0% found this document useful (0 votes)
55 views22 pages

Network and Its Storage: Presented by Ratna Deep

The document discusses various standards related to computer networking. It describes IEEE 802.11 standards for wireless LANs including 802.11, 802.11a, 802.11b, 802.11e, 802.11g, 802.11n, 802.11ac, and 802.11ad. It also discusses the IEEE 802.1 standard for networking architecture, the IEEE 802.5 Token Ring standard, T1 carrier systems, InfiniBand, network attached storage, and various RAID levels including RAID 0, 1, 4, 5 and hybrid RAIDs.

Uploaded by

ratnadeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views22 pages

Network and Its Storage: Presented by Ratna Deep

The document discusses various standards related to computer networking. It describes IEEE 802.11 standards for wireless LANs including 802.11, 802.11a, 802.11b, 802.11e, 802.11g, 802.11n, 802.11ac, and 802.11ad. It also discusses the IEEE 802.1 standard for networking architecture, the IEEE 802.5 Token Ring standard, T1 carrier systems, InfiniBand, network attached storage, and various RAID levels including RAID 0, 1, 4, 5 and hybrid RAIDs.

Uploaded by

ratnadeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

NETWORK AND

ITS STORAGE
PRESENTED BY RATNA DEEP
IEEE 802.11
• IEEE 802.11 refers to the set of standards that define communication for
wireless LANs
• IEEE 802.11 is the set of technical guidelines for implementing Wi-Fi
• 802.11 — Applies to wireless LANs and provides 1 or 2 Mbps transmission in
the 2.4 GHz band
• 802.11a — an extension to 802.11 that applies to wireless LANs and provides
up to 54-Mbps in the 5GHz band
• 802.11b — an extension to 802.11 that applies to wireless LANS and provides
11 Mbps transmission in the 2.4 GHz band
• 802.11e— a wireless draft standard that defines
the Quality of Service support for LANs, and is an enhancement to the
802.11a and 802.11b wireless LAN (WLAN) specifications
• 802.11g — applies to wireless LANs and is used for transmission over short
distances at up to 54-Mbps in the 2.4 GHz bands
• 802.11n—The real speed would be 100 Mbit/s (even 250 Mbit/s in PHY level),
and so up to 4-5 times faster than 802.11g.
• 802.11ac—The 802.11ac specification operates only in the 5 GHz frequency range
and features support for wider channels (80MHz and 160MHz)
• 802.11ac Wave 2—it help increase theoretical maximum wireless speeds for the
spec to 6.93 Gbps.
• 802.11ad — 802.11ad is a wireless specification under development that will
operate in the 60GHz frequency band and maximum transfer rate of up to 7Gbps .
• 802.11ah— it is the first Wi-Fi specification to operate in frequency bands below
one gigahertz (900 MHz), and it has a range of nearly twice that of other Wi-Fi
technologies.
• 802.11r — It also called Fast Basic Service Set (BSS)
• 802.1X— 802.1X is an IEEE standard for port-based Network Access Control that
allows network administrators to restricted use of IEEE 802 LAN service access
points to secure communication between authenticated and authorized devices.
IEEE 802.1
• IEEE 802.1 is a working group of the IEEE 802 project of the IEEE Standards
Association
• It is concerned with:
• 802 LAN/MAN architecture
• internetworking among 802 LANs, MANs and wide area networks
• 802 Link Security
• 802 overall network management
• protocol layers above the MAC& LLC layers
IEEE 802.5: TOKEN RING NETWORK
• The principle used in the token ring network is that a token is circulating in
the ring and whichever node grabs that token will have right to transmit the
data.
• Whenever a station wants to transmit a frame it inverts a single bit of the 3-
byte token which instantaneously changes it into a normal data packet
• Because there is only one token, there can at most be one transmission at a
time.
• since the token rotates in the ring it is guaranteed that every node gets the
token with in some specified time
• To distinguish the normal data packets from token (control packet) a special
sequence is assigned to the token packet
• When any node gets the token it first sends the data it wants to send, then
recirculates the token.
T1-CARRIER SYSTEM

• The T1 (or T-1) carrier is the most commonly used digital transmission service
• it consists of 24 separate channels using pulse code modulation (PCM) signals
with time-division multiplexing (TDM) at an overall rate of 1.544 million bits
per second (Mbps)
• T1 lines originally used copper wire but now also include optical and wireless
media
• A T1 Outstate System has been developed for longer distances between cities.
INFINI BAND

• it is a computer-networking communications standard used in high-


performance computing that features very high throughput and very
low latency
• It is used for data interconnect both among and within computers
• Infini Band is also used as either a direct or switched interconnect between
servers and storage systems, as well as an interconnect between storage
systems
• Infini Band uses a switched fabric topology, as opposed to early shared
medium Ethernet
• InfiniBand transmits data in packets of up to 4 KB
NETWORK ATTACHED STORAGE
• Network-attached storage (NAS) is a type of dedicated file storage device that
provides local-area network with file-based shared storage through a
standard Ethernet connection.
• Each NAS resides on the LAN as an independent network node and has its
own IP address
• An important benefit of NAS is its ability to provide multiple clients on the
network with access to the same files
• Today, when more storage capacity is required, NAS appliances can simply be
outfitted with larger disks or clustered together to provide both vertical
scalability and horizontal scalability
RAID ARCHITECTURE
RAID

• “Redundant Arrays of Inexpensive Disks” is a technique which makes use of a


combination of multiple disks instead of using a single disk for increased
performance, data redundancy or both
• Data redundancy, although taking up extra space, adds to disk reliability
• This means, in case of disk failure, if the same data is also backed up onto
another disk, we can retrieve the data and go on with the operation
• On the other hand, if the data is spread across just multiple disks without the
RAID technique, the loss of a single disk can affect the entire data
KEY EVALUATION POINTS FOR A RAID SYSTEM
• Reliability: How many disk faults can the system tolerate?
• Availability: What fraction of the total session time is a system in uptime
mode, i.e. how available is the system for actual use?
• Performance: How good is the response time? How high is the throughput
(rate of processing work)? Note that performance contains a lot of
parameters and not just the two.
• Capacity: Given a set of N disks each with B blocks, how much useful capacity
is available to the user?
• RAID is very transparent to the underlying system. This means, to the host
system, it appears as a single big disk presenting itself as a linear array of
blocks
DIFFERENT RAID LEVELS

RAID-0 (STRIPING)

• Also known as “Striping”


• Data is striped across the disks in the array
• Each subsequent block is written to a different disk
• In the figure, blocks “0,1,2,3” form a stripe
• Instead of placing just one block into a disk at a time, we can work with two
(or more) blocks placed into a disk before moving on to the next one.
Evaluation:
• Reliability: 0
There is no duplication of data. Hence, a block once lost cannot be recovered.
• Capacity: N*B
The entire space is being used to store data. Since there is no duplication, N
disks each having B blocks are fully utilized
RAID 1 (MIRRORING)

• More than one copy of each block is stored in a separate disk


• Thus, every block has two (or more) copies, lying on different disks
• RAID 0 was unable to tolerate any disk failure. But RAID 1 is capable of reliability.
Evaluation:
• Assume a RAID system with mirroring level 2.
• Reliability: 1 to N/2
1 disk failure can be handled for certain, because blocks of that disk would have duplicates on
some other disk. If we are lucky enough and disks 0 and 2 fail, then again this can be handled
as the blocks of these disks have duplicates on disks 1 and 3. So, in the best case, N/2 disk
failures can be handled.
• Capacity: N*B/2
Only half the space is being used to store data. The other half is just a mirror to the already
stored data.
RAID-4 (BLOCK-LEVEL STRIPING WITH DEDICATED PARITY)

• Instead of duplicating data, this adopts a parity-based approach

• In the figure, we can observe one column (disk) dedicated to parity.


• Parity is calculated using a simple XOR function. If the data bits are 0,0,0,1 the parity bit is
XOR(0,0,0,1) = 1. If the data bits are 0,1,1,0 the parity bit is XOR(0,1,1,0) = 0
• A simple approach is that even number of ones results in parity 0, and an odd number of
ones results in parity 1.
• Assume that in the above figure, C3 is lost due to some disk failure
• hen, we can recompute the data bit stored in C3 by looking at the values of all the other
columns and the parity bit
• This allows us to recover lost data.
Evaluation:
• Reliability: 1
RAID-4 allows recovery of at most 1 disk failure (because of the way parity works). If more
than one disk fails, there is no way to recover the data.
• Capacity: (N-1)*B
One disk in the system is reserved for storing the parity. Hence, (N-1) disks are made available
for data storage, each disk having B blocks.
RAID-5 (BLOCK-LEVEL STRIPING WITH DISTRIBUTED
PARITY)
• This is a slight modification of the RAID-4 system where the only difference is that the parity
rotates among the drives.

• In the figure, we can notice how the parity bit “rotates”.


• This was introduced to make the random write performance better.
• Evaluation:
• Reliability: 1
RAID-5 allows recovery of at most 1 disk failure (because of the way parity
works). If more than one disk fails, there is no way to recover the data. This is
identical to RAID-4.
• Capacity: (N-1)*B
Overall, space equivalent to one disk is utilized in storing the parity. Hence,
(N-1) disks are made available for data storage, each disk having B blocks
OTHER RAID LEVELS

• RAID-2 consists of bit-level striping using a Hamming Code parity.


• RAID-3 consists of byte-level striping with a dedicated parity.
• These two are less commonly used.
RAID-6 is a recent advancement which contains a distributed double parity,
which involves block-level striping with 2 parity bits instead of just 1
distributed across all the disks.
• There are also hybrid RAIDs, which make use of more than one RAID levels
nested one after the other, to fulfil specific requirements.
THANK YOU

You might also like