM BIM BIM BIM 192 192
implementing full interconnection between 8/12/16
cores cores
controllers.

Interconnection of disks and


enclosures across controller enclosures
 A controller enclosure uses the back-end
interconnect I/O module (BIM) to connect a disk
enclosure which can be accessed by all controllers in
the enclosure.
Note: Huawei OceanStor Dorado 8000 and 18000 V6  A smart disk enclosure has two groups of uplink
are used as the example. ports and can connect to two controller enclosures,
implementing full interconnection between the disk
enclosure and eight controllers.

27 Huawei Confidential
Fully Interconnected Disk Enclosures
Controller Controller
enclosure 0 enclosure 1

2 U smart disk
enclosure 0

2 U smart disk
enclosure 1

28 Huawei Confidential
E2E Global Resource Sharing

Host

SAN

Distributed based
on hash results DHT

Global cache

... ...

29 Huawei Confidential
Switchover in Seconds: Mission-Critical Storage with FIMs
Host

 Hosts are unaware of the


Fibre Channel switch switchover, and links are
not interrupted.

Hi1822

I/O process I/O process I/O process I/O process

System mgmt. Device mgmt. Configuration Network


process process mgmt. process mgmt. process

User mode

OS kernel mode

Controller 0 Controller 1 Controller 2 Controller 3

30 Huawei Confidential
Global Cache
Write latency
LUN 0 LUN 1 LUN 2 95 μs
4 KB 4 KB ... 8 KB 4 KB 4 KB ... 8 KB 4 KB 4 KB ... 8 KB
50 μs

Write Ahead Log (WAL)


Cache linear ...
A B C D E
space
Traditional cache OceanStor
Data Dorado V6

write

A B C D E ... Global memory


Virtual address space

RDMA
AddrN1 AddrN2 AddrN3

Memory of controller A Memory of controller B Memory of controller C Memory of controller D

31 Huawei Confidential
Global Pool
A A1 A2 A3

LUN B B1

C C1 C2

D D1 D2

LUN mapping
and FP mapping

Strip A B C D P Q

Strip A1 B1 C1 D1 P Q

Strip A2 A3 C2 D2 P Q

RAID ... ...

...

32 Huawei Confidential
Back-End Sharing
Engine 0 Engine 1 • A single port is connected via a single
13 0 13 connection in the external system.
• A single port is connected to four
A A controllers in the internal system.
0 13 0 13

B B
100 Gbit/s 100 Gbit/s • Dual physical links, balanced and
100 Gbit/s redundant

100 Gbit/s
A 0 1 2 3

B 0 1 2 3
A B C D
x4 x4 x4 • A single port on the controller
x4 cascades two disk enclosures in a
loop.
• A single expansion module supports
A 0 1 2 3
dual links, achieving load balancing
1822
B 0 1 2 3 and redundancy.

33 Huawei Confidential
Active-Active Architecture with Full Load Balancing

34 Huawei Confidential
Cache Mirroring Technology
 The function is as follows:
Controller enclosure 1 Controller enclosure 2

Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D

Hybrid flash storage

35 Huawei Confidential
Key Reliability Technology
 The function is as follows:

Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D

Normal Failure of a controller (controller A)

36 Huawei Confidential
Host Service Switchover upon Failure of a Single
Controller
Host Host

Fibre Channel switch Fibre Channel switch

Interconnect I/O Interconnect I/O


module module

Automatic
switchover

Backplane Backplane

Controller Controller Controller Controller Controller Controller Controller Controller


1 2 3 4 1 2 3 4

37 Huawei Confidential
Quiz

1. (True or False) Scale-up is a method in which disk enclosures are continuously


added to existing storage systems to cope with increasing data volumes.

2. (Short Answer Question) What are the differences between scale-up and scale-
out?

38 Huawei Confidential
Summary

Storage Architecture
Evolution

Storage System
Scale-up and Scale-out
Storage System Expansion Methods
Architecture

Hardware System Architecture


Huawei Storage
Product Architecture
Full-mesh Architecture

39 Huawei Confidential
More Information

Enterprise Huawei
Technical Enterprise
Support App Service App

40 Huawei Confidential
Recommendations

 Huawei official websites


 Enterprise business: https://enterprise.huawei.com/en/
 Technical support: https://support.huawei.com/enterprise/en/index.html
 Online learning: https://learning.huawei.com/en/

 Popular tools
 HedEx Lite
 Network Document Tool Center
 Information Query Assistant

41 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Storage Network Architecture
Foreword

 With the development of host, disk, and network technologies, the storage
system architecture evolves, and the storage network architecture also
develops to meet service requirements. This lesson introduces the storage
network architecture.

1 Huawei Confidential
Objectives

Upon completion of this lesson, you will be able to understand:


 Storage network architecture evolution
 Storage networking technology evolution

2 Huawei Confidential
Contents

1. DAS

2. NAS

3. SAN

4. Distributed Architecture

3 Huawei Confidential
DAS

External disk array (DAS) Smart disk array (DAS)

Server Server
CPU CPU
RAM
RAM

Disk
Disk

SCSI card
RAID SCSI card

Controller

JBOD

4 Huawei Confidential
Challenges for DAS
Challenges Description

Limited number of ports that can be connected to a host.


Low
Scalability Limited number of addressable disks.

Limited distance.

Inconvenient
The system needs to be powered off during maintenance.
Maintenance

Insufficient Front-end ports and storage space are difficult to share.


Resource
Sharing Resource silos: For example, the DAS with insufficient storage
space cannot share the remaining space of the DAS with excessive
storage resources.

5 Huawei Confidential
Contents

1. DAS

2. NAS

3. SAN

4. Distributed architecture

6 Huawei Confidential
NAS
 Network-attached storage (NAS) connects storage devices to the
live network and provides data and file services.
 The most commonly used network sharing protocols for NAS are
Common Internet File System (CIFS) and Network File System  Benefits:
(NFS).  Improved efficiency
OS: Windows  Improved flexibility
 Centralized storage
 Simplified management
OS: Linux  High scalability
 High availability
 Security (user
Switch NAS device authentication and
OS: MAC OS
authorization)

7 Huawei Confidential
General-Purpose Server and NAS Devices

File system
Application
OS
Printer driver
Network
File system
OS
Network Uni-functional
NAS device

General-purpose server
(Windows or UNIX)

8 Huawei Confidential
NAS Protocols
Enterprise Enterprise
office office • NFS
• CIFS
IP IP IP IP
• FTP
Linux Windows
• HTTP
IP IP IP IP
• NDMP

NFS CIFS
FS
CACHE
POOL

9 Huawei Confidential
Working Principles of NFS
POR TMAP
Client Server Port mapping
1. RPC request
table

2. RPC response RPC


Client program

Request
RPC
Registration

3. Communication NFS processes:


rpc.nfsd and
Rpc.mountd

NFS share
information

10 Huawei Confidential
Typical Application of NFS: Shared Storage for Cloud
Computing
 Cloud computing uses the NFS server as the internal shared storage.

Converged storage
NFS client

Cloud computing server


Internal IP
Firewall

External IP network
network Cloud computing server

NFS server
Cloud computing server

11 Huawei Confidential
Working Principles of CIFS

Client Server
SMB NEGOTIATE Request
Protocol Protocol
SMB NEGOTIATE Response negotiation handshake

SMB SESSION_SETUP Request


Security
SMB SESSION_SETUP Response Session setup authentication

SMB TREECONNECT Request


Tree Share
SMB TREECONNECT Response connection connection

...... Network file


File operation
operation
SMB TREE_DISCONNECT Request
Disconnection Disconnection
SMB TREE_DISCONNECT Response

12 Huawei Confidential
Typical Application of CIFS: File Sharing Service
 The file sharing service applies to scenarios such as enterprise file servers and
Enterprise office
media assets.
IP Windows IP IP Management
Performance Service Share User
IP IP IP monitoring management management management

NAS service

LAN
DNS

Authentication flow
AD server Management flow
Data flow

13 Huawei Confidential
Contents

1. DAS

2. NAS

3. SAN
 IP SAN Technologies

▫ FC SAN Technologies

▫ Comparison Between IP SAN and FC SAN

4. Distributed Architecture

14 Huawei Confidential
NIC + Initiator Software

The initiator software


converts iSCSI packets into
TCP/IP packets, which
consumes host resources.

NIC

TCP/IP-based Ethernet IP SAN


connection

Internal bus
Storage device Ethernet

15 Huawei Confidential
TOE NIC + Initiator Software
The initiator software
implements the
functions of the iSCSI
layer, which consumes
host resources.
The TOE NIC implements
TCP/IP conversion, which
TOE NIC does not consume host
resources.

TCP/IP-based IP SAN
Ethernet connection

Internal bus
Storage device Ethernet

16 Huawei Confidential
iSCSI HBA

The iSCSI HBA converts


iSCSI packets into TCP/IP
iSCSI HBA packets, which does not
consume host resources.

TCP/IP-based IP SAN
Ethernet connection

Internal bus

Storage device Ethernet

17 Huawei Confidential
Logical Port
 Logical ports are created based on bond ports, VLAN ports, or Ethernet ports. The logical ports
are virtual ports that carry host services.
 A unique IP address is allocated to each logical port for carrying its services.

No. Description
Logical port
Indicates that multiple Ethernet ports are 4
1
bonded to form a bond port.
One to One to
5
Indicates that an Ethernet port is added many many
2
to multiple VLANs.
Indicates that a bond port is added to One to
3
One to
3 Bond port VLAN
multiple VLANs. many many
Indicates that a bond port is used to
4
create multiple logical ports.
Many to One to
2
Indicates that a VLAN port is used to one many 6
5
create multiple logical ports. 1

Indicates that an Ethernet port is used to Ethernet port


6
create multiple logical ports.

18 Huawei Confidential
VLAN Configuration
 VLAN is a technology that logically divides a physical LAN into multiple broadcast
domains.
 Ethernet ports or bond ports in a storage system can be added to multiple independent
VLANs. You can configure different services in different VLANs to ensure the security
and reliability of service data.

VLAN 1 VLAN 2 VLAN 3 VLAN k


ID = 1 ID = 2 ID = 3 …… ID = k

Ethernet port

Bond port
P0 P1 P2 P3 Storage device
Adding ports to VLANs

19 Huawei Confidential
IP Address Failover
 IP address failover indicates that a logical IP address fails over from a faulty port to an available
port. In this way, services are switched from the faulty port to the available port without
interruption. The faulty port can take over services back after being recovered.
 During the IP address failover, services are switched from the faulty port to the available port,
ensuring service continuity and improving reliability of paths for accessing file systems. This
process is transparent to users.
 The essence is a service switchover between ports. The ports can be Ethernet ports, bond ports, or
VLAN ports.

20 Huawei Confidential
Ethernet Port–based IP Address Failover
 To improve reliability of paths for accessing file systems, you can create logical ports based on
Ethernet ports.
 When the Ethernet port that corresponds to a logical port fails, the system will:

 Locate an available Ethernet


port of the same type.
 Delete the logical port from
the faulty Ethernet port.
Search
 Create the same logical port Logical port A Logical port A
Logical port A
(IP address a) (IP address a)
on the available Ethernet Port fault Port switchover
port to carry services.
 Ensure service continuity.

Ethernet port A Ethernet port A Ethernet port B

21 Huawei Confidential
Bond Port–based IP Address Failover
 To improve reliability of paths for accessing file systems, you can bond multiple Ethernet ports to
form a bond port.
 When the Ethernet ports that are used to create the bond port fails, the system will:

 Locate an available port.


 Delete the logical port created
High-speed
on the faulty port. data
 Create a logical port with the transmission
Search
same IP address on the Logical port A
Logical port A
Logical port A
(IP address a) (IP address a)
available port. Port fault Port switchover
 Switch services to the
available port.
After the faulty port recovers, it Ethernet port A Ethernet port A Ethernet port C

can take over services again. Ethernet port B Ethernet port B Ethernet port D
Bond Port A Bond Port A Bond Port A

22 Huawei Confidential
VLAN-based IP Address Failover
 You can create VLANs to isolate different services.
 When an Ethernet port on a VLAN fails, the system will:

 Locate an available port of


the same type.
 Delete the logical port from
Search
the faulty port. Logical port A Logical port A
Logical port A
(IP address a) (IP address a)
 Create the same logical port Port fault Port switchover

on the available port.


 Switch services to the Ethernet port A Ethernet port A Ethernet port B
available port. VLAN A VLAN A VLAN B
ID = 1 ID = 1 ID = 1

23 Huawei Confidential
Contents

1. DAS

2. NAS

3. SAN
▫ IP SAN Technologies
 FC SAN Technologies

▫ Comparison Between IP SAN and FC SAN

4. Distributed Architecture

24 Huawei Confidential
FC HBA

The FC HBA converts SCSI


packets into Fibre Channel
FC HBA packets, which does not
consume host resources.

Fibre Channel
FC SAN
protocol-based

Internal bus

Storage device FC network

25 Huawei Confidential
FC Network

26 Huawei Confidential
Zoning

Zone 1: Server 1 can Zone 2: Server 2 can


access Storage 1. access Storage 2.

Server 1 Server 2

Storage 1 Storage 2

Zone 3: Server 3 can


access Storage 1 and
Storage 3 Storage 2.
Server 3

27 Huawei Confidential
Contents

1. DAS

2. NAS

3. SAN
▫ IP SAN Technologies

▫ FC SAN Technologies
 Comparison Between IP SAN and FC SAN

4. Distributed Architecture

28 Huawei Confidential
IP SAN and FC SAN

DAS IP SAN FC SAN

iSCSI
FC FC
IP

SCSI

IP
FC FC
iSCSI

29 Huawei Confidential
Comparison Between IP SAN and FC SAN
Item IP SAN FC SAN
Dedicated Fibre Channel networks and
Network architecture Existing IP networks
HBAs
Transmission Limited by the maximum transmission
Not limited theoretically
distance distance of optical fibers
Management and Complicated technologies and
As simple as operating IP devices
maintenance management
Compatibility Compatible with all IP network devices Poor compatibility
High purchase (Fibre Channel switches,
Lower purchase and maintenance costs HBAs, Fibre Channel disk arrays, and so
Cost than FC SAN, higher return on on) and maintenance (staff training,
investment (ROI) system configuration and supervision,
and so on) costs
Disaster recovery Local and remote DR available based High hardware and software costs for
(DR) on existing networks at a low cost DR
Security Relatively low Relatively high

30 Huawei Confidential
Contents

1. DAS

2. NAS

3. SAN

4. Distributed Architecture

31 Huawei Confidential
Distributed Storage Networking

Node 1
Frontend service
network
Node 2

Node 3
Management
network
Node 4

Node 5
Backend storage network

32 Huawei Confidential
Networking Overview
 Frontend service/Tenant network
 The front-end service/tenant network is used to interconnect the distributed storage with the customer network. It
provides the tenant UI for tenant users to complete operations such as resource application and usage query, and
processes service requests sent by tenant clients or APIs.

 Backend storage network


 The backend storage/internal management network is used for internal interconnection between nodes. It provides
heartbeat communication between high availability (HA) components such as the data service subsystem (DSS), and
internal communication and data interaction between components.

 Management network
 The management network is used to interconnect with the customer's maintenance network. It provides a management
UI for the system administrator to perform service operations such as system configuration, tenant management,
resource management, and service provisioning, as well as maintenance operations such as alarm, performance, and
topology management. In addition, the Mgmt ports of all physical nodes can be aggregated to provide remote device
maintenance capabilities, such as remotely logging in to the virtual KVM of a device and viewing hardware running data
such as temperature and voltage.

33 Huawei Confidential
Network Planes

Management Management
Private client node Standard protocol node
access mode FSM access mode FSM

Storage node Compute node Storage node Compute node


REP REP
VBS Application Application
VBS/HDF
EDS EDS
S-SVR

OSD OSD

Third-place Third-place
DR site quorum DR site quorum Management plane:
server server Storage plane:
Replication plane:
Arbitration plane:
Service plane:

34 Huawei Confidential
Networking Rules
 Nodes must be placed in a cabinet from bottom to top.
 A deployment solution is usually chosen based on project requirements. The
total power consumption and weight of the storage nodes, switches, and KVM
in a cabinet must be calculated and the number of nodes that can be housed by
a cabinet must be determined based on the equipment room conditions.
 In typical configuration, nodes and switches in the base cabinet are connected
through network cables and SFP+ cables, and nodes in an expansion cabinet
connect to switches in the base cabinet through network cables and optical
fibers.

35 Huawei Confidential
Quiz
1. Which of the following are included in distributed storage networking?
A. Management network

B. Frontend service network

C. Frontend storage network

D. Backend storage network

2. Which of the following protocols are commonly used in SAN networking?


A. FC

B. iSCSI

C. CIFS

D. NFS

36 Huawei Confidential
Summary

DAS

NAS IP SAN
Storage network
architecture evolution
SAN FC SAN

Comparison between
Distributed architecture
IP SAN and FC SAN

37 Huawei Confidential
More Information

Enterprise Technical Huawei Enterprise


Support App Service App

38 Huawei Confidential
Recommendations

 Huawei official websites


 Enterprise business: https://e.huawei.com/en/
 Technical support: https://support.huawei.com/enterprise/en/index.html
 Online learning: https://www.huawei.com/en/learning

 Popular tools
 HedEx Lite
 Network Document Tool Center
 Information Query Assistant

39 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
Introduction to Huawei Intelligent Storage
Products
Foreword

 This course describes features, positioning, and typical application scenarios


of Huawei intelligent storage products, including Huawei OceanStor all-
flash storage, Huawei OceanStor hybrid flash storage, Huawei OceanStor
distributed storage, and Huawei edge data storage (FusionCube).

1 Huawei Confidential
Objectives

Upon completion of this course, you will be able to know the following about
Huawei intelligent storage products:
 Features
 Positioning
 Typical application scenarios

2 Huawei Confidential
Contents

1. All-Flash Storage

2. Hybrid Flash Storage

3. Distributed Storage

4. Edge Data Storage (FusionCube)

3 Huawei Confidential
All-Flash Product Display

Huawei OceanStor
Huawei OceanStor
Dorado 18000 V6
Huawei OceanStor Dorado 8000 V6
Huawei OceanStor Dorado 6000 V6
Huawei OceanStor Dorado 5000 V6
Dorado 3000 V6

Huawei OceanStor
Huawei OceanStor
Dorado 18000 V3
Huawei OceanStor Dorado 6000 V3
Dorado 5000 V3
Huawei OceanStor
Dorado 3000 V3

4 Huawei Confidential
Features

Intelligent AI chips+FlashLink

SSDs+NVMe disks for high SmartMatrix 3.0 full-


performance and low latency mesh architecture
Huawei OceanStor Dorado all-flash storage

5 Huawei Confidential
Device Model Examples

2 U, disk and controller integration, 2 U, disk and controller integration, built-in 36 x


built-in 25 x 2.5-inch disks palm-sized NVMe disks

Power-BBU module Icon Description


Management Maintenance Serial Interface
port port port  1+1 redundancy
module
Enclosure ID indicator
Enclosure location indicator
1. Blinking blue: The controller enclosure is
being located.
2. Off: The controller enclosure is not
located.
Enclosure alarm indicator
SAS expansion port 1. Steady amber: An alarm is reported by
 Each controller provides two SAS (SAS version) or 100
the controller enclosure.
Gbit/s RDMA (NVMe version) expansion ports. 2. Off: The controller enclosure is working
properly.

Note: Huawei OceanStor Dorado series is used as an example. Power indicator/Power button

6 Huawei Confidential
Storage System Components
Power Module

Controller

System Subrack

Disk Module

Note: Huawei OceanStor Dorado (2 U) is used as an example.

7 Huawei Confidential
Software Architecture

Software on a Software running on an


maintenance terminal application server
Management
network Software on the
storage system iSCSI/Fibre Channel
port/Serial port

OceanStor BCManager SNMP CLI Syslog Management function


control software

Cache HyperSnap HyperReplication HyperClone HyperMetro HyperCDP

Pool
SmartQoS SmartThin SmartMigration SmartVirtualization Three-copy mode
SCSI

RAID SmartDedupe and SmartCompression HyperSnap

Storage operating system

8 Huawei Confidential
Intelligent Chips
FLASHLINK ® intelligent algorithm
Controller with0
five chips
0
00
0 0
1 1 Reconstruction
1 010 Multi-core
1
00
1101
0 scheduling X00 minutes/TB
001 0 1X minutes/TB
1 1 1 00 1 Restart 1 2 3 4 5
0
0
0 1 10
0 1 count
1 010 1 Kunpeng chip + service
1
1
1
0 101enclosure
Smart0disk0 0
0
Kunpeng chip + multi-core
splitting
AI chip + cache algorithm
1 1010 1 algorithm Improved read hit ratio
Faster reconstruction
1
0 01
0 0101 0
0
1 1010 1
10 1 10
0101 0
0 1 1 10 1
0 Metadata Data read
0 01
1 0 0 01 0
1 New data Data write
0 1 1 11 1
00 0
Advanced feature
1 10
1 1 SSD1
11 1
GC migration Disk reconstruction
1 data
11 1 Garbage collection
0 11
Multi-stream data Global I/O priority
1 Full-stripe write
Reduced write amplification
partitioning adjustment
Reduced garbage collection Constant low latency

9 Huawei Confidential
Typical Application Scenario – Mission-Critical Service
Acceleration
Data center

Operational Product Risk control Supervision and


analytics management reporting

SAN

Data Data
Data analysis
extraction consolidation
...

Huawei OceanStor
Dorado

10 Huawei Confidential
Contents

1. All-Flash Storage

2. Hybrid Flash Storage

3. Distributed Storage

4. Edge Data Storage (FusionCube)

11 Huawei Confidential
Hybrid Flash Storage Series
Huawei OceanStor 18810F V5

Huawei OceanStor 18510F V5

Huawei OceanStor 18800F V5 Huawei OceanStor 18810 V5


Performance, IOPS

Huawei OceanStor 6810F V5

Huawei OceanStor 18500F V5


Huawei OceanStor 18510 V5
Huawei OceanStor 5610F/5810F V5

Huawei OceanStor 6800F V5

Huawei OceanStor 5310F/5510F V5 Huawei OceanStor 6810 V5

Huawei OceanStor 5600F/5800F V5

Huawei OceanStor
Huawei OceanStor 5610/5810 V5
5100/5210F V5 Huawei OceanStor 18800 V5

Huawei OceanStor 5300F/5500F V5


Huawei OceanStor 18500 V5
Huawei OceanStor 5310/5510 V5

Huawei OceanStor 6800 V5


Huawei OceanStor 5110/5210 V5

Huawei OceanStor 5600/5800 V5

All Flash Arrays


Huawei OceanStor 5300/5500 V5
Hybrid Flash Arrays
Scalability, PB Usable

12 Huawei Confidential
Hybrid Flash Storage
Enterprise-class hybrid flash storage products
provide stable, reliable, converged, and
efficient data services.

Meets requirements of various services and


applications such as OLTP/OLAP databases,
high-performance computing, digital media,
Internet operation, centralized storage,
backup, disaster recovery, and data migration.

Provides a wide range of efficient and flexible


backup and disaster recovery solutions to
ensure business continuity and data security.

Huawei OceanStor hybrid flash storage

13 Huawei Confidential
Device Model Examples
Storage device (2 U) For example, Huawei Storage device (2 U) For example, Huawei OceanStor
OceanStor hybrid flash storage 5110 V5 hybrid flash storage 5600/5800 V5 Kunpeng

Storage device (2 U) For example, Huawei Storage device (4 U), for example, Huawei OceanStor
OceanStor hybrid flash storage 5300 V5 Kunpeng hybrid flash storage 6800/18800 V5 Kunpeng

14 Huawei Confidential
Convergence of SAN and NAS Storage
LUN

Extent

iSCSI/FC/FCOE NFS/CIFS/FTP/HTTP

Block Service File Service Tier0: SSD Tier1: SAS Tier2: NL-SAS

ROOT

Storage POOL RAID 2.0+


File system
Dir Dir

File

Convergence of SAN and NAS resources of Tier0: SSD Tier1: SAS and NL-SAS
Huawei OceanStor hybrid flash series
Intelligent tiering of SAN and NAS cold/hot data

15 Huawei Confidential
Support for Multiple Service Scenarios

Cloud Finance
computing

Carrier
Social
intercourse

Energy

Big data
Government

Enterprise
Backup
and DR

16 Huawei Confidential
Application Scenario – Active-Active Data Centers

Data center A Data center B

Database service
Virtualization
service
File service
...
Switch Switch
Active-active

SAN NAS SAN NAS

17 Huawei Confidential
Contents

1. All-Flash Storage

2. Hybrid Flash Storage

3. Distributed Storage

4. Edge Data Storage (FusionCube)

18 Huawei Confidential
Distributed Storage

• The distributed technology creates a large-scale storage


resource pool that provides services for upper-layer
applications and clients through standard service interfaces.
• Supports large-scale expansion and elastic EC data
redundancy protection, improving disk space utilization.
• One storage system supports block, file, HDFS, and object
storage services.
• The solution with separated storage and computing
resources ensures stable latency and fast response to
mission-critical services.

Note: Huawei OceanStor 100D is used as an example in the figure.

19 Huawei Confidential
Product Highlights
Object service
File service
Block service HDFS service

Note: Huawei OceanStor 100D is used


as an example.
Block File Object
HDFS

OceanStor distributed storage

Four-in-one storage service, enabling one storage


system to support four types of storage services

20 Huawei Confidential
Hardware Node Examples
• Virtualization
Performance scenario
node • Cloud computing
For example: OceanStor 100D P100 and P110
scenario

• Big data analytics


Capacity scenario
node • Object resource
pool scenario For example: OceanStor 100D C100 and C110

All-flash
node • Database scenario
For example: OceanStor 100D F100 and F110

Note: Huawei OceanStor 100D is used as an example in the figure.

21 Huawei Confidential
Hardware Node Examples

P36A C36A
TaiShan 5280 V2
TaiShan 5280 V2

P12A S12A
TaiShan 2280 V2 TaiShan 2280 V2

x86 Platform Application Scenario Remarks


Checkpoint/Portrait checkpoint, hybrid
storage of video and images, media
P36X
asset production, HPC production, and
mobile centralized procurement TaiShan 5280 V2 server
Video surveillance, media asset library,
C36X
and HPC archiving
Small-sized media asset production and
P25X None
resource pool

Note: Huawei OceanStor 9000, the scale-out storage for files, is


used as an example in the figure.

22 Huawei Confidential
Software System Architecture
Service Layer

VBS (SCSI/iSCSI) NFS/SMB HDFS S3/SWIFT/POE


Disaster Recovery OAM Plane
HyperReplication
Cluster
Block File HDFS Object
HyperMetro Management
LUN Volume Direct IO Cache NameNode LS OSC Billing
Device
Manager
Index Layer
QoS
Write Ahead Log Snapshot Compression Deduplication Garbage Collection
Alarm/Log

Persistence Layer Authentication


Mirror Erasure Coding Fast Reconstruction Write-back Cache SmartCache
License

Hardware x86/Kunpeng
Note: Huawei OceanStor 100D is used as an example.

23 Huawei Confidential
Application Scenario – Cloud Resource Pool
Traditional compute-storage convergence

Data nodes + Compute nodes

Data nodes + Compute nodes

Storage-compute separation

Compute node

Cloud storage resource pool

Data node Data node Data node

24 Huawei Confidential
Contents

1. All-Flash Storage

2. Hybrid Flash Storage

3. Distributed Storage

4. Edge Data Storage (FusionCube)

25 Huawei Confidential
Edge Data Storage (FusionCube)
 FusionCube:
 It is an edge data storage
infrastructure based on the
converged architecture. It is  FusionCube 1000:
mainly used in hybrid load  It is an edge IT infrastructure
scenarios, such as databases, solution with integrated
desktop clouds, containers, design and is delivered as
and virtualization. integrated cabinet. The
 The Kunpeng ecosystem is solution is mainly used in
supported to flexibly meet edge data centers and edge
the elastic configuration application scenarios of
requirements of computing, vertical industries.
storage, and I/O resources Huawei FusionCube  The Kunpeng ecosystem is
and meet the requirements supported. Pre-cabling and
of multiple types of pre-configuration can be
application load modes with completed in advance based
an IT infrastructure at the on the customer's plan, and
edge. the solution is delivered as
integrated cabinet to
implement quick deployment.

Huawei FusionCube 1000

26 Huawei Confidential
Hardware Model Examples

Blade server High-density server Rack server

4 U with 4 nodes or 2 U with 4


12 U with 8 or 16 nodes 2 U with one node
nodes

27 Huawei Confidential
Introduction to Intelligent Management
System device Virtual resource
management management

VM provisioning and management


Automatic detection
Server Resource usage monitoring
Status monitoring
One-click capacity expansion
Switch One-click O&M
FusionCube
Center
Unified
management

Storage resource Bare metalresource


management management

Storage pool status monitoring Resource usage monitoring


Storage usage monitoring Network configuration
Distributed
Disk volume device management
block storage

28 Huawei Confidential
Storage System
Node 1 Node 2 Node N

VM VM VM VM VM VM

...

Distributed storage resource pool

SSD HDD SSD HDD SSD HDD

29 Huawei Confidential
Software Architecture
Office Application VDI BI CRM&ERP Email Web Application

Service
Database
software

Linux OS Operating
Hyper-convergence
Unified system
management Backup software
Distributed storage system
One-click
Asynchronous
capacity EC Active-active QoS
replication
expansion

Multiple
Thin Linked Distributed
Snapshot resource
provisioning clone cache
pools
Hyper-convergence
Unified installation DR
Huawei server hardware

Note: The figure uses FusionCube as an example.

30 Huawei Confidential
Application Scenario – Edge Data Center Service Scenario
FusionCube
Installer
Hardware
installation in an
edge data center
Edge data
center

Compute
+ module

Network
Site
module
management +
Service provisioning
Real-time Storage
Edge data center module
monitoring
Data backup HQ data center
+
Intelligent UPS
O&M

Modular
design and
Edge data center all-in-one
cabinet

31 Huawei Confidential
Quiz
1. (Single-answer question) Which of the following statement about Huawei OceanStor all-
flash storage is false?
A. Supports SSDs and NVMe disks.
B. Supports SAS disks.
C. Supports HDDs.
D. Supports palm-sized SSDs.

32 Huawei Confidential
Quiz
2. (Multi-answer question) Which of the following storage services are supported by Huawei
distributed storage (such as Huawei OceanStor 100D)?
A. Block storage
B. File storage
C. Object storage
D. HDFS storage
E. Linked storage

33 Huawei Confidential
Summary

All-flash storage

Hybrid flash storage


Introduction to Huawei intelligent Characteristics, positioning,
storage products and application scenarios
Distributed storage

Edge data storage


(FusionCube)

34 Huawei Confidential
More Information

Enterprise Technical Huawei Enterprise


Support App Service App

35 Huawei Confidential
Recommendations

 Huawei official websites


 Enterprise business: https://e.huawei.com/en/
 Technical support: https://support.huawei.com/enterprise/en/index.html
 Online learning: https://www.huawei.com/en/learning
 Popular tools
 HedEx Lite
 Network Document Tool Center
 Information Query Assistant

36 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.

You might also like