2012 Oracle Corporation

Similar documents
An Integrated End-to-End Data Integrity Solution to Protect Against Silent Data Corruption

White paper FUJITSU Storage ETERNUS DX series

Difference between Enterprise SATA HDDs and Desktop HDDs. Difference between Enterprise Class HDD & Desktop HDD

End-to-end Data integrity Protection in Storage Systems

Silent data corruption in SATA arrays: A solution

ZFS Administration 1

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System

Ensuring Robust Data Integrity

General Parallel File System (GPFS) Native RAID For 100,000-Disk Petascale Systems

Why disk arrays? CPUs speeds increase faster than disks. - Time won t really help workloads where disk in bottleneck

End to End Data Path Protection

GPFS Storage Server. Concepts and Setup in Lemanicus BG/Q system" Christian Clémençon (EPFL-DIT)" " 4 April 2013"

RAID technology and IBM TotalStorage NAS products

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1

Enterprise-class versus Desktop-class Hard Drives

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM

How To Fix A Fault Fault Fault Management In A Vsphere 5 Vsphe5 Vsphee5 V2.5.5 (Vmfs) Vspheron 5 (Vsphere5) (Vmf5) V

Best practices for Implementing Lotus Domino in a Storage Area Network (SAN) Environment

Enterprise-class versus Desktopclass

Security in Storage Networks A Current Perspective

A Comparison of Client and Enterprise SSD Data Path Protection

Taking Linux File and Storage Systems into the Future. Ric Wheeler Director Kernel File and Storage Team Red Hat, Incorporated

The BRU Advantage. Contact BRU Sales. Technical Support. T: F: W:

Long term retention and archiving the challenges and the solution

Building High-Performance iscsi SAN Configurations. An Alacritech and McDATA Technical Note

SeMiNAS: A Secure Middleware for Wide-Area Network-Attached Storage

IP SAN Fundamentals: An Introduction to IP SANs and iscsi

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation

NIMSOFT SLM DATABASE

Staying afloat in today s Storage Pools. Bob Trotter IGeLU 2009 Conference September 7-9, 2009 Helsinki, Finland

Implementing Storage Concentrator FailOver Clusters

PADS GPFS Filesystem: Crash Root Cause Analysis. Computation Institute

DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering

Why disk arrays? CPUs improving faster than disks

Sun Storage Perspective & Lustre Architecture. Dr. Peter Braam VP Sun Microsystems

Date: March Reference No. RTS-CB 018

Lessons learned from parallel file system operation

Best Practices for Installing and Configuring the Hyper-V Role on the LSI CTS2600 Storage System for Windows 2008

RedHat (RHEL) System Administration Course Summary

Softraid: OpenBSD s virtual HBA, with benefits. Marco Peereboom OpenBSD

Checksumming RAID. Brian Kroth Suli Yang Abstract. 1 Introduction. 2 Background. 2.

Raid storage. Raid 0: Striping. Raid 1: Mirrored

Dependable Systems. 9. Redundant arrays of. Prof. Dr. Miroslaw Malek. Wintersemester 2004/05

Chip Coldwell Senior Software Engineer, Red Hat

CSE-E5430 Scalable Cloud Computing P Lecture 5

Storage. The text highlighted in green in these slides contain external hyperlinks. 1 / 14

Chapter 12: Mass-Storage Systems

VERITAS Volume Management Technologies for Windows

Fault Tolerance & Reliability CDA Chapter 3 RAID & Sample Commercial FT Systems

What s New in VMware vsphere 4.1 Storage. VMware vsphere 4.1

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

Redundancy in enterprise storage networks using dual-domain SAS configurations

EMC DATA DOMAIN DATA INVULNERABILITY ARCHITECTURE: ENHANCING DATA INTEGRITY AND RECOVERABILITY

efolder White Paper: The Truth about Data Integrity: 5 Questions to ask your Online Backup Provider

TRACE PERFORMANCE TESTING APPROACH. Overview. Approach. Flow. Attributes

High Speed I/O Server Computing with InfiniBand

Optimizing Large Arrays with StoneFly Storage Concentrators

Distributed Data Storage Based on Web Access and IBP Infrastructure. Faculty of Informatics Masaryk University Brno, The Czech Republic

DELL TM PowerEdge TM T Mailbox Resiliency Exchange 2010 Storage Solution

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

Gigabit Ethernet Design

Toward I/O-Efficient Protection Against Silent Data Corruptions in RAID Arrays

SQL Server 2012 Optimization, Performance Tuning and Troubleshooting

FlexArray Virtualization

EOFS Workshop Paris Sept, Lustre at exascale. Eric Barton. CTO Whamcloud, Inc Whamcloud, Inc.

Emulex s OneCore Storage Software Development Kit Accelerating High Performance Storage Driver Development

Module 6. RAID and Expansion Devices

VMware vstorage Virtual Machine File System. Technical Overview and Best Practices

Hyperoo 2 User Guide. Hyperoo 2 User Guide

AIX NFS Client Performance Improvements for Databases on NAS

Microsoft SQL Server Always On Technologies

How To Build A Clustered Storage Area Network (Csan) From Power All Networks

Data Storage - II: Efficient Usage & Errors

Overview of RD Virtualization Host

How To Create A Multi Disk Raid

Trends in Enterprise Backup Deduplication

Storing Data: Disks and Files

Manage the RAID system from event log

RAID Performance Analysis

Configuration Maximums

ClearPath Storage Update Data Domain on ClearPath MCP

Chapter 10 Case Study 1: LINUX

SCSI Standards and Technology Update: SAS and SCSI Express

Introduction Disks RAID Tertiary storage. Mass Storage. CMSC 412, University of Maryland. Guest lecturer: David Hovemeyer.

File-System Implementation

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

GPT hard Disk Drives. For HP Desktops. Abstract. Why GPT? April Table of Contents:

Linux Powered Storage:

IP Storage: The Challenge Ahead Prasenjit Sarkar, Kaladhar Voruganti Abstract 1 Introduction

Transcription:

<Insert Picture Here> End-To-End Data Integrity Requirements For NFS Chuck Lever <chuck.lever@oracle.com> Consulting Member of Technical Staff

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.

Today s Data Integrity Solutions Application ADB (block poisoning) Filesystem data and metadata checksumming Transport integrity and encryption Block CRC Kerberos integrity and privacy Storage On-disk checksums RAID N+1 Disk scrubbing

Domain-Specific Checking Inadequate Silent data corruption on storage media Storage subsystem complexity increases failure rate Corruption often undetected until data is read: too late Checksums miss important failures iscsi can DMA the wrong pages from memory. The checksums will match the bad pages transferred An array may receive incorrect data then use it to generate RAID parity blocks Disks may never write data, or write it to the wrong LBA

Protection Must Be End-To-End Protection should enable integrity check of I/O request at every stage of the I/O path during each write request Protected handoffs and conversions as the I/O transitions between domains with different protection schemes may be necessary

T10 Protection Information Model Standard 8 bytes of integrity metadata Any layer of storage subsystem can re-verify the data Prevents content corruption and misplacement errors Protects path between HBA and storage device Protection information is interleaved with data on the wire, i.e. effectively 520-byte logical blocks

T10 Protection Information Model T10 PI allows multiple components to exchange and verify protection information

T10 Data Integrity Extensions DIX facilitates protection information interchange with I/O controller. This enables applications to send and receive checksums

Data Integrity Extensions + T10 PI When combined, DIX and T10 PI enable end-to-end data integrity protection

Marrying NFS with T10 PI + DIX When PI-capable storage is available on an NFS server, enable applications on NFS clients to access and update PI Use of a maturing standard enables choice of access Proposed optional feature of NFSv4.(n+1) Challenges to make this work for byte-stream access model Obvious fit with pnfs block layout PI-enabled NFS I/O and locking must be block aligned Initial use mostly by non-posix NFS clients

High-Level Requirements Applications can read or write PI-protected data via SCSI, a pnfs layout, or non-pnfs NFS NFS servers can indicate that a particular share s underlying storage supports PI Not all classes of NFS servers may support PI, and not all FSIDs on one server may support it Report supported T10 PI classes Report data-to-pi size ratio of underlying storage NFS clients access PI data via an NFSv4 protocol extension Must allow concurrent READ_PLUS variations (e.g. ADB) Each READ contains one or more 8-byte PI values

Additional Considerations T10 PI + DIX is not owned by IETF How to reference T10 work items in an IETF standard Security considerations Ignore, recommend or require integrity-capable transport

The preceding is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.