• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back
What is IP SAN?

A Storage Area Network that uses Internet Protocol for the transport of block-level data.
Uses for IP-based protocols for communication


Internet SCSI (iSCSI)


Fibre Channel over IP (FCIP)

What does FC SAN provide?


High performance


Scalability

Drivers for IP SAN


- Existing IP- based network infrastructure can be leveraged which will reduce cost comparison


- IP network extends or connects SANS over long distances


- Many long distance disaster recovery solutions already leverage IP-based network


- Many robust and mature security options are available



What is iSCSI?


iSCSI is an IP-based protocol that establishes and manages connections between compute systems and storage systems over IP.




Encapsulation of SCSI I/O over IP

Pros of iSCSI


- Relatively inexpensive


- Easy to Implement, especially where environments where FC SAN doesn't exist.

Components of iSCSI Network


- iSCSI initiators (iSCSI HBA)


- iSCSI targets (iSCSI targets)


- IP-based network (Ethernet LAN)




iSCSI initiator sends commends and associated data to a target and the target returns data and responses to the initiator.

Types of ISCSI Initiators

- Software (Standard NIC with software iSCSI adapter)


-TOE (TCP Offload Enginer (TOE) NIC with software iSCSI adapater


- iSCSI HBA

Software (Standard NIC with software iSCSI adapter)



CHEAP




- An operating system (OS) or hypervisor-kernel resident software that uses an existing NIC of the compute system to emulate an iSCSI initiator.




Easy to implement most compute systems have embedded NICs.



TOE (TCP Offload Engine (TOE) NIC with software iSCSI adapter



- TOE NIC performs TCP/IP processing


- Software adapter provides iSCSI functionality


- iSCSI processing requires CPU cycles of compute system

iSCSI HBA

- Performs both iSCSI and TCP/IP processing


- Frees-up CPU cycles of compute system for business application




(Boot From SAN)




Expensive, but does everything

Native iSCSI

ALL Ethernet, IP connected from Initiator to Target


Bridged iSCSI

Allows the initiators to exist in an IP environment while the storage systems remain in an FC SAN environment.




- Gateway or a multiprotocol must be used.

A Storage system with FC and Native iSCSI Connectivity


- Enable iSCSI and FC connectivity in the same environment


- No bridge device is needed

iSCSI Protocol Stack




(The encapsulation order of the SCSI commands for delivery through the physical carrier)


Open System Interconnection (OSI) Model Layers


Layer 7- Application, SCSI, Commands and Data


Layer 5- Session, iSCSI, Login and Discovery


Layer 4- Transport, TCP- Windows and Segments


Layer 3- Network, IP- Packets


Layer 2- Data Link, Ethernet- Frames

iSCSI Address


Location of the iSCSI initiator/target




-Combination of IP address and TCP port number

iSCSI name


Unique identifier




Most common--IQN: iSCSI Qualified Name




Other types: EUI--> Extended unique identifier


NAA--> Network Address Autority

How does ISCSI discovery commonly take place? (two ways)


SendTargets discovery


Internet Storage Name Service (iSNS)

SendTargets Discovery


The initiator is manually configured with the target's network portal (IP address and TCP port number) to establish a discovery session.




Initiator issues a SendTarget Command, and the target network portal responds with a location and name of the target.

iSNS (Internet Storage Name Service)

The initiators and targets can be configured to automatically register themselves with the iSNS serve.




- When an initiator wants to know the target, it queries the iSNS server for a list of available targets.




- equivalent to the name server in FC SAN.

iSNS Discovery Domain
Provide function grouping of devices (including initiators and targets) in an IP SAN.
- Functions the same way as FC zones
State Change notifications
State Change notifications (SCNs) within Discovery Domain inform the registered devices about network events that affect the operational state of devices such as the addition or removal of devices from a discovery domain.
Link Aggregation

In an Ethernet network combines two or more parallel network links into a single logical link (port-channel)




-Distribution of network traffic across the links to ensure link utilization.


Switch aggregation



Combines two physical switches to make them appear as a single logical switch.

Self-forming network

Allows an Ethernet switch to join an Ethernet network automatically.
Self-forming link aggregation

Enables an Ethernet network to automatically include new interswitch links into a port-channel and redistributes network traffic among all the links in the port-channel.
vLan

A logical network created on a LAN enabling communication between a group of nodes with a common set of functional requirements, independent of their physical location in the network.
Port-based technique


Membership in a VLAN is defined by assigning a VLAN ID to a switch port.




When a node connects to a switch port that belongs to a VLAN, the node becomes a member of the VLAN.



MAC-based techniqie

Membership in a VLAN is defined on the basis of the MAC address of the node.

Protocol-based technique

Different VALNS are assigned to different protocols based on the protocol= type field found in OSI Layer 2.
IP subnet address-based technique


VLAN membership is based on the UP subnet address. All nodes in an IP subnet are members of the same VLAN.




Application-Based technique

A specific application, ex- File transfer protocol application can be configured to execute on one VLAN.
VLAN Trunking

Allows a single network link (Trunk link) to carry multiple VLAN Traffic

VLAN Tagging

Inserting a 4-byte tag field containing 12-bit VLAN ID into the Ethernet frame before it is transmitted through a trunk link.
Stretched VLAN


A VLAN that spans multiple sites and enables OSU Layer 2 communication between a group of nodes over an OSI Layer 3 WAN infrastructure, independent of their physical location.




Enable movement of virtual machines between sites

Fibre Channel IP


IP-based protocol that enables distributed FC SAN islands to be interconnected over an existing IP network.




FC frames are encapsulated onto the IP payload and transported over an IP Network.

FCIP Tunneling Protocol

FCIP entity such as an FCIP gateway or MP Switch is used to tunnel FC fabrics through an IP network.
FCIP


Storage- to-Storage




REMOTE REPLACATION!


Remote Replications VMAX/ VNX


VMAX: SRDF


VNX: Mirror View




Recovery Point

FCIP Tunnel Configuration- Merged Fabric

VE_Ports are used on both ends of the FCIP tunnel- establishes virtual ISLs through FCIP tunnel
FCIP Tunnel Configuration- Separate Fabric

EX_Port on FCIP gateway (SWITCH) connects to E_Port of an FC switch. Enables FC-FC routing without merging fabrics.
FCIP Encapsulation