List of Figures
Figure 1 RAID0 Concept..........................................................................................................................................17
Figure 2
RAID1 Concept..........................................................................................................................................17
Figure 3 RAID1+0 Concept......................................................................................................................................18
Figure 4 RAID5 Concept..........................................................................................................................................18
Figure 5 RAID5+0 Concept......................................................................................................................................19
Figure 6 RAID6 Concept..........................................................................................................................................20
Figure 7 RAID6-FR Concept.....................................................................................................................................21
Figure 8 Example of a RAID Group .........................................................................................................................24
Figure 9 Volume Concept .......................................................................................................................................25
Figure 10 Hot Spares................................................................................................................................................27
Figure 11 Data Block Guard......................................................................................................................................29
Figure 12 Disk Drive Patrol.......................................................................................................................................30
Figure 13 Redundant Copy Function ........................................................................................................................31
Figure 14 Rebuild.....................................................................................................................................................32
Figure 15 Fast Recovery ...........................................................................................................................................33
Figure 16 Copyback..................................................................................................................................................34
Figure 17 Copybackless............................................................................................................................................35
Figure 18 Protection (Shield) ...................................................................................................................................36
Figure 19 Deduplication/Compression Overview ......................................................................................................38
Figure 20 Deduplication Overview ...........................................................................................................................39
Figure 21 Compression Overview .............................................................................................................................39
Figure 22 Details of the Deduplication/Compression Function .................................................................................44
Figure 23 Storage Capacity Virtualization.................................................................................................................46
Figure 24 TPV Balancing (When Allocating Disproportionate TPV Physical Capacity Evenly) ....................................49
Figure 25 TPV Balancing (When Distributing Host Accesses Evenly after TPP Expansion) ........................................49
Figure 26 TPV/FTV Capacity Optimization .................................................................................................................51
Figure 27 FTV Configuration.....................................................................................................................................53
Figure 28 FTRP Balancing.........................................................................................................................................56
Figure 29 RAID Migration (When Data Is Migrated to a High Capacity Drive)...........................................................59
Figure 30 RAID Migration (When a Volume Is Moved to a Different RAID Level) ......................................................59
Figure 31 RAID Migration.........................................................................................................................................60
Figure 32 Logical Device Expansion (When Expanding the RAID Group Capacity)....................................................61
Figure 33 Logical Device Expansion (When Changing the RAID Level).....................................................................61
Figure 34 LUN Concatenation ..................................................................................................................................62
Figure 35 LUN Concatenation (When the Concatenation Source Is a New Volume)..................................................63
Figure 36 LUN Concatenation (When the Existing Volume Capacity Is Expanded) ...................................................63
Figure 37 Wide Striping............................................................................................................................................64
Figure 38 Data Encryption with Self Encrypting Drives (SED) ...................................................................................66
Figure 39 Firmware Data Encryption........................................................................................................................67
Figure 40 Key Management Server Linkage.............................................................................................................69
Figure 41 Account Management ..............................................................................................................................71
Figure 42 Audit Log..................................................................................................................................................75
Figure 43 Host Affinity .............................................................................................................................................76
Figure 44 Associating Host Groups, CA Port Groups, and LUN Groups.......................................................................77
Figure 45 Power Consumption Visualization ............................................................................................................78
Figure 46 Event Notification ....................................................................................................................................82
Figure 47 Device Time Synchronization....................................................................................................................84
6
FUJITSU Storage ETERNUS AF250 S2, ETERNUS AF250 All-Flash Arrays
Design Guide (Basic)
Copyright 2019 FUJITSU LIMITED
P3AG-1822-09ENZ0