1 / 22

Jan., 2013

MaxTronic International Co., Ltd. Arena iSCSI Presentation: iSCSI vs. NAS. Jan., 2013. Storage Environment. DAS Direct Attached Storage SAN Storage Area Networks NAS Network Attached Storage. Networking. Networking. Networking. DAS. FC / IP SAN. NAS. Application software.

aelwen
Télécharger la présentation

Jan., 2013

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MaxTronic International Co., Ltd. Arena iSCSI Presentation: iSCSI vs. NAS Jan., 2013

  2. Storage Environment • DAS Direct Attached Storage • SAN Storage Area Networks • NAS Network Attached Storage 2

  3. Networking Networking Networking DAS FC / IP SAN NAS Application software File system FC / SAS / SCSI / eSATA RAID File system FC / iSCSI RAID NAS 3

  4. Ethernet DAS - Direct Attached Storage • Data storage connect directly to a server or workshop through Host Bus Adapter (HBA), there is no network between storage and host servers Storage Storage Server A 4

  5. SAN - Storage Area Networks • A dedicated data storage network which can be accessed by multiple servers SAN LAN Client Server A Storage Data Command Storage Server B Client 5

  6. Ethernet NAS - Network Attached Storage • A file level computer data storage connect to other device on TCP/ IP network Client Server B NAS Client Server A NAS 6

  7. Difference of iSCSI, NAS - 1 Network Attached Storage (NAS) uses File-Level protocols such as NFS or SMB/CIFS for remote files sharing. iSCSI NAS Computer Computer File System File Level Block Level File System iSCSI Storage NAS Storage Same as traditional SCSI and FC interface, iSCSI require Block-Level access to the hard drives such as email servers, databases, and high usage file servers. 7

  8. Difference of iSCSI, NAS - 2 8 8

  9. Why 1Gb iSCSI? Low Total Cost of Ownership Deploy SAN infrastructure on the existing Ethernet infrastructure Share the 10Gb infrastructure NIC, switch, cables Leverage technology expertise The same technology as existing network topology No additional training needed Easy management and maintenance Upgrade performance from existing 1Gb iSCSI 9 9

  10. IP SAN Structure 10 10

  11. iSCSI Application - 1 Server Virtualization SAN management 11

  12. iSCSI Application - 2 Surveillance 12

  13. Nova 1Gb iSCSI RAID Overview 13 13

  14. 1Gb iSCSI Performance Comparison Nova 39S SS-6603E 14 14

  15. High Scalability Internal SAS expanders enable easy to connect another SAS 6Gb JBOD enclosures up to 7 x JBOD, scalable up to 120 drives Support latest 3TB HDD Feasible for 24x7 operation. Max. 120 disks = 15 15

  16. New features from Nova Entry Series 16 16

  17. Easy Configuration & Management • Embedded, browser based Graphic User Interface. • Quick setup menu to allow setup RAID level in only 3 steps. 17 17

  18. Disk Standby Smart FAN Control 80% High Efficiency Power Supply ROHS Compliance Modularized and ECO friendly Design • Fully modularization, designed for easy configuration, easy field service, easy inventory management • Shared modules for different platforms: • Same controller module for 2U, 3U, 4U • Same P/S module for 2U, 4U • Same Fan module for 3U, 4U • Same Cache backup module for 3U, 4U • Eco Friendly design 18

  19. Block 1 Block 2 Block 3 Block 4 Block 5 Block 6 Block 1 Block 2 Parity (1,2) Block 3 Parity (3,4) Block 4 Parity (5,6) Block 5 Block 6 Cloning Sick Fail Roaming Working Array Recovery 2nd disk Fail RAID 5 Fail~ RAID 5 OK 1st Disk Fail Arena Data Care Features • RAID Level • Support RAID levels 1, 3, 5, and 6 to prevent for drive failure. • Sustained read performance even in degrade mode. • Disk Cloning • A method to automatically copy data to spare disk and replace the sick disk. It could be configured to trigger by the following conditions: • Over bad block threshold of disk. • Detect SMART warning from disk. • Disk cloning is to prevent a rebuild from ever occurring and having the unit in degraded mode. • On-line Array Roaming • Array member disks has recorded specific Identification when original RAID system or controller faulty, the function provides a easily way to recognized data back by just move member disks to the same model and working RAID system. • Array Recovery • A embedded utility to rescue array set back from a fatal error of when parity array (RAID 3/5/6) unexpected lose too many disks and makes array fail. 19 19

  20. Utility Highlights PathGuard™ MPIO A specialist software utility focusing on I/O load balancing while increasing performance by leveraging end-to-end I/O path failover and failback, and Multiple path to each device. This software is available in all Redundant series which ensuring business continuity in any event of performance is a priority. RAIDGuard Central™ (RGC) A free centralized management software utility to provides centralized monitoring multiple RAID systems by through Ethernet at a local area network. Easier install RGC to a normal PC as an agent and then any PC/server could monitor to RAID system remotely. Allow customer to warning the engineer real-time with mail sending and most popular web messenger: MSN. 20 20

  21. Encryption ASIC Embedded-in Encryption Key Feature Highlights • MaxSure • Arena unique F/W feature to support SED (Self Encrypting Drive), the drives are embedded with encryption ASIC and encryption key, to encrypt/decrypt data write / read to the drives automatically. The MaxSure are the 2 features for SED : • Instant Secure Erase • Authentication Key Management LUN Masking LUN (Logical Unit Number) Masking is an authorization process that makes a LUN available to some hosts and unavailable to other hosts. LUN Masking is implemented primarily at the HBA level. LUN Masking implemented at this level is vulnerable to any attack that compromises the HBA. LUN Masking support by storage is important because Windows based servers attempt to write volume labels to all available LUN's. This can render the LUN's unusable by other operation systems and can result in data loss. 21 21

  22. More Green More Secure More Intelligent Summary 22 22

More Related