0% found this document useful (0 votes)
2K views36 pages

ISM Book Exercise Solutions

The document contains solutions to exercises from an ISM book. It includes solutions for questions about data centers, information lifecycle management strategies, storage infrastructures, disk performance, and queueing theory concepts. Key elements discussed include storage tiers, hardware and software components, capacity planning, I/O throughput. Queue utilization and response time are calculated for different load levels.

Uploaded by

Bradley Smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views36 pages

ISM Book Exercise Solutions

The document contains solutions to exercises from an ISM book. It includes solutions for questions about data centers, information lifecycle management strategies, storage infrastructures, disk performance, and queueing theory concepts. Key elements discussed include storage tiers, hardware and software components, capacity planning, I/O throughput. Queue utilization and response time are calculated for different load levels.

Uploaded by

Bradley Smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Fulltextof"ISMBookExercise
Solutions.pdfUnixLabDirectory"
Seeotherformats
Chapter1

1.AhospitalusesanapplicationthatstorespatientXraydataintheformoflarge
binaryobjectsinanOracledatabase.TheapplicationishostedonaUNIXserver,
andthehospitalstaffaccessestheXrayrecordsthroughaGigabitEthernet
backbone.AnEMCCLARiiONstoragearrayprovidesstoragetotheUNIX
server,whichhas6TBofusablecapacity.Explainthecoreelementsofthedata
center.Whatarethetypicalchallengesthestoragemanagementteammayfacein
meetingtheserviceleveldemandsofthehospitalstaff?Describehowthevalue
ofthispatientdatamightchangeovertime.
Solution/Hint:
Coreelementsofthedatacenter:
Application
Databaseoracle
ServerandoperatingsystemUNIXserver
NetworkLAN,SAN
StoragearrayEMCCLARiiONstoragearray
Challenges:
Longtermpreservation
Highcost
Howpatientdatamightchangeovertime:
Forfirst60days,thepatientdataisaccessedfrequently
Afterthattherequirementofthepatientdataisveryless,soitcouldbe
movedtoCAS.
2.Anengineeringdesigndepartmentofalargecompanymaintainsover600,000
engineeringdrawingsthatitsdesigner'saccessandreuseintheircurrentprojects,
modifyingorupdatingthemasrequired.Thedesignteamwantsinstantaccessto
thedrawingsforitscurrentprojects,butiscurrentlyconstrainedbyan

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

1/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

infrastructurethatisnotabletoscaletomeettheresponsetimerequirements.The
teamhasclassifiedthedrawingsas"mostfrequentlyaccessed,""frequently
accessed,""occasionallyaccessed,"and"archive."
Suggestandprovidethedetailsforastrategyforthedesigndepartment
thatoptimizesthestorageinfrastructurebyusingILM.
Explainhowyouwilluse"tieredstorage"basedonaccessfrequency.
Detailthehardwareandsoftwarecomponentsyouwillneedtoimplement
yourstrategy.
Researchproductsandsolutionscurrentlyavailabletomeetthesolution
youareproposing.
Solution/Hint:
Classifythedataaccordingtoaccessfrequencyorvalueandusetiered
storagethatoptimizestheinfrastructurecostandperformancebyusing
ILM.
Storagerequirementcanbeclassifyas:
frequentlyuseddatashouldbeplacedinhighendstoragearray
occasionallyaccessedshouldbeinlowendstoragearray
andarchiveddatainspecializedCASsystem

Hardwareandsoftwarecomponentsneeded:
HighendandMidrangestoragearray
Contentaddressedstorage(CAS)
FCSAN,LAN
Server
Software:
ILMtool
Researchonfollowingproductsandsolutions(www.emc.com)
StoragearraysCLARiiON/Symmetrix
CASCentera
FCSANSwitches/Directors
ILMstrategy

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

2/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

3.Themarketingdepartmentatamidsizefirmisexpanding.Newhiresarebeing
addedtothedepartmentandtheyaregivennetworkaccesstothedepartment's
files.IThasgivenmarketinganetworkeddriveontheLAN,butitkeepsreaching
capacityeverythirdweek.Currentcapacityis500MB(andgrowing),with
hundredsoffiles.UsersarecomplainingaboutLANresponsetimesandcapacity.
AstheITmanager,whatcouldyourecommendtoimprovethesituation?
Solution/Hint:
NAS
4.Alargecompanyisconsideringastorageinfrastructureonethatisscalableand
provideshighavailability.Moreimportantly,thecompanyalsoneeds
performanceforitsmissioncriticalapplications.Whichstoragetopologywould
yourecommend(SAN,NAS,IPSAN)andwhy?
Solution/Hint:
SANisarecommendedsolution.
BecauseSANhashighscalabilityandavailability(usingdirectoror
switch).

Chapter2

WhatarethebenefitsofusingmultipleHBAsonahost?
Solution/Hint:
Highavailability
Anapplicationspecifiesarequirementof200GBtohostadatabaseandother
files.Italsospecifiesthatthestorageenvironmentshouldsupport5,000IOPS
duringitspeakprocessingcycle.Thedisksavailableforconfigurationprovide
66GBofusablecapacity,andthemanufacturerspecifiesthattheycansupporta
maximumof140IOPS.Theapplicationisresponsetimesensitiveanddisk
utilizationbeyond60percentwillnotmeettheresponsetimerequirementsofthe
application.Computeandexplainthetheoreticalbasisfortheminimumnumber
ofdisksthatshouldbeconfiguredtomeettherequirementsoftheapplication.
Solution/Hint:
Numberofdiskrequired=max(sizerequirement,IOPSrequirements)
Tomeetthesizerequirement=200GB/66GB=4disks
TomeettheIOPSrequirement=5000IOPS/(140x0.6IOPS)=60disks
=max(4,60)=60disks
Whichcomponentsconstitutethediskservicetime?Whichcomponent
contributesthelargestpercentageofthediskservicetimeinarandomI/O

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

3/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

operation?
Solution/Hint:
seektime,rotationallatencyandtransferrate
seektime
Whydoformatteddiskshavelesscapacitythanunformatteddisks?
Solution/Hint:
Inordertomakestoragedevicefunctional,itneedtobeformatted.
CommontypesofdriveformatsareFAT32,NTFSandext2.Ineachof
theformattingschemes,aportionofthestoragespaceisallocatedto
configuredfilesystemtoenablecatalogingdataonthediskdrive.
TheaverageI/Osizeofanapplicationis64KB.Thefollowingspecificationsare
availablefromthediskmanufacturer:averageseektime=5ms,7,200rpm,
transferrate=40MB/s.DeterminethemaximumIOPSthatcouldbeperformed
withthediskforthisapplication.Takingthiscaseasanexample,explainthe
relationshipbetweendiskutilizationandIOPS.
Solution/Hint:
Thediskservicetime(Rs)isakeymeasureofdiskperformance;and
Rsalongwithdiskutilizationrate(U)determinestheI/Oresponsetime
forapplications.
Thetotaldiskservicetime(Rs)isthesumofseektime(E),rotational
latency(L),andtheinternaltransfertime(X):
Rs=E+L+X

EisdeterminedbasedontherandomnessoftheI/Orequest.Land
Xaremeasuresprovidedbydiskvendorsastechnical
specificationsofthedisk.
Averageseektimeof5msinarandomI/Oenvironment,orE=5ms
Diskrotationspeedof7,200rpmfromwhichrotationallatency(L)
canbedetermined,whichisonehalfofthetimetakenforafull
rotationor
L=(0.5/7,200rpmexpressedinms)
40MB/sinternaldatatransferrate,fromwhichtheinternaltransfer
time(X)isderivedbasedontheblocksizeoftheI/O.
Withablocksizeof64KB,X=64KB/40MB
ConsequentlyRs=5ms+(0.5/7,200)+64KB/40MB
=5+4.167+1.6
=10.767ms
Themaximumno.ofI/OsservicedpersecondorIOPS=1/RS
Inotherwords,foranI/Owithablocksizeof64KBand

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

4/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Rs=10.767ms,themaximumIOPSwillbe
1/(10.767*10"3)=92.876IOPS
6.ConsideradiskI/OsysteminwhichanI/Orequestarrivesattherateof80IOPS.
Thediskservicetimeis6ms.
a.Computethefollowing:UtilizationofI/Ocontroller,Totalresponsetime,
Averagequeuesize,andTotaltimespentbyarequestinaqueue.
b.Computetheprecedingparameteriftheservicetimeishalved.
Solution/Hint:
Arrivalrate(a)=80IOPS,consequently,thearrivaltime
Ra=1/a=1/80=12.5ms
Rs=6ms(given)
1.Utilization(U)=Rs/Ra
=6/12.5=0.48or48%
2.Responsetime(R)=Rs/(1U)
=6/(10.48)=11.5ms
3.Averagequeuesize=U/(1U)
=(0.48)2/(l0.48)
=0.44
4.Timespentbyarequestinaqueue=UxR,orthetotalresponsetimeservice
time=0.48x11.5=5.52ms
Now,ifcontrollerpowerisdoubled,ortheservicetimeishalved;
consequentlyRs=3msinthisscenario.
1.Utilization(U)=Rs/Ra=3/12.5=0.24or24%
2.Responsetime(R)=Rs/(1U)=3/(10.24)=3.9ms
3.Averagequeuesize=U2/(lU)=(0.24)2/(10.24)=0.08
4.Timespentbyarequestinaqueue=0.24x3.9=0.936ms

7.RefertoQuestion6andplotagraphshowingtheresponsetimeandutilization,
considering20percent,40percent,60percent,80percent,and100percent
utilizationoftheI/Ocontroller.Describetheconclusionthatcouldbederived
fromthegraph.
Solution/Hint:

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

5/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

1.

Utilization=20%=0.2

Responsetime

7.5ms

2.

Itili/ation=40

%=0.4

Responsetime=

10ms

3.

Utilization=60

%=0.6

Responsetime

15ms

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

6/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

4.

1tiliAition=80

%=0.8

Responsetime

30ms

5.

LUili/ation=100

%=1

Responsetime=

infinity

70i

^,,,,,,,,
102030405060708090
Utilization(%)

Chapter3

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

7/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

1.WhyisRAID1notasubstituteforabackup?
Solution/Hint:
RAID1providesprotectionagainstdiskfailureandnotasolutionfordata
recoveryduetodisaster.
2.WhyisRAIDnotanoptionfordataprotectionandhighavailability?
Solution/Hint:
Itdoesnotprovideanydataprotection.
3.ExplaintheprocessofdatarecoveryincaseofadrivefailureinRAID5.
Solution/Hint:
ItperformsXORoperationbetweenremainingdisksandregeneratelost
data.
4.WhatarethebenefitsofusingRAID3inabackupapplication?
Solution/Hint:
BackupapplicationperformslargesequentialI/OsandRAID3givesbest
resultincaseoflargesequentialI/Ooperation.
5.DiscusstheimpactofrandomandsequentialI/OindifferentRAID
configurations.
Solution/Hint:

RAID

Random

Sequential

Goodforrandomreadsandpoorto
fairforsmallrandomwrites.

verygoodforsequentialreadsand
goodforlarge,sequentialwrites.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

8/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Verygoodforrandomreads.Fair
forrandomwrite.Slowerdueto
parityoverhead.

Goodforsequentialreads.Fairto
goodforsequentialwrites.

1/0

Verygoodforrandomwrite.

Poortofairforsequentialwrites

6.A10Krpmdriveisratedtoperform130IOPS,anda15Krpmdriveisratedto
perform180IOPSforanapplication.Theread/writeratiois3:1.Computethe
RAIDadjustedIOPSforthe10Kand15KdrivesforRAID1,RAID5,andRAID
6.
Solution/Hint:QuestionInvalid

7.Anapplicationhas1,000heavyusersatapeakof2IOPSeachand2,000typical
usersatapeakof1IOPSeach,witharead/writeratioof2:1.Itisestimatedthat
theapplicationalsoexperiencesanoverheadof20percentforotherworkloads.
CalculatetheIOPSrequirementforRAID1,RAID3,RAID5,andRAID6.

Solution/Hint:

1000heavyusersatapeakof2IOPSeach=2000IOPS
2000typicalusersatapeakof1IOPSeach=2000IOPS

Assumemaximumconcurrency90%

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

9/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

[(2000+2000)*0.9]=3600hostbasedIOPSfor3000usersduringpeak
activityperiod
read/writeratio2:1

8.ForQuestion7,computethenumberofdrivesrequiredtosupporttheapplication
indifferentRAIDenvironmentsif10Krpmdriveswitharatingof130IOPSper
drivewereused.
Solution/Hint:
NumberofdrivesrequiredtosupporttheapplicationindifferentRAID
environments,if10krpmdriveswitharatingof130IOPSperdrive

ForRAID1
ForRAID3
ForRAID5
ForRAID6

3600*2/3+(2*1/3*3600)
3600*2/3+(4*1/3*3600)
3600*2/3+(4*1/3*3600)
3600*2/3+(6*1/3*3600)

4800IOPS
7200IOPS
7200IOPS
9600IOPS

ForRAID1=4800/130=37drives
ForRAID3=7200/130=55drives
ForRAID5=7200/130=55drives
ForRAID6=9600/130=74drives

Chapter4

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

10/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

1.ConsiderascenarioinwhichanI/Orequestfromtrack1isfollowedbyanI/O
requestfromtrack2onasectorthatis180degreesawayfromthefirstrequest.A
thirdrequestisfromasectorontrack3,whichisadjacenttothesectoronwhich
thefirstrequestismade.Discusstheadvantagesanddisadvantagesofusingthe
commandqueuingalgorithminthisscenario.
Solution/Hint:
Inthisscenario,commandqueuingproviderotationallatencyoptimization
whererequestfromtrack3isservicedbeforerequest2toavoidone
rotationtiming.Assumeifrequest3isfromthesametrack1inthatcase
commandqueuingprovidesseektimeoptimizationandimprovesdisk
performance.
2.WhichapplicationbenefitsthemostbybypassingthewritecacheandWhy?
Solution/Hint:
ApplicationwithverylargesizeI/Owrites.
3.AnOracledatabaseusesablocksizeof4KforitsI/Ooperation.Theapplication
thatusesthisdatabaseprimarilyperformsasequentialreadoperation.Suggest
andexplaintheappropriatevaluesforthefollowingcacheparameters:cachepage
size,cacheallocation(readversuswrite),prefetchtype,andwriteasidecache.
Solution/Hint:
Cachepagesize:4K
Cacheallocation(readversuswrite):morereadcache
prefetchtype:fixedprefetch
Writeasidecache:Largevalue

Chapter5

1.DASprovidesaneconomicallyviablealternativetootherstoragenetworking
solutions.Justifythisstatement.
Solution/Hint:
Setuprequiresarelativelylowerinitialinvestment
Setupismanagedusinghostbasedtools,suchasthehostOS,whichmakes

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

11/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

storagemanagementtaskseasyforsmallandmediumenterprises.
Requiresfewermanagementtasks,andlesshardwareandsoftwareelements
tosetupandoperate.
2.HowistheprioritysequenceestablishedinawideSCSIenvironment?
Solution/Hint:
InawideSCSI,thedeviceIDsfrom8to15havethehighestpriority,butthe
entiresequenceofwideSCSIIDshaslowerprioritythannarrowSCSIIDs.
Therefore,theoverallprioritysequenceforawideSCSIis7,6,5,4,3,2,1,0,
15,14,13,12,11,10,9,and8.
3.WhyisSCSIperformancesuperiortothatofIDE/ATA?Explainthereasonsfrom
anarchitecturalperspective.
Solution/Hint:
SCSIoffersimprovedperformanceandexpandabilityandcompatibility
options,makingitsuitableforhighendcomputers.
Numberofdevicessupportedis16
SCSIarchitecturederivesitsbasefromtheclientserverrelationship
SCSIinitiator,oraclient,sendsarequesttoaSCSItarget,oraserver.
Thetargetperformsthetasksrequestedandsendstheoutputtotheinitiator
Whenadeviceisinitialized,SCSIallowsforautomaticassignmentofdevice
IDsonthebus,whichpreventstwoormoredevicesusingthesameSCSIIDs.
4.ResearchbladeserverarchitectureanddiscussthelimitationsofDASforthis
architecture.
Solution/Hint:DASLimitations
DASdoesnotscalewell,hasalimitednumberofports
AlimitedbandwidthinDASrestrictstheavailableI/Oprocessingcapability.
ThedistancelimitationsassociatedwithDAS
Inabilitytosharetheresources,unusedresourcescannotbeeasilyre
allocated,resultinginislandsofoverutilizedandunderutilizedstoragepools.
5.WhatwouldyouconsiderwhilechoosingserialorparalleldatatransferinaDAS
implementation?Explainyouranswerandjustifyyourchoice.
Solution/Hint:
Distanceandspeedarethekeyfactors
Serialdatatransfercanovercomethedistancelimitations
Paralleldatatransfercanovercometheseedlimitations
ParalleldatatransferissuitableforInternalDAS

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

12/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

SerialdatatransferissuitableforExternalDAS

6.Ifthreeharddiskdrivesareconnectedinadaisychainandcommunicateover
SCSI,explainhowtheCPUwillperformI/Ooperationswithaparticulardevice.
Solution/Hint:
Eachdiskwillbeidentifiedbycn|tn|dnnumber
Asthethreedisksareconnectedinadaisychaincnandtnnumberwillbe
thesameforallthedisks
SCSIcommands/responsewillbeusedforthecommunication

Chapter6

1.Whatiszoning?Discussascenario,
(i)wheresoftzoningispreferredoverhardzoning.
(ii)wherehardzoningispreferredoversoftzoning.
Solution/Hint:
ZoningisanFCswitchfunctionthatenablesnodeswithinthefabrictobe
logicallysegmentedintogroupsthatcancommunicatewitheachother.Azone
consistsofselecteddevices,suchashostbusadapters(HBAs)andstorage
devices,inthefabric.Devicesassignedtoonezonecancommunicatewithother
devicesinthesamezone,butnotwithdevicesinzonesofwhichtheyarenot
members.Thiszoningpracticeprovidesafast,efficient,andreliablemeansof
controllingtheHBAdiscovery/loginprocess.Withoutzoning,theHBAwill
attempttologintoallportsonthefabricduringdiscoveryandduringtheHBA's
responsetoastatechangenotification.Withzoning,thetimeandFibreChannel
bandwidthrequiredtoprocessdiscoveryandthestatechangenotificationare
minimized.
(i)SoftzoningisalsocalledWWNzoninganditispreferredwhenuserneed
flexibilitytophysicallymoveattachednodesbetweenswitchportsrecablethe
SAN,thatmaytakeplaceduringswitchmaintenanceandrepairwithout
reconfiguringthezoneinformation.ThisispossiblebecausetheWWNisstaticto
thenodeport.
(ii)Hardzoningisalsocalledportzoning,itisconvenientwhenthereisaneed
forhardwarereplacementasWWNisuniquelyassociatedwithahardware.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

13/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

2.DescribetheprocessofassigningFCaddresstoanodewhenloggingintothe
networkforthefirsttime.
Solution/Hint::
Tologontothefabric,anodesendsaFLOGIframewiththeWorldWideNode
Name(WWNN)andWorldWidePortName(WWPN)parameterstothelogin
serviceatthewellknownFCaddressFFFFFE.Inturn,theswitchacceptsthe
loginandreturnsanAccept(ACC)framewiththeassignedFCaddressforthe
device.ImmediatelyaftertheFLOGI,theN_portregistersitselfwiththelocal
nameserverontheswitch,indicatingitsWWNN,WWPN,andassignedFC
address.
3.Seventeenswitches,with16portseach,areconnectedinameshtopology.How
manyportsareavailableforhostandstorageconnectivityifyoucreateahigh
availabilitysolution?
Solution/Hint:
Totalports=17*16=272
NumberofISL136
EachISLconsumes2ports
numberofportsavailableforhosts
4.DiscusstheadvantageofFCSWoverFCAL.

Solution/Hint::
Unlikealoopconfiguration,aFibreChannelswitchedfabric(FCSW)network
providesinterconnecteddevices,dedicatedbandwidth,andscalability.Theaddition
orremovalofadeviceinaswitchedfabricisminimallydisruptive;itdoesnotaffect
theongoingtrafficbetweenotherdevices(ascomparedtoFCAL).InFCSW,nodes
donotsharealoop;instead,dataistransferredthroughadedicatedpathbetweenthe
nodes.FCuses24bitfibrechanneladdressingschemeforconnectivitywhichcan
supportupto15milliondevices(FCALuses8bitaddressingwhichcansupportup
to127devicesonaloop)
5.HowflowcontrolworksinFCnetwork.
Solution/Hint::
Flowcontrolisusedtodefineandregulatethepaceofflowofdataframesbetween
senderandreceiverduringdatatransmission.FCtechnologyusestwoflowcontrol
mechanisms:buffertobuffercredit(BBCredit)andendtoendcredit(EECredit).
BB_Credit:Theprocessisasfollows

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

14/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

1.Atlogin,thetransmitterandthereceiverexchangeparametersandestablishthe
BBCreditvalue.
2.Thetransmitter'scountinitializestotheBBCreditvalue.
3.If(BBCredit>0),transmittersendsaframe,anddecrementsthecountper
transmittedframe.
4.AnRRDY(ReceiverReady)issentfromthereceivingporttothetransmitting
portforeveryavailablebufferonthereceivingside.
5.Thetransmitterincrementsthecountby1foreachRRDYitreceivesfromthe
receiver.Thetransmittingportmaintainsacountoffreereceiverbuffers.
5.Uponalinkreset,theBBCreditvalueresetstothevaluenegotiateduponlogin.
EE_Credit
Thefunctionofendtoendcredit,knownasEECredit,issimilartothatof
BB_Credit.(TheEECreditmechanismisusedfortheflowcontrolforclass1and
class2trafficonly).
6.Whyisclass3servicemostpreferredforFCcommunication?
Solution/Hint:
Nondedicatedconnection
BBcredit
Highbandwidthutilization
Supportformultiplexing

Chapter7

1.ListandexplaintheconsiderationsforcapacitydesignforbothCPUandstorage
inaNASenvironment.
Solution/Hint:
ThescalabilityofcapacitycanbeaconstraintinanintegratedNAS.However,
thegatewayNAScanscalefortherequiredconnectivityandstorage.
GatewayNASsharesCPUloadwithSANworkloadandmayfaceconstraint
onCPUutilization.Typically,CPUcapacityisnotthemajorbottleneckfactor
inaNASsystem,butotherconsiderationssuchasmemoryrequirement,
numberofnetworkports,filesystem,IOPSrequirements,alongwithstorage
capacityrequirementsareimportantfactor.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

15/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

2.SANisconfiguredforbackuptoadiskenvironment,andthestorage
configurationhasadditionalcapacityavailable.CanyouhaveaNASgateway
configurationusethisSAN?Discusstheimplicationsofsharingthebackupto
diskSANenvironmentwithNAS.
Solution/Hint:
AstheadditionalcapacityisavailablegatewayNAScanbeimplemented.
Butduringthebackupwindowitwillhaveconsiderableperformanceimpact
onNetworkandhenceNAS.
3.ExplainhowtheperformanceofNAScanbeaffectediftheTCPwindowsizeat
thesenderandthereceiverarenotsynchronized.
Solution/Hint:
ThiswillaffecttheNASperformanceasthismayleadtoretransmissionof
data,lowerbandwidthutilization,performancedegradationofthenetwork,
intermittentconnectivity,anddatalinkerrors.
4.ResearchtheuseofbabyjumboframesandhowitaffectsNASperformance.
Solution/Hint:
CommonEthernetJumboframesizeis9000Bytes
Babyjumboframessizeis2.5KBBytes
5.ResearchthefilesharingfeaturesoftheNFSprotocol.
Hint:Researchquestion(refertoNFSprotocolsectioninthebook)
6.ANASimplementationconfiguredjumboframesontheNAShead,with9,000as
itsMTU.However,theimplementersdidnotseeanyperformanceimprovement
andactuallyexperiencedperformancedegradation.Whatcouldbethecause?
Researchtheendtoendjumboframesupportrequirementsinanetwork.
Solution/Hint:
Jumboframesareusedattheendpoint(NASHead)withMTUof9000
CheckiftheintermediatenetworkusesadifferentMTUsize(e.g.1500).
Thiscancausetheroutertodroppacketswhichthenhavetoretransmitatthe
TCPlayer.

Packetsarethenfragmentedandhavetoreassembletoaccommodatethe
differentMTUsizes.Thisdegradesnetworkperformance.
7.AcmeCorporationistryingtodecidebetweenanintegratedoragatewayNAS
solution.TheexistingSANatAcmewillprovidecapacityandscalability.TheIT

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

16/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

departmentisconsideringaNASsolutionfortheTrainingdepartmentatAcme
fortrainingvideos.Thevideoswouldonlybeusedbythetrainingdepartmentfor
evaluationofinstructors.PickaNASsolutionandexplainthereasonsforyour
choice.
Solution/Hint:
ExistingSAN;sothechoicewillbegatewayNAS
CheckifSANhasadditionalcapacityavailable.

Chapter8

1.HowdoesiSCSIhandletheprocessofauthentication?Researchtheavailable
options.
Solution/Hint::
CHAP(Challengehandshakeauthenticationprotocol)
2.ListsomeofthedatastorageapplicationsthatcouldbenefitfromanIPSAN
solution.
Solution/Hint:
ExtendingreachofexistingSAN
Disasterrecoverysolutions
Remoteofficeapplications
3.WhatarethemajorperformanceconsiderationsforFCIP?
Solution/Hint:
Refersection8.2.2FCIPPerformanceandsecurity
4.ResearchthemultipathingsoftwareavailableforaniSCSIenvironment.Writea
technicalnoteonthefeaturesandfunctionalityofEMCPowerPathsupportfor
iSCSI.
Hint:Researchwork
5.ResearchtheiSCSIcapabilitiesinaNASdevice;provideusecaseexamples.
Hint:Researchwork
6.Acompanyisconsideringimplementingstorage.Theydonothaveacurrent
storageinfrastructuretouse,buttheyhaveanetworkthatgivesthemgood
performance.DiscusswhethernativeorbridgediSCSIshouldbeusedandexplain
yourrecommendation.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

17/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Solution/Hint:
NativeiSCSIimplementationdoesn'tinvolveanyFCcomponentswhile
BridgediSCSIimplementationinvolvesFCcomponents
Asthecompanydoesn'thavestorageinfrastructureandthenetworktheyhave
givesthemagoodperformancenativeiSCSIshouldbedeployed.
iSCSIenabledStorageisonlyneededifnativeiSCSIistobeimplementedin
thiscase.
7.TheIPbandwidthprovidedforFCIPconnectivityseemstobeconstrained.
DiscussitsimplicationsiftheSANsthataremergedarefairlylarge,with500
portsoneachside,andtheSANsatbothendsareconstantlyreconfigured.
Solution/Hint:
AsbandwidthisinsufficientIPnetworkwillbecomethebottleneck
Asthefabricsonbothsidesarefairlylargeandareconstantlyreconfigured
anydisruptionintheIPnetworkwillleadtoinstabilitiesinunifiedfabric.
Theseincludeasegmentedfabric,excessiveRSCNs,andhost
timeouts.

ThesolutioncanbetosegregateFCIPtrafficintoaseparatevirtualfabric,to
provideadditionalstability,

8.ComparedtoastandardIPframe,whatpercentageofreductioncanberealizedin
protocoloverheadinaniSCSIconfiguredtousejumboframeswithanMTU
valueof9,000?
Solution/Hint:
iSCSIPDUsize=1460bytes(containpayloadandadditionalheadersegment)
Jumboframesizeof9000MTUoutofwhichpayloadis8960
JumboFramesallowsasignificantamountofincreasedpayloadtobe
deliveredineachiSCSIPDU.
9.WhyshouldanMTUvalueofatleast2,500beconfiguredinabridgediSCSI
environment?
Solution/Hint:
FCsupportsframesizeof2148byte

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

18/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Chapter9

1.ExplainhowaCASsolutionfitsintotheILMstrategy.
Solution/Hint:
AccordingtoILMstrategyvalueofinformationchangesoveritslifecycle,when
createdvalueofinformationisveryhighanditisfrequentlyaccessedand
changed,henceplacedinahighperformancecostlystorage.Withthetimeits
valuedropsanditbecomesfixedcontentwhichisrarelyaccessed,butstillholds
placeincostlystoragespace.Forthecostoptimizationlessaccesseddatashould
bemovedtoarchivedandleavethecostlyspaceforhighvaluedata.CASisa
solutionforarchiveddata,whichnotonlyprovidecostbenefitbutalsoprovide
fasteraccessandreliablestoragetofixedcontent.
2.ToaccessdatainaSAN,ahostusesaphysicaladdressknownasalogicalblock
address(LBA).AhostusingaCASdevicedoesnotuse(orneed)aphysical
address.Why?
Solution/Hint:
Unlikefilelevelandblockleveldataaccessthatusefilenamesandthe
physicallocationofdataforstorageandretrieval,CASstoresdataandits
attributesasanobject.Thestoredobjectisassignedagloballyunique
addressknownasacontentaddresswhichisderivedfromtheactualbinary
representationofstoreddata.
3.TheITdepartmentofadepartmentalstoreusestapetoarchivedata.Explain45
majorpointsyoucouldprovidetopersuadetheITdepartmenttomovetoaCAS
solution.HowwouldyoursuggestionsimpacttheITdepartment?
Solution/Hint:
GuaranteedContentAuthenticityandIntegrity:Datacannotbemanipulated
oncestored,meetregulatoryandbusinesscompliance.
SingleInstanceStorage:Simplifiesstorageresourcemanagement,especially
whenhandlinglargeamountoffixedcontent.
FasterDataRetrieval:Comparedtotape
Technologyindependence:Aslongastheapplicationserverisabletomapthe
originalcontentaddressthedataremainsaccessible.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

19/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Betterdataprotectionanddisposition:AllfixedcontentisstoredinCASonce
andisbackedupwithaprotectionscheme.

Chapter10

1.WhatdoVLANsvirtualize?DiscussVLANimplementationasavirtualization
technology.
Solution/Hint:
VLANstandforvirtualLANwhichhassameattributesasofphysicalLAN,butallows
hoststobegroupedtogethereveniftheyarenotlocatedonthesamenetworkswitch.
Withtheuseofnetworkreconfigurationsoftware,portsonthelayer2switchcanbe
logicallygroupedtogether,formingaseparate,VirtualLocalAreaNetwork.VLANshelp
tosimplifynetworkadministration.PortsinaVLANcanbelimitedtoonlythenumber
neededforaparticularnetwork.ThisallowsunusedportstobeusedinotherVLANs.
Throughsoftwarecommands,additionalportscanbeaddedtoanexistingVLANif
furtherexpansionisneeded.IfamachineneedstobemovedtoadifferentIPnetwork,
theportisreassignedtoadifferentVLANandthereisnoneedforthephysical
movementofcables.
3.Howcanablocklevelvirtualizationimplementationbeusedasadatamigrationtool?
Explainhowdatamigrationwillbeaccomplishedanddiscusstheadvantagesofusing
thismethodforstorage.Comparethismethodtotraditionalmigrationmethods.
Solution/Hint:
Conventionallydatamigrationneedsphysicalremappingofserverstonewstorage
locationwhichresultedinapplicationdowntimeandphysicalchanges.Inavirtualized
environmentvirtualvolumesareassignedtothehostoutofphysicalpoolofstorage
capacity.Datamigrationisachievedthroughthesevirtualvolumes.Tomoveavirtual
volume,virtualizationsoftwareperformsaredirectionofLOfromonephysicallocation
toanother.DespitethefactthattheLOisphysicallyredirectedtoanewlocationbythe
virtualizationsoftware,theaddressofthevirtualvolumepresentedtothehostnever
changes.Thisisaccomplishedthroughvirtualaddressing.Thisallowstheprocesstobe
transparentandnondisruptivetothehost.Additionally,sincethecopyingandremapping
isdonebythevirtualizationsystem,nohostcyclearerequired,freeingserverstobe
dedicatedtotheirproperapplicationcentricfunction.

Chapter11

1.Anetworkrouterhasafailurerateof0.02percentper1,000hours.Whatisthe

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

20/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

MTBFofthatcomponent?
Solution/Hint:
MTBFofnetworkrouter=1/Failurerate
=100*1000/0.02
=50,00,000hrs
2.TheITdepartmentofabankpromisescustomeraccesstothebankratetable
between9:00a.m.and4:00p.m.fromMondaytoFriday.Itupdatesthetable
everydayat8:00a.m.withafeedfromthemainframesystem.Theupdate
processtakes35minutestocomplete.OnThursday,duetoadatabasecorruption,
theratetablecouldnotbeupdated,andat9:05a.m.,itwasestablishedthatthe
tablehaderrors.Arerunoftheupdatewasdone,andthetablewasrecreatedat
9:45a.m.Verificationwasrunfor15minutes,andtheratetablebecameavailable
tothebankbranches.Whatwastheavailabilityoftheratetablefortheweekin
whichthisincidenttookplace,assumingtherewerenootherissues?
Solution/Hint:
Availability=totaluptime/totalscheduledtime
Totalscheduledtime=7hrs*5=35hrs
Totaluptime=34hrs(asonThursdayratetablewasmadeavailableat10:00am
insteadof9:00am)
Therefore,availabilityoftheratetablefortheweek=34/35
3.'Availabilityisexpressedintermsof9s."Explaintherelevanceoftheuseof9s
foravailability,usingexamples.
Solution/Hint:
Uptimeperyearisbasedontheexacttimelinessrequirementsofthe
service,thiscalculationleadstothenumberof"9s"representationfor
availabilitymetrics.
Forexample,aservicethatissaidtobe"five9savailable"isavailablefor
99.999percentofthescheduledtimeinayear(24x7x365).
Uptime(%)Downtime(%)DowntimeperDowntimeper
YearWeek
99.9990.0015.25minutes6sec
4.Provideexamplesofplannedandunplanneddowntimeinthecontextofdata
centeroperations.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

21/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Solution/Hint:
Examplesofplanneddowntime:installation/integration/maintenanceof
newhardware,softwareupgradesorpatches,takingbackups,application

anddatarestores,facilityoperations(renovationandconstruction),
refresh/migrationoftestingenvironmenttotheproductiondata
Examplesofunplanneddowntime:failurecausedbydatabasecorruption,
componentfailure,humanerrors
5.HowdoesclusteringhelptominimizeRTO?
Solution/Hint:
RTOof1hour:Clusterproductionserverswithcontrollerbaseddisk
mirroring.
RTOofafewseconds:Clusterproductionserverswithbidirectional
mirroring,enablingtheapplicationstorunatbothsitessimultaneously.
6.Howisthechoiceofarecoverysitestrategy(coldandhot)determinedinrelation
toRTOandRPO?
Solution/Hint:
RTOandRPOsmallhotsite
RTOandRPOlargecoldsite
7.Assumethestorageconfigurationdesignshowninthefollowingfigure:

Performthesinglepointoffailureanalysisforthisconfigurationandprovidean
alternateconfigurationthateliminatesallsinglepointsoffailure.
Solution/Hint:
Singlepointoffailure:host,switch,storagearray,HBA,arrayportand
path
AlternateconfigurationasshownbelowtoavoidSPF

Host

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

22/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Storage
Array

t.iuslhimiISkrhrh

RedundantFCSwitcherI

Chapter12

1.Amanufacturingcorporationusestapeasitsprimarybackupstoragemedia
throughouttheorganization:
FullbackupsareperformedeverySunday.
IncrementalbackupsareperformedMondaythroughSaturday.
Theenvironmentcontainsmanybackupservers,backingupdifferent
groupsofservers.
Theemailanddatabaseapplicationshavetobeshutdownduringthe
backupprocess.
Duetothedecentralizedbackupenvironment,recoverabilityisoften
compromised.Therearetoomanytapesthatneedtobemountedtoperformafull
recoverincaseofacompletefailure.Thetimeneededtorecoveristoolengthy.
Thecompanywouldliketodeployaneasytomanagebackupenvironment.They
wanttoreducetheamountoftimetheemailanddatabaseapplicationsare
unavailable,andreducethenumberoftapesrequiredtofullyrecoveraserverin
caseoffailure.
Proposeabackupandrecoverysolutiontoaddressthecompany'sneeds.Justify
howyoursolutionensuresthattheirrequirementswillbemet.
Solution/Hint:
Thesolutionshouldhavethefollowingelements:
Centralizedbackupserver

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

23/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Backupagentstoavoidtherequirementforcriticalapplicationstobe
shutdownduringthebackupprocess.
Useofacumulativebackuppolicyinsteadofincrementalbackups,
reducingtheamountoftaperequiredforafullrestore.
2.TherearelimitedbackupdevicesinafilesharingNASenvironment.Suggesta
suitablebackupimplementationthatwillminimizethenetworktraffic,avoidany
congestion,andatthesametimenotimpacttheproductionoperations.Justify
youranswer.
Solution/Hint:
ThisisachievedbytheintroductionofNDMP,topromotedatatransportbetween
NASandbackupdevices.Duetoitsflexibilityitisnolongernecessaryto
transportthedatathroughthebackupserver.Dataissentfromthefilerdirectlyto
thebackupdevice,whilemetadataissenttothebackupserverfortracking
purposes.Thissolutionmeetsthestrategicneedtocentrallymanageandcontrol
distributeddata,whileminimizingnetworktraffic.NDMP3wayisusefulwhen
therearelimitedbackupdevicesintheenvironment,enablingtheNASdevice
controllingthebackupdevicetoshareitwithotherNASdevices,byreceiving
backupdataviaNDMP.

3.Discussthesecurityconcernsinbackupenvironment.

Solution/Hint:
Majorsecurityconcerninbackupenvironmentisspoofingbackupserver,backupclientor
backupnodeidentitybyunauthorizedhost,togainaccesstobackupdata.Anotherconcernis
backuptapebeinglost,stolen,ormisplaced,especiallyifthetapescontainhighlyconfide
ntial
information.Backuptotapeapplicationsarealsovulnerabletosecurityimplicationsifthe
y
donotencryptdatawhilebackingup.Lastlybackupdatashreddingshouldalso
consider,byperformingsafetapedataerasureoroverwritingiftheynolonger
required.
4.Whatarethevariousbusiness/technicalconsiderationsforimplementingabackup
solution,andhowdotheseconsiderationsimpactthebackupsolution/
implementation?
Solution/Hint:
>RTOandRPOaretheprimaryconsiderationsinselectingandimplementinga

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

24/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

>specificbackupstrategy.
>Retentionperiod
>Backupmediatype
>Backupgranularity
>Timeforperformingbackupandavailablebackupwindow
>Locationandtimeoftherestoreoperation
>filecharacteristics(location,size,andnumberoffiles)anddatacompression
5.Whatisthepurposeofperformingoperationbackup,disasterrecovery,
andarchiving?
Solution/Hint:
Operationbackup:Torestoredataintheeventofdatalossorlogicalcorruptions
Disasterrecovery:Forrestoringdataatanalternatesitewhentheprimarysiteis
incapacitatedduetoadisaster.
Archiving:Forlongtermdataretention(regulatorycomplianceorbusiness
requirement)
6.Listandexplaintheconsiderationsinusingtapeasthebackuptechnology.What
arethechallengesinthisenvironment?
Solution/Hint:
Advantages:
Offsitedatacopy
Lowerinitialcost
Challenges:
Reliability
Restoreperformance(mount,loadtoready,rewind,dismounttimes)
SequentialAccess
HVACcontrolledenvironment
Shipping/handlingchallenges

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

25/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

7.Describethebenefitsofusing"virtualtapelibrary"over"physicaltapes."

Features

Tape

VirtualTape

OffsiteCapabilities

Yes

Yes

Reliability

Noinherent
protectionmethods

RAID,spare

Performance

Subjecttomechanical
operations,loadtimes

Fastersinglestream

Use

Backuponly

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

26/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Backuponly

Chapter13

1.Whatistheimportanceofrecoverabilityandconsistencyinlocalreplication?
Solution/Hint:
Recoverabilityenablesrestorationofdatafromthereplicastotheproduction
volumesintheeventofdatalossordatacorruption.
RecoverabilitymustprovideminimalRPOandRTOforresuming
businessoperationsontheproductionvolumes.
Consistencyensurestherestartabilityfromdata.Businessoperationcannot
resumefrominconsistentdata.
2.Describetheusesofalocalreplicainvariousbusinessoperations.
Solution/Hint:
Alternatesourceforbackup
Fastrecovery
Decisionsupportactivitiessuchasreporting
Testingplatform
Datamigration
3.Whataretheconsiderationsforperformingbackupfromalocalreplica?
Solution/Hint:
ThereplicashouldbeconsistentPITcopyofthesource
Replicashouldnotbeupdatedwhenthebackupwindowisopen
4.Whatisthedifferencebetweenarestoreoperationandaresynchronization
operationwithlocalreplicas?Explainwithexamples.
Solution/Hint:
Restoreoperation
Sourceissynchronizedwiththetargetdata
Forexample,ifsourcecontainsadatabasewherealogicaldatacorruption
occurs,thedatacanberecoveredbyattachingthelatestPITreplicaofthe
sourceandmakingincrementalrestoreoperation.
Resynchronizationoperation

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

27/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Targetissynchronizedwiththesourcedata
Forexample,aftertargetisdetachedfromthesource,bothsourceand
targetdataareupdatedbythehost.Aftersometimethetargetneedstobe
synchronizedwiththesourcedata.Forthat,targetisagainattachedtothe
sourceandincrementalresynchronizationisperformed.
5.A300GBdatabaseneedstwolocalreplicasforreportingandbackup.Thereare
constraintsinprovisioningfullcapacityforthereplicas.Ithasbeendetermined
thatthedatabasehasbeenconfiguredon15disks,andthedailyrateofchangein
thedatabaseisapproximately25percent.Youneedtoconfiguretwopointer

basedreplicasforthedatabase.Describehowmuchcapacityyouwouldallocate
forthesereplicasandhowmanysavevolumesyouwouldconfigure.
Solution/Hint:
75GBofsavevolumesarerequired
space/capacityisallocated,sinceitispointerbasedreplica
6.ForthesamedatabasedescribedinQuestion5,discusstheadvantagesof
configuringfullvolumemirroringiftherearenoconstraintsoncapacity.
Solution/Hint:
Infullvolumemirroring,thesourceneednotbeup/healthyforrecovery.
7.AnadministratorconfiguressixsnapshotsofaLUNandcreateseightclonesof
thesameLUN.Theadministratorthencreatesfoursnapshotsforeachclonethat
wascreated.Howmanyusablereplicasarenowavailable?
Solution/Hint:
Usablereplicas=6+8+32=46
8.RefertoQuestion5.Havingcreatedthetworeplicasforbackupandreporting
purposes,assumeyouarerequiredtoautomatetheprocessesofbackupand
reportingfromthereplicasbyusingascript.Developascriptinapseudo
language(youcanusethestandardTimeFindercommandsfortheoperationsyou
needtoperform)thatwillfullyautomatebackupandreporting.Yourscript
shouldperformalltypesofvalidationsateachstep(e.g.,validatingwhethera
synchronizationprocessiscompleteoravolumemountissuccessfullydone).
Solution/Hint:

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

28/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Createaflowchartinsimplelanguage.

Chapter14

1.Anorganizationisplanningadatacentermigration.Theycanonlyafforda
maximumoftwohoursdowntimetocompletethemigration.Explainhowremote
replicationtechnologycanbeusedtomeetthedowntimerequirements.Whywill
theothermethodsnotmeetthisrequirement?
Solution/Hint:
SANbasedremotereplicationtechnologycanbeusedtoavoidthe
downtimeasitprovidenondisruptivedatamigration.
Conventionalmethodsneeddowntimetomigratedatafromonelocation
toother.
2.ExplaintheRPOthatcanbeachievedwithsynchronous,asynchronous,anddisk
bufferedremotereplication.
Solution/Hint:
RPOthatcanbeachievedwithsynchronousoftheorderofSeconds
RPOthatcanbeachievedwithasynchronousoftheorderofMinutes
RPOthatcanbeachievedwithDiskbufferedremotereplicationofthe
orderofhours
3.Discusstheeffectsofabunkerfailureinathreesitereplicationforthefollowing
implementation:
Multihopsynchronous+diskbuffered
Multihopsynchronous+asynchronous
Multitarget
Solution/Hint:
Multihopsynchronous+diskbuffered
Sameassynchronous+asynchronous
Multihopsynchronous+asynchronous
Ifthereisadisasteratthebunkersiteorifthereisanetworklinkfailure

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

29/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

betweenthesourceandbunkersites,thesourcesitewillcontinueto
operateasnormalbutwithoutanyremotereplication.Thissituationis
verysimilartotwositereplicationwhenafailure/disasteroccursatthe
targetsite.Theupdatestotheremotesitecannotoccurduetothefailurein
thebunkersite.Hence,thedataattheremotesitekeepsfallingbehind;but
theadvantagehereisthatifthesourcefailsaswellduringthistime,
operationscanberesumedattheremotesite.RPOattheremotesite
dependsonthetimedifferencebetweenthebunkersitefailureandsource
sitefailure.
Multitarget
Afailureofthebunkerortheremotesiteisnotconsideredadisaster
becausenormaloperationscancontinueatthesourcesitewhileremote
disasterrecoveryprotectionisstillavailablewiththesitethathasnot
failed.Anetworklinkfailuretoeitherthebunkersite(target1)orthe

remotesite(target2)enablesbusinessoperationstocontinue
uninterruptedatthesourcesitewhileremotedisasterrecoveryprotection
isstillavailablewiththesitethatcanbereached.
4.Discusstheeffectsofasourcefailureinathreesitereplicationforthefollowing
implementation,andtheavailablerecoveryoptions:
Multihopsynchronous+diskbuffered
Multihopsynchronous+asynchronous
Multitarget
Solution/Hint:
Multihopsynchronous+diskbuffered
Sameassynchronous+asynchronous
Multihopsynchronous+asynchronous
Ifthereisadisasteratthesource,operationsarefailedovertothebunker
sitewithzeroornearzerodataloss.Butunlikethesynchronoustwosite
situation,thereisstillremoteprotectionatthethirdsite.TheRPObetween
thebunkerandthirdsitecouldbeontheorderofminutes.
Multitarget
Ifasourcesitedisasteroccurs,BCoperationscanbestartedwiththe
bunker(target1)ortheremotesite(target2).Undernormal
circumstances,thedataatthebunkersiteisthemorerecentandupto

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

30/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

date.Hence,operationsareresumedwiththebunkersitedata.Insome
circumstances,thedataontheremotesiteismorecurrentthanthedataon
thebunkersiteforexample,ifthenetworklinksbetweenthesourceand
bunkersiteshasfailed.Inthiscase,theworkloadwouldcontinueatthe
sourcesitewithjusttheasynchronousreplicationtotheremotesite.Ifthe
synchronouslinksaredownlongenough,thenthedataattheremotesite
wouldbemorecurrentthanthedataatthebunkersite.Ifasourcesite
disasteroccursatthistime,thedataontheremotesiteshouldbeusedto
recover.Thenetworklinksbetweenthebunkerandremotesitesare
activatedinthissituationtoperformincrementalsynchronization.The
RPOisnearzeroifthebunkersitedataisused,anditisinminutesifthe
remotesitedataisused.
5.Ahostgenerates8,000I/OsatpeakutilizationwithanaverageI/Osizeof32KB.
Theresponsetimeiscurrentlymeasuredatanaverageof12msduringpeak
utilizations.WhensynchronousreplicationisimplementedwithaFibreChannel
linktoaremotesite,whatistheresponsetimeexperiencedbythehostifthe
networklatencyis6msperI/O?
Solution/Hint:
Actualresponsetime=12+(6*4)+(32*1024/8000)=40.096
Where12ms=currentresponsetime
6msperI/O=latency
32*1024/8000=datatransfertime

Chapter15

1.Researchthefollowingsecurityprotocolsandexplainhowtheyareused:
Hint:Researchwork
2.Astoragearraydialsasupportcenterautomaticallywheneveranerrorisdetected.
Thevendor'srepresentativeatthesupportcentercanlogontotheservice
processorofthestoragearraythroughtheInternettoperformdiagnosticsand
repair.Discusstheimpactofthisfeatureinasecurestorageenvironmentand
providesecuritymethodsthatcanbeimplementedtomitigateanymalicious
attacksthroughthisgateway.
Solution/Hint:
Modificationattacks
Inamodificationattack,theunauthorizeduserattemptstomodify
informationformaliciouspurposes.Amodificationattackcantargetdata
atrestordataintransit.Theseattacksposeathreattodataintegrity.
DenialofService

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

31/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

DenialofService(DoS)attacksdeniestheuseofresourcesto
legitimateusers.Theseattacksgenerallydonotinvolveaccesstoor
modificationofinformationonthecomputersystem.Instead,theyposea
threattodataavailability.Theintentionalfloodingofanetworkorwebsite
topreventlegitimateaccesstoauthorizedusersisoneexampleofaDoS
attack.
Eavesdropping
Whensomeoneoverhearsaconversation,theunauthorizedaccess
iscalledEavesdropping.
Snooping
Thisreferstoaccessinganotheruser'sdatainanunauthorized
way.Ingeneral,snoopingandeavesdroppingaresynonymous.
Managementaccess
Managementaccess,whethermonitoring,provisioning,ormanaging
storageresources,isassociatedwitheverydevicewithinthestorage
network.MostmanagementsoftwaresupportssomeformofCLI,system
managementconsoleorawebbasedinterface.
SControllingadministrativeaccess
Controllingadministrativeaccesstostorageaimsto
safeguardagainstthethreatsofanattackerspoofingan
administrator'sidentityorelevatinganotheruser'sidentityand
privilegestogainadministrativeaccess.Bothofthesethreats
affecttheintegrityofdataanddevices.Toprotectagainstthese
threats,administrativeaccessregulationandvariousauditing
techniquesareusedtoenforceaccountability.
fProtectingthemanagementinfrastructure
Protectingthemanagementnetworkinfrastructureisalso
necessary.Controlstoprotectthemanagementnetwork

infrastructureincludeencryptingmanagementtraffic,enforcing
managementaccesscontrols,andapplyingIPnetworksecurity
bestpractices.ThesebestpracticesincludetheuseofIProuters
andEthernetswitchestorestricttraffictocertaindevicesand
managementprotocols.
3.DevelopachecklistforauditingthesecurityofastorageenvironmentwithSAN,
NAS,andiSCSIimplementations.Explainhowyouwillperformtheaudit.
Assumethatyoudiscoveratleastfivesecurityloopholesduringtheauditprocess.
Listthemandprovidecontrolmechanismsthatshouldbeimplementedto
eliminatethem.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

32/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Solution/Hint:

SAN,NAS,iSCSI

Servers(Production,management,backup,thirdparty,NAS)
oWhatdataorobjectwasaccessed/attemptedtoaccess?
oWhatactionwasperformed?
oWhenwasexecuted?
oWhoauthorizedandperformedtheaction?
oNFS/CIFSaccess(sharedfiles)
Fabric/IPnetwork
oPhysicalandlogicalaccess
Switches
oPhysicalandlogicalaccess
oZoning
Storage
oWhichvolumewasaccessed/attemptedtoaccess?
oWhatactionwasperformed?
oWhenwasexecuted?
oWhoauthorizedandperformedtheaction?
oLUNmasking
oProvisioning
oUpgrade/replacement
oHandlingofphysicalmedia

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

33/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Process

Collectlogandcorrelate
Analyzeaccessandchangecontrol
oProductionandDRsite
oBackupandreplication
oThirdpartyservice
Checkalertingmechanism
Checksecuritycontrols

oPhysical
oAdministrative
oTechnological
Identifysecuritygap
Documentationandrecommendation

Fivesecurityloopholes

1.Authenticationallowsmultiplelogin
2.Nofirewall
3.Noauthenticationattheswitchlevel
4.Noencryptionforinflightdata
5.Poorphysicalsecurityatthedatacenter
Control

1.Restrictioninnumberofloginattempt,twopartpassword

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

34/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

2.Implementfirewalltoblockinappropriateordangeroustraffic
3.Authenticateusers/administratorsofFCswitchesusingRADIUS(Remote
AuthenticationDialInUserService),DHCHAP(DiffieHellmanChallenge
HandshakeAuthenticationProtocol),etc.
4.Encryptingthetrafficintransit
5.Increasesecuritymanpowerandimplementbiometricsecurity

Chapter16

1.DownloadEMCControlCentersimulatorandtheaccompanyinglabguidefrom
http://education.emc.com/ismbookandexecutethestepsdetailedinthelabguide.
Labexercise
2.Aperformanceproblemhasbeenreportedonadatabase.Monitoringconfirms
thatat12:00a.m.,aproblemsurfaced,andaccesstothedatabaseisseverely
affecteduntil3:00p.m.everyday.Thistimeslotiscriticalforbusinessoperations
andaninvestigationhasbeenlaunched.Areportingprocessthatstartsat12:00
p.m.contendsfordatabaseresourcesandconstrainstheenvironment.What
monitoringandmanagementprocedures,tools,andalertswouldyouestablishto
ensureaccessibility,capacity,performance,andsecurityinthisenvironment?
Hints:
Monitoring:
Settingupmonitoringandreportingforaccessibility,capacity,
performanceandsecurityonproductionandreplicationdata
MonitoringandmanagementtoolssuchasECCPerformancemanager
needtobedeploytogatherallperformancestatisticsdata(historicaldata)
Performanceanalysisperformanceconstraintisbecauseoftheresource
Management:
Requirement:Databaseneedtobereplicateforreportingprocess
SBasedonrequirementandinfrastructurechosenreplication
softwareneedtobedeploy
SProvisionstoragecapacityforreplication
fConfiguretheenvironmentforaccessingreplicateddata(need
configurationathost,networkandstorage)

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

35/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

SConfigureadequatecapacitybasedonpolicyondataretention
andchange
SConfiguresecurityforreplicateddata
3.ResearchSMISandwriteatechnicalpaperondifferentvendorimplementations
ofstoragemanagementsolutionsthatcomplywithSMIS.
Researchwork

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

36/36

You might also like