SlideShare a Scribd company logo
1 of 20
Download to read offline
Introduction to the SAS


Serial attached SCSI is a method
used to access computer
peripheral devices. It employs the
digital data transfer over the thin
cable. In business enterprise it is
used to acess the mass storage
devices.
What is SCSI

SCSI is the acronym of small
computer system interface. It
defines a logical standard to
which disk devices must adhere.
This standard called common
command set. It is a type of
parallel bus.
Introduction to SCSI



This interface is a set of standerd
for physically connecting and
transfer of data between
peripheral devices.
Basic component of
   SAS
1) Initiator.


2) Target.


3) Service delivary subsystem.


4) Expanders.
Initiator

It is a device that originate device
service and task management
system. It processing by the
target device. It is provided as on
board component in the
motherboard or as a host bus
adapter.
Target

A device containing logical unit
and target ports that receives
device service and task
management request. It could be
a hard disk or a disk array
system.
Service delivery
   subsystem

It is a part of a I/O system that
transmit information between
initiator and target. Typecally
cable connecting beteen these
devices.
Expanders


It is a part of device delivary
system and faciliate connection
between SAS devices.
Example of SAS



There are many different types of
SAS. These are SFF 8482, SFF
8484, SG_XPCIE8SAS_E_Z etc.
SAS Protocol
SAS uses point to point
architecture that data between
two different SCSI devices. It uses
differential signaling for achieving
reliable and high speed
communication. It inherits it’s
command set from parallel SCSI
and uses full duplex
communication in the fibre
channel. It uses SAS 2 protocol
it’s link rate is 6.2 Gb/s.
Cables of SAS
SAS support active cables, those
are thin cables with active
circuitry to reduce cable weight
and management. Active circuitry
have build in driver, repeaters and
equalizing filter. It removes the ISI
(inter symbol interference), it is a
type of distorted signal. Driver
and repeater increased the signal
to noise ratio by up raising the
near end cross talk (NEXT).
Topology is a arrangement of
links, nodes or computers. It may
also be called as the structure of
network. LAN is a type of physical
topology. SAS has different types
of topology. Mainly internal and
external. There are lots of other
also.
Internal Topology

In this topology RAID system use
SAS or SATA drivers. Each drive
has point to point connection with
the controllers. Maximum eight
drives are supported by
controllers. A full height HP smart
expender card support eight
internal drives.
External Topology

In this type of topology the
controller connecting to the
external storage enclosure. Each
controller port incorporate four
lanes and total maximum
throughput 2400 MB/s. The
storage enclosure contains
internal 36 port expanders.
Multi Node Cluster



SAS using this topology it is an
alternative to the fibre channel
local loop topology. It gives you a
high availability with no point of
failure.
Dual Path Dual Domain
  Architecture
T10 technological committee
SCSI defines as interconnection
of two or more SCSI devices.
When any part of data pathway
domains fails then data transfer
has stop because there is no
redundant pathway. But in this
architecture creates dual path
dual domain and redundant
pathway for storage.
Zoning

Zoning breaks topology into
different logical group for better
traffic management. It gives
unique ID in each expander PHY
to provide secure method for
managing SAS devices. All device
within zone group can interact
with each other.
SAS cable
SAS uses mini SAS 4X external
cable plug to connect to the end
devices with enclosure universal
port. Connector can attached with
the out of an enclosure or in port
of an enclosure. Connector have
icon to identify the type of
enclosure. It has a reverse key
allow them to accept SAS 2 cable
longer than 6 m.
Conclusion
SAS technology with different
signaling and active cable
continue to evolve and improve. If
you looking for high level
redundancy then dual domain
and dual path configuration helps
you. It increased the data
availability into the storage
network. Data availability is
essential for uninterrupted of
business operation.
THANK YOU

More Related Content

Viewers also liked

Viewers also liked (17)

Storage School 1
Storage School 1Storage School 1
Storage School 1
 
SCSI commands
SCSI commandsSCSI commands
SCSI commands
 
Supply Chain Analytic Solution
Supply Chain Analytic SolutionSupply Chain Analytic Solution
Supply Chain Analytic Solution
 
Intro to R for SAS and SPSS User Webinar
Intro to R for SAS and SPSS User WebinarIntro to R for SAS and SPSS User Webinar
Intro to R for SAS and SPSS User Webinar
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storage
 
Chapter22
Chapter22Chapter22
Chapter22
 
INTRODUCTION TO SAS
INTRODUCTION TO SASINTRODUCTION TO SAS
INTRODUCTION TO SAS
 
Hard disk_
 Hard disk_ Hard disk_
Hard disk_
 
Storage interface sata_pata
Storage interface sata_pataStorage interface sata_pata
Storage interface sata_pata
 
San
SanSan
San
 
Storage devices
Storage devicesStorage devices
Storage devices
 
SATA Introduction
SATA IntroductionSATA Introduction
SATA Introduction
 
Disk Drives Interfaces
Disk Drives InterfacesDisk Drives Interfaces
Disk Drives Interfaces
 
Pci,usb,scsi bus
Pci,usb,scsi busPci,usb,scsi bus
Pci,usb,scsi bus
 
Introduction to SAS
Introduction to SASIntroduction to SAS
Introduction to SAS
 
External Cards and Slots
External Cards and SlotsExternal Cards and Slots
External Cards and Slots
 
Sas demo
Sas demoSas demo
Sas demo
 

Recently uploaded

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Recently uploaded (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Introduction to the SAS

  • 1. Introduction to the SAS Serial attached SCSI is a method used to access computer peripheral devices. It employs the digital data transfer over the thin cable. In business enterprise it is used to acess the mass storage devices.
  • 2. What is SCSI SCSI is the acronym of small computer system interface. It defines a logical standard to which disk devices must adhere. This standard called common command set. It is a type of parallel bus.
  • 3. Introduction to SCSI This interface is a set of standerd for physically connecting and transfer of data between peripheral devices.
  • 4. Basic component of SAS 1) Initiator. 2) Target. 3) Service delivary subsystem. 4) Expanders.
  • 5. Initiator It is a device that originate device service and task management system. It processing by the target device. It is provided as on board component in the motherboard or as a host bus adapter.
  • 6. Target A device containing logical unit and target ports that receives device service and task management request. It could be a hard disk or a disk array system.
  • 7. Service delivery subsystem It is a part of a I/O system that transmit information between initiator and target. Typecally cable connecting beteen these devices.
  • 8. Expanders It is a part of device delivary system and faciliate connection between SAS devices.
  • 9. Example of SAS There are many different types of SAS. These are SFF 8482, SFF 8484, SG_XPCIE8SAS_E_Z etc.
  • 10. SAS Protocol SAS uses point to point architecture that data between two different SCSI devices. It uses differential signaling for achieving reliable and high speed communication. It inherits it’s command set from parallel SCSI and uses full duplex communication in the fibre channel. It uses SAS 2 protocol it’s link rate is 6.2 Gb/s.
  • 11. Cables of SAS SAS support active cables, those are thin cables with active circuitry to reduce cable weight and management. Active circuitry have build in driver, repeaters and equalizing filter. It removes the ISI (inter symbol interference), it is a type of distorted signal. Driver and repeater increased the signal to noise ratio by up raising the near end cross talk (NEXT).
  • 12. Topology is a arrangement of links, nodes or computers. It may also be called as the structure of network. LAN is a type of physical topology. SAS has different types of topology. Mainly internal and external. There are lots of other also.
  • 13. Internal Topology In this topology RAID system use SAS or SATA drivers. Each drive has point to point connection with the controllers. Maximum eight drives are supported by controllers. A full height HP smart expender card support eight internal drives.
  • 14. External Topology In this type of topology the controller connecting to the external storage enclosure. Each controller port incorporate four lanes and total maximum throughput 2400 MB/s. The storage enclosure contains internal 36 port expanders.
  • 15. Multi Node Cluster SAS using this topology it is an alternative to the fibre channel local loop topology. It gives you a high availability with no point of failure.
  • 16. Dual Path Dual Domain Architecture T10 technological committee SCSI defines as interconnection of two or more SCSI devices. When any part of data pathway domains fails then data transfer has stop because there is no redundant pathway. But in this architecture creates dual path dual domain and redundant pathway for storage.
  • 17. Zoning Zoning breaks topology into different logical group for better traffic management. It gives unique ID in each expander PHY to provide secure method for managing SAS devices. All device within zone group can interact with each other.
  • 18. SAS cable SAS uses mini SAS 4X external cable plug to connect to the end devices with enclosure universal port. Connector can attached with the out of an enclosure or in port of an enclosure. Connector have icon to identify the type of enclosure. It has a reverse key allow them to accept SAS 2 cable longer than 6 m.
  • 19. Conclusion SAS technology with different signaling and active cable continue to evolve and improve. If you looking for high level redundancy then dual domain and dual path configuration helps you. It increased the data availability into the storage network. Data availability is essential for uninterrupted of business operation.