Cloud computing is a model that ensures fast and reliable network connection to computer resources. There are public, private, community, and hybrid clouds. The main difference is in management and access rights. The basic structure is common to all models and it consists of servers, switches, and storage systems. To ensure high utilization of resources, virtualization is used practically in all implementations. With virtualization, we can create many virtual machines on one physical device.
Servers and storage systems are connected through their own local network called SAN. Data access in SAN is on block level.
Storage system has to be configured so that servers and users constantly have access to data. It can be configured as active/active or as active/passive. In active/active configuration, each controller serves its own data. If one controller fails, the partner controller takes over and serves both, its own data and the data of the partner. In active/passive configuration, only one controller serves data and the other one is idle. If active controller fails then the partner controller, which is in passive state, changes into active state and serves data.
Servers and storage systems use Ethernet or fiber connections. Multiple connections can be configured as one and presented as VIF (Virtual Network Interface). VIF ensures higher throughput and reliability. After physical connection is ensured, it is necessary to make data connection with iSCSI protocol. This protocol enables transfer of data over the TCP/IP protocols.
The result of the diploma thesis is a practical implementation on NetApp storage system. It is managed over DataONTAP operating system, which is accessed over CLI (Command Line Interface) or over GUI (Graphical User Interface) in a browser.
The thesis describes configuration of all storage components that are necessary for cloud computing. It is tested and we have shown how the storage system reacts when there is a failure on one of two controllers. If one of the active controllers fails, the other one takes control. Data are accessible at all times because the takeover happens immediately and without disturbance.
|