Term
List six logical design factors. |
|
Definition
1. Security
2. Scalability
3. Availability
4. Topology
5. Scope of Design
6. Heterogeneous Connectivity |
|
|
Term
List four methods of making a storage network more secure. |
|
Definition
1. Lun Masking
2. Zoning
3. Lun Mapping
4. Volume Management |
|
|
Term
Describe the two major factors used to define a customers scalability needs. |
|
Definition
1. Number of servers needed
2. Amount of storage being added |
|
|
Term
Describe two design considerations for achieving a high availablity storage network. |
|
Definition
1. A server must have a minimum of two HBAs to allow for path failover.
2. Determine cost of downtime.
Note: 99.999% equals approximately 5 minutes of downtime per year and 99.99% equals approximately one hour per year |
|
|
Term
Define the most common types of heterogenous connectivity. |
|
Definition
1. SCSI over fibre channel (FCP)
2. FICON attached mainframe server/storage
3. IP over fibre channel
4. Fibre channel over IP |
|
|
Term
Describe the advantages of a point-to-point topology. |
|
Definition
1. High performance full-duplex system interconnect
2. Extends distance beyond a direct attach SCSI model
3. Specific application optimized |
|
|
Term
Describe the disadvantages of a point-to-point topology. |
|
Definition
1. Limited connectivity
2. Does not provide scalability |
|
|
Term
Describe arbitrated loop topology. |
|
Definition
Maximum of one point-to-point connection at a time. Shared bandwidth. |
|
|
Term
Describe fabric loop topology. |
|
Definition
A loop connected to a fabric. |
|
|
Term
List the advantages of a fabric loop implementation. |
|
Definition
1. Low cost
2. Non-shared bandwidth |
|
|
Term
List the advantages of using a core to edge design. |
|
Definition
1. Increased availability
3. Minimizing post costs and scalability |
|
|
Term
List three characteristics of the core. |
|
Definition
1. Must feature high reliability 99.999% availability.
2. Design with a limited consistent diameter
3. Fully redundance components |
|
|
Term
Describe the edge characteristics. |
|
Definition
Being able to aggregiate between ISLs. |
|
|
Term
Full mesh provides all servers access to their associated ________ _______ with a maximum of ____ hop. |
|
Definition
Full mesh provides all servers access to their associated storage port with a maximum of one hop. |
|
|
Term
Explain core to edge connectivity to include each device and where it is optimally connected. |
|
Definition
Full mesh connectivity is often used in the core. The edge switches are then connected into the mesh. Connect high availability servers and storage devices into the core. |
|
|
Term
List the core to edge design guidelines. |
|
Definition
1. Control the diameter of enterprise connectivity.
2. Aviod or minimize hops
3. Identify the layer which servers / storage belong.
4. Plan interactions based on the analysis of traffic load, flow, and behavior |
|
|
Term
With a hybrid fabric loop topology, ______ is supported and there is full ________ between initiators and targets. This topology is still a _______ architecture with no concurrent multiplexing. |
|
Definition
With a hybrid fabric loop topology, zoning is supported and there is full bandwidth between initiators and targets. This topology is still a blocking architecture with no concurrent multiplexing. |
|
|
Term
Using a high port count switch (ie. McData 6064) gives all ports full ___________ access to each other with no __________. |
|
Definition
Using a high port count switch (ie. McData 6064) gives all ports full bandwidth access to each other with no bottlenecks. |
|
|
Term
Using cascaded switches to get a higher port count can be done, however, the cost of doing so is a loss within the fabric of ______ to ______. |
|
Definition
Using cascaded switches to get a higher port count can be done, however, the cost of doing so is a loss within the fabric of ports to ISLs. |
|
|