Professional Documents
Culture Documents
HCIA-Storage V4.5 Training Material SESION 2
HCIA-Storage V4.5 Training Material SESION 2
HCIA-Storage V4.5 Training Material SESION 2
Foreword
This chapter describes the components of the storage system, including the
controller enclosure, disk enclosure, disks, interface modules, and
connection modes between enclosures and their respective working
principles.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
3 Huawei Confidential
Storage Product Form
4 Huawei Confidential
Controller Enclosure
The controller enclosure uses a modular design and consists of a system subrack,
controllers (with built-in fan modules), BBUs, power modules, management modules,
and interface modules. Management
Power Module Module
Interface
Module
System Subrack
Controller
5 Huawei Confidential
Front View of a Controller Enclosure
Icon Description
Enclosure ID indicator
6 Huawei Confidential
Rear View of a Controller Enclosure
1 2 3 4 5
No. Description
1 Management port
2 Maintenance port
6 7 3 Serial port
4 Interface module
5 Power-BBU module
6 SAS expansion port
7 Interface module
8 Management module
9 Power module
8 9
7 Huawei Confidential
Controller
A controller is the core component of a storage system. It processes storage
services, receives configuration management commands, saves configuration
data, connects to disks, and saves critical data to coffer disks.
Controller enclosure
FE FE
Controller Controller
Cache Cache
CPU CPU
BE BE
Disk
enclosure
Cache data
8 Huawei Confidential
BBU and Fan Module
Fan module
Running/Alarm Running/Alarm
indicator of the BBU indicator of the fan
BBU Front view
9 Huawei Confidential
Coffer Disk
Latch Latch
Handle Handle
Disk Disk
Label Label
10 Huawei Confidential
Power Module
The AC power module supplies power to the controller enclosure, allowing the
enclosure to operate normally at maximum power. Running/
Alarm
Handle indicator Latch
Power socket
Note: Huawei OceanStor Dorado V6 is used as the example.
11 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
12 Huawei Confidential
Disk Enclosure
The disk enclosure uses a modular design and consists of a system subrack,
expansion modules, power modules, and disks.
Power
Module
Expansion
Module
System Subrack
Disk Drive
Module
13 Huawei Confidential
Front View of a Disk Enclosure
Icon Description
14 Huawei Confidential
Rear View of a Disk Enclosure
4
No. Description
1 Serial port
2 Mini SAS HD expansion port
3 ID display
4 Expansion module
1 2 3 5
5 Power module
2 U SAS disk enclosure 6 Onboard expansion port
7 Onboard management port
8 Power module
15 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
16 Huawei Confidential
Expansion Module
17 Huawei Confidential
CE Switch
Rear view
Console
Front view
18 Huawei Confidential
Fibre Channel Switch
Management ports
(serial port and
Ethernet port) USB port 24 Fibre Channel ports Power socket
Three link
aggregation groups
19 Huawei Confidential
Device Cables
20 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
HDD
SSD
5. Interface Module
21 Huawei Confidential
Disk Type
IDE
SCSI
SATA
1.8-inch SAS Interface
2.5-inch FC type
3.5-inch Dimensions
NVMe
5.25-inch ... Enterprise-class
Application
... scenario Desktop-class
...
What are the types of disks?
HDD
SSD Structure
...
22 Huawei Confidential
HDD Structure
An HDD consists of platters, an actuator arm, read/write heads, a spindle, a
port, and control circuits.
Platter
Actuator arm
Spindle
Control circuit
Port
Read/write head
23 Huawei Confidential
HDD Working Principles
Basic
operation The platter is
driven by a motor.
Platter
Landing zone
24 Huawei Confidential
Data Organization on a Disk
Sector Track
Head
Cylinder
Actuator
Platter arm
Motor
Motor
25 Huawei Confidential
Disk Capacity and Cache
Disk capacity
Disk capacity = Number of cylinders x Number of heads x Number of sectors x 512
bytes. The unit is MB or GB. The disk capacity is determined by the capacity of a
single platter and the number of platters.
Cache
Because the processing speed of a CPU is much faster than that of a disk, the CPU
must wait until the disk completes a read/write operation before issuing a new
command. To solve this problem, a cache is added to the disk to improve the
read/write speed.
26 Huawei Confidential
Factors Relevant to Disk Performance
Single platter
Indirect factor for disk performance
capacity
27 Huawei Confidential
Average Access Time
The average access time is determined by:
Average seek time
Average latency time
Disc
Data Block
Seek
Tracks
28 Huawei Confidential
Data Transfer Rate
The date transfer rate is determined by:
Internal transfer rate
External transfer rate/Interface transfer rate
Disk Disc
Seek
Tracks
External
Internal
29 Huawei Confidential
Disk IOPS and Transmission Bandwidth
IOPS
Input/Output operations per second (IOPS) is a key indicator to measure disk
performance.
IOPS is calculated by the seek time, rotation latency, and data transmission time.
30 Huawei Confidential
Parallel and Serial Transmission
For example, the methods for transmitting numbers 1 to 8 are as follows:
1
2
3 8 7 6 5 4 3 2 1
Transmit 4 Receive Transmit Receive
end 5 end end end
6
7
8
Multiple lines are connected between two ends, Only one line is connected between two ends. Eight
and one number is transmitted on each line. numbers are sent on this line in sequence. The receive
end has all numbers after eight transmissions.
31 Huawei Confidential
Disk Port Technology
A disk must provide a simple port for users to access its data. Generally, disks
provide the following physical ports:
IDE port
Used for the ATA
instruction system
SATA port
Disk
Ports Parallel SCSI port
32 Huawei Confidential
IDE Disk Port
The integrated drive electronics (IDE) port is also called the parallel ATA port.
ATA stands for Advanced Technology Attachment.
The ATA disk is also called the IDE disk.
The ATA port uses the parallel ATA technology.
33 Huawei Confidential
SATA Port
SATA is short for serial ATA.
SATA ports use serial transmission and provide a higher rate than IDE ports.
SATA uses a point-to-point architecture and supports hot swap.
SATA Port
34 Huawei Confidential
SCSI Port
SCSI is short for Small Computer System Interface.
35 Huawei Confidential
SAS Port
SAS is short for Serial Attached SCSI.
SAS is a point-to-point, full-duplex, and dual-port interface.
SAS is backward compatible with SATA.
Rate: 600 Mbit/s per channel
SAS features high performance, high reliability, and powerful scalability.
36 Huawei Confidential
Fibre Channel Port
Fibre Channel disks use the Fibre Channel arbitrated loop (FC-AL).
FC-AL is a dual-port serial storage interface based on the SCSI protocol.
FC-AL supports full-duplex mode.
Fibre Channel provides a universal hardware transmission platform for upper-layer protocols
(SCSI and IP). It is a serial data transmission interface that features high speed, high reliability,
low latency, and high throughput.
37 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
HDD
SSD
5. Interface Module
38 Huawei Confidential
SSD Overview
Compared to HDDs, SSDs have absolute advantages in terms of performance, reliability,
power consumption, and portability. SSDs have been widely used in various industries.
SSD characteristics:
Uses NAND flash to save data, providing a faster speed than HDDs.
Has no mechanical structure inside, so it consumes less power, dissipates less heat, and
generates less noise.
Its service life is determined by the number of program/erase (P/E) cycles.
39 Huawei Confidential
SSD Architecture
An SSD consists of a control unit and a storage unit (mainly flash memory
chips).
Control unit: SSD controller, host interface, and DRAM
Storage unit: NAND flash
RAM
Flash Flash
SSD Controller ...
Pkg Pkg
Processor
Host Host NAND Flash Flash
interface flash Pkg Pkg ...
Interconnect logic Buffer interface
manager
40 Huawei Confidential
NAND Flash
Internal storage units in NAND flash Page 0 Page 0
Page 1 Page 1
include:
...
...
Page P Page P
LUNs, planes, blocks, pages, and cells Block 0 Block 1
Page 0 Page 0
Operations on the NAND flash include
Logical Unit 0
Page 1 Page 1
...
...
erase, program, and read. Page P Page P
Block 2 Block 3
NAND flash is a non-volatile medium. A
...
...
block must be erased before new data is Page 0 Page 0
Page 1 Page 1
written to it. A program/erase (P/E) cycle
...
...
Page P Page P
is the process of erasing a block and then Block B Block B+1
Page Register
writing it again. Page Register
Plane Plane
Address 0 Address 1
41 Huawei Confidential
SLC, MLC, TLC, and QLC
1111
111 1110
11 110 1101
1100
1 101 1011
10 100
1010
1001
1000
011 0111
01 010 0110
0101
0 001 0100
00 000
0011
0010
0001
0000
42 Huawei Confidential
Flash Chip Data Relationship
Plane Die
1478 blocks 2 planes
...
... ...
Page is the minimum read/write unit, and block is the minimum program/erase unit.
43 Huawei Confidential
Address Mapping Management
Logical block address (LBA) No. 26, XX Road, Binjiang District, Hangzhou City,
Zhejiang Province, People's Republic of China
Physical block address (PBA) 120º 12' east longitude, 30º 16' north latitude
44 Huawei Confidential
FTL
Sector
0
Sector
2
Sector 3 Main controller
FTL mapping table: saved in the Sector
1
internal SRAM/DRAM, external
Sector 2 DRAM, or NAND flash. Sector
4
Sector Sector
Sector 0 Sector 1 3 5
45 Huawei Confidential
Data Write Process on an SSD (1)
The following uses eight channels as an example to demonstrate how the host writes data to the
SSD.
Channel 0 block Channel 1 block Channel 2 block Channel 3 block
Writes 4 KB
of data
Writes 16 KB
of data
4 KB
SSD controller
46 Huawei Confidential
Data Write Process on an SSD (2)
When the SSD is full, old data must be deleted to release space for new data. When a user
deletes and writes data, data in some blocks becomes invalid or aged.
Channel 0 block Channel 1 block Channel 2 block Channel 3 block
SSD controller
47 Huawei Confidential
Data Read Process on an SSD
Reads 4 KB Channel 0 block Channel 1 block Channel 2 block Channel 3 block
of data
Reads 32 KB
of data 4 KB
SSD controller
48 Huawei Confidential
SSD Performance Advantages
SSD Performance Advantages Power consumption under 100,000 read IOPS
I/O I/O
IP/FC SAN
Seek time
Mechanical latency
2 SSDs 250 HDDs
Power (W)
4000
About 400-fold
2000
VS
HDD storage system SSD storage system SSD FC HDD
49 Huawei Confidential
Use of SSDs in Storage Systems
Class A applications: high-concurrency applications featuring random reads and writes, such as databases
Class B applications: large files, images, and streaming media featuring sequential reads and writes
Access frequency
A SSD media
FC/SAS disk
SATA/NL-SAS/Tape
C
Data distribution
50 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
51 Huawei Confidential
GE Interface Modules
52 Huawei Confidential
SAS Expansion Module and RDMA Interface Module
53 Huawei Confidential
SmartIO Interface Module
54 Huawei Confidential
PCIe and 56 Gbit/s IB Interface Modules
55 Huawei Confidential
Fibre Channel and FCoE Interface Modules
Power Power
indicator/Hot indicator/Hot Handle
Handle swap button
swap button
16 Gbit/s Fibre
Channel port 10 Gbit/s
FCoE port
Link/Speed
indicator of
the port Link/Speed
indicator of a 10
Gbit/s FCoE port
56 Huawei Confidential
Quiz
1. What are the types of SSDs?
A. SLC
B. MLC
C. TLC
D. QLC
B. Rotation speed
57 Huawei Confidential
Summary
Controller
Expansion module
Expansion module
Intelligent storage components Device cables
HDD
Disk
SSD
Interface module
58 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
59 Huawei Confidential
Recommendations
60 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
This course introduces technologies of traditional RAID and RAID 2.0+. The
evolution of RAID technologies aims at data protection and performance
improvement.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Traditional RAID
2. RAID 2.0+
3 Huawei Confidential
Background
Problems in traditional computer systems must be addressed.
Instructions
processed per
second
CPU > 1 million Disks become the system performance bottleneck.
4 Huawei Confidential
What Is RAID?
Redundant Array of Independent Disks (RAID) combines multiple physical disks into one
logical disk in different ways, for the purposes of read/write performance and data
security improvement.
Implementations: hardware RAID and software RAID.
How large is
a logical disk?
Logical disk
5 Huawei Confidential
Data Organization Forms
Disk striping: Space in each disk is divided into multiple strips of a specified size. Data is
also divided into blocks based on strip size when data is being written.
Strip: A strip consists of one or more consecutive sectors in a disk, and multiple strips
form a stripe.
Stripe: A stripe consists of strips of the same location or ID on multiple disks in the
same array.
D3 D4 D5 Stripe 1
D0 D1 D2 Stripe 0
Data strips in Data strips in Data strips in
a disk a disk a disk
6 Huawei Confidential
Data Protection Techniques
Mirroring: Data copies are stored on another redundant disk.
Exclusive or (XOR)
XOR is widely used in digital electronics and computer science.
XOR is a logical operation that outputs true only when inputs differ (one is true, the other is
false).
0 ⊕ 0 = 0, 0 ⊕ 1 = 1, 1 ⊕ 0 = 1, 1 ⊕ 1 = 0
1 1 0
0 1 1
0 0 0
7 Huawei Confidential
Common RAID Levels and Classification Criteria
RAID levels use different combinations of data organization forms and data
protection techniques.
8 Huawei Confidential
How Does RAID 0 Work
Write data to D 2, Read data from D 2,
D 3... D 3...
Write data to D 1. Read data from D 1.
D5 D 0, D 1, D 2, D 3, D 4, D 5
D4
D3
Physical disk 1 Physical disk 2
D2 D6
D4 D5 Stripe 2
D1
D2 D3 Stripe 1
D0
D0 D1 Stripe 0
9 Huawei Confidential
How Does RAID 1 Work
D1
D1 D1
Logical disk D0 D0
10 Huawei Confidential
How Does RAID 3 Work
Write data to C.
Write data to B.
Read data.
Write data to A.
C
A 0, A 1, A 2, B 0, B 1, B 2, C 0, C 1, C 2
A C0 C1 C2 P3
B0 B1 B2 P2
A0 A1 A2 P1
Logical disk
Note: A write penalty occurs when just a small amount of new data needs to be written to one or two disks.
11 Huawei Confidential
How Does RAID 5 Work
Write data.
Read data.
D5
D 0, D 1, D 2, D 3, D 4, D 5
D4
D3
D2
Physical disk 1 Physical disk 2 Physical disk 3
D1
P2 D4 D5
D0
D2 P1 D3
D0 D1 P0
Logical disk
12 Huawei Confidential
RAID 6
RAID 6
Requires at least N + 2 (N > 2) disks and provides extremely high data reliability and
availability.
Common RAID 6 technologies:
RAID 6 P+Q
RAID 6 DP
13 Huawei Confidential
How Does RAID 6 P+Q Work?
P and Q parity data is calculated. A maximum of two data blocks that are lost can be recovered
using P and Q parity data. Formulas for calculating P and Q parity data are as follows:
P = D 0 ⊕ D 1 ⊕ D 2...
Q = (α * D 0) ⊕ (β * D 1) ⊕ (γ * D 2)...
Physical disk 1 Physical disk 2 Physical disk 3 Physical disk 4 Physical disk 5
P1 Q1 D0 D1 D2 Stripe 0
D3 P2 Q2 D4 D5 Stripe 1
D6 D7 P3 Q3 D8 Stripe 2
D9 D 10 D 11 P4 Q4 Stripe 3
Q5 D 12 D 13 D 14 P5 Stripe 4
14 Huawei Confidential
How Does RAID 6 DP Work?
Double parity (DP) adds another disk in addition to the horizontal XOR parity disk used in RAID 4 to store
diagonal XOR parity data.
P0 to P3 in the horizontal parity disk represent the horizontal parity data for respective disks.
For example, P0 = D0 XOR D1 XOR D2 XOR D3
DP 0 to DP 3 in the diagonal parity disk represent the diagonal parity data for respective data disks and the
horizontal parity disk.
For example, DP 0 = D 0 XOR D 5 XOR D 10 XOR D 15
D8 D9 D 10 D 11 P2 DP 2 Stripe 2
D 12 D 13 D 14 D 15 P3 DP 3 Stripe 3
15 Huawei Confidential
How Does RAID 10 Work?
RAID 10 consists of nested RAID 1 + RAID 0 levels and allows disks to be mirrored
(RAID 1) and then striped (RAID 0). RAID 10 is also a widely used RAID level.
User data D 0, D 1, D 2, D 3, D 4, D 5
D4 D4 D5 D5
D2 D2 D3 D3
D0 D0 D1 D1
16 Huawei Confidential
How Does RAID 50 Work?
RAID 50 consists of nested RAID 5 + RAID 0 levels. RAID 0 is implemented after RAID 5
is implemented.
D 0, D 1, D 2, D 3, D 4, D 5, D 6, D 7...
D 0, D 1, D 4, D 5, D 8, D 9 D 2, D 3, D 6, D 7, D 10, D 11
P4 D8 D9 P5 D 10 D 11 Stripe 2
D4 P2 D5 D6 P3 D7 Stripe 1
D0 D1 P0 D2 D3 P1 Stripe 0
Physical Physical Physical Physical Physical Physical
disk 1 disk 2 disk 3 disk 4 disk 5 disk 6
RAID 5 RAID 5
RAID 0
17 Huawei Confidential
Contents
1. Traditional RAID
2. RAID 2.0+
18 Huawei Confidential
RAID Evolution
Hot
spare
19 Huawei Confidential
How Does RAID 2.0+ Work?
Extent
LUN Extent
Extent
Disk
Disk 0 Disk 1 Disk k Disk n
20 Huawei Confidential
Reconstruction
Traditional RAID (many-to-one) RAID 2.0+ (many-to-many)
01 02 03 51 52 53 CKG 0 (RAID 5)
HDD 0 HDD 5
HDD 0 04 05 06 HDD 5 54 55 56
Hot spare 07 08 09 57 58 59
HDD 1 14 15 16 HDD 6 64 65 66
17 18 19 67 68 69 CKG 1 (RAID 5)
HDD 2 HDD 7 21 22 23 71 72 73
HDD 2 24 25 26 HDD 7 74 75 76
27 28 29 77 78 79
HDD 3 HDD 8 31 32 33 81 82 83
HDD 3 34 35 36 HDD 8 84 85 86 CKG 2 (RAID 5)
37 38 39 87 88 89 52 13 63 74 85
HDD 4 HDD 9
41 42 43 91 92 93
Hot spare disk HDD 4 44 45 46 HDD 9 94 95 96 Unused CK
Hot spare
47 48 49 97 98 99 block space
21 Huawei Confidential
Logical Objects
Storage pool LUNs that can be
Chunk CKG Extent Volume
consisting of viewed on the host
physical disks
Tiered
Not tiered
A CKG is
divided into Not tiered
Multiple types of Space provided by each Chunks from spaces of a
Several extents
disks are added to disk is divided into fine- different disks smaller LUNs can be created quickly.
form one volume.
a storage pool. grained chunks. form a CKG. granularity.
22 Huawei Confidential
Disk Domain
A disk domain is a combination of disks (which can be all disks in the array). After the disks are
combined and reserved for hot spare capacity, it provides storage resources for the storage pool.
Tiers
High-performance tier
Performance tier
Disk domain #2
Capacity tier
23 Huawei Confidential
Storage Pool and Tier
A storage pool is a storage resource container. The storage resources used by application servers are all from
storage pools.
A storage tier is a collection of storage media providing the same performance level in a storage pool.
Different storage tiers manage storage media of different performance levels and provide storage space for
applications that have different performance requirements.
Storage Supported
Tier Type Application
Tier Disk Type RAID Level RAID Policy
High- Best for storage of data that is RAID 1 1D + 1D, 1D + 1D + 1D + 1D
Tier 0 performance SSD frequently accessed with high
tier performance and price. 2D + 2D or 4D + 4D, which is automatically
RAID 10
selected by a storage system.
Best for storage of data that is less
Performance frequently accessed with relatively RAID 3 2D + 1P, 4D + 1P, 8D + 1P
Tier 1 SAS
tier high performance and moderate RAID 5 2D + 1P, 4D + 1P, 8D + 1P
price.
(2D + 1P) x 2, (4D + 1P) x 2, or (8D + 1P) x
Best for storage of mass data that RAID 50
2
is infrequently accessed with low
Tier 2 Capacity tier NL-SAS RAID 6 2D + 2P, 4D + 2P, 8D + 2P, 16D + 2P
performance and price, and large
capacity per disk.
24 Huawei Confidential
Disk Group
A disk group (DG) is a set of disks of the same type in a disk domain. The disk
type can be SSD, SAS, or NL-SAS.
SSD
Disk type
SAS NL-SAS
25 Huawei Confidential
Logical Drive
A logical drive (LD) is a disk that is managed by a storage system and corresponds
to a physical disk.
LD 0 LD 1 LD 2 LD 3
26 Huawei Confidential
Chunk
A chunk (CK) is a disk space of a specified size allocated from a storage pool. It is
the basic unit of a RAID array.
Chunk Chunk
27 Huawei Confidential
Chunk Group
A chunk group (CKG) is a logical storage unit that consists of CKs from different
disks in the same DG based on the RAID algorithm. It is the minimum unit for
allocating resources from a disk domain to a storage pool.
CKG CKG
Disk Disk
CK
DG DG
28 Huawei Confidential
Extent
Each CKG is divided into logical storage spaces of a fixed and adjustable size called
extents. Extent is the minimum unit (granularity) for migration and statistics of
hot data. It is also the minimum unit for space application and release in a storage
pool.
LUN 0 (thick)
Extent
CKG
LUN 1 (thick)
29 Huawei Confidential
Grain
When a thin LUN is created, extents are divided into blocks of a fixed size, called
grains. A thin LUN allocates storage space by grains. Logical block addresses
(LBAs) in a grain are consecutive.
LUN (thin)
Extent Grain
CKG
30 Huawei Confidential
Volume and LUN
A volume is an internal management object in a storage system.
A LUN is a storage unit that can be directly mapped to a host for data reads and writes.
A LUN is the external embodiment of a volume.
Server
LUN
Volume Storage
31 Huawei Confidential
Contents
1. Traditional RAID
2. RAID 2.0+
32 Huawei Confidential
Huawei Dynamic RAID Algorithm
Common RAID algorithm Huawei dynamic RAID algorithm
When a block in a RAID array fails, recover the data in the faulty When a block in a RAID array fails, recover and migrate the data in
block, migrate all the data in the RAID array, and then shield the the faulty block, shield the faulty block, and reconstruct a new
RAID array. RAID array using remaining blocks.
Result: A large amount of available flash memory space is wasted. Benefit: The flash memory space is fully and effectively used.
4. Shield and obsolete the faulty RAID array, which wastes space. 4. Reconstruct a new RAID array using remaining blocks to store data.
ch 0 ch 1 ch n-1 ch n ch P ch 0 ch 1 ch n-1 ch n ch P
PBA 0 16 17 ...
… 100 60 P0 PBA 0 16 17 ... 100 60
60 PPm+2
0
1. A block in a RAID array fails.
1. A block in a RAID array fails.
PBA 1 101 160 … 10 11 P1 PBA 1 101 160 ... 10 11 P1
2. Create a new RAID array to store the data of the RAID array where a block fails. 2. Create a new RAID array to store the data in the faulty block.
33 Huawei Confidential
RAID-TP
RAID protection is essential to a storage system for consistent high reliability and performance. However, the
reliability of RAID protection is challenged by uncontrollable RAID array construction time due to drastic
increase in capacity.
RAID-TP achieves the optimal performance, reliability, and capacity utilization.
Traditional
RAID
34 Huawei Confidential
Quiz
2. Which RAID level would you recommend if a user focuses on reliability and
random write performance?
3. Is it true or false that data access will remain unaffected when any disk in a RAID
10 array fails?
35 Huawei Confidential
Summary
Dynamic RAID
Other RAID
technologies
RAID-TP
36 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
37 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
38 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. SCSI
3 Huawei Confidential
SCSI Protocol
Small Computer System Interface (SCSI) is a huge
protocol system evolved from SCSI-1 > SCSI-2 > SCSI device instruction set
(SBC/SSC)
SCSI-3.
The SCSI protocol defines a model and a necessary
instruction set for different devices to exchange SCSI system model
information by using the framework. (SAM/SPC)
4 Huawei Confidential
SCSI Evolution
SCSI-1
Launched within 1983 to
1985.
SCSI-1 Supports synchronous and
asynchronous modes. SCSI-2
Supports up to seven 8-bit
devices. Launched within 1988 to
Provides up to 5 Mbit/s speed. 1994.
Uses 50-pin cables that span Compatible with SCSI-1.
6 m at most. Supports 16-bit
SCSI-3
5 Huawei Confidential
SCSI Logical Topology
Initiator
Initiator 1 Initiator 2
SDS
Target
Target 1 Target 2 Target 3
LUN 0
LUN 2
LUN 5
LUN namespace Target device
6 Huawei Confidential
SCSI Initiator Model
Generally, the SCSI system of a host works in the initiator mode. The SCSI
architecture on Windows, Linux, AIX, Solaris, and BSD contains the architecture
layer (middle layer), device layer, and transport layer.
7 Huawei Confidential
SCSI Target Model
Based on the SCSI architecture, a target is divided into
three layers: port layer, middle layer, and device layer.
Port layer
The most important part is the middle layer, at which
LUN namespaces, link ports, target devices, tasks, task
sets, and sessions are managed and maintained based Middle layer
on SAM/SPC specifications.
Drivers at the port layer are dynamically loaded in the
Device layer
form of registration. Drivers at the device layer are also
dynamically loaded.
8 Huawei Confidential
SCSI Protocol and Storage System
The SCSI protocol is the basic protocol used for communication between hosts
and storage devices.
DAS uses the SCSI protocol to achieve interconnection between hosts and
storage devices.
SCSI bus
Control signal
SCSI array SCSI array
ID 0 ID 5
9 Huawei Confidential
SCSI Protocol Addressing
Bus
number Differentiates SCSI buses.
Logical
Differentiates sub-devices
unit
number in SCSI devices.
10 Huawei Confidential
Contents
1. SCSI
5. RDMA and IB
11 Huawei Confidential
Emergence of iSCSI
12 Huawei Confidential
iSCSI
SCSI block SCSI flow Other SCSI SCSI commands, responses, and data
instructions instructions instructions
13 Huawei Confidential
iSCSI Initiator and Target
Initiator iSCSI
The SCSI layer generates command descriptor blocks (CDBs) Initiator Target
Link Link
14 Huawei Confidential
iSCSI Architecture
iSCSI nodes encapsulate SCSI instructions and data into iSCSI packets and send the packets to the
TCP/IP layer, where the packets are encapsulated into IP packets to be transmitted over an IP
network.
iSCSI node iSCSI node
IP address IP address
of the of the iSCSI
network network Target
port port
iSCSI IP network
Initiator
IP address
IP address
of the
of the iSCSI
network
network Target
port
port
15 Huawei Confidential
Relationships Between iSCSI and SCSI, TCP and IP
Initiator Function Target
16 Huawei Confidential
FC in Storage
FC can be referred to as the FC protocol, FC network, or FC interconnection. As FC delivers high
performance, it is gradually used for front-end host access on point-to-point and switch-based
networks.
FC brings the following advantages to the storage network:
The scalability is improved.
The transmission distance is increased. Initiator
Host Initiator
Security problems are solved.
FC switch FC switch
17 Huawei Confidential
FC Protocol Structure
Upper-layer protocol
SCSI-3 IP ATM
18 Huawei Confidential
FC Topology
Point-to-point FC-AL FC switching network
19 Huawei Confidential
Seven Types of Ports for the FC Protocol
On an FC network, there are seven types of ports.
FL
Fabric device Fabric device
FC FC
terminal terminal
NL NL
Open ring device Open ring device
FC-AL device
L L L
FC FC FC
terminal terminal terminal
Private ring device Private ring device Private ring device
20 Huawei Confidential
FC Adapter
The FC host bus adapter (HBA) supports FC network applications and provides
high-bandwidth and high-performance storage network solutions.
21 Huawei Confidential
FCoE Protocol
The FCoE protocol is used to transmit FC signals over lossless enhanced
Ethernet infrastructure.
FCoE encapsulates FC data frames in Ethernet frames and allows service traffic
on a LAN and SAN to be transmitted over the same Ethernet.
Ethernet data link
layer frame
VoIP call
22 Huawei Confidential
Comparison Between FC and FCoE
FCoE: defines the mapping from FC to
IEEE 802.3 Ethernet, and uses the physical
FC-4 FC-4
layer and data link layer of the Ethernet
FC-3 FC levels
FC-3 (No changes)
and the network layer, service layer, and FC-2V FC-2V
protocol layer of FC. FC-2 FC-2M
FC_BB_E
FCoE entity Mapping
FC-2P
FCoE retains the protocol stack above FC-
FC-1 MAC IEEE
2 and replaces FC-0 and FC-1 with the FC-0 PHY
802.3
Layers
23 Huawei Confidential
Contents
1. SCSI
5. RDMA and IB
24 Huawei Confidential
Background of SAS
• The parallel bus has been developed to the peak and the bandwidth limit is
reached.
• Serial buses such as FC, IB, and the Ethernet have the following disadvantages for
storage applications:
- FC: It is expensive, and applicable to complex networking and long-distance
scenarios.
- IB: It is expensive, and the networking is complex.
- iSCSI: The latency is high, and the transmission rate is low.
25 Huawei Confidential
What is SAS
SAS is the serial standard of the SCSI bus protocol.
SAS uses the serial technology to achieve higher transmission rate and better scalability, and is
compatible with SATA disks.
SAS adopts the point-to-point architecture to achieve a transmission rate of up to 3 Gbit/s, 6
Gbit/s, 12 Gbit/s, or higher. The full-duplex mode is supported.
26 Huawei Confidential
SAS Protocol Layers
SCSI application layer ATA application layer Management application layer Application layer
SSP transport layer STP transport layer SMP transport layer Transmission layer
27 Huawei Confidential
Highlights of SAS
Provides the serial communication mode to allow multiple data channels to communicate with devices at full
speed.
Binds multiple narrow ports to form a wide port.
Uses expanders to expand interfaces, providing excellent scalability.
Expander
Works in full-duplex mode. Server
SAS Expander
RAID Expander
Controller Wide Expander
Link
Expander
SAS
Read data
RAID Expander
Controller Commands
28 Huawei Confidential
Scalability of SAS
SAS uses expanders to expand interfaces. One SAS domain supports a maximum
of 16,384 disk devices. 1
Expander
Expander
Expander
SASRAID
Expander
Controller
1
Expander
Expander
128
128
29 Huawei Confidential
Cable Connection Principles of SAS
Generally, a SAS cable has four channels, each of which supports 12 Gbit/s bandwidth.
SAS devices are connected in the form of a loop (also called a chain).
A cable supports 4 x 12 Gbit/s bandwidth, which limits the number of disks in the loop.
A maximum of 168 disks are supported in a loop. That is, a loop consists of a maximum
of seven disk enclosures with 24 disk slots each.
Mini SAS
30 Huawei Confidential
SATA
SATA is short for Serial ATA, which is a kind of computer bus used for data transmission between
the main board and storage devices (disks and CD-ROM drives).
Instead of simple PATA improvement, the bus structure is brand new.
A SATA bus uses embedded clock signals and has better error correction capability.
SATA has better anti-interference capability than PATA.
SATA, designed for entry-level applications, is not as powerful as SCSI in terms of big data throughput or
multi-thread transmission.
Serial
SAS SATA transmission
Serial
SCSI transmission PATA
31 Huawei Confidential
Contents
1. SCSI
5. RDMA and IB
32 Huawei Confidential
PCIe
PCIe is short for PCI Express, which is a high-performance and high-bandwidth serial
communication interconnection standard. It was first proposed by Intel and then
developed by the Peripheral Component Interconnect Special Interest Group (PCI-SIG)
to replace the bus-based communication architecture, such as PCI, PCI Extended (PCI-X),
and Accelerated Graphics Port (AGP).
33 Huawei Confidential
Why PCIe
34 Huawei Confidential
PCIe Protocol Structure
PCIe device layers include the physical layer, data link layer, transaction layer,
and application layer. PCIe Device
Physical layer AP
Logical sub-block
Physical
Electrical sub-block
Tx Rx
35 Huawei Confidential
NVMe
NVMe is short for Non-Volatile Memory Express.
The NVMe standard is oriented to PCIe SSDs. Direct connection of the native PCIe channel to the
CPU can avoid the latency caused by the communication between the external controller (PCH) of
the SATA and SAS interface and the CPU.
PCIe is an interface form and a bus standard, and NVMe is a standard interface protocol
customized for PCIe SSDs.
36 Huawei Confidential
NVMe Protocol Stack
App Reduced interaction: The number of
communication interactions is reduced from 4 to 2,
reducing the latency.
Block Layer
Controller SSD
1. Transfer command
Controller
SCSI
Initiator NVMe 2. Ready to transfer
SAS
3. Transfer data
SCSI
37 Huawei Confidential
Advantages and Application of NVMe
IOPS
Over Fabric
Fusion Server End-to-end 100GE
FC NVMe-oF
CloudEngine
100GE NVMe-oF
CE8800 End-to-end hardware Reduced by 50%
uninstallation Latency
NVMe-oF protocol
Huawei
OceanStor
FC NVMe-oF
Dorado
Reduced by 66%
TCO
End-to-end DIF
Data integrity protection
NVMe SSD
FC NVMe-oF
38 Huawei Confidential
Contents
1. SCSI
5. RDMA and IB
39 Huawei Confidential
RDMA
RDMA is short for Remote Direct
Memory Access, which is a method of
Traditional mode RDMA mode
transferring data in a buffer between
application software on two servers over APP Buffer App Buffer
a network.
OS
TCP/IP Buffer
Low latency OS TCP/IP
Driver Buffer
High throughput
Low CPU and OS resource occupancy Buffer
RDMA
Buffer
Adapter Adapter
40 Huawei Confidential
RDMA Bearer Network
Software RDMA application/ULP
RDMA API (Verbs)
UDP TCP
IB network layer IB network layer
IP IP
IB link layer Ethernet link layer Ethernet link layer Ethernet link layer
41 Huawei Confidential
IB
Overview:
The IB technology is specifically designed for server connections, and is widely used for
communication between servers (for example, replication and distributed working), between a
server and a storage device (for example, SAN and DAS), and between a server and a network
(for example, LAN, WAN, and the Internet).
Highlights:
Standard-protocol-based
High bandwidth and low latency
RDMA
Transmission uninstallation
42 Huawei Confidential
IB Architecture
IB defines a series of devices for system communication, including channel
adapters, switches, and routers.
FCP
TCA
Host interconnect
Host
CPU HCA Switch Router
controller
43 Huawei Confidential
IB in Storage
Converged storage
Distributed storage
Server
Initiator
Back-end IB Back-end IB
switch switch Switch cascading
FCoE FC TOE 10GE IB
Back-end network
Target
Front-end IB Client
Disk Front-end IB
switch switch
44 Huawei Confidential
IB Layers
Application layer
45 Huawei Confidential
IB Interface
There are two types of channel adapters (CAs):
Host channel adapter (HCA), for example, Mellanox
Target channel adapter (TCA), an I/O interface used for IB switches and storage
systems
IB connectors:
CA 10 Gb/s to 40 Gb/s
46 Huawei Confidential
Contents
1. SCSI
5. RDMA
47 Huawei Confidential
CIFS Protocol
In 1996, Microsoft renamed SMB to CIFS and added many new functions. Now,
CIFS includes SMB1, SMB2, and SMB3.0.
CIFS uses the C/S mode and basic network protocols including TCP/IP and
IPX/SPX.
Redefined
48 Huawei Confidential
NFS Protocol
NFS is short for Network File System. The network file sharing protocol is
defined by the IETF and widely used in the Linux/Unix environment.
NFS works based on the client/server architecture. The servers provide the
clients with access to shared file systems. NFS enables clients using different
operating systems to share files over a network.
49 Huawei Confidential
NDMP Protocol
NDMP protocol is designed for the data
backup system of NAS devices. It enables NAS
2-way
devices to directly send data to the connected
networking Production Production Backup
system A system N server disk devices or the backup servers on the
network for backup, without any backup
NAS storage
system Tape library client agent required.
There are two networking modes for NDMP
2-way
3-way 3-way
networking Production Production Backup
system A system N server
NAS storage FC
system A Ethernet
50 Huawei Confidential
Quiz
1. Which networks are included in FC topologies?
A. Arbitrated loop network
B. Point-to-point network
C. Switching network
D. Dual-switching network
B. PCIe 2.0
C. PCIe 3.0
D. PCIe 4.0
51 Huawei Confidential
Quiz
3. Which of the following are file sharing protocols?
A. HTTP protocol
B. iSCSI protocol
C. NFS protocol
D. CIFS protocol
B. NFSv2
C. NFSv3
D. NFSv4
52 Huawei Confidential
Quiz
B. Security authentication
D. File operation
E. Disconnection
53 Huawei Confidential
Summary
SCSI
54 Huawei Confidential
More Information
Enterprise Huawei
technical enterprise
support App business App
55 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
56 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
With the development of cloud computing and big data, the storage
architecture changes from scattered to centralized, and gradually evolves
to network-based, virtualized, and massive cloud storage. Storage not only
needs to provide routine services such as data management, data
replication, snapshot, mirroring, and migration, but also needs to enable
functions such as data disaster recovery, data consistency, virtualized
convergence, elastic computing, and resource expansion. These services and
functions depend on a good storage system architecture.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Storage System Architecture Evolution
4 Huawei Confidential
Single-controller Storage
SCSI interface
Logical disks are presented to hosts as LUNs.
SCSI
Terminator
controller
Controller
OS
5 Huawei Confidential
Dual-controller Storage
Services are running on Services are running on
only one controller. both controllers.
Active-Standby Active-Active
6 Huawei Confidential
Mid-range Storage Architecture Evolution
Fixed storage Dual-controller Flexible hardware Flexible software
system active-active component function
configuration redundancy configuration configuration
configuration
Limited Fibre Channel The single-controller Fast Ethernet (FE) Unified storage that
interfaces are and dual-controller interface module are supports both SAN
provided, and the active-passive supported, greatly and NAS protocols has
flexibility is poor. architecture gradually improving flexibility become a hotspot.
Capacity expansion evolve to the active- and scalability. Users can flexibly
can be implemented active architecture. The number of ports configure multi-
only by cascading disk can be selected as protocol services as
enclosures. required. required.
7 Huawei Confidential
Multi-controller Storage
Disk Disk
enclosures enclosures
8 Huawei Confidential
Mission-Critical Storage Architecture Evolution
Bus Hi-Star Direct-connection Virtual matrix
architecture architecture architecture architecture
9 Huawei Confidential
Storage Software Technology Evolution
Improved data Simplified data Improved space Optimized service
reliability management utilization performance
10 Huawei Confidential
Distributed Storage Technology Evolution
Automatic metadata extension
Giga+ indexing
Hadoop FS
Universal hardware Universal hardware Metadata separation Public cloud storage
Customized hardware Software-defined Software-defined Metadata extension
Scale-up Scale-up Scale-out EC Coding
Integrated Parallel cluster file Huawei
GoogleFS Azure Storage
box system OceanStor 100D
General purpose Scientific computing Analysis scenario Facebook
Facebook F4
Haystack
Social scenario Warm storage
MooseFS NoSQL
Small files
11 Huawei Confidential
Distributed Storage Architecture
iSCSI S3/Swift client
VBS
initiator
HDFS client
CM CM CM
Server node Server node Server node Server node Server node Server node Server node Server node Server node
Note: Huawei OceanStor 100D is used as an example to describe the distributed storage architecture.
12 Huawei Confidential
Contents
13 Huawei Confidential
Scale-up and Scale-out
With the continued development of enterprise information systems and the ever-increasing expansion in the
scale of services, service data keeps increasing. The initial configuration of storage systems is often not
enough to meet these demands. Storage system capacity expansion has become the major concern of system
administrators. There are two capacity expansion methods: scale-up and scale-out. The following uses Huawei
storage products as an example to describe the two methods.
Storage
Devices (enclosures and disks) Storage controllers
controllers
Storage Storage
controllers controllers
Scale-up architecture
Scale-out architecture
14 Huawei Confidential
SAS Disk Enclosure Scale-up Networking Principles
Adding a 2 U SAS disk enclosure to
an existing loop
Controller
enclosure
2 U SAS disk
enclosure 0
2 U SAS disk
enclosure 1
15 Huawei Confidential
Smart Disk Enclosure Scale-up Networking Principles
Adding a 2 U smart disk enclosure
to an existing loop
Controller
enclosure
Smart disk
enclosure 0
Smart disk
enclosure 1
16 Huawei Confidential
PCIe Scale-out and IP Scale-out
PCIe scale-out runs on the PCIe protocol while IP scale-out works based on the IP protocol.
Mid-range storage
Medium Functions and prices
enterprises balanced
IP scale-out
Entry-level storage
Small enterprises Price first
IP scale-out
17 Huawei Confidential
Scale-out Technologies Used by Huawei Storage Systems
OceanStor OS
XNET
iWARP
UDP
IB
PCIE DRV transport TCP
IP
PCIe IB ETH
18 Huawei Confidential
Scale-out Networking
Connects to the user's management network
Controller enclosure
0 (original)
Controller enclosure
1 (new)
19 Huawei Confidential
Local Write Process
1 2
SAN
1
LUN 2 PCIe switched network
4
20 Huawei Confidential
Non-local Write Process
1 4
SAN
1 4
LUN
2 PCIe switched network
3
6
21 Huawei Confidential
Local Read Process
1 2
SAN
2
LUN PCIe switched network
5
8
Engine 0 Engine 1 Engine 2 Engine 3
3 4 6 7
22 Huawei Confidential
Non-local Read Process
1 4
SAN
1 4
10
Engine 0 Engine 1 Engine 2 Engine 3
5 6 8 9
23 Huawei Confidential
Contents
24 Huawei Confidential
Hardware Architecture with Two Controllers
Interface .. Interface Interface Interface
.. Service subsystem
module A0 . module A7 module B7 module B0
.
PCIe 3.0 x8 PCIe 3.0 x8
Management
Management Management subsystem
interface module A interface module B
12 V
12 V
Power Power Electromechanical
BBU 0 BBU 1 BBU 2 BBU 3
supply 0 supply 1 subsystem
Service channel
Manage channel
Power supply
25 Huawei Confidential
Hardware Architecture with Multiple Controllers
Interface ... Interface Interface ... Interface
module A0 module A5 module B5 PCIe 3.0 x8 module B0
PCIe 3.0 x8
... ...
Interface Interface Interface Interface
module A0 module A5 module B5 module B0
PCIe 3.0 x8 PCIe 3.0 x8
Management
Management Management
subsystem
interface module A interface module B
12 V
12 V
Electromechanical
Power Power Power Power
BBU 0 BBU 1 BBU 2 BBU 3 subsystem
supply 0 supply 1 supply 2 supply 3
26 Huawei Confidential
Full-mesh Architecture
Host I/O
Network adapter Network adapter
Fully-shared FIMs
Each front-end interconnect I/O module (FIM)
connects to all four controllers through PCIe ports
in a controller enclosure. This module can
FIM FIM FIM FIM simultaneously access the four controllers with
multi-channel technology in active-active mode.
27 Huawei Confidential
Fully Interconnected Disk Enclosures
Controller Controller
enclosure 0 enclosure 1
2 U smart disk
enclosure 0
2 U smart disk
enclosure 1
28 Huawei Confidential
E2E Global Resource Sharing
Host
SAN
Distributed based
on hash results DHT
Global cache
... ...
29 Huawei Confidential
Switchover in Seconds: Mission-Critical Storage with FIMs
Host
Hi1822
User mode
OS kernel mode
30 Huawei Confidential
Global Cache
Write latency
LUN 0 LUN 1 LUN 2 95 μs
4 KB 4 KB ... 8 KB 4 KB 4 KB ... 8 KB 4 KB 4 KB ... 8 KB
50 μs
write
RDMA
AddrN1 AddrN2 AddrN3
31 Huawei Confidential
Global Pool
A A1 A2 A3
LUN B B1
C C1 C2
D D1 D2
LUN mapping
and FP mapping
Strip A B C D P Q
Strip A1 B1 C1 D1 P Q
Strip A2 A3 C2 D2 P Q
...
32 Huawei Confidential
Back-End Sharing
Engine 0 Engine 1 • A single port is connected via a single
13 0 13 connection in the external system.
• A single port is connected to four
A A controllers in the internal system.
0 13 0 13
B B
100 Gbit/s 100 Gbit/s • Dual physical links, balanced and
100 Gbit/s redundant
100 Gbit/s
A 0 1 2 3
B 0 1 2 3
A B C D
x4 x4 x4 • A single port on the controller
x4 cascades two disk enclosures in a
loop.
• A single expansion module supports
A 0 1 2 3
dual links, achieving load balancing
1822
B 0 1 2 3 and redundancy.
33 Huawei Confidential
Active-Active Architecture with Full Load Balancing
34 Huawei Confidential
Cache Mirroring Technology
The function is as follows:
Controller enclosure 1 Controller enclosure 2
35 Huawei Confidential
Key Reliability Technology
The function is as follows:
Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D
36 Huawei Confidential
Host Service Switchover upon Failure of a Single
Controller
Host Host
Automatic
switchover
Backplane Backplane
37 Huawei Confidential
Quiz
2. (Short Answer Question) What are the differences between scale-up and scale-
out?
38 Huawei Confidential
Summary
Storage Architecture
Evolution
Storage System
Scale-up and Scale-out
Storage System Expansion Methods
Architecture
39 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
40 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
41 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
With the development of host, disk, and network technologies, the storage
system architecture evolves, and the storage network architecture also
develops to meet service requirements. This lesson introduces the storage
network architecture.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
3 Huawei Confidential
DAS
Server Server
CPU CPU
RAM
RAM
Disk
Disk
SCSI card
RAID SCSI card
Controller
JBOD
4 Huawei Confidential
Challenges for DAS
Challenges Description
Limited distance.
Inconvenient
The system needs to be powered off during maintenance.
Maintenance
5 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed architecture
6 Huawei Confidential
NAS
Network-attached storage (NAS) connects storage devices to the
live network and provides data and file services.
The most commonly used network sharing protocols for NAS are
Common Internet File System (CIFS) and Network File System Benefits:
(NFS). Improved efficiency
OS: Windows Improved flexibility
Centralized storage
Simplified management
OS: Linux High scalability
High availability
Security (user
Switch NAS device authentication and
OS: MAC OS
authorization)
7 Huawei Confidential
General-Purpose Server and NAS Devices
File system
Application
OS
Printer driver
Network
File system
OS
Network Uni-functional
NAS device
General-purpose server
(Windows or UNIX)
8 Huawei Confidential
NAS Protocols
Enterprise Enterprise
office office • NFS
• CIFS
IP IP IP IP
• FTP
Linux Windows
• HTTP
IP IP IP IP
• NDMP
NFS CIFS
FS
CACHE
POOL
9 Huawei Confidential
Working Principles of NFS
POR TMAP
Client Server Port mapping
1. RPC request
table
Request
RPC
Registration
NFS share
information
10 Huawei Confidential
Typical Application of NFS: Shared Storage for Cloud
Computing
Cloud computing uses the NFS server as the internal shared storage.
Converged storage
NFS client
External IP network
network Cloud computing server
NFS server
Cloud computing server
11 Huawei Confidential
Working Principles of CIFS
Client Server
SMB NEGOTIATE Request
Protocol Protocol
SMB NEGOTIATE Response negotiation handshake
12 Huawei Confidential
Typical Application of CIFS: File Sharing Service
The file sharing service applies to scenarios such as enterprise file servers and
Enterprise office
media assets.
IP Windows IP IP Management
Performance Service Share User
IP IP IP monitoring management management management
NAS service
LAN
DNS
Authentication flow
AD server Management flow
Data flow
13 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
IP SAN Technologies
▫ FC SAN Technologies
4. Distributed Architecture
14 Huawei Confidential
NIC + Initiator Software
NIC
Internal bus
Storage device Ethernet
15 Huawei Confidential
TOE NIC + Initiator Software
The initiator software
implements the
functions of the iSCSI
layer, which consumes
host resources.
The TOE NIC implements
TCP/IP conversion, which
TOE NIC does not consume host
resources.
TCP/IP-based IP SAN
Ethernet connection
Internal bus
Storage device Ethernet
16 Huawei Confidential
iSCSI HBA
TCP/IP-based IP SAN
Ethernet connection
Internal bus
17 Huawei Confidential
Logical Port
Logical ports are created based on bond ports, VLAN ports, or Ethernet ports. The logical ports
are virtual ports that carry host services.
A unique IP address is allocated to each logical port for carrying its services.
No. Description
Logical port
Indicates that multiple Ethernet ports are 4
1
bonded to form a bond port.
One to One to
5
Indicates that an Ethernet port is added many many
2
to multiple VLANs.
Indicates that a bond port is added to One to
3
One to
3 Bond port VLAN
multiple VLANs. many many
Indicates that a bond port is used to
4
create multiple logical ports.
Many to One to
2
Indicates that a VLAN port is used to one many 6
5
create multiple logical ports. 1
18 Huawei Confidential
VLAN Configuration
VLAN is a technology that logically divides a physical LAN into multiple broadcast
domains.
Ethernet ports or bond ports in a storage system can be added to multiple independent
VLANs. You can configure different services in different VLANs to ensure the security
and reliability of service data.
Ethernet port
Bond port
P0 P1 P2 P3 Storage device
Adding ports to VLANs
19 Huawei Confidential
IP Address Failover
IP address failover indicates that a logical IP address fails over from a faulty port to an available
port. In this way, services are switched from the faulty port to the available port without
interruption. The faulty port can take over services back after being recovered.
During the IP address failover, services are switched from the faulty port to the available port,
ensuring service continuity and improving reliability of paths for accessing file systems. This
process is transparent to users.
The essence is a service switchover between ports. The ports can be Ethernet ports, bond ports, or
VLAN ports.
20 Huawei Confidential
Ethernet Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can create logical ports based on
Ethernet ports.
When the Ethernet port that corresponds to a logical port fails, the system will:
21 Huawei Confidential
Bond Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can bond multiple Ethernet ports to
form a bond port.
When the Ethernet ports that are used to create the bond port fails, the system will:
can take over services again. Ethernet port B Ethernet port B Ethernet port D
Bond Port A Bond Port A Bond Port A
22 Huawei Confidential
VLAN-based IP Address Failover
You can create VLANs to isolate different services.
When an Ethernet port on a VLAN fails, the system will:
23 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
FC SAN Technologies
4. Distributed Architecture
24 Huawei Confidential
FC HBA
Fibre Channel
FC SAN
protocol-based
Internal bus
25 Huawei Confidential
FC Network
26 Huawei Confidential
Zoning
Server 1 Server 2
Storage 1 Storage 2
27 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
▫ FC SAN Technologies
Comparison Between IP SAN and FC SAN
4. Distributed Architecture
28 Huawei Confidential
IP SAN and FC SAN
iSCSI
FC FC
IP
SCSI
IP
FC FC
iSCSI
29 Huawei Confidential
Comparison Between IP SAN and FC SAN
Item IP SAN FC SAN
Dedicated Fibre Channel networks and
Network architecture Existing IP networks
HBAs
Transmission Limited by the maximum transmission
Not limited theoretically
distance distance of optical fibers
Management and Complicated technologies and
As simple as operating IP devices
maintenance management
Compatibility Compatible with all IP network devices Poor compatibility
High purchase (Fibre Channel switches,
Lower purchase and maintenance costs HBAs, Fibre Channel disk arrays, and so
Cost than FC SAN, higher return on on) and maintenance (staff training,
investment (ROI) system configuration and supervision,
and so on) costs
Disaster recovery Local and remote DR available based High hardware and software costs for
(DR) on existing networks at a low cost DR
Security Relatively low Relatively high
30 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
31 Huawei Confidential
Distributed Storage Networking
Node 1
Frontend service
network
Node 2
Node 3
Management
network
Node 4
Node 5
Backend storage network
32 Huawei Confidential
Networking Overview
Frontend service/Tenant network
The front-end service/tenant network is used to interconnect the distributed storage with the customer network. It
provides the tenant UI for tenant users to complete operations such as resource application and usage query, and
processes service requests sent by tenant clients or APIs.
Management network
The management network is used to interconnect with the customer's maintenance network. It provides a management
UI for the system administrator to perform service operations such as system configuration, tenant management,
resource management, and service provisioning, as well as maintenance operations such as alarm, performance, and
topology management. In addition, the Mgmt ports of all physical nodes can be aggregated to provide remote device
maintenance capabilities, such as remotely logging in to the virtual KVM of a device and viewing hardware running data
such as temperature and voltage.
33 Huawei Confidential
Network Planes
Management Management
Private client node Standard protocol node
access mode FSM access mode FSM
OSD OSD
Third-place Third-place
DR site quorum DR site quorum Management plane:
server server Storage plane:
Replication plane:
Arbitration plane:
Service plane:
34 Huawei Confidential
Networking Rules
Nodes must be placed in a cabinet from bottom to top.
A deployment solution is usually chosen based on project requirements. The
total power consumption and weight of the storage nodes, switches, and KVM
in a cabinet must be calculated and the number of nodes that can be housed by
a cabinet must be determined based on the equipment room conditions.
In typical configuration, nodes and switches in the base cabinet are connected
through network cables and SFP+ cables, and nodes in an expansion cabinet
connect to switches in the base cabinet through network cables and optical
fibers.
35 Huawei Confidential
Quiz
1. Which of the following are included in distributed storage networking?
A. Management network
B. iSCSI
C. CIFS
D. NFS
36 Huawei Confidential
Summary
DAS
NAS IP SAN
Storage network
architecture evolution
SAN FC SAN
Comparison between
Distributed architecture
IP SAN and FC SAN
37 Huawei Confidential
More Information
38 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
39 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
Upon completion of this course, you will be able to know the following about
Huawei intelligent storage products:
Features
Positioning
Typical application scenarios
2 Huawei Confidential
Contents
1. All-Flash Storage
3. Distributed Storage
3 Huawei Confidential
All-Flash Product Display
Huawei OceanStor
Huawei OceanStor
Dorado 18000 V6
Huawei OceanStor Dorado 8000 V6
Huawei OceanStor Dorado 6000 V6
Huawei OceanStor Dorado 5000 V6
Dorado 3000 V6
Huawei OceanStor
Huawei OceanStor
Dorado 18000 V3
Huawei OceanStor Dorado 6000 V3
Dorado 5000 V3
Huawei OceanStor
Dorado 3000 V3
4 Huawei Confidential
Features
Intelligent AI chips+FlashLink
5 Huawei Confidential
Device Model Examples
Note: Huawei OceanStor Dorado series is used as an example. Power indicator/Power button
6 Huawei Confidential
Storage System Components
Power Module
Controller
System Subrack
Disk Module
7 Huawei Confidential
Software Architecture
Pool
SmartQoS SmartThin SmartMigration SmartVirtualization Three-copy mode
SCSI
8 Huawei Confidential
Intelligent Chips
FLASHLINK ® intelligent algorithm
Controller with0
five chips
0
00
0 0
1 1 Reconstruction
1 010 Multi-core
1
00
1101
0 scheduling X00 minutes/TB
001 0 1X minutes/TB
1 1 1 00 1 Restart 1 2 3 4 5
0
0
0 1 10
0 1 count
1 010 1 Kunpeng chip + service
1
1
1
0 101enclosure
Smart0disk0 0
0
Kunpeng chip + multi-core
splitting
AI chip + cache algorithm
1 1010 1 algorithm Improved read hit ratio
Faster reconstruction
1
0 01
0 0101 0
0
1 1010 1
10 1 10
0101 0
0 1 1 10 1
0 Metadata Data read
0 01
1 0 0 01 0
1 New data Data write
0 1 1 11 1
00 0
Advanced feature
1 10
1 1 SSD1
11 1
GC migration Disk reconstruction
1 data
11 1 Garbage collection
0 11
Multi-stream data Global I/O priority
1 Full-stripe write
Reduced write amplification
partitioning adjustment
Reduced garbage collection Constant low latency
9 Huawei Confidential
Typical Application Scenario – Mission-Critical Service
Acceleration
Data center
SAN
Data Data
Data analysis
extraction consolidation
...
Huawei OceanStor
Dorado
10 Huawei Confidential
Contents
1. All-Flash Storage
3. Distributed Storage
11 Huawei Confidential
Hybrid Flash Storage Series
Huawei OceanStor 18810F V5
Huawei OceanStor
Huawei OceanStor 5610/5810 V5
5100/5210F V5 Huawei OceanStor 18800 V5
12 Huawei Confidential
Hybrid Flash Storage
Enterprise-class hybrid flash storage products
provide stable, reliable, converged, and
efficient data services.
13 Huawei Confidential
Device Model Examples
Storage device (2 U) For example, Huawei Storage device (2 U) For example, Huawei OceanStor
OceanStor hybrid flash storage 5110 V5 hybrid flash storage 5600/5800 V5 Kunpeng
Storage device (2 U) For example, Huawei Storage device (4 U), for example, Huawei OceanStor
OceanStor hybrid flash storage 5300 V5 Kunpeng hybrid flash storage 6800/18800 V5 Kunpeng
14 Huawei Confidential
Convergence of SAN and NAS Storage
LUN
Extent
iSCSI/FC/FCOE NFS/CIFS/FTP/HTTP
Block Service File Service Tier0: SSD Tier1: SAS Tier2: NL-SAS
ROOT
File
Convergence of SAN and NAS resources of Tier0: SSD Tier1: SAS and NL-SAS
Huawei OceanStor hybrid flash series
Intelligent tiering of SAN and NAS cold/hot data
15 Huawei Confidential
Support for Multiple Service Scenarios
Cloud Finance
computing
Carrier
Social
intercourse
Energy
Big data
Government
Enterprise
Backup
and DR
16 Huawei Confidential
Application Scenario – Active-Active Data Centers
Database service
Virtualization
service
File service
...
Switch Switch
Active-active
17 Huawei Confidential
Contents
1. All-Flash Storage
3. Distributed Storage
18 Huawei Confidential
Distributed Storage
19 Huawei Confidential
Product Highlights
Object service
File service
Block service HDFS service
20 Huawei Confidential
Hardware Node Examples
• Virtualization
Performance scenario
node • Cloud computing
For example: OceanStor 100D P100 and P110
scenario
All-flash
node • Database scenario
For example: OceanStor 100D F100 and F110
21 Huawei Confidential
Hardware Node Examples
P36A C36A
TaiShan 5280 V2
TaiShan 5280 V2
P12A S12A
TaiShan 2280 V2 TaiShan 2280 V2
22 Huawei Confidential
Software System Architecture
Service Layer
Hardware x86/Kunpeng
Note: Huawei OceanStor 100D is used as an example.
23 Huawei Confidential
Application Scenario – Cloud Resource Pool
Traditional compute-storage convergence
Storage-compute separation
Compute node
24 Huawei Confidential
Contents
1. All-Flash Storage
3. Distributed Storage
25 Huawei Confidential
Edge Data Storage (FusionCube)
FusionCube:
It is an edge data storage
infrastructure based on the
converged architecture. It is FusionCube 1000:
mainly used in hybrid load It is an edge IT infrastructure
scenarios, such as databases, solution with integrated
desktop clouds, containers, design and is delivered as
and virtualization. integrated cabinet. The
The Kunpeng ecosystem is solution is mainly used in
supported to flexibly meet edge data centers and edge
the elastic configuration application scenarios of
requirements of computing, vertical industries.
storage, and I/O resources Huawei FusionCube The Kunpeng ecosystem is
and meet the requirements supported. Pre-cabling and
of multiple types of pre-configuration can be
application load modes with completed in advance based
an IT infrastructure at the on the customer's plan, and
edge. the solution is delivered as
integrated cabinet to
implement quick deployment.
26 Huawei Confidential
Hardware Model Examples
27 Huawei Confidential
Introduction to Intelligent Management
System device Virtual resource
management management
28 Huawei Confidential
Storage System
Node 1 Node 2 Node N
VM VM VM VM VM VM
...
29 Huawei Confidential
Software Architecture
Office Application VDI BI CRM&ERP Email Web Application
Service
Database
software
Linux OS Operating
Hyper-convergence
Unified system
management Backup software
Distributed storage system
One-click
Asynchronous
capacity EC Active-active QoS
replication
expansion
Multiple
Thin Linked Distributed
Snapshot resource
provisioning clone cache
pools
Hyper-convergence
Unified installation DR
Huawei server hardware
30 Huawei Confidential
Application Scenario – Edge Data Center Service Scenario
FusionCube
Installer
Hardware
installation in an
edge data center
Edge data
center
Compute
+ module
Network
Site
module
management +
Service provisioning
Real-time Storage
Edge data center module
monitoring
Data backup HQ data center
+
Intelligent UPS
O&M
Modular
design and
Edge data center all-in-one
cabinet
31 Huawei Confidential
Quiz
1. (Single-answer question) Which of the following statement about Huawei OceanStor all-
flash storage is false?
A. Supports SSDs and NVMe disks.
B. Supports SAS disks.
C. Supports HDDs.
D. Supports palm-sized SSDs.
32 Huawei Confidential
Quiz
2. (Multi-answer question) Which of the following storage services are supported by Huawei
distributed storage (such as Huawei OceanStor 100D)?
A. Block storage
B. File storage
C. Object storage
D. HDFS storage
E. Linked storage
33 Huawei Confidential
Summary
All-flash storage
34 Huawei Confidential
More Information
35 Huawei Confidential
Recommendations
36 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.