Professional Documents
Culture Documents
Network
Technologies
November 2014
2 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Disk technologies
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Parallel SCSI
IMPORTANT: When referring to SCSI disks, you need to know specific details about the interface type and signaling
method.
NOTICE: Ultra640 standard reached the limits of speed/cable lengths, that made it impractical for more than two devices.
Most manufacturers skipped over Ultra640 for Serial Attached SCSI instead.
4 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Serial ATA (SATA)
5 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Serial Attached SCSI
• SAS uses the full-duplex architecture, effectively doubling the transfer speeds
• The current SAS standard provides speed of 12 Gb/s, with a maximum theoretical speed of 16 Gb/s
• The maximum number of attached devices is 128 (compared to 16 for Parallel SCSI)
• A single SAS domain can address up to 65,535 devices using a fanout expander
• The MTBF is increased to 1.6 million hours
6 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Near-line SAS
7 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Native Command Queuing
8 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
NCQ performance gains
9 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
SAS domains
10 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Solid State Drives
NOTE: Solid State Hybrid Drives (SSHDs) combine the large capacity of HDD with the speed of the SSD used for
caching to improve performance and keep the price low.
11 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Single-level cell
Value State
0 Programmed
1 Erased
12 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Multi-level cell
Value State
00 Fully programmed
01 Partially programmed
10 Partially erased
11 Fully erased
13 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Comparing SLC and MLC
• On high-end SSDs, it is possible to over-provision by 25% above the stated storage capacity
• Distributes the total number of reads and writes across a larger population of NAND blocks and pages over
time
• The SSD controller gets additional buffer space for managing page writes and NAND block erases
16 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
SmartSSD Wear Gauge
NOTE: SmartSSD Wear Gauge is part of the Array Configuration Utility (ACU) in the HP Intelligent Provisioning
that is embedded in HP ProLiant Gen8 and newer servers.
17 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Disk enclosures
18 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fault-tolerant cabling
19 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Straight-through cabling
20 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
LUN masking
21 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Storage virtualization
22 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fat (thick) or thin provisioning
23 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
HP Storage Arrays
HP XP7
HP XP
HP 3PAR P9500
EVA StoreServ 10000
P6000
Storage
Consolidation and performance
HP 3PAR
StoreServ 7000
24 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Storage area network hosts
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
SAN hosts
26 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Hosts and Fibre Channel
27 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Converged network adapter
28 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
N_Port ID virtualization
What is NPIV?
• N_Port ID Virtualization (NPIV) is an industry-standard Fibre Channel protocol that provides a means to
assign multiple Fibre Channel addresses on the same physical link.
• NPIV makes a single Fibre Channel port appear as multiple virtual ports, each having its own N_Port ID and
virtual WWN.
• HP offers an NPIV-based Fibre Channel interconnect option for server blades called Virtual Connect.
29 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
NPIV
• NPIV allows a single HBA, called an “N_Port,” to register multiple World Wide Port Names (WWPNs) and
N_Port identification numbers
30 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Server virtualization with NPIV
31 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
HP Virtual Connect Fibre Channel
32 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
HP Virtual Connect FlexFabric
33 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Boot from SAN
34 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Multipath concept
35 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Path failover
36 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Load balancing
• MPIO provides load balancing across all installed HBAs (ports) in a server
• There are various load-balancing policies, depending on the multipath software:
− Round robin
− Least I/O
− Least bandwidth
− Shortest queue (requests, bytes, service time)
37 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Microsoft Multi-Port IO
• Uses redundant physical paths to eliminate single points of failure between servers and storage
• Increases data reliability and availability
• Reduces bottlenecks
• Provides fault tolerance and load balancing
• Two components:
− Driversdeveloped by Microsoft
− Device-specific modules (DSMs) developed by storage vendors to Microsoft standards
NOTICE: Starting with Windows Server 2008, Microsoft provides native multipathing (Microsoft MPIO)
software.
38 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fibre Channel
advanced features
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fibre Channel addressing
40 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fibre Channel name and address
• 24-bit addresses are automatically assigned by the topology to remove the overhead of manual administration
• Unlike the WWN addresses, port addresses are not built-in
• The switch is responsible for assigning and maintaining the port addresses
• The switch maintains the correlation between the port address and the WWN address of the device on that port
• The Name server is a component of the fabric operating system running on the switch
41 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fibre Channel port address (1 of 2)
42 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fibre Channel port address (2 of 2)
Available addresses:
239 x 256 x 256 = 15,663,104
43 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Simple Name Server
• The Name server stores information about all of the devices in the fabric
• An instance of the Name server runs on every Fibre Channel switch in a SAN
• A switch service that stores names, addresses, and attributes for up to 15 minutes and provides them as required
to other devices in the fabric
44 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
10-bit addressing mode
• The number of physical ports on the switch is limited to 256 by the number of bits in the Area part of the Fibre
Channel address.
• Director switches, such as Brocade DCX and DCX 4, support Virtual Fabric, where the number of required
ports might easily grow to more than 256.
• To support up to 1,024 ports in a Virtual Fabric, use the 10-bit addressing mode.
• The 10-bit addressing mode uses the 8-bit Area_ID and the borrowed upper 2 bits from the AL_PA portion of
the port ID.
45 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Arbitrated loop addressing
46 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Arbitrated loop order sets
• An Arbitrated Loop uses arbitration, and a switched fabric uses flow control to prevent data overruns at the
receiver side.
• Fibre Channel implements a credit-based flow-control mechanism to prevent frame dropping.
• The transmitter (Tx) can send frames in the amount of the buffer-to-buffer (B2B) credits reported by the
receiver (Rx).
• For each packet sent, the Rx port needs to send an R_Rdy (Receiver_Ready, Fibre Channel Primitive) signal.
48 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Types of flow control
49 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fibre Channel class of service
• Fibre Channel defines several classes of service (CoS), which can be used by applications to provide the
optimal type of delivery priority and flow control, depending on the type of application data.
• Each CoS uses a connection-oriented, packet-switched, or quality of service (QoS) communication strategy.
50 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fabric zoning
51 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Hard and soft zoning
Hard zoning
• A member is identified by its port number
• Known as “hard” zoning
• Enforced by a switch at a hard level
Soft zoning
• A member is identified by its port WWN
• Known as “soft” zoning
• Enforced by the Name server, which returns filtered
responses to port queries
52 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Software zone enforcement
• The Name server service in the fabric masks the Name server entries that a host should not access.
• When the host logs in to the fabric, it discovers only the unmasked Name server entries.
• Software-enforced zoning has no mechanism that prevents a host from accessing storage.
53 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Hardware zone enforcement
• Hardware enforcement
− Frame-based
− Session-based
• Performed by the Application-Specific Integrated Circuits (ASICs) in fabric switches
• A proactive security mechanism
• Every port has a filter that allows only the traffic defined by the zoning configuration to pass through
54 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Zoning decisions
55 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Traffic isolation zones
56 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Brocade QoS zones
57 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
LSAN zones
58 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fabric segmentation
• Fabric segmentation occurs when two or more switches are joined together by ISLs but they do not
communicate with each other
• Possible causes for fabric segmentation are:
− Zone type mismatch
− Zone content mismatch
− Zone configuration mismatch
− Duplicate domain IDs
59 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
iSCSI storage area network
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
The value of an iSCSI SAN architecture
61 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Built for virtualization
HP StoreVirtual Technology
62 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
HP StoreVirtual for iSCSI and Fibre Channel
For customers:
• With disjointed storage pools across Fibre Fibre Channel 10GbE IP network
Centralized
Channel and iSCSI networks management network (SAN/iQ OS/iSCSI)
− Leverages a single storage architecture for console
HP StoreVirtual
4330 or 4730
63 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
HP StoreVirtual storage clustering
64 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Scale-out architecture
65 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Seamless and nondisruptive data mobility
Motion
Peer Motion
• Locations
• Form factors 43
30
• Disk types 43
Peer
30
43
30
• Different generations 43
30
66 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Network RAID
67 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Network RAID 0
68 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Network RAID 10
69 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Network RAID 10+1
70 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Network RAID 10+2
71 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Network RAID 5
72 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Network RAID 6
73 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Storage area network security
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
SAN security
• Storage security is the act of protecting the data that resides in the SAN from unauthorized access.
• Security is an Internet Protocol (IP) issue, not a Fibre Channel issue.
• To provide proper protection, all aspects of data security must be addressed.
• On average, more resources are spent on protecting web servers than on protecting SANs.
75 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Security model
76 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Elements of storage security
77 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Differentiating data security and data protection
78 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Transitive trust problem
• SAN security must not be treated separated from the security of other parts of IT infrastructure such as
networking.
• If there is a network security breach, SAN data becomes exposed even if the storage infrastructure remains
intact.
• Risk mitigation includes:
− Identification (authentication)
− Authorization (LUN and tape access permissions)
− Audit
− Encryption (data on disk and tape and data in transit)
79 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
SAN security: Where and how to implement it
Where? How?
• Enable authentication for: • To prevent unauthorized access:
− User − Use multilevel passwords.
− Management − Use Access Control Lists (ACLs).
− Server − Use centralized access control or Domain
− Switch authentication.
80 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fabric Access Control Lists (ACLs)
• The Brocade Fabric OS provides following policies: • The FCS, DCC, and SCC policy members are
− Fabricconfiguration server (FCS) policy specified by the device port WWN, the switch
− Device connection control (DCC) policies
WWN, domain IDs, or switch names, depending on
the policy
− Switch connection control (SCC) policy
81 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Device authentication
82 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Device authorization
83 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Data encryption
84 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Management security
85 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Data protection
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Data protection overview
87 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Challenges in data protection
88 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Recovery Time and Recovery Point Objectives
• The Recovery Time Objective (RTO) is the goal for how quickly you need to have your information available
after downtime has occurred.
• The Recovery Point Objective (RPO) describes the point in time to which data must be restored to successfully
resume processing.
RPO RTO
Time
89 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Data protection
• Physical tapes
− Traditional destination for backup sets
− Shelf life of up to 30 years
− Requires tape library solutions to handle complex
backup environments
• Virtual Tapes
• Replication
− Local
− Remote
• Clustering
90 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Data protection topologies
• Centralized server backup − Tape libraries are connected to the SAN fabric
− Client-server architecture
− One server has a tape library attached
− Uses a LAN to transport data
• The LAN might become a bottleneck
91 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Tape libraries
92 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Virtual tape libraries
HP StoreOnce Backup
93 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Remote Copy introduction
94 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Fibre Channel-based Remote Copy
High performance
• Used for campus-distance solutions
• Offers low latency and high bandwidth
Flexible
• Direct or Fibre Channel SANs are supported
• Extended-distance technologies
− Longwave links
− FCIP bridging or routing
95 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Native IP-based Remote Copy
96 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Synchronous mode operation
2 4
97 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Asynchronous periodic operation
2
Only the most
Data is written to recent data is
the cache on two written to the cache
Host nodes on the nodes
server
1
Write request
Only the most
recent data is
Primary Storage copied over, Secondary or
3 “deltas” Backup Storage
Array
Array
Primary
acknowledges
the Host Scheduled or manual resynchronization
98 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Synchronous long distance
Fibre Channel sync mode
Bidirectional between
Source and Sync targets A
A ’
• The same volume is protected on two arrays.
− One in synchronous mode B Metropolitan distance
− One in asynchronous mode B
’ (Source – Sync site)
IP idire and
• In the case of a failure, a full sync of a volume is not
or
Un urc
k
FC on R t
lin
So
required
IP al b arg
by
cti D
e
nd
as
yn twe ts
Sta
c m en
e
od
A
e
e
’
DR Site,
Target 2
Continental distance
(Source, Sync – DR Site)
99 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Deduplication
100 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Deduplication in remote and branch office setups
101 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Storage area network design
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
SAN design considerations
Distance &
Geographic
Layout
Availability Performance
Management &
Security
103 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Planning considerations
104 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
HP standard supported SAN topologies
TIP: HP SAN design rules are explored in the SAN Design Guide available at:
http://www.hp.com/go/sandesign
105 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
HP SAN Design Reference Guide
106 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
SAN fabric topology overview
Single-switch fabric
Cascaded fabric
Meshed fabric
Ring fabric
Core-edge fabric
107 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Single-switch fabric
108 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Cascaded fabric
110 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
ISL connections in a meshed fabric
111 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Ring fabric
112 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Ring fabric with satellite switches
113 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Core-edge fabric (1 of 2)
114 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Core-edge fabric (2 of 2)
115 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Topology data access
Local (one-to-one)
• Data access between a local server and a storage system connected to the same switch
Centralized (many-to-one)
• Data access between multiple, dispersed servers and one centrally located storage system
Distributed (many-to-many)
• Data access between multiple, dispersed servers and storage systems
116 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Data access performance by SAN fabric topology
117 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Topology maximums
• The maximum number of supported switches and ports for specific fabric topologies can vary.
• The number of switches and ports depends on:
− The number of hops in the fabric topology
− The number of ISLs
118 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
B-series switch and port topology maximums
119 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
C-series switch and port topology maximums
120 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
H-series switch and port topology maximums
121 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Data availability
The data availability level required for your SAN environment is based on:
• The administrative requirements
− Examples: Backup schedules, operating procedures, and staffing
• The protection level for applications or data
• The hardware redundancy
122 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Single-connectivity fabric
Level 1
• Maximum connectivity
• No fabric resiliency or redundancy
• Each switch has one path to other switch or fabric
• Each server or storage system has one path to the
fabric
123 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Single resilient fabric
Level 2
• Provides fabric path redundancy by using multiple
ISLs between switches
• Each server and storage system has one path to the
fabric
• There is no interruption in I/O activity in the event of
a switch port or ISL failure
124 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Single resilient fabric with multiple device paths
Level 3
• Provides multiple server and storage system paths to
the fabric to increase availability
• There is no interruption of I/O in the event of a
switch, server HBA, or storage system path failure
125 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Multiple fabrics and device paths (NSPOF)
Level 4
• Provides multiple data paths between servers and
storage systems, but the paths connect to physically
separate fabrics
• Provides the highest availability and no single point
of failure (NSPOF) protection
• Minimizes the vulnerability to fabric failures
• Using two fabrics might increase the implementation
costs, but it also increases the total number of
available ports
126 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Data availability level considerations
127 © Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.
Thank you
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential – For training purposes only.