Model Answer. Multiple Choice FORM. Questions Answer Key D D D D D C C C C C. Questions

Similar documents
Vendor: EMC. Exam Code: E Exam Name: Cloud Infrastructure and Services Exam. Version: Demo

S S SNIA Storage Networking Foundations

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

ECE Enterprise Storage Architecture. Fall 2016

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

COSC6376 Cloud Computing Lecture 17: Storage Systems

Storage Area Network (SAN)

Big Data Processing Technologies. Chentao Wu Associate Professor Dept. of Computer Science and Engineering

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo

iscsi Technology: A Convergence of Networking and Storage

CONTENTS. 1. Introduction. 2. How To Store Data. 3. How To Access Data. 4. Manage Data Storage. 5. Benefits Of SAN. 6. Conclusion

Course Documentation: Printable course material This material is copyrighted and is for the exclusive use of the student only

CompTIA Storage+ Powered by SNIA

access addresses/addressing advantages agents allocation analysis

Connectivity. Module 2.2. Copyright 2006 EMC Corporation. Do not Copy - All Rights Reserved. Connectivity - 1

Module 2 Storage Network Architecture

Storage Update and Storage Best Practices for Microsoft Server Applications. Dennis Martin President, Demartek January 2009 Copyright 2009 Demartek

Chapter 10: Mass-Storage Systems

Title: CompTIA Storage+ Powered by SNIA

EMC Exam E Information Storage and Management Version 3 Exam Version: 6.0 [ Total Questions: 171 ]

FIBRE CHANNEL OVER ETHERNET

3.1. Storage. Direct Attached Storage (DAS)

Storage Area Networks SAN. Shane Healy

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results

Introduction to Virtualization. From NDG In partnership with VMware IT Academy

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition

USING ISCSI AND VERITAS BACKUP EXEC 9.0 FOR WINDOWS SERVERS BENEFITS AND TEST CONFIGURATION

Vblock Architecture. Andrew Smallridge DC Technology Solutions Architect

Cisco I/O Accelerator Deployment Guide

White Paper. EonStor GS Family Best Practices Guide. Version: 1.1 Updated: Apr., 2018

Traditional SAN environments allow block

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

Deployment Guide: Network Convergence with Emulex OneConnect FCoE CNA and Windows Server Platform

STORAGE PROTOCOLS. Storage is a major consideration for cloud initiatives; what type of disk, which

Vendor: Hitachi. Exam Code: HH Exam Name: Hitachi Data Systems Storage Fondations. Version: Demo

iscsi Unified Network Storage

Architecture. SAN architecture is presented in these chapters: SAN design overview on page 16. SAN fabric topologies on page 24

Lossless 10 Gigabit Ethernet: The Unifying Infrastructure for SAN and LAN Consolidation

IBM EXAM QUESTIONS & ANSWERS

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

As storage networking technology

THE SUMMARY. CLUSTER SERIES - pg. 3. ULTRA SERIES - pg. 5. EXTREME SERIES - pg. 9

vsan Mixed Workloads First Published On: Last Updated On:

VMware Virtual SAN Technology

IBM Europe Announcement ZG , dated February 13, 2007

EMC Business Continuity for Microsoft Applications

Realizing the Promise of SANs

HPE Synergy HPE SimpliVity 380

Snia S Storage Networking Management/Administration.

CompTIA Cloud+ Course Contents. 1.0 Cloud Concepts and Models. 1.1 Compare and contrast cloud services. * SaaS (according to NIST)

Copyright 2012 EMC Corporation. All rights reserved.

70-414: Implementing an Advanced Server Infrastructure Course 01 - Creating the Virtualization Infrastructure

Information Storage and Management

S SNIA Storage Networking Management & Administration

Availability for the Modern Data Center on FlexPod Introduction NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only

PESIT Bangalore South Campus

DELL EMC UNITY: HIGH AVAILABILITY

LEVERAGING A PERSISTENT HARDWARE ARCHITECTURE

The storage challenges of virtualized environments

Introduction to iscsi

Storage Area Network (SAN)

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Exam Name: Midrange Storage Technical Support V2

Dell EMC SAN Storage with Video Management Systems

Cloud Certified Professional (CCP) Course Catalog

vsphere Storage Update 1 Modified 16 JAN 2018 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

Offloaded Data Transfers (ODX) Virtual Fibre Channel for Hyper-V. Application storage support through SMB 3.0. Storage Spaces

VTUNOTESBYSRI MODULE 1: INTRODUCTION TO INFORMATION STORAGE DATA CENTER ENVIRONMENT DATA PROTECTION - RAID INTELLIGENT STORAGE SYSTEM

Redefine Data Protection: Next Generation Backup And Business Continuity

SNIA Discussion on iscsi, FCIP, and IFCP Page 1 of 7. IP storage: A review of iscsi, FCIP, ifcp

Hyper-V Innovations for the SMB. IT Pro Camp, Northwest Florida State College, Niceville, FL, October 5, 2013

SPECIFICATION FOR NETWORK ATTACHED STORAGE (NAS) TO BE FILLED BY BIDDER. NAS Controller Should be rack mounted with a form factor of not more than 2U

Storage Protocol Offload for Virtualized Environments Session 301-F

Software-Defined Data Infrastructure Essentials

Enhancing Oracle VM Business Continuity Using Dell Compellent Live Volume

EMC Backup and Recovery for Microsoft Exchange 2007

Virtualization with Protection for SMBs Using the ReadyDATA 5200

CompTIA CV CompTIA Cloud+ Certification. Download Full Version :

StarWind Virtual SAN Free

Nutanix White Paper. Hyper-Converged Infrastructure for Enterprise Applications. Version 1.0 March Enterprise Applications on Nutanix

VIRTUALIZING SERVER CONNECTIVITY IN THE CLOUD

SAN Virtuosity Fibre Channel over Ethernet

Verron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved.

SAS Technical Update Connectivity Roadmap and MultiLink SAS Initiative Jay Neer Molex Corporation Marty Czekalski Seagate Technology LLC

EqualLogic iscsi SAN Concepts for the Experienced Fibre Channel Storage Professional A Dell Technical Whitepaper

Learn Your Alphabet - SRIOV, NPIV, RoCE, iwarp to Pump Up Virtual Infrastructure Performance

Introducing Tegile. Company Overview. Product Overview. Solutions & Use Cases. Partnering with Tegile

How Symantec Backup solution helps you to recover from disasters?

HP Supporting the HP ProLiant Storage Server Product Family.

1 Quantum Corporation 1

Virtualization And High Availability. Howard Chow Microsoft MVP

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware

PRESENTATION TITLE GOES HERE

PeerStorage Arrays Unequalled Storage Solutions

Best Practices for deploying VMware ESX 3.x and 2.5.x server with EMC Storage products. Sheetal Kochavara Systems Engineer, EMC Corporation

Building Private Cloud Infrastructure

EMC Integrated Infrastructure for VMware. Business Continuity

NAS for Server Virtualization Dennis Chapman Senior Technical Director NetApp

FOUR WAYS TO LOWER THE COST OF REPLICATION

Transcription:

Benha University Final Exam (May 2017) Class: 4 th Year Students (CS) Subject: Elective Course (2) Faculty of Computers & Informatics Date: 28/05/2017 Time: 3 hours Examinar : Dr. Diaa Salama Instructions to students: Question One : Model Answer Multiple Choice FORM Questions 1 2 3 4 5 6 7 8 9 10 Answer Key D D D D D C C C C C Questions 11 12 13 14 15 16 17 18 19 20 Answer Key B B B B B A A A A A Questions 21 22 23 24 25 26 27 28 29 30 A A A A A B B B B B Questions 31 32 33 34 35 36 37 38 39 40 C C C C C D D D D D Questions 41 42 43 44 45 46 47 48 49 50 A A A A A B B B B B 1. Check that your Exam Paper is complete. The exam paper is 7 pages long in total.

Question One :Answer ALL the following, by selecting the correct answer in each. Place the answer on the special Multiple Choice FORM Alphabetically. Each Point [0.5 Mark] Total [25 Marks] 1) Which is true about big data? A. Includes only unstructured data B. Includes data from a single source C. Captured efficiently using traditional software tools D. Data size is beyond the capability of traditional software to process ** 2) Which is a feature of information-centric architecture? A. Storage is internal to the servers B. Prevents sharing of storage among servers C. Consists of server, network, and storage in a single system D. Storage is managed centrally and independent of servers ** 3) Which requirement refers to the ability of a storage solution to grow with the business? A. Availability B. Manageability C. Integrity D. Scalability ** 4) Which statement is true about software RAID implementation? A. Upgrades to operating system do not require compatibility validation with RAID software B. It is expensive than hardware RAID implementation C. Supports all RAID levels D. Uses host CPU cycles to perform RAID calculations ** 5) What is write penalty in a RAID 6 configuration for small random I/Os? A. 2 B. 3 C. 4 D. 6 ** 6) An application generates 400 small random IOPS with a read/write ratio of 3:1. What is the RAID-corrected IOPS on the disk for RAID 5? A. 400 B. 500 C. 700 ** D. 900 7) Which problem is addressed by RAID technologies? A. Data corruption B. Data backup C. Data loss D. Data security Answer: C 8) Which Cloud deployment model(s) is considered suitable for most start-up organizations? A.Private Cloud only B. Hybrid Cloud only C. Public Cloud D.Both Private and Hybrid Cloud Answer: C 9) Which is an example of structured data? Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 2 of 27

A. Image B. PDF document C. Database ** D. Web page 10) What is the stripe size of a five disk parity RAID 5 set that has a strip size of 64 KB? A. 64 KB B. 128 KB C. 256 KB ** D. 320 KB 11) What accurately describes virtualization? A. Provides on-demand, metered services B. Abstracts physical resources into logical resources ** C. Pools logical resources to provide data integrity D. Enables decentralized management across data centers 12) Which is a benefit of compute virtualization? A. Enables compute memory swapping B. Improves compute utilization ** C. Isolates compute memory from the applications D. Isolates compute OS from the applications 13) Which is a challenge of DAS environment? A. Low performance B. Limited scalability ** C. Deployment complexity D. High initial investment 14) In traditional storage provisioning, which LUN expansion technique provides improved performance? A. Concatenated metalun B. Striped metalun ** C. Base LUN D. Component LUN 15) Which mechanism provides protection to uncommitted data in cache against power failure? A. Mirroring B. Vaulting ** C. Watermarking D. Tiering 16) Which data center management activity ensures business continuity by eliminating single points of failure? A. Availability management B. Capacity management C. Performance management D. Security management Answer: A 17) Which is a benefit provided by Hyper-threading in a virtualized server environment? A. Improved CPU utilization B. Logical CPU load balancing C. Improved memory utilization D. Improved virtual machine security Answer: A 18) Which statement about virtual machines is true? Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 3 of 27

A. They are not aware of the underlying storage technology used. B. They are not aware of the size of the virtual disk. C. They are aware of the underlying storage technology used. D. They are aware of the type of storage media used. Answer: A 19) Which application is most benefited by using RAID 3? A. Backup ** B. OLTP C. e-commerce D. email 20) What is concatenation? A. Grouping multiple physical drives into a logical drive ** B. Dividing a physical drive into multiple logical drives C. Process of writing disk metadata on a logical drive D. Adding more capacity to a physical drive through de-fragmentation 21) Which RAID type uses parity to protect against data loss? A. RAID 3 B. RAID 0 C. RAID 1 D. Nested Answer: A 22) Which component of a compute system performs the creation and control of logical storage? A. Volume Manager B. Operating System C. DBMS D. Application Answer: A 23) A compute resource is accessing data from storage over a network at the block level. Which statement is true about the associated file system? A. It is managed by the compute resource. B. It is managed by the storage. C. It is part of the network. D. It is managed by the application. Answer: A 24) An organization runs a proprietary operating system for its custom applications. System performance has been declining at an increasing rate. They would like to leverage a Cloud solution to address their problem.which Cloud service model would be appropriate for them? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: A 25) Which process provides data access control by restricting host access to specific LUN(s)? A. LUN masking ** B. Zoning C. Trespassing D. VSAN 26) Which is a benefit of server clustering? Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 4 of 27

A.High CPU utilization B. High availability C. High memory utilization D. High security Answer: B 27) Which Cloud service model allows the user to run any operating system and application? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: B 28) Which Cloud service model is most appropriate for application development? A.Platform-as-a-Service B.Infrastructure-as-a-Service C.Software-as-a-Service D.IT-as-a- Service Answer: B 29) What is an F_Port in FC SAN? A. Switch port that connects an E_Port B. Switch port that connects an N_Port ** C. Node port that connects an N_Port D. Node port that connects an E_Port 30) Which is a benefit of zoning in FC SAN? A. Isolates fabric services B. Restricts RSCN traffic ** C. Enables online volume expansion D. Provides non-disruptive data migration 31) What best describes virtual machines (VMs)? A. All VMs on a physical server must run same OS B. VM files are deleted when VM is powered off C. VMs are discrete sets of files ** D. All VMs share available resources equally 32) Which component of an intelligent storage system isolates host from the mechanical delays associated with rotating disks? A. Front-end controller B. Back-end controller C. Cache ** D. Storage network 33) Which mode of flushing is activated when the cache reaches 100% of its capacity? A. Idle B. High watermark C. Forced ** D. Low watermark 34) Which cable type provides minimum signal attenuation over long distance? A. Twisted-pair copper B. Coaxial copper C. Single-mode optical ** D. Multimode optical 35) Which type of fabric login enables the exchange of upper layer protocol-related parameters between N_Ports? A. Fabric login Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 5 of 27

B. Port login C. Process login ** D. ULP login 36) Which factors contribute to the overall service time of a mechanical disk? A. Disk buffer time, full stroke, and rotation latency B. Internal transfer rate, external transfer rate, and buffer time C. Full stroke, average seek time, and track-to-track seek time D. Average seek time, rotational latency, and data transfer rate ** 37) Which is a feature of scale-out NAS? A. Uses general purpose operating system for file serving B. Creates multiple file systems on each node in the cluster C. Uses external and independently-managed nodes D. Enables pooling of nodes that work as a single NAS device ** 38) Which statement best describes the capability of the FCIP protocol? (a) Enables the creation of virtual IP links over FC network (b) Enables the creation of virtual FC links over FCoE network (c) Enables the creation of virtual TCP links over IP network (d) Enables the creation of virtual FC links over IP network Answer: d 39) What best describes Recovery Point Objective (RPO)? (a) The time within which business operations must resume after an outage (b) The amount of data that an application must lose after an outage (c) The time within which systems and applications must be recovered after an outage (d) The point-in-time to which systems and data must be recovered after an outage Answer: d 40) Which formula is used to calculate "mean time between failure (MTBF)"? (a) MTBF = uptime/(uptime + downtime) (b) MTBF = total downtime/number of failures (c) MTBF = downtime/(uptime + downtime) (d) MTBF = total uptime/number of failures Answer: d 41) Which is a benefit of VSAN? A. Improves security by isolating traffic between VSANs ** B.Eliminates need for fabric login process C. Provides higher network bandwidth D. Enables VSANs to share fabric zoning service 42) What enables communication among a group of nodes regardless of their physical location in a Fibre Channel fabric? (a) Virtual SAN Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 6 of 27

(b) File storage virtualization (c) Block storage virtualization (d) Virtual router Answer: a 43) Which iscsi topology does the graphic represent? A. Bridged B. Native C. Combined D. Isolated Answer: Bridged 44) Which NAS implementation consolidates file-based and block-based access on a single storage platform? A. Unified ** B.Scale-out C. Gateway D. Both gateway and scale-out 45) Which type of iscsi name requires a registered domain name to generate unique iscsi identifier? A. iqn ** B. eui C. WWN D. MAC 46) Which Fibre Channel layer defines flow control and routing? (a) FC-1 (b) FC-2 (c) FC-3 (d) FC-4 Answer: b 47) Which iscsi host connectivity option offloads both iscsi and TCP/IP processing from the host CPU? A. Standard NIC with iscsi initiator software B. iscsi HBA ** C. TOE NIC D. CNA 48) Which protocol encapsulates FC frames onto IP packet? A. FCoE B. FCIP ** C. iscsi Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 7 of 27

D. CIFS 49) Which component of a NAS head translates file-level requests into block-storage requests? A. Front-end ports B. Optimized operating system ** C. CIFS and NFS D. Network Interface Card 50) Which is a feature of gateway NAS? A. Uses dedicated storage for each NAS head B. NAS head and storage are managed independently ** C. Creates a single file system that runs on all NAS heads D. Provides connectivity to iscsi and FC hosts Question Two : Answer ALL the following Question Each Point [2 Mark] Total [20 Marks] 1- Differentiate between different types of services models of cloud computing and different types of deplyment models. 2- There are two different Types of Hypervisor, explain 3- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 4- Explain briefly the main Components of FC SAN 5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. 6- There are Three modes of flushing to manage cache utilization, explain 7- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. 8- Differentinate between the Two common NAS file sharing protocols 9- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 10- Differentinate between difernt types of protocol stack of FC SAN, FCOE, FCIP 1-Differentiate between different types of services models of cloud computing and different types of deplyment models. A cloud service model specifies the services and the capabilities that are provided to consumers. In SP 800-145, NIST classifies cloud service offerings into the three primary models listed below: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) The different service models provide different capabilities and are suitable for different consumers and business objectives. The factors that a provider should take into consideration while adopting a particular cloud service model are covered in Building the Cloud Infrastructure module. Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 8 of 27

Note: Many alternate cloud service models based on IaaS, PaaS, and SaaS are defined in various publications and by different industry groups. These service models are specific to certain specialized cloud services and capabilities that (they) provide. Such cloud service models are Backup as a Service (BaaS), Network as a Service (NaaS), Case as a Service (CaaS), Desktop as a Service (DaaS), Test Environment as a service (TEaaS), Disaster Recovery as a Service (DRaaS), and so on. However, these models eventually belong to one of the three primary cloud service models. A cloud deployment model provides a basis for how cloud infrastructure is built, managed, and accessed. In SP 800-145, NIST specifies the four primary cloud deployment models listed below: Public cloud Private cloud Hybrid cloud Community cloud Each cloud deployment model may be used for any of the cloud service models: IaaS, PaaS, and SaaS. The different deployment models present a number of tradeoffs in terms of control, scale, cost, and availability of resources. 2- There are two different Types of Hypervisor, explain [2 Marks] Hypervisors can be categorized into two types: bare-metal hypervisor and hosted hypervisor. A bare-metal hypervisor is directly installed on the hardware. It has direct access to the hardware resources of the compute system. Therefore, it is more efficient than a hosted hypervisor. However, this type of hypervisor may have limited device drivers built-in. Therefore, hardware certified by the hypervisor vendor is usually required to run bare-metal hypervisors. A bare-metal hypervisor is designed for enterprise data centers and cloud infrastructure. It also supports advanced capabilities such as resource management, high availability, security, and so on. In contrast to a bare-metal hypervisor, a hosted hypervisor is installed as an application on an operating system. In this approach, the hypervisor does not have direct access to the hardware and all requests must pass through the operating system running on the physical compute system. Hosted hypervisors are compatible with all the devices that are supported by the operating system on which it is installed. Using this type of hypervisor adds overhead compared to a bare-metal hypervisor, because there are many services and processes running on an operating system that are consuming compute system resources. Therefore, a hosted hypervisor is most suitable for development, testing, and training purposes. Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 9 of 27

3- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 4- Explain briefly the main Components of FC SAN The key FC SAN components include network adapters, cables and connectors, and interconnecting devices. Each node requires one or more network adapters to provide a physical interface for communicating with other nodes. Examples of network adapters are FC host bus adapters (HBAs), and storage system front-end adapters. An FC HBA has SCSI-to-FC processing capability. It encapsulates OS (or hypervisor) storage I/Os (usually SCSI I/O) into FC frames before sending the frames to FC storage systems over an FC SAN. FC SAN predominantly uses optical fiber to provide physical connectivity between nodes. Copper cables might be used for shorter distances. A connector may attach at the end of a cable to enable swift connection and disconnection of the cable to and from a port. FC switches and directors are the interconnecting devices commonly used in an FC SAN to forward data from one physical switch port to another. Directors are high-end switches with a higher port count and better fault-tolerance capabilities than smaller switches (also known as departmental switches). Switches are available with a fixed port count or with a modular design. In a modular switch, the port count is increased by installing additional port cards into empty slots. Modular switches enable online installation of port cards. The architecture of a director is usually modular, and its port count is increased by inserting line cards or blades to the director s chassis. Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 10 of 27

5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. IDE/ATA and Serial ATA Integrated Device Electronics (IDE)/Advanced Technology Attachment (ATA) Popular interface used to connect hard disks or CD-ROM drives Available with varity of standards and names Serial Advanced Technology Attachment (SATA) Serial version of the IDE/ATA specification that has replaced the parallel ATA Inexpensive storage interconnect, typically used for internal connectivity Provides data transfer rate up to 6 Gb/s (standard 3.0) SCSI and SAS Parallel Small computer system interface (SCSI) Popular standard for connecting host and peripheral devices Commonly used for storage connectivity in servers Higher cost than IDE/ATA, therefore not popular in PC environments Available in wide variety of related technologies and standards Support up to 16 devices on a single bus Ultra-640 version provides data transfer speed up to 640 MB/s Serial Attached SCSI (SAS) Point-to-point serial protocol replacing parallel SCSI Supports data transfer rate up to 6 Gb/s (SAS 2.0) Fibre Channel and IP Fibre Channel (FC) Widely used protocol for high speed communication to the storage device Provides a serial data transmission that operates over copper wire and/or optical fiber Latest version of the FC interface 16FC allows transmission of data up to 16 Gb/s Internet Protocol (IP) Traditionally used to transfer host-to-host traffic Provide opportunity to leverage existing IP based network for storage communication Examples: iscsi and FCIP protocols 6- There are Three modes of flushing to manage cache utilization, explain Three modes of flushing to manage cache utilization are: Idle flushing High watermark flushing Forced flushing Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 11 of 27

7- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. Backup vs. Replication Definition Backup involves making a copy or copies of data. Replication is the act of copying and then moving data between a company s sites. It is typically measured in Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Requirements Backup requires a tape library (usually VTL doing disk-to-disk backup) and some place to store archived tapes. Replication requires investment in another, identical, infrastructure, effectively doubling your IT costs. Purpose Backup focuses on compliance and granular recovery, such as recovering a single user s emails from 5 years ago. Replication and recovery focus on business continuity quick and easy resumption of operations after a disaster or corruption. Minimizing the recovery time objective (RTO) is key. Uses Backup is typically used for everything in the enterprise, from critical production servers to desktops. Replication is often used for mission-critical applications that must always be up and running. How it Works Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point in time. Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data Protection (CDP) to enable users to access historic images. Bottom Line Relatively inexpensive way to avoid data loss. Valuable for compliance. Does not ensure continuity of operations. Focused on ensuring that business applications and processes are always available, even after a disaster. More expensive to set up and maintain. This table begs the question asked by Chris Mellor in a post on The Register 8- Differentinate between the Two common NAS file sharing protocols Two common NAS file sharing protocols are: Common Internet File System (CIFS) Network File System (NFS) CIFS Client-server application protocol An open variation of the Server Message Block (SMB) protocol Enables clients to access files that are on a server over TCP/IP Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 12 of 27

Stateful Protocol Maintains connection information regarding every connected client Can automatically restore connections and reopen files that were open prior to interruption NFS Client-server application protocol Enables clients to access files that are on a server Uses Remote Procedure Call (RPC) mechanism to provide access to remote file system Currently, three versions of NFS are in use: NFS v2 is stateless and uses UDP as transport layer protocol NFS v3 is stateless and uses UDP or optionally TCP as transport layer protocol NFS v4 is stateful and uses TCP as transport layer protocol 9- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 10- Differentinate between difernt types of protocol stack of FC SAN, FCOE, FCIP Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 13 of 27

Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 14 of 27

Question Three : Differentiate between the following terms using Figures Total [20 Marks] Each Point [2 Mark] 1. LVM examples 2. Different types of Storage Provisioning 3. Different types of LUN Expansion 4. Different types of ISS 5. Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache 6. Different types of FC Interconnectivity Options 7. Different types of iscsi Topologies 8. Data Center Infrastructure Before Using FCoE and Data Center Infrastructure Before Using FCoE 9. Different types of NAS Implementation 10. Local Replication Technologies 2- There are two different Types of Hypervisor, explain [2 Marks] Hypervisors can be categorized into two types: bare-metal hypervisor and hosted hypervisor. A bare-metal hypervisor is directly installed on the hardware. It has direct access to the hardware resources of the compute system. Therefore, it is more efficient than a hosted hypervisor. However, this type of hypervisor may have limited device drivers built-in. Therefore, hardware certified by the hypervisor vendor is usually required to run bare-metal hypervisors. A bare-metal hypervisor is designed for enterprise data centers and cloud infrastructure. It also supports advanced capabilities such as resource management, high availability, security, and so on. In contrast to a bare-metal hypervisor, a hosted hypervisor is installed as an application on an operating system. In this approach, the hypervisor does not have direct access to the hardware and all requests must pass through the operating system running on the physical compute system. Hosted hypervisors are compatible with all the devices that are supported by the operating system on which it is installed. Using this type of hypervisor adds overhead compared to a bare-metal hypervisor, because there are many services and processes running on an operating system that are consuming compute system resources. Therefore, a hosted hypervisor is most suitable for development, testing, and training purposes. 4-Describe the key components of intelligent storage system [2 Marks] Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 15 of 27

Question Two : Answer only 10 of the following Question Each Point [3 Mark] Total [30 Marks] 1- Differentiate between different types of services models of cloud computing and different types of deplyment models. 2- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). 3- List different Fabric Port Types and explain the different Types of Zoning 4- Explain briefly the main Components of FC SAN 5- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. 6- Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache 7- Explain briefly the main Components of FC SAN and its implementations 8- Differntionate by graph between Data Center Infrastructure Before Using FCoE and after Using FCoE 9- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. 10- Explain the differnec between difernt type of protocol stack of FC SAN, IP SAN 11- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. 1-Differentiate between different types of services models of cloud computing and different types of deplyment models. A cloud service model specifies the services and the capabilities that are provided to consumers. In SP 800-145, NIST classifies cloud service offerings into the three primary models listed below: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 16 of 27

The different service models provide different capabilities and are suitable for different consumers and business objectives. The factors that a provider should take into consideration while adopting a particular cloud service model are covered in Building the Cloud Infrastructure module. Note: Many alternate cloud service models based on IaaS, PaaS, and SaaS are defined in various publications and by different industry groups. These service models are specific to certain specialized cloud services and capabilities that (they) provide. Such cloud service models are Backup as a Service (BaaS), Network as a Service (NaaS), Case as a Service (CaaS), Desktop as a Service (DaaS), Test Environment as a service (TEaaS), Disaster Recovery as a Service (DRaaS), and so on. However, these models eventually belong to one of the three primary cloud service models. A cloud deployment model provides a basis for how cloud infrastructure is built, managed, and accessed. In SP 800-145, NIST specifies the four primary cloud deployment models listed below: Public cloud Private cloud Hybrid cloud Community cloud Each cloud deployment model may be used for any of the cloud service models: IaaS, PaaS, and SaaS. The different deployment models present a number of tradeoffs in terms of control, scale, cost, and availability of resources. 10- Describe the cloud computing reference model including all entities that operate at this layer and Functions of the physical layer (support your answer with figures). Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 17 of 27

11- List different Fabric Port Types and explain the different Types of Zoning A port in a switched fabric can be one of the following types: N_Port is an end-point in the fabric. This port is also known as the node port (or FC adapter port). Typically, it is a compute system port (on an FC HBA) or a storage system port connected to a switch in a fabric. E_Port is a switch port that forms a connection between two FC switches. This port is also known as an expansion port. The E_Port on an FC switch connects to the E_Port of another FC switch in the fabric through ISLs. F_Port is a port on a switch that connects an N_Port. It is also known as a fabric port. G_Port is a generic port on some vendors switches. It can operate as an E_Port or an F_Port and determines its functionality automatically during initialization. Zoning can be categorized into three types: WWN zoning, port zoning, and mixed zoning. WWN zoning uses WWNs to define zones. The zone members are the unique WWPN addresses of the ports in HBA and its targets (storage systems). A major advantage of WWN zoning is its flexibility. WWN zoning allows nodes to be moved to another switch port in the fabric and to maintain connectivity to their zone partners without having to modify the zone configuration. This is possible because the WWN is static to the node port. Port zoning uses the switch port identifier to define zones. In port zoning, access to data is determined by the physical switch port to which a node is connected. The zone members are the port identifier (switch domain ID and port number) to which an HBA and its targets are connected. If a node is moved to another switch port in the fabric, then zoning must be modified to allow the node, in its new port, to participate in its original zone. However, if an HBA or a storage system port fails, an administrator just has to replace the failed device without changing the zoning configuration. Mixed zoning combines the qualities of both WWN zoning and port zoning. Using mixed zoning enables a specific node port to be tied to the WWN of a node. 12- Explain briefly the main Components of FC SAN The key FC SAN components include network adapters, cables and connectors, and interconnecting devices. Each node requires one or more network adapters to provide a physical interface for communicating with other nodes. Examples of network adapters are FC host bus adapters (HBAs), and storage system front-end adapters. An FC HBA has SCSI-to-FC processing capability. It encapsulates OS (or hypervisor) storage I/Os (usually SCSI I/O) into FC frames before sending the frames to FC storage systems over an FC SAN. FC SAN predominantly uses optical fiber to provide physical connectivity between nodes. Copper cables might be used for shorter distances. A connector may attach at the end of a cable to enable swift connection and disconnection of the cable to and from a port. FC switches and directors are the interconnecting devices commonly used in an FC SAN to forward data from one physical switch port to another. Directors are high-end switches with a higher port count and better fault-tolerance capabilities than smaller switches (also known as departmental Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 18 of 27

switches). Switches are available with a fixed port count or with a modular design. In a modular switch, the port count is increased by installing additional port cards into empty slots. Modular switches enable online installation of port cards. The architecture of a director is usually modular, and its port count is increased by inserting line cards or blades to the director s chassis. 13- Differentiate between different types of Storage connectivity protocols such as IDE/ATA and SCSI, and etc.. IDE/ATA and Serial ATA Integrated Device Electronics (IDE)/Advanced Technology Attachment (ATA) Popular interface used to connect hard disks or CD-ROM drives Available with varity of standards and names Serial Advanced Technology Attachment (SATA) Serial version of the IDE/ATA specification that has replaced the parallel ATA Inexpensive storage interconnect, typically used for internal connectivity Provides data transfer rate up to 6 Gb/s (standard 3.0) SCSI and SAS Parallel Small computer system interface (SCSI) Popular standard for connecting host and peripheral devices Commonly used for storage connectivity in servers Higher cost than IDE/ATA, therefore not popular in PC environments Available in wide variety of related technologies and standards Support up to 16 devices on a single bus Ultra-640 version provides data transfer speed up to 640 MB/s Serial Attached SCSI (SAS) Point-to-point serial protocol replacing parallel SCSI Supports data transfer rate up to 6 Gb/s (SAS 2.0) Fibre Channel and IP Fibre Channel (FC) Widely used protocol for high speed communication to the storage device Provides a serial data transmission that operates over copper wire and/or optical fiber Latest version of the FC interface 16FC allows transmission of data up to 16 Gb/s Internet Protocol (IP) Traditionally used to transfer host-to-host traffic Provide opportunity to leverage existing IP based network for storage communication Examples: iscsi and FCIP protocols Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 19 of 27

14- Explain the two different types of Read Operation with Cache and the two different types of write Operation with Cache Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 20 of 27

7-Explain briefly the main Components of FC SAN and its implementations Components of FC SAN Node (server and storage) ports Cables Connectors Interconnecting devices such as FC switches and hubs SAN management software Components of a NAS device: -Network Interface -NFS -CIFS -Dedicated optimized OS -Storage interface Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 21 of 27

NAS Implementation 1- Unified NAS Consolidates NAS-based (file-level) and SAN-based (block-level) access on a single storage platform Supports both CIFS and NFS protocols for file access and iscsi and FC protocols for block level access Provides unified management for both NAS head and storage NAS Implementation 2- Gateway NAS Uses external and independently-managed storage NAS heads access SAN-attached or direct-attached storage arrays NAS heads share storage with other application servers that perform block I/O Requires separate management of NAS head and storage NAS Implementation 3- Scale-out NAS Pools multiple nodes together in a cluster that works as a single NAS device Pool is managed centrally Scales performance and/or capacity with addition of nodes to the pool non-disruptively Creates a single file system that runs on all nodes in the cluster Clients, connected to any node, can access entire file system File system grows dynamically as nodes are added Stripes data across all nodes in a pool along with mirror or parity protection 8-Differntionate by graph between Data Center Infrastructure Before Using FCoE and after Using FCoE Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 22 of 27

9- Sometimes, Some people considered that backup and replication are two sides of the same coin, Explain the validity of previous information. Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 23 of 27

Backup vs. Replication Definition Backup involves making a copy or copies of data. Replication is the act of copying and then moving data between a company s sites. It is typically measured in Recovery Time Objective (RTO) and Recovery Point Objective (RPO). Requirements Backup requires a tape library (usually VTL doing disk-to-disk backup) and some place to store archived tapes. Replication requires investment in another, identical, infrastructure, effectively doubling your IT costs. Purpose Backup focuses on compliance and granular recovery, such as recovering a single user s emails from 5 years ago. Replication and recovery focus on business continuity quick and easy resumption of operations after a disaster or corruption. Minimizing the recovery time objective (RTO) is key. Uses Backup is typically used for everything in the enterprise, from critical production servers to desktops. Replication is often used for mission-critical applications that must always be up and running. How it Works Backup typically relies on snapshots which are copies of the data set taken at a pre-determined point in time. Replication can be synchronous, asynchronous or near-synchronous and may use Continuous Data Protection (CDP) to enable users to access historic images. Bottom Line Relatively inexpensive way to avoid data loss. Valuable for compliance. Does not ensure continuity of operations. Focused on ensuring that business applications and processes are always available, even after a disaster. More expensive to set up and maintain. This table begs the question asked by Chris Mellor in a post on The Register 10 Explain the differnec between difernt type of protocol stack of FC SAN, IP SAN Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 24 of 27

12- Differntionate between different RAID levels according to minimum number of disks, available storage capacity %,write penality, and protection. Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 25 of 27

Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 26 of 27

Good Luck Dr. Diaa Salama Committee of Examiners and correctors: 1 st Member/..... 2 nd Member/.. Page 27 of 27