Prévia do material em texto
Storage Technology Trends
Huawei Confidential2
Foreword
Data carries information during the transmission on networks. What is the
relationship between information and data? What is the function of data
storage? This course describes the definition of information and data in the
computer field, their relationship, as well as the concept, development
history, and development trend of data storage.
Huawei Confidential3
Objectives
On completion of this course, you will be able to understand:
Definition of information and data
Concept of data storage
History of data storage
Development trend of data storage products
Huawei Confidential4
Contents
1. Data and Information
2. Data Storage
3. Development of Storage Technologies
4. Development Trend of Storage Products
Huawei Confidential5
What is Data
SNIA (Storage Networking Industry Association) defines data as the digital
representation of anything in any form.
Ebook
Digital video
Email
Digital music
0101001010100010000011
1100011100010001110001
1100000111101010100101
0101001010100101001010
1001010101001010100010
1010010101001010101010
0101010101010010100010
0101001010101010100101
0101001010101010100101
0101010010100101001000
1010101001001010010010
Format in which data is stored
Huawei Confidential6
Data Types
Structured
data
Unstructured
data
Semi-
structured
data
Huawei Confidential7
Data Processing Cycle
Data processing is the reorganization or reordering of data by humans or
machines to increase their specific value. A data processing cycle includes three
basic steps: input, processing, and output.
Input Processing Output
Huawei Confidential8
What is Information
Information is processed, structured, or
rendered in a given context to make it
meaningful and useful.
Information is processed data, including
data with context, relevance, and
purpose. It also involves the manipulation
of raw data.
Information
Data
Redundancy
Data
Processing
Huawei Confidential9
Data vs. Information
After being processed, data can be converted into information.
In order to be stored and transmitted in IT systems, information need to be
processed as data.
Item Data Information
Feature Raw and meaningless, with no
specific purpose
Valuable and logical
Essence Original materials Processed data
Dependence Data never depend on information Information depends on data
Example
Meteorological data or satellite
image data
Weather forecasts
Huawei Confidential10
Information Lifecycle Management
Information lifecycle management (ILM) refers to a set of management
theories and methods from the stage in which the information is generated and
initially stored to the stage where the information is obsoletely deleted.
Data
creation
Data
protection
Data
access
Data
archiving
Data
destruction
Data value
Data
migration
Huawei Confidential11
Contents
1. Data and Information
2. Data Storage
3. Development of Storage Technologies
4. Development Trend of Storage Products
Huawei Confidential12
What is Data Storage
Storage in a narrow sense Storage in a broad sense
Huawei Confidential13
Storage devices
Disk array
Tape library
Virtual tape
library
……
Connection elements
HBA cards
Switches
Cables
……
Disaster recovery (DR) solutions
Backup solutions
Storage management software
Snapshot and mirroring software
Backup software
Multipathing software
Solutions
Storage hardware
Storage software
Data Storage System
Huawei Confidential14
Physical Structure of Storage
Network switching devices
The front-end board of
controllers
Cache
The back-end board of
controllers
Connectors
Disks
NAS gateway
Storage management
software
Storage application
software
Hosts
Storage
System
Huawei Confidential15
Data Storage Types
Storage
External
Storage
DAS
FAS
SAN
NAS
Internal
Storage
Huawei Confidential16
Evolution of Data Management Technologies
Manual
management
File system
management
Traditional
database
system
management
Big data
management
Card and paper
tape
Tape and single
disk
Dedicated
storage device
Distributed
storage device
Huawei Confidential17
Data Storage Application
File servers
Offline
storage
Data
generation
Data
processing
Data
management
Database servers
Email servers
Application
servers
Users
Employees
Online storage Nearline storage
Classification based on data access frequencies
Huawei Confidential18
Contents
1. Data and Information
2. Data Storage
3. Development of Storage Technologies
Storage Architecture
▫ Storage Media
▫ Interface Protocols
4. Development Trend of Storage Products
Huawei Confidential19
1950s
• Traditional
storage
1980s
• External
storage
1990s
• Storage
network
2000s
• Distributed
storage
• Cloud storage
History of Storage Architecture Development
Huawei Confidential20
From Disks to Disk Arrays
CPU
RAM
Disks
Server
JBOD
CPU
RAM
Disks
Server
CPU
RAM
Disks
Server
Controllers
Disks in a server Early external storage Storage arrays
Huawei Confidential21
From Separation to Convergence
NAS
LAN
Server
Storage
File
system
NAS
SAN
Server
Storage
File
system
SAN
Server
Storage
File
system
Ethernet
Clients Unified
Storage
SAN
Huawei Confidential22
Distributed Storage
Physical resources are organized using
software to form a high-performance
logical storage pool, ensuring reliability
and providing multiple storage services.
Generally, distributed storage scatters
data to multiple independent storage
servers in a scalable system structure. It
uses those storage servers to share
storage loads and uses location servers
to locate storage information.
Management
network
Front-end
service
network
...
Back-end storage network
Node NodeNode Node
Huawei Confidential23
Storage Virtualization
Storage virtualization consolidates the
storage devices into logical resources,
thereby providing comprehensive and
unified storage services.
Unified functions are provided
regardless of different storage forms
and device types.
Logical resources
Management
Physical resources
Clients or servers
Virtualization
Huawei Confidential24
Cloud Storage
The cloud storage system combines multiple storage devices, applications, and services. It uses
highly virtualized multi-tenant infrastructure to provide scalable storage resources for enterprises.
Those storage resources can be dynamically configured based on organization requirements.
Converged
Elastic
Open
New
applications
Legacy
applications
Object storage serviceFile storage serviceBlock storage service
Universal hardware platforms
Storage device and storage node
Protocol and interface
Huawei Confidential25
Contents
1. Data and Information
2. Data Storage
3. Development of Storage Technologies
▫ Storage Architecture
Storage Media
▫ Interface Protocols
4. Development Trend of Storage Products
Huawei Confidential26
History of HDDs
Larger capacity with the smaller size.
1950s–1960s
Giant disk
1960s–1970s
14-inch disk
1970s–1980s
8-inch disk
1980s-1990s
Portable
1990s-
Microdrive
IBM 350 RAMAC
IBM 1301
IBM 3340 Disks started to
enter the civil
market
5.25-inch
3.5-inch
2.5-inch
1.8-inch
Hitachi: 1-inch
Toshiba: 0.85-
inch
...
Huawei Confidential27
History of SSDs
Solid-state drives (SSDs) were invented almost as early as HDDs, but were not
popular at that time due to high price and the rapid development of HDDs at
the end of the 20th century.
With the requirement for high access speed, SSDs are booming.
• Bell Labs
• Floating gate
transistor
1967
• Dataram sold
Bulk Core.
• 2 MB capacity
1976 • SanDisk
launched flash
SSDs.
• 20 MB capacity
1991
• BiTMICRO
launched flash
SSDs.
• 18 GB capacity
1999 • Samsung
released laptops
using SSDs.
• 32 GB capacity
2006
• Lower costs
• Greater capacity
2010…
Huawei Confidential28Development of Flash Memory
Single-level
cell (SLC): fast
read/write and
long service
life
Multi-level cell
(MLC):
moderate
read/write
speed and
service life
Triple-level cell
(TLC): mature
mainstream
technology
3D TLC:
improve the
storage density
through multi-
layer
overlaying
Quad-level cell
(QLC): larger
and cheaper,
applicable to
warm data
Huawei Confidential29
Contents
1. Data and Information
2. Data Storage
3. Development of Storage Technologies
▫ Storage Architecture
▫ Storage Media
Interface Protocols
4. Development Trend of Storage Products
Huawei Confidential30
Interface Protocols
Disk interfaces connect disks to hosts.
Interface protocols refer to the communication modes and requirements that
interfaces for exchanging information must comply with.
Parallel interface Serial interface
Huawei Confidential31
History of Interface Protocols
2004 2008 2012 2016 2017 2018
4G FC
SAS 1.0
SATA 2.0
2020…
Host interface
Disk interface
SAS 2.0 SAS 3.0 SAS 4.0
NVMe 1.0 NVMe 1.2 NVMe 1.3
SATA 1.0
NVMe 1.4
SATA 3.0
8G FC 16G FC 32G FC 64G FC
NVMe-oF 1.0
(RDMA) NVMe-oF 1.1
(TCP)
NVMe-oF
(FC-NVMe)
iSCSI2G FC
4G FC
The first-gen FC
protocol was
released in 1994.
100G
Ethernet
400G
Ethernet
Huawei Confidential32
NVMe and NVMe-oF
NVMe, Non-Volatile Memory Express
Improve the performance
Reduce the latency
NVMe-oF, NVMe over Fabrics
Potential: low latency and high
bandwidth
Purpose: accelerate the data
transmission among the storage
network
SAS back-end
physical path
NVMe back-end
physical path
CPU
PCIe
CPU
PCIe
SAS Controller
SAS Expander
Huawei Confidential33
Contents
1. Data and Information
2. Data Storage
3. Development of Storage Technologies
4. Development Trend of Storage Products
Huawei Confidential34
History of Storage Products
IntelligenceAll-flash
Cloud
Trend
HDD SSD
Media
Centralized Distributed
Architecture
Manual O&M Intelligent O&M
Management
Huawei Confidential35
Steam Age Electricity Age Information Age Intelligence Age
+
AI
Internet
Cloud
computing
IoT
Big data
Data + Intelligence
Service extension
Network coordination
Customization
Intelligent production
Service
Agriculture
Industry
The Intelligence Era is Coming
Huawei Confidential36
Challenges to Data Storage
24/7
Always-on
services for all
things connected
µs-level
Real-time, high-speed
processing of production
transactions in the 5G era
EB-level
Data monetized as
assets and intelligent
storage tiering,
turning cold data to
warm data to mine
data value
Reliable Fast
Large Efficient
TCO reduction
Edge-center-cloud
synergy, minimizing
the per-bit data cost
and maximizing the
value
Finance
Carrier
Large
enterprise
Gov & Public
Energy & Electricity
Transportation
High disk
failure rate
Service
interruption due
to multiple points
of failure
Unstable latency
under high
concurrencyInefficient convergence of
block, file, and object
services
Time-consuming of
RAID reconstruction
Low data
deduplication and
compression ratio
Huawei Confidential37
Characteristics of Storage in the Intelligence Era
Storage in the intelligence
era
Zero data migration Data collaboration
Robust reliability Large capacity
Efficient deduplication &
compression
Cost-effective media, warm and
cold data storage
Intelligent storage tiering of hot,
warm, and cold data
Solution-level reliability +
Cloud-level DR
PB-level to EB-level
High performance
ms-level to µs-level
Minimum cost and maximum value for per-bit data
Data convergence
Dedicated hardware and
distributed storage
AI in storageStorage for AI
Multi-service convergence
(block, file, and object)
Convergence of
SAN and NAS
Intelligent distributed cacheSystem-level of 99.999%
Device-level of 99.99999%
High-speed protocols
and algorithms
Simplified protocol stack and data-
storage convergence
Compute-storage collaboration, on-
demand capacity expansion
Intelligent data lifecycle
management
Hardware + Algorithm + Architecture = Efficient storage
Huawei Confidential38
Data Storage Trend
HDD SSD
x86
IP
VM
FC IBSAS
Database
applications
Traditional
external
storage
Cloud
computing
Distributed
storage
Hyper-
converged
infrastructure
(HCI)
Mainframe
system
Private software
and hardware
solutions with
fully coupled
computing,
storage, and
network
resources,
applicable only to
large
organizations
Storage in
the
intelligenc
e era
Container
AI
Big data
Blockchain
Tensor
computing
Brain-like
computin
g
Graph
computing
DNA
computing
5G
CXL HCCS
RoCE/NVMe
PCM
Quantum dot
MRAM
Optical storageBiomolecule
General-
purpose
computing
Huawei Confidential39
Blu-ray storage Gold nanostructured glass
Long service
life
High
reliability
100 GB+ per
disk
10 TB per
disk
Long-term
stable storage
Low power
consumption
50 years >>> 600 years
Optical Storage Technology
Huawei Confidential40
DNA Data Storage
A small number of synthetic DNA molecules can store a large amount of data,
and can freeze, dry, transport, and store data for thousands of years.
Advantages of using DNA as storage media:
Small size
High density
Strong stability
Bottlenecks and limitations:
High costs of DNA molecular synthesis
Slow data read and search
Huawei Confidential41
Atomic Storage
In 1959, physicist Richard Feynman suggested that it was possible to use atoms to store
information if they could be arranged the way we wanted.
Because an atom is so small, the capacity of atomic storage will be much larger than that of the
existing storage medium in the same size.
With the development of science and technology, arranging the atoms the way we want has
become a reality.
Bottlenecks and limitations:
Strict requirements on the operating environment.
Huawei Confidential42
Quantum Storage
Now, information in electronic devices is stored and moved through the flow of electrons.
If electrons are replaced by photons, the movement of information within the computer may
occur at the speed of light.
Although the storage efficiency and service life are improved, the quantum storage is still difficult
to be widely applied at present.
Quantum storage cannot meet the following requirements:
High storage efficiency
Low noise
Long service life
Operating at room temperature
Huawei Confidential43
Storage Network Trend
AS-IS
FC SAN and IP SAN
TO-BE
Converged AI Fabric network
High network costs: The FC private network has low latency but high
costs. The IP SAN has low costs but high latency and poor performance.
High O&M costs: IP SAN and FC SAN require dedicated O&M personnel
separately, and do not support cloud-and-network synergy
Reduced network costs: Open Ethernet carries high-performance, low-
latency, and low-cost storage networks.
Reduced O&M costs: No dedicated O&M skills are required, and unified
network management is supported for data centers.
iNIC iNIC
25/100G Eth
Low latency
No packet loss
Flexibility
FC
SAN
LAN
Eth
10G IP SAN
16G FC SAN
10G Eth
IP SAN
NIC
FC SAN
Low latency
Flexibility
IP SAN
NIC
FC SAN
IP
SAN
Low cost
Huawei Confidential44
History of Huawei Storage Products
2002
Dived into
storage
technical
research
2003
Launched
FC storage
2013
Launched T
series
unified storage
2012
Launched self-
developed
HSSDs, pioneer
in the all-flash
industry
2015
2014
2017
2018
Leader in Gartner
Magic Quadrant
for the first time
Industry's first
full-series
NVMe all-flash
storage
2019
Start out Grow Lead
2011
Distributed
clustered
NAS storage
2006
Released
self-
developed
IP SAN
2007
Released self-
developed
virtual storage
2008
Launched 2nd-
gen FC storage.
Founded
Huawei
Symantec Co.,
Ltd.
2009
First SAN&NAS
converged
storage
Huawei
OceanStor V3
2016
Huawei OceanStor
Dorado, fastest
all-flash storageFirst high-end
storage
accelerated by AI
chips
Interop Best
of Show
Award
2nd-gen high-
end storage1st-gen high-
end storage
SmartMatrix
architecture Best-in-class of
the year
2020
Huawei
OceanStor
Pacific series
Huawei Confidential45
Hardware
Intelligence
+
Intelligent scheduling
Intelligent data reduction Intelligent data storage
DRAM SCM SLC/QLC QLC/OLC
ns µs 50 µs 200 µs
Memory
media
SSD
media
Network
chip
Network
chip
DRACPU SCMNPU SSDGPU
Memory Fabric
All IP
Storage Database Big data Edge
• Intelligent
tiering
• Intelligent
prefetch
• Intelligent
prediction
• Deep
compression
• Intelligent
global
prediction
• CPU/GPU
acceleration
• Container •Heterogeneous computing power •Near-data computing
ArchiveBackupAnalysisProductionEdge
Intelligent data reduction
• AI-based prediction
• Intelligent CPU and GPU reduction algorithms
Intelligent data storage
• Optimal media combination using technologies
such as intelligent prefetch, data tiering, hotspot
identification, and data caching
Intelligent scheduling
• Dynamic management of heterogeneous
computing resources; near-data computing
scheduling; quick start of containers
Memory Fabric: high-performance network centered
on memory
• High-performance network with ns-level latency
• Memory pooling and tiering
All IP: extremely low cost of SSD media
• In-depth disk-controller collaboration,
SLC/QLC/OLC evolution
• All IP to build an ultra-simplified network
Architecture of Huawei Intelligent Data Storage Products
Huawei Confidential46
Quiz
1. (Multiple-answer question) Which of the following are data types?
A. Structured data
B. Semi-structured data
C. Unstructured data
D. Massive amounts of data
2. (Multiple-answer question) Which of the following statements about storage are correct?
A. Storage refers to disks.
B. A storage system consists of storage hardware, software, and solutions.
C. Storage types include block storage, file storage, and object storage.
D. File storage is used to store data of data applications.
Huawei Confidential47
Quiz
3. (Multiple-answer question) Which are characteristics of cloud storage?
A. Convergence
B. Open
C. Elasticity
D. Scale-up
4. (Multiple-answer question) Which of the following are the objectives of integrating AI into storage?
A. Simple
B. Efficient
C. High power consumption
D. Easy to use
Huawei Confidential48
Summary
Trend of Storage
Technologies
Storage Architecture
Storage Media
Interface Protocols
Data and Information
Data Storage
Storage Technologies
Storage Products
Huawei Confidential49
More Information
Huawei
Enterprise
Service App
Enterprise
Technical
Support App
Huawei Confidential50
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Intelligent Storage Components
Huawei Confidential2
Foreword
This chapter describes the components of the storage system, including the
controller enclosure, disk enclosure, disks, interface modules, and
connection modes between enclosures and their respective working
principles.
Huawei Confidential3
Objectives
Upon completion of this course, you will understand:
Storage product forms
Functions and components of controller enclosures and disk enclosures
Working principles of HDDs and SSDs
Cables and interface modules for connecting storage enclosures and the
connection methods
Huawei Confidential4
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
Huawei Confidential5
Storage Product Form
2 U, disk and
controller integration
4 U, disk and
controller separation
Integrated bay
Note: Huawei OceanStor Dorado V6 is used as the example.
Huawei Confidential6
Controller Enclosure
The controller enclosure uses a modular design and consists of a system subrack,
controllers (with built-in fan modules), BBUs, power modules, management modules,
and interface modules.
Controller
System Subrack
Management
Module
Interface
Module
Power Module
Huawei Confidential7
Front View of a Controller Enclosure
2U controller enclosure (disk and controller integration)
Icon Description
Enclosure ID indicator
Enclosure location indicator
1. Blinking blue: The controller
enclosure is being located.
2. Off: The controller enclosure is
not located.
Enclosure alarm indicator
1. Steady amber: An alarm is
reported by the controller
enclosure.
2. Off: The controller enclosure is
working properly.
Power indicator/Power button
4U controller enclosure (disk and controller separation)
Note: Huawei OceanStor Dorado V6 is used as the example.
Huawei Confidential8
Rear View of a Controller Enclosure
1 2 3
6
4 5
7
8 9
No. Description
1 Management port
2 Maintenance port
3 Serial port
4 Interface module
5 Power-BBU module
6 SAS expansion port
7 Interface module
8 Management module
9 Power module
Huawei Confidential9
Controller
Disk
enclosure
Controller enclosure
Controller
FE
BE
Cache
CPU
Controller
Cache
CPU
FE
BE
Cache data
A controller is the core component of a storage system. It processes storage
services, receives configuration management commands, saves configuration
data, connects to disks, and saves critical data to coffer disks.
Huawei Confidential10
BBU and Fan Module
Fan module
BBU latch Fan latch
Running/Alarm
indicator of the fan
Running/Alarm
indicator of the BBU
Front viewBBU
Huawei Confidential11
Coffer Disk
Alarm/Location indicator
Running indicator
Latch
Handle
Label
Disk
2.5-inch coffer disk
Alarm/Location indicator
Running indicator
Latch
Handle
Label
Disk
Palm-sized NVMe coffer SSD
Note: Huawei OceanStor Dorado V6 is used as the example.
Huawei Confidential12
Power Module
The AC power module supplies power to the controller enclosure, allowing the
enclosure to operate normally at maximum power.
Handle
Running/
Alarm
indicator Latch
Power socket
Note: Huawei OceanStor Dorado V6 is used as the example.
Huawei Confidential13
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
Huawei Confidential14
Disk Enclosure
The disk enclosure uses a modular design and consists of a system subrack,
expansion modules, power modules, and disks.
System Subrack
Expansion
Module
Power
Module
Disk Drive
Module
Huawei Confidential15
Front View of a Disk Enclosure
2 U 25-slot SAS disk enclosure
2 U 36-slot smart NVMe disk enclosure
Icon Description
ID indicator of the disk enclosure
Location indicator of the disk enclosure
1. Blinking blue: The disk enclosure is being located.
2. Off: The disk enclosure is not located.
Alarm indicator of the disk enclosure
1. Steady yellow: An alarm is reported by the disk
enclosure.
2. Off: The disk enclosure is working properly.Power indicator of the disk enclosure
1. Steady green: The disk enclosure is powered on.
2. Off: The disk enclosure is powered off.
Power indicator/Power button
1. The disk enclosure is powered on and off with the
controller enclosure. The power button on the disk
enclosure is invalid and cannot be used to power
on or off the disk enclosure separately.
Note: This slide shows the front views of a 2 U SAS
disk enclosure and a 2 U smart NVMe disk enclosure
of Huawei OceanStor Dorado V6.
Huawei Confidential16
Rear View of a Disk Enclosure
2 U SAS disk enclosure
2 U smart NVMe disk enclosure
1 2 3
4
5
6 7 8
No. Description
1 Serial port
2 Mini SAS HD expansion port
3 ID display
4 Expansion module
5 Power module
6 Onboard expansion port
7 Onboard management port
8 Power module
Note: This slide shows the rear
views of the 2 U smart SAS and
smart NVMe disk enclosures of
Huawei OceanStor Dorado V6.
Huawei Confidential17
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
Huawei Confidential18
Expansion Module
Expansion module of a 2 U SAS disk enclosure
Connects to a controller enclosure through expansion ports
Expansion module of a 2 U smart NVMe disk enclosure
Connects to a controller enclosure through expansion ports
Huawei Confidential19
CE Switch
48 x 10GE electrical ports 4 x 60 Gbit/s optical ports
PWR1FAN1 PWR2FAN2
Rear view
Front view
Two Ethernet management ports (combo)
Console
USB port
Note: Huawei CE6800 series switches are used as an example.
Huawei Confidential20
Fibre Channel Switch
Management ports
(serial port and
Ethernet port) USB port 24 Fibre Channel ports Power socket
Note: Huawei SNS2124 is used as an example.
Three link
aggregation groups
Huawei Confidential21
Device Cables
1. Serial cable 2. Mini SAS HD
electrical cable
3. Mini SAS HD
optical cable
4. AOC cable
5. 100G
QSFP28 cable
6. 25G SFP28
cable
7. FDR cable 8. MPO-4*DLC
optical fiber
9. Optical fiber
Huawei Confidential22
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
HDD
SSD
5. Interface Module
Huawei Confidential23
Disk Type
What are the types of disks?
...
Structure
HDD
SSD
Dimensions
1.8-inch
2.5-inch
3.5-inch
5.25-inch
...
Interface
type
IDE
SCSI
SATA
SAS
FC
NVMe
... Application
scenario
Enterprise-class
Desktop-class
...
Huawei Confidential24
HDD Structure
An HDD consists of platters, an actuator arm, read/write heads, a spindle, a
port, and control circuits.
Platter
Spindle
Read/write head
Actuator arm
Port
Control circuit
Huawei Confidential25
HDD Working Principles
Platter
R/W Head
The head flies
over the platter.
The distance between the
head and the disk is small.
Basic
operation The platter is
driven by a motor.
Magnetic data
Landing zone
Spindle
Huawei Confidential26
Data Organization on a Disk
Motor
Platter
Cylinder
Sector Track
Head
Actuator
arm
Motor
Huawei Confidential27
Disk Capacity and Cache
Disk capacity
Disk capacity = Number of cylinders x Number of heads x Number of sectors x 512
bytes. The unit is MB or GB. The disk capacity is determined by the capacity of a
single platter and the number of platters.
Cache
Because the processing speed of a CPU is much faster than that of a disk, the CPU
must wait until the disk completes a read/write operation before issuing a new
command. To solve this problem, a cache is added to the disk to improve the
read/write speed.
Huawei Confidential28
Factors Relevant to Disk Performance
Single platter
capacity
Rotation speed
Seek speed
Port speed
Primary factor that determines the
throughput in the case of sequential I/Os
Primary factor that affects the random I/O
performance
Indirect factor for disk performance
The least important factor for disk
performance
Huawei Confidential29
Average Access Time
The average access time is determined by:
Average seek time
Average latency time
Seek time
Disc
Tracks
Seek
Wait time
Data Block
Latency
Huawei Confidential30
Data Transfer Rate
The date transfer rate is determined by:
Internal transfer rate
External transfer rate/Interface transfer rate
Disc
Tracks
Seek
Disk
Internal
External
Huawei Confidential31
Disk IOPS and Transmission Bandwidth
IOPS
Input/Output operations per second (IOPS) is a key indicator to measure disk
performance.
IOPS is calculated by the seek time, rotation latency, and data transmission time.
Transmission bandwidth (throughput)
Indicates the amount of data that is successfully transmitted in a unit time, that is,
the speed at which data streams are transmitted. For example, if it takes 10s to write
10,000 files of 1 KB size, the transmission bandwidth is only 1 MB/s; if it takes 0.1s to
write a 10 MB file, the transmission bandwidth is 100 MB/s.
Huawei Confidential32
Parallel and Serial Transmission
For example, the methods for transmitting numbers 1 to 8 are as follows:
Transmit
end
Receive
end
1
2
3
4
5
6
7
8
Parallel transmission
Transmit
end
Receive
end
12345678
Serial transmission
Multiple lines are connected between two ends,
and one number is transmitted on each line.
Only one line is connected between two ends. Eight
numbers are sent on this line in sequence. The receive
end has all numbers after eight transmissions.
Huawei Confidential33
Disk Port Technology
A disk must provide a simple port for users to access its data. Generally, disks
provide the following physical ports:
Used for the ATA
instruction system
Used for the SCSI
instruction system
IDE port
SATA port
Parallel SCSI port
Serial SCSI (SAS) port
Fibre Channel port
Disk
Ports
Huawei Confidential34
IDE Disk Port
The integrated drive electronics (IDE) port is also called the parallel ATA port.
ATA stands for Advanced Technology Attachment.
The ATA disk is also called the IDE disk.
The ATA port uses the parallel ATA technology.
Huawei Confidential35
SATA Port
SATA is short for serial ATA.
SATA ports use serial transmission and provide a higher rate than IDE ports.
SATA uses a point-to-point architecture and supports hot swap.
SATA Version Line Code Transfer Rate Throughput
1.0 8b/10b 1.5 Gbit/s 150 MB/s
2.0 8b/10b 3 Gbit/s 300 MB/s
3.0 8b/10b 6 Gbit/s 600 MB/s
SATA Port
Power
Huawei Confidential36
SCSI Port
SCSI is short for Small Computer System Interface.
Huawei Confidential37
SAS Port
SAS is short for Serial Attached SCSI.
SAS is a point-to-point, full-duplex, and dual-port interface.
SAS is backward compatible with SATA.
Rate: 600 Mbit/s per channel
SAS features high performance, high reliability, and powerful scalability.
Huawei Confidential38
Fibre Channel Port
Fibre Channel disks use the Fibre Channel arbitrated loop (FC-AL).
FC-AL is a dual-port serial storage interface based on the SCSI protocol.
FC-AL supports full-duplex mode.
Fibre Channel provides a universal hardware transmission platform for upper-layer protocols
(SCSI and IP). It is a serial data transmission interface that features high speed, high reliability,
low latency, and high throughput.
40-pin Male FC-SCA II Connector
Huawei Confidential39
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
HDD
SSD
5. Interface Module
Huawei Confidential40
SSD Overview
Compared to HDDs, SSDs have absolute advantages in terms of performance, reliability,
power consumption, and portability. SSDs have been widely used in various industries.
SSD characteristics:
Uses NAND flash to save data, providing a faster speed than HDDs.
Has no mechanical structure inside, so it consumes less power, dissipates less heat, and
generates less noise.
Its service life is determined by the number of program/erase (P/E) cycles.
Huawei Confidential41
SSD Architecture
An SSD consistsof a control unit and a storage unit (mainly flash memory
chips).
Control unit: SSD controller, host interface, and DRAM
Storage unit: NAND flash
Host
interface
logic
RAM
Processor
Buffer
manager
NAND
flash
interface
Flash
Pkg
Flash
Pkg
Flash
Pkg
Flash
Pkg ...
...
Host
Interconnect
SSD Controller
Huawei Confidential42
NAND Flash
Internal storage units in NAND flash
include:
LUNs, planes, blocks, pages, and cells
Operations on the NAND flash include
erase, program, and read.
NAND flash is a non-volatile medium. A
block must be erased before new data is
written to it. A program/erase (P/E) cycle
is the process of erasing a block and then
writing it again.
Page 1
Page 0
...
Block B
Page P
Page 1
Page 0
...
Block 2
Page P
Page 1
Page 0
...
Block 0
Page P
...
Page Register
Plane
Address 0
Page 1
Page 0
...
Block B+1
Page P
Page 1
Page 0
...
Block 3
Page P
Page 1
Page 0
...
Block 1
Page P
...
Page Register
Plane
Address 1
Lo
gi
ca
l U
ni
t
0
Huawei Confidential43
SLC, MLC, TLC, and QLC
000
001
010
011
100
101
110
111
00
01
10
11
0
1
SLC-1bit MLC-2bit TLC-3bit
SLC
1. Supports 50,000 to 100,000
P/E cycles, providing the
best reliability.
2. The storage capacity is
small.
3. The cost is the highest.
MLC
1. Supports about 3,000 P/E cycles.
2. The speed is slower than that of
SLC.
3. The storage capacity is relatively
large.
4. The price is relatively low.
TLC
1. Provides higher data density and
supports only several hundred to
1,000 P/E cycles.
2. The reliability and performance
are low.
3. Generally used in personal
devices due to the cost
advantage, but cannot meet the
requirements of enterprise
products.
QLC-4bit
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
QLC
1. The capacity is further
improved by 33%.
2. The performance and life
cycle are further reduced.
Huawei Confidential44
...
Flash Chip Data Relationship
Cell Page Block
Plane Die
2 planes1478 blocks
768 pages146688 cells
... ...
......
...
...
Page is the minimum read/write unit, and block is the minimum program/erase unit.
Huawei Confidential45
Address Mapping Management
Logical block address (LBA)
Physical block address (PBA) 120º 12' east longitude, 30º 16' north latitude
HDD: The relationship between LBA and PBA is fixed.
Overwrite
SSD: The relationship between LBA and PBA is not fixed.
Non-overwrite: A block must be erased before new data is
written to it. New data and old data are at different
locations.
The Flash Translation
Layer (FTL) is responsible
for the conversion
between the LBA and PBA.
No. 26, XX Road, Binjiang District, Hangzhou City,
Zhejiang Province, People's Republic of China
Huawei Confidential46
FTL
Sector 0 Sector 1
Sector 2
Sector 3
Sector
0
Sector
2
Sector
1
Sector
4
Sector
3
Sector
5
Main controller
FTL mapping table: saved in the
internal SRAM/DRAM, external
DRAM, or NAND flash.
OS sector (512
bytes). File systems
read/write data in the
unit of 512 bytes.
FTL mapping
operation. The main
controller maps the
addresses based on
the mapping table.
Data is stored in the
NAND physical
addresses based on
the mapping table.
Huawei Confidential47
SSD controller
Channel 0 block Channel 1 block Channel 2 block Channel 3 block
Channel 4 block Channel 5 block Channel 6 block Channel 7 block
Data Write Process on an SSD (1)
The following uses eight channels as an example to demonstrate how the host writes data to the
SSD.
4 KB
Writes 4 KB
of data
Writes 16 KB
of data
Huawei Confidential48
Data Write Process on an SSD (2)
When the SSD is full, old data must be deleted to release space for new data. When a user
deletes and writes data, data in some blocks becomes invalid or aged.
SSD controller
Channel 0 block Channel 1 block Channel 2 block Channel 3 block
Channel 4 block Channel 5 block Channel 6 block Channel 7 block
Huawei Confidential49
Data Read Process on an SSD
SSD controller
Channel 0 block Channel 1 block Channel 2 block Channel 3 block
Channel 4 block Channel 5 block Channel 6 block Channel 7 block
4 KB
Reads 4 KB
of data
Reads 32 KB
of data
Huawei Confidential50
SSD Performance Advantages
SSD Performance Advantages
VS
IP/FC SAN
HDD storage system SSD storage system
Seek time
Mechanical latency
I/O I/O
2 SSDs 250 HDDs
2000
4000
SSD FC HDD
About 400-fold
Power consumption under 100,000 read IOPS
Power (W)
Huawei Confidential51
Use of SSDs in Storage Systems
Class A applications: high-concurrency applications featuring random reads and writes, such as databases
Class B applications: large files, images, and streaming media featuring sequential reads and writes
Class C applications: data backup or rarely used applications
Access frequency
Data distribution
A
C
B
SSD media
FC/SAS disk
SATA/NL-SAS/Tape
Huawei Confidential52
Contents
1. Controller Enclosure
2. Disk Enclosure
3. Expansion Module
4. Disk
5. Interface Module
Huawei Confidential53
GE Interface Modules
GE electrical interface module 40GE interface module 100GE interface module
Huawei Confidential54
SAS Expansion Module and RDMA Interface Module
25 Gbit/s RDMA
interface module
100 Gbit/s RDMA
interface module
12 Gbit/s SAS
expansion module
Huawei Confidential55
SmartIO Interface Module
Huawei Confidential56
PCIe and 56 Gbit/s IB Interface Modules
PCIe interface module 56 Gbit/s InfiniBand interface module
Huawei Confidential57
Fibre Channel and FCoE Interface Modules
Power
indicator/Hot
swap button
16 Gbit/s Fibre
Channel port
Link/Speed
indicator of
the port
Handle
Power
indicator/Hot
swap button
10 Gbit/s
FCoE port
Link/Speed
indicator of a 10
Gbit/s FCoE port
Handle
16 Gbit/s Fibre Channel interface module 10 Gbit/s FCoE interface module
Huawei Confidential58
Quiz
1. What are the types of SSDs?
A. SLC
B. MLC
C. TLC
D. QLC
2. Which of the following can be used to measure the performance of an HDD?
A. Disk capacity
B. Rotation speed
C. Data transfer rate
D. Average access time
Huawei Confidential59
Summary
Intelligent storage components
Controller enclosure
Disk enclosure
Expansion module
Disk
HDD
SSD
Interface module
Controller
Coffer disk
BBU
Expansion module
Device cables
Huawei Confidential60
More Information
Huawei
Enterprise
Service App
Enterprise
Technical
Support App
Huawei Confidential61
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
RAID Technologies
Huawei Confidential2
Foreword
This course introduces technologies of traditional RAID and RAID 2.0+. The
evolution of RAID technologies aims at data protection and performance
improvement.
Huawei Confidential3
Objectives
After completing thiscourse, you will be able to understand:
Common RAID levels
Different levels of data protection provided by different RAID levels
Working principles of RAID 2.0+
Dynamic RAID and RAID-TP
Huawei Confidential4
Contents
1. Traditional RAID
2. RAID 2.0+
3. Other RAID Technologies
Huawei Confidential5
Background
Problems in traditional computer systems must be addressed.
CPU
RAM
Disk
Instructions
processed per
second
> 1 million
> 100,000
< 300
Disks become the system performance bottleneck.
Operations on disks are limited, making it impossible to
provide large capacities.
Data is stored on individual disks, making it impossible
to provide consistent high data reliability.
Huawei Confidential6
What Is RAID?
Redundant Array of Independent Disks (RAID) combines multiple physical disks into one
logical disk in different ways, for the purposes of read/write performance and data
security improvement.
Implementations: hardware RAID and software RAID.
Physical
disk
Physical
disk
Physical
disk
Physical
disk
Logical disk
How large is
a logical disk?
Huawei Confidential7
Data Organization Forms
Disk striping: Space in each disk is divided into multiple strips of a specified size. Data is
also divided into blocks based on strip size when data is being written.
Strip: A strip consists of one or more consecutive sectors in a disk, and multiple strips
form a stripe.
Stripe: A stripe consists of strips of the same location or ID on multiple disks in the
same array.
D 7
D 4
D 1
Disk 2
D 6
D 3
D 0
Disk 1
D 8
D 5
D 2
Disk 3
Stripe 2
Stripe 1
Stripe 0
Data strips in
a disk
Data strips in
a disk
Data strips in
a disk
Depth of a stripe
Huawei Confidential8
Data Protection Techniques
Mirroring: Data copies are stored on another redundant disk.
Exclusive or (XOR)
XOR is widely used in digital electronics and computer science.
XOR is a logical operation that outputs true only when inputs differ (one is true, the other is
false).
0 ⊕ 0 = 0, 0 ⊕ 1 = 1, 1 ⊕ 0 = 1, 1 ⊕ 1 = 0
1
1
0
Physical disk 2
1
0
0
Physical disk 1
0
1
0
Parity disk
XOR for redundant backup
Huawei Confidential9
Common RAID Levels and Classification Criteria
RAID levels use different combinations of data organization forms and data
protection techniques.
RAID 0
RAID 1
RAID 3
RAID 5
RAID 6
RAID 10
RAID 50
Common RAID levels
Consists of striping, but
no mirroring or parity.
Consists of data mirroring,
without parity or striping.
Consists of byte-level striping
with dedicated parity.
Consists of block-level striping
with distributed parity.
Consists of block-level striping with
double distributed parity.
RAID 0 is implemented after RAID
1 is implemented.
RAID 0 is implemented after RAID
5 is implemented.
Huawei Confidential10
How Does RAID 0 Work
D 4
D 2
D 0
Physical disk 1
D 6
D 5
D 3
D 1
Physical disk 2
D 0, D 1, D 2, D 3, D 4, D 5
Stripe 2
Stripe 1
Stripe 0
Data strips in a disk Data strips in a disk
Stripping without error check
D 2
D 1
D 0
D 5
D 4
D 3
D 0
Logical disk
Just a Bundle Of Disks (JBOD)
Write data to D 0.
Write data to D 1.
Write data to D 2,
D 3...
Read data from D 1.
Read data from D 2,
D 3...
Read data from D 0.
Huawei Confidential11
How Does RAID 1 Work
Disk array with mirroring
D 2
D 1
D 0
D 2
Logical disk
D 2
D 1
D 0
Physical disk 1 Physical disk 2
D 0, D 1, and D 2 pass through a mirror.
D 2
D 1
D 0
Write data to and read data from D 0.
Write data to and read data from D 1.
Write data to and read data from D 2.
Huawei Confidential12
How Does RAID 3 Work
A 0, A 1, A 2, B 0, B 1, B 2, C 0, C 1, C 2
P 3
P 1
Parity disk
C 2
B 2
A 2
Physical disk 3
A
B
C
Logical disk
C 1
B 1
A 1
Physical disk 2
C 0
B 0
A 0
Physical disk 1
P 2
Write data to A.
Write data to B.
Write data to C.
Note: A write penalty occurs when just a small amount of new data needs to be written to one or two disks.
Read data.
Huawei Confidential13
How Does RAID 5 Work
D 2
D 1
D 0
D 5
D 4
D 3
Logical disk
D 0, D 1, D 2, D 3, D 4, D 5
D 5
D 3
P 0
Physical disk 3
P 2
D 2
D 0
Physical disk 1
D 4
P 1
D 1
Physical disk 2
Write data.
Read data.
Independent disk structure with distributed parity check codes
Huawei Confidential14
RAID 6
RAID 6
Requires at least N + 2 (N > 2) disks and provides extremely high data reliability and
availability.
Common RAID 6 technologies:
RAID 6 P+Q
RAID 6 DP
Huawei Confidential15
How Does RAID 6 P+Q Work?
P and Q parity data is calculated. A maximum of two data blocks that are lost can be recovered
using P and Q parity data. Formulas for calculating P and Q parity data are as follows:
P = D 0 ⊕ D 1 ⊕ D 2...
Q = (α * D 0) ⊕ (β * D 1) ⊕ (γ * D 2)...
Q 5
D 9
P 1
D 3
D 6
D 12
D 10
Q 1
P 2
D 7
D 13
D 11
D 0
Q 2
P 3
D 14
P 4
D 1
D 4
Q 3
P 5
Q 4
D 2
D 5
D 8
Physical disk 1 Physical disk 2 Physical disk 3 Physical disk 4 Physical disk 5
Stripe 0
Stripe 1
Stripe 2
Stripe 3
Stripe 4
Huawei Confidential16
How Does RAID 6 DP Work?
Double parity (DP) adds another disk in addition to the horizontal XOR parity disk used in RAID 4 to store
diagonal XOR parity data.
P0 to P3 in the horizontal parity disk represent the horizontal parity data for respective disks.
For example, P0 = D0 XOR D1 XOR D2 XOR D3
DP 0 to DP 3 in the diagonal parity disk represent the diagonal parity data for respective data disks and the
horizontal parity disk.
For example, DP 0 = D 0 XOR D 5 XOR D 10 XOR D 15
D 12
D 0
D 4
D 8
D 13
D 1
D 5
D 9
D 14
D 2
D 6
D 10
P 3
P 0
P 1
P 2
DP 3
DP 0
DP 1
DP 2
Physical
disk 1
Physical
disk 2
Physical
disk 3
Horizontal
parity disk
Diagonal
parity disk
Stripe 0
Stripe 1
Stripe 2
Stripe 3D 15
D 3
D 7
D 11
Physical
disk 4
Huawei Confidential17
How Does RAID 10 Work?
RAID 10 consists of nested RAID 1 + RAID 0 levels and allows disks to be mirrored
(RAID 1) and then striped (RAID 0). RAID 10 is also a widely used RAID level.
D 0
D 2
D 4
D 0
D 2
D 4
D 1
D 3
D 5
D 1
D 3
D 5
Disk mirror Disk mirror
D 0, D 1, D 2, D 3, D 4, D 5User data
RAID 1 RAID 1
RAID 0
Physical disk 1 Physical disk 2 Physical disk 3 Physical disk 4
Huawei Confidential18
How Does RAID 50 Work?
RAID 50 consists of nested RAID 5 + RAID 0 levels. RAID 0 is implemented after RAID 5
is implemented.
D 11
D 7
P 1
D 10
P 3
D 3
P 5
D 6
D 2
D 9
D 5
D 8
P 0
P 2
D 0 D 1
D 4
P 4
Stripe 0
Stripe 1
Stripe 2
D 0, D 1, D 2, D 3, D 4, D 5, D 6, D 7...
D 0, D 1, D 4, D 5, D 8, D 9 D 2, D 3, D 6, D 7, D 10, D 11
Physical
disk 1
Physical
disk 2
Physical
disk 3
Physical
disk 4
Physical
disk 5
Physical
disk 6
RAID 5 RAID 5
RAID 0
Huawei Confidential19
Contents
1. Traditional RAID
2. RAID 2.0+
3. Other RAID Technologies
Huawei Confidential20
RAID Evolution
Block virtualization
Hot
spare
Traditional RAID LUN virtualization
Huawei Confidential21
How Does RAID 2.0+ Work?
Disk
Extent
CKG ... ...
Disk 0 Disk 1 Disk nDisk k
... ...
... ...
LUN
Extent
Extent
Extent
CK ... ... ......
Hot spare
space
Huawei Confidential22
Reconstruction
Traditional RAID (many-to-one) RAID 2.0+ (many-to-many)
01 02 03
04 05 06
07 08 09
11 12 13
14 15 16
17 18 19
21 22 23
24 25 26
27 28 29
31 32 33
34 35 36
37 38 39
41 42 43
44 45 46
47 48 49
51 52 53
54 55 56
57 58 59
61 62 63
64 65 66
67 68 69
71 72 73
74 75 76
77 78 79
81 82 83
84 85 86
87 88 89
91 92 93
94 95 96
97 98 99
Unused CK
Hot spare
block space
52 13 63 74 85
CKG 2 (RAID 5)
HDD 0
HDD 1
HDD 2
HDD 3
HDD 4
HDD 5
HDD 6
HDD 7
HDD 8
HDD 9
CKG 1 (RAID 5)
CKG 0 (RAID 5)
HDD 0
HDD 1
HDD 2
HDD 3
HDD 4
Hot spare
HDD 5
HDD 6
HDD 7
HDD 8
HDD 9
RAID 5 (4 + 1)
Hot spare disk
Huawei Confidential23
Logical Objects
Storage pool
consisting of
physicaldisks
Chunk CKG LUNs that can be
viewed on the host
Multiple types of
disks are added to
a storage pool.
Space provided by each
disk is divided into fine-
grained chunks.
Chunks from
different disks
form a CKG.
LUNs can be created quickly.
Extent
A CKG is
divided into
spaces of a
smaller
granularity.
Tiered
Not tiered
Volume
Not tiered
Several extents
form one volume.
Huawei Confidential24
Disk Domain
A disk domain is a combination of disks (which can be all disks in the array). After the disks are
combined and reserved for hot spare capacity, it provides storage resources for the storage pool.
Physical disks Disk domain #1
Disk domain #2
Tiers
High-performance tier
Performance tier
Capacity tier
Huawei Confidential25
Storage Pool and Tier
A storage pool is a storage resource container. The storage resources used by application servers are all from
storage pools.
A storage tier is a collection of storage media providing the same performance level in a storage pool.
Different storage tiers manage storage media of different performance levels and provide storage space for
applications that have different performance requirements.
Storage
Tier Tier Type
Supported
Disk Type Application
Tier 0
High-
performance
tier
SSD
Best for storage of data that is
frequently accessed with high
performance and price.
Tier 1
Performance
tier
SAS
Best for storage of data that is less
frequently accessed with relatively
high performance and moderate
price.
Tier 2 Capacity tier NL-SAS
Best for storage of mass data that
is infrequently accessed with low
performance and price, and large
capacity per disk.
RAID Level RAID Policy
RAID 1 1D + 1D, 1D + 1D + 1D + 1D
RAID 10
2D + 2D or 4D + 4D, which is automatically
selected by a storage system.
RAID 3 2D + 1P, 4D + 1P, 8D + 1P
RAID 5 2D + 1P, 4D + 1P, 8D + 1P
RAID 50
(2D + 1P) x 2, (4D + 1P) x 2, or (8D + 1P) x
2
RAID 6 2D + 2P, 4D + 2P, 8D + 2P, 16D + 2P
Huawei Confidential26
Disk Group
A disk group (DG) is a set of disks of the same type in a disk domain. The disk
type can be SSD, SAS, or NL-SAS.
Disk type
SSD
SAS NL-SAS
Huawei Confidential27
Logical Drive
A logical drive (LD) is a disk that is managed by a storage system and corresponds
to a physical disk.
LD 0 LD 1 LD 2 LD 3
Disk 0 Disk 1 Disk 2 Disk 3
Huawei Confidential28
Chunk
A chunk (CK) is a disk space of a specified size allocated from a storage pool. It is
the basic unit of a RAID array.
HDD 0 HDD 1 HDD 2 HDD 3 HDD 4
Chunk Chunk
Huawei Confidential29
Chunk Group
A chunk group (CKG) is a logical storage unit that consists of CKs from different
disks in the same DG based on the RAID algorithm. It is the minimum unit for
allocating resources from a disk domain to a storage pool.
DG
CKG
DG
CKG
Disk Disk
CK
Huawei Confidential30
Extent
Each CKG is divided into logical storage spaces of a fixed and adjustable size called
extents. Extent is the minimum unit (granularity) for migration and statistics of
hot data. It is also the minimum unit for space application and release in a storage
pool.
CKG
Extent
LUN 0 (thick)
LUN 1 (thick)
Huawei Confidential31
Grain
When a thin LUN is created, extents are divided into blocks of a fixed size, called
grains. A thin LUN allocates storage space by grains. Logical block addresses
(LBAs) in a grain are consecutive.
CKG
Extent Grain
LUN (thin)
Huawei Confidential32
Volume and LUN
A volume is an internal management object in a storage system.
A LUN is a storage unit that can be directly mapped to a host for data reads and writes.
A LUN is the external embodiment of a volume.
Volume
LUN
Server
Storage
Huawei Confidential33
Contents
1. Traditional RAID
2. RAID 2.0+
3. Other RAID Technologies
Huawei Confidential34
Huawei dynamic RAID algorithm
When a block in a RAID array fails, recover and migrate the data in
the faulty block, shield the faulty block, and reconstruct a new
RAID array using remaining blocks.
Benefit: The flash memory space is fully and effectively used.
Huawei Dynamic RAID Algorithm
Common RAID algorithm
When a block in a RAID array fails, recover the data in the faulty
block, migrate all the data in the RAID array, and then shield the
RAID array.
Result: A large amount of available flash memory space is wasted.
16 17 … 100 P 0
101 160 … 10 P 1
3000 1280 … n P m
ch 0 ch 1 ch n-1
60
11
n+1
ch n ch P
PBA 0
PBA 1
PBA m
P m+1PBA m+1
1. A block in a RAID array fails.
2. Create a new RAID array to store the data of the RAID array where a block fails.
3. Recover the data in the faulty block using the RAID
algorithm and migrate all the data in the RAID array.
4. Shield and obsolete the faulty RAID array, which wastes space.
16 17 ... 100 606060 16 17 100 P 0
101 160 ... 10 P 1
3000 1280 ... n P m
ch 0 ch 1 ch n-1
11
n+1
ch n ch P
PBA 0
PBA 1
PBA m
P m+1PBA m+1
1. A block in a RAID array fails.
2. Create a new RAID array to store the data in the faulty block.
3. Recover the data in the faulty block using the RAID
algorithm and migrate the data.
4. Reconstruct a new RAID array using remaining blocks to store data.
... 6060 P m+2
Huawei Confidential35
RAID-TP
RAID protection is essential to a storage system for consistent high reliability and performance. However, the
reliability of RAID protection is challenged by uncontrollable RAID array construction time due to drastic
increase in capacity.
RAID-TP achieves the optimal performance, reliability, and capacity utilization.
Tolerates failures of up to three disks
with zero service interruptions.
Traditional
RAID
RAID-TP
Huawei RAID-TP:
• Tolerates failures of up to three disks.
• Greatly reduces reconstruction time.
• Effectively copes with data protection challenges in
the era of large-capacity disks.
Huawei Confidential36
Quiz
1. What is the difference between a strip and stripe?
2. Which RAID level would you recommend if a user focuses on reliability and
random write performance?
3. Is it true or false that data access will remain unaffected when any disk in a RAID
10 array fails?
Huawei Confidential37
Summary
RAID Technologies
Traditional RAID
RAID 0, RAID 1, RAID 3, RAID 5 and RAID 6
RAID 10 and RAID 50
RAID 2.0+ RAID 2.0+
Other RAID
technologies
Dynamic RAID
RAID-TP
Huawei Confidential38
More Information
Huawei
Enterprise
Service App
Enterprise
Technical
Support App
Huawei Confidential39
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Common Storage Protocols
Huawei Confidential2
Foreword
A protocol is a set of conventions that both communication computers
must comply with. For example, how to set up a connection and how to
identify each other.
A protocol not only defines the language usedfor communication, but also
specifies the hardware, transmission medium, transmission protocol, and
interface technology. This course describes the definitions and principles of
different storage protocols.
Huawei Confidential3
Objectives
Through this course, you are expected to:
Learn about common protocols used in storage systems.
Understand the working principles and features of the protocols.
Huawei Confidential4
Contents
1. SCSI
2. iSCSI, Fibre Channel (FC), and FCoE
3. SAS and SATA
4. PCIe and NVMe
5. RDMA and (InfiniBand) IB
6. CIFS, NFS, and NDMP
Huawei Confidential5
SCSI Protocol
Small Computer System Interface (SCSI) is a huge
protocol system evolved from SCSI-1 > SCSI-2 >
SCSI-3.
The SCSI protocol defines a model and a necessary
instruction set for different devices to exchange
information by using the framework.
The SCSI protocol is irrelevant to transmission
media, that is, it can be implemented on various
media, and even virtual media.
SCSI device instruction set
(SBC/SSC)
SCSI system model
(SAM/SPC)
SCSI link implementation
(FCP/SAS/iSCSI)
Huawei Confidential6
SCSI Evolution
Launched within 1983 to
1985.
Supports synchronous and
asynchronous modes.
Supports up to seven 8-bit
devices.
Provides up to 5 Mbit/s speed.
Uses 50-pin cables that span
6 m at most.
Out of use.
SCSI-3
SCSI-2
SCSI-1
SCSI-1
Launched within 1988 to
1994.
Compatible with SCSI-1.
Supports 16-bit
bandwidth.
Provides up to 20 Mbit/s
speed.
SCSI-2
Standardized in 1993.
Compatible with SCSI-1 and
SCSI-2.
Becomes a standard system.
Supports various media such
as FCP and IEEE1394.
SCSI-3
Huawei Confidential7
SCSI Logical Topology
Initiator 1 Initiator 2
Target 1 Target 2 Target 3
LUN 0
LUN 2
LUN 5
Initiator
Target
LUN namespace Target device
SDS
Huawei Confidential8
SCSI Initiator Model
Generally, the SCSI system of a host works in the initiator mode. The SCSI
architecture on Windows, Linux, AIX, Solaris, and BSD contains the architecture
layer (middle layer), device layer, and transport layer.
SCSI device driver layer
SCSI middle layer
SCSI link layer
Huawei Confidential9
SCSI Target Model
Based on the SCSI architecture, a target is divided into
three layers: port layer, middle layer, and device layer.
The most important part is the middle layer, at which
LUN namespaces, link ports, target devices, tasks, task
sets, and sessions are managed and maintained based
on SAM/SPC specifications.
Drivers at the port layer are dynamically loaded in the
form of registration. Drivers at the device layer are also
dynamically loaded.
Port layer
Middle layer
Device layer
Huawei Confidential10
SCSI bus
Control signal
Host adapter
SCSI ID 7
LUN 2 LUN 1
LUN 0 LUN 0
SCSI array
ID 0
SCSI array
ID 5
Data/Address bus
SCSI Protocol and Storage System
The SCSI protocol is the basic protocol used for communication between hosts
and storage devices.
DAS uses the SCSI protocol to achieve interconnection between hosts and
storage devices.
LUN 1
Huawei Confidential11
SCSI Protocol Addressing
Logical
unit
number
Differentiates SCSI buses.
Differentiates devices
on SCSI buses.
Differentiates sub-devices
in SCSI devices.
Bus
number
Device
ID
Huawei Confidential12
Contents
1. SCSI
2. iSCSI, FC, and FCoE
3. SAS and SATA
4. PCIe and NVMe
5. RDMA and IB
6. CIFS, NFS, and NDMP
Huawei Confidential13
Emergence of iSCSI
SCSI allows a small number of
devices to be connected.
The distance between devices is
limited.
IP-network-based SCSI: iSCSI
Huawei Confidential14
iSCSI
SCSI applications (file systems and databases)
SCSI block
instructions
SCSI flow
instructions
Other SCSI
instructions
SCSI instructions, data, and status
iSCSI
TCP
IP
Ethernet
iSCSI protocol stack
SCSI commands, responses, and data
Receives SCSI data, generates iSCSI
protocol data, and encapsulates
the data into iSCSI PDUs.
Encapsulates iSCSI PDUs into
TCP/IP packets for transmission
and reception.
Converts bit streams and transmits
them over physical links.
Huawei Confidential15
iSCSI Initiator and Target
Initiator
The SCSI layer generates command descriptor blocks (CDBs)
and transfers them to the iSCSI layer.
The iSCSI layer generates iSCSI protocol data units (PDUs)
and sends them to the target over an IP network.
Target
The iSCSI layer receives PDUs and sends CDBs to the SCSI
layer.
The SCSI layer interprets CDBs and gives responses when
necessary.
iSCSI
Initiator Target
SCSI
iSCSI
TCP
IP
Link
SCSI
iSCSI
TCP
IP
Link
Huawei Confidential16
iSCSI Architecture
iSCSI nodes encapsulate SCSI instructions and data into iSCSI packets and send the packets to the
TCP/IP layer, where the packets are encapsulated into IP packets to be transmitted over an IP
network.
iSCSI
Initiator
IP address
of the
network
port
IP address
of the
network
port
iSCSI node iSCSI node
IP address
of the
network
port
IP address
of the
network
port
iSCSI
Target
iSCSI
Target
IP network
Huawei Confidential17
Relationships Between iSCSI and SCSI, TCP and IP
SCSI application
protocol
Initiator
iSCSI protocol
TCP/IP protocol
stack
NIC driver
Physical
SCSI application
protocol
Target
iSCSI protocol
TCP/IP protocol
stack
NIC driver
Physical
SCSI commands, responses, and
data
Receives SCSI data, generates iSCSI
protocol data, and encapsulates
the data into iSCSI PDUs.
Encapsulates iSCSI PDUs into
TCP/IP packets for transmission
and reception.
Performs 8-bit/10-bit encoding, as
well as transmits and receives
data.
Performs 0/1 code stream
transmission.
Function
Huawei Confidential18
FC in Storage
FC can be referred to as the FC protocol, FC network, or FC interconnection. As FC delivers high
performance, it is gradually used for front-end host access on point-to-point and switch-based
networks.
FC brings the following advantages to the storage network:
The scalability is improved.
The transmission distance is increased.
Security problems are solved.
Host
Storage
InitiatorInitiator
TargetTarget Disk
enclosure
Disk
enclosure
FC switch FC switch
Huawei Confidential19
FC Protocol Structure
FC-1
FC-0 Physical conversion
Coding/Decoding
FC-2 Structure protocol
FC-3
FC-4
Upper-layer protocol
FC-AL2FC-ALFC-PH
FC-PH2
FC-PH3
General equipment
FC-ATM
ATM
FC-LE
Link
encapsulation
IP
Copper cables and optical cables,
8-bit/10-bit encoding
SCSI-3
Command
set mapping
SCSI-3
IPI-3
Command
set mapping
Huawei Confidential20
FC Topology
A
H
Only two devices can
be connected.
(Direct connection)
Up to 16 million devices
can be connected.
Up to 127 devices
can be connected.
Most widely used technology
Point-to-point FC switching networkFC-AL
Huawei Confidential21
Seven Types of Ports for the FC Protocol
On an FC network, there are seven types of ports.
FC switch FC terminalFC terminal NN F F
FL
FC-AL device
FC
terminal
NL
FC
terminal
NL
FC
terminal
L
FC
terminal
L
FC
terminal
L
Open ring deviceOpen ring device
Private ring devicePrivate ring devicePrivate ring device
Fabric deviceFabric device
Huawei Confidential22
FC Adapter
The FC host bus adapter (HBA) supports FC network applications and provides
high-bandwidth and high-performance storage network solutions.
Huawei Confidential23
FCoE Protocol
The FCoE protocol is used to transmit FC signals over lossless enhanced
Ethernet infrastructure.
FCoE encapsulates FC data frames in Ethernet frames and allows service traffic
on a LAN and SAN to be transmitted over the same Ethernet.
Ethernet data link
layer frame
Service flow IP address
Block storage FCoE
VoIP call
Video stream VoIP
Huawei Confidential24
Comparison Between FC and FCoE
FCoE: defines the mapping from FC to
IEEE 802.3 Ethernet, and uses thephysical
layer and data link layer of the Ethernet
and the network layer, service layer, and
protocol layer of FC.
FCoE retains the protocol stack above FC-
2 and replaces FC-0 and FC-1 with the
link layer of the Ethernet.
FC-4
FC-3
FC-2V
FC-2M
FC-2P
FC-1
FC-0
FC-4
FC-3
FC-2V
FCoE entity
MAC
PHY
FC-2
FC levels
(No changes)
FC_BB_E
Mapping
IEEE
802.3
Layers
FCoE protocol stack
Huawei Confidential25
Contents
1. SCSI
2. iSCSI, FC, and FCoE
3. SAS and SATA
4. PCIe and NVMe
5. RDMA and IB
6. CIFS, NFS, and NDMP
Huawei Confidential26
Background of SAS
• The parallel bus has been developed to the peak and the bandwidth limit is
reached.
• Serial buses such as FC, IB, and the Ethernet have the following disadvantages for
storage applications:
- FC: It is expensive, and applicable to complex networking and long-distance
scenarios.
- IB: It is expensive, and the networking is complex.
- iSCSI: The latency is high, and the transmission rate is low.
SCSI in serial mode: SAS
Huawei Confidential27
What is SAS
SAS is the serial standard of the SCSI bus protocol.
SAS uses the serial technology to achieve higher transmission rate and better scalability, and is
compatible with SATA disks.
SAS adopts the point-to-point architecture to achieve a transmission rate of up to 3 Gbit/s, 6
Gbit/s, 12 Gbit/s, or higher. The full-duplex mode is supported.
Huawei Confidential28
SAS Protocol Layers
SCSI application layer ATA application layer Management application layer
SSP transport layer STP transport layer SMP transport layer
SAS port layer
SSP link layer STP link layer SMP link layer
SAS link layer
SAS phy layer
SAS physical layer
Application layer
Transmission layer
Port layer
Link layer
PHY layer
Physical layer
Huawei Confidential29
Highlights of SAS
Provides the serial communication mode to allow multiple data channels to communicate with devices at full
speed.
Binds multiple narrow ports to form a wide port.
Uses expanders to expand interfaces, providing excellent scalability.
Works in full-duplex mode. Server
SAS
RAID
Controller
Expander
Expander
Expander
Expander
Expander
Wide
Link
SAS
RAID
Controller
Expander
Read data
Commands
Huawei Confidential30
Scalability of SAS
SAS uses expanders to expand interfaces. One SAS domain supports a maximum
of 16,384 disk devices.
SASRAID
Controller
Expander
Expander
Expander
Expander
1
Expander
Expander
128
1
128
Huawei Confidential31
Cable Connection Principles of SAS
Generally, a SAS cable has four channels, each of which supports 12 Gbit/s bandwidth.
SAS devices are connected in the form of a loop (also called a chain).
A cable supports 4 x 12 Gbit/s bandwidth, which limits the number of disks in the loop.
A maximum of 168 disks are supported in a loop. That is, a loop consists of a maximum
of seven disk enclosures with 24 disk slots each.
Mini SAS
High-density mini SAS
SAS cable connectors:
Huawei Confidential32
SATA
SATA is short for Serial ATA, which is a kind of computer bus used for data transmission between
the main board and storage devices (disks and CD-ROM drives).
Instead of simple PATA improvement, the bus structure is brand new.
A SATA bus uses embedded clock signals and has better error correction capability.
SATA has better anti-interference capability than PATA.
SATA, designed for entry-level applications, is not as powerful as SCSI in terms of big data throughput or
multi-thread transmission.
SAS SATA
Serial
transmission
SCSI PATA
Serial
transmission
Huawei Confidential33
Contents
1. SCSI
2. iSCSI, FC, and FCoE
3. SAS and SATA
4. PCIe and NVMe
5. RDMA and IB
6. CIFS, NFS, and NDMP
Huawei Confidential34
PCIe
PCIe is short for PCI Express, which is a high-performance and high-bandwidth serial
communication interconnection standard. It was first proposed by Intel and then
developed by the Peripheral Component Interconnect Special Interest Group (PCI-SIG)
to replace the bus-based communication architecture, such as PCI, PCI Extended (PCI-X),
and Accelerated Graphics Port (AGP).
Huawei Confidential35
Why PCIe
PCIe is used to obtain significantly improved system throughput,
scalability, and flexibility at lower production costs, which are almost
impossible to achieve using the traditional bus-based interconnection.
High-performance and high-bandwidth serial interconnection standard:
PCIe
Huawei Confidential36
PCIe Protocol Structure
PCIe device layers include the physical layer, data link layer, transaction layer,
and application layer.
Physical layer
Data link layer
Transaction layer
Application layer Physical
AP
Transaction
Data link
Physical
PCIe Device
Tx Rx
Logical sub-block
Electrical sub-block
Huawei Confidential37
NVMe
NVMe is short for Non-Volatile Memory Express.
The NVMe standard is oriented to PCIe SSDs. Direct connection of the native PCIe channel to the
CPU can avoid the latency caused by the communication between the external controller (PCH) of
the SATA and SAS interface and the CPU.
PCIe is an interface form and a bus standard, and NVMe is a standard interface protocol
customized for PCIe SSDs.
Huawei Confidential38
NVMe Protocol Stack
Reduced interaction: The number of
communication interactions is reduced from 4 to 2,
reducing the latency.
Controller SSD
4. Response feedback
1. Transfer command
3. Transfer data
2. Ready to transfer
1. NVMe write command
2. NVMe write finished
SAS
NVMe
The average I/O latency when NVMe is used
is less than that when SAS 3.0 is used.SAS Protocol Stack
SCSI
SAS
SAS
SCSI
NVMe Protocol Stack
NVMe
NVMe
App
Block Layer
Controller
Initiator
Target
Huawei Confidential39
Advantages and Application of NVMe
Fusion Server
CloudEngine
CE8800
Huawei
OceanStor
Dorado
NVMe SSD
10
0G
E
N
V
M
e-
oF
Over Fabric
End-to-end 100GE
End-to-end hardware
uninstallation
NVMe-oF protocol
End-to-end DIF
Data integrity protection
FC NVMe-oF
IOPS
FC NVMe-oF
Latency
Reduced by 50%
FC NVMe-oF
TCO
Reduced by 66%
Huawei Confidential40
Contents
1. SCSI
2. iSCSI, FC, and FCoE
3. SAS and SATA
4. PCIe and NVMe
5. RDMA and IB
6. CIFS, NFS, and NDMP
Huawei Confidential41
RDMA
RDMA is short for Remote Direct
Memory Access, which is a method of
transferring data in a buffer between
application software on two servers over
a network.
Low latency
High throughput
Low CPU and OS resource occupancy
OS
Driver
TCP/IP
APP
Adapter
Buffer
Buffer
Buffer
Buffer
Traditional mode RDMA mode
OS
TCP/IP
App
Adapter
Buffer
Buffer
RDMA
Huawei Confidential42
RDMA Bearer Network
RDMA application/ULP
RDMA API (Verbs)
RDMA software stack
IB transport protocol
IB network layer
IB link layer
IB management
IB transport protocol
IB network layer
Ethernet link layer
Ethernet/IP
management
IB transport protocol
UDP
Ethernet link layer
Ethernet/IP
management
IP
iWARP protocol
TCP
Ethernet link layer
Ethernet/IP
management
IP
IB RoCEv1 RoCEv2 iWARP
So
ft
w
ar
e
Ty
pi
ca
l h
ar
dw
ar
e
Content defined by IBTA
Content defined by IEEE/IETF
Huawei Confidential43
IB
Overview:
The IB technology is specifically designed for server connections, and is widely used for
communication between servers (for example, replication and distributed working), between a
server and a storage device (for example, SAN and DAS), and between a server and a network
(for example, LAN, WAN, and the Internet).
Highlights:
Standard-protocol-based
High bandwidth and low latency
RDMA
Transmission uninstallation
Huawei Confidential44
IB Architecture
IB defines a series of devices for system communication, including channel
adapters, switches, and routers.
CPU
CPU
CPU
H
os
t
in
te
rc
on
ne
ct Host
controller
System main
storage
HCA RouterSwitch
TCA
Gbit
Ethernet
TCA
SCSI
FCP
TCAHuawei Confidential45
IB in Storage
Node
2
Node
n
Node
3
Distributed cluster
Front-end IB
switch
...
Front-end IB
switch
Node
1
Back-end IB
switch
Back-end IB
switch
Client
Switch cascading
Back-end network
Front-end network
10GE
SAS SAS
FCoE IBTOE
Frontend
FC
Backend
Server
Initiator
Target
Initiator
Target
Disk
Storage controller
Converged storage
Distributed storage
Huawei Confidential46
IB Layers
Physical layer
Link layer
Network layer
Transmission layer
Application layer
Determines the connection rate.
Provides data packet design and point-to-
point connection for local subsystems.
Provides addressing and routing.
Sends, receives, and reassembles data
packet segments.
Huawei Confidential47
IB Interface
There are two types of channel adapters (CAs):
Host channel adapter (HCA), for example, Mellanox
Target channel adapter (TCA), an I/O interface used for IB switches and storage
systems
IB connectors:
CA 10 Gb/s to 40 Gb/s
Huawei Confidential48
Contents
1. SCSI
2. iSCSI, FC, and FCoE
3. SAS and SATA
4. PCIe and NVMe
5. RDMA
6. CIFS, NFS, and NDMP
Huawei Confidential49
CIFS Protocol
In 1996, Microsoft renamed SMB to CIFS and added many new functions. Now,
CIFS includes SMB1, SMB2, and SMB3.0.
CIFS uses the C/S mode and basic network protocols including TCP/IP and
IPX/SPX.
1988
Named as SMB
1992
Realized Samba
1996
Redefined
CIFS
2007
Defined SMB2
2000
Added new features
2012
SMB2.2 => SMB3.0
2009
Defined SMB2.1
2020
IBM
Huawei Confidential50
NFS Protocol
NFS is short for Network File System. The network file sharing protocol is
defined by the IETF and widely used in the Linux/Unix environment.
NFS works based on the client/server architecture. The servers provide the
clients with access to shared file systems. NFS enables clients using different
operating systems to share files over a network.
2020
NFSv1
1990
NFSv2 NFSv3 NFSv4.0 NFSv4.1 NFSv4.2
2000 2010
Huawei Confidential51
NDMP Protocol
NDMP protocol is designed for the data
backup system of NAS devices. It enables NAS
devices to directly send data to the connected
disk devices or the backup servers on the
network for backup, without any backup
client agent required.
There are two networking modes for NDMP
2-way
3-way
FC
Ethernet
Backup data flow
Control flow
2-way
networking Production
system A
Production
system N
Backup
server
Tape library
NAS storage
system
3-way
networking Production
system A
Production
system N
Backup
server
Tape library
NAS storage
system A
NAS storage system A
Huawei Confidential52
Quiz
1. Which networks are included in FC topologies?
A. Arbitrated loop network
B. Point-to-point network
C. Switching network
D. Dual-switching network
2. Which PCIe versions are available currently?
A. PCIe 1.0
B. PCIe 2.0
C. PCIe 3.0
D. PCIe 4.0
Huawei Confidential53
Quiz
3. Which of the following are file sharing protocols?
A. HTTP protocol
B. iSCSI protocol
C. NFS protocol
D. CIFS protocol
4. Which NFS versions are available currently?
A. NFSv1
B. NFSv2
C. NFSv3
D. NFSv4
Huawei Confidential54
Quiz
5. Which processes are involved when the CIFS protocol is used?
A. Protocol handshake
B. Security authentication
C. Connection to the share
D. File operation
E. Disconnection
Huawei Confidential55
Summary
SCSI
iSCSI, Fibre Channel (FC), and FCoE
SAS and SATA
PCIe and NVMe
RDMA: RoCE, IB, and iWARP
CIFS, NFS, and NDMP
Common Storage Protocols
Huawei Confidential56
More Information
Huawei
enterprise
business App
Enterprise
technical
support App
Huawei Confidential57
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Storage System Architecture
Huawei Confidential2
Foreword
With the development of cloud computing and big data, the storage
architecture changes from scattered to centralized, and gradually evolves
to network-based, virtualized, and massive cloud storage. Storage not only
needs to provide routine services such as data management, data
replication, snapshot, mirroring, and migration, but also needs to enable
functions such as data disaster recovery, data consistency, virtualized
convergence, elastic computing, and resource expansion. These services and
functions depend on a good storage system architecture.
Huawei Confidential3
Objectives
On completion of this course, you will be able to know:
Storage architecture evolution and expansion methods
Huawei storage product architecture
Huawei Confidential4
Contents
1. Storage System Architecture Evolution
2. Storage System Expansion Methods
3. Huawei Storage Product Architecture
Huawei Confidential5
Storage System Architecture Evolution
Single controller Dual controllers Multiple controllers Distributed
architecture
Huawei Confidential6
Single-controller Storage
OS
SCSI
controller
T
er
m
in
at
or
Logical disks are presented to hosts as LUNs.
Single-controller storage
C
on
tr
ol
le
r
Host
SCSI interface
Huawei Confidential7
Dual-controller Storage
Services are running on
only one controller.
Services are running on
both controllers.
Controller A Controller AController B Controller B
Active-Standby Active-Active
Huawei Confidential8
Mid-range Storage Architecture Evolution
Fixed storage
system
configuration
Limited Fibre Channel
interfaces are
provided, and the
flexibility is poor.
Capacity expansion
can be implemented
only by cascading disk
enclosures.
Dual-controller
active-active
redundancy
configuration
The single-controller
and dual-controller
active-passive
architecture gradually
evolve to the active-
active architecture.
Flexible hardware
component
configuration
Fast Ethernet (FE)
interface module are
supported, greatly
improving flexibility
and scalability.
The number of ports
can be selected as
required.
Flexible software
function
configuration
Unified storage that
supports both SAN
and NAS protocols has
become a hotspot.
Users can flexibly
configure multi-
protocol services as
required.
Huawei Confidential9
Multi-controller Storage
SAS controller SAS controller SAS controller SAS controller
SAS expander SAS expander
Disk
enclosures
Disk
enclosures
Controller A Controller B Controller C Controller D
Huawei Confidential10
Mission-Critical Storage Architecture Evolution
Bus
architecture
Scale-up multi-
controller architecture
based on bus
interconnection and
upgrade by using
more powerful CPUs,
interface modules,
memory, and
protocols
Hi-Star
architecture
Switch-based
connection of front-
end interfaces, back-
end disk interfaces,
and cache modules,
and back-end Fibre
Channel connection
Direct-connection
architecture
Front-end interfaces
and back-end diskinterfaces directly
connected to cache
resources to avoid
latency caused by bus
and switch connection
Virtual matrix
architecture
Scale-out expansion
mode, full switching
mode, x86 platform,
and loose coupling
Huawei Confidential11
Storage Software Technology Evolution
Improved data
reliability
Emergence of
snapshot, clone, and
data replication
(synchronous and
asynchronous)
technologies
Simplified data
management
Storage devices are
flexibly managed by
centralized
management
software. Thin
provisioning
technology resolves
the conflict between
resource investment
and optimal use.
Improved space
utilization
Tiered storage
promotes storage
space utilization and
service efficiency. The
data deduplication
technology reduces
maintenance and
capacity expansion
costs.
Optimized service
performance
Performance is
optimized according
to service types.
Resources are properly
allocated according to
service importance.
Storage resources are
balanced and shared
flexibly and globally.
Huawei Confidential12
Distributed Storage Technology Evolution
Integrated
box
Parallel cluster file
system
GoogleFS
Hadoop FS
MooseFS
Azure Storage
Facebook
Haystack
Facebook F4
Giga+ indexing
2000
PVFS
Lustre
2003
Google
2008 to 2011
Facebook/Microsoft/Huawei
199x
EMC
NetApp
2014
Facebook
Huawei
OceanStor 100D
Customized hardware
Scale-up
Universal hardware
Software-defined
Scale-up
Universal hardware
Software-defined
Scale-out
Metadata separation
Metadata extension
EC Coding
Automatic metadata extension
Small files
Public cloud storage
Social scenario
NoSQL
Warm storage
Analysis scenarioScientific computingGeneral purpose
Huawei Confidential13
Distributed Storage Architecture
Server node
OSD
EDS-F
Storage pool (block) Storage pool (HDFS) Storage pool (object)
OSD OSD OSD OSD OSD OSD OSD OSD
EDS-F EDS-F
EDS-B EDS-B EDS-B
Compute node
VBS
OBJ
service
OBJ
service
OBJ
service
OBJ
index
OBJ
index
OBJ
index
VBS
Compute node
iSCSI
initiator HDFS client
S3/Swift client
Index
Block
service
Index
Block
service
Index
Block
service
Index
HDFS
service
Index
HDFS
service
Index
HDFS
service
MDC MDC MDC
CMCMCM
Server node Server node Server node Server node Server node Server node Server node Server node
Note: Huawei OceanStor 100D is used as an example to describe the distributed storage architecture.
Huawei Confidential14
Contents
1. Storage Architecture Evolution
2. Storage System Expansion Methods
3. Huawei Storage Product Architecture
Huawei Confidential15
Scale-up and Scale-out
With the continued development of enterprise information systems and the ever-increasing expansion in the
scale of services, service data keeps increasing. The initial configuration of storage systems is often not
enough to meet these demands. Storage system capacity expansion has become the major concern of system
administrators. There are two capacity expansion methods: scale-up and scale-out. The following uses Huawei
storage products as an example to describe the two methods.
Scale-up
Scale-out Switch Fabric
Storage
controllers
Storage
controllers
Storage
controllers
Storage
controllers
Storage
controllers
Storage
controllers
Scale-up architecture
Scale-out architecture
Devices (enclosures and disks)
Huawei Confidential16
SAS Disk Enclosure Scale-up Networking Principles
Adding a 2 U SAS disk enclosure to
an existing loop
Controller
enclosure
2 U SAS disk
enclosure 0
2 U SAS disk
enclosure 1
Huawei Confidential17
Smart Disk Enclosure Scale-up Networking Principles
Adding a 2 U smart disk enclosure
to an existing loop
Controller
enclosure
Smart disk
enclosure 0
Smart disk
enclosure 1
Huawei Confidential18
PCIe Scale-out and IP Scale-out
PCIe scale-out runs on the PCIe protocol while IP scale-out works based on the IP protocol.
Large
enterprises
Medium
enterprises
Small enterprises
Mission-critical storage
Functions first
Mid-range storage
Functions and prices
balanced
Entry-level storage
Price first
PCIe scale-out
IP scale-out
IP scale-out
Huawei Confidential19
Scale-out Technologies Used by Huawei Storage Systems
TCP
IP
XNET-PCIe
PCIE DRV
ETHPCIe
XNET
iWARP
XNET RDMA
IB
transport
IB
OceanStor OS
UDP
XNET UDP
Huawei Confidential20
Scale-out Networking
The figure shows the scale-out
networking of Huawei solid-state
storage Huawei OceanStor Dorado
5000 V6 and 6000 V6.
Four-controller direct connection
Controller enclosure
0 (original)
Controller enclosure
1 (new)
Connects to the user's management network
Connects to the user's
management network
Huawei Confidential21
SAN
Engine 0 Engine 1 Engine 2 Engine 3
1 2
LUN PCIe switched network
1
2
3
4
5
Local Write Process
Huawei Confidential22
SAN
LUN
PCIe switched network
Engine 0 Engine 1 Engine 2 Engine 3
1
1 4
4
5
6
7
2
3
Non-local Write Process
Huawei Confidential23
76
SAN
LUN PCIe switched network
Engine 0 Engine 1 Engine 2 Engine 3
1
1
2
2
3 4
5
8
Local Read Process
Huawei Confidential24
Non-local Read Process
SAN
LUN
Engine 0 Engine 1 Engine 2 Engine 3
1
1 4
4
5
7
8
2
3
6 9
10
PCIe switched network
Huawei Confidential25
Contents
1. Storage Architecture Evolution
2. Storage System Expansion Methods
3. Huawei Storage Product Architecture
Huawei Confidential26
Hardware Architecture with Two Controllers
Service subsystem
Service channel
Manage channel
Power supply
Power
supply 0
BBU 0 BBU 1
Power
supply 1
BBU 2 BBU 3
Interface
module A0
Control
module B
Management
interface module A
Management
interface module B
Management
subsystem
Electromechanical
subsystem
PCIe 3.0 x8
12 V 12 V
Interface
module A7
..
.
Interface
module B7
PCIe 3.0 x8
Interface
module B0
..
.
Control
module A
Fan module 0
Fan module 2
Fan module 1
Fan module 0
Fan module 2
Fan module 1
PCIe 3.0
x8
Huawei Confidential27
Hardware Architecture with Multiple Controllers
Power
supply 0
BBU 0 BBU 1
Power
supply 3
BBU 2 BBU 3
Interface
module A0
Control
module B
Management
interface module A
Management
interface module B
PCIe 3.0 x8
12 V
12 V
Interface
module A5
...
Interface
module B5
PCIe 3.0 x8
Interface
module B0
...
Control
module A
Fan module 0
Fan module 2
Fan module 1
Fan module 0
Fan module 2
Fan module 1
Power
supply 1
Power
supply 2
Control
module D
PCIe 3.0 x8
...
PCIe 3.0 x8
...
Control
module C
Fan module 0
Fan module 2
Fan module 1
Fan module 0
Fan module 2
Fan module 1
PCIe 3.0 x8
PCIe 3.0 x8
Service subsystem
Management
subsystem
Electromechanical
subsystem
Interface
module A0
Interface
module A5
Interface
module B5
Interface
module B0
Huawei Confidential28
Full-mesh Architecture
FIMFIM
BIMBIM
Each front-end interconnect I/O module (FIM)
connects to all four controllers through PCIe ports
in a controller enclosure. This module can
simultaneously access the four controllers with
multi-channel technology in active-active mode.
The controllers in a controller enclosure are fully
interconnected using the passive backplane.
100 Gbit/s RDMA shared interface modules are
used for expansion across controller enclosures,
implementing full interconnection between 8/12/16
controllers.
A controller enclosure uses the back-end
interconnect I/O module (BIM) to connect a disk
enclosure which can be accessed by all controllers in
the enclosure.
A smart disk enclosure has two groups of uplink
ports and can connect to two controller enclosures,
implementing full interconnection between the disk
enclosure and eight controllers.
Network adapter Network adapter
Host I/O
192
cores
Fully-shared FIMs
Full interconnection among controllers
Interconnection of disks and
enclosures across controller enclosures
FIMFIM
BIMBIM
192
core
s
192
cores
192
cores
Note: Huawei OceanStor Dorado 8000 and 18000 V6
are usedas the example.
Huawei Confidential29
Fully Interconnected Disk Enclosures
Controller
enclosure 1
Controller
enclosure 0
2 U smart disk
enclosure 0
2 U smart disk
enclosure 1
Huawei Confidential30
Host
...
SAN
...
DHT
Distributed based
on hash results
Global cache
E2E Global Resource Sharing
Huawei Confidential31
Switchover in Seconds: Mission-Critical Storage with FIMs
User mode
OS kernel mode
Hi1822
Host
Fibre Channel switch
System mgmt.
process
I/O process I/O process I/O process
Controller 0 Controller 1 Controller 2 Controller 3
Hosts are unaware of the
switchover, and links are
not interrupted.
I/O process
Device mgmt.
process
Configuration
mgmt. process
Network
mgmt. process
Huawei Confidential32
...A B C D E Global memory
Virtual address space
Memory of controller A Memory of controller B Memory of controller C Memory of controller D
AddrN1 AddrN2 AddrN3
Cache linear
space
A B C D E ...
Write Ahead Log (WAL)
LUN 0 LUN 2
4 KB 8 KB4 KB ...
LUN 1
4 KB 8 KB4 KB ... 4 KB 8 KB4 KB ...
Data
write
95 μs
50 μs
Write latency
OceanStor
Dorado V6
Traditional cache
RDMA
Global Cache
Huawei Confidential33
D D1 D2
B B1
C C1 C2
...
...
A A1 A2 A3
Strip A2 A3 C2 D2 P Q
Strip A B C D P Q
LUN
RAID
Strip A1 B1 C1 D1 P Q
...
LUN mapping
and FP mapping
Global Pool
Huawei Confidential34
Engine 1
A
B
A
B
100 Gbit/s
100 Gbit/s
100 Gbit/s100 Gbit/s
A
0 13
B
0 13
A
Engine 0
13
B
0 13
1822
A B C D
x4 x4 x4 x4
• A single port is connected via a single
connection in the external system.
• A single port is connected to four
controllers in the internal system.
• Dual physical links, balanced and
redundant
• A single port on the controller
cascades two disk enclosures in a
loop.
• A single expansion module supports
dual links, achieving load balancing
and redundancy.
Back-End Sharing
2 3
2 3
0 1 2 3
0 1 2 3
0 1
0 1
Huawei Confidential35
Active-Active Architecture with Full Load Balancing
Huawei Confidential36
Cache Mirroring Technology
The function is as follows:
Hybrid flash storage
Controller enclosure 1 Controller enclosure 2
Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller D
Huawei Confidential37
Key Reliability Technology
The function is as follows:
Controller A
Normal
Controller C Controller D Controller A Controller B Controller C Controller D Controller A Controller B Controller C Controller DController B
Failure of a controller (controller A)
Huawei Confidential38
Host Service Switchover upon Failure of a Single
Controller
Host Host
Fibre Channel switch Fibre Channel switch
Backplane Backplane
Controller
1
Controller
2
Controller
3
Controller
4
Controller
1
Controller
2
Controller
3
Controller
4
Interconnect I/O
module
Interconnect I/O
module
Automatic
switchover
Huawei Confidential39
Quiz
1. (True or False) Scale-up is a method in which disk enclosures are continuously
added to existing storage systems to cope with increasing data volumes.
2. (Short Answer Question) What are the differences between scale-up and scale-
out?
Huawei Confidential40
Summary
Storage System
Architecture
Storage Architecture
Evolution
Storage System
Expansion Methods
Scale-up and Scale-out
Huawei Storage
Product Architecture
Hardware System Architecture
Full-mesh Architecture
Huawei Confidential41
More Information
Huawei
Enterprise
Service App
Enterprise
Technical
Support App
Huawei Confidential42
Recommendations
Huawei official websites
Enterprise business: https://enterprise.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://learning.huawei.com/en/
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://enterprise.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://learning.huawei.com/en/
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Storage Network Architecture
Huawei Confidential2
Foreword
With the development of host, disk, and network technologies, the storage
system architecture evolves, and the storage network architecture also
develops to meet service requirements. This lesson introduces the storage
network architecture.
Huawei Confidential3
Objectives
Upon completion of this lesson, you will be able to understand:
Storage network architecture evolution
Storage networking technology evolution
Huawei Confidential4
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
Huawei Confidential5
DAS
RAID
JBOD
CPU
Disk
RAM
Server
SCSI card
External disk array (DAS)
Disk
CPU
RAM
Server
SCSI card
Controller
Smart disk array (DAS)
Huawei Confidential6
Challenges for DAS
Challenges Description
Low
Scalability
Limited number of ports that can be connected to a host.
Limited number of addressable disks.
Limited distance.
Inconvenient
Maintenance
The system needs to be powered off during maintenance.
Insufficient
Resource
Sharing
Front-end ports and storage space are difficult to share.
Resource silos: For example, the DAS with insufficient storage
space cannot share the remaining space of the DAS with excessive
storage resources.
Huawei Confidential7
Contents
1. DAS
2. NAS
3. SAN
4. Distributed architecture
Huawei Confidential8
NAS
Network-attached storage (NAS) connects storage devices to the
live network and provides data and file services.
The most commonly used network sharing protocols for NAS are
Common Internet File System (CIFS) and Network File System
(NFS).
OS: Windows
OS: Linux
OS: MAC OS
Switch NAS device
Benefits:
Improved efficiency
Improved flexibility
Centralized storage
Simplified management
High scalability
High availability
Security (user
authentication and
authorization)
Huawei Confidential9
General-Purpose Server and NAS Devices
Network
OS
File system
Network
OS
File system
Printer driver
Application
General-purpose server
(Windows or UNIX)
Uni-functional
NAS device
Huawei Confidential10
NAS Protocols
FS
CACHE
POOL
IP IP
IP IP
Linux
Enterprise
office
IP IP
IP IP
Windows
Enterprise
office • NFS
• CIFS
• FTP
• HTTP
• NDMP
NFS CIFS
Huawei Confidential11
Working Principles of NFS
C
lie
nt
p
ro
gr
am
R
PC
RPC
NFS processes:
rpc.nfsd and
Rpc.mountd
POR TMAP
Port mapping
table
NFS share
information
1. RPC request
2. RPC response
3. Communication
Client Server
Registration
Request
Huawei Confidential12
Typical Application of NFS: Shared Storage for Cloud
Computing
Cloud computing uses the NFS server as the internal shared storage.
Cloud computing server
Internal IP
network
NFS client Converged storage
NFS server
Cloud computing server
Cloud computing server
External IP
network Fi
re
w
al
l
Huawei Confidential13
Working Principles of CIFS
Client Server
SMB NEGOTIATE Request
SMB NEGOTIATE Response
SMB SESSION_SETUP Request
SMB SESSION_SETUP Response
SMB TREECONNECT Request
SMB TREECONNECT Response
SMB TREE_DISCONNECT Request
SMB TREE_DISCONNECT Response
Protocol
negotiation
Protocol
handshakeSecurity
authentication
Share
connection
File operation
Disconnection
Session setup
Tree
connection
Network file
operation
Disconnection
......
Huawei Confidential14
Typical Application of CIFS: File Sharing Service
The file sharing service applies to scenarios such as enterprise file servers and
media assets.
LAN
AD server
DNS
Windows
Performance
monitoring
Service
management
Share
management
User
management
Enterprise office
IPIP
IPIP
NAS service
ManagementIP
IP
Authentication flow
Management flow
Data flow
Huawei Confidential15
Contents
1. DAS
2. NAS
3. SAN
IP SAN Technologies
▫ FC SAN Technologies
▫ Comparison Between IP SAN and FC SAN
4. Distributed Architecture
Huawei Confidential16
NIC + Initiator Software
Internal bus
Ethernet
The initiator software
converts iSCSI packets into
TCP/IP packets, which
consumes host resources.
TCP/IP-based Ethernet
connection
Storage device
IP SAN
NIC
Huawei Confidential17
TOE NIC + Initiator Software
The initiator software
implements the
functions of the iSCSI
layer, which consumes
host resources.
TCP/IP-based
Ethernet connection
The TOE NIC implements
TCP/IP conversion, which
does not consume host
resources.
Internal bus
EthernetStorage device
IP SAN
TOE NIC
Huawei Confidential18
iSCSI HBA
TCP/IP-based
Ethernet connection
The iSCSI HBA converts
iSCSI packets into TCP/IP
packets, which does not
consume host resources.
Internal bus
EthernetStorage device
IP SAN
iSCSI HBA
Huawei Confidential19
Logical Port
Logical ports are created based on bond ports, VLAN ports, or Ethernet ports. The logical ports
are virtual ports that carry host services.
A unique IP address is allocated to each logical port for carrying its services.
1
Ethernet port
Logical port
Bond port VLAN
Many to
one
One to
many
One to
many
One to
many
One to
many
One to
many
2
3
4
5
6
No. Description
1 Indicates that multiple Ethernet ports are bonded to form a bond port.
2 Indicates that an Ethernet port is added to multiple VLANs.
3 Indicates that a bond port is added to multiple VLANs.
4 Indicates that a bond port is used to
create multiple logical ports.
5 Indicates that a VLAN port is used to create multiple logical ports.
6 Indicates that an Ethernet port is used to create multiple logical ports.
Huawei Confidential20
VLAN Configuration
VLAN is a technology that logically divides a physical LAN into multiple broadcast
domains.
Ethernet ports or bond ports in a storage system can be added to multiple independent
VLANs. You can configure different services in different VLANs to ensure the security
and reliability of service data.
VLAN 1
ID = 1
VLAN 2
ID = 2
VLAN 3
ID = 3
VLAN k
ID = k……
P0 P1 P2 P3 Storage device
Ethernet port
Adding ports to VLANs
Bond port
Huawei Confidential21
IP Address Failover
IP address failover indicates that a logical IP address fails over from a faulty port to an available
port. In this way, services are switched from the faulty port to the available port without
interruption. The faulty port can take over services back after being recovered.
During the IP address failover, services are switched from the faulty port to the available port,
ensuring service continuity and improving reliability of paths for accessing file systems. This
process is transparent to users.
The essence is a service switchover between ports. The ports can be Ethernet ports, bond ports, or
VLAN ports.
Huawei Confidential22
Ethernet Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can create logical ports based on
Ethernet ports.
When the Ethernet port that corresponds to a logical port fails, the system will:
Locate an available Ethernet
port of the same type.
Delete the logical port from
the faulty Ethernet port.
Create the same logical port
on the available Ethernet
port to carry services.
Ensure service continuity.
Logical port A
(IP address a)
Ethernet port A
Logical port A
Ethernet port A
Logical port A
(IP address a)
Ethernet port B
Search
Port switchoverPort fault
Huawei Confidential23
Bond Port–based IP Address Failover
To improve reliability of paths for accessing file systems, you can bond multiple Ethernet ports to
form a bond port.
When the Ethernet ports that are used to create the bond port fails, the system will:
Search
Port switchoverPort fault
Logical port A
(IP address a)
Ethernet port A
Bond Port A
Ethernet port B Ethernet port B
Logical port A
Ethernet port A
Bond Port A
Ethernet port D
Ethernet port C
Logical port A
(IP address a)
Bond Port A
High-speed
data
transmission
Locate an available port.
Delete the logical port created
on the faulty port.
Create a logical port with the
same IP address on the
available port.
Switch services to the
available port.
After the faulty port recovers, it
can take over services again.
Huawei Confidential24
VLAN-based IP Address Failover
You can create VLANs to isolate different services.
When an Ethernet port on a VLAN fails, the system will:
Search
Port switchoverPort fault
Logical port A
(IP address a)
Ethernet port A
VLAN A
ID = 1
Logical port A
Ethernet port A
VLAN A
ID = 1
Logical port A
(IP address a)
Ethernet port B
VLAN B
ID = 1
Locate an available port of
the same type.
Delete the logical port from
the faulty port.
Create the same logical port
on the available port.
Switch services to the
available port.
Huawei Confidential25
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
FC SAN Technologies
▫ Comparison Between IP SAN and FC SAN
4. Distributed Architecture
Huawei Confidential26
FC HBA
Fibre Channel
protocol-based
The FC HBA converts SCSI
packets into Fibre Channel
packets, which does not
consume host resources.
Internal bus
FC networkStorage device
FC SAN
FC HBA
Huawei Confidential27
FC Network
Huawei Confidential28
Zoning
Storage 2
Server 1
Server 3
Server 2
Storage 1
Storage 3
Zone 1: Server 1 can
access Storage 1.
Zone 2: Server 2 can
access Storage 2.
Zone 3: Server 3 can
access Storage 1 and
Storage 2.
Huawei Confidential29
Contents
1. DAS
2. NAS
3. SAN
▫ IP SAN Technologies
▫ FC SAN Technologies
Comparison Between IP SAN and FC SAN
4. Distributed Architecture
Huawei Confidential30
IP SAN and FC SAN
SCSI
DAS
FC
FCFC
FC
FC SAN
iSCSI
iSCSI
IP SAN
IP
IP
Huawei Confidential31
Comparison Between IP SAN and FC SAN
Item IP SAN FC SAN
Network architecture Existing IP networks
Dedicated Fibre Channel networks and
HBAs
Transmission
distance
Not limited theoretically
Limited by the maximum transmission
distance of optical fibers
Management and
maintenance
As simple as operating IP devices
Complicated technologies and
management
Compatibility Compatible with all IP network devices Poor compatibility
Cost
Lower purchase and maintenance costs
than FC SAN, higher return on
investment (ROI)
High purchase (Fibre Channel switches,
HBAs, Fibre Channel disk arrays, and so
on) and maintenance (staff training,
system configuration and supervision,
and so on) costs
Disaster recovery
(DR)
Local and remote DR available based
on existing networks at a low cost
High hardware and software costs for
DR
Security Relatively low Relatively high
Huawei Confidential32
Contents
1. DAS
2. NAS
3. SAN
4. Distributed Architecture
Huawei Confidential33
Distributed Storage Networking
Frontend service
network
Management
network
Backend storage network
Node 1
Node 2
Node 3
Node 4
Node 5
Huawei Confidential34
Networking Overview
Frontend service/Tenant network
The front-end service/tenant network is used to interconnect the distributed storage with the customer network. It
provides the tenant UI for tenant users to complete operations such as resource application and usage query, and
processesservice requests sent by tenant clients or APIs.
Backend storage network
The backend storage/internal management network is used for internal interconnection between nodes. It provides
heartbeat communication between high availability (HA) components such as the data service subsystem (DSS), and
internal communication and data interaction between components.
Management network
The management network is used to interconnect with the customer's maintenance network. It provides a management
UI for the system administrator to perform service operations such as system configuration, tenant management,
resource management, and service provisioning, as well as maintenance operations such as alarm, performance, and
topology management. In addition, the Mgmt ports of all physical nodes can be aggregated to provide remote device
maintenance capabilities, such as remotely logging in to the virtual KVM of a device and viewing hardware running data
such as temperature and voltage.
Huawei Confidential35
Network Planes
Management
node
Compute nodeStorage node
FSM
VBS
EDS
OSD
REP
Application
DR site
Third-place
quorum
server
Private client
access mode
Management
node
Compute nodeStorage node
FSM
VBS/HDF
S-SVREDS
OSD
REP
Application
DR site
Third-place
quorum
server
Standard protocol
access mode
Management plane:
Storage plane:
Replication plane:
Arbitration plane:
Service plane:
Huawei Confidential36
Networking Rules
Nodes must be placed in a cabinet from bottom to top.
A deployment solution is usually chosen based on project requirements. The
total power consumption and weight of the storage nodes, switches, and KVM
in a cabinet must be calculated and the number of nodes that can be housed by
a cabinet must be determined based on the equipment room conditions.
In typical configuration, nodes and switches in the base cabinet are connected
through network cables and SFP+ cables, and nodes in an expansion cabinet
connect to switches in the base cabinet through network cables and optical
fibers.
Huawei Confidential37
Quiz
1. Which of the following are included in distributed storage networking?
A. Management network
B. Frontend service network
C. Frontend storage network
D. Backend storage network
2. Which of the following protocols are commonly used in SAN networking?
A. FC
B. iSCSI
C. CIFS
D. NFS
Huawei Confidential38
Summary
Storage network
architecture evolution
DAS
NAS
SAN
IP SAN
FC SAN
Comparison between
IP SAN and FC SANDistributed architecture
Huawei Confidential39
More Information
Huawei Enterprise
Service App
Enterprise Technical
Support App
Huawei Confidential40
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Introduction to Huawei Intelligent Storage
Products
Huawei Confidential2
Foreword
This course describes features, positioning, and typical application scenarios
of Huawei intelligent storage products, including Huawei OceanStor all-
flash storage, Huawei OceanStor hybrid flash storage, Huawei OceanStor
distributed storage, and Huawei edge data storage (FusionCube).
Huawei Confidential3
Objectives
Upon completion of this course, you will be able to know the following about
Huawei intelligent storage products:
Features
Positioning
Typical application scenarios
Huawei Confidential4
Contents
1. All-Flash Storage
2. Hybrid Flash Storage
3. Distributed Storage
4. Edge Data Storage (FusionCube)
Huawei Confidential5
All-Flash Product Display
Huawei OceanStor
Dorado 5000 V3
Huawei OceanStor
Dorado 6000 V3
Huawei OceanStor
Dorado 18000 V3
Huawei OceanStor
Dorado 3000 V3
Huawei OceanStor
Dorado 3000 V6
Huawei OceanStor
Dorado 5000 V6
Huawei OceanStor
Dorado 6000 V6
Huawei OceanStor
Dorado 8000 V6
Huawei OceanStor
Dorado 18000 V6
Huawei Confidential6
Features
SSDs+NVMe disks for high
performance and low latency
SmartMatrix 3.0 full-
mesh architecture
Intelligent AI chips+FlashLink
Huawei OceanStor Dorado all-flash storage
Huawei Confidential7
Device Model Examples
Icon Description
Enclosure ID indicator
Enclosure location indicator
1. Blinking blue: The controller enclosure is
being located.
2. Off: The controller enclosure is not
located.
Enclosure alarm indicator
1. Steady amber: An alarm is reported by
the controller enclosure.
2. Off: The controller enclosure is working
properly.
Power indicator/Power button
2 U, disk and controller integration, built-in 36 x
palm-sized NVMe disks
2 U, disk and controller integration,
built-in 25 x 2.5-inch disks
Note: Huawei OceanStor Dorado series is used as an example.
Management
port
Maintenance
port
Serial
port
Power-BBU module
1+1 redundancy
Interface
module
SAS expansion port
Each controller provides two SAS (SAS version) or 100
Gbit/s RDMA (NVMe version) expansion ports.
Huawei Confidential8
Storage System Components
Controller
Power Module
System Subrack
Disk Module
Note: Huawei OceanStor Dorado (2 U) is used as an example.
Huawei Confidential9
Software Architecture
HyperReplication HyperClone HyperMetro
SmartQoS SmartThin SmartMigration
HyperCDP
SmartVirtualization Three-copy mode
SmartDedupe and SmartCompression HyperSnap
Software on a
maintenance terminal
Software running on an
application server
Software on the
storage system
SNMP CLI Syslog Management function
control software
iSCSI/Fibre Channel
Management
network
port/Serial port
Cache
Pool
SCSI
RAID
OceanStor BCManager
Storage operating system
HyperSnap
Huawei Confidential10
Intelligent Chips
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
0
1
0
1
1
0
1
0
1
0
1
0
1
0
1
FLASHLINK intelligent algorithm®
SSD
Controller with five chips
Smart disk enclosure
Global I/O priority
adjustment
Constant low latency
Multi-stream data
partitioning
Reduced garbage collection
Full-stripe write
Reduced write amplification
AI chip + cache algorithm
Improved read hit ratio
Kunpeng chip + service
splitting
Faster reconstruction
Kunpeng chip + multi-core
algorithm
Restart
count
1 2 3 4 5
Multi-core
scheduling
Reconstruction
1X minutes/TBX00 minutes/TB
Metadata
New data
GC migration
data
Data read
Data write
Advanced feature
Disk reconstruction
Garbage collection
Huawei Confidential11
Typical Application Scenario – Mission-Critical Service
Acceleration
Data center
SAN
Huawei OceanStor
Dorado
Supervision and
reporting
Risk controlOperational
analytics
Product
management
Data
extractionData
consolidation
Data analysis
...
Huawei Confidential12
Contents
1. All-Flash Storage
2. Hybrid Flash Storage
3. Distributed Storage
4. Edge Data Storage (FusionCube)
Huawei Confidential13
Hybrid Flash Storage Series
All Flash Arrays
Hybrid Flash Arrays
Huawei OceanStor 5300F/5500F V5
Huawei OceanStor 18800F V5
Huawei OceanStor 5600F/5800F V5
Huawei OceanStor 6800F V5
Huawei OceanStor 18500F V5
Huawei OceanStor 18500 V5
Huawei OceanStor 6800 V5
Huawei OceanStor 5600/5800 V5
Huawei OceanStor 5300/5500 V5
Huawei OceanStor 18800 V5
Scalability, PB Usable
P
erform
an
ce, IO
P
S
Huawei OceanStor 5110/5210 V5
Huawei OceanStor 5310F/5510F V5
Huawei OceanStor 5610/5810 V5
Huawei OceanStor 6810F V5
Huawei OceanStor 18510 V5
Huawei OceanStor 18810 V5
Huawei OceanStor
5100/5210F V5
Huawei OceanStor 5310/5510 V5
Huawei OceanStor 5610F/5810F V5
Huawei OceanStor 6810 V5
Huawei OceanStor 18510F V5
Huawei OceanStor 18810F V5
Huawei Confidential14
Hybrid Flash Storage
Enterprise-class hybrid flash storage products
provide stable, reliable, converged, and
efficient data services.
Meets requirements of various services and
applications such as OLTP/OLAP databases,
high-performance computing, digital media,
Internet operation, centralized storage,
backup, disaster recovery, and data migration.
Provides a wide range of efficient and flexible
backup and disaster recovery solutions to
ensure business continuity and data security.
Huawei OceanStor hybrid flash storage
Huawei Confidential15
Device Model Examples
Storage device (2 U) For example, Huawei
OceanStor hybrid flash storage 5110 V5
Storage device (2 U) For example, Huawei
OceanStor hybrid flash storage 5300 V5 Kunpeng
Storage device (2 U) For example, Huawei OceanStor
hybrid flash storage 5600/5800 V5 Kunpeng
Storage device (4 U), for example, Huawei OceanStor
hybrid flash storage 6800/18800 V5 Kunpeng
Huawei Confidential16
Convergence of SAN and NAS Storage
Block Service
Storage POOL
File Service
RAID 2.0+
iSCSI/FC/FCOE NFS/CIFS/FTP/HTTP
Convergence of SAN and NAS resources of
Huawei OceanStor hybrid flash series
LUN
Tier0: SSD Tier1: SAS Tier2: NL-SAS
Extent
ROOT
Dir Dir
File system
Tier0: SSD Tier1: SAS and NL-SAS
File
Intelligent tiering of SAN and NAS cold/hot data
Huawei Confidential17
Support for Multiple Service Scenarios
Cloud
computing
Social
intercourse
Backup
and DR
Big data
Finance
Energy
Carrier
Government
Enterprise
Huawei Confidential18
Application Scenario – Active-Active Data Centers
Data center A Data center B
Active-active
Database service
Virtualization
service
File service
...
SwitchSwitch
SAN NAS SAN NAS
Huawei Confidential19
Contents
1. All-Flash Storage
2. Hybrid Flash Storage
3. Distributed Storage
4. Edge Data Storage (FusionCube)
Huawei Confidential20
Distributed Storage
• The distributed technology creates a large-scale storage
resource pool that provides services for upper-layer
applications and clients through standard service interfaces.
• Supports large-scale expansion and elastic EC data
redundancy protection, improving disk space utilization.
• One storage system supports block, file, HDFS, and object
storage services.
• The solution with separated storage and computing
resources ensures stable latency and fast response to
mission-critical services.
Note: Huawei OceanStor 100D is used as an example in the figure.
Huawei Confidential21
Product Highlights
Block service
File service
Object service
HDFS service
Block File Object HDFS
OceanStor distributed storage
Four-in-one storage service, enabling one storage
system to support four types of storage services
Note: Huawei OceanStor 100D is used
as an example.
Huawei Confidential22
Hardware Node Examples
Performance
node
• Virtualization
scenario
• Cloud computing
scenario
Capacity
node
• Big data analytics
scenario
• Object resource
pool scenario
All-flash
node • Database scenario
For example: OceanStor 100D P100 and P110
For example: OceanStor 100D C100 and C110
For example: OceanStor 100D F100 and F110
Note: Huawei OceanStor 100D is used as an example in the figure.
Huawei Confidential23
Hardware Node Examples
P36A
TaiShan 5280 V2
P12A
TaiShan 2280 V2
C36A
TaiShan 5280 V2
S12A
TaiShan 2280 V2
x86 Platform Application Scenario Remarks
P36X
Checkpoint/Portrait checkpoint, hybrid
storage of video and images, media
asset production, HPC production, and
mobile centralized procurement TaiShan 5280 V2 server
C36X Video surveillance, media asset library, and HPC archiving
P25X Small-sized media asset production and resource pool None
Note: Huawei OceanStor 9000, the scale-out storage for files, is
used as an example in the figure.
Huawei Confidential24
Software System Architecture
OAM Plane
Cluster
Management
Device
Manager
QoS
Alarm/Log
Authentication
License
Persistence Layer
Mirror Erasure Coding Fast Reconstruction Write-back Cache SmartCache
Index Layer
Write Ahead Log Snapshot Compression Deduplication Garbage Collection
VBS (SCSI/iSCSI)
Block
LUN Volume
NFS/SMB
File
Direct IO Cache
Object
LS OSC Billing
S3/SWIFT/POEHDFS Disaster Recovery
HyperReplication
HyperMetroHDFS
NameNode
Hardware x86/Kunpeng
Service Layer
Note: Huawei OceanStor 100D is used as an example.
Huawei Confidential25
Application Scenario – Cloud Resource Pool
Traditional compute-storage convergence
Data nodes + Compute nodes
Data nodes + Compute nodes
Compute node
Data node Data node Data node
Cloud storage resource pool
Storage-compute separation
Huawei Confidential26
Contents
1. All-Flash Storage
2. Hybrid Flash Storage
3. Distributed Storage
4. Edge Data Storage (FusionCube)
Huawei Confidential27
Edge Data Storage (FusionCube)
FusionCube:
It is an edge data storage
infrastructure based on the
converged architecture. It is
mainly used in hybrid load
scenarios, such as databases,
desktop clouds, containers,
and virtualization.
The Kunpeng ecosystem is
supported to flexibly meet
the elastic configuration
requirements of computing,
storage, and I/O resources
and meet the requirements
of multiple types of
application load modes with
an IT infrastructure at the
edge.
FusionCube 1000:
It is an edge IT infrastructure
solution with integrated
design and is delivered as
integrated cabinet. The
solution is mainly used in
edge data centers and edge
application scenarios of
vertical industries.
The Kunpeng ecosystem is
supported. Pre-cabling and
pre-configuration can be
completed in advance based
on the customer's plan, and
the solution is delivered as
integrated cabinet to
implement quick deployment.
Huawei FusionCube
Huawei FusionCube 1000
Huawei Confidential28
Hardware Model Examples
Blade server
12 U with 8 or 16 nodes
High-density server
4 U with 4 nodes or 2 U with 4
nodes
Rack server
2 U with one node
Huawei Confidential29
Introduction to Intelligent Management
System device
management
Virtual resource
management
Storage resource
management
Bare metal resource
management
Automatic detection
Status monitoring
One-click capacity expansion
One-click O&M
VM provisioning and management
Resource usage monitoring
Storage pool status monitoring
Storage usage monitoring
Disk volume device management
Resource usage monitoring
Network configuration
FusionCube
Center
Unified
management
Server
Switch
Distributed
block storage
Huawei Confidential30
Storage System
Distributed storage resource pool
Node 1 Node 2 Node N
HDDSSD
...
VMVM
HDDSSD
VMVM
HDDSSD
VMVM
Huawei Confidential31
Software Architecture
Huawei server hardware
Distributed storage system
Office Application EmailBI CRM&ERPVDI Web Application
Hyper-convergence
Unified
management
Hyper-convergence
Unified installation
Backup software
DR
Thinprovisioning
Multiple
resource
pools
Snapshot Distributed cache
Linked
clone
One-click
capacity
expansion
Active-active Asynchronous replicationEC QoS
Database
Service
software
Linux OS Operating
system
Note: The figure uses FusionCube as an example.
Huawei Confidential32
Application Scenario – Edge Data Center Service Scenario
Site
management
Data backup
Real-time
monitoring
Intelligent
O&M
HQ data center
Edge data
center
Edge data center
Edge data center
Hardware
installation in an
edge data center
Modular
design and
all-in-one
cabinet
FusionCube
Installer
Service provisioning
Compute
module
Storage
module
UPS
+
+
+
Network
module
Huawei Confidential33
Quiz
1. (Single-answer question) Which of the following statement about Huawei OceanStor all-
flash storage is false?
A. Supports SSDs and NVMe disks.
B. Supports SAS disks.
C. Supports HDDs.
D. Supports palm-sized SSDs.
Huawei Confidential34
Quiz
2. (Multi-answer question) Which of the following storage services are supported by Huawei
distributed storage (such as Huawei OceanStor 100D)?
A. Block storage
B. File storage
C. Object storage
D. HDFS storage
E. Linked storage
Huawei Confidential35
Summary
Introduction to Huawei intelligent
storage products
All-flash storage
Hybrid flash storage
Distributed storage
Edge data storage
(FusionCube)
Characteristics, positioning,
and application scenarios
Huawei Confidential36
More Information
Huawei Enterprise
Service App
Enterprise Technical
Support App
Huawei Confidential37
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Storage Resource Tuning Technologies and
Applications
Huawei Confidential2
Foreword
This course describes storage resource tuning technologies, including
SmartThin, SmartTier, SmartQoS, SmartDedupe, SmartCompression, and
SmartMigration.
Huawei Confidential3
Objectives
On completion of this course, you will be able to understand the service features,
implementation principles, and application scenarios of the following features:
SmartThin
SmartTier
SmartQoS
SmartDedupe
SmartCompression
SmartMigration
Huawei Confidential4
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
Huawei Confidential5
Overview
The traditional deployment of a storage system has the following problems:
Adverse impact or even interruption on services when expanding the storage space
Uneven storage space utilization
Low storage efficiency
SmartThin can allocate the storage space on demand to improve storage
resource utilization and fully meet service requirements.
Huawei Confidential6
Working Principle of SmartThin
Servers
Logical virtual
space
Actual physical
space
Visible storage
space
Storage
resource pool
Disk
resources
Storage
array
Data
Data
Data
Data
Disk
Disk
Disk
Space
RAID
RAID
RAID
RAID
DB
server
DB
server
DB
server
DB
server
Huawei Confidential7
SmartThin Read Process
D D D
1 D
2
3 D
4
5 D
6
1 3 5
2 4 6
Storage pool
Mapping
table
Thin LUN
Data
0000
1
2 3
3
1 2
1. A thin LUN receives a read
request from a host.
2. Queries the mapping table between
the thin LUN and the storage pool.
3. Confirms that the space is allocated by the storage pool and returns the data
read from the corresponding area in the storage pool to the host.
1. The thin LUN receives a read request from the host.
2. Queries the mapping table between the thin LUN and the storage pool.
3. Confirms that the space is not allocated by the pool and returns all zeros to the host.
Huawei Confidential8
SmartThin Write Process
D D
1 D
2
3
4
5
6
1 3 5
2 4 6
Storage pool
Mapping table
Thin LUN
Data
1
2 3
31 2
1. A thin LUN receives a write
request from a host.
2. Queries the mapping table between
the thin LUN and the storage pool.
3. Confirms that the space is allocated by the pool and performs the write process on the
corresponding area in the storage pool. If the write request asks for releasing space, the
space is released.
1. A thin LUN receives a write
request from the host.
2. Queries the mapping table between
the thin LUN and the storage pool.
3. If the space is not allocated by the pool, the storage system allocates the space first. And then performs write process
on the corresponding area in the storage pool. If the write request asks for releasing space, a message is returned to the
host.
Data
Huawei Confidential9
Application Scenarios
SmartThin can help core system services that require high service continuity, such as
bank transaction systems, expand system capacity online without interrupting ongoing
services.
SmartThin can assist with on-demand physical space allocation for services where the
growth of application system data is hard to be accurately evaluated, such as email
services and web disk services, preventing a space waste.
SmartThin can assist with physical space contention for mixed services that have diverse
storage requirements, such as carriers' services, to achieve optimized space
configuration.
Huawei Confidential10
Configuration Process
Create a storage pool.
Create a thin LUN.
Delete a thin LUN.
Delete a storage pool.
Create a disk domain.
End
Check the SmartThin
license.
Import a SmartThin
license.
Create a disk domain.
Start Modify properties of a
thin LUN.
Expand a thin LUN online.
Huawei Confidential11
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
Huawei Confidential12
Overview
The random distribution of hot and cold data fails to fully utilize disk characteristics of different
media. SmartTier automatically matches different active data with storage media of different
characteristics. For example, cold data is stored on NL-SAS disks, and hot data is stored on SSDs.
In this way, data flows vertically, improving storage system performance and reducing costs.
Most active data
Hot data
Cold data
High-performance tier
Performance tier
Capacity tier
SSDs
SAS disks
NL-SAS
disks
Huawei Confidential13
Dividing Storage Tiers
In the same storage pool, a storage tier is a collection of storage media with the same
performance. Each storage tier respectively uses the same type of disks and RAID policy.
Storage
tiers
High-performance tier: SSDs
High IOPS; Short task response
time; High cost of storage
capacity per unit
Applicable to applications with
intensive random access requests
Performance tier: SAS disks
High bandwidth under a large number of
service loads; Moderate task response time;
Write speed slower than read speed without
cached data
Applicable to applications with moderate
access requests
Capacity tier: NL-SAS disks
LowIOPS; Long task response time.
High cost for storage request
processing per unit
Applicable to applications with light
access requests
Huawei Confidential14
Three Phases for Implementing SmartTier
The storage system undergoes three phases of I/O monitoring, data placement
analysis, and data relocation to implement SmartTier.
I/O monitoring
Data migration
The I/O monitoring module collects statistics on the
activity levels of all data blocks.
The data placement analysis module ranks the
activity levels of all data blocks.
The data migration module migrates data based on
the ranking result and data migration policies.
Data placement
analysis
Huawei Confidential15
SmartTier Key Technologies
Initial capacity
allocation
Migration
policy
formulation
Monitoring
statistics
analysis
Data
migration
• Automatic
allocation
• Preferential
allocation to the
high-performance
tier
• Preferential
allocation to the
performance tier
• Preferential
allocation to the
capacity tier
• Automatic
migration
• Migration to the
higher-
performance tier
• Migration to the
lower-
performance tier
• No migration
• I/O monitoring
and statistics
collection
• Determining the
data to be
migrated
• Data migration
plan
• Data migration
rate
• Data migration
granularity
Huawei Confidential16
Application Scenarios
SmartTier is used for various service
environments.
The following uses the Oracle database
service as an example:
After using SmartTier, enterprise A
reduces 25% cost for disk procurement.
The more cold data is stored, the more
disk procurement costs are saved.
0
5000
10000
15000
20000
25000
0 20 40 60 80 100
D
is
k
pr
oc
ur
em
en
t
co
st
(
U
SD
)
Idle data percentage (%)
Huawei Confidential17
Configuration Process
Check the license.
Configure SmartTier parameters based
on the storage system level.
Configure SmartTier parameters base
on the storage pool level.
Configure SmartTier parameters based
on the LUN level.
Storage system-level configuration includes the
configuration of data migration speed, which is applied
to all storage pools in a storage system.
Storage pool-level configurations include configurations
of data migration granularity, RAID policy, data
migration plan, enabling I/O monitoring, and forecast
analysis. The mentioned configurations are applied to a
single storage pool.
LUN-level configurations include the
configuration of the initial capacity allocation
policy, and SmartTier policy, which are applied to
a single LUN.
Start
End
Huawei Confidential18
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
Huawei Confidential19
Overview
SmartQoS traffic control management
SmartQoS dynamically allocates storage system resources to meet
certain performance goals of some applications.
The storage system uses LUN-, file system-, or snapshot-based I/O
priority scheduling and I/O traffic management to ensure the proper
running of critical services.
Huawei Confidential20
I/O Priority Scheduling
App 2App 1 App 3
FIFO
1
2
3
4
5 6
7
8
9
1
2
3
4
5
6
7
8
9
App 2App 1 App 3
High Middle Low High Middle Low
Traditional storage I/O priority scheduling
Huawei Confidential21
I/O Traffic Control
......
Number of allocated tokens
(I/O queue processing mechanism
of applications in the system)
Application I/O queue 1
Application I/O queue n
Disk
Application server 1 Application server 2
1
I/O
request 1
I/O
request
2
3
Processes
dequeued I/O
requests.
Storage
system
Huawei Confidential22
Application Scenario
User Type Service Quality
Requirements
Subscriber A (gold
subscriber)
High
Subscriber B (silver
subscriber)
Low
• SmartQoS traffic control policy A: limits the service
bandwidth of subscriber A (for example, ≤ 100 MB/s) to
ensure the service performance of subscriber A without
affecting the service performance of the whole storage
system.
• SmartQoS traffic control policy B: limits the service
bandwidth of subscriber B (for example, ≤ 30 MB/s). The
bandwidth of subscriber B is less than that of subscribe A to
reserve robust system resources for other users.
The limited bandwidth is less
than or equal to 100 MB/s,
which ensures robust
resources.
The limited bandwidth is less
than or equal to 30 MB/s.
Subscriber A
gold
subscriber
Subscriber B
silver
subscriber
Huawei Confidential23
Configuration Process
Start
Check the SmartQoS license.
Configure SmartQoS.
End
Monitor service performance.
Configure the I/O priority.
Create a SmartQoS policy.
Main steps
Sub-steps
Huawei Confidential24
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
Huawei Confidential25
Overview
SmartDedupe eliminates redundant data from a storage system and reduces the
physical storage capacity for storing data to meet the increasing needs for
storage capacity.
Huawei OceanStor Dorado V6 storage systems support inline deduplication and
post-process similarity deduplication.
Inline deduplication: Data is deduplicated before being written to disks.
Post-processing similarity deduplication: Data is written to disks in advance and then
read and deduplicated when the system is idle.
Huawei Confidential26
Working Principle of Inline Deduplication
Data to be deduplicated
Writes data. + 1 Writes data.
Block 1 Block 2 Block 3
FP0 FP1 FP2
New block
(same FP)
Old block
(same FP)
(byte-by-byte comparison)
New
block
FP Data Address References
FP0=FPx Data address 0 1
FP1=FPy Data addition 1->2
FP2 Data address 2 1
FPx Data address 1
Fingerprint (FP) table
Huawei Confidential27
Working Principle of Post-processing Similarity
Deduplication
<FP> Data Address References
FP0 Data address 0 2,1
<LBA> <FP> <Similarity
fingerprint
(SFP)>
LBA0 FP0 SFP0
LBA1 FP1 SFP1
LBA2 FP2 SFP2
Similarity deduplication opportunity table
Data to be deduplicated
Block 1 Block 2 Block 3
SFP0
FP0
SFP1
FP1
SFP2
FP2
Storage
Saved after differential compression
Writes data + 1 Delta
compression
New block
Same block
(same FP)
(byte-by-byte comparison)
Similar block
(same SFP)
Fingerprint table
Huawei Confidential28
Application Scenarios of SmartDedupe
Virtual Desktop Infrastructure (VDI) is a common application scenario of
deduplication.
In VDI applications, users create multiple virtual images on a storage device.
These images have a large amount of duplicate data. As the amount of
duplicate data increases, the storage system space fails to meet service running
requirements. SmartDedupe can delete duplicate data between images to
release storage resources and store more service data.
Huawei Confidential29
Configuration Process
Start
Check the license.
Enable SmartDedupe.
End
1. Checking the
availability of
SmartDedupe
2. Enabling
SmartDedupe for
LUNs
Huawei Confidential30
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
Huawei Confidential31
Overview
SmartCompression reorganizes data to save storage space and improves the
data transfer, processing, and storage efficiency under the precondition that no
data is lost. The storage system supports inline compression, that is, only newly
written data is compressed.
The storage systems of the Huawei OceanStor Dorado V6 storage systems
support inline compression and post-compression, both of which are lossless
compression.
Inline compression: Data is compressed before being written to disks.
Post-compression: Data is written to disks in advance and then read and compressed
when the system is idle.
Huawei Confidential32
Working Principle of SmartCompression
... ... abcdefg abc hj abchjData to be
compressed
After
compression
Compression window
(0,3)
Searches for the
longest identical
character string,
starting fromthe
first character.
Offset in the
window
Longest
matched string
hj
The window moves forward The window moves forward
(2,5)
(LZ77 example)
Huawei Confidential33
Application Scenarios of SmartCompression
Databases
Engineering
and
Seismic
Geological
Data
File
Services
Huawei Confidential34
Scenarios Where SmartDedupe and SmartCompression
Are Used Together
The deduplication and compression technologies can be used at the same time
to achieve the optimal space saving effect.
Application scenarios:
VDI and VSI scenarios
Data tests or development systems
Storage systems with the file service enabled
Engineering data systems
Less
storage
space
Longer
SSD life
Less cost
Huawei Confidential35
Configuration Process
Start
Check the license.
Enable SmartCompression.
End
1. Checking the
availability of
SmartCompression
2. Enabling
SmartCompression
for LUNs
Huawei Confidential36
Contents
1. SmartThin
2. SmartTier
3. SmartQoS
4. SmartDedupe
5. SmartCompression
6. SmartMigration
Huawei Confidential37
Overview
SmartMigration is a key service migration technology. Services on a source LUN
can be completely migrated to a target LUN without interrupting host services.
The target LUN can totally replace the source LUN to carry services after the
replication is complete.
What does
"completely" mean?
Huawei Confidential38
Working Principle of SmartMigration
SmartMigration is leveraged to adjust service performance or upgrade storage
systems by migrating services between LUNs.
SmartMigration is implemented in two phases:
Start
Service data
synchronization
LUN information
exchange
Finish
Huawei Confidential39
SmartMigration Service Data Synchronization
After creating a SmartMigration task, create the pair relationship between a source LUN
and a target LUN.
Service data synchronization between the source and target LUNs involves initial
synchronization and change synchronization.
A B C
D E F
G H I
Source LUN
A B C
D E F
G H I
Target LUN
A B C
D E F
G H I
Copy all data.
Initial synchronization
LM
Source
LUN
Target
LUN
DCL Log
Host
Storage
1
4
5
4 2
2 2
3 3
Change synchronization
Huawei Confidential40
SmartMigration LUN Information Exchange
LUN information exchange is used for mappings between LUNs and data volumes,
namely, the exchange between both data volume IDs when the IDs of source LUNs and
target LUNs remain unchanged.
Source
LUN
Target
LUN
LUN ID Source data volume ID
0 0
Before LUN
information exchange
During LUN
information exchange
After LUN
information exchange
LUN ID Target data volume ID
1 1
LUN ID Target data volume ID
0 1
LUN ID Source data volume ID
1 0
LUN ID Target data volume ID
0 1
LUN ID Source data volume ID
1 0
Mapping
Exchanging data volume IDs
1
2
3
The host reads the ID
of the source LUN.
Mapping
Huawei Confidential41
SmartMigration Pair Splitting
Splitting is performed on a single pair. The splitting process includes stopping service
data synchronization between the source LUN and target LUN in a pair to exchange
LUN information, and removing the data migration relationship after the exchange.
Source
LUN
Target
LUN
Pair
1. Information
exchange
2. Pair splitting
Splitting
After service data synchronization is stopped.
What if multiple
pairs are split?
Huawei Confidential42
Configuration Process
Start
Check the license file.
Create a SmartMigration task.
Split SmartMigration pairs or
perform consistency splitting on
SmartMigration pairs.
End
Huawei Confidential43
Summary
Storage resource tuning
technology and application
SmartThin
SmartTier
SmartQoS
SmartDedupe
SmartCompression
SmartMigration
Definitions, working
principles, and
configuration processes
Huawei Confidential44
Quiz
1. (True or false) SmartTier cannot be enabled for a storage pool whose member disks are of the same
type. ( )
2. (Multiple-choice) Which of the following migration policies can be set for LUNs? ( )
A. Automatic migration
B. Migration to the higher-performance tier
C. Migration to the lower-performance tier
D. No migration
Huawei Confidential45
Quiz
3. (Single-answer question) Which status must a pair be before consistency splitting during
LUN
migration? ( )
A. Migrating
B. Stop
C. Normal
D. Migrated
Huawei Confidential46
More Information
Huawei
enterprise
business app
Enterprise
technical
support app
Huawei Confidential47
Recommendations
Huawei official websites
Enterprise business: https://enterprise.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/
Online learning: https://learning.huawei.com/en/
Popular tools
HedEx Lite
Network Documentation Tool Center
Information Query Assistant
https://enterprise.huawei.com/en/
https://support.huawei.com/enterprise/
https://learning.huawei.com/en/
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Storage Data Protection Technologies and
Applications
Huawei Confidential2
Foreword
Traditional data protection solutions focus on periodic data backup.
Therefore, problems such as no backup window, inconsistent data, and
impact on the production system always occur.
This course describes storage data protection technologies such as
HyperSnap, HyperClone, HyperReplication, and HyperMetro which are new
data protection methods.
Huawei Confidential3
Objectives
On completion of this course, you will be able to understand the principles,
configuration methods, and application scenarios of the following features:
HyperSnap
HyperClone
HyperReplication
HyperMetro
Huawei Confidential4
Contents
1. HyperSnap
2. HyperClone
3. HyperReplication
4. HyperMetro
Huawei Confidential5
Overview
Storage Networking Industry Association (SNIA) defines a
snapshot as follows:
A snapshot is an available copy of the specified data collection. The
copy contains the image for the relevant data at a time point when
the copy begins.
A snapshot can be a duplicate or replicate of data.
Huawei Confidential6
Working Principles of HyperSnap
Definition: A snapshot is a consistent copy of the source data at a certain point in time. After the snapshot is
generated, it can be read by hosts and used as a data backup at a certain point in time.
Main features
Instant generation: A storage system can generate a snapshot within a few seconds to obtain the consistent copy of
source data.
Small storage space occupation: A snapshot is not a full physical data copy, which does not occupy large storage space.
Therefore, a snapshot for a large amount of source data occupies only a small space.
8:00 AM
9:00 PM
a
d
g
j
b
e
h
k
c
f
i
l
a
d
g
j
b
e
h
k
c
f
i
l
a
d
g
j
b
e
h
k
c
f
i
l
a
d
g
j
b
m
h
k
c
f
n
l
Huawei Confidential7
HyperSnap Principles – Zero Performance Loss
A B C D E
L0->P0
Data requested to be written to L2 of
the source LUN is written to P5.
Data requested to be written to L2 of
the source LUN is again written to P7.
SSD storage space
LUN Mapping Table Snap Mapping Table
L1->P1 L3->P3 L4->P4 L2->P5L2->P2
Data requestedto be
written to L0 of snapshot
1 is written to P6.
L0->P6
P0 P1 P2 P3 P4 P5 P6 P7 P8
G F
Snap Mapping Table
H
Data requested to be written
to L2 of snapshot 2 is written
to P8.
L2->P7
I
L2->P8
Data requested to be written to
L2 of the source LUN is written
to a new space P5. The original
space P2 is referenced by the
snapshot.
Data requested to be written to
L0 of snapshot 1 is written to the
new space P6, bringing no
additional read and write
overhead.
When data is written to L2 of the
source LUN again, the requested
data is written to a new space
P7. The original space P5 is
released because it is not
referenced by a snapshot.
A new snapshot 2 is created and
activated.
Huawei Confidential8
HyperSnap Principles – Rollback
TIME10 11 12
Data 10:00 AM Data 11:00 AM
Snap 11:00 AMSnap 10:00 AM
Virus Infection Data 11:00 AM
Restore
Huawei Confidential9
HyperSnap Principles – Snapshot Cascading and Cross-
Level Rollback
Snapshot cascading: It is a child
snapshot of a parent snapshot. The
difference between snapshot duplicates
and snapshot cascading is that the
latter includes the data of its parent
snapshot. Other functions are the same
as common snapshots.
Cross-level rollback: Snapshots sharing
the same source volume can roll back
each other regardless of their cascading
levels.
Snapshot1.snapshot1
8:00
Source
volume
snapshot0 snapshot1
9:00
Snapshot1.snapshot0
10:00 11:00
Huawei Confidential10
Key Technologies of HyperSnap-Duplicate
Snapshots are virtual, so
they can be duplicated fast.
8:00
8:00 8:00 8:00
Source
volume Snapshot
How can I obtain multiple
duplicates of the same
snapshot?
Huawei Confidential11
Key Technologies of HyperSnap - Rollback Before Write
During the rollback, when a
host writes data to a source
LUN, the snapshot copies the
data blocks to the source LUN,
and then the host continues to
write data.
When no host reads or writes
data, the snapshot data is
rolled back to the source
volume in sequence.
How can I instantly recover data?
8:00
Snapshot
rollback
Source
volume Snapshot
Huawei Confidential12
Application Scenario
1:00
2:00
3:004:00
Source
LUN
Snapshot
LUN
Continuous data protection Data backup and restoration
Duplicate Duplicate Duplicate Duplicate
Decision-
making
support
Data
analysis
Data
test
Report
generation
Source
LUN
Snapshot
LUN
Huawei Confidential13
Configuration Process
Create a snapshot.
1. Checking the
availability of the
snapshot function
2. Creating a snapshot
Performing this operation when a
storage system does not have the
source LUN of a snapshot.
Start
End
Check the license
file.
Create a source
LUN.
Required
Optional
Huawei Confidential14
Contents
1. HyperSnap
2. HyperClone
3. HyperReplication
4. HyperMetro
Huawei Confidential15
Overview
Definition
HyperClone creates a full data copy (a target LUN) of a source LUN at a specified
point in time (synchronization start time).
Features
A target LUN can be read and written during synchronization.
Full synchronization and incremental synchronization are supported.
Forward synchronization and reverse synchronization are supported.
Consistency groups are supported.
Huawei Confidential16
Working Principles of HyperClone
Definition: Clone is a consistent data copy of a source data at a specific point in time. It functions as a
complete data copy after data synchronization. It serves as a data backup and is accessible to hosts.
Main features:
Quick clone generation: A storage system can generate a clone within several seconds to obtain a consistency copy of a
source data. The generated clone can be read and written immediately. Users can configure different deduplication and
compression attributes for the generated clone.
Online splitting: A split can be performed to cancel the association between a source LUN and a clone LUN without
interrupting services. The split read and write operation on the clone LUN will not affect the I/O process of the source
LUN.
a
d
g
j
b
e
h
k
c
f
i
l
a
d
g
j
b
e
h
k
c
f
i
l
Create
HyperClone.
a
d
g
j
b
e
h
k
c
f
i
l
Synchronize
HyperClone.
Huawei Confidential17
HyperClone Principles - Synchronization
Copy all data a and b to the target
LUN.
a
b
a
b
a
b
1
2 3
Source
LUN
Target
LUN
Snapshot
1
2
3
Create a HyperClone pair.
Create a snapshot for the source
LUN after synchronization is
started.
Scenario 1: Initial
synchronization and full
copy are performed.
1
2
Create a snapshot for the source LUN
after a second synchronization.
Copy incremental data c to the target
LUN.
a
b
a
b
a
b
1 2
Source
LUN
Target
LUN
Snapshot
c c
c
Scenario 2: Synchronization is
performed again after the first
synchronization, and differential
copy is performed.
a b Stored data
ca b Newly copied data
c New data written to the host
Internal signal flow of the
storage system
HyperClone pair
Huawei Confidential18
HyperClone Principles - Reverse Synchronization
a b Stored datac
ca b Newly copied datad
d New data written to the host
Internal signal flow of the
storage system
HyperClone pair
Scenario 1: Full copy
Copy all data a, b, c, and d to
the source LUN.
1
2
Create a snapshot for the target LUN after
the reverse synchronization is started.
a
b
2 1
Source
LUN
Target
LUN
Snapshot
a
b
c
d
c
d
a
b
c
d
1
2
Create a snapshot for the target LUN after
the reverse synchronization is started.
Copy incremental data d to the source LUN.
Scenario 2: Differential copy
a
b
2 1
Source
LUN
Target
LUN
Snapshot
c
d
a
b
c
d
a
b
c
d
Huawei Confidential19
HyperSnap Principles - Restrictions on Feature Configuration
Feature Restriction
HyperSnap A source LUN of HyperSnap can be used as a source LUN of HyperClone, but a LUN of HyperSnapcannot be used as a target LUN of HyperClone.
HyperMetro A member LUN of HyperMetro can be used as a source or a target LUN of HyperClone.
HyperReplication Primary and secondary LUNs of HyperReplication can be used as a source or a target LUN of HyperClone.
SmartMigration A source or a target LUN of HyperClone cannot be used as the source or target LUN of SmartMigration.
SmartVirtualization A heterogeneous LUN cannot be used as a source or a target LUN of HyperClone.
HyperCDP A source LUN of HyperCDP can be used as a source or a target LUN of HyperClone.
Huawei Confidential20
Application Scenarios - Data Backup and Restoration
Time
point A
Time
point B
Time
point C
Time
point D
Source
LUN
Target LUN
a
a a
a
aa
Create HyperCopy.
Synchronize data on a source LUN to a target
LUN. In this case, the target LUN stores the data
on the source LUN at time point B.
Data on the source LUN is lost.
Reversely synchronize data on the target LUN
to the source LUN. In this case, the source
LUN is restored to the status at time point B.
Huawei Confidential21
Application Scenarios - Data Analysis and Reproduction
Reproducing n
pieces of data
Target
LUN (1)
Target LUN
(n-1)
Target LUN
(n)
Only for data
analysis
Source
LUN
Data analysis
host
Data analysis
The data analysis service uses data on a
target LUN to prevent the data analysis
service and production service from
contending for resources of a source LUN
and affecting performance.
Data reproduction
HyperClone can create multiple copies of the
same source LUN for multiple target LUNs.
Huawei Confidential22
Configuration Process
Check the license.
Create a clone pair.
Start
End
Create a clone
consistency group.
Create a protection
group.
Huawei Confidential23
Contents
1. HyperSnap
2. HyperClone
3. HyperReplication
4. HyperMetro
Huawei Confidential24
Overview
As a core technology for DR and backup, HyperReplication can realize the
remote data backup and disaster recovery.Function Purpose Benefit
Remote backup and
recovery
To recover service data using backup data in the
remote storage system after the service data is
invalid.
This function prevents damage caused
by data loss in the case that data at
the primary site becomes unavailable.
Continuous service
support
To quickly switch service data from the primary
site to the secondary site to protect service
continuity when a disaster occurs.
This function prevents damage caused
by a service interruption upon a failure
at the primary site.
DR To recover data at the primary site using backup data at the secondary site after a disaster.
This function prevents damage caused
by service data loss or a long recovery
duration after a disaster.
Huawei Confidential25
Introduction to DR and Backup
When the HyperReplication feature is used, two data centers work in active/standby mode. The primary site is in
the service running status, and the DR center is in the non-service running status.
For active/standby DR, when a device in data center A is faulty or even the entire data center A is faulty, services
are automatically switched to data center B.
For backup, data center B backs up only data in data center A and does not carry services when data center A is
faulty.
Data center A (primary site)
Data center B (secondary site)
Huawei Confidential26
HyperReplication Concepts
Question: What are HyperReplication pairs, consistency groups, synchronization,
splitting, primary/secondary switchover, data status, and writable secondary LUNs?
To implement remote backup and recovery of service data, HyperReplication involves
the following phases: creating a HyperReplication relationship, data synchronization,
service switchover, and data recovery. What do these phases mean?
Huawei Confidential27
Phases for Realizing Remote Backup and Recovery of
Service Data
1. Create a HyperReplication pair. 2. Synchronize data.
3. Switch over services. 4. Recover data.
HyperReplication
Link
Primary LUN Secondary LUN
WAN
Pair
HyperReplication
Link
Primary LUN Secondary LUN
WAN
Pair
HyperReplication
Link
Primary LUN Secondary LUN
WAN
Pair
Primary LUN Secondary LUN
WAN
Pair
HyperReplication
Link
Huawei Confidential28
Running Status of a Pair
By viewing the running status of a pair, you can perform synchronization, splitting, and primary/secondary
switchover operations on HyperReplication in time. After performing an operation, you can view the running
status of the pair to check whether the operation is successful.
Running
Status Description
Normal Indicates that data synchronization between the primary and secondary LUNs is complete.
Splitting
Indicates that data replication between the primary and secondary LUNs is suspended. For the need of services, a pair of primary
and secondary LUNs is manually split. As a result, the running status of the pair changes to the splitting status.
Interrupted Indicates that if the pair relationship between the primary and secondary LUNs is interrupted because the link used by HyperReplication is down or the primary or secondary LUN of HyperReplication is faulty. The pair running status is interrupted.
To be recovered
Indicates that if HyperReplication requires to be restored using a manual policy after the fault caused by a pair interruption is
rectified, the pair running status changes to the to-be-recovered status. This status indicates that users need to manually
synchronize data between the original primary LUN and the secondary LUN to restore the pair.
Invalid
Indicates that if the original attributes of a primary or secondary LUN change when a pair is interrupted (for example, when the
HyperReplication link is down, the pair is deleted on the primary or secondary end), the pair running status changes to the
invalid status because the primary and secondary system configurations become inconsistent.
Synchronizing
When the primary LUN is synchronizing data to the secondary LUN, the secondary LUN cannot be read or written. If a disaster
occurs, data on the secondary LUN cannot be used for service recovery. When the secondary LUN is in the complete status, data
on the secondary LUN can be used for service recovery.
Huawei Confidential29
Principles of Asynchronous Remote Replication
Based on the known
asynchronous remote
replication, try to draw a
schematic diagram of
synchronous remote
replication.
Primary
LUN
Secondary
Cache
RM
Primary
LUN
Snapshot of the
primary LUN
Snapshot of the
primary LUN
Host
Secondary
LUN
Snapshot of the
secondary LUN
Snapshot of the
secondary LUN
DCL
Primary Storage System
Secondary Storage System
DCL
1 2
1 2
3
4 4
5
5
7 7WAN
HyperReplication Link
6
Huawei Confidential30
HyperReplication Service Switchover
1. Normal production at the primary site
Primary
LUN
Production Host Standby Host
Secondary
LUN
Primary storage Secondary storage
WAN
Replication
Link
Services run by the
production host
√
Read-only
2. A disaster at the primary site
Primary
LUN
Production host Standby host
Secondary
LUN
Primary storage Secondary storage
WAN
Disconnected
Link
Read-only
3. Service taken over by the secondary sitePrimary
LUN
Production host Standby host
Secondary
LUN
Primary storage Secondary storage
WAN
Disconnected
Link
Read/Write
Services
taken
over by
the
standby
host
√
Huawei Confidential31
HyperReplication Data Recovery
2. Data recovery at the primary site
Production host Standby host
1. Disaster recovery at the primary site.
Secondary
LUN
Primary
LUN
Primary storage Secondary storage
WAN
Link
Recovery
Services
run by the
standby
host.
√
Secondary
LUN
Production host Standby host
Primary
LUN
Primary storage Secondary storage
WAN
New
Link
Data
recovered
3. Service recovery at the primary site
Primary
LUN
Production host Standby host
Secondary
LUN
Primary storag Secondary storage
WAN
Replication
Link
Unreadable
Unwritable
Services
run by
the
producti
on host
√
Huawei Confidential33
Functions of a Consistency Group
3. Ensure data validity for the consistency group.
1. Create a consistency group.
Primary LUN 01
Primary LUN 02
Primary LUN 03
Secondary LUN 01
Secondary LUN 02
Secondary LUN 03
HyperReplication
Task 01
CG 01
HyperReplication
Task 02
HyperReplication
Task 03
2. Stop replication tasks for the consistency group.
CG 01Primary LUN 01
Primary LUN 02
Primary LUN 03
Secondary LUN 01
Secondary LUN 02
Secondary LUN 03
HyperReplication
Task 01
HyperReplication
Task 02
HyperReplication
Task 03
CG 01
HyperReplication
Task 01
HyperReplication
Task 02
HyperReplication
Task 03
Primary LUN 01
Primary LUN 02
Primary LUN 03
Secondary LUN 01
Secondary LUN 02
Secondary LUN 03
Huawei Confidential34
Typical Application Scenarios
Analysis Item Central DR and Backup Geo-redundancy
Scenario feature
Backup data is managed centrally so that data
analysis and data mining can be performed
without affecting services.
When a disaster occurs at any service site, the
central DR and backup site can quickly take over
its services and recover data, achieving unified
service data management.
HyperReplication mode can be selected for a
service site flexibly based on the distance
between the service site and the central DR and
backup site.
Three data centers are deployed in two cities to perform
real-time backup and remote backup concurrently.
Service data is backed up to an intra-city DR center in
real time through a high-speed link.
After data in the primary site is invalid, services are
quickly switched to the intra-city DR center.
If a disaster damages the primary site and the DR center
in the same city, an inter-city DR center takes over
services and implements DR.
HyperReplication
mode Asynchronous remote replication
Intra-city: asynchronous remote replication
Inter-city: asynchronous remote replication
Maximum distance
for DR and backup Asynchronous remotereplication: no restriction Asynchronous remote replication: no restriction
Huawei Confidential35
Central DR and Backup Scenario
Central DR and backup refer to backing up service data from different places to the same site for centralized
management. Service data at multiple service sites is centrally backed up to and managed at the central DR
and backup site. When a disaster occurs, the central DR and backup site can take over services from the
service site and recover data.
Service site 02
Service site n
Asynchronous
Asynchronous Central DR and
backup site
Primary LUN 02
Primary LUN n
HyperReplication 02
HyperReplication n
Secondary
LUN 02
Secondary
LUN n
Host
WAN
WAN
......
......
......
Huawei Confidential36
Realizing DR Used with BCManager eReplication
BCManager eReplication is a DR management software specially designed for Huawei typical DR solutions. It
provides a visualized and process-based platform for simple and fast operations and monitoring based on
data consistency, HyperSnap, and HyperReplication technologies.
Production host
Storage system Storage system
Standby host
BCManager
eReplication
Host
BCManager
eReplication
Agent
BCManager
eReplication
Server
BCManager
eReplication
Agent
HyperReplication
Primary site DR center
Huawei Confidential37
Configuration Process
Start
Check the license.
Create a logical port.
End
Manage a route.
Create an authentication user.
Add a remote device.
Create a HyperReplication
pair.
Create a protection group.
Create a remote replication
consistency group.
Required
Optional
Huawei Confidential38
Contents
1. HyperSnap
2. HyperClone
3. HyperReplication
4. HyperMetro
Huawei Confidential39
Overview
HyperMetro is also called active-active feature. Two data centers are backups
for each other in the running status.
If a device is faulty in a data center or even the entire center is faulty, the other
data center will automatically take over services, solving the problems of
traditional DR centers in switchover. This ensures high data reliability and
service continuity, and improves the resource utilization of the storage system.
Huawei Confidential40
Working Principles of HyperMetro
WAN
Data center A
Production
storage
Real-time data synchronization
Quorum device
Data center B
Production
storage
SAN
IP network
Oracle RAC cluster/VMware
vSphere cluster/
FusionSphere cluster
......
FC/IP SANFC/IP SAN
IP network
How to perform
arbitration when
a fault occurs?
Huawei Confidential41
Quorum Mode
If the link between two data centers is down or one data center is faulty, data
cannot be synchronized between the two data centers in real time. In this case,
only a HyperMetro pair or a site of HyperMetro consistency group can continue
providing services. For data consistency, HyperMetro adopts an arbitration
mechanism to determine service priority in data centers.
HyperMetro provides two quorum modes:
Static priority mode: applied to scenarios where no quorum server is configured.
Quorum server mode (recommended): applied to scenarios where a quorum server
is configured.
Huawei Confidential42
Static Priority Mode
Fault Type Result
A link between storage
systems is down.
A HyperMetro pair is in the to-be-synchronized status.
LUNs in data center A continue providing services while LUNs in
data center B stop providing services.
Data center B is faulty.
A HyperMetro pair is in the to-be-synchronized status.
LUNs in data center A continue providing services while LUNs in
data center B stop providing services.
Data center A is faulty.
A HyperMetro pair is in the to-be-synchronized status.
LUNs in data center A cannot be accessed and LUNs in data center
B stop providing services.
A HyperMetro replication
link is down and a link
between a host and data
center B is down.
A HyperMetro pair is in the to-be-synchronized status.
LUNs in data center A continue providing services while LUNs in
data center B stop providing services.
Data center B is faulty
and the link between the
host and data center B is
down.
A HyperMetro pair is in the to-be-synchronized status.
LUNs in data center A continue providing services while LUNs in
data center B stop providing services.
Links between the host
and data centers A and B
are concurrently down.
A HyperMetro pair is in the normal status.
A host fails to access LUNs in both data center A and B.
Data center A Data center B
Host
HyperMetro
Huawei Confidential43
Quorum Server Mode
Fault Type Result
The quorum server is faulty.
A HyperMetro pair is in the normal status.
LUNs in data center A and data center B continue
providing services.
A link between a storage system
and the quorum (example of the
storage system in data center A)
is down.
A HyperMetro pair is in the normal status.
LUNs in data center A and data center B continue
providing services.
A storage system is faulty
(example of the storage system in
data center A).
A HyperMetro pair is in the to-be-synchronized status.
LUNs in data center A are invalid, but LUNs in data center
B continue providing services.
A link between storage systems is
down.
A HyperMetro pair is in the to-be-synchronized status.
LUNs in data center A continue providing services while
LUNs in data center B stop providing services.
A storage system and the quorum
server (example of the storage
system in data center A) are
concurrently faulty.
A HyperMetro pair is in the to-be-synchronized status.
Data center A is faulty and LUNs in data center B stop
services.
Data center A Data center B
Host
HyperMetro
Quorum server
Huawei Confidential45
Dual-Write Principle
Array A Array B
Host
Cross-site active-active cluster
HyperMetro LUN HyperMetro LUN
1
3 3
4
4
5
HyperMetro LUN2
Write I/O
Huawei Confidential46
Strong Data Consistency
HyperMetro LUN HyperMetro LUN
Mutual exclusion of HyperMetro LUNs' distributed locks
Cross-site active-active cluster
Host Host
Array A Array B
Application cluster
Data center A Data center B
Huawei Confidential47
Solution Extensibility Design
Synchronous/
asynchronous
replication
Site A Site B
HyperMetro
Site A Site B
Data
center A
Data
center B
Data center C
Upgraded
architecture and
uninterrupted
services
Disaster recovery solution HyperMetro data center solution
Geo-redundant solution
Huawei Confidential48
Typical Application Scenarios
Industry Feature
Healthcare
With the development of hospital services, the growing numbers of beds and new outpatient buildings pose
higher requirements on service continuity.
Once critical departments such as out-patient, in-patient, and electronic medical record (EMR) are interrupted,
medical treatment will be delayed and hospitals will suffer from great economic loss and inestimable damage to
their reputation. In addition, an out-patient building is close to an in-patient network information center in the
same hospital, and two hospitals in the same city are physically close to each other. HyperMetro can meet their
requirements.
Finance
In the finance industry, banking services, 24-hour ATM services, POS services, and e-bank services are developing
quickly as bank services develop. These services require that banking systems process around-the-clock services.
For reliability and stability, banks require a solution to store for reused and meet their service construction
requirements (RPO = 0, RTO = 0) to ensure business continuity. Service interruptions damage banks' reputation
and pose huge pressure on technical departments.
Social
security
In the social security industry, service continuity requirements are high. Monthly settlement and year-end carry-
over require 24/7 online operation. Otherwise, people's livelihood problems may occur. For example, pension
cannot be paid in time, and medical insurance cannot be settled in time.
HyperMetro is applicable to social insurance application scenarios includingthe basic information management,
social insurance card service, labor relationship, public services, public resource management, employment, and
social insurance management.
Huawei Confidential49
Configuration Process
Start
Prepare the configuration.
Configure the switches.
End
Configure quorum server
software.
Configure HyperMetro.
Configure a multipathing
policy for hosts.
Required
Optional
Check the license.
Add a remote device.
Create a quorum server.
Create a HyperMetro
domain.
Create a HyperMetro pair.
Create a HyperMetro
consistency group.
Huawei Confidential50
Summary
Storage Data Protection
Technologies and
Applications
HyperSnap
HyperClone
HyperReplication
HyperMetro
Definitions, principles,
and configuration
processes
Huawei Confidential51
Quiz
1. (True or false) A source LUN can form multiple HyperClone pairs with different target
LUNs. A target LUN can be added to only one HyperClone pair.
2. Which of the following statements are correct? ( )
A. Synchronous replication synchronizes data in real time to maximize data consistency and minimize
data loss in the event of a disaster.
B. Asynchronous replication performs periodic data synchronization, minimizing service performance
deterioration caused by data transmission latency.
C. HyperReplication does not require a license.
D. Synchronous replication uses snapshots for replication.
Huawei Confidential52
Quiz
1. Which of the following statements about consistency groups are correct? ( )
A. If multiple LUNs at the primary end have write dependency relationships, replication
consistency groups must be configured to ensure that the secondary LUNs also have
write dependency relationships.
B. A consistency group is only used to manage the replication relationship between
multiple LUNs.
C. If one member in a consistency group is faulty, all members in the consistency group
are unavailable.
Huawei Confidential53
More Information
Huawei
enterprise
business app
Enterprise
technical
support app
Huawei Confidential54
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Backup Solution Introduction
Huawei Confidential2
Foreword
This course introduces storage backup solutions for data centers, including:
Overview
Architecture
Network
Common technologies
Typical applications
Huawei Confidential3
Objectives
After completing this course, you will be able to understand and master:
Technologies of storage backup solutions for data centers
Technical differences between backup and disaster recovery solutions
Deployment of a backup solution
Huawei Confidential4
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
Huawei Confidential5
Why Is Backup Important?
Software
and
hardware
failures
Natural
disasters
Viruses
and
hacker
attacks
Human
errors
Risks of data lossLegal requirements on data protection
Higher efficiency Lower costs Better data
utilization
More than 30% of users use backup copies for development and testing,
and more than 20% of users adopt cloud-based disaster recovery.
Gartner:
Huawei Confidential6
What Is Backup?
In information technology and data management, a backup refers to a copy of data in
a file system or database for swiftly and promptly recovering the valid data and normal
operation of the system when a disaster or misoperation occurs.
Media server
LAN
Backup storage device
Management
server
Application server
Purpose: Recovers data when an accident occurs.
Nature: Stores a copy of data elsewhere.
Huawei Confidential7
Why Is Backup Irreplaceable?
HA ≠ Backup
Availability
High system
availability
Physical fault
tolerance
Security
Accidental
deletion
Logical
damage
System script
≠ Backup
× Heterogeneous networks
× Fault tolerance
× Openness
× Complex backup policies
× Large databases
× Special devices, such as
tape libraries
X ≠ Backup
A cluster ≠ Backup
A RAID array ≠ Backup
A dual-controller disk array ≠
Backup
System script ≠ Backup
×
: Supported
×: Not supported
Huawei Confidential8
Backup and DR
Backup vs. DR
Backup:
Recovers missing data.
Recovers damaged data.
Recovers historical data.
X Directly takes over services.
DR:
Recovers data from a recent
point in time.
Directly takes over services.
X Recovers missing data.
X Recovers damaged data.
Backup focuses on data recoverability, while DR is focused on application continuity.
Backup is the basis of DR.
: Supported
×: Not supported
Huawei Confidential9
Backup vs. Archive
Backup:
Recovers data and system.
Meets the SLA (RPO and RTO).
Retains source data at the
original location.
Provides data retention control.
Archive:
Retains data for a long term.
Meets legal requirements and
efficiency requirements.
Only retains data copies and
deletes source data.
Provides object retention control.
Backup is for data recovery and archiving is for legal compliance.
Backup and Archive
: Supported
×: Not supported
Huawei Confidential10
Considerations
Effective data recovery must be guaranteed.
3. Fast recovery
1. Reliable recovery
4. Minimal system impact
5. Recovery from a specified point in time
2. Availability of recovered data
Objective: data recovery
Backup data identification
Backup success rate
Backup granularity
Data retention period
Compatibility for applications
Requirements
Off-site protection
Multiple data copies
Backup mode
Huawei Confidential11
Challenges to Data Backup
Security threats
C
ha
lle
ng
es
Numerous data copies
A complex application
Huawei Confidential12
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
Huawei Confidential13
Components
Production
storage
Backup media
Media
server
Production center
SAN
Backup center
...
LAN
A client agent of backup software
must be installed on service hosts
that need to be backed up.
Backup data flows from the backup client to
the backup server over the backup network.
TCP or IP network or Fibre Channel network
Devices that store backup data.
Tape library, VTL, disk array, CD-ROM
tower, and cloud storage
Consists of backup management software
and backup management servers.
Automatically initiates and performs a
backup task, and reads and writes data
from the backup client to the backup media.
Backup
management
server
Application
server Database server File server
Application server
Backup client Backup network Backup media
Backup management system
Huawei Confidential14
Three Key Elements
Recovery Time Objective (RTO)
Tolerable downtime
Recover
applications.
A recovery task ends.A backup
task ends.
RPO
A fault or
disaster occurs.
00:00 06:00 12:00
A backuptask
starts.
Recovery Point Objective (RPO)
Tolerable amount of lost data
Backup Window (BW)
Backup period for the backup system within a working period
RTOBW
Data can be
recovered from
any point in time
during this period.
A recovery task starts.
Huawei Confidential15
Backup Solutions
Backup node
Backup storage
resource pool
Remote backup center
Huawei OceanStor
backup storage
resource pool
Physical and
virtual tape library
Backup node
Enterprise branch and SMB local backup
Replication with
deduplication
Centralized backup
All-in-one backup
Centralized backup for data centers
All-in-one backup node
HUAWEI CLOUD
Hybrid cloud backup
Huawei Confidential16
All-In-One Backup Solution
Item Description
Application Local backup for small data centers
Benefits
Integrated backup server and backup storage,
greatly reducing device acquisition and maintenance
costs
Broad compatibility for various operating systems,
databases, and virtualization environments
Comprehensive protection for virtual, physical, and
cloud environments. P2P, P2V, V2V, and V2P
migration scenarios
Deduplication and compression
Web UI for easy management, operation, and
maintenance
Production
storage
Production
server
Data Protection
ApplianceFibre
Channel or IP
...
Backup agent
AA
A
Huawei Confidential17
Centralized Backup Solution
Backup agentA
Production
storage
Center
Backup
storage
Backup
management
node
Production server
Fibre Channel
or IP
...
Backup service
node
A A A A
IP network
Branch
...
Fibre Channel
or IP
Production
server
All-in-one
backup
node
Production storage
Branch
...
Backup
service
node
Production
storage
Backup storage
Fibre Channel
or IP
Production
server
(Backup software) (Backup software)
A A A A
(Backup software)
A
Huawei Confidential18
Cloud Backup Solution
Cloud platform
FusionSphere OpenStack
Backup service management
platform
ManageOne SC
Production storage
Data protection service
platform
DJ-DPS
Backup storage
BC&DR management
software
Data flow
Management flow
DC 1
Cloud DC 2
HUAWEI CLOUD
Huawei's unique two-level cloud backup solution can store backup
data in the local data center, in the backup resource pool of the
cloud data center, or in the S3 space of the public cloud.
Huawei VBS can back up data to the backup resource pool of the
remote cloud data center and or in the S3 space of the public cloud,
which can be used to build the two-level e-Government cloud.
Highlights
Huawei Confidential19
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
Huawei Confidential20
LAN-Base
File service Application service
LAN
Data flow Data flow
Backup storage device
AgentAgent
Data flow
Command flow
Huawei Confidential21
LAN-Free
Application server
LAN
SAN
Application server Backup server
Media server
Storage deviceStorage device
Backup storage device
Data flow
Command flow
Huawei Confidential22
Server-Free
Application server
LAN
SAN
Application server Backup server
Media server
Storage deviceStorage device
Backup storage device
Data flow
Command flow
Huawei Confidential23
Server-Less (NDMP)
Data flow
Command flow
Application server
LAN
Application server Backup server
Media server
Storage device
Tapes
Huawei Confidential24
Architecture Comparison
Architecture Strength Weakness
LAN-Base
The backup system and the application
system are separated, conserving
hardware resources of application
servers during backup.
Additional backup servers increase hardware costs.
Backup agents adversely affect the performance of application servers.
Backup data is transmitted over the LAN, which adversely affects network
performance.
Backup services must be separately maintained, complicating management and
maintenance operations.
Users must be quite competent in processing services.
LAN-Free
Backup data is transmitted using no
LAN resources, significantly improving
backup performance while maintaining
high network performance.
Backup agents adversely affect the performance of application servers.
The costs are high.
Devices must meet certain requirements.
Server-Free
Backup data is transmitted using no
LAN resources, and network
performance remains unaffected.
Host services remain nearly unaffected.
Backup performance is excellent.
The costs are high.
Devices must meet strict requirements.
NDMP
Backup and recovery duration is
shortened. The throughput depends on
the speed of storage devices rather than
the processing capability of the server.
Therefore, the system performance is
greatly improved.
Workloads on the server are greatly relieved, but the backup software and its host
server are still required for backup process control. Metadata must be recorded in the
database of the backup software, which still consumes CPU resources.
Huawei Confidential25
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
Huawei Confidential26
Common Backup Types
Full backup
Sun.
Mon.
Tue.
Wed.
Thu.
Fri.
Sat.
Sun.
Full backup is performed once
a week.
In the rest of the week, the
difference with the last full
backup is backed up every day.
Sun.
Mon.
Tue.
Wed.
Thu.
Fri.
Sat.
Sun.
All data is fully backed up.
Easy management
Differential incremental backupCumulative incremental backup
Full backup is performed once
a week.
In the rest of the week, the
difference with the last backup
is backed up every day.
Sun.
Mon.
Tue.
Wed.
Thu.
Fri.
Sat.
Sun.
* The definitions of incremental backup may vary with the backup software.
Huawei Confidential27
Backup Policies
Files, operating systems, databases,
software, logs...Data to be backed up
Disk, tape, cloud storage...Backup media
Full backup, incremental backup, and
differential backupBackup type
Source-side deduplication and target-side
deduplicationDeduplication policy
One month or one yearData retention period
Daily or weeklyBackup frequency
One week or one monthBackup window
Huawei Confidential28
Deduplication
1. Reads fingerprint data.
2. Transfers data with deduplication (data blocks with deduplication).
Production server
3. Maps data blocks to the fingerprint library.
Memory-level File-level Global Task-level
Storage unit Processing unit
Fingerprint pool
Centralized backup solution
Global deduplication: A fingerprint library is shared globally.
Highlights: high deduplication ratio for optimal resource utilization
Task-level deduplication: Backup tasks for different types of
applications use independent fingerprint databases.
Highlights: high fingerprint query efficiency and low memory usage
Memory-level deduplication: Fingerprint query and calculation are
performed in the memory.
Highlights: conserved disk I/O resources for higher query efficiency
File-level deduplication: One fingerprint is created for each file,
eliminating the need for data slicing.
Highlights: higher deduplication ratio
Fingerprint: It is a unique value calculated based on a data block by hashing.
Huawei Confidential29
1. Calculates the
fingerprints of data blocks.
2. Queries fingerprints in
the fingerprint library.
3. Returns the query result.
3. Transfers data blocks
without deduplication.
Deduplication
fingerprint library
Data
Protection
Appliance
Backup storage pool
Source-Side Deduplication
Huawei Data Protection Appliance supports deduplication. That is, data is deduplicated
before being transferred to the storage media, greatly improving backup performance.
Huawei Confidential30
Parallel Deduplication
Parallel deduplication:
Deduplication fingerprint libraries are
created on multiple nodes and
fingerprints are distributed on these
nodes, effectively addressing poor
performance of a single node and
saving storage space.
Huawei Confidential31
Snapshot Backup
Recovers copies.
Production LUN/volumeAgent (media agent)
Mount/Index
Snapshot is performed every
two hours.
Storage array
Retains copies.
Disk Tape
Huawei Confidential32
Standard Backup
Permanent
incremental
backup
Parallel
deduplication
Source-side
deduplication
Compression
Encryption
Multi-channel
backup
Agent-free
backup
Concurrent
backup
Huawei Data
Protection Appliance
Disk
Tape
Cloud
Blu-ray optical disc
Object storage
Operating systems
Windows, Red Hat, and SUSE
Virtualization platforms
VMware, H3C CAS, XenServer,
Hyper-V,
FusionCompute, and Huawei
HCS
File systems
Windows, Linux, and UNIX
NeoKylin, Kylin, and Huawei Euler
Databases
Oracle: RMAN (Recovery
Manager)
SQL Server: Virtual Device
Interface (VDI)
DB2: Vendor
MySQL: MySQL Plugin
GBase: GBase API
Informix, Dameng,
Kingbase, and Shentong:
export and import
Volumes
Windows and Linux
Production data capture Copy management D2D2R or D2C
Huawei Confidential33
Continuous Backup
Continuous backup:
Data on production hosts is
continuously backed up to the
backup media.
With block-level continuous data
protection, data can be stored in
native format and host-level backup
and volume-level backup are
supported.
Huawei Confidential35
Advanced Backup
Copy management
The system periodically creates a snapshot
copy of any point in time for the base
volume and deletes a snapshot when a copy
expires.
Copy access and useProduction data capture
Users can obtain application-
consistent production data copies
in native format.
Permanent
incremental
backup
...
Copy 1
Copy 2
Copy 3
Copy n
Base volume
Clone volume
Snapshot
Data mount
and recovery
in minutes
Fast recovery
Development and
testing
Application data
extraction
Oracle
SQL Server
Oracle RAC
VMware
Windows NTFS file system
Snapshot
copy 1
Snapshot
copy 1
Snapshot
copy 1
Snapshot
copy 1
Snapshot
copy 1
Recovery
Recovery to the
same host
Recovery to
another host
Users can access and use
virtual copies on demand or
instantly and benefit from
diverse data services.
Huawei Confidential36
Contents
1. Overview
2. Architecture
3. Network
4. Common Technologies
5. Applications
Huawei Confidential37
Database
* The preceding figure uses the Oracle database as an example.
Databases, such as GaussDB, Oracle, SQL Server, MySQL, DB2, and GBase, are supported.
Huawei Confidential38
Virtualization Platform
Virtualization platforms, such as VMware, FusionCompute, HCS, CAS, OpenStack, XenServer and Hyper-V, are
supported.
Huawei Confidential39
File System
Huawei Confidential40
Operating System
Windows
Linux
One of the defining features of Linux operating systems is that
everything is a file. Therefore, for backup of a Linux operating
system, we just need to back up the files in the operating system
and then modify configuration file and boot upon recovery.
Huawei Confidential41
Quiz
1. (Multiple) Which are not common backup types?
A. Full backup
B. Incremental backup
C. Extension backup
D. Elastic backup
2. (Single) Which is not a common backup topology?
A. LAN-Base
B. LAN-Free
C. Server-Free
D. Server-Base
Huawei Confidential42
Section Summary
Backup solution
Overview
Architecture
Network
Common
technologies
Applications
Huawei Confidential43
More Information
Huawei
Enterprise
Service App
Enterprise
Technical
Support App
Huawei Confidential44
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
DR Solution Introduction
Huawei Confidential2
Foreword
This part includes:
Definition of the DR system and importance of the DR system to enterprise
service continuity
Common solutions of the DR system
Technology used by the DR system
Success stories of the DR solution
Huawei Confidential3
Objectives
On completion of this course, you will be able to:
Describe the concept and importance of the DR system.
Know advantages and disadvantages of common DR solutions.
Master the technical principles of the DR solution.
Learn how to deploy a DR system based on typical application cases of the DR
solution.
Huawei Confidential4
Contents
1. DR Solution Overview
2. DR Solution Architecture
3. Common DR Technologies
4. DR Application Cases
Huawei Confidential5
DR Requirements
Three risks: data loss, data damage, and service interruption. The loss caused by service
interruption per hour is millions of dollars.
Regulatory compliance: financial compliance, security isolation, geo-redundant solution, and high
service continuity
IT O&M: System disaster recovery simplifies IT O&M work and avoids the impact of major events.
Enterprise: Avoid major
losses and reduce
enterprise risks.
IT: Simplify O&M and
avoid the impact of
emergencies.
Enterprise: Comply with
policies and regulations,
and meet industry
regulatory requirements.
Huawei Confidential6
DR Challenges
Cumbersome
management
Multiple devices are not
centrally managed.
Independent storage media,
servers, and network
management pages, complex
workflows, and low efficiency
Complicated capacity
expansion
The capacity is insufficient and
needs to be expanded. The
rollout period is long.
Costly investment
High capital expenditure
(CAPEX)
High purchase costs of
infrastructure such as servers,
storage devices, and software
High basic construction costs
on facilities such as equipment
rooms.
High OPEX
Professional O&M support
(implementation, training, and
onsite support)
Long-term costs on resources
such as water and electricity.
Limited DR capability
Poor security and DR
capabilities
Data cannot be backed up out
of the data center, and
infrastructure faults may cause
extreme situations.
Poor agility
Capabilities such as disaster
recovery and data sharing are
restricted by physical locations
of data. Applications and data
cannot be separated. Agile
applications and better DR
features cannot be built.
Huawei Confidential7
HA
High availability (HA) ensures that applications can still be accessed when a single component of the local system is faulty,
no matter whether the fault is a service software fault, physical facility fault, or IT software/hardware fault.
The best HA is that users using the data center service are completely unaware of a machine that breaks down in the data
center. However, if a server in a data center breaks down, it takes some time for services running on the server to fail over. As
a result, customers will be aware of the failure.
The key indicator of HA is availability. Its calculation formula is [1 – (Downtime)/(Downtime + Runtime)]. The following nines
are used to represent availability:
4 nines: 99.99% = 0.01% x 365 x 24 x 60 = 52.56 minutes/year
5 nines: 99.999% = 0.001% x 365 = 5.265minutes/year
6 nines: 99.9999% = 0.0001% x 365 = 31 seconds/year
For HA, shared storage is usually used. In this case, RPO = 0. In addition, the active/active cluster HA mode is used to ensure
that RTO is almost 0. If the active/passive HA mode is used, RTO needs to be reduced to the minimum.
Huawei Confidential8
Disaster Recovery
A disaster is an unexpected event (caused by human errors or natural factors) that results in
severe faults or breakdown of the system in one data center. In this case, services may be
interrupted or become unacceptable. If the system unavailability reaches a certain level at a
specific time, the system must be switched to the standby site.
Disaster recovery (DR) refers to the capability of recovering data, applications, and services in
data centers at different locations when the production center is damaged by a disaster.
In the DR mode, a redundant site is established in addition to the production site. If the
production site is damaged due to a disaster, the redundant site can take over services from the
production site to ensure service continuity. To achieve higher availability, customers even
establish multiple redundant sites.
Huawei Confidential9
Dimension HA DR
Scenario
HA refers to a local HA system. When one or more
applications are running on multiple servers, ensure that
the running applications are not interrupted when any
server is faulty. The applications and system can be
quickly switched to other servers.
DR refers to a remote (intra-city or remote) HA system. It is
used to recover data, applications, and services when a disaster
occurs.
Storage
Generally, HA uses shared storage. Therefore, data will
not be lost (RPO = 0) and the switchover duration, that
is, RTO, is considered.
Data replication is used for remote disaster recovery data.
Based on different data replication technologies (synchronous
and asynchronous), data loss often causes RPO to be greater
than 0. However, remote application switchover usually takes a
longer time. In this case, RTO is greater than 0.
Fault Load switchover between servers in the cluster caused by a single faulty component.
Service switchover between data centers caused by large-scale
faults.
Network HA is used in LAN. DR is used in WAN.
Cloud HA is a mechanism that ensures service continuity in a cloud environment.
DR is a mechanism that ensures service continuity among
multiple cloud environments.
Objective HA is used to ensure high availability of services. DR ensures data reliability and service availability.
Relationship Between HA and DR
They are interrelated and complementary to each other. They overlap with each other
and have significant differences.
Huawei Confidential10
Differences Between DR and Backup
Backup: Backup is a process of copying all or part of data
sets from an application host's disks or a storage array to
other storage media in a data center. Backup is a method
of DR.
DR: A DR system consists of two or more sets of IT systems
that are geographically far from each other. These IT
systems provide the same functions, and monitor the
health status of each other. In the event of an accident
(such as a fire or an earthquake), applications on a broken-
down system can be switched to other systems to ensure
business continuity.
Generally, DR indicates the backup of data or application systems across equipment rooms, whereas backup refers to local data or system backup.
A DR and backup solution combines local backup and remote data replication to provide comprehensive data protection.
SAN
VTL/NAS
Production Center
DC1
MA
iDA
MA
iDA MA
CS
Backup &
Archive
Server PTL
Backup Center
OSAPPOSAPPOSAPP OS
APP
OSAPPOSAPPHA
Cluster
Mirror
DC1 DC2
Huawei Confidential11
Main Indicators for Measuring a DR System
Recovery Point Objective (RPO) indicates the maximum amount of data that can be lost when a disaster occurs.
Recovery Time Object (RTO) indicates the time for system recovery.
The smaller the RPO and RTO, the higher the system availability, and the larger the investment required by users.
RPO00:00 06:00 12:00
Application
recovery
Recovery
started
Data
recovery
completed
Backup
completed
A fault or
disaster
occurs.
Backup
started
RTO
Backup
window
Point in
time to
which data
is recovered
Time
required
for data
recovery
Huawei Confidential12
Level Definition RTO TCO
Data level
Builds a remote DR center to back up data remotely, which prevents data loss
or corruption in the event of a disaster.
The remote DR center is considered as a remote data backup center. Data-
level DR cannot prevent service interruption if a disaster occurs.
The recovery time of data-level disaster recovery is long, but the cost is low
and facilities are easy to construct.
The data source is essential to all key service systems. Therefore, data-level
DR is indispensable.
The RTO is the longest
(several days) because
device re-deployment
is needed to restore
services.
Lowest
Application level
Builds a backup site that carries the same application system as the
production site, and uses synchronous or asynchronous replication to
synchronize data between the sites. This allows critical applications to recover
within the specified time and minimizes the loss. Data recovery is transparent
to users, ensuring integral, reliable, and secure businesses.
Medium RTO (several
hours)
Medium. The same
system or a smaller
system can be
established at the
backup site.
Service level
Requires all of the necessary IT technologies and infrastructures to achieve
full-service DR. Most of the contents are from non-IT systems (such as
telephones and offices). If a disaster damages the original office, a backup
office is also needed in addition to data and application recovery.
Shortest RTO (several
minutes or seconds)
Highest
Levels of DR Systems
Huawei Confidential13
15Min 1~4Hr 4~8Hr 8~12Hr 12~16hr 24Hr Days Weeks RTO
Expenses
Tier 7: Near-zero or zero data loss, remote data mirroring, and automatic service switchover
Tier 6: Near-zero or zero data loss. Remote data mirroring ensures data integrity
and consistency.
Tier 5: transaction integrity
Tier 4: Batch/online database image or log transmission
Tier 3: electronic vaulting
Tier 2: PTAM + Hot standby site
Tier 1 – PTAM
Time-based backup
Available backup center
Remote DR center
According to SHARE 78, a disaster recovery system can be categorized into 7 tiers:
Global Standards for a Disaster Recovery System
Huawei Confidential14
Huawei Business Continuity and Disaster Recovery
(BC&DR) Solution
Traditional data center Public cloud
FusionCloud
Local production
center
Intra-city DR
center
Remote DR
center
Local HA solution
HyperMetro DC solution
Active-passive DR solution
≤100 km
≥ 100 km
Geo-redundant DR
solution
Active-passive DR
solution
Centralized backup solution and
integrated backup solution
Private cloud
Cloud server high
availability
Cloud server
disaster recovery
Volume high
availability
Cloud server
backup service
Volume backup
service
Cloud server backup service
Volume backup service
Volume high availability Converged data management
Huawei Confidential15
Contents
1. DR Solution Overview
2. DR Solution Architecture
3. Common DR Technologies
4. DR Application Cases
Huawei Confidential16
Disaster Recovery and Backup Solution
Government Energy Education ......
Backup
Transportation Healthcare
VM backup
Finance
Data-level DR
Application-level DR
Active-active
cloud DR
Active-passive
cloud DR
Cloud computing mode Physical server mode
DR
selection
Drill
switchover
Evaluation
optimization
Service
delivery
Link
design
Consulting
Cooperation
delivery
Levels 1
to 2
Level 3
Level 4
to 5
Level 6
Levels 1
to 2
Level 3
Level 4
to 5
Levels 6
to 7
China
standard
International
standard
CDP DR
Application-levelDR
Same-city application-level DR
WAN application-level DR
Data-level DR
Database DR
Array replication–
based DR
Virtual storage DR
Backup
Integrated backup
Backup software
backup
Huawei Confidential17
DR Mode Reliability Solution Disaster Recovery Data Backup Requirement
Active-active Cluster + Load balancing Automatic Real-time synchronous replication (< 100 km)
Hot backup Cluster Automatic Real-time synchronous replication (< 100 km)
Warm backup Manual intervention Manual Asynchronous replication (> 100 km)
Cold backup Strong manual intervention Manual Same as above
Hot
backup
Warm
backup
Cold
backup
Active-
active
A
va
ila
bi
lit
y
resource utilization
High
Low
HighLow 1
2
4
3
Synchronous disaster recovery:
distance limit exists.
RPO: 0s. The two images are the same.
1
3
2
4
Asynchronous disaster recovery:
no distance limit
RPO: from 30 minutes to several hours,
with data synchronized regularly
DR Design Mode: Combination of Synchronous and
Asynchronous Modes
Huawei Confidential18
Active-Passive DR Solution
Synchronous
/Asynchronous
replication
SAN
V
M
V
M
Database
Virtualization/
Middleware/
Applications
WAN
SAN
DR
management
V
M
V
M
V
M
V
M
V
M
V
M
Production
Center
DR
Center
Huawei Confidential19
Active-Active DR Solution
HyperMetro
Data
synchronization
mirroring
SAN SAN
V
M
V
M
V
M
V
M
V
M
V
M
V
M
V
M
Oracle, DB2, or
SQL Server
cluster
FusionSphere
/VMware
/WebLogic
/WAS cluster
WAN
GSLB/SLB
cluster
(F5/L2800)
Production
Center 1
Production
Center 2
Huawei Confidential20
Geo-Redundant DR Solution
SAN
Production center
HyperMetro or
synchronous/
asynchronous
replication
SAN
Same-city DR center
Asynchronous
replication
A
A
SAN
Production center
Synchronous/
asynchronous
replication
(HyperMetro)
SAN
Same-city DR center
Asynchronous
replication
A
Cascading architecture
Parallel architecture
SAN
Remote DR center
A A
SAN
Remote DR center
A
A A
Huawei Confidential21
New DR Mode Evolution in Cloud Computing
Mainly service data replication
The recovery process is complex and the recovery period is long.
Cloud management platform
Storage
OS
App
OS
App
OS
App
OS
App
Component redundancy and
high device reliability
Dual-host hot backup
High reliability in traditional data centers
High reliability in cloud computing data centers
Automatic migration of VMs (including services)
Traditional cross-DC DR
VM: DB
OS+DB
VM: APP
OS+J2EE
VM: WEB
OS+Apache
VM: DB
OS+DB
VM: APP
OS+J2EE
VM: WEB
OS+Apache
VM
migration
All service data and running environment data are replicated and
managed in an integrated manner.
The recovery process is simple and the recovery period is short.
Cloud computing cross-DC DR
Huawei Confidential22
Implementation of Cloud Active/Passive Data-Level DR
OS
APP
OS
APP
OS
APP
Production storage pool
VM data
replication
Production center
(active)
DR center (passive)
IP network
FC network
Management
data
replication
IP SAN IP SAN
DR storage pool
ESC/CRM/
OMM ESC/CRM/OMM
OS
APP
OS
APP
OS
APP
OS
APP
OS
APP
OS
APP OS
APP
OS
APP
OS
APP
Protected LUN
Unprotected LUNProtected LUN copy
Huawei Confidential23
Contents
1. DR Solution Overview
2. DR Solution Architecture
3. Common DR Technologies
4. DR Application Cases
Huawei Confidential24
IP
NAS
SAN
Disk array
OS
Applications
Database management system
File system
Raw devices/volumes
Device I/O driver
IP
NAS
SAN
Disk array
OS
Applications
Database management system
File system
Raw devices/volumes
Device I/O driver
Host layer
• Application replication
• Database replication
• Logical volume replication
SAN-based network layer
Array layer
Major Disaster Recovery Technologies
Huawei Confidential25
Transmission Relay
Host Host
FC Switch FC Switch
Storage Device
Main Datacenter
Host Host
FC Switch FC Switch
Storage Device
Backup Datacenter
Remote Synchronization of
data transaction
100 BaseT 100 BaseT
Host Layer DR Technology - Application Level
The application-level DR technology uses application software to implement remote data replication and
synchronization. When the production center fails, the application software system in the DR center recovers
and takes over services from the production center.
E1, ATM…
Huawei Confidential26
Host Layer DR Technology - Database Level
The database-level DR technology is designed for specific databases. Generally, typical databases
have the database-level DR function, for example, Oracle Data Guard and DB2 HADR. Database-
level DR is implemented by transmitting database logs and replaying them at the DR site. The
database-level DR technology supports smooth switchover.
DB2 Engine
(Primary Server)
DB2 Engine
(Primary Server)
Backup
DB
Backup
DB
Log
Files
Log
Files
Primary Standby
Automatic
Client Reroute
TCP/IP
Log
Capture
Log
Capture
Huawei Confidential27
Host Layer DR Technology - Logical Volume Level
Remote data replication based on logical disk volumes refers to remote synchronous (or
asynchronous) replication of one or more volumes as required. This solution is usually
implemented by using software.
Storage
Device
Servers
FC Switch
Storage
Device
Servers
FC Switch
Fiber Connection/DWDM
WAN
Volume Replication System/Software
Huawei Confidential28
Network-layer DR Technology
A smart switch is added to the storage area network (SAN) between the front-
end application servers and back-end storage systems.
Log
Replication
VolumeLOG
Production
Volume
New Data Write ①
Write into Log Volume②
③Write completed
④Write into Production Volume
④Write Request to DR Center
⑤Confirmation Signal from DR
⑥Write into Replication
Volume
⑦Write Completion Signal from DR
Production Center DR Center
Huawei Confidential29
Array-layer DR Technology
Array-level DR is implemented using the inter-array replication technology. The
replication of the array does not pass through the host. Therefore, the impact on the
host performance is small.
Application
Hosts
Application
LAN
FC/IP
Switch
FC/IP
SAN
Local Storage
System
Remote Storage
System
FC/IP
Switch
Huawei Confidential30
Data
replication
network
Huawei OceanStor
Hybrid Flash Storage
DR
management
network
Application
server
Production
center
DR center
Huawei OceanStor
Hybrid Flash Storage
WAN
Synchronous
replication
DR management
server
(Optional)
DR servers
Service plane
FC switch FC switch
IP management network
IP service network
FC network
Data flow
DWDM DWDM
Server
Agent
DR
management
network
SAN Synchronous Replication
Huawei Confidential31
SAN Synchronous Replication Principles
Data Change Log (DCL)
Cache
LUN A
Primary Site
Cache
LUN B
Secondary Site
Synchronou
s
Host
Synchronous
Replication
Cache
Primary
LUN
Production Storage
Cache
Secondar
y LUN
DR Storage
②
②
③
③
④
①
DB Server
Huawei Confidential32
Huawei OceanStor
Hybrid Flash Storage
DR management
network
Application
server
Production
center
DR center
Huawei OceanStor
Hybrid Flash Storage
WAN
DR management
server
(Optional) DR
servers
Service plane
FC switch
FC switch
IP management network
IP service network
FC network
Data flow
Server
Agent
DR management
network
WAN
SAN Asynchronous Replication DR
Huawei Confidential33
SAN Asynchronous Replication Principles
LUN A
Primary Site Secondary Site
Asynchronous Replication
Cache
N+1
N
LUN B
Cache
x+1
x
DB Server
12
3
1
4
5 5
Production
Server
Backup
Production
Server
Secondary Site
Primary
LUN
Secondary
LUN
Secondary
LUN
SwitchSwitch
Primary Site
Primary
LUN
Huawei Confidential35
NAS Asynchronous Replication DR
Production
center
DR center
WAN
DR
management
server
Server
Agent
WAN
Huawei OceanStor Hybrid
Flash Storage
DRM network
Application
servers
Huawei OceanStor
Hybrid Flash Storage
(Optional)
DR servers
Servicenetwork
FC
switches
FC
switches
DRM network
DRM: Disaster recovery
management
Asynchronous
replication
IP management
network
IP service
network
FC network
Data flow
Huawei Confidential36
NAS Asynchronous Replication Principles
Host
Production Storage
②
①
Primary FS
Primary FS
Snapshot
DR Storage
Secondary FS
Secondary
FS Snapshot
③
④
⑤
Replicate
Incremental
Data
Huawei Confidential37
Multi-Point-in-Time Asynchronous Remote Replication
Technology – Second-Level RPO
Active LUN
3
4
Production
center
2
5
1
Standby LUN
Time
segment T2
Time
segment T1
Cache
DR center
5
1
Time
segment T2
Time
segment T1
Cache
Asynchronous remote
replication
DB Server
Huawei Confidential38
Remote Replication - Application Consistency
Consistency Agent Application engineHost
Storage array
Snapshot
Replication
Mirroring
Host channelCompleted
Memory 1
7
2
8
3
9
4
A
5
B
6
C
Host status
recovered.
Writes the data in the
memory to the disk.
Triggered
periodically
Requests
archiving
Huawei Confidential39
Remote Replication - Consistency Group
A consistency group ensures time consistency of mirrored data among multiple LUNs.
All pairs in a consistency group are simultaneously synchronized, split, interrupted, or
switched over.
Active LUN 1
Active LUN 2
Active LUN 8
Standby LUN 1
Standby LUN 2
Standby LUN 8
Huawei Confidential40
Comparison of DR Technologies
Host layer (typical
replication software such
as Symantec VVR, Oracle
DataGuard, DSG and
Quest)
This function is implemented on hosts, and the compatibility between underlying devices does not
need to be considered.
During database replication, the DR center can take over part of the work of the production center.
Database replication can be implemented only for the corresponding database.
Host-layer replication occupies certain host resources and affects the application system.
Implemented on hosts, which is complex and usually requires system reconstruction.
Advantages
Disadvantages
Network layer (typically
IBM SVC, EMC VPLEX,
and Huawei VIS)
Broad compatibility with different back-end heterogeneous SAN storage resources.
Simultaneous disaster recovery for multiple SAN arrays without a one-to-one relationship.
Extendable disaster recovery platform.
No extra investment required as the number of hosts and arrays increases.
High initial investment because few vendors can provide such a solution.
Advantages
Disadvantages
Array layer (arrays that
support mirroring or
replication, such as
Huawei OceanStor
series)
Data replication does not affect the host application system.
When the production array is faulty, applications can be switched to the DR array in a short time.
Data replication is implemented based on lower-layer arrays, and users are not charged based on
host licenses.
Does not support heterogeneous storage arrays. Storage arrays at the production center and the
disaster recovery center must be from the same vendor.
The data at the remote site cannot be accessed in real time. The data can be viewed only after the
data volume can be read and written or the snapshot mode is used.
Advantages
Disadvantages
Huawei Confidential41
Typical DR Drill Solution
Making a drill plan
Approving the
drill plan
Publishing the drill
start message
Drill switchover
Verification
after the drill
switchover
Drill switchback
Verification after the
drill switchback
Publishing the drill
finish message
Analysis and
assessment
Drill summary
Huawei Confidential42
Contents
1. DR Solution Overview
2. DR Solution Architecture
3. Common DR Technologies
4. DR Application Cases
Huawei Confidential43
Case 1: XX Virtualization DR Project
1、The active end creates a
remote replication task (task 1).
The active LUN is LUN 1, and the
standby LUN is LUN 1'.
2、The standby end requests the
replication task information from
the active end, and then creates a
recovery task at the backup end
based on a replication task.
3、The active end starts
task1 to copy data from
LUN1 to LUN1‘.
4、The replication task is complete.
5、The standby end chooses
snapshots to recover VMs based on
the specified recovery task.
Windows
Server
Windows
Server
Linux
Server
HA
Linux
Server
Linux
Server
HA
Linux
Server
Linux
Server
Linux
Server
A disaster
occurs at the
active end.
Huawei Confidential44
Case 2: Application-Level DR Solution
MSTP
DR centerProduction center
Production storage CDP storage
CDP device
Internet
Data
replication
2 Mbit/s
private line
Data
replication
Application
serverIP SAN
switch
Core switch
CDP
aggregation
switch
Production storageCDP storage
CDP device Data
replication
Application
server IP SAN
switch
Core switchGSLB GSLB
CDP
aggregation
switch
Huawei Confidential45
Quiz
1. (Multiple) Data replication is the core of a DR technology. On which three layers are replication
devices distributed? ( )
A. Application layer
B. Host layer
C. Network layer
D. Storage layer
2. (True or False) When designing a DR solution, set RTO to 0 to ensure that services are not
interrupted. ( )
Huawei Confidential46
Summary
DR Solution Introduction
DR Solution Overview
DR Solution Architecture
Common DR
Technologies
DR Application Cases
Huawei Confidential47
More Information
Huawei
Enterprise
Service App
Enterprise
Technical
Support App
Huawei Confidential48
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Storage System Operation Management
Huawei Confidential2
Foreword
This chapter describes two methods of managing storage systems:
OceanStor DeviceManager and CLI, as well as management content and
related operations.
Huawei Confidential3
Objectives
On completion of this course, you will be able to know:
DeviceManager and CLI storage system management tools.
Basic management operations of the storage system.
Huawei Confidential4
Contents
1. Storage Management Overview
2. Storage Management Tools
3. Basic Management Operations
Huawei Confidential5
Storage Management Definition
Storage management allows users to use management tools to query, set,
manage, and maintain storage systems.
Storage resource allocation
Alarm management
Device performance monitoring
User management
Data protection feature management
......
M
an
ag
em
en
t
co
nt
en
t
Huawei Confidential6
Common Storage System Access Mode
In what ways can I log in to a
storage system?
Log in to DeviceManager.
Log in to the CLI.
Huawei Confidential7
Main Functions of DeviceManager
DeviceManager is storage management software designed by Huawei for a single storage system.
It can help you easily configure, manage, and maintain storage devices.
Main software functions include storage resourceallocation, user management, data protection
feature management, device performance monitoring, and alarm management.
Huawei Confidential8
Logging In Using DeviceManager
Enter an IP address. Enter port number 8088.
Enter the user name.
Enter the
password.
You must add port number 8088 after
the IP address of the management
network port. Otherwise, the login fails.
Format: https://xxx.xxx.xxx.xxx:8088
Huawei Confidential9
Introduction to the CLI
CLI allows you to manage and maintain the storage system. Configuration commands are entered on the keyboard and
compiled and executed by programs. The command output is displayed in text or graphics on the CLI.
Terminal software is required for logging in to the CLI. PuTTY is used as an example.
Enter the IP address of the
management network port.
Set Connection type to SSH.
Click Open. The CLI window is displayed asking
you to log in.
Huawei Confidential10
Logging In Using the CLI
Enter the user name and password as prompted. The system asks you to change the password upon the first login. Change
the password immediately to ensure system security. The following information is displayed when the login is successful:
1. Enter the
user name.
2. Enter the
password.
3. Change the
password.
Huawei Confidential11
Contents
1. Storage Management Overview
2. Storage Management Tools
DeviceManager
▫ CLI
3. Basic Management Operations
Huawei Confidential12
DeviceManager GUI (1)
Function pane
Navigation bar
Alarm and task statistics area
Note: The GUI may vary slightly depending on the product version and model. The actual GUI prevails.
Huawei Confidential13
DeviceManager GUI (2)
No. Name Description
1 Function pane Displays available functions related to the current operation.
2 Navigation bar Lists all functional modules of the storage system.
3
Alarm and task statistics
area
The alarm statistics area displays the number of alarms by severity
and helps users learn about the running status of the storage
system.
The task statistics area displays all the tasks executed by users. You
can check whether the tasks are executed successfully.
4 Device management area
In the device management area, you can view and modify device
information, and power off or restart devices.
5
Logout and language
area
The logout and language area provide buttons of logout and
language. DeviceManager supports two languages: English and
simplified Chinese.
Huawei Confidential14
Managing the Access Permission of a Storage System
Security
policy
adjustment
User
management
Access IP
address
control
Ensuring system
security
• Account policy
• Login policy
• Access control
• Account audit
• IP address or address
segment list
• Operation rights of the
super administrator
• Administrator-----role
• Role--operation rights
Huawei Confidential15
Storage System User Management
To prevent misoperations from compromising the storage system stability and service data security, the
storage system defines user levels and roles to determine user permission and scope of permission.
Level: super administrator
Role: super administrator
All functional modules of
the system
Level: administrator
Role: built-in role B
Disk
domain
Storage
pool
......
Level: read-only user
Role: customized role C
LUN Host ......
User A
Operation permission
Operation permission Access permission
Creating a user and specifying the
user level and role
User B User C
Huawei Confidential16
Roles and Permissions of a User
• Security rule management
• Certificate management
• KMC management
• Antivirus management
• Data destruction management
• Regulatory clock management
• Physical port management
• Logical port management
• VLAN management
• Failover group management
1
2
3
4
5 Data protection administrator
SAN resource
administrator
Network
administrator
Security
administrator
Super
administrator
• Storage pool
management
• LUN management
• Mapping view
management
• Host management
• Port management
• Local data protection
• Remote data protection
management
• HyperMetro
management
• Full control permissions
• Creates users of different levels.
Huawei Confidential17
Downloading a DeviceManager Demo
Visit Huawei technical support
website:
support.huawei.com
Go to Tools.
Search for Storage Simulator.
Click Storage Simulator Demo
and select the simulator of the
desired version for installation.
Huawei Confidential18
Contents
1. Storage Management Overview
2. Storage Management Tools
▫ DeviceManager
CLI
3. 3. Basic Management Operations
Huawei Confidential19
CLI Format Conventions (1)
You are required to follow the format conventions when you use the CLI commands. Typical
command formats are:
First field: operation that you want to perform, for example, change (modify) and show (query)
Second field: object of an operation, for example, storage_pool (storage pool) and host (host)
Third field (available only in some commands): object attribute, for example, relocation_speed (migration
rate)
Other fields: other parameters required.
change storage_pool relocation_speed relocation_speed=?
show host
1 2 3
Huawei Confidential20
CLI Format Conventions (2)
For example,
change user keeps unchanged.
user_name=?, mandatory; For level=? and action=?, one of them can be selected.
For parameter level=?, level= remains unchanged. The value of ? must be an optional value, for example, level=admin.
Correct command example:
Format Description
Boldface The keywords of a command are in boldface.
Italic The arguments of a command line, which will be replaced by actual values, are in italics.
[ ] Items in square brackets [ ] are optional.
{ x | y | ... } Indicates that one option is selected from two or more options.
[ x | y | ... ] Indicates that one or no option is selected from two or more options.
{ x | y | ... } *
Indicates that multiple options are selected from two or more options. At least one option must be selected, and at most all
options can be selected.
[ x | y | ... ] * Indicates that multiple options are selected or none is selected from two or more options.
change user user_name=? { level=? | action=? }
admin:/>change user user_name=newuser level=admin
Huawei Confidential21
CLI Command Completion
On the CLI, you can press Tab or the space bar to use the command completion function.
The difference between the two keys is as follows: The space key is used to supplement only the current field,
whereas the Tab key is used to supplement all possible values.
After the starting segment is determined and completed, press
Tab once to display the available adjacent segments of the
starting segment.
When all the fields required by the command are entered and the conditions for running the command are met, the
system prompts that the command can be run after you press Tab. In this case, you can press Enter to run the command.
Press Tab once to display the available
starting segments of a command line.
admin:/>//Press“Tab”
^
add change create
delete exit export
help import poweroff
poweron reboot remove
scan show swap
admin:/>add//Press“Tab”
cache_partition clone consistency_group
disk_domain host host_group
lun_copy lun_group mapping_view
notification port port_group
remote_device security_rule smartqos_policy
snmp storage_pool
admin:/>add port ipv4_route eth_port_id=0 type=net target_ip=192.168.3.0 mask=255.255.255.0 gateway=10.0.0.1//Press“Tab”
Command is executable now.
Huawei Confidential22
Context-Sensitive Help
Context-
sensitive
Help
• Enter a question mark (?) to
query the basic instruction of CLI
operations and detailed
description of command
parameters.
• Afterentering the first field of the
command and a space, enter a
question mark (?). You can query all
available next fields and the detailed
description of each field.
• Press Ctrl+A to view the
optional values of certain
parameters in certain
commands. Generally, these
values need to be obtained
from the system.
Ctrl+A
q
• Exit the context-
sensitive help page.
?
PageDown
PageUp
• You can turn pages on the
context-sensitive help page.
Huawei Confidential23
CLI Command Filtering
Filtering
Purpose Redundant information is deleted, and valid
content is displayed as required.
• filterColumn column filtering command
• filterRow row filtering command
How to Use After entering the complete query command, enter |
and press Tab or the space bar.
Related
Commands
Huawei Confidential24
CLI Column Filtering Command - filterColumn
show xxx|filterColumn { exclude | include } columnList=?}
Choose either.
exclude: Filter out information that does
not need to be displayed.
Include: Only the columns to be displayed
are reserved.
Columns available
for filtering
If multiple columns are involved, they are
separated by commas (,).
admin:/>show bbu general|filterColumn exclude//Press“Tab”
<columnList=?> column list separated by comma, select one or more
seperated by comma, the spaces are replaced with \s in the
parameter list.
columnList=Inter\sID columnList=ID
columnList=Health\sStatus columnList=Running\sStatus
columnList=Current\sVoltage(V) columnList=Number\sOf\sDischarges
columnList=Firmware\sVersion columnList=Delivered\sOn
columnList=Owning\sController columnList=Electronic\sLabel
admin:/>show bbu general |filterColumn include
columnList=Inter\sID,ID
Inter ID ID
-------- ------
0.0A.0 CTE0.0
0.0A.1 CTE0.1
Huawei Confidential25
CLI Row Filtering Command - filterRow
show xxx|filterRow column=? predict=? [ predict2=? ] value=? [ logicOp=? ]
Columns required
for filtering
Filtering
condition
Filtering
condition 2 Value
Logical relationship
between columns
logicOp=?
• and: Multiple columns
that meet the condition
are displayed.
• or: Any column that
meets the condition is
displayed.
• not: The logicOp is not.
• equal_to: a value equal to value=?
• greater_than: a value greater than
value=?
• greater_equal: a value equal to or
greater than value=?
• less_than: a value less than value=?
• less_equal: a value less than or
equal to value=?
• match: regular expression matching
value=?
predict=?
Huawei Confidential26
Error Prompt Function
Purpose
Error
prompt
function
Specify the position of the input error in the command
and provide the correct field for reference.
When multiple errors occur in the command,
the system displays only the first error.
How to Use When the format of the entered command is incorrect, the system displays the error location with symbol ^.
Note
admin:/>add part
^
port port_group
admin:/>add part
Huawei Confidential27
Contents
1. Storage Management Overview
2. Storage Management Tools
3. Basic Management Operations
Huawei Confidential28
Basic Management Operations
3
1 5
42
Managing a storage
system license
Version information
and ESN
Managing alarms
and events
Configuring basic
storage services
Managing basic
information about a
storage system
Collecting storage
system information
Huawei Confidential29
Managing Basic Information About a Storage System -
Setting the Device Time (1)
Introduction
NTP
A protocol used to synchronize the system time of a computer to the
Coordinated Universal Time (UTC). A server that supports the NTP
protocol is called an NTP server.
Function
When an alarm is generated, users can accurately locate the time
when the alarm is generated based on alarm logs.
Setting mode
• Set the time manually.
• Synchronize the client time.
• Set automatic NTP synchronization.
Huawei Confidential30
Managing Basic Information About a Storage System -
Setting the Device Time (2)
Managing the device time on DeviceManager Managing the device time on the CLI
The change ntp_server config command is used to
automatically synchronize the storage system time
with the NTP server time.
The show system ntp command is used to query
NTP settings.
The show ntp status command is used to query the
NTP status.
The show ntp_server general command is used to
query the settings of the time synchronization
function.
Huawei Confidential31
Managing Device Licenses (1)
Introduction
License
file
Permission credentials for using various value-added features (such as
snapshot, remote replication, clone, and SmartQoS)
Precautions During routine device management, you need to check whether the
license file is available.
Using DeviceManager to manage licenses
Based on the status of the imported or activated license, different license operations are
displayed on the License Management page: Import License, Activate License, and Update
License.
For an activated license file, DeviceManager provides two control modes:
Running time-based control: displays the expiration time of the license.
Capacity-based control: displays the used/total capacity of the license.
Huawei Confidential32
Viewing Device Licenses (2)
The export license command is used to export a license file.
Example: export license ip=? user=? password=? license_path=? [ port=? ] [ protocol=? ]
The import license command is used to import a license file.
Example: import license ip=? user=? password=? license_path=? [ port=? ] [ protocol=? ]
The show license command is used to query the function configuration of the imported license file in
the system.
Example: show license
The show license_active command is used to query information about active licenses.
Example: show license_active
Using CLI to manage licenses
Huawei Confidential33
admin:/>show system general
System Name : XXX.Storage
Health Status : Normal
Running Status : Normal
Total Capacity : 3.186TB
SN : 210235G6EHZ0CX0000XX
Location :
Product Model : XXXX
Product Version : VX00R00XCXX
High Water Level(%) : 80
Low Water Level(%) : 20
WWN : XXXX
Time : 2020-07-07/15:34:05 UTC+08:00
Patch Version : SPCXXX SPHXXX
Description :
Obtaining the Current Version Information of the Device
Obtaining the current system version information
on DeviceManager
The following shows the device information:
Function
The matching software version can be accurately determined
based on the system version.
Version
Information
Log in to the CLI as a super administrator.
Run the show system general command.
Product Version indicates the version of the current storage
system.
Huawei Confidential34
Obtaining the Device ESN
Obtaining the ESN using DeviceManager
Introduction
ESN
Character string that uniquely identifies a device.
Application
scenarios
Scenarios such as license application, device repair, and eService service
configuration
• Obtaining the ESN using the CLI
>> Run the show system general command.
admin:/>show system general
System Name : XXX.Storage
Health Status : Normal
Running Status : Normal
Total Capacity : 3.186TB
SN : 210235G6EHZ0CX0000XX
Location :
Product Model : XXXX
Product Version : VX00R00XCXX
High Water Level(%) : 80
Low Water Level(%) : 20
WWN : XXXX
Time : 2020-07-07/15:34:05 UTC+08:00
Patch Version : SPCXXX SPHXXX
Description :
Huawei Confidential35
Managing Alarms and Events
Managing
alarms and
events
Configuring the
event notification
method
Configuring alarm
dump
Configuring alarm
masking
Configuring the
alarm notification
mode
• Email notification
• SMS notification
• Syslog notification
• Trap notification
• Email notification
• SMS notification
• Trap notification
• When the number of alarms exceeds
the threshold, the alarms willbe
dumped automatically to a specific
FTP or SFTP server.
• Alarm masking needs to be enabled or
disabled so that the system does not
report or reports alarms to the network
management system.
Huawei Confidential36
Collecting Storage System Information
Purpose
Collecting
information
• Prevent storage system faults and other unpredictable
disasters from damaging the storage system.
• Know the storage system operating status.
• Configuration information, system logs, disk logs, and
diagnosis files
How
• Regularly export and securely save the system data for fault
locating and analysis.
System data
Huawei Confidential37
Collecting Storage System Information (2)
Log in to the CLI of the storage system as the super administrator and run the following command to export
the configuration file to an FTP or SFTP server:
Collecting storage system configuration data using the CLI
On DeviceManager:
• You can export the configuration information to collect the information about the current running status of
the system.
• You can download Recent logs or All logs to collect configuration information, event information, and
debugging logs on the storage device.
• You can download DHA Runtime Log List or HSSD Log List to collect disk run logs, I/O statistics and
service life, and S.M.A.R.T. logs.
• You can export the diagnosis file to collect fault information.
Collecting storage system configuration data using DeviceManager
export configuration_data ip=? user=? password=? db_file=? [ port=? ] [ protocol=? ] [ clean_device_file=? ]
Huawei Confidential39
Configuring Basic Storage Services
Function
• The storage space provided by the storage system is divided
into multiple LUNs.
• Map LUNs to an application server.
• The application server can use the storage space provided by
the storage system.
Configuring
basic
services
Creating a storage pool: DeviceManager allows you to create a storage pool in either recommended or
custom mode.
Allocate storage resources by creating LUN groups or file systems.
Using DeviceManager to configure basic storage services
Huawei Confidential40
Configuring Basic Storage Services Using the CLI
1. Creating storage space
Create a disk
domain.
Create a storage
pool.
Create a LUN.
Create a LUN group.
2. Setting up connection
• Create a host.
• Create a host group.
• Configure initiators.
• Create a mapping view.
• Configure connectivity
between a host and a
storage system.
3. Using the storage space on an
application server
Use the storage space on
an application server.
Huawei Confidential41
Quiz
1. The management IP address of a storage device is 192.168.5.12. Engineer A needs to enter
( ) in the address box of the browser to log in to the storage device.
A. 192.168.5.12
B. http://192.168.5.12
C. https://192.168.5.12
D. https://192.168.5.12:8088
2. DeviceManager can monitor the performance of controllers, front-end ports, and back-end ports. ( )
http://192.168.5.12/
https://192.168.5.12/
https://192.168.5.12:8088/
Huawei Confidential42
Summary
Storage System Operation Management
Storage
Management
Overview
Storage
Management
Overview
Storage
Management Login
Mode
DeviceManager
CLI
Introduction to
Storage
Management Tools
Basic Management
Operations of the
Storage System
Huawei Confidential43
More Information
Huawei
Enterprise
Service App
Enterprise
Technical
Support App
Huawei Confidential44
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Storage System O&M Management
Huawei Confidential2
Foreword
As the cost of storage devices decreases, large-capacity storage devices
have been used by more and more enterprises to store data generated by
enterprise service application systems and IT systems, such as emails,
documents, service data, and data backup. Therefore, effective
management of storage devices is critical to the continuity and stability of
enterprise services.
Huawei Confidential3
Objectives
On completion of this course, you will be able to know:
General O&M management process
Common storage system O&M management tools
Process and methods of typical storage system O&M scenarios
Huawei Confidential4
Contents
1. O&M Overview
2. O&M Tools
3. O&M Scenarios
Huawei Confidential5
O&M
O&M is essentially the operation and maintenance of networks, servers, and services in each
phase of their lifecycles to achieve a consistent and acceptable status in terms of cost, stability,
and efficiency.
Maintenance
management
Personnel
organization
Platform
configuration
ProcessStandard
system
Technical
assurance
Management Resource
Standard
• Asset management
• Event management
• Energy efficiency management
• ...
• Organizational structure
• Skill
• Personnel allocation
• ...
• Maintenance tool
• Knowledge base
• Maintenance platform
• ...
• Standard operation procedure
• Emergency response process
• Troubleshooting process
• ...
• Device maintenance
• Device repair
• Risk identification
• ...
• ITIL
• Uptime O&M
• ISO 2000
• ...
Huawei Confidential6
How to Perform O&M
Technical layer: Streamline the O&M lifecycle of each product and identify the key measures of each task.
Process layer (ITIL process management framework): change, event, and problem management.
Requirement Model
selection
Design Implementation Online
O&M/
Operation
Offline
Before the device goes online O&M/Operation period
Service rollout and maintenance
transfer specifications
Configuration selection
and architecture design
Rollout and deployment
specifications
Monitoring and security compliance
Capacity management and expansion
PRR management (performance, reliability, and recoverability)
Performance and experience optimization
Cost and efficiency optimization
Emergency and DR drill
O
pe
ra
ti
on
Requirement
analysis
Offline
specifications Event management
Configuration management
Problem management
Change management
Release management
Process management
......
Huawei Confidential7
Event Management
A
To restore services as soon as possible
To minimize the impact of emergencies on service running
To ensure that the service quality and availability meet the SLA requirements
Objective
C Detection and recording
Classification and online support
Priority (based on the impact and urgency)
Investigation and diagnosis
Solution and recovery
End
Responsibilities, monitoring, tracking, and communication
Task
B Emergency
Any event that causes or may cause service interruption or service quality deterioration
Hardware faults, software faults, and service request interruption
Definition
Huawei Confidential8
Event Management Process
Service desk
Computer
operations
Network
Procedure
Other sources
of accidentsIncident
management
process:
• Identification
and record
• Classification
and initial
support
• Investigation
and analysis
• Solution and
recovery
• Incident
termination
Input:
accident
Output:
solution&
temporary
measures
Service request
Problem
management
Change
management
Service level
management
Capability
management
Availability
management
Configuration management
database (CMDB)
Transfer and supervision
Accident data
Temporary measures
Change requirement
Solution
Report
SLA parameters
Report
Report
Configuration
information
Huawei Confidential9
Problem Management
A
Locate the root cause of the problem and take measures to eliminate known errors.
Minimize the number of incidents caused by IT infrastructure errors and minimize the negative impact of problems.
Prevent the recurrence of emergencies related to errors.
Objective
C Problem control
Known error control
Proactive problem management
Trend analysis
Review of major issues
Task
B Problem: obtained from multiple emergencies with the same symptom or a major incident and indicates
that an error with unknown causes exists.
Known errors: The root cause of a problem has been successfully located and a solution has been found.
Definition
Huawei Confidential10
Problem Management Process
Incident
management
Problem
management
Configuration
management
Service level
management
Capability
management
Availability
management
Change
management
Problem
database
Matching information,
emergency measures, and
quick recovery solution Record
Information
Post implementation
review (PIR)
Change request
(RFC)
Information
Huawei Confidential11
Change Management
A
Ensure that all changes are effectively controlled and handled through standardized means and
processes, and that approved changes are implemented with minimum risks, high efficiency, and high
cost-effectiveness.
Objective
C Receive, record, approve, plan, test, implement, and review change requests.
Provide the IT infrastructure change report.
Modify CMDB.
Task
B Change: An action that causes the status of one or more IT infrastructure CIs to change.
Standard change (approved in advance)
Request for Change (RFC)
Change Schedule (FSC)
Change Advisory Board (CAB)
Definition
Huawei Confidential12
Change Management Process
The input information includes:
Change request
Data information provided by the configuration management database, especially information about the impact of changes
Change implementation schedule
Capability database provided by capability management and budget information provided by the financial management process
Incident
management
Problem
management
Change
management
Release
management
Configuration
management
The output information includes:
Updated change implementation schedule
Signals that trigger the start of configuration management
and release management
Agenda, minutes, and action items of CAB
Change management report
Huawei Confidential13
Configuration Management
A
Measure the value of all IT assets and configuration items used in organizations and services.
Provide accurate information about IT infrastructure configuration for other service management processes.
Support the operation of incident management, problem management, change management, and release management
Verify the correctness of the configuration records related to the IT infrastructure and correct the detected errors.
Objective
C Receive, record, approve, plan, test, implement, and review change requests.
Provide the IT infrastructure change report.
Modify CMDB.
Task
B
Identify and define configuration items.
Plan, define, and manage the configuration management database.
Periodically verify the accuracy and integrity of CMDB.
Detailed report of IT assets
Definition
Huawei Confidential14
Configuration Management Process
Change request
Release
Implementation
Comment
End
Categorization &
Plan
Release and distribute
the hardware and
software of the new
version.
Report and audit
configuration information
Report
Update information.
Update CMDB & DSL.
Check whether CMDB is
updated.
D
ef
in
it
iv
e
so
ft
w
ar
e
lib
ra
ry
C
on
fi
gu
ra
ti
on
m
an
ag
em
en
t
da
ta
ba
se
(C
M
D
B
)
(D
SL
)
Change management Release management Configuration
management
Huawei Confidential15
Release Management
A
Comprehensively assess changes to IT services and ensure that all aspects
(including technical and non-technical factors) of a release are considered
Objective
C Release planning
Design, development, and configuration release
Release review
Rollout plan
Communication, preparation, and training
Distribution and installation
Task
B
Release
Delta release
Full release
Package release
Emergency release
Release policy
Definition
Huawei Confidential16
Release Management Process
Design and development
environment
Controlled test
environment
Production environment
R
el
ea
se
p
ol
ic
y
R
el
ea
se
pl
an
ni
ng
R
el
ea
se
de
si
gn
,
bu
ild
in
g,
a
nd
co
nf
ig
ur
at
io
n
Building and
configuration
release
Release test
and
acceptance
Fi
rs
t-
ti
m
e
ru
nn
in
g
pl
an
ni
ng
C
om
m
un
ic
at
io
n
an
d
tr
ai
ni
ng
D
is
tr
ib
ut
io
n
In
st
al
la
ti
on
Release management
Configuration management database (CMDB)
Definitive Software Library (DSL)
Huawei Confidential17
Contents
1. O&M Overview
2. O&M Tools
3. O&M Scenarios
Huawei Confidential18
Components of Huawei Enterprise Storage O&M System
Huawei Technical
Support Center
Trouble submission
Remoting solution
Customer Data Center
Server
Fabric
Storage
18000 V3 9000
DeviceManager
Single Device Management
O&M administrator
Configure & Alarming
Device
Manager
Device
Manager
Device
Manager
DME
Storage resource control
O&M administrator
Resource pooling & Service Orchestration
eSight
Multi-device management
O&M administrator
Fault monitoring & Performance report
eService
Remote maintenance
O&M administrator
Fault monitoring & Fault feedback
SmartKit
Storage service tool
Service personnel
Delivery & Upgrade & Toubleshooting
Device archive system
Trouble order handling system
Fault diagnosis expert system
Authentication system
eService
Cloud Platform
Remote Control
Huawei Confidential19
Main Functions of DeviceManager
DeviceManager is storage management software designed by Huawei for a single storage system.
It can help you easily configure, manage, and maintain storage devices.
Main software functions include storage resource allocation, user management, data protection
feature management, device performance monitoring, and alarm management.
Huawei Confidential20
Home Page of DeviceManager
Huawei Confidential21
Introduction to SmartKit
2. Scenario-based guidance
Tools specific to each O&M
scenario can be downloaded
on demand.
1. Unified platform
The desktop tool management
platform integrates O&M tools
for storage systems, servers, and
cloud computing.
3. Standardized operations
The wizard guides you
through operations based
on scenarios in an easy and
intelligent manner.
Huawei Confidential22
Home Page of SmartKit
Standardized and process-based operations in various service scenarios, improving operation
efficiency
Domain Function
management
Function
navigation bar
Scenario-
based entry
Device
Huawei Confidential23
Introduction to DME
Southbound API
Planning Construction O&M Optimization
Gold Silver Bronze
Service level-based pooling
and consolidation
Intelligent planning and
automatic pooling
Flexible automation
modes
Orchestratable
scheduled tasks
Automatic identification
and proactive prevention
Automatic analysis and
quick locating
Gold Silver
Multi-dimensional analysis
and optimization suggestions
One-click change and
automaticdriving
Northbound API
Automation platform Monitoring platform Report platform
ITSM
Huawei OceanStor
distributed storage
Huawei OceanStor
all-flash storage
Third-party storageFC switch
Huawei Confidential24
DME Functions and Features
Planning Construction O&M Optimization
- E2E topology
SLA-based pooling
and consolidation
- Workload evaluation
- QoS policy
- Threshold policy
- Scheduling policy
- Quota policy
- Protection policy
Automatic provisioning
- Full-process automation
- Auxiliary automation
- Orchestratable scheduled
tasks
- Application template
Automatic protection
- Copy creation
- Copy visualization
- Copy enabling
Proactive problem
identification
- Capacity prediction/
Performance prediction
- Disk service life prediction
- Capacity threshold/
Performance threshold
- Disk health/Abnormal load
- Configuration compliance/
Data protection
Automatic problem analysis
- Automatic masking/
aggregation/association
Fast fault locating
- E2E performance analysis
Automatic problem
resolution
- SLA change
- Data flow
(reclamation/migration)
- Best practice
implementation
Multi-dimensional analysis
- SLA/Cost/Capacity/
Performance
- Application/Device/
Project/Label
- Customized report/
Large screen
Autonomous driving
- Policy-based autonomy
- AI-based inference
autonomy
Infrastructure
management
User role
management Open API
Multi-DC
management
Huawei Confidential25
Introduction to eSight
eSight provides multi-vendor device adaptation for unified network-wide device management,
component-based architecture for on-demand construction of enterprise O&M platforms, and
lightweight design and web client for lower system maintenance and upgrade costs.
eSight
Architecture
Platform + Components
eSight Basic Management Platform
Switches/Routers/
WLAN
Management
PON Management ……
UC/Telepresence,
Video Surveillance
Management
eLTE Management
Transport Device
Management
Storage
Management
Servers/Virtual
Resources
Management
Equipment
Room Facility
Management
Huawei Confidential26
Logical Architecture of eSight
Managed object: server/storage/VM/switch/router firewall/……
eSight Management Platform
WLAN Management Storage Capacity Management Server Stateless Computing
Network SLA&QoS management Storage Network Analysis Server Configuration and Deployment
Network Traffic Analysis Management Business Service Management Report Management
…… …… ……
Communication Devices Network Devices eLTE Devices
Telepresence & Videoconferencing Virtual Resource PON Devices
Terminal Servers Transport Devices
Intelligent Video Surveillance Storage Devices Equipment Room Facilities
…… …… ……
Device
Management
Value-added
O&M
Management
Platform
Administrator
Huawei Confidential27
Introduction to eService
Based on Cloud-Native, Huawei eService cloud intelligent management platform uses big data analysis and AI technologies to provide services
such as automatic fault reporting, capacity and performance prediction, and disk risk prediction, preventing potential risks and providing a basis for
capacity planning.
Efficient
O&M
Technical
support
capabilities
eService
Reactive response
Complex management
for multiple devices
Asset
platform
Real-time
analysis
Rapid
response
Intelligent
prediction
Proactive problem handling
24/7 remote monitoring for all
IT devices, and automatic fault
reporting and SR creation
Proactive problem handling
reduces the troubleshooting
duration and improves the
operation efficiency.
Asset management
Collects device asset
information for future
reference.
Provides product EOX
information and device
maintenance information.
Intelligently identifies risky disks,
ensuring data security.
Predicts the capacity trend in the
next 12 months to facilitate
procurement planning.
Predicts performance bottlenecks
according to performance
fluctuation rules.
Intelligent prediction and analysis
Cloud platform capability building
Service rollout delay
Huawei Confidential28
System Architecture of eService
DC1
FusionCloud
OC/SC
Email (optional channel)
Supports only fault
monitoring.
HTTPS
Customer
Email
server
Proxy
server
(Optional)
Customer network
Intranet DMZ
zone
Huawei network
Huawei
Email
server
HTTPS
service
eService
cloud
system
DC2
Cloud OS
Fusion Manager/Fusion
Compute/Fusion
Access/FusionSphere OpenStack OM
Storage
eSight
Storage
/Server
/Network
Network
eService
Client
& FusoinCare
Fault monitoring
Remote inspection
Remote log collection
Capacity prediction
Performance
exception analysis
Disk prediction
Maintenance
host
Server
Hardware
layer
In
te
rn
et
ManageOne
Huawei Confidential29
Contents
1. O&M Overview
2. O&M Tools
3. O&M Scenarios
Huawei Confidential30
Routine Maintenance Items
01
Checking the SmartKit
installation
Checking the installation and
configuration of eService
Checking the alarm policy
configuration
Initial maintenance
items
02
Checking and handling alarms
Daily maintenance
item
03
Weekly
maintenance items
Inspecting a storage device
Checking the equipment room
environment
Checking the rack internal
environment
Huawei Confidential31
Quick Maintenance Process
Start
End
Check the indicator status
and handle related exceptions.
Check the service status.
and handle related exceptions.
Check the system performance
and handle related exceptions.
Check and clear alarms.
Can the preceding
exceptions be handled?
Collect information and report faults.
Yes
No
The indicators on the front and rear panels of the storage devices indicate the device
running status and help you discover and rectify common hardware faults.
By checking the system information and service status, you can learn about the basic
information, alarms, capacity trend, and performance of the storage system, as well as
the status of storage resource allocation and value-added features.
You can query the real-time and historical performance statistics on DeviceManager.
If a fault occurs in the storage system, DeviceManager automatically determines the
severity of the fault and reports an alarm. Maintenance personnel should rectify the
fault in a timely manner to prevent service interruption or data loss.
Huawei Confidential32
O&M Scenario 1: Inspection
Background
After the storage devices purchased by company E are
deployed, services are deployed and running properly. To
ensure the storage security of core devices in the service
system, engineer A in the IT department is responsible for
the inspection of storage devices. Help engineer A make
an inspection plan.
Huawei Confidential33
Inspection Method
Check the
storage system
operating
environment.
Check
indicators.
Check the device
running status.
Check the
service
running
status.
Manual
inspection
Inspection
using tools
SmartKit inspection
DeviceManager
inspection
Huawei Confidential34
O&M Scenario 2: Performance Monitoring
Background
Company E's business has gone online. To learn about the
performance and usage of the storage device, engineer B in
the IT department is responsible for monitoring the
performance of the storage device. Help engineer B
monitor the performance of the storage device.
Huawei Confidential35
Performance Monitoring Process
Start
End
Set performance monitoring
parameters.
Configure the threshold.
View storage system
performance information.
View performance monitoring data.
Check storage system alarm information.
Check storage system event information.
Check storage system power consumption.
Different service scenarios have special requirements on
performance monitoring parameters. You can set performance
monitoring parameters based on service requirements. Ensure
that the performance monitoring function is enabled.
Configure the threshold. When the threshold is exceeded,
check the alarm information.
View storagedevice performance information, including real-
time performance monitoring data, alarms, events, and power
consumption.
Create a metric chart.
Configure performance
monitoring file dump.
Create a service-related indicator template so that you can
view the indicators in a timely manner.
After the dump function is enabled, newly generated
performance monitoring files are automatically dumped to the
specified application server through the SFTP or FTP protocol.
Huawei Confidential36
Performance Monitoring Metrics
IOPS
Monitoring
metrics
LatencyBandwidth
• For applications with an I/O size smaller than 64
KB, mainly focus on the IOPS.
• For applications with an I/O size greater than or
equal to 64 KB, mainly focus on the bandwidth.
Huawei Confidential37
Performance Metrics
1 Snapshot
2 Front-end Ethernet port
3 LUN priority
4 Back-end SAS port
5 Front-end FC port
6 Front-end bound port
7 Disk
1 Logical port
2 Host
3 Controller
4 LUN
5 Storage pool
6 SmartQoS policy
7 LUN group
1 Heterogeneous iSCSI link
2 Heterogeneous FC link
3
Remote replication consistency
group
4 FC replication link
5 Remote replication
6 System
7 Host group
Huawei Confidential38
O&M Scenario 3: Parts Replacement
Background
After the storage system of enterprise E has been running
for a period, it reports a disk failure and disk replacement
is needed. After receiving the disk replacement request,
Huawei technical support engineer C is going to the
customer site to perform the replacement.
Huawei Confidential39
Parts Replacement Procedure
Successful
check
Log in to SmartKit.
Rectify the
fault as
prompted.
Select the component to be replaced
and start the replacement.
Use the tool to perform the pre-
replacement check.
Use the tool to power off the
component.
Remove cables from
the component.
Remove the
component.
Insert a new
component.
Connect cables.
Confirm that the
replacement is
complete on the
tool.
Check the system after
the replacement.
Successful
check
Use the tool to perform
the inspection.
Successful
check
End
Rectify the fault as
prompted.
Rectify the fault as
prompted.
Start
Yes
No
Yes
Yes
No
No
Huawei Confidential40
Replaceable Parts
FRU CRU
Controller Power module
Interface module BBU module
System subrack Fan module
Management module Disk module
Cable Expansion module
Assistant cooling unit Optical module
Quorum server -
Data switch -
Huawei Confidential41
Spare Parts Query Assistant
Huawei Confidential42
Key Points for Disk Replacement
When handling a disk module, hold only its edge to prevent damage.
Remove and insert a disk module with even force. Excessive force may damage the appearance of
the disk module or cause faults.
To avoid damaging disk modules, wait at least 1 minute between removal and insertion.
To prevent data loss, replace only a disk module of which the Alarm/Location indicator is steady
yellow.
Complete the replacement within five minutes after removing a disk module. Otherwise, the
system heat dissipation is compromised.
Use SmartKit to replace a risky disk (not faulty).
Ensure that the replacement disk is inserted in to the same slot as the replaced disk. Otherwise,
the system may work abnormally.
Huawei Confidential43
Disk Replacement Using SmartKit
Start SmartKit and select the parts replacement tool.
Huawei Confidential44
Disk Replacement Wizard
Huawei Confidential45
Quiz
1. (Multiple choices) Which of the following are common management software? ( )
A. A. DeviceManager
B. B. eSight
C. C. SmartKit
D. D. eService
2. (True or False) SmartKit integrates various tools required for deploying, maintaining, and
upgrading IT devices, helping service and maintenance engineers perform precise
operations on these devices, improving work efficiency. ( )
Huawei Confidential46
Summary
Storage system O&M management
O&M overview
O&M concepts
O&M handling process
Common O&M tools
DeviceManager
SmartKit
eSight
DME
eService
Common O&M scenarios
Huawei Confidential47
More Information
Huawei
Enterprise
Service App
Enterprise
Technical
Support App
Huawei Confidential48
Recommendations
Huawei official websites
Enterprise business: https://e.huawei.com/en/
Technical support: https://support.huawei.com/enterprise/en/index.html
Online learning: https://www.huawei.com/en/learning
Popular tools
HedEx Lite
Network Document Tool Center
Information Query Assistant
https://e.huawei.com/en/
https://support.huawei.com/enterprise/en/index.html
https://www.huawei.com/en/learning
Copyright©2020 Huawei Technologies Co., Ltd.
All Rights Reserved.
The information in this document may contain predictive
statements including, without limitation, statements regarding
the future financial and operating results, future product
portfolio, new technology, etc. There are a number of factors that
could cause actual results and developments to differ materially
from those expressed or implied in the predictive statements.
Therefore, such information is provided for reference purpose
only and constitutes neither an offer nor an acceptance. Huawei
may change the information at any time without notice.
把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界。
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.
Thank you.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
Huawei Storage Certification Training
HCIA-Storage
Lab Guide
V4.5
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129
People's Republic of China
Website: http://e.huawei.com
http://e.huawei.com/
Page 1
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
Huawei Certificate System
Huawei Certification follows the "platform + ecosystem" development strategy,
which is a new collaborative architecture of ICT infrastructure based on "Cloud-Pipe-
Terminal". Huawei has set up a complete certification system consisting of three
categories: ICT infrastructure certification, Platform and Service certification and ICT
vertical certification, and grants Huawei certification the only all-range technical
certification in the industry.
Huawei offers three levels of certification: Huawei Certified ICT Associate (HCIA),
Huawei Certified ICT Professional (HCIP), and Huawei Certified ICT Expert (HCIE).
Huawei Certified ICT Associate-Storage (HCIA-Storage) isdesigned for Huawei
engineers, students and ICT industry personnel. HCIA-Storage covers knowledge about
storage technology trends, storage basic technologies, storage common advanced
technologies, storage business continuity solutions and storage system O&M
management.
The HCIA-Storage certificate system introduces you to the industry and market,
helps you in innovation, and enables you to stand atop the Storage frontiers.
Page 2
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 3
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd
HCIA-Storage V4.5 Lab Course Overview
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Storage Certification Training
HCIA-Storage
Scenario-based Practice of
Storage Fundamentals
(For Trainees)
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129
People's Republic of China
Website: http://e.huawei.com
http://e.huawei.com/
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 1
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Certificate System
Huawei Certification follows the "platform + ecosystem" development strategy,
which is a new collaborative architecture of ICT infrastructure based on
"Cloud-Pipe-Terminal". Huawei has set up a complete certification system consisting of
three categories: ICT infrastructure certification, Platform and Service certification and
ICT vertical certification, and grants Huawei certification the only all-range technical
certification in the industry.
Huawei offers three levels of certification: Huawei Certified ICT Associate (HCIA),
Huawei Certified ICT Professional (HCIP), and Huawei Certified ICT Expert (HCIE).
Huawei Certified ICT Associate-Storage (HCIA-Storage) is designed for Huawei
engineers, students and ICT industry personnel. HCIA-Storage covers knowledge about
storage technology trends, storage basic technologies, storage common advanced
technologies, storage business continuity solutions and storage system O&M
management.
The HCIA-Storage certificate system introduces you to the industry and market, helps
you in innovation, and enables you to stand atop the Storage frontiers.
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 2
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 3
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Contents
1 References and Tools ............................................................................................................. 4
1.1 References ........................................................................................................................................................................ 4
1.2 Software Tools ................................................................................................................................................................ 4
1.3 Version Description ....................................................................................................................................................... 5
2 Scenario-based Practice of Storage Fundamentals ........................................................ 6
2.1 Course Overview ............................................................................................................................................................ 6
2.2 Objectives ......................................................................................................................................................................... 6
2.3 Case Background ........................................................................................................................................................... 6
2.4 Tasks ................................................................................................................................................................................... 7
Scenario 1: Requirement Analysis, Planning, and Design ...................................................................................... 7
Scenario 2: Initial Configuration ...................................................................................................................................... 9
Scenario 3: Basic Service Planning and Configuration .......................................................................................... 10
2.5 Summary and Conclusion ......................................................................................................................................... 17
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 4
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
1 References and Tools
1.1 References
Commands and documents listed in this document are for reference only. Use the
corresponding commands and documents based on the product version in the actual
environment.
Huawei OceanStor Dorado V6 Product Documentation
Features supported by Huawei OceanStor Dorado vary with product models. For details, see the product
documentation of the desired product model. You can log in to Huawei's technical support website
(https://support.huawei.com/enterprise/en/index.html) and input the name of a document or tool in the
search box to search for, browse, and download the desired document or tool.
1.2 Software Tools
1. Huawei OceanStor UltraPath
You can log in to Huawei's technical support website
(https://support.huawei.com/enterprise/en/index.html) and input UltraPath in the search box to
search for, browse, and download the desired document or tool.
2. PuTTY
https://support.huawei.com/enterprise/en/index.html
https://support.huawei.com/enterprise/en/index.html
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 5
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
You are advised to use the open-source software PuTTY to log in to a terminal. You can use the
common domain name (putty.org) of PuTTY to browse or download the desired document or tool.
1.3 Version Description
Name Version Quantity Remarks
Storage system Huawei OceanStor Dorado V61 Recommended version
Windows OS Windows Server 2012 and
Windows Server 2016
- Recommended version
Linux OS SUSE, Red Hat, CentOS, and
EulerOS
- Recommended version
S5700 switch - 1
Multipathing
software
UltraPath 21.6.3 - Recommended version
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 6
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
2 Scenario-based Practice of Storage
Fundamentals
2.1 Course Overview
This course provides case study and scenario-based practices to help trainees consolidate
their knowledge on initial configuration and basic service deployment and implementation
of Huawei OceanStor storage.
2.2 Objectives
● To understand common networking modes of storage services
● To plan and design networks
● To complete the initial configuration of the storage system
● To install UltraPath
● To plan and configure block services
2.3 Case Background
Cases in this document are examples only. The actual configurations may vary according to actual
environments. For details, see the corresponding product document.
Company W needs a high-performance storage system to support new service lines. The
planned upper-layer services are OLTP transactional databases. To meet service
development requirements, company W purchases a Huawei OceanStor all-flash storage
system. To ensure proper service running, two test servers are used. Server A runs the
Windows OS, server B runs the Linux OS, and storage devices provide block storage services
for the two servers over an IP network.
As a storage engineer, you are responsible for network planning and design, initial
configuration, and block service configuration of the storage system.
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 7
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
2.4 Tasks
Scenario 1: Requirement Analysis, Planning, and Design
Background
As a storage engineer, how do you plan networks?
Question
1. Please analyze the business requirements of company W.
2. What needs to be done to meet the requirements of company W? (For example, what
needs to be planned?)
[Suggested Procedure]
For details, see Install and Upgrade > Installation Guide > Installation Planning in
the desired product documentation.
3. What are the common networking modes of storage service networks? How to
prevent SPOFs?
[Suggested Procedure]
For details, see Install and Upgrade > Installation Guide > Installation Planning in
the desired product documentation.
Task 1: Obtaining Device User Information
Plan and record the IP address and user information of the storage device based on the
actual lab environment.
Device Name Management
IP Address
Subnet Mask Gateway User Name Password
Storage001
Host001
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 8
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Host002
[Suggested Procedure]
Follow certain principles when planning the IP address and user information of the storage
device.
For details, see Install and Upgrade > Installation Guide > Installation Planning in the
desired product documentation.
The following example is for reference only. The actual information may vary depending on lab
environment.
Task 2: Designing the Network Topology
Draw the service network topology based on the case background.
Huawei OceanStor all-flash storage Linux server
Ethernet switch Windows server
[Suggested Procedure]
For details, see Install and Upgrade > Installation Guide > Installation Planning in the
desired product documentation.
[Extension]
To ensure the security and stability of company W's services, use dual-switch networking to
build the storage system. Draw the dual-switch networking topology.
Task 3: Planning the Front-End Service Network
Plan the device connections of the front-end service network.
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 9
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Device Name Connection Diagram
IP_Switch001
Host001
Host002
Storage001
[Suggested Procedure]
For details, see Huawei Storage Networking Assistant
(https://support.huawei.com/onlinetoolsweb/sna/#/home).
Task 4: Planning Service IP Addresses
Plan front-end service IP addresses based on the network topology.
Device Name Port Location IP Address Subnet Mask Gateway
Storage001
Host001
Host002
The following example is for reference only. The actual information may vary depending on lab
environment.
[Suggested Procedure]
For details, see Install and Upgrade > Installation Guide > Installation Planning in the
desired product documentation.
Scenario 2: Initial Configuration
Background
After the network planning and design are complete, perform initial configuration on the
storage system.
https://support.huawei.com/onlinetoolsweb/sna/#/home
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 10
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Question
What information can be configured in the initial configuration wizard of the Huawei
OceanStor all-flash storage system?
Task 1: Initial configuration
After logging in to DeviceManager, perform initial configuration on the storage system in
the initial configuration wizard, including: configuring basic information, creating a storage
pool (excluding scanning for UltraPath hosts and allocating storage resources), and filling
in the following form.
The initial configuration address is https://XXX.XXX.XXX.XXX:8088/initialize, where XXX.XXX.XXX.XXX
indicates the IP address of the management network port of the storage system.
The following example is for reference only. The actual information may vary depending
on lab environment.
Basic Information Result
Device name
Device location
Device time
Storage pool name, capacity alarm threshold, and
capacity exhaustion alarm threshold
[Suggested Procedure]
For details, see Install and Upgrade > Initialization Guide > Logging In and Starting
Initialization > Initially Configuring a Storage Device in the desired product
documentation.
A license file is a credential for using basic storage features or value-added features. Before practices,
check whether the license file is valid.
In this scenario, a license file has been imported and activated. You can manage the license in the initial
configuration wizard.
Scenario 3: Basic Service Planning and Configuration
Background
After the tasks in scenarios 1 and 2 are complete, plan and configure block services.
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 11
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Question
Plan the storage capacity and answer the following questions.
Storage Pool Name Disk Type Disk Quantity Hot Spare Policy RAID Policy
StoragePool001
LUN Name ID Type Capacity /
LUN001
LUN002
1. What factors need to be considered during usable capacity planning?
2. How many RAID levels does Huawei OceanStor Dorado support?
3. Does Huawei OceanStor Dorado support thick LUNs?
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Planning Basic
Storage Services in the desired product documentation.
In this experiment environment, a single storage pool requires at least 8 normal member disks. If a storage
pool spans multiple controller enclosures, the minimum number of disks required for creating the storage
pool is calculated as follows: Minimum number of disks = 8 x Number of controller enclosures that the
storage pool spans.RAID 2.0+ allows all member disks in a storage pool to provide the hot spare capacity. For ease of
understanding, the hot spare capacity is expressed in the number of hot spare disks on DeviceManager.
1. Differences between the nominal capacity of a single disk and the capacity displayed
on the OS, hot spare capacity, and RAID usage. The evaluation results of eDesigner
take precedence over the considerations of this section.
2. RAID 5, RAID 6, and RAID-TP
3. No
Task 1: Planning Mapping Views
Plan mapping views based on the case background.
Mapping View 1: to Windows Hosts
LUN Name Owning Storage Pool LUN Capacity Host Name OS IQN
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 12
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Mapping View 2: to Linux Hosts
LUN Name Owning Storage Pool LUN Capacity Host Name OS IQN
Question
Provide key steps of the block service configuration process.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Configuring
Basic Storage Services > Configuration Process in the desired product documentation.
Task 2: Configuring Block Services
Based on the case background and planning, configure block services on the Windows and
Linux servers. Then, use the storage space on the application server, that is, write a test file
named test.txt to the application server.
Step 1 Create a storage pool.
To ensure that the application server can use the storage space of the storage system,
create a storage pool named StoragePool001.
During initial configuration, if you have specified that all disks are used to create a unique storage pool,
skip this step.
If this step is performed, the capacity of the storage pool depends on the actual planning and experiment
environment.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Configuring
Basic Storage Services > Creating a Storage Pool in the desired product documentation.
Step 2 Create LUNs.
Create LUNs LUN001 and LUN002 and configure their capacities as planned.
[Suggested Procedure]
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 13
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
For details, see Configure > Basic Storage Service Configuration Guide > Configuring
Basic Storage Services > Creating a LUN in the desired product documentation.
Step 3 Create hosts.
On DeviceManager, create virtual hosts Host001 and Host002 running Windows and Linux,
respectively, for the storage system.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Configuring
Basic Storage Services > Creating a Host in the desired product documentation.
Step 4 Create mappings.
On DeviceManager, create mappings between the LUNs and hosts.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Configuring
Basic Storage Services > Creating a Mapping in the desired product documentation.
Step 5 (Optional) Install UltraPath.
OceanStor UltraPath is the multipathing software supported by Huawei, which is installed on servers to
control the access of application servers to the storage system. UltraPath selects the paths for application
servers to access the storage server and manages the paths.
This step is optional. You are advised to install UltraPath before deploying HyperMetro. If UltraPath is
installed and configured after LUNs are mapped to an application server, you must restart the application
server for the multipathing policies to take effect.
Install UltraPath on both the Windows and Linux hosts. (Obtain the UltraPath installation
package from the trainer.)
[Suggested Procedure]
For details, see Installing UltraPath in the UltraPath user guide of the corresponding OS.
Step 6 Configure connectivity between hosts and the storage system.
1. Establish iSCSI connections.
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 14
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Establish iSCSI connections between the Windows application server and storage
system and between the Linux-based application server and storage system by
complying the following configuration logic.
If switches are used, configure zones (for FC connections) or VLANs (for iSCSI connections) by
referring to the official product documentation specific to the switch model and version.
The display of DeviceManager varies with different versions.
[Suggested Procedure]
For details, see Configuring Connectivity > Establishing iSCSI Connections in
OceanStor Dorado V6 Host Connectivity Guide for XXX, where XXX indicates the OS,
such as Windows, SUSE, Red Hat, CentOS, and EulerOS.
2. Scan LUNs on a host.
Scan for disks on the Windows and Linux servers respectively to detect LUNs mapped
by the storage system.
[Suggested Procedure]
For details, see Configuring Connectivity > Scanning LUNs on the Host in
OceanStor Dorado V6 Host Connectivity Guide for XXX, where XXX indicates the OS,
such as Windows, SUSE, Red Hat, CentOS, and EulerOS.
Step 7 Use the storage space on an application server.
1. Manage volumes.
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 15
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
On the Windows and Linux servers, initialize, partition, and format the detected disks
so that an application server can use the storage space.
[Suggested Procedure]
For details, see Appendix A Volume Management in OceanStor Dorado V6 Host
Connectivity Guide for XXX, where XXX indicates the OS, such as Windows, SUSE, Red
Hat, CentOS, and EulerOS.
2. Write a test file to verify the experiment result.
Write a test file to an application server to test whether the application server can
properly use the storage space.
[Suggested Procedure]
For details, see Appendix A Volume Management in OceanStor Dorado V6 Host
Connectivity Guide for XXX, where XXX indicates the OS, such as Windows, SUSE, Red
Hat, CentOS, and EulerOS.
Question
Provide key steps of the service space reclamation process.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Managing
Basic Storage Services in the desired product documentation.
Task 3: Reclaiming Service Space
Step 1 Disconnect iSCSI connections.
Disconnect iSCSI connections from a service host.
[Suggested Procedure]
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 16
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
For details, see Appendix A Volume Management in OceanStor Dorado V6 Host
Connectivity Guide for XXX, where XXX indicates the OS, such as Windows, SUSE, Red Hat,
CentOS, and EulerOS.
Step 2 Delete mappings.
Log in to DeviceManager and cancel mappings between the hosts and LUNs.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Managing
Basic Storage Services > Managing Hosts in the desired product documentation.
Step 3 Delete the hosts and initiators.
Log in to DeviceManager and delete the hosts, initiators, and service IP addresses.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Managing
Basic Storage Services in the desired product documentation.
Step 4 Delete LUNs.
Log in to DeviceManager and delete the LUNs to release storage space.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Managing
Basic Storage Services > Managing LUNs in the desired product documentation.
Step 5 Delete thestorage pool.
Log in to DeviceManager and delete the storage pool.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Managing
Basic Storage Services > Managing Storage Pools in the desired product documentation.
Step 6 Verify the result.
HCIA-Storage
Scenario-based Practice of Storage Fundamentals Page 17
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Verify that the service space has been reclaimed successfully.
2.5 Summary and Conclusion
My Opinion:
_________________________________________________________________________________________
_________________________________________________________________________________________
__________________________________________________________________
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Storage Certification Training
HCIA-Storage
SmartQoS
Scenario-based Practice
(For Trainees)
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129
People's Republic of China
Website: http://e.huawei.com
http://e.huawei.com/
HCIA-Storage SmartQoS Scenario-based Practice Page 1
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Certificate System
Huawei Certification follows the "platform + ecosystem" development strategy,
which is a new collaborative architecture of ICT infrastructure based on
"Cloud-Pipe-Terminal". Huawei has set up a complete certification system consisting of
three categories: ICT infrastructure certification, Platform and Service certification and
ICT vertical certification, and grants Huawei certification the only all-range technical
certification in the industry.
Huawei offers three levels of certification: Huawei Certified ICT Associate (HCIA),
Huawei Certified ICT Professional (HCIP), and Huawei Certified ICT Expert (HCIE).
Huawei Certified ICT Associate-Storage (HCIA-Storage) is designed for Huawei
engineers, students and ICT industry personnel. HCIA-Storage covers knowledge about
storage technology trends, storage basic technologies, storage common advanced
technologies, storage business continuity solutions and storage system O&M
management.
The HCIA-Storage certificate system introduces you to the industry and market, helps
you in innovation, and enables you to stand atop the Storage frontiers.
HCIA-Storage SmartQoS Scenario-based Practice Page 2
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
HCIA-Storage SmartQoS Scenario-based Practice Page 3
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Contents
1 References and Tools ............................................................................................................. 4
1.1 References ........................................................................................................................................................................ 4
1.2 Software Tools ................................................................................................................................................................ 4
1.3 Version Description ....................................................................................................................................................... 4
2 Scenario-based Practice on SmartQoS .............................................................................. 5
2.1 Course Overview ............................................................................................................................................................ 5
2.2 Objectives ......................................................................................................................................................................... 5
2.3 Case Background ........................................................................................................................................................... 5
2.4 Tasks ................................................................................................................................................................................... 6
2.4.1 Scenario: Using SmartQoS ...................................................................................................................................... 6
2.5 Summary and Conclusion ......................................................................................................................................... 10
HCIA-Storage SmartQoS Scenario-based Practice Page 4
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
1 References and Tools
1.1 References
The commands, documents, and document paths listed in this document are for reference
only. The actual commands, documents, and document paths may vary.
Huawei OceanStor Dorado V6 Product Documentation
The specifications of SmartQoS vary with products. For details, see the product documentation of the
desired product model. You can log in to Huawei's technical support website
(https://support.huawei.com/enterprise/) and input the name of a document or tool in the search box to
search for, browse, and download the desired document or tool.
1.2 Software Tools
PuTTY
You are advised to use the open-source software PuTTY to log in to a terminal. You can use the common
domain name (putty.org) of PuTTY to browse or download the desired document or tool.
1.3 Version Description
Name Version Quantity Remarks
Storage device Huawei OceanStor Dorado V6 1
Windows OS
Windows Server 2012, Windows Server
2016 --
Recommended
version
Linux OS SUSE, Red Hat, CentOS, EulerOS --
Recommended
version
https://support.huawei.com/enterprise/
HCIA-Storage SmartQoS Scenario-based Practice Page 5
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
2 Scenario-based Practice on SmartQoS
2.1 Course Overview
This course provides case study and scenario-based practices to help trainees consolidate
their knowledge on the use of SmartQoS. SmartQoS is a common advanced storage
technology. Before using SmartQoS, you are advised to learn how to configure basic
storage services.
2.2 Objectives
● To know the application scenarios of SmartQoS
● To be able to configure SmartQoS
2.3 Case Background
Cases in this document are examples only. The actual configurationsmay vary according to actual
environments. For details, see the corresponding product document. The names of storage pools and
LUNs involved in this document can be customized (for example, LUN _XXX) for different trainees if they
use the same device.
A company uses a Huawei OceanStor all-flash storage device to run services. Multiple
LUNs have been created to support different services. LUN_0 mapped to the Linux service
host carries critical services, and LUN_1 and LUN_2 mapped to the Windows host carry
non-critical services. To ensure that LUN_0 can obtain storage resources preferentially, the
company purchases SmartQoS. Help storage engineers get familiar with operations related
to SmartQoS.
The following figure shows the live network topology of the enterprise.
HCIA-Storage SmartQoS Scenario-based Practice Page 6
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Figure 2-1 Network topology
2.4 Tasks
2.4.1 Scenario: Using SmartQoS
Background
SmartQoS is configured to accurately limit the performance of applications and prevent
non-critical applications from contending for too many storage resources.
Question
How do we set indicators (bandwidth and IOPS) to implement traffic control?
Task 1: Configuring SmartQoS
Help the engineer configure SmartQoS.
Step 1 Draw a flowchart for configuring SmartQoS.
Demonstrate how to configure SmartQoS.
[Suggested Procedure]
For details about how to draw a flowchart, see Configure > SmartQoS Feature Guide >
Configuring SmartQoS > Configuration Process in the product documentation.
Step 2 View SmartQoS license information.
HCIA-Storage SmartQoS Scenario-based Practice Page 7
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Before configuring SmartQoS, ensure that the permission for using SmartQoS has been
granted. Help the engineer check SmartQoS license information.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartQoS Feature
Guide > Configuring SmartQoS > Checking the SmartQoS License in the product
documentation.
For details about operations on the CLI, see Reference > Command Reference > License
Management Commands > license > show license in the product documentation.
For details about how to log in to the CLI of the storage system, see Reference > Advanced
O&M Command Reference > CLI Use Guidance > Logging In to the CLI of the Storage
System in the product documentation.
Step 3 Monitor service performance.
Obtain the I/O characteristics of LUNs by using the service monitoring function of storage
systems and use these characteristics as a basis of SmartQoS policies. View the total IOPS
of LUNs.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartQoS Feature
Guide > Configuring SmartQoS > Monitoring Application Performance in the product
documentation.
Step 4 Create a SmartQoS policy.
After analyzing the performance monitoring data, the engineer concludes that the IOPS of
LUN_1 should be within 200. Help the engineer configure SmartQoS policy Policy01 to set
the maximum IOPS to 200.
HCIA-Storage SmartQoS Scenario-based Practice Page 8
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartQoS Feature
Guide > Configuring SmartQoS > Creating a SmartQoS Policy in the product
documentation.
Question
Why can the SmartQoS policy be adjusted based on the performance data of LUNs?
Task 2: Managing SmartQoS
After configuring SmartQoS, the engineer needs to manage SmartQoS to adjust data flows,
thereby properly allocating storage resources. Explain to the engineer how to manage
SmartQoS.
Step 1 Add a control object.
On DeviceManager, you can add new control objects to the SmartQoS policy as required.
Add control object LUN_2 to Policy01.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartQoS Feature
Guide > Managing SmartQoS > Adding a Control Object in the product documentation.
Step 2 Remove a control object.
On DeviceManager, you can remove control objects from a SmartQoS policy as required.
Remove control object LUN_2 from Policy01.
HCIA-Storage SmartQoS Scenario-based Practice Page 9
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartQoS Feature
Guide > Managing SmartQoS > Removing a Control Object in the product
documentation.
Step 3 Activate and deactivate a SmartQoS policy.
A SmartQoS policy can take effect according to its triggering policy after it is activated. In a
storage system where only one type of applications is available or all LUNs or LUN groups
need the same amount of resources, you can deactivate SmartQoS policies because
adjusting and controlling performance of I/O classes is unnecessary. Help the engineer get
familiar with the activation and deactivation of Policy01.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartQoS Feature
Guide > Managing SmartQoS > Activating Creating a SmartQoS Policy and
Deactivating a SmartQoS Policy in the product documentation.
Step 4 Modify a SmartQoS policy.
In off-peak hours, the engineer considers that the IOPS limit for non-critical services can be
adjusted to 300. Help the engineer change the maximum IOPS limit to 300 for Policy01.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartQoS Feature
Guide > Managing SmartQoS > Modifying a SmartQoS Policy in the product
documentation.
Step 5 Delete a SmartQoS policy.
As the company develops, critical services are migrated to other storage devices and do not
need to compete for resources with non-critical services. Therefore, the original SmartQoS
policy can be deleted. Help the engineer delete SmartQoS policy Policy01.
HCIA-Storage SmartQoS Scenario-based Practice Page 10
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartQoS Feature
Guide > Managing SmartQoS > Deleting a SmartQoS Policy in the product
documentation.
Discussion
In a storage system, what are the performance indicators and their applicable scenarios?
2.5 Summary and Conclusion
My Opinion:
_________________________________________________________________________________________
_________________________________________________________________________________________
__________________________________________________________________
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Storage Certification Training
HCIA-Storage
HyperSnap
Scenario-based Practice
(For Trainees)
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information,and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129
People's Republic of China
Website: http://e.huawei.com
http://e.huawei.com/
HCIA-Storage HyperSnap Scenario-based Practice Page 3
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Certificate System
Huawei Certification follows the "platform + ecosystem" development strategy,
which is a new collaborative architecture of ICT infrastructure based on
"Cloud-Pipe-Terminal". Huawei has set up a complete certification system consisting of
three categories: ICT infrastructure certification, Platform and Service certification and
ICT vertical certification, and grants Huawei certification the only all-range technical
certification in the industry.
Huawei offers three levels of certification: Huawei Certified ICT Associate (HCIA),
Huawei Certified ICT Professional (HCIP), and Huawei Certified ICT Expert (HCIE).
Huawei Certified ICT Associate-Storage (HCIA-Storage) is designed for Huawei
engineers, students and ICT industry personnel. HCIA-Storage covers knowledge about
storage technology trends, storage basic technologies, storage common advanced
technologies, storage business continuity solutions and storage system O&M
management.
The HCIA-Storage certificate system introduces you to the industry and market, helps
you in innovation, and enables you to stand atop the Storage frontiers.
HCIA-Storage HyperSnap Scenario-based Practice Page 4
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
HCIA-Storage HyperSnap Scenario-based Practice Page 5
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Contents
1 References and Tools ............................................................................................................. 6
1.1 References ........................................................................................................................................................................ 6
1.2 Software Tools ................................................................................................................................................................ 6
1.3 Version Description ....................................................................................................................................................... 6
2 Scenario-based Practice on HyperSnap ............................................................................. 7
2.1 Course Overview ............................................................................................................................................................ 7
2.2 Objectives ......................................................................................................................................................................... 7
2.3 Case Background ........................................................................................................................................................... 7
2.4 Tasks ................................................................................................................................................................................... 8
2.4.1 Scenario: Using HyperSnap ..................................................................................................................................... 8
2.5 Summary and Conclusion ......................................................................................................................................... 12
HCIA-Storage HyperSnap Scenario-based Practice Page 6
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
1 References and Tools
1.1 References
The commands, documents, and document paths listed in this document are for reference
only. The actual commands, documents, and document paths may vary.
Huawei OceanStor Dorado V6 Product Documentation
The specifications of HyperSnap vary with products. For details, see the product documentation of the
desired product model. You can log in to Huawei's technical support website
(https://support.huawei.com/enterprise/) and input the name of a document or tool in the search box to
search for, browse, and download it.
1.2 Software Tools
PuTTY
You are advised to use the open-source software PuTTY to log in to a terminal. You can use the common
domain name (putty.org) of PuTTY to browse or download the desired document or tool.
1.3 Version Description
Name Version Quantity Remarks
Storage device Huawei OceanStor Dorado V6 1
Windows OS Windows Server 2012, Windows
Server 2016
-- Recommended
version
Linux OS SUSE, Red Hat, CentOS, EulerOS -- Recommended
version
https://support.huawei.com/enterprise/
HCIA-Storage HyperSnap Scenario-based Practice Page 7
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
2 Scenario-based Practice on HyperSnap
2.1 Course Overview
This course provides case study and scenario-based practices to help trainees consolidate
their knowledge on the use of HyperSnap. HyperSnap is a common advanced storage
technology. Before using HyperSnap, you are advised to learn how to configure basic
storage services.
2.2 Objectives
● To be able to configure a snapshot of a LUN.
● To be able to roll back data using a snapshot.
2.3 Case Background
Cases in this document are examples only. The actual configurations may vary according to actual
environments. For details, see the corresponding product document. The names of storage pools and
LUNs involved in this document can be customized (for example, LUN _XXX) for different trainees if they
use the same device.
An enterprise has an OceanStor all-flash storage device. To shorten the backup window,
the enterprise purchased HyperSnap. Help storage engineers get familiar with operations
related to HyperSnap.
The following figure shows the live network topology of the enterprise.
HCIA-Storage HyperSnap Scenario-based Practice Page 8
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Figure 2-1 Network topology
2.4 Tasks
2.4.1 Scenario: Using HyperSnap
Background
A 5 GB LUN named LUN_SOUR has been created and mapped to a host. A file system has
been created for LUN_SOUR on the host and has been mounted. Two text files A.txt and
B.txt containing characters have been written to LUN_SOUR.
Question
What are COW and ROW?
Task 1: Configuring a Snapshot of a LUN
After a snapshot is created for a source LUN, the snapshot stores data of the source LUN at
the snapshot creation time point.
Step 1 Draw a flowchart for configuring HyperSnap.
Demonstrate how to configure HyperSnap.
[Suggested Procedure]
HCIA-Storage HyperSnap Scenario-based Practice Page 9
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
For details about how to draw the flowchart, see Configure > HyperSnap Feature Guide >
Configuring and Managing Snapshots of LUNs > Configuring a Snapshot > Flowchart
of the product documentation.
Step 2 View HyperSnap license information.
Before configuring HyperSnap, ensure that the permission for using HyperSnap has been
granted. Help the engineer check HyperSnap license information.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperSnapFeature
Guide > Configuring and Managing Snapshots of LUNs > Configuring a Snapshot >
Checking the License of the product documentation.
For details about operations on the CLI, see Reference > Command Reference > License
Management Commands > license > show license of the product documentation.
Step 3 Create a snapshot.
Use LUN_SOUR as the source LUN. Help the engineer create a snapshot named Snap01
for LUN_SOUR and set the rollback rate to the Highest.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperSnap Feature
Guide > Configuring and Managing Snapshots of LUNs > Configuring a Snapshot >
Creating a Snapshot of the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Data
Protect Management Commands > lun_snapshot > create snapshot general of the
product documentation.
Question
Why can a snapshot of a LUN be used to recover data without saving all copies of the
source LUN?
HCIA-Storage HyperSnap Scenario-based Practice Page 10
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Task 2: Rolling Back Data Using a Snapshot
After configuring the snapshot of the LUN, the engineer mistakenly modifies data on the
source LUN. In this case, the engineer needs to roll back data on the source LUN using the
snapshot. Modify the files in LUN_SOUR and explain how to roll back the data using the
snapshot.
Step 1 Check the snapshot status.
Before the rollback, check whether the snapshot is activated.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperSnap Feature
Guide > Configuring and Managing Snapshots of LUNs > Managing Snapshots of
LUNs > Viewing Snapshots of the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Data
Protect Management Commands > lun_snapshot > show snapshot available_snapshot
of the product documentation.
Step 2 Cancel the mapping between the source LUN and the host.
To ensure data consistency, stop host services before data rollback. Help the engineer
cancel the mapping between LUN_SOUR and the host.
[Suggested Procedure]
For details, see Configure > Basic Storage Service Configuration Guide > Managing
Basic Storage Services > Managing LUNs > Unmapping a LUN of the product
documentation.
Step 3 Start data rollback.
Use Snap01 to roll back data on LUN_SOUR. After the rollback is complete, map
LUN_SOUR to the host again, mount the file system, and check whether the data on
LUN_SOUR has been rolled back to the time point when the snapshot was activated.
HCIA-Storage HyperSnap Scenario-based Practice Page 11
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperSnap Feature
Guide > Configuring and Managing Snapshots of LUNs > Managing Snapshots of
LUNs > Rolling Back a Snapshot of the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Data
Protect Management Commands > lun_snapshot > change snapshot restore of the
product documentation.
Question
For a writable snapshot, if data on the snapshot LUN is modified, can the snapshot LUN be
used to restore data on the source LUN?
Task 3: Managing Snapshots
After configuring the snapshot and rolling back data using the snapshot, the engineer
wants to learn about routine snapshot management operations, such as managing and
modifying snapshot properties. Help the engineer get familiar with these operations.
Step 1 Modify the snapshot.
View the snapshot information, modify the snapshot name to Snap_Test, and set the
rollback rate to Low.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperSnap Feature
Guide > Configuring and Managing Snapshots of LUNs > Managing Snapshots of
LUNs > Modifying a Snapshot of the product documentation.
For details about operations on the CLI, see Configure > HyperSnap Feature Guide >
Configuring and Managing Snapshots of LUNs > Managing Snapshots of LUNs >
Modifying a Snapshot of the product documentation.
Step 2 Delete the snapshot.
After completing the preceding operations, delete the snapshot.
HCIA-Storage HyperSnap Scenario-based Practice Page 12
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperSnap Feature
Guide > Configuring and Managing Snapshots of LUNs > Managing Snapshots of
LUNs > Deleting a Snapshot of the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Data
Protect Management Commands > lun_snapshot > delete snapshot of the product
documentation.
Discussion
Why can the Huawei OceanStor all-flash storage system implement lossless performance
using the ROW technology?
2.5 Summary and Conclusion
My Opinion:
_________________________________________________________________________________________
_________________________________________________________________________________________
__________________________________________________________________
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Storage Certification Training
HCIA-Storage
HyperClone
Scenario-based Practice
(For Trainees)
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129
People's Republic of China
Website: http://e.huawei.com
http://e.huawei.com/
HCIA-Storage HyperClone Scenario-based Practice Page 1
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Certificate System
Huawei Certification follows the "platform + ecosystem" development strategy,
which is a new collaborative architecture of ICT infrastructure based on
"Cloud-Pipe-Terminal". Huawei has set up a complete certification system consisting of
three categories: ICT infrastructure certification, Platform and Service certification and
ICT vertical certification, and grants Huawei certification the only all-range technical
certification in the industry.
Huawei offers three levels of certification: Huawei Certified ICT Associate (HCIA),
Huawei Certified ICT Professional (HCIP), and Huawei Certified ICT Expert (HCIE).
Huawei Certified ICT Associate-Storage (HCIA-Storage) is designedfor Huawei
engineers, students and ICT industry personnel. HCIA-Storage covers knowledge about
storage technology trends, storage basic technologies, storage common advanced
technologies, storage business continuity solutions and storage system O&M
management.
The HCIA-Storage certificate system introduces you to the industry and market, helps
you in innovation, and enables you to stand atop the Storage frontiers.
HCIA-Storage HyperClone Scenario-based Practice Page 2
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
HCIA-Storage HyperClone Scenario-based Practice Page 3
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Contents
1 References and Tools ............................................................................................................. 4
1.1 References ........................................................................................................................................................................ 4
1.2 Software Tools ................................................................................................................................................................ 4
1.3 Version Description ....................................................................................................................................................... 4
2 Scenario-based Practice on HyperClone ........................................................................... 5
2.1 Course Overview ............................................................................................................................................................ 5
2.2 Objectives ......................................................................................................................................................................... 5
2.3 Case Background ........................................................................................................................................................... 5
2.4 Tasks ................................................................................................................................................................................... 6
2.4.1 Scenario: Using HyperClone ................................................................................................................................... 6
2.5 Summary and Conclusion ........................................................................................................................................... 9
HCIA-Storage HyperClone Scenario-based Practice Page 4
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
1 References and Tools
1.1 References
The commands, documents, and document paths listed in this document are for reference
only. The actual commands, documents, and document paths may vary.
Huawei OceanStor Dorado V6 Product Documentation
The specifications of HyperClone vary with products. For details, see the product documentation of the
desired product model. You can log in to Huawei's technical support website
(https://support.huawei.com/enterprise/) and input the name of a document or tool in the search box to
search for, browse, and download it.
1.2 Software Tools
PuTTY
You are advised to use the open-source software PuTTY to log in to a terminal. You can use the common
domain name (putty.org) of PuTTY to browse or download the desired document or tool.
1.3 Version Description
Name Version Quantity Remarks
Storage device Huawei OceanStor Dorado V6 1
Windows OS Windows Server 2012, Windows
Server 2016
-- Recommended version
Linux OS SUSE, Red Hat, CentOS, EulerOS -- Recommended version
https://support.huawei.com/enterprise/
HCIA-Storage HyperClone Scenario-based Practice Page 5
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
2 Scenario-based Practice on HyperClone
2.1 Course Overview
This course provides case study and scenario-based practices to help trainees consolidate
their knowledge on the use of HyperClone. HyperClone is a common advanced storage
technology. Before using HyperClone, you are advised to learn how to configure basic
storage services.
2.2 Objectives
● To be able to configure HyperClone
● To understand how to manage clones
2.3 Case Background
Cases in this document are examples only. The actual configuration may vary according to actual
environments. For details, see the corresponding product document. The names of storage pools and
LUNs involved in this document can be customized (for example, LUN _XXX) for different trainees if they
use the same device.
An enterprise has a Huawei OceanStor all-flash storage device and has purchased the
HyperClone license. Help storage engineers get familiar with operations related to
HyperClone.
The following figure shows the live network topology of the enterprise.
HCIA-Storage HyperClone Scenario-based Practice Page 6
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Figure 2-1 Network topology
2.4 Tasks
2.4.1 Scenario: Using HyperClone
Background
A 5 GB LUN named LUN_SOUR has been created and mapped to a host. A file system has
been created for LUN_SOUR on the host and has been mounted. A text file A.txt
containing characters has been written to LUN_SOUR.
Question
What is the difference between HyperClone and HyperSnap?
Task 1: Configuring HyperClone
Step 1 Draw a flowchart for configuring HyperClone.
Demonstrate how to configure HyperClone.
[Suggested Procedure]
For details about how to draw a flowchart, see Configure > HyperClone Feature Guide >
Configuring HyperClone > Configuration Process in the product documentation.
Step 2 View HyperClone license information.
HCIA-Storage HyperClone Scenario-based Practice Page 7
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Before configuring HyperClone, ensure that the permission for using HyperClone has been
granted. Help the engineer check HyperClone license information.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperClone Feature
Guide > Configuring HyperClone > Checking the License in the product documentation.
For details about operations on the CLI, see Reference > Command Reference > License
Management Commands > license > show license in the product documentation.
Step 3 Create a clone pair.
Help the engineer create a clone pair for LUN_SOUR. Set the target LUN name to
LUN_DEST.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperClone Feature
Guide > Configuring HyperClone > Creating a Clone Pair in the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Data
Protection Management Commands > hyper_copy > create clone general in the
product documentation.
Question
In Huawei OceanStor all-flash storage systems, what will happen if the capacity of the
source LUN is inconsistent with that of the target LUN in a clone pair?
Task 2: Managing HyperClone
In practice, unexpected situations may occur during the use of HyperClone, for example,
the service load increases sharply during clone synchronization. In such cases, the engineer
should pause the synchronization and resume it when the service load is light. Help the
engineer understand how to pause and resume clone synchronization.
Step 1 Pause synchronization.
Help the engineer pause clone synchronization.
HCIA-Storage HyperClone Scenario-based Practice Page 8
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperClone Feature
Guide > Managing Clone Pairs >Pausing Synchronizing or Reversely Synchronizing a
Clone Pair in the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Data
Protection Management Commands > hyper_copy > change clone restore in the
product documentation.
Step 2 Resume synchronization.
Help the engineer resume clone synchronization.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperClone Feature
Guide > Managing Clone Pairs > Resuming Synchronizing or Reversely Synchronizing a
Clone Pair in the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Data
Protection Management Commands > hyper_copy > change clone restore in the
product documentation.
Step 3 Delete a clone pair.
After completing the preceding operations, delete the clone pair.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > HyperClone Feature
Guide > Managing Clone Pairs > Deleting a Clone Pair in the product documentation.
HCIA-Storage HyperClone Scenario-based Practice Page 9
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
For details about operations on the CLI, see Reference > Command Reference > Data
Protection Management Commands > hyper_copy > delete clone in the product
documentation.
Discussion
After clone synchronization is complete, can users perform synchronization again?
2.5 Summary and Conclusion
My Opinion:
_________________________________________________________________________________________
_________________________________________________________________________________________
__________________________________________________________________
Huawei Storage Certification Training
HCIA-Storage
SmartMigration
Scenario-based Practice
(For Trainees)
HUAWEI TECHNOLOGIES CO., LTD.
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129
People's Republic of China
Website: http://e.huawei.com
http://e.huawei.com/
HCIA-Storage SmartMigration Scenario-based Practice Page 1
Huawei Certificate System
Huawei Certification follows the "platform + ecosystem" development strategy,
which is a new collaborative architecture of ICT infrastructure based on
"Cloud-Pipe-Terminal". Huawei has set up a complete certification system consisting of
three categories: ICT infrastructure certification, Platform and Service certification and
ICT vertical certification, and grants Huawei certification the only all-range technical
certification in the industry.
Huawei offers three levels of certification: Huawei Certified ICT Associate (HCIA),
Huawei Certified ICT Professional (HCIP), and Huawei Certified ICT Expert (HCIE).
Huawei Certified ICT Associate-Storage (HCIA-Storage) is designed for Huawei
engineers, students and ICT industry personnel. HCIA-Storage covers knowledge about
storage technology trends, storage basic technologies, storage common advanced
technologies, storage business continuity solutions and storage system O&M
management.
The HCIA-Storage certificate system introduces you to the industry and market, helps
you in innovation, and enables you to stand atop the Storage frontiers.
HCIA-Storage SmartMigration Scenario-based Practice Page 2
HCIA-Storage SmartMigration Scenario-based Practice Page 3
Contents
1 References and Tools ............................................................................................................. 4
1.1 References ........................................................................................................................................................................ 4
1.2 Software Tools ................................................................................................................................................................ 4
1.3 Version Description ....................................................................................................................................................... 4
2 Scenario-based Practice on SmartMigration ................................................................... 5
2.1 Course Overview ............................................................................................................................................................ 5
2.2 Objectives ......................................................................................................................................................................... 5
2.3 Case Background ........................................................................................................................................................... 5
2.4 Tasks ................................................................................................................................................................................... 6
2.4.1 Scenario: Using SmartMigration ........................................................................................................................... 6
2.5 Summary and Conclusion ........................................................................................................................................... 9
HCIA-Storage SmartMigration Scenario-based Practice Page 4
1 References and Tools
1.1 References
The commands, documents, and document paths listed in this document are for reference
only. The actual commands, documents, and document paths may vary.
Huawei OceanStor Dorado V6 Product Documentation
The specifications of SmartMigration vary with products. For details, see the product documentation of the
desired product model. You can log in to Huawei's technical support website
(https://support.huawei.com/enterprise/) and input the name of a document or tool in the search box to
search for, browse, and download the desired document or tool.
1.2 Software Tools
PuTTY
You are advised to use the open-source software PuTTY to log in to a terminal. You can use the common
domain name (putty.org) of PuTTY to browse or download the desired document or tool.
1.3 Version Description
Name Version Quantity Remarks
Storage device Huawei OceanStor Dorado V6 1
Windows OS
Windows Server 2012, Windows
Server 2016 --
Recommended
version
Linux OS SUSE, Red Hat, CentOS, EulerOS --
Recommended
version
https://support.huawei.com/enterprise/
HCIA-Storage SmartMigration Scenario-based Practice Page 5
2 Scenario-based Practice on
SmartMigration
2.1 Course Overview
This course provides casestudy and scenario-based practices to help trainees consolidate
their knowledge on the use of SmartMigration. SmartMigration is a common advanced
storage technology. Before using SmartMigration, you are advised to learn how to
configure basic storage services.
2.2 Objectives
● To know the application scenarios of SmartMigration
● To be able to configure SmartMigration
2.3 Case Background
Cases in this document are examples only. The actual configurations may vary according to actual
environments. For details, see the corresponding product document. The names of storage pools and
LUNs involved in this document can be customized (for example, LUN _XXX) for different trainees if they
use the same device.
An enterprise has a Huawei OceanStor all-flash storage device and purchases
SmartMigration for data migration. Help storage engineers get familiar with operations
related to SmartMigration.
The following figure shows the live network topology of the enterprise.
HCIA-Storage SmartMigration Scenario-based Practice Page 6
Figure 2-1 Network topology
2.4 Tasks
2.4.1 Scenario: Using SmartMigration
Background
The enterprise creates two storage pools named SP_ SOUR and SP_DEST. A storage
engineer maps a 5 GB LUN named LUN_SOUR in storage pool SP_SOUR to the host. A file
system has been created for LUN_SOUR on the host and has been mounted. A text file
A.txt containing characters has been written to LUN_SOUR. Data in LUN_SOUR is to be
migrated to LUN_DEST.
Question
What are the differences between SmartMigration and HyperClone?
Task 1: Configuring SmartMigration
Help the engineer configure SmartMigration.
Step 1 Draw a flowchart for configuring SmartMigration.
Demonstrate how to configure SmartMigration.
HCIA-Storage SmartMigration Scenario-based Practice Page 7
[Suggested Procedure]
For details about how to draw a flowchart, see Configure > SmartMigration Feature
Guide > Configuring SmartMigration Between Storage Systems > Configuration
Process in the product documentation.
Step 2 View SmartMigration license information.
Before configuring SmartMigration, ensure that the permission for using SmartMigration
has been granted. Help the engineer check SmartMigration license information.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartMigration Feature
Guide > Configuring SmartMigration Between Storage Systems > Checking the
License File in the product documentation.
For details about operations on the CLI, see Reference > Command Reference > License
Management Commands > license > show license in the product documentation.
Step 3 Create a SmartMigration task.
Help the engineer create a SmartMigration task. Use LUN_SOUR as the source LUN and
select SP_DEST as the storage pool where the target LUN resides. Set the migration rate to
Low and split mode to Manual.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartMigration Feature
Guide > Configuring SmartMigration Between Storage Systems > Creating a
SmartMigration Task in the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Storage
Domain Management Commands > smart_migration > create lun_migration in the
product documentation.
HCIA-Storage SmartMigration Scenario-based Practice Page 8
Step 4 Split a SmartMigration pair.
The target LUN can save the data copy of the source LUN at the split point in time only
after the SmartMigration pair is split. The data copy can be used for application tests for
the enterprise. Help the engineer split the SmartMigration pair and stop the
synchronization between the source LUN and target LUN.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartMigration Feature
Guide > Configuring SmartMigration Between Storage Systems > Splitting a
SmartMigration Pair in the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Storage
Domain Management Commands > smart_migration > change lun_migration_split
consistency in the product documentation.
Question
Can SmartMigration be used to migrate data between heterogeneous storage systems?
Task 2: Managing SmartMigration
After configuring SmartMigration, help the engineer get familiar with snapshot
management operations.
Step 1 Modify the migration rate.
The engineer determines to perform the migration at night when the service load is light. If
the migration rate is Low, the migration may take a long time and affect services in the
daytime. Help the engineer modify the migration rate to Highest.
[Suggested Procedure]
HCIA-Storage SmartMigration Scenario-based Practice Page 9
For details about operations on DeviceManager, see Configure > SmartMigration Feature
Guide > Managing SmartMigration > Modifying the Properties of a SmartMigration
Task in the product documentation.
For details about operations on the CLI, see Reference > Command Reference > Storage
Domain Management Commands > smart_migration > change lun_migration in the
product documentation.
Step 2 Delete a SmartMigration task.
Help the engineer delete the SmartMigration task and redundant LUNs created during the
migration.
[Suggested Procedure]
For details about operations on DeviceManager, see Configure > SmartMigration Feature
Guide > Managing SmartMigration > Deleting a SmartMigration Task in the product
documentation.
For details about operations on the CLI, see Reference > Command Reference > Storage
Domain Management Commands > smart_migration > delete lun_migration in the
product documentation.
Discussion
In addition to the migration rate, what property of SmartMigration can be modified?
2.5 Summary and Conclusion
My Opinion:
_________________________________________________________________________________________
_________________________________________________________________________________________
__________________________________________________________________
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Storage Certification Training
HCIA-Storage
Scenario-based Practice of
Storage O&M Management
(For Trainees)
HUAWEI TECHNOLOGIES CO., LTD.
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129
People's Republic of China
Website: http://e.huawei.com
http://e.huawei.com/
HCIA-Storage Scenario-basedPractice of Storage O&M management Page 1
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Huawei Certificate System
Huawei Certification follows the "platform + ecosystem" development strategy,
which is a new collaborative architecture of ICT infrastructure based on
"Cloud-Pipe-Terminal". Huawei has set up a complete certification system consisting of
three categories: ICT infrastructure certification, Platform and Service certification and
ICT vertical certification, and grants Huawei certification the only all-range technical
certification in the industry.
Huawei offers three levels of certification: Huawei Certified ICT Associate (HCIA),
Huawei Certified ICT Professional (HCIP), and Huawei Certified ICT Expert (HCIE).
Huawei Certified ICT Associate-Storage (HCIA-Storage) is designed for Huawei
engineers, students and ICT industry personnel. HCIA-Storage covers knowledge about
storage technology trends, storage basic technologies, storage common advanced
technologies, storage business continuity solutions and storage system O&M
management.
The HCIA-Storage certificate system introduces you to the industry and market, helps
you in innovation, and enables you to stand atop the Storage frontiers.
HCIA-Storage Scenario-based Practice of Storage O&M management Page 2
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
HCIA-Storage Scenario-based Practice of Storage O&M management Page 3
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Contents
1 References and Tools ............................................................................................................. 4
1.1 References ........................................................................................................................................................................ 4
1.2 Software Tools ................................................................................................................................................................ 4
1.3 Version Description ....................................................................................................................................................... 5
2 Scenario-based Practice of Storage O&M management ............................................... 6
2.1 Course Overview ............................................................................................................................................................ 6
2.2 Objectives ......................................................................................................................................................................... 6
2.3 Case Background ........................................................................................................................................................... 6
2.4 Tasks ................................................................................................................................................................................... 7
2.4.1 Scenario 1: Checking Storage Device Status .................................................................................................... 7
2.4.2 Scenario 2: Inspecting Storage Devices on SmartKit ................................................................................... 13
2.5 Summary and Conclusion ......................................................................................................................................... 16
HCIA-Storage Scenario-based Practice of Storage O&M management Page 4
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
1 References and Tools
Commands and documents listed in this document are for reference only. Use the
corresponding commands and documents based on the product version in the actual
environment.
1.1 References
1. Huawei OceanStor Dorado V6 Product Documentation
You can log in to Huawei's technical support website (https://support.huawei.com/enterprise/) and
input the name of a document or tool in the search box to search for, browse, and download the
document or tool.
2. Huawei SmartKit Product Documentation
You can log in to Huawei's technical support website (https://support.huawei.com/enterprise/) and
input the name of a document or tool in the search box to search for, browse, and download the
document or tool.
1.2 Software Tools
1. PuTTY
You are advised to use the open-source software PuTTY to log in to a terminal. You can use the
common domain name (putty.org) of PuTTY to browse or download the corresponding document or
tool.
2. SmartKit
https://support.huawei.com/enterprise/
https://support.huawei.com/enterprise/
HCIA-Storage Scenario-based Practice of Storage O&M management Page 5
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
You can log in to Huawei's technical support website (https://support.huawei.com/enterprise/) and
input the name of a document or tool in the search box to search for, browse, and download the
document or tool.
1.3 Version Description
The recommended platform and software versions in the practice tasks are as follows:
Name Version Quantity Remarks
Huawei
storage
Huawei OceanStor Dorado V6 1 None
SmartKit
software
SmartKit V2R7C00RC1 -- This version or later is
recommended.
Windows OS Windows Server 2012 or
Windows Server 2016
-- Recommended version
Linux OS SUSE, Red Hat, CentOS, or
EulerOS
-- Recommended version
https://support.huawei.com/enterprise/
HCIA-Storage Scenario-based Practice of Storage O&M management Page 6
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
2 Scenario-based Practice of Storage
O&M management
2.1 Course Overview
Based on the previous study, this course provides case study and scenario-based practices
to help trainees consolidate the previous study and equip them with storage device O&M
management capabilities.
2.2 Objectives
● You will be able to use DeviceManager to check devices and collect logs.
● You will be able to use CLI commands to query basic information about device
components and resource pools.
● You will be able to use SmartKit to inspect devices and collect logs.
2.3 Case Background
Cases in this document are examples only. The actual configurations may vary according to actual
environments. For details, see the corresponding product document. The names of storage pools and
LUNs involved in this document can be customized (for example, LUN _XXX) for different trainees if they
use the same device.
An enterprise has completed the acceptance of project X. In this case, multiple Huawei
OceanStor all-flash storage devices (such as Huawei OceanStor Dorado V6) are added to
the data center. Devices have been installed and services have been deployed. Routine
maintenance and management are required to ensure the normal running of devices and
the stability and reliability of services.
If you are the administrator who is responsible for the management and maintenance of
related devices, how do you perform routine inspection?
HCIA-Storage Scenario-based Practice of Storage O&M management Page 7
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
The following figure shows the topology of the enterprise:
Figure 2-1 Network topology
2.4 Tasks
2.4.1 Scenario 1: Checking Storage Device Status
Background
O&M engineers need to periodically inspect storage devices based on the plan, for example,
check whether alarms are generated and check the resource usage, to learn about the
running status of parts in a timely manner. Once a fault occurs on the storage device, the
fault can be detected and rectified as soon as possible to ensure service security and
reliability.
If you arean engineer, how will you perform the inspection?
Question
As a storage O&M engineer, what are the routine maintenance items?
Item Operation Daily maintenance item
Item Operation Weekly maintenance
item
HCIA-Storage Scenario-based Practice of Storage O&M management Page 8
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Task 1: Performing O&M Checks on DeviceManager
Step 1 View device details.
Log in to DeviceManager and view storage system information, such as the health status,
storage version, and ESN.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Manual Inspection > Checking the Running Status of the Storage
Device in the desired product documentation.
Step 2 View alarms.
View the alarm information of a storage system on DeviceManager.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Manual Inspection > Viewing and Handling Alarms in the desired
product documentation.
Step 3 Check the status of parts such as controllers and disks.
On DeviceManager, check the status of controller enclosures, controllers, disks, and ports.
HCIA-Storage Scenario-based Practice of Storage O&M management Page 9
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Manual Inspection > Checking the Running Status of the Storage
Device > Checking the Storage System Inventory in the desired product documentation.
Step 4 Check the status of BBUs and fan modules.
Use DeviceManager to query the status of parts such as BBUs, fan modules, and power
modules.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Manual Inspection > Checking the Running Status of the Storage
Device > Checking Controller Enclosure BBUs/Checking Fan Modules/Checking Power
Modules in the desired product documentation.
Step 5 Check the storage pool status.
On DeviceManager, check the storage pool status and its usage.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Manual Inspection > Checking the Running Status of Services >
Checking Storage Pools in the desired product documentation.
Step 6 Check the storage LUN status.
Use DeviceManager to check the LUN usage and status.
HCIA-Storage Scenario-based Practice of Storage O&M management Page 10
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Manual Inspection > Checking the Running Status of Services >
Checking LUNs in the desired product documentation.
Step 7 Export log files.
Use DeviceManager to export system logs and diagnosis files.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Collecting Storage System Information > Collecting Logs and Alarms
Using DeviceManager > Exporting System Data in the desired product documentation.
Task 2: Performing O&M Checks on the CLI
Step 1 Log in to the storage system.
Log in to the storage system using the CLI.
[Suggested Procedure]
For details, see Installation and Upgrade > Initialization Guide > Logging In to the CLI
in the desired product documentation.
HCIA-Storage Scenario-based Practice of Storage O&M management Page 11
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Note: You can use the IP address of the management network port to log in.
Step 2 Query system information.
Query the storage system information on the CLI.
[Suggested Procedure]
For details, see Reference > Command Reference > Basic Operation Commands >
base > show system general in the desired product documentation.
Step 3 Query parts information.
1. Query the disk information on the CLI.
2. Query the controller information on the CLI.
3. Query the fan module information on the CLI.
4. Query the BBU information on the CLI.
[Suggested Procedure]
For details, see:
1. Reference > Command Reference > Hardware Management Commands > disk >
show disk general;
2. Reference > Command Reference > Hardware Management Commands >
controller > show controller general;
3. Reference > Command Reference > Hardware Management Commands > fan >
show fan;
4. Reference > Command Reference > Hardware Management Commands > bbu >
show bbu general.
Step 4 Query details about a LUN.
Use the CLI to query LUN information.
HCIA-Storage Scenario-based Practice of Storage O&M management Page 12
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
[Suggested Procedure]
For details, see Reference > Command Reference > Storage Domain Management
Commands > lun > show lun general in the desired product documentation.
Step 5 Query storage pool information.
Use the CLI to query storage pool information.
[Suggested Procedure]
For details, see Reference > Command Reference > Storage Domain Management
Commands > storage_pool > show storage_pool general in the desired product
documentation.
Task 3: Managing License Files
Step 1 View license information.
View the license information of a storage system on DeviceManager.
[Suggested Procedure]
Log in to the storage system through DeviceManager and check the license of the storage
system. Pay attention to the license authorization items, expiration time, and licensed
capacity.
HCIA-Storage Scenario-based Practice of Storage O&M management Page 13
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
For details, see Operation and Maintenance > Administrator Guide > Routine
Management > Managing License Files > Viewing an Activated License File in the
desired product documentation.
Step 2 Back up the license file.
Backup the license file using DeviceManager.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Management > Managing License Files > Backing Up an Activated License File in the
desired product documentation.
Step 3 Query license information.
Query license information of the storage system in the CLI.
[Suggested Procedure]
For details, see Reference > Command Reference > License Management Commands >
license > show License in the desired product documentation.
2.4.2 Scenario 2: Inspecting Storage Devices on SmartKit
Background
Due to service requirements, a company adjusts (for example, migration) its storage
devices. O&M engineers need to check the adjusted devices to ensure that the devices are
running properly and collect logs. Check items include the device running status, device
port status, and disk health status.
If you are engineer A, how do you use SmartKit to check storage devices?
Question
What are the typical application scenarios of SmartKit?
HCIA-Storage Scenario-based Practice of Storage O&M management Page 14
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Task 1: Performing Inspection on SmartKit
Step 1 Install the software.
Install SmartKit on the management host. If it has been installed, run it directly.
[Suggested Procedure]
After obtaining the software, double-click the software to start installation, and install the
software as prompted.
Step 2 Run the software.
Run SmartKit.
Note: After the software is started, the system may prompt you to log in. If you have an
account, click Authenticate Now and use the account to log in. If you do not have an
account, select Authenticate Later.
[Suggested Procedure]For details, see Operation and Maintenance > Administrator Guide > Common
Management Software and Access Method > Logging In to the Storage System O&M
Software in the desired product documentation.
Step 3 Add devices.
Add storage devices to be inspected on SmartKit.
[Suggested Procedure]
HCIA-Storage Scenario-based Practice of Storage O&M management Page 15
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Inspection Using SmartKit in the desired product documentation.
Step 4 Inspect devices.
Inspect the newly added devices on SmartKit.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Inspection Using SmartKit in the desired product documentation.
Step 5 Collect logs.
Collect storage device information on SmartKit.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Inspection Using SmartKit in the desired product documentation.
Step 6 (Optional) Check the health of disks.
Analyze disk health on SmartKit.
[Suggested Procedure]
For details, see Operation and Maintenance > Administrator Guide > Routine
Maintenance > Inspection Using SmartKit in the desired product documentation.
HCIA-Storage Scenario-based Practice of Storage O&M management Page 16
Huawei Prorietary and Confidential
Copyright © Huawei Technologies Co,Ltd
Note: If the SmartKit version to be installed is used only in Chinese Mainland, this step may
fail. If the device uses Huawei OceanStor eStor simulator, some information in the analysis
report may be incomplete.
Discussion
What information needs to be collected when a fault occurs on a device?
Information Type Item Description
Basic Information
Fault information
Storage device information
Networking information
Application server information
2.5 Summary and Conclusion
My Opinion:
_________________________________________________________________________________________
_________________________________________________________________________________________
__________________________________________________________________
1 References and Tools
1.1 References
1.2 Software Tools
1.3 Version Description
2 Scenario-based Practice of Storage Fundamentals
2.1 Course Overview
2.2 Objectives
2.3 Case Background
2.4 Tasks
Scenario 1: Requirement Analysis, Planning, and Design
Scenario 2: Initial Configuration
Scenario 3: Basic Service Planning and Configuration
2.5 Summary and Conclusion
1 References and Tools
1.1 References
1.2 Software Tools
1.3 Version Description
2 Scenario-based Practice on SmartQoS
2.1 Course Overview
2.2 Objectives
2.3 Case Background
2.4 Tasks
2.4.1 Scenario: Using SmartQoS
2.5 Summary and Conclusion
1 References and Tools
1.1 References
1.2 Software Tools
1.3 Version Description
2 Scenario-based Practice on HyperSnap
2.1 Course Overview
2.2 Objectives
2.3 Case Background
2.4 Tasks
2.4.1 Scenario: Using HyperSnap
2.5 Summary and Conclusion
1 References and Tools
1.1 References
1.2 Software Tools
1.3 Version Description
2 Scenario-based Practice on HyperClone
2.1 Course Overview
2.2 Objectives
2.3 Case Background
2.4 Tasks
2.4.1 Scenario: Using HyperClone
2.5 Summary and Conclusion
1 References and Tools
1.1 References
1.2 Software Tools
1.3 Version Description
2 Scenario-based Practice on SmartMigration
2.1 Course Overview
2.2 Objectives
2.3 Case Background
2.4 Tasks
2.4.1 Scenario: Using SmartMigration
2.5 Summary and Conclusion
1 References and Tools
1.1 References
1.2 Software Tools
1.3 Version Description
2 Scenario-based Practice of Storage O&M management
2.1 Course Overview
2.2 Objectives
2.3 Case Background
2.4 Tasks
2.4.1 Scenario 1: Checking Storage Device Status
2.4.2 Scenario 2: Inspecting Storage Devices on SmartKit
2.5 Summary and Conclusion