Professional Documents
Culture Documents
Storage Network Architecture
Storage Network Architecture
Foreword
With the development of host, disk, and network technologies, the storage system
architecture evolves, and the storage network architecture also develops to meet
service requirements. This course introduces the storage network architecture.
3 Huawei Confidential
Objectives
4 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
5 Huawei Confidential
Contents
6 Huawei Confidential
DAS
LAN
Client
7 Huawei Confidential
DAS
Server Server
CPU CPU
RAM
RAM
Disk
Disk
SCSI card
RAID SCSI card
Controller
JBOD
8 Huawei Confidential
Challenges for DAS
Challenges Description
Limited distance.
Inconvenient
The system needs to be powered off during maintenance.
Maintenance
9 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
10 Huawei Confidential
Contents
11 Huawei Confidential
NAS
Network-attached storage (NAS) connects storage devices to the live
network and provides data and file services.
The most commonly used network sharing protocols for NAS are
Common Internet File System (CIFS) and Network File System (NFS).
Benefits:
OS: Windows Improved efficiency
Improved flexibility
Centralized storage
OS: Linux Simplified management
High scalability
Switch
High availability
NAS device
OS: MAC OS Security (user authentication
and authorization)
12 Huawei Confidential
General-Purpose Server and NAS Devices
File system
Application
OS
Printer driver
Network
File system
OS
Network Uni-functional
NAS device
General-purpose server
(Windows or UNIX)
13 Huawei Confidential
NAS Protocols
Enterprise Enterprise
office office • NFS
• CIFS
IP IP IP IP
• FTP
Linux Windows
• HTTP
IP IP IP IP
• NDMP
NFS CIFS
FS
CACHE
POOL
14 Huawei Confidential
Working Principles of NFS
Request
RPC
Registration
NFS share
information
16 Huawei Confidential
Typical Application of NFS: Shared Storage for Cloud
Computing
Cloud computing uses the NFS server as the internal shared storage.
Converged storage
NFS client
External IP network
network Cloud computing server
NFS server
Cloud computing server
17 Huawei Confidential
Working Principles of CIFS
Client Server
SMB NEGOTIATE Request
Protocol Protocol
SMB NEGOTIATE Response negotiation handshake
18 Huawei Confidential
Typical Application of CIFS: File Sharing Service
The file sharing service applies to scenarios such as enterprise file servers and media assets.
Enterprise office
IP Windows IP IP Management
NAS service
LAN
DNS
Authentication flow
AD server Management flow
Data flow
19 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
IP SAN Technologies
▫ FC SAN Technologies
4. Distributed Architecture
20 Huawei Confidential
Contents
21 Huawei Confidential
NIC + Initiator Software
NIC
Internal bus
Storage device Ethernet
22 Huawei Confidential
TOE NIC + Initiator Software
Internal bus
Storage device Ethernet
23 Huawei Confidential
iSCSI HBA
Internal bus
24 Huawei Confidential
Type of iSCSI initiators
25 Huawei Confidential
Logical Port
Logical ports are created based on bond ports, VLAN ports, or Ethernet ports. The logical ports are virtual ports
that carry host services.
A unique IP address is allocated to each logical port for carrying its services.
No. Description
Logical port
Indicates that multiple Ethernet ports are
1 4
bonded to form a bond port.
One to One to
Indicates that an Ethernet port is added to 5
2 many many
multiple VLANs.
Indicates that a bond port is added to 3
3 One to One to
multiple VLANs. Bond port VLAN
many many
Indicates that a bond port is used to
4
create multiple logical ports.
Indicates that a VLAN port is used to Many to One to
5 2
one many 6
create multiple logical ports.
1
Indicates that an Ethernet port is used to
6
create multiple logical ports. Ethernet port
26 Huawei Confidential
Network on which two ports are bonded
27 Huawei Confidential
VLAN Configuration
VLAN is a technology that logically divides a physical LAN into multiple broadcast domains.
Ethernet ports or bond ports in a storage system can be added to multiple independent VLANs. You
can configure different services in different VLANs to ensure the security and reliability of service
data.
Ethernet port
Bond port
P0 P1 P2 P3 Storage device
Adding ports to VLANs
28 Huawei Confidential
IP Address Failover
IP address failover indicates that a logical IP address fails over from a faulty port to an available port. In this
way, services are switched from the faulty port to the available port without interruption. The faulty port can
take over services back after being recovered.
During the IP address failover, services are switched from the faulty port to the available port, ensuring service
continuity and improving reliability of paths for accessing file systems. This process is transparent to users.
The essence is a service switchover between ports. The ports can be Ethernet ports, bond ports, or VLAN ports.
29 Huawei Confidential
Ethernet Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can create logical ports based on Ethernet ports.
When the Ethernet port that corresponds to a logical port fails, the system will:
30 Huawei Confidential
Bond Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can bond multiple Ethernet ports to form a bond
port.
When the Ethernet ports that are used to create the bond port fails, the system will:
31 Huawei Confidential
VLAN-based IP Address Failover
You can create VLANs to isolate different services.
When an Ethernet port on a VLAN fails, the system will:
32 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
FC SAN Technologies
▫ Comparison Between IP SAN and FC SAN
4. Distributed Architecture
33 Huawei Confidential
FC HBA
Fibre Channel
FC SAN
protocol-based
Internal bus
34 Huawei Confidential
FC Network
35 Huawei Confidential
Zoning
Server 1 Server 2
Storage 1 Storage 2
36 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
▫ FC SAN Technologies
Comparison Between IP SAN and FC SAN
4. Distributed Architecture
37 Huawei Confidential
IP SAN and FC SAN
IP SAN FC SAN
iSCSI
FC FC
IP
IP
FC F
C
iSCSI
38 Huawei Confidential
Comparison Between IP SAN and FC SAN
Item IP SAN FC SAN
Dedicated Fibre Channel networks and
Network architecture Existing IP networks
HBAs
Transmission Limited by the maximum transmission
Not limited theoretically
distance distance of optical fibers
Management and Complicated technologies and
As simple as operating IP devices
maintenance management
Compatibility Compatible with all IP network devices Poor compatibility
39 Huawei Confidential
Comparison Between DAS, NAS, and SAN
Storage System Architecture DAS NAS SAN
Application scope SME servers and JBOD SME, monitoring, and broadcasting Large enterprises and data centers
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
41 Huawei Confidential
Scale-out Storage Networking
Node 1
Front-end service
network
Node 2
Node 3
Management
network
Node 4
Node 5
Back-end storage network
42 Huawei Confidential
Networking Overview
Front-end service/Tenant network
The front-end service/tenant network is used to interconnect the scale-out storage with the customer network. It provides the tenant
UI for tenant users to complete operations such as resource application and usage query, and processes service requests sent by tenant
clients or APIs.
Management network
The management network is used to interconnect with the customer's maintenance network. It provides a management UI for the
system administrator to perform service operations such as system configuration, tenant management, resource management, and service
provisioning, as well as maintenance operations such as alarm, performance, and topology management. In addition, the Mgmt ports of
all physical nodes can be aggregated to provide remote device maintenance capabilities, such as remotely logging in to the virtual KVM
of a device and viewing hardware running data such as temperature and voltage.
43 Huawei Confidential
Network Planes
Management Management
Private client Standard protocol node
node FSM
access mode FSM access mode
OSD OSD
Third-place
Third-place
DR site quorum DR site Management plane:
quorum server
server Storage plane:
Replication plane:
Arbitration plane:
Service plane:
44 Huawei Confidential
Networking Rules
Nodes must be placed in a cabinet from bottom to top.
A deployment solution is usually chosen based on project requirements. The total power
consumption and weight of the storage nodes, switches, and KVM in a cabinet must be
calculated and the number of nodes that can be housed by a cabinet must be determined
based on the equipment room conditions.
In typical configuration, nodes and switches in the base cabinet are connected through
network cables and SFP+ cables, and nodes in an expansion cabinet connect to switches in
the base cabinet through network cables and optical fibers.
45 Huawei Confidential
Quiz
1. Which of the following are included in scale-out storage networking?
A. Management network
F. iSCSI
G. CIFS
H. NFS
46 Huawei Confidential
Summary
DAS
NAS IP SAN
Storage network
architecture evolution
SAN FC SAN
47 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
48 Huawei Confidential
Acronyms and Abbreviations
Direct Attached Storage (DAS): An external storage device is directly connected to a computer through a cable.
Redundant Array of Independent Disks (RAID): It is a technology that provides a disk group (logical disk) consisting of multiple disks
(physical disks) combined in different modes. The disk group features higher storage performance over a single disk and supports data
redundancy.
Redirect on write (ROW): A core technology used to create file system snapshots. When a source file system receives a write request to modify
existing data, the storage system writes the new data to a new location and directs the BP of the modified data block to the new location.
Virtual Local Area Network (VLAN): A VLAN is a group of hosts with a common set of requirements that communicate as if they were attached
to the same broadcast domain, regardless of their physical location. VLAN membership can be configured through software instead of physically
relocating devices or connections.
KVM: keyboard, video, and mouse. You can use the KVM to remotely view the screen of the terminal host or use the local mouse and keyboard
to remotely control the terminal host. In this way, the administrator can remotely solve the problems that occur on the terminal host.
49 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.