Download 5.10.3. Storage Area Network

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Business intelligence wikipedia , lookup

Information privacy law wikipedia , lookup

OneDrive wikipedia , lookup

B-tree wikipedia , lookup

Disk formatting wikipedia , lookup

Object storage wikipedia , lookup

Transcript
5.10. DISK ATTACHMENT
Computers access disk storage in two ways.
1. Via I/O ports (or host-attached storage); this is common on small systems.
2. Via a remote host via a distributed file system; this is referred to as
network-attached storage.
5.10.1. Host-Attached Storage
Storage accessed via local I/O ports. These ports are available in
several technologies.
1. SCSI(small scale system interface) itself is a bus, up to 16 devices on
one cable, SCSI initiator requests operation and SCSI targets perform tasks

Each target
 can have up to 8 logical units (disks attached to device

controller)
2. FC (fiber channel) is high-speed serial architecture. This can operate over
optical fiber or over a 4-conductor copper cable.
It has two variants:
(a) It can be switched fabric with 24-bit address space – the basis of storage
area networks (SANs) in which many hosts attach to many storage units
(b) It can be arbitrated loop (FC-AL) of 126 devices
5.10.2. Network-Attached Storage(NAS)
Storage made available over a network rather than over a local connection
(such as a bus).
Implemented via remote procedure calls (RPCs) between host and storage
The remote procedure calls
RPCs are carried via TCP or UDP over an IP network-usually the same local
area network (LAN) that carries all data traffic to the clients.
The NAS unit is usually implemented as a RAID array with software that
implements the remote procedure call interface.
Fig.Network-attached storage.
(+) Network-attached storage provides a convenient way for all the computers on a
LAN to share a pool of storage.
(-) It tends to be less efficient and have lower performance than some directattached storage options.
5.10.3. Storage Area Network
One drawback of NAS systems is that the storage I/O operations consume
bandwidth on the data network, thereby increasing the latency of
communication.
network
The solution is SAN.
SAN is a private network & is common in large storage environments.
Multiple hosts attached to multiple storage arrays can attach to the same SAN,
and storage can be dynamically allocated to hosts – More flexible
Fig. Storage-area network.
5.11. STABLE-STORAGE IMPLEMENTATION
Information residing in stable storage is never
lost. To implement stable storage:
o Replicate information on more than one nonvolatile storage media with
independent failure modes.
o Update information in a controlled manner to ensure that we can recover
the stable data after any failure during data transfer or recovery.
A disk writes results in one of three outcomes:
Successful completion
The data were written correctly on disk.
Partial failure
A failure occurred in the middle of transfer, so only some of the sectors
were written with the new data & the sector being written during the
failure may have been corrupted.
Total failure
The failure occurred before the disk write started, so the previous data
values on the disk remain undamaged.
Whenever a failure occurs during writing of a block, the system detects it
and invokes a recovery procedure to restore the block to a consistent state. To do
that, the system must maintain two physical blocks for each logical block.
An output operation is executed as follows:
1. Write the information onto the first physical block.
2. When the first write completes successfully, write the
same information onto the second physical block.
3. Declare the operation complete only after the second write
completes successfully.
Recovery Procedure: During recovery from a failure, each pair of physical blocks
is examined.
1. If both are the same and no detectable error exists, then no further
action is necessary.
2. If one block contains a detectable error, then we replace its contents with
the
value of the other block.
3. If both blocks contain no detectable error, but they differ in content,
then we replace the content of the first block with the value of the
second.
This recovery procedure ensures that a write to stable storage either
succeeds completely or results in no change.