You are on page 1of 58

Common Storage Protocols

Foreword

 A protocol is a set of conventions that both communication computers


must comply with. For example, how to set up a connection and how to
identify each other.
 A protocol not only defines the language used for communication, but also
specifies the hardware, transmission medium, transmission protocol, and
interface technology. This course describes the definitions and principles of
different storage protocols.

2 Huawei Confidential
Objectives

Through this course, you are expected to:


 Learn about common protocols used in storage systems.
 Understand the working principles and features of the protocols.

3 Huawei Confidential
Contents

1. SCSI

2. iSCSI, Fibre Channel (FC), and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and (InfiniBand) IB

6. CIFS, NFS, and NDMP

4 Huawei Confidential
SCSI Protocol
 Small Computer System Interface (SCSI) is a huge
protocol system evolved from SCSI-1 > SCSI-2 > SCSI device instruction set
(SBC/SSC)
SCSI-3.
 The SCSI protocol defines a model and a necessary
instruction set for different devices to exchange SCSI system model
information by using the framework. (SAM/SPC)

 The SCSI protocol is irrelevant to transmission


media, that is, it can be implemented on various
SCSI link implementation
media, and even virtual media. (FCP/SAS/iSCSI)

5 Huawei Confidential
SCSI Evolution
SCSI-1
 Launched within 1983 to
1985.
SCSI-1  Supports synchronous and
asynchronous modes. SCSI-2
 Supports up to seven 8-bit
devices.  Launched within 1988 to
 Provides up to 5 Mbit/s speed. 1994.
 Uses 50-pin cables that span  Compatible with SCSI-1.
6 m at most. Supports 16-bit
SCSI-3

 Out of use. bandwidth.


Provides up to 20 Mbit/s
SCSI-2

 Standardized in 1993.
speed.  Compatible with SCSI-1 and
SCSI-2.
 Becomes a standard system.
 Supports various media such
SCSI-3 as FCP and IEEE1394.

6 Huawei Confidential
SCSI Logical Topology
Initiator
Initiator 1 Initiator 2

SDS

Target
Target 1 Target 2 Target 3

LUN 0

LUN 2

LUN 5
LUN namespace Target device

7 Huawei Confidential
SCSI Initiator Model
 Generally, the SCSI system of a host works in the initiator mode. The SCSI
architecture on Windows, Linux, AIX, Solaris, and BSD contains the architecture
layer (middle layer), device layer, and transport layer.

SCSI device driver layer

SCSI middle layer

SCSI link layer

8 Huawei Confidential
SCSI Target Model
 Based on the SCSI architecture, a target is divided into
three layers: port layer, middle layer, and device layer.
Port layer
 The most important part is the middle layer, at which
LUN namespaces, link ports, target devices, tasks, task
sets, and sessions are managed and maintained based Middle layer
on SAM/SPC specifications.
 Drivers at the port layer are dynamically loaded in the
Device layer
form of registration. Drivers at the device layer are also
dynamically loaded.

9 Huawei Confidential
SCSI Protocol and Storage System
 The SCSI protocol is the basic protocol used for communication between hosts
and storage devices.
 DAS uses the SCSI protocol to achieve interconnection between hosts and
storage devices.
SCSI bus

Host adapter Data/Address bus


SCSI ID 7

Control signal
SCSI array SCSI array
ID 0 ID 5

LUN 0 LUN 1 LUN 0


LUN 2 LUN 1

10 Huawei Confidential
SCSI Protocol Addressing

Bus
number Differentiates SCSI buses.

Device Differentiates devices


ID on SCSI buses.

Logical
unit
Differentiates sub-devices
number in SCSI devices.

11 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and IB

6. CIFS, NFS, and NDMP

12 Huawei Confidential
Emergence of iSCSI

SCSI allows a small number of


devices to be connected.
The distance between devices is
limited.

IP-network-based SCSI: iSCSI

13 Huawei Confidential
iSCSI

SCSI applications (file systems and databases)

SCSI block SCSI flow Other SCSI SCSI commands, responses, and data
instructions instructions instructions

SCSI instructions, data, and status


Receives SCSI data, generates iSCSI
protocol data, and encapsulates
iSCSI
the data into iSCSI PDUs.

TCP Encapsulates iSCSI PDUs into


TCP/IP packets for transmission
and reception.
IP
Converts bit streams and transmits
Ethernet them over physical links.
iSCSI protocol stack

14 Huawei Confidential
iSCSI Initiator and Target
 Initiator iSCSI
 The SCSI layer generates command descriptor blocks (CDBs) Initiator Target

and transfers them to the iSCSI layer.


SCSI SCSI
 The iSCSI layer generates iSCSI protocol data units (PDUs)
and sends them to the target over an IP network. iSCSI iSCSI
 Target
 The iSCSI layer receives PDUs and sends CDBs to the SCSI TCP TCP
layer.
 The SCSI layer interprets CDBs and gives responses when IP IP
necessary.

Link Link

15 Huawei Confidential
iSCSI Architecture
 iSCSI nodes encapsulate SCSI instructions and data into iSCSI packets and send the packets to the
TCP/IP layer, where the packets are encapsulated into IP packets to be transmitted over an IP
network.
iSCSI node iSCSI node
IP address IP address
of the of the iSCSI
network network Target
port port

iSCSI IP network
Initiator

IP address
IP address
of the
of the iSCSI
network
network Target
port
port

16 Huawei Confidential
Relationships Between iSCSI and SCSI, TCP and IP
Initiator Function Target

SCSI application SCSI commands, responses, and SCSI application


protocol data protocol

Receives SCSI data, generates iSCSI


protocol data, and encapsulates
iSCSI protocol the data into iSCSI PDUs. iSCSI protocol

Encapsulates iSCSI PDUs into


TCP/IP protocol TCP/IP packets for transmission TCP/IP protocol
stack and reception. stack
Performs 8-bit/10-bit encoding, as
well as transmits and receives
NIC driver data. NIC driver

Performs 0/1 code stream


transmission.
Physical Physical

17 Huawei Confidential
FC in Storage
 FC can be referred to as the FC protocol, FC network, or FC interconnection. As FC delivers high
performance, it is gradually used for front-end host access on point-to-point and switch-based
networks.
 FC brings the following advantages to the storage network:
 The scalability is improved.
 The transmission distance is increased. Initiator
Host Initiator
 Security problems are solved.

FC switch FC switch

Target Target Disk Disk


Storage
enclosure enclosure

18 Huawei Confidential
FC Protocol Structure

Upper-layer protocol
SCSI-3 IP ATM

FC-4 IPI-3 SCSI-3 FC-LE


Command Command Link FC-ATM
set mapping set mapping encapsulation

FC-3 General equipment

FC-2 Structure protocol FC-AL FC-AL2


FC-PH
FC-1 Coding/Decoding FC-PH2
FC-0 FC-PH3 Copper cables and optical cables,
Physical conversion
8-bit/10-bit encoding

19 Huawei Confidential
FC Topology
Point-to-point FC-AL FC switching network

Most widely used technology


Only two devices can Up to 127 devices
be connected. Up to 16 million devices
can be connected. can be connected.
(Direct connection)

20 Huawei Confidential
Seven Types of Ports for the FC Protocol
 On an FC network, there are seven types of ports.

FC terminal N F FC switch F N FC terminal

FL
Fabric device Fabric device
FC FC
terminal terminal
NL NL
Open ring device Open ring device
FC-AL device

L L L
FC FC FC
terminal terminal terminal
Private ring device Private ring device Private ring device

21 Huawei Confidential
FC Adapter
 The FC host bus adapter (HBA) supports FC network applications and provides
high-bandwidth and high-performance storage network solutions.

22 Huawei Confidential
FCoE Protocol
 The FCoE protocol is used to transmit FC signals over lossless enhanced
Ethernet infrastructure.
 FCoE encapsulates FC data frames in Ethernet frames and allows service traffic
on a LAN and SAN to be transmitted over the same Ethernet.
Ethernet data link
layer frame

 Service flow IP address

 Block storage FCoE

 VoIP call

 Video stream VoIP

23 Huawei Confidential
Comparison Between FC and FCoE
 FCoE: defines the mapping from FC to
IEEE 802.3 Ethernet, and uses the physical
FC-4 FC-4
layer and data link layer of the Ethernet
FC-3 FC levels
FC-3
(No changes)
and the network layer, service layer, and FC-2V FC-2V
protocol layer of FC. FC-2 FC-2M
FC_BB_E
FCoE entity Mapping
FC-2P
 FCoE retains the protocol stack above FC-
FC-1 MAC IEEE
2 and replaces FC-0 and FC-1 with the FC-0 PHY
802.3
Layers
link layer of the Ethernet. FCoE protocol stack

24 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and IB

6. CIFS, NFS, and NDMP

25 Huawei Confidential
Background of SAS
• The parallel bus has been developed to the peak and the bandwidth limit is
reached.
• Serial buses such as FC, IB, and the Ethernet have the following disadvantages for
storage applications:
- FC: It is expensive, and applicable to complex networking and long-distance
scenarios.
- IB: It is expensive, and the networking is complex.
- iSCSI: The latency is high, and the transmission rate is low.

SCSI in serial mode: SAS

26 Huawei Confidential
What is SAS
 SAS is the serial standard of the SCSI bus protocol.
 SAS uses the serial technology to achieve higher transmission rate and better scalability, and is
compatible with SATA disks.
 SAS adopts the point-to-point architecture to achieve a transmission rate of up to 3 Gbit/s, 6
Gbit/s, 12 Gbit/s, or higher. The full-duplex mode is supported.

27 Huawei Confidential
SAS Protocol Layers
SCSI application layer ATA application layer Management application layer Application layer

SSP transport layer STP transport layer SMP transport layer Transmission layer

SAS port layer Port layer

SSP link layer STP link layer SMP link layer


Link layer
SAS link layer

SAS phy layer PHY layer

SAS physical layer Physical layer

28 Huawei Confidential
Highlights of SAS
 Provides the serial communication mode to allow multiple data channels to communicate with devices at full
speed.
 Binds multiple narrow ports to form a wide port.
 Uses expanders to expand interfaces, providing excellent scalability.
Expander
 Works in full-duplex mode. Server
SAS Expander
RAID Expander
Controller Wide Expander
Link

Expander

SAS
Read data
RAID Expander
Controller Commands

29 Huawei Confidential
Scalability of SAS
 SAS uses expanders to expand interfaces. One SAS domain supports a maximum
of 16,384 disk devices. 1
Expander

Expander

Expander

SASRAID
Expander
Controller
1

Expander

Expander

128
128

30 Huawei Confidential
Cable Connection Principles of SAS
 Generally, a SAS cable has four channels, each of which supports 12 Gbit/s bandwidth.
 SAS devices are connected in the form of a loop (also called a chain).
 A cable supports 4 x 12 Gbit/s bandwidth, which limits the number of disks in the loop.
 A maximum of 168 disks are supported in a loop. That is, a loop consists of a maximum
of seven disk enclosures with 24 disk slots each.

SAS cable connectors:

Mini SAS

High-density mini SAS

31 Huawei Confidential
SATA
 SATA is short for Serial ATA, which is a kind of computer bus used for data transmission between
the main board and storage devices (disks and CD-ROM drives).
 Instead of simple PATA improvement, the bus structure is brand new.
 A SATA bus uses embedded clock signals and has better error correction capability.
 SATA has better anti-interference capability than PATA.
 SATA, designed for entry-level applications, is not as powerful as SCSI in terms of big data throughput or
multi-thread transmission.

Serial
SAS SATA transmission

Serial
SCSI transmission PATA

32 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and IB

6. CIFS, NFS, and NDMP

33 Huawei Confidential
PCIe
 PCIe is short for PCI Express, which is a high-performance and high-bandwidth serial
communication interconnection standard. It was first proposed by Intel and then
developed by the Peripheral Component Interconnect Special Interest Group (PCI-SIG)
to replace the bus-based communication architecture, such as PCI, PCI Extended (PCI-X),
and Accelerated Graphics Port (AGP).

34 Huawei Confidential
Why PCIe

PCIe is used to obtain significantly improved system throughput,


scalability, and flexibility at lower production costs, which are almost
impossible to achieve using the traditional bus-based interconnection.

High-performance and high-bandwidth serial interconnection standard:


PCIe

35 Huawei Confidential
PCIe Protocol Structure
 PCIe device layers include the physical layer, data link layer, transaction layer,
and application layer. PCIe Device

 Physical layer AP

 Data link layer


 Transaction layer Transaction

 Application layer Physical Data link

Logical sub-block
Physical

Electrical sub-block

Tx Rx

36 Huawei Confidential
NVMe
 NVMe is short for Non-Volatile Memory Express.
 The NVMe standard is oriented to PCIe SSDs. Direct connection of the native PCIe channel to the
CPU can avoid the latency caused by the communication between the external controller (PCH) of
the SATA and SAS interface and the CPU.
 PCIe is an interface form and a bus standard, and NVMe is a standard interface protocol
customized for PCIe SSDs.

37 Huawei Confidential
NVMe Protocol Stack
App Reduced interaction: The number of
communication interactions is reduced from 4 to 2,
reducing the latency.
Block Layer
Controller SSD
1. Transfer command
Controller
Initiator
SCSI NVMe 2. Ready to transfer
SAS
3. Transfer data

SAS 4. Response feedback

1. NVMe write command


Target
SAS NVMe
NVMe 2. NVMe write finished

SCSI

The average I/O latency when NVMe is used


SAS Protocol Stack NVMe Protocol Stack
is less than that when SAS 3.0 is used.

38 Huawei Confidential
Advantages and Application of NVMe
IOPS
Over Fabric
Fusion Server End-to-end 100GE

FC NVMe-oF
CloudEngine

100GE NVMe-oF
CE8800 End-to-end hardware Reduced by 50%
uninstallation Latency
NVMe-oF protocol
Huawei
OceanStor
FC NVMe-oF
Dorado
Reduced by 66%
TCO
End-to-end DIF
Data integrity protection
NVMe SSD
FC NVMe-oF

39 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA and IB

6. CIFS, NFS, and NDMP

40 Huawei Confidential
RDMA
 RDMA is short for Remote Direct
Memory Access, which is a method of
Traditional mode RDMA mode
transferring data in a buffer between
application software on two servers over APP Buffer App Buffer

a network. OS
TCP/IP Buffer
 Low latency OS TCP/IP

Driver Buffer
 High throughput
 Low CPU and OS resource occupancy Buffer
RDMA
Buffer
Adapter Adapter

41 Huawei Confidential
RDMA Bearer Network
Software RDMA application/ULP
RDMA API (Verbs)

RDMA software stack


Typical hardware

IB transport protocol IB transport protocol IB transport protocol iWARP protocol

UDP TCP
IB network layer IB network layer
IP IP

IB link layer Ethernet link layer Ethernet link layer Ethernet link layer

IB RoCEv1 RoCEv2 iWARP

Ethernet/IP Ethernet/IP Ethernet/IP


IB management
management management management

Content defined by IBTA


Content defined by IEEE/IETF

42 Huawei Confidential
IB
 Overview:
 The IB technology is specifically designed for server connections, and is widely used for
communication between servers (for example, replication and distributed working), between a
server and a storage device (for example, SAN and DAS), and between a server and a network
(for example, LAN, WAN, and the Internet).

 Highlights:
 Standard-protocol-based
 High bandwidth and low latency
 RDMA
 Transmission uninstallation

43 Huawei Confidential
IB Architecture
 IB defines a series of devices for system communication, including channel
adapters, switches, and routers.
FCP
TCA

Host interconnect
Host
CPU HCA Switch Router
controller

CPU System main TCA TCA


storage
SCSI Gbit
CPU Ethernet

44 Huawei Confidential
IB in Storage
Converged storage

Distributed storage
Server
Initiator
Back-end IB Back-end IB
switch switch Switch cascading
FCoE FC TOE 10GE IB
Back-end network

Target Front-end network


Frontend
Storage controller ...
Node Node Node Node
Initiator Backend 1 2 3 n

SAS SAS Distributed cluster

Target
Front-end IB Client
Disk Front-end IB
switch switch

45 Huawei Confidential
IB Layers

Application layer

Transmission layer Sends, receives, and reassembles data


packet segments.

Network layer Provides addressing and routing.

Provides data packet design and point-to-


Link layer
point connection for local subsystems.

Physical layer Determines the connection rate.

46 Huawei Confidential
IB Interface
 There are two types of channel adapters (CAs):
 Host channel adapter (HCA), for example, Mellanox
 Target channel adapter (TCA), an I/O interface used for IB switches and storage
systems
IB connectors:
CA 10 Gb/s to 40 Gb/s

47 Huawei Confidential
Contents

1. SCSI

2. iSCSI, FC, and FCoE

3. SAS and SATA

4. PCIe and NVMe

5. RDMA

6. CIFS, NFS, and NDMP

48 Huawei Confidential
CIFS Protocol
 In 1996, Microsoft renamed SMB to CIFS and added many new functions. Now,
CIFS includes SMB1, SMB2, and SMB3.0.
 CIFS uses the C/S mode and basic network protocols including TCP/IP and
IPX/SPX.

Redefined

Named as SMB CIFS Defined SMB2 SMB2.2 => SMB3.0

1988 1992 1996 2000 2007 2009 2012 2020

IBM Defined SMB2.1


Realized Samba Added new features

49 Huawei Confidential
NFS Protocol
 NFS is short for Network File System. The network file sharing protocol is
defined by the IETF and widely used in the Linux/Unix environment.
 NFS works based on the client/server architecture. The servers provide the
clients with access to shared file systems. NFS enables clients using different
operating systems to share files over a network.

NFSv1 NFSv2 NFSv3 NFSv4.0 NFSv4.1 NFSv4.2

1990 2000 2010 2020

50 Huawei Confidential
NDMP Protocol
 NDMP protocol is designed for the data
backup system of NAS devices. It enables NAS
2-way
devices to directly send data to the connected
networking Production Production Backup
system A system N server disk devices or the backup servers on the
network for backup, without any backup
NAS storage
system Tape library client agent required.
 There are two networking modes for NDMP
 2-way
3-way  3-way
networking Production Production Backup
system A system N server

NAS storage FC
system A Ethernet

NAS storage system A Backup data flow


Tape library
Control flow

51 Huawei Confidential
Quiz
1. Which networks are included in FC topologies?
A. Arbitrated loop network

B. Point-to-point network

C. Switching network

D. Dual-switching network

2. Which PCIe versions are available currently?


A. PCIe 1.0

B. PCIe 2.0

C. PCIe 3.0

D. PCIe 4.0

52 Huawei Confidential
Quiz
3. Which of the following are file sharing protocols?
A. HTTP protocol

B. iSCSI protocol

C. NFS protocol

D. CIFS protocol

4. Which NFS versions are available currently?


A. NFSv1

B. NFSv2

C. NFSv3

D. NFSv4

53 Huawei Confidential
Quiz

5. Which processes are involved when the CIFS protocol is used?


A. Protocol handshake

B. Security authentication

C. Connection to the share

D. File operation

E. Disconnection

54 Huawei Confidential
Summary

SCSI

iSCSI, Fibre Channel (FC), and FCoE

SAS and SATA


Common Storage Protocols
PCIe and NVMe

RDMA: RoCE, IB, and iWARP

CIFS, NFS, and NDMP

55 Huawei Confidential
More Information

Enterprise Huawei
technical enterprise
support App business App

56 Huawei Confidential
Recommendations

 Huawei official websites


 Enterprise business: https://e.huawei.com/en/
 Technical support: https://support.huawei.com/enterprise/en/index.html
 Online learning: https://www.huawei.com/en/learning

 Popular tools
 HedEx Lite
 Network Document Tool Center
 Information Query Assistant

57 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.

Copyright©2020 Huawei Technologies Co., Ltd.


All Rights Reserved.

The information in this document may contain predictive


statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.

You might also like