114 terms

Storage Area Networks

What is true about big data?
Data size is beyond the capability of traditional software processes.
Which term is used to describe an idle component in a RAID array that becomes a temporary replacement for a failed component disk.
Hot Spare
What application is most benefited by using RAID 3?
The primary benefit of data striping is more efficient reads/writes simultaneously across the strip.
What is the stripe size of a five disk parity RAID 5 set that has a stripe size of 64KB?
256 KB
Which is a benefit of compute virtualization?
Improves compute utilization
What best describes virtual machines (VMs)?
VMs are discrete sets of files
What accurately describes virtualization?
Abstracts physical resources into logical resources.
Which is a feature of information-centric architecture?
Storage is managed centrally and independent of servers.
Which is an example of structured data?
Which requirement refers to the ability of a storage solution to grow with the business?
An application generates 400 small random IOPS with a read/write ration of 3:1
What is the RAID-corrected IOPS on the disk for RAID5?
Which factors contribute to the overall service time of a mechanical disk?
Average seek time, rotational latency, and data transfer rate
Which statement is true about software RAID implementation?
It uses host CPU cycles to perform RAID calculations.
What is concatenation?
Grouping multiple physical drives into a logical drive
Each device in the FC environment is assigned a 64 bit unique identifier called a World Wide Name (WWN).
Which type of fabric login enables the exchange of upper layer protocol-related parameters between N_Ports?
Process Login
An EUI (Extended Unique Identifier) is a local unique identifier based on IEEE EUI-64 naming standard.
Which mechanism provides protection to uncommitted data in cache against power failure.
Which process provides data access control by restricting host access to specific LUN(s)?
LUN Masking
Which of the following are parts of an Intelligent Storage System?
Front End Ports, Cache, Back End Ports, Physical Disks
In traditional storage provisioning, which LUN expansion technique provides improved performance?
Striped metalLUN
Which protocol encapsulates FC frames onto IP packets?
Which cable type provides minimum signal attenuation over long distances?
Single-mode optical
Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
IQN (iSCSI Qualified Name)
What is an F_Port in FC SAN?
Switch port that connects an N_Port
Which mode of flushing is activated when the cache reaches 100% of its capacity?
Which of these are considered strengths of SAN?
A SAN can be used as the shared data storage in a cluster.
Multiple servers can access the same storage devices at the same time.
A SAN provides high availability at all times.
Which of these are categories of data storage?
Enterprise Storage
Consumer Storage
What are the advantages of load balancing?
High performance
High availabilty
Which process gives the appearance of more physical space than what is actually present?
Thin provisioning
Which protocol does NAS use on an Unix system?
Which controls the power supplied to the spindle motor and its speed?
Disk controller
What are the advantages of using a dual controller array?
No or limited loss performance after a controller failure ensures high availability.
All drives and cache can be used to service all workloads.
What facts are true about hot-pluggable on networks?
Hot-pluggable on networks refer to the addition or removal of a node without affecting the startup of the running network.
Once a node is hot-plugged, all the other devices on the network must be able to identify it and share the information across it.
Which connectivity protocols are used to extend an FC SAN over IP networks? (choose 2)
It is a collection of raw facts from which conclusions may be drawn.
Structured data
Unstructured data
contracts, forms, images, manuals, X-rays, audio, video, email attachments, instant messages, invoices, Web Pages, documents, rich media, PDF
It refers to data sets whose sizes are beyond the ability of commonly used software tools to capture, store, manage, and process within acceptable time limits.
Big Data
It is a facility that contains storage, compute, network, and other IT resources to provide centralized data-processing capabilities.
Data Center
Key characteristics of a Data Center.
Data Integrity Availability, Security, Manageability, Performance, Scalability, Capacity
Key management activities include
Monitoring, Reporting, Provisioning
Enables individuals and organizations to use IT resources as a service over network.
Enables self-service requesting and automates request-fulfillment process
Enables consumption-based metering
Cloud Computing
A software program that provides logic for computing operations
Commonly deployed applications in a data center.
Business applications,
Management applications,
Data protection applications,
Security applications
It is the technique of presenting an application to an end user without any installation, integration, or dependencies on the underlying computing platform.
Application Virtualization
Resource that runs applications with the help of underlying computing components.
Host (Compute)
Include CPU, memory, and input/output (I/O) devices
Hardware components
Include OS, device driver, file system, volume manager, and so on
Software components
In a virtualized environment virtualization layer works between
OS and hardware
a software that enables the OS to recognize the specific device
Device driver
Responsible for creating and controlling host level logical storage.
Logical Volume Manager
It is a technique of masking or abstracting the physical compute hardware and enabling multiple operating systems (OSs) to run concurrently on a single or clustered physical machine(s)
Compute Virtualization
It is a technology which enables detachment of the user state, the OS, and the applications from endpoint devices.
Desktop Virtualization
Flexibility of access due to enablement of thin clients,
Improved data security,
Simplified data backup and PC Maintenance
Desktop virtualization benefits
a defined format for communication between sending and receiving devices
Parallel Small computer system interface
Serial Attached SCSI
Time taken by a disk to complete an I/O request, depends on:
Seek time,
Rotational latency,
Data transfer rate
It is a process that prepares for, responds to, and recovers from a system outrage that can adversely affects business operations
Business Continuity
It is the ability of an IT infrastructure to function according to business expectations, during its specified time of operation.
Information Availability
Average time available for a system or component to perform its normal operations between failures
=total uptime/number of failures
Average time required to repair a failed component
=total downtime/number of failures
Point-in-time to which systems and data must be recovered after an outage
Amount of data loss that a business can endure
Recovery-Point Objective (RPO)
Time within which systems and applications must be recovered after an outage
Amount of downtime that a business can endure and survive
Recovery-Time Objective (RTO)
It refers to the failure of a component of a system that can terminate the availability of the entire system or IT service
Single Points of Failure
It is an additional copy of production data that is created and retained for the sole purpose of recovering lost or corrupted data
Gather the data that is to be backed up and send it to storage node
Backup client
Manages backup operations and maintains backup catalog
Backup Server
Responsible for writing data to backup device
Manages the backup device
Storage node
Application is up and running, with users accessing their data during backup
Hot or Online Backup
Requires application to be shutdown during the backup process
Cold or Offline Backup
Creates and backs up server configuration profiles, based on user-defined schedules
Server Configuration Backup
Common backup implementations in a NAS environment are:
NDMP 2-way,
It is a process of identifying and eliminating redundant data
Data Deduplication
Deduplication methods
File level
Subfile level
Deduplication implementations
Reduces infrastructure costs
Enables longer retention periods
Reduces backup window
Reduces backup bandwidth requirement
Data Deduplication Key Benefits
Creates a copy of the guest OS, its data, VM state, and configurations
Image-based Backup
A repository where fixed content is stored
Data Archive
Centralizes, automates, and accelerates data backup and recovery operations across the enterprise
EMC NetWorker
It is a process of creating an exact copy (replica) of data
Captures the state and data of a running VM at a specific point in time (PIT)
Uses a separate delta file to record all the changes to the virtual disk since the snapshot session is activated
Restores all settings configured in a guest OS to the PIT
An identical copy of an existing VM
VM Clone
Provides continuous data protection and recovery to any PIT
Uses splitting technology at server, fabric, or array to mirror to a write to a RecoverPoint appliance
Provides automatic RecoverPoint appliance failover
EMC RecoverPoint
Consumers deploy their software, including OS and application on provider's infrastructure
Infrastucture-as-a-Service (IAAS)
Consumers deploy consumer-created or acquired applications onto provider's computing platform
Consumers use provider's applications running on the cloud infrastructure
Cloud Deployment Models
Public, Private, Community, Hybrid
A systematic way of defining security requirements
Information Security Framework
Defines risk in terms of threats, assets, and vulnerabilities
Risk Triad
Potential attacks that can be carried out on an IT infrastructure
Reduces the impact of vulnerabilities
Security Controls
Restricts devices that can attach to a particular switch port
Port binding
Include device connection and switch connection control policies
Access control lists
Prevents unauthorized switch from joining a fabric
Fabric Binding
Enables multiple independent tenants to be serviced using the same set of storage resources
Provides packet filtering and monitoring of the VM-to-VM traffic
Virtual firewall
Provides identity, security, and access-control management for physical, virtual, and cloud-based environments
RSA Identity and Access Management
ensure that the availability requirements of all the components and services are constantly met
Availability Management
ensure adequate availability of resources, based on their service level requirements
Capacity Management
ensure the optimal operational efficiency of all components
Performance Management
ensure confidentiality, integrity, and availability of information
Security Management
Involves gathering information from various components or processes and generating reports
Enables multiple tenants to share the same storage resources provided by a single landlord (resource provider)
Storage Multitenancy
Suite of application for managing and monitoring storage infrastructure
Enterprise Management Platform
It is a technique of establishing a hierarchy of storage types and identifying the candidate data to relocate to the appropriate storage type to meet service level requirements at a minimal cost.
Storage Tiering
Moves entire LUN from one tier to another
Does not give effective cost and performance benefits
LUN tiering
A LUN is broken down into smaller segments and tiered at that level
Provides effective cost and performance benefits
Sub-LUN tiering
Enables creation of a large capacity secondary cache using SSDs
Enables tiering between DRAM cache and SSDs
Cache Tiering
Enhances performance during peak workload.
Non-disruptive and transparent to applications
Cache Tiering benefits
Contains storage resource management applications to manage a multi-vendor storage infrastructure
Enterprise Management Platform
Which monitoring parameter helps ensure the availability of adequate amount of resources and prevents service unavailability