Q5
Q5
web
texts
movies
audio
software
image
logo
search
upload
personSIGN IN
ABOUT
CONTACT
BLOG
PROJECTS
HELP
DONATE
JOBS
VOLUNTEER
PEOPLE
1 . A hospital uses an application that stores patient X-ray data in the form of larg
e
binary objects in an Oracle database. The application is hosted on a UNIX server,
and the hospital staff accesses the X-ray records through a Gigabit Ethernet
backbone. An EMC CLARiiON storage array provides storage to the UNIX
server, which has 6 TB of usable capacity. Explain the core elements of the data
center. What are the typical challenges the storage management team may face in
meeting the service-level demands of the hospital staff? Describe how the value
of this patient data might change over time.
Solution/Hint:
After that the requirement of the patient data is very less, so it could be
moved to CAS.
• Suggest and provide the details for a strategy for the design department
that optimizes the storage infrastructure by using ILM.
• Explain how you will use "tiered storage" based on access frequency.
• Detail the hardware and software components you will need to implement
your strategy.
Solution/Hint:
• Classify the data according to access frequency or value and use tiered
storage that optimizes the infrastructure cost and performance by using
ILM.
- FC SAN, LAN
Server
Software:
- ILM tool
- CAS - Centera
3. The marketing department at a mid-size firm is expanding. New hires are being
added to the department and they are given network access to the department's
files. IT has given marketing a networked drive on the LAN, but it keeps reaching
capacity every third week. Current capacity is 500 MB (and growing), with
hundreds of files. Users are complaining about LAN response times and capacity.
As the IT manager, what could you recommend to improve the situation?
Solution/Hint:
- NAS
Solution/Hint:
Chapter 2
High availability
seek time
The average I/O size of an application is 64 KB. The following specifications are
available from the disk manufacturer: average seek time = 5 ms, 7,200 rpm,
transfer rate = 40 MB/s. Determine the maximum IOPS that could be performed
with the disk for this application. Taking this case as an example, explain the
relationship between disk utilization and IOPS.
Solution/Hint:
The disk service time (Rs) is a key measure of disk performance; and
Rs along with disk utilization rate (U) determines the I/O response time
for applications.
The total disk service time (Rs) is the sum of seek time (E), rotational
latency (L), and the internal transfer time (X):
Rs=E+L+X
6. Consider a disk I/O system in which an I/O request arrives at the rate of 80 IOPS.
The disk service time is 6 ms.
a. Compute the following: Utilization of I/O controller, Total response time,
Average queue size, and Total time spent by a request in a queue.
= 6/(1-0.48)= 11.5 ms
= (0.48) 2 /(l-0.48)
= 0.44
7. Refer to Question 6 and plot a graph showing the response time and utilization,
considering 20 percent, 40 percent, 60 percent, 80 percent, and 100 percent
utilization of the I/O controller. Describe the conclusion that could be derived
from the graph.
Solution/Hint:
1.
Utilization = 20 % = 0.2
Response time
7.5 ms
2.
I tili/ation = 40
% = 0.4
Response time =
10 ms
3.
Utilization = 60
% = 0.6
Response time
15 ms
4.
1 tiliAition = 80
% = 0.8
Response time
30 ms
5.
LUili/ation =100
% = 1
Response time =
infinity
70 -i
^ , , , , , , , ,
10 20 30 40 50 60 70 80 90
Utilization (%)
Chapter 3
RAID 1 provides protection against disk failure and not a solution for data
recovery due to disaster.
2. Why is RAID not an option for data protection and high availability?
Solution/Hint:
Solution/Hint:
RAID
Random
Sequential
5
Very good for random reads. Fair
for random write. Slower due to
parity overhead.
1/0
6. A 10K rpm drive is rated to perform 130 IOPS, and a 15K rpm drive is rated to
perform 180 IOPS for an application. The read/write ratio is 3:1. Compute the
RAID-adjusted IOPS for the 10K and 15K drives for RAID 1, RAID 5, and RAID
6.
7. An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typical
users at a peak of 1 IOPS each, with a read/write ratio of 2: 1 . It is estimated tha
t
the application also experiences an overhead of 20 percent for other workloads.
Calculate the IOPS requirement for RAID 1, RAID 3, RAID 5, and RAID 6.
Solution/Hint:
[(2000 + 2000)*0.9] = 3600 host based IOPS for 3000 users during peak
activity period
8. For Question 7, compute the number of drives required to support the application
in different RAID environments if 10K rpm drives with a rating of 130 IOPS per
drive were used.
Solution/Hint:
For RAID 1
For RAID 3
For RAID 5
For RAID 6
3600*2/3 + (2*1/3*3600)
3600*2/3 + (4*1/3*3600)
3600*2/3 + (4*1/3*3600)
3600*2/3 + (6*1/3*3600)
4800 IOPS
7200 IOPS
7200 IOPS
9600 IOPS
Chapter 4
Solution/Hint:
2. Which application benefits the most by bypassing the write cache and Why?
Solution/Hint:
3. An Oracle database uses a block size of 4 K for its I/O operation. The application
that uses this database primarily performs a sequential read operation. Suggest
and explain the appropriate values for the following cache parameters: cache page
size, cache allocation (read versus write), pre-fetch type, and write aside cache.
Solution/Hint:
Solution/Hint:
Setup is managed using host-based tools, such as the host OS, which makes
storage management tasks easy for small and medium enterprises.
Requires fewer management tasks, and less hardware and software elements
to set up and operate.
In a wide SCSI, the device IDs from 8 to 15 have the highest priority, but the
entire sequence of wide SCSI IDs has lower priority than narrow SCSI IDs.
Therefore, the overall priority sequence for a wide SCSI is 7, 6, 5, 4, 3, 2, 1, 0,
15, 14, 13, 12, 11, 10, 9, and 8.
3. Why is SCSI performance superior to that of IDE/ AT A? Explain the reasons from
an architectural perspective.
Solution/Hint:
4. Research blade server architecture and discuss the limitations of DAS for this
architecture.
5. What would you consider while choosing serial or parallel data transfer in a DAS
implementation? Explain your answer and justify your choice.
Solution/Hint:
SCSI, explain how the CPU will perform I/O operations with a particular device.
Solution/Hint:
As the three disks are connected in a daisy chain cn and tn number will be
the same for all the disks
Chapter 6
(i) Soft zoning is also called WWN zoning and it is preferred when user need
flexibility to physically move attached nodes between switch portsre cable the
SAN, that may take place during switch maintenance and repair without
reconfiguring the zone information. This is possible because the WWN is static to
the node port.
(ii) Hard zoning is also called port zoning, it is convenient when there is a need
for hardware replacement as WWN is uniquely associated with a hardware.
Solution/Hint::
To log on to the fabric, a node sends a FLOGI frame with the World Wide Node
Name (WWNN) and World Wide Port Name (WWPN) parameters to the login
service at the well-known FC address FFFFFE. In turn, the switch accepts the
login and returns an Accept (ACC) frame with the assigned FC address for the
device. Immediately after the FLOGI, the N_port registers itself with the local
name server on the switch, indicating its WWNN, WWPN, and assigned FC
address.
3. Seventeen switches, with 16 ports each, are connected in a mesh topology. How
many ports are available for host and storage connectivity if you create a high-
availability solution?
Solution/Hint:
- Total ports = 17 * 16 = 272
Solution/Hint::
Flow control is used to define and regulate the pace of flow of data frames between
sender and receiver during data transmission. FC technology uses two flow-control
mechanisms: buffer-to-buffer credit (BBCredit) and end-to-end credit (EE Credit).
3. If (BB Credit > 0), transmitter sends a frame, and decrements the count per
transmitted frame.
4. An RRDY (Receiver Ready) is sent from the receiving port to the transmitting
port for every available buffer on the receiving side.
5. The transmitter increments the count by 1 for each R RDY it receives from the
receiver. The transmitting port maintains a count of free receiver buffers.
5. Upon a link reset, the BB Credit value resets to the value negotiated upon login.
EE_Credit
Non-dedicated connection
- BBcredit
1 . List and explain the considerations for capacity design for both CPU and storage
in a NAS environment.
Solution/Hint:
Solution/Hint:
3. Explain how the performance of NAS can be affected if the TCP window size at
the sender and the receiver are not synchronized.
Solution/Hint:
This will affect the NAS performance as this may lead to re-transmission of
data, lower bandwidth utilization, performance degradation of the network,
intermittent connectivity, and data link errors.
4. Research the use of baby jumbo frames and how it affects NAS performance.
Solution/Hint:
6. A NAS implementation configured jumbo frames on the NAS head, with 9,000 as
its MTU. However, the implementers did not see any performance improvement
and actually experienced performance degradation. What could be the cause?
Research the end-to-end jumbo frame support requirements in a network.
Solution/Hint:
Jumbo frames are used at the end point (NAS Head) with MTU of 9000
Check if the intermediate network uses a different MTU size (e.g. 1500 ).
This can cause the router to drop packets which then have to re-transmit at the
TCP layer.
Chapter 8
1 . How does iSCSI handle the process of authentication? Research the available
options.
Solution/Hint::
2. List some of the data storage applications that could benefit from an IP SAN
solution.
Solution/Hint:
5. Research the iSCSI capabilities in a NAS device; provide use case examples.
Hint: Research work
Solution/Hint:
As the company doesn't have storage infrastructure and the network they have
this case.
Solution/Hint:
The solution can be to segregate FCIP traffic into a separate virtual fabric, to
provide additional stability,
Solution/Hint:
iSCSI PDU size =1460 bytes (contain payload and additional header segment)
Jumbo frame size of 9000MTU out of which payload is 8960
Jumbo Frames allows a significant amount of increased payload to be
delivered in each iSCSI PDU.
Solution/Hint:
FC supports frame size of 2148 byte
Chapter 9
According to ILM strategy value of information changes over its lifecycle, when
created value of information is very high and it is frequently accessed and
changed, hence placed in a high performance costly storage. With the time its
value drops and it becomes fixed content which is rarely accessed, but still holds
place in costly storage space. For the cost optimization less accessed data should
be moved to archived and leave the costly space for high value data. CAS is a
solution for archived data, which not only provide cost benefit but also provide
faster access and reliable storage to fixed content.
2. To access data in a SAN, a host uses a physical address known as a logical block
address (LBA). A host using a CAS device does not use (or need) a physical
address. Why?
Solution/Hint:
Unlike file-level and block-level data access that use file names and the
physical location of data for storage and retrieval, CAS stores data and its
attributes as an object. The stored object is assigned a globally unique
address known as a content address which is derived from the actual binary
representation of stored data.
3. The IT department of a departmental store uses tape to archive data. Explain 4-5
major points you could provide to persuade the IT department to move to a CAS
solution. How would your suggestions impact the IT department?
Solution/Hint:
Better data protection and disposition: All fixed content is stored in CAS once
and is backed up with a protection scheme.
Chapter 10
Solution/Hint:
VLAN stand for virtual LAN which has same attributes as of physical LAN, but allows
hosts to be grouped together even if they are not located on the same network switch.
With the use of network reconfiguration software, ports on the layer 2 switch can be
logically grouped together, forming a separate, Virtual Local Area Network. VLANs hel
p
to simplify network administration. Ports in a VLAN can be limited to only the number
needed for a particular network. This allows unused ports to be used in other VLANs.
Through software commands, additional ports can be added to an existing VLAN if
further expansion is needed. If a machine needs to be moved to a different IP network
,
the port is reassigned to a different VLAN and there is no need for the physical
movement of cables.
Solution/Hint:
Chapter 11
1 . A network router has a failure rate of 0.02 percent per 1 ,000 hours. What is the
MTBF of that component?
Solution/Hint:
= 100*1000/0.02
= 50, 00,000 hrs
2. The IT department of a bank promises customer access to the bank rate table
between 9:00 a.m. and 4:00 p.m. from Monday to Friday. It updates the table
every day at 8:00 a.m. with a feed from the mainframe system. The update
process takes 35 minutes to complete. On Thursday, due to a database corruption,
the rate table could not be updated, and at 9:05 a.m., it was established that the
table had errors. A rerun of the update was done, and the table was recreated at
9:45 a.m. Verification was run for 15 minutes, and the rate table became available
to the bank branches. What was the availability of the rate table for the week in
which this incident took place, assuming there were no other issues?
Solution/Hint:
Solution/Hint:
Year Week
Solution/Hint:
6. How is the choice of a recovery site strategy (cold and hot) determined in relatio
n
to RTO and RPO?
Solution/Hint:
Perform the single point of failure analysis for this configuration and provide an
alternate configuration that eliminates all single points of failure.
Solution/Hint:
Single point of failure: host, switch, storage array, HBA, array port and
path
Host
Storage
Array
Redundant FC Switcher I
Chapter 12
• The e-mail and database applications have to be shut down during the
backup process.
Propose a backup and recovery solution to address the company's needs. Justify
how your solution ensures that their requirements will be met.
Solution/Hint:
Solution/Hint:
Solution/Hint:
Major security concern in backup environment is spoofing backup server, backup client
or
backup node identity by unauthorized host, to gain access to backup data. Another con
cern is
backup tape being lost, stolen, or misplaced, especially if the tapes contain highly
confidential
information. Backup-to-tape applications are also vulnerable to security implications
if they
do not encrypt data while backing up. Lastly backup data shredding should also
consider, by performing safe tape data erasure or overwriting if they no longer
required.
imp lementation?
Solution/Hint:
-> RTO and RPO are the primary considerations in selecting and implementing a
-> file characteristics (location, size, and number of files) and data compression
Solution/Hint:
Operation backup: To restore data in the event of data loss or logical corruptions
Disaster recovery: For restoring data at an alternate site when the primary site is
incapacitated due to a disaster.
Archiving: For long term data retention (regulatory compliance or business
requirement)
6. List and explain the considerations in using tape as the backup technology. What
are the challenges in this environment?
Solution/Hint:
Advantages:
- Reliability
- Sequential Access
7. Describe the benefits of using "virtual tape library" over "physical tapes."
Features
Tape
Virtual Tape
Offsite Capabilities
Yes
Yes
Reliability
No inherent
protection methods
RAID, spare
Performance
Subject to mechanical
operations, load times
Use
Backup only
Backup only
Chapter 13
Consistency ensures the restart ability from data. Business operation can not
resume from inconsistent data.
3. What are the considerations for performing backup from a local replica?
Solution/Hint:
Solution/Hint:
Restore operation
For example, after target is detached from the source, both source and
target data are updated by the host. After sometime the target needs to be
synchronized with the source data. For that, target is again attached to the
source and incremental resynchronization is performed.
5. A 300 GB database needs two local replicas for reporting and backup. There are
constraints in provisioning full capacity for the replicas. It has been determined
that the database has been configured on 15 disks, and the daily rate of change in
the database is approximately 25 percent. You need to configure two pointer-
based replicas for the database. Describe how much capacity you would allocate
for these replicas and how many save volumes you would configure.
Solution/Hint:
Solution/Hint:
In full volume mirroring, the source need not be up/healthy for recovery.
Solution/Hint:
- Usable replicas = 6 + 8 + 32 = 46
8. Refer to Question 5. Having created the two replicas for backup and reporting
purposes, assume you are required to automate the processes of backup and
reporting from the replicas by using a script. Develop a script in a pseudo
language (you can use the standard Time Finder commands for the operations you
need to perform) that will fully automate backup and reporting. Your script
should perform all types of validations at each step (e.g., validating whether a
synchronization process is complete or a volume mount is successfully done).
Solution/Hint:
Chapter 14
Solution/Hint:
Solution/Hint:
order of hours
3. Discuss the effects of a bunker failure in a three-site replication for the follow
ing
implementation:
• Multitarget
Solution/Hint:
Multitarget
4. Discuss the effects of a source failure in a three-site replication for the follow
ing
implementation, and the available recovery options:
• Multitarget
Solution/Hint:
If there is a disaster at the source, operations are failed over to the bunker
site with zero or near-zero data loss. But unlike the synchronous two-site
situation, there is still remote protection at the third site. The RPO between
the bunker and third site could be on the order of minutes.
Multitarget
5. A host generates 8,000 I/Os at peak utilization with an average I/O size of 32 KB.
The response time is currently measured at an average of 12 ms during peak
utilizations. When synchronous replication is implemented with a Fibre Channel
link to a remote site, what is the response time experienced by the host if the
network latency is 6 ms per I/O?
Solution/Hint:
Chapter 15
1 . Research the following security protocols and explain how they are used:
Hint: Research work
Solution/Hint:
Modification attacks
Eavesdropping
3. Develop a checklist for auditing the security of a storage environment with SAN,
NAS, and iSCSI implementations. Explain how you will perform the audit.
Assume that you discover at least five security loopholes during the audit process.
List them and provide control mechanisms that should be implemented to
eliminate them.
Solution/Hint:
• Fabric/ IP network
• Switches
• Storage
o LUN masking
o Provisioning
o Upgrade/replacement
o Physical
o Administrative
o Technological
2. No firewall
Control
Chapter 16
1 . Download EMC ControlCenter simulator and the accompanying lab guide from
http://education.emc.com/ismbook and execute the steps detailed in the lab guide.
Lab exercise
Monitoring:
Management:
and change
S Configure security for replicated data
Research work