White paper FUJITSU Storage ETERNUS DX series

Similar documents
An Integrated End-to-End Data Integrity Solution to Protect Against Silent Data Corruption

End-to-end Data integrity Protection in Storage Systems

Oracle Linux Strategy and Roadmap

The HBAs tested in this report are the Brocade 825 and the Emulex LPe12002 and LPe12000.

Solution Brief July All-Flash Server-Side Storage for Oracle Real Application Clusters (RAC) on Oracle Linux

Best Practices Guide: Network Convergence with Emulex LP21000 CNA & VMware ESX Server

8Gb Fibre Channel Adapter of Choice in Microsoft Hyper-V Environments

Oracle Linux Overview. Presented by: Anuj Verma Title: Senior Pre-Sales Consultant

Flash Storage Gets Priority with Emulex ExpressLane

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

Vendor and Hardware Platform: Fujitsu BX924 S2 Virtualization Platform: VMware ESX 4.0 Update 2 (build )

Performance Comparison of Fujitsu PRIMERGY and PRIMEPOWER Servers

Sun 8Gb/s Fibre Channel HBA Performance Advantages for Oracle Database

Storage Management for the Oracle Database on Red Hat Enterprise Linux 6: Using ASM With or Without ASMLib

Emulex s OneCore Storage Software Development Kit Accelerating High Performance Storage Driver Development

SOLUTION BRIEF AUGUST All-Flash Server-Side Storage for Oracle Real Application Clusters (RAC) on Oracle Linux

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

Configuration Maximums VMware Infrastructure 3

Configuration Maximums

Business-centric Storage for small and medium-sized enterprises. How ETERNUS DX powered by Intel Xeon processors improves data management

An Oracle White Paper July Accelerating Database Infrastructure Using Oracle Real Application Clusters 11g R2 and QLogic FabricCache Adapters

Violin Memory Arrays With IBM System Storage SAN Volume Control

English ETERNUS CS800 S3. Backup Exec OST Guide

New I/O Management Best Practices for Oracle Database Quality of Service

Business-centric Storage FUJITSU Hyperscale Storage System ETERNUS CD10000

QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide

QuickSpecs. Models. HP StorageWorks 8Gb PCIe FC HBAs Overview. Part Number AK344A

Evaluation Report: Emulex OCe GbE and OCe GbE Adapter Comparison with Intel X710 10GbE and XL710 40GbE Adapters

HP 4 Gb PCI-X 2.0 Host Bus Adapters Overview

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008

SAN Conceptual and Design Basics

Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide

HP SN1000E 16 Gb Fibre Channel HBA Evaluation

Technical White Paper ETERNUS DX8700 S2 Hardware Architecture

Achieve Automated, End-to-End Firmware Management with Cisco UCS Manager

White paper 200 Camera Surveillance Video Vault Solution Powered by Fujitsu

Unleash the Performance of vsphere 5.1 with 16Gb Fibre Channel

Hetero Streams Library 1.0

An Oracle White Paper January Using Oracle's StorageTek Search Accelerator

Why Use 16Gb Fibre Channel with Windows Server 2012 Deployments

Data Sheet FUJITSU Storage ETERNUS DX200F All Flash Array

FUJITSU Storage ETERNUS Multipath Driver (Windows Version) Installation Information

The 8Gb Fibre Channel Adapter of Choice in Oracle Environments

Enhancements of ETERNUS DX / SF

Fujitsu Cloud for SAP

Datasheet FUJITSU Software Systemwalker Runbook Automation V15

Data Sheet FUJITSU Storage ETERNUS DX200F All-Flash-Array

Doubling the I/O Performance of VMware vsphere 4.1

NetFlow Collection and Processing Cartridge Pack User Guide Release 6.0

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

HP 8Gb PCIe FC HBAs Overview

Virtualized High Availability and Disaster Recovery Solutions

This guide consists of the following two chapters and an appendix. Chapter 1 Installing ETERNUSmgr This chapter describes how to install ETERNUSmgr.

SUN ORACLE DATABASE MACHINE

FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection-

HBA Virtualization Technologies for Windows OS Environments

MySQL and Virtualization Guide

Reference Architecture. EMC Global Solutions. 42 South Street Hopkinton MA

Technical Brief: Egenera Taps Brocade and Fujitsu to Help Build an Enterprise Class Platform to Host Xterity Wholesale Cloud Service

Enabling Multi-pathing on ESVA with Red Hat Enterprise Linux 6 Device Mapper

KVM Virtualized I/O Performance

Fujitsu extends SAP HANA to the Cloud

The Advantages of Multi-Port Network Adapters in an SWsoft Virtual Environment

High Availability Server Clustering Solutions

ClearPath MCP Software Series Compatibility Guide

Intel Data Direct I/O Technology (Intel DDIO): A Primer >

HP iscsi storage for small and midsize businesses

Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays

ETERNUS VSS Hardware Provider Installation Information

EMC Unified Storage for Oracle Database 11g/10g Virtualized Solution. Enabled by EMC Celerra and Linux using NFS and DNFS. Reference Architecture

QuickSpecs. HP Smart Array 5312 Controller. Overview

unisys ClearPath FS1770 System Implementation Guide FS December

HP Data Protector Software

N_Port ID Virtualization

FUJITSU Storage ETERNUS DX Configuration Guide -Server Connection-

2012 Oracle Corporation

DIABLO TECHNOLOGIES MEMORY CHANNEL STORAGE AND VMWARE VIRTUAL SAN : VDI ACCELERATION

Windows Host Utilities Installation and Setup Guide

How To Connect Virtual Fibre Channel To A Virtual Box On A Hyperv Virtual Machine

Building Enterprise-Class Storage Using 40GbE

New!! - Higher performance for Windows and UNIX environments

Disk-to-Disk Backup and Restore Solution

HP Serviceguard Cluster Configuration for Partitioned Systems

Data Sheet FUJITSU Storage ETERNUS CD10000

EMC DATA DOMAIN OPERATING SYSTEM

QLogic 16Gb Gen 5 Fibre Channel in IBM System x Deployments

High Availability with Windows Server 2012 Release Candidate

iscsi Quick-Connect Guide for Red Hat Linux

An Oracle White Paper July Oracle Linux and Oracle VM Remote Lab User Guide

An Oracle White Paper September Oracle Exadata Database Machine - Backup & Recovery Sizing: Tape Backups

High Availability Databases based on Oracle 10g RAC on Linux

Intel RAID Controllers

Installation and Support Guide for Microsoft Windows Server, Linux, Novell NetWare, and VMware ESX Server

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

An Oracle Technical Article November Certification with Oracle Linux 6

Transcription:

White paper End-to-end Data Protection Using Oracle Linux with the ETERNUS DX S3 series and Emulex HBA Greatly improving the reliability of the entire system Content Preface 2 1. Data Protection with T10 PI 3 1.1 What are T10 PI and DIX? 3 1.2 T10 PI Data Protection Field Format 3 1.3 I/O Processing With T10 PI 3 1.4 I/O Processing With DIX 4 2. Components that Enable End-to-end Data Integrity 4 3. Combination of Components and Functions that Achieves Data Integrity 5 4. Summary 5 Page 1 of 5

Preface As demand for data protection has grown in recent years, ensuring the integrity of the customer's data is a very important task. To carry out this task, data protection is not only required for the storage system but the entire system. This White Paper explains how data protection can be implemented for the entire system using T10 Protection Information (T10 PI) that comes with the Oracle Linux with Unbreakable Enterprise Kernel (UEK), FUJITSU Storage ETERNUS DX S3 series, and Emulex HBA. FUJITSU Storage ETERNUS DX S3 series Page 2 of 5

1. Data Protection with T10 PI 1.1 What are T10 PI and DIX? Data protection is nothing new. Each system component has data protection functions such as memory parity detection, error detection with communication protocols, CRC error detection of the disk storage system, and redundancy. (Figure 1.1, I. Conventional data integrity functions) T10 PI defines the mechanism for data integrity protection that is standardized through communication paths and devices. End-to-end data integrity from applications to disk drives is implemented with the combination of T10 Protection Information (T10 PI) and Data Integrity Extensions (DIX). T10 PI adds protection information to data in the layer, transfers the protection information to the devices that support T10 PI in the layers lower than the, and validates data integrity, including data written to the disk drive. (Figure 1.1, II. T10 PI) However, because protection information is added to data in the I/O controller layer, data cannot be protected in the higher layers (applications, ). Data protection, including applications and s, is implemented with the Data Integrity Extensions (DIX) which enable the T10 protection information to be exchanged between the Linux kernel and the HBA. (Figure 1.1, III. DIX) 1.2 T10 PI Data Protection Field Format An 8-byte protection information that is added by T10 PI during I/O operations consists of Reference Tag, Tag, and Guard Tag as shown in Figure 1.2. 512 bytes of data GRD APP REF 2-byte Guard Tag (CRC of 512-byte data portion) 2-byte Tag 4-byte Reference Tag 512 514 516 519 Figure 1.2 Protection Information field format Reference Tag: Detects data writing to incorrect blocks. Tag: Specific to applications. Tag defines the purpose of data. Guard Tag: Protects the data portion of the sector with CRC. 1.3 I/O Processing With T10 PI T10 PI adds protection information () to data in the I/O controller and validates data integrity within the layers lower than the. Figure 1.3 indicates I/O processing with T10 PI. The combination of T10 PI and DIX provides complete end-to-end data protection. (Figure 1.1, IV. DIX + T10 PI) Byte stream I. Conventional data integrity functions II. T10 PI III. DIX IV. DIX + T10 PI Area where data integrity can be validated by DIX Data validation with CRC Area where data integrity can be validated by T10 PI Area where data integrity can be inclusively validated by DIX and T10 PI T10 PI Xport CRC I/O controller Disk storage system Disk drive Disk storage system Figure 1.3 I/O processing with T10 PI Sector CRC Figure 1.1 range of the data integrity function The application transfers data to be written to the. The (file system) transfers the data to be written to the I/O controller as a logical block with 512 bytes per sector. The generates and adds the protection information, and sends data with 520 bytes per sector to the. The controller (disk storage system) validates the protection information and destination. The disk drive validates the protection information before writing the data. Page 3 of 5

1.4 I/O Processing With DIX DIX validates data integrity in applications and s. Figure 1.4 indicates I/O processing with DIX. Byte stream DIX Xport CRC Oracle Linux Oracle Linux integrates latest innovations in the Linux mainline and provides excellent performance, high scalability, and reliability for enterprise systems and applications. Oracle Linux provides the latest tools, and features that enable customers to innovate, collaborate, and create solutions across traditional, cloud-based, and virtual environments. Oracle Linux with UEK efficiently runs on systems with many cores, threads and NUMA nodes. Developed and tested to support demanding workloads, such as the Oracle Database, it is one of the most reliable, fast, and scalable for the enterprise implementations. In addition to this, Unbreakable Enterprise Kernel contains many new features that are relevant to Linux running in the data center, including support for T10 PI and the Data Integrity Extensions. Disk storage system Figure 1.4 I/O processing with DIX Data integrity processing that is specific to applications generates protection information for data and transfers both the data to be written and the protection information to the as required. The transfers the data and the protection information to the I/O controller. If the protection information is not generated, the automatically generates and adds the protection information to the data. The merges the data and the protection information, and sends them as data with 520 bytes per sector to the. The following processes are the same as those described in " 1.3 I/O Processing With T10 PI". The combination of T10 PI and DIX enables end-to-end data integrity as described above. 2. Components that Enable End-to-end Data Integrity Sector CRC This section explains the three components that enable end-to-end data integrity (,, disk storage system). Oracle Linux with Unbreakable Enterprise Kernel (UEK) Emulex LightPulse LPe16000 series of 16Gb Fibre Channel HBA Oracle Linux with the Unbreakable Enterprise Kernel, including the data integrity features, is provided under the GNU General Public License (GPL) and is available to anyone in both binary and source form. Oracle Linux with the default Unbreakable Enterprise Kernel can be downloaded for free from edelivery.oracle.com/linux Existing or new Oracle Linux support customers will receive full support for this kernel as part of their existing support subscriptions. Bug fixes and security errata are delivered via ULN and announced via the el-errata mailing list. Emulex LightPulse LPe16000 series Fibre Channel HBAs Emulex LightPulse LPe16000 series of 16Gb Fibre Channel HBA implements the data integrity functions of T10 PI and DIX using BlockGuard technology. Data Integrity Offload Support Emulex LightPulse Fibre Channel HBA family implements T10 PI as standard using the Data Integrity offload function. The integrity of user data that is transferred from applications to the is maintained by T10 PI. Data Integrity offload operates in the UEK and in the Emulex LightPulse Fibre Channel HBA driver that resides in the kernel. Emulex LightPulse LPe16000 series Fibre Channel HBA 16Gb/s Fibre Channel PCI Express 3.0 Single-Port Host Bus Adapter (LPe16000) Dual-Port Host Bus Adapter (LPe16002) Supports hardware offload of T10 PI tasks The end-to-end data integrity function is offloaded to the hardware by using T10 PI and provides a 40% higher performance than a firmware implementation. Page 4 of 5

The hybrid and unified ETERNUS DX S3 series feature data protection and flexibility functions to meet highest business- centric requirements and provide excellent reliability. The protection information generated by the is secured in the UEK and the HBA using T10 PI and DIX functions. It is then transferred to the disk storage system, ensuring data integrity until all data is written to disk. Besides T10 PI, ETERNUS DX series improves data reliability with the unique "Data Block Guard" function. This function adds a check code to each block of data being written to disk and validates data integrity at multiple check points. In the case of drive failures incorrect data will be detected, thus data integrity is validated and ensured throughout the disk storage system. The current ETERNUS DX series supporting T10 PI lineup consists of: Entry class systems ETERNUS DX100 S3, ETERNUS DX200 S3 Midrange class systems ETERNUS DX500 S3, ETERNUS DX600 S3 Enterprise class systems ETERNUS DX8000 S3 series All-flash Array ETERNUS DX200F 4. Summary The T10 PI and DIX functions enable data protection for the entire system including data write processes from applications to disk drives. Data protection for the entire system can improve system reliability by protecting the system from damaged or inconsistent data to minimize downtime and reduce end-user maintenance costs. For other specifications and functions of the components that are described in this document, refer to the following URLs: Oracle Linux http://www.oracle.com/us/technologies/linux/product/overview/in dex.html Emulex LightPulse LPe16000 series Fibre Channel HBA http://www.emulex.com/products/fibre-channel-hbas/ http://www.fujitsu.com/global/products/computing/storage/ 3. Combination of Components and Functions that Achieves Data Integrity The relationship between components and data integrity functions that achieves data integrity is shown in Figure 3. Disk storage system ensure data integrity Oracle Linux Kernel Emulex LightPulse LPe16000 series of 16Gb Fibre Channel HBA FUJITSU Storage ETERNUS DX S3 series Data Integrity Extensions (DIX) T10 Protection Information (T10 PI) Figure 3. Combination of components and functions that achieves data integrity DIX validates data integrity from the application to the I/O controller. T10 PI validates data integrity from the to the disk drive. Published by Fujitsu Limited Copyright 2015 Fujitsu Limited, the Fujitsu logo are trademarks or registered trademarks of Fujitsu Limited in Japan and other countries. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Emulex is a registered trademark of Emulex Corporation in the United States and other countries. Other company, product and service names may be trademarks or registered trademarks of their respective owners. All rights reserved, including intellectual property rights. Technical data subject to modifications and delivery subject to availability. Any liability that the data and illustrations are complete, actual or correct is excluded. Designations may be trademarks and/or copyrights of the respective manufacturer, the use of which by third parties for their own purposes may infringe the rights of such owner. Page 5 of 5