Contact www.solvedcare.
com for best and lowest cost solution or email
solvedcare@gmail.com
Emerging Technologies V1A
Assignment A
Q1.) What are the benefits of using multiple HBAs on a host?
Q2.) Why do formatted disks have less capacity than unformatted disks?
Q3.) How can a block-level virtualization implementation be used as a data
migration tool?
Explain how data migration will be accomplished and discuss the advantages of using
this
method for storage. Compare this method to traditional migration methods.
Q4.) The marketing department at a mid-size firm is expanding. New hires are being
added to the
department and they are given network access to the departments files. IT has
given marketing a
networked drive on the LAN, but it keeps reaching capacity every third week.
Current capacity is
500 gigabytes (and growing), with hundreds of files. Users are complaining about
LAN response
times and capacity. As the IT manager, what could you recommend to improve the
situation?
Q5.) An application specifies a requirement of 200 GB to host a database and other
files. It also
specifies that the storage environment should support 5,000 IOPS during its peak
processing
cycle. The disks available for configuration provide 66 GB of usable capacity, and
the
manufacturer specifies that they can support a maximum of 140 IOPS. The application
is
response time sensitive and disk utilization beyond 60 percent will not meet the
response time
requirements of the application. Compute and explain the theoretical basis for the
minimum
number of disks that should be configured to meet the requirements of the
application.
Q6 A large company is considering a storage infrastructureone that is scalable and
provides
high availability. More importantly, the company also needs performance for its
mission-critical
applications. Which storage topology would you recommend (SAN, NAS, IP SAN) and
why?
Q7). An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000
typical users at a
peak of 1 IOPS each, with a read/write ratio of 2:1. It is estimated that the
application also
experiences an overhead of 20 percent for other workloads. Calculate the IOPS
requirement for
RAID 1, RAID 3, and RAID 5
Q8). To access data in a SAN, a host uses a physical address known as a logical
block address
(LBA). A host using a CAS device does not use (or need) a physical address. Why?
Assignment B
Case Study
A hospital uses an application that stores patient X-ray data in the form of large
binary objects in
an Oracle database. The application is hosted on a UNIX server, and the hospital
staff accesses
the X-ray records through a Gigabit Ethernet backbone. Storage array provides
storage to the
UNIX server, which has 6 terabytes of usable capacity.
(a) Explain the core elements of the data center. What are the typical challenges
the
storage management team may face in meeting the service-level demands of the
hospital
staff?
(b) Describe how the value of this patient data might change over time.
Assignment C
1 What is the most basic level of storage
a. SAN
b. DAS
c. NAS
d. ISCSI
2 A NAS solution is most appropriate for what type of data environment
a. Secured Access
b. Shared access
c. Remote access
d. Parallel access
3 Fileystem is created using command.....
(A): Mkfs
(B): Format
(C): Fsck
(D): defrag
4 Every File or directory has unique.... ?
(A): Inode
(B): Directory
(C): Pathname
(D): Inode & pathname
5 Dirty buffer cache contains..... ?
(A): Invalid data
(B): New valid data
(C): File
(D): Inode
6 Following are some of the file sharing protocols ...
(A): Telnet
(B): NFS & CIFS
(C): FTP
(D): HTTP
7. File access protocols operate in which layer of the OSI model
(A): Application
(B): Session
(C): Transport
(D): All of these
8 Identify a network file protocol in the below mentioned set.
(A): FC
(B): SCSI
(C): SAN
(D): CIFS
9 What will be used by SAN to provide connectivity between hosts and storage?
(A): FC or iSCSI
(B): SCSI
(C): SAN
(D): CIFS
10 In FC structure which layer maps block I/O SCSI commands into FC FC-4
(A): FC-4
(B): FC-1
(C): FC-0
(D): None of the these
11 What are the major benefits of SAN?
(A): Centralized backup
(B): Storage consolidation
(C): LAN-less backup
(D): All of these
12 Which data storage technology offers the best performance?
(A): SAN
(B): DAS
(C): NAS
(D): ISCSI
13 Identify the data storage technology used in the below data center?
(A): SAN
(B): DAS
(C): NAS
(D): None of the these
14 Which two RAID types use parity for data protection?
(A): RAID 1 & 2
(B): RAID 4 & 5
(C): RAID 1 & 0
(D): RAID 3 &1
15 Which one of these is characteristic of RAID 5?
(A): Distributed parity
(B): No Parity
(C): All parity in a single disk
(D): Double Parity
16 Which of the following combinations can support RAID 05?
(A): 2 sets with 3 disks each
(B): 2 sets with 2 disks each
(C): 4 sets with 3 disks each
(D): 4 sets with 1 disk each
17 What is the minimum number of disks required for RAID1?
(A): 1
(B): 2
(C): 4
(D): 5
18 Which of the following raid levels provides maximum usable disk space?
(A): RAID 1
(B): RAID 0
(C): RAID 5
(D): RAID 6
19 The mean time to failure of a single disk is 200000 hrs. If an array of disks is
using 5 such disks, the mttf of the array is
(A): 200000 hrs
(B): 40000 hrs
(C): 1000000 hrs
(D): Can not be determined
20 Name the mechanism which provides the highest level of data protection
(A): RAID 0
(B): RAID 1
(C): RAID 6
(D): RAID 2
21 Which command is used to view NFS shared directories?
(A): share
(B): shareall
(C): sharetab
(D): dfshares
22 Which file would you edit to mount an NFS filesystem at system boot time?
(A): /etc/fstab
(B): /etc/dfs/dfstab
(C): /etc/vfstab
(D): /etc/nfstab
23 CIFS runs over the following protocols:
(A): TCP/IP
(B): FTP
(C): SNMP
(D): DNS
24 Which of the below is component of SAN
(A): Ethernet switch
(B): Fibre Switch
(C): Ethernet Card
(D): None of the these
25 What components on SAN can be virtualized
(A): Disk
(B): Tape Drive
(C): Tape Library
(D): All the these
26 Which is the correct statement
(A): Virtualization cloud presents itself as host to the host
(B): Virtualization cloud presents itself as targets to the host
(C): None of A or B
(D): Both A and B
27 A SAN network can have.. ?
(A): 1 FC switch
(B): 2 FC switch
(C): There can be many FC switches
(D): No FC switch
28 Which of the following is true?
(A): SAS is compatible with SATA physical layer
(B): SAS is not parallel SCSI
(C): SAS has multiple channels per port
(D): All the these
29 SAS Domain can have:
(A): 16256 devices in a single domain
(B): 128 expanders per domain
(C): 128 phys per expander
(D): All the these
30 Which of the following is false?
(A): SAS devices can have narrow ports and/or wide ports
(B): Expander port is a type of SAS port
(C): Each SAS port has a SAS address
(D): All the these
31 Which of the following layer is present in a SAS port?
(A): Transport layer
(B): Phy layer
(C): Port layer
(D): All the these
32 Which of the following protocol has slowest speed?
(A): SATA
(B): SAS
(C): FC-AL
(D): All the these
33 This is a repository for the storage, management, and dissemination of data in
which the mechanical, lighting, electrical and computer systems are designed for
maximum energy efficiency and minimum environmental impact.
(A): Storage lab
(B): Data Center
(C): Data warehouse
(D): Fabric
34 This is the process of assigning storage, usually in the form of server disk
drive space, in order to optimize the performance of a storage area network.
(A): Storage Provisioning
(B): Data mining
(C): Storage assignment
(D): Data Warehousing
35 Simply stated, these are large boxes that hold lots of hard disks.
(A): Host
(B): Tape library
(C): Switch
(D): Disk Array
36 This consists of the precautions taken so that the effects of a disaster will be
minimized.
(A): Data retrieval
(B): Disaster recovery
(C): Archive
(D): Replication
37 This is the practice of collecting computer files that have been packaged
together for backup, to transport to some other location, for saving away from the
computer so that more hard disks can be made available, or for some other purpose.
(A): Backup
(B): Archive
(C): Migration
(D): Compression
38 Which of the following company manufactures Raid arrays ?
(A): Hyundai
(B): Honda
(C): Hitachi
(D): Mitsubishi
39 An FC jammer-analyzer can be used to.. ?
(A): Capture all FC frames
(B): Tamper FC packets
(C): I/O performance
(D): All the these
40 Network level virtualization in a SAN fabric can be implemented by having
virtualization engine running in
(A): HBA
(B): FC switch
(C): Raid array
(D): All the these
Contact www.solvedcare.com for best and lowest cost solution or email
solvedcare@gmail.com