+ All Categories
Home > Documents > SAN_Basics.ppt

SAN_Basics.ppt

Date post: 28-Oct-2015
Category:
Upload: deepaksharma15
View: 21 times
Download: 0 times
Share this document with a friend
Description:
SAN Fundas
Popular Tags:
65
VERITAS Technical Support Basic Fibre Channel & Storage Area Networking
Transcript
Page 1: SAN_Basics.ppt

VERITAS Technical Support

Basic Fibre Channel

&

Storage Area Networking

Page 2: SAN_Basics.ppt

VERITAS Confidential 2

What time is it?

Page 3: SAN_Basics.ppt

VERITAS Confidential 3

This course is designed to cover the following objectives:

Module 2: Networking & Storage.

This module begins with an introduction to the background of networking and data storage. Front end networks, the SCSI bus, network attached storage (NAS) and back end networks are described.

Module 3:Fibre Channel Architecture.

This module covers provides an in depth overview of the architectural structure of the Fibre Channel protocol

.Module 4:SAN Topologies.

This module explains the various connectivity methods used in the SAN environment. Point to Point, Arbitrated Loop and Fabric (switched) topologies are discussed.

Module 5: SAN Hardware Products.

This module provides an introduction to the most common SAN hardware products in use today. Host Bus Adapters (HBA’s), Raid/Fibre disks, Hubs, SCSI to Fibre Bridges and Fabrics (switches) are presented.

Page 4: SAN_Basics.ppt

VERITAS Confidential 4

Module 2

Networking & Storage

Page 5: SAN_Basics.ppt

VERITAS Confidential 5

Page 6: SAN_Basics.ppt

VERITAS Confidential 6

Page 7: SAN_Basics.ppt

VERITAS Confidential 7

Page 8: SAN_Basics.ppt

VERITAS Confidential 8

Page 9: SAN_Basics.ppt

VERITAS Confidential 9

Page 10: SAN_Basics.ppt

VERITAS Confidential 10

Serial & Parallel TransmissionsSerial & Parallel Transmissions

Page 11: SAN_Basics.ppt

VERITAS Confidential 11

2 .3 .B NETWORK ACCESS.Gaining access and/or control of the network iscontrolled regardless of the transport method used.Ethernet, the most common transport method in aFront End network, uses an access method known ascarrier sense multiple access and collision detection(CSMA/CD). The server, or node that wants to transmit data, “listens” for the presence of another transmission on the wire. Actually it’s sensing the presence of a particular voltage level. If another transmission is not detected, the node sends its data.

2 .3 .B NETWORK ACCESS.Gaining access and/or control of the network iscontrolled regardless of the transport method used.Ethernet, the most common transport method in aFront End network, uses an access method known ascarrier sense multiple access and collision detection(CSMA/CD). The server, or node that wants to transmit data, “listens” for the presence of another transmission on the wire. Actually it’s sensing the presence of a particular voltage level. If another transmission is not detected, the node sends its data.

Page 12: SAN_Basics.ppt

VERITAS Confidential 12

NETWORK ADDRESSING.

All communication adapters are encoded with a unique address at the time of manufacture. Each manufacturer is assigned a range of addresses. This is commonly referred to as the Media Access Control (MAC) address and is 6 bytes long. (4 bits = 1 byte).

In order to participate on a network such as the IP network, each node must be assigned a unique Internet Protocol (IP) address which consists of 16 bytes divided into 4 byte positions known as octals. Each octal position is equal to one of the 4 decimal positions in an IP address.

NETWORK ADDRESSING.

All communication adapters are encoded with a unique address at the time of manufacture. Each manufacturer is assigned a range of addresses. This is commonly referred to as the Media Access Control (MAC) address and is 6 bytes long. (4 bits = 1 byte).

In order to participate on a network such as the IP network, each node must be assigned a unique Internet Protocol (IP) address which consists of 16 bytes divided into 4 byte positions known as octals. Each octal position is equal to one of the 4 decimal positions in an IP address.

Page 13: SAN_Basics.ppt

VERITAS Confidential 13

Page 14: SAN_Basics.ppt

VERITAS Confidential 14

Page 15: SAN_Basics.ppt

VERITAS Confidential 15

The dominant method for disk and tape access by the server has been the SCSI bus architecture.

The dominant method for disk and tape access by the server has been the SCSI bus architecture.

Page 16: SAN_Basics.ppt

VERITAS Confidential 16

SCSI Bus Issues

Skew Limited Distance.

Termination is Mandatory

Host Internal Bus Congestion

Page 17: SAN_Basics.ppt

VERITAS Confidential 17

Network Attached Storage.Network Attached Storage.

Page 18: SAN_Basics.ppt

VERITAS Confidential 18

Page 19: SAN_Basics.ppt

VERITAS Confidential 19

The NAS approachsolved many of the parallel SCSI bus

limitations, but also added a few kinks ofit’s own that proved to be undesirable

for transport of block level storage data.

The NAS approachsolved many of the parallel SCSI bus

limitations, but also added a few kinks ofit’s own that proved to be undesirable

for transport of block level storage data.

Page 20: SAN_Basics.ppt

VERITAS Confidential 20

Back End Networking.

Page 21: SAN_Basics.ppt

VERITAS Confidential 21

Page 22: SAN_Basics.ppt

VERITAS Confidential 22

Module 2Summary.

Page 23: SAN_Basics.ppt

VERITAS Confidential 23

Module 3

Fibre Channel Protocol

Page 24: SAN_Basics.ppt

VERITAS Confidential 24

Objectives:

At the end of this module, the student will be able to:

1. Discuss the multiple layers of the FC Protocol.

2. Discuss the physical components of Fibre Channel.

3. Discuss bit stream conversion.

4. Discuss Fibre Channel Ordered Sets.

5. Discuss Fibre Channel data frame structure.

6. Fibre Channel classes of service.

7. Fibre Channel flow control.

8. Fibre Channel addressing.

Page 25: SAN_Basics.ppt

VERITAS Confidential 25

Page 26: SAN_Basics.ppt

VERITAS Confidential 26

FC-0 defines and details the physical interface, cables & connectors, transmitters & receivers and their interfaces.

FC-1 defines and details the 8b/10b code and the detection of transmission and reception errors.

FC-2 is the most complex layer. It provides the different classes of service, packetization, exchange & sequencing determination, error detection, segmentation & re-assembly of transmitted data, log-in services for coordinating communication between ports with different capabilities and B to B & E to E flow control.

FC-3 This level is not yet implemented.

FC-4 defines and details the mapping of Fibre Channel capabilities to pre-existing Upper Level Protocols, such as IP, or SCSI.

Page 27: SAN_Basics.ppt

VERITAS Confidential 27

Cables.

Page 28: SAN_Basics.ppt

VERITAS Confidential 28

Page 29: SAN_Basics.ppt

VERITAS Confidential 29

Page 30: SAN_Basics.ppt

VERITAS Confidential 30

GLM.

Gigabaud Link Module

Page 31: SAN_Basics.ppt

VERITAS Confidential 31

GBIC.

Gigabit Interface Converter

Page 32: SAN_Basics.ppt

VERITAS Confidential 32

BIT STREAM CONVERSION.

All information is encoded 8 bits at a time into two possible 10 bit “Transmission Characters”. One is negative and the other is positive.

The 10 bit character with more 1’s than 0’s is said to have positive disparity. You can guess then, what negative and neutral disparity represent.

The transmission sequence is forced from a positive to negative transition to enable the detection of the end of one bit and the beginning of another.

Running disparity keeps track of the previous transmission event and if it was positive, it sends the negative version next thus maintaining balance on the line.

Page 33: SAN_Basics.ppt

VERITAS Confidential 33

8 Bits

8B/10B Encoder

Positive

Negative

2 Ten Bit Transmission Characters

Running disparity keeps track of the previous transmission event and if it was positive, it sends the negative version next thus maintaining balance on the line.

Page 34: SAN_Basics.ppt

VERITAS Confidential 34

ORDERED SETS.

Page 35: SAN_Basics.ppt

VERITAS Confidential 35

DATA FRAME STRUCTURE

Page 36: SAN_Basics.ppt

VERITAS Confidential 36

The Start of Frame (SOF)Frame header.Payload.The Cyclical Redundancy Check (CRC)The End of Frame (EOF)

The Fibre Channel standards allow for 65536 frames per Sequence. To put this in perspective as a comparison between IP and Fibre channel, remember that an IP packets total size is equal to 1518 bytes and that a Fibre Channel Sequence is equal to an IP packet from a CPU’s perspective. Do the math and you’ll see why Fibre Channel is optimized for large block data transfers typical of storage data.

Page 37: SAN_Basics.ppt

VERITAS Confidential 37

CLASSES OF SERVICE.

Page 38: SAN_Basics.ppt

VERITAS Confidential 38

Class 1 - Dedicated Connection

Class 1 is a service which provides Dedicated Connections. A Class 1 Connection is requested by an N_Port with another N_Port. An acknowledgment (ACK) is returned by the other N_Port to establish the Connection. In general, once a Connection is established, it shall be retained and guaranteed by the Fabric, until one of these N_Ports requests removal of the Connection.

Page 39: SAN_Basics.ppt

VERITAS Confidential 39

Class 2 - Multiplex

This operating environment provides Connectionless service with notification of non-delivery, (BSY or RJT), between two N_Ports. This service allows one N_Port to transmit consecutive frames to multiple destinations without establishing a Dedicated Connection with any specific N_Port. Conversely, this service also allows one N_Port to receive consecutive frames from one or more N_Ports without having established Dedicated Connections with any of them.

Page 40: SAN_Basics.ppt

VERITAS Confidential 40

Class 3 – Data gram

This operating environment provides Connectionless service without any notification of non-delivery (BSY or RJT), delivery (ACK), or end-to-end flow control between two N_Ports. The Fabric, if present, and the destination N_Port are allowed to discard Class 3 frames without any notification to the transmitting N_Port. This service allows one N_Port to transmit consecutive frames to multiple destinations without establishing a Dedicated Connection with any specific N_Port. Conversely, this service also allows one N_Port to receive consecutive frames from one or more N_Ports without having established Dedicated Connections with any of them.

Page 41: SAN_Basics.ppt

VERITAS Confidential 41

FLOW CONTROL.

Page 42: SAN_Basics.ppt

VERITAS Confidential 42

ADDRESSING.

Each node has a 64 bit Node_Name assigned at the time of manufacture.

Referred to as the World Wide Name and is globally unique.

As with IP, Fibre Channel assigns an address to the port of each node when the port performs a “Log-In” to it’s respective topology. This is a 24 bit address called an N_Port ID and, like an IP address, the N_Port ID is used to route frames within a SAN. 24 bits may not seem like many addresses however, it is equal to 2 to the 24th power (over 16 million addresses).

Page 43: SAN_Basics.ppt

VERITAS Confidential 43

Chapter 3 Summary.

Page 44: SAN_Basics.ppt

VERITAS Confidential 44

MODULE 4 - SAN TOPOLOGY

Page 45: SAN_Basics.ppt

VERITAS Confidential 45

Objectives:

At the end of this module, the student will be able to:

1. Understand and discuss the Point to Point Topology.

2. Understand and discuss the Arbitrated Loop Topology.

3. Understand and discuss the Switched Fabric Topology.

Page 46: SAN_Basics.ppt

VERITAS Confidential 46

Fibre Channel Ports.

N-Ports

F-Ports

NL- Ports

FL-Ports

E-Ports

G-Ports

Page 47: SAN_Basics.ppt

VERITAS Confidential 47

Port Login.

3 Methods to Choose From

Page 48: SAN_Basics.ppt

VERITAS Confidential 48

Fabric Login.

N_Port to N_Port Login.

Loop Login.

Page 49: SAN_Basics.ppt

VERITAS Confidential 49

Fabric Login.

Whenever an N_Port connects to an F_Port, after power up, the N_Port signals the Fabric.

The Fabric responds.

The N_Port transmits it’s WWN (FLOGI).

Fabric records the N_Port WWN into its Name Server table.

Now the two ports establish a connection performing a Port Login (PLOGI).

The N_Port queries the Fabric Name Server.

The Fabric Name Server send a copy of its WWN/Fabric address table to the N_Port.

The N_Port now performs a PLOGI with the other ports in the Fabric.

Process Login (PRLI) with the other Fabric ports.

Page 50: SAN_Basics.ppt

VERITAS Confidential 50

N_Port to N_Port Login.

The OLS & LRR are sent and the LR is received.

The N_Port sends the FLOGI.

The port with the lowest WWN waits for a PLOGI from the other N_Port.

The N_Port with the highest WWN sends S_ID & D_ID values in the PLOGI frame.

Page 51: SAN_Basics.ppt

VERITAS Confidential 51

Loop Login.

Loop Initialization Process.

Loop Initialization Select Master

Loop Initialization Fabric Assigned.

Loop Initialization Previously Assigned

Loop Initialization Hard Assigned

Loop Initialization Soft Assigned

Clarify One Thing

LIRP

LILP

Page 52: SAN_Basics.ppt

VERITAS Confidential 52

POINT TO POINT TOPOLOGY.

Page 53: SAN_Basics.ppt

VERITAS Confidential 53

ARBITRATED LOOP TOPOLOGY.

Page 54: SAN_Basics.ppt

VERITAS Confidential 54

SWITCHED FABRIC TOPOLOGY

Page 55: SAN_Basics.ppt

VERITAS Confidential 55

Module 4 SUMMARY.

Page 56: SAN_Basics.ppt

VERITAS Confidential 56

MODULE 5 SAN HARDWARE PRODUCTS

Page 57: SAN_Basics.ppt

VERITAS Confidential 57

Objectives:

At the end of this module, the student will be able to:

1. Identify and discuss the Fibre Channel Host Bus Adapter (HBA).

2. Identify and discuss Fibre Channel Raid Controllers.

3. Identify and discuss Fibre Channel JBOD (Just a Bunch of Disk).

4. Identify and discuss Fibre Channel Hubs.

5. Identify and discuss the Fibre Channel SCSI to Fibre Bridge (Router).

6. Identify and discuss the Fibre Channel Fabric (Switches).

Page 58: SAN_Basics.ppt

VERITAS Confidential 58

HOST BUS ADAPTERS.

Page 59: SAN_Basics.ppt

VERITAS Confidential 59

RAID CONTROLLERS

Page 60: SAN_Basics.ppt

VERITAS Confidential 60

FIBRE JBOD.

Page 61: SAN_Basics.ppt

VERITAS Confidential 61

HUBS

Page 62: SAN_Basics.ppt

VERITAS Confidential 62

SCSI TO FIBRE BRIDGES (ROUTERS).

Page 63: SAN_Basics.ppt

VERITAS Confidential 63

FABRICS (SWITCHES)

Page 64: SAN_Basics.ppt

VERITAS Confidential 64

Module 5 Summary.

Page 65: SAN_Basics.ppt

VERITAS Confidential 65

REFERENCE MATERIAL