Fundamentals 7 min read

Understanding Storage Systems: Hardware, Software, Networks, and Key Technologies

This article provides a comprehensive overview of modern storage systems, covering hardware components, storage software, networking protocols like iSCSI, the roles of SAN and NAS, RAID configurations, hot spares, deduplication, snapshots, remote replication, and disaster recovery strategies.

Architects' Tech Alliance
Architects' Tech Alliance
Architects' Tech Alliance
Understanding Storage Systems: Hardware, Software, Networks, and Key Technologies

The author continues a series on data storage, first referencing a previous article on basic storage concepts and then delving into detailed components of storage systems, including hardware (disk arrays, controllers, tape libraries), software (backup, management, snapshot, replication), networking (HBA cards, fiber switches, FC/SAS cables), and solution types (centralized storage, archiving, backup, disaster recovery).

iSCSI is explained as an IP‑based protocol that transports SCSI commands over Ethernet, offering a cost‑effective alternative to Fibre Channel for building storage area networks, with benefits in openness, capacity, speed, compatibility, and security.

The article clarifies that SAN and NAS are complementary technologies: SAN provides block‑level high‑performance data transfer, while NAS offers file‑level access and sharing, and many data centers adopt a combined SAN+NAS architecture.

It discusses disk interface types and their impact on performance, the concept of hot spares in RAID arrays (global and dedicated), and introduces Huawei's RAID2.0 based on extent‑level virtualization, describing chunk reconstruction, migration, and metadata management.

Data reduction techniques such as deduplication are described, followed by explanations of disk standby (power‑saving) modes and the transition between standby and active states during I/O requests.

Snapshot technology is covered, distinguishing full and incremental copies of LUN data, and the same principles are applied to LUN copy operations.

Remote replication (synchronous and asynchronous) and Continuous Data Protection (CDP) are introduced as methods for maintaining data copies across sites and enabling point‑in‑time recovery.

Device management topics include centralized configuration, topology monitoring, health alerts, and integration of diverse devices and services, exemplified by solutions like Symantec CCS.

The article concludes with a discussion of disaster recovery planning, emphasizing data and system backup, business continuity, crisis communication, and the importance of comprehensive emergency response strategies.

DeduplicationstorageData CenterNASiSCSIRAIDSAN
Architects' Tech Alliance
Written by

Architects' Tech Alliance

Sharing project experiences, insights into cutting-edge architectures, focusing on cloud computing, microservices, big data, hyper-convergence, storage, data protection, artificial intelligence, industry practices and solutions.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.