Database Server Installation Deployment in MyCollege.net

xiaoxiao2021-03-06  41

Database Server Installation Deployment in MyCollege.net

table of Contents

I. Foreword .......................................................................................

Second. Application significance ........................................................................ 1

3. Related technology ........................................................................ 2

IV. System configuration ........................................................................ 6

V. System characteristics ........................................................................ 8

Sixth. Small knot ...................................................................................................

Summary

The system uses SAN storage technology to the database server to improve the overall speed of the system and provide a broad expansion space for the system.

This System, Which Use San Storage Technic, Used In this System's Database Server To Improve The System's Speed.it Provides The System A Wide Expand Area.

Key words SAN, disk array, RAID

I. Introduction

The system includes a user's unified authentication system and a public resource management system. The authentication system mainly stores username and password information for user login, mainly involved in the database query operation, and there is no information accessed by multiple users. The situation is not very high when multiple users are logged in. Public resource management system stores students 'students' s, name, selection information, etc., but also some relevant information of teachers, in addition to many users who have a multi-user access to the entire system, there may be multiple users one of them. Access to the information of the students or teachers, the requirements for the access speed and response time of the storage device. And the data of these two systems affect the interests of students and teachers, unexpected data loss or damage will cause unpredictable impact on users, and even lead to serious consequences of confusion of school management, so data security Sex and important. At the same time, due to the increase in registration information, such as new students, the storage capacity has a higher requirements, so the expansion of the system becomes a question worth considering, so we take SAN with high read and write speed and high expansion. Storage System.

2. Application Significance

The SAN storage system is used to increase the performance of the entire system in a computer system that has large data storage, high read and write speed, high real-time requirements, has played an extremely important role in improving the performance of the entire system. The system uses the disk array through the controller as a local hard disk, and then shares the server (workstation) that is shared on these "local hard drive", to read the data of the array to the local hard disk, read the data At the time, the data of the disk array is directly transmitted from the fiber switch through the fiber to the corresponding server (workstation). Since it is directly transmitted by fiber, the speed is fast, and it is a special fiber transmission, which does not affect the workstation (server) to read and write by other workstations or servers. High real-time, the transmission speed is also stable. The read data is complete by the disk array controller, which greatly reduces the burden on the server, so that the server can do other more important work.

3. Related Technology

The technology used is mainly the principle of disk array:

Technical: Disk array is a plurality of disks into an array, as a single disk is used, which stores data in different disks in different disks, and is accessed, and the relevant disks in the array work together. Largely reduce the access time of data, and there is a better spatial utilization. Different techniques utilized by disk arrays, called RAID Level, different Level for different systems and applications to solve data security issues. Generally high-performance disk arrays are reached in hardware, and further connecting disk to a controller or disk array on a controller or control card, for different users to solve four major requirements for disk output entering systems. : (1) Increase access speed;

(2) fault tolerance, security;

(3) Effective use of disk space;

(4) Try to balance the performance difference between CPU, memory, and disk, improve the overall workability of the computer.

Principle of disk arrays:

Different technologies for different applications in disk arrays, called RAID Level, RAID is an abbreviation for Redundant Array Of InExpensive Disks, and each Level represents a technology, currently use RAID 0 ~ RAID 5. This Level does not mean that the technology is high, Level 5 is not higher than Level 3, and the Level 1 is not less than Level 4. As for the product of RAID Level, the pure look user's operating environment and application, Level has no inevitable relationship. RAID 0 and RAID 1 Suitable for PC and PC-related systems such as small network servers and workstations that require high disk capacity and fast disk access, because it is cheap, but because of the general people don't understand the disk array, do not see disk arrays For them, the market has not been opened; RAID 2 and RAID 3 apply to large computers and images, CAD / CAM and other treated; RAID 5 is used for OLTP, because there is a financial institution and large data processing center, there are more uses More famous, but also forms a misunderstanding of the disk array, thinking that the disk array is not RAID 5; RAID 4 is used, because both have their common restrictions. To introduce each RAID Level, let's take a look at two basic techniques to form a disk array:

As shown in the figure below, the DFTRAID disk array controller is connected to four disks:

These four disks form an array, and the controller of the disk array is considering this four disks as a single disk, such as the C: disk in the DOS environment, extending the small capacity disk to a single disk, the user does not have to Planning the distribution of data in each disk, and increases the usage rate of disk space. Dftraid's SCSI disk array can connect dozens of disk, form an array of capacities reaches a few T or even tens of T, so that the disk capacity can be almost unlimited; and each disk is used together, more than a single disk Fast.

The disk array is considering multiple disks of the same array as a single virtual disk, so its data is stored in a disk array in a segmentation manner, as shown below.

Disk 0

Disk 1

Disk 2

Disk 3

A0-A1

B0-B1

C0-C1

D0-D1

A2-A3

B2-B3

C2-C3

D2-D3

A4-A5

B4-B5

C4-C5

D4-C5

A6-A7

B6-B7

C6-C7

D6-D7

The data is segmented as needed, starting from the first disk, put it until the last disk returns to the first disk until the data distribution is completed.

Below mainly, several RAIDs:

RAID0:

RAID 0 has the highest efficiency of the output of the disk. The disk array has more efficient reasons in addition to the data segmentation, it can perform multiple output requirements simultaneously, because each disk in the array can operate independently, segmented in different disks, different disks At the same time, it is read and written, and it is possible to simultaneously access the memory and disk for parallel access, but only hardware disk arrays have this performance performance. RAID 1

RAID 1 is a technology that uses disk mirror. It is an additional backup disk other than the working disk, and the data stored in the two disks is exactly the data written to the working disk, and the backup disk is also written. Unlike ordinary disk mirroring, RAID 1 has no working disk and backup disk, multiple disks can operate simultaneously and overlap the functions, even different mirror disks can be written simultaneously, this is the most Bethematically, called load balancing. For example, there are multiple users to read data at the same time, and the system can simultaneously drive mirror-mounted disks while reading data to mitigate the load of the system, add I / O performance.

RAID 2

RAID 2 is to disperse data into bit or block, add a sea code, write into each disk in the disk array, and the address is the same, that is, in each disk, its data is in the same track and Sector. The design of RAID 2 is a technology that uses a coaxial synchronization. When data is accessed, the entire disk array is operated together, and it is parallel to the same position of each of the disks, so there is the best access time, and its bus is special design. , With a large bandwidth parallel transmission, there is the best transmission time. Access applications in large files, RAID 2 has the best performance, but if the file is too small, it will pull it down because the access of the disk is in the sector, and the access of RAID 2 is all disks. Parallel action, and is the access to the unit element, so the amount of data smaller than one sector will make its performance greatly.

RAID 3

RAID 3's data storage and access mode is the same as RAID 2, but in terms of security, in the parity, the sea code is replaced, and there is only an additional automatic disk. The calculation of parity values ​​is the logical operation of the relative application of each disk, and then writes the result to parity disks, and any data is modified to do parity calculations, such as a disk failure, replace it After the new disk, the entire disk array (including parity disks) needs to be recalculated once, restore the data of the fault disk and writes in a new disk; if the parity disk failure, recalculate the parity value of the parity. Fault tolerance requirements.

RAID 4

RAID 4 is a segment of the segment of the same position as the segment of the segment, and a check disk segment is formed in the same location. This approach can perform different readings in different disks, greatly improve the reading performance of the disk array; however, when writing data, only one time is limited to verification disks, start all disks Reading data forms all data segments of the same checkout segment, and checks the calculation and writing with data to be written. Even so, the writing of the small file is still fast than RAID 3, because its verification is calculated and the bit level is calculated; however, the verification disk forms the bottleneck of RAID 4, reducing performance.

RAID 5

RAID5 avoids the bottleneck of RAID 4, the method is to place the verification data in each disk without checking the disk, and the first disk segment of the disk array is the verification value, the second disk is rear A disk re-folded back to the first disk is data, and then the segment of the second disk is the check value, and the segment of the second disk is re-folded back to the second disk. According to this, it is pushed until it is finished. The check value is calculated from the segmentation of the segments of each disk. This approach increases the access performance of the small file, which can not only read simultaneously, but may even perform multiple writes simultaneously.

Compared with the above strategies: RAID0's disk utilization is high, the data is read and written is fast, but the security of the data is poor; the data of the data of RAID1 is fast, and the security is very good, the disadvantage is The utilization rate of the disk is low; RAID2 to RAID5 can be said to be the combination of RAID0 and RAID1, the read and write speed is fast, and the data is safely guaranteed. The utilization of the disk is relatively high, but RAID2 and RAID3 are suitable for mass data. Batch Reading and writing, reading and writing performance in a large number of small data is not very good; RAID4 solves the above problems, but the checkbox is easy to form a communication bottleneck, and the emergence of RAID5 solves this problem. Therefore, the information stored in the user authentication system and the public resource management system is a wide number of small block data, and the security requirements are high, so it is not suitable for use in RAID0, RAID2, and RAID3 read mode, this system Especially the public resource management system, there may be access to multiple users at the same time to a student or teacher information. If this is used, it can read data simultaneously when this happens. It will undoubtedly improve the performance of the system relative to RAID5. So use the RAID1 policy on the read and write strategy of the disk array. (More technologies can be referred to http://www.dft.com.cn) In order to ensure that the system's long-term uninterrupted work, the redundancy of system equipment is guaranteed. The disk array uses a dual controller. In normal cases, the dual controller works together, improve the speed of the input and output data, improve the performance of the system, and greatly reduce the interruption of system services due to controller failure; similar to this, server Also made into a cluster service.

IV. System configuration

Wiring diagram of the system (Figure A)

All types of servers have only introduced their special hardware configurations in addition to basic configuration. Database Server: Ethernet Card (

100M

), Fiber Channel Card (FC Card). Web server: Ethernet card (

100M

), Fiber Channel Card, Fibernet Card (If you want to make a cluster service, you need an additional Ethernet card). Ethernet switches and FC switches (as an example of 16-port switches) can be used with Cisco or Vixel switches. The Ethernet switch does not require other special configuration, and if you want to use the same switch to connect other networks, it is best to connect the server connected to the storage network to the switch into a VLAN to avoid interference. . For FC switches, you can configure it with San Insite and other software. Assume that the fiber connected to the disk array controller is connected to the first and 2nd interface of the FC switch, the interface to which other servers is connected to the same. 1 and 2 interface communications and cannot communicate with each other, so that mutual interference between each server is avoided. When configuring the controller, be aware that shielding does not have to read the LUN's access to the LUN to improve data security.

Software configuration: Server Uniform Install Windows 2000 Advance Server, after installing the operating system and each hardware driver, install SANERGY, restart the server, then test the speed of the server's disk array read data and write data, if

75M

In the left and right, the system is operating normally, for the database server, install SQL Server, and imports data. For web servers, install IIS services. The Ethernet card is connected to the storage network's Ethernet switch, the fiber network card is connected to the local area network or wide area network, responsible and user communication, so the IP setting of the IP card IP and fiber network card must be set to be not in the same network segment. For servers such as public resource management, multiple servers can be made into cluster services to improve performance and stability. V. Systematic characteristics

Disks on disk arrays can be divided into different rolls, in order to ensure the security of data, put data (usernames and passwords) of the user's unified identity authentication system (username and password) on a LUN; and put the data related to the public resource management system in other LUNs top, unhane server access to LUNs, which can be damaged by preventing illegal access from different servers from illegal access. Therefore, the disk array is divided into two LUN (LUN0 and LUN1), which stores relevant data of the above two subsystems, and if there is enough space, divide other LUNs to store other data. These volumes become a disk on the server and set to sharing, then other web servers access the disk on the disk array by diffraction these disks to the local disk, easy to use, easy to use. The transmission of data is transmitted through specialized fiber, not through Ethernet (this function is implemented by SANERGY, so database server and WED server need to install sanergy), fast speed, and no contention transmission channel, Therefore, the response time is short, the read and write speed of the data is also stable. Disk array of disk arrays support hot-swappable techniques, when the disk corruption occurs, can pull out corrupted disk in the system without stopping, replace the new disk, and reconstruct the data on the corrupted disk, other devices , Such as disk arrays, servers, etc. also support hot-swappable techniques to ensure that the damaged components are replaced when the system is run, ensuring the continuity of the system and the safety of data. As the amount of data is increasing, when a single disk array cannot meet the needs, the new disk array can be extended to double the storage capacity, and no new price is expensive, so it provides users with a large Extended space, the cost of expanding the need is also greatly reduced.

Sixth.

This graduation design mainly learned from network storage technologies during the internship, and an actual application in graduation design is an assessment of the study at the time. In the process of design inquiry, I have made me a more profound understanding of network storage technology, and I have mastered a lot of ideas in improving data security and access. At the same time, through cooperation with other students of the group, I personally understand the mainity of collaborative cooperation. In the event of this article,

Xie Guide

The teacher's careful guidance and the students of this group help me, this design can be completed smoothly, Chengdu Saber Digital Technology Co., Ltd. has an indispensable role in the internship opportunities I provide, and I would like to express my heartfelt thanks.

(Figure A)

转载请注明原文地址:https://www.9cbs.com/read-74019.html

New Post(0)