Cloud Computing - Chapter 3
Cloud Computing - Chapter 3
Foreword
⚫ Data is the most important asset for every enterprise. This course describes
how and where data is stored, and provides the key data storage
technologies in cloud computing.
2 Huawei Confidential
Objectives
3 Huawei Confidential
Contents
1. Storage Basics
◼ Definition of Storage
History of Storage
Mainstream Disk Types
Storage Networking Types
Storage Forms
4 Huawei Confidential
What Is Storage?
Database server
User
Application server
Mail server
5 Huawei Confidential
• Storage in a narrow sense: CDs, DVDs, ZIP drives, tapes, and disks...
1. Storage Basics
Definition of Storage
◼ History of Storage
Mainstream Disk Types
Storage Networking Types
Storage Forms
6 Huawei Confidential
History of Storage
Controller
This century
1990s • Distributed
• Storage storage
1980s network • Cloud storage
• External
1950s storage
• Traditional
storage
7 Huawei Confidential
• The storage architecture has gone through the following development phases:
traditional storage, external storage, storage network, distributed storage, and
cloud storage.
• Traditional storage refers to individual disks. In 1956, IBM invented the world's
first mechanical hard drive that has fifty 24-inch platters and the total storage
capacity of just 5 MB. It is about the size of two refrigerators and weighs more
than a ton. It was used in the industrial field at that time and was independent of
the mainframe.
• A storage area network (SAN) is a typical storage network that transmits data
mainly over a Fibre Channel network. Then, IP SANs emerge.
Server RAM
RAM
CPU
Disk Disk
RAM
SCSI card
SCSI card
Disk
Controller
Server Server
Server
CPU
Server
File system File system
RAM
SAN LAN
Disk
RAID File system
SCSI card
9 Huawei Confidential
• The direct connection between the controller and server resolves the problems
caused by the limited disk slot quantities, single-disk storage, and poor disk
interface performance.
1. Storage Basics
Definition of Storage
History of Storage
◼ Mainstream Disk Types
Storage Networking Types
Storage Forms
10 Huawei Confidential
Introduction to Disks
⚫ Disks can be considered the most important storage device of a computer.
⚫ A disk interface is a component used to connect a disk to a host. It transmits data between the disk cache and the
host memory. The disk interface type determines the connection speed between the disk and the computer, the
program running speed, and system performance.
Capacity (TB) 1 TB/2 TB/3 TB 0.6 TB/0.9 TB 2 TB/3 TB/4 TB 0.6 TB/0.8 TB/1.2 TB/1.6 TB
• Increasing order of price: SATA and NL-SAS disks, SAS disks, and SSDs
Disk Key Indicators
⚫ Disk capacity IOPS Bandwidth
Disk Type (4 KB random (128 KB
⚫ Rotational speed (HDD only) write) sequential read)
⚫ Input/Output operations per second (IOPS) SAS 15K 450 290 MB/s
Higher IOPS,
SATA SSD 30,000 to 60,000 540 MB/s
IOPS
better performance
12 Huawei Confidential
• Disk capacity: The capacity is measured in MB or GB. The factors that affect the
disk capacity include the single platter capacity and the number of platters.
• Rotational speed: The rotational speed is the number of rotations made by disk
platters per minute. The unit is rotation per minute (rpm). In most cases, the
rotational speed of a disk reaches 5400 rpm or 7200 rpm. The disk that uses the
SCSI interface reaches 10,000 rpm to 15,000 rpm.
• Data transfer rate: The data transfer rate of a disk is the speed at which the disk
reads and writes data. It is measured in MB/s. The rate consists of the internal
data transfer rate and the external data transfer rate.
1. Storage Basics
Definition of Storage
History of Storage
Mainstream Disk Types
◼ Storage Networking Types
Storage Forms
13 Huawei Confidential
Introduction to DAS
⚫ Direct attached storage (DAS)
⚫ Time: 1970s
Server
⚫ Background: Data explosion drove up huge
14 Huawei Confidential
Introduction to NAS (1)
⚫ Network attached storage (NAS)
⚫ Time: early 1990s
NAS system architecture
Unix Linux Windows
⚫ Background: Developing networks drove the need
for large-scale data sharing and exchange, leading
to dedicated NAS storage devices.
NFS NFS CIFS ⚫ Access mode: Multiple front-end servers share
space on back-end NAS storage devices using CIFS
Dedicated IP or NFS Concurrent read and write operations can
storage network be performed on the same directory or file.
NFS and
CIFS File system
RAID ⚫ The file system is on the back-end storage device.
15 Huawei Confidential
• Linux NFS clients support NFSv2 [RFC1094], NFSv3 [RFC1813], and NFSv4
[RFC3530]. NFSv2 that uses the User Datagram Protocol (UDP) is outdated due
to its limited data access and transmission capabilities.
▫ RPC provides a set of operations to achieve remote file access that are not
restricted by machines, OSs, and lower-layer transmission protocols. It
allows remote clients to access storage over a network like accessing a local
file system.
▫ The NFS client sends an RPC request to the NFS server. The server transfers
the request to the local file access process, reads the local disk files on the
server, and returns the files to the client.
• Common Internet File System (CIFS) is a network file system protocol used for
sharing files and printers between machines on a network. CIFS is mainly used to
share network files between hosts running Windows.
Introduction to NAS (2)
⚫ NAS supports the centralized management of scattered and independent data, facilitating
access to various hosts and application servers.
NAS
Ethernet port Ethernet port
NFS
File system
Volume management module Volume management module
16 Huawei Confidential
• NAS can serve as a network node and be directly connected to the network. In
theory, NAS can support various network technologies and topologies. As
Ethernet is the most popular network connection mode nowadays, we mainly
discuss the NAS environment on the Ethernet.
• NAS supports multiple protocols (such as NFS and CIFS) and supports various
OSs. Users can conveniently manage NAS devices by using Internet Explorer or
Netscape on any work station.
Introduction to SAN
⚫ A storage area network (SAN) is a dedicated storage network that connects one or more
network storage devices to servers.
Clients
LAN
Servers
Storage devices
17 Huawei Confidential
• The SAN that uses Fibre Channel Protocol (FCP) to set up connections between
servers and storage devices through Fibre Channel switches is called an FC SAN.
Fibre Channel is especially suitable for SANs, because it supports long-distance
and large-block transfer. The SAN mainly applies to high-end and enterprise-
class storage applications, which have demanding requirements for performance,
redundancy, and data availability.
• The major difference between NAS and SAN is that NAS provides a file operation
and management system while SAN does not. SAN provides only data
management, which is the layer below file management. SAN and NAS do not
conflict with each other. They can coexist on the same network. However, NAS
implements storage space management and resource sharing through a public
interface, while SAN provides only a quick dedicate back-end channel for servers
to store data.
Introduction to FC SAN
⚫ Fiber Channel storage area network (FC SAN)
⚫ Time: middle and late 1990s
Server ⚫ Background: To solve the poor scalability issue of
DAS, storage devices was networked. More than 100
servers can be connected in a network.
Fibre Channel ⚫ Connection mode: Fibre Channel link; Fibre Channel
switch switch
Fibre Channel
link ⚫ Access mode: The storage space on the back-end
FC SAN storage device can be divided into multiple LUNs.
Controller Each LUN belongs to only one front-end server.
⚫ Link rate: 2 Gbit/s, 4 Gbit/s, or 8 Gbit/s
⚫ Provides advanced data protection functions, such
as snapshot and disaster recovery.
Disk array
18 Huawei Confidential
• Fibre Channel (FC) is a standard data storage network used to transmit 100
Mbit/s to 4.25 Gbit/s signals over fiber or copper cables. It is a high-speed
transport technology used to build SANs. Fibre Channel is primarily used for
transporting SCSI traffic from servers to disk arrays, but it can also be used on
networks carrying ATM and IP traffic.
Introduction to IP SAN
⚫ IP storage area network (IP SAN)
⚫ Time: 2001
⚫ Background: IP SAN is designed to solve the price and
Server management issues of the FC SAN.
⚫ Connection mode: Ethernet link; Ethernet switch
⚫ Access mode: The storage space on the back-end storage
Ethernet switch device can be divided into multiple LUNs. Each LUN
belongs to only one front-end server.
IP link ⚫ Link rate: 1 Gbit/s, or 10 Gbit/s
⚫ The IP SAN provides advanced data protection functions,
iSCSI storage controller such as snapshot and disaster recovery.
⚫ iSCSI is a mainstream choice because:
Mature IP network management tools and
infrastructure can be used.
IP networks are widely used, which can reduce a large
Disk array number of construction, management, and personnel
costs.
19 Huawei Confidential
Application
Any File servers Database applications Video security
scenario
High scalability and
Easy to understand; Easy to install; Strong scalability;
Advantage performance;
robust compatibility low cost low cost
high availability
Difficult management;
Low performance; Expensive and complex
limited scalability; low Low performance
Disadvantage inapplicable to some configuration; poor
storage space
applications networking compatibility
utilization
20 Huawei Confidential
Contents
1. Storage Basics
Definition of Storage
History of Storage
Mainstream Disk Types
Storage Networking Types
◼ Storage Forms
21 Huawei Confidential
Centralized Storage
⚫ A centralized storage system refers to one set of storage system consisting of multiple devices. Enterprises often
deploy their storage devices on a centralized environment. For example, the Huawei storage system may need
several cabinets to house devices. In terms of technical architectures, centralized storage is classified into SAN
(including FC SAN and IP SAN) and NAS storage.
⚫ Centralized storage has a simple deployment structure, which means you do not need to consider how to deploy
multiple nodes for a service, or the distributed collaboration between multiple nodes.
Server
Ethernet switch
IP link
Disk storage
22 Huawei Confidential
P1 P2 Px
...
P1 P2 Py
23 Huawei Confidential
Object
File Object
Object Object Data
system Key
system Object
Storage Metadata
layer
...
User-defined
metadata
... ...
24 Huawei Confidential
• Users can access data in an object storage as fast as in a SAN storage and can
share data as easy as in a NAS storage. Object storage has high reliability and
secure data sharing between platforms. The following describes the comparison
among the object storage, block storage, and file storage:
▫ Block storage directly accesses the storage layer, featuring fast speed,
minimum overhead, and maximum efficiency. However, block storage has
the high cost and poor scalability. Block storage employs iSCSI and Fibre
Channel. Therefore, it is difficult to transmit data across networks. Block
storage is applicable to enterprise databases, such as Oracle.
▫ File storage creates a file system on the basis of block storage. Data is
organized in the directory-directory-file mode, facilitating data
management. The objects operated by most application programs are files.
Therefore, file storage enables easier interworking with application systems.
File systems are restricted by directory trees. Therefore, a file system can be
typically expanded to dozens of PB at most. The scalability is limited. File
systems are applicable to application integration and file sharing in an
enterprise.
Storage Service Type
iSCSI/FC NFS/CIFS HTTP/REST/S3
Protocol layer
Object
File Object
Object Object Data
system Key
system Object
Storage Metadata
layer
...
User-defined
metadata
... ...
25 Huawei Confidential
▫ Object storage creates the object management layer above block storage.
Compared with the file system, the object system is flat with little
expansion limitation. An object consists of a unique key, file, data (file),
metadata, and user-defined metadata. An object contains self-management
information. Therefore, object storage is more intelligent. Using compatible
standard Internet protocol interfaces, object storage supports cross-region
transmission. Object storage applies to storage scenarios for Internet
services, and internal arching and backup scenarios for enterprises.
Contents
1. Storage Basics
26 Huawei Confidential
What Is RAID?
⚫ Redundant Array of Independent Disks (RAID) combines multiple physical disks into one logical disk in
different ways, improving read/write performance and data security.
D3 D4 D5 Stripe 1
D0 D1 D2 Stripe 0
28 Huawei Confidential
• Stripe width
▫ Indicates the number of disks in an array for striping. For example, if a disk
array consists of three member disks, the stripe width is 3.
• Stripe depth
A0 Reconstruction XOR
Fault
Reconstruction
A0 A1 A2 P
Replacement
Data disk Data disk Data disk Parity disk
Hot spare
disk
30 Huawei Confidential
• Data parity: Redundant data is used to detect and rectify data errors. The
redundant data is usually calculated through Hamming check or XOR operations.
Data parity can greatly improve the reliability, performance, and error tolerance
of the disk arrays. However, the system needs to read data from multiple
locations, calculate, and compare data during the parity process, which affects
system performance.
D3 D2 D3 D3
D2 D2
D2 D3 D1 D1 D2 P1 D3 D0 D1 D2 D3
D0 D1 D0 D1 P0 RAID 1 RAID 1 RAID 1 RAID 1
D0 D0
Three key
technologies
31 Huawei Confidential
• RAID 0 consists of striping without fault tolerance. Data of the RAID group is
evenly distributed on all disks in stripe form.
• RAID 1, also called mirroring, can simultaneously write data into the primary disk
and mirror disk.
• RAID 3 consists of striping with dedicated parity. Data is striped on data disks,
and parity data is stored on a dedicated parity disk.
• RAID 10 combines mirroring and striping. The first level is RAID 1 mirrored pairs,
and the second level is RAID 0. RAID 10 is also a widely used RAID level.
Working Principles of RAID 6 DP
⚫ Double parity (DP): In addition to the horizontal XOR parity disk used in RAID 4, it adds another disk to
store diagonal XOR parity data.
⚫ P0 to P3 on the horizontal parity disk are the parity information of horizontal data on all data disks.
For example, P 0 = D 0 XOR D 1 XOR D 2 XOR D 3
⚫ DP 0 to DP 3 in the diagonal parity disk represent the diagonal parity data for respective data disks
and the horizontal parity disk.
For example, DP 0 = D 0 XOR D 5 XOR D 10 XOR D 15
32 Huawei Confidential
• RAID 6 DP has two independent parity data blocks: horizontal parity data and
diagonal parity data.
• Parity values in the horizontal parity disk are also called parity check values,
which are obtained by performing the XOR operation on user data in the same
stripe.As shown in the following figure,P0 is obtained by performing an XOR
operation on D0, D1, D2, and D3 on a stripe 0, and P1 is obtained by performing
an XOR operation on D4, D5, D6, and D7 on a stripe 1. Therefore, P0 = D0 ⊕D1⊕
D2⊕D3, P1 = D4⊕D5⊕D6⊕D7, and so on.
• The diagonal parity uses the diagonal XOR operation to obtain the row-diagonal
parity data block. A process of selecting a data block is relatively complex. DP0 is
obtained by performing an exclusive OR operation on D0 on a stripe 0 of a hard
disk 1, D5 on a stripe 1 of a hard disk 2, D10 on a stripe 2 of a hard disk 3, and
D15 on a stripe 3 of a hard disk 4. DP1 is obtained by performing an exclusive OR
operation on D1 on a stripe 0 of a hard disk 2, D6 on a stripe 1 of a hard disk 3,
D11 on a stripe 2 of a hard disk 4, and P3 on a stripe 3 of a first parity hard disk.
DP2 is obtained by performing an exclusive OR operation on D2 on a stripe 0 of a
hard disk 3, D7 on a stripe 1 of a hard disk 4, P2 on a stripe 2 of an odd even
hard disk, and D12 on a stripe 3 of a hard disk 1. Therefore, DP0 =
D0⊕D5⊕D10⊕D15, DP1 = D1⊕D6⊕D11⊕P3, and so on.
Working Principles of RAID 6 DP
⚫ Double parity (DP): In addition to the horizontal XOR parity disk used in RAID 4, it adds another disk to
store diagonal XOR parity data.
⚫ P0 to P3 on the horizontal parity disk are the parity information of horizontal data on all data disks.
For example, P 0 = D 0 XOR D 1 XOR D 2 XOR D 3
⚫ DP 0 to DP 3 in the diagonal parity disk represent the diagonal parity data for respective data disks
and the horizontal parity disk.
For example, DP 0 = D 0 XOR D 5 XOR D 10 XOR D 15
33 Huawei Confidential
▫ The disk capacity is large (usually greater than 2 TB). The reconstruction of
a large-capacity disk takes a long time. Data will be inaccessible for a long
time if two disks fail at the same time. A RAID 6 array tolerates failure of
another disk during the reconstruction of one disk. Some enterprises want
to use a dual-redundancy RAID array for their large-capacity disks.
Introduction to RAID 2.0
⚫ RAID 2.0
RAID 2.0 is an enhanced RAID technology that effectively resolves the following problems: prolonged
reconstruction of an HDD, and data loss if a disk is faulty during the long reconstruction of a traditional RAID
group.
⚫ RAID 2.0+
RAID 2.0+ provides smaller resource granularities (tens of KB) than RAID 2.0 to serve as the units of standard
allocation and reclamation of storage resources, similar to VMs in computing virtualization. This technology is
called virtual block technology.
⚫ Huawei RAID 2.0+
Huawei RAID 2.0+ is a new RAID technology that overcomes traditional RAID issues. Huawei RAID 2.0+ evolves
in line with the storage architecture virtualization to implement two-layer virtualized management instead of
the traditional fixed management. Based on the underlying disk management that employs block
virtualization (Virtual for Disk), RAID 2.0+ uses Smart-series efficiency improvement software to implement
efficient resource management that features upper-layer virtualization (Virtual for Pool).
34 Huawei Confidential
35 Huawei Confidential
2. Each SSD is then divided into CKs of a fixed size (typically 4 MB) for logical space
management.
3. CKs from different SSDs form chunk groups (CKGs) based on the RAID policy
specified on DeviceManager.
4. CKGs are further divided into grains (typically 8 KB). Grains are mapped to LUNs
for refined management of storage resources.
• Balanced service loads for zero hotspots. Data is evenly distributed to all
SSDs in a storage resource pool, ensuring no SSD becomes a hotpot,
thereby lowering the SSD failure rate.
• Quick reconstruction for a lowered data loss risk. Faulty SSDs trigger data
reconstruction on all the other SSDs in the storage pool. This many-to-
many reconstruction is rapid and significantly reduces data vulnerability.
1. Storage Basics
36 Huawei Confidential
SCSI
⚫ Small Computer System Interface (SCSI) is an interface technology developed for midrange
computers and used for connecting between hosts and peripheral devices.
I/O request
SCSI bus
Data/Address bus Host Disk
Host
Adapter C/S
Command/Data
SCSI array SCSI transport layer SCSI transport layer
SCSI array
ID 0 ID 5
Bus connection
LUN 0 LUN 1 LUN 0 SCSI interconnection SCSI interconnection
LUN 2 LUN 1 layer layer
37 Huawei Confidential
• Computers communicate with storage systems through buses. The bus is a path
through which data is transferred from the source device to the target device. To
put it simple, the high-speed cache of the controller functions as the source
device and transfers data to target disks, which serve as the target devices. The
controller sends a signal to the bus processor requesting to use the bus. After the
request is accepted, the controller's high-speed cache sends data. During this
process, the bus is occupied by the controller and other devices connected to the
same bus cannot use it. However, the bus processor can interrupt the data
transfer at any time and allow other devices to use the bus for operations of a
higher priority.
• A computer has numerous buses, which are like high-speed channels used for
transferring information and power from one place to another. For example, the
universal serial bus (USB) port is used to connect an MP3 player or digital
camera to a computer. The USB port is competent to the data transfer and
charging of portable electronic devices that store pictures and music. However,
the USB bus is incapable of supporting computers, servers, and many other
devices.
SCSI
⚫ Small Computer System Interface (SCSI) is an interface technology developed for midrange
computers and used for connecting between hosts and peripheral devices.
I/O request
SCSI bus
Data/Address bus Host Disk
Host
Adapter C/S
Command/Data
SCSI array SCSI transport layer SCSI transport layer
SCSI array
ID 0 ID 5
Bus connection
LUN 0 LUN 1 LUN 0 SCSI interconnection SCSI interconnection
LUN 2 LUN 1 layer layer
38 Huawei Confidential
• In this case, SCSI buses are applicable. SCSI, short for Small Computer System
Interface, is an interface used to connect between hosts and peripheral devices
including disk drives, tape drives, CD-ROM drives, and scanners. Data operations
are implemented by SCSI controllers. Like a small CPU, the SCSI controller has its
own command set and cache. The special SCSI bus architecture can dynamically
allocate resources to tasks run by multiple devices in a computer. In this way,
multiple tasks can be processed at the same time.
iSCSI
⚫ iSCSI encapsulates SCSI commands and block data into TCP packets and transmits the
packets over an IP network. iSCSI uses mature IP network technologies to implement and
extend SANs.
SCSI applications (such as file systems and databases)
SCSI block instruction SCSI flow instruction Other SCSI instructions
iSCSI
TCP
IP
Physical layer
39 Huawei Confidential
• The SCSI controller card is used to connect to multiple devices to form a network.
The devices can communicate with each other on the network but cannot be
shared on the Ethernet. If devices form a network through SCSI and the network
can be mounted to an Ethernet, the devices can interconnect and share with
other devices as network nodes. As a result, the iSCSI protocol evolved from SCSI.
The IP SAN using iSCSI converts user requests into SCSI codes and encapsulates
data into IP packets for transmission over the Ethernet.
• The iSCSI scheme was initiated by Cisco and IBM and then advocated by Adaptec,
Cisco, HP, IBM, Quantum, and other companies. iSCSI offers a way of transferring
data through TCP and saving data on SCSI devices. The iSCSI standard was
drafted in 2001 and submitted to IETF in 2002 after numerous arguments and
modifications. In Feb. 2003, the iSCSI standard was officially released. The iSCSI
technology inherits advantages of traditional technologies and develops based on
them. On one hand, SCSI technology is a storage standard widely applied by
storage devices including disks and tapes. It has been keeping a fast development
pace since 1986. On the other hand, TCP/IP is the most universal network
protocol and IP network infrastructure is mature. The two points provide a solid
foundation for iSCSI development.
40 Huawei Confidential
• The iSCSI communication system inherits some of SCSI's features. The iSCSI
communication involves an initiator that sends I/O requests and a target that
responds to the I/O requests and executes I/O operations. After a connection is
set up between the initiator and target, the target controls the entire process as
the primary device.
• iSCSI targets include iSCSI disk arrays and iSCSI tape libraries.
• The iSCSI protocol defines a set of naming and addressing methods for iSCSI
initiators and targets. All iSCSI nodes are identified by their iSCSI names. This
method distinguishes iSCSI names from host names.
• iSCSI uses iSCSI names to identify initiators and targets. Addresses change with
the relocation of initiator or target devices, but their names remain unchanged.
When setting up a connection, an initiator sends a request. After the target
receives the request, it checks whether the iSCSI name contained in the request is
consistent with that bound with the target. If the iSCSI names are consistent, the
connection is set up. Each iSCSI node has a unique iSCSI name. One iSCSI name
can be used in the connections from one initiator to multiple targets. Multiple
iSCSI names can be used in the connections from one target to multiple initiators.
Discussion:
⚫ We have learned the FC SAN and IP SAN. Now assume that two sites use different
networks FC SAN and TCP/IP. How can storage devices at the two sites
communicate with each other?
41 Huawei Confidential
Convergence of Fibre Channel and TCP
⚫ Ethernet technologies and Fibre Channel technologies are both developing fast. Therefore, it
is inevitable that IP SAN and FC SAN that are complementary coexist for a long time.
⚫ Fibre Channel over a TCP/IP network:
◼ iFCP
◼ FCoE
42 Huawei Confidential
• Fibre Channel over IP (FCIP) is an IETF proposed standard that defines the Fibre
Channel architecture over TCP/IP links. FCIP uses the current IP protocol and
facilities to connect the tunnels of two Fibre Channel SANs at different places.
• Fibre Channel over Ethernet (FCoE) transmits Fibre Channel signals over an
Ethernet, so that Fibre Channel data can be transmitted at the backbone layer of
a 10 Gbit/s Ethernet using the Fibre Channel protocol.
• IP over Fiber Channel (IPFC) uses the Fibre Channel connections between two
servers as IP data exchange media. To do this, IPFC defines how to transmit IP
packets over a Fibre Channel network. Like all other application protocols, IPFC is
implemented by a device driver in an operating system. The ifconfig or ipconfig
command is executed for local IP connections. Then the IPFC driver addresses the
Fibre Channel HBA. After that, IP packets can be transmitted through Fibre
Channel.
iFCP
⚫ Internet Fibre Channel Protocol (iFCP) is a gateway-to-gateway protocol that provides Fibre
Channel communication services for optical devices on TCP/IP networks to implement end-
to-end IP connection.
iFCP gateway iFCP gateway
TCP/IP
• The frame address conversion method defined in the iFCP protocol allows Fibre
Channel storage devices to be added to the TCP/IP-based network through
transparent gateways. iFCP can replace Fibre Channel to connect to and group
Fibre Channel devices using iFCP devices. However, iFCP does not support the
merge of independent SANs, and therefore a logical SAN cannot be formed. iFCP
outstands in supporting SAN interconnection as well as gateway zoning, allowing
fault isolation and breaking the limitations of point-to-point tunnels. In addition,
iFCP enables end-to-end connection between Fibre Channel devices. As a result,
the interruption of TCP connection affects only a communication pair. SANs that
adopt iFCP support fault isolation and security management, and deliver higher
reliability than SANs that adopt FCIP.
iFCP Protocol Stack
⚫ iFCP is between Fibre Channel and TCP/IP, which means that iFCP can interwork with either
Fibre Channel or TCP/IP.
iFCP
TCP
IP
Physical layer
44 Huawei Confidential
• The main function of the iFCP protocol layer is to transport Fibre Channel frame
images between locally and remotely attached N_Ports. When transporting
frames to a remote N_Port, the iFCP layer encapsulates and routes the Fibre
Channel frame comprising each Fibre Channel information unit, and transmits
the frame via a predetermined TCP connection over the IP network.
• In the IP SAN that uses iFCP, iFCP devices take the place of Fibre Channel
switches, which means that iFCP switches can also function as Internet Storage
Name Servers (iSNSs) to provide the name discovery service for terminal nodes.
The iFCP switch allocates a 4-byte IP address to each Fibre Channel terminal
node. When a Fibre Channel device sends an SNS name query request, the
request is intercepted by the iFCP switch and interpreted by the iSNS server.
FCoE
⚫ Fibre Channel over Ethernet (FCoE) allows the transmission of LAN and FC SAN data on the
same Ethernet link. This reduces the number of devices, cables, and network nodes in a data
center, as well as power consumption and cooling loads, simplifying management.
⚫ FCoE encapsulates FC data frames into Ethernet frames and allows service traffic on a LAN
and SAN to be transmitted over the same Ethernet.
Ethernet data link layer frame
VoIP call
45 Huawei Confidential
• FCoE offers standard Fibre Channel services, including discovery, global naming,
and zoning. These services run in the same way as the original Fibre Channel
services with low latency and high performance.
• From the perspective of Fibre Channel, FCoE enables Fibre Channel to be carried
by the Ethernet Layer 2 link. From the perspective of the Ethernet, FCoE is an
upper-layer protocol that the Ethernet carries, like IP or IPX.
FCoE Protocol Encapsulation
⚫ FCoE encapsulates contents in the FC-2 and above layers into Ethernet packets for
transmission.
FC-4 FC-4
FC-3 FC-3 Fibre Channel protocol layers
FC-2 FC-2
FC-1 FCoE
FC-0 MAC
Ethernet protocol layers
PHY
46 Huawei Confidential
• The Fibre Channel protocol stack has five layers. FC-0 defines the medium type,
FC-1 defines the frame coding and decoding mode, FC-2 defines the frame
division protocol and flow control mechanism, FC-3 defines general services, and
FC-4 defines the mapping from upper-layer protocols to Fibre Channel.
Discussion:
⚫ What are the application scenarios of FCoE?
⚫ What are the application scenarios of iFCP?
47 Huawei Confidential
Quiz
B. False
48 Huawei Confidential
Answers:
▫ AD
▫ B
Summary
49 Huawei Confidential
Recommendations
⚫ Huawei iLearning
https://e.huawei.com/en/talent/#/
⚫ Huawei Support Case Library
https://support.huawei.com/enterprise/en/knowledge?lang=en
50 Huawei Confidential
Acronyms and Abbreviations
FC: Fibre Channel
51 Huawei Confidential
Acronyms and Abbreviations
IOPS: Input/Output per second
52 Huawei Confidential
Thank you. 把数字世界带入每个人、每个家庭、
每个组织,构建万物互联的智能世界.
Bring digital to every person, home, and
organization for a fully connected,
intelligent world.