Disk Array and storage access and storage protocols for SAN storage

Source: Internet
Author: User
Composition and classification of Disk Arrays

1. Disk Array includes two main components: controller and Cabinet

2. The controller is the "brain" of the disk array. Its main components are processor and cache. It is the first to implement simple Io operations and raid management functions. With the development of technology, provides various data management functions, such as snapshots, images, and copies.

3. The cabinet contains multiple disks, namely No processor or cache. Raid and data management functions are implemented through controllers.

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/47/DA/wKioL1QBNw3Chc9SAAByrb_Djk4097.gif "Title =" grouping and classification of arrays. GIF "alt =" wkiol1qbnw3chc9saabyrb_djk4097.gif "/>

Composition of common Disk Arrays

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/47/D8/wKiom1QBNk6iFvC2AACKIa_HvkM355.gif "Title =" Your arrays into .gif "alt =" wkiom1qbnk6ifvc2aackia_hvkm355.gif "/>

Common disk array categories

By controller quantity

Jbod: no controller. It is usually used for expansion or in combination with host raid.

Dual Controller array: such as ix5000s

Multi-controller array: such as ix5000

By external interface

SCS Array

FC Array

Iscsi Array

......

 

Internal Structure of the array Controller

Common Internal Controller Components


650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/47/D8/wKiom1QBNtDj7GMjAAAijcpCHFk068.gif "Title =" render controller internal component .gif "alt =" wkiom1qbntdj7gmjaaaijcpchfk068.gif "/>

Array controller cache Working Mode

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/47/DA/wKioL1QBOC_hZwOOAACPdWEuRjw287.gif "Title =" .gif "alt =" wkiol1qboc_hzwooaacpdweurjw287.gif "/>

Cache protection design for three common Controllers


650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/47/D8/wKiom1QBNymQJz5iAABe7pjkD6M852.gif "Title =" three types of controllers cacheprotective design .gif "alt =" wkiom1qbnymqjz5iaabe7pjkd6m852.gif "/>

Controller cache Image


1. Host Data is written to the cache;

2. cache data for exclusive or operation to generate validation data;

3. Add the validation data to the cache;

4. Copy the cached data to the target controller.

5. The target controller processes the data and verifies the data and returns the message;

6. The source controller returns the host message. The operation is complete.

Array expansion mode

Typical mid-range disk array expansion for FC

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/47/DA/wKioL1QBOOCSxerzAAB-0D_tnc8369.gif "Title =" fc 中. GIF "alt =" wKioL1QBOOCSxerzAAB-0D_tnc8369.gif "/>

Extended full-switch architecture of a vendor

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/47/D8/wKiom1QBN-mRJmbMAACoNwK8-X4584.gif "Title =" A factory's full-exchange extension. GIF "alt =" wKiom1QBN-mRJmbMAACoNwK8-X4584.gif "/>


Extended full-switch architecture of a vendor

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/47/DA/wKioL1QBOQzgL_TvAAC0bv4y3AQ302.gif "Title =" A factory's full-exchange capacity expansion 1.gif "alt =" wkiol1qboqzgl_tvaac0bv4y3aq302.gif "/>

Stack Expansion


650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/47/DA/wKioL1QBORzAc49gAAEs9RDAQ7I907.gif "Title =" stacked expansion .gif "alt =" wkiol1qborzac49gaaes9rdaq7i907.gif "/>

Storage Access host access storage

Host access level

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/47/D8/wKiom1QBOMyTNID7AAB6PIpuTSo378.gif "Title =" storing stored images. GIF "alt =" wkiom1qbomytnid7aab6piputso378.gif "/>


Host access storage

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/47/D8/wKiom1QBON3CQ7zzAAB074GjPzI108.gif "style =" float: none; "Title =" zookeeper storage .gif "alt =" wkiom1qbon3cq7zzaab074gjpzi108.gif "/>

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/47/DA/wKioL1QBOfWz2YdDAACIIBBzsMA539.gif "style =" float: none; "Title =" zookeeper storage 1.gif "alt =" wkiol1qbofwz2yddaaciibbzsma539.gif "/>



Host access storage path

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/47/D8/wKiom1QBOPvwn1BRAABiOrJ-cWs920.gif "Title =" zookeeper storage ).gif "alt =" wKiom1QBOPvwn1BRAABiOrJ-cWs920.gif "/>


Connection Topology

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/47/D8/wKiom1QBOQ3Q7WTdAAB0KGHExZI307.gif "Title =" connection topology .gif "alt =" wkiom1qboq3q7wtdaab0kghexzi307.gif "/>


Host access storage mode

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/47/DA/wKioL1QBOjijAvy5AACAVI5Teu0797.gif "Title =" zookeeper storage pattern .gif "alt =" wkiol1qbojijavy5aacavi5teu0797.gif "/>


Das

Traditional Storage deployment methods

Storage Management is performed through the host connected to each other

Other hosts must share the storage via LAN.

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/47/D8/wKiom1QBOV3gUNvOAABEDqK_9cs014.gif "Title =" das.gif "alt =" wkiom1qbov1_unvoaabedqk_9cs014.gif "/>

NAS

Network File Sharing

Supported protocols include CIFS and NFS.

Sharing of file data on Heterogeneous Platforms

Easy to install and use

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/47/DA/wKioL1QBOn-xBhCnAABCQ85FFxs516.gif "Title =" nas.gif "alt =" wKioL1QBOn-xBhCnAABCQ85FFxs516.gif "/>

 

San

Computing (host), transmission (switch), storage (RAID/tape), isolation

Hosts can access any storage device, and storage devices can access each other.

The host and storage devices can be expanded independently.

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/47/DB/wKioL1QBOwzhVrZDAABRSPB8Mwk846.gif "Title =" san.gif "alt =" wkiol1qbowzhvrzdaabrspb8mwk846.gif "/>

Analysis of DAS, NAS, and San

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/47/D8/wKiom1QBOhXQv6m7AACZ749JBh4851.gif "Title =" dasw.nasw.san .gif "alt =" wkiom1qbohxqv6m7aacz749jbh4851.gif "/>

Networking comparison between FC San and IP san

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/47/DB/wKioL1QBOzzR8ieQAABu4LpvZWc157.gif "Title =" FC San and IP sanlogin.gif "alt =" wkiol1qbozzr8ieqaabu4lpvzwc157.gif "/>

Procurement Investment comparison between FC San and IP san

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/47/D8/wKiom1QBOkHQVWjRAACKu3Kj0ko816.gif "Title =" FC San and IP san. .gif "alt =" wkiom1qbokhqvwjraacku3kj0ko816.gif "/>

FC San and IP San post-maintenance costs

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/47/D8/wKiom1QBOkyStF5gAACPxI1jzqI209.gif "Title =" FC San and IP sanaftermarket maintenance costs .gif "alt =" wkiom1qbokystf5gaacpxi1jzqi209.gif "/>

Disk Array and storage access and storage protocols for SAN storage

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.