Professional Documents
Culture Documents
net/publication/305933028
A Survey on Storage Virtualization and its Levels along with the Benefits and
Limitations
CITATIONS READS
7 4,694
1 author:
Pratik Bhore
Bharati Vidyapeeth Deemed University
6 PUBLICATIONS 47 CITATIONS
SEE PROFILE
All content following this page was uploaded by Pratik Bhore on 19 August 2016.
A Survey on Storage Virtualization and its Levels along with the Benefits
and Limitations
Keywords— Storage, Performance, Virtualization, Network, Storage Virtualization, Storage Area Network (SAN), Network
Attached Storage (NAS), Server, Storage Device (Sub-System), Host, SAN Fabric, Virtual Machine Monitor/
Hypervisor
I. INTRODUCTION
B. Server Virtualization
A. Virtualization
In Server virtualization, we see that one individual server
performs the work of many servers combined, as it
Virtualization is known as the creation of a virtual
partitions out the resources or devices of a respective
version of a resource (device) like a server, a storage device,
individual server across the multiple environments. The
a network or an operating system where the framework is
hypervisor/ virtual machine monitor (VMM) allows it to
dividing the device into single or more executing
host many apps and operating systems locally.
environments.
For example, even partitioning of a hard disk drive is
considered as virtualization. The reason behind this is, we C. Client Virtualization
have one single hard disk drive, and we divide it into two
partitions which give us two different hard drives. In the In Client virtualization, we see that the system
end explaining to us what the term virtualization is all about administrator carries out the monitoring in a practical
[1][2][3][4]. manner and also updates the customer's devices such as
Virtualization gets divided into types such as: desktops, laptops, and mobile devices. It gives the
1) Server Virtualization (Full and Para-Virtualization) improvement of the client device management and helps
(consists of Virtual Servers) the client device to defend itself from the cyber criminals
2) Client Virtualization and remain secure.
Moreover, also
3) Storage Virtualization (consists of Virtual Storage)
The main area of focus here is the most important type of D. Para-Virtualization
virtualization i.e. the Storage Virtualization. Hence we will
study it in detail further. We analyze its levels which are an In Para-Virtualization, we see that there are virtual calls
integral part of its architecture. Moreover, also we will made, which carry out the substitution between ISA
explain its benefits as well as the limitations or drawbacks it (instruction set architecture) of the host. It shows that there
faces in the various levels of storage virtualization.
is communication between the virtual machine monitor and three types of data storage seen in virtualization they are
operating system (guest). It must be carried for namely; Direct Attached Storage (DAS), Network Attached
improvement in efficiency as well performance. Accessing Storage (NAS) and Storage Area Network (SAN). In DAS
devices are better in Para-Virtualization compared to full we see data storage where the storage devices are directly
virtualization since all devices matched in full attached to the server. In NAS we see a connection formed
virtualization. through the network. The NAS hence can be used for
operations such as file or device sharing and backup for
storage among devices [5][6][7][8]. Moreover, lastly in
E. Full Virtualization
SAN, we see that there are storage devices that get shared
with different servers though a highly accelerated network.
In Full Virtualization, we see that the Virtual machine
monitor creates a remote environment between the virtual
server (guest) and server hardware (host). Operating
systems can directly access the hardware controllers as well B. Storage Area Network
as the peripheral devices without awareness of the virtual
environment or its modified requirements. The Storage Area Network gets defined as an individual
network which grants us access to the shared data storage.
SANs have been initially used to improve the storage
F. The Need for Storage Virtualization
resource devices, such as disks, tapes, and optical disks that
can be accessed by the servers so that these support devices
Storage Virtualization is essential in carrying out the can get locally connected to the Operating System. SAN has
necessary operations of dividing the available storage space its individual network of various storage resource devices
into Virtual Volumes irrespective to the physical layout of that cannot access from the LAN by other support
the actual available storage components. (e.g. Disk Drives, equipment.
RAID subsystems)
In Storage Area Network (SAN) there is an essential need
for management of large chunks of storage data in a
uniform way and centrally located. There is a rapid growth C. Network Attached Storage
in storage capacity and processing power in most of the
enterprise installation activities. Its coupling gets done with Network-attached storage (NAS) has a data storage server
the need for high availability and the everyday operations, which gets connected to a network that provides data access
which requires the Storage architecture to allow them the to a similar bunch of clients. NAS is known for giving
seamless addition of storage without any downtime. These access to various files. It is indeed manufactured many
strategic goals are achieved at best because of virtualization times as a computer device which is a unique purpose-built
of the storage. The primary need for Storage Virtualization network. The NAS systems contain multiple storage devices
is because of its capability to expand. The importance of attached to the network, which gets arranged as logical,
this ability can be justified while handling the necessary redundant storage containers such as Redundant Array of
activities of e-commerce websites. It enables the property of Independent Disks also known as RAID.
data migration and mobility. Also, Storage Virtualization
allows the usage of software apps instead of human admins
to perform the various activities and allocations. Data
management gets significantly carried through Storage
Virtualization applications such as Snapshot Remote
Mirroring, Virtual Tapes. It requires creation and expansion
of its Virtual Volumes for the use. In summary, a SAN
cannot be useful without Storage Virtualization. Hence it is
vital and needed the most in Storage Area Network.
A. Storage Virtualization
C. Tape Virtualization
System Interface (iSCSI) or Fiber Channel (FC) networks to It also reduces the Storage infrastructure problems where
form a connection as Storage Area Network. These types of everything in connected virtually. Moreover, hence no
device components are available and implemented in the physical space is needed in large amounts. It increases the
shape of virtualization. The virtualization device efficiency in the storage of data. It undergoes address space
components work in the SAN and provide us with the layer remapping where the physical storage gets abstracted to
of abstraction between the host that is performing the IO logical storage during the IO redirection requests. It carries
operation and the storage controller which provides the the metadata which stores all physical storage locations that
storage capacity [15]. are mapped. These places all get stored in a mapping table.
It is real management and organization at its best. It carries
out disk management here. All the drives connected are
G. Storage Device (Sub-System) Based Virtualization managed over here over a single network. It has different
storage devices connected to a network i.e. virtually or in a
Similar to the host-based virtualization, several operations practical manner hence it has small capital expenses. It also
have existed since many years and have recently gets named has a higher availability rate and is available when we need
as virtualization. Simple data storage components, like resources. That is giving service to the user 24 x 7. It
single hard drives, do not provide us with virtualization. provides efficiency in resource utilization and consumes
However, even the simplest disk technology provides a less energy. It is beneficial for energy saving purposes.
logical to physical translation, as they use Redundant Array Also, all the energy is utilized properly for processing
of Independent Disk solutions to join more than one drive in purposes. It consists of huge disk memory space for storage.
a single array. Advanced disk controllers consist of cloning, It gets seen in data centers for example. It has a fast loading
snapshots, and remote replications. Usually, these and backup speed. The same amount of work can be
components do not provide us with the advantages of data completed with fewer servers since they are collectively
migration or replication across different storage, as each user working well together. Hence proving that it is work
wants to use their necessary protocols. efficient and time-saving in storing and processing of a
large amount of data.
IV. STUDY FINDINGS These are the benefits of Storage Virtualization derived
from surveying the existing architecture.
Storage Virtualization is a great innovation in the world of
technology, and it has plenty of benefits no doubt, but B. Limitations
meanwhile, there are a few limitations as well which also
exist and get considered. Data leakage can occur here due to the insecure
environment or handle done by some random party. Data
A. Benefits leakage is becoming very common these days where while
transferring data for storage or processing purposes has
Storage Virtualization carries out enhancement of the become unsafe. The Data Integrity and Confidentiality get
Network Attached Storage (NAS) where multiple storage preserved for stopping the data leakage [17]. It consists of
devices get connected via a large accelerated network. various security issues such as intrusion or hacking which
Hence it gives a significant capacity. This capability gets need to be detected and prevented. Many hackers want to
expanded with the increase in demand for storage. There is violate the privacy of others and want to access their data
no disruption in the data migration. The same benefits get without authorization. It causes into intrusion and hence
seen during achievement of data mobility [16]. The affecting the security of stored data. It has data remanence
utilization of storage is optimized and improved. It needs to issues where the deleted data gets used by the user itself.
get improved for handling the big data that gets stored. Some delicate information is removed by the user after it
Load balancing is carried here in Storage Virtualization uses. This data can be retrieved from the stored spaces and
while integrating large chunks of data in datacenters. The used in blackmailing the user. Privacy threats get handled
replication of data takes place which is handy during here. Here the private life of stored data should be
disaster recovery. It creates various data replicas that are preserved. The resources get managed appropriately and
useful during such phenomenon. Data is stored and properly according to their demand. It gets based on a need basis. It
managed. It is a necessity to keep management and shows backing out is carried after a failed attempt of
organization in this big amount of data. Pooling of various implementation. It gives the limitation of internally moving
storage devices together is done. It ties all these storage the operations with the user support. It consists of various
devices together via a network. The most significant benefit complexities that need attention. The metadata needs to be
is that there has been a reduction in the management costs. managed to keep track of all the mapped storages. All this
data needs to be properly handled and organized. [3] Sandeep Kumar and Syam Kumar P, “Secure and
Performance and scalability are the most important of these efficient design and implementation of out-of-band
issues, where they need to be optimized otherwise the work storage virtualization”, IEEE, 2015.
done is low. Performance gets based on various parameters [4] S. D. Joshi, Naveenkumar Jayakumar, Farid Zeimfar,
such as latency, throughput, bandwidth and memory. These “Workload Characteristics Impacts on File System
parameters get considered for achieving high performance Benchmarking”, Int. J. Adv. Res. Computer Sci.
in virtualization. If not, then the performance is low. Here Software Eng., vol. 4, no. 2, pp. 39–44, 2014.
violation of licensing agreements occurs sometimes. The [5] N. Jayakumar, S. Singh, S. H. Patil, and S. D. Joshi,
benefit of reduction in management costs and an increase in “Evaluation Parameters of Infrastructure Resources
some disks can boost people to add some servers, which Required for Integrating Parallel Computing Algorithm
will create a server sprawl, in which there will be too many and Distributed File System,” IJSTE - Int. J. Sci.
servers to be managed. The network system is much more Technol. Eng., vol. 1, no. 12, pp. 251–254, 2015.
complex here in storage virtualization. If one storage system [6] N. Jayakumar, T. Bhardwaj, K. Pant, S. D. Joshi, and S.
fails while getting connected during processing, then they H. Patil, “A Holistic Approach for Performance
all fail. If one of the servers gets infected or corrupted, then Analysis of Embedded Storage Array.”
the whole network gets affected and compromised. [7] D. T. Jayakumar and R. Naveenkumar, “Active
Storage,” Int. J. Adv. Res. Computer Sci. Software
These are the limitations of Storage Virtualization derived Eng. Int. J, vol. 2, no. 9, pp. 62–70, 2012.
from surveying the existing architecture. [8] M. G. Kakamanshadi, M. J. Naveenkumar and S. H.
Patil, “A Method to Find Shortest Reliable Path by
Hardware Testing and Software Implementation,” Int.
V. CONCLUSION AND FUTURE SCOPE J. Eng. Sci., 2011.
[9] N. Kumar, S. Angral and R. Sharma, “Integrating
This paper discussed the Storage Virtualization concept in Intrusion Detection System with Network monitoring,”
brief and its relation as well as use with the storage Int. J. Sci. Res. Publ., vol. 4, no. 5, pp. 1–4, 2014.
topologies such as Storage Area Network and Network [10] P. D. S. D. J. Naveenkumar J, “Evaluation of Active
Attached Storage. We also discussed the concept of Levels Storage System Realized through Mobility RPC,” Int.
in Storage Virtualization along with their benefits and J. Innov. Res. Computer Commun. Eng., vol. 3, no. 11,
limitations. Finally, considering its high performance as pp. 11329–11335, 2015.
well as storage, high availability, efficiency, its capability [11] S. D. Joshi, Naveenkumar J, “Evaluation of Active
to expand and scalability of utilizing the data proves that it Storage System Realized Through Hadoop,” Int. J.
has humongous future scope in the new world of Computer Sci. Mob. Computer, vol. 4, no. 12, pp. 67–
technology. Moreover, hence Storage Virtualization has 73, 2015.
been proposed for future consideration and will grow [12] J. Naveenkumar, R. Makwana, S. D. Joshi, and D. M.
bigger in the coming days. Thakore, “Offloading Compression and Decompression
Logic Closer to Video Files Using Remote Procedure
Call,” J. Impact Factor, vol. 6, no. 3, pp. 37–45, 2015.
ACKNOWLEDGMENT [13] N. J. Rishikesh Salunkhe, “Query Bound Application
Offloading: Approach Towards Increase Performance
I would like to thank Dr. Naveen Kumar for his complete of Big Data Computing,” J. Emerg. Technol. Innov.
guidance and the Computer Engineering department of Res., vol. 3, no. 6, pp. 188–191, 2016.
BVUCOE, Pune as well. I would also like to thank my [14] R. Salunkhe, A. D. Kadam, N. Jayakumar, and S. Joshi,
family and friends for their constant support and confidence “Luster A Scalable Architecture File System: A
in me. Research Implementation on Active Storage Array
Framework with Luster File System.” in ICEEOT,
2015.
REFERENCES [15] R. Salunkhe, A. D. Kadam, N. Jayakumar, and D.
Thakore, “In Search of a Scalable File System State-of-
[1] Jun-wei Ge, Yong-long Deng, Yi-qiu Fang, “Research the-art File Systems Review and Map view of new
on Storage Virtualization Structure in Cloud Storage Scalable File system.,” International Conference on
Environment” , Multimedia Technology (ICMT), Electrical, Electronics, and Optimization Techniques
International Conference, IEEE, 2010. (ICEEOT) - 2016, pp. 1–8.
[2] Aameek Singh, Madhukar Korupolu and Dushmanta [16] Naveenkumar J, Sagar S Lad, S. D. Joshi, “Comparison
Mohapatra, “Server-Storage Virtualization: Integration study on Hadoop’s HDFS with Lustre File System,”
and Load Balancing in Data Centers”, IEEE, 2008.
Int. J. Sci. Eng. Appl. Sci., vol. 1, no. 8, pp. 491–494, Implemented on Active Storage
2015. Framework. International Journal, 5(2), 2015.
[17] G. Sullivan, “Virtualization for Storage Efficiency and [32] Salunkhe R, Kadam A.D, Jayakumar N and Thakore D,
Centralized Management.” In Search of a Scalable File System State-of-the-art File
[18] T. A. Faculty, S. Sivathanu, and I. P. Fulfillment, Systems Review and Map view of new Scalable File
“Enhancing Storage Performance in Virtualized system.
Environments Enhancing Storage Performance in [33] Salunkhe R, Kadam A.D, Jayakumar N and Joshi S.D,
Virtualized” no. August, 2011. Luster A Scalable Architecture File System: A
[19] G. Praveen, “Analysis of Performance in the Virtual Research Implementation on Active Storage Array
Machines Environment,” International J. Adv. Sci. Framework with Luster File System.
Technol., vol. 32, no. pp. 53–64, 2011. [34] Jayakumar N, Reducts and Discretization Concepts,
[20] Press, “Virtualization.” Summary, “How Processor tools for Predicting Student’s Performance.
Core Count Impacts Virtualization Performance and [35] Jayakumar M.N, Zaeimfar M.F, Joshi M.M and Joshi
Scalability. S.D, International Journal of Computer Engineering &
[21] Salunkhe R, Kadam A.D, Jayakumar N and Thakore D, Technology (IJCET), Journal Impact Factor, 5(1),
In Search of a Scalable File System State-of-the-art File pp.46-51, 2014.
Systems Review and Map view of new Scalable File [36] Kumar N, Angral S and Sharma R, Integrating
system. Intrusion Detection System with Network
[22] Raval K.S, Suryawanshi R.S, Naveenkumar J and Monitoring. International Journal of Scientific and
Thakore D.M, The Anatomy of a Small-Scale Research Publications, 4, pp.1-4, 2014.
Document Search Engine Tool: Incorporating a new [37] Namdeo J and Jayakumar N, Predicting Students
Ranking Algorithm. International Journal of Performance Using Data Mining Technique with
Engineering Science and Technology, 1(3), pp.5802- Rough Set Theory Concepts. International
5808, 2011. Journal, 2(2), 2014.
[23] Archana R.C, Naveenkumar J and Patil, S.H, Iris Image [38] Naveenkumar J, Keyword Extraction through Applying
Pre-Processing and Minutiae Points Rules of Association and Threshold
Extraction. International Journal of Computer Science Values. International Journal of Advanced Research in
and Information Security, 9(6), p.171, 2011. Computer and Communication Engineering
[24] BVDUCOE, B.B, Iris Image Pre-Processing and (IJARCCE), ISSN, pp.2278-1021.
Minutiae Points Extraction. International Journal of [39] Kakamanshadi G, Naveenkumar J and Patil S.H, 2011.
Computer Science & Information Security, 2011. A Method to Find Shortest Reliable Path by Hardware
[25] Jayakumar M.N, Zaeimfar M.F, Joshi, M.M and Joshi Testing and Software Implementation. International
S.D, 2014. INTERNATIONAL JOURNAL OF Journal of Engineering Science and Technology
COMPUTER ENGINEERING & TECHNOLOGY (IJEST), ISSN, pp.0975-5462.
(IJCET). Journal Impact Factor, 5(1), pp.46-51. [40] Naveenkumar J and Raval K.S, Clouds Explained
[26] Naveenkumar J and Joshi S.D, 2015. Evaluation of Using Use-Case Scenarios.
Active Storage System Realized through Mobility [41] Naveenkumar J, S.D Joshi, Evaluation of Active
RPC. Storage System Realized Through Hadoop.
[27] Jayakumar D.T and Naveen Kumar, S.D Joshi, International Journal of Computer Science and Mobile
“International Journal of Advanced Research in Computing, 4(12), pp.67–73, 2015.
Computer Science and Software Engineering”, Int. [42] Rishikesh Salunkhe, N.J, Query Bound Application
J, 2(9), pp.62-70, 2012. Offloading: Approach Towards Increase Performance
[28] Jayakumar N, Singh S, Patil S.H and Joshi S.D, of Big Data Computing. Journal of Emerging
Evaluation Parameters of Infrastructure Resources Technologies and Innovative Research, 3(6), pp.188–
Required for Integrating Parallel Computing Algorithm 191, 2016.
and Distributed File System. [43] Sagar S Lad, S.D Joshi, N.J, Comparison study on
[29] Jayakumar N, Bhardwaj T, Pant K., Joshi S.D and Patil Hadoop’s HDFS with Lustre File System. International
S.H, A Holistic Approach for Performance Analysis of Journal of Scientific Engineering and Applied Science,
Embedded Storage Array. 1(8), pp.491–494, 2015.
[30] Naveenkumar J, Makwana R, Joshi S.D and Thakore [44] Angel, S. et al., End-to-end performance isolation
D.M, Offloading Compression and Decompression through virtual datacenters. 11th USENIX Symposium
Logic Closer to Video Files Using Remote Procedure on Operating Systems Design and Implementation
Call, Journal Impact Factor, 6(3), pp.37-45, 2015. (OSDI 14), (Vdc), pp.233–248. Available at:
[31] Naveenkumar J, Makwana R, Joshi S.D and Thakore http://dl.acm.org/citation.cfm?id=2685048.2685067,
D.M, Performance Impact Analysis of Application 2014.
AUTHORS PROFILE