Professional Documents
Culture Documents
HCIA-Storage V4.5 Training Material
HCIA-Storage V4.5 Training Material
5 Theory Course
Theory Course Overview
M1 Storage Technology Trends 1-1 Storage Technology Trends
1 Huawei Confidential
Storage Technology Trends
Foreword
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
2. Data Storage
3 Huawei Confidential
What is Data
SNIA (Storage Networking Industry Association) defines data as the digital
representation of anything in any form.
Format in which data is stored
Email 0101001010100010000011
1100011100010001110001
1100000111101010100101
Digital music 0101001010100101001010
1001010101001010100010
1010010101001010101010
Digital video
0101010101010010100010
0101001010101010100101
Ebook 0101001010101010100101
0101010010100101001000
1010101001001010010010
4 Huawei Confidential
Data Types
Semi-
Structured structured Unstructured
data data data
5 Huawei Confidential
Data Processing Cycle
Data processing is the reorganization or reordering of data by humans or
machines to increase their specific value. A data processing cycle includes three
basic steps: input, processing, and output.
6 Huawei Confidential
What is Information
Information is processed, structured, or
rendered in a given context to make it
Processing Information
meaningful and useful.
Information is processed data, including
data with context, relevance, and
Data
purpose. It also involves the manipulation
of raw data.
Data
Redundancy
7 Huawei Confidential
Data vs. Information
After being processed, data can be converted into information.
In order to be stored and transmitted in IT systems, information need to be
processed as data.
8 Huawei Confidential
Information Lifecycle Management
Information lifecycle management (ILM) refers to a set of management
theories and methods from the stage in which the information is generated and
initially stored to the stage where the information is obsoletely deleted.
Data value
9 Huawei Confidential
Contents
2. Data Storage
10 Huawei Confidential
What is Data Storage
Storage in a narrow sense Storage in a broad sense
11 Huawei Confidential
Data Storage System
12 Huawei Confidential
Physical Structure of Storage
Hosts
Storage application
software
The front-end board of
controllers
Cache
Storage
System The back-end board of Storage management
controllers software
Connectors
Disks
13 Huawei Confidential
Data Storage Types
Internal DAS
Storage SAN
Storage FAS
External NAS
Storage
14 Huawei Confidential
Evolution of Data Management Technologies
Distributed
Dedicated storage device
storage device
Manual
management
15 Huawei Confidential
Data Storage Application
Database servers
Users
Application
servers
Email servers
Offline
storage
File servers Online storage Nearline storage
Employees
Classification based on data access frequencies
16 Huawei Confidential
Contents
2. Data Storage
▫ Storage Media
▫ Interface Protocols
17 Huawei Confidential
History of Storage Architecture Development
2000s
1990s • Distributed
• Storage storage
1980s network • Cloud storage
• External
storage
1950s
• Traditional
storage
18 Huawei Confidential
From Disks to Disk Arrays
JBOD
Controllers
19 Huawei Confidential
From Separation to Convergence
File
Ethernet
system Server
SAN LAN
File
NAS SAN
system
Storage Storage
File
system
Storage
20 Huawei Confidential
Distributed Storage
Physical resources are organized using
software to form a high-performance
Front-end
logical storage pool, ensuring reliability service
network Management
and providing multiple storage services. network
21 Huawei Confidential
Storage Virtualization
Storage virtualization consolidates the Clients or servers
22 Huawei Confidential
Cloud Storage
The cloud storage system combines multiple storage devices, applications, and services. It uses
highly virtualized multi-tenant infrastructure to provide scalable storage resources for enterprises.
Those storage resources can be dynamically configured based on organization requirements.
Legacy New
applications applications
Converged
Elastic Block storage service File storage service Object storage service
23 Huawei Confidential
Contents
2. Data Storage
▫ Interface Protocols
24 Huawei Confidential
History of HDDs
Larger capacity with the smaller size.
25 Huawei Confidential
History of SSDs
Solid-state drives (SSDs) were invented almost as early as HDDs, but were not
popular at that time due to high price and the rapid development of HDDs at
the end of the 20th century.
With the requirement for high access speed, SSDs are booming.
• Bell Labs
1976 • SanDisk
1999 • Samsung
2010…
• Floating gate • Dataram sold launched flash • BiTMICRO released laptops • Lower costs
transistor Bulk Core. SSDs. launched flash using SSDs.
• Greater capacity
• 2 MB capacity • 20 MB capacity SSDs. • 32 GB capacity
• 18 GB capacity
1967 1991 2006
26 Huawei Confidential
Development of Flash Memory
27 Huawei Confidential
Contents
2. Data Storage
▫ Storage Media
Interface Protocols
28 Huawei Confidential
Interface Protocols
Disk interfaces connect disks to hosts.
Interface protocols refer to the communication modes and requirements that
interfaces for exchanging information must comply with.
29 Huawei Confidential
History of Interface Protocols
The first-gen FC
protocol was 2004 2008 2012 2016 2017 2018 2020…
released in 1994.
SATA 1.0
Disk interface SATA 3.0
4G FC
SAS 1.0 SAS 2.0 SAS 3.0 SAS 4.0
SATA 2.0
30 Huawei Confidential
NVMe and NVMe-oF
NVMe, Non-Volatile Memory Express
Improve the performance CPU CPU
Reduce the latency PCIe PCIe
NVMe-oF, NVMe over Fabrics
SAS Controller
Potential: low latency and high
SAS Expander
bandwidth
Purpose: accelerate the data
transmission among the storage NVMe back-end SAS back-end
physical path physical path
network
31 Huawei Confidential
Contents
2. Data Storage
32 Huawei Confidential
History of Storage Products
Cloud
Media
HDD SSD
Architecture Trend
Centralized Distributed
All-flash Intelligence
Management
Manual O&M Intelligent O&M
33 Huawei Confidential
The Intelligence Era is Coming
34 Huawei Confidential
Challenges to Data Storage
24/7 µs-level
Time-consuming of Always-on Real-time, high-speed
RAID reconstruction services for all processing of production
Service things connected transactions in the 5G era
interruption due
to multiple points
of failure Finance High disk
Reliable Fast
failure rate
35 Huawei Confidential
Characteristics of Storage in the Intelligence Era
Storage in the intelligence
era
Intelligent data lifecycle
management
Storage for AI AI in storage
Data convergence
Zero data migration Data collaboration
Convergence of Simplified protocol stack and data-
SAN and NAS storage convergence
Intelligent storage tiering of hot, Compute-storage collaboration, on-
warm, and cold data demand capacity expansion
Multi-service convergence Dedicated hardware and
(block, file, and object) distributed storage
Hardware + Algorithm + Architecture = Efficient storage
Robust reliability Large capacity High performance
Device-level of 99.99999% PB-level to EB-level ms-level to µs-level
System-level of 99.999% Efficient deduplication & Intelligent distributed cache
compression
Solution-level reliability + Cost-effective media, warm and High-speed protocols
Cloud-level DR cold data storage and algorithms
Minimum cost and maximum value for per-bit data
36 Huawei Confidential
Data Storage Trend
Distributed
storage
Database Cloud
applications Blockchain
computing Storage in AI
Mainframe the
system
Private software
Hyper- Big data intelligenc
Traditional
and hardware
external
converged e era
solutions with infrastructure 5G
fully coupled storage (HCI) General-
computing, purpose
Brain-like
storage, and computing DNA Graph
Tensor computin
network computing computing computing
VM Container g
resources, x86
applicable only to
CXL HCCS
large RoCE/NVMe
organizations
FC IP
SAS IB Quantum dot
PCM MRAM
HDD SSD
37 Huawei Confidential
Optical Storage Technology
Long service High 100 GB+ per Low power Long-term 10 TB per
life reliability disk consumption stable storage disk
38 Huawei Confidential
DNA Data Storage
A small number of synthetic DNA molecules can store a large amount of data,
and can freeze, dry, transport, and store data for thousands of years.
Advantages of using DNA as storage media:
Small size
High density
Strong stability
Bottlenecks and limitations:
High costs of DNA molecular synthesis
Slow data read and search
39 Huawei Confidential
Atomic Storage
In 1959, physicist Richard Feynman suggested that it was possible to use atoms to store
information if they could be arranged the way we wanted.
Because an atom is so small, the capacity of atomic storage will be much larger than that of the
existing storage medium in the same size.
With the development of science and technology, arranging the atoms the way we want has
become a reality.
Bottlenecks and limitations:
Strict requirements on the operating environment.
40 Huawei Confidential
Quantum Storage
Now, information in electronic devices is stored and moved through the flow of electrons.
If electrons are replaced by photons, the movement of information within the computer may
occur at the speed of light.
Although the storage efficiency and service life are improved, the quantum storage is still difficult
to be widely applied at present.
Quantum storage cannot meet the following requirements:
High storage efficiency
Low noise
Long service life
Operating at room temperature
41 Huawei Confidential
Storage Network Trend
AS-IS TO-BE
FC SAN and IP SAN Converged AI Fabric network
High network costs: The FC private network has low latency but high Reduced network costs: Open Ethernet carries high-performance, low-
costs. The IP SAN has low costs but high latency and poor performance. latency, and low-cost storage networks.
High O&M costs: IP SAN and FC SAN require dedicated O&M personnel Reduced O&M costs: No dedicated O&M skills are required, and unified
separately, and do not support cloud-and-network synergy network management is supported for data centers.
LAN Flexibility
Eth
Flexibility
No packet loss
NIC NIC
Low latency
FC SAN FC SAN
IP SAN IP SAN
10G Eth
IP FC
16G FC SAN iNIC iNIC
SAN SAN
10G IP SAN
Low cost Low latency
25/100G Eth
42 Huawei Confidential
History of Huawei Storage Products
2019
2017 First high-end
2015 Huawei OceanStor storage
2013 2nd-gen high- Dorado, fastest
2011 accelerated by AI
end storage all-flash storage
2008 1st-gen high- chips
2006 Launched self- end storage
2002 Launched 2nd- developed Interop Best
Released SmartMatrix
Dived into gen FC storage. HSSDs, pioneer architecture Best-in-class of of Show
self-
storage Founded in the all-flash the year Award
developed
technical IP SAN Huawei industry
research Symantec Co.,
Ltd.
Released self-
Launched developed Distributed Huawei
FC storage virtual storage clustered Launched T OceanStor V3
2003 NAS storage series
2007 unified storage First SAN&NAS Leader in Gartner Industry's first
2009 converged Magic Quadrant full-series
2012 storage Huawei
for the first time NVMe all-flash
2014 OceanStor
2016 storage Pacific series
2018
2020
43 Huawei Confidential
Architecture of Huawei Intelligent Data Storage Products
Storage Database Big data Edge Intelligent data reduction
• AI-based prediction
Intelligent data reduction Intelligent data storage • Intelligent CPU and GPU reduction algorithms
• Deep • Intelligent • CPU/GPU • Intelligent • Intelligent • Intelligent
compression global acceleration tiering prefetch prediction Intelligent data storage
Intelligence prediction • Optimal media combination using technologies
Intelligent scheduling such as intelligent prefetch, data tiering, hotspot
• Container • Heterogeneous computing power • Near-data computing identification, and data caching
+
Intelligent scheduling
CPU
DRA NPU
SCM GPU
SSD • Dynamic management of heterogeneous
computing resources; near-data computing
Memory Fabric scheduling; quick start of containers
Hardware Network Network
chip chip
Memory Fabric: high-performance network centered
All IP on memory
• High-performance network with ns-level latency
Memory SSD
media
• Memory pooling and tiering
media
44 Huawei Confidential
Quiz
1. (Multiple-answer question) Which of the following are data types?
A. Structured data
B. Semi-structured data
C. Unstructured data
2. (Multiple-answer question) Which of the following statements about storage are correct?
A. Storage refers to disks.
C. Storage types include block storage, file storage, and object storage.
45 Huawei Confidential
Quiz
3. (Multiple-answer question) Which are characteristics of cloud storage?
A. Convergence
B. Open
C. Elasticity
D. Scale-up
4. (Multiple-answer question) Which of the following are the objectives of integrating AI into storage?
A. Simple
B. Efficient
D. Easy to use
46 Huawei Confidential
Summary
47 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
48 Huawei Confidential
Recommendations
49 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
This chapter describes the components of the storage system, including the
controller enclosure, disk enclosure, disks, interface modules, and
connection modes between enclosures and their respective working
principles.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
3 Huawei Confidential
Storage Product Form
4 Huawei Confidential
Controller Enclosure
The controller enclosure uses a modular design and consists of a system subrack,
controllers (with built-in fan modules), BBUs, power modules, management modules,
and interface modules. Management
Power Module Module
Interface
Module
System Subrack
Controller
5 Huawei Confidential
Front View of a Controller Enclosure
Icon Description
Enclosure ID indicator
6 Huawei Confidential
Rear View of a Controller Enclosure
1 2 3 4 5
No. Description
1 Management port
2 Maintenance port
6 7 3 Serial port
4 Interface module
5 Power-BBU module
6 SAS expansion port
7 Interface module
8 Management module
9 Power module
8 9
7 Huawei Confidential
Controller
A controller is the core component of a storage system. It processes storage
services, receives configuration management commands, saves configuration
data, connects to disks, and saves critical data to coffer disks.
Controller enclosure
FE FE
Controller Controller
Cache Cache
CPU CPU
BE BE
Disk
enclosure
Cache data
8 Huawei Confidential
BBU and Fan Module
Fan module
Running/Alarm Running/Alarm
indicator of the BBU indicator of the fan
BBU Front view
9 Huawei Confidential
Coffer Disk
Latch Latch
Handle Handle
Disk Disk
Label Label
10 Huawei Confidential
Power Module
The AC power module supplies power to the controller enclosure, allowing the
enclosure to operate normally at maximum power. Running/
Alarm
Handle indicator Latch
Power socket
Note: Huawei OceanStor Dorado V6 is used as the example.
11 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
12 Huawei Confidential
Disk Enclosure
The disk enclosure uses a modular design and consists of a system subrack,
expansion modules, power modules, and disks.
Power
Module
Expansion
Module
System Subrack
Disk Drive
Module
13 Huawei Confidential
Front View of a Disk Enclosure
Icon Description
14 Huawei Confidential
Rear View of a Disk Enclosure
4
No. Description
1 Serial port
2 Mini SAS HD expansion port
3 ID display
4 Expansion module
1 2 3 5
5 Power module
2 U SAS disk enclosure 6 Onboard expansion port
7 Onboard management port
8 Power module
15 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
16 Huawei Confidential
Expansion Module
17 Huawei Confidential
CE Switch
Rear view
Console
Front view
18 Huawei Confidential
Fibre Channel Switch
Management ports
(serial port and
Ethernet port) USB port 24 Fibre Channel ports Power socket
Three link
aggregation groups
19 Huawei Confidential
Device Cables
20 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
HDD
SSD
5. Interface Module
21 Huawei Confidential
Disk Type
IDE
SCSI
SATA
1.8-inch SAS Interface
2.5-inch FC type
3.5-inch Dimensions
NVMe
5.25-inch ... Enterprise-class
Application
... scenario Desktop-class
...
What are the types of disks?
HDD
SSD Structure
...
22 Huawei Confidential
HDD Structure
An HDD consists of platters, an actuator arm, read/write heads, a spindle, a
port, and control circuits.
Platter
Actuator arm
Spindle
Control circuit
Port
Read/write head
23 Huawei Confidential
HDD Working Principles
Basic
operation The platter is
driven by a motor.
Platter
Landing zone
24 Huawei Confidential
Data Organization on a Disk
Sector Track
Head
Cylinder
Actuator
Platter arm
Motor
Motor
25 Huawei Confidential
Disk Capacity and Cache
Disk capacity
Disk capacity = Number of cylinders x Number of heads x Number of sectors x 512
bytes. The unit is MB or GB. The disk capacity is determined by the capacity of a
single platter and the number of platters.
Cache
Because the processing speed of a CPU is much faster than that of a disk, the CPU
must wait until the disk completes a read/write operation before issuing a new
command. To solve this problem, a cache is added to the disk to improve the
read/write speed.
26 Huawei Confidential
Factors Relevant to Disk Performance
Single platter
Indirect factor for disk performance
capacity
27 Huawei Confidential
Average Access Time
The average access time is determined by:
Average seek time
Average latency time
Disc
Data Block
Seek
Tracks
28 Huawei Confidential
Data Transfer Rate
The date transfer rate is determined by:
Internal transfer rate
External transfer rate/Interface transfer rate
Disk Disc
Seek
Tracks
External
Internal
29 Huawei Confidential
Disk IOPS and Transmission Bandwidth
IOPS
Input/Output operations per second (IOPS) is a key indicator to measure disk
performance.
IOPS is calculated by the seek time, rotation latency, and data transmission time.
30 Huawei Confidential
Parallel and Serial Transmission
For example, the methods for transmitting numbers 1 to 8 are as follows:
1
2
3 8 7 6 5 4 3 2 1
Transmit 4 Receive Transmit Receive
end 5 end end end
6
7
8
Multiple lines are connected between two ends, Only one line is connected between two ends. Eight
and one number is transmitted on each line. numbers are sent on this line in sequence. The receive
end has all numbers after eight transmissions.
31 Huawei Confidential
Disk Port Technology
A disk must provide a simple port for users to access its data. Generally, disks
provide the following physical ports:
IDE port
Used for the ATA
instruction system
SATA port
Disk
Ports Parallel SCSI port
32 Huawei Confidential
IDE Disk Port
The integrated drive electronics (IDE) port is also called the parallel ATA port.
ATA stands for Advanced Technology Attachment.
The ATA disk is also called the IDE disk.
The ATA port uses the parallel ATA technology.
33 Huawei Confidential
SATA Port
SATA is short for serial ATA.
SATA ports use serial transmission and provide a higher rate than IDE ports.
SATA uses a point-to-point architecture and supports hot swap.
SATA Port
34 Huawei Confidential
SCSI Port
SCSI is short for Small Computer System Interface.
35 Huawei Confidential
SAS Port
SAS is short for Serial Attached SCSI.
SAS is a point-to-point, full-duplex, and dual-port interface.
SAS is backward compatible with SATA.
Rate: 600 Mbit/s per channel
SAS features high performance, high reliability, and powerful scalability.
36 Huawei Confidential
Fibre Channel Port
Fibre Channel disks use the Fibre Channel arbitrated loop (FC-AL).
FC-AL is a dual-port serial storage interface based on the SCSI protocol.
FC-AL supports full-duplex mode.
Fibre Channel provides a universal hardware transmission platform for upper-layer protocols
(SCSI and IP). It is a serial data transmission interface that features high speed, high reliability,
low latency, and high throughput.
37 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
HDD
SSD
5. Interface Module
38 Huawei Confidential
SSD Overview
Compared to HDDs, SSDs have absolute advantages in terms of performance, reliability,
power consumption, and portability. SSDs have been widely used in various industries.
SSD characteristics:
Uses NAND flash to save data, providing a faster speed than HDDs.
Has no mechanical structure inside, so it consumes less power, dissipates less heat, and
generates less noise.
Its service life is determined by the number of program/erase (P/E) cycles.
39 Huawei Confidential
SSD Architecture
An SSD consists of a control unit and a storage unit (mainly flash memory
chips).
Control unit: SSD controller, host interface, and DRAM
Storage unit: NAND flash
RAM
Flash Flash
SSD Controller ...
Pkg Pkg
Processor
Host Host NAND Flash Flash
interface flash Pkg Pkg ...
Interconnect logic Buffer interface
manager
40 Huawei Confidential
NAND Flash
Internal storage units in NAND flash Page 0 Page 0
Page 1 Page 1
include:
...
...
Page P Page P
LUNs, planes, blocks, pages, and cells Block 0 Block 1
Page 0 Page 0
Operations on the NAND flash include
Logical Unit 0
Page 1 Page 1
...
...
erase, program, and read. Page P Page P
Block 2 Block 3
NAND flash is a non-volatile medium. A
...
...
block must be erased before new data is Page 0 Page 0
Page 1 Page 1
written to it. A program/erase (P/E) cycle
...
...
Page P Page P
is the process of erasing a block and then Block B Block B+1
Page Register
writing it again. Page Register
Plane Plane
Address 0 Address 1
41 Huawei Confidential
SLC, MLC, TLC, and QLC
1111
111 1110
11 110 1101
1100
1 101 1011
10 100
1010
1001
1000
011 0111
01 010 0110
0101
0 001 0100
00 000
0011
0010
0001
0000
42 Huawei Confidential
Flash Chip Data Relationship
Plane Die
1478 blocks 2 planes
...
... ...
Page is the minimum read/write unit, and block is the minimum program/erase unit.
43 Huawei Confidential
Address Mapping Management
Logical block address (LBA) No. 26, XX Road, Binjiang District, Hangzhou City,
Zhejiang Province, People's Republic of China
Physical block address (PBA) 120º 12' east longitude, 30º 16' north latitude
44 Huawei Confidential
FTL
Sector
0
Sector
2
Sector 3 Main controller
FTL mapping table: saved in the Sector
1
internal SRAM/DRAM, external
Sector 2 DRAM, or NAND flash. Sector
4
Sector Sector
Sector 0 Sector 1 3 5
45 Huawei Confidential
Data Write Process on an SSD (1)
The following uses eight channels as an example to demonstrate how the host writes data to the
SSD.
Channel 0 block Channel 1 block Channel 2 block Channel 3 block
Writes 4 KB
of data
Writes 16 KB
of data
4 KB
SSD controller
46 Huawei Confidential
Data Write Process on an SSD (2)
When the SSD is full, old data must be deleted to release space for new data. When a user
deletes and writes data, data in some blocks becomes invalid or aged.
Channel 0 block Channel 1 block Channel 2 block Channel 3 block
SSD controller
47 Huawei Confidential
Data Read Process on an SSD
Reads 4 KB Channel 0 block Channel 1 block Channel 2 block Channel 3 block
of data
Reads 32 KB
of data 4 KB
SSD controller
48 Huawei Confidential
SSD Performance Advantages
SSD Performance Advantages Power consumption under 100,000 read IOPS
I/O I/O
IP/FC SAN
Seek time
Mechanical latency
2 SSDs 250 HDDs
Power (W)
4000
About 400-fold
2000
VS
HDD storage system SSD storage system SSD FC HDD
49 Huawei Confidential
Use of SSDs in Storage Systems
Class A applications: high-concurrency applications featuring random reads and writes, such as databases
Class B applications: large files, images, and streaming media featuring sequential reads and writes
Access frequency
A SSD media
FC/SAS disk
SATA/NL-SAS/Tape
C
Data distribution
50 Huawei Confidential
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
51 Huawei Confidential
GE Interface Modules
52 Huawei Confidential
SAS Expansion Module and RDMA Interface Module
53 Huawei Confidential
SmartIO Interface Module
54 Huawei Confidential
PCIe and 56 Gbit/s IB Interface Modules
55 Huawei Confidential
Fibre Channel and FCoE Interface Modules
Power Power
indicator/Hot indicator/Hot Handle
Handle swap button
swap button
16 Gbit/s Fibre
Channel port 10 Gbit/s
FCoE port
Link/Speed
indicator of
the port Link/Speed
indicator of a 10
Gbit/s FCoE port
56 Huawei Confidential
Quiz
1. What are the types of SSDs?
A. SLC
B. MLC
C. TLC
D. QLC
B. Rotation speed
57 Huawei Confidential
Summary
Controller
Expansion module
Expansion module
Intelligent storage components Device cables
HDD
Disk
SSD
Interface module
58 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
59 Huawei Confidential
Recommendations
60 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
This course introduces technologies of traditional RAID and RAID 2.0+. The
evolution of RAID technologies aims at data protection and performance
improvement.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. Traditional RAID
2. RAID 2.0+
3 Huawei Confidential
Background
Problems in traditional computer systems must be addressed.
Instructions
processed per
second
CPU > 1 million Disks become the system performance bottleneck.
4 Huawei Confidential
What Is RAID?
Redundant Array of Independent Disks (RAID) combines multiple physical disks into one
logical disk in different ways, for the purposes of read/write performance and data
security improvement.
Implementations: hardware RAID and software RAID.
How large is
a logical disk?
Logical disk
5 Huawei Confidential
Data Organization Forms
Disk striping: Space in each disk is divided into multiple strips of a specified size. Data is
also divided into blocks based on strip size when data is being written.
Strip: A strip consists of one or more consecutive sectors in a disk, and multiple strips
form a stripe.
Stripe: A stripe consists of strips of the same location or ID on multiple disks in the
same array.
D3 D4 D5 Stripe 1
D0 D1 D2 Stripe 0
Data strips in Data strips in Data strips in
a disk a disk a disk
6 Huawei Confidential
Data Protection Techniques
Mirroring: Data copies are stored on another redundant disk.
Exclusive or (XOR)
XOR is widely used in digital electronics and computer science.
XOR is a logical operation that outputs true only when inputs differ (one is true, the other is
false).
0 ⊕ 0 = 0, 0 ⊕ 1 = 1, 1 ⊕ 0 = 1, 1 ⊕ 1 = 0
1 1 0
0 1 1
0 0 0
7 Huawei Confidential
Common RAID Levels and Classification Criteria
RAID levels use different combinations of data organization forms and data
protection techniques.
8 Huawei Confidential
How Does RAID 0 Work
Write data to D 2, Read data from D 2,
D 3... D 3...
Write data to D 1. Read data from D 1.
D5 D 0, D 1, D 2, D 3, D 4, D 5
D4
D3
Physical disk 1 Physical disk 2
D2 D6
D4 D5 Stripe 2
D1
D2 D3 Stripe 1
D0
D0 D1 Stripe 0
9 Huawei Confidential
How Does RAID 1 Work
D1
D1 D1
Logical disk D0 D0
10 Huawei Confidential
How Does RAID 3 Work
Write data to C.
Write data to B.
Read data.
Write data to A.
C
A 0, A 1, A 2, B 0, B 1, B 2, C 0, C 1, C 2
A C0 C1 C2 P3
B0 B1 B2 P2
A0 A1 A2 P1
Logical disk
Note: A write penalty occurs when just a small amount of new data needs to be written to one or two disks.
11 Huawei Confidential
How Does RAID 5 Work
Write data.
Read data.
D5
D 0, D 1, D 2, D 3, D 4, D 5
D4
D3
D2
Physical disk 1 Physical disk 2 Physical disk 3
D1
P2 D4 D5
D0
D2 P1 D3
D0 D1 P0
Logical disk
12 Huawei Confidential
RAID 6
RAID 6
Requires at least N + 2 (N > 2) disks and provides extremely high data reliability and
availability.
Common RAID 6 technologies:
RAID 6 P+Q
RAID 6 DP
13 Huawei Confidential
How Does RAID 6 P+Q Work?
P and Q parity data is calculated. A maximum of two data blocks that are lost can be recovered
using P and Q parity data. Formulas for calculating P and Q parity data are as follows:
P = D 0 ⊕ D 1 ⊕ D 2...
Q = (α * D 0) ⊕ (β * D 1) ⊕ (γ * D 2)...
Physical disk 1 Physical disk 2 Physical disk 3 Physical disk 4 Physical disk 5
P1 Q1 D0 D1 D2 Stripe 0
D3 P2 Q2 D4 D5 Stripe 1
D6 D7 P3 Q3 D8 Stripe 2
D9 D 10 D 11 P4 Q4 Stripe 3
Q5 D 12 D 13 D 14 P5 Stripe 4
14 Huawei Confidential
How Does RAID 6 DP Work?
Double parity (DP) adds another disk in addition to the horizontal XOR parity disk used in RAID 4 to store
diagonal XOR parity data.
P0 to P3 in the horizontal parity disk represent the horizontal parity data for respective disks.
For example, P0 = D0 XOR D1 XOR D2 XOR D3
DP 0 to DP 3 in the diagonal parity disk represent the diagonal parity data for respective data disks and the
horizontal parity disk.
For example, DP 0 = D 0 XOR D 5 XOR D 10 XOR D 15
D8 D9 D 10 D 11 P2 DP 2 Stripe 2
D 12 D 13 D 14 D 15 P3 DP 3 Stripe 3
15 Huawei Confidential
How Does RAID 10 Work?
RAID 10 consists of nested RAID 1 + RAID 0 levels and allows disks to be mirrored
(RAID 1) and then striped (RAID 0). RAID 10 is also a widely used RAID level.
User data D 0, D 1, D 2, D 3, D 4, D 5
D4 D4 D5 D5
D2 D2 D3 D3
D0 D0 D1 D1
16 Huawei Confidential
How Does RAID 50 Work?
RAID 50 consists of nested RAID 5 + RAID 0 levels. RAID 0 is implemented after RAID 5
is implemented.
D 0, D 1, D 2, D 3, D 4, D 5, D 6, D 7...
D 0, D 1, D 4, D 5, D 8, D 9 D 2, D 3, D 6, D 7, D 10, D 11
P4 D8 D9 P5 D 10 D 11 Stripe 2
D4 P2 D5 D6 P3 D7 Stripe 1
D0 D1 P0 D2 D3 P1 Stripe 0
Physical Physical Physical Physical Physical Physical
disk 1 disk 2 disk 3 disk 4 disk 5 disk 6
RAID 5 RAID 5
RAID 0
17 Huawei Confidential
Contents
1. Traditional RAID
2. RAID 2.0+
18 Huawei Confidential
RAID Evolution
Hot
spare
19 Huawei Confidential
How Does RAID 2.0+ Work?
Extent
LUN Extent
Extent
Disk
Disk 0 Disk 1 Disk k Disk n
20 Huawei Confidential
Reconstruction
Traditional RAID (many-to-one) RAID 2.0+ (many-to-many)
01 02 03 51 52 53 CKG 0 (RAID 5)
HDD 0 HDD 5
HDD 0 04 05 06 HDD 5 54 55 56
Hot spare 07 08 09 57 58 59
HDD 1 14 15 16 HDD 6 64 65 66
17 18 19 67 68 69 CKG 1 (RAID 5)
HDD 2 HDD 7 21 22 23 71 72 73
HDD 2 24 25 26 HDD 7 74 75 76
27 28 29 77 78 79
HDD 3 HDD 8 31 32 33 81 82 83
HDD 3 34 35 36 HDD 8 84 85 86 CKG 2 (RAID 5)
37 38 39 87 88 89 52 13 63 74 85
HDD 4 HDD 9
41 42 43 91 92 93
Hot spare disk HDD 4 44 45 46 HDD 9 94 95 96 Unused CK
Hot spare
47 48 49 97 98 99 block space
21 Huawei Confidential
Logical Objects
Storage pool LUNs that can be
Chunk CKG Extent Volume
consisting of viewed on the host
physical disks
Tiered
Not tiered
A CKG is
divided into Not tiered
Multiple types of Space provided by each Chunks from spaces of a
Several extents
disks are added to disk is divided into fine- different disks smaller LUNs can be created quickly.
form one volume.
a storage pool. grained chunks. form a CKG. granularity.
22 Huawei Confidential
Disk Domain
A disk domain is a combination of disks (which can be all disks in the array). After the disks are
combined and reserved for hot spare capacity, it provides storage resources for the storage pool.
Tiers
High-performance tier
Performance tier
Disk domain #2
Capacity tier
23 Huawei Confidential
Storage Pool and Tier
A storage pool is a storage resource container. The storage resources used by application servers are all from
storage pools.
A storage tier is a collection of storage media providing the same performance level in a storage pool.
Different storage tiers manage storage media of different performance levels and provide storage space for
applications that have different performance requirements.
Storage Supported
Tier Type Application
Tier Disk Type RAID Level RAID Policy
High- Best for storage of data that is RAID 1 1D + 1D, 1D + 1D + 1D + 1D
Tier 0 performance SSD frequently accessed with high
tier performance and price. 2D + 2D or 4D + 4D, which is automatically
RAID 10
selected by a storage system.
Best for storage of data that is less
Performance frequently accessed with relatively RAID 3 2D + 1P, 4D + 1P, 8D + 1P
Tier 1 SAS
tier high performance and moderate RAID 5 2D + 1P, 4D + 1P, 8D + 1P
price.
(2D + 1P) x 2, (4D + 1P) x 2, or (8D + 1P) x
Best for storage of mass data that RAID 50
2
is infrequently accessed with low
Tier 2 Capacity tier NL-SAS RAID 6 2D + 2P, 4D + 2P, 8D + 2P, 16D + 2P
performance and price, and large
capacity per disk.
24 Huawei Confidential
Disk Group
A disk group (DG) is a set of disks of the same type in a disk domain. The disk
type can be SSD, SAS, or NL-SAS.
SSD
Disk type
SAS NL-SAS
25 Huawei Confidential
Logical Drive
A logical drive (LD) is a disk that is managed by a storage system and corresponds
to a physical disk.
LD 0 LD 1 LD 2 LD 3
26 Huawei Confidential
Chunk
A chunk (CK) is a disk space of a specified size allocated from a storage pool. It is
the basic unit of a RAID array.
Chunk Chunk
27 Huawei Confidential
Chunk Group
A chunk group (CKG) is a logical storage unit that consists of CKs from different
disks in the same DG based on the RAID algorithm. It is the minimum unit for
allocating resources from a disk domain to a storage pool.
CKG CKG
Disk Disk
CK
DG DG
28 Huawei Confidential
Extent
Each CKG is divided into logical storage spaces of a fixed and adjustable size called
extents. Extent is the minimum unit (granularity) for migration and statistics of
hot data. It is also the minimum unit for space application and release in a storage
pool.
LUN 0 (thick)
Extent
CKG
LUN 1 (thick)
29 Huawei Confidential
Grain
When a thin LUN is created, extents are divided into blocks of a fixed size, called
grains. A thin LUN allocates storage space by grains. Logical block addresses
(LBAs) in a grain are consecutive.
LUN (thin)
Extent Grain
CKG
30 Huawei Confidential
Volume and LUN
A volume is an internal management object in a storage system.
A LUN is a storage unit that can be directly mapped to a host for data reads and writes.
A LUN is the external embodiment of a volume.
Server
LUN
Volume Storage
31 Huawei Confidential
Contents
1. Traditional RAID
2. RAID 2.0+
32 Huawei Confidential
Huawei Dynamic RAID Algorithm
Common RAID algorithm Huawei dynamic RAID algorithm
When a block in a RAID array fails, recover the data in the faulty When a block in a RAID array fails, recover and migrate the data in
block, migrate all the data in the RAID array, and then shield the the faulty block, shield the faulty block, and reconstruct a new
RAID array. RAID array using remaining blocks.
Result: A large amount of available flash memory space is wasted. Benefit: The flash memory space is fully and effectively used.
4. Shield and obsolete the faulty RAID array, which wastes space. 4. Reconstruct a new RAID array using remaining blocks to store data.
ch 0 ch 1 ch n-1 ch n ch P ch 0 ch 1 ch n-1 ch n ch P
PBA 0 16 17 ...
… 100 60 P0 PBA 0 16 17 ... 100 60
60 PPm+2
0
1. A block in a RAID array fails.
1. A block in a RAID array fails.
PBA 1 101 160 … 10 11 P1 PBA 1 101 160 ... 10 11 P1
2. Create a new RAID array to store the data of the RAID array where a block fails. 2. Create a new RAID array to store the data in the faulty block.
33 Huawei Confidential
RAID-TP
RAID protection is essential to a storage system for consistent high reliability and performance. However, the
reliability of RAID protection is challenged by uncontrollable RAID array construction time due to drastic
increase in capacity.
RAID-TP achieves the optimal performance, reliability, and capacity utilization.
Traditional
RAID
34 Huawei Confidential
Quiz
2. Which RAID level would you recommend if a user focuses on reliability and
random write performance?
3. Is it true or false that data access will remain unaffected when any disk in a RAID
10 array fails?
35 Huawei Confidential
Summary
Dynamic RAID
Other RAID
technologies
RAID-TP
36 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
37 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
38 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. SCSI
3 Huawei Confidential
SCSI Protocol
Small Computer System Interface (SCSI) is a huge
protocol system evolved from SCSI-1 > SCSI-2 > SCSI device instruction set
(SBC/SSC)
SCSI-3.
The SCSI protocol defines a model and a necessary
instruction set for different devices to exchange SCSI system model
information by using the framework. (SAM/SPC)
4 Huawei Confidential
SCSI Evolution
SCSI-1
Launched within 1983 to
1985.
SCSI-1 Supports synchronous and
asynchronous modes. SCSI-2
Supports up to seven 8-bit
devices. Launched within 1988 to
Provides up to 5 Mbit/s speed. 1994.
Uses 50-pin cables that span Compatible with SCSI-1.
6 m at most. Supports 16-bit
SCSI-3
5 Huawei Confidential
SCSI Logical Topology
Initiator
Initiator 1 Initiator 2
SDS
Target
Target 1 Target 2 Target 3
LUN 0
LUN 2
LUN 5
LUN namespace Target device
6 Huawei Confidential
SCSI Initiator Model
Generally, the SCSI system of a host works in the initiator mode. The SCSI
architecture on Windows, Linux, AIX, Solaris, and BSD contains the architecture
layer (middle layer), device layer, and transport layer.
7 Huawei Confidential
SCSI Target Model
Based on the SCSI architecture, a target is divided into
three layers: port layer, middle layer, and device layer.
Port layer
The most important part is the middle layer, at which
LUN namespaces, link ports, target devices, tasks, task
sets, and sessions are managed and maintained based Middle layer
on SAM/SPC specifications.
Drivers at the port layer are dynamically loaded in the
Device layer
form of registration. Drivers at the device layer are also
dynamically loaded.
8 Huawei Confidential
SCSI Protocol and Storage System
The SCSI protocol is the basic protocol used for communication between hosts
and storage devices.
DAS uses the SCSI protocol to achieve interconnection between hosts and
storage devices.
SCSI bus
Control signal
SCSI array SCSI array
ID 0 ID 5
9 Huawei Confidential
SCSI Protocol Addressing
Bus
number Differentiates SCSI buses.
Logical
Differentiates sub-devices
unit
number in SCSI devices.
10 Huawei Confidential
Contents
1. SCSI
5. RDMA and IB
11 Huawei Confidential
Emergence of iSCSI
12 Huawei Confidential
iSCSI
SCSI block SCSI flow Other SCSI SCSI commands, responses, and data
instructions instructions instructions
13 Huawei Confidential
iSCSI Initiator and Target
Initiator iSCSI
The SCSI layer generates command descriptor blocks (CDBs) Initiator Target
Link Link
14 Huawei Confidential
iSCSI Architecture
iSCSI nodes encapsulate SCSI instructions and data into iSCSI packets and send the packets to the
TCP/IP layer, where the packets are encapsulated into IP packets to be transmitted over an IP
network.
iSCSI node iSCSI node
IP address IP address
of the of the iSCSI
network network Target
port port
iSCSI IP network
Initiator
IP address
IP address
of the
of the iSCSI
network
network Target
port
port
15 Huawei Confidential
Relationships Between iSCSI and SCSI, TCP and IP
Initiator Function Target
16 Huawei Confidential
FC in Storage
FC can be referred to as the FC protocol, FC network, or FC interconnection. As FC delivers high
performance, it is gradually used for front-end host access on point-to-point and switch-based
networks.
FC brings the following advantages to the storage network:
The scalability is improved.
The transmission distance is increased. Initiator
Host Initiator
Security problems are solved.
FC switch FC switch
17 Huawei Confidential
FC Protocol Structure
Upper-layer protocol
SCSI-3 IP ATM
18 Huawei Confidential
FC Topology
Point-to-point FC-AL FC switching network
19 Huawei Confidential
Seven Types of Ports for the FC Protocol
On an FC network, there are seven types of ports.
FL
Fabric device Fabric device
FC FC
terminal terminal
NL NL
Open ring device Open ring device
FC-AL device
L L L
FC FC FC
terminal terminal terminal
Private ring device Private ring device Private ring device
20 Huawei Confidential
FC Adapter
The FC host bus adapter (HBA) supports FC network applications and provides
high-bandwidth and high-performance storage network solutions.
21 Huawei Confidential
FCoE Protocol
The FCoE protocol is used to transmit FC signals over lossless enhanced
Ethernet infrastructure.
FCoE encapsulates FC data frames in Ethernet frames and allows service traffic
on a LAN and SAN to be transmitted over the same Ethernet.
Ethernet data link
layer frame
VoIP call
22 Huawei Confidential
Comparison Between FC and FCoE
FCoE: defines the mapping from FC to
IEEE 802.3 Ethernet, and uses the physical
FC-4 FC-4
layer and data link layer of the Ethernet
FC-3 FC levels
FC-3 (No changes)
and the network layer, service layer, and FC-2V FC-2V
protocol layer of FC. FC-2 FC-2M
FC_BB_E
FCoE entity Mapping
FC-2P
FCoE retains the protocol stack above FC-
FC-1 MAC IEEE
2 and replaces FC-0 and FC-1 with the FC-0 PHY
802.3
Layers
23 Huawei Confidential
Contents
1. SCSI
5. RDMA and IB
24 Huawei Confidential
Background of SAS
• The parallel bus has been developed to the peak and the bandwidth limit is
reached.
• Serial buses such as FC, IB, and the Ethernet have the following disadvantages for
storage applications:
- FC: It is expensive, and applicable to complex networking and long-distance
scenarios.
- IB: It is expensive, and the networking is complex.
- iSCSI: The latency is high, and the transmission rate is low.
25 Huawei Confidential
What is SAS
SAS is the serial standard of the SCSI bus protocol.
SAS uses the serial technology to achieve higher transmission rate and better scalability, and is
compatible with SATA disks.
SAS adopts the point-to-point architecture to achieve a transmission rate of up to 3 Gbit/s, 6
Gbit/s, 12 Gbit/s, or higher. The full-duplex mode is supported.
26 Huawei Confidential
SAS Protocol Layers
SCSI application layer ATA application layer Management application layer Application layer
SSP transport layer STP transport layer SMP transport layer Transmission layer
27 Huawei Confidential
Highlights of SAS
Provides the serial communication mode to allow multiple data channels to communicate with devices at full
speed.
Binds multiple narrow ports to form a wide port.
Uses expanders to expand interfaces, providing excellent scalability.
Expander
Works in full-duplex mode. Server
SAS Expander
RAID Expander
Controller Wide Expander
Link
Expander
SAS
Read data
RAID Expander
Controller Commands
28 Huawei Confidential
Scalability of SAS
SAS uses expanders to expand interfaces. One SAS domain supports a maximum
of 16,384 disk devices. 1
Expander
Expander
Expander
SASRAID
Expander
Controller
1
Expander
Expander
128
128
29 Huawei Confidential
Cable Connection Principles of SAS
Generally, a SAS cable has four channels, each of which supports 12 Gbit/s bandwidth.
SAS devices are connected in the form of a loop (also called a chain).
A cable supports 4 x 12 Gbit/s bandwidth, which limits the number of disks in the loop.
A maximum of 168 disks are supported in a loop. That is, a loop consists of a maximum
of seven disk enclosures with 24 disk slots each.
Mini SAS
30 Huawei Confidential
SATA
SATA is short for Serial ATA, which is a kind of computer bus used for data transmission between
the main board and storage devices (disks and CD-ROM drives).
Instead of simple PATA improvement, the bus structure is brand new.
A SATA bus uses embedded clock signals and has better error correction capability.
SATA has better anti-interference capability than PATA.
SATA, designed for entry-level applications, is not as powerful as SCSI in terms of big data throughput or
multi-thread transmission.
Serial
SAS SATA transmission
Serial
SCSI transmission PATA
31 Huawei Confidential
Contents
1. SCSI
5. RDMA and IB
32 Huawei Confidential
PCIe
PCIe is short for PCI Express, which is a high-performance and high-bandwidth serial
communication interconnection standard. It was first proposed by Intel and then
developed by the Peripheral Component Interconnect Special Interest Group (PCI-SIG)
to replace the bus-based communication architecture, such as PCI, PCI Extended (PCI-X),
and Accelerated Graphics Port (AGP).
33 Huawei Confidential
Why PCIe
34 Huawei Confidential
PCIe Protocol Structure
PCIe device layers include the physical layer, data link layer, transaction layer,
and application layer. PCIe Device
Physical layer AP
Logical sub-block
Physical
Electrical sub-block
Tx Rx
35 Huawei Confidential
NVMe
NVMe is short for Non-Volatile Memory Express.
The NVMe standard is oriented to PCIe SSDs. Direct connection of the native PCIe channel to the
CPU can avoid the latency caused by the communication between the external controller (PCH) of
the SATA and SAS interface and the CPU.
PCIe is an interface form and a bus standard, and NVMe is a standard interface protocol
customized for PCIe SSDs.
36 Huawei Confidential
NVMe Protocol Stack
App Reduced interaction: The number of
communication interactions is reduced from 4 to 2,
reducing the latency.
Block Layer
Controller SSD
1. Transfer command
Controller
SCSI
Initiator NVMe 2. Ready to transfer
SAS
3. Transfer data
SCSI
37 Huawei Confidential
Advantages and Application of NVMe
IOPS
Over Fabric
Fusion Server End-to-end 100GE
FC NVMe-oF
CloudEngine
100GE NVMe-oF
CE8800 End-to-end hardware Reduced by 50%
uninstallation Latency
NVMe-oF protocol
Huawei
OceanStor
FC NVMe-oF
Dorado
Reduced by 66%
TCO
End-to-end DIF
Data integrity protection
NVMe SSD
FC NVMe-oF
38 Huawei Confidential
Contents
1. SCSI
5. RDMA and IB
39 Huawei Confidential
RDMA
RDMA is short for Remote Direct
Memory Access, which is a method of
Traditional mode RDMA mode
transferring data in a buffer between
application software on two servers over APP Buffer App Buffer
a network.
OS
TCP/IP Buffer
Low latency OS TCP/IP
Driver Buffer
High throughput
Low CPU and OS resource occupancy Buffer
RDMA
Buffer
Adapter Adapter
40 Huawei Confidential
RDMA Bearer Network
Software RDMA application/ULP
RDMA API (Verbs)
UDP TCP
IB network layer IB network layer
IP IP
IB link layer Ethernet link layer Ethernet link layer Ethernet link layer
41 Huawei Confidential
IB
Overview:
The IB technology is specifically designed for server connections, and is widely used for
communication between servers (for example, replication and distributed working), between a
server and a storage device (for example, SAN and DAS), and between a server and a network
(for example, LAN, WAN, and the Internet).
Highlights:
Standard-protocol-based
High bandwidth and low latency
RDMA
Transmission uninstallation
42 Huawei Confidential
IB Architecture
IB defines a series of devices for system communication, including channel
adapters, switches, and routers.
FCP
TCA
Host interconnect
Host
CPU HCA Switch Router
controller
43 Huawei Confidential
IB in Storage
Converged storage
Distributed storage
Server
Initiator
Back-end IB Back-end IB
switch switch Switch cascading
FCoE FC TOE 10GE IB
Back-end network
Target
Front-end IB Client
Disk Front-end IB
switch switch
44 Huawei Confidential
IB Layers
Application layer
45 Huawei Confidential
IB Interface
There are two types of channel adapters (CAs):
Host channel adapter (HCA), for example, Mellanox
Target channel adapter (TCA), an I/O interface used for IB switches and storage
systems
IB connectors:
CA 10 Gb/s to 40 Gb/s
46 Huawei Confidential
Contents
1. SCSI
5. RDMA
47 Huawei Confidential
CIFS Protocol
In 1996, Microsoft renamed SMB to CIFS and added many new functions. Now,
CIFS includes SMB1, SMB2, and SMB3.0.
CIFS uses the C/S mode and basic network protocols including TCP/IP and
IPX/SPX.
Redefined
48 Huawei Confidential
NFS Protocol
NFS is short for Network File System. The network file sharing protocol is
defined by the IETF and widely used in the Linux/Unix environment.
NFS works based on the client/server architecture. The servers provide the
clients with access to shared file systems. NFS enables clients using different
operating systems to share files over a network.
49 Huawei Confidential
NDMP Protocol
NDMP protocol is designed for the data
backup system of NAS devices. It enables NAS
2-way
devices to directly send data to the connected
networking Production Production Backup
system A system N server disk devices or the backup servers on the
network for backup, without any backup
NAS storage
system Tape library client agent required.
There are two networking modes for NDMP
2-way
3-way 3-way
networking Production Production Backup
system A system N server
NAS storage FC
system A Ethernet
50 Huawei Confidential
Quiz
1. Which networks are included in FC topologies?
A. Arbitrated loop network
B. Point-to-point network
C. Switching network
D. Dual-switching network
B. PCIe 2.0
C. PCIe 3.0
D. PCIe 4.0
51 Huawei Confidential
Quiz
3. Which of the following are file sharing protocols?
A. HTTP protocol
B. iSCSI protocol
C. NFS protocol
D. CIFS protocol
B. NFSv2
C. NFSv3
D. NFSv4
52 Huawei Confidential
Quiz
B. Security authentication
D. File operation
E. Disconnection
53 Huawei Confidential
Summary
SCSI
54 Huawei Confidential
More Information
Enterprise Huawei
technical enterprise
support App business App
55 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
56 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
With the development of cloud computing and big data, the storage
architecture changes from scattered to centralized, and gradually evolves
to network-based, virtualized, and massive cloud storage. Storage not only
needs to provide routine services such as data management, data
replication, snapshot, mirroring, and migration, but also needs to enable
functions such as data disaster recovery, data consistency, virtualized
convergence, elastic computing, and resource expansion. These services and
functions depend on a good storage system architecture.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
3 Huawei Confidential
Storage System Architecture Evolution
4 Huawei Confidential
Single-controller Storage
SCSI interface
Logical disks are presented to hosts as LUNs.
SCSI
Terminator
controller
Controller
OS
5 Huawei Confidential
Dual-controller Storage
Services are running on Services are running on
only one controller. both controllers.
Active-Standby Active-Active
6 Huawei Confidential
Mid-range Storage Architecture Evolution
Fixed storage Dual-controller Flexible hardware Flexible software
system active-active component function
configuration redundancy configuration configuration
configuration
Limited Fibre Channel The single-controller Fast Ethernet (FE) Unified storage that
interfaces are and dual-controller interface module are supports both SAN
provided, and the active-passive supported, greatly and NAS protocols has
flexibility is poor. architecture gradually improving flexibility become a hotspot.
Capacity expansion evolve to the active- and scalability. Users can flexibly
can be implemented active architecture. The number of ports configure multi-
only by cascading disk can be selected as protocol services as
enclosures. required. required.
7 Huawei Confidential
Multi-controller Storage
Disk Disk
enclosures enclosures
8 Huawei Confidential
Mission-Critical Storage Architecture Evolution
Bus Hi-Star Direct-connection Virtual matrix
architecture architecture architecture architecture
9 Huawei Confidential
Storage Software Technology Evolution
Improved data Simplified data Improved space Optimized service
reliability management utilization performance
10 Huawei Confidential
Distributed Storage Technology Evolution
Automatic metadata extension
Giga+ indexing
Hadoop FS
Universal hardware Universal hardware Metadata separation Public cloud storage
Customized hardware Software-defined Software-defined Metadata extension
Scale-up Scale-up Scale-out EC Coding
Integrated Parallel cluster file Huawei
GoogleFS Azure Storage
box system OceanStor 100D
General purpose Scientific computing Analysis scenario Facebook
Facebook F4
Haystack
Social scenario Warm storage
MooseFS NoSQL
Small files
11 Huawei Confidential
Distributed Storage Architecture
iSCSI S3/Swift client
VBS
initiator
HDFS client
CM CM CM
Server node Server node Server node Server node Server node Server node Server node Server node Server node
Note: Huawei OceanStor 100D is used as an example to describe the distributed storage architecture.
12 Huawei Confidential
Contents
13 Huawei Confidential
Scale-up and Scale-out
With the continued development of enterprise information systems and the ever-increasing expansion in the
scale of services, service data keeps increasing. The initial configuration of storage systems is often not
enough to meet these demands. Storage system capacity expansion has become the major concern of system
administrators. There are two capacity expansion methods: scale-up and scale-out. The following uses Huawei
storage products as an example to describe the two methods.
Storage
Devices (enclosures and disks) Storage controllers
controllers
Storage Storage
controllers controllers
Scale-up architecture
Scale-out architecture
14 Huawei Confidential
SAS Disk Enclosure Scale-up Networking Principles
Adding a 2 U SAS disk enclosure to
an existing loop
Controller
enclosure
2 U SAS disk
enclosure 0
2 U SAS disk
enclosure 1
15 Huawei Confidential
Smart Disk Enclosure Scale-up Networking Principles
Adding a 2 U smart disk enclosure
to an existing loop
Controller
enclosure
Smart disk
enclosure 0
Smart disk
enclosure 1
16 Huawei Confidential
PCIe Scale-out and IP Scale-out
PCIe scale-out runs on the PCIe protocol while IP scale-out works based on the IP protocol.
Mid-range storage
Medium Functions and prices
enterprises balanced
IP scale-out
Entry-level storage
Small enterprises Price first
IP scale-out
17 Huawei Confidential
Scale-out Technologies Used by Huawei Storage Systems
OceanStor OS
XNET
iWARP
UDP
IB
PCIE DRV transport TCP
IP
PCIe IB ETH
18 Huawei Confidential
Scale-out Networking
Connects to the user's management network
Controller enclosure
0 (original)
Controller enclosure
1 (new)
19 Huawei Confidential
Local Write Process
1 2
SAN
1
LUN 2 PCIe switched network
4
20 Huawei Confidential
Non-local Write Process
1 4
SAN
1 4
LUN
2 PCIe switched network
3
6
21 Huawei Confidential
Local Read Process
1 2
SAN
2
LUN PCIe switched network
5
8
Engine 0 Engine 1 Engine 2 Engine 3
3 4 6 7
22 Huawei Confidential
Non-local Read Process
1 4
SAN
1 4
10
Engine 0 Engine 1 Engine 2 Engine 3
5 6 8 9
23 Huawei Confidential
Contents
24 Huawei Confidential
Hardware Architecture with Two Controllers
Interface .. Interface Interface Interface
.. Service subsystem
module A0 . module A7 module B7 module B0
.
PCIe 3.0 x8 PCIe 3.0 x8
Management
Management Management subsystem
interface module A interface module B
12 V
12 V
Power Power Electromechanical
BBU 0 BBU 1 BBU 2 BBU 3
supply 0 supply 1 subsystem
Service channel
Manage channel
Power supply
25 Huawei Confidential
Hardware Architecture with Multiple Controllers
Interface ... Interface Interface ... Interface
module A0 module A5 module B5 PCIe 3.0 x8 module B0
PCIe 3.0 x8
... ...
Interface Interface Interface Interface
module A0 module A5 module B5 module B0
PCIe 3.0 x8 PCIe 3.0 x8
Management
Management Management
subsystem
interface module A interface module B
12 V
12 V
Electromechanical
Power Power Power Power
BBU 0 BBU 1 BBU 2 BBU 3 subsystem
supply 0 supply 1 supply 2 supply 3
26 Huawei Confidential
Full-mesh Architecture
Host I/O
Network adapter Network adapter
Fully-shared FIMs
Each front-end interconnect I/O module (FIM)
connects to all four controllers through PCIe ports
in a controller enclosure. This module can
FIM FIM FIM FIM simultaneously access the four controllers with
multi-channel technology in active-active mode.
27 Huawei Confidential
Fully Interconnected Disk Enclosures
Controller Controller
enclosure 0 enclosure 1
2 U smart disk
enclosure 0
2 U smart disk
enclosure 1
28 Huawei Confidential
E2E Global Resource Sharing
Host
SAN
Distributed based
on hash results DHT
Global cache
... ...
29 Huawei Confidential
Switchover in Seconds: Mission-Critical Storage with FIMs
Host
Hi1822
User mode
OS kernel mode
30 Huawei Confidential
Global Cache
Write latency
LUN 0 LUN 1 LUN 2 95 μs
4 KB 4 KB ... 8 KB 4 KB 4 KB ... 8 KB 4 KB 4 KB ... 8 KB
50 μs
write
RDMA
AddrN1 AddrN2 AddrN3
31 Huawei Confidential
Global Pool
A A1 A2 A3
LUN B B1
C C1 C2
D D1 D2
LUN mapping
and FP mapping
Strip A B C D P Q
Strip A1 B1 C1 D1 P Q
Strip A2 A3 C2 D2 P Q
...
32 Huawei Confidential
Back-End Sharing
Engine 0 Engine 1 • A single port is connected via a single
13 0 13 connection in the external system.
• A single port is connected to four
A A controllers in the internal system.
0 13 0 13
B B
100 Gbit/s 100 Gbit/s • Dual physical links, balanced and
100 Gbit/s redundant
100 Gbit/s
A 0 1 2 3
B 0 1 2 3
A B C D
x4 x4 x4 • A single port on the controller
x4 cascades two disk enclosures in a
loop.
• A single expansion module supports
A 0 1 2 3
dual links, achieving load balancing
1822
B 0 1 2 3 and redundancy.
33 Huawei Confidential
Active-Active Architecture with Full Load Balancing
34 Huawei Confidential
Cache Mirroring Technology
The function is as follows:
Controller enclosure 1 Controller enclosure 2
35 Huawei Confidential
Key Reliability Technology
The function is as follows:
Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D
36 Huawei Confidential
Host Service Switchover upon Failure of a Single
Controller
Host Host
Automatic
switchover
Backplane Backplane
37 Huawei Confidential
Quiz
2. (Short Answer Question) What are the differences between scale-up and scale-
out?
38 Huawei Confidential
Summary
Storage Architecture
Evolution
Storage System
Scale-up and Scale-out
Storage System Expansion Methods
Architecture
39 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
40 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
41 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
With the development of host, disk, and network technologies, the storage
system architecture evolves, and the storage network architecture also
develops to meet service requirements. This lesson introduces the storage
network architecture.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
3 Huawei Confidential
DAS
Server Server
CPU CPU
RAM
RAM
Disk
Disk
SCSI card
RAID SCSI card
Controller
JBOD
4 Huawei Confidential
Challenges for DAS
Challenges Description
Limited distance.
Inconvenient
The system needs to be powered off during maintenance.
Maintenance
5 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed architecture
6 Huawei Confidential
NAS
Network-attached storage (NAS) connects storage devices to the
live network and provides data and file services.
The most commonly used network sharing protocols for NAS are
Common Internet File System (CIFS) and Network File System Benefits:
(NFS). Improved efficiency
OS: Windows Improved flexibility
Centralized storage
Simplified management
OS: Linux High scalability
High availability
Security (user
Switch NAS device authentication and
OS: MAC OS
authorization)
7 Huawei Confidential
General-Purpose Server and NAS Devices
File system
Application
OS
Printer driver
Network
File system
OS
Network Uni-functional
NAS device
General-purpose server
(Windows or UNIX)
8 Huawei Confidential
NAS Protocols
Enterprise Enterprise
office office • NFS
• CIFS
IP IP IP IP
• FTP
Linux Windows
• HTTP
IP IP IP IP
• NDMP
NFS CIFS
FS
CACHE
POOL
9 Huawei Confidential
Working Principles of NFS
POR TMAP
Client Server Port mapping
1. RPC request
table
Request
RPC
Registration
NFS share
information
10 Huawei Confidential
Typical Application of NFS: Shared Storage for Cloud
Computing
Cloud computing uses the NFS server as the internal shared storage.
Converged storage
NFS client
External IP network
network Cloud computing server
NFS server
Cloud computing server
11 Huawei Confidential
Working Principles of CIFS
Client Server
SMB NEGOTIATE Request
Protocol Protocol
SMB NEGOTIATE Response negotiation handshake
12 Huawei Confidential
Typical Application of CIFS: File Sharing Service
The file sharing service applies to scenarios such as enterprise file servers and
Enterprise office
media assets.
IP Windows IP IP Management
Performance Service Share User
IP IP IP monitoring management management management
NAS service
LAN
DNS
Authentication flow
AD server Management flow
Data flow
13 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
IP SAN Technologies
▫ FC SAN Technologies
4. Distributed Architecture
14 Huawei Confidential
NIC + Initiator Software
NIC
Internal bus
Storage device Ethernet
15 Huawei Confidential
TOE NIC + Initiator Software
The initiator software
implements the
functions of the iSCSI
layer, which consumes
host resources.
The TOE NIC implements
TCP/IP conversion, which
TOE NIC does not consume host
resources.
TCP/IP-based IP SAN
Ethernet connection
Internal bus
Storage device Ethernet
16 Huawei Confidential
iSCSI HBA
TCP/IP-based IP SAN
Ethernet connection
Internal bus
17 Huawei Confidential
Logical Port
Logical ports are created based on bond ports, VLAN ports, or Ethernet ports. The logical ports
are virtual ports that carry host services.
A unique IP address is allocated to each logical port for carrying its services.
No. Description
Logical port
Indicates that multiple Ethernet ports are 4
1
bonded to form a bond port.
One to One to
5
Indicates that an Ethernet port is added many many
2
to multiple VLANs.
Indicates that a bond port is added to One to
3
One to
3 Bond port VLAN
multiple VLANs. many many
Indicates that a bond port is used to
4
create multiple logical ports.
Many to One to
2
Indicates that a VLAN port is used to one many 6
5
create multiple logical ports. 1
18 Huawei Confidential
VLAN Configuration
VLAN is a technology that logically divides a physical LAN into multiple broadcast
domains.
Ethernet ports or bond ports in a storage system can be added to multiple independent
VLANs. You can configure different services in different VLANs to ensure the security
and reliability of service data.
Ethernet port
Bond port
P0 P1 P2 P3 Storage device
Adding ports to VLANs
19 Huawei Confidential
IP Address Failover
IP address failover indicates that a logical IP address fails over from a faulty port to an available
port. In this way, services are switched from the faulty port to the available port without
interruption. The faulty port can take over services back after being recovered.
During the IP address failover, services are switched from the faulty port to the available port,
ensuring service continuity and improving reliability of paths for accessing file systems. This
process is transparent to users.
The essence is a service switchover between ports. The ports can be Ethernet ports, bond ports, or
VLAN ports.
20 Huawei Confidential
Ethernet Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can create logical ports based on
Ethernet ports.
When the Ethernet port that corresponds to a logical port fails, the system will:
21 Huawei Confidential
Bond Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can bond multiple Ethernet ports to
form a bond port.
When the Ethernet ports that are used to create the bond port fails, the system will:
can take over services again. Ethernet port B Ethernet port B Ethernet port D
Bond Port A Bond Port A Bond Port A
22 Huawei Confidential
VLAN-based IP Address Failover
You can create VLANs to isolate different services.
When an Ethernet port on a VLAN fails, the system will:
23 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
FC SAN Technologies
4. Distributed Architecture
24 Huawei Confidential
FC HBA
Fibre Channel
FC SAN
protocol-based
Internal bus
25 Huawei Confidential
FC Network
26 Huawei Confidential
Zoning
Server 1 Server 2
Storage 1 Storage 2
27 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
▫ FC SAN Technologies
Comparison Between IP SAN and FC SAN
4. Distributed Architecture
28 Huawei Confidential
IP SAN and FC SAN
iSCSI
FC FC
IP
SCSI
IP
FC FC
iSCSI
29 Huawei Confidential
Comparison Between IP SAN and FC SAN
Item IP SAN FC SAN
Dedicated Fibre Channel networks and
Network architecture Existing IP networks
HBAs
Transmission Limited by the maximum transmission
Not limited theoretically
distance distance of optical fibers
Management and Complicated technologies and
As simple as operating IP devices
maintenance management
Compatibility Compatible with all IP network devices Poor compatibility
High purchase (Fibre Channel switches,
Lower purchase and maintenance costs HBAs, Fibre Channel disk arrays, and so
Cost than FC SAN, higher return on on) and maintenance (staff training,
investment (ROI) system configuration and supervision,
and so on) costs
Disaster recovery Local and remote DR available based High hardware and software costs for
(DR) on existing networks at a low cost DR
Security Relatively low Relatively high
30 Huawei Confidential
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
31 Huawei Confidential
Distributed Storage Networking
Node 1
Frontend service
network
Node 2
Node 3
Management
network
Node 4
Node 5
Backend storage network
32 Huawei Confidential
Networking Overview
Frontend service/Tenant network
The front-end service/tenant network is used to interconnect the distributed storage with the customer network. It
provides the tenant UI for tenant users to complete operations such as resource application and usage query, and
processes service requests sent by tenant clients or APIs.
Management network
The management network is used to interconnect with the customer's maintenance network. It provides a management
UI for the system administrator to perform service operations such as system configuration, tenant management,
resource management, and service provisioning, as well as maintenance operations such as alarm, performance, and
topology management. In addition, the Mgmt ports of all physical nodes can be aggregated to provide remote device
maintenance capabilities, such as remotely logging in to the virtual KVM of a device and viewing hardware running data
such as temperature and voltage.
33 Huawei Confidential
Network Planes
Management Management
Private client node Standard protocol node
access mode FSM access mode FSM
OSD OSD
Third-place Third-place
DR site quorum DR site quorum Management plane:
server server Storage plane:
Replication plane:
Arbitration plane:
Service plane:
34 Huawei Confidential
Networking Rules
Nodes must be placed in a cabinet from bottom to top.
A deployment solution is usually chosen based on project requirements. The
total power consumption and weight of the storage nodes, switches, and KVM
in a cabinet must be calculated and the number of nodes that can be housed by
a cabinet must be determined based on the equipment room conditions.
In typical configuration, nodes and switches in the base cabinet are connected
through network cables and SFP+ cables, and nodes in an expansion cabinet
connect to switches in the base cabinet through network cables and optical
fibers.
35 Huawei Confidential
Quiz
1. Which of the following are included in distributed storage networking?
A. Management network
B. iSCSI
C. CIFS
D. NFS
36 Huawei Confidential
Summary
DAS
NAS IP SAN
Storage network
architecture evolution
SAN FC SAN
Comparison between
Distributed architecture
IP SAN and FC SAN
37 Huawei Confidential
More Information
38 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
39 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
Upon completion of this course, you will be able to know the following about
Huawei intelligent storage products:
Features
Positioning
Typical application scenarios
2 Huawei Confidential
Contents
1. All-Flash Storage
3. Distributed Storage
3 Huawei Confidential
All-Flash Product Display
Huawei OceanStor
Huawei OceanStor
Dorado 18000 V6
Huawei OceanStor Dorado 8000 V6
Huawei OceanStor Dorado 6000 V6
Huawei OceanStor Dorado 5000 V6
Dorado 3000 V6
Huawei OceanStor
Huawei OceanStor
Dorado 18000 V3
Huawei OceanStor Dorado 6000 V3
Dorado 5000 V3
Huawei OceanStor
Dorado 3000 V3
4 Huawei Confidential
Features
Intelligent AI chips+FlashLink
5 Huawei Confidential
Device Model Examples
Note: Huawei OceanStor Dorado series is used as an example. Power indicator/Power button
6 Huawei Confidential
Storage System Components
Power Module
Controller
System Subrack
Disk Module
7 Huawei Confidential
Software Architecture
Pool
SmartQoS SmartThin SmartMigration SmartVirtualization Three-copy mode
SCSI
8 Huawei Confidential
Intelligent Chips
FLASHLINK ® intelligent algorithm
Controller with0
five chips
0
00
0 0
1 1 Reconstruction
1 010 Multi-core
1
00
1101
0 scheduling X00 minutes/TB
001 0 1X minutes/TB
1 1 1 00 1 Restart 1 2 3 4 5
0
0
0 1 10
0 1 count
1 010 1 Kunpeng chip + service
1
1
1
0 101enclosure
Smart0disk0 0
0
Kunpeng chip + multi-core
splitting
AI chip + cache algorithm
1 1010 1 algorithm Improved read hit ratio
Faster reconstruction
1
0 01
0 0101 0
0
1 1010 1
10 1 10
0101 0
0 1 1 10 1
0 Metadata Data read
0 01
1 0 0 01 0
1 New data Data write
0 1 1 11 1
00 0
Advanced feature
1 10
1 1 SSD1
11 1
GC migration Disk reconstruction
1 data
11 1 Garbage collection
0 11
Multi-stream data Global I/O priority
1 Full-stripe write
Reduced write amplification
partitioning adjustment
Reduced garbage collection Constant low latency
9 Huawei Confidential
Typical Application Scenario – Mission-Critical Service
Acceleration
Data center
SAN
Data Data
Data analysis
extraction consolidation
...
Huawei OceanStor
Dorado
10 Huawei Confidential
Contents
1. All-Flash Storage
3. Distributed Storage
11 Huawei Confidential
Hybrid Flash Storage Series
Huawei OceanStor 18810F V5
Huawei OceanStor
Huawei OceanStor 5610/5810 V5
5100/5210F V5 Huawei OceanStor 18800 V5
12 Huawei Confidential
Hybrid Flash Storage
Enterprise-class hybrid flash storage products
provide stable, reliable, converged, and
efficient data services.
13 Huawei Confidential
Device Model Examples
Storage device (2 U) For example, Huawei Storage device (2 U) For example, Huawei OceanStor
OceanStor hybrid flash storage 5110 V5 hybrid flash storage 5600/5800 V5 Kunpeng
Storage device (2 U) For example, Huawei Storage device (4 U), for example, Huawei OceanStor
OceanStor hybrid flash storage 5300 V5 Kunpeng hybrid flash storage 6800/18800 V5 Kunpeng
14 Huawei Confidential
Convergence of SAN and NAS Storage
LUN
Extent
iSCSI/FC/FCOE NFS/CIFS/FTP/HTTP
Block Service File Service Tier0: SSD Tier1: SAS Tier2: NL-SAS
ROOT
File
Convergence of SAN and NAS resources of Tier0: SSD Tier1: SAS and NL-SAS
Huawei OceanStor hybrid flash series
Intelligent tiering of SAN and NAS cold/hot data
15 Huawei Confidential
Support for Multiple Service Scenarios
Cloud Finance
computing
Carrier
Social
intercourse
Energy
Big data
Government
Enterprise
Backup
and DR
16 Huawei Confidential
Application Scenario – Active-Active Data Centers
Database service
Virtualization
service
File service
...
Switch Switch
Active-active
17 Huawei Confidential
Contents
1. All-Flash Storage
3. Distributed Storage
18 Huawei Confidential
Distributed Storage
19 Huawei Confidential
Product Highlights
Object service
File service
Block service HDFS service
20 Huawei Confidential
Hardware Node Examples
• Virtualization
Performance scenario
node • Cloud computing
For example: OceanStor 100D P100 and P110
scenario
All-flash
node • Database scenario
For example: OceanStor 100D F100 and F110
21 Huawei Confidential
Hardware Node Examples
P36A C36A
TaiShan 5280 V2
TaiShan 5280 V2
P12A S12A
TaiShan 2280 V2 TaiShan 2280 V2
22 Huawei Confidential
Software System Architecture
Service Layer
Hardware x86/Kunpeng
Note: Huawei OceanStor 100D is used as an example.
23 Huawei Confidential
Application Scenario – Cloud Resource Pool
Traditional compute-storage convergence
Storage-compute separation
Compute node
24 Huawei Confidential
Contents
1. All-Flash Storage
3. Distributed Storage
25 Huawei Confidential
Edge Data Storage (FusionCube)
FusionCube:
It is an edge data storage
infrastructure based on the
converged architecture. It is FusionCube 1000:
mainly used in hybrid load It is an edge IT infrastructure
scenarios, such as databases, solution with integrated
desktop clouds, containers, design and is delivered as
and virtualization. integrated cabinet. The
The Kunpeng ecosystem is solution is mainly used in
supported to flexibly meet edge data centers and edge
the elastic configuration application scenarios of
requirements of computing, vertical industries.
storage, and I/O resources Huawei FusionCube The Kunpeng ecosystem is
and meet the requirements supported. Pre-cabling and
of multiple types of pre-configuration can be
application load modes with completed in advance based
an IT infrastructure at the on the customer's plan, and
edge. the solution is delivered as
integrated cabinet to
implement quick deployment.
26 Huawei Confidential
Hardware Model Examples
27 Huawei Confidential
Introduction to Intelligent Management
System device Virtual resource
management management
28 Huawei Confidential
Storage System
Node 1 Node 2 Node N
VM VM VM VM VM VM
...
29 Huawei Confidential
Software Architecture
Office Application VDI BI CRM&ERP Email Web Application
Service
Database
software
Linux OS Operating
Hyper-convergence
Unified system
management Backup software
Distributed storage system
One-click
Asynchronous
capacity EC Active-active QoS
replication
expansion
Multiple
Thin Linked Distributed
Snapshot resource
provisioning clone cache
pools
Hyper-convergence
Unified installation DR
Huawei server hardware
30 Huawei Confidential
Application Scenario – Edge Data Center Service Scenario
FusionCube
Installer
Hardware
installation in an
edge data center
Edge data
center
Compute
+ module
Network
Site
module
management +
Service provisioning
Real-time Storage
Edge data center module
monitoring
Data backup HQ data center
+
Intelligent UPS
O&M
Modular
design and
Edge data center all-in-one
cabinet
31 Huawei Confidential
Quiz
1. (Single-answer question) Which of the following statement about Huawei OceanStor all-
flash storage is false?
A. Supports SSDs and NVMe disks.
B. Supports SAS disks.
C. Supports HDDs.
D. Supports palm-sized SSDs.
32 Huawei Confidential
Quiz
2. (Multi-answer question) Which of the following storage services are supported by Huawei
distributed storage (such as Huawei OceanStor 100D)?
A. Block storage
B. File storage
C. Object storage
D. HDFS storage
E. Linked storage
33 Huawei Confidential
Summary
All-flash storage
34 Huawei Confidential
More Information
35 Huawei Confidential
Recommendations
36 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
On completion of this course, you will be able to understand the service features,
implementation principles, and application scenarios of the following features:
SmartThin
SmartTier
SmartQoS
SmartDedupe
SmartCompression
SmartMigration
2 Huawei Confidential
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
3 Huawei Confidential
Overview
The traditional deployment of a storage system has the following problems:
Adverse impact or even interruption on services when expanding the storage space
Uneven storage space utilization
Low storage efficiency
SmartThin can allocate the storage space on demand to improve storage
resource utilization and fully meet service requirements.
4 Huawei Confidential
Working Principle of SmartThin
Logical virtual Actual physical
Servers
space space
DB
Data
RAID
server
Disk
DB
Data
RAID
server
Space Disk
DB
Data
server RAID
Disk
DB
Data
server RAID
5 Huawei Confidential
SmartThin Read Process
1. A thin LUN receives a read 2. Queries the mapping table between
request from a host. the thin LUN and the storage pool.
3. Confirms that the space is allocated by the storage pool and returns the data
read from the corresponding area in the storage pool to the host.
Data
2 1 D 3
1 2 D D D
3 D
1 1 3 5 2
0000 4
2 4 6 5 D
3
Thin LUN 6 Storage pool
Mapping
1. The thin LUN receives a read request from the host. table
2. Queries the mapping table between the thin LUN and the storage pool.
3. Confirms that the space is not allocated by the pool and returns all zeros to the host.
6 Huawei Confidential
SmartThin Write Process
2. Queries the mapping table between
1. A thin LUN receives a write
the thin LUN and the storage pool.
request from a host.
3. Confirms that the space is allocated by the pool and performs the write process on the
corresponding area in the storage pool. If the write request asks for releasing space, the
space is released.
Data
Data
2 1 D 3
1 2 D D
1 1 5 2
3 3
3
4
2 4 6 5
1. A thin LUN receives a write
request from the host. Storage pool
Thin LUN 6
2. Queries the mapping table between
the thin LUN and the storage pool. Mapping table
3. If the space is not allocated by the pool, the storage system allocates the space first. And then performs write process
on the corresponding area in the storage pool. If the write request asks for releasing space, a message is returned to the
host.
7 Huawei Confidential
Application Scenarios
SmartThin can help core system services that require high service continuity, such as
bank transaction systems, expand system capacity online without interrupting ongoing
services.
SmartThin can assist with on-demand physical space allocation for services where the
growth of application system data is hard to be accurately evaluated, such as email
services and web disk services, preventing a space waste.
SmartThin can assist with physical space contention for mixed services that have diverse
storage requirements, such as carriers' services, to achieve optimized space
configuration.
8 Huawei Confidential
Configuration Process
Import a SmartThin
Delete a thin LUN.
license.
9 Huawei Confidential
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
10 Huawei Confidential
Overview
The random distribution of hot and cold data fails to fully utilize disk characteristics of different
media. SmartTier automatically matches different active data with storage media of different
characteristics. For example, cold data is stored on NL-SAS disks, and hot data is stored on SSDs.
In this way, data flows vertically, improving storage system performance and reducing costs.
High-performance tier
SSDs
Performance tier
SAS disks
Most active data
11 Huawei Confidential
Dividing Storage Tiers
In the same storage pool, a storage tier is a collection of storage media with the same
performance. Each storage tier respectively uses the same type of disks and RAID policy.
12 Huawei Confidential
Three Phases for Implementing SmartTier
The storage system undergoes three phases of I/O monitoring, data placement
analysis, and data relocation to implement SmartTier.
13 Huawei Confidential
SmartTier Key Technologies
Migration Monitoring
Initial capacity Data
policy statistics
allocation migration
formulation analysis
14 Huawei Confidential
Application Scenarios
15 Huawei Confidential
Configuration Process
Storage system-level configuration includes the
Start
configuration of data migration speed, which is applied
to all storage pools in a storage system.
Check the license. Storage pool-level configurations include configurations
of data migration granularity, RAID policy, data
migration plan, enabling I/O monitoring, and forecast
Configure SmartTier parameters based
on the storage system level. analysis. The mentioned configurations are applied to a
single storage pool.
End
16 Huawei Confidential
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
17 Huawei Confidential
Overview
18 Huawei Confidential
I/O Priority Scheduling
High Middle Low High Middle Low
FIFO 7
8 4
7 1
9 8
6
5 6
4 2
3 9
2 5
1 3
19 Huawei Confidential
I/O Traffic Control
Application server 1 Application server 2
I/O I/O
1 request 1 request
20 Huawei Confidential
Application Scenario
User Type Service Quality
Requirements
Subscriber A (gold High
subscriber) The limited bandwidth is less
Subscriber B (silver Low Subscriber A
than or equal to 100 MB/s,
subscriber) gold
which ensures robust
subscriber
resources.
• SmartQoS traffic control policy A: limits the service
bandwidth of subscriber A (for example, ≤ 100 MB/s) to
ensure the service performance of subscriber A without
Subscriber B
The limited bandwidth is less
silver
affecting the service performance of the whole storage than or equal to 30 MB/s.
subscriber
system.
• SmartQoS traffic control policy B: limits the service
bandwidth of subscriber B (for example, ≤ 30 MB/s). The
bandwidth of subscriber B is less than that of subscribe A to
reserve robust system resources for other users.
21 Huawei Confidential
Configuration Process
Start
22 Huawei Confidential
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
23 Huawei Confidential
Overview
SmartDedupe eliminates redundant data from a storage system and reduces the
physical storage capacity for storing data to meet the increasing needs for
storage capacity.
Dorado V6 storage systems support online deduplication and post-process
similarity deduplication.
Online deduplication: Data is deduplicated before being written to disks.
Post-processing similarity deduplication: Data is written to disks in advance and then
read and deduplicated when the system is idle.
24 Huawei Confidential
Working Principle of Online Deduplication
Data to be deduplicated
25 Huawei Confidential
Working Principle of Post-processing Similarity
Deduplication
Data to be deduplicated
Differentially
Writes data. +1
compresses.
26 Huawei Confidential
Application Scenarios of SmartDedupe
Virtual Desktop Infrastructure (VDI) is a common application scenario of
deduplication.
In VDI applications, users create multiple virtual images on a storage device.
These images have a large amount of duplicate data. As the amount of
duplicate data increases, the storage system space fails to meet service running
requirements. SmartDedupe can delete duplicate data between images to
release storage resources and store more service data.
27 Huawei Confidential
Configuration Process
Start
1. Checking the
availability of Check the license.
SmartDedupe
2. Enabling
SmartDedupe for Enable SmartDedupe.
LUNs
End
28 Huawei Confidential
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
29 Huawei Confidential
Overview
SmartCompression reorganizes data to save storage space and improves the
data transfer, processing, and storage efficiency under the precondition that no
data is lost. The storage system supports online compression, that is, only newly
written data is compressed.
The storage systems of the Dorado V6 storage systems support online
compression and post-compression, both of which are lossless compression.
Online compression: Data is compressed before being written to disks.
Post-compression: Data is written to disks in advance and then read and compressed
when the system is idle.
30 Huawei Confidential
Working Principle of SmartCompression
Compression window
Data to be
... ... abcdefg abc hj abchj
compressed
(LZ77 example)
31 Huawei Confidential
Application Scenarios of SmartCompression
Engineering
and
File
Databases Seismic
Services
Geological
Data
32 Huawei Confidential
Scenarios Where SmartDedupe and SmartCompression
Are Used Together
The deduplication and compression technologies can be used at the same time
to achieve the optimal space saving effect.
Application scenarios:
VDI and VSI scenarios
Less
Longer
storage Less cost
Data tests or development systems space
SSD life
33 Huawei Confidential
Configuration Process
Start
1. Checking the
availability of Check the license.
SmartCompression
2. Enabling
SmartCompression Enable SmartCompression.
for LUNs
End
34 Huawei Confidential
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
35 Huawei Confidential
Overview
SmartMigration is a key service migration technology. Services on a source LUN
can be completely migrated to a target LUN without interrupting host services.
The target LUN can totally replace the source LUN to carry services after the
replication is complete.
What does
"completely" mean?
36 Huawei Confidential
Working Principle of SmartMigration
SmartMigration is leveraged to adjust service performance or upgrade storage
systems by migrating services between LUNs.
SmartMigration is implemented in two phases:
37 Huawei Confidential
SmartMigration Service Data Synchronization
After creating a SmartMigration task, create the pair relationship between a source LUN
and a target LUN.
Service data synchronization between the source and target LUNs involves initial
synchronization and change synchronization.
A B C Host
D E F 1 5
G H I DCL Log
A B C A B C 2
4
Storage
D E F Copy all data. D E F
4 LM
G H I G H I
2 2
3 3
Source LUN Target LUN
Source Target
LUN LUN
Initial synchronization
Change synchronization
38 Huawei Confidential
SmartMigration LUN Information Exchange
LUN information exchange is used for mappings between LUNs and data volumes,
namely, the exchange between both data volume IDs when the IDs of source LUNs and
target LUNs remain unchanged.
Source Target
The host reads the ID LUN LUN
of the source LUN.
39 Huawei Confidential
SmartMigration Pair Splitting
Splitting is performed on a single pair. The splitting process includes stopping service
data synchronization between the source LUN and target LUN in a pair to exchange
LUN information, and removing the data migration relationship after the exchange.
1. Information
exchange
2. Pair splitting
40 Huawei Confidential
Configuration Process
Start
End
41 Huawei Confidential
Summary
SmartThin
SmartTier
SmartQoS
Storage resource tuning Definitions, working
principles, and
technology and application configuration processes
SmartDedupe
SmartCompression
SmartMigration
42 Huawei Confidential
Quiz
1. (True or false) SmartTier cannot be enabled for a storage pool whose member disks are of the same
type. ( )
2. (Multiple-choice) Which of the following migration policies can be set for LUNs? ( )
A. Automatic migration
D. No migration
43 Huawei Confidential
Quiz
3. (Single-answer question) Which status must a pair be before consistency splitting during
LUN
migration? ( )
A. Migrating
B. Stop
C. Normal
D. Migrated
44 Huawei Confidential
More Information
Enterprise Huawei
technical enterprise
support app business app
45 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Documentation Tool Center
Information Query Assistant
46 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Objectives
2 Huawei Confidential
Contents
1. HyperSnap
2. HyperClone
3. HyperReplication
4. HyperMetro
3 Huawei Confidential
Overview
4 Huawei Confidential
Working Principles of HyperSnap
Definition: A snapshot is a consistent copy of the source data at a certain point in time. After the snapshot is
generated, it can be read by hosts and used as a data backup at a certain point in time.
Main features
Instant generation: A storage system can generate a snapshot within a few seconds to obtain the consistent copy of
source data.
Small storage space occupation: A snapshot is not a full physical data copy, which does not occupy large storage space.
Therefore, a snapshot for a large amount of source data occupies only a small space.
a b c a b c
d e f d e f
8:00 AM
g h i g h i
j k l j k l
a b c a b c
d m f d e f 9:00 PM
g h n g h i
j k l j k l
5 Huawei Confidential
HyperSnap Principles – Zero Performance Loss
Data requested to be written to L2 of
the source LUN is written to P5. Data requested to be Data requested to be written
Data requested to be written to L2 of written to L0 of snapshot to L2 of snapshot 2 is written
the source LUN is again written to P7. 1 is written to P6. to P8. Data requested to be written to
L2 of the source LUN is written
LUN Mapping Table Snap Mapping Table to a new space P5. The original
Snap Mapping Table
space P2 is referenced by the
snapshot.
Data requested to be written to
L0 of snapshot 1 is written to the
new space P6, bringing no
additional read and write
overhead.
When data is written to L2 of the
source LUN again, the requested
L3->P3 L4->P4 L2->P5 L2->P7 L2->P8
L0->P6 L0->P0 L1->P1 L2->P2 data is written to a new space
P7. The original space P5 is
released because it is not
A B C D E F G H I referenced by a snapshot.
A new snapshot 2 is created and
P0 P1 P2 P3 P4 P5 P6 P7 P8 activated.
SSD storage space
6 Huawei Confidential
HyperSnap Principles – Rollback
Data 10:00 AM Data 11:00 AM Virus Infection Data 11:00 AM
Restore
10 11 12 TIME
7 Huawei Confidential
HyperSnap Principles – Snapshot Cascading and Cross-
Level Rollback
Source
Snapshot cascading: It is a child
volume
snapshot of a parent snapshot. The
difference between snapshot duplicates
and snapshot cascading is that the
latter includes the data of its parent
8:00 9:00
snapshot. Other functions are the same
snapshot0 snapshot1
as common snapshots.
10:00 11:00
Snapshot1.snapshot0 Snapshot1.snapshot1
Cross-level rollback: Snapshots sharing
the same source volume can roll back
each other regardless of their cascading
levels.
8 Huawei Confidential
Key Technologies of HyperSnap-Duplicate
8:00
9 Huawei Confidential
Key Technologies of HyperSnap - Rollback Before Write
Source
volume Snapshot
Snapshot
rollback During the rollback, when a
8:00 host writes data to a source
LUN, the snapshot copies the
data blocks to the source LUN,
and then the host continues to
write data.
When no host reads or writes
data, the snapshot data is
rolled back to the source
volume in sequence.
10 Huawei Confidential
Application Scenario
Source Snapshot
LUN LUN
Source
LUN
Snapshot
Duplicate Duplicate Duplicate Duplicate
LUN
1:00
2:00
4:00 3:00
11 Huawei Confidential
Configuration Process
Required
Start
Optional
1. Checking the
Check the license
availability of the
snapshot function file.
End
12 Huawei Confidential
Contents
1. HyperSnap
2. HyperClone
3. HyperReplication
4. HyperMetro
13 Huawei Confidential
Overview
Definition
HyperClone creates a full data copy (a target LUN) of a source LUN at a specified
point in time (synchronization start time).
Features
A target LUN can be read and written during synchronization.
Full synchronization and incremental synchronization are supported.
Forward synchronization and reverse synchronization are supported.
Consistency groups are supported.
14 Huawei Confidential
Working Principles of HyperClone
Definition: Clone is a consistent data copy of a source data at a specific point in time. It functions as a
complete data copy after data synchronization. It serves as a data backup and is accessible to hosts.
Main features:
Quick clone generation: A storage system can generate a clone within several seconds to obtain a consistency copy of a
source data. The generated clone can be read and written immediately. Users can configure different deduplication and
compression attributes for the generated clone.
Online splitting: A split can be performed to cancel the association between a source LUN and a clone LUN without
interrupting services. The split read and write operation on the clone LUN will not affect the I/O process of the source
LUN.
Create Synchronize
HyperClone. HyperClone.
a b c a b c a b c
d e f d e f d e f
g h i g h i g h i
j k l j k l j k l
15 Huawei Confidential
HyperClone Principles - Synchronization
Scenario 1: Initial Scenario 2: Synchronization is
synchronization and full performed again after the first
copy are performed. synchronization, and differential
copy is performed.
a
b a a b Stored data
b
2 3
Snapshot c
1 2 a b c Newly copied data
Snapshot
1 c New data written to the host
a a
b b a a Internal signal flow of the
b b storage system
Source Target
LUN LUN c c
HyperClone pair
1 Create a HyperClone pair. Source Target
LUN LUN
2 Create a snapshot for the source
LUN after synchronization is 1 Create a snapshot for the source LUN
started. after a second synchronization.
3 Copy all data a and b to the target 2 Copy incremental data c to the target
LUN.
LUN.
16 Huawei Confidential
HyperClone Principles - Reverse Synchronization
Scenario 1: Full copy Scenario 2: Differential copy a b c Stored data
HyperClone pair
a a a a
b b b b
c c c c
d d d d
Source Target Source Target
LUN LUN LUN LUN
1 Create a snapshot for the target LUN after 1 Create a snapshot for the target LUN after
the reverse synchronization is started. the reverse synchronization is started.
2 Copy all data a, b, c, and d to 2 Copy incremental data d to the source LUN.
the source LUN.
17 Huawei Confidential
HyperSnap Principles - Restrictions on Feature Configuration
Feature Restriction
A source LUN of HyperSnap can be used as a source LUN of HyperClone, but a LUN of HyperSnap
HyperSnap
cannot be used as a target LUN of HyperClone.
HyperMetro A member LUN of HyperMetro can be used as a source or a target LUN of HyperClone.
Primary and secondary LUNs of HyperReplication can be used as a source or a target LUN of
HyperReplication
HyperClone.
SmartMigration A source or a target LUN of HyperClone cannot be used as the source or target LUN of SmartMigration.
HyperCDP A source LUN of HyperCDP can be used as a source or a target LUN of HyperClone.
18 Huawei Confidential
Application Scenarios - Data Backup and Restoration
Source
Target LUN
LUN
Time
point A a Create HyperCopy.
Time
point C a Data on the source LUN is lost.
Time
Reversely synchronize data on the target LUN
point D a a to the source LUN. In this case, the source
LUN is restored to the status at time point B.
19 Huawei Confidential
Application Scenarios - Data Analysis and Reproduction
Data analysis
Source Data analysis The data analysis service uses data on a
LUN host
target LUN to prevent the data analysis
service and production service from
Reproducing n contending for resources of a source LUN
pieces of data Only for data
analysis and affecting performance.
Data reproduction
Target Target LUN Target LUN HyperClone can create multiple copies of the
LUN (1) (n-1) (n) same source LUN for multiple target LUNs.
20 Huawei Confidential
Configuration Process
Start
Create a protection
group.
Create a clone pair.
Create a clone
consistency group.
End
21 Huawei Confidential
Contents
1. HyperSnap
2. HyperClone
3. HyperReplication
4. HyperMetro
22 Huawei Confidential
Overview
As a core technology for DR and backup, HyperReplication can realize the
remote data backup and disaster recovery.
To recover service data using backup data in the This function prevents damage caused
Remote backup and
remote storage system after the service data is by data loss in the case that data at
recovery
invalid. the primary site becomes unavailable.
To quickly switch service data from the primary This function prevents damage caused
Continuous service
site to the secondary site to protect service by a service interruption upon a failure
support
continuity when a disaster occurs. at the primary site.
23 Huawei Confidential
Introduction to DR and Backup
When the HyperReplication feature is used, two data centers work in active/standby mode. The primary site is in
the service running status, and the DR center is in the non-service running status.
For active/standby DR, when a device in data center A is faulty or even the entire data center A is faulty, services
are automatically switched to data center B.
For backup, data center B backs up only data in data center A and does not carry services when data center A is
faulty.
24 Huawei Confidential
HyperReplication Concepts
Question: What are HyperReplication pairs, consistency groups, synchronization,
splitting, primary/secondary switchover, data status, and writable secondary LUNs?
To implement remote backup and recovery of service data, HyperReplication involves
the following phases: creating a HyperReplication relationship, data synchronization,
service switchover, and data recovery. What do these phases mean?
25 Huawei Confidential
Phases for Realizing Remote Backup and Recovery of
Service Data
1. Create a HyperReplication pair. 2. Synchronize data.
Primary LUN Secondary LUN Primary LUN Secondary LUN
HyperReplication HyperReplication
Link Link
WAN WAN
Pair Pair
Pair Pair
26 Huawei Confidential
Running Status of a Pair
By viewing the running status of a pair, you can perform synchronization, splitting, and primary/secondary
switchover operations on HyperReplication in time. After performing an operation, you can view the running
status of the pair to check whether the operation is successful.
Running
Description
Status
Normal Indicates that data synchronization between the primary and secondary LUNs is complete.
Indicates that data replication between the primary and secondary LUNs is suspended. For the need of services, a pair of primary
Splitting
and secondary LUNs is manually split. As a result, the running status of the pair changes to the splitting status.
Indicates that if the pair relationship between the primary and secondary LUNs is interrupted because the link used by
Interrupted
HyperReplication is down or the primary or secondary LUN of HyperReplication is faulty. The pair running status is interrupted.
Indicates that if HyperReplication requires to be restored using a manual policy after the fault caused by a pair interruption is
To be recovered rectified, the pair running status changes to the to-be-recovered status. This status indicates that users need to manually
synchronize data between the original primary LUN and the secondary LUN to restore the pair.
Indicates that if the original attributes of a primary or secondary LUN change when a pair is interrupted (for example, when the
Invalid HyperReplication link is down, the pair is deleted on the primary or secondary end), the pair running status changes to the
invalid status because the primary and secondary system configurations become inconsistent.
When the primary LUN is synchronizing data to the secondary LUN, the secondary LUN cannot be read or written. If a disaster
Synchronizing occurs, data on the secondary LUN cannot be used for service recovery. When the secondary LUN is in the complete status, data
on the secondary LUN can be used for service recovery.
27 Huawei Confidential
Principles of Asynchronous Remote Replication
Based on the known
Host
asynchronous remote
1 2 DCL
replication, try to draw a 3 6
RM
schematic diagram of
1 2
synchronous remote 5
Primary Secondary
replication. LUN Cache
Primary 5 Secondary
LUN LUN
4 4
Snapshot of the HyperReplication Link Snapshot of the
primary LUN secondary LUN
7 WAN 7
DCL
Secondary Storage System
Primary Storage System
28 Huawei Confidential
HyperReplication Service Switchover
Production Host Production host Standby host
Standby Host
√
Services
Read/Write taken
over by
Primary Disconnected Secondary the 3. Service taken over by the secondary site
LUN Link LUN standby
host
WAN
Primary storage Secondary storage
29 Huawei Confidential
HyperReplication Data Recovery
Production host Standby host Production host Standby host
√
Data
recovered
Services
run by the
Secondary Primary standby
Link Secondary New Primary
LUN LUN host.
Recovery LUN Link LUN
WAN WAN
Primary storage Secondary storage Primary storage Secondary storage
1. Disaster recovery at the primary site. 2. Data recovery at the primary site
30 Huawei Confidential
Functions of a Consistency Group
Primary LUN 01 CG 01 Secondary LUN 01 Primary LUN 01 CG 01
Secondary LUN 01
HyperReplication
HyperReplication Task 01
Task 01
Primary LUN 02 Secondary LUN 02 Primary LUN 02 Secondary LUN 02
HyperReplication
HyperReplication Task 02
Task 02
Primary LUN 03 Secondary LUN 03 Primary LUN 03 Secondary LUN 03
HyperReplication
HyperReplication Task 03
Task 03
1. Create a consistency group. 2. Stop replication tasks for the consistency group.
HyperReplication
Task 01
Primary LUN 02 Secondary LUN 02
32 Huawei Confidential
Typical Application Scenarios
Analysis Item Central DR and Backup Geo-redundancy
Maximum distance
Asynchronous remote replication: no restriction Asynchronous remote replication: no restriction
for DR and backup
33 Huawei Confidential
Central DR and Backup Scenario
Central DR and backup refer to backing up service data from different places to the same site for centralized
management. Service data at multiple service sites is centrally backed up to and managed at the central DR
and backup site. When a disaster occurs, the central DR and backup site can take over services from the
service site and recover data.
Secondary
Primary LUN 02 HyperReplication 02 LUN 02
WAN
Host
Service site 02 Asynchronous
......
......
......
Secondary
Primary LUN n HyperReplication n LUN n
WAN
34 Huawei Confidential
Realizing DR Used with BCManager eReplication
BCManager eReplication is a DR management software specially designed for Huawei typical DR solutions. It
provides a visualized and process-based platform for simple and fast operations and monitoring based on
data consistency, HyperSnap, and HyperReplication technologies.
Primary site DR center
BCManager BCManager
Production host eReplication
eReplication
Server Agent
BCManager
eReplication
Agent
Standby host
BCManager
eReplication
Host
HyperReplication
35 Huawei Confidential
Configuration Process
Start
Required
Check the license.
Optional
Manage a route.
Create a HyperReplication
pair. Create a remote replication
consistency group.
End
36 Huawei Confidential
Contents
1. HyperSnap
2. HyperClone
3. HyperReplication
4. HyperMetro
37 Huawei Confidential
Overview
HyperMetro is also called active-active feature. Two data centers are backups
for each other in the running status.
If a device is faulty in a data center or even the entire center is faulty, the other
data center will automatically take over services, solving the problems of
traditional DR centers in switchover. This ensures high data reliability and
service continuity, and improves the resource utilization of the storage system.
38 Huawei Confidential
Working Principles of HyperMetro
Data center A Data center B
How to perform
arbitration when
Oracle RAC cluster/VMware a fault occurs?
vSphere cluster/
FusionSphere cluster
......
WAN
FC/IP SAN SAN SAN
FC/IP
IP network IP network
Quorum device
39 Huawei Confidential
Quorum Mode
If the link between two data centers is down or one data center is faulty, data
cannot be synchronized between the two data centers in real time. In this case,
only a HyperMetro pair or a site of HyperMetro consistency group can continue
providing services. For data consistency, HyperMetro adopts an arbitration
mechanism to determine service priority in data centers.
HyperMetro provides two quorum modes:
Static priority mode: applied to scenarios where no quorum server is configured.
Quorum server mode (recommended): applied to scenarios where a quorum server
is configured.
40 Huawei Confidential
Static Priority Mode
Fault Type Result
A HyperMetro pair is in the to-be-synchronized status.
A link between storage
LUNs in data center A continue providing services while LUNs in
systems is down.
data center B stop providing services.
A HyperMetro pair is in the to-be-synchronized status.
Host Data center B is faulty. LUNs in data center A continue providing services while LUNs in
data center B stop providing services.
A HyperMetro pair is in the to-be-synchronized status.
Data center A is faulty. LUNs in data center A cannot be accessed and LUNs in data center
B stop providing services.
A HyperMetro replication
A HyperMetro pair is in the to-be-synchronized status.
HyperMetro link is down and a link
LUNs in data center A continue providing services while LUNs in
between a host and data
data center B stop providing services.
center B is down.
Data center B is faulty
A HyperMetro pair is in the to-be-synchronized status.
and the link between the
Data center A Data center B host and data center B is
LUNs in data center A continue providing services while LUNs in
data center B stop providing services.
down.
Links between the host
A HyperMetro pair is in the normal status.
and data centers A and B
A host fails to access LUNs in both data center A and B.
are concurrently down.
41 Huawei Confidential
Quorum Server Mode
42 Huawei Confidential
Dual-Write Principle
Host
Write I/O
1 5
Cross-site active-active cluster
Array A Array B
2 HyperMetro LUN
4
4 3 3
44 Huawei Confidential
Strong Data Consistency
Array A Array B
45 Huawei Confidential
Solution Extensibility Design
Disaster recovery solution HyperMetro data center solution
Site A Site B Site A
Upgraded Site B
architecture and
uninterrupted
services
Synchronous/
asynchronous HyperMetro
replication
Geo-redundant solution
Data Data Data center C
center A center B
46 Huawei Confidential
Typical Application Scenarios
Industry Feature
With the development of hospital services, the growing numbers of beds and new outpatient buildings pose
higher requirements on service continuity.
Once critical departments such as out-patient, in-patient, and electronic medical record (EMR) are interrupted,
Healthcare medical treatment will be delayed and hospitals will suffer from great economic loss and inestimable damage to
their reputation. In addition, an out-patient building is close to an in-patient network information center in the
same hospital, and two hospitals in the same city are physically close to each other. HyperMetro can meet their
requirements.
In the finance industry, banking services, 24-hour ATM services, POS services, and e-bank services are developing
quickly as bank services develop. These services require that banking systems process around-the-clock services.
Finance For reliability and stability, banks require a solution to store for reused and meet their service construction
requirements (RPO = 0, RTO = 0) to ensure business continuity. Service interruptions damage banks' reputation
and pose huge pressure on technical departments.
In the social security industry, service continuity requirements are high. Monthly settlement and year-end carry-
over require 24/7 online operation. Otherwise, people's livelihood problems may occur. For example, pension
Social cannot be paid in time, and medical insurance cannot be settled in time.
security HyperMetro is applicable to social insurance application scenarios including the basic information management,
social insurance card service, labor relationship, public services, public resource management, employment, and
social insurance management.
47 Huawei Confidential
Configuration Process
Start
Required
Prepare the configuration. Optional
End
48 Huawei Confidential
Summary
HyperSnap
HyperClone
Storage Data Protection Definitions, principles,
Technologies and and configuration
Applications processes
HyperReplication
HyperMetro
49 Huawei Confidential
Quiz
1. (True or false) A source LUN can form multiple HyperClone pairs with different target
LUNs. A target LUN can be added to only one HyperClone pair.
50 Huawei Confidential
Quiz
C. If one member in a consistency group is faulty, all members in the consistency group
are unavailable.
51 Huawei Confidential
More Information
Enterprise Huawei
technical enterprise
support app business app
52 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
53 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
This course introduces storage backup solutions for data centers, including:
Overview
Architecture
Network
Common technologies
Typical applications
2 Huawei Confidential
Objectives
After completing this course, you will be able to understand and master:
Technologies of storage backup solutions for data centers
Technical differences between backup and disaster recovery solutions
Deployment of a backup solution
3 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
4 Huawei Confidential
Why Is Backup Important?
Legal requirements on data protection Risks of data loss
Software Viruses
Human and and Natural
errors hardware hacker disasters
failures attacks
Gartner: More than 30% of users use backup copies for development and testing,
and more than 20% of users adopt cloud-based disaster recovery.
5 Huawei Confidential
What Is Backup?
In information technology and data management, a backup refers to a copy of data in
a file system or database for swiftly and promptly recovering the valid data and normal
operation of the system when a disaster or misoperation occurs.
Application server
6 Huawei Confidential
Why Is Backup Irreplaceable?
: Supported
×: Not supported
7 Huawei Confidential
Backup and DR
Backup vs. DR
Backup: DR:
Recovers missing data. Recovers data from a recent
Recovers damaged data. point in time.
: Supported
Recovers historical data. Directly takes over services.
X Recovers missing data.
×: Not supported
X Directly takes over services.
X Recovers damaged data.
8 Huawei Confidential
Backup and Archive
Backup: Archive:
Recovers data and system. Retains data for a long term.
Meets the SLA (RPO and RTO). Meets legal requirements and
Retains source data at the efficiency requirements. : Supported
original location. Only retains data copies and ×: Not supported
Provides data retention control. deletes source data.
Provides object retention control.
9 Huawei Confidential
Considerations
Effective data recovery must be guaranteed. Requirements
Objective: data recovery Backup success rate
Off-site protection
2. Availability of recovered data
3. Fast recovery
Backup mode
Backup granularity
5. Recovery from a specified point in time
Data retention period
10 Huawei Confidential
Challenges to Data Backup
A complex application
Challenges
Security threats
11 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
12 Huawei Confidential
Components
...
Application server Backup management system
Backup media
Production
storage
A client agent of backup software Backup data flows from the backup client to Devices that store backup data.
must be installed on service hosts the backup server over the backup network. Tape library, VTL, disk array, CD-ROM
that need to be backed up. TCP or IP network or Fibre Channel network tower, and cloud storage
13 Huawei Confidential
Three Key Elements
Backup Window (BW)
Backup period for the backup system within a working period
A backup task A backup Data can be A fault or A recovery task starts. A recovery task ends. Recover
starts. task ends. recovered from disaster occurs. applications.
any point in time
during this period.
14 Huawei Confidential
Backup Solutions
All-in-one backup
Hybrid cloud backup
Enterprise branch and SMB local backup
HUAWEI CLOUD
Backup node
Replication with
deduplication
Backup node
15 Huawei Confidential
All-In-One Backup Solution
Item Description
16 Huawei Confidential
Centralized Backup Solution
Center
Backup
management
node (Backup software)
...
A A A A
IP network
Production server Backup service
Fibre Channel node
or IP
17 Huawei Confidential
Cloud Backup Solution
18 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
19 Huawei Confidential
LAN-Base
LAN
Agent Agent
20 Huawei Confidential
LAN-Free
LAN
SAN
21 Huawei Confidential
Server-Free
LAN
SAN
Backup storage device
Data flow
Storage device Storage device
Command flow
22 Huawei Confidential
Server-Less (NDMP)
LAN
Tapes
Storage device
Data flow
Command flow
23 Huawei Confidential
Architecture Comparison
Architecture Strength Weakness
Additional backup servers increase hardware costs.
Backup agents adversely affect the performance of application servers.
The backup system and the application
Backup data is transmitted over the LAN, which adversely affects network
system are separated, conserving
LAN-Base hardware resources of application
performance.
Backup services must be separately maintained, complicating management and
servers during backup.
maintenance operations.
Users must be quite competent in processing services.
24 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
25 Huawei Confidential
Common Backup Types
Full backup Cumulative incremental backup Differential incremental backup
Sun. Sun. Sun.
All data is fully backed up. Full backup is performed once Full backup is performed once
Easy management a week. a week.
In the rest of the week, the In the rest of the week, the
difference with the last full difference with the last backup
backup is backed up every day. is backed up every day.
* The definitions of incremental backup may vary with the backup software.
26 Huawei Confidential
Backup Policies
Files, operating systems, databases,
Data to be backed up software, logs...
27 Huawei Confidential
Deduplication
3. Maps data blocks to the fingerprint library.
1. Reads fingerprint data.
Fingerprint pool
Memory-level File-level Global Task-level
Production server
Task-level deduplication: Backup tasks for different types of File-level deduplication: One fingerprint is created for each file,
applications use independent fingerprint databases. eliminating the need for data slicing.
Highlights: high fingerprint query efficiency and low memory usage Highlights: higher deduplication ratio
28 Huawei Confidential
Source-Side Deduplication
Huawei Data Protection Appliance supports deduplication. That is, data is deduplicated
before being transferred to the storage media, greatly improving backup performance.
1. Calculates the
fingerprints of data blocks.
2. Queries fingerprints in
the fingerprint library.
Deduplication
fingerprint library
3. Transfers data blocks
without deduplication.
Data
Protection
Appliance
Backup storage pool
29 Huawei Confidential
Parallel Deduplication
Parallel deduplication:
30 Huawei Confidential
Snapshot Backup
Production LUN/volume
Recovers copies.
Storage array
Mount/Index
Retains copies.
31 Huawei Confidential
Standard Backup
File systems
Windows, Linux, and UNIX Permanent
NeoKylin, Kylin, and Huawei Euler incremental Huawei Data Disk
backup
Protection Appliance
Volumes Parallel
deduplication Tape
Windows and Linux
Source-side
Databases deduplication
Operating systems Oracle: RMAN (Recovery
Compression Cloud
Windows, Red Hat, and SUSE Manager)
Encryption
SQL Server: Virtual Device
Interface (VDI) Multi-channel
backup
Virtualization platforms
DB2: Vendor
Blu-ray optical disc
MySQL: MySQL Plugin Agent-free
VMware, H3C CAS, XenServer, backup
GBase: GBase API
Hyper-V, Informix, Dameng, Concurrent
FusionCompute, and Huawei Object storage
Kingbase, and Shentong: backup
HCS
export and import
32 Huawei Confidential
Continuous Backup
Continuous backup:
33 Huawei Confidential
Advanced Backup
Oracle Snapshot
Fast recovery
copy 1 Copy 1
Development and
Oracle RAC Snapshot
copy 1 Copy 2 testing
Data mount
Snapshot and recovery Application data
SQL Server copy 1 Copy 3 extraction
in minutes
Snapshot
Snapshot ...
VMware Permanent Base volume copy 1
incremental Copy n Recovery to the
Snapshot
backup
Windows NTFS file system copy 1 same host
Clone volume
Recovery
Recovery to
another host
The system periodically creates a snapshot
Users can access and use
copy of any point in time for the base
Users can obtain application- virtual copies on demand or
volume and deletes a snapshot when a copy
consistent production data copies instantly and benefit from
expires.
in native format. diverse data services.
35 Huawei Confidential
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
36 Huawei Confidential
Database
Databases, such as GaussDB, Oracle, SQL Server, MySQL, DB2, and GBase, are supported.
* The preceding figure uses the Oracle database as an example.
37 Huawei Confidential
Virtualization Platform
Virtualization platforms, such as VMware, FusionCompute, HCS, CAS, OpenStack, XenServer and Hyper-V, are
supported.
38 Huawei Confidential
File System
39 Huawei Confidential
Operating System
Windows
Linux
40 Huawei Confidential
Quiz
1. (Multiple) Which are not common backup types?
A. Full backup
B. Incremental backup
C. Extension backup
D. Elastic backup
B. LAN-Free
C. Server-Free
D. Server-Base
41 Huawei Confidential
Section Summary
Overview
Architecture
Common
technologies
Applications
42 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
43 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
44 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
2 Huawei Confidential
Objectives
3 Huawei Confidential
Contents
1. DR Solution Overview
2. DR Solution Architecture
3. Common DR Technologies
4. DR Application Cases
4 Huawei Confidential
DR Requirements
Three risks: data loss, data damage, and service interruption. The loss caused by service
interruption per hour is millions of dollars.
Regulatory compliance: financial compliance, security isolation, geo-redundant solution, and high
service continuity
IT O&M: System disaster recovery simplifies IT O&M work and avoids the impact of major events.
Enterprise: Avoid major Enterprise: Comply with IT: Simplify O&M and
losses and reduce policies and regulations, avoid the impact of
enterprise risks. and meet industry emergencies.
regulatory requirements.
5 Huawei Confidential
DR Challenges
Cumbersome
Costly investment Limited DR capability
management
High capital expenditure Multiple devices are not Poor security and DR
(CAPEX) centrally managed. capabilities
High purchase costs of Independent storage media, Data cannot be backed up out
infrastructure such as servers, servers, and network of the data center, and
storage devices, and software management pages, complex infrastructure faults may cause
High basic construction costs workflows, and low efficiency extreme situations.
on facilities such as equipment Complicated capacity Poor agility
rooms. expansion Capabilities such as disaster
High OPEX The capacity is insufficient and recovery and data sharing are
Professional O&M support needs to be expanded. The restricted by physical locations
(implementation, training, and rollout period is long. of data. Applications and data
onsite support) cannot be separated. Agile
Long-term costs on resources applications and better DR
such as water and electricity. features cannot be built.
6 Huawei Confidential
HA
High availability (HA) ensures that applications can still be accessed when a single component of the local system is faulty,
no matter whether the fault is a service software fault, physical facility fault, or IT software/hardware fault.
The best HA is that users using the data center service are completely unaware of a machine that breaks down in the data
center. However, if a server in a data center breaks down, it takes some time for services running on the server to fail over. As
a result, customers will be aware of the failure.
The key indicator of HA is availability. Its calculation formula is [1 – (Downtime)/(Downtime + Runtime)]. The following nines
are used to represent availability:
4 nines: 99.99% = 0.01% x 365 x 24 x 60 = 52.56 minutes/year
For HA, shared storage is usually used. In this case, RPO = 0. In addition, the active/active cluster HA mode is used to ensure
that RTO is almost 0. If the active/passive HA mode is used, RTO needs to be reduced to the minimum.
7 Huawei Confidential
Disaster Recovery
A disaster is an unexpected event (caused by human errors or natural factors) that results in
severe faults or breakdown of the system in one data center. In this case, services may be
interrupted or become unacceptable. If the system unavailability reaches a certain level at a
specific time, the system must be switched to the standby site.
Disaster recovery (DR) refers to the capability of recovering data, applications, and services in
data centers at different locations when the production center is damaged by a disaster.
In the DR mode, a redundant site is established in addition to the production site. If the
production site is damaged due to a disaster, the redundant site can take over services from the
production site to ensure service continuity. To achieve higher availability, customers even
establish multiple redundant sites.
8 Huawei Confidential
Relationship Between HA and DR
They are interrelated and complementary to each other. They overlap with each other
and have significant differences.
Dimension HA DR
HA refers to a local HA system. When one or more
applications are running on multiple servers, ensure that DR refers to a remote (intra-city or remote) HA system. It is
Scenario the running applications are not interrupted when any used to recover data, applications, and services when a disaster
server is faulty. The applications and system can be occurs.
quickly switched to other servers.
Data replication is used for remote disaster recovery data.
Generally, HA uses shared storage. Therefore, data will Based on different data replication technologies (synchronous
Storage not be lost (RPO = 0) and the switchover duration, that and asynchronous), data loss often causes RPO to be greater
is, RTO, is considered. than 0. However, remote application switchover usually takes a
longer time. In this case, RTO is greater than 0.
Load switchover between servers in the cluster caused by Service switchover between data centers caused by large-scale
Fault a single faulty component. faults.
Objective HA is used to ensure high availability of services. DR ensures data reliability and service availability.
9 Huawei Confidential
Differences Between DR and Backup
Backup: Backup is a process of copying all or part of data
DC1
sets from an application host's disks or a storage array to
other storage media in a data center. Backup is a method
of DR. MA MA CS
iDA iDA MA
Backup & VTL/NAS
SAN
Archive
Server
DR: A DR system consists of two or more sets of IT systems PTL
that are geographically far from each other. These IT Production Center Backup Center
Generally, DR indicates the backup of data or application systems across equipment rooms, whereas backup refers to local data or system backup.
A DR and backup solution combines local backup and remote data replication to provide comprehensive data protection.
10 Huawei Confidential
Main Indicators for Measuring a DR System
Recovery Point Objective (RPO) indicates the maximum amount of data that can be lost when a disaster occurs.
Recovery Time Object (RTO) indicates the time for system recovery.
The smaller the RPO and RTO, the higher the system availability, and the larger the investment required by users.
Backup 00:00
window RPO 06:00
RTO 12:00
11 Huawei Confidential
Levels of DR Systems
Level Definition RTO TCO
Builds a remote DR center to back up data remotely, which prevents data loss
or corruption in the event of a disaster.
The remote DR center is considered as a remote data backup center. Data- The RTO is the longest
level DR cannot prevent service interruption if a disaster occurs. (several days) because
Data level The recovery time of data-level disaster recovery is long, but the cost is low
device re-deployment Lowest
is needed to restore
and facilities are easy to construct. services.
The data source is essential to all key service systems. Therefore, data-level
DR is indispensable.
Builds a backup site that carries the same application system as the Medium. The same
production site, and uses synchronous or asynchronous replication to system or a smaller
Medium RTO (several
Application level synchronize data between the sites. This allows critical applications to recover
hours)
system can be
within the specified time and minimizes the loss. Data recovery is transparent established at the
to users, ensuring integral, reliable, and secure businesses. backup site.
12 Huawei Confidential
Global Standards for a Disaster Recovery System
According to SHARE 78, a disaster recovery system can be categorized into 7 tiers:
Tier 6: Near-zero or zero data loss. Remote data mirroring ensures data integrity
and consistency.
13 Huawei Confidential
Huawei Business Continuity and Disaster Recovery
(BC&DR) Solution
FusionCloud
Cloud server high
Remote DR availability
Local production center Cloud server Cloud server
Intra-city DR disaster recovery backup service
center center
Geo-redundant DR Volume high Volume backup
HyperMetro DC solution solution availability service
Local HA solution Active-passive DR solution Active-passive DR
solution
Private cloud
≥ 100 km
≤100 km
1. DR Solution Overview
2. DR Solution Architecture
3. Common DR Technologies
4. DR Application Cases
15 Huawei Confidential
Disaster Recovery and Backup Solution
Government Finance Transportation Energy Education Healthcare ......
16 Huawei Confidential
DR Design Mode: Combination of Synchronous and
Asynchronous Modes
High Active- Synchronous disaster recovery: Asynchronous disaster recovery:
Hot active distance limit exists. no distance limit
backup
Availability
2 3
Warm
backup 1 1
Low High
3 4
4 2
Cold
backup RPO: from 30 minutes to several hours,
RPO: 0s. The two images are the same. with data synchronized regularly
Low
resource utilization
Active-active Cluster + Load balancing Automatic Real-time synchronous replication (< 100 km)
Hot backup Cluster Automatic Real-time synchronous replication (< 100 km)
Warm backup Manual intervention Manual Asynchronous replication (> 100 km)
17 Huawei Confidential
Active-Passive DR Solution
WAN
Virtualization/
Middleware/
Applications
Database
SAN SAN
Synchronous/
Asynchronous
replication
18 Huawei Confidential
Active-Active DR Solution
WAN
Oracle, DB2,
or SQL Server
cluster
SAN SAN
HyperMetro
V3 mid-range
and high-end
storage
19 Huawei Confidential
Geo-Redundant DR Solution
Cascading architecture
Production center Same-city DR center Remote DR center
HyperMetro or
synchronous/
A Asynchronous
asynchronous
replication replication
SAN SAN SAN
A A A
Parallel architecture
Production center Same-city DR center
Synchronous/
A asynchronous
replication Remote DR center
(HyperMetro)
SAN SAN
A A
Asynchronous SAN
replication A
20 Huawei Confidential
New DR Mode Evolution in Cloud Computing
High reliability in traditional data centers Traditional cross-DC DR
Component redundancy and Dual-host hot backup Mainly service data replication
high device reliability The recovery process is complex and the recovery period is long.
VM: DB VM: DB
OS+DB OS+DB
Storage
All service data and running environment data are replicated and
Automatic migration of VMs (including services) managed in an integrated manner.
The recovery process is simple and the recovery period is short.
21 Huawei Confidential
Implementation of Cloud Active/Passive Data-Level DR
Production center DR center (passive)
(active)
Management
data
replication
IP SAN IP SAN
VM data
replication
22 Huawei Confidential
Contents
1. DR Solution Overview
2. DR Solution Architecture
3. Common DR Technologies
4. DR Application Cases
23 Huawei Confidential
Major Disaster Recovery Technologies
Applications Applications
Array layer
Disk array NAS Disk array NAS
24 Huawei Confidential
Host Layer DR Technology - Application Level
The application-level DR technology uses application software to implement remote data
replication and synchronization. When the production center fails, the application software system
in the DR center recovers and takes over services from the production center.
25 Huawei Confidential
Host Layer DR Technology - Database Level
The database-level DR technology is designed for specific databases. Generally, typical databases
have the database-level DR function, for example, Oracle Data Guard and DB2 HADR. Database-
level DR is implemented by transmitting database logs and replaying them at the DR site. The
database-level DR technology supports smooth switchover.
26 Huawei Confidential
Host Layer DR Technology - Logical Volume Level
Remote data replication based on logical disk volumes refers to remote synchronous (or
asynchronous) replication of one or more volumes as required. This solution is usually
implemented by using software.
WAN
Servers
Servers
Fiber Connection/DWDM
FC Switch
FC Switch
Storage Storage
Device Device
27 Huawei Confidential
Network-layer DR Technology
A smart switch is added to the storage area network (SAN) between the front-
end application servers and back-end storage systems.
Production Center DR Center
③Write completed
New Data Write ① ④Write Request to DR Center
Production Replication
LOG Log Volume
Volume
28 Huawei Confidential
Array-layer DR Technology
Array-level DR is implemented using the inter-array replication technology. The
replication of the array does not pass through the host. Therefore, the impact on the
host performance is small.
Application
LAN
Application
Hosts
29 Huawei Confidential
SAN Synchronous Replication
Production DR center
center DR management
DR DR server
management management
network network
WAN
Service plane
Application (Optional)
server Data DR servers
replication
network
FC switch
FC switch
DWDM DWDM
Synchronous
IP management network
replication
IP service network
FC network
Data flow
Server
Agent
Huawei OceanStor Huawei OceanStor
Hybrid Flash Storage Hybrid Flash Storage
30 Huawei Confidential
SAN Synchronous Replication Principles
① Synchronous
Replication
②
③ ②
Cache Cache
③
④
Primary Secondar
Host y LUN
LUN
DR Storage
Production Storage
DB Server
31 Huawei Confidential
SAN Asynchronous Replication DR
Production DR center DR management
center server
DR management DR management
WAN
network network
Service plane
(Optional) DR
Application
servers
server
FC switch
FC switch
IP management network
WAN IP service network
FC network
Data flow
Server
Agent
Huawei OceanStor Huawei OceanStor
Hybrid Flash Storage Hybrid Flash Storage
32 Huawei Confidential
SAN Asynchronous Replication Principles
4
N+1 x+1
2 1 1
N x
Cache Cache
DB Server 3 5 Asynchronous Replication
5
LUN A
Primary Site Secondary Site LUN B
Production Backup
Server Production
Server
Primary Secondary
LUN LUN
Switch Switch
Secondary Primary
Primary Site LUN LUN
Secondary Site
33 Huawei Confidential
NAS Asynchronous Replication DR
Production DR center DR
center management
server
DRM network WAN DRM network
Service
network
(Optional)
DR servers
Application
servers
FC
switches
FC IP management
switches network
IP service
WAN network
FC network
Huawei OceanStor Asynchronous Data flow
Hybrid Flash Storage replication Server
Agent
Huawei OceanStor Hybrid
Flash Storage
DRM: Disaster recovery
management
35 Huawei Confidential
NAS Asynchronous Replication Principles
Replicate
Incremental
① ④ Data
Primary FS Secondary FS
③
⑤
②
Host
Primary FS Secondary
Snapshot FS Snapshot
Production Storage DR Storage
36 Huawei Confidential
Multi-Point-in-Time Asynchronous Remote Replication
Technology – Second-Level RPO
DB Server
3 2
Time Time
segment T2 segment T2
4
Time Time
segment T1 segment T1
Cache 1 Cache 1
Asynchronous remote
5 5
replication
Production DR center
center
37 Huawei Confidential
Remote Replication - Application Consistency
Host Consistency Agent Application engine
Triggered Requests
periodically archiving
1 2 3 4 5 6
Memory
7 8 9 A B C
Snapshot
Mirroring
Replication
38 Huawei Confidential
Remote Replication - Consistency Group
A consistency group ensures time consistency of mirrored data among multiple LUNs.
All pairs in a consistency group are simultaneously synchronized, split, interrupted, or
switched over.
39 Huawei Confidential
Comparison of DR Technologies
This function is implemented on hosts, and the compatibility between underlying devices does not
Advantages
Host layer (typical need to be considered.
replication software such During database replication, the DR center can take over part of the work of the production center.
as Symantec VVR, Oracle
DataGuard, DSG and Database replication can be implemented only for the corresponding database.
Quest) Disadvantages Host-layer replication occupies certain host resources and affects the application system.
Implemented on hosts, which is complex and usually requires system reconstruction.
40 Huawei Confidential
Typical DR Drill Solution
Drill switchback
Publishing the drill
start message
Analysis and
Making a drill plan
assessment
41 Huawei Confidential
Contents
1. DR Solution Overview
2. DR Solution Architecture
3. Common DR Technologies
4. DR Application Cases
42 Huawei Confidential
Case 1: XX Virtualization DR Project
HA HA
A disaster
occurs at the 4、The replication task is complete.
active end. 3、The active end starts
task1 to copy data from
LUN1 to LUN1‘. 5、The standby end chooses
snapshots to recover VMs based on
the specified recovery task.
43 Huawei Confidential
Case 2: Application-Level DR Solution
MSTP Internet
2 Mbit/s
GSLB Core switch private line Core switch GSLB
CDP CDP
aggregation aggregation
switch switch
Application Application
IP SAN server server IP SAN
switch switch
CDP device CDP device
Data Data
replication replication
44 Huawei Confidential
Quiz
1. (Multiple) Data replication is the core of a DR technology. On which three layers are replication
devices distributed? ( )
A. Application layer
B. Host layer
C. Network layer
D. Storage layer
2. (True or False) When designing a DR solution, set RTO to 0 to ensure that services are not
interrupted. ( )
45 Huawei Confidential
Summary
DR Solution Overview
DR Solution Architecture
DR Solution Introduction
Common DR
Technologies
DR Application Cases
46 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
47 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
48 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
2 Huawei Confidential
Objectives
3 Huawei Confidential
Contents
4 Huawei Confidential
Storage Management Definition
Storage management allows users to use management tools to query, set,
manage, and maintain storage systems.
Storage resource allocation
User management
Management
content
Data protection feature management
Alarm management
......
5 Huawei Confidential
Common Storage System Access Mode
Log in to DeviceManager.
6 Huawei Confidential
Main Functions of DeviceManager
DeviceManager is storage management software designed by Huawei for a single storage system.
It can help you easily configure, manage, and maintain storage devices.
Main software functions include storage resource allocation, user management, data protection
feature management, device performance monitoring, and alarm management.
7 Huawei Confidential
Logging In Using DeviceManager
8 Huawei Confidential
Introduction to the CLI
CLI allows you to manage and maintain the storage system. Configuration commands are entered on the keyboard and
compiled and executed by programs. The command output is displayed in text or graphics on the CLI.
Terminal software is required for logging in to the CLI. PuTTY is used as an example.
9 Huawei Confidential
Logging In Using the CLI
Enter the user name and password as prompted. The system asks you to change the password upon the first login. Change
the password immediately to ensure system security. The following information is displayed when the login is successful:
1. Enter the
user name.
2. Enter the
password.
3. Change the
password.
10 Huawei Confidential
Contents
▫ CLI
11 Huawei Confidential
DeviceManager GUI (1)
Navigation bar
Alarm and task statistics area
Function pane
Note: The GUI may vary slightly depending on the product version and model. The actual GUI prevails.
12 Huawei Confidential
DeviceManager GUI (2)
No. Name Description
1 Function pane Displays available functions related to the current operation.
13 Huawei Confidential
Managing the Access Permission of a Storage System
• Account policy
• Login policy
Security • Access control
policy • Account audit
adjustment
Ensuring system
security • IP address or address
• Administrator-----role User Access IP
segment list
• management address
Role--operation rights
control • Operation rights of the
super administrator
14 Huawei Confidential
Storage System User Management
To prevent misoperations from compromising the storage system stability and service data security, the
storage system defines user levels and roles to determine user permission and scope of permission.
Operation permission
Level: super administrator
Role: super administrator
All functional modules of
the system
User A
User B User C
15 Huawei Confidential
Roles and Permissions of a User
• Full control permissions
Data protection • Local data protection
• Creates users of different levels. 5 administrator • Remote data protection
management
Super
administrator 1 • HyperMetro
management
4 SAN resource •
administrator
Storage pool
management
Security 2 •
•
LUN management
Mapping view
administrator 3 Network •
management
Host management
administrator • Port management
• Security rule management
• Certificate management
• Physical port management
• KMC management
• Logical port management
• Antivirus management
• VLAN management
• Data destruction management
• Failover group management
• Regulatory clock management
16 Huawei Confidential
Downloading a DeviceManager Demo
17 Huawei Confidential
Contents
18 Huawei Confidential
CLI Format Conventions (1)
You are required to follow the format conventions when you use the CLI commands. Typical
command formats are:
First field: operation that you want to perform, for example, change (modify) and show (query)
Second field: object of an operation, for example, storage_pool (storage pool) and host (host)
Third field (available only in some commands): object attribute, for example, relocation_speed (migration
rate)
Other fields: other parameters required.
19 Huawei Confidential
CLI Format Conventions (2)
For example, change user user_name=? { level=? | action=? }
change user keeps unchanged.
user_name=?, mandatory; For level=? and action=?, one of them can be selected.
For parameter level=?, level= remains unchanged. The value of ? must be an optional value, for example, level=admin.
Format Description
Boldface The keywords of a command are in boldface.
Italic The arguments of a command line, which will be replaced by actual values, are in italics.
{ x | y | ... } Indicates that one option is selected from two or more options.
[ x | y | ... ] Indicates that one or no option is selected from two or more options.
Indicates that multiple options are selected from two or more options. At least one option must be selected, and at most all
{ x | y | ... } *
options can be selected.
[ x | y | ... ] * Indicates that multiple options are selected or none is selected from two or more options.
20 Huawei Confidential
CLI Command Completion
On the CLI, you can press Tab or the space bar to use the command completion function.
The difference between the two keys is as follows: The space key is used to supplement only the current field,
whereas the Tab key is used to supplement all possible values.
When all the fields required by the command are entered and the conditions for running the command are met, the
system prompts that the command can be run after you press Tab. In this case, you can press Enter to run the command.
admin:/>add port ipv4_route eth_port_id=0 type=net target_ip=192.168.3.0 mask=255.255.255.0 gateway=10.0.0.1//Press“Tab”
Command is executable now.
21 Huawei Confidential
Context-Sensitive Help
22 Huawei Confidential
CLI Command Filtering
Redundant information is deleted, and valid
Purpose
content is displayed as required.
23 Huawei Confidential
CLI Column Filtering Command - filterColumn
show xxx|filterColumn { exclude | include } columnList=?
}
Choose either. Columns available
for filtering
24 Huawei Confidential
CLI Row Filtering Command - filterRow
predict=? logicOp=?
• not: The logicOp is not. • and: Multiple columns
• equal_to: a value equal to value=? that meet the condition
• greater_than: a value greater than are displayed.
value=? • or: Any column that
• greater_equal: a value equal to or meets the condition is
greater than value=? displayed.
• less_than: a value less than value=?
• less_equal: a value less than or
equal to value=?
• match: regular expression matching
value=?
25 Huawei Confidential
Error Prompt Function
Error
When the format of the entered command is incorrect,
prompt How to Use
the system displays the error location with symbol ^.
function
admin:/>add part
^
port port_group
admin:/>add part
26 Huawei Confidential
Contents
27 Huawei Confidential
Basic Management Operations
Version information
and ESN
1 5
Collecting storage
Managing basic
system information
information about a
storage system
Configuring basic
storage services
28 Huawei Confidential
Managing Basic Information About a Storage System -
Setting the Device Time (1)
29 Huawei Confidential
Managing Basic Information About a Storage System -
Setting the Device Time (2)
Managing the device time on DeviceManager Managing the device time on the CLI
The change ntp_server config command is used to
automatically synchronize the storage system time
with the NTP server time.
The show system ntp command is used to query
NTP settings.
The show ntp status command is used to query the
NTP status.
The show ntp_server general command is used to
query the settings of the time synchronization
function.
30 Huawei Confidential
Managing Device Licenses (1)
Based on the status of the imported or activated license, different license operations are
displayed on the License Management page: Import License, Activate License, and Update
License.
For an activated license file, DeviceManager provides two control modes:
Running time-based control: displays the expiration time of the license.
Capacity-based control: displays the used/total capacity of the license.
31 Huawei Confidential
Viewing Device Licenses (2)
The show license command is used to query the function configuration of the imported license file in
the system.
Example: show license
The show license_active command is used to query information about active licenses.
Example: show license_active
32 Huawei Confidential
Obtaining the Current Version Information of the Device
Obtaining the current system version information Log in to the CLI as a super administrator.
on DeviceManager Run the show system general command.
The following shows the device information: Product Version indicates the version of the current storage
system.
admin:/>show system general
System Name : XXX.Storage
Health Status : Normal
Running Status : Normal
Total Capacity : 3.186TB
SN : 210235G6EHZ0CX0000XX
Location :
Product Model : XXXX
Product Version : VX00R00XCXX
High Water Level(%) : 80
Low Water Level(%) : 20
WWN : XXXX
Time : 2020-07-07/15:34:05 UTC+08:00
Patch Version : SPCXXX SPHXXX
Description :
33 Huawei Confidential
Obtaining the Device ESN
Introduction Character string that uniquely identifies a device.
ESN
Application Scenarios such as license application, device repair, and eService service
scenarios configuration
Obtaining the ESN using DeviceManager • Obtaining the ESN using the CLI
>> Run the show system general command.
admin:/>show system general
System Name : XXX.Storage
Health Status : Normal
Running Status : Normal
Total Capacity : 3.186TB
SN : 210235G6EHZ0CX0000XX
Location :
Product Model : XXXX
Product Version : VX00R00XCXX
High Water Level(%) : 80
Low Water Level(%) : 20
WWN : XXXX
Time : 2020-07-07/15:34:05 UTC+08:00
Patch Version : SPCXXX SPHXXX
Description :
34 Huawei Confidential
Managing Alarms and Events
• Email notification
• Email notification
• SMS notification
• SMS notification
• Syslog notification
• Trap notification
• Trap notification
Configuring the Configuring the
event notification alarm notification
method mode
Managing
alarms and
events
Configuring alarm
masking Configuring alarm
dump
• Alarm masking needs to be enabled or
disabled so that the system does not • When the number of alarms exceeds
report or reports alarms to the network the threshold, the alarms will be
management system. dumped automatically to a specific
FTP or SFTP server.
35 Huawei Confidential
Collecting Storage System Information
Collecting • Regularly export and securely save the system data for fault
information
How locating and analysis.
36 Huawei Confidential
Collecting Storage System Information (2)
Log in to the CLI of the storage system as the super administrator and run the following command to export
the configuration file to an FTP or SFTP server:
export configuration_data ip=? user=? password=? db_file=? [ port=? ] [ protocol=? ] [ clean_device_file=? ]
37 Huawei Confidential
Configuring Basic Storage Services
39 Huawei Confidential
Configuring Basic Storage Services Using the CLI
• Create a host.
• Create a host group.
• Configure initiators.
1. Creating storage space
• Create a mapping view.
• Configure connectivity
Create a disk between a host and a
domain. storage system.
Create a storage
pool.
Create a LUN.
Create a LUN group.
40 Huawei Confidential
Quiz
B. http://192.168.5.12
C. https://192.168.5.12
D. https://192.168.5.12:8088
2. DeviceManager can monitor the performance of controllers, front-end ports, and back-end ports. ( )
41 Huawei Confidential
Summary
Storage
Management
Overview
Storage
Management DeviceManager
Overview
Storage
Management Login
Mode
Introduction to
Storage System Operation Management Storage CLI
Management Tools
Basic Management
Operations of the
Storage System
42 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
43 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
44 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
2 Huawei Confidential
Objectives
3 Huawei Confidential
Contents
1. O&M Overview
2. O&M Tools
3. O&M Scenarios
4 Huawei Confidential
O&M
O&M is essentially the operation and maintenance of networks, servers, and services in each
phase of their lifecycles to achieve a consistent and acceptable status in terms of cost, stability,
and efficiency. • • Organizational structure
Asset management
• Event management • Skill
• Energy efficiency management • Personnel allocation
• ... • ...
Maintenance Personnel
management organization
Standard Process
system
• Standard operation procedure
• ITIL
• Emergency response process
• Uptime O&M
• Troubleshooting process
• ISO 2000
• ...
• ...
5 Huawei Confidential
How to Perform O&M
Technical layer: Streamline the O&M lifecycle of each product and identify the key measures of each task.
Process layer (ITIL process management framework): change, event, and problem management.
Operation
Rollout and deployment Monitoring and security compliance Change management
specifications
Capacity management and expansion
Configuration management
Performance and experience optimization
Emergency and DR drill
Release management
Cost and efficiency optimization
......
PRR management (performance, reliability, and recoverability)
6 Huawei Confidential
Event Management
Objective
A To restore services as soon as possible
To minimize the impact of emergencies on service running
To ensure that the service quality and availability meet the SLA requirements
Definition
B Emergency
Any event that causes or may cause service interruption or service quality deterioration
Hardware faults, software faults, and service request interruption
Task
C Detection and recording
Classification and online support
Priority (based on the impact and urgency)
Investigation and diagnosis
Solution and recovery
End
Responsibilities, monitoring, tracking, and communication
7 Huawei Confidential
Event Management Process
Transfer and supervision
Service request
Accident data
Incident Problem
Service desk management Temporary measures management
process:
• Identification Change requirement
Computer Change
operations Input: and record management
• Classification Solution
accident
and initial Report
Network support Service level
Output: • Investigation SLA parameters management
solution& and analysis
Procedure temporary • Solution and Report Capability
measures recovery management
Other sources • Incident
of accidents termination
Report Availability
management
Configuration
information
Configuration management
database (CMDB)
8 Huawei Confidential
Problem Management
Objective
A Locate the root cause of the problem and take measures to eliminate known errors.
Minimize the number of incidents caused by IT infrastructure errors and minimize the negative impact of problems.
Prevent the recurrence of emergencies related to errors.
Definition
B Problem: obtained from multiple emergencies with the same symptom or a major incident and indicates
that an error with unknown causes exists.
Known errors: The root cause of a problem has been successfully located and a solution has been found.
Task
C Problem control
Known error control
Proactive problem management
Trend analysis
Review of major issues
9 Huawei Confidential
Problem Management Process
Information
Matching information,
emergency measures, and
quick recovery solution Record
Problem Problem
management Information database
Change request Post implementation
(RFC) review (PIR)
Change
management
10 Huawei Confidential
Change Management
Objective
A Ensure that all changes are effectively controlled and handled through standardized means and
processes, and that approved changes are implemented with minimum risks, high efficiency, and high
cost-effectiveness.
Definition
B Change: An action that causes the status of one or more IT infrastructure CIs to change.
Standard change (approved in advance)
Request for Change (RFC)
Change Schedule (FSC)
Change Advisory Board (CAB)
Task
C Receive, record, approve, plan, test, implement, and review change requests.
Provide the IT infrastructure change report.
Modify CMDB.
11 Huawei Confidential
Change Management Process
The input information includes:
Change request
Data information provided by the configuration management database, especially information about the impact of changes
Capability database provided by capability management and budget information provided by the financial management process
Change
management
12 Huawei Confidential
Configuration Management
Objective
A Measure the value of all IT assets and configuration items used in organizations and services.
Provide accurate information about IT infrastructure configuration for other service management processes.
Support the operation of incident management, problem management, change management, and release management
Verify the correctness of the configuration records related to the IT infrastructure and correct the detected errors.
Definition
B Identify and define configuration items.
Plan, define, and manage the configuration management database.
Periodically verify the accuracy and integrity of CMDB.
Detailed report of IT assets
Task
C Receive, record, approve, plan, test, implement, and review change requests.
Provide the IT infrastructure change report.
Modify CMDB.
13 Huawei Confidential
Configuration Management Process
Change management Release management Configuration
management
Report and audit
Change request
configuration information
(CMDB)
(DSL)
Release and distribute
the hardware and
Implementation Update CMDB & DSL.
software of the new
version.
Comment
14 Huawei Confidential
Release Management
Objective
A Comprehensively assess changes to IT services and ensure that all aspects
(including technical and non-technical factors) of a release are considered
Definition
B Release
Delta release
Full release
Package release
Emergency release
Release policy
Task
C Release planning
Design, development, and configuration release
Release review
Rollout plan
Communication, preparation, and training
Distribution and installation
15 Huawei Confidential
Release Management Process
Design and development Controlled test
Production environment
environment environment
Release management
Communication
and training
Release policy
configuration
building, and
Distribution
Installation
First-time
planning
planning
Building and Release test
running
Release
Release
design,
configuration and
release acceptance
16 Huawei Confidential
Contents
1. O&M Overview
2. O&M Tools
3. O&M Scenarios
17 Huawei Confidential
Components of Huawei Enterprise Storage O&M System
Customer Data Center Huawei Technical
DME Support Center
Storage resource control
O&M administrator
Trouble submission
Server Resource pooling & Service Orchestration
Remoting solution
eSight eService
Multi-device management Cloud Platform
Fabric O&M administrator
Fault monitoring & Performance report
Remote Control
eService
Storage Device Device Device
Remote maintenance
Manager Manager Manager
O&M administrator
Fault monitoring & Fault feedback Authentication system
18000 V3 9000
Device archive system
SmartKit
DeviceManager Storage service tool
Single Device Management Service personnel
Trouble order handling system
O&M administrator Delivery & Upgrade & Toubleshooting
Configure & Alarming Fault diagnosis expert system
18 Huawei Confidential
Main Functions of DeviceManager
DeviceManager is storage management software designed by Huawei for a single storage system.
It can help you easily configure, manage, and maintain storage devices.
Main software functions include storage resource allocation, user management, data protection
feature management, device performance monitoring, and alarm management.
19 Huawei Confidential
Home Page of DeviceManager
20 Huawei Confidential
Introduction to SmartKit
1. Unified platform
The desktop tool management
platform integrates O&M tools
for storage systems, servers, and
cloud computing.
2. Scenario-based guidance
Tools specific to each O&M
scenario can be downloaded
on demand.
3. Standardized operations
The wizard guides you
through operations based
on scenarios in an easy and
intelligent manner.
21 Huawei Confidential
Home Page of SmartKit
Standardized and process-based operations in various service scenarios, improving operation
efficiency
Function
navigation bar Domain Function
management
Device
Scenario-
based entry
22 Huawei Confidential
Introduction to DME
ITSM
Northbound API
Gold Silver
Gold Silver Bronze
Southbound API
23 Huawei Confidential
DME Functions and Features
Planning Construction O&M Optimization
24 Huawei Confidential
Introduction to eSight
eSight provides multi-vendor device adaptation for unified network-wide device management,
component-based architecture for on-demand construction of enterprise O&M platforms, and
lightweight design and web client for lower system maintenance and upgrade costs.
Switches/Routers/
WLAN PON Management ……
Management
Architecture UC/Telepresence,
Transport Device
Platform + Components Video Surveillance eLTE Management
Management
Management
eSight
Servers/Virtual Equipment
Storage
Resources Room Facility
Management
Management Management
25 Huawei Confidential
Logical Architecture of eSight
Administrator
Value-added Network SLA&QoS management Storage Network Analysis Server Configuration and Deployment
O&M Network Traffic Analysis Management Business Service Management Report Management
…… …… ……
…… …… ……
Management
Platform eSight Management Platform
26 Huawei Confidential
Introduction to eService
Based on Cloud-Native, Huawei eService cloud intelligent management platform uses big data analysis and AI technologies to provide services
such as automatic fault reporting, capacity and performance prediction, and disk risk prediction, preventing potential risks and providing a basis for
capacity planning.
27 Huawei Confidential
System Architecture of eService
Customer network Huawei network
FusionCloud DMZ
Intranet
Email (optional channel)
zone
ManageOne OC/SC Supports only fault
monitoring.
DC1
DC2 Customer Huawei
Email Email
Cloud OS
Internet
server server
Fusion Manager/Fusion
Compute/Fusion eService
eSight
Access/FusionSphere OpenStack OM Storage cloud
/Server system
Network HTTPS
Hardware /Network
layer
Storage Fault monitoring
eService
Remote inspection Proxy HTTPS
Server Client
Remote log collection server service
& FusoinCare
Capacity prediction (Optional)
Maintenance Performance
host exception analysis
Disk prediction
28 Huawei Confidential
Contents
1. O&M Overview
2. O&M Tools
3. O&M Scenarios
29 Huawei Confidential
Routine Maintenance Items
03
02 Weekly
maintenance items
01
Daily maintenance
item Inspecting a storage device
Initial maintenance Checking the equipment room
items environment
Checking and handling alarms Checking the rack internal
environment
Checking the SmartKit
installation
Checking the installation and
configuration of eService
Checking the alarm policy
configuration
30 Huawei Confidential
Quick Maintenance Process
Start
Check the indicator status The indicators on the front and rear panels of the storage devices indicate the device
and handle related exceptions. running status and help you discover and rectify common hardware faults.
By checking the system information and service status, you can learn about the basic
Check the service status.
information, alarms, capacity trend, and performance of the storage system, as well as
and handle related exceptions.
the status of storage resource allocation and value-added features.
No
End
31 Huawei Confidential
O&M Scenario 1: Inspection
Background
After the storage devices purchased by company E are
deployed, services are deployed and running properly. To
ensure the storage security of core devices in the service
system, engineer A in the IT department is responsible for
the inspection of storage devices. Help engineer A make
an inspection plan.
32 Huawei Confidential
Inspection Method
Check the
storage system
operating
environment.
Inspection
Manual
inspection
Check the using tools
Check service SmartKit inspection
indicators. running DeviceManager
status. inspection
33 Huawei Confidential
O&M Scenario 2: Performance Monitoring
Background
Company E's business has gone online. To learn about the
performance and usage of the storage device, engineer B in
the IT department is responsible for monitoring the
performance of the storage device. Help engineer B
monitor the performance of the storage device.
34 Huawei Confidential
Performance Monitoring Process
Start
View storage device performance information, including real- View storage system Check storage system alarm information.
time performance monitoring data, alarms, events, and power performance information.
consumption. Check storage system event information.
35 Huawei Confidential
Performance Monitoring Metrics
IOPS
• For applications with an I/O size smaller than 64
KB, mainly focus on the IOPS.
• For applications with an I/O size greater than or
equal to 64 KB, mainly focus on the bandwidth.
Monitoring
metrics
Bandwidth Latency
36 Huawei Confidential
Performance Metrics
37 Huawei Confidential
O&M Scenario 3: Parts Replacement
Background
After the storage system of enterprise E has been running
for a period, it reports a disk failure and disk replacement
is needed. After receiving the disk replacement request,
Huawei technical support engineer C is going to the
customer site to perform the replacement.
38 Huawei Confidential
Parts Replacement Procedure
Start
Rectify the No No
Successful
fault as Connect cables.
check Successful Rectify the fault as
prompted.
Yes check prompted.
Confirm that the Yes
Use the tool to power off the replacement is
component. complete on the
tool.
End
39 Huawei Confidential
Replaceable Parts
FRU CRU
Quorum server -
Data switch -
40 Huawei Confidential
Spare Parts Query Assistant
41 Huawei Confidential
Key Points for Disk Replacement
When handling a disk module, hold only its edge to prevent damage.
Remove and insert a disk module with even force. Excessive force may damage the appearance of
the disk module or cause faults.
To avoid damaging disk modules, wait at least 1 minute between removal and insertion.
To prevent data loss, replace only a disk module of which the Alarm/Location indicator is steady
yellow.
Complete the replacement within five minutes after removing a disk module. Otherwise, the
system heat dissipation is compromised.
Use SmartKit to replace a risky disk (not faulty).
Ensure that the replacement disk is inserted in to the same slot as the replaced disk. Otherwise,
the system may work abnormally.
42 Huawei Confidential
Disk Replacement Using SmartKit
Start SmartKit and select the parts replacement tool.
43 Huawei Confidential
Disk Replacement Wizard
44 Huawei Confidential
Quiz
B. B. eSight
C. C. SmartKit
D. D. eService
2. (True or False) SmartKit integrates various tools required for deploying, maintaining, and
upgrading IT devices, helping service and maintenance engineers perform precise
operations on these devices, improving work efficiency. ( )
45 Huawei Confidential
Summary
O&M concepts
O&M overview
O&M handling process
DeviceManager
eService
46 Huawei Confidential
More Information
Enterprise Huawei
Technical Enterprise
Support App Service App
47 Huawei Confidential
Recommendations
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
48 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.