Softraid: OpenBSD s virtual HBA, with benefits. Marco Peereboom OpenBSD
|
|
|
- Easter Patterson
- 10 years ago
- Views:
Transcription
1 Softraid: OpenBSD s virtual HBA, with benefits Marco Peereboom OpenBSD Abstract Prior to softraid(4) 1 OpenBSD 2 had two RAID implementations. RAIDframe 3 is a full blown RAID implementation written by Carnegie Mellon University and ccd(4) 4 is a minimal RAID-like I/O transformation engine developed at the University of Utah. RAIDframe has not been synchronized with the upstream codebase for years and has never been enabled by default. In the OpenBSD project that translates to unsupported code. The only work done on RAIDframe was an occasional change to ensure that it still compiles. The RAIDframe code base is large, complex and intended for research purposes. The ccd(4) stack is enabled by default but has also not seen any significant change or update in years. The implementation is bare-bones and its use is complex and error prone. Both of these implementations interact at the block I/O layer. This results in the need for implementation specific tools rather than using system defaults such as bioctl(8) 5, the tool normally used for RAID management. Due to the above mentioned reasons a new generic implementation of I/O transformation was devised. It had to fit the OpenBSD philosophy of being simple and powerful, which led to the development of a virtual Host Bus Adapter (HBA) with benefits. These benefits are the capability to transform any standard SCSI I/O operation into one or more complex operations, enabling functionality such as RAID, iscsi and encryption. 1 Introduction The softraid framework interacts in the I/O stack as a standard SCSI HBA and therefore has to provide exactly the same entry points as a hardware driver would. It has a tophalf and bottom-half, an IOCTL path and the required MINPHYS function to determine the maximum size I/O it can handle. Additionally it adds sensors just like a hardware HBA would in order to indicate the health of a virtual disk. An I/O transformation driver is known as a discipline. A discipline is essentially a driver that plugs into the softraid framework and it is responsible for all I/O transformations. The transformations are arbitrarily complex and span a wide range of uses. For example, a discipline could mirror an I/O, stripe an I/O or encrypt an I/O. All I/Os at some point end up stored on chunks. These chunks are disk partitions with a RAID type. The RAID partition type is reused from RAIDframe, however the format used is incompatible. All chunks contain metadata at the start of the partition to indicate that it is a softraid chunk. This metadata also contains all of the information that a discipline needs to completely describe a virtual disk. The act of bringing up a virtual disk is known as assembling a volume. An exception to this are target devices such as the AOE target. Such disciplines do not appear as a device within the operating system, however they do use all of the metadata functionality provided by softraid. Virtual disks, or volumes, consist of any number of chunks depending on the discipline. For example, a RAID 0 discipline requires at least 2 chunks. A virtual disk behaves just like any other SCSI disk attached to the system. All of the standard utilities and tools can operate on it as if it were a physical device. When a SCSI I/O arrives at the softraid framework a corresponding Work Unit (WU) is created and sent to the appropriate discipline. A WU can consist of any number of operations that need to complete before a WU can complete the original SCSI I/O. An operation is contained in a Command Control Block (CCB) and is usually, but not limited to, a physical I/O. In order to prevent data corruption when I/Os physically overlap the same LBA range softraid implements a feature known as colliders. When an I/O physically overlaps an LBA range of any outstanding I/O it will be deferred until the underlying I/O completes. At completion time, in the interrupt handler, the collider I/O will be resubmitted. Each I/O can have at most one collider however, the colliding I/O can also have a collider forming a chain of ordered I/Os. This feature is also used during RAIL volume recovery scenarios where I/Os need to complete in order to form an atomic I/O. Since softraid pretends to be a HBA it has some limitations and requirements. A HBA can be called in both process and interrupt context. Inherently softraid cannot perform any operation that requires process context, such as 1
2 tsleep(9) 6. In order to properly detect a failed chunk softraid relies on the underlying hardware and layers to correctly propagate errors up the stack. 2 Disciplines A discipline contains all variables and function pointers for the softraid framework to handle said discipline. The entry pointers are divided into two logical areas namely those that are SCSI and discipline specific. Not all function pointers are required and some have generic implementations. In some specific cases the discipline reuses other discipline functions (e.g. the crypto discipline reuses the RAID 1 sd_set_vol_state). All sd_ functions deal with the discipline specific parts of the generic functions. This is a theme that is repeated throughout all the softraid code. The required discipline functions are: sd_create This function is the discipline specific part of a creation call. This function validates that the the discipline meets the minimal requirements and sets several internal variables such as the discipline name, maximum number of CCBs per WUs etc. sd_assemble This function is the discipline specific part of an assembly call. For most disciplines it comes down to only filling out the sd_max_wu variable however disciplines such as crypto perform additional work to properly assemble the discipline. sd_alloc_resources This function allocates all resources the discipline needs to operate. It generally is advised to not allocate resources in the I/O path due to latency. sd_free_resources This function frees all resources previously allocated by sd_alloc_resources. This function is called prior to shutdown of the discipline. sd_ioctl_handler The IOCTL handler is used by user-space tools such as bioctl to display the status of softraid, its volumes and chunks. sd_start_discipline This function is only used for target devices that are not virtual disks. Disciplines such as the AOE target use this function to bring up the discipline and make it ready to serve requests. sd_set_chunk_state This function is used to modify the state of a chunk into a valid new state. Chunk state is what drives the volume state and this function changes the state of a single chunk and subsequently calls sd_set_vol_state in order to alter the volume state. sd_set_vol_state This functions calculates the new volume state based on the current state of all chunks. This function should only be called by sd_set_chunk_state. Optional: sd_openings This function is optional and is called only if set. It returns a sensible value for openings that are used to initialize the SCSI-midlayer when the volume is brought online. The disciplines that use this function are ones that tax the system unfairly due to internal colliding I/Os and therefore cannot use the sd_max_wu heuristic. Disciplines that make use of this facility are RAID P (level 4 & 5) and RAID 6. The SCSI functions are mostly generic however the read and write functions are always discipline dependent. The functions correspond exactly to the SCSI specification as define by T10 7. The SCSI functions that must be implemented are: sd_scsi_inquiry. This function returns the INQUIRY(12) data and is generic providing sd_create filled in all required fields. sd_scsi_read_cap. This function returns the READ_CAPACITY(25) and READ_CAPACITY16(9E) data and are generic providing sd_create filled in all required fields. sd_scsi_tur. This generic function returns success if the volume has been brought up successfully and it will return failure if the volume subsequently fails. sd_scsi_req_sense. This function is generic and simply returns the last sense data that was generated, before zeroing the sense buffer. sd_scsi_start_stop. This function is generic and will bring a volume online or offline depending on the parameter provided. sd_scsi_sync. This function is generic and drains all outstanding I/O as per the SYNCHRONIZE_CACHE(35) command. sd_scsi_rw. This function is discipline specific and performs the read or write for the following SCSI opcodes: 2
3 READ6(08) READ(28) READ16(88) WRITE6(0a) WRITE(2a) WRITE16(8a) The following sections will briefly detail all currently implemented disciplines, however these sections will not question or debate RAID as a technology, nor will they discuss its relative merit. RAID concepts are generally well understood and are outside the scope of this paper. 2.1 RAID 0 The RAID 0 discipline provides striping across disks without providing any form of redundancy. The strip size is fixed at 64KB which is optimal for performance with the OpenBSD block I/O layer. At less than 500 lines of code, including the license and comments, this discipline makes for an easy read. It is considered to be the reference implementation due to its small size and the lack of complexity. 2.2 RAID 1 The RAID 1 discipline provides mirroring across N chunks, whereas most traditional RAID 1 implementations only support two chunks in a mirror. The softraid implementation reads single I/Os on a round-robin basis from all active chunks and writes I/Os to all active chunks. This presents the user with some interesting choices at volume creation time. A mostly read-only system can favor a larger number of chunks at the cost of disk space, resulting in increased read performance. Also unlike traditional RAID 1 implementations the softraid version does not mirror the chunks upon creation. The reason for this is that all blocks are always written to prior to being read. If this is not the case then there is a bug in the layer above softraid, in which case softraid will not behave any differently to a traditional disk. The RAID 1 discipline can automatically recover from a failed chunk if a hot-spare chunk of bigger or equal size is available at the time of the failure. This process can also be manually initiated by the user. A rebuild will result in every block being read from the active chunks and being written to the rebuild chunk. If a rebuild is aborted due to a reboot or crash it will resume upon the subsequent boot. 2.3 RAID P The RAID P (Parity) discipline provides RAID level 4 and 5. The only difference being that RAID 4 uses a fixed parity chunk instead of distributing the parity across all chunks. The RAID P discipline is currently considered experimental because it misses scrub and rebuild functionality. Unlike with RAID 1 discipline RAID P require that all parity is zeroed before use. 2.4 RAID 6 Unlike RAID 5, the RAID 6 discipline provides the capability to have two chunks fail while maintaining integrity. Additionally, in the case of silent data corruption it raises the chances of successful recovery since it potentially can recreate the data from multiple sources. The RAID 6 discipline is currently considered experimental because it misses scrub and rebuild functionality. Unlike with RAID 1 discipline, RAID 6 requires that all parity is initialized before use. 2.5 Crypto This discipline is the most complex. It requires a complex bring-up procedure that may result in multiple calls between userland and the kernel. The reason for this is that there are pieces of code that do not belong in the kernel and in the case of the crypto discipline this is the encryption of the keys. This procedure does facilitate additional functionality such as changing the password to unmask the keys. The crypto discipline defaults to the AES XTS 256 encryption algorithm. This algorithm is a modified AES implementation that has a built-in tweak that was especially developed for disk encryption. The OpenBSD implementation uses one key per 0.5TB instead of the recommended 1TB. Currently the implementation has 32 keys which nets a maximum 16TB volume. These numbers are design decisions and can be easily modified in the future. The encryption keys are automatically generated using a strong random number generator (arc4random_buf(9) 8 ) and are encrypted based on a user provided password. If the user opts to use a key disk instead then the keys are written either unencrypted to the specified chunk. This enables auto-assembly of a crypto volume during boot. The usecase is writing the keys on an easily removable device, such as a USB flash disk, so that an encrypted volume can only be brought up with this removable disk inserted. There are still a few things missing in the crypto discipline. Currently there is only one password that can decrypt the 3
4 keys, whereas it is desirable to have multiple passwords. Another thing that is missing is some sort of utility that can facilitate reading and writing the decrypted keys so that they can be used in the future for a variety of reasons such as disaster recovery etc. Currently there is no way to select the number of bits the encryption algorithm uses even though the code supports two of them. 2.6 Missing or incomplete features Softraid is still under development and there are some major features missing. On the discipline front there are still some ideas floating around for the following types: Concat. Simply concatenate chunks together to make a larger disk. Stacking. This is a complex problem that needs to be thought through. The intent is to be able to stack RAID volumes on top of each other to obtain hybrid types such as RAID 10 or RAID 1CRYPTO. AOE has not been actively maintained and needs to be revisited and brought into the enabled state. The target code might require additional framework features. iscsi. There is an active iscsi development using a different kernel interface known as vscsi(4) 9 however this code will run mostly in user-space and does not seem likely to ever support a target. FCoE 10. This is currently the buzz of the industry and having target and initiator code would enable OpenBSD to play with some really large iron. Multipath. This one might not be written using softraid due to recent addition of the mpath(4) 11 driver. Aside from new disciplines, the framework itself still requires some additional features. Work has begun on booting and rooting from softraid disciplines. A working prototype exists for the OpenBSD/sparc64 platform. Each architecture has its own challenges and this is still under investigation. The intent is that the softraid metadata has the boot loader code as a payload and the user-space utilities that are used to create bootable disks talk to softraid and provide the hints required to perform all boot loader related functions. A particular problem that arises from using softraid is the potential for physical disks to move around. To work around this problem the code to mount filesystems using a disklabel ID has been written. This code will be integrated into the tree after the current release (4.7) has been tagged. The metadata code has hooks to be able to read foreign metadata from different vendors, however there is currently no additional support for metadata formats other than softraid. 3 Metadata Softraid uses on disk metadata to record state and persistent information. All chunks carry near identical metadata payloads, however each chunk designates which piece they represent. The metadata is written at the beginning of the disk at a constant offset from the beginning of the partition. It has a fixed block count for size, which limits the amount of information it can carry. This limitation is currently in the order of 200 chunks. All chunks have at least 2 pieces of metadata. 1. sr_metadata. The sr_metadata chunk is divided into 2 areas; a variant and an invariant area. The invariant piece contains persistent information that will not change, such as the volume ID, metadata version, number of chunks, number of optional metadata areas, discipline type, etc. The variant piece contains the invariant checksum, on disk metadata version, etc. 2. sr_meta_chunk. All chunks are written in sorted order following the sr_metadata piece. The sr_meta_chunk also has a variant and an invariant area. The invariant area contains persistent information such as the volume ID, chunk ID, volume UUID, etc. The variant piece contains the invariant checksum and current chunk status. The area directly after the last chunk metadata is where the optional metadata is stored. The number of optional metadata members are stored in the sr_metadata area. These optional areas contain things such as crypto keys or boot loader code, etc. Each chunk maintains an on-disk version number. This number is used to resolve bring-up and failure conflicts. The metadata code will only use the latest on-disk version when bringing up a volume. Every time a change is made to any metadata component a new version is written to all chunks. At a minimum, a power-up to power-down of an auto assembled volume will have increased the on-disk version of the firmware by two. The metadata code is written with foreign data formats in mind. It provides hooks in strategic locations for so called translation functions. For example, when foreign metadata is read from a disk it is translated into a softraid legible format and conversely when written. 4 Related Work 4
5 There are quite a few distinct RAID implementations out in the open source arena, however it is believed that softraid is the first one to implement it at the SCSI level by presenting itself as an HBA. The name softraid is actually a poorly chosen name, however it stuck. Some other implementations are device-mapper 12 on Linux and GEOM 13 on FreeBSD. 5 Acknowledgments I would like to acknowledge several people in the OpenBSD community who have worked on parts of softraid: Joel Sing. Joel has worked tirelessly on softraid and he implemented several major features. From code re-factoring to bug hunting to brand new features, he has done it all. He must have touched virtually all code in the softraid stack. Ted Unangst. Ted, is as usual, responsible for getting other people to do the work after he shows a working prototype. He wrote the crypto and AOE prototypes. Hans-Joerg Hoexer. Hans-Joerg wrote the entire implementation of the crypto discipline during a hackathon. Damien Miller. Before Damien had his second child he found some time during a hackathon to help me out with the metadata format. He also helped Hans-Joerg with the crypto discipline. Jordan Hargrave. One day out of nowhere Jordan handed me a more or less working versions of the RAID P and RAID 6 disciplines. Since then he has made many improvements and continues to do so. He told me It is wondrous what one can do with math after his latest performance improvements. Theo de Raadt for his supportive yelling and seemingly unending energy and devotion to keep OpenBSD running, allowing me to play in the most intellectually stimulating open source community in the world. His insight into operating system design is simply unparalleled and he has lent me some of it to make several key architectural decisions in the softraid stack. I d like to acknowledge Clarissa, my lovely wife, who puts up with me and my open source addiction. Finally, my lovely daughter Holland who always manages to brighten my day and JT who watches her while I am coding. 5
6 References [1] softraid query=softraid&apropos=0&sektion=0&manpath=openbsd+current&arch=i386&format=html [2] OpenBSD [3] RAIDframe [4] ccd query=ccd&apropos=0&sektion=0&manpath=openbsd+current&arch=i386&format=html [5] bioctl query=bioctl&apropos=0&sektion=0&manpath=openbsd+current&arch=i386&format=html [6] tsleep query=tsleep&apropos=0&sektion=0&manpath=openbsd+current&arch=i386&format=html [7] T10 [8] arc4random_buf query=arc4random_buf&apropos=0&sektion=9&manpath=openbsd+current&arch=i386&format=html [9] query=vscsi&apropos=0&sektion=0&manpath=openbsd+current&arch=i386&format=html [10]FCoE [11]mpath(4) query=mpath&apropos=0&sektion=0&manpath=openbsd+current&arch=i386&format=html [12]Device-mapper [13]GEOM
LVM2 data recovery. Milan Brož [email protected]. LinuxAlt 2009, Brno
LVM2 data recovery Milan Brož [email protected] LinuxAlt 2009, Brno Linux IO storage stack [ VFS ] filesystem [ volumes ] MD / LVM / LUKS / MPATH... [ partitions ] legacy partition table recovery from the
File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
NSS Volume Data Recovery
NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management
SATA II 4 Port PCI RAID Card RC217 User Manual
SATA II 4 Port PCI RAID Card RC217 SATA II 4 Port PCI RAID Card This Manual is for many Models of SATAII RAID5 HBA that uses Silicon Image SATA II SiI3124 chipset: 1) 32bit PCI bus host card 2) 64bit PCI-X
EMC DATA DOMAIN DATA INVULNERABILITY ARCHITECTURE: ENHANCING DATA INTEGRITY AND RECOVERABILITY
White Paper EMC DATA DOMAIN DATA INVULNERABILITY ARCHITECTURE: ENHANCING DATA INTEGRITY AND RECOVERABILITY A Detailed Review Abstract No single mechanism is sufficient to ensure data integrity in a storage
Violin: A Framework for Extensible Block-level Storage
Violin: A Framework for Extensible Block-level Storage Michail Flouris Dept. of Computer Science, University of Toronto, Canada [email protected] Angelos Bilas ICS-FORTH & University of Crete, Greece
Disk encryption... (not only) in Linux. Milan Brož [email protected]
Disk encryption... (not only) in Linux Milan Brož [email protected] FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
Chapter 11 I/O Management and Disk Scheduling
Operatin g Systems: Internals and Design Principle s Chapter 11 I/O Management and Disk Scheduling Seventh Edition By William Stallings Operating Systems: Internals and Design Principles An artifact can
Intel Rapid Storage Technology
Intel Rapid Storage Technology User Guide August 2011 Revision 1.0 1 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
Taking Linux File and Storage Systems into the Future. Ric Wheeler Director Kernel File and Storage Team Red Hat, Incorporated
Taking Linux File and Storage Systems into the Future Ric Wheeler Director Kernel File and Storage Team Red Hat, Incorporated 1 Overview Going Bigger Going Faster Support for New Hardware Current Areas
Chip Coldwell Senior Software Engineer, Red Hat
Chip Coldwell Senior Software Engineer, Red Hat Classical Storage Stack: the top layer File system examples: ext3, NFS, GFS built on Linux VFS ( Virtual File System abstraction) defines on-disk structure:
Update: About Apple RAID Version 1.5 About this update
apple Update: About Apple RAID Version 1.5 About this update This update describes new features and capabilities of Apple RAID Software version 1.5, which includes improvements that increase the performance
RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1
RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.
Chapter 12: Mass-Storage Systems
Chapter 12: Mass-Storage Systems Chapter 12: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID Structure
Enterprise Storage Management with Red Hat Enterprise Linux for Reduced TCO. Dave Wysochanski ([email protected])
Enterprise Storage Management with Red Hat Enterprise Linux for Reduced TCO Dave Wysochanski ([email protected]) Agenda Enterprise Storage Problems Red Hat Enterprise Linux Solutions Device Mapper
Support for Storage Volumes Greater than 2TB Using Standard Operating System Functionality
Support for Storage Volumes Greater than 2TB Using Standard Operating System Functionality Introduction A History of Hard Drive Capacity Starting in 1984, when IBM first introduced a 5MB hard drive in
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Chapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
Encore SATA2 RAID PCIe Card
Encore SATA2 RAID PCIe Card User Manual Ver. 2.00 All brand names and trademarks are properties of their Respective owners. 1 Features and Benefits Compliant with PCI Express Base Specification 1.0a Compliant
Storage Class Memory Support in the Windows Operating System Neal Christiansen Principal Development Lead Microsoft nealch@microsoft.
Storage Class Memory Support in the Windows Operating System Neal Christiansen Principal Development Lead Microsoft [email protected] What is Storage Class Memory? Paradigm Shift: A non-volatile storage
Performance Analysis of RAIDs in Storage Area Network
Performance Analysis of RAIDs in Storage Area Network Sneha M. Assistant Professor, Department of Computer Science and Engineering, R V College of Engineering Bengaluru-560059 ABSTRACT Direct Attached
PARALLELS CLOUD STORAGE
PARALLELS CLOUD STORAGE Performance Benchmark Results 1 Table of Contents Executive Summary... Error! Bookmark not defined. Architecture Overview... 3 Key Features... 5 No Special Hardware Requirements...
SiS S-ATA User s Manual. Quick User s Guide. Version 0.1
SiS S-ATA User s Manual Quick User s Guide Version 0.1 Edition April 2003 Copyright Trademarks SiS is a registered trademark of Silicon Integrated Systems Corp. All brand or product names mentioned are
SiS 180 S-ATA User s Manual. Quick User s Guide. Version 0.1
SiS 180 S-ATA User s Manual Quick User s Guide Version 0.1 Edition April 2003 Copyright Trademarks SiS is a registered trademark of Silicon Integrated Systems Corp. All brand or product names mentioned
SiS964 RAID. User s Manual. Edition. Trademarks V1.0 P/N: 91-187-U49-M2-0E
SiS964 RAID User s Manual Edition V1.0 P/N: 91-187-U49-M2-0E Trademarks All brand or product names mentioned are trademarks or registered trademarks of their respective holders. CONTENTS Introduction...
Cloud Storage. Parallels. Performance Benchmark Results. White Paper. www.parallels.com
Parallels Cloud Storage White Paper Performance Benchmark Results www.parallels.com Table of Contents Executive Summary... 3 Architecture Overview... 3 Key Features... 4 No Special Hardware Requirements...
PADS GPFS Filesystem: Crash Root Cause Analysis. Computation Institute
PADS GPFS Filesystem: Crash Root Cause Analysis Computation Institute Argonne National Laboratory Table of Contents Purpose 1 Terminology 2 Infrastructure 4 Timeline of Events 5 Background 5 Corruption
DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering
DELL RAID PRIMER DELL PERC RAID CONTROLLERS Joe H. Trickey III Dell Storage RAID Product Marketing John Seward Dell Storage RAID Engineering http://www.dell.com/content/topics/topic.aspx/global/products/pvaul/top
User Guide - English. Embedded MegaRAID Software
User Guide - English Embedded MegaRAID Software April 2015 Comments Suggestions Corrections The User Documentation Department would like to know your opinion of this manual. Your feedback helps us optimize
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
How To Set Up A Raid On A Hard Disk Drive On A Sasa S964 (Sasa) (Sasa) (Ios) (Tos) And Sas964 S9 64 (Sata) (
SiS964/SiS180 SATA w/ RAID User s Manual Quick User s Guide Version 0.3 Edition December 2003 Copyright 2003 Silicon Integrated Systems Corp. Trademarks SiS is a registered trademark of Silicon Integrated
SiS964/SiS180 SATA w/ RAID User s Manual. Quick User s Guide. Version 0.3
SiS964/SiS180 SATA w/ RAID User s Manual Quick User s Guide Version 0.3 Edition December 2003 Copyright 2003 Silicon Integrated Systems Corp. Trademarks SiS is a registered trademark of Silicon Integrated
Virtual Private Systems for FreeBSD
Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system
Filesystems Performance in GNU/Linux Multi-Disk Data Storage
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 22 No. 2 (2014), pp. 65-80 Filesystems Performance in GNU/Linux Multi-Disk Data Storage Mateusz Smoliński 1 1 Lodz University of Technology Faculty of Technical
Chapter 2 Array Configuration [SATA Setup Utility] This chapter explains array configurations using this array controller.
Embedded MegaRAID SATA User's Guide Areas Covered Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview This chapter introduces
The SATA II PCIe RAID is an ultra high-speed two channel Serial ATA Generation II RAID controller for use in PCI Express enabled systems.
SATA II PCIe RAID Quick Installation Guide Introducing the SATA II PCIe RAID The SATA II PCIe RAID is an ultra high-speed two channel Serial ATA Generation II RAID controller for use in PCI Express enabled
Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik Outline NTFS File System Formats File System Driver Architecture Advanced Features NTFS Driver On-Disk Structure (MFT,...)
Overview of Luna High Availability and Load Balancing
SafeNet HSM TECHNICAL NOTE Overview of Luna High Availability and Load Balancing Contents Introduction... 2 Overview... 2 High Availability... 3 Load Balancing... 4 Failover... 5 Recovery... 5 Standby
Serial ATA RAID PCI. User's Manual
Serial ATA RAID PCI User's Manual Chapter 1 Introduction Table of Contents 1-1 Features and Benefits. 1 1-2 System Requirements. 1 Chapter 2 RAID Arrays 2-1 RAID Overview.. 2 2-1.1 RAID 0 (striping)...
Date: March 2006. Reference No. RTS-CB 018
Customer Bulletin Product Model Name: CS3102 and FS3102 subsystems Date: March 2006 Reference No. RTS-CB 018 SUBJECT: Volumes greater than 2TB on Windows OS Overview This document explores how different
How To Recover From A Disaster On Linux (Amd64) On A Hard Disk Drive (Amd32) On An Uniden (Amd66) Or A Hard Drive (Oranium) On Your Computer (Orren) On The Same Computer (
Methods of Linux Bare Metal Restore and Disaster Recovery www.storix.net 1-877-786-7491 STORIX WHITE PAPER 2 We don t think much about health insurance when we re feeling well, but even the least prudent
Ryusuke KONISHI NTT Cyberspace Laboratories NTT Corporation
Ryusuke KONISHI NTT Cyberspace Laboratories NTT Corporation NILFS Introduction FileSystem Design Development Status Wished features & Challenges Copyright (C) 2009 NTT Corporation 2 NILFS is the Linux
Embedded MegaRAID Software
Embedded MegaRAID Software User Guide 48712-00, Rev. B Revision History Version and Date Description of Changes 48712-00, Rev. B, Revised the guide to document changes to the driver installation procedures,
Serial ATA 4-Channel RAID Quick Installation Guide
Serial ATA 4-Channel RAID Quick Installation Guide Introducing the Serial ATA 4-Channel RAID The Serial ATA 4-Channel RAID is an ultra high-speed four channel Serial ATA controller for use in Pentium class
Silent data corruption in SATA arrays: A solution
Silent data corruption in SATA arrays: A solution Josh Eddy August 2008 Abstract Recent large academic studies have identified the surprising frequency of silent read failures that are not identified or
easyraid P & M Series GUI Software Manual
easyraid P & M Series GUI Software Manual 42-34000-5034 8G Fibre to SAS 6G SAS to SAS 10G iscsi to SAS Disk Array Systems Version 1.0 2 8G Fibre to SAS 6G SAS to SAS 10G iscsi to SAS Model: ERM16S-8FR3,
Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS
Windows Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik 2 Hardware Basics Win2K File System Formats Sector: addressable block on storage medium usually 512 bytes (x86 disks) Cluster:
Introduction Disks RAID Tertiary storage. Mass Storage. CMSC 412, University of Maryland. Guest lecturer: David Hovemeyer.
Guest lecturer: David Hovemeyer November 15, 2004 The memory hierarchy Red = Level Access time Capacity Features Registers nanoseconds 100s of bytes fixed Cache nanoseconds 1-2 MB fixed RAM nanoseconds
ExpressSAS Host Adapter 6Gb v2.15 Linux
Product Release Notes ExpressSAS Host Adapter 6Gb v2.15 Linux 1. General Release Information These product release notes define the new features, changes, known issues and release details that apply to
RAID Basics Training Guide
RAID Basics Training Guide Discover a Higher Level of Performance RAID matters. Rely on Intel RAID. Table of Contents 1. What is RAID? 2. RAID Levels RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID 0+1 RAID 1E
RAID installation guide for Silicon Image SiI3114
RAID installation guide for Silicon Image SiI3114 Contents Contents 2 1 Introduction 4 1.1 About this Guide 4 1.2 The Basics 4 1.2.1 What is RAID? 4 1.2.2 Advantages of RAID 4 1.2.3 Disadvantages of RAID
TELE 301 Lecture 7: Linux/Unix file
Overview Last Lecture Scripting This Lecture Linux/Unix file system Next Lecture System installation Sources Installation and Getting Started Guide Linux System Administrators Guide Chapter 6 in Principles
Checksumming RAID. Brian Kroth [email protected]. Suli Yang [email protected]. Abstract. 1 Introduction. 2 Background. 2.
Checksumming RAID Brian Kroth [email protected] Suli Yang [email protected] Abstract Storage systems exhibit silent data corruptions that go unnoticed until too late, potenially resulting in whole trees
Areas Covered. Chapter 1 Features (Overview/Note) Chapter 2 How to Use WebBIOS. Chapter 3 Installing Global Array Manager (GAM)
PRIMERGY RX300 S2 Onboard SCSI RAID User s Guide Areas Covered Chapter 1 Features (Overview/Note) This chapter explains the overview of the disk array and features of the SCSI array controller. Chapter
Linux Driver Devices. Why, When, Which, How?
Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may
COS 318: Operating Systems. I/O Device and Drivers. Input and Output. Definitions and General Method. Revisit Hardware
COS 318: Operating Systems I/O and Drivers Input and Output A computer s job is to process data Computation (, cache, and memory) Move data into and out of a system (between I/O devices and memory) Challenges
1 Storage Devices Summary
Chapter 1 Storage Devices Summary Dependability is vital Suitable measures Latency how long to the first bit arrives Bandwidth/throughput how fast does stuff come through after the latency period Obvious
How to recover a failed Storage Spaces
www.storage-spaces-recovery.com How to recover a failed Storage Spaces ReclaiMe Storage Spaces Recovery User Manual 2013 www.storage-spaces-recovery.com Contents Overview... 4 Storage Spaces concepts and
Intel Matrix Storage Manager 8.x
Intel Matrix Storage Manager 8.x User's Manual January 2009 Revision 1.0 Document Number: XXXXXX INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
Embedded MegaRAID Software
Embedded MegaRAID Software User Guide 48712-00 Rev. A Revision History Version and Date Initial release of document. Description of Changes LSI, the LSI & Design logo, MegaRAID, and MegaRAIDStorage Manager
Onboard-RAID. Onboard-RAID supports striping (RAID 0), mirroring (RAID 1), striping/mirroring (RAID 0+1), or spanning (JBOD) operation, respectively.
1. Introduction Onboard-RAID IEI s Onboard-RAID is designed with Promise IDE RAID controller to provide a cost-effective, high performance RAID that adds performance and/or reliability to systems using
Violin Memory Arrays With IBM System Storage SAN Volume Control
Technical White Paper Report Best Practices Guide: Violin Memory Arrays With IBM System Storage SAN Volume Control Implementation Best Practices and Performance Considerations Version 1.0 Abstract This
esata 3.0Gbps RAID ExpressCard
esata 3.0Gbps RAID ExpressCard 1. Introduction Quick Installation Guide The esata 3.0Gbps 2-channel RAID ExpressCard provides two ultra high-speed esata channels with RAID 0/1 features into your notebook
Active @ UNDELETE Users Guide
Active @ UNDELETE Users Guide Contents 2 Contents Legal Statement...5 Active@ UNDELETE Overview... 6 Getting Started with Active@ UNDELETE... 7 Active@ UNDELETE Views And Windows... 7 Recovery Explorer
StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved.
PRODUCT SCENARIOS Introduction Fast and reliable online backup and bare metal recovery for Windows servers ShadowProtect Server Edition creates an exact point-in-time backup of your entire server or specific
46xx_47xx_1546_1547 RAID Recovery/Set Up Instructions
46xx_47xx_1546_1547 RAID Recovery/Set Up Instructions Note: The Windows RAID utility should handle most RAID recovery situations without any trouble. In Windows, when the ICON in the RAID utility turns
PCI Express SATA / esata 6Gb/s RAID Card User Manual
PCI Express SATA / esata 6Gb/s RAID Card User Manual Specifications : - 2 x SATA 6Gb/s Port (SATA version) - 2 x esata 6Gb/s Port (esata version) - Max. 6Gb/s transfer rate per port - Supports both SATA
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices
Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices September 2008 Recent advances in data storage and data protection technology are nothing short of phenomenal. Today,
Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION
Storage Protocol Comparison White Paper TECHNICAL MARKETING DOCUMENTATION v 1.0/Updated APRIl 2012 Table of Contents Introduction.... 3 Storage Protocol Comparison Table....4 Conclusion...10 About the
Recovery Protocols For Flash File Systems
Recovery Protocols For Flash File Systems Ravi Tandon and Gautam Barua Indian Institute of Technology Guwahati, Department of Computer Science and Engineering, Guwahati - 781039, Assam, India {r.tandon}@alumni.iitg.ernet.in
Introduction to Gluster. Versions 3.0.x
Introduction to Gluster Versions 3.0.x Table of Contents Table of Contents... 2 Overview... 3 Gluster File System... 3 Gluster Storage Platform... 3 No metadata with the Elastic Hash Algorithm... 4 A Gluster
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Timing of a Disk I/O Transfer
Disk Performance Parameters To read or write, the disk head must be positioned at the desired track and at the beginning of the desired sector Seek time Time it takes to position the head at the desired
RAID. Tiffany Yu-Han Chen. # The performance of different RAID levels # read/write/reliability (fault-tolerant)/overhead
RAID # The performance of different RAID levels # read/write/reliability (fault-tolerant)/overhead Tiffany Yu-Han Chen (These slides modified from Hao-Hua Chu National Taiwan University) RAID 0 - Striping
SATA II PCIe RAID Quick Installation Guide
SATA II PCIe RAID Quick Installation Guide Introducing the SATA II PCIe RAID The SATA II PCIe RAID is an ultra high-speed two channel Serial ATA Generation II RAID controller for use in PCI Express enabled
Storage and File Structure
Storage and File Structure Chapter 10: Storage and File Structure Overview of Physical Storage Media Magnetic Disks RAID Tertiary Storage Storage Access File Organization Organization of Records in Files
actitape LTO-3 and LTO-4 internal SCSI and SAS Quick Start Guide
actitape LTO-3 and LTO-4 internal SCSI and SAS Quick Start Guide Page 1 of 11 Introduction This poster describes how to install your ActiTape LTO half-height internal tape drives with SCSI and SAS interface.
VERITAS Storage Foundation 4.3 for Windows
DATASHEET VERITAS Storage Foundation 4.3 for Windows Advanced Volume Management Technology for Windows In distributed client/server environments, users demand that databases, mission-critical applications
Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP
Analysis to develop an ISCSI Layer inside Microsoft Windows NT/2K/XP Ing. Franco Ometti While1 S.r.l. Description The activity is related to develop a special device driver that implements a SCSI miniport
Cover sheet. How do you create a backup of the OS systems during operation? SIMATIC PCS 7. FAQ November 2013. Service & Support. Answers for industry.
Cover sheet How do you create a backup of the OS systems during operation? SIMATIC PCS 7 FAQ November 2013 Service & Support Answers for industry. Question This entry originates from the Service & Support
Practical issues in DIY RAID Recovery
www.freeraidrecovery.com Practical issues in DIY RAID Recovery Based on years of technical support experience 2012 www.freeraidrecovery.com This guide is provided to supplement our ReclaiMe Free RAID Recovery
6-Port SATA II 150 PCI Host Card w/raid
6-Port SATA II 150 PCI Host Card w/raid User Manual Model: UGT-ST310R All brand names and trademarks are properties of their respective owners. w w w. v a n t e c u s a. c o m Table of Contents 1. Bus
Configuring Linux to Enable Multipath I/O
Configuring Linux to Enable Multipath I/O Storage is an essential data center component, and storage area networks can provide an excellent way to help ensure high availability and load balancing over
Advanced DataTools Webcast. Webcast on Oct. 20, 2015
Advanced DataTools Webcast Webcast on Oct. 20, 2015 1 Advanced DataTools Webcast Base Webcast on?????, 2014 2 Informix Storage and RAID5 Doing Storage The Right Way! Art S. Kagel ASK Database Management
Taurus - RAID. Dual-Bay Storage Enclosure for 3.5 Serial ATA Hard Drives. User Manual
Dual-Bay Storage Enclosure for 3.5 Serial ATA Hard Drives User Manual v1.0 August 23, 2007 EN Table of Contents CHAPTER 1 - INTRODUCTION 1 CHAPTER 3 - SYSTEM SET UP 9 ICON KEY 1 THE TAURUS RAID 1 AVAILABLE
How To Fix A Fault Fault Fault Management In A Vsphere 5 Vsphe5 Vsphee5 V2.5.5 (Vmfs) Vspheron 5 (Vsphere5) (Vmf5) V
VMware Storage Best Practices Patrick Carmichael Escalation Engineer, Global Support Services. 2011 VMware Inc. All rights reserved Theme Just because you COULD, doesn t mean you SHOULD. Lessons learned
SiI3132 SATARAID5 Storage Management Software User Manual
SiI3132 SATARAID5 Storage Management Software User Manual Home Edition Silicon Image, Inc. 1060 East Arques Ave. Sunnyvale CA 94085 (408) 616-4000 www.siliconimage.com Copyright 2004, Silicon Image, Inc.
Offline Array Recovery Procedures SuperTrak SX6000 and UltraTrak
Version 5a Offline Array Recovery Procedures SuperTrak SX6000 and UltraTrak This document describes the procedures for protecting data and restoring array status to arrays that have gone OFFLINE. Promise
is605 Dual-Bay Storage Enclosure for 3.5 Serial ATA Hard Drives FW400 + FW800 + USB2.0 Combo External RAID 0, 1 Subsystem User Manual
is605 Dual-Bay Storage Enclosure for 3.5 Serial ATA Hard Drives FW400 + FW800 + USB2.0 Combo External RAID 0, 1 Subsystem User Manual (English/Deutsch/ 中 文 ) v1.0 August 23, 2007 Table of Contents CHAPTER
Practical Online Filesystem Checking and Repair
Practical Online Filesystem Checking and Repair Daniel Phillips Samsung Research America (Silicon Valley) [email protected] 1 2013 SAMSUNG Electronics Co. Why we want online checking: Fsck
Manage the RAID system from event log
Manage the RAID system from event log Tim Chung Version 1.0 (JAN, 2010) - 1 - QSAN Technology, Inc. http://www.qsantechnology.com White Paper# QWP201001-ALL lntroduction Event log records the information
Restore and Recovery Tasks. Copyright 2009, Oracle. All rights reserved.
Restore and Recovery Tasks Objectives After completing this lesson, you should be able to: Describe the causes of file loss and determine the appropriate action Describe major recovery operations Back
ProTrack: A Simple Provenance-tracking Filesystem
ProTrack: A Simple Provenance-tracking Filesystem Somak Das Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology [email protected] Abstract Provenance describes a file
Intel RAID Controllers
Intel RAID Controllers Best Practices White Paper April, 2008 Enterprise Platforms and Services Division - Marketing Revision History Date Revision Number April, 2008 1.0 Initial release. Modifications
Alternatives to Big Backup
Alternatives to Big Backup Life Cycle Management, Object- Based Storage, and Self- Protecting Storage Systems Presented by: Chris Robertson Solution Architect Cambridge Computer Copyright 2010-2011, Cambridge
