Printer Friendly

Continuous data availability solutions using an iSCSI virtualization switch.

The majority of today's businesses cannot survive a catastrophic loss of corporate data. Data is growing at exponential rates, forcing businesses to continually examine and enhance the availability, security and efficiency of their data environment. As one banking executive said, "The information we have on money is more valuable than the money itself."

Businesses recognize that remote data replication, multi-path failover, along with faster backup and recovery times, are essential to their survival and ability to service the new 24x7 global economy. Several mechanisms are implemented by most businesses to ensure business continuity. Most legacy methods use RAID within a storage system and local attached tape for backup. Although these methods are useful, they are slowly proving to be inadequate. Business requirements for continuity plans and fault recovery demand greater levels of data protection and business continuance requiring off-site data replication, automatic storage system failover, smaller backup windows and quicker file recovery. These new high availability business requirements can be delivered by two essential techniques.

The first technique is the use of iSCSI and its ability to move data efficiently and securely whenever TCP/IP and Ethernet are deployed. iSCSI is a new data communication protocol that resides between the a host's OS file system and the storage infrastructure. Hosts can now reliably and cost effectively read and write data to and from storage systems over greater distances using an IP network. iSCSI is similar to any standard device driver located on the lower layers of the host operational stack and therefore will not interfere with standard applications, operating systems and file systems. Moreover, iSCSI is an IETF standard, which eliminates interoperability issues.

The second technique is in-band virtualization, which delivers volume management, data replication, failover control and data routing from the network layer. The introduction of this control at the network layer augments or replaces traditional volume management mechanisms that reside on the periphery, within the hosts or storage systems. By placing control in the center, network administrators have greater flexibility and control over data flow and can build more reliable and secure high performance storage networks.

This article will review how an iSCSI switch can be deployed to provide Disaster Recovery solutions in the following areas:

* Local and Remote Synchronous Data Mirroring and Failover

* Backup and Recovery to and from a Remote Site

* Synchronous Remote Replication and High Availability

Local and Remote Synchronous Rata Mirroring and Failover

Mirroring is a RAID technique for creating and maintaining identical data sets on different physical disks within an array. Mirroring protects data and keeps applications operational in the event of disk failure. Without mirroring, a damaged disk drive would halt an application and potentially cause data lose. With RAID, if a disk drive fails within a mirror, it will have an identical partner or partners that will seamlessly take over the I/O requests previously serviced by the down disk drive. Once the failed drive is replaced, the partner rebuilds the new replaced disk drive with the current data until its data is 100% resynchronized to match the partner. At this time, the replaced disk drive rejoins its partner (or partners) and can again support I/O requests.

Read commands are generally divided among all mirrored partners. Any new data write commands must be replicated and sent to all the mirrored partners to maintain data continuity across all mirrors. All partners must acknowledge and confirm the write request before the RAID controller returns a write acknowledgment to the file system of the host(s). This ensures that all mirrors remain synchronized and the file system of the host(s) remains synchronized with the data on the minors. If a mirrored partner does not return a write acknowledgement, then the RAID controller will retry several times to confirm that one of the partners has failed. If there is still no write acknowledgement, the RAID controller will send an alert to the system administrator but it will continue to service file system I/O requests with the surviving partner (s). Some RAID controllers provide "self healing" where unused disk drives within the RAID system will automatically be selected as the new "spare" drive and be automatically synchronized and enabled as the new replacement disk drive.

Local Synchronous Data Mirroring Within a LAN

The iSCSI switch can perform mirroring with block-level virtualization capabilities. Mirroring is performed by the iSCSI switch in a similar fashion as a RAID controller. The major difference is that RAID controllers mirror storage devices within a single enclosure. However, because the iSCSI switch is in the network layer, it can create and maintain mirrored partners/ volumes anywhere within the network, indifferent to traditional physical limitation such as enclosures and distance. Local synchronous mirroring can now be performed between two or more enclosures. For example, an iSCSI switch in Building A with a FC attached JBOD can keep the data files on the FC JBOD synchronized with a FC attached JBOD in building B, and another FC attached JBOD in building C. The iSCSI switch can maintain all three as partners within a mirror. Like a RAID controller, if one of the mirrored partners goes off-line or experiences a failure, the iSCSI switch will automatically remove the failed partner from operation but will continue to service the application I/O requests with the remaining two mirrored partners (see Figure 1).

[FIGURE 1 OMITTED]

Remote Synchronous Data Mirroring within a MAN or WAN

High-end storage solution vendors use proprietary remote replication software to implement disaster recovery solutions for large enterprise applications. Such solutions require data to be remotely mirrored to a duplicate high-end storage system. The cost of purchasing a second storage system and the replication software can run into the hundreds of thousands of dollars, nearly 150% more than the initial storage system investment.

The iSCSI switch provides an alternative solution that enables companies to use any system from any vendor to create the redundant mirrored partner. An enterprise customer can use a high-end storage system for their primary storage and, with the iSCSI switch's mirroring capability, implement a low cost remote replication solution using lower cost simple disk systems without degradation of performance levels.

SANRAD's iSCSI switch, as an example, provides synchronous mirroring using direct attached SCSI storage systems and direct-attached or fabric-attached FC storage systems. Remote Synchronous Data Mirroring within a MAN or WAN is accomplished by using standard FC tunneling techniques.

In the primary site, a local storage system is attached to the iSCSI switch using either a SCSI or FC connection. In the recovery site an FC disk subsystem is attached to the same iSCSI V Switch through a dark fibre/tunneling technique like a DWDM connection. Dark fibre/DWDM service provides a high-speed low latency connection which is as fast as a direct FC or SCSI connection. Using iSCSI virtualizationsoftware, mirrored partner volumes are defined from the local and remote storage system(see Figure 2).

[FIGURE 2 OMITTED]

During normal system operation, blocks that are written to the mirror are duplicated and written to the local mirror over FC or SCSI and the remote mirror partner using dark fibre/DWDM. Just like a RAID controller, a write acknowledgement is sent to the host only after the blocks are written to both local and remote mirror partners. In case of a disk subsystem failure in a primary site, the iSCSI switch directs all read/write operations to the remote mirror partner connected over dark fibre/DWDM. The hosts in the primary site continue working without interruption through the iSCSI switch to the remote storage systems even though the primary storage systems are off-line.

This method assures complete data integrity at all times. Similar to a RAID controller, after the disk subsystem in the primary site is replaced, this new local mirror partner is resynchronized by the mirror partner at the recovery site and the system is recovered. The example below shows how an SSP (storage service provider) can use the iSCSI switch at a customer site to replicate and protect customer data.

Synchronous Remote Replication and High Availability

We can expand a simple remote synchronous mirroring installation into a complete storage disaster recovery configuration. We can use one site as a disaster recovery site for another or, as in this example, we will use two sites where each site is acting as the failover over disaster recovery site for the other. Either way, this is accomplished by having an iSCSI switch in both the primary and recovery sites. iSCSI switches are physically connected to all the hosts for both sites through the IP network; but each host is only communicating with the iSCSI switch within its primary site. The primary disk systems for each site are located and locally connected to the primary iSCSI switch. For disaster recovery purposes, a mirror of the local disk systems is connected to the same primary iSCSI switch, but located remotely through dark fiber/DWDM within the other site. To make the configuration complete, the iSCSI switch in each respective recovery site is given a physical connection to the mirrored disk belonging to the respective primary site (see Figure 3).

[FIGURE 3 OMITTED]

Using this topology, we form a symmetric configuration where each site is acting as a primary site as well as a disaster recovery site for the other site. The iSCSI switch high-availability feature monitors the availability of the other site by using the IP network to constantly send and receive heartbeat packets between the two iSCSI switches. For example, in case of a disaster in Site 1, the SANRAD V Switch in Site 2 will detect the failure at Site 1 and perform a failover process. Each connection between hosts, the down iSCSI switch and the down storage at off-line Site 1 will be terminated and moved automatically to the designated recovery site (Site 2). The operational iSCSI switch at Site 2 will automatically re-establish a connection to the hosts seeking storage from down Site 1. Once authentication has been confirmed, the iSCSI switch at Site 2 will connect the hosts to the mirror of Site 1 data. This mirror of Site 1 data has been kept synchronized up until the time of the disaster with Site 1 data by the iSCSI switch at Site 1 performing synchronous mirroring over the dark fiber DWDM connection. This failover is done through an iSCSI switch IP-takeover process.

iSCSI Switch IP Take-Over for Enhanced High-Availability

IP Take-over is key to enabling high availability and failover paths with the iSCSI switch. In the event an iSCSI switch is temporarily off-line or becomes overloaded, other iSCSI switches attached to the stone storage and the same host network can take over the IP addresses and data communication for the off-line switch. All iSCSI switches are "active" servicing their assigned hosts but they can also provide a "passive" failover path for other hosts within the network. This is because all iSCSI switches maintain the configuration information of other iSCSI switches within the same network topology and monitor the heartbeat of their designated partner or partners. When a site or switch goes off-line, iSCSI will terminate the host connections with the problematic site but maintain the iSCSI session within the host while waiting for the IP addresses for storage to be re-exposed. Another iSCSI switch will now expose the IP addresses from the down site or switch. iSCSI will discover the re-exposed IP addresses and create a new connection thus enabling the hosts to proceed with communication through a new switch to the storage systems. The iSCSI switch will continue to service it's own hosts and the hosts of the off-line switch until the original off-line switch is brought back on-line and the connection paths or site are repaired. The IP addresses will be restored to the returning switch and the original connections will be re-established, thus providing continuous data availability (see Figure 4).

[FIGURE 4 OMITTED]

IP take-over can be used with a single data center to provide multiple failover paths to storage systems. It can be used across multiple data centers to automatically provide a new route to storage resources in the event of a sectional site failure. As mentioned in the previous section, when used in conjunction with iSCSI switch mirroring and FC or third party FC tunneling techniques, it can provide an off-site disaster recovery facility which re-connects hosts with mirrored partners within seconds of primary site failure.

Synchronous Remote Replication over IP

Future additions of iSCSI initiators into the iSCSI switch leverage the remote replication process to work over the IP network. In this case we are not bound to the limitation of the fiber channel transport or fibre channel tunneling techniques such as dark fibre/DWDM. We can use any IP transport that provides enough performance bandwidth for the synchronous remote replication process.

In Figure 5 the volume is replicated between the primary and the remote site using an iSCSI switch as SANRAD's V Switch through a secured IP network within the LAN.

[FIGURE 5 OMITTED]

Backup and Recovery To and From a Remote Site

An iSCSI switch enables secure off-site remote backup and recovery over any IP network. Using the iSCSI switch, a disk or tape storage device can be used as a remote disk or tape recovery system. To configure this type of a solution, an iSCSI driver or iSCSI HBA (NIC) is installed in the local backup software application host. This host "sees" both the local storage systems and hosts to be backed up and, by way of iSCSI, sees the remote iSCSI switch and the attached tape or disk storage systems. The backup software application views and communicates with the remote iSCSI-attached backup systems as local storage devices even though they may be miles away in a different building, city or even in another country. The IT manager can use a simple file copy command, a backup software application or even an OS based mirroring feature to securely replicate files to the remote iSCSI switch and thus the remotely located storage systems. In this same fashion, files can also be read and recovered from the remote systems via the iSCSI switch and returned to the local backup host where they can be used to replace damaged or deleted files.

In Figure 6, the iSCSI switch presents virtual volumes to the application host. Critical files and data can be transferred securely to the remote recovery site using a simple copy command or backup software application.

[FIGURE 6 OMITTED]

Using backup SW such as Veritas Backup Exec or BakBone NetVault we offer a highly efficient, secure and easy to implement off-site backup and recovery solution. Using incremental backup, open file backup, snap-shot and file backup policies, we can configure remote backup and recovery routines to optimally utilize the existing bandwidth of the network without interfering with the normal operation of production systems and applications. With off-site remote backup, data is replicated periodically from the backup host located in the main site into a remote disk or tape located at the recovery site.

With a backup application software and an iSCSI switch, remote backup can be performed over any IP-based network including wireless connections or the Internet.

In Figure 7, an additional local tape backup system can be installed. Data can be backed up locally to tape in addition to remote disk and/or tape.

[FIGURE 7 OMITTED]

When adopting the remote backup option, an enterprise may decide to locate its recovery site with a data-hosting provider that specializes in hosting and facilitating the application. By locating the backup data at the service provider facilities, data is protected against a variety of natural and human disasters. By transferring data over an IP network, the geographic location of the enterprise recovery site is unrestricted.

As noted earlier, another benefit obtained through the iSCSI switch when combined with proper backup policies and applications, is that it allows for both tape and disk to be used as backup devices. Disk systems are generally faster than tape systems and thus can decrease the backup window as well as the time it takes to recover recently backed up and replicated files. Tape systems provide the best and most efficient media for longer-term backup and archiving. By using the iSCSI switch and combining new cost effective and simple disk systems with tape solutions, the backup and recovery times can vary from a few seconds for recent files still stored on disk to several minutes or hours for files migrated to tape. Network bandwidth and the amount of data that needs to be recovered will also effect recovery times.

We have presented an affordable remote backup and recovery solution for customers that would like to have a reasonable disaster recovery solution with minimal investment using their existing backup software application. An iSCSI switch enables the IT manager to easily configure a remote storage device, either disk or tape, and have it used by the existing backup software to perform remote backup and recovery of critical files and data.

Asynchronous Remote Replication Over IP

Today, synchronous remote replication methods provide the most reliable and instantaneous disaster recovery solutions. They require a high bandwidth and low latency network to provide optimum performance. These solutions provide the best answer for implementing a disaster recovery solution today but they may be beyond the budgets of some businesses.

Future asynchronous remote data replication techniques over long distances will require a technology to address the limitations of lower speed networks. SANRAD offers a wide variety of solutions for disaster recovery and will also provide a cost efficient asynchronous remote replication option which is totally transparent to the hosts and disk subsystems within an infrastructure. SANRAD is quickly developing an asynchronous remote replication option for its existing platform.

Data is growing at exponential rates and businesses are continually examining and enhancing the security, reliability and efficiency of their data environment. Vendors fully understand the importance of continuous data availability, efficient and reliable backup and secure and rapid system and file recovery. SANRAD's iSCSI V Switch provides businesses with local and remote mirroring/data replication and multi-path failover along with faster backup and recovery times. All these are essential to a businesses ability to service the new 24x7 economy.

Zophar Sante is vice president, market development, at SANRAD (San dose, CA)

www.sanrad.com
COPYRIGHT 2003 West World Productions, Inc.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2003, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:Disaster Recovery
Author:Sante, Zophar
Publication:Computer Technology Review
Date:Aug 1, 2003
Words:3050
Previous Article:Tape automation's never looked so good.
Next Article:Suspect system incident verification in incident response.


Related Articles
iSCSI vs. FC for meeting mission critical requirements.
Maximizing FC SAN investments with iSCSI.
Trends in virtualization focusing on solutions, not technologies.
Virtualization's new voice: virtualization plays an important role in an overall data management strategy.
Implementing an IP SAN for disaster recovery: using iSCSI as an enabler.
Managing and scaling IP SAN.
Looking back.
Beyond storage consolidation: the benefits of iSCSI SANs.
SANRAD and emBoot team to deliver iSCSI diskless boot.
2005 storage year in review.

Terms of use | Copyright © 2017 Farlex, Inc. | Feedback | For webmasters