Improve the Performance and Scalability of RAID-6 Systems Using Erasure Codes

Total Page:16

File Type:pdf, Size:1020Kb

Improve the Performance and Scalability of RAID-6 Systems Using Erasure Codes Virginia Commonwealth University VCU Scholars Compass Theses and Dissertations Graduate School 2012 Improve the Performance and Scalability of RAID-6 Systems Using Erasure Codes Chentao Wu Virginia Commonwealth University Follow this and additional works at: https://scholarscompass.vcu.edu/etd Part of the Engineering Commons © The Author Downloaded from https://scholarscompass.vcu.edu/etd/2894 This Dissertation is brought to you for free and open access by the Graduate School at VCU Scholars Compass. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of VCU Scholars Compass. For more information, please contact [email protected]. c by Chentao Wu, 2012 All Rights Reserved. i Improve the Performance and Scalability of RAID-6 Systems Using Erasure Codes A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at Virginia Commonwealth University. by Chentao Wu B. E., Huazhong Univ. of Sci. and Tech., Computer Sci. and Tech. M. E., Huazhong Univ. of Sci. and Tech., Software Engineering Director: Dr. Xubin He, Associate Professor Department of Electrical and Computer Engineering Virginia Commonwealth University Richmond, Virginia November 2012 Acknowledgements I would like to thank my dissertation advisor Dr. Xubin He, for his constant support and guidance at VCU in these years. He not only teaches me academically and shares his profound knowledge on data storage systems, but also encourages me in my daily life as an older brother. I would like to thank Dr. Wei Zhang, Dr. Meng Yu, Dr. Robert H. Klenke and Dr. Preetam Ghosh for serving on my advisory committee. The Storage Technology and Architecture Research (STAR) Lab at VCU have been very supportive in these years, but a special thank to Mr. Guanying Wu, Dr. Shenggang Wan, Dr. Huailiang Tan, Mr. Chao Yu and Mr. Tao Lyu for their continuous help and support. I would also like to thank Prof. Changsheng Xie, Dr. Qiang Cao, Dr. Jianzhong Huang, Dr. Zhihu Tan, Dr. Jiguang Wan, etc., who gave me a lot support on both academic research and daily life at Wuhan National Lab for Optoelectronics (WNLO), Huazhong University of Science and Technology (HUST), Wuhan, China. Finally, I would like to thank my parents and my younger brother for their understand- ing on my research. I would like to thank my wife Yizhe for her constant patience, love, and support in all of my endeavors for the last four years. Words cannot express my appreciation and gratefulness for finding you on this Earth and making the improbable a reality. iii Contents List of Tables ix List of Figures xi List of Algorithms xv List of Symbols xvi Preface xx Abstract xxii 1 Introduction1 1.1 Motivations..................................1 1.2 Problem Statement..............................3 1.3 Background and Related Work........................3 1.3.1 Definitions..............................3 1.3.2 Existing Erasure Codes........................5 1.3.3 Research on Performance in RAID Systems.............9 1.3.4 Research on Scalability in RAID Systems.............. 12 iv 1.4 Research Approaches............................. 16 2 H-Code 19 2.1 Introduction.................................. 19 2.2 H-Code.................................... 23 2.2.1 Data/Parity Layout and Encoding of H-Code............ 23 2.2.2 Construction Process......................... 25 2.2.3 Proof of Correctness......................... 26 2.2.4 Reconstruction............................ 29 2.3 Property Analysis............................... 32 2.3.1 Optimal Property of H-Code..................... 32 2.3.2 Partial Stripe Writes to Two Continuous Data Elements in H-Code. 34 2.3.3 Different Cases of Partial Stripe Writes to w Continuous Data Elements............................... 35 2.4 Performance Evaluation............................ 36 2.4.1 Evaluation Methodology....................... 36 2.4.2 Numerical Results.......................... 40 2.5 Summary................................... 45 3 HDP Code 47 3.1 Introduction.................................. 47 3.2 Summary on Load Balancing of Various Parities and Our Motivation.... 50 3.2.1 Horizontal Parity (HP)........................ 51 3.2.2 Diagonal/Anti-diagonal Parity (DP/ADP).............. 51 3.2.3 Vertical Parity (VP).......................... 52 v 3.2.4 Motivation.............................. 52 3.3 HDP Code................................... 53 3.3.1 Data/Parity Layout and Encoding of HDP Code........... 53 3.3.2 Construction Process......................... 55 3.3.3 Proof of Correctness......................... 55 3.3.4 Reconstruction Process........................ 57 3.3.5 Property of HDP Code........................ 59 3.4 Load Balancing Analysis........................... 59 3.4.1 Evaluation Methodology....................... 60 3.4.2 Numerical Results.......................... 63 3.5 Reliability Analysis.............................. 65 3.5.1 Fast Recovery on Single Disk.................... 66 3.5.2 Parallel Recovery on Double Disks................. 67 3.6 Summary................................... 68 4 Stripe-based Data Migration (SDM) Scheme 70 4.1 Introduction.................................. 70 4.2 Motivation................................... 72 4.3 SDM Scheme................................. 73 4.3.1 Priority Definition of Data/Parity Movements............ 74 4.3.2 Layout Comparison.......................... 75 4.3.3 Load Balancing Check in SDM................... 80 4.3.4 Data Migration............................ 83 4.3.5 Data Addressing Algorithm..................... 84 vi 4.3.6 Property of SDM........................... 84 4.4 Scalability Analysis.............................. 86 4.4.1 Evaluation Methodology....................... 86 4.4.2 Numerical Results.......................... 89 4.4.3 Analysis............................... 93 4.5 Summary................................... 93 5 MDS Coding Scaling Framework (MDS-Frame) 95 5.1 Introduction.................................. 95 5.2 Motivation................................... 96 5.3 MDS-Frame.................................. 97 5.4 Intermediate Code Layer........................... 98 5.4.1 Sp-Code................................ 99 5.4.2 Sp−1-Code and Sp+1-Code...................... 104 5.4.3 Observations............................. 106 5.5 Management Layer.............................. 107 5.5.1 Unified Management User Interface................. 107 5.5.2 Definition of the HE and LE Scaling................. 107 5.5.3 Scaling Algorithms.......................... 108 5.5.4 Overhead Analysis of Scaling between Intermediate Codes..... 109 5.5.5 Scaling Rules............................. 110 5.6 Scalability Analysis.............................. 110 5.6.1 Evaluation Methodology....................... 111 5.6.2 Numerical Results and Analysis................... 111 vii 5.7 Summary................................... 114 6 Conclusions 115 Bibliography 117 Vita 130 viii List of Tables 2.1 50 Random Integer Numbers......................... 38 2.2 Improvement of H-Code over Other Codes in terms of Average Partial Stripe Write Cost (Uniform Access)..................... 41 2.3 Improvement of H-Code over Other Codes in terms of Average Partial Stripe Write Cost (Random Access)..................... 43 2.4 Cost Of A Partial Stripe Write to w Continuous Data Elements in the Same Row (p = 7, Uniform Access)........................ 44 3.1 Summary of Different Parities........................ 53 3.2 50 Random Integer Numbers......................... 62 3.3 Different L Value in Horizontal Codes.................... 64 3.4 Reduced I/O of Single Disk failure in Different Codes............ 67 3.5 Recovery Time of Any Two Disk Failures in HDP Code (p = 5)...... 68 4.1 Summary on Various Fast Scaling Approaches................ 72 4.2 Priorities of Data/Parity Migration in SDM (For A Movement on Single Data/Parity Element)............................. 74 4.3 Different overhead of Extended Disk(s) Labelling in SDM......... 77 ix 4.4 Data Distribution of RAID-6 Scaling by Using SDM Scheme (RDP code, Scaling from 6 to 8 disks)........................... 80 4.5 Data Distribution of RAID-6 Scaling by Using SDM Scheme (P-Code, Scaling from 6 to 7 disks)........................... 80 4.6 Overhead of RAID-6 Scaling by Using SDM Scheme (RDP code, Scaling from 6 disks to 8 disks)............................ 87 4.7 Overhead of RAID-6 Scaling by Using SDM Scheme (P-Code, Scaling from 6 disks to 7 disks)............................ 88 4.8 Speed Up of SDM Scheme over Other RAID-6 Scaling Schemes in terms of Migration Time............................... 93 5.1 Overhead of Typical scaling in MDS-Frame................. 109 x List of Figures 1.1 EVENODD code for p + 2 disks when p = 5 and n = 7...........6 1.2 Blaum-Roth code for p + 1 disks (p = 5, n = 6)...............6 1.3 Liberation code for p + 2 disks (p = 5, n = 7)................7 1.4 RDP code for p + 1 disks (p = 5, n = 6)...................7 1.5 X-Code for p disks (p = 5, n = 5).......................8 1.6 P-Code.....................................8 1.7 HoVer code for 6 disks (n = 6)........................9 1.8 Reduce I/O cost when column 2 fails in RDP code (p = 7, n = 8)...... 11 1.9 Reduce I/O cost when column 2 fails in X-Code (p = 7, n = 7)....... 12 1.10 RAID-6 scaling in RDP from 6 to 8 disks using RR approach........ 14 1.11 RAID-6 scaling in P-Code from 6 to 7 disks using Semi-RR approach.... 15 1.12 RAID-5 scaling from 4 to 5 disks using ALV approach (all data blocks are need to be migrated).............................
Recommended publications
  • VIA RAID Configurations
    VIA RAID configurations The motherboard includes a high performance IDE RAID controller integrated in the VIA VT8237R southbridge chipset. It supports RAID 0, RAID 1 and JBOD with two independent Serial ATA channels. RAID 0 (called Data striping) optimizes two identical hard disk drives to read and write data in parallel, interleaved stacks. Two hard disks perform the same work as a single drive but at a sustained data transfer rate, double that of a single disk alone, thus improving data access and storage. Use of two new identical hard disk drives is required for this setup. RAID 1 (called Data mirroring) copies and maintains an identical image of data from one drive to a second drive. If one drive fails, the disk array management software directs all applications to the surviving drive as it contains a complete copy of the data in the other drive. This RAID configuration provides data protection and increases fault tolerance to the entire system. Use two new drives or use an existing drive and a new drive for this setup. The new drive must be of the same size or larger than the existing drive. JBOD (Spanning) stands for Just a Bunch of Disks and refers to hard disk drives that are not yet configured as a RAID set. This configuration stores the same data redundantly on multiple disks that appear as a single disk on the operating system. Spanning does not deliver any advantage over using separate disks independently and does not provide fault tolerance or other RAID performance benefits. If you use either Windows® XP or Windows® 2000 operating system (OS), copy first the RAID driver from the support CD to a floppy disk before creating RAID configurations.
    [Show full text]
  • Building Reliable Massive Capacity Ssds Through a Flash Aware RAID-Like Protection †
    applied sciences Article Building Reliable Massive Capacity SSDs through a Flash Aware RAID-Like Protection † Jaeho Kim 1 and Jung Kyu Park 2,* 1 Department of Aerospace and Software Engineering & Engineering Research Institute, Gyeongsang National University, Jinju 52828, Korea; [email protected] 2 Department of Computer Software Engineering, Changshin University, Changwon 51352, Korea * Correspondence: [email protected] † This Paper Is an Extended Version of Paper Published in the IEEE International Conference on Consumer Electronics (ICCE) 2020, Las Vegas, NV, USA, 4–6 January 2020. Received: 14 November 2020; Accepted: 16 December 2020; Published: 21 December 2020 Abstract: The demand for mass storage devices has become an inevitable consequence of the explosive increase in data volume. The three-dimensional (3D) vertical NAND (V-NAND) and quad-level cell (QLC) technologies rapidly accelerate the capacity increase of flash memory based storage system, such as SSDs (Solid State Drives). Massive capacity SSDs adopt dozens or hundreds of flash memory chips in order to implement large capacity storage. However, employing such a large number of flash chips increases the error rate in SSDs. A RAID-like technique inside an SSD has been used in a variety of commercial products, along with various studies, in order to protect user data. With the advent of new types of massive storage devices, studies on the design of RAID-like protection techniques for such huge capacity SSDs are important and essential. In this paper, we propose a massive SSD-Aware Parity Logging (mSAPL) scheme that protects against n-failures at the same time in a stripe, where n is protection strength that is specified by the user.
    [Show full text]
  • Rethinking RAID for SSD Reliability
    Differential RAID: Rethinking RAID for SSD Reliability Asim Kadav Mahesh Balakrishnan University of Wisconsin Microsoft Research Silicon Valley Madison, WI Mountain View, CA [email protected] [email protected] Vijayan Prabhakaran Dahlia Malkhi Microsoft Research Silicon Valley Microsoft Research Silicon Valley Mountain View, CA Mountain View, CA [email protected] [email protected] ABSTRACT sult, a write-intensive workload can wear out the SSD within Deployment of SSDs in enterprise settings is limited by the months. Also, this erasure limit continues to decrease as low erase cycles available on commodity devices. Redun- MLC devices increase in capacity and density. As a conse- dancy solutions such as RAID can potentially be used to pro- quence, the reliability of MLC devices remains a paramount tect against the high Bit Error Rate (BER) of aging SSDs. concern for its adoption in servers [4]. Unfortunately, such solutions wear out redundant devices at similar rates, inducing correlated failures as arrays age in In this paper, we explore the possibility of using device-level unison. We present Diff-RAID, a new RAID variant that redundancy to mask the effects of aging on SSDs. Clustering distributes parity unevenly across SSDs to create age dispari- options such as RAID can potentially be used to tolerate the ties within arrays. By doing so, Diff-RAID balances the high higher BERs exhibited by worn out SSDs. However, these BER of old SSDs against the low BER of young SSDs. Diff- techniques do not automatically provide adequate protec- RAID provides much greater reliability for SSDs compared tion for aging SSDs; by balancing write load across devices, to RAID-4 and RAID-5 for the same space overhead, and solutions such as RAID-5 cause all SSDs to wear out at ap- offers a trade-off curve between throughput and reliability.
    [Show full text]
  • Disk Array Data Organizations and RAID
    Guest Lecture for 15-440 Disk Array Data Organizations and RAID October 2010, Greg Ganger © 1 Plan for today Why have multiple disks? Storage capacity, performance capacity, reliability Load distribution problem and approaches disk striping Fault tolerance replication parity-based protection “RAID” and the Disk Array Matrix Rebuild October 2010, Greg Ganger © 2 Why multi-disk systems? A single storage device may not provide enough storage capacity, performance capacity, reliability So, what is the simplest arrangement? October 2010, Greg Ganger © 3 Just a bunch of disks (JBOD) A0 B0 C0 D0 A1 B1 C1 D1 A2 B2 C2 D2 A3 B3 C3 D3 Yes, it’s a goofy name industry really does sell “JBOD enclosures” October 2010, Greg Ganger © 4 Disk Subsystem Load Balancing I/O requests are almost never evenly distributed Some data is requested more than other data Depends on the apps, usage, time, … October 2010, Greg Ganger © 5 Disk Subsystem Load Balancing I/O requests are almost never evenly distributed Some data is requested more than other data Depends on the apps, usage, time, … What is the right data-to-disk assignment policy? Common approach: Fixed data placement Your data is on disk X, period! For good reasons too: you bought it or you’re paying more … Fancy: Dynamic data placement If some of your files are accessed a lot, the admin (or even system) may separate the “hot” files across multiple disks In this scenario, entire files systems (or even files) are manually moved by the system admin to specific disks October 2010, Greg
    [Show full text]
  • Identify Storage Technologies and Understand RAID
    LESSON 4.1_4.2 98-365 Windows Server Administration Fundamentals IdentifyIdentify StorageStorage TechnologiesTechnologies andand UnderstandUnderstand RAIDRAID LESSON 4.1_4.2 98-365 Windows Server Administration Fundamentals Lesson Overview In this lesson, you will learn: Local storage options Network storage options Redundant Array of Independent Disk (RAID) options LESSON 4.1_4.2 98-365 Windows Server Administration Fundamentals Anticipatory Set List three different RAID configurations. Which of these three bus types has the fastest transfer speed? o Parallel ATA (PATA) o Serial ATA (SATA) o USB 2.0 LESSON 4.1_4.2 98-365 Windows Server Administration Fundamentals Local Storage Options Local storage options can range from a simple single disk to a Redundant Array of Independent Disks (RAID). Local storage options can be broken down into bus types: o Serial Advanced Technology Attachment (SATA) o Integrated Drive Electronics (IDE, now called Parallel ATA or PATA) o Small Computer System Interface (SCSI) o Serial Attached SCSI (SAS) LESSON 4.1_4.2 98-365 Windows Server Administration Fundamentals Local Storage Options SATA drives have taken the place of the tradition PATA drives. SATA have several advantages over PATA: o Reduced cable bulk and cost o Faster and more efficient data transfer o Hot-swapping technology LESSON 4.1_4.2 98-365 Windows Server Administration Fundamentals Local Storage Options (continued) SAS drives have taken the place of the traditional SCSI and Ultra SCSI drives in server class machines. SAS have several
    [Show full text]
  • 1 Configuring SATA Controllers A
    RAID Levels RAID 0 RAID 1 RAID 5 RAID 10 Minimum Number of Hard ≥2 2 ≥3 ≥4 Drives Array Capacity Number of hard Size of the smallest (Number of hard (Number of hard drives * Size of the drive drives -1) * Size of drives/2) * Size of the smallest drive the smallest drive smallest drive Fault Tolerance No Yes Yes Yes To create a RAID set, follow the steps below: A. Install SATA hard drive(s) in your computer. B. Configure SATA controller mode in BIOS Setup. C. Configure a RAID array in RAID BIOS. (Note 1) D. Install the SATA RAID/AHCI driver and operating system. Before you begin, please prepare the following items: • At least two SATA hard drives or M.2 SSDs (Note 2) (to ensure optimal performance, it is recommended that you use two hard drives with identical model and capacity). (Note 3) • A Windows setup disk. • Motherboard driver disk. • A USB thumb drive. 1 Configuring SATA Controllers A. Installing hard drives Connect the SATA signal cables to SATA hard drives and the Intel® Chipset controlled SATA ports (SATA3 0~5) on the motherboard. Then connect the power connectors from your power supply to the hard drives. Or install your M.2 SSD(s) in the M.2 connector(s) on the motherboard. (Note 1) Skip this step if you do not want to create RAID array on the SATA controller. (Note 2) An M.2 PCIe SSD cannot be used to set up a RAID set either with an M.2 SATA SSD or a SATA hard drive.
    [Show full text]
  • Techsmart Representatives
    Wave TechSmart representatives RAID BASICS ARE YOUR SECURITY SOLUTIONS FAULT TOLERANT? Redundant Array of Independent Disks (RAID) is a Enclosure: The "box" which contains the controller, storage technology used to improve the processing drives/drive trays and bays, power supplies, and fans is capability of storage systems. This technology is called an "enclosure." The enclosure includes various designed to provide reliability in disk array systems and controls, ports, and other features used to connect the to take advantage of the performance gains offered by RAID to a host for example. an array of mulple disks over single-disk storage. Wave RepresentaCves has experience with both high- RAID’s two primary underlying concepts are (1) that performance compuCng and enterprise storage, providing distribuCng data over mulple hard drives improves soluCons to large financial instuCons to research performance and (2) that using mulple drives properly laboratories. The security industry adopted superior allows for any one drive to fail without loss of data and compuCng and storage technologies aGer the transiCon without system downCme. In the event of a disk from analog systems to IP based networks. This failure, disk access will conCnue normally and the failure evoluCon has created robust and resilient systems that will be transparent to the host system. can handle high bandwidth from video surveillance soluCons to availability for access control and emergency Originally designed and implemented for SCSI drives, communicaCons. RAID principles have been applied to SATA and SAS drives in many video systems. Redundancy of any system, especially of components that have a lower tolerance in MTBF makes sense.
    [Show full text]
  • Softraid Boot
    softraid boot Stefan Sperling <[email protected]> EuroBSDcon 2015 Introduction to softraid OpenBSD's softraid(4) device emulates a host controller which provides a virtual SCSI bus uses disciplines to perform I/O on underlying disks: RAID 0, RAID 1, RAID 5, CRYPTO, CONCAT borrows the bioctl(8) configuration utility from the bio(4) hardware RAID abstraction layer softraid0 at root scsibus4 at softraid0: 256 targets sd9 at scsibus4 targ 1 lun 0: <OPENBSD, SR RAID 1, 005> SCSI2 0/direct fixed sd9: 1430796MB, 512 bytes/sector, 2930271472 sectors (RAID 1 softraid volume appearing as disk sd9) OpenBSD softraid boot 2/22 Introduction to softraid OpenBSD's softraid(4) device uses chunks (disklabel slices of type RAID) for storage records meta data at the start of each chunk: format version, UUID, volume ID, no. of chunks, chunk ID, RAID type and size, and other optional meta data # disklabel -pm sd2 [...] # size offset fstype [fsize bsize cpg] c: 1430799.4M 0 unused d: 1430796.9M 64 RAID # bioctl sd9 Volume Status Size Device softraid0 0 Online 1500298993664 sd9 RAID1 0 Online 1500298993664 0:0.0 noencl <sd2d> 1 Online 1500298993664 0:1.0 noencl <sd3d> (RAID 1 softraid volume using sd2d and sd3d for storage) OpenBSD softraid boot 3/22 Introduction to softraid softraid volumes can be assembled manually with bioctl(8) or automatically during boot softraid UUID ties volumes and chunks together disk device names and disklabel UUIDs are irrelevant when softraid volumes are auto-assembled volume IDs are used to attach volumes in a predictable order stable disk device names unless disks are added/removed chunk IDs make chunks appear in a predictable order important for e.g.
    [Show full text]
  • RAID — Begin with the Basics How Does RAID Work? RAID Increases Data Protection and Performance by What Is RAID? Duplicating And/Or Spreading Data Over Multiple Disks
    RAID — Begin With The Basics How Does RAID Work? RAID increases data protection and performance by What is RAID? duplicating and/or spreading data over multiple disks. DRIVE 1 RAID stands for Redundant Array of Inexpensive Disks. RAID is a method of logically treating Mirroring Mirroring & Striping several hard drives as one unit. It can offer fault tolerance and higher throughput levels than a Duplicates data from primary Mirrors data that is striped, spread single hard drive or group of independent hard drives. DRIVE 2 drive to secondary drive evenly across multiple disks Why Do We Need It? RAID provides real-time data recovery when a hard drive fails, increasing system uptime and DRIVE 1 DRIVE 1 DRIVE 3 availability while protecting against loss of data. Multiple drives working together also increase system performance. DRIVE 2 DRIVE 2 DRIVE 4 Levels of RAID DRIVE 1 DRIVE 3 RAID Level Description Minimum # of Drives Benefit RAID 0 Data striping (no data protection) 2 Highest performance DRIVE 2 DRIVE 4 RAID 1 Disk mirroring 2 Highest data protection RAID 1E Disk mirroring 3 Highest data protection for an odd number of disks RAID 5 Data striping with distributed parity 3 Best cost/performance balance for multi-drive environments RAID 5EE Data striping with distributed parity with 4 The cost/performance balance of RAID 5 without setting aside a dedicated hotspare disk hotspare integrated into the array RAID 6 Data striping with dual distributed parity 4 Highest fault tolerance with the ability to survive two disk failures RAID 10 Data
    [Show full text]
  • ZFS Basics Various ZFS RAID Lebels = & . = a Little About Zetabyte File System ( ZFS / Openzfs)
    = BDNOG11 | Cox's Bazar | Day # 3 | ZFS Basics & Various ZFS RAID Lebels. = = ZFS Basics & Various ZFS RAID Lebels . = A Little About Zetabyte File System ( ZFS / OpenZFS) =1= = BDNOG11 | Cox's Bazar | Day # 3 | ZFS Basics & Various ZFS RAID Lebels. = Disclaimer: The scope of this topic here is not to discuss in detail about the architecture of the ZFS (OpenZFS) rather Features, Use Cases and Operational Method. =2= = BDNOG11 | Cox's Bazar | Day # 3 | ZFS Basics & Various ZFS RAID Lebels. = What is ZFS? =0= ZFS is a combined file system and logical volume manager designed by Sun Microsystems and now owned by Oracle Corporation. It was designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens. Matt is the founding member of OpenZFS. =0= Its development started in 2001 and it was officially announced in 2004. In 2005 it was integrated into the main trunk of Solaris and released as part of OpenSolaris. =0= It was described by one analyst as "the only proven Open Source data-validating enterprise file system". This file =3= = BDNOG11 | Cox's Bazar | Day # 3 | ZFS Basics & Various ZFS RAID Lebels. = system also termed as the “world’s safest file system” by some analyst. =0= ZFS is scalable, and includes extensive protection against data corruption, support for high storage capacities, efficient data compression and deduplication. =0= ZFS is available for Solaris (and its variants), BSD (and its variants) & Linux (Canonical’s Ubuntu Integrated as native kernel module from version 16.04x) =0= OpenZFS was announced in September 2013 as the truly open source successor to the ZFS project.
    [Show full text]
  • RAID with Windows Server 2012 O RAID 0: Stripe Set Without Parity O RAID 1: Mirror Set Without Parity O RAID 5: Stripe Set with Distributed Parity
    Lesson 3: Configuring Local Storage MOAC 70-410: Installing and Configuring Windows Server 2012 Overview • Exam Objective 1.3: Configure Local Storage • Planning Server Storage • Understanding Windows Disk Settings • Working with Disks © 2013 John Wiley & Sons, Inc. 2 Planning Server Storage Lesson 3: Configuring Local Storage © 2013 John Wiley & Sons, Inc. 3 Planning Server Storage When planning storage solutions for a server, you must consider many factors: • The amount of storage the server needs • The number of users that will be accessing the server at the same time • The sensitivity of the data to be stored on the server • The importance of the data to the organization © 2013 John Wiley & Sons, Inc. 4 How Many Servers Do I Need? When is one big file server preferable to several smaller ones? Consider the storage limitations of Windows Server 2012 ReFS. Attribute Limit based on the on-disk format Maximum size of a single file 264-1 bytes Format supports 278 bytes with 16KB cluster size. Maximum size of a single volume Windows stack addressing allows 264 bytes Maximum number of files in a directory 264 Maximum number of directories in a volume 264 Maximum file name length 32K unicode characters Maximum path length 32K Maximum size of any storage pool 4 petabytes Maximum number of storage pools in a system No limit Maximum number of spaces in a storage pool No limit © 2013 John Wiley & Sons, Inc. 5 Estimating Storage Requirements The amount of space you need in a server depends on a variety of factors, not just the requirements of your applications and users: • Operating system: Depends on roles and features chosen • Paging file: Depends on RAM and number of VMs • Memory dump: Space to hold the contents of memory + 1MB • Log files: From Event Viewer • Shadow copies: Can utilize up to 10% of space • Fault tolerance: Disk mirroring versus parity © 2013 John Wiley & Sons, Inc.
    [Show full text]
  • Which RAID Level Is Right for Me?
    STORAGE SOLUTIONS WHITE PAPER Which RAID Level is Right for Me? Contents Introduction.....................................................................................1 RAID 10 (Striped RAID 1 sets) .................................................3 RAID Level Descriptions..................................................................1 RAID 50 (Striped RAID 5 sets) .................................................4 RAID 0 (Striping).......................................................................1 RAID 60 (Striped RAID 6 sets) .................................................4 RAID 1 (Mirroring).....................................................................2 RAID Level Comparison ..................................................................5 RAID 1E (Striped Mirror)...........................................................2 About Adaptec RAID .......................................................................5 RAID 5 (Striping with parity) .....................................................2 RAID 5EE (Hot Space).....................................................................3 RAID 6 (Striping with dual parity).............................................3 Data is the most valuable asset of any business today. Lost data of users. This white paper intends to give an overview on the means lost business. Even if you backup regularly, you need a performance and availability of various RAID levels in general fail-safe way to ensure that your data is protected and can be and may not be accurate in all user
    [Show full text]