SYMMETRIC STORAGE VIRTUALISATION IN THE NETWORK

Similar documents
In contrast to symmetric virtualisation, in asymmetric virtualisation the data flow is separated from the control flow. This is achieved by moving

Introduction 1.1 SERVER-CENTRIC IT ARCHITECTURE AND ITS LIMITATIONS

Definition of RAID Levels

A GPFS Primer October 2005

SYSTEM UPGRADE, INC Making Good Computers Better. System Upgrade Teaches RAID

vsan 6.6 Performance Improvements First Published On: Last Updated On:

goals monitoring, fault tolerance, auto-recovery (thousands of low-cost machines) handle appends efficiently (no random writes & sequential reads)

CSCI 4717 Computer Architecture

After the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning

Lessons learned implementing a multithreaded SMB2 server in OneFS

RAIDIX Data Storage Solution. Clustered Data Storage Based on the RAIDIX Software and GPFS File System

File Management. Chapter 12

IBM Spectrum NAS. Easy-to-manage software-defined file storage for the enterprise. Overview. Highlights

CLOUD COMPUTING IT0530. G.JEYA BHARATHI Asst.Prof.(O.G) Department of IT SRM University

Current Topics in OS Research. So, what s hot?

RAID SEMINAR REPORT /09/2004 Asha.P.M NO: 612 S7 ECE

A Thorough Introduction to 64-Bit Aggregates

An Introduction to GPFS

Sistemi in Tempo Reale

Finding a Needle in a Haystack. Facebook s Photo Storage Jack Hartner

Computer Organization. Chapter 16

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

itx with RAID-RT Robust Raid Technology Whitepaper

Cloudian Sizing and Architecture Guidelines

CTS2134 Introduction to Networking. Module 09: Network Management

Storage Integration with Host-based Write-back Caching

The Google File System

Storage Area Networks SAN. Shane Healy

TANDBERG Management Suite - Redundancy Configuration and Overview

Data warehouse and Data Mining

High Performance Computing Course Notes High Performance Storage

Gavin Payne Senior Consultant.

Administering VMware vsan. 17 APR 2018 VMware vsphere 6.7 VMware vsan 6.7

Veritas Storage Foundation for Windows by Symantec

Administering VMware vsan. Modified on October 4, 2017 VMware vsphere 6.5 VMware vsan 6.6.1

Administering VMware Virtual SAN. Modified on October 4, 2017 VMware vsphere 6.0 VMware vsan 6.2

Research Article Mobile Storage and Search Engine of Information Oriented to Food Cloud

CA485 Ray Walshe Google File System

The General Parallel File System

The term "physical drive" refers to a single hard disk module. Figure 1. Physical Drive

Microsoft Administering Microsoft SQL Server 2012/2014 Databases. Download Full version :

Organisasi Sistem Komputer

Google Cloud Platform for Systems Operations Professionals (CPO200) Course Agenda

Installation and Cluster Deployment Guide for VMware

Introduction CHAPTER. Exercises

It also performs many parallelization operations like, data loading and query processing.

EMC Celerra CNS with CLARiiON Storage

HPC File Systems and Storage. Irena Johnson University of Notre Dame Center for Research Computing

SONAS Best Practices and options for CIFS Scalability

The Google File System

A Thorough Introduction to 64-Bit Aggregates

Installation and Cluster Deployment Guide for VMware

The File Systems Evolution. Christian Bandulet, Sun Microsystems

DELL POWERVAULT MD FAMILY MODULAR STORAGE THE DELL POWERVAULT MD STORAGE FAMILY

Step into the future. HP Storage Summit Converged storage for the next era of IT

IBM Europe Announcement ZG , dated October 23, 2007

Lecture 24: Virtual Memory, Multiprocessors

Nexenta Technical Sales Professional (NTSP)

CS /29/18. Paul Krzyzanowski 1. Question 1 (Bigtable) Distributed Systems 2018 Pre-exam 3 review Selected questions from past exams

vsan Planning and Deployment Update 1 16 OCT 2018 VMware vsphere 6.7 VMware vsan 6.7

Distributed Systems Pre-exam 3 review Selected questions from past exams. David Domingo Paul Krzyzanowski Rutgers University Fall 2018

SQA Advanced Unit specification. General information. Network Server Operating Systems. Unit code: HP2W 48. Unit purpose

White Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018

Dynamic Load-Balanced Multicast for Data-Intensive Applications on Clouds 1

Comparison: Microsoft Logical Disk Manager (LDM) and VERITAS Volume Manager

Google File System. Arun Sundaram Operating Systems

Example Implementations of File Systems

CHALLENGES OF STORAGE APPLIANCE SCALING

The Google File System

CS 111. Operating Systems Peter Reiher

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Authors : Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung Presentation by: Vijay Kumar Chalasani

Simplified Storage Migration for Microsoft Cluster Server

Petal and Frangipani

RAID: The Innovative Data Storage Manager

Operating Systems. Operating Systems

Challenges in making Lustre systems reliable

Isilon Scale Out NAS. Morten Petersen, Senior Systems Engineer, Isilon Division

Media Inventory Management. by Anthony DuBoyce, P.Eng IMMAD ECVS Systems Integration

Virtualizing SQL Server 2008 Using EMC VNX Series and VMware vsphere 4.1. Reference Architecture

StorageCraft OneXafe and Veeam 9.5

Assessing performance in HP LeftHand SANs

Guide to SATA Hard Disks Installation and RAID Configuration

CXS Citrix XenServer 6.0 Administration

CS60021: Scalable Data Mining. Sourangshu Bhattacharya

Flexible Array Storage Tool. User s Guide

Effective SAN Management

GFS: The Google File System. Dr. Yingwu Zhu

Virtualization of the MS Exchange Server Environment

Survey Of Volume Managers

NEC M100 Frequently Asked Questions September, 2011

Boundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:

RAID5 SATA II Host Adapter

SMD149 - Operating Systems - File systems

Downtime Prevention Buyer s Guide. 6 QUESTIONS to help you choose the right availability protection for your applications

Parallel File Systems for HPC

Assignment 5. Georgia Koloniari

White Paper: Clustering of Servers in ABBYY FlexiCapture

Technical Note. Dell/EMC Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

1993 Paper 3 Question 6

Transcription:

SYMMETRIC STORAGE VIRTUALISATION IN THE NETWORK The symmetric and asymmetric virtualisation models are representatives of storage virtualization in the network. In both approaches it is possible to perform virtualisation both on block and on file level. In both models the virtualisation entity that undertakes the separation between physical and logical storage is placed in the storage network in the form of a specialised server or a device. This holds all the meta-information needed for the virtualisation. The virtualisation entity is therefore also called the metadata controller. Its duties also include the management of storage resources and the control of all storage functions that are offered in addition to virtualisation. Symmetric and asymmetric virtualisation differ primarily with regard to their distribution of data and control flow. Data flow is the transfer of the application data between the servers and storage devices. The control flow consists of all metadata and control information necessary for virtualisation between virtualisation entity and storage devices and servers. In symmetric storage virtualisation the data flow and the control flow travel down the same path. By contrast, in asymmetric virtualisation the data flow is separated from the control flow. 6.7.1 Symmetric storage virtualisation In symmetric storage virtualisation the data and control flow go down the same path (Figure 5.15). This means that the abstraction from physical to logical storage necessary for virtualisation must take place within the data flow. As a result, the metadata controller is positioned precisely in the data flow between server and storage devices, which is why symmetric virtualisation is also called in-band virtualization.

Figure 6.15 In symmetric virtualisation, data and control flow travel down the same path. The abstraction from physical to logical storage takes place within the data stream. In addition to the control of the virtualisation, all data between servers and storage devices now flow through the metadata controller. To this end virtualisation is logically structured in two layers: the layer for the management of the logical volumes and the data access layer (Figure 5.16): 1. The volume management layer is responsible for the management and configuration of the storage devices that can be accessed directly or via a storage network and it provides the aggregation of these resources into logical disks. 2. The

data access layer makes the logical drives available for access either on block or file level, depending upon what degree of abstraction is required. These logical drives can thus be made available to the application servers by means of appropriate protocols. In the case of virtualisation on block level, this occurs in the form of a virtual disk and in the case of virtualisation on file level it takes place in the form of a file system.

Figure 6.16 In symmetric virtualisation the metadata controller consists of a data access layer and a volume management layer. In symmetric virtualisation all data flow through the metadata controller, which means that this represents a potential bottleneck. To increase performance, therefore, the metadata controller is upgraded by the addition of a cache. With the use of caching and symmetric virtualisation it is even possible to improve the performance of an existing storage network as long as exclusively write-intensive applications are not used. A further issue is fault-tolerance. A single metadata controller represents a single point of failure. The use of cluster technology (Section 6.3.2) makes it possible to remove the single point of failure by using several metadata controllers in parallel. In addition, a corresponding load distribution provides a performance increase. However, a configuration failure or a software failure of that cluster can lead to data loss on all virtualised resources. In the case of a network-based virtualisation spanning several servers and storage devices, this can halt the activity of a complete data centre (Section 6.3.4). Thus the advantages of symmetric virtualisation are evident: The application servers can easily be provided with data access both on block and file level, regardless of the underlying physical storage devices. The administrator has complete control over which storage resources are available to which servers at a central point. This increases security and eases the administration. Assuming that the appropriate protocols are supported, symmetric virtualisation does not place any limit on specific operating system platforms. It can thus also be used in heterogeneous environments. The performance of existing storage networks can be improved by the use of caching and clustering in the metadata controllers. The use of a metadata controller means that techniques such as snapshots or mirroring can be implemented in a simple manner, since they control the storage

access directly. They can also be used on storage devices such as JBODs or simple RAID arrays that do not provide to these techniques themselves. The disadvantages of a symmetric virtualisation are: Each individual metadata controller must be administered. If several metadata controllers are used in a cluster arrangement, then the administration is relatively complex and time-consuming particularly due to the cross-computer data access layer. This disadvantage can, however, be reduced by the use of a central administration console for the metadata controller. Several controllers plus cluster technology are indispensable to guarantee the faulttolerance of data access. As an additional element in the data path, the controller can lead to performance problems, which makes the use of caching or load distribution over several controllers indispensable. It can sometimes be difficult to move the data between storage devices if this is managed by different metadata controllers.