Professional Documents
Culture Documents
0 Huawei Confidential
Contents
1 Huawei Confidential
New Data Center: New Compute, Storage, Network, and Energy
Layer 4 Application
• ERP • iCare • W3
APPLICATION • PDM • DW • Email
• iSales • HRMS • ...
Service platform
Layer 3 Database, big data, and middleware
Application middleware IT • WAS • Message middleware • LDAP
Database and big data arc • Oracle DB • MySQL • DNS
hit • Integration via EIP • SQL Server • Big data
Compute ect
Layer 2 Compute, storage, and network
Storage
ure
lay • Compute • Storage • Network
Network ers
Layer 1 Energy
Equipment room • Electric power • Cabling system • Physical
system • Fire extinguishing security
• Cooling system system • ...
2 Huawei Confidential
Reliable Storage Systems of High Performance and Large Capacity Dedicated
to Data Centers
Storage Products for Enterprise Data
Storage Products for Individuals
Centers
• Requirements: cost-effectiveness and fair and • Requirements: data integrity, high reliability, high
reasonable prices performance, and large capacity
• Different from servers in high availability (HA)
• Tolerance for disadvantages in response time, service
architecture, power failure protection, and quality
life, and errors
control
3 Huawei Confidential
Storage System Classification by Service – Block Storage
Protocol layer ⚫ Block storage is used to store structured data, that is,
data is directly read and written by reading or writing
one or more addresses from or into storage space.
⚫ Generally, block storage is used to store important data
Storage of virtualization applications such as Oracle database
layer ...
and VMware.
Block storage:
• Advantages: direct access, minimized overhead, and
highest efficiency
• Disadvantages: highest cost and poor scalability
• Application scenarios: Oracle database and VMware
virtualization
4 Huawei Confidential
Storage System Classification by Service – File Storage
NFS or CIFS
File storage:
• Advantages: easy management and interconnection with applications
• Disadvantage: supports expansion, requiring ecosystem compatibility.
• Application scenarios: enterprises' internal application integration and file
sharing
5 Huawei Confidential
Storage System Classification by Service – Object Storage
HTTP, REST, SOAP, or S3
6 Huawei Confidential
Storage System Classification by Architecture – Centralized Storage
...
...
7 Huawei Confidential
Storage System Classification by Architecture – Scale-Out Storage
Switch 1 Switch 2
8 Huawei Confidential
Contents
9 Huawei Confidential
Disk Types
Function
Media
HDD
Disk types Desktop level
Monitoring level
SSD Enterprise level
Enterprise-level disks are designed for enterprise applications, such as storage arrays and
servers. Desktop-level disks are mainly used for home applications, such as desktop PCs and
laptops.
10 Huawei Confidential
Classification by Media
11 Huawei Confidential
SSDs vs. HDDs
12 Huawei Confidential
By Protocol – Serial ATA (SATA)
Advantages:
1. SATA is a serial bus interface protocol. During data transmission, the data and signal cables are used independently,
and the embedded clock frequency signal is used. Its rate can reach 30 times of the Parallel ATA (PATA).
2. Instead of simple PATA improvement, the bus structure is brand new.
3. Control information is scattered in data and transmitted by using a predefined bit.
4. One path is used to transmit data, and the other is used to return a response.
5. SATA has higher anti-interference capabilities and faster speed than PATA. The installation is easier and the number of
cables used in the chassis is reduced.
6. The performance of single-thread tasks is good.
Disadvantages:
1. SATA, designed for entry-level applications, is not as powerful as SCSI in terms of big data throughput or multi-thread
transmission.
2. When multiple threads are reading data, the head of a disk swings back and forth, causing the disk to be overheated.
13 Huawei Confidential
By Protocol – Serial Attached SCSI (SAS)
1. SCSI is a storage interface protocol specially designed for small computer systems. 50-pin ports are used. The
appearance of a 50-pin port is similar to that of a common disk port. The SCSI disks support connections to various
devices. In addition, each SCSI disk has an independent chip for data processing. The CPU usage is low, the
bandwidth can reach 320 MB/s, and the stability is good.
2. SAS is a disk connection technology that integrates the advantages of the parallel SCSI and serial connection
technologies.
3. SAS is a point-to-point, full-duplex, and dual-port interface.
4. SAS is compatible with SATA, delivering high performance for enterprises, achieving interoperability with SATA, and
bringing unprecedented flexibility and benefits to enterprises.
5. SAS features high performance, high reliability, and powerful scalability.
The serial technology is also used, which is better than SCSI in transmission rate and anti-interference. However, the
price is higher.
14 Huawei Confidential
By Protocol – Near-Line SAS (NL-SAS)
1. NL-SAS disks integrate SAS interfaces and SATA disks. In other words, NL-SAS disks refer to SATA disks
with SAS interfaces and near-SAS performance.
2. Near-line storage is oriented to applications between online storage and offline storage. Data that is not
frequently used or seldom accessed is stored on the storage devices of which performance is relatively
low. However, these devices must provide fast addressing capabilities and a high transmission rate.
15 Huawei Confidential
SAS SSD
Size: standard 2.5-inch SAS SSDs accessed based on the SAS protocol
Short access time: The xx μs-level average read/write response time meets the
requirements of latency-sensitive service applications and minimizes the response time
to customers' requirements.
High throughput: Provides hundreds of thousands of random read/write IOPS, meeting
the requirements of high-performance storage system.
High read/write speed: GB-level read/write bandwidth and stable performance.
Low power consumption: The energy consumption per unit capacity is much lower than
that of SAS HDDs.
16 Huawei Confidential
NVMe SSD
Size: 2.5-inch and 1.8-inch NVMe SSDs accessed based on the NVMe
protocol
Short access time: The xx μs-level average read/write response time,
shorter than that of SAS SSDs, meets the requirements of latency-
sensitive service applications and minimizes the response time to
customers' requirements.
High throughput: Provides hundreds of thousands of random read/write
IOPS, meeting the requirements of high-performance storage system.
High read/write speed: GB-level read/write bandwidth and stable
performance.
Low power consumption: The energy consumption per unit capacity is
much lower than that of SAS HDDs.
17 Huawei Confidential
Comparison of Mainstream Disk Types
Indicator SATA HDD SAS HDD NL-SAS HDD SAS SSD NVMe SSD
Rotational speed
7200 15,000 or 10,000 7200 N/A N/A
(rpm)
Capacity (TB) 4, 6, 8, 10, or 14 1.2, 1.8, or 2.4 4, 6, 8, 10, or 14 1.92, 3.84, 7.68, 15.36, etc. 1.92, 3.84, 7.68, 15.36, etc.
18 Huawei Confidential
SCM – Next-Generation Storage Media
Storage Class Memory (SCM) is a new storage medium popular in the High-performance SSDs provide the following application forms
industry. SCM is similar to storage in its persistence and to memory in in a storage system:
its byte-level access. • Metadata cache: As metadata cache of AFA, SCM SSDs work
with the DRAM to build a memory + SCM SSD two-tier
The SCM SSD, which uses NVMe block interface and is compatible cache, which avoids bottlenecks in memory capacity and
with the native architecture, is the primary application form of SCM. supports larger user capacity with stable performance.
Optane P4800X series launched by Intel is an example. This product • Data cache: SCM SSDs serve as the acceleration layer of user
has little impact on the system architecture but provides better data and improves performance in typical application
performance than that of flash SSDs. In addition, SCM SSDs do not scenarios.
require garbage collection, which prevents performance deterioration • Main storage: SCM SSDs serve as the storage layer of user
similar to that of NAND SSD after long-time running, and curbs data and provides a high-performance storage system to
latency at an appropriate level. This type of storage products is meet the performance requirements of some scenarios.
springing up in the industry, and Huawei is also working on the R&D
of relevant products.
Limited by the price of SCM, its high requirements on the storage architecture, and unclear application scenarios, it
is difficult to put SCM into large-scale commercial use in a short term.
19 Huawei Confidential
Contents
20 Huawei Confidential
RAID
The term RAID was invented by David Patterson, Garth A. Gibson, and Randy Katz at the University of California, Berkeley
in 1987. It combines multiple independent physical disks into a virtual logical disk using related algorithms to provide
larger capacity, higher performance, and better error tolerance capabilities.
RAID10 RAID50
⚫ RAID is classified into different RAID levels based
on the combination methods, such as RAID0,
RAID1, RAID3, RAID5, and RAID6.
⚫ Two different RAID levels can be combined to form
a new RAID level.
21 Huawei Confidential
Comparison between Mainstream RAID Levels
Level RAID0 RAID1 RAID3 RAID5 RAID6 RAID10
Read performance High Low High High High Medium and high
Random write
High Low Medium Medium and high Medium and high Medium
performance
Sequential write
High Low Medium Medium and high Medium and high Medium and high
performance
mn ≥ 4
Number of disks ≥1 ≥2 ≥3 ≥3 ≥4 (m indicates the number of
RAID 0 groups.)
22 Huawei Confidential
Erasure coding (EC )
Erasure coding (EC) is a data redundancy protection mechanism widely used in scale-out storage. Data written into
the scale-out storage system is divided into N data fragments, and M parity fragments are generated for the N data
fragments using EC. If M fragments are damaged in an EC group, the system implements data recovery from the N
fragments.
Compared with the multi-copy mechanism, EC improves both disk utilization and storage reliability, thereby cutting
costs. If N+M EC protection is used, the utilization rate of storage space is N/(N+M).
N* original data
N* original data fragments Any N* data
fragments fragments
Splitting Coding
M* parity fragments
23 Huawei Confidential
Contents
24 Huawei Confidential
Stable Services, Represented by Production Transactions, Require Powerful
and Reliable Storage
Carrier: Core billing systems carry a Finance: Transaction channel diversity brings
heavier load in the 5G era sharp transaction volume increase
Mobile Mobile
marketing banking
Mobile Network-wide Mobile phone
IoT devices IoT CDR
phone traffic CDR Emerging micropayment transactions increase
over 10x
User device growth: 3x CDR growth: 10x
24/7 service availability
25 Huawei Confidential
Agile Services, Represented by HPDA, Demand Efficient, Large-Capacity
Storage
L3 to L4 Each vehicle generates 64 TB of S3, NFS, and HDFS interfaces Requires high bandwidth and
50x more drive test mileage data daily. Massive data copy demands high OPS at once.
generates 50x more data. 100 PB data level requires efficient analysis. Ultra-low latency requires
more storage space. high performance.
26 Huawei Confidential
Intelligent Management: Rapid Data Growth and Various Devices
Complicate Management
Digital transformation faces increasing challenges, including diversified
applications, media, and devices. Data volume managed per capita
Enterprise storage New mass data storage increases by several times.
(structured data) (unstructured data) Manpower
5
Required
CRM ERP EDA Container HPC Big data PB
Stream
1 PB Monthly deployment time
PB 15 days
required:
Billing Manufacturing Video AI Monthly deployment time
processing
required: 3 days Data Volume
O&M management
complexity increases.
Media Network Architecture
Centralized Distributed
architecture architecture
Planning Building O&M Optimization
Composable architecture Survey and Segment-by- Labor-
5 persons, 2 nights
Hyper-converged analysis segment check consuming
Manual
architecture 2 months 2 hours 3 hours
deployment
27 Huawei Confidential
Data Security: With Digital Transformation in Full Swing, Data Protection
Becomes More Important than Ever
28 Huawei Confidential
Green Storage Is a Must to Achieve Its Carbon Peak and Carbon Neutrality
Goals
New energy methods to meet All-flash data centers to save energy and
carbon neutral targets reduce emissions
◆ Carbon neutral targets of major economies ◆ All-flash storage devices are becoming more ubiquitous in data
centers.
IDC Worldwide AFA ESS Market Forecast,
Value ($M), 2020-2025
According to
China EU US Japan
projections, the all-
Carbon peak Delivers the Rejoined the Announced the
flash market will grow
by 2030 Green Deal Paris Green Growth
Carbon Carbon Agreement Strategy by 9.6% to $14.8
29 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
DAS (Direct Attached Storage)
Direct Attached Storage (DAS)
DAS is a dedicated digital storage device attached directly to a server or PC DAS is used to expand the capacity of a single
via a cable, as opposed to storage accessed over a computer network. A server.
typical DAS system is made of a data storage device (for example, JBOF)
connected directly to a host through a host bus adapter (HBA). Between Typical scenarios:
the host and storage, there is no network device (such as a hub, switch, or Storing cold data at a low cost, for example,
router). DAS can provide block-level storage services to hosts. backup, archiving, and video security.
2 Huawei Confidential
DAS Types and Evolution
Built-in DAS External DAS Intelligent external DAS
Disk Disk
Disk RAID
function HBA HBA
Controller
RAID
Just a Bunch of Disks (JBOD)
• Built-in hard disks of the server • The hard disks are placed in an external • Controller chips are added to the DAS to
• A limited number of disks deliver storage device. offload the RAID function to the DAS.
small capacity. • More but still a limited number of disks. • Provide simple data management
• Only capacity is provided. The RAID functions.
function is still provided by servers. • Another name is DAS-RAID storage.
3 Huawei Confidential
Advantages and Disadvantages of DAS
Advantages
◼ Simplicity
DAS is connected to servers using cables for expansion, without the need for complex procedures, thereby
making it easy-to-use.
◼ Low cost
The price is more affordable than enterprise SAN or NAS.
Disadvantages
Following the data explosion and the new requirements in modern data centers, DAS has shown a lot of
disadvantages:
◼ Hard to scale Requirements of enterprise-
DAS can connect to one server (limited ports without network device, limited connected servers, and limited class storage:
connection distance).
◼ Inefficient utilization High scalability
DAS can be only accessed by a few servers and cannot share capacity or performance, resulting in data silos.
◼ Low reliability
High availability
As professional enterprise storage, DAS lacks disaster recovery (DR) features. High reliability
◼ Poor performance
Due to limited bandwidth and ports, the performance cannot be expanded on demand, consuming server Superior performance
computing resources. Easy to manage
◼ High management costs
Devices are managed one by one and cannot be centrally managed by management software. ...
4 Huawei Confidential
DAS Storage Evolution
DAS SAN/NAS
Server Server Server
Data silo Data silo Data silo • Improve scalability by network
Server Server Server devices. ... ...
• Can be shared among multiple
servers.
... ...
• Add rich DR features. FC/IP
• Achieve better performance. Switch Switch
• ...
Storage device
Emerged in 1970s Emerged in 1990s
Data is scattered and not shared. Data is centralized and shared.
5 Huawei Confidential
SAN Storage Overview
Definition:
Storage Area Network (SAN)
LAN bus 1. A network whose primary purpose is to transfer data
Application server File server Database server between computer systems and storage devices and
among storage devices.
6 Huawei Confidential
Advantages of SAN over DAS
◼ Excellent flexibility
Contain plenty of disks, connect huge number of servers, and support scale-out controllers and scale-up disks to increase
performance and capacity linearly on demand, as well as supporting long-distance connections.
◼ Efficient utilization
Storage resources can be shared among multiple servers, eliminating data silos.
◼ High reliability
Various DR and backup features are provided to enhance reliability, such as replication, snapshot, and E2E DIF.
◼ High performance
High-speed and high-bandwidth network ports offload RAID calculation from servers to storage.
◼ Easy to manage
7 Huawei Confidential
SAN Storage Types
By Front-End Protocols By Architectures
IP FC
8 Huawei Confidential
Comparison Among Different SAN Protocols
Type FC SAN IP SAN FCoE SAN IB SAN NVMe over Fabric SAN
From 1980s, the From about 2009, From about 2005, From 2017, providing high
From about 2001,
most common type, allowing the transfer of using in the performance for advanced
Others lower cost, around
around 75% market FC frames over Ethernet scenario requiring media such as all-flash and
20% market share.
share networks high bandwidth SCM.
9 Huawei Confidential
Comparison Between Centralized SAN and Distributed SAN
Item Centralized SAN Distributed SAN
Hardware Dedicated: General:
architecture Uses dedicated hardware. Supports universal hardware architecture and x86 servers.
Closed source:
Open source:
Software Uses closed-source software, which is updated only by
Supports both closed-source and open-source software.
vendors.
Network FC/iSCSI/NVMe/IB iSCSI
Limited scalability: Better scalability:
Scalability Supports scale-up and scale-out expansion, but with limited Supports thousands of nodes, EB-level capacity, and on-demand capacity
number of nodes. expansion or reduction.
To be improved:
Higher reliability:
Compared with traditional enterprise storage, the evolving architecture
Reliability Mature architecture design, dedicated end-to-end design, and
uses universal x86 hardware that has lower reliability and less robust DR
various DR features
features.
Unlimited scalability but high latency:
Limited performance but low latency:
Unlimited peak performance and high bandwidth, but higher latency
Performance Limited maximum performance because of the limit in
because of the complex network interconnection and data inconsistency
controller quantity, but with lower latency
between distributed nodes
Application Mission-critical applications, which need high reliability and Cloud-based applications, which need elasticity and high bandwidth,
scenario low latency, such as databases such as hosting service in ISP
10 Huawei Confidential
Comparisons Among DAS, SAN, and NAS
NAS
DAS SAN (Network Attached Storage)
JBOD
RAID RAID RAID RAID
11 Huawei Confidential
Contents
12 Huawei Confidential
SAN Storage Networking
I/O stack
Windows server Linux server AIX server Application
File system
Host layer ... ... Volume management
HBA HBA HBA Multipathing software
Hardware drive
HBA
Cables FC/IP Cables
13 Huawei Confidential
SAN Connectivity – Switch
Switch is the core component of a SAN, connecting servers and storage devices.
It allows for many-to-many automatic connections between senders and receivers, device name lookup, security, and
redundancy.
SAN Switch Selection Considerations:
What type? FC or iSCSI
How many ports? 48 or 96
How much bandwidth is required?
IP switch 16 Gbit/s or 32 Gbit/s FC, 10GE or 25GE IP
Physical partition or VLAN?
FC switch
Waterfall or mesh network?
IB switch
Broadcom
Mellanox Cisco
14 Huawei Confidential
SAN Connectivity – HBA
The host bus adapter (HBA) is a circuit board or an independent adapter which can:
• Provide a physical connection between a host server and compatible devices/networks.
• Perform Input/Output (I/O) processing.
• Transfer data between the connected devices and the host computer.
• Free up resources of the host computer by conducting the data storage and retrieval operations on its own.
15 Huawei Confidential
SAN Connectivity – Cable
Optical Fiber Cable Ethernet Cable (RJ45) AOC/DAC
16 Huawei Confidential
Contents
17 Huawei Confidential
SCSI Is the Basis of All
What is SCSI?
Small Computer System Interface (SCSI) is a set of standards for physical connection and data transfer between
computers and peripheral devices. The SCSI standards define commands, protocols, electrical, optical, and logical
interfaces. SCSI is most commonly used for hard disk drives and tape drives, but it can connect to a wide range of other
devices, including scanners and CD drives, although not all controllers can handle all devices.
18 Huawei Confidential
SCSI Development History
SCSI-1
◼ Released in 1983–1985
SCSI-2
◼ Common SCSI
◼ 7-bit bus ◼ Adopted in 1988–1994
SCSI-1 ◼ Up to 7 devices ◼ Evolved from SCSI-1
◼ Standard instruction set
◼ 16-bit bus
◼ Up to 15 devices
SCSI-3
SCSI-2
◼ Approved in 1993
◼ Compatible with SCSI-1 and SCSI-2
SCSI-3 ◼ Supports both parallel and serial data
transmission.
◼ Supports multiple transmission protocols,
such as FC and iSCSI.
19 Huawei Confidential
SCSI Transmission Model – Initiator and Target
Initiator Target
Link
Physical layer FC-0 ETH Lossless ETH
PHY
FC iSCSI FCoE IB
Header
FC frame SOF (destination ID, source ID, frame type, Data CRC EOF
frame control flag...)
iSCSI frame
Ethernet header IP header TCP header iSCSI header Data Ethernet trailer
21 Huawei Confidential
Fibre Channel Protocol
Fibre Channel (FC) is a transport layer protocol that is used to transfer data between computers and peripheral
devices. It has been primarily used for transporting SCSI packets from servers to SAN. FC was launched in 1988, and
acquired ANSI standard approval in 1994.
Advantages SCSI-3 Command
◼ Low latency
The lightweight protocol overhead of FC reduces FC-4 FC Protocol
transmission latency.
◼ High security FC-3 Common Fabric Services
The FC network is separated from the LAN for
higher security.
FC-2 Framing Protocol/Flow Control
Disadvantages
FC-1 Encode/Decode (8B/10B or 64B/66B)
◼ High costs
FC networks require dedicated adapters and 133 256 531 1 2 4 8 16 32
switches, and therefore are expensive to deploy. FC-0 Mbit/s Mbit/s Mbit/s Gbit/s Gbit/s Gbit/s Gbit/s Gbit/s Gbit/s
Support only two devices Support 126 devices Support up to 1,600,000 devices (FC
(Direct connecting) (FC hubs required) switches required)
23 Huawei Confidential
iSCSI Protocol
Internet Small Computer System Interface (iSCSI) is a transport layer protocol that describes how SCSI data should be transported over a TCP/IP network,
providing an interoperable solution that can take advantage of existing Internet infrastructure. iSCSI was pioneered by IBM and Cisco in 1998 and
submitted as a draft standard by Internet Engineering Task Force (IETF) in March 2000.
Advantages
SCSI-3 Command
◼ Low costs
With standard Ethernet, the iSCSI protocol eliminates the iSCSI
need for expensive and complex switches and interface
modules like FC, making it more affordable.
◼ High flexibility TCP
iSCSI can run over IP, making it easy to connect and expand.
IP
Disadvantages
◼ Low reliability ETH
Standard Ethernet suffers from packet loss, so it is not as
reliable as FC. However, iSCSI is fit for general-purpose 10 25 40 100
applications. 1 Gbit/s
Gbit/s Gbit/s Gbit/s Gbit/s
24 Huawei Confidential
FCoE Protocol
Fibre Channel over Ethernet (FCoE) is a storage protocol that enables FC Advantages
communications to run directly over Ethernet. FCoE makes it possible to
move FC traffic across existing high-speed Ethernet infrastructure and ◼ Simplified network structure
converges storage and IP protocols onto a single transmission cable and FCoE unifies input/output (I/O) interfaces and
interface. consolidates SAN and other traffic into the same
FCoE was approved by ANSI at 2009 and is rarely used today. network. This reduces the number of interface modules
and cables.
FC-4 FC-4
FC-2 FC-2
◼ High reconstruction costs
FC-1 FCoE Mapping ◼ FCoE is designed based on lossless Ethernet.
Customers are reluctant to change or replace their
FC-0 ETH legacy networks with FCoE.
FC stack FCoE stack
25 Huawei Confidential
IB Protocol
InfiniBand (IB) is a networking communications protocol that originated in
SCSI-3 Command
1999 and is used in high-performance computing that features high
throughput and low latency. It is utilized to establish data interconnections
between servers, between servers and storage devices, and between storage SRP
devices. Typically, it employs direct connection or switch networking modes.
IBA operation
Advantages SAR
◼ High speed
40 Gbit/s (QDR), 56 Gbit/s (FDR), 100 Gbit/s (EDR), 200 Gbit/s (HDR) Network
◼ Low latency
As IB reduces OS overhead, data can be transferred more quickly over the
Link
network.
Disadvantages PHY
◼ High costs
IB requires the dedicated adapter and switch. Generally, IB is more expensive 40 56 100 200
than FC. Gbit/s Gbit/s Gbit/s Gbit/s
26 Huawei Confidential
NVMe-oF Protocol
What is NVMe? NVMe is the best alternative to SCSI.
Non-Volatile Memory Express (NVMe) is an interface
specification between computers and non-volatile
memory (especially SSDs). It was first proposed by the
NVMe-oF
NVM Express group in 2011.
(www.nvmexpress.org)
27 Huawei Confidential
NVMe-oF/RoCE Protocol Stack
Software
NVMe command
UDP
IB network layer IB network layer
IP
RDMA/Flexibility
IB link layer Ethernet link layer Ethernet link layer
IB + IP RoCE v2
InfiniBand RoCE v1 RoCE v2
InfiniBand Lossless Ethernet Lossless Ethernet
Now
28 Huawei Confidential
NVMe-oF/RoCE Ecosystem
Category Component Status
✓Mellanox
NIC
✓Marvell
Servers NVMe-oF Driver ✓Linux: SUSE 15/15 SP1, Red Hat 8.0/8.1/8.2, Ubuntu 16.04.2 LTS…
✓Windows (third-party initiator required)
Multipathing software ✓VMware: VMware 7.0
✓Cisco
Network switch
Networks ✓Huawei
(support RoCE)
✓Mellanox
✓Huawei
SAN NVMe-oF/RoCE ✓NetApp
✓Pure Storage
29 Huawei Confidential
Trend of NVMe-oF Protocol
Protocol Latency Scalability Cost
NVMe-oF (FC) ★★ ★★ ★
NVMe/FC
NVMe NVMe-oF/FC NVMe-oF/RoCE NVMe-oF/TCP
NVMe/RoCE
Replace Replace Replace
NVMe/TCP
30 Huawei Confidential
SAN Protocol Comparison – FC for Now, NVMe-oF for Tomorrow
FC
iSCSI
FCoE
IB
NVMe-
oF/RoCE
In low-latency and high-reliability scenarios, FC is still the most popular protocol. However, NVMe-oF develops rapidly and will become
a mainstream protocol in high-throughput and high-flexibility scenarios.
31 Huawei Confidential
Contents
32 Huawei Confidential
SAN Storage Functions
Server
Value-added functions of LUNs
• Snapshot
• Clone
Data protection
• Replication LUN
SAN storage
• Metro
33 Huawei Confidential
Introduction to LUNs
In SAN storage, a logical unit number (LUN) is the unique identifier assigned to identify a logical unit. The storage
system partitions physical disks into parts with logical addresses and allows hosts to read and write data in the
partitions. In this way, a partition becomes a LUN, which is a logical disk created on a SAN storage system.
Application
SAN storage LUN group Host group server
system
LUN 0
SAN storage
LUN 1 Mapping view
networking
LUN 2
SAN storage divides storage space into A host created on the storage system represents Once the application server has been connected
multiple LUNs based on service an application server. Storage space can be to the storage system, it can scan LUNs to locate
demands. LUN groups are created and allocated to application servers after a mapping the storage space allocated by the storage
mapped to host groups for better between a host group and a LUN group has been system.
management. established.
34 Huawei Confidential
Introduction to Thin Provisioning
Logical virtual space
Thin Provisioning can dynamically
Server
allocate storage space on
Actual physical
demand when LUNs are in use, Storage
space
improving storage resource LUN
utilization. LUN
Pain points of traditional
allocation modes A LUN with the Thin Provisioning function is called
a thin LUN. After a thin LUN is created, the storage
• After being allocated to system does not immediately allocate physical
Mapping 1 2 3 4 5 6
specific LUNs, most of the storage space to the thin LUN. Instead, the storage
table system generates a mapping table to associate the
storage space remains D E F
logical address of the thin LUN with the physical
unused, resulting in wasted storage pool. In this way, space can be allocated
storage. dynamically based on servers' read and write
• Idle space is unavailable for D E F requests.
Thanks to thin LUNs, storage space can be allocated
new storage demands, so on demand, improving storage resource utilization.
space expansion is required,
incurring extra procurement Pool
costs.
35 Huawei Confidential
Application Scenarios of Thin Provisioning
⚫ For core service systems that have demanding requirements on business continuity, such as
bank transaction systems, intelligent Thin Provisioning function helps expand system capacity
online without interrupting ongoing services.
⚫ For services where it is challenging to accurately evaluate the potential size of system data,
such as email and web disk services, this function can assist with on-demand physical space
allocation, preventing space wastage.
⚫ For mixed services that have diverse storage requirements, such as carriers' services, Thin
Provisioning can assist with physical space contention, achieving optimized space configuration.
36 Huawei Confidential
Introduction to Tier
If the media performance varies in SAN storage, the Tier function supports dynamic data migration based
on data types (hot or cold) to achieve optimal global performance.
• High IOPS
Data migration policies:
• High capacity cost per terabyte Hot data migrated to the
Data with high access popularity performance tier • Time
The Tier function is widely used and helps reduce procurement costs significantly in non-critical service
scenarios.
37 Huawei Confidential
Introduction to Cache
The Cache function uses high-performance media storage space as the L2 cache between data disks and the cache to store read hot
data, improving the read cache hit ratio and read performance.
38 Huawei Confidential
Introduction to QoS (Flow Control)
QoS is also known as intelligent service quality control. It dynamically allocates storage system resources to meet specific performance
goals of certain applications. With the I/O priority scheduling policy and I/O traffic control policy, QoS ensures uninterrupted key
services.
I/O priority scheduling policy
If QoS is disabled, the I/O processing of
Application 1
key applications may be delayed,
High I/O priority
resulting in high latency and poor
Application 2 service experience.
Medium I/O priority
If QoS is enabled, I/Os of mission-
Application 3 critical applications are preferentially
Low I/O priority processed, delivering optimal
QoS disabled QoS enabled performance experience.
I/O traffic control policy
I/O enqueuing
Implementing bandwidth limits for
I/O queue of Application 1/User 1; Bandwidth: ≤ 100 Mbit/s specific applications or users ensures
Processing reliable service performance and
... dequeued I/O
Disk
requests minimizes the impact on the overall
I/O queue of Application n/User n; Bandwidth ≤ 20 Mbit/s performance of storage systems.
39 Huawei Confidential
Introduction to Deduplication
Deduplication is a data downsizing technology that deletes redundant data blocks in a storage system to save physical storage capacity,
meeting growing data storage needs. It includes inline and post-process deduplication.
Block 1 Block 2 Block 3 Block 1 Block 2 Block 3 Writes data onto disks
Write Similarity-based
deduplication opportunity
table
SFP 1 FP 1 SFP 2 FP 2 SFP 3 FP 3
FP* 1 FP 2 FP 3
Service handling during
off-peak hours
Comparison Fingerprint database Fingerprint database
Writes data onto Increases the Writes data onto Writes data onto Increases the Differential
disks reference count disks disks reference count compression *FP: Fingerprint
40 Huawei Confidential
Application Scenarios of Deduplication
• Deduplication requires high performance in fingerprint query and random data read/writes. Therefore, this
function is typically only available for all-flash storage systems.
• Virtual desktop infrastructure (VDI) is a common example of data deduplication. VDI creates virtual images on a
storage device that contain a large amount of duplicate data, quickly causing a lack of storage space.
Deduplication removes the duplicate data between images to release storage resources for more service data.
41 Huawei Confidential
Introduction to Compression
Data compression reduces occupied storage space by rearranging and compressing data without causing information loss, to improve
the efficiency of data storage, transfer, and processing.
• Common data compression algorithms include Huffman Coding, LZ77, Rice, and
Run Length Encoding (RLE).
Data
compression • Data compression is often used together with deduplication for VDI, virtual server
infrastructure (VSI), databases, development and tests, and file service systems.
42 Huawei Confidential
Introduction to Migration
This function is critical to service data migration. It migrates all service data on a source LUN to a target LUN without interrupting host
services. The target LUN can then fully take over the source LUN to run services after the replication is complete.
• The data migration function aims to migrate data from one
Migration
physical space to another so that the host can read and write data
in the new space in the future.
1. Create a migration
• Synchronization of modified data ensures the host writes new data
pair.
correctly to the new space during data replication.
Host I/O A B C A B C
access D E F D E F • LUN information exchange enables the host to write data to the
2. Perform data new physical space with no impact on services after data
replication. migration is complete.
Source LOG
Target • This function is often used when upgrading storage systems, or to
H I J
LUN LUN improve service performance, modify LUN properties, and balance
3. Synchronize data
changes. data.
0 1 LUN information 1 0
exchange
43 Huawei Confidential
Introduction to LUN Virtualization
This function simplifies management of storage systems as it supports the local storage to take over services from a heterogeneous
LUN. It also supports data migration between heterogeneous LUNs without interrupting services.
Virtualization • The local storage creates an external LUN using this logical space,
Application and maps this LUN to the application server, which can then
server External Logical Heterogeneous access the heterogeneous LUN through the local storage.
LUN space LUN
• LUN virtualization is mainly used to uniformly manage, migrate,
and protect data between heterogeneous storage systems. LUN
virtualization and migration work together to migration data from
heterogeneous storage system to local storage.
Physical
networking
44 Huawei Confidential
Introduction to Snapshots
A snapshot is a point-in-time copy of source data that is accessible by the host and can serve as a data backup. Snapshots are mainly
used to protect production data.
A B C A B C A B C
Main features of snapshots
Source LUN D E F D M F D E F • Snapshots can be generated
within a few seconds to obtain a
G H I G H N G H I consistent copy of the source
J K L J K L J K L data.
• Because snapshots do not
Snapshot Unauthorized contain complete physical data
Recovery
creation modification copies, and instead serve as a
reference, they do not occupy a
A B C A B C A B C large amount of storage space.
D E F D E F D E F
Snapshot
G H I G H I G H I
J K L J K L J K L
20:00 21:00
45 Huawei Confidential
Major Technologies of Snapshots
COW snapshot ROW snapshot
E New data
A B C D E A B C H I D E A B C D E A B C D E H I
• The Copy on Write (COW) technology uses the write-in-place mechanism to write new data to the original physical location. It also
copies the snapped historical data to another storage space, causing extra cost of data migration and reducing write performance.
• The Redirect on Write (ROW) technology uses the redirected-write mechanism, which writes new data directly and points the
metadata content to a new physical location. This ensures the snapped historical data does not need to be migrated when writing
new data.
• ROW facilitates high-density snapshots, snapshot cascading, and other technologies. It reduces the impact of snapshots on write
performance but its impact on continuity of data reads makes ROW more suitable for flash storage with high random read
performance.
46 Huawei Confidential
Application Scenarios of Snapshots
⚫ Snapshot is one of the most commonly used technologies to protect service data.
⚫ In data backup systems, snapshots are often used for incremental backup.
⚫ Backup storage usually uses snapshots for data copy reuse.
⚫ Secure snapshots are used for ransomware protection.
47 Huawei Confidential
Introduction to Data Cloning
Clones are a full copy of the source LUN data at a specific point in time. This copy is instantly accessible by the host and acts as a point-
in-time data backup.
Snapshot • The storage system can create a clone within a few seconds to
obtain a consistent copy of the source data. The clone can be read
A B C and written immediately.
2. Create a 3. Copy data to • Differential copies are supported to ensure data consistency
snapshot of the the target LUN. between the source and target LUNs before the clone pair is split.
source LUN. Clone pair splitting is also supported without service interruption.
1. Create a • Data cloning is often used to back up the source LUN data at a
A B C clone pair. A B C specific point in time, but also for data analysis of production data,
Source LUN Target LUN without impacting the production LUN.
48 Huawei Confidential
Introduction to Remote Replication
Remote replication synchronously or asynchronously replicates data from the primary LUN at the primary site to the secondary LUN at
the DR site for remote data backup and DR. It is one of the core DR and backup technologies.
Production • When the production storage at data center A, the primary site, is
data faulty, services can be switched to data center B.
Replication pair
• There are synchronous and asynchronous remote replication
modes. The synchronous mode writes data to the primary and
Secondary secondary LUNs at the same time. The asynchronous mode
Primary LUN periodically synchronizes incremental data from the primary LUN
LUN
to the secondary.
49 Huawei Confidential
Application Scenarios of Remote Replication
⚫ Remote replication is essential to DR and backup. All production storage systems should be configured using this
function to protect production services against data loss and avoid any serious impact on production and life.
⚫ The production storage and DR storage can be deployed in two data centers far away from each other, to provide
protection against data center-level disasters. They can also be deployed in the same data center to make the local
storage highly available.
⚫ Synchronous replication has a slight impact on production services. Typically, the active and standby data centers
should not be far from each other. There is no distance limit to asynchronous replication.
50 Huawei Confidential
Introduction to Metro Clustering Function
This function allows two data centers to back up each other while they are both running. Unlike traditional DR services, if there are
faulty devices in one data center or if the data center is in faulty status, the other data center will automatically take over services. This
ensures high data reliability and service continuity, and improves utilization of the storage system resources.
51 Huawei Confidential
Application Scenarios of Metro Clustering Function
⚫ The metro clustering function is also one of the most important DR and backup functions. To
protect core production services against interruption and loss, it is advised to configure this
function for all core production storage systems.
⚫ Active-active data centers can be separated at a distance of 50 km to 300 km, depending on the
application scope.
⚫ Active-active environments are common in finance, carrier, government, and healthcare.
52 Huawei Confidential
Contents
53 Huawei Confidential
SAN Storage Products
SAN storage products mainly comprise all-flash, hybrid flash, and scale-out storage.
Scale-out storage
Huawei OceanStor
H3C UniStor X10000
Pacific Red Hat Ceph
EMC ScaleIO
54 Huawei Confidential
Typical Application Scenarios for SAN
55 Huawei Confidential
SAN Deployment for Databases
Key requirement
Data center 1 Data center 2
◼ High performance
IP
SAN databases typically require minimally
IP
WAN 200,000 IOPS to process thousands of
Oracle RAC SQL Sysbase Oracle RAC SQL Sysbase transactions every second.
server 1 server server server 2 server server
◼ High reliability
Data center–level DR is required as
databases are often business-critical.
Active-active
SAN solution
◼ All-flash SAN storage
FC switches FC switches All-flash SAN storage provides extremely
high IOPS and low latency
(< 1 ms).
◼ Active-active/snapshot
IP
FC A-A setups provide excellent DR services
Mirror FC with zero RPO and RTO. In addition,
SAN storage SAN storage snapshots are configured to avoid logical
errors in data.
56 Huawei Confidential
SAN Deployment for VSI
Data center 1 Data center 2 Key requirement
◼ High performance
IP IP
WAN Each VM requires 20 to 50 IOPS. Therefore,
VMware FusionSphere VMware FusionSphere thousands of VMs require that SAN provides at least
100,000 IOPS.
◼ Data protection
Many applications are running on the SAN storage.
In the event of storage failure, data loss must not
exceed 30 minutes.
SAN solution
57 Huawei Confidential
SAN Deployment for VDI
Key requirement
◼ Performance
IP
Performance demands vary between virtual desktops and
applications. Typically, each desktop system requires 15 to 17
VMware Horizon
IOPS, and each data disk requires 3 IOPS.
Citrix
◼ High scalability
FusionAccess
Storage capacity and performance are required to expand on
demand as the number of virtual desktops increases.
SAN solution
58 Huawei Confidential
Thank you. Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1. NAS Overview
2. NAS Technology
3. NAS Products
4. NAS Applications
1 Huawei Confidential
What Is NAS?
NAS, or network attached storage, is a framework that shares storage resources over a network and acts as a file
server for file access.
Features:
• Easy to use, no need for dedicated IT
experts
IP network
• Cost-effective, using IP switches
• Secure and reliable
RAID
• Easy data backup and recovery
NAS storage
2 Huawei Confidential
History of NAS
The development of the Internet has created a need for unstructured data sharing, giving rise to the popularity of NAS
storage.
1946 - World's first 1974 - Invention of TCP/IP. 1984 - Sharing of network 1990 - The Internet connected
computer, but no 1979 - Duke University first implemented file servers achieved by IBM, Novell, commercial and enterprise
network. sharing without media. Microsoft, and 3Com. networks.
3 Huawei Confidential
NAS Evolution
Huawei
Sun NetApp
Distributed NAS Startups Second-generation distributed NAS: Huawei
Microsystems Filer (first NAS
Isilon/GlusterFS WushanFS (renamed OceanStor 9000 OceanStor V5 NAS
NFS product)
in 2013)
1984 1988 1990 1993 2000 2006 2010 2011 2014 2018 2021
4 Huawei Confidential
Differences Between DAS, SAN, and NAS
RAID
Data package Block Block File
offload
File sharing,
Small-scale Database and
Scenario archiving, and
servers VMware
backup
DR solution
Low High, dedicated High
(complexity)
5 Huawei Confidential
NAS Components
• External server
a. DNS server
b. AD/LDAP server
• IP switch Switch
• NAS client
a. Server/Mainframe
b. Computer
AD
c. Printer
NAS
d. Scanner storage
External server
6 Huawei Confidential
NAS Storage Software
• OS kernel
a. Windows NAS share (CIFS and NFS)
Web management
b. Linux
• Configuration
• Storage management
File system • View
a. RAID 0, 1, 10, 5, 6, 50
• Monitoring
b. EC (N+M)
c. Multi-copy • Statistics
Storage management • Troubleshooting
• File system RAID/Pool
a. OceanStor FS
b. Quota and WORM
• NAS share OS kernel (Windows and Linux)
a. CIFS, NFS, FTP, and HTTP
• Web management NAS hardware (CPU, cache, disk, and GE switch)
7 Huawei Confidential
File System
8 Huawei Confidential
Network File System
File system client File system client File system client File system client
Network protocol
IP switch
IP switch
NAS engine
...
Integrated storage and compute device
NAS storage SAN storage
Storage switch
NAS Type Device Model Scale-out RAID/EC Scenario Main Product Huawei
Integrated compute and storage
device (x86 server), no Dell EMC PowerScale
Distributed independent controller or
Up to 4000 EC (N+M)/Multi-copy Cloud and big data
Ceph
OceanStor Pacific
gateway
Controller + disk (capacity File sharing, archiving, and NetApp FAS/AFF OceanStor Dorado/OceanStor
Centralized expansion)
≤ 24 General RAID
backup Dell EMC Unity hybrid flash storage
10 Huawei Confidential
Contents
1. NAS Overview
2. NAS Technology
3. NAS Products
4. NAS Applications
11 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
NFS HDFS
Network File System (NFS) is a distributed file system protocol developed by Sun Microsystems (Sun) in 1984. It is
an open standard defined in a Request for Comments (RFC), which means anyone can implement the protocol.
In 2003, Sun Microsystems transferred NFS protocol development to the Internet Engineering Task Force (IETF).
NFSv4.1
NFSv4
NFSv3 5661
NFSv2 3010 + 3530
NFSv1 1813
1094
Version/RFC#
12 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
NFS Evolution NFSv4.1 (RFC 5661) HDFS
NFSv4 (RFC 3530) 1. Enhanced agents
NFSv2 (RFC 1094) NFSv3 (RFC 1813) 1. TCP only a.Directory lease
1. UDP only 1. UDP and TCP 2. State mechanism b.Optimized reapplication and denial agent NFSv4.2
2. Stateless 2. 64-bit files 3. Client cache operations 1. Application I/O hints
3. 2 GB file read and 3. Asynchronous write (commit) 4. NFS server namespace c. File/directory notification mechanism 2. VAAI and ODX applications:
write 4. READDIRPLUS (virtual root directory) d.Clients' agent selection server offload read and write
4. NLM-dependent lock 5. More info in file properties to 5. Kerberos authentication 2. Session and multichannel mechanism 3. MAC: labeled NFS
mechanism prevent repetitive interaction 3. ACL enhancement 4. Space reservation
6. NFS ACL
6. Client authentication 7. File locking and share 4. Data retention 5. Sparse files
reservations 5. Notification of availability of byte-range locks 6. Application Data Block (ADB)
8. Replication and migration 6. Multi-server namespace (location, referral)
13 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
NFS Working Principles HDFS
NFS implements remote communication based on the Remote Procedure Call (RPC) protocol. RPC uses the client-server
model.
Users and
1. The RPC client sends a call request with
applications
parameters to the RPC server and waits
File operation request and for a response.
reply NFS server 2. Upon receipt of the call request, the RPC
NFS client server obtains the process parameters,
outputs the calculation results, and sends
NFS request and reply the reply to the client.
3. The RPC client receives the reply and
RPC client RPC server
RPC request and obtains the call results.
reply
14 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
NFS Version Differences HDFS
15 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
SMB Evolution HDFS
• Server Message Block (SMB) is a protocol for network file sharing. One of the most popular versions is Microsoft SMB.
• The Common Internet File System (CIFS) Protocol is a dialect of SMB. Both SMB and CIFS are also available on ESXi, Unix, Linux and
Mac.
MS WIN WIN
DOS XP VISTA WIN7 WIN 8.1 WIN 10
1988 1992 1996 2000 2001 2003 2007 2008 2009 2012 2013 2016
16 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
NFS vs. CIFS/SMB HDFS
Security Authentication Client IP, domain user Local user, domain user
17 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
HDFS HDFS
HDFS (Hadoop Distributed File System) was designed and developed based on a Google File System (GFS) paper. In
addition to the features of other distributed file systems, HDFS provides:
…
Who is using HDFS
18 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Hadoop HDFS Architecture HDFS
Data node
Hadoop file management
⚫ A file is split into blocks (default size: 64 MB), and each block has multiple
Client copies stored on different machines. The number of copies can be
specified (default: 3) when the file is being generated. This ensures data
reliability.
⚫ A file cannot be modified after being created, written, or closed.
19 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Quotas HDFS
20 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Quota Levels HDFS
21 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Quota Working Principles HDFS
Hard quota Y Y Y
22 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
WORM HDFS
Write Once Read Many (WORM) is a data Differences between WORM files and
protection mode. After data is written, the file common files
enters the protection mode through manual setting Operation WORM File Common File
or after a certain period of time.
Read
Modify
What applications support WORM?
Delete
23 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
WORM Modes HDFS
documents.
24 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Global Namespace HDFS
Global namespace
namespace.
File systems
File systems
25 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
DNS HDFS
• DNS
The domain name system (DNS) is a network service that Domain name resolver
translates domain names into IP addresses.
• Benefits
✓ Access to the Internet without having to remember
each IP address
✓ More balanced access, no single-point bottleneck
26 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
DNS-based Load Balancing HDFS
Client
DNS server • Principles
1. A user uses a domain name to access NAS services.
2. The DNS client sends a DNS request to the DNS server to
obtain an IP address based on the domain name.
Frontend 3. The DNS server selects an IP address and returns it to the
service client.
network
• Load balancing policies
NAS storage
1. Round-robin
2. CPU usage of each node
3. Number of connections of each node
4. Port bandwidth usage of each node
5. Comprehensive load of each node
Node 1 Node 2 Node 3 Node 4
27 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Embedded and External DNS Servers HDFS
28 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
NAS Audit Logs HDFS
NAS audit logs are used in security audit scenarios to trace each file operation. When a file is accessed, the system
records the operation in NAS audit logs.
• File operations:
a. Create, delete, and rename
User A User B
b. Open and close
c. Read and write
d. Get attributes (Get_attr) and set attributes
• Operation time (Set_attr)
• Operator Syslog server
• Operation type Transmission e. Get security attributes (Get_security) and set
Audit logs
security attributes (Set_security)
29 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Multi-Tenancy HDFS
Pain points
• Security issues arise when enterprises or users use the same physical storage device and access or interfere with each other's
logical resources.
• IT service providers need to pay extra costs to manage users.
4. NDMP service
Each service can be disabled and enabled separately.
Physical storage system
30 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Multi-Protocol Access HDFS
Multi-protocol access enables Windows, Linux, and Unix clients to access the same directory or file at the same
time.
31 Huawei Confidential
NAS Protocol Key Technologies
NFS SMB
Multi-Protocol File Sharing HDFS
Management
32 Huawei Confidential
Contents
1. NAS Overview
2. NAS Technology
3. NAS Products
4. NAS Applications
33 Huawei Confidential
Centralized NAS: OceanStor Dorado
OceanStor Dorado all-flash unified storage sets a new benchmark with its industry-leading stability, SAN and NAS performance, intelligence, and efficient
Overview
management and O&M.
• OceanStor Dorado 3000 is an entry-level storage product, boasting high cost-effectiveness to expand its footprint in the market.
• OceanStor Dorado 5000 and OceanStor Dorado 6000 are mid-range storage systems that outperform competitors with their high quality and high density.
• OceanStor Dorado 8000 is an entry-level high-end storage system. Its stable architecture and competitive mid-range pricing are key to expanding its market share.
Products • OceanStor Dorado 18000 is a high-end storage system. Its stable architecture, top-notch performance, and intelligence are key qualities that allow it to expand its
presence in high-end markets and empower benchmark projects for core NAs.
NAS Focusing on high-performance NAS scenarios, such as EDA simulation, carrier CDRs, and financial data exchange platforms
34 Huawei Confidential
Scale-Out NAS: OceanStor Pacific Series
High-performance Content resource pool Log retention Smart city Virtualization/Cloud
resource pool Database
computing Backup &
Application Web disk
archiving
layer
NFS/SMB
S3 HDFS SCSI/iSCSI
/POSIX/MPI-IO
File storage service Object storage service HDFS storage service Block storage service
Software SmartEncryption SmartAuditlog SmartInterworking Recycle bin SmartIndexing MultiPool SmartDedupe SmartCompression
layer
HyperReplication
Object Versioning SmartTakeover HyperSnap HyperReplication (A) HyperSnap HyperClone HyperMetro
(S)/(A)
35 Huawei Confidential
Contents
1. NAS Overview
2. NAS Technology
3. NAS Products
4. NAS Applications
36 Huawei Confidential
Energy Exploration
Data collection Data Data
Result processing Data archiving
and import preprocessing analysis/processing
Seismic data collection Seismic data processing Seismic data interpretation/reservoir simulation
Reservoir Backup and
Regular Pre-stack Post-stack Seismic data Well data simulation & archiving
Service Data import processing migration modification interpretation interpretation imaging
process Result data
Service I/O model: GB-level files, sequential large I/Os Image loading: 100,000 IOPS
Data size: 1–20 TB/day
requirements Large bandwidth: 2–20 GB/s (per PB) Latency: ms-level response
37 Huawei Confidential
Gene Sequencing
Service process Data
Data collection High-performance computing (HPC) HPC-AI/big data Data archiving
preprocessing
Sample Library AI-/big-data-assisted Data archiving
preparation Format Sequence Mutation diagnosis and treatment
preparation
conversion alignment analysis Permanent retention 5-year retention
0.5 hours 4.5 hours
4.5 hours 12–72 hours 2–6 hours
BCL format FASTQ file BAM/SAM file VCF file AI model XXX file
Service requirements
Archived data amount
AI training &
100 GB/sample inference
10 PB/device
Intermediate data amount Low cost and automatic
1 PB/year/device Single thread: 6+ GB/s Strong demands for
5 PB/year/device management
Compressed genetic data transfer file systems
38 Huawei Confidential
Autonomous Driving
Service process and requirements
• Scenarios involving AI training: OceanStor Pacific 9920/9950 + OceanStor Pacific 9546/9550 + automatic
Solutions tiering
• Common scenarios: OceanStor Pacific 9546/9550
39 Huawei Confidential
Non-Linear Media Editing System
Production Long-term
Ingesting system Editing system
system archiving
40 Huawei Confidential
EDA System
User
NAS applications
Client (VM) Computing (physical)
EDA • EDA development
software • EDA test
Cadence Service features
Task Short (< 3 hours)
submission Synopsys
Mentor • Mass small files: > 4 billion
Task management
and scheduling (IBM LSF) • File size (95% of files) < 128 KB
Result return Normal (< 24 hours) License • Concurrent access, high OPS, and low
obtaining latency
Task
Active Standby scheduling Solution: OceanStor Dorado
License server
Long (> 24 hours)
NAS
Red Hat Linux CentOS
NFS 10GE
NAS storage
resources
Archiving
41 Huawei Confidential
Medical PACS System
Doctors' terminals Image capture Technicians
Medical X-ray MR/MRI
Clinical Outpatient
treatment
process UCG EMG ECG
42 Huawei Confidential
Video Security System
Direct storage/dump
Solutions
• Dump: OceanStor Pacific 93xx
• Direct storage: IVS3800
43 Huawei Confidential
Big Data Analysis
Solutions
• OceanStor Pacific 9546/9550 big data
Native HDFS storage
Storage layer
HDFS storage
44 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Security level:
Contents
2 Huawei Confidential
Storage Trends: Unstructured Data Surge
Users: > 800 million
Douyin Daily active users: > 600 million
Monthly active users: > 1.9 billion
Tik Tok Avg. video searches per day: > 400
180 ZB > 80% million
New data in 2025 Unstructured data
• There has been an explosion in users, videos, and capacity.
Unstructured • Videos require quick storage and retrieval.
data • Videos require tagging, categorization, and analytics.
• User preferences are created from usage history for
Structured data customized video recommendations.
2005
2005年 2010
2010年 2015
2015年 2020
2020年 2025
2025年 • The most popular topics will be updated dynamically.
20%
• Data is accessed through mobile apps.
3 Huawei Confidential
Object Storage Harnesses Internet and Mass Data
• Limitless scalability
✓ Storage of tens of billions of objects
Unstructured data surge ✓ Linear expansion on demand for
capacity and performance
• Storage must provide large capacity
and scalability on demand to handle
sudden data growth. • Customized
• Unstructured data must have attributes
metadata for tagging, classification, ✓ Identified by unique
object IDs Object
and analytics. Object
✓ User-defined attribute
fields
Interactive online access
• Universal access
• Data centers must support access across ✓ Online device access
Object storage
regions. anytime and anywhere
• File systems (NAS) are designed for
human-machine interaction, meaning they
struggle to handle M2M interactions, such
as data sharing and management. • Flexible connection
✓ RESTful API, HTTP, HTTPS
4 Huawei Confidential
Object Storage Surpasses NAS for Mass Data
NAS storage Object storage
Server
Shared directory Direct visit
Access
App App • Servers • Support for different
• App access through devices
shared directories Networks IoT Mobile
Directory
Protocols
CIFS/NFS
HTTP/HTTPS
• Complex protocols HTTP/HTTPS (RESTful API)
NFS/SMB/POSIX • Incompatibility with
• URL address
• Simple flexibility
different OSs
Network
Private Public/Private
LAN Internet
• Private connection • Public/private connection
• Within LANs • Unrestricted networks
Organization
• Retrieval • Simple file
performance of directories
files or directories • Better scalability Object
impacted by growth
5 Huawei Confidential
What Is Object Storage?
Object storage simplifies management and reduces costs by eliminating hierarchies for unlimited
cloud storage of unstructured data.
Object identifier
Item Description
Object identifier
Object name
(OID)
• Data is stored as objects.
Object attributes, such as object size, access permissions, and
• Data is contained in a flat address space. System metadata
creation time
• Bucket/Object
• Easy scalability User metadata Additional object information about applications
6 Huawei Confidential
Objects with Data and Metadata
Object
7 Huawei Confidential
History of Object Storage
• IBM acquired Cleversafe and
launched object storage COS.
NetApp acquired Bycast • The Ceph community
(an object storage startup) Inktank released
EMC launched content- HDS acquired ArC released a basic commercial
and renamed it Ceph enterprise Huawei launched
addressed storage (CAS) software from Archivas version.
StorageGRID. edition. FusionStorage 7.0
to manage mass data and and renamed it HCP
object storage
Centera (a CAS-based object storage in 2009.
supporting S3.
product) for archiving.
1996 2002 2006 2007 2008 2010 2012 2013 2014 2015 2016 2019 2021
Carnegie Mellon
University (USA) Amazon released AWS (S3)
proposed object EMC released Atmos
object storage, which Huawei launched Huawei launched
storage as a S3, which is mainly
officially introduced object OceanStor 9000 OceanStor Pacific, the
research project. used in cloud Huawei launched its
storage as a cloud storage V300R005 file next-generation scale-
The University of services and first self-developed EMC released ECS,
service and introduced it storage, supporting out storage system
California, Berkeley, backup/archiving object storage solution supporting S3 and
into the cloud computing NFS, S3, and Swift. supporting S3 and
then launched a scenarios. — OceanStor UDS — Swift, which still
field, setting an industry lossless interworking
similar program. supporting EB-level receives iterative
standard for Internet access with NAS and HDFS.
scalability. upgrades today.
to object storage.
8 Huawei Confidential
Distributed Architecture vs. Gateway Architecture
The distributed architecture provides object storage
without additional gateways.
⚫ Distributed storage
Gateway architecture Distributed architecture Object mapping for file systems is eliminated to
shorten access latency.
Object gateway
⚫ Concurrent access
Object APIs Distributed storage improves over object gateways
and NAS architecture by making the network fully
Protocol
conversion Object APIs redundant and eliminating single points of failure
for better concurrent access.
File system
⚫ Scale-out
Capacity and performance increase linearly with
nodes, which are unrestricted by file system size.
• DELL EMC PowerScale • DELL EMC ECS
• IBM COS • Huawei OceanStor Pacific
• NetApp StorageGRID • Red Hat Ceph
9 Huawei Confidential
API Types
⚫ Amazon S3 is an open object ⚫ Swift is an object storage API in ⚫ CDMI is a cloud storage API
storage protocol of Amazon AWS the OpenStack cloud computing released by the Storage
and is the de facto standard of framework. Networking Industry Association
object storage. (SNIA).
10 Huawei Confidential
AWS S3: A Standard Protocol for Object Storage
Account
User 1
• Amazon S3 is an open protocol launched by User 2
Concept Description
Bucket A bucket is a container for storing objects, eliminating the nested structure and container hierarchies.
11 Huawei Confidential
AWS S3 APIs: Request and Response Instances
Operation Format Instances
Setting the region of a bucket
PUT / HTTP/1.1 Request HTTP/1.1 200 OK Response
User-Agent: Jakarta Commons-HttpClient/3.1 Server: OBS
Host: example.obs.example.com
x-obs-request-id: 001B21A61C6C00000134029F41D1527F
Accept: */*
x-obs-id-2:
Date: Sat, 03 Dec 2011 07:31:58 +0000
PUT MDAxQjIxQTYxQzZDMDAwMDAxMzQwMjlGNDFEMTUyN0ZB
Authorization: OBS QUFBQUFBQWJiYmJiYmJi
BF6C09F302931425E9A7:QBaO+tS/76QYHVnUoxvf9EPH/3o=
object Location: /example
Content-Length: 149
<CreateBucketConfiguration xmlns="http://obs.example.com/doc/2015-06- Date: Sat, 03 Dec 2011 07:31:58 GMT
30/"> Content-Length: 0
<Location>china</Location>
</CreateBucketConfiguration>
12 Huawei Confidential
OpenStack Swift: Similar to AWS S3
Account
User 1
⚫ Swift is a distributed storage module of OpenStack.
User 2
⚫ The module consists of an account, a container (also a buck in
AWS S3), and an object layer.
⚫ Uses HTTP/HTTPS RESTful APIs. Container Container
... ...
Object Object Object Object
Description
The top layer of the hierarchy. The service provider creates an account and grants ownership of the resource to the user. The account
Account defines namespaces for containers. Containers in different accounts are allowed to have the same name.
Container Create namespaces for objects. Objects in two different containers can share the same name, but they represent two different objects.
13 Huawei Confidential
Contents
14 Huawei Confidential
Data System
Data Access
Protection Management
Important Concepts
• Bucket: A bucket is a container for storing objects. It can be
Account considered as a directory that can be accessed through the
network. Buckets cannot be nested, thereby avoiding complex
Network
multi-layer structure.
User User • Object: Objects represent data and are regarded as files that can
be accessed through the network. An object is always stored in a
bucket.
Bucket Bucket Bucket
Object
Object Object
Object
Object • Account: An account should be obtained before using the object
Object
Object Object Object storage service (compatible with Amazon S3 APIs), and acts as the
owner of resources.
S3
Bucket
Bucket
Object
Object
Service host Object
S3 Object
APP
2. Customer-developed
API Bucket
software (API)
SDK (C, Python, S3 Object Object System
Object
Java, PHP) Key
metadata
Object User-defined
metadata
Data
S3
16 Huawei Confidential
Data System
Data Access
Protection Management
www.Huawei.com
A unified domain
name
Object
Object
Cluster 1 Cluster 2 Cluster 3 Cluster N Object storage Object
Object
Object resource pool Object
Node 1 Node 1 Node 1 Node 1
17 Huawei Confidential
Data System
Data Access
Protection Management
18 Huawei Confidential
Data System
Data Access
Protection Management
Versioning
The object uploaded for the third time
after versioning is enabled • Function
Disabled • Status
Different statuses
19 Huawei Confidential
Data System
Data Access
Protection Management
20 Huawei Confidential
Data System
Data Access
Protection Management
21 Huawei Confidential
Data System
Data Access
Protection Management
Cross-Site DR
Cross-site DR type Features
⚫ Multi-active DR ⚫ Multiple sites carry services at the same time, tolerating site-level
✓ Multi-active replication: Multiple sites work in active-active mode. faults.
Each site has one copy of data. ⚫ The distance between sites is long — measured in thousands of
✓ Cross-site EC: Multiple sites work in active-active mode. One data kilometers.
slice is distributed across multiple sites, and multiple sites share one ⚫ A global namespace allows any site to access the same object.
copy of data. ⚫ Different DR types can be set for different buckets. Multi-active, multi-
⚫ Remote replication: Sites work in active-passive mode, supporting active- site EC, and remote replication can coexist to meet different SLA
standby switch. Each site has one copy of data. requirements.
9-site EC
Triple-active Active-active
22 Huawei Confidential
Data System
Data Access
Protection Management
Quota
Object storage uses the quota function to limit the
resources occupied by buckets and tenants.
Object storage • Quota
2 TB 10 TB 8 TB 5 TB
• Notification
Bucket 1 Bucket 2 Bucket 3 Bucket 4 ✓ An alarm or event is triggered when resources are occupied.
23 Huawei Confidential
Data System
Data Access
Protection Management
• Object storage billing records the operations of end users and the size
of data stored by end users, and generates service detail records.
Billing center
✓ Billing services are mandatory for object storage and you only pay for what you
use.
✓ Object storage generally provides open APIs, such as SFTP, which upper-layer
billing uses to access object storage and obtain data for fee calculation.
✓ Inbound bills record the resource utilization of end users. Object storage saves
a capacity record for each uploaded object in the inbound bill file.
24 Huawei Confidential
Contents
25 Huawei Confidential
Huawei OceanStor Pacific Series Builds an Optimal Storage Foundation
for Diversified Mass Data
High-performance Content resource pool Virtualization/
Database
computing Backup & Log retention Smart city Cloud resource pool
Web disk
Application archiving
layer
NFS/SMB
/POSIX/MPI-IO S3 HDFS SCSI/iSCSI
File storage service Object storage service HDFS storage service Block storage service
Self-encrypting drive
SmartTier SmartQuota SmartQoS SmartEqualizer SmartMulti-Tenant SmartThin SmartQoS
(SED)
Software SmartEncryption SmartAuditlog SmartInterworking Recycle bin SmartIndexing MultiPool SmartDedupe SmartCompression
layer
HyperReplication
Object Versioning SmartTakeover HyperSnap HyperReplication (A) HyperSnap HyperClone HyperMetro
(S)/(A)
26 Huawei Confidential
Contents
27 Huawei Confidential
Backup and Archiving of Massive Data Improve Data Recoverability with
Lower Storage Costs
Production Office
Online data Scenario description
• Backup: Object storage replaces tape libraries to retain data for a long time,
providing high availability and improving data recoverability.
• Archiving: Object storage saves important but rarely accessed data, such as
Backup/Archive design, regulatory, and financial documents. For data with low usage
data Backup/Archive data frequency, it is important to achieve a balance between cost-effectiveness and
availability.
Storage requirements
Production Office
• Security: WORM, audit logs, and encryption
Online data
• Availability: tolerance for site-level faults
Object storage • Cost: high space utilization and massive scalability
Backup/Archive
data Backup/Archive
data
Solution
• OceanStor Pacific 9550/9540
Application 2 Backup media server
28 Huawei Confidential
Content Storage Is Oriented to Massive Data, Replacing NAS to Improve
Access Efficiency
Scenario description
Email Check image Traffic checkpoint Media • The enterprise management system for electronic content is oriented to large-scale
digital content directory services, such as the PACS system in the healthcare industry
and check images and dual-recording in the financial industry. The data types are
documents, images, and videos.
• Based on the service log workflow, the system comprehensively manages
Video unstructured data and provides search and file management functions.
Music VOD surveillance Storage leasing
• The number of files increases from tens of millions to billions.
Storage requirements
• Performance and high scalability
Multi-tenancy ✓ Billions of objects, second-level latency
✓ Metadata retrieval: It takes less than 1s to retrieve billions of objects.
✓ QoS guarantee
• Availability: active-active, tolerating site-level faults
Object storage
Solution
• OceanStor Pacific 9550/9546
29 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Security level:
Contents
1 Huawei Confidential
Why Is Business Continuity Important?
Consider the following example. Assume as a senior executive you need to handle the following incidents:
4. Medical records are unusable due to damage to the tape library (healthcare).
...
All of these incidents impair business, including data loss, downtime, and impacts to brand image. What is
the solution?
2 Huawei Confidential
The Necessity of DR – Direct Benefits
Cost of downtime/hour
Apple Google
Amazon iCloud storage Full breakdown
Two breakdowns breakdown Global traffic
The amount of The number of decrease in 5
Loss ($) affected users minutes
7,000,000 3,000,000 40% 648
280
Source: Huawei MI 200
160
63 110
From conventional DCs to cloud environments, downtime resulting from a 9
disaster (natural, human-error, equipment failure, or cyber threat) can cause (Unit: US$10,000)
financial and reputational repercussions. Customers require 24/7 business Media Healthcare Retail Manufacturing Telecom Energy Finance
continuity and data protection. Source: Network Computing, the Meta Group and Contingency
Planning Research
3 Huawei Confidential
Key Parameters Used to Measure Business Continuity – RPO and RTO
The recovery point objective (RPO) is the amount of data loss The recovery time objective (RTO) is the maximum length of a time it
that an enterprise can tolerate losing. This threshold is typically should take to restore systems to normal conditions in order to avoid
represented by a time value. further or unacceptable consequences caused by downtime.
4 Huawei Confidential
Two Major Standards of DR Construction
RPO: the amount of data loss caused by downtime RTO: the time period of downtime
Information Security Technology – Technical Requirements of
IBM's SHARE 78 Seven Levels of Disaster
Disaster Recovery Specifications for RPO RTO the Classified Protection of
Recovery (International)
Information Systems (China) Cybersecurity 2.0 (China)
Tier 6 – Zero data loss and services are Tier 7 – Zero data loss and services are Level 4
0 < 15 min Local backup + remote
automatically started automatically started
backup + local high
Tier 5 – Zero data loss Tier 6 – Zero data loss 0–30 min < 2 hours availability (HA) +
remote service HA
Tier 5 – Real-time status update in the DR DC 2–12 hours < 24 hours Level 3
Tier 4 – Electronic transmission and full device Local backup + remote
support real-time backup + local
Tier 4 – Active DR DC 2–24 hours < 24 hours service HA
5 Huawei Confidential
Differences Between Backup, DR, and Archiving
Backup: DR:
✓ Recovery of lost and damaged data ✓ Recovery to the nearest running time
✓ Retrieval of historical data
Backup VS. DR ✓ Direct service takeover
✓ No direct service takeover ✓ Unable to recover lost or damaged data
Archiving
Archiving:
✓ Only retains data copies while deletes
raw data
✓ Long-term information retention
✓ Meets compliance and cost-efficiency
requirements
Backup provides data recovery, DR focuses on business continuity, and archiving meets
regulatory compliance.
6 Huawei Confidential
Contents
7 Huawei Confidential
Basic Concepts of Backup
Definition:
A backup is an additional copy of production data used to recover lost or damaged data. With ever-increasing data
volumes, organizations need an efficient and cost-effective backup method to meet service and regulatory
requirements on data storage, retention, and availability.
DB Disk
OS
Disc
App
Tape library
Backup
File
Cloud
And more
And more
8 Huawei Confidential
Components of a Backup System
Production DC Backup DC
LAN
Backup media
Production storage
⚫ Centralized backup solution: The backup media servers (running backup software) are separated from the backup media, that is, storage and
computing are decoupled.
⚫ All-in-one backup solution: integrates backup software, media servers, and backup media, also known as coupled storage.
9 Huawei Confidential
Data Backup Process
When data backup is initiated, important network communication takes place between the components of the backup
infrastructure. This operation is initiated either by the backup management server or the client.
10 Huawei Confidential
Data Recovery Process
Once receiving a recovery request, the administrator can find the list of backed up clients in the recovery application.
Backup management
5
Media server Backup device
server
11 Huawei Confidential
Three Typical Scenarios of the Backup Solution
Local backup Copy archiving Copy replication
Production DC Production DC Production DC DR DC
Software copy
… … …
replication
Software copy
tiering
DB File server Backup DB File server DB File
Backup Backup Backup
server server server server server
server server server
IP/FC IP/FC Copy tiering IP/FC
Storage copy
replication
OceanProtect OceanProtect OceanProtect OceanProtect
Production storage Backup storage Production storage Backup storage Archiving storage Production storage Backup media Backup media
12 Huawei Confidential
Common Backup Types
Synthetic full backup
Full backup Differential backup Incremental backup
(Forever incremental backup)
Sun.
Mon.
Tue.
Wed.
Thu.
Fri.
Sat.
Sun.
13 Huawei Confidential
Typical Backup Networking
LAN-Based LAN-Free Server-Free
Production DC Backup DC Production DC Backup DC Production DC Backup DC
LAN Dedicated backup network
… … …
iDA iDA iDA iDA MA CS iDA iDA iDA iDA MA CS iDA iDA iDA iDA MA CS
App File App Media Backup App DB server File App Media Backup App DB server File App Media Backup
DB server
server server server server server server server server server server server server server server server
Production storage Backup media Production storage Backup media Production storage Backup media
14 Huawei Confidential
Overview of Huawei Backup Solution
All-in-one backup
Intra-city backup DC Remote backup DC
Replication
15 Huawei Confidential
Contents
16 Huawei Confidential
What Is Disaster Recovery?
Disaster recovery (DR) is the coordinated plan to restore and recover systems, data, and the infrastructure from
an event that disrupts business operations. It is the process of restoring a data copy and applying logs or other
necessary processes to that copy to bring it to a point of consistency. After all recovery efforts are completed, the
data is validated to ensure that it is correct.
17 Huawei Confidential
Major Disaster Recovery Technologies
Application Application
IP
SAN-based network SAN IP
SAN
layer
Huawei
Solution
Disk array layer
Disk array NAS Disk array NAS
18 Huawei Confidential
DR Implementation in the Industry
Data replication is implemented on hosts without compatibility issues for underlying devices.
Pros During database replication, the DR center takes over certain workload from the production center.
Host layer: Typical replication
software includes Oracle Data
Guard, Veritas VVR, DSG, and Database replication can run on only single-type databases.
Quest Cons Host-layer replication occupies certain host resources, affecting the application system.
Host-based data replication is complex and usually requires system reconstruction.
Broad compatibility enables integration of different backend heterogeneous SAN storage resources.
Network layer: Typical Simultaneous disaster recovery for multiple SAN arrays without one-to-one mapping.
Pros Extendable disaster recovery platform.
gateway devices include EMC
No extra investment required even with additional hosts and arrays.
VPLEX and IBM SVC
High initial investment and few solution vendors.
Cons Complex gateway networking increases latency.
Data replication does not affect the host application system and the DR architecture is easy to deploy.
19 Huawei Confidential
Overview of Huawei Flash Storage Disaster Recovery Solution
Local High Availability Active-Active Data Center Geo-Redundant 4DC DR Solution
Active-Passive DR Solution Geo-Redundant 3DC DR Solution
Solution Solution (SAN Storage 6.1.6)
• Financial core production systems
• Financial core production systems (class
Service application (class A and B) • Financial core production systems
A and B) • Financial core production systems (class A and B)
• HIS and PACS (classes A, B, C, and D)
• HIS and PACS • HIS • Financial core production systems (class A and B)
• Core system of the carrier's BSS • HIS and PACS
• Core system of the carrier's BSS domain • Core system of the carrier's BSS domain • Core manufacturing system
domain • Core system of the carrier's BSS domain
• Core manufacturing system • Core manufacturing system
• Core manufacturing system • Core manufacturing system
• University information system
• University information system
• Single point of failure (SPOF) of • Quick recovery in the event of power
• Failure of apps, storage devices, or an • Rapid recovery in the event of large-scale or regional • Rapid recovery in the event of large-scale or regional
components (network adapter, outage, fire, or flood
entire data center disasters such as earthquakes, fires, and floods disasters such as earthquakes, fires, and floods
Fault protection controller, and storage device) in a • Planned migration in the event of
• Zero service disruption • Planned migration in the event of planned power • Planned migration in the event of planned power outages,
data center planned power outages, routine O&M,
• Zero data loss outages, routine O&M, and disasters routine O&M, and disasters
• SPOFs of networks in data centers and disasters
VM DB VM FS
FS DB VM FS DB VM FS VM DB VM FS DB FS
DB VM DB VM FS DB VM FS DB FS
DB VM DB VM DB VM DB VM
Solution topology
Local A-A A-A Sync/Async A-A/Sync
Sync/Async
Production storage DR storage A-A Remote async A-A
Production storage DR storage Production storage DR storage Production storage DR storage Remote storage
Production DR storage Remote production Remote DR
storage storage storage
Distance (from Intra-city or remote data center Intra-city or remote data center (synchronous
Different cabinets in the same Intra-city active-active (< 100 km); remote asynchronous
production to DR equipment room or at the same site
Intra-city (< 100 km) (synchronous replication: < 100 km; replication: < 100 km; asynchronous replication: < 3000
replication (< 3000 km)
storage) asynchronous replication: < 3000 km) km)
20 Huawei Confidential
Overview of Huawei Scale-Out Storage Disaster Recovery Solution
Solution topology
A-A Sync Async Async Async Async replication Async
replication replication replication
Production storage DR storage Production storage DR storage
Production storage DR storage
DC 1 DC 2 DC 3 DC 1 DC 2 DC 3
Async replication
Async replication
Distance (from
production to DR Intra-city (< 100 km) Intra-city (< 300 km) Asynchronous replication (< 3000 km) Asynchronous replication (< 3000 km) Remote asynchronous replication (< 3000 km)
storage)
> 0 (seconds, depending on cross-site network bandwidth, latency, > 0 (seconds, depending on cross-site network bandwidth,
RPO 0 (intra-city active-active) 0 Seconds to minutes
and frontend service pressure) latency, and frontend service pressure)
RTO ≈0 Minutes Minutes Minutes (depending on load balancer) Minutes (depending on load balancer)
21 Huawei Confidential
Synchronous/Asynchronous Remote Replication and Active-Active Arrays
22 Huawei Confidential
Active-Active Active-Passive Geo-Redundant
23 Huawei Confidential
Active-Active Active-Passive Geo-Redundant
Active-Passive DR Solution
Solution and Technologies
⚫ Integrated SAN and NAS active-passive DR solution ensures the
WAN consistency of databases and files.
⚫ Heterogeneous storage resource consolidation in the
production center improves the utilization of the existing
Production center DR center storage arrays while avoiding storage vendor lock-in for DR
system construction.
V V V V V V DR management V V V V V V
⚫ Supports interconnection across high-end, mid-range, and
M M M M M M
M M M M M M entry-level storage systems, and heterogeneous server
Virtualization/ virtualization, reducing investment on devices in the DR center.
Middleware/App ⚫ I/O-based data replication, RPO ≈ 0.
⚫ Automatic or manual switchover between synchronous and
Database asynchronous replications, cutting down the impact of link
jitter on services.
⚫ Supports synchronous and asynchronous replication of
24 Huawei Confidential
Active-Active Active-Passive Geo-Redundant
A''
25 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
0 Huawei Confidential
Contents
• Ever Solid
• Intelligent
1 Huawei Confidential
OceanStor Dorado Positioning
Overall OceanStor Dorado all-flash unified storage sets a new benchmark for the industry with the highest stability, best-in-class SAN and NAS performance, and intelligent, efficient
Positioning management and O&M.
• The OceanStor Dorado 2000/3000 is entry-level storage products. Its cost-effectiveness is its competitive edge.
Product • The OceanStor Dorado 5000/6000 is positioned as a mid-range storage system, outperforming competitors with its high-end advantages and high-density form factors.
• The OceanStor Dorado 8000/18000 is positioned as a high-end storage system. Its stable architecture, #1 performance, and intelligence are key to expanding high-end
Positioning markets and setting benchmark projects of core NAs.
NAS
• It is positioned as a high-performance NAS product and provides abundant enterprise-class features to meet customers' demanding file storage requirements.
Positioning
High-end competitiveness
Unified SAN and NAS storage Rock-solid architecture + leading intelligent tech
High-end advantages + high-
density form factors
Recommended
Two levels for attack and Best-in-Class
Configurations defense
OceanStor Dorado 8000 OceanStor Dorado 18000
Entry-level all flash
OceanStor Dorado 5000 OceanStor Dorado 6000 Building competitiveness based on high-end architecture
Breaking into core applications based on NVMe/intelligent tech
OceanStor Dorado OceanStor Dorado
2000 3000
2 Huawei Confidential
OceanStor Dorado Product Overview
Entry-Level Mid-Range 高端 High End
OceanStor
Dorado 18000
OceanStor
OceanStor Dorado 8000
OceanStor OceanStor OceanStor Dorado 6000
Dorado 2000 Dorado 3000 Dorado 5000
3 Huawei Confidential
Lead the Market with Cutting-Edge Huawei All-Flash Storage
Inspur
2010: Niche Player 9.9% Dell EMC Huawei HPE NetApp Pure Storage IBM
H3C
10.6%
Source: Gartner Magic Quadrant for Primary Source: IDC AFA Storage System Market Overview Source: Gartner Market Share Report, 2022 Q4
Storage (China), 2022 Q4
4 Huawei Confidential
Huawei All-Flash Storage Gains Industry Renown
Interop Grand Prize 2021 Gartner Peer Insights Ranked Recommended by DCIG
The Server & Storage category Customers' Choice for Primary Storage Arrays Listed in Top 5 High-end Storage Array List
5 Huawei Confidential
ESG: High Availability, Optimal Performance, Extremely Low Latency, and
78% 5-Year TCO Savings with OceanStor Dorado
Enterprise Strategy Group is an IT analyst, research, validation, One of the lowest response times while maintaining high performance
and strategy firm that provides market intelligence and actionable
insight to the global IT community.
81 µs response time
Three out of four controllers offline in the test — I/Os run normal, and
response time is < 20 µ sec
Controller B Offline
Controller A Offline 220,000 IOPS
Controller C Offline
18 µ sec 20 µ sec
Up to 78% lower TCO over 5 years
Controller C Online
Controller A Online
Controller B Online
6 Huawei Confidential
Evaluator: Customers evaluating NAS storage systems should consider
Huawei OceanStor Dorado systems
An IT analyst firm dedicated to providing independent expertise on Data and Information Management.
Deliver high I/O rates with low latency for EDA and OLTP, and provide high It balances loads among controllers in a single file system, so no file system
throughput for the medical image workload. belongs to any controller.
24,618
21,484
10,029
Overall, OceanStor Dorado NAS systems were found to provide comprehensive set of NAS features along with excellent performance and reliability required for enterprise
application workloads. Customers evaluating NAS storage systems should consider Huawei OceanStor Dorado systems.
7 Huawei Confidential
OceanStor Dorado All-Flash Storage Highlights
8 Huawei Confidential
Contents
• Ever Solid
• Intelligent
9 Huawei Confidential
Ever Fast
11
10 Huawei Confidential
Huawei Confidential
Innovative E2E Acceleration Platform Achieves 21M IOPS and 30% Higher
NAS Performance
Efficient protocols
E2E NVMe for a high-performance
expressway NVMe
Innovative E2E acceleration for
leading performance
Distributed file system
Distributed file system maximizes system
performance Distributed file systems
Accelerated algorithms
SSD-controller synergy with intelligent algorithms
maximizes all-flash performance FlashLink®
11 Huawei Confidential
Uncompromising Performance with Innovative FlashLink® Algorithms
®
FLASHLINK intelligent algorithms
Controller
Core Reconstruction 81.79%
53.13%
001
0 Core
Many-core Core
0 Ordered 1 2 3 4 5
0 0 scheduling 300 min/TB 15 min/TB
1
1 010 1 by reboot
0 101 Core sequence
0 1
1
1 0010
0
0 0
1
0 0 1101 0
Smart00SSD
0
00 enclosure
10
1
1 1 010 1
Many-core algorithm Service grouping Intelligent cache algorithm
11 11
001 0101 0 2x computing power 20x reconstruction speed 50% cache hit ratio
011 10 11 0 0
101 1010 1
1 0 0 01
1 1
011 01101 0
1
1 1010 1
1 1
0 0101 0
011
Data read
1 11 0
0
1 Metadata
Data write
1 0
0SSD00
New data
11 11 Garbage Advanced feature
12 Huawei Confidential
Smart SSD Enclosure Implements Service Splitting and Computing Power
Unlocking
Smart SSD enclosure
Controller enclosure
Front-end Front-end Front-end Front-end 30% computing power sharing
interface module interface module interface module interface module
• Each smart SSD enclosure has two control boards with built-in
Data Data
reconstruction Controller
Controller ControllerreconstructionController computing platform and memory resources
13 Huawei Confidential
LUN Active-Active: Fully End-to-End Symmetric Architecture
Active-Active Architecture
Host • All products support host access in active-active mode.
Requests can be evenly distributed to each front-end link.
• All products support LUNs without owning controllers, which
SAN is easy to use and load balancing. (The LUN is divided into
several slices, and the slices are evenly distributed to all
controllers using the DHT algorithm.)
• High-end products provide front-end intelligent shared I/O
modules to directly send host I/O slices based on LUNs to
target controllers, reducing latency.
Hash sharing
DHT
Global Cache
• the LUN writes the I/O directly to the cache of the
controller where the shards reside and returns a response
to the host.
Global Cache
• Intelligent read cache for all controllers participates in
data and metadata prefetch and cache hits for all LUNs
14 Huawei Confidential
Distributed File System with Global Sharing Enables Fast NAS Performance
DIR
Distributed
data balancing File File File
Intelligent balancing vNode
Directory balancing algorithm: Directory and file co-
Faster file systems with all controllers ownership processing:
Zero cross-core and -controller
System architecture overheads
Readdir 8 KB
Filelist Filelist Filelist Metadata
/A /B /C /D Global Cache
Intelligent cache Intelligent metadata
prefetch/elimination Metadata compaction algorithm:
Distributed file system algorithm: Accelerates index Greatly improves cache and
file search prefetch efficiency
Controller 1 Controller 2 Controller 3 Controller 4
15 Huawei Confidential
Provides Directory Balancing and Performance Modes to Fit into Different
Scenarios
Host Host
NFS/CIFS NFS/CIFS
Client Client
/A /B /C /D A B C D
• The directory balancing mode eliminates • The performance mode ensures no cross-core
bottlenecks from a single controller or CPU. overhead for a single directory.
16 Huawei Confidential
Online transactions: 5x more TPS
OceanStor
5x Better User Experience
Dorado 6000 57,000 TPS 40% higher in large files 30% higher in small
Vendor E AFA and small blocks files and small blocks
11,500 TPS
700
Test conditions: dual-controller, 40 x 3.84 TB SSDs,
SwingBench OE2 transaction simulation system
500
*TPS: transactions per second
380
Report queries: 33% shorter batch processing
300
180
120
5s 5.1s 200
4.7s
Vendor E AFA 2800
1.8s OceanStor Dorado 6000
1.5s
0.9s 80
Test conditions: dual-controller, 100 x 3.84 TB Test conditions: dual-controller, 512 x 20 Test conditions: dual-controller, and
GB files, 1 MB I/O sequential read mkdir/rmdir/create/delete/readdirplus
SSDs, 8 TB per LUN, 50 GB per VDI
17 Huawei Confidential
Contents
• Ever Solid
• Intelligent
18 Huawei Confidential
12,000+ DCs
13-year stable operation on the live network
31 Huawei Confidential
Ever Solid Applications with 5 Reliability Layers
▪
99.9999%
Active-active solution for SAN and NAS ensures always-
on services
Solution ▪ FlashEver without data migration
99.99999%
Dynamic Reconstruction Ensures Redundancy Ratio
20 Huawei Confidential
Architecture Reliability-SmartMatrix Sets a New Benchmark
BIM**
Global cache
CPU
Global cache
SmartMatrix OceanStor
Global cache
CPU
Vendor E Vendor H
CPU
BIM
FIM
BIM
FIM
Tolerance Dorado Interconnection: Interconnection: front-
CPU
Full interconnection:
CPU
back-end (2- end (full); back-end (4-
front and back-ends controller) controller)
CPU
CPU
1-controller failure
2-controller
failure
FIM
BIM
*Front-end interconnect I/O module (FIM)
**Back-end interconnect I/O module (BIM)
21 Huawei Confidential
Architecture Reliability-Continuous Front-End Link in the Event of Controller
Failure Servers
Controller enclosure
Shared Shared Shared Shared
frontend frontend frontend frontend
Data
Controller enclosure
• The FIMs are linked to servers independently regardless of FIM FIM FIM FIM
controller failures.
Data
22 Huawei Confidential
Architecture Reliability-Non-Disruptive Upgrade in Seconds with Higher
Stability and Simplicity
Host
✓ Modular software architecture
◼ 94% of components are in user mode and can be upgraded within 1s.
FC switch ◼ Components on the I/O path can be upgraded within 1s.
✓ Continuous link and host
unaware of upgrade ✓ FIM:
◼ Connects 4 internal links to 4 controllers in an enclosure
◼ Provides 1 communication link to the host through the front-end port
✓ I/O components ◼ Switches the service link to another controller when any controller restarts during
upgraded within 1s an upgrade. The host is unaware of the upgrade, and the communication link is
uninterrupted.
✓ The firmware supports loose mappings and patch upgrades. In extreme scenarios, the
FIMs can ensure host linkup.
23 Huawei Confidential
System Reliability-HyperZoom Dynamic Reconstruction Ensures Redundancy
Ratio
A0 B0 C0 D0 E0 F0 G0 P0 Q0 A1 B1 C1 D1 E1 F1 P1 Q1
• If the disk number is less than the number of member disks required in a RAID group, the system automatically reduces the number of member disks in a RAID group.
• When a disk fault is rectified and the total number of available disks in the disk domain meet the RAID requirement, the number of RAID data columns automatically
restores to the normal value.
24 Huawei Confidential
System Reliability-HyperCDP Has Industry-Leading Interval of 3 Seconds
Interval: 3s for LUN and 15s for FS
Periodic policies with shortest interval More intensive and persistent data protection
✓ Supports periodic policies by day, week, month, or specific interval ✓ HyperCDP only saves the corresponding time points, surpassing
for customized backup. common snapshots with stronger and longer protection.
✓ The multi-time-point and ROW technologies create a data copy (at ✓ A single LUN supports up to 60,000 HyperCDP snapshots. The
a certain point in time) of a source LUN at a minimum interval of 3s minimum snapshot interval is 3 seconds, providing continuous
and that of an FS at 15s. protection for three days.
✓ Each CDP snapshot matches a time point of the source LUN/FS.
25 Huawei Confidential
Solution Reliability-Active-Active Solution for SAN and NAS Meets the Most
Demanding Reliability Requirements
HyperReplication HyperReplication
Easy-to-scale
OceanStor storage
OceanStor Dorado system • Scalability to 3DC (SAN) improves reliability.
• Serial, parallel, and star networking (SAN) meets the most
demanding requirements for enterprise reliability.
DR center
26 Huawei Confidential
System Reliability: Comprehensive Ransomware Protection Solution*
Key 1 Detection and analysis* 2 File blocking* 3 Secure snapshot 4 Air Gap
technologies 5 Replication link encryption 6 Protocol encryption* 7 Storage encryption * Indicates NAS-specific functions.
27 Huawei Confidential
Contents
• Ever Solid
• Intelligent
28 Huawei Confidential
28
29 Huawei Confidential
Huawei Confidential
Native Unified Storage Architecture Provides the Same I/O Path for NAS and
SAN Without Extra Overhead
iSCSI/FC/NVMe-oF NFS/CIFS
Protocol layer
SAN and NAS protocols are isolated. iSCSI, NFS, and CIFS support DTOE offloading.
Data service
Smart Series: Cache, Tier, Quota, Migration, Virtualization Data service layer
Hyper Series: Replication, Vault, Metro Value-added features and data protection features based on LUNs and file systems
Global cache
Global cache SAN/NAS global cache sharing
Cache for data, metadata, and deduplication fingerprints
Hot and cold data Global wear leveling ROW full-stripe write
separation Storage pool
Global Post-process Global garbage SAN and NAS share the FlashLink-based global storage pool, which provides global
deduplication similarity-based collection
deduplication deduplication, compression, similarity-based data reduction, global wear leveling, and global
garbage collection.
Storage pool
30 Huawei Confidential
Cloud Native Container Storage Base-Quick Deployment and Powerful
Functions
Container Management Platform (Provided by Partners)
Containerized application layer Advanced technology: Enterprise-class container management platform.
Professional support: First-class technical support for complex issues.
Container Reduced backup cost: Application-level backup and recovery without additional backup
management software, reducing TCO.
platform Fast recovery: Services are available immediately after recovery, ensuring data security.
Easy to use: Standard CSI, on-demand storage resource provisioning, easy to use.
Computing Network Fast service provisioning: Batch service provisioning is 30% faster than the industry
(ECS/BMS/ARM/GPU)
Storage (VPC/EIP) average.
Fast and Stable Data Storage for Zero Loss of Container Data
High performance: NAS performance is 30% higher than the industry average.
High reliability: Multiple reliability designs and automatic failover ensure service
OceanStor Dorado continuity.
Provided by High security: Industry-leading SAN/NAS ransomware protection, protecting container
Huawei *CSI: container storage interface data from ransomware threats.
*CDR: container disaster recovery
31 Huawei Confidential
Flash Storage Convergence for Different Types, Levels, and Generations
⚫ Different architecture
OceanStor Dorado
⚫ Different generations
2000/3000/5000/6000 ⚫ Low data mobility
HyperReplication
OceanStor Hybrid Interconnected services for free data mobility
OceanStor Dorado Unified management for 50% lower complexity
Flash Storage 8000/18000 High-end + entry-level products for customer savings
32 Huawei Confidential
SmartMobility for Free Data Flow, Reducing TCO Throughout the Lifecycle
Hybrid flash storage
NAS client
Warm and cold Tiering policy
File system data: 300 TB
File name
Option 1
File size
Read/Write Object storage
Creation time
Option 2 Modification time
Warm and cold
Total: 500 TB data: 300 TB
Access time
Hot: 200 TB
OceanStor Dorado Contents
All-flash storage Cloud
Option 3 File type
➢ Experience: The client only needs to access the all-flash storage and does not need to consider the file storage location.
➢ Direction: Cold data is automatically migrated to warm and cold data storage media. When a file is accessed, the file is automatically migrated to the all-flash storage.
➢ Target: Files can flow to NAS storage, object storage, or public clouds.
33 Huawei Confidential
Three Intelligent Layers: Full-Lifecycle Data Management for the Intelligent
Era
Intelligent
Cloud Intelligent Expert experience
prediction
DME IQ
Model training Call Home service Cloud Brain for intelligent O&M
Intelligent model training
34 Huawei Confidential
DeviceManager: Easy-to-Use, Intelligent Device Management
Integrated GUI
Simplified GUI
Unified portal for multiple services: >50%
Block File Name Object* higher management efficiency
35 Huawei Confidential
DME-Intelligent Data Lifecycle Management Platform
IT management platform
DME Storage
Visual Automatic Intelligent
Shorter solution design Improved proactive O&M
Precise investment planning
period efficiency
36 Huawei Confidential
DME IQ-Cloud-based Intelligent O&M Platform for Customer Data Centers
DME IQ uses AI technologies such as machine learning and deep learning to perform big data analysis. It proactively helps customers monitor, analyze, and plan IT infrastructure such as Huawei
storage devices and servers. It implements proactive and predictive O&M anytime and anywhere, reducing O&M costs and improving O&M efficiency. Therefore, it provides one-stop O&M
solutions for customers.
37 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Contents
3. Product Highlights
2 Huawei Confidential
New-Gen OceanStor Hybrid Flash Storage: Product Positioning
➢ Replaces OceanStor V5 Kunpeng
➢ Covers 6 mid-range or higher models — OceanStor 5310/5510/5610/6810/18510/18810
➢ Tailored for the hybrid flash market (i.e. the role of SSDs and mandatory config.) and all-
OceanStor
flash evolution Dorado 18000
512 GB/1 TB/2 TB
➢ Integrates the advantages of OceanStor Dorado and OceanStor V5 Kunpeng
OceanStor
Dorado 8000
High-end model OceanStor 18510
(entry point) OceanStor 18810
512 GB/1 TB/2 TB
OceanStor 1 TB/2 TB
OceanStor OceanStor
Dorado 3000 Dorado 5000 Dorado 6000
128/192/256 GB 256/512 GB 1024 GB
OceanStor 6810
High-end model
(entry point)
OceanStor Dorado 2000
OceanStor 5310 OceanStor 5510 OceanStor 5610
64/128 GB
128/256 GB 384/512 GB 768/1024 GB
OceanStor OceanStor
2200/2220 2600/2620
32 GB 64/128 GB
3 Huawei Confidential
Key Features: New-Gen OceanStor Hybrid Flash Storage vs. OceanStor V5
Upgraded hardware and architecture innovation
compared to OceanStor V5 Kunpeng
Category OceanStor V5 Kunpeng New-Gen OceanStor Hybrid Flash Storage
LUN ALUA A-A LUN A-A
Architecture
File system: A-P architecture File system: distributed file system
High-end models tolerate 3/4 controller
Architecture Reliability High-end models tolerate 7/8 controller failures
failures
Kernel-mode upgrade. Controller restart User-mode upgrade. No restart required in 95% of
Upgrade
required scenarios
Hardware
Host protocol NoF is not supported. Supports FC-NVMe and NVMe over RoCE (NoF+)
capabilities
COW mode: snapshot performance
deteriorates significantly. ROW-based lossless mode:
Snapshot
High-density snapshots and cascaded Supports high-density and cascaded snapshots.
OceanStor snapshots are not supported.
A-A solution for SAN
5310/5510/5610/6810/18510/18810 Metro
Industry's only A-A solution for SAN and NAS
Function clustering
A-P solution for NAS
Supports RAID 5, RAID 6, RAID-TP, and RAID zoom
Supports RAID 0, 1, 3, 5, and 6. Tolerance for
RAID (dynamic RAID reconstruction). Tolerance for 3 disk
up to 2 disk failures
failures
Built-in
Not supported Supported
container
4 Huawei Confidential
Contents
3. Product Highlights
5 Huawei Confidential
Two Architecture Upgrades of the New-Gen OceanStor Hybrid Flash Storage
7 Huawei Confidential
New-Gen OceanStor Hybrid Flash Storage Uses ROW-based Large Block
Sequential Writes to Solve HDD Performance Bottlenecks
Data to be
modified
B' D' E' Snapshot
S
Data
written A B C D E P1 P2
Snapshot
S The latest data
N
Data written
The latest data
A B C D E P1 P2
Snapshot
S N
New data
Data after
B' D' E' X1 X2 P1' P2'
modification A B' C D' E' P1' P2'
ROW does not cause write penalty and data migration.
Snapshot ROW + large block sequential writes convert random I/Os to sequential large I/Os,
protection zone Write penalty generated by which is more suitable for HDDs.
B D E writing data in place; High-density snapshots can be created without migrating original data.
High data migration costs; ROW increases the amount of metadata and requires frequent rewriting of
Snapshots greatly affect metadata.
Write-in-place performance and cannot be used
as high-density snapshots. ROW + large block sequential writes
OceanStor V5 SAN
New-Gen OceanStor Hybrid Flash Storage
8 Huawei Confidential
New-Gen OceanStor Hybrid Flash Storage Uses the Symmetric A-A
Architecture for True Load Balancing
LUN/FS ownership: I/O requests
No LUN/FS ownership: I/O requests
from hosts to LUN-A/FS-A can be Host
delivered only through
from hosts to LUN-A/FS-A are Host
distributed to multiple controllers for
controller A.
load balancing.
Forwarding
Forwarding
LUN-A/FS-A
LUN-1/FS-1
ALUA A-A architecture Symmetric A-A architecture
OceanStor V5 New-Gen OceanStor Hybrid Flash Storage
9 Huawei Confidential
Architecture Upgrade-100% Performance Improvement
Performance comparison in
SmartAcceleration OceanStor V5
typical configurations
48 NL-SAS HDDs + 4 SSDs
New-Gen OceanStor
Hybrid Flash Storage
ROW-based Large Block 180%
110%
Sequential Writes
Global data write optimization
10 Huawei Confidential
Architecture Upgrade-Extensive Value-Added Features (VAFs) and Minimal
Impact on Performance After VAFs Are Enabled
Advanced data protection functions Minimal impact on performance (VAFs
enabled)
Performance decrease: 20% to 30% for competitor vs. <10% for Huawei
OceanStor V5
11 Huawei Confidential
Architecture Upgrade-Industry's Only Active-Active Solution for NAS
EDA
PACS CAD
File Sharing
Cross-site directory access balancing
Industry's only
New-Gen OceanStor New-Gen OceanStor
A-A solution for NAS Hybrid Flash Storage Hybrid Flash Storage
HyperMetro
Gateway-free A-A solution
Production center A Production center B
HyperReplication HyperReplication
12 Huawei Confidential
Content
13 Huawei Confidential
Future-Oriented Design that Supports Multi-Workloads
OceanStor
5310/5510/5610/6810/18510/18810 Reduced TCO
No SAS HDD required reduces construction costs; supports reuse of
cross-gen devices.
Intelligent and automatic O&M greatly reduces O&M costs.
14 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
Data Center
Multiple Application Ecosystems
Traditional core Critical + emerging
services services Supports block, file, container, VM, and
distributed database apps.
15 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
Full COPY
HW-Assisted Locking
VASA Provider DME plugin
Block Zero
Thin Provisioning Unmap
Vvols 2.0 for SRM integration for automatic vMSCs metro clustering for
VM-level resource remote and unified management of 99.9999% virtualization
replication virtual DR processes reliability
VMware ESXi
VMware ESXi
FullCOPY
FC/iSCSI HW-Assisted Locking
LazyClone/
FC-NVMe Block Zero
FullClone/
NVMe over RoCE Thin Provisioning Unmap
Reserve Space/ UltraPath for VMware
Extended Statistics
16 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
Application auto
Control plane HA
scaling
Kunpeng container Storage plug-ins Image scanning BMS container
Huawei CSI feature highlights:
Automated Volcano batch Automated Permissions
Node auto scaling GUI/CLI/API
configuration processing deployment management
✓ Standard interface definition for interconnection with multiple
container platforms
Enhanced features of containerized applications
✓ The out-of-tree model is decoupled from K8s, and supports
containerized deployment, which is more secure and flexible.
✓ Powerful functions include volume and snapshot management,
and support continuous upgrade.
17 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
HUAWEI CLOUD AWS S3 • With CloudBackup, data can be backed up to public cloud object storage
OBS
(currently, HUAWEI CLOUD OBS and AWS S3 supported) or backup
Incremental Difference
storage in a local data center.
backup of comparison
differential data
History Current • Based on SmartContainer deployed on storage, CloudBackup can directly
snapshot snapshot
access storage file systems and read-only snapshots, reducing the cost of
CloudBackup
purchasing backup servers.
SmartContainer
• Configurable full backup and incremental backup policies
Read-only
FileSystem snapshot
• Users can import cloud copies and recreate copy database information
18 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
19 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
20 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
21 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
22 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
23 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
DIR
Distributed data
balancing File File File
/A /B /C /D Global Cache
Intelligent cache
Intelligent metadata Metadata compaction algorithm:
Distributed file system prefetch/elimination algorithm: Greatly improves cache and prefetch
Accelerates index file search efficiency
Intelligent layout Metadata sequence table layout: Metadata hash table layout:
Accelerates file traversing Accelerates file locating
(Readdir) (Lookup)
24 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
HDD HDD
HDD
Hot data changes frequently. Cold data is read immediately after Data changes from hot to cold based on
being modified. the write time.
25 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
26 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
27 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
Performance
8 KB Multi-granularity hot data statistics layer Hot data prediction based on time
64 KB Algorithm: predicts hot data sequence
Advance
prefetch
64 KB 32 KB Cold Hot
8 KB
1 MB Time
T0 T1
Current
Timeline
15000 38000
33000
9800
42000
create
OceanStor 5510 40
35000 mkdir
Vendor H C650 30
delete
chdir
10
Vendor N 8300
29 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
Purchase costs
Purchase costs x%
The cost per TB of SAS HDDs is five times that of
NL-SAS HDDs. Adopting the SmartAcceleration
Performance
intelligent data layout algorithm, New-Gen
OceanStor Hybrid Flash Storage can achieve
performance far higher than OceanStor V5 at a
New-Gen OceanStor Hybrid lower purchase cost, and without SAS HDDs.
OceanStor V5 Flash Storage
30 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
• The New-Gen OceanStor Hybrid Flash Storage supports SAN/NAS asynchronous replication
OceanStor Dorado V3 with OceanStor Dorado, and can work as the primary storage node of DR.
• The New-Gen OceanStor Hybrid Flash Storage supports SAN asynchronous replication with
OceanStor Dorado V3 and OceanStor V3/V5 to fully reuse legacy storage devices.
OceanStor
V3
OceanStor OceanStor
OceanStor Dorado All-Flash
V5 V5 kunpeng OceanStor 5310~18810 Storage
New-Gen OceanStor Hybrid Flash
Storage
31 Huawei Confidential
Diverse Workloads Flash-Like Optimal TCO
32 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
1 Huawei Confidential
Contents
2 Huawei Confidential
Data Is the Core of an Intelligent World and a Key Production Factor for the
Digital Economy
Core of an intelligent world Key production factor for the digital economy
1 TB/day 10 PB 40 PB 64 TB/day
Production data Transaction data Analytical data Training data
3 Huawei Confidential
New Challenges to Data Backup as Industry Digitalization Grows Rapidly
Rapid data backup and recovery Ultimate data reduction Storage ransomware protection
capability capability
More than I/3 of the Data grows by more than 50% Gartner: 60% of enterprises
enterprises cannot meet each year, but the data require storage products with
backup window requirements protection budget increases ransomware protection
of mass data. less than 10%. functions.
February 2020 April 2021 July 2021 December 2021 March 2022
Core user data of an enterprise Ransomware attack on a REvil attack on a tech Data in the supercomputing Data breach of a consumer
intentionally damaged computer manufacturer management software system of a Japanese electronics company in South
Services for 3 million clients A ransomware gang called REvil supplier in the US university deleted by mistake Korea
interrupted. intruded the enterprise's More than 1 million systems About 77 TB files deleted by 150 GB of confidential data and
system and claimed a ransom locked and a ransom of USD 70 mistake, and around 3400 files core source codes stolen by a
of $50 million. million demanded. lost. ransomware gang.
4 Huawei Confidential
The F2F2X Era Has Come, Redefining Flash-based Backup Solutions
"Disk to Disk to Tape" (D2D2T) Is Now
Out of Date F2F2X
Flash-to-Flash-to-Anything
Restart the backup job in the mid-night Performance Cost System resilience
Bandwidth improved by TCO reduced by 20% Disk return rate decreased from
3 to 5 times 5% to 0.3%
5 Huawei Confidential
Contents
6 Huawei Confidential
OceanProtect Backup Storage Leads Backup into the F2F2X Era
7 Huawei Confidential
OceanProtect Backup Storage: The Enterprise-Class Industry Benchmark
Efficient Reduction
IP/FC
72:1 data reduction ratio using leading
algorithms, greatly improving effective
capacity and reducing system investment.
Solid Resilience
Industry-leading ransomware protection solution
OceanProtect Backup Storage
and exclusive active-active architecture, ensuring
the secure and reliable data copies.
8 Huawei Confidential
Certification of Huawei OceanProtect by Authoritative Organizations:
Evaluator Group and Interop Tokyo
Evaluator Group Interop Tokyo Award
Evaluator Group, a leading IT analyst firm Authoritative awards in the Storage & Server Categories
worldwide, released the technical review report on
Huawei OceanProtect Backup Storage. Following
rigorous tests on the live network, Evaluator
concluded that
9 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
➢ Industry-leading 10/25/40/100GE OS
Buffer Driver
Backup data 6 hours
Protocol User
➢ TCP/IP protocol parsing to release CPU FileSystem
10 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
LUN map Read and write in the LBA order. HDD-based recovery
Data locality rearrangement effect
performance: 20% better than
Backup data is read and written in logical order. peer product
Fingerprints are randomly
reorganized by content.
Fingerprint A B C D E F G H I Overall leading recovery
table
bandwidth
The data sequence on the disk is consistent with
the fingerprint sequence.
Single-node recovery bandwidth
+
On-disk data
Data locality Unit: TB/hour
rearrangement
24
Standard backup and
Three-layer metadata structure dedupe process 18
8 8
Actual storage
A B
C EC D
H E
G BF GI H
D 1
F location
6
Points to old IDs for Assigns new IDs for new
duplicate data. data
...
ID index table
...
On-disk read order
The ID sequence is the consistent with the 1 3 5 8 7 2 9 4 69
1 2 3 4 5 6 7 8 Mid-range Lower high-end High-end flagship
LBA sequence.
Points to historical data blocks
Writes new data to disks On-disk data
for duplicate data. The actual storage location of data on disks is the Peer HDD-based storage
... ...... layout Huawei HDD-based storage
same as the logical sequence.
The data sequence on the disk is consistent with the
ID sequence.
Data is randomly stored on disks.
11 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
* Test case: 200 VMs in a virtualization scenario, daily full backup for 28 days, 4% data changes per day, 0.125% new data per day
12 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
Backup data
Data head Changed
generation
Backup server data
Backup data
Traditional backup preprocessing OceanProtect
storage Backup Storage
13 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
There is a low probability that proper chunking points are found. As a Find proper chunking points, thereby improving
result, the deduplication ratio is low. the data deduplication ratio.
14 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
Compression ratio
Data block 1B 8B
combination 4.5
(larger compression field) A B C D a b c d 4
3.5
All letters are changed to
3
uppercase letters.
Data feature 3 bits 1B 8B 2.5
preprocessing 2
(improved data compressibility) A B C D A B C D 1.5
Metadata 1
tag
Byte-level dedupe and 0.5
compression 3 bits 1B 4B 0
(byte-level de-redundancy)
A B C D LZ4 GZ fast GZ HZBC
Metadata
tag
High-performance predictive Feature-based compression: The Huawei's patented
entropy encoding
(bit-level redundancy removal)
HZBC algorithm provides a leading compression ratio
which is 57% higher than LZ4, 27% higher than GZ fast,
and 14% higher than GZ.
15 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
④
File system Storage File system Backup OceanProtect storage replication
Backup Replication bandwidth
images replication images
6000+
②
Oracle Windows file Unit: MB/s
Application Swift
(RMAN file) system
3 Packages and sends non-duplicate data 4 Writes data Replication time 9s 12s 12s Vendor N OceanProtect
(compression available). * Project test environment
OceanProtect X8000, NetBackup, and two data centers are 500+ km away from each other.
* Network requirements:
• RTT ≤ 100ms
• Bandwidth ≥ Changed data volume during peak hours/Replication period
• Packet loss rate < 0.1%
16 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
10 hours
1 PB
File system Backup
images
④ Backup storage boost in the
industry (90+ TB/hour)
17 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
1 2 3 4 5 6
Replication link
technologies
transmitted in ciphertext to stored data and addresses the production center and security file system from being replication link to copy data
transmission encryption
prevent data from being risk of sensitive information isolation zone uses the secure modified or deleted, or to an isolation area for higher
ensures data security and
stolen. leakage caused by snapshot technology to ensure encrypted by ransomware. security.
prevents sensitive
ransomware attacks. that the snapshot data is read-
information leakage.
only and cannot be modified or
deleted within a specified
period.
18 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
Active-Active RAID-TP
Controller Controller
19 Huawei Confidential
Rapid Backup Efficient Solid
Rapid Recovery Reduction Resilience
20 Huawei Confidential
Contents
21 Huawei Confidential
Product Overview High-end OceanProtect X9000
New
OceanProtect X3000 OceanProtect X6000 OceanProtect X6000 OceanProtect X8000 OceanProtect X8000 OceanProtect X9000 OceanProtect X9000
(HDD mode) (all-flash mode) (HDD mode) (all-flash mode) (HDD mode) (all-flash mode) (HDD mode)
Single-node
2 U, 2 controllers 2 U, 2 controllers 2 U, 2 controllers 2 U, 2 controllers 2 U, 2 controllers 4 U, 4 controllers 4 U, 4 controllers
specifications
Maximum number of
1 1 1 2 2 2 2
nodes*
Data disk type NL-SAS HDD SAS SSD NL-SAS HDD SAS SSD NL-SAS HDD SAS SSD NL-SAS HDD
Capacity per data 4 TB/8 TB/14 TB NL- 4 TB/8 TB/14 TB NL- 4 TB/8 TB/14 TB NL-
3.84 TB/7.68 TB 3.84 TB/7.68 TB 7.68 TB 8 TB/14 TB NL-SAS
disk** SAS SAS SAS
System usable
16 TB to 60 TB 16 TB to 300 TB 150 TB to 2.0 PB 480 TB to 3.6 PB
capacity
System backup
Up to 6 TB/hour Up to 19 TB/hour Up to 19 TB/hour Up to 55 TB/hour Up to 55 TB/hour Up to 155 TB/hour Up to 155 TB/hour
bandwidth
System logical backup
Up to 10 TB/hour Up to 45 TB/hour Up to 45 TB/hour Up to 117 TB/hour Up to 117 TB/hour Up to 310 TB/hour Up to 310 TB/hour
bandwidth
System restore
Up to 1 TB/hour Up to 22 TB/hour Up to 8 TB/hour Up to 57 TB/hour Up to 24 TB/hour Up to 172 TB/hour Up to 48 TB/hour
bandwidth
Front-end port type 8/16/32 Gbit/s FC, 10/25/40/100GE
Back-end port type SAS 3.0
SQL Server
CIFS/NFS/FC SAN/IP SAN
MySQL
MongoDB
Hadoop
23 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Security level:
1 Huawei Confidential
Contents
1. Distributed Storage Concepts
2 Huawei Confidential
Distributed Storage Becomes Increasingly Essential
Video networking
Converged
Government, law enforcement, public safety,
campus services
3 Huawei Confidential
Distributed Storage vs. Centralized Storage
Distributed Storage Centralized Storage
Cluster + Identical Nodes Controller + Disk Enclosure
VM VM VM VM DB VM VM
VM VM VM VM 1. Larger capacity: VM VM
1. Smaller capacity:
XXX TB~EB TB~PB
XX controllers
Hundreds to thousands of nodes
Linear expansion of capacity and performance
Application for Distributed Storage: ①diversified data ②Massive expansion ③ simplified management
4 Huawei Confidential
Catalog of Distributed Storage
File HDFS
Block
Video editting • Works as traditional SAN
Logs
HPDA • Application: low latency, high IOPS
Analysis
CCTV
bigdata
PACS
Block Object
File
• Works as shared folder
VM Image • Application: File sharing, HPC,
Video, Image
Database Online video
Container Backup & Archive Object
• Internet access
• Application: Internet App,
SCSI/iSCSI NFS/CIFS S3 HDFS IOT
HDFS
• Similar as file
• Application: bigdata platform
Distributed Storage
5 Huawei Confidential
Contents
6 Huawei Confidential
Huawei OceanStor Embraces the Era of Mass Data with Continuous
New
Innovations OceanStor Pacific scale-out storage
Gartner Peer Insights Customers' Choice 2022
7 Huawei Confidential
Huawei Distributed Storage Products Have Gained Industry Recognition via
Continuous Upgrades
New
Best of Show Award Grand Prize at Interop One of the world's leading HPC storage performance
Tokyo 2021 rankings Gartner Peer Insights Customers'
Choice 2022
3rd place worldwide (1st place as a commercial
product)
8 Huawei Confidential
OceanStor Pacific Series Overview
High-performance Content resource pool Log retention Smart city Virtualization/Cloud
resource pool Database
computing Backup &
Application Web disk
archiving
layer
NFS/SMB
S3 HDFS SCSI/iSCSI
/POSIX/MPI-IO
File storage service Object storage service HDFS storage service Block storage service
Software SmartEncryption SmartAuditlog SmartInterworking Recycle bin SmartIndexing MultiPool SmartDedupe SmartCompression
layer
HyperReplication
Object Versioning SmartTakeover HyperSnap HyperReplication (A) HyperSnap HyperClone HyperMetro
(S)/(A)
9 Huawei Confidential
OceanStor Pacific Product Overview
Decoupled storage- Backup and
HPDA compute for big Virtualization/cloud
Intelligent video & image archiving of
data resource pool
mass data
Balanced Archive
OceanStor OceanStor Pacific 9550
Performance OceanStor Pacific 9546 OceanStor Pacific 9340 OceanStor Pacific 9350
Pacific 9950
OceanStor Pacific
9920
(80 slots per enclosure) (25 slots per enclosure) (120 slots per enclosure)
Hardware
(60 slots per enclosure) (120 slots per enclosure) (60 slots per enclosure)
Main Storage Disk Type NVMe SSD SATA HDD SATA HDD
Dedicated hardware Dedicated hardware Dedicated hardware Dedicated hardware Dedicated hardware Dedicated hardware
Chassis Model
5 U 8-node 2 U 1-node 4 U 2-node 5 U 2-node 4 U 1-node 5 U 2-node
(Key Features of Version 8.1.5)
Storage File, object, block, and HDFS File, object, block, and HDFS File and object
NFS over RDMA Supported Supported Supported Not supported
Ransomware Protection Supported Supported Supported Supported
Functions
10 Huawei Confidential
OceanStor Pacific : Massive Data Storage Platform for Hybrid Loads
OceanStor Pacific
High efficiency with Hybrid loads Optimal TCO for Massive Data High Data Resilience
• SmartInterworking: Industry-Leading, • High-density hardware: 120 HDD/5U, saving • HyperGeoMetro & EC:Multiple-DC DR
Lossless Interworking Between Unstructured space and power. solution, supporting up to 12 DCs.
Protocols
• Automatic inter-intra Data Flow: built-in data • Fast Failover: failover <10S
• One nodes supports multiple-protocol services. tier make data migration more smoothly and
cost-effective. • Data Security:Built-in intelligent
ransomware detection, with a detection and
• Excellent Expansion Capability:Fully identification rate of 99.9%, industry-leading,
symmetric distributed architecture, linear comprehensive protection to ensure high
growth of performance and capacity. data security
11 Huawei Confidential
Always cost-
Always efficient Always on
effective
Data
Data import Training & Simulation Data release Data import Data preprocessing
Training & SimulationData release
preprocessing
Unique in
the industry
S3
S3
NFS/CIFS
50%
File Big data File Object File Big data Object
Analysis efficiency
30%
12 Huawei Confidential
Always cost-
Always efficient Always on
effective
Large I/O Small Large I/Os are directly written to the storage tier.
I/O 1
Reduces network and memory bandwidth amplification and
improves bandwidth.
Single frame
13 Huawei Confidential
Always efficient Always cost-effective Always on
91.6%
OceanStor Pacific 9550
80%
5 U, 120 disks
4 U, 80 disks
• Up to 22+2 EC
• Flexible number of nodes
Note: The space usage does not exclude the reserved space.
14 Huawei Confidential
Always efficient Always cost-effective Always on
Tiering and Free Flow of Hot, Warm, and Cold Data, Reducing TCO by 70%
≥
70% TCO reduction *
AWS
Huawei Cloud • Automatic data tiering: supports free flow
...
combination and
compression
Tiering
Multi-model
SSD HDD Data Cloud cluster to multiple clusters or clouds at
Tiering
multiple data centers, with customizable
Multi-model
OceanStor Pacific OceanStor Pacific HDD
Data
9950 | 9920 9550 | 9546 data tiering policies.
OceanStor Pacific
Blu-ray disc library • Data compression before flow: offers a
Blu-ray
maximum compression ratio of 2:1,
Tiering exceeding the industry by 40%, reducing
OceanStor
OceanStor Dorado OceanProtect
self-developed storage space and bandwidth.
Blu-ray storage
15 Huawei Confidential
Always efficient Always cost-effective Always on
Optimal linear expansion: 100 billion objects in a single bucket, meeting the
requirements for efficient access of massive small files
The number of objects in a
single bucket is far ahead.
e-bill image Checkpoint image IoT Internet of
Vehicles
15M 1000M 1000M 100,000M
Vendor X Vendor E Vendor H HUAWEI
Stable performance
• 100 billion-level • A large city, 2W traffic • Large object,
TPS
objects in a bucket cameras, 140 billion bandwidth > 250 MB/s
Third-party test data and 10 billion-level images in a year • Small object, TPS of a
HUAWEI
1,000,000 objects in a single set single bucket: 300–
• Performance: TPS 600
1000 to 10000
Vendor X
1,000,000
100,000 million
Meets the single-bucket read and write requirements of service applications, eliminating bucket reconstruction for large-scale
applications.
16 Huawei Confidential
Always efficient Always cost-effective Always on
Set of Data
A B C D P P
Site 3
17 Huawei Confidential
Always efficient Always cost-effective Always on
Cross-Site DR Demonstration
HyperGeoMetro HyperGeoEC
Site 1
Site 2
Site 1 Site 2
Bucket A
Bucket A
A B
C P
HyperGeoMetro WAN Bucket D
Bucket A Bucket A
Site 4 Site 7
File
File11 HyperGeoMetro File 1
Bucket B Bucket B Bucket A
Bucket A
Host 1 …
Bucket D Bucket C
Site 3
File 1
File 2
Site 12 Site 5
Host 1 Site 12
…
File
File 22
Bucket B
Site 5
Bucket C
18 Huawei Confidential
Always efficient Always cost-effective Always on
1 Detection and analysis 2 Secure Snapshot 3 AIR GAP 4 Replication Link Encryption 5 Protocol Encryption 6 Storage Encryption
Huawei-developed detection and Storage in the production center Data is copied to the isolated During the replication process, Ensure the security of stored data
NFS and CIFS/SMB
analysis engine is installed. It and Air-Gap area uses the secure area by automatically shutting transmission encryption and prevent the risk of sensitive
packets are transmitted
analyzes file I/O behavior and file snapshot technology to ensure down the replication link, which ensures data transmission information leakage caused by
in ciphertext, preventing ransomware attacks.
damage characteristics based on ML that data is read-only and cannot provides a more secure security and prevents sensitive
data theft.
algorithm, generates event alarms, be modified or deleted within the protection effect. information from being (2023H2)
specified time range. (2023H2) disclosed.
and provides client information for
source tracing.
19 Huawei Confidential
Contents
20 Huawei Confidential
OceanStor Pacific Scale-Out Storage: One Storage System for Multiple
Workloads
Four Scenarios
Scientific research HPDA Video and media Mass data archiving Medical imaging center
• Education: HPC in higher education • Broadcasting and TV: HD editing • Finance: financial document imaging • Healthcare: PACS system
institutions
• Government: safe city • Education: data archiving • Healthcare: digital pathology
• Government: supercomputing, scientific
research, and meteorological HPC • Transportation: highway, airport, • Government: data archiving
• Healthcare: genome sequencing and urban rail
• Manufacturing: autonomous driving and oil
and gas exploration
Huawei OceanStor Pacific - next-generation distributed storage system that supports large-scale scale-out and
hybrid loads
21 Huawei Confidential
HPDA-One Storage Device Meets Multiple Service Requirements and
Delivers Leading Performance in All Scenarios
Energy
exploration
Supercomputi
ng Center
Gene
sequencing
educational and
scientific research
Autopilot 7mins
Clinical Medicine ESI Top One Thousand in the World
data center network InfiniBand/RoCE hereditary population Assisted Oncology contagious ICU early sieve
POSIX, MPI-IO, NFS, S3 disease cohort study reproducti Research disease
research on
WHS-IMOAP
Native objects, files, and big data 7
ARM+AI+X86+GPU 160 GB/s bandwidth, 6.4 million IOPS 2.0 minutes
Single-stream bandwidth: 8 GB/s Multi-Protocol Interworking
22 Huawei Confidential
Data Backup and Archiving Solution-Efficient, Reliable, and Cost-effective
Object Data Platform
Internet
Efficient Top Banks
Content Stable and high performance in the
Ticket image Video of
collaboration case of 100 billion object storage
Things
Ticket image
TPS 7 x 24 service continuity 4x faster processing speed
Third-party test data
assurance
Atempo software 1,000,000 Huawei
PSM
Rubrik
... Product C
Content management 1,000,000 100,000 million
platform
electronic statement
system
Reliable
S3 Cross-site DR supports a maximum e-bill ......
Global
Namespace of 12 sites in multi-active mode.
Industry-leading reliability and
... space utilization
Legacy system: Active-
OceanStor Pacific Legacy file Active
Site 1 Site 12 OceanStor Solution OceanStor
system
economy Pacific Pacific
Large EC ratio provides optimal site1 Site 2
Site 2 resource utilization.
23 Huawei Confidential
Intelligent Video and Image Storage-New-Generation Stream Forwarding &
Storage for Video Security, Responding to the Video Explosion Era with Ease
Video security service flow
Multi-protocol
More flexible scalability
Fully symmetric distributed architecture: up to
interworking
4096 nodes for a single cluster, with no
Seamless NFS/CIFS/HDFS/S3 interworking with
independent
zero metadata
data copy helps node easily
our customers
Safe City Urban rail Airport Subway implement HPDA- and AI-oriented
Efficient management evolution.
and easy deployment:
efficient, easy-to-use, and unified cluster
management mode
Video/Image
VMS
Video/Image
Access Multi-protocol
Lower cost
interworking
High-density hardware: 4 U/5 U high-density
Seamless NFS/CIFS/HDFS/S3
models save equipment interworking
room space, with
cabinet
zero data copy helps our customers easily
TCP/IP power consumption, and total cost of
AI analysis implement HPDA- and AI-oriented evolution.
operation (TCO).
Large-ratio EC: 22+2
NFS/CIFS
Multi-protocol
Higher reliability
Camera video
stream OceanStor Pacific series stream interworking
System-level high reliability: 99.999%
Camera image Storage reliability, dynamic EC, and
Seamless NFS/CIFS/HDFS/S3 tolerance
interworking of
with
stream
forwarding and storage base zero data copy helps
four faulty nodes our customers easily
implement
Service HPDA- and assurance:
continuity AI-oriented evolution.
failover in
seconds, and online upgrade with no
service interruption
24 Huawei Confidential
Media Service Storage-Cost Effective, Performant, and Streamlined Storage
for HD Video
Storage Solution
Satellite/Filming/DVD Editing/Rendering/Sy
nthesis
Cataloging/Indexing/T
ranscoding
CD-ROM/Storage Broadcast and control Unique 36-layer
4K UHD editing
…
25 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home
home, and
and
organization for a fully connected,
intelligent world.
0 Huawei Confidential
Can't finish product evaluation or
product configuration in several hours?
⚫ Can master complicated calculating methods
1 Huawei Confidential
Takes only 10 minutes
Just input performance requirement
or device configuration into
eDesigner
2 Huawei Confidential
Contents
4. Obtaining Help
3 Huawei Confidential
Placing an Order: What Is SCT?
• The UniSTAR SCT is a new generation
configuration and quotation tool that adopts
the B/S architecture.
• In the bidding and contract signing stages,
product managers can use the UniSTAR SCT for
performing configuration and providing
quotations. Project data can be used in
manufacturing, shipment, project preparation,
and project implementation stages until the
contract is complete.
4 Huawei Confidential
Placing an Order: SCT Materials
This picture is SCT homepage, you can find the user guide and video at the right corner and click it.
5 Huawei Confidential
What Is an eDesigner?
eDesigner introduction
eDesigner, an online Huawei solution design tool, is
developed for product managers, channel partners, and SAs
to conduct project expansion and bidding.
Online solutions
1. Storage eDesigner classification:
✓ All-Flash Storage
✓ Scale-Out Storage
✓ Data Protection
✓ Virtualization
2. Features:
✓ Integrated
✓ Professional
✓ Flexible
✓ Simple
6 Huawei Confidential
Application Scenarios
User Roles
Product managers, channel partners, and SAs
Application Scenarios
✓ Customers can design solutions and display ✓ eDesigner automatically generates solution technical
solutions and products, improving customers' proposals and configuration lists, serving as comprehensive
experiences. and useful bidding materials.
7 Huawei Confidential
Accessing eDesigner (1): Navigation Path
The eDesigner of enterprise has been integrated into the SCT platform, you can visit by link, and then click “Solution”.
You can also access it using the following methods.
Search for Huawei SCT in Google, and then click “Solution” and “Data Storage”
8 Huawei Confidential
Accessing eDesigner (2): Select Location
After accessing eDesigner, select the country or area where you are located. After you select a country, eDesigner
automatically memorizes your selection.
9 Huawei Confidential
Accessing eDesigner (3): Registered User
Registered user: Use all the functions of the eDesigner platform
Note:
The eDesigner platform is a free
solution design tool and can be visited
online by Uniportal or W3 users.
10 Huawei Confidential
Applying for Permission
Huawei-certified partner
1. Log in to Huawei’s official website and apply for Uniportal 1. Approve the applications for associating organizations on the
user account. UIPM.
2. Use your Uniportal account to log in and apply, so you can 2. Submit the applications of applying for eDesigner permissions
start associating with the Huawei channel partners organization for the employees on the UIPM platform.
at the UIPM platform.
11 Huawei Confidential
Contents
2. Designing Solutions
3. Placing Orders, and Sharing Solutions
4. Obtaining Help
12 Huawei Confidential
Solution Design Process
eDesigner provides wizard-based design steps, product Capability Evaluation and Integrated
Solution design. You will complete the solution design in 3 steps for Configuration Wizard.
The following uses the Storage Configuration Wizard (OceanStor Dorado) solution as an
example.
01 02 03
Design Product Design Finish Design
Solution Service Solution
13 Huawei Confidential
Support Solutions
eDesigner supports product solution of Datacom, Optical, Data Storage, Cloud and Digital Power. For Data Storage,
a total of 35 solutions are released.
14 Huawei Confidential
Getting Started
Log in to the SCT website and click “Solution”-> “Product”-> “Data
Storage” -> “All-Flash Storage” -> “All-Flash SAN” -> “Design Solutions”.
15 Huawei Confidential
Step 1: Enter Requirements Storage Configuration Guide
17 Huawei Confidential
Step 2: Configuration Selection (2) Storage Configuration Guide
Note:
The parameter values are displayed in red(such as 2) are
displayed on the parameters to indicate that the parameter
values are manually modified and are no longer the default
values. Click to restore the default setting.
18 Huawei Confidential
Step 2: Configuration Selection (3) Storage Configuration Guide
eDesigner calculates
the IOPS/bandwidth
based on the
recommended
configuration.
19 Huawei Confidential
Step 2: Configuration Selection (4) Storage Configuration Guide
20 Huawei Confidential
Step 2: Configuration Selection (5) Storage Configuration Guide
21 Huawei Confidential
Step 2: Configuration Selection (6) Storage Configuration Guide
DME Storage is a
storage management
tool. You can configure
the license and service
years at here for this
tool.
22 Huawei Confidential
Step 3: Service Design (1)
23 Huawei Confidential
Step 3: Service Design (2)
24 Huawei Confidential
Step 4: Finish Design (1)
Storage Configuration Guide
25 Huawei Confidential
Step 4: Finish Design (2) Storage Configuration Guide
26 Huawei Confidential
Step 4: Finish Design (3) Storage Configuration Guide
27 Huawei Confidential
Contents
28 Huawei Confidential
Placing Order (1)
After all errors are cleared, click in the Operation column to calculate again, because it depends on the
configuration result of OceanStor Dorado 5000 product.
29 Huawei Confidential
Placing Order (2)
30 Huawei Confidential
Placing Order (3)
31 Huawei Confidential
Placing Order (4)
32 Huawei Confidential
Sharing Solutions
You can quickly share your solution or quotation with other colleagues: My Quotation -> Draft/Submmitted, check the solution which you want
to share and then click Share.
Note:
• Address Book: After sharing a solution,
the email address of the user who wants
the solution is automatically uploaded
to the Address Book. You can click the
email to share again.
33 Huawei Confidential
Contents
34 Huawei Confidential
Feedback and Help
35 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.