Model Answer. Multiple Choice FORM. Questions Answer Key D D D D D C C C C C. Questions
|
|
- Warren Lawson
- 5 years ago
- Views:
Transcription
1 Benha University Final Exam (May 2017) Class: 4 th Year Students (CS) Subject: Elective Course (2) Faculty of Computers & Informatics Date: 28/05/2017 Time: 3 hours Examinar : Dr. Diaa Salama Instructions to students: Question One : Model Answer Multiple Choice FORM Questions Answer Key D D D D D C C C C C Questions Answer Key B B B B B A A A A A Questions A A A A A B B B B B Questions C C C C C D D D D D Questions A A A A A B B B B B 1. Check that your Exam Paper is complete. The exam paper is 7 pages long in total.
2 Question One :Answer ALL the following, by selecting the correct answer in each. Place the answer on the special Multiple Choice FORM Alphabetically. Each Point [0.5 Mark] Total [25 Marks] 1) Which is true about big data? A. Includes only unstructured data B. Includes data from a single source C. Captured efficiently using traditional software tools D. Data size is beyond the capability of traditional software to process ** 2) Which is a feature of information-centric architecture? A. Storage is internal to the servers B. Prevents sharing of storage among servers C. Consists of server, network, and storage in a single system D. Storage is managed centrally and independent of servers ** 3) Which requirement refers to the ability of a storage solution to grow with the business? A. Availability B. Manageability C. Integrity D. Scalability ** 4) Which statement is true about software RAID implementation? A. Upgrades to operating system do not require compatibility validation with RAID software B. It is expensive than hardware RAID implementation C. Supports all RAID levels D. Uses host CPU cycles to perform RAID calculations ** 5) What is write penalty in a RAID 6 configuration for small random I/Os? A. 2 B. 3 C. 4 D. 6 ** 6) An application generates 400 small random IOPS with a read/write ratio of 3:1. What is the RAID-corrected IOPS on the disk for RAID 5? A. 400 B. 500 C. 700 ** D ) Which problem is addressed by RAID technologies? A. Data corruption B. Data backup C. Data loss D. Data security Answer: C 8) Which Cloud deployment model(s) is considered suitable for most start-up organizations? A.Private Cloud only B. Hybrid Cloud only C. Public Cloud D.Both Private and Hybrid Cloud Answer: C 9) Which is an example of structured data? Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 2 of 27
3 A. Image B. PDF document C. Database ** D. Web page 10) What is the stripe size of a five disk parity RAID 5 set that has a strip size of 64 KB? A. 64 KB B. 128 KB C. 256 KB ** D. 320 KB 11) What accurately describes virtualization? A. Provides on-demand, metered services B. Abstracts physical resources into logical resources ** C. Pools logical resources to provide data integrity D. Enables decentralized management across data centers 12) Which is a benefit of compute virtualization? A. Enables compute memory swapping B. Improves compute utilization ** C. Isolates compute memory from the applications D. Isolates compute OS from the applications 13) Which is a challenge of DAS environment? A. Low performance B. Limited scalability ** C. Deployment complexity D. High initial investment 14) In traditional storage provisioning, which LUN expansion technique provides improved performance? A. Concatenated metalun B. Striped metalun ** C. Base LUN D. Component LUN 15) Which mechanism provides protection to uncommitted data in cache against power failure? A. Mirroring B. Vaulting ** C. Watermarking D. Tiering 16) Which data center management activity ensures business continuity by eliminating single points of failure? A. Availability management B. Capacity management C. Performance management D. Security management Answer: A 17) Which is a benefit provided by Hyper-threading in a virtualized server environment? A. Improved CPU utilization B. Logical CPU load balancing C. Improved memory utilization D. Improved virtual machine security Answer: A 18) Which statement about virtual machines is true? Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 3 of 27
4 A. They are not aware of the underlying storage technology used. B. They are not aware of the size of the virtual disk. C. They are aware of the underlying storage technology used. D. They are aware of the type of storage media used. Answer: A 19) Which application is most benefited by using RAID 3? A. Backup ** B. OLTP C. e-commerce D. 20) What is concatenation? A. Grouping multiple physical drives into a logical drive ** B. Dividing a physical drive into multiple logical drives C. Process of writing disk metadata on a logical drive D. Adding more capacity to a physical drive through de-fragmentation 21) Which RAID type uses parity to protect against data loss? A. RAID 3 B. RAID 0 C. RAID 1 D. Nested Answer: A 22) Which component of a compute system performs the creation and control of logical storage? A. Volume Manager B. Operating System C. DBMS D. Application Answer: A 23) A compute resource is accessing data from storage over a network at the block level. Which statement is true about the associated file system? A. It is managed by the compute resource. B. It is managed by the storage. C. It is part of the network. D. It is managed by the application. Answer: A 24) An organization runs a proprietary operating system for its custom applications. System performance has been declining at an increasing rate. They would like to leverage a Cloud solution to address their problem.which Cloud service model would be appropriate for them? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: A 25) Which process provides data access control by restricting host access to specific LUN(s)? A. LUN masking ** B. Zoning C. Trespassing D. VSAN 26) Which is a benefit of server clustering? Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 4 of 27
5 A.High CPU utilization B. High availability C. High memory utilization D. High security Answer: B 27) Which Cloud service model allows the user to run any operating system and application? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: B 28) Which Cloud service model is most appropriate for application development? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: B 29) What is an F_Port in FC SAN? A. Switch port that connects an E_Port B. Switch port that connects an N_Port ** C. Node port that connects an N_Port D. Node port that connects an E_Port 30) Which is a benefit of zoning in FC SAN? A. Isolates fabric services B. Restricts RSCN traffic ** C. Enables online volume expansion D. Provides non-disruptive data migration 31) What best describes virtual machines (VMs)? A. All VMs on a physical server must run same OS B. VM files are deleted when VM is powered off C. VMs are discrete sets of files ** D. All VMs share available resources equally 32) Which component of an intelligent storage system isolates host from the mechanical delays associated with rotating disks? A. Front-end controller B. Back-end controller C. Cache ** D. Storage network 33) Which mode of flushing is activated when the cache reaches 100% of its capacity? A. Idle B. High watermark C. Forced ** D. Low watermark 34) Which cable type provides minimum signal attenuation over long distance? A. Twisted-pair copper B. Coaxial copper C. Single-mode optical ** D. Multimode optical 35) Which type of fabric login enables the exchange of upper layer protocol-related parameters between N_Ports? A. Fabric login Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 5 of 27
6 B. Port login C. Process login ** D. ULP login 36) Which factors contribute to the overall service time of a mechanical disk? A. Disk buffer time, full stroke, and rotation latency B. Internal transfer rate, external transfer rate, and buffer time C. Full stroke, average seek time, and track-to-track seek time D. Average seek time, rotational latency, and data transfer rate ** 37) Which is a feature of scale-out NAS? A. Uses general purpose operating system for file serving B. Creates multiple file systems on each node in the cluster C. Uses external and independently-managed nodes D. Enables pooling of nodes that work as a single NAS device ** 38) Which statement best describes the capability of the FCIP protocol? (a) Enables the creation of virtual IP links over FC network (b) Enables the creation of virtual FC links over FCoE network (c) Enables the creation of virtual TCP links over IP network (d) Enables the creation of virtual FC links over IP network Answer: d 39) What best describes Recovery Point Objective (RPO)? (a) The time within which business operations must resume after an outage (b) The amount of data that an application must lose after an outage (c) The time within which systems and applications must be recovered after an outage (d) The point-in-time to which systems and data must be recovered after an outage Answer: d 40) Which formula is used to calculate "mean time between failure (MTBF)"? (a) MTBF = uptime/(uptime + downtime) (b) MTBF = total downtime/number of failures (c) MTBF = downtime/(uptime + downtime) (d) MTBF = total uptime/number of failures Answer: d 41) Which is a benefit of VSAN? A. Improves security by isolating traffic between VSANs ** B.Eliminates need for fabric login process C. Provides higher network bandwidth D. Enables VSANs to share fabric zoning service 42) What enables communication among a group of nodes regardless of their physical location in a Fibre Channel fabric? (a) Virtual SAN Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 6 of 27
7 (b) File storage virtualization (c) Block storage virtualization (d) Virtual router Answer: a 43) Which iscsi topology does the graphic represent? A. Bridged B. Native C. Combined D. Isolated Answer: Bridged 44) Which NAS implementation consolidates file-based and block-based access on a single storage platform? A. Unified ** B.Scale-out C. Gateway D. Both gateway and scale-out 45) Which type of iscsi name requires a registered domain name to generate unique iscsi identifier? A. iqn ** B. eui C. WWN D. MAC 46) Which Fibre Channel layer defines flow control and routing? (a) FC-1 (b) FC-2 (c) FC-3 (d) FC-4 Answer: b 47) Which iscsi host connectivity option offloads both iscsi and TCP/IP processing from the host CPU? A. Standard NIC with iscsi initiator software B. iscsi HBA ** C. TOE NIC D. CNA 48) Which protocol encapsulates FC frames onto IP packet? A. FCoE B. FCIP ** C. iscsi Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 7 of 27
8 D. CIFS 49) Which component of a NAS head translates file-level requests into block-storage requests? A. Front-end ports B. Optimized operating system ** C. CIFS and NFS D. Network Interface Card 50) Which is a feature of gateway NAS? A. Uses dedicated storage for each NAS head B. NAS head and storage are managed independently ** C. Creates a single file system that runs on all NAS heads D. Provides connectivity to iscsi and FC hosts Question Two : Answer ALL the following Question Each Point [2 Mark] Total [20 Marks] 1- Differentiate between different types of services models of cloud computing and different types of deplyment models. 2- There are two different Types of Hypervisor, explain 3- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 4- Explain briefly the main Components of FC SAN 5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. 6- There are Three modes of flushing to manage cache utilization, explain 7- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. 8- Differentinate between the Two common NAS file sharing protocols 9- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 10- Differentinate between difernt types of protocol stack of FC SAN, FCOE, FCIP 1-Differentiate between different types of services models of cloud computing and different types of deplyment models. A cloud service model specifies the services and the capabilities that are provided to consumers. In SP , NIST classifies cloud service offerings into the three primary models listed below: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) The different service models provide different capabilities and are suitable for different consumers and business objectives. The factors that a provider should take into consideration while adopting a particular cloud service model are covered in Building the Cloud Infrastructure module. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 8 of 27
9 Note: Many alternate cloud service models based on IaaS, PaaS, and SaaS are defined in various publications and by different industry groups. These service models are specific to certain specialized cloud services and capabilities that (they) provide. Such cloud service models are Backup as a Service (BaaS), Network as a Service (NaaS), Case as a Service (CaaS), Desktop as a Service (DaaS), Test Environment as a service (TEaaS), Disaster Recovery as a Service (DRaaS), and so on. However, these models eventually belong to one of the three primary cloud service models. A cloud deployment model provides a basis for how cloud infrastructure is built, managed, and accessed. In SP , NIST specifies the four primary cloud deployment models listed below: Public cloud Private cloud Hybrid cloud Community cloud Each cloud deployment model may be used for any of the cloud service models: IaaS, PaaS, and SaaS. The different deployment models present a number of tradeoffs in terms of control, scale, cost, and availability of resources. 2- There are two different Types of Hypervisor, explain [2 Marks] Hypervisors can be categorized into two types: bare-metal hypervisor and hosted hypervisor. A bare-metal hypervisor is directly installed on the hardware. It has direct access to the hardware resources of the compute system. Therefore, it is more efficient than a hosted hypervisor. However, this type of hypervisor may have limited device drivers built-in. Therefore, hardware certified by the hypervisor vendor is usually required to run bare-metal hypervisors. A bare-metal hypervisor is designed for enterprise data centers and cloud infrastructure. It also supports advanced capabilities such as resource management, high availability, security, and so on. In contrast to a bare-metal hypervisor, a hosted hypervisor is installed as an application on an operating system. In this approach, the hypervisor does not have direct access to the hardware and all requests must pass through the operating system running on the physical compute system. Hosted hypervisors are compatible with all the devices that are supported by the operating system on which it is installed. Using this type of hypervisor adds overhead compared to a bare-metal hypervisor, because there are many services and processes running on an operating system that are consuming compute system resources. Therefore, a hosted hypervisor is most suitable for development, testing, and training purposes. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 9 of 27
10 3- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 4- Explain briefly the main Components of FC SAN The key FC SAN components include network adapters, cables and connectors, and interconnecting devices. Each node requires one or more network adapters to provide a physical interface for communicating with other nodes. Examples of network adapters are FC host bus adapters (HBAs), and storage system front-end adapters. An FC HBA has SCSI-to-FC processing capability. It encapsulates OS (or hypervisor) storage I/Os (usually SCSI I/O) into FC frames before sending the frames to FC storage systems over an FC SAN. FC SAN predominantly uses optical fiber to provide physical connectivity between nodes. Copper cables might be used for shorter distances. A connector may attach at the end of a cable to enable swift connection and disconnection of the cable to and from a port. FC switches and directors are the interconnecting devices commonly used in an FC SAN to forward data from one physical switch port to another. Directors are high-end switches with a higher port count and better fault-tolerance capabilities than smaller switches (also known as departmental switches). Switches are available with a fixed port count or with a modular design. In a modular switch, the port count is increased by installing additional port cards into empty slots. Modular switches enable online installation of port cards. The architecture of a director is usually modular, and its port count is increased by inserting line cards or blades to the director s chassis. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 10 of 27
11 5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. IDE/ATA and Serial ATA Integrated Device Electronics (IDE)/Advanced Technology Attachment (ATA) Popular interface used to connect hard disks or CD-ROM drives Available with varity of standards and names Serial Advanced Technology Attachment (SATA) Serial version of the IDE/ATA specification that has replaced the parallel ATA Inexpensive storage interconnect, typically used for internal connectivity Provides data transfer rate up to 6 Gb/s (standard 3.0) SCSI and SAS Parallel Small computer system interface (SCSI) Popular standard for connecting host and peripheral devices Commonly used for storage connectivity in servers Higher cost than IDE/ATA, therefore not popular in PC environments Available in wide variety of related technologies and standards Support up to 16 devices on a single bus Ultra-640 version provides data transfer speed up to 640 MB/s Serial Attached SCSI (SAS) Point-to-point serial protocol replacing parallel SCSI Supports data transfer rate up to 6 Gb/s (SAS 2.0) Fibre Channel and IP Fibre Channel (FC) Widely used protocol for high speed communication to the storage device Provides a serial data transmission that operates over copper wire and/or optical fiber Latest version of the FC interface 16FC allows transmission of data up to 16 Gb/s Internet Protocol (IP) Traditionally used to transfer host-to-host traffic Provide opportunity to leverage existing IP based network for storage communication Examples: iscsi and FCIP protocols 6- There are Three modes of flushing to manage cache utilization, explain Three modes of flushing to manage cache utilization are: Idle flushing High watermark flushing Forced flushing Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 11 of 27
12 7- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. Backup vs. Replication Definition Backup involves making a copy or copies of data. Replication is the act of copying and then moving data between a company s sites. It is typically measured in Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Requirements Backup requires a tape library (usually VTL doing disk-to-disk backup) and some place to store archived tapes. Replication requires investment in another, identical, infrastructure, effectively doubling your IT costs. Purpose Backup focuses on compliance and granular recovery, such as recovering a single user s s from 5 years ago. Replication and recovery focus on business continuity quick and easy resumption of operations after a disaster or corruption. Minimizing the recovery time objective (RTO) is key. Uses Backup is typically used for everything in the enterprise, from critical production servers to desktops. Replication is often used for mission-critical applications that must always be up and running. How it Works Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point in time. Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data Protection (CDP) to enable users to access historic images. Bottom Line Relatively inexpensive way to avoid data loss. Valuable for compliance. Does not ensure continuity of operations. Focused on ensuring that business applications and processes are always available, even after a disaster. More expensive to set up and maintain. This table begs the question asked by Chris Mellor in a post on The Register 8- Differentinate between the Two common NAS file sharing protocols Two common NAS file sharing protocols are: Common Internet File System (CIFS) Network File System (NFS) CIFS Client-server application protocol An open variation of the Server Message Block (SMB) protocol Enables clients to access files that are on a server over TCP/IP Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 12 of 27
13 Stateful Protocol Maintains connection information regarding every connected client Can automatically restore connections and reopen files that were open prior to interruption NFS Client-server application protocol Enables clients to access files that are on a server Uses Remote Procedure Call (RPC) mechanism to provide access to remote file system Currently, three versions of NFS are in use: NFS v2 is stateless and uses UDP as transport layer protocol NFS v3 is stateless and uses UDP or optionally TCP as transport layer protocol NFS v4 is stateful and uses TCP as transport layer protocol 9- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 10- Differentinate between difernt types of protocol stack of FC SAN, FCOE, FCIP Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 13 of 27
14 Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 14 of 27
15 Question Three : Differentiate between the following terms using Figures Total [20 Marks] Each Point [2 Mark] 1. LVM examples 2. Different types of Storage Provisioning 3. Different types of LUN Expansion 4. Different types of ISS 5. Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache 6. Different types of FC Interconnectivity Options 7. Different types of iscsi Topologies 8. Data Center Infrastructure Before Using FCoE and Data Center Infrastructure Before Using FCoE 9. Different types of NAS Implementation 10. Local Replication Technologies 2- There are two different Types of Hypervisor, explain [2 Marks] Hypervisors can be categorized into two types: bare-metal hypervisor and hosted hypervisor. A bare-metal hypervisor is directly installed on the hardware. It has direct access to the hardware resources of the compute system. Therefore, it is more efficient than a hosted hypervisor. However, this type of hypervisor may have limited device drivers built-in. Therefore, hardware certified by the hypervisor vendor is usually required to run bare-metal hypervisors. A bare-metal hypervisor is designed for enterprise data centers and cloud infrastructure. It also supports advanced capabilities such as resource management, high availability, security, and so on. In contrast to a bare-metal hypervisor, a hosted hypervisor is installed as an application on an operating system. In this approach, the hypervisor does not have direct access to the hardware and all requests must pass through the operating system running on the physical compute system. Hosted hypervisors are compatible with all the devices that are supported by the operating system on which it is installed. Using this type of hypervisor adds overhead compared to a bare-metal hypervisor, because there are many services and processes running on an operating system that are consuming compute system resources. Therefore, a hosted hypervisor is most suitable for development, testing, and training purposes. 4-Describe the key components of intelligent storage system [2 Marks] Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 15 of 27
16 Question Two : Answer only 10 of the following Question Each Point [3 Mark] Total [30 Marks] 1- Differentiate between different types of services models of cloud computing and different types of deplyment models. 2- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 3- List different Fabric Port Types and explain the different Types of Zoning 4- Explain briefly the main Components of FC SAN 5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. 6- Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache 7- Explain briefly the main Components of FC SAN and its implementations 8- Differntionate by graph between Data Center Infrastructure Before Using FCoE and after Using FCoE 9- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. 10- Explain the differnec between difernt type of protocol stack of FC SAN, IP SAN 11- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 1-Differentiate between different types of services models of cloud computing and different types of deplyment models. A cloud service model specifies the services and the capabilities that are provided to consumers. In SP , NIST classifies cloud service offerings into the three primary models listed below: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 16 of 27
17 The different service models provide different capabilities and are suitable for different consumers and business objectives. The factors that a provider should take into consideration while adopting a particular cloud service model are covered in Building the Cloud Infrastructure module. Note: Many alternate cloud service models based on IaaS, PaaS, and SaaS are defined in various publications and by different industry groups. These service models are specific to certain specialized cloud services and capabilities that (they) provide. Such cloud service models are Backup as a Service (BaaS), Network as a Service (NaaS), Case as a Service (CaaS), Desktop as a Service (DaaS), Test Environment as a service (TEaaS), Disaster Recovery as a Service (DRaaS), and so on. However, these models eventually belong to one of the three primary cloud service models. A cloud deployment model provides a basis for how cloud infrastructure is built, managed, and accessed. In SP , NIST specifies the four primary cloud deployment models listed below: Public cloud Private cloud Hybrid cloud Community cloud Each cloud deployment model may be used for any of the cloud service models: IaaS, PaaS, and SaaS. The different deployment models present a number of tradeoffs in terms of control, scale, cost, and availability of resources. 10- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 17 of 27
18 11- List different Fabric Port Types and explain the different Types of Zoning A port in a switched fabric can be one of the following types: N_Port is an end-point in the fabric. This port is also known as the node port (or FC adapter port). Typically, it is a compute system port (on an FC HBA) or a storage system port connected to a switch in a fabric. E_Port is a switch port that forms a connection between two FC switches. This port is also known as an expansion port. The E_Port on an FC switch connects to the E_Port of another FC switch in the fabric through ISLs. F_Port is a port on a switch that connects an N_Port. It is also known as a fabric port. G_Port is a generic port on some vendors switches. It can operate as an E_Port or an F_Port and determines its functionality automatically during initialization. Zoning can be categorized into three types: WWN zoning, port zoning, and mixed zoning. WWN zoning uses WWNs to define zones. The zone members are the unique WWPN addresses of the ports in HBA and its targets (storage systems). A major advantage of WWN zoning is its flexibility. WWN zoning allows nodes to be moved to another switch port in the fabric and to maintain connectivity to their zone partners without having to modify the zone configuration. This is possible because the WWN is static to the node port. Port zoning uses the switch port identifier to define zones. In port zoning, access to data is determined by the physical switch port to which a node is connected. The zone members are the port identifier (switch domain ID and port number) to which an HBA and its targets are connected. If a node is moved to another switch port in the fabric, then zoning must be modified to allow the node, in its new port, to participate in its original zone. However, if an HBA or a storage system port fails, an administrator just has to replace the failed device without changing the zoning configuration. Mixed zoning combines the qualities of both WWN zoning and port zoning. Using mixed zoning enables a specific node port to be tied to the WWN of a node. 12- Explain briefly the main Components of FC SAN The key FC SAN components include network adapters, cables and connectors, and interconnecting devices. Each node requires one or more network adapters to provide a physical interface for communicating with other nodes. Examples of network adapters are FC host bus adapters (HBAs), and storage system front-end adapters. An FC HBA has SCSI-to-FC processing capability. It encapsulates OS (or hypervisor) storage I/Os (usually SCSI I/O) into FC frames before sending the frames to FC storage systems over an FC SAN. FC SAN predominantly uses optical fiber to provide physical connectivity between nodes. Copper cables might be used for shorter distances. A connector may attach at the end of a cable to enable swift connection and disconnection of the cable to and from a port. FC switches and directors are the interconnecting devices commonly used in an FC SAN to forward data from one physical switch port to another. Directors are high-end switches with a higher port count and better fault-tolerance capabilities than smaller switches (also known as departmental Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 18 of 27
19 switches). Switches are available with a fixed port count or with a modular design. In a modular switch, the port count is increased by installing additional port cards into empty slots. Modular switches enable online installation of port cards. The architecture of a director is usually modular, and its port count is increased by inserting line cards or blades to the director s chassis. 13- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. IDE/ATA and Serial ATA Integrated Device Electronics (IDE)/Advanced Technology Attachment (ATA) Popular interface used to connect hard disks or CD-ROM drives Available with varity of standards and names Serial Advanced Technology Attachment (SATA) Serial version of the IDE/ATA specification that has replaced the parallel ATA Inexpensive storage interconnect, typically used for internal connectivity Provides data transfer rate up to 6 Gb/s (standard 3.0) SCSI and SAS Parallel Small computer system interface (SCSI) Popular standard for connecting host and peripheral devices Commonly used for storage connectivity in servers Higher cost than IDE/ATA, therefore not popular in PC environments Available in wide variety of related technologies and standards Support up to 16 devices on a single bus Ultra-640 version provides data transfer speed up to 640 MB/s Serial Attached SCSI (SAS) Point-to-point serial protocol replacing parallel SCSI Supports data transfer rate up to 6 Gb/s (SAS 2.0) Fibre Channel and IP Fibre Channel (FC) Widely used protocol for high speed communication to the storage device Provides a serial data transmission that operates over copper wire and/or optical fiber Latest version of the FC interface 16FC allows transmission of data up to 16 Gb/s Internet Protocol (IP) Traditionally used to transfer host-to-host traffic Provide opportunity to leverage existing IP based network for storage communication Examples: iscsi and FCIP protocols Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 19 of 27
20 14- Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 20 of 27
21 7-Explain briefly the main Components of FC SAN and its implementations Components of FC SAN Node (server and storage) ports Cables Connectors Interconnecting devices such as FC switches and hubs SAN management software Components of a NAS device: -Network Interface -NFS -CIFS -Dedicated optimized OS -Storage interface Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 21 of 27
22 NAS Implementation 1- Unified NAS Consolidates NAS-based (file-level) and SAN-based (block-level) access on a single storage platform Supports both CIFS and NFS protocols for file access and iscsi and FC protocols for block level access Provides unified management for both NAS head and storage NAS Implementation 2- Gateway NAS Uses external and independently-managed storage NAS heads access SAN-attached or direct-attached storage arrays NAS heads share storage with other application servers that perform block I/O Requires separate management of NAS head and storage NAS Implementation 3- Scale-out NAS Pools multiple nodes together in a cluster that works as a single NAS device Pool is managed centrally Scales performance and/or capacity with addition of nodes to the pool non-disruptively Creates a single file system that runs on all nodes in the cluster Clients, connected to any node, can access entire file system File system grows dynamically as nodes are added Stripes data across all nodes in a pool along with mirror or parity protection 8-Differntionate by graph between Data Center Infrastructure Before Using FCoE and after Using FCoE Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 22 of 27
23 9- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 23 of 27
24 Backup vs. Replication Definition Backup involves making a copy or copies of data. Replication is the act of copying and then moving data between a company s sites. It is typically measured in Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Requirements Backup requires a tape library (usually VTL doing disk-to-disk backup) and some place to store archived tapes. Replication requires investment in another, identical, infrastructure, effectively doubling your IT costs. Purpose Backup focuses on compliance and granular recovery, such as recovering a single user s s from 5 years ago. Replication and recovery focus on business continuity quick and easy resumption of operations after a disaster or corruption. Minimizing the recovery time objective (RTO) is key. Uses Backup is typically used for everything in the enterprise, from critical production servers to desktops. Replication is often used for mission-critical applications that must always be up and running. How it Works Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point in time. Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data Protection (CDP) to enable users to access historic images. Bottom Line Relatively inexpensive way to avoid data loss. Valuable for compliance. Does not ensure continuity of operations. Focused on ensuring that business applications and processes are always available, even after a disaster. More expensive to set up and maintain. This table begs the question asked by Chris Mellor in a post on The Register 10 Explain the differnec between difernt type of protocol stack of FC SAN, IP SAN Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 24 of 27
25 12- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 25 of 27
26 Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 26 of 27
27 Good Luck Dr. Diaa Salama Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 27 of 27
Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo
Vendor: EMC Exam Code: E20-002 Exam Name: Cloud Infrastructure and Services Exam Version: Demo QUESTION NO: 1 In which Cloud deployment model would an organization see operational expenditures grow in
More informationS S SNIA Storage Networking Foundations
S10-110 Number: S10-110 Passing Score: 800 Time Limit: 120 min S10-110 SNIA Storage Networking Foundations Exam A QUESTION 1 What are two NAS file access protocols? (Choose two.) A. SMB B. iscsi C. NFS
More informationSTORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp
STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in
More informationECE Enterprise Storage Architecture. Fall 2016
ECE590-03 Enterprise Storage Architecture Fall 2016 Storage Area Network (SAN) Tyler Bletsch Duke University Adapted from the course Information Storage and Management v2 (module 5-6), published by EMC
More informationSTORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp
STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in
More informationCOSC6376 Cloud Computing Lecture 17: Storage Systems
COSC6376 Cloud Computing Lecture 17: Storage Systems Instructor: Weidong Shi (Larry), PhD Computer Science Department University of Houston Storage Area Network and Storage Virtualization Single Disk Drive
More informationStorage Area Network (SAN)
Storage Area Network (SAN) 1 Outline Shared Storage Architecture Direct Access Storage (DAS) SCSI RAID Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel and Fiber Channel Switch 2
More informationBig Data Processing Technologies. Chentao Wu Associate Professor Dept. of Computer Science and Engineering
Big Data Processing Technologies Chentao Wu Associate Professor Dept. of Computer Science and Engineering wuct@cs.sjtu.edu.cn Schedule (1) Storage system part (first eight weeks) lec1: Introduction on
More informationNutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure
Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.
More informationExam : S Title : Snia Storage Network Management/Administration. Version : Demo
Exam : S10-200 Title : Snia Storage Network Management/Administration Version : Demo 1. A SAN architect is asked to implement an infrastructure for a production and a test environment using Fibre Channel
More informationiscsi Technology: A Convergence of Networking and Storage
HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...
More informationCONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion
CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries
More informationCourse Documentation: Printable course material This material is copyrighted and is for the exclusive use of the student only
Title: CompTIA Storage+ Powered by SNIA Course Length: 5 days Monday - Friday 9AM 5PM (MTN) Course Instructional Method: Interactive Lecture Lab Exam Study Sessions Course Documentation: Printable course
More informationCompTIA Storage+ Powered by SNIA
CompTIA Storage+ Powered by SNIA http://www.snia.org/education/courses/training_tc Course Length: 4 1/2 days 9AM 5PM (Monday-Thursday) local time 9AM 2PM (Friday) local time Course Fee: $2,790 USD Register:
More informationaccess addresses/addressing advantages agents allocation analysis
INDEX A access control of multipath port fanout, LUN issues, 122 of SAN devices, 154 virtualization server reliance on, 173 DAS characteristics (table), 19 conversion to SAN fabric storage access, 105
More informationConnectivity. Module 2.2. Copyright 2006 EMC Corporation. Do not Copy - All Rights Reserved. Connectivity - 1
Connectivity Module 2.2 2006 EMC Corporation. All rights reserved. Connectivity - 1 Connectivity Upon completion of this module, you will be able to: Describe the physical components of a networked storage
More informationModule 2 Storage Network Architecture
Module 2 Storage Network Architecture 1. SCSI 2. FC Protocol Stack 3. SAN:FC SAN 4. IP Storage 5. Infiniband and Virtual Interfaces FIBRE CHANNEL SAN 1. First consider the three FC topologies pointto-point,
More informationStorage Update and Storage Best Practices for Microsoft Server Applications. Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek
Storage Update and Storage Best Practices for Microsoft Server Applications Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek Agenda Introduction Storage Technologies Storage Devices
More informationChapter 10: Mass-Storage Systems
Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space
More informationTitle: CompTIA Storage+ Powered by SNIA
1 Title: CompTIA Storage+ Powered by SNIA Course Length: 4.5 Days Course Instructional Method: Interactive Lecture Animations, Lab Exam Study Sessions Course Documentation DVD containing: o Printable and
More informationEMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ]
s@lm@n EMC Exam E05-001 Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ] EMC E05-001 : Practice Test Question No : 1 Which type of storage device does the X represent
More informationFIBRE CHANNEL OVER ETHERNET
FIBRE CHANNEL OVER ETHERNET A Review of FCoE Today Abstract Fibre Channel over Ethernet (FcoE) is a storage networking option, based on industry standards. This white paper provides an overview of FCoE,
More information3.1. Storage. Direct Attached Storage (DAS)
3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.
More informationStorage Area Networks SAN. Shane Healy
Storage Area Networks SAN Shane Healy Objective/Agenda Provide a basic overview of what Storage Area Networks (SAN) are, what the constituent components are, and how these components fit together to deliver
More informationDell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results
Dell Fluid Data solutions Powerful self-optimized enterprise storage Dell Compellent Storage Center: Designed for business results The Dell difference: Efficiency designed to drive down your total cost
More informationIntroduction to Virtualization. From NDG In partnership with VMware IT Academy
Introduction to Virtualization From NDG In partnership with VMware IT Academy www.vmware.com/go/academy Why learn virtualization? Modern computing is more efficient due to virtualization Virtualization
More informationChapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition
Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space
More informationUSING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION
WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003
More informationVblock Architecture. Andrew Smallridge DC Technology Solutions Architect
Vblock Architecture Andrew Smallridge DC Technology Solutions Architect asmallri@cisco.com Vblock Design Governance It s an architecture! Requirements: Pretested Fully Integrated Ready to Go Ready to Grow
More informationCisco I/O Accelerator Deployment Guide
Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves
More informationWhite Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018
EonStor GS Family Best Practices Guide White Paper Version: 1.1 Updated: Apr., 2018 Abstract: This guide provides recommendations of best practices for installation and configuration to meet customer performance
More informationTraditional SAN environments allow block
Chapter 8 SAN Traditional SAN environments allow block KEY CONCEPTS I/O over Fibre Channel, whereas NAS iscsi Protocol environments allow file I/O over -based networks. Organizations need the performance
More informationA Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer
A Crash Course In Wide Area Data Replication Jacob Farmer, CTO, Cambridge Computer SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals
More informationDeployment Guide: Network Convergence with Emulex OneConnect FCoE CNA and Windows Server Platform
W h i t e p a p e r Deployment Guide: Network Convergence with Emulex OneConnect FCoE CNA and Windows Server Platform How to Deploy Converged Networking with a Windows Server Platform Using Emulex OneConnect
More informationSTORAGE PROTOCOLS. Storage is a major consideration for cloud initiatives; what type of disk, which
STORAGE PROTOCOLS Storage is a major consideration for cloud initiatives; what type of disk, which vendor, and as importantly which protocol? Experts will tout one over the other based on cost, performance,
More informationVendor: Hitachi. Exam Code: HH Exam Name: Hitachi Data Systems Storage Fondations. Version: Demo
Vendor: Hitachi Exam Code: HH0-130 Exam Name: Hitachi Data Systems Storage Fondations Version: Demo QUESTION: 1 A drive within a HUS system reaches its read error threshold. What will happen to the data
More informationiscsi Unified Network Storage
iscsi Unified Network Storage Steve Rogers Adaptec, Inc. 691 S Milpitas Blvd, Milpitas, CA 95035-5473 Phone:+1-510-957-1631 E-mail: steve_rogers@adaptec.com Presented at the THIC Meeting at the Sony Auditorium,
More informationArchitecture. SAN architecture is presented in these chapters: SAN design overview on page 16. SAN fabric topologies on page 24
Architecture SAN architecture is presented in these chapters: SAN design overview on page 16 SAN fabric topologies on page 24 Fibre Channel routing on page 46 Fibre Channel over Ethernet on page 65 Architecture
More informationLossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation
. White Paper Lossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation Introduction As organizations increasingly rely on IT to help enable, and even change, their business
More informationIBM EXAM QUESTIONS & ANSWERS
IBM 000-452 EXAM QUESTIONS & ANSWERS Number: 000-452 Passing Score: 800 Time Limit: 120 min File Version: 68.8 http://www.gratisexam.com/ IBM 000-452 EXAM QUESTIONS & ANSWERS Exam Name: IBM Storwize V7000
More informationWhite Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft
White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS
More informationAs storage networking technology
Chapter 10 Storage As storage networking technology matures, larger and complex implementations are becoming more common. The heterogeneous nature of storage infrastructures has further added to the complexity
More informationTHE SUMMARY. CLUSTER SERIES - pg. 3. ULTRA SERIES - pg. 5. EXTREME SERIES - pg. 9
PRODUCT CATALOG THE SUMMARY CLUSTER SERIES - pg. 3 ULTRA SERIES - pg. 5 EXTREME SERIES - pg. 9 CLUSTER SERIES THE HIGH DENSITY STORAGE FOR ARCHIVE AND BACKUP When downtime is not an option Downtime is
More informationvsan Mixed Workloads First Published On: Last Updated On:
First Published On: 03-05-2018 Last Updated On: 03-05-2018 1 1. Mixed Workloads on HCI 1.1.Solution Overview Table of Contents 2 1. Mixed Workloads on HCI 3 1.1 Solution Overview Eliminate the Complexity
More informationVMware Virtual SAN Technology
VMware Virtual SAN Technology Today s Agenda 1 Hyper-Converged Infrastructure Architecture & Vmware Virtual SAN Overview 2 Why VMware Hyper-Converged Software? 3 VMware Virtual SAN Advantage Today s Agenda
More informationIBM Europe Announcement ZG , dated February 13, 2007
IBM Europe Announcement ZG07-0221, dated February 13, 2007 Cisco MDS 9200 for IBM System Storage switches, models 9216i and 9216A, offer enhanced performance, scalability, multiprotocol capabilities, and
More informationEMC Business Continuity for Microsoft Applications
EMC Business Continuity for Microsoft Applications Enabled by EMC Celerra, EMC MirrorView/A, EMC Celerra Replicator, VMware Site Recovery Manager, and VMware vsphere 4 Copyright 2009 EMC Corporation. All
More informationRealizing the Promise of SANs
Business without interruption. Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee Chairman Storage Network Industry
More informationHPE Synergy HPE SimpliVity 380
HPE Synergy HPE SimpliVity 0 Pascal.Moens@hpe.com, Solutions Architect Technical Partner Lead February 0 HPE Synergy Composable infrastructure at HPE CPU Memory Local Storage LAN I/O SAN I/O Power Cooling
More informationSnia S Storage Networking Management/Administration.
Snia S10-200 Storage Networking Management/Administration http://killexams.com/exam-detail/s10-200 QUESTION: 85 What are two advantages of over-subscription? (Choose two.) A. saves on ISL links B. decreases
More informationCompTIA Cloud+ Course Contents. 1.0 Cloud Concepts and Models. 1.1 Compare and contrast cloud services. * SaaS (according to NIST)
Course Contents 1.0 Cloud Concepts and Models 1.1 Compare and contrast cloud services. * SaaS (according to NIST) * IaaS (according to NIST) * CaaS (according to NIST) * PaaS (according to NIST) * XaaS
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 TRANSFORMING MICROSOFT APPLICATIONS TO THE CLOUD Louaye Rachidi Technology Consultant 2 22x Partner Of Year 19+ Gold And Silver Microsoft Competencies 2,700+ Consultants Worldwide Cooperative Support
More information70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure
70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center
More informationInformation Storage and Management
Information Storage and Management Storing, Managing, and Protecting Digital Information Edited by G. Somasundaram Alok Shrivastava EMC Education Services W WILEY Wiley Publishing, Inc. Contents Foreword
More informationS SNIA Storage Networking Management & Administration
S10 201 SNIA Storage Networking Management & Administration Version 23.3 Topic 1, Volume A QUESTION NO: 1 Which two (2) are advantages of ISL over subscription? (Choose two.) A. efficient ISL bandwidth
More informationAvailability for the Modern Data Center on FlexPod Introduction NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Availability for the Modern Data Center on FlexPod Introduction 2014 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only Abstract Veeam Availability Suite v8 leverages NetApp storage
More informationPESIT Bangalore South Campus
PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Information Science & Engineering SOLUTION MANUAL INTERNAL ASSESSMENT TEST 1 Subject & Code : Storage Area
More informationDELL EMC UNITY: HIGH AVAILABILITY
DELL EMC UNITY: HIGH AVAILABILITY A Detailed Review ABSTRACT This white paper discusses the high availability features on Dell EMC Unity purposebuilt solution. October, 2017 1 WHITE PAPER The information
More informationLEVERAGING A PERSISTENT HARDWARE ARCHITECTURE
WHITE PAPER I JUNE 2010 LEVERAGING A PERSISTENT HARDWARE ARCHITECTURE How an Open, Modular Storage Platform Gives Enterprises the Agility to Scale On Demand and Adapt to Constant Change. LEVERAGING A PERSISTENT
More informationThe storage challenges of virtualized environments
The storage challenges of virtualized environments The virtualization challenge: Ageing and Inflexible storage architectures Mixing of platforms causes management complexity Unable to meet the requirements
More informationIntroduction to iscsi
Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol
More informationStorage Area Network (SAN)
Storage Area Network (SAN) By Hardik Jani 4/16/2009 1 Subtopics Need of Storage Area Networks What is SAN SAN Protocols Storage and Data Sharing SAN Backup SAN and Data Availability SAN Management 4/16/2009
More informationGovt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Information Storage and Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents Slno Chapters
More informationExam Name: Midrange Storage Technical Support V2
Vendor: IBM Exam Code: 000-118 Exam Name: Midrange Storage Technical Support V2 Version: 12.39 QUESTION 1 A customer has an IBM System Storage DS5000 and needs to add more disk drives to the unit. There
More informationDell EMC SAN Storage with Video Management Systems
Dell EMC SAN Storage with Video Management Systems Surveillance October 2018 H14824.3 Configuration Best Practices Guide Abstract The purpose of this guide is to provide configuration instructions for
More informationCloud Certified Professional (CCP) Course Catalog
Certified Professional (CCP) Course Catalog The Certified Professional (CCP ) program from the Arcitura School is dedicated to excellence in the fields of cloud computing technology, architecture, security,
More informationvsphere Storage Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5
Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationOffloaded Data Transfers (ODX) Virtual Fibre Channel for Hyper-V. Application storage support through SMB 3.0. Storage Spaces
2 ALWAYS ON, ENTERPRISE-CLASS FEATURES ON LESS EXPENSIVE HARDWARE ALWAYS UP SERVICES IMPROVED PERFORMANCE AND MORE CHOICE THROUGH INDUSTRY INNOVATION Storage Spaces Application storage support through
More informationVTUNOTESBYSRI MODULE 1: INTRODUCTION TO INFORMATION STORAGE DATA CENTER ENVIRONMENT DATA PROTECTION - RAID INTELLIGENT STORAGE SYSTEM
MODULE 1: INTRODUCTION TO INFORMATION STORAGE DATA CENTER ENVIRONMENT DATA PROTECTION - RAID INTELLIGENT STORAGE SYSTEM 1.1 Information Storage 1.1.1 Data 1.1.2 Types of Data 1.1.3 Big Data 1.1.3.1 Data
More informationRedefine Data Protection: Next Generation Backup And Business Continuity
Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen
More informationSNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp
SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,
More informationHyper-V Innovations for the SMB. IT Pro Camp, Northwest Florida State College, Niceville, FL, October 5, 2013
Hyper-V Innovations for the SMB IT Pro Camp, Northwest Florida State College, Niceville, FL, October 5, 2013 Ben Jones Systems Engineer 7 years of experience Microsoft Certified Solutions Expert: Server
More informationSPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER. NAS Controller Should be rack mounted with a form factor of not more than 2U
SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER S.No. Features Qualifying Minimum Requirements No. of Storage 1 Units 2 Make Offered 3 Model Offered 4 Rack mount 5 Processor 6 Memory
More informationStorage Protocol Offload for Virtualized Environments Session 301-F
Storage Protocol Offload for Virtualized Environments Session 301-F Dennis Martin, President August 2016 1 Agenda About Demartek Offloads I/O Virtualization Concepts RDMA Concepts Overlay Networks and
More informationSoftware-Defined Data Infrastructure Essentials
Software-Defined Data Infrastructure Essentials Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft Greg Schulz Server StorageIO @StorageIO 1 of 13 Contents Preface Who Should Read
More informationEnhancing Oracle VM Business Continuity Using Dell Compellent Live Volume
Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume Wendy Chen, Roger Lopez, and Josh Raw Dell Product Group February 2013 This document is for informational purposes only and may
More informationEMC Backup and Recovery for Microsoft Exchange 2007
EMC Backup and Recovery for Microsoft Exchange 2007 Enabled by EMC CLARiiON CX4-120, Replication Manager, and Hyper-V on Windows Server 2008 using iscsi Reference Architecture Copyright 2009 EMC Corporation.
More informationVirtualization with Protection for SMBs Using the ReadyDATA 5200
Virtualization with Protection for SMBs Using the ReadyDATA WHITE PAPER For most small-to-medium size businesses, building a virtualization solution that provides scalability, reliability, and data protection
More informationCompTIA CV CompTIA Cloud+ Certification. Download Full Version :
CompTIA CV0-001 CompTIA Cloud+ Certification Download Full Version : http://killexams.com/pass4sure/exam-detail/cv0-001 Answer: D QUESTION: 379 An administrator adds a new virtualization host to an existing
More informationStarWind Virtual SAN Free
#1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Free Value Proposition For virtualization admins, IT geeks, bloggers, students or those who look to build and maintain virtualization infrastructure
More informationNutanix White Paper. Hyper-Converged Infrastructure for Enterprise Applications. Version 1.0 March Enterprise Applications on Nutanix
Nutanix White Paper Hyper-Converged Infrastructure for Enterprise Applications Version 1.0 March 2015 1 The Journey to Hyper-Converged Infrastructure The combination of hyper-convergence and web-scale
More informationVIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD
VIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD Truls Myklebust Director, Product Management Brocade Communications 2011 Brocade Communciations - All Rights Reserved 13 October 2011 THE ENTERPRISE IS GOING
More informationSAN Virtuosity Fibre Channel over Ethernet
SAN VIRTUOSITY Series WHITE PAPER SAN Virtuosity Fibre Channel over Ethernet Subscribe to the SAN Virtuosity Series at www.sanvirtuosity.com Table of Contents Introduction...1 VMware and the Next Generation
More informationVerron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved.
Verron Martina vspecialist 1 TRANSFORMING MISSION CRITICAL APPLICATIONS 2 Application Environments Historically Physical Infrastructure Limits Application Value Challenges Different Environments Limits
More informationSAS Technical Update Connectivity Roadmap and MultiLink SAS Initiative Jay Neer Molex Corporation Marty Czekalski Seagate Technology LLC
SAS Technical Update Connectivity Roadmap and MultiLink SAS Initiative Jay Neer Molex Corporation Marty Czekalski Seagate Technology LLC SAS Connectivity Roadmap Background Connectivity Objectives Converged
More informationEqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper
Dell EqualLogic Best Practices Series EqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper Storage Infrastructure and Solutions Engineering Dell
More informationLearn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance
Learn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance TechTarget Dennis Martin 1 Agenda About Demartek I/O Virtualization Concepts RDMA Concepts Examples Demartek
More informationIntroducing Tegile. Company Overview. Product Overview. Solutions & Use Cases. Partnering with Tegile
Tegile Systems 1 Introducing Tegile Company Overview Product Overview Solutions & Use Cases Partnering with Tegile 2 Company Overview Company Overview Te gile - [tey-jile] Tegile = technology + agile Founded
More informationHow Symantec Backup solution helps you to recover from disasters?
How Symantec Backup solution helps you to recover from disasters? Finn Henningsen Presales Specialist Technology Days 2011 1 Thank you to our sponsors Technology Days 2011 2 Agenda Why do we bother? Infrastructure
More informationHP Supporting the HP ProLiant Storage Server Product Family.
HP HP0-698 Supporting the HP ProLiant Storage Server Product Family https://killexams.com/pass4sure/exam-detail/hp0-698 QUESTION: 1 What does Volume Shadow Copy provide?. A. backup to disks B. LUN duplication
More information1 Quantum Corporation 1
1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual
More informationVirtualization And High Availability. Howard Chow Microsoft MVP
Virtualization And High Availability Howard Chow Microsoft MVP Session Objectives And Agenda Virtualization and High Availability Types of high availability enabled by virtualization Enabling a highly
More informationVirtualizing Microsoft Exchange Server 2010 with NetApp and VMware
Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware Deploying Microsoft Exchange Server 2010 in a virtualized environment that leverages VMware virtualization and NetApp unified storage
More informationPRESENTATION TITLE GOES HERE
Enterprise Storage PRESENTATION TITLE GOES HERE Leah Schoeb, Member of SNIA Technical Council SNIA EmeraldTM Training SNIA Emerald Power Efficiency Measurement Specification, for use in EPA ENERGY STAR
More informationPeerStorage Arrays Unequalled Storage Solutions
Simplifying Networked Storage PeerStorage Arrays Unequalled Storage Solutions John Joseph, VP of Marketing EqualLogic,, 9 Townsend West, Nashua NH 03063 Phone: +1-603 603-249-7772, FAX: +1-603 603-579-6910
More informationBest Practices for deploying VMware ESX 3.x and 2.5.x server with EMC Storage products. Sheetal Kochavara Systems Engineer, EMC Corporation
Best Practices for deploying VMware ESX 3.x and 2.5.x server with EMC Storage products Sheetal Kochavara Systems Engineer, EMC Corporation Agenda Overview of EMC Hardware and Software Best practices with
More informationBuilding Private Cloud Infrastructure
Building Private Cloud Infrastructure Matthias Wessendorf Consulting Systems Engineer 20.11.2014 Cloud == FOG?? 3 The Path to Data Center Transformation Application- Based Silos Zones of Virtualization
More informationEMC Integrated Infrastructure for VMware. Business Continuity
EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.
More informationNAS for Server Virtualization Dennis Chapman Senior Technical Director NetApp
NAS for Server Virtualization Dennis Chapman Senior Technical Director NetApp Agenda The Landscape has Changed New Customer Requirements The Market has Begun to Move Comparing Performance Results Storage
More informationFOUR WAYS TO LOWER THE COST OF REPLICATION
WHITE PAPER I JANUARY 2010 FOUR WAYS TO LOWER THE COST OF REPLICATION How an Ultra-Efficient, Virtualized Storage Platform Brings Disaster Recovery within Reach for Any Organization FOUR WAYS TO LOWER
More information