Pobieranie prezentacji. Proszę czekać

Pobieranie prezentacji. Proszę czekać

Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve.

Podobne prezentacje


Prezentacja na temat: "Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve."— Zapis prezentacji:

1 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 1 BOSCH IP Video Solutions Technical Training BVMS 3.0 Moduł 13: Opcje zapisu iSCSI

2 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 2 Przegląd zagadnień Technologie zapisu wykorzystywane przez firmę Bosch NVR lokalny iSCSI Fundamenty zapisu iSCSI Terminologia Anatomia Działanie Limity Opcje połączenia (DAS / NAS) DAS vs. VRM

3 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 3 Scenariusz NVR (EOL)

4 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 4 Zapis lokalny: Już od 2001! HDD Dostępny dla urządzeń: Wbudowany dysk Nośnik dodawany do urządzenia (USB/SDHC) Wolumin kontrolowany przez urządzenie

5 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 5 DAS lub NAS: Bosch jako pierwszy wykorzystuje inicjator iSCSI

6 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 6 Czym jest iSCSI? iSCSI stanowi powiązanie dwóch protokołów: Internet Protocol Small Computer System Interface Rozwijany porzez Internet Engineering Task Force (IETF).

7 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 7 Terminologia iSCSI Inicjator iSCSI: Inicjator funkcjonuje jako klient iSCSI. Wysyłani komendy SCSI po sieci IP. Wszystkie kodery/kamery firmy Bosch posiadają wbudowany inicjator iSCSI iSCSI Qualified Name (IQN): data (rok-miesiąc) przejęcia domeny na własność przez instytucję Przykład: iqn com.bosch:vrm183da LUN: Logical Unit Number określa numer używany do określenia logicznej jednostki adresowanej z wykorzystaniem protokołu SCSI iSCSI Protocol Data Unit (PDU) – PDU jest podstawową jednostką informacji w technologii iSCSI. Służą głównie do komunikacji pomiędzy inicjatorami iSCSI a targetami iSCSI.

8 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 8 Anatomia jednostki PDU w iSCSI

9 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 9 Działanie iSCSI Etap 2: Po otrzymaniu pakiet jest otwierany, odczytywane są komendy SCSI, dane oraz zapytania. Komendy SCSI są wysyłane do kontrolera iSCSI, a stąd do woluminu dyskowego. Etap 1: Koder/kamera umieszcza informacje PDU w pakiecie IP wymagające dostarczenia do docelowego LUNu.

10 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 10 Urządzenia iSCSI Macierze iSCSI współpracujące z inicjatorami Bosch: Net App Bosch DLA Infortrend ( DVA-12T)

11 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 11 Wartości graniczne dla iSCSI iSCSI: Rozmiar maksymalny LUN to 2TB 1 IP Adres do 1 LUNu

12 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 12 Opcja 1: DAS Połączenie z iSCSI Dostępne są porty: 1, 2 i Organizacja portów przyłączeniowych w VIP-X1600-XFB

13 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 13 Opcja 2: NAS Macierz iSCSI zlokalizowana w sieci, używana przez kodery/kamery obecne w tej samej sieci.

14 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 14 Opcja 3: DAS / NAS X1600 #1 połączony w trybie DAS do iSCSI Eth_Port 0 X1600 #2 połączony w trybie NAS poprzez przełącznik do Eth_Port 1 1 2

15 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 15 Połączenia łańcuchowe Sieć IP: po światłowodzie Uwaga!: Łączymy w łańcuch nie więcej niż 3 urządzenia. Połączenia portów: X1600 #1 Port 1 do X1600 #3 Port 1 X1600 #1 Port 2 do X1600 #2 Port 2 X1600 #2 Port 3 do X1600 #3 Port 2 X1600 #3 Port 3 do iSCSI 1 2 3

16 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 16 Typowy system VRM

17 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 17 iSCSI: 2TB na 1 LUN 1 IP Adres do 1 LUNu VRM: dystrybuuje bloki 1 GB DAS iSCSI kontra VRM Kiedyś Dziś

18 Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve all rights of disposal such as copying and passing on to third parties. Security Systems 18 Pytania? BOSCH IP Video Solutions Technical Training


Pobierz ppt "Security & Communications Training Academy | Date 2011 © Robert Bosch GmbH reserves all rights even in the event of industrial property rights. We reserve."

Podobne prezentacje


Reklamy Google