VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
VERITAS Confidential
10
2 .3 .B NETWORK ACCESS. Gaining access and/or control of the network is controlled regardless of the transport method used. Ethernet, the most common transport method in a Front End network, uses an access method known as carrier sense multiple access and collision detection (CSMA/CD). The server, or node that wants to transmit data, listens for the presence of another transmission on the wire. Actually its sensing the presence of a particular voltage level. If another transmission is not detected, the node sends its data.
VERITAS Confidential
11
NETWORK ADDRESSING.
All communication adapters are encoded with a unique address at the time of manufacture. Each manufacturer is assigned a range of addresses. This is commonly referred to as the Media Access Control (MAC) address and is 6 bytes long. (4 bits = 1 byte). In order to participate on a network such as the IP network, each node must be assigned a unique Internet Protocol (IP) address which consists of 16 bytes divided into 4 byte positions known as octals. Each octal position is equal to one of the 4 decimal positions in an IP address.
VERITAS Confidential 12
VERITAS Confidential
13
VERITAS Confidential
14
The dominant method for disk and tape access by the server has been the SCSI bus architecture.
VERITAS Confidential
15
Termination is Mandatory
VERITAS Confidential
16
VERITAS Confidential
17
VERITAS Confidential
18
The NAS approach solved many of the parallel SCSI bus limitations, but also added a few kinks of its own that proved to be undesirable for transport of block level storage data.
VERITAS Confidential
19
VERITAS Confidential
20
VERITAS Confidential
21
Module 2 Summary.
VERITAS Confidential
22
Module 3
Fibre Channel Protocol
VERITAS Confidential
23
Objectives: At the end of this module, the student will be able to: 1. Discuss the multiple layers of the FC Protocol. 2. Discuss the physical components of Fibre Channel. 3. Discuss bit stream conversion.
VERITAS Confidential
24
VERITAS Confidential
25
FC-0 defines and details the physical interface, cables & connectors, transmitters & receivers and their interfaces. FC-1 defines and details the 8b/10b code and the detection of transmission and reception errors. FC-2 is the most complex layer. It provides the different classes of service, packetization, exchange & sequencing determination, error detection, segmentation & re-assembly of transmitted data, log-in services for coordinating communication between ports with different capabilities and B to B & E to E flow control. FC-3 This level is not yet implemented. FC-4 defines and details the mapping of Fibre
VERITAS Confidential 26
Cables.
VERITAS Confidential
27
VERITAS Confidential
28
VERITAS Confidential
29
GLM.
Gigabaud Link Module
VERITAS Confidential
30
GBIC.
Gigabit Interface Converter
VERITAS Confidential
31
The 10 bit character with more 1s than 0s is said to have positive disparity. You can guess then, what negative and neutral disparity represent. The transmission sequence is forced from a positive to negative transition to enable the detection of the end of one bit and the beginning of another.
Running disparity keeps track of the previous transmission event and if it was positive, it sends the negative version next thus maintaining balance on the line. VERITAS Confidential 32
8 Bits
8B/10B Encoder
Positive
Negative Running disparity keeps track of the previous transmission event and if it was positive, it sends the negative version next thus maintaining balance on the line.
VERITAS Confidential 33
ORDERED SETS.
VERITAS Confidential
34
VERITAS Confidential
35
The Start of Frame (SOF) Frame header. Payload. The Cyclical Redundancy Check (CRC) The End of Frame (EOF)
The Fibre Channel standards allow for 65536 frames per Sequence. To put this in perspective as a comparison between IP and Fibre channel, remember that an IP packets total size is equal to 1518 bytes and that a Fibre Channel Sequence is equal to an IP packet from a CPUs perspective. Do the math and youll see why Fibre Channel is optimized for large block data transfers typical of storage data.
VERITAS Confidential 36
CLASSES OF SERVICE.
VERITAS Confidential
37
Class 1 - Dedicated Connection Class 1 is a service which provides Dedicated Connections. A Class 1 Connection is requested by an N_Port with another N_Port. An acknowledgment (ACK) is returned by the other N_Port to establish the Connection. In general, once a Connection is established, it shall be retained and guaranteed by the Fabric, until one of these N_Ports requests removal of the Connection.
VERITAS Confidential
38
Class 2 - Multiplex This operating environment provides Connectionless service with notification of nondelivery, (BSY or RJT), between two N_Ports. This service allows one N_Port to transmit consecutive frames to multiple destinations without establishing a Dedicated Connection with any specific N_Port. Conversely, this service also allows one N_Port to receive consecutive frames from one or more N_Ports without having established Dedicated Connections with any of them.
VERITAS Confidential
39
Class 3 Data gram This operating environment provides Connectionless service without any notification of non-delivery (BSY or RJT), delivery (ACK), or end-to-end flow control between two N_Ports. The Fabric, if present, and the destination N_Port are allowed to discard Class 3 frames without any notification to the transmitting N_Port. This service allows one N_Port to transmit consecutive frames to multiple destinations without establishing a Dedicated Connection with any specific N_Port. Conversely, this service also allows one N_Port to receive consecutive frames from one or more N_Ports without having established Dedicated Connections with any of them.
VERITAS Confidential 40
FLOW CONTROL.
VERITAS Confidential
41
ADDRESSING.
Each node has a 64 bit Node_Name assigned at the time of manufacture. Referred to as the World Wide Name and is globally unique.
As with IP, Fibre Channel assigns an address to the port of each node when the port performs a LogIn to its respective topology. This is a 24 bit address called an N_Port ID and, like an IP address, the N_Port ID is used to route frames within a SAN. 24 bits may not seem like many addresses however, it is equal to 2 to the 24th power (over 16 million addresses).
VERITAS Confidential 42
Chapter 3 Summary.
VERITAS Confidential
43
VERITAS Confidential
44
Objectives:
VERITAS Confidential
45
NL- Ports
FL-Ports E-Ports G-Ports
VERITAS Confidential 46
Port Login.
3 Methods to Choose From
VERITAS Confidential
47
VERITAS Confidential
48
Fabric Login.
Whenever an N_Port connects to an F_Port, after power up, the N_Port signals the Fabric. The Fabric responds. The N_Port transmits its WWN (FLOGI). Fabric records the N_Port WWN into its Name Server table. Now the two ports establish a connection performing a Port Login (PLOGI). The N_Port queries the Fabric Name Server. The Fabric Name Server send a copy of its WWN/Fabric address table to the N_Port. The N_Port now performs a PLOGI with the other ports in the Fabric. Process Login (PRLI) with the other Fabric ports.
VERITAS Confidential
49
VERITAS Confidential
50
Loop Login.
Loop Initialization Process. Loop Initialization Select Master Loop Initialization Fabric Assigned. Loop Initialization Previously Assigned Loop Initialization Hard Assigned Loop Initialization Soft Assigned
VERITAS Confidential
52
VERITAS Confidential
53
VERITAS Confidential
54
Module 4 SUMMARY.
VERITAS Confidential
55
VERITAS Confidential
56
Objectives:
1. Identify and discuss the Fibre Channel Host Bus Adapter (HBA).
VERITAS Confidential
57
VERITAS Confidential
58
RAID CONTROLLERS
VERITAS Confidential
59
FIBRE JBOD.
VERITAS Confidential
60
HUBS
VERITAS Confidential
61
VERITAS Confidential
62
FABRICS (SWITCHES)
VERITAS Confidential
63
Module 5 Summary.
VERITAS Confidential
64
REFERENCE MATERIAL
VERITAS Confidential
65