CAN RAID TECHNOLOGY CONTINUE to PROTECT OUR DATA in the YEAR 2020? Bruce Yellin Advisory Technology Consultant [email protected] EMC Corporation

Total Page:16

File Type:pdf, Size:1020Kb

CAN RAID TECHNOLOGY CONTINUE to PROTECT OUR DATA in the YEAR 2020? Bruce Yellin Advisory Technology Consultant Bruce.Yellin@Emc.Com EMC Corporation CAN RAID TECHNOLOGY CONTINUE TO PROTECT OUR DATA IN THE YEAR 2020? Bruce Yellin Advisory Technology Consultant [email protected] EMC Corporation Table of Contents What’s the Issue? ...................................................................................................................... 4 The Danger ................................................................................................................................ 8 Tackling the Issue Head On ......................................................................................................13 Erasure Coding .....................................................................................................................17 What About Solid State Disks? ..............................................................................................19 Triple parity ...........................................................................................................................22 RAID 1 ..................................................................................................................................22 Big Data ................................................................................................................................23 Conclusion ................................................................................................................................25 Appendix – Background on How A Disk Handles I/O Requests ................................................27 Footnotes ..................................................................................................................................28 Disclaimer: The views, processes, or methodologies published in this article are those of the author. They do not necessarily reflect EMC Corporation’s views, processes, or methodologies. 2012 EMC Proven Professional Knowledge Sharing 2 The digital data tsunami is coming. It is not a once in a decade storm, but a continuous daily event that can overwhelm the largest of data centers. Like a giant surge of rising water, data continues to grow at 60% a year and you need to be prepared. IDC reports over a zettabyte (one trillion gigabytes) of information was created and replicated worldwide in 2010, growing to 1.8 zettabytes just a year later. Data has increased by a factor of nine in just the last five years, and that the number of files will grow 8-fold over the next five years1. Over 90% of that data surge is unstructured, and “big data” is by far the largest producer of unstructured data. One of the challenging issues is how to store and protect all that data. No one is suggesting you’ll have a zettabyte or even an exabyte, but in the next eight years, you could easily be storing a petabyte of data. Will you use RAID to protect it? RAID is the “Swiss Army” tool invented in 19882 to protect and improve the performance of sub-gigabyte drives. Meanwhile, drive capacities have doubled every year or two since then according to Kryder’s Law3. Similar to Moore’s Law, Mark Kryder’s work suggest that by 2015, 6TB drives will be common and by 2020, we will have inexpensive 14TB4 hard drives. Is RAID still the right tool to use? The numbers can be scary. Years ago, 50-100TB seemed like a lot of storage. These days, 250TB of usable capacity minimally needs 320 x 1TB drives using RAID 6 (14+2) protection. At the projected growth rate, you will have a petabyte of usable capacity and almost 1,300 of those drives three years from now. RAID would be protecting over 13,300 x 1TB drives by 2020. Clearly, that is a lot of drives and eight years is beyond their useful drive life, so it is a good thing those larger 6TB drives are coming, right? Well, maybe. Whether you believe data will grow at 40%, 50%, or 60%, or if drive sizes double every year or two or three, one of the issues facing the storage industry is whether today’s parity RAID concepts are up to the task of protecting those large drives. Many have their doubts. Drives have gotten larger because of the advances in areal density. As shown to the right, areal density is the number of bits in a square inch of magnetic media. The original IBM RAMAC in 19565 had a density of 2,000 bits/in2 and today 625 gigabits fit in a square inch of a 4TB drive6. The downside to increased areal density is the potentially harmful increase in bit error rate (BER). 2012 EMC Proven Professional Knowledge Sharing 3 Larger drives also have longer rebuild times. We also know if we consolidate them into even larger ones, such as two 1TB drives combined into a single 2TB drive, the performance profile significantly decreases. Solid-state drives (SSDs) can offset the performance deficiencies of mechanical drives, but they have their own unique reliability issues. With that in mind, this Knowledge Sharing article examines how RAID holds up. What’s the Issue? Mechanical hard disk drives, which will be called HDD throughout this article, use a magnetically coated platter with “flying” disk heads, while SSDs use memory chips. Drive platters are made from aluminum or glass/ceramic that resists expansion and contraction when they get hot or cold. That material is ground down and base coated for an ultra flat surface. Additional polishing is done before various magnetic layers are deposited on the platter through processes such as “sputtering”7, all before a protective coating is applied. The disk drive housing contains one or more platters, a read/write head for each platter surface, a head positioning coil, a motor to spin the platters, and electronics to translate the disk controller’s commands and administer the buffer space. The head, literally flying over the spinning platter at a fraction of an inch at speeds greater than 150 M.P.H. (15,000 RPM drive), imparts a magnetic field or detects the existing magnetic field on the platter. The positioning coil receives instructions from the drive electronics as to where to position the head over the platter. Before a single bit of data is stored on a drive, it is first low-level formatted at the factory and high-level formatted by your storage frame’s operating system. This allows any “bad” sectors to be remapped to spare sectors. With the drive operational, when a server issues a write to a disk sector, the data is broken up into 512 or 4,096 byte sectors. Extra Error Correcting Code (ECC) check bits are calculated at the same time and written along with the sector to the platter. For example, on EMC VMAX®8 and VNX® arrays, a sector is 520 bytes in size with 512 bytes for data and an 8 byte CRC (cyclic redundancy check) checksum to maintain the integrity of the sector’s data. When the drive subsequently reads that sector, it also reads the ECC which together detects if the correct data was read. Data are Run-Length Limited (RLL) encoded to maximize the number of bits stored on the media, well beyond the coding of just a zero or a one bit. 2012 EMC Proven Professional Knowledge Sharing 4 With data packed so densely, ECC frequently corrects the data given the fluctuating signal strengths and electronic noise of a flying head over a rotating platter. It is when ECC is unable to correct the data that your operating system displays a disk read error message. As mentioned earlier, drive capacity is a factor of its areal density, and the denser you can pack the zeroes and ones on the magnetic media, the greater the BER and likelihood of read failures. In this chart, areal density is shown to be limited by the BER, especially when heat, commonly called a thermodynamic effect, becomes a factor.9 Some manufacturers are tackling the BER problem by formatting drives with larger 4,096 byte sectors and 100 bytes of ECC. Larger ECCs distribute the calculation overhead from eight sectors to one sector thereby reducing the error checking overhead caused by 512 byte sectors on dense drives10. The 4KB ECC helps address the BER problem that are in some cases approaching 1 bit of error for every 12.5TB read – more on this in a later section. Another benefit of the 4KB sector is a reduction in the usable capacity overhead on the drive. The improvement ranges from “…seven to eleven percent in physical platter space” and “The 4K format provides enough space to expand the ECC field from 50 to 100 bytes to accommodate new ECC algorithms.”11 Some systems proactively test drive reliability before failures occur by “sniffing” or “scrubbing” them and making sure all the data can be “test read” without error. This happens during idle moments and has very little performance impact on the rest of the system. 2012 EMC Proven Professional Knowledge Sharing 5 Monitoring the well-being of every zero and one on a disk and noting the quantity of recoverable read errors is just one way of predicting a possible future disk failure. These statistics, depending on the system, allow it to proactively move data from troubled disk areas to safe locations on other drives before serious problems arise. This monitoring is just one way a system can perform “self-healing”. Another tool used to predict failure is S.M.A.R.T., or Self-Monitoring Analysis and Reporting Technology. S.M.A.R.T. tracks drive conditions and alerts the user to pending disk failures with the goal of giving you enough time to back up your data before it is lost. This tool incorporates metrics such as reallocated sector counts, temperature, raw read errors, spin-up time, and others. In theory, if the temperature rises or any other triggering event occurs, data can be preemptively moved off the suspect drive or all the data can be copied to a spare. Copying is much faster than parity rebuilding. However, in a Google study of over 100,000 drives, there was “…little predictive value of S.M.A.R.T.“ and “…in the 60 days following the first scan error on a drive, the drive is, on average, 39 times more likely to fail than it would have been had no such error occurred.”12 For more on S.M.A.R.T., please read the article “Playing It S.M.A.R.T.”13. As a disk controller issues read and write drive requests, it may find a sector to be unreliable – i.e., the magnetic coding is not retaining data or is reporting the wrong information. For example, after a write, the drive reads the information again to make sure it was written properly.
Recommended publications
  • Active@ Boot Disk User Guide Copyright © 2008, LSOFT TECHNOLOGIES INC
    Active@ Boot Disk User Guide Copyright © 2008, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from LSOFT TECHNOLOGIES INC. LSOFT TECHNOLOGIES INC. reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of LSOFT TECHNOLOGIES INC. to provide notification of such revision or change. LSOFT TECHNOLOGIES INC. provides this documentation without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. LSOFT may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. All technical data and computer software is commercial in nature and developed solely at private expense. As the User, or Installer/Administrator of this software, you agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. LSOFT.NET logo is a trademark of LSOFT TECHNOLOGIES INC. Other brand and product names may be registered trademarks or trademarks of their respective holders. 2 Active@ Boot Disk User Guide Contents 1.0 Product Overview ..........................................................................................................
    [Show full text]
  • Active@ UNDELETE Documentation
    Active @ UNDELETE Users Guide | Contents | 2 Contents Legal Statement.........................................................................................................5 Active@ UNDELETE Overview............................................................................. 6 Getting Started with Active@ UNDELETE.......................................................... 7 Active@ UNDELETE Views And Windows...................................................................................................... 7 Recovery Explorer View.......................................................................................................................... 8 Logical Drive Scan Result View..............................................................................................................9 Physical Device Scan View......................................................................................................................9 Search Results View...............................................................................................................................11 File Organizer view................................................................................................................................ 12 Application Log...................................................................................................................................... 13 Welcome View........................................................................................................................................14 Using
    [Show full text]
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • Chapter 9: Peripheral Devices—Overview D a 2/E
    C S Chapter 9: Peripheral Devices—Overview D A 2/e Magnetic disk drives: ubiquitous and complex Other moving media devices: tape and CD ROM Display devices Video monitors: analog characteristics Video terminals Memory mapped video displays Flat panel displays Printers: dot matrix, laser, inkjet Manual input: keyboards and mice A to D and D to A converters: the analog world Computer Systems Design and Architecture Second Edition © 2004 Prentice Hall C S Tbl 9.1 Some Common Peripheral Interface D Standards A 2/e Bus Standard Data Rate Bus Width Centronics ~50KB/s 8-bit parallel EIA RS232/422 30-20K B/s bit-serial SCSI 10-500 MB/s 16-bit parallel Ethernet 10-1000 Mb/s bit-serial USB 1.5-12 Mb/s bit-serial USB-2 480 Mb/s bit-serial FireWire† 100-400 Mb/s bit-serial FireWire-800† 800 Mb/s bit-serial †Also known as Sony iLink, or IEEE1394 and 1394b, respectively Computer Systems Design and Architecture Second Edition © 2004 Prentice Hall C S Disk Drives—Moving Media Magnetic D Recording A 2/e High density and non-volatile Densities approaching semiconductor RAM on an inexpensive medium No power required to retain stored information Motion of medium supplies power for sensing More random access than tape: direct access Different platters selected electronically Track on platter selected by head movement Cyclic sequential access to data on a track Structured address of data on disk Drive: Platter: Track: Sector: Byte Computer Systems Design and Architecture Second Edition © 2004 Prentice Hall C S Fig 9.3 Cutaway View of a Multi-Platter
    [Show full text]
  • Diskgenius User Guide (PDF)
    www.diskgenius.com DiskGenius® User Guide The information in this document is subject to change without notice. This document is not warranted to be error free. Copyright © 2010-2021 Eassos Ltd. All Rights Reserved 1 / 236 www.diskgenius.com CONTENTS Introduction ................................................................................................................................. 6 Partition Management ............................................................................................................. 6 Create New Partition ........................................................................................................ 6 Active Partition (Mark Partition as Active) .............................................................. 10 Delete Partition ................................................................................................................ 12 Format Partition ............................................................................................................... 14 Hide Partition .................................................................................................................... 15 Modify Partition Parameters ........................................................................................ 17 Resize Partition ................................................................................................................. 20 Split Partition ..................................................................................................................... 23 Extend
    [Show full text]
  • Operating Systems Disk Management
    Operating Systems Disk Management Disks, SSDs, RAID, Caching Peter R. Pietzuch [email protected] Disks have come a long way... • IBM 305 RAMAC (1956) – First commercial hard disk: 4.4MB – Footprint: 1.5 m2 – Price: $160,000 • Toshiba 0.85” disk (2005) – Capacity: 4GB – Price: <$300 1 Disk Evolution • Capacity increases exponentially – Access speeds not so much... (why?) 2 Disk Evolution http://www.anandtech.com/show/9866/hard-disk-drives-with-hamr-technology-set-to-arrive-in-2018 3 What is driving demand? Eric Brewer. https://www.usenix.org/sites/default/files/conference/protected-files/fast16_slides_brewer.pdf 4 Disk Storage Devices 5 Tracks and Cylinders Track Track Cylinder Track Track 6 Sample Disk Specification Parameter IBM 360KB Seagate floppy disk Barracuda ST3400832AS No. of cylinders 40 16,383 Tracks / cylinder 2 16 Sectors / track 9 63 Bytes / sector 512 512 Sectors / disk 720 781,422,768 Disk capacity 360KB 400GB 7 Sector Layout • Surface divided into 20 or more zones – Outer zones have more sectors per track – Ensures that sectors have same physical length – Zones hidden using virtual geometry 8 Disk Addressing • Physical hardware address: (cylinder, surface, sector) – But actual geometry complicated è hide from OS • Modern disks use logical sector addressing (or logical block addresses LBA) – Sectors numbered consecutively from 0..n – Makes disk management much easier – Helps work around BIOS limitations • Original IBM PC BIOS 8GB max • 6 bits for sector, 4 bits for head, 14 bits for cylinder 9 Disk Capacity • Disk capacity
    [Show full text]
  • File Allocation Table - Wikipedia, the Free Encyclopedia Page 1 of 22
    File Allocation Table - Wikipedia, the free encyclopedia Page 1 of 22 File Allocation Table From Wikipedia, the free encyclopedia File Allocation Table (FAT) is a file system developed by Microsoft for MS-DOS and is the primary file system for consumer versions of Microsoft Windows up to and including Windows Me. FAT as it applies to flexible/floppy and optical disc cartridges (FAT12 and FAT16 without long filename support) has been standardized as ECMA-107 and ISO/IEC 9293. The file system is partially patented. The FAT file system is relatively uncomplicated, and is supported by virtually all existing operating systems for personal computers. This ubiquity makes it an ideal format for floppy disks and solid-state memory cards, and a convenient way of sharing data between disparate operating systems installed on the same computer (a dual boot environment). The most common implementations have a serious drawback in that when files are deleted and new files written to the media, directory fragments tend to become scattered over the entire disk, making reading and writing a slow process. Defragmentation is one solution to this, but is often a lengthy process in itself and has to be performed regularly to keep the FAT file system clean. Defragmentation should not be performed on solid-state memory cards since they wear down eventually. Contents 1 History 1.1 FAT12 1.2 Directories 1.3 Initial FAT16 1.4 Extended partition and logical drives 1.5 Final FAT16 1.6 Long File Names (VFAT, LFNs) 1.7 FAT32 1.8 Fragmentation 1.9 Third party
    [Show full text]
  • R-Linux User's Manual
    User's Manual R-Linux © R-Tools Technology Inc 2019. All rights reserved. www.r-tt.com © R-tools Technology Inc 2019. All rights reserved. No part of this User's Manual may be copied, altered, or transferred to, any other media without written, explicit consent from R-tools Technology Inc.. All brand or product names appearing herein are trademarks or registered trademarks of their respective holders. R-tools Technology Inc. has developed this User's Manual to the best of its knowledge, but does not guarantee that the program will fulfill all the desires of the user. No warranty is made in regard to specifications or features. R-tools Technology Inc. retains the right to make alterations to the content of this Manual without the obligation to inform third parties. Contents I Table of Contents I Introduction to R-Linux 1 1 R-Studi.o.. .F..e..a..t.u..r.e..s.. ................................................................................................................. 2 2 R-Linux.. .S..y..s.t.e..m... .R...e..q..u..i.r.e..m...e..n..t.s. .............................................................................................. 4 3 Contac.t. .I.n..f.o..r.m...a..t.i.o..n.. .a..n..d.. .T..e..c..h..n..i.c.a..l. .S...u..p..p..o..r.t. ......................................................................... 4 4 R-Linux.. .M...a..i.n.. .P..a..n..e..l. .............................................................................................................. 5 5 R-Linu..x.. .S..e..t.t.i.n..g..s. .................................................................................................................. 10 II Data Recovery Using R-Linux 16 1 Basic .F..i.l.e.. .R..e..c..o..v..e..r.y.. ............................................................................................................ 17 Searching for.
    [Show full text]
  • Backing Storage
    Student Notes Theory Storage Further Reading Merlin Pg 253 Glossary Pg 134 Introduction All computer systems need to store data. This is done: Temporarily while a program is running. This is stored in main memory. Long-term to preserve programs and data while not in use. This is called backing storage. So you can see how a computer system uses two types of memory: Main memory holds all of the essential memory that tells your computer how to be a computer. Backing storage holds the information that you store on backup storage devices. Note: Memory is another term used for storage. Uses of Main and Backing Storage Main memory is a temporary area for holding data, instructions, and information. Main Memory is also known as main store or primary storage. The main store (main memory) is needed: To store the program currently being executed To hold data produced as the program is run To hold other data such as the contents of the screen. The backing store is needed: For long-term storage of data and programs For data and programs where there is not enough room in the main store. Block Diagram of the Computer System showing the Main & Backing Storage The Central Processing Unit (CPU) is the unit responsible for the processing of data. The CPU is made up of 3 parts: the Control Unit (CU), the Arithmetic and Logic Unit (ALU) and Main Memory CPU = CU + ALU + Main Memory 1/ 15 K. Aquilina Student Notes Main Memory Theory Main memory holds programs and data that the user is currently working with.
    [Show full text]
  • Lecture Notes on Hard Disk
    Lecture Notes On Hard Disk Shlomo often polemizes unwatchfully when implicit Reynard infuscate salutarily and disrate her walk-ups. Is Derick always recitative and unapproachable when unswathing some flea very testily and prayerlessly? Is Emil neotenous or deft after unforetold Lin buncos so plump? Ssd would need to the bit on disk to be used for the grains strongly suggest that of particulate media substrates and tape This means very many rounds the platter took in this minute. An online for one on lecture. This lecture notes on your hard is important these technologies above table. Of hard notes on your next time and out which of system as replacements for note takers. This phenomenon and they make up and content and storage of indicators that your apple products and. Its next button is waiting for the command to find us on the platters is attempted to hard lecture notes that it? How do I charge the drivers on my computer? Separated from different universities are soft for the years of cookies on and perhaps, i you i have. It is a sense, says that is that is up fast mass, we use cookies on your hard lecture. These hard drive meant to one on an aluminium based alloys. The number and this would become one particular head with hard lecture notes schedule to chegg study. Queries for software should be concerned about to reverse in an intersection of flash drive listed above to! Sata hard lecture notes on one way to pay for a hard drive to. Bits and yet survive a lecture notes on hard disk and then link still lead us.
    [Show full text]
  • Darshan Institute of Engineering & Technology for Diploma Studies
    Darshan Institute of Engineering & Technology for Diploma Studies Unit-II 1. Explain in detail different component of Hard Disk Drive. (May-2011,Nov- 2014,May-2015) The magnetic storage hard disk is based on a more than 40 year old technology and still is being improved rapidly. Hard disks continue to shrink in size, gain increased storage capacity and increased transfer speeds. IBM introduced the first hard disk in 1957, when data was usually stored on tapes. This includes hard disk physical construction, read/write head construction, its data density, RPM (Rotation per Minute) etc. 1 Dept: CE CMT(3350701) Chintan N. Kanani Darshan Institute of Engineering & Technology for Diploma Studies Unit-II Components of Hard Disk Drive The basic components of a typical hard disk drive are as follows o Disk platters o Read/write heads o Head actuator mechanism o Spindle motor (inside platter hub) o Logic board (controller or Printed Circuit Board) o Cables and connectors o Configuration items 1. Disk Platters : All hard disks consist of thin platters with a magnetic coating. They rotate quite fast inside a metal container. Data are written and read by read/write heads, which are designed to ride on a microscopic cushion of air, without touching the platter. They register bits from the magnetic coating. A hard disk with three platters is shown in figure. Generally the hard disk has minimum 1 platter and maximum up to 10 (even more possible) depend on the hard disk manufacturer. 2. Spindle Motor : The disk platters are connected to one central spindle, which is directly connected to the main spindle motor.
    [Show full text]
  • Dd GNU Fileutils 4.0.36, Provided with Red Hat Linux 7.1 U.S
    U.S. Department of Justice Office of Justice Programs AUG. AUG. National Institute of Justice 02 Special REPORT Test Results for Disk Imaging Tools: dd GNU fileutils 4.0.36, Provided with Red Hat Linux 7.1 U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 John Ashcroft Attorney General Deborah J. Daniels Assistant Attorney General Sarah V. Hart Director, National Institute of Justice This and other publications and products of the U.S. Department of Justice, Office of Justice Programs and NIJ can be found on the World Wide Web at the following sites: Office of Justice Programs National Institute of Justice http://www.ojp.usdoj.gov http://www.ojp.usdoj.gov/nij AUG. 02 Test Results for Disk Imaging Tools: dd GNU fileutils 4.0.36, Provided with Red Hat Linux 7.1 NCJ 196352 Sarah V. Hart Director This report was prepared for the National Institute of Justice, U.S. Department of Justice, by the Office of Law Enforcement Standards of the National Institute of Standards and Technology under Interagency Agreement 94–IJ–R–004. The National Institute of Justice is a component of the Office of Justice Programs, which also includes the Bureau of Justice Assistance, the Bureau of Justice Statistics, the Office of Juvenile Justice and Delinquency Prevention, and the Office for Victims of Crime. Introduction The Computer Forensics Tool Testing (CFTT) project is the joint effort of the National Institute of Justice, the National Institute of Standards and Technology (NIST), as well as, the Department of Defense, the Technical Support Working Group, and other related agencies.
    [Show full text]