search
HomeCommon ProblemWhat are the three implementation methods of storage virtualization?

The three ways to implement storage virtualization are: 1. Host-based virtual storage, relying on agents or management software; 2. Storage device-based virtualization, relying on storage modules that provide related functions; 3. , Network-based virtual storage can be divided into interconnected device-based virtualization and router-based virtualization.

What are the three implementation methods of storage virtualization?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

The most popular understanding of storage virtualization is the abstract representation of storage hardware resources. According to virtualization objects, there are three main ways to implement virtualized storage.

Host-based virtual storage

Host-based virtual storage relies on agents or management software, which are installed on one or more hosts to implement storage virtualization Control and management. Since the control software runs on the host, this will take up the host's processing time. Therefore, this method has poor scalability and its actual performance is not very good. The host-based approach also has the potential to impact system stability and security by potentially allowing inadvertent unauthorized access to protected data.

This method requires the installation of appropriate control software on the host, so the failure of one host may affect the integrity of data in the entire SAN system. Software-controlled storage virtualization may also bring unnecessary interoperability overhead due to differences in software and hardware from different storage vendors, so this method is also less flexible. However, because it does not require any additional hardware, the host-based virtualization approach is the easiest to implement and has the lowest equipment costs. Suppliers using this method tend to become software vendors in the storage management field, and currently have mature software products. These software can provide easy-to-use graphical interfaces, easily used for SAN management and virtualization, and have good load balancing mechanisms in hosts and small SAN structures. In this sense, host-based storage virtualization is a cost-effective method.

Storage device-based virtualization

The storage device-based storage virtualization method relies on storage modules that provide related functions. Without third-party virtualization software, storage-based virtualization often provides an incomplete storage virtualization solution. For SAN storage systems containing multi-vendor storage devices, this method does not work very well. Functional modules that rely on storage vendors will exclude the use of JBODS (Just a Bunch of Disks, simple hard disk groups) and simple storage devices in the system, because these devices do not provide storage virtualization functions.

Of course, using this approach means ultimately locking in a single storage provider. A storage-based virtualization approach also has some advantages: it is easier to implement in a storage system, easier to coordinate with a specific storage vendor's equipment, so it is easier to manage, and it is transparent to users or administrators. . However, we must note that the lack of adequate software support makes the solution more difficult to customize and monitor.

Network-based virtual storage

1) Virtualization based on interconnected devices

If the method based on interconnected devices is symmetrical, then the control information and data travel on the same channel; if it is asymmetric, control information and data travel on different paths. In a symmetrical manner, interconnected devices may become a bottleneck, but multiple device management and load balancing mechanisms can alleviate bottleneck conflicts. At the same time, in a multi-device management environment, when a device fails, it is easier to support the server to take over the fault. However, this creates multiple SAN islands because one device only controls the storage system to which it is connected. Asymmetric virtual storage is more scalable than symmetric because the paths for data and control information are separated.

Internet-based virtualization methods can run on dedicated servers using standard operating systems such as Windows, SunSolaris, Linux or vendor-provided operating systems. This approach runs on a standard operating system and has many of the advantages of a host-based approach - ease of use and cheap equipment. Many device-based virtualization providers also provide additional functional modules to improve the overall performance of the system. They can obtain better performance and more complete functions than standard operating systems, but require higher hardware costs. However, the device-based approach also inherits some of the drawbacks of the host-based virtualization approach, as it still requires an agent software or host-based adapter running on the host, and any host failure or inappropriate host configuration may lead to access to unprotected data. At the same time, interoperability among heterogeneous operating systems remains an issue.

2) Router-based virtualization

The router-based approach is to implement the storage virtualization function on the router firmware. Vendors also often provide add-on software that runs on the host to further enhance storage management capabilities. In this method, a router is placed in the data channel from each host to the storage network to intercept any command from the host to the storage system in the network. Since the router potentially serves every host, most control modules exist in the router's firmware, which results in better performance and better results than host-based and most connected device-based approaches. By not relying on a proxy server running on each host, this approach provides better security than host-based or device-based approaches.

When the router connecting the host to the storage network fails, the data on the host may still be inaccessible. However, only hosts connected to the failed router will be affected; other hosts can still access the storage system through other routers. Router redundancy can support dynamic multipathing, which also provides a solution to the above failure problem. Since routers often serve as bridges for protocol translation, a router-based approach can also provide interoperability between heterogeneous operating systems and multi-vendor storage environments.

If you want to read more related articles, please visit PHP Chinese website! !

The above is the detailed content of What are the three implementation methods of storage virtualization?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
deepseek web version official entrancedeepseek web version official entranceMar 12, 2025 pm 01:42 PM

The domestic AI dark horse DeepSeek has risen strongly, shocking the global AI industry! This Chinese artificial intelligence company, which has only been established for a year and a half, has won wide praise from global users for its free and open source mockups, DeepSeek-V3 and DeepSeek-R1. DeepSeek-R1 is now fully launched, with performance comparable to the official version of OpenAIo1! You can experience its powerful functions on the web page, APP and API interface. Download method: Supports iOS and Android systems, users can download it through the app store; the web version has also been officially opened! DeepSeek web version official entrance: ht

In-depth search deepseek official website entranceIn-depth search deepseek official website entranceMar 12, 2025 pm 01:33 PM

At the beginning of 2025, domestic AI "deepseek" made a stunning debut! This free and open source AI model has a performance comparable to the official version of OpenAI's o1, and has been fully launched on the web side, APP and API, supporting multi-terminal use of iOS, Android and web versions. In-depth search of deepseek official website and usage guide: official website address: https://www.deepseek.com/Using steps for web version: Click the link above to enter deepseek official website. Click the "Start Conversation" button on the homepage. For the first use, you need to log in with your mobile phone verification code. After logging in, you can enter the dialogue interface. deepseek is powerful, can write code, read file, and create code

How to solve the problem of busy servers for deepseekHow to solve the problem of busy servers for deepseekMar 12, 2025 pm 01:39 PM

DeepSeek: How to deal with the popular AI that is congested with servers? As a hot AI in 2025, DeepSeek is free and open source and has a performance comparable to the official version of OpenAIo1, which shows its popularity. However, high concurrency also brings the problem of server busyness. This article will analyze the reasons and provide coping strategies. DeepSeek web version entrance: https://www.deepseek.com/DeepSeek server busy reason: High concurrent access: DeepSeek's free and powerful features attract a large number of users to use at the same time, resulting in excessive server load. Cyber ​​Attack: It is reported that DeepSeek has an impact on the US financial industry.

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Repo: How To Revive Teammates
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment