Model Answer. Multiple Choice FORM. Questions Answer Key D D D D D C C C C C. Questions

Size: px
Start display at page:

Download "Model Answer. Multiple Choice FORM. Questions Answer Key D D D D D C C C C C. Questions"

Transcription

1 Benha University Final Exam (May 2017) Class: 4 th Year Students (CS) Subject: Elective Course (2) Faculty of Computers & Informatics Date: 28/05/2017 Time: 3 hours Examinar : Dr. Diaa Salama Instructions to students: Question One : Model Answer Multiple Choice FORM Questions Answer Key D D D D D C C C C C Questions Answer Key B B B B B A A A A A Questions A A A A A B B B B B Questions C C C C C D D D D D Questions A A A A A B B B B B 1. Check that your Exam Paper is complete. The exam paper is 7 pages long in total.

2 Question One :Answer ALL the following, by selecting the correct answer in each. Place the answer on the special Multiple Choice FORM Alphabetically. Each Point [0.5 Mark] Total [25 Marks] 1) Which is true about big data? A. Includes only unstructured data B. Includes data from a single source C. Captured efficiently using traditional software tools D. Data size is beyond the capability of traditional software to process ** 2) Which is a feature of information-centric architecture? A. Storage is internal to the servers B. Prevents sharing of storage among servers C. Consists of server, network, and storage in a single system D. Storage is managed centrally and independent of servers ** 3) Which requirement refers to the ability of a storage solution to grow with the business? A. Availability B. Manageability C. Integrity D. Scalability ** 4) Which statement is true about software RAID implementation? A. Upgrades to operating system do not require compatibility validation with RAID software B. It is expensive than hardware RAID implementation C. Supports all RAID levels D. Uses host CPU cycles to perform RAID calculations ** 5) What is write penalty in a RAID 6 configuration for small random I/Os? A. 2 B. 3 C. 4 D. 6 ** 6) An application generates 400 small random IOPS with a read/write ratio of 3:1. What is the RAID-corrected IOPS on the disk for RAID 5? A. 400 B. 500 C. 700 ** D ) Which problem is addressed by RAID technologies? A. Data corruption B. Data backup C. Data loss D. Data security Answer: C 8) Which Cloud deployment model(s) is considered suitable for most start-up organizations? A.Private Cloud only B. Hybrid Cloud only C. Public Cloud D.Both Private and Hybrid Cloud Answer: C 9) Which is an example of structured data? Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 2 of 27

3 A. Image B. PDF document C. Database ** D. Web page 10) What is the stripe size of a five disk parity RAID 5 set that has a strip size of 64 KB? A. 64 KB B. 128 KB C. 256 KB ** D. 320 KB 11) What accurately describes virtualization? A. Provides on-demand, metered services B. Abstracts physical resources into logical resources ** C. Pools logical resources to provide data integrity D. Enables decentralized management across data centers 12) Which is a benefit of compute virtualization? A. Enables compute memory swapping B. Improves compute utilization ** C. Isolates compute memory from the applications D. Isolates compute OS from the applications 13) Which is a challenge of DAS environment? A. Low performance B. Limited scalability ** C. Deployment complexity D. High initial investment 14) In traditional storage provisioning, which LUN expansion technique provides improved performance? A. Concatenated metalun B. Striped metalun ** C. Base LUN D. Component LUN 15) Which mechanism provides protection to uncommitted data in cache against power failure? A. Mirroring B. Vaulting ** C. Watermarking D. Tiering 16) Which data center management activity ensures business continuity by eliminating single points of failure? A. Availability management B. Capacity management C. Performance management D. Security management Answer: A 17) Which is a benefit provided by Hyper-threading in a virtualized server environment? A. Improved CPU utilization B. Logical CPU load balancing C. Improved memory utilization D. Improved virtual machine security Answer: A 18) Which statement about virtual machines is true? Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 3 of 27

4 A. They are not aware of the underlying storage technology used. B. They are not aware of the size of the virtual disk. C. They are aware of the underlying storage technology used. D. They are aware of the type of storage media used. Answer: A 19) Which application is most benefited by using RAID 3? A. Backup ** B. OLTP C. e-commerce D. 20) What is concatenation? A. Grouping multiple physical drives into a logical drive ** B. Dividing a physical drive into multiple logical drives C. Process of writing disk metadata on a logical drive D. Adding more capacity to a physical drive through de-fragmentation 21) Which RAID type uses parity to protect against data loss? A. RAID 3 B. RAID 0 C. RAID 1 D. Nested Answer: A 22) Which component of a compute system performs the creation and control of logical storage? A. Volume Manager B. Operating System C. DBMS D. Application Answer: A 23) A compute resource is accessing data from storage over a network at the block level. Which statement is true about the associated file system? A. It is managed by the compute resource. B. It is managed by the storage. C. It is part of the network. D. It is managed by the application. Answer: A 24) An organization runs a proprietary operating system for its custom applications. System performance has been declining at an increasing rate. They would like to leverage a Cloud solution to address their problem.which Cloud service model would be appropriate for them? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: A 25) Which process provides data access control by restricting host access to specific LUN(s)? A. LUN masking ** B. Zoning C. Trespassing D. VSAN 26) Which is a benefit of server clustering? Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 4 of 27

5 A.High CPU utilization B. High availability C. High memory utilization D. High security Answer: B 27) Which Cloud service model allows the user to run any operating system and application? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: B 28) Which Cloud service model is most appropriate for application development? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: B 29) What is an F_Port in FC SAN? A. Switch port that connects an E_Port B. Switch port that connects an N_Port ** C. Node port that connects an N_Port D. Node port that connects an E_Port 30) Which is a benefit of zoning in FC SAN? A. Isolates fabric services B. Restricts RSCN traffic ** C. Enables online volume expansion D. Provides non-disruptive data migration 31) What best describes virtual machines (VMs)? A. All VMs on a physical server must run same OS B. VM files are deleted when VM is powered off C. VMs are discrete sets of files ** D. All VMs share available resources equally 32) Which component of an intelligent storage system isolates host from the mechanical delays associated with rotating disks? A. Front-end controller B. Back-end controller C. Cache ** D. Storage network 33) Which mode of flushing is activated when the cache reaches 100% of its capacity? A. Idle B. High watermark C. Forced ** D. Low watermark 34) Which cable type provides minimum signal attenuation over long distance? A. Twisted-pair copper B. Coaxial copper C. Single-mode optical ** D. Multimode optical 35) Which type of fabric login enables the exchange of upper layer protocol-related parameters between N_Ports? A. Fabric login Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 5 of 27

6 B. Port login C. Process login ** D. ULP login 36) Which factors contribute to the overall service time of a mechanical disk? A. Disk buffer time, full stroke, and rotation latency B. Internal transfer rate, external transfer rate, and buffer time C. Full stroke, average seek time, and track-to-track seek time D. Average seek time, rotational latency, and data transfer rate ** 37) Which is a feature of scale-out NAS? A. Uses general purpose operating system for file serving B. Creates multiple file systems on each node in the cluster C. Uses external and independently-managed nodes D. Enables pooling of nodes that work as a single NAS device ** 38) Which statement best describes the capability of the FCIP protocol? (a) Enables the creation of virtual IP links over FC network (b) Enables the creation of virtual FC links over FCoE network (c) Enables the creation of virtual TCP links over IP network (d) Enables the creation of virtual FC links over IP network Answer: d 39) What best describes Recovery Point Objective (RPO)? (a) The time within which business operations must resume after an outage (b) The amount of data that an application must lose after an outage (c) The time within which systems and applications must be recovered after an outage (d) The point-in-time to which systems and data must be recovered after an outage Answer: d 40) Which formula is used to calculate "mean time between failure (MTBF)"? (a) MTBF = uptime/(uptime + downtime) (b) MTBF = total downtime/number of failures (c) MTBF = downtime/(uptime + downtime) (d) MTBF = total uptime/number of failures Answer: d 41) Which is a benefit of VSAN? A. Improves security by isolating traffic between VSANs ** B.Eliminates need for fabric login process C. Provides higher network bandwidth D. Enables VSANs to share fabric zoning service 42) What enables communication among a group of nodes regardless of their physical location in a Fibre Channel fabric? (a) Virtual SAN Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 6 of 27

7 (b) File storage virtualization (c) Block storage virtualization (d) Virtual router Answer: a 43) Which iscsi topology does the graphic represent? A. Bridged B. Native C. Combined D. Isolated Answer: Bridged 44) Which NAS implementation consolidates file-based and block-based access on a single storage platform? A. Unified ** B.Scale-out C. Gateway D. Both gateway and scale-out 45) Which type of iscsi name requires a registered domain name to generate unique iscsi identifier? A. iqn ** B. eui C. WWN D. MAC 46) Which Fibre Channel layer defines flow control and routing? (a) FC-1 (b) FC-2 (c) FC-3 (d) FC-4 Answer: b 47) Which iscsi host connectivity option offloads both iscsi and TCP/IP processing from the host CPU? A. Standard NIC with iscsi initiator software B. iscsi HBA ** C. TOE NIC D. CNA 48) Which protocol encapsulates FC frames onto IP packet? A. FCoE B. FCIP ** C. iscsi Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 7 of 27

8 D. CIFS 49) Which component of a NAS head translates file-level requests into block-storage requests? A. Front-end ports B. Optimized operating system ** C. CIFS and NFS D. Network Interface Card 50) Which is a feature of gateway NAS? A. Uses dedicated storage for each NAS head B. NAS head and storage are managed independently ** C. Creates a single file system that runs on all NAS heads D. Provides connectivity to iscsi and FC hosts Question Two : Answer ALL the following Question Each Point [2 Mark] Total [20 Marks] 1- Differentiate between different types of services models of cloud computing and different types of deplyment models. 2- There are two different Types of Hypervisor, explain 3- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 4- Explain briefly the main Components of FC SAN 5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. 6- There are Three modes of flushing to manage cache utilization, explain 7- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. 8- Differentinate between the Two common NAS file sharing protocols 9- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 10- Differentinate between difernt types of protocol stack of FC SAN, FCOE, FCIP 1-Differentiate between different types of services models of cloud computing and different types of deplyment models. A cloud service model specifies the services and the capabilities that are provided to consumers. In SP , NIST classifies cloud service offerings into the three primary models listed below: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) The different service models provide different capabilities and are suitable for different consumers and business objectives. The factors that a provider should take into consideration while adopting a particular cloud service model are covered in Building the Cloud Infrastructure module. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 8 of 27

9 Note: Many alternate cloud service models based on IaaS, PaaS, and SaaS are defined in various publications and by different industry groups. These service models are specific to certain specialized cloud services and capabilities that (they) provide. Such cloud service models are Backup as a Service (BaaS), Network as a Service (NaaS), Case as a Service (CaaS), Desktop as a Service (DaaS), Test Environment as a service (TEaaS), Disaster Recovery as a Service (DRaaS), and so on. However, these models eventually belong to one of the three primary cloud service models. A cloud deployment model provides a basis for how cloud infrastructure is built, managed, and accessed. In SP , NIST specifies the four primary cloud deployment models listed below: Public cloud Private cloud Hybrid cloud Community cloud Each cloud deployment model may be used for any of the cloud service models: IaaS, PaaS, and SaaS. The different deployment models present a number of tradeoffs in terms of control, scale, cost, and availability of resources. 2- There are two different Types of Hypervisor, explain [2 Marks] Hypervisors can be categorized into two types: bare-metal hypervisor and hosted hypervisor. A bare-metal hypervisor is directly installed on the hardware. It has direct access to the hardware resources of the compute system. Therefore, it is more efficient than a hosted hypervisor. However, this type of hypervisor may have limited device drivers built-in. Therefore, hardware certified by the hypervisor vendor is usually required to run bare-metal hypervisors. A bare-metal hypervisor is designed for enterprise data centers and cloud infrastructure. It also supports advanced capabilities such as resource management, high availability, security, and so on. In contrast to a bare-metal hypervisor, a hosted hypervisor is installed as an application on an operating system. In this approach, the hypervisor does not have direct access to the hardware and all requests must pass through the operating system running on the physical compute system. Hosted hypervisors are compatible with all the devices that are supported by the operating system on which it is installed. Using this type of hypervisor adds overhead compared to a bare-metal hypervisor, because there are many services and processes running on an operating system that are consuming compute system resources. Therefore, a hosted hypervisor is most suitable for development, testing, and training purposes. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 9 of 27

10 3- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 4- Explain briefly the main Components of FC SAN The key FC SAN components include network adapters, cables and connectors, and interconnecting devices. Each node requires one or more network adapters to provide a physical interface for communicating with other nodes. Examples of network adapters are FC host bus adapters (HBAs), and storage system front-end adapters. An FC HBA has SCSI-to-FC processing capability. It encapsulates OS (or hypervisor) storage I/Os (usually SCSI I/O) into FC frames before sending the frames to FC storage systems over an FC SAN. FC SAN predominantly uses optical fiber to provide physical connectivity between nodes. Copper cables might be used for shorter distances. A connector may attach at the end of a cable to enable swift connection and disconnection of the cable to and from a port. FC switches and directors are the interconnecting devices commonly used in an FC SAN to forward data from one physical switch port to another. Directors are high-end switches with a higher port count and better fault-tolerance capabilities than smaller switches (also known as departmental switches). Switches are available with a fixed port count or with a modular design. In a modular switch, the port count is increased by installing additional port cards into empty slots. Modular switches enable online installation of port cards. The architecture of a director is usually modular, and its port count is increased by inserting line cards or blades to the director s chassis. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 10 of 27

11 5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. IDE/ATA and Serial ATA Integrated Device Electronics (IDE)/Advanced Technology Attachment (ATA) Popular interface used to connect hard disks or CD-ROM drives Available with varity of standards and names Serial Advanced Technology Attachment (SATA) Serial version of the IDE/ATA specification that has replaced the parallel ATA Inexpensive storage interconnect, typically used for internal connectivity Provides data transfer rate up to 6 Gb/s (standard 3.0) SCSI and SAS Parallel Small computer system interface (SCSI) Popular standard for connecting host and peripheral devices Commonly used for storage connectivity in servers Higher cost than IDE/ATA, therefore not popular in PC environments Available in wide variety of related technologies and standards Support up to 16 devices on a single bus Ultra-640 version provides data transfer speed up to 640 MB/s Serial Attached SCSI (SAS) Point-to-point serial protocol replacing parallel SCSI Supports data transfer rate up to 6 Gb/s (SAS 2.0) Fibre Channel and IP Fibre Channel (FC) Widely used protocol for high speed communication to the storage device Provides a serial data transmission that operates over copper wire and/or optical fiber Latest version of the FC interface 16FC allows transmission of data up to 16 Gb/s Internet Protocol (IP) Traditionally used to transfer host-to-host traffic Provide opportunity to leverage existing IP based network for storage communication Examples: iscsi and FCIP protocols 6- There are Three modes of flushing to manage cache utilization, explain Three modes of flushing to manage cache utilization are: Idle flushing High watermark flushing Forced flushing Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 11 of 27

12 7- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. Backup vs. Replication Definition Backup involves making a copy or copies of data. Replication is the act of copying and then moving data between a company s sites. It is typically measured in Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Requirements Backup requires a tape library (usually VTL doing disk-to-disk backup) and some place to store archived tapes. Replication requires investment in another, identical, infrastructure, effectively doubling your IT costs. Purpose Backup focuses on compliance and granular recovery, such as recovering a single user s s from 5 years ago. Replication and recovery focus on business continuity quick and easy resumption of operations after a disaster or corruption. Minimizing the recovery time objective (RTO) is key. Uses Backup is typically used for everything in the enterprise, from critical production servers to desktops. Replication is often used for mission-critical applications that must always be up and running. How it Works Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point in time. Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data Protection (CDP) to enable users to access historic images. Bottom Line Relatively inexpensive way to avoid data loss. Valuable for compliance. Does not ensure continuity of operations. Focused on ensuring that business applications and processes are always available, even after a disaster. More expensive to set up and maintain. This table begs the question asked by Chris Mellor in a post on The Register 8- Differentinate between the Two common NAS file sharing protocols Two common NAS file sharing protocols are: Common Internet File System (CIFS) Network File System (NFS) CIFS Client-server application protocol An open variation of the Server Message Block (SMB) protocol Enables clients to access files that are on a server over TCP/IP Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 12 of 27

13 Stateful Protocol Maintains connection information regarding every connected client Can automatically restore connections and reopen files that were open prior to interruption NFS Client-server application protocol Enables clients to access files that are on a server Uses Remote Procedure Call (RPC) mechanism to provide access to remote file system Currently, three versions of NFS are in use: NFS v2 is stateless and uses UDP as transport layer protocol NFS v3 is stateless and uses UDP or optionally TCP as transport layer protocol NFS v4 is stateful and uses TCP as transport layer protocol 9- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 10- Differentinate between difernt types of protocol stack of FC SAN, FCOE, FCIP Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 13 of 27

14 Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 14 of 27

15 Question Three : Differentiate between the following terms using Figures Total [20 Marks] Each Point [2 Mark] 1. LVM examples 2. Different types of Storage Provisioning 3. Different types of LUN Expansion 4. Different types of ISS 5. Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache 6. Different types of FC Interconnectivity Options 7. Different types of iscsi Topologies 8. Data Center Infrastructure Before Using FCoE and Data Center Infrastructure Before Using FCoE 9. Different types of NAS Implementation 10. Local Replication Technologies 2- There are two different Types of Hypervisor, explain [2 Marks] Hypervisors can be categorized into two types: bare-metal hypervisor and hosted hypervisor. A bare-metal hypervisor is directly installed on the hardware. It has direct access to the hardware resources of the compute system. Therefore, it is more efficient than a hosted hypervisor. However, this type of hypervisor may have limited device drivers built-in. Therefore, hardware certified by the hypervisor vendor is usually required to run bare-metal hypervisors. A bare-metal hypervisor is designed for enterprise data centers and cloud infrastructure. It also supports advanced capabilities such as resource management, high availability, security, and so on. In contrast to a bare-metal hypervisor, a hosted hypervisor is installed as an application on an operating system. In this approach, the hypervisor does not have direct access to the hardware and all requests must pass through the operating system running on the physical compute system. Hosted hypervisors are compatible with all the devices that are supported by the operating system on which it is installed. Using this type of hypervisor adds overhead compared to a bare-metal hypervisor, because there are many services and processes running on an operating system that are consuming compute system resources. Therefore, a hosted hypervisor is most suitable for development, testing, and training purposes. 4-Describe the key components of intelligent storage system [2 Marks] Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 15 of 27

16 Question Two : Answer only 10 of the following Question Each Point [3 Mark] Total [30 Marks] 1- Differentiate between different types of services models of cloud computing and different types of deplyment models. 2- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 3- List different Fabric Port Types and explain the different Types of Zoning 4- Explain briefly the main Components of FC SAN 5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. 6- Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache 7- Explain briefly the main Components of FC SAN and its implementations 8- Differntionate by graph between Data Center Infrastructure Before Using FCoE and after Using FCoE 9- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. 10- Explain the differnec between difernt type of protocol stack of FC SAN, IP SAN 11- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 1-Differentiate between different types of services models of cloud computing and different types of deplyment models. A cloud service model specifies the services and the capabilities that are provided to consumers. In SP , NIST classifies cloud service offerings into the three primary models listed below: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 16 of 27

17 The different service models provide different capabilities and are suitable for different consumers and business objectives. The factors that a provider should take into consideration while adopting a particular cloud service model are covered in Building the Cloud Infrastructure module. Note: Many alternate cloud service models based on IaaS, PaaS, and SaaS are defined in various publications and by different industry groups. These service models are specific to certain specialized cloud services and capabilities that (they) provide. Such cloud service models are Backup as a Service (BaaS), Network as a Service (NaaS), Case as a Service (CaaS), Desktop as a Service (DaaS), Test Environment as a service (TEaaS), Disaster Recovery as a Service (DRaaS), and so on. However, these models eventually belong to one of the three primary cloud service models. A cloud deployment model provides a basis for how cloud infrastructure is built, managed, and accessed. In SP , NIST specifies the four primary cloud deployment models listed below: Public cloud Private cloud Hybrid cloud Community cloud Each cloud deployment model may be used for any of the cloud service models: IaaS, PaaS, and SaaS. The different deployment models present a number of tradeoffs in terms of control, scale, cost, and availability of resources. 10- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 17 of 27

18 11- List different Fabric Port Types and explain the different Types of Zoning A port in a switched fabric can be one of the following types: N_Port is an end-point in the fabric. This port is also known as the node port (or FC adapter port). Typically, it is a compute system port (on an FC HBA) or a storage system port connected to a switch in a fabric. E_Port is a switch port that forms a connection between two FC switches. This port is also known as an expansion port. The E_Port on an FC switch connects to the E_Port of another FC switch in the fabric through ISLs. F_Port is a port on a switch that connects an N_Port. It is also known as a fabric port. G_Port is a generic port on some vendors switches. It can operate as an E_Port or an F_Port and determines its functionality automatically during initialization. Zoning can be categorized into three types: WWN zoning, port zoning, and mixed zoning. WWN zoning uses WWNs to define zones. The zone members are the unique WWPN addresses of the ports in HBA and its targets (storage systems). A major advantage of WWN zoning is its flexibility. WWN zoning allows nodes to be moved to another switch port in the fabric and to maintain connectivity to their zone partners without having to modify the zone configuration. This is possible because the WWN is static to the node port. Port zoning uses the switch port identifier to define zones. In port zoning, access to data is determined by the physical switch port to which a node is connected. The zone members are the port identifier (switch domain ID and port number) to which an HBA and its targets are connected. If a node is moved to another switch port in the fabric, then zoning must be modified to allow the node, in its new port, to participate in its original zone. However, if an HBA or a storage system port fails, an administrator just has to replace the failed device without changing the zoning configuration. Mixed zoning combines the qualities of both WWN zoning and port zoning. Using mixed zoning enables a specific node port to be tied to the WWN of a node. 12- Explain briefly the main Components of FC SAN The key FC SAN components include network adapters, cables and connectors, and interconnecting devices. Each node requires one or more network adapters to provide a physical interface for communicating with other nodes. Examples of network adapters are FC host bus adapters (HBAs), and storage system front-end adapters. An FC HBA has SCSI-to-FC processing capability. It encapsulates OS (or hypervisor) storage I/Os (usually SCSI I/O) into FC frames before sending the frames to FC storage systems over an FC SAN. FC SAN predominantly uses optical fiber to provide physical connectivity between nodes. Copper cables might be used for shorter distances. A connector may attach at the end of a cable to enable swift connection and disconnection of the cable to and from a port. FC switches and directors are the interconnecting devices commonly used in an FC SAN to forward data from one physical switch port to another. Directors are high-end switches with a higher port count and better fault-tolerance capabilities than smaller switches (also known as departmental Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 18 of 27

19 switches). Switches are available with a fixed port count or with a modular design. In a modular switch, the port count is increased by installing additional port cards into empty slots. Modular switches enable online installation of port cards. The architecture of a director is usually modular, and its port count is increased by inserting line cards or blades to the director s chassis. 13- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. IDE/ATA and Serial ATA Integrated Device Electronics (IDE)/Advanced Technology Attachment (ATA) Popular interface used to connect hard disks or CD-ROM drives Available with varity of standards and names Serial Advanced Technology Attachment (SATA) Serial version of the IDE/ATA specification that has replaced the parallel ATA Inexpensive storage interconnect, typically used for internal connectivity Provides data transfer rate up to 6 Gb/s (standard 3.0) SCSI and SAS Parallel Small computer system interface (SCSI) Popular standard for connecting host and peripheral devices Commonly used for storage connectivity in servers Higher cost than IDE/ATA, therefore not popular in PC environments Available in wide variety of related technologies and standards Support up to 16 devices on a single bus Ultra-640 version provides data transfer speed up to 640 MB/s Serial Attached SCSI (SAS) Point-to-point serial protocol replacing parallel SCSI Supports data transfer rate up to 6 Gb/s (SAS 2.0) Fibre Channel and IP Fibre Channel (FC) Widely used protocol for high speed communication to the storage device Provides a serial data transmission that operates over copper wire and/or optical fiber Latest version of the FC interface 16FC allows transmission of data up to 16 Gb/s Internet Protocol (IP) Traditionally used to transfer host-to-host traffic Provide opportunity to leverage existing IP based network for storage communication Examples: iscsi and FCIP protocols Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 19 of 27

20 14- Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 20 of 27

21 7-Explain briefly the main Components of FC SAN and its implementations Components of FC SAN Node (server and storage) ports Cables Connectors Interconnecting devices such as FC switches and hubs SAN management software Components of a NAS device: -Network Interface -NFS -CIFS -Dedicated optimized OS -Storage interface Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 21 of 27

22 NAS Implementation 1- Unified NAS Consolidates NAS-based (file-level) and SAN-based (block-level) access on a single storage platform Supports both CIFS and NFS protocols for file access and iscsi and FC protocols for block level access Provides unified management for both NAS head and storage NAS Implementation 2- Gateway NAS Uses external and independently-managed storage NAS heads access SAN-attached or direct-attached storage arrays NAS heads share storage with other application servers that perform block I/O Requires separate management of NAS head and storage NAS Implementation 3- Scale-out NAS Pools multiple nodes together in a cluster that works as a single NAS device Pool is managed centrally Scales performance and/or capacity with addition of nodes to the pool non-disruptively Creates a single file system that runs on all nodes in the cluster Clients, connected to any node, can access entire file system File system grows dynamically as nodes are added Stripes data across all nodes in a pool along with mirror or parity protection 8-Differntionate by graph between Data Center Infrastructure Before Using FCoE and after Using FCoE Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 22 of 27

23 9- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 23 of 27

24 Backup vs. Replication Definition Backup involves making a copy or copies of data. Replication is the act of copying and then moving data between a company s sites. It is typically measured in Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Requirements Backup requires a tape library (usually VTL doing disk-to-disk backup) and some place to store archived tapes. Replication requires investment in another, identical, infrastructure, effectively doubling your IT costs. Purpose Backup focuses on compliance and granular recovery, such as recovering a single user s s from 5 years ago. Replication and recovery focus on business continuity quick and easy resumption of operations after a disaster or corruption. Minimizing the recovery time objective (RTO) is key. Uses Backup is typically used for everything in the enterprise, from critical production servers to desktops. Replication is often used for mission-critical applications that must always be up and running. How it Works Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point in time. Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data Protection (CDP) to enable users to access historic images. Bottom Line Relatively inexpensive way to avoid data loss. Valuable for compliance. Does not ensure continuity of operations. Focused on ensuring that business applications and processes are always available, even after a disaster. More expensive to set up and maintain. This table begs the question asked by Chris Mellor in a post on The Register 10 Explain the differnec between difernt type of protocol stack of FC SAN, IP SAN Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 24 of 27

25 12- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 25 of 27

26 Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 26 of 27

27 Good Luck Dr. Diaa Salama Committee of Examiners and correctors: 1 st Member/ nd Member/.. Page 27 of 27

Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo

Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo Vendor: EMC Exam Code: E20-002 Exam Name: Cloud Infrastructure and Services Exam Version: Demo QUESTION NO: 1 In which Cloud deployment model would an organization see operational expenditures grow in

More information

S S SNIA Storage Networking Foundations

S S SNIA Storage Networking Foundations S10-110 Number: S10-110 Passing Score: 800 Time Limit: 120 min S10-110 SNIA Storage Networking Foundations Exam A QUESTION 1 What are two NAS file access protocols? (Choose two.) A. SMB B. iscsi C. NFS

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

ECE Enterprise Storage Architecture. Fall 2016

ECE Enterprise Storage Architecture. Fall 2016 ECE590-03 Enterprise Storage Architecture Fall 2016 Storage Area Network (SAN) Tyler Bletsch Duke University Adapted from the course Information Storage and Management v2 (module 5-6), published by EMC

More information

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp STORAGE CONSOLIDATION WITH IP STORAGE David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in

More information

COSC6376 Cloud Computing Lecture 17: Storage Systems

COSC6376 Cloud Computing Lecture 17: Storage Systems COSC6376 Cloud Computing Lecture 17: Storage Systems Instructor: Weidong Shi (Larry), PhD Computer Science Department University of Houston Storage Area Network and Storage Virtualization Single Disk Drive

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) 1 Outline Shared Storage Architecture Direct Access Storage (DAS) SCSI RAID Network Attached Storage (NAS) Storage Area Network (SAN) Fiber Channel and Fiber Channel Switch 2

More information

Big Data Processing Technologies. Chentao Wu Associate Professor Dept. of Computer Science and Engineering

Big Data Processing Technologies. Chentao Wu Associate Professor Dept. of Computer Science and Engineering Big Data Processing Technologies Chentao Wu Associate Professor Dept. of Computer Science and Engineering wuct@cs.sjtu.edu.cn Schedule (1) Storage system part (first eight weeks) lec1: Introduction on

More information

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.

More information

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo Exam : S10-200 Title : Snia Storage Network Management/Administration Version : Demo 1. A SAN architect is asked to implement an infrastructure for a production and a test environment using Fibre Channel

More information

iscsi Technology: A Convergence of Networking and Storage

iscsi Technology: A Convergence of Networking and Storage HP Industry Standard Servers April 2003 iscsi Technology: A Convergence of Networking and Storage technology brief TC030402TB Table of Contents Abstract... 2 Introduction... 2 The Changing Storage Environment...

More information

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion CONTENTS 1. Introduction 2. How To Store Data 3. How To Access Data 4. Manage Data Storage 5. Benefits Of SAN 6. Conclusion 1. Introduction: A Storage Area Network (SAN) is a dedicated network that carries

More information

Course Documentation: Printable course material This material is copyrighted and is for the exclusive use of the student only

Course Documentation: Printable course material This material is copyrighted and is for the exclusive use of the student only Title: CompTIA Storage+ Powered by SNIA Course Length: 5 days Monday - Friday 9AM 5PM (MTN) Course Instructional Method: Interactive Lecture Lab Exam Study Sessions Course Documentation: Printable course

More information

CompTIA Storage+ Powered by SNIA

CompTIA Storage+ Powered by SNIA CompTIA Storage+ Powered by SNIA http://www.snia.org/education/courses/training_tc Course Length: 4 1/2 days 9AM 5PM (Monday-Thursday) local time 9AM 2PM (Friday) local time Course Fee: $2,790 USD Register:

More information

access addresses/addressing advantages agents allocation analysis

access addresses/addressing advantages agents allocation analysis INDEX A access control of multipath port fanout, LUN issues, 122 of SAN devices, 154 virtualization server reliance on, 173 DAS characteristics (table), 19 conversion to SAN fabric storage access, 105

More information

Connectivity. Module 2.2. Copyright 2006 EMC Corporation. Do not Copy - All Rights Reserved. Connectivity - 1

Connectivity. Module 2.2. Copyright 2006 EMC Corporation. Do not Copy - All Rights Reserved. Connectivity - 1 Connectivity Module 2.2 2006 EMC Corporation. All rights reserved. Connectivity - 1 Connectivity Upon completion of this module, you will be able to: Describe the physical components of a networked storage

More information

Module 2 Storage Network Architecture

Module 2 Storage Network Architecture Module 2 Storage Network Architecture 1. SCSI 2. FC Protocol Stack 3. SAN:FC SAN 4. IP Storage 5. Infiniband and Virtual Interfaces FIBRE CHANNEL SAN 1. First consider the three FC topologies pointto-point,

More information

Storage Update and Storage Best Practices for Microsoft Server Applications. Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek

Storage Update and Storage Best Practices for Microsoft Server Applications. Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek Storage Update and Storage Best Practices for Microsoft Server Applications Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek Agenda Introduction Storage Technologies Storage Devices

More information

Chapter 10: Mass-Storage Systems

Chapter 10: Mass-Storage Systems Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

Title: CompTIA Storage+ Powered by SNIA

Title: CompTIA Storage+ Powered by SNIA 1 Title: CompTIA Storage+ Powered by SNIA Course Length: 4.5 Days Course Instructional Method: Interactive Lecture Animations, Lab Exam Study Sessions Course Documentation DVD containing: o Printable and

More information

EMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ]

EMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ] s@lm@n EMC Exam E05-001 Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ] EMC E05-001 : Practice Test Question No : 1 Which type of storage device does the X represent

More information

FIBRE CHANNEL OVER ETHERNET

FIBRE CHANNEL OVER ETHERNET FIBRE CHANNEL OVER ETHERNET A Review of FCoE Today Abstract Fibre Channel over Ethernet (FcoE) is a storage networking option, based on industry standards. This white paper provides an overview of FCoE,

More information

3.1. Storage. Direct Attached Storage (DAS)

3.1. Storage. Direct Attached Storage (DAS) 3.1. Storage Data storage and access is a primary function of a network and selection of the right storage strategy is critical. The following table describes the options for server and network storage.

More information

Storage Area Networks SAN. Shane Healy

Storage Area Networks SAN. Shane Healy Storage Area Networks SAN Shane Healy Objective/Agenda Provide a basic overview of what Storage Area Networks (SAN) are, what the constituent components are, and how these components fit together to deliver

More information

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results Dell Fluid Data solutions Powerful self-optimized enterprise storage Dell Compellent Storage Center: Designed for business results The Dell difference: Efficiency designed to drive down your total cost

More information

Introduction to Virtualization. From NDG In partnership with VMware IT Academy

Introduction to Virtualization. From NDG In partnership with VMware IT Academy Introduction to Virtualization From NDG In partnership with VMware IT Academy www.vmware.com/go/academy Why learn virtualization? Modern computing is more efficient due to virtualization Virtualization

More information

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION WHITE PAPER Maximize Storage Networks with iscsi USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION For use with Windows 2000 VERITAS Software Corporation 03/05/2003

More information

Vblock Architecture. Andrew Smallridge DC Technology Solutions Architect

Vblock Architecture. Andrew Smallridge DC Technology Solutions Architect Vblock Architecture Andrew Smallridge DC Technology Solutions Architect asmallri@cisco.com Vblock Design Governance It s an architecture! Requirements: Pretested Fully Integrated Ready to Go Ready to Grow

More information

Cisco I/O Accelerator Deployment Guide

Cisco I/O Accelerator Deployment Guide Cisco I/O Accelerator Deployment Guide Introduction This document provides design and configuration guidance for deploying the Cisco MDS 9000 Family I/O Accelerator (IOA) feature, which significantly improves

More information

White Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018

White Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018 EonStor GS Family Best Practices Guide White Paper Version: 1.1 Updated: Apr., 2018 Abstract: This guide provides recommendations of best practices for installation and configuration to meet customer performance

More information

Traditional SAN environments allow block

Traditional SAN environments allow block Chapter 8 SAN Traditional SAN environments allow block KEY CONCEPTS I/O over Fibre Channel, whereas NAS iscsi Protocol environments allow file I/O over -based networks. Organizations need the performance

More information

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer A Crash Course In Wide Area Data Replication Jacob Farmer, CTO, Cambridge Computer SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals

More information

Deployment Guide: Network Convergence with Emulex OneConnect FCoE CNA and Windows Server Platform

Deployment Guide: Network Convergence with Emulex OneConnect FCoE CNA and Windows Server Platform W h i t e p a p e r Deployment Guide: Network Convergence with Emulex OneConnect FCoE CNA and Windows Server Platform How to Deploy Converged Networking with a Windows Server Platform Using Emulex OneConnect

More information

STORAGE PROTOCOLS. Storage is a major consideration for cloud initiatives; what type of disk, which

STORAGE PROTOCOLS. Storage is a major consideration for cloud initiatives; what type of disk, which STORAGE PROTOCOLS Storage is a major consideration for cloud initiatives; what type of disk, which vendor, and as importantly which protocol? Experts will tout one over the other based on cost, performance,

More information

Vendor: Hitachi. Exam Code: HH Exam Name: Hitachi Data Systems Storage Fondations. Version: Demo

Vendor: Hitachi. Exam Code: HH Exam Name: Hitachi Data Systems Storage Fondations. Version: Demo Vendor: Hitachi Exam Code: HH0-130 Exam Name: Hitachi Data Systems Storage Fondations Version: Demo QUESTION: 1 A drive within a HUS system reaches its read error threshold. What will happen to the data

More information

iscsi Unified Network Storage

iscsi Unified Network Storage iscsi Unified Network Storage Steve Rogers Adaptec, Inc. 691 S Milpitas Blvd, Milpitas, CA 95035-5473 Phone:+1-510-957-1631 E-mail: steve_rogers@adaptec.com Presented at the THIC Meeting at the Sony Auditorium,

More information

Architecture. SAN architecture is presented in these chapters: SAN design overview on page 16. SAN fabric topologies on page 24

Architecture. SAN architecture is presented in these chapters: SAN design overview on page 16. SAN fabric topologies on page 24 Architecture SAN architecture is presented in these chapters: SAN design overview on page 16 SAN fabric topologies on page 24 Fibre Channel routing on page 46 Fibre Channel over Ethernet on page 65 Architecture

More information

Lossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation

Lossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation . White Paper Lossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation Introduction As organizations increasingly rely on IT to help enable, and even change, their business

More information

IBM EXAM QUESTIONS & ANSWERS

IBM EXAM QUESTIONS & ANSWERS IBM 000-452 EXAM QUESTIONS & ANSWERS Number: 000-452 Passing Score: 800 Time Limit: 120 min File Version: 68.8 http://www.gratisexam.com/ IBM 000-452 EXAM QUESTIONS & ANSWERS Exam Name: IBM Storwize V7000

More information

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

White Paper. A System for  Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft White Paper Mimosa Systems, Inc. November 2007 A System for Email Archiving, Recovery, and Storage Optimization Mimosa NearPoint for Microsoft Exchange Server and EqualLogic PS Series Storage Arrays CONTENTS

More information

As storage networking technology

As storage networking technology Chapter 10 Storage As storage networking technology matures, larger and complex implementations are becoming more common. The heterogeneous nature of storage infrastructures has further added to the complexity

More information

THE SUMMARY. CLUSTER SERIES - pg. 3. ULTRA SERIES - pg. 5. EXTREME SERIES - pg. 9

THE SUMMARY. CLUSTER SERIES - pg. 3. ULTRA SERIES - pg. 5. EXTREME SERIES - pg. 9 PRODUCT CATALOG THE SUMMARY CLUSTER SERIES - pg. 3 ULTRA SERIES - pg. 5 EXTREME SERIES - pg. 9 CLUSTER SERIES THE HIGH DENSITY STORAGE FOR ARCHIVE AND BACKUP When downtime is not an option Downtime is

More information

vsan Mixed Workloads First Published On: Last Updated On:

vsan Mixed Workloads First Published On: Last Updated On: First Published On: 03-05-2018 Last Updated On: 03-05-2018 1 1. Mixed Workloads on HCI 1.1.Solution Overview Table of Contents 2 1. Mixed Workloads on HCI 3 1.1 Solution Overview Eliminate the Complexity

More information

VMware Virtual SAN Technology

VMware Virtual SAN Technology VMware Virtual SAN Technology Today s Agenda 1 Hyper-Converged Infrastructure Architecture & Vmware Virtual SAN Overview 2 Why VMware Hyper-Converged Software? 3 VMware Virtual SAN Advantage Today s Agenda

More information

IBM Europe Announcement ZG , dated February 13, 2007

IBM Europe Announcement ZG , dated February 13, 2007 IBM Europe Announcement ZG07-0221, dated February 13, 2007 Cisco MDS 9200 for IBM System Storage switches, models 9216i and 9216A, offer enhanced performance, scalability, multiprotocol capabilities, and

More information

EMC Business Continuity for Microsoft Applications

EMC Business Continuity for Microsoft Applications EMC Business Continuity for Microsoft Applications Enabled by EMC Celerra, EMC MirrorView/A, EMC Celerra Replicator, VMware Site Recovery Manager, and VMware vsphere 4 Copyright 2009 EMC Corporation. All

More information

Realizing the Promise of SANs

Realizing the Promise of SANs Business without interruption. Realizing the Promise of SANs Bill North Director, Storage Network Programs Strategic Initiatives Group VERITAS Software Education Committee Chairman Storage Network Industry

More information

HPE Synergy HPE SimpliVity 380

HPE Synergy HPE SimpliVity 380 HPE Synergy HPE SimpliVity 0 Pascal.Moens@hpe.com, Solutions Architect Technical Partner Lead February 0 HPE Synergy Composable infrastructure at HPE CPU Memory Local Storage LAN I/O SAN I/O Power Cooling

More information

Snia S Storage Networking Management/Administration.

Snia S Storage Networking Management/Administration. Snia S10-200 Storage Networking Management/Administration http://killexams.com/exam-detail/s10-200 QUESTION: 85 What are two advantages of over-subscription? (Choose two.) A. saves on ISL links B. decreases

More information

CompTIA Cloud+ Course Contents. 1.0 Cloud Concepts and Models. 1.1 Compare and contrast cloud services. * SaaS (according to NIST)

CompTIA Cloud+ Course Contents. 1.0 Cloud Concepts and Models. 1.1 Compare and contrast cloud services. * SaaS (according to NIST) Course Contents 1.0 Cloud Concepts and Models 1.1 Compare and contrast cloud services. * SaaS (according to NIST) * IaaS (according to NIST) * CaaS (according to NIST) * PaaS (according to NIST) * XaaS

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 TRANSFORMING MICROSOFT APPLICATIONS TO THE CLOUD Louaye Rachidi Technology Consultant 2 22x Partner Of Year 19+ Gold And Silver Microsoft Competencies 2,700+ Consultants Worldwide Cooperative Support

More information

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure 70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure Slide 1 Creating the Virtualization Infrastructure Slide 2 Introducing Microsoft System Center

More information

Information Storage and Management

Information Storage and Management Information Storage and Management Storing, Managing, and Protecting Digital Information Edited by G. Somasundaram Alok Shrivastava EMC Education Services W WILEY Wiley Publishing, Inc. Contents Foreword

More information

S SNIA Storage Networking Management & Administration

S SNIA Storage Networking Management & Administration S10 201 SNIA Storage Networking Management & Administration Version 23.3 Topic 1, Volume A QUESTION NO: 1 Which two (2) are advantages of ISL over subscription? (Choose two.) A. efficient ISL bandwidth

More information

Availability for the Modern Data Center on FlexPod Introduction NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only

Availability for the Modern Data Center on FlexPod Introduction NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only Availability for the Modern Data Center on FlexPod Introduction 2014 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only Abstract Veeam Availability Suite v8 leverages NetApp storage

More information

PESIT Bangalore South Campus

PESIT Bangalore South Campus PESIT Bangalore South Campus Hosur road, 1km before Electronic City, Bengaluru -100 Department of Information Science & Engineering SOLUTION MANUAL INTERNAL ASSESSMENT TEST 1 Subject & Code : Storage Area

More information

DELL EMC UNITY: HIGH AVAILABILITY

DELL EMC UNITY: HIGH AVAILABILITY DELL EMC UNITY: HIGH AVAILABILITY A Detailed Review ABSTRACT This white paper discusses the high availability features on Dell EMC Unity purposebuilt solution. October, 2017 1 WHITE PAPER The information

More information

LEVERAGING A PERSISTENT HARDWARE ARCHITECTURE

LEVERAGING A PERSISTENT HARDWARE ARCHITECTURE WHITE PAPER I JUNE 2010 LEVERAGING A PERSISTENT HARDWARE ARCHITECTURE How an Open, Modular Storage Platform Gives Enterprises the Agility to Scale On Demand and Adapt to Constant Change. LEVERAGING A PERSISTENT

More information

The storage challenges of virtualized environments

The storage challenges of virtualized environments The storage challenges of virtualized environments The virtualization challenge: Ageing and Inflexible storage architectures Mixing of platforms causes management complexity Unable to meet the requirements

More information

Introduction to iscsi

Introduction to iscsi Introduction to iscsi As Ethernet begins to enter into the Storage world a new protocol has been getting a lot of attention. The Internet Small Computer Systems Interface or iscsi, is an end-to-end protocol

More information

Storage Area Network (SAN)

Storage Area Network (SAN) Storage Area Network (SAN) By Hardik Jani 4/16/2009 1 Subtopics Need of Storage Area Networks What is SAN SAN Protocols Storage and Data Sharing SAN Backup SAN and Data Availability SAN Management 4/16/2009

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64 Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Information Storage and Management Contact Hrs / week: 4 Total hrs: 64 Table of Contents Slno Chapters

More information

Exam Name: Midrange Storage Technical Support V2

Exam Name: Midrange Storage Technical Support V2 Vendor: IBM Exam Code: 000-118 Exam Name: Midrange Storage Technical Support V2 Version: 12.39 QUESTION 1 A customer has an IBM System Storage DS5000 and needs to add more disk drives to the unit. There

More information

Dell EMC SAN Storage with Video Management Systems

Dell EMC SAN Storage with Video Management Systems Dell EMC SAN Storage with Video Management Systems Surveillance October 2018 H14824.3 Configuration Best Practices Guide Abstract The purpose of this guide is to provide configuration instructions for

More information

Cloud Certified Professional (CCP) Course Catalog

Cloud Certified Professional (CCP) Course Catalog Certified Professional (CCP) Course Catalog The Certified Professional (CCP ) program from the Arcitura School is dedicated to excellence in the fields of cloud computing technology, architecture, security,

More information

vsphere Storage Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vsphere Storage Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Offloaded Data Transfers (ODX) Virtual Fibre Channel for Hyper-V. Application storage support through SMB 3.0. Storage Spaces

Offloaded Data Transfers (ODX) Virtual Fibre Channel for Hyper-V. Application storage support through SMB 3.0. Storage Spaces 2 ALWAYS ON, ENTERPRISE-CLASS FEATURES ON LESS EXPENSIVE HARDWARE ALWAYS UP SERVICES IMPROVED PERFORMANCE AND MORE CHOICE THROUGH INDUSTRY INNOVATION Storage Spaces Application storage support through

More information

VTUNOTESBYSRI MODULE 1: INTRODUCTION TO INFORMATION STORAGE DATA CENTER ENVIRONMENT DATA PROTECTION - RAID INTELLIGENT STORAGE SYSTEM

VTUNOTESBYSRI MODULE 1: INTRODUCTION TO INFORMATION STORAGE DATA CENTER ENVIRONMENT DATA PROTECTION - RAID INTELLIGENT STORAGE SYSTEM MODULE 1: INTRODUCTION TO INFORMATION STORAGE DATA CENTER ENVIRONMENT DATA PROTECTION - RAID INTELLIGENT STORAGE SYSTEM 1.1 Information Storage 1.1.1 Data 1.1.2 Types of Data 1.1.3 Big Data 1.1.3.1 Data

More information

Redefine Data Protection: Next Generation Backup And Business Continuity

Redefine Data Protection: Next Generation Backup And Business Continuity Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen

More information

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7 IP storage: A review of iscsi, FCIP, ifcp SNIA IP Storage Forum With the advent of new IP storage products and transport protocol standards iscsi, FCIP,

More information

Hyper-V Innovations for the SMB. IT Pro Camp, Northwest Florida State College, Niceville, FL, October 5, 2013

Hyper-V Innovations for the SMB. IT Pro Camp, Northwest Florida State College, Niceville, FL, October 5, 2013 Hyper-V Innovations for the SMB IT Pro Camp, Northwest Florida State College, Niceville, FL, October 5, 2013 Ben Jones Systems Engineer 7 years of experience Microsoft Certified Solutions Expert: Server

More information

SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER. NAS Controller Should be rack mounted with a form factor of not more than 2U

SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER. NAS Controller Should be rack mounted with a form factor of not more than 2U SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER S.No. Features Qualifying Minimum Requirements No. of Storage 1 Units 2 Make Offered 3 Model Offered 4 Rack mount 5 Processor 6 Memory

More information

Storage Protocol Offload for Virtualized Environments Session 301-F

Storage Protocol Offload for Virtualized Environments Session 301-F Storage Protocol Offload for Virtualized Environments Session 301-F Dennis Martin, President August 2016 1 Agenda About Demartek Offloads I/O Virtualization Concepts RDMA Concepts Overlay Networks and

More information

Software-Defined Data Infrastructure Essentials

Software-Defined Data Infrastructure Essentials Software-Defined Data Infrastructure Essentials Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft Greg Schulz Server StorageIO @StorageIO 1 of 13 Contents Preface Who Should Read

More information

Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume

Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume Wendy Chen, Roger Lopez, and Josh Raw Dell Product Group February 2013 This document is for informational purposes only and may

More information

EMC Backup and Recovery for Microsoft Exchange 2007

EMC Backup and Recovery for Microsoft Exchange 2007 EMC Backup and Recovery for Microsoft Exchange 2007 Enabled by EMC CLARiiON CX4-120, Replication Manager, and Hyper-V on Windows Server 2008 using iscsi Reference Architecture Copyright 2009 EMC Corporation.

More information

Virtualization with Protection for SMBs Using the ReadyDATA 5200

Virtualization with Protection for SMBs Using the ReadyDATA 5200 Virtualization with Protection for SMBs Using the ReadyDATA WHITE PAPER For most small-to-medium size businesses, building a virtualization solution that provides scalability, reliability, and data protection

More information

CompTIA CV CompTIA Cloud+ Certification. Download Full Version :

CompTIA CV CompTIA Cloud+ Certification. Download Full Version : CompTIA CV0-001 CompTIA Cloud+ Certification Download Full Version : http://killexams.com/pass4sure/exam-detail/cv0-001 Answer: D QUESTION: 379 An administrator adds a new virtualization host to an existing

More information

StarWind Virtual SAN Free

StarWind Virtual SAN Free #1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Free Value Proposition For virtualization admins, IT geeks, bloggers, students or those who look to build and maintain virtualization infrastructure

More information

Nutanix White Paper. Hyper-Converged Infrastructure for Enterprise Applications. Version 1.0 March Enterprise Applications on Nutanix

Nutanix White Paper. Hyper-Converged Infrastructure for Enterprise Applications. Version 1.0 March Enterprise Applications on Nutanix Nutanix White Paper Hyper-Converged Infrastructure for Enterprise Applications Version 1.0 March 2015 1 The Journey to Hyper-Converged Infrastructure The combination of hyper-convergence and web-scale

More information

VIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD

VIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD VIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD Truls Myklebust Director, Product Management Brocade Communications 2011 Brocade Communciations - All Rights Reserved 13 October 2011 THE ENTERPRISE IS GOING

More information

SAN Virtuosity Fibre Channel over Ethernet

SAN Virtuosity Fibre Channel over Ethernet SAN VIRTUOSITY Series WHITE PAPER SAN Virtuosity Fibre Channel over Ethernet Subscribe to the SAN Virtuosity Series at www.sanvirtuosity.com Table of Contents Introduction...1 VMware and the Next Generation

More information

Verron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved.

Verron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved. Verron Martina vspecialist 1 TRANSFORMING MISSION CRITICAL APPLICATIONS 2 Application Environments Historically Physical Infrastructure Limits Application Value Challenges Different Environments Limits

More information

SAS Technical Update Connectivity Roadmap and MultiLink SAS Initiative Jay Neer Molex Corporation Marty Czekalski Seagate Technology LLC

SAS Technical Update Connectivity Roadmap and MultiLink SAS Initiative Jay Neer Molex Corporation Marty Czekalski Seagate Technology LLC SAS Technical Update Connectivity Roadmap and MultiLink SAS Initiative Jay Neer Molex Corporation Marty Czekalski Seagate Technology LLC SAS Connectivity Roadmap Background Connectivity Objectives Converged

More information

EqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper

EqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper Dell EqualLogic Best Practices Series EqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper Storage Infrastructure and Solutions Engineering Dell

More information

Learn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance

Learn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance Learn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance TechTarget Dennis Martin 1 Agenda About Demartek I/O Virtualization Concepts RDMA Concepts Examples Demartek

More information

Introducing Tegile. Company Overview. Product Overview. Solutions & Use Cases. Partnering with Tegile

Introducing Tegile. Company Overview. Product Overview. Solutions & Use Cases. Partnering with Tegile Tegile Systems 1 Introducing Tegile Company Overview Product Overview Solutions & Use Cases Partnering with Tegile 2 Company Overview Company Overview Te gile - [tey-jile] Tegile = technology + agile Founded

More information

How Symantec Backup solution helps you to recover from disasters?

How Symantec Backup solution helps you to recover from disasters? How Symantec Backup solution helps you to recover from disasters? Finn Henningsen Presales Specialist Technology Days 2011 1 Thank you to our sponsors Technology Days 2011 2 Agenda Why do we bother? Infrastructure

More information

HP Supporting the HP ProLiant Storage Server Product Family.

HP Supporting the HP ProLiant Storage Server Product Family. HP HP0-698 Supporting the HP ProLiant Storage Server Product Family https://killexams.com/pass4sure/exam-detail/hp0-698 QUESTION: 1 What does Volume Shadow Copy provide?. A. backup to disks B. LUN duplication

More information

1 Quantum Corporation 1

1 Quantum Corporation 1 1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual

More information

Virtualization And High Availability. Howard Chow Microsoft MVP

Virtualization And High Availability. Howard Chow Microsoft MVP Virtualization And High Availability Howard Chow Microsoft MVP Session Objectives And Agenda Virtualization and High Availability Types of high availability enabled by virtualization Enabling a highly

More information

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware Deploying Microsoft Exchange Server 2010 in a virtualized environment that leverages VMware virtualization and NetApp unified storage

More information

PRESENTATION TITLE GOES HERE

PRESENTATION TITLE GOES HERE Enterprise Storage PRESENTATION TITLE GOES HERE Leah Schoeb, Member of SNIA Technical Council SNIA EmeraldTM Training SNIA Emerald Power Efficiency Measurement Specification, for use in EPA ENERGY STAR

More information

PeerStorage Arrays Unequalled Storage Solutions

PeerStorage Arrays Unequalled Storage Solutions Simplifying Networked Storage PeerStorage Arrays Unequalled Storage Solutions John Joseph, VP of Marketing EqualLogic,, 9 Townsend West, Nashua NH 03063 Phone: +1-603 603-249-7772, FAX: +1-603 603-579-6910

More information

Best Practices for deploying VMware ESX 3.x and 2.5.x server with EMC Storage products. Sheetal Kochavara Systems Engineer, EMC Corporation

Best Practices for deploying VMware ESX 3.x and 2.5.x server with EMC Storage products. Sheetal Kochavara Systems Engineer, EMC Corporation Best Practices for deploying VMware ESX 3.x and 2.5.x server with EMC Storage products Sheetal Kochavara Systems Engineer, EMC Corporation Agenda Overview of EMC Hardware and Software Best practices with

More information

Building Private Cloud Infrastructure

Building Private Cloud Infrastructure Building Private Cloud Infrastructure Matthias Wessendorf Consulting Systems Engineer 20.11.2014 Cloud == FOG?? 3 The Path to Data Center Transformation Application- Based Silos Zones of Virtualization

More information

EMC Integrated Infrastructure for VMware. Business Continuity

EMC Integrated Infrastructure for VMware. Business Continuity EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.

More information

NAS for Server Virtualization Dennis Chapman Senior Technical Director NetApp

NAS for Server Virtualization Dennis Chapman Senior Technical Director NetApp NAS for Server Virtualization Dennis Chapman Senior Technical Director NetApp Agenda The Landscape has Changed New Customer Requirements The Market has Begun to Move Comparing Performance Results Storage

More information

FOUR WAYS TO LOWER THE COST OF REPLICATION

FOUR WAYS TO LOWER THE COST OF REPLICATION WHITE PAPER I JANUARY 2010 FOUR WAYS TO LOWER THE COST OF REPLICATION How an Ultra-Efficient, Virtualized Storage Platform Brings Disaster Recovery within Reach for Any Organization FOUR WAYS TO LOWER

More information