Redundancy means security in SAN fabrics

By Rick Cook

If a SAN carries most, or all, of a company's storage load, it had better not go down. Redundancy is one of the most straightforward ways of protecting critical parts of any computer system and in relation to SANs, redundancy has two common meanings.

The simplest, cheapest level of redundancy is path redundancy, which provides two separate data paths between storage and servers by including two Host Bus Adapters (HBAs) in each node. The data paths use separate ports in the Fibre Channel fabric switch, which effectively isolates them. The SAN software must support automatic failover from one HBA to the other in the event a data path fails. Redundant data paths are especially suitable for networks where only one or two of the connections need high reliability. It is susceptible to a failure of the fabric switch but otherwise the connection is well protected.

For critical applications you can provide two independent, identical SAN fabrics so that even the failure of a SAN switch will not shut the system down. This solution effectively doubles the cost of the SAN since everything from the HBAs to the fabric switch to the storage arrays must be duplicated. However, it does provide a very high level of reliability.

Of course, high availability also requires protecting and perhaps duplicating other parts of the system, such as the LAN and especially the supply of power.

Dell discusses redundancy in SAN

Requires Free Membership to View

fabrics as well as a number of other important topics in a white paper on designing SAN architectures on its Web site at http://www.dell.com/us/en/hied/topics/vectors_1999-fchannel.htm

While the discussion is built around Dell's SAN offerings, it is sufficiently general to be useful to anyone who is considering implementing a SAN.

About the author: Rick Cook has been writing about mass storage since the days when the term meant an 80K floppy disk. The computers he learned on used ferrite cores and magnetic drums. For the last twenty years he has been a freelance writer specializing in storage and other computer issues.

This was first published in October 2000

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.