Richard D. JonesProduct Manager, Storage [email protected]
Novell® iSCSI Building Affordable SAN Solutions
© March 9, 2004 Novell Inc.2
one Net: Information without boundaries…where the right people are connected with the right information at the right time to make the right decisions.
The one Net vision
Novell exteNd™
Novell Nsure™
Novell Nterprise™
Novell NgageSM
:
:
:
:
© March 9, 2004 Novell Inc.3
The one Net vision
Novell Nterprise is an innovative family of products which gives you the power to enable and manage the constant interaction of people with your business systems — regardless of who they are or where they are.
Novell Nterprise™
Novell exteNd™
Novell Nsure™
Novell Nterprise™
Novell NgageSM
:
:
:
:
© Novell Inc, Confidential & Proprietary
Agenda
Storage Trends – How to manage the growth?
What is iSCSI?
When to use iSCSI?
Novell iSCSI Solutions
Novell iSCSI disk server
iSCSI and LDAP
Question and answer
© Novell Inc, Confidential & Proprietary
The Storage Trends
Direct Attached Storage moving to Storage Area Networks (SAN)
• Server Consolidation• Storage Consolidation• Storage Flexibility and Management• LAN Free backup and archive• Modern data protection (change from
traditional tape backup to snap-shot, archive, geographically separated mirrored storage)
Increased use of Clustering for Business Continuance solutions
• In light of 911, Disaster Avoidance is a key focus
• Clustering requires a SAN
© Novell Inc, Confidential & Proprietary
NetWare® Deployments
70% of NetWare new and upgrade sales are deployed on New Hardware
Data growth Doubling every 12 months
Digital Media is the major driving factor
© Novell Inc, Confidential & Proprietary
Managing the Data Growth: a SAN
New techniques are required in order to manage data in the future
• Large Data centers have figured out the value of SANs
SANs help manage data• Consolidate Storage• Easy to provision and re-provision storage• Better backup/archive
SANs for Business Continuance• Clustering• Mirrored Geographically separate Data Centers
© Novell Inc, Confidential & Proprietary
The SAN Problem: Costly
SAN Deployment using Fibre Channel Solutions
Storage Frames (FC or SCSI)~$150,000 to $1,000,000 ea
Fibre Channel Switch(s)~$25,000 ea.
Servers.HBA ~$700 eaGBIC ~$800 ea
HBA=Host Bus AdapterGBIC=Gigabit Interface Converter
Specialized Training$??????
© Novell Inc, Confidential & Proprietary
The Solution:
An Inexpensive SAN should:
• Leverage commodity Networking Hardware
• Leverage Local Area Networking knowledge and expertise
• Leverage existing networking paradigms
• Allow reuse of existing Direct Attached Storage hardware
• The Answer: iSCSI
© Novell Inc, Confidential & Proprietary
Agenda
Storage Trends – How to manage the growth?
What is iSCSI?
When to use iSCSI?
Novell iSCSI Solutions
Novell iSCSI disk server
iSCSI and LDAP
Question and answer
© Novell Inc, Confidential & Proprietary
iSCSI
iSCSI is a new internet standard which defines how industry standard SCSI (Small Computer Systems Interface) storage protocols are run over industry standard TCP/IP.
• V1.0 was ratified on February 11, 2003• This was Internet Draft version 20 of the
specification:• “SCSI protocols are request/response application
protocols with a common standardized architecture model and basic command set as well as standardized command sets for different device classes (disks, tapes, media-changers, etc.)”
• “iSCSI is a transport protocol for SCSI that works on top of TCP/IP. The iSCSI protocol aims to be fully compliant with the standardized SCSI architectural model.”
© Novell Inc, Confidential & Proprietary
iSCSI SAN Fundamentals
File System
SCSI Protocol
TCP/IP
SCSI Protocol
TCP/IP
Hard DisksServer
Standard LAN Adapter
Standard Ethernet Adapter
Standard Ethernet Switch
SCSI “Initiator” SCSI “Target” or Disk Server
A simple iSCSI SANRead Block Request
SCSI Block Request
iSCSI Packet
SCSI Block Request
iSCSI Packet
SCSI Disk Request
© Novell Inc, Confidential & Proprietary
The Solution: An inexpensive SAN
iSCSI on Gigabit Ethernet Hardware is a fraction of the cost of a full Fibre Channel SAN solution.
• Estimates are 4 to 10 times less expensive for the same amount of storage
• Not as performant as Fibre Channel
Use existing servers as your shared storage.• DAS servers converted into iSCSI Storage
Arrays.• No new hardware costs incurred.
© Novell Inc, Confidential & Proprietary
iSCSI Value
SAN Deployment using iSCSI Solutions
Storage Frames (FC, SCSI, or ATA)~$20,000 to $1,000,000 ea
Gigabit Ethernet Switches~$10,000 ea.
Servers.Gigabit Ethernet
Built-in
Standard LAN infrastructureNo training - $0.00
4 to 10 times less expensive
thanFiber Channel
© Novell Inc, Confidential & Proprietary
Agenda
Storage Trends – How to manage the growth?
What is iSCSI?
When to use iSCSI?
Novell iSCSI Solutions
Novell iSCSI disk server
iSCSI and LDAP
Question and answer
© Novell Inc, Confidential & Proprietary
When to use iSCSI?
iSCSI vs Fibre Channel is the wrong question• There are no indications that iSCSI
will replace Fibre Channel• iSCSI will bring SANs to those who would not
implement Fibre Channel• iSCSI will supplement Fibre Channel for 2nd
and 3rd tier data storage• Bridged into Fibre channel
Customers want to use Fibre Channel in the classic data center
• Already deployed • Better Performance• Better support from HW vendors (you get what you pay
for)
© Novell Inc, Confidential & Proprietary
When to use iSCSI?
iSCSI may replace Fibre channel as data centers become more dense and iSCSI and ethernet speeds improve to beyond 1GB
• Blades with iSCSIPresently, customer interest and needs from iSCSI are as follows:
• Data migration• DAS to SAN migration• Site to site migration
• Distance replication• Disaster recovery• Geographic data caching
• Serverless backup• Low cost Clusters
© Novell Inc, Confidential & Proprietary
Storage Consolidation
GigEthernetSwitch
Gig EthernetSCSI
Easily re-provision
storage between the three servers.
SCSI
© Novell Inc, Confidential & Proprietary
Data Migration
GigEthernetSwitch
Gig EthernetSCSI
Migrate data to iSCSI storage
Upgrade or convert data using extra iSCSI
storage
© Novell Inc, Confidential & Proprietary
Business Continuity
Low Cost Business Continuance Solution
Mirrored Data
Cluster 1
iSCSI
LAN (Web)
Internet Router
Mirrored Data
Cluster N
iSCSI
LAN (Web)
Internet Router
User workstation
Internet(iSCSI and Web data)
Access all data via the internetusing Novell Technologies
© Novell Inc, Confidential & Proprietary
Agenda
Storage Trends – How to manage the growth?
What is iSCSI?
When to use iSCSI?
Novell iSCSI Solutions
Novell iSCSI disk server
iSCSI and LDAP
Question and answer
© Novell Inc, Confidential & Proprietary
Novell iSCSI Solution
Support the NetWare Product Line
• NetWare 5.1 and above
• Ensure NetWare works with open standards and standard Storage Solutions
• Ensure customer base has leading edge solutions.
• Offer direct and indirect SAN benefits to customers who typically would not purchase expensive Fibre Channel SANs
Prepare the way for ‘Fluid Computing’ models
• Key to Blade & Grid Computing
© Novell Inc, Confidential & Proprietary
iSCSI for Blade Servers
A key component of Blade and Server Farm Strategy
iSCSI SANSCSI-3TCP/IP
Ethernet
File/Message/Directory/Print/Database Access Protocols
-NW6 File Server Blades
NW6 Disk Server Blades
Directory enabledMulti-protocol
Highly availablescalable NAS/SANNetWare Cluster…
© Novell Inc, Confidential & Proprietary
Deployment Plans for iSCSI
Initiator Software stack• Web download for NW5.1 and NW6
• http://download.novell.com/pages/PublicSearch.jsp
• Choose “iSCSI Initiator for NW5.1 and NW6” under “choose a Product”
• Included in NetWare 6.5Target Software stack
• Included in NetWare 6.5 onlyHardware iSCSI adapters
• Third Party Certification Program through DeveloperNet
© Novell Inc, Confidential & Proprietary
Management interface - Browser
• NetWare Remote Manager®
• iManager®
© Novell Inc, Confidential & Proprietary
Management interface - Browser
• Add target Wizard
© Novell Inc, Confidential & Proprietary
Management interface - Browser
• Target Added
© Novell Inc, Confidential & Proprietary
Management interface - Browser
© Novell Inc, Confidential & Proprietary
Management interface - Cont.
© Novell Inc, Confidential & Proprietary
iSCSI HW Initiators for NetWare
HardWare Adapters
• Great for older OS release compatibility
• Great for off loading host CPUs
Plug n Go iSCSI
Management
• Load command line initially
• To be integrated into iSCSI management UI in the future
• Give HW adapters LDAP management capabilities automatically
© Novell Inc, Confidential & Proprietary
iSCSI HW Initiators for NetWare
Novell and TOE
• Currently no plans to support TOE for just TCP/IP
• NetWare OS Stack efficient enough
• 3 interfaces into NetWare stack
– WinSock 2
– BSD
– Proprietary Novell interface (difficult to emulate in HW)
Novell and SSL offload engines
• Novell is very interested in this technology, as SSL and link layer encryption off loading would make significant differences in Host CPU load
© Novell Inc, Confidential & Proprietary
Agenda
Storage Trends – How to manage the growth?
What is iSCSI?
When to use iSCSI?
Novell iSCSI Solutions
Novell iSCSI disk server
iSCSI and LDAP
Question and answer
© Novell Inc, Confidential & Proprietary
Novell iSCSI Disk Server
An inexpensive way to turn your existing direct attached storage (DAS) server hardware into a flexible and manageable SAN solution for your Net Services
NetWare 6.5 only
Integrated with LDAP for Directory based management
• Simplifies “LUN masking” in a familiar rights and access control management system
• Enterprise Wide management
• Security of TCP/IP (IPSec)
• Internet Capable
© Novell Inc, Confidential & Proprietary
iSCSI Disk Server
Leveraging existing direct attached storage systems to build a SAN
Gig Ethernet Switch
iSCSI Disk Servers (Targets)
Web & Applications Servers with iSCSI Initiators
Gig EthernetSCSI
© Novell Inc, Confidential & Proprietary
Management interface - Browser
© Novell Inc, Confidential & Proprietary
Agenda
Storage Trends – How to manage the growth?
What is iSCSI?
When to use iSCSI?
Novell iSCSI Solutions
Novell iSCSI disk server
iSCSI and LDAP
Question and answer
© Novell Inc, Confidential & Proprietary
Novell iSCSI + LDAP Strategy
Target and LUN objects represented in Directory
Initiator objects represented in Directory
Directory used to associate Initiators to Targets and LUNs
Target enforces the Directory associations
• Only those Initiators specified can attach
• All others; connection rejected
© Novell Inc, Confidential & Proprietary
Novell iSCSI + LDAP Strategy
Simple graphical interface for making associations
Enterprise wide enforcement
Only authorized users can make the associations
• Role based SAN administration
• Full eDirectory security enforced
• Many initiators to one target for Clustering
© Novell Inc, Confidential & Proprietary
LUN masking with eDir enabled iSCSI
© Novell Inc, Confidential & Proprietary
Agenda
Storage Trends – How to manage the growth?
What is iSCSI?
When to use iSCSI?
Novell iSCSI Solutions
Novell iSCSI disk server
iSCSI and LDAP
Question and answer
© Novell Inc, Confidential & Proprietary
© Novell Inc, Confidential & Proprietary
General DisclaimerThis document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.
No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.