Term
|
Definition
Data is a collection of raw facts from which conclusions can be drawn.
Letters, photographs, movies, word documents, etc. are all examples of data. |
|
|
Term
What are the two catagories of data? |
|
Definition
Structured and Unstructured |
|
|
Term
|
Definition
Structured data is organized in rows and columns in a rigidly defined format so that applications can retrieve and process it efficiently. |
|
|
Term
Describe Unstructured Data |
|
Definition
Data is unstructured if its elements cannot be stored in rows and columns, and is therefore difficult to query and retrieve by business applications.
Examples of unstructured data are images, PDFs, documents, audio / video, email attachments, x-rays, etc. |
|
|
Term
|
Definition
Information is the intelligence and knowledge derived from data.
Examples of intelligence could be the buying habits of customers and the health histories of patients. |
|
|
Term
What is the value of information to a business? |
|
Definition
- Identifying new business opportunities.
- Identifying patterns that lead to changes in existing business.
- Creating a competitive advantage.
|
|
|
Term
How is the type of storage to be used determined? |
|
Definition
The type of storage used is based on the type of data and the rate at which it is created and used. |
|
|
Term
|
Definition
Redundant Array of Independent Disks. RAID is used in all storage architectures such as DAS, SAN and so on. |
|
|
Term
|
Definition
Direct Attached Storage. Connects directly to the server (host) or a group of servers in a cluster. Storage can either be internal or external to the server. External DAS alleviated the challenges of limited internal storage capacity. |
|
|
Term
|
Definition
Storage Area Network. This is a dedicated, high performance Fibre Channel (FC) network to facilitate Block Level communication between servers and storage. Storage is partitioned and assigned to a server for accessing its data. |
|
|
Term
What are the benefits of SAN? |
|
Definition
SAN offers scalability, availability, performance and cost benefits compared to DAS. |
|
|
Term
|
Definition
Network Attached Storage. Dedicated storage for File Serving applications. Connects to an existing communication network (LAN) and provided file access to heterogeneous clients. |
|
|
Term
What are the benefits of NAS?
|
|
Definition
NAS offers higher availability, scalability, performance and cost benefits compared to general purpose file servers. |
|
|
Term
|
Definition
Internet Protocol Storage Area Network. One of the latest evolutions in storage architecture. IP SAN is a convergence of technologies used in SAN and NAS. It provides Block Level communication across a LAN or WAN resulting in greater consolidation and availability of data. |
|
|
Term
What are the five core elements of Data Center Infrastructure? |
|
Definition
- Application / User Interface
- Database (More commonly referred to as a Database Management System)
- Server and Operating System
- Network
- Storage Array
|
|
|
Term
What are the seven key requirements for data center elements? |
|
Definition
- Performance
- Availability
- Scalability
- Security
- Data Integrity
- Capacity
- Manageability
|
|
|
Term
What are the four activities within the Information Life Cycle Management Process? |
|
Definition
- Classifying data
- Implementing Policies
- Managing the Environment
- Organizing Storage Resources
**Classifying Data is the most difficult activity in the process** |
|
|
Term
What are the benefits of implementing Information Life Cycle Management? |
|
Definition
- Improved Utilization
- Simplified Management
- Simplified Backup and Recovery
- Maintaining Compliance
- Lower Cost of Total Ownership
|
|
|
Term
What are the three most basic components of a storage system environment? |
|
Definition
- Host
- Connectivity (Network)
- Storage Array
|
|
|
Term
What are the physical components of a host? |
|
Definition
-
CPU
-
Storage
-
Input / Output (I/O) Device
|
|
|
Term
What are the three methods of communication between I/O devices and the host? |
|
Definition
- User to Host (Keyboard, Mouse, etc.)
- Host to Host (via Network Interface Card)
- Host to Storage Device (via Host Bus Adapter)
|
|
|
Term
What are the logical components of a host? |
|
Definition
- Applications
- Operating System
- File System
- Volume Manager
- Device Drivers
**Note: Host Bus Adaptors interface on the back end** |
|
|
Term
What are the logical components of a host? |
|
Definition
-
Application
-
Operating System
|
|
|
Term
What are the two application data access classifications? |
|
Definition
- Block Level (Data stored and retrieved in Blocks specifying the LBA)
- File Level (Data stored and retrieved by specifying the name and path of the files)
|
|
|
Term
|
Definition
A defined Format for communication between sending and receiving devices. |
|
|
Term
What are the three major communication protocols for system components? |
|
Definition
- Tightly Connected Entities
- Directly Attached Entities
- Network Connected Entities
|
|
|
Term
Give three storage media options |
|
Definition
- Magnetic Tape
- Optical Disks
- Disk Drives
|
|
|
Term
What are the key components of a disk drive?
|
|
Definition
- Platter
- Spindle
- Read / Write Head
- Actuator Arm Assembly
- Controller
**All of these items are housed in the Head Disk Assembly** |
|
|
Term
What are the two ways of accessing data on a platter? |
|
Definition
- Cylender, Head, Sector (CHS)
- Logical Block Addressing (LBA)
|
|
|
Term
What are the things that affect disk drive performance? |
|
Definition
- Electromechanical Device
- Disk Service Type
|
|
|
Term
What are the components that comprise service time?
|
|
Definition
- Seek Time
- Rotational Latency
- Data Transfer Rate
|
|
|
Term
What are the three seek time specifications? |
|
Definition
- Full Stroke
- Average
- Track to Track
|
|
|
Term
|
Definition
|
|
Term
|
Definition
- Increased Capacity
- Higher Availability
- Increased Performance
|
|
|
Term
What are the components of a RAID Array? |
|
Definition
- Host
- RAID Controller
- RAID Array
- Physical Array
- Logical Array
- Hard Disks
|
|
|
Term
What are the common RAID Levels? |
|
Definition
|
|
Term
|
Definition
A striped array with no fault tolerance. |
|
|
Term
|
Definition
|
|
Term
|
Definition
- Combines the benefits of multiple RAID configurations.
- 0+1: Striping & Mirroring. Commonly Called a Mirrored Stripe. The process of striping across HDDs is performed then the entire stripe is mirrored.
- 1+0: Mirroring & Striping. Refferred to as a Striped Mirror. The incoming data is first mirrored and then both copies of data are striped across multiple HDDs.
|
|
|
Term
|
Definition
- Parity is a method of protecting striped data from HDD failure without the cost of mirroring.
- An additional HDD is added to the strip width to hold parity.
- Parity is a mathematical construct that allows re-creation of the missing data.
- It is a redundancy check that ensures full protection of data without maintaining a full set of duplicate data.
|
|
|
Term
|
Definition
- Stripes data for high performance and uses parity for improved fault tolerance.
- Parity information is stored on a dedicated disk drive so that data can be re-constructed it a drive fails.
- ALWAYS reads and writes complete stripes of data across all disks.
- Provides good bandwidth for the transfer of large volumes of data.
- Used in applications that involve large amounts of sequential data such as video streaming.
|
|
|
Term
|
Definition
- Stripes data for high performance.
- Uses parity for improved fault tolerance.
- Unlike RAID 3, disks in RAID 4 can be accessed independently so that specific data elements can be read or written on a single disk without read or write of the entire stripe.
|
|
|
Term
|
Definition
- Drive (strips) are independently accessible
- Parity is distributed across all disks
- Preferred for messaging, data mining, medium performance media serving and Relational Database Management System (RDBMS) implementations in which Database administrators (DBAs) optimize data access.
|
|
|
Term
|
Definition
- Dual Parity
- Distributes parity across all disks
- Can survive two disk failures
- Rebuild operation may take longer due to the presence of two parity sets.
|
|
|
Term
|
Definition
Referrs to a spare HDD in a RAID array that temporarily replaces a failed HDD of a RAID set. |
|
|
Term
What is EMC^2's Best practice concerning Hot Spares? |
|
Definition
For every two Disk Array Enclosures (DAE) one Hot Spare will be used. |
|
|
Term
What is an intelligent Storage System? |
|
Definition
RAID Arrays that are:
-
Highly optimized for I/O processing
-
Hove large amounts of cache for improving I/O performance
-
Have operating environments that provide:
-
Intelligence for managing cache
-
Array resource allocation
-
Connectivity for heterogeneous hosts
-
Advanced array based local and remote replication options
|
|
|
Term
What are the benefits of an intelligent storage system? |
|
Definition
- Increased capacity
- improved performance
- easier data management
- improved data availability & protection
- Enhanced business continuity & support
- Improved security and access control
|
|
|
Term
What are the components of an intelligent storage system? |
|
Definition
- Front end
- Cache
- Back end
- Physical disks
|
|
|
Term
What is the function of the 'Front End' in an intelligent storage system? |
|
Definition
The front end provides the interface between the storage system and the host. It consists of two components:
- Front End Ports
- Front End Controllers
|
|
|
Term
What is the function of a front end port? |
|
Definition
The front end ports enable hosts to connect to the intelligent storage system.
Each front end port has processing logic that executes the appropriate transport protocol, such as SCSI, FC or iSCSI for storage connections. |
|
|
Term
What is the function of a front end controller? |
|
Definition
The front end controllers route data to and from cache via the internal data bus.
When cache receives write data, the controller sends and acknowledgement message back to the host.
Controllers optimize I/O processing by using command queuing algorithms. |
|
|
Term
|
Definition
Command queuing is a technique implemented on front end controllers. It determines the execution order of received commands and can reduce unnecessary drive head movements and improve disk head movements and improve disk performance. |
|
|
Term
What are the most commonly used command queuing algorithms? |
|
Definition
- First in First Out (FIFO): Default algorithm where commands are executed in the order in which they are received.
- Seek Time Optimization: Commands executed based on optimizing read /write head movements which may result in reordering of commands.
- Access Time Optimization: Commands are executed based on the combination of seek time optimization and an analysis of rotational latency for optimal performance.
|
|
|
Term
|
Definition
Cache is semiconductor memory where data is placed temporarily to reduce the time required to service I/O requests from the host. |
|
|
Term
Describe the ways that cache is implemented in write operations |
|
Definition
- Write Through: Data is placed into the cache and immediately written to disk, and an acknowledgement is sent to the host.
|
|
|
Term
What is a Read Cache Hit? |
|
Definition
If the requested data is found in the cache it is called a read cache hit or a read hit and the data is sent to the host without any disk operation. |
|
|
Term
|
Definition
If the requested data is not found in the cache, it is called a cache miss and the data must be read from disk. |
|
|
Term
Describe two cache management algorithms implemented by intelligent storage systems to proactively maintain a free set of pages. |
|
Definition
- Least Recently Used (LRU): An algorithm that continuously monitors data access in cache and identifies the cache pages that have not been accessed for a long time.
- Most Recently Used (MRU): An algorithm that is the converse of LRU. In MRU the pages that have been accessed most recently are freed up or marked for reuse.
|
|
|
Term
Describe 'Watermarking' in cache management |
|
Definition
Flushing is the process of commuting data from the cache to the disk. On the basis of the I/O access rate and pattern, high and low levels called Watermarks are set in cache to manage the flushing process. This process provides headroom in the write cache for improved performance. There are three watermarks:
- 100%
- High Water Mark
- Low Water mark
|
|
|
Term
|
Definition
Idle Flushing occurs continuously, at a modest rate, when the cache utilization level is between the high and low watermark. |
|
|
Term
Describe 'High Watermark Flushing'
|
|
Definition
Activated when cache utilization hits the high watermark. The system dedicates some additional resources to flushing. This type of flushing has minimal impact on host I/O processing. |
|
|
Term
Describe 'Forced Flushing' |
|
Definition
Forced Flushing occurs in the event of a large I/O burst when the cache reaches 100% of its capacity, which significantly affects the I/O response time. In Forced Flushing, dirty pages are forcibly flushed to disk. |
|
|
Term
Describe two methods of Cache Data Protection |
|
Definition
The risk of losing data held in the cache can be mitigated by:
|
|
|
Term
In an intelligent storage system, what is the 'back end'? |
|
Definition
The back end provides the interface between the cache and physical disks. From the cache data is sent to the back end and then routed to the destination disk. the back end consists of two components:
- Back End Ports:
- Back End Controllers: Communicates with the disks when performing reads and writes and also provides additional, but limited temporary data storage.
|
|
|
Term
|
Definition
Physical drives or groups of RAID Protected drives can be logically split into volumes known as Logical Unit Numbers (LUN). The use of LUNs improves disk utilization by only allocating the portion of disk space needed by the host thereby leaving the remainder of disk space to be allocated to other hosts. |
|
|
Term
|
Definition
- LUN Masking is an access control mechanism that provides data access control by defining which LUNs a host can access.
- LUN masking is typically implimented at the front end controller.
- LUN Masking ensures that volume access by servers is controlled appropriately, preventing unauthorized or accidental use in a distributed environment.
- Usually implimented on staorage arrays.
|
|
|
Term
Describe the capabilities of a high end storage array |
|
Definition
**Also referred to as Active - Active Arrays**
-
Large storage capacity
-
Huge cache to service host I/Os
-
Fault tolerance architecture
-
Multiple front end ports and support to interface protocols
-
high scalability
-
ability to handle large amounts of concurrent I/Os
-
Designed for large enterprises
**Symmetrix is an example of a high end storage system** |
|
|
Term
Describe the capabilities of a Midrange storage array
|
|
Definition
**Also referred to as Active - Passive Arrays**
-
Host can perform I/Os to LUNs only through active paths
-
Other paths remain passive until active path fails
-
Have two controllers, each with cache, RAID controllers and disk drive interfaces
-
Designed for small and medium enterprises
-
less scalable than a high end array
**CLARiiON is an example** |
|
|
Term
Describe the characteristics of the CLARiiON CX-4 |
|
Definition
- Support for Ultraflex technology
- Scalable up to 960 disks
- Supports flash drives
- Supports RAID 0,1, 1+0, 3, 5, 6
- Supports up to 16GB of cache per controller (2 controllers = 32GB total)
- Supports storage based local and remote data replication via SnapView (Local) and MirrorView(Remote)
- CLARiiON Messaging Interface (CMI)
- Stanby power supply
- FLARE Storage Operating Environment
|
|
|
Term
Describe the characteristics of the Symmetrix DMX-4 |
|
Definition
- Incrementally scalable to 2,400 disks
- Dynamic global cache memory (16GB - 512GB)
- Advanced processing power
- High data processing bandwidth (up to 128 GB/s)
- Supports RAID 1, 1+0 (AKA 10 for mainframe), 5, 6
- Storage based local and remote replication through TimeFinder (Local) and SRDF (Remote)
- Utilizes Direct Matrix Architecture
- Each memory director connects to each front end director
- Uses the Enginuity OS
|
|
|
Term
Describe the characteristics of the Symmetrix VMAX Series |
|
Definition
- 96 to 2,400 drives up to 2 PB (3x more usable capacity)
- One to eight VMAX engines
- Upt to 1TB global memory
- Twice the host ports (FC, iSCSI, Gb Ethernet, FICON) up to 128 ports
- 8Gb/s FC, FICON and FC SRDF
- Twice the back end connections for flash
- Quad core 2.3GHz processors to provide more than twice the IOPS
|
|
|
Term
|
Definition
Direct Attached Storage is an architecture where storage connects directly to servers.
- Uses Block Level protocol for access
- Internal HDD and tape libraries are examples of DAS
***Can be internal or external*** |
|
|
Term
|
Definition
Internal DAS is internally connected to the host by a serial or parallel bus.
- The physical bus has distance limitations and can only be sustained over short distances for high speed connectivity.
- Most internal buses can only support a limited number of devices
|
|
|
Term
|
Definition
In External DAS Architectures, the server connects directly to the external storage device. In most cases, communication between the host and the storage device takes place over SCSI or FC protocol.
- External DAS overcomes distance and device count limitations of Internal DAS
|
|
|
Term
What are the benefits of DAS? |
|
Definition
- Ideal for data provisioning
- Quick deployment for small environments
- Simple to deploy
- Reliable
- Low capital expense
- low complexity
|
|
|
Term
What are the four DAS connectivity options? |
|
Definition
- ATA and SATA
- SCSI
- FC
- Buss and Tag (primarily for external mainframe)
|
|
|
Term
What are the two types of DAS Management? |
|
Definition
- Internal: Host provides disk partitioning and file system layout.
- External: Array based management, lower TCO for managing data and storage infrastructure.
|
|
|
Term
What are some of the challenges of DAS? |
|
Definition
- Scalability is limited
- Number of connectivity ports to hosts
- number of addressable disks
- distance limitations
- Downtime is required for maintenance with internal DAS
- Limited ability to share resources
- Array front end port, storage space
- resulting in islands of over and underutilized storage pools
|
|
|
Term
What is the definition of SCSI? |
|
Definition
Small Computer System Initiative
- SCSI is all about an initiator sending a command to a target.
|
|
|
Term
What does SCSI communication involve? |
|
Definition
- SCSI Initiator Device: Issues commands to SCSI target devices.
- SCSI Target Device: Executes commands issued by initiators.
|
|
|
Term
What are the versions of SCSI? |
|
Definition
SCSI -1: Defined cable length, signaling characters, commands, and transfer modes, Uses 8-bit narrow bus (supoports 8 devices)
SCSI -2: Defined common Set (CCS), 16 bit, improved performance and reliability
SCSI -3: Latest version, comprised different but related standards, rather than one large document.
*Can support between 8 and 16 devices
|
|
|
Term
|
Definition
Used to uniquely number (0-15) identify hosts and devices. the UNIX naming convention is used to identify a disk and the three identifiers - initiator ID, target ID, and a LUN.
|
|
|
Term
Structure and Organization of FC Data
|
|
Definition
Exchange Operation (conversation): enables two N_ports to identify and manage a set of information units.
Sequence (Sentence): refers to a contiguous set of frames that are sent from one port to another.
Frame (word): the fundamental unit of data transfer at Layer 2. *Each frame can contain up to 2,112 bytes of payload
|
|
|
Term
What SCSI ID has the highest priority? |
|
Definition
|
|
Term
|
Definition
- SCSI ports are physical connectors that the SCSI cable plugs into for communication with a SCSI device.
- SCSI device may contain initiator port, target port and target / initiator port.
- To cater to service requests from multiple devices, a SCSI device may also have multiple ports.
|
|
|
Term
|
Definition
World Wide Names: a unique 64-bit identifier which is static to the port. Used to physically identify ports.
Like a NIC's MAC Address
Every HBA has one
Burned into an array port |
|
|
Term
|
Definition
Storage Area Network. Is a dedicated high speed network for block level access.
- Carries data between servers (AKA Hosts) and storage devices through FC switches.
- Provides Block Level data access.
- Consolidates resources centralizing storage and management
- Scalability (theoretical limit 15 million nodes)
- Secure access
|
|
|
Term
|
Definition
is dynamically assigned during fabric login. Used to communicate between nodes within SAN. Like an IP Address on a NIC
Address format: 24 bit, dynamically assigned |
|
|
Term
What are the components of SAN?
|
|
Definition
A SAN consists of three basic components:
-
Servers
-
Network infrastructure
-
Storage
These components can be further broken down into the following key elements:
-
Node Ports
-
Cabling
-
Interconnecting Devices (such as FC switches or hubs)
-
Storage Arrays
-
SAN Management Software
|
|
|
Term
Fibre Channel Protocol Stack (5) |
|
Definition
FC-4: Upper Layer protocol
FC-2: Transport Layer
FC-1: transmission layer
FC-0: physical interface
FC-3 has not been implemented |
|
|
Term
Fiber Channel Architecture Overview |
|
Definition
- used channel technology
- high performance with low protocol overheads
- FCP is SCSI-3 over FC network
- Has five layers
|
|
|
Term
What is Fibre Channel SAN and its components? |
|
Definition
moves blocks of data over fibre optic cables using SCSI commands between initiator and target.
Components: director/switch, host (node), storage (node), cables, management software to control ports/switches. |
|
|
Term
|
Definition
Fabric Log In: between N-Port to F_port
Between node and switch (switch/array or initiator/target)
1st in process
|
|
|
Term
What are the two types of optical cables? |
|
Definition
- Single Mode: Can carry single beams of light with a distance of up to 10 KM.
- Multi Mode:Can carry multiple beams of light simultaneously at a distance of up to 500M.
(Note: multi mode cable can suffer from modal dispersion) |
|
|
Term
|
Definition
Port Login : between N_Port to N_Port (initiator to target initial contact)
2nd in process |
|
|
Term
|
Definition
Process login (figure out how to talk by a common language - SCSI)
3rd in series
|
|
|
Term
What are the different types of SAN connectors? |
|
Definition
Node Connectors:
Patch Panel Connectors
|
|
|
Term
|
Definition
Inter Switch Links - connects two or more FC Switches to each other using E-Ports.
Used to transfer host to storage data as well as the fabric management traffic from one switch to another
Also one of the scaling mechanisms in SAN connectivity |
|
|
Term
What are the different port types on SAN? |
|
Definition
N_Port (node port): end point in the fabric to the switch.
NL_Port (node loop port): supports arbitrated loop topology. Goes into a HUB.
E_Port (expansion port): FC port that forms the connection between two FC Switches.
F_Port (fabric port): a port on a switch that connects an
FL_Port (public loop): a fabric port that participates in FC-AL. Connected to the NL_Ports on an FC-AL loop.
G_Port (generic port): can operate as an E_Port or an F_Port and determines its functionality automatically during initialization. |
|
|
Term
What are the three commonly used SAN Interconnecting Devices? |
|
Definition
- Hubs:Â Physically connect nodes in a logical loop or a physical star topology.
- Switches: More intelligent than hubs and directly route data from one physical port to another. Â
- Directors:Â Departmental switch.
|
|
|
Term
Â
Â
Â
Describe the SAN Interconnectivity Option called FC-SW? |
|
Definition
Fibre Channel switched fabric (FC-SW) - provides interconnected devices, dedicated bandwidth, and scalability.
Â
Also know as fabric connect. |
|
|
Term
Â
Â
Describe the SAN Interconnectivity Option called FC-AL? |
|
Definition
Fibre Channel Arbitrated Loop (FC-AL):Â devices are attached to a shared loop. Devices on the loop must arbitrate to gain control of the loop. At any given time, only ONE device can perform I/O operations on the loop. |
|
|
Term
Â
Â
What is the simpliest form of SAN Interconnectivity? |
|
Definition
Point to Point - two devices are connected directly to each other (like DAS). |
|
|
Term
Describe SAN Management Software? |
|
Definition
- A suite of tools used in a SAN to manage the interface between host and storage arrays.
- Provides integrated management of SAN environment.
- Web based GUI or CLI
|
|
|
Term
Â
Â
What is Core-Edge Fabric?
Â
&
Â
What are the two types? |
|
Definition
two types of switch tiers - the edge tier (comprised of switches) and the core tier (enterprise directors)
Â
Single Core: all hosts are connected to the edge tier and the core tier.
Â
Dual Core: can be expanded to include more core switches - enables load balancing. |
|
|
Term
Describe the Fabric Topology Mesh and name the different types |
|
Definition
each switch is connected directly to the other switches by using ISLs. Promotes enhanced SAN connectivity.
Â
Full Mesh: every switch is connected to another switch in the topology - appropriate for a smaller # of switches (4).
Â
Partial Mesh: several hops or ISLs may be required for traffic to reach its destination. Can cause latency issues. |
|
|
Term
Describe the term Zoning in Fabric Management |
|
Definition
is an FC switch funtion that enables nodes within the fabric to be logically segmented into groups that can communicated with each other.
Â
Access control done on the switch or fabric vs. LUN masking which is done on the array
Â
Setting up a relationship between initiator and target. |
|
|
Term
What are the Storage Over IP protocol Options?
|
|
Definition
- iSCSI:Â
- Is SCSI over IP.Â
- Has IP encapsulation
- Hardware-based gateway to Fibre Channel Storage
- Used to connect servers
- FCIP:Â
- Fibre Channel-to-IP bridge / tunnel
- Point to point
- Fibre Channel end points
**Used in DR Implementations** |
|
|
Term
|
Definition
- An IP base protocol that establishes and manages connections between storage, hosts and bridge devices over IP.Â
- Carries block level data over IP based networks, including Ethernet networks and the Internet.Â
- Is built on the iSCSI protocol by encapsulating SCSI commands and data in order to allow these encapsulated commands and data blocks to be transported using TCP/IP packets
|
|
|
Term
Describe the components of a Zone |
|
Definition
Members: nodes within the SAN that can be included in a zone
Â
Zones: comprise a set of members
Â
Zone Set: comprise of a group of zones that can be activated or deactivated as a single entity fabric
Â
*Only one zone set per fabric can be active at a time |
|
|
Term
Describe the Types of Zoning |
|
Definition
sets up the relationship to set what initiator can see what target
Port Zoning (hard zoning): uses FC addressing of the physical ports to define the zones (most secure - EMC general Practice).
Â
Â
Â
Â
Â
WWN zoning (soft zoning): uses world wide names to define zones. Â
Â
.
|
|
|
Term
What are the components of iSCSI? |
|
Definition
- iSCSI host initiators:
- Host computer using a NIC or iSCSI HBA to connect to storage
- iSCSI initiator software may need tobe installed
- iSCSI Targets:Â
- Storage array with embedded iSCSI capable network port
- FC-iSCSI bridge
- LAN for IP Storage Network:
- Interconnected Ethernet switches and / or routers
|
|
|
Term
What is NAS and what are the benefits? |
|
Definition
Network attached storage. It is an IP based file-sharing device attached to a local area network.
- Efficiency
- Flexibility
- Centralized storage
- Simplifies management
- Scalable
- High Availability
- Secure
|
|
|
Term
What are the iSCSI host connectivity options |
|
Definition
|
|
Term
What are the component of NAS? |
|
Definition
- NAS Head (CPU and Memory)
- NIC Card(s)
- Operating System to manage NAS functions
- NFS (unix) and CIFS (microsoft)
- Industry-standard storage protocols
- Storage Array
|
|
|
Term
Describe the NAS File Sharing Protocols |
|
Definition
CIFS - Common Internet File System Protocol
- Microsoft Environment based on the server message block protocol
NFS - Network File System Protocol
|
|
|
Term
Describe the NAS I/O Process |
|
Definition
- requester packages the I/O request into TC/IP to a remote file system which is handled by the NAS
- The NAS converts the I/O into an appropriate physical storage request (block level I/O)
- When the data is returned from the physical storage pool, the NAS processes and repackages it into a file protocol response.
- The NAS packages this response into TCP/IP again and forwards it to the client through the network.
|
|
|
Term
What are the three iSCSI Topologies? |
|
Definition
- Native Connectivity: Do not have and FC components; perform all communication over IP.
- Bridged Connectivity:Â Enable the co-existance of FC with IP by providing iSCSI to FC bridging functionality.
- Combining FCP and Native Connectivity
|
|
|
Term
Describe the types of NAS Implementations |
|
Definition
Integrated NAS: - has all components of NASÂ in a single enclosure. Connects to the IP network to provides connectivity to the clients and service the file I/O requests.
Â
Gateway NAS: has independent NAS head and one or more storage arrays (2 protocols) |
|
|
Term
What are the two ways in which iSCSI discovery takes place? |
|
Definition
- Send Targets Discovery:Â
- Initiator is mutually configured with the target
- Internet Storage Name Service (iSNS):Â
- Initiators and targets automatically register themselves with iSNS server
- iSNS is a client / server model
|
|
|
Term
Describe how Managing an Integrated System (NAS Connectivity) works |
|
Definition
Both the NAS component and the storage array are managed via NAS management software |
|
|
Term
Describe managing a Gateway System (NAS) |
|
Definition
NAS component managed via NAS Management software and the storage array is managed via array management software |
|
|
Term
What are the two types of iSCSI names? |
|
Definition
- IQN: iSCSI Qualified Name
- IQN (ex: iqn.2008-02.com.example:optional)
- EUI: Extended Unique Identifier
- (ex: eui.020234k2034j03D34)
|
|
|
Term
|
Definition
Celerra is a dedicated high-performance infrastructure for FILE LEVEL I/Os
Â
Celerra NS40G (gateway NAS) - Celerra NS-960 (Integrated NAS)
Â
Consists of:
Data movers (file servers in cabinet)
Control Station (sets up data movers and initially configs them)
Specialized OS - DART - Linux Red Hat |
|
|
Term
Describe how to join the building blocks in Integrated NAS and Gateway NAS? |
|
Definition
Integrated: the system is assigned to dedicated NAS storage. No other SAN hosts connected to the storage - whole array is dedicated solely to NAS provisioning.
Â
Gateway: the NAS system is assigned separately apportioned storage within the array. Two separate sections for SAN and NAS. |
|
|
Term
|
Definition
- Encapsulates FC frames in IP packets
- FCIP router is used for encapsulation
- FC Router at other end removes IP wrapper and sends FC data to other fabric
- Includes security, data integrity, congestion and performance specifications
 |
|
|
Term
What is Fibre Channel over Ethernet? |
|
Definition
- A new protocol that maps Fibre Channel protocol naively over Ethernet.
- Based on two new standards that are currently in active development:
- FCoE standard, being developed by T11 Fibre Channel Interfaces Technical Committee
- Enhanced Ethernet standard, being developed by the Ethernet IEEE Data Center Bridging Task Group
- Enables the consolidation of SAN traffic and Ethernet traffic onto a common 10 Gigabit network infrastructureÂ
- FCoE requires jumbo frames (2180 byte) support to prevent a Fibre Channel frame from being split into two Ethernet frames Â
|
|
|
Term
Â
Â
Â
Describe Lossless Ethernet |
|
Definition
To support Fibre Channel frames over Ethernet, no frames can be dropped throughout the entire transmission.
- No frame drop due to congestion or buffer overflow.
- PAUSE capability of Ethernet is used to achieve the lossless fabric.
|
|
|
Term
Describe the FCoE Physical Elements |
|
Definition
- Host Interface: CNA (converged network adapter) - ex: PCIs card on host consolidates NICs and HBAs
Â
- 10 Gbps connectivity options: either copper or standard optical
|
|
|
Term
Describe the benefits of FCoE |
|
Definition
- Lower capital expenditure
- Reduced power and cooling requirements
- Enabler for consolidated network infrastructure
- Lower TOC
|
|
|
Term
Â
Â
Â
What is Virtualization? |
|
Definition
The technique of abstracting physical resources into a logical view.
-
Increases utilization
-
Simplifies resource management
-
Reduces downtime (planned and unplanned)
-
Improved performance of IT resources
 |
|
|
Term
What are the challenges of storing fixed content? |
|
Definition
- Fixed content is growing at more than 90% annually.
- New regulations require retention and data protection
- Often, long term preservation is required
- Simultaneous multi-user online access is preferable to online storage
- Need faster access to fixed content
- Traditional storage methods are inadequate
|
|
|
Term
Â
Â
Â
What is a swap file (used in memory virtulization)? |
|
Definition
is a portion of the hard disk that functions like physical memory (RAM) to the operating system. |
|
|
Term
Â
Â
Â
Describe Network Virtualization |
|
Definition
creates virtual networks whereby each application sees its own logical network independent of the physical networks.
Â
EX: Virtual LAN (VLAN) - centralized configuration of devices |
|
|
Term
What are the traditional storage solutions for archive? |
|
Definition
Three categories of archival solutions are:
-
Online
-
Nearline
-
Offline
|
|
|
Term
Â
Â
What is Server Virtualization? |
|
Definition
enables multiple operating systems and applications to run simultaneously on different virtual machines created on the same physical server (or group of servers).
Â
Provides a layer of abstraction between the OS and the underlying hardware.
Â
Any # of virtualized servers can be established. |
|
|
Term
Â
Â
Â
What is storage virtulization? |
|
Definition
Process of presenting a logical view of physical storage resources to hosts
Logical storage appears and behaves as physical storage directly connected to host
- Examples: Host Based, LUN Creation (thin LUN), Tape
- Benefits
- Increased storage utilization
- Adding or deleting storage without affecting apps
- Non-disruptive data migration
|
|
|
Term
What are the shortcomings of traditional archival solutions? |
|
Definition
- Tape is slow
- Optical is expensive and requires vast amounts of media
- Recovering files from tape and optical is often time consuming
- Data on tape and optical is subject to media degradation
- Both solutions require sophisticated media management
 |
|
|
Term
Â
Â
What does SNIA Storage Virtulization Taxonomy provide? |
|
Definition
the Storage Networking Industry Association (SNIA) storage virtulization taxonomy provides a systematic classification of storage virtulization, with three levels: WHAT, WHERE, and HOW
Specifies the types of virtulization:
- block
- File
- Disk
- Tape
- Any
|
|
|
Term
What is Content Addressed Storage? |
|
Definition
- Object oriented, location-independent approach to data storage
- Repository for the "objects"
- Access mechanism to interface with repository
- Globally unique identifiers provide access to objects
|
|
|
Term
What are the benefits of CAS? |
|
Definition
- Content authenticity
- Content integrity
- Location independance
- Single instance storage
- Retention enforcement
- Record level protection and disposition
- Technology independence
- Fast record retrieval
|
|
|
Term
Â
Â
Describe block level storage virtualization |
|
Definition
-Ties together multiple independent storage arrays.
- Presented to host as a single storage device
- Mapping used to redirect I/O on this device to underlying physical arrays.
- -Deployed in a SAN environment
*Non-disruptive data mobility and data migration
-Enable significant cost and resource optimization |
|
|
Term
What are the Physical Elements of CAS? |
|
Definition
- Storage devices (CAS based)
- Servers (to which storage devices get connected)
- Client
|
|
|
Term
Describe the Application Programming Interface (API)? |
|
Definition
- A set of function calls that enables communication between applications or between an application and an operating system.
|
|
|
Term
Â
Â
Describe file-level virtualization |
|
Definition
addresses the NAS challenges by eliminating the dependencies between the data accessed at the file level and the location where the files are physically stored.
Â
Before virtualization, each NAS device of file server is physically and logically independent. |
|
|
Term
Â
Â
Describe EMCs Invista |
|
Definition
provides block-level storage virtualization in heterogeneous storage environments. Supports dynamic volume mobility for volume extension and data migration between different storage tier without any downtime.
Â
 |
|
|
Term
|
Definition
- The distinct bit sequence (DBS) of user data represents the actual content of a file and is independent of the file name and physical location.
|
|
|
Term
Â
Â
Â
Describe the difference between CPC and DPC and how they see targets and initiators |
|
Definition
Control Path Cluster - storage device running invista and is located OUTSIDE of the data path (handles any requests which are NOT I/Os)
Â
Data Path Controller - special purpose SAN switch/blade which operates inside the data path and handles the I/O requests. If its not an I/O then it routes the request to the CPC. |
|
|
Term
What are the key Functions of a RAID Controller? |
|
Definition
- Management and controll of disk Aggregations - Translation of I/O requests between logical disks and physical disks. - Data regeneration in the event of disk failures. |
|
|
Term
Describe EMC Centera Architecture |
|
Definition
deals with the storage and retrieval of fixed content
Based on RAIN (redundant array of independant node - access and storage)
Linux OS, CentraStar sw to impliment CAS functions
1 TB of usable capacity in each node
two 24-port 2 gigabit internal switches
Is self healing |
|
|
Term
|
Definition
- A package containing the user's data and associated metadata
- C-Clip ID is the CA that the system returns to the client application
|
|
|
Term
What data protection does the Centera Use? |
|
Definition
CCP - content protection parity
CPM - Content protection mirrioring |
|
|
Term
|
Definition
- An identifier that uniquely addresses the content of a file and not its location.
- Unlike location based addresses, content addresses are inherently stable and, once calculated, they never change and always refer to the same content
|
|
|
Term
Describe the C-Clip Descriptor File (CDF) |
|
Definition
- The additional XML file that the system creates when making a C-Clip. This file includes the content addresses for all referenced BLOBs and associated metadata.
|
|
|
Term
What are the features of CAS? |
|
Definition
- Integrity Checking
- Data protection (local and remote)
- Load balancing
- scalability
- Self - diagnosis and repair
- Report generation and event notification
- Fault tolerance
- Audit trails
|
|
|
Term
How does CAS store a data object? |
|
Definition
-
End users present the data to be archived to the CAS API via an application
-
The API separates the actual data (BLOB) from the metadata and the CA is calculated from the object's binary representation.
-
The content address and metadata of the object are then inserted into the C-Clip Descriptor File (CDF)
-
The CAS system recalculates the object's CA as a validation step and stores the object.
-
An acknowledgement is sent to the API after a mirrored copy of the CDF and protected copy of the BLOB have been safely stored in the CAS system
-
Using the C-Clip ID, the application can read the data back from the CAS system.
|
|
|
Term
How does CAS retrieves a Data Object? |
|
Definition
- The end user or an application requests an object
- The application queries the local table of C-Clip IDs stored in the local storage and located the C-Clip ID for the requested object
- Using the API, a retrieval request is sent along with the C-Clip ID to the CAS System
- The CAS system delivers the requested information to the application, which in turn delivers it to the end user
|
|
|
Term
|
Definition
Its a technique of abstracting physical resources in to a logical view.
Benefits: increases utilization, simplifies resource management, reduces downtime, improved performance of IT resources |
|
|
Term
What are the four forms of virtualization? |
|
Definition
Memory, storage, servers, and storage |
|
|
Term
How does virtual memory work? |
|
Definition
makes an application appear as if it has its own contiguous logical memory independent of the existing physical memory resource.
Done by virtual memory managers (VMM)
Space used by VMMs on the disk is known as a swap file
|
|
|
Term
|
Definition
the portion of the hard disk that functions like physical memory (RAM) to the operating system.
- gives the illusion physical space on the memory |
|
|
Term
How does Network Virtualization Work? |
|
Definition
createsvirtual networks whereby each application sees its own logical network independent of the physical network.
EX: Virtual LAN (VLAN) - enables centralized configuration of devices located in the physically diverse locations. |
|
|
Term
What are the benefits of Virtual Memory? |
|
Definition
- Removed physical - memory limits
- Run multiple applications at once
|
|
|
Term
What are the benefits of Virtual Networks? |
|
Definition
- Common network links with access-control properties of separate links
- Manage logical networks instead of physical networks
- Virtual SANs provide similar benefits for SANs
|
|
|
Term
How does Server Virtualization work? |
|
Definition
Enables multiple operating systems and applications to run simultaneously on different virtual machines created on the same physical server (or group of servers).
Provide a layer of abstraction between the OS and the underlying hardware
VMWare |
|
|
Term
What is Business Continuity |
|
Definition
- Preparing for, responding to and recovering from an application outage that adversely affects business operations.
- Addresses unavailability and degrades application performance
- An integrated and enterprise wide process and set of activities to ensure "information availability"
|
|
|
Term
What are the benefits of server virtualization? |
|
Definition
- break dependencies between operating system and hardware
- Manage OS and application as a single unit
- Strong fault tolerance
- Hardware - independent
|
|
|
Term
How does storage virtualization work? |
|
Definition
the process of presenting a logical view of the physical storage resources to a host. Appears and behaves as physical storage
Examples:
1. Host-based volume management
2. LUN Creation (thin LUN)
3. Tape virtualization |
|
|
Term
What are the benefits of storage virtualization? |
|
Definition
- Increased storage utilization
- Adding or deleting storage without affecting applications availability
- Non-disruptive data migration - KEY
|
|
|
Term
Describe SNIA Storage Virtualization Taxonomy? |
|
Definition
Storage Networking Industry Association: provides a systematic classification of storage virtualization, with three levels - what, where, and how
It specifies the types of virtualization: block, file, disk, tape, or any other devices. |
|
|
Term
What is Information Availability (IA)? |
|
Definition
- Refers to the ability of an infrastructure of function according to business expectations during its specified time of operation.
- Can be defined in terms of three parameters:
- Accessibility:(information should be accessible in the right place and to the right user
- Reliaability: Information should be reliable and correct
- Timeliness: Information must be available whenever required
|
|
|
Term
Describe the Multi-Level Approach to Storage Virtualization |
|
Definition
Server: path management, volume management, replication
Storage Network: path redirection, load balancing - ISL trunking, Access control - zoning (ex - powerpath
Storage: volume management - LUNs, access control (LUN Masking), replication, RAID |
|
|
Term
What are the two types of storage virtualization configs? |
|
Definition
Out of Band - the virt. env. confi is stored externally to the data path - minimal latency
In Band - implementation places the virtualization function inside the data path - additional latency |
|
|
Term
What are some causes of information unavailability? |
|
Definition
- Planned Outages (80%)
- Unplanned Outages (20%)
- Disaster (<1%)
|
|
|
Term
What is block-level storage virtualization? |
|
Definition
Ties together multiple independent storage arrays and presents them to the host as a single storage device. Mapping is used to direct the I/O on this device to underlying physical arrays
Deployed in a SAN environment
*Non-disruptive data mobility and data migration
Cost reduction |
|
|
Term
What are some of the impacts of Downtime? |
|
Definition
- Lost productivity
- Damaged Reputation
- Lost Revenue
- Financial Performance
- Other expenses
|
|
|
Term
What is file level virualization? |
|
Definition
address the NAS challenges by eliminating the depenpendancies between the data accessed at the file level and the location where the files are physically storage.
EX: RAIN Finity |
|
|
Term
How is Information Availability Measured? |
|
Definition
- IA=Uptime / (Uptime + Downtime)
- Uptime = Mean Time Between Failure (MTBF)
- Downtime = Mean Time to Repair (MTTR)
|
|
|
Term
|
Definition
Enables NON-DISRUPTIVE data migration. Provides block-level storage virtualization in heterogeneous storage environments. |
|
|
Term
What are main hardware components of Invista? |
|
Definition
Control path cluster (CPC): stores configurations parameters OUTSIDE of the data path.
Data Path Controller (DPD): special purpose SAN switch blade which routes I/Os INSIDE the data path. If its not an I/O then it sends it to the CPC |
|
|
Term
What is Disaster Recovery? |
|
Definition
- Coordinated process of restoring systems, data and infrastructure required to support ongoing business operations in the event of a disaster
- Restoring previous copies of data and applying logs to that copy to bring it to a known point of consistency
- Generally implies the use of backup technology
|
|
|
Term
What are the benefits of virtual provisioning? |
|
Definition
- Reduce administrative costs (people)
- Reduce storage costs by deploying assets as needed
- Reduce operating costs (fewer disks)
- Reduce downtime
|
|
|
Term
What is Disaster Restart? |
|
Definition
- The process of restarting from disaster using mirrored consistent copies of data and applications
- Generally implies the use of replication technologies
|
|
|
Term
In virtual provisioning - what is thin pool expansion? |
|
Definition
Adding drives to a thin pool on disruptively increases available shared capacity for all the Thin LUNs in the pool |
|
|
Term
Describe the "Cloud" Approach to Storage |
|
Definition
A cost effective approach to handling internet era data growth.
Five requirements: infinite scale, no boundaries, operationally efficient, self-managing, self-healing |
|
|
Term
What is Recovery Point Objective? |
|
Definition
- A point in time to which systems and data must be recovered after an outage
- The amount of data loss that a business can endure
|
|
|
Term
|
Definition
is an emerging IT development, deployment, and delivery model, enabling real time delivery of products, services and solutions over the Internet
Services Include: Saas, PaaS, Iaas
Ex: Google aps, salesforce.com |
|
|
Term
What are the key attributes of Cloud Services? |
|
Definition
Offsite third party provided
Accessed via Internet
Minimal to no IT skills required to implement
Provisioning
Pricing
User interface
system interface
Shared resources |
|
|
Term
What is Recovery Time Objective? |
|
Definition
- The time within which systems, applications or functions must be recovered after an outage.
- The ammount of downtime that a business can endure and survive.
|
|
|
Term
What is EMCs Cloud Infrastructure? |
|
Definition
Atmos - offers scalability, is policy based, and increases operational efficiency |
|
|
Term
|
Definition
is an additional copy of data that can be used for restore and recovery purposes. Used when the primary copy is lost or corrupted.
Can be created by:
-Simply copying the data
-Mirroring the data |
|
|
Term
What are the elements of the Business Continuity Planning Process? |
|
Definition
- Identify the critical business functions
- Collecting data on various business processes within those functions
- Business Impact Analysis (BIA)
- Risk Analysis
- Assessing, prioritizing, mitigating and managing risk
- Designing and developing contingency plans and disaster recovery (DR) plan
- Testing, training and maintenance
|
|
|
Term
What do organizations perform backups? |
|
Definition
1. Disaster recovery
2. Operational - restore in the event of data loss or corruption during routine process
3. Archival - preserver transactions for business and/or regulatory compliance |
|
|
Term
What needs to be considered before a Backup/Restore Solution is Implemented? |
|
Definition
Recovery Point Objective (RPO)
Recovery Time Objective (RTO)
Media type to be used
Where and when the restore operations occur
When to perform the backup
The granularity of the backup (Full, Incr., Cum)
How long to keep the backup
Do you copy the backup
Data - size and location of it |
|
|
Term
What are the solutions and supporting technologies that enable business continuity and uninterrupted data availability? |
|
Definition
- Single point of failure
- Multi-pathing software
- Backup and replication
- Backup and recovery
- Local replication
- remote replication
|
|
|
Term
What are the three types of backup granularity? |
|
Definition
Full Backup - all data once per week
Incremental - copies the data that has changed since the last full - faster but slower to get back data
Cumulative - copies the data that has changed since the last full backup. takes longer - easier/faster to recover data |
|
|
Term
Define Single Point of Failure |
|
Definition
|
|
Term
What are the differnt types of Backup Methods? |
|
Definition
- Cold - offline
- Hot - online
- Open File (either have to retry or have a SW agent)
- Point in Time (PIT) Replica
- Backup file metadata for consistency
- Bare metal recovery
|
|
|
Term
What are some advantages of Multi-pathing Software? |
|
Definition
- Configures multiple paths to increase data availability
- Helps to recognize and and utilize alternate I/O paths to data
- Provides load balancing to improve data path utilization
|
|
|
Term
Backup Architecture and Process |
|
Definition
- Backup Client - sends backup data to backup server or storage node
- Backup Sever - manages backup operations and maintains backup catalog
- Storage Node - Responsible for writing data to backup device
|
|
|
Term
What are the steps in the backup operation? |
|
Definition
1.Start of scheduled backup
2.Backup server retrieves backup related info from catalog
3(a) backup sever instructs storage node to load backup media in backup device
3b. Backup server instructs backup client to send its metadata to the backup server and data to be backed up to storage nodes
4. Backup clients send data to storage node
5. Storage node send media information to backup server
7. Backup server update catalog and records the status |
|
|
Term
What is local replication? |
|
Definition
- Data from the production devices (LUN) is copied to replica devices within the same array
- The replicas can then be used for restore operations in the event of data corruption or other events
|
|
|
Term
Describe Local Replication |
|
Definition
- Data from the production devices is copied to replica devices on a remote array
- In the event of a failure, applications can continue to run from the target device
|
|
|
Term
What are the steps in the restore operation? |
|
Definition
1. Backup server scans backup catalog to identify data to be restored and the client that will receive the data
2. Backup server instructs storage node to load backup media in backup device
3. Storage node then reads the data and sends to backup client
4. Storage node sends restore metadata to backup server
5. Backup server updates catalog |
|
|
Term
Describe Backup / Restore |
|
Definition
- Backup to tape has been a predominant method to ensure business continuity
- The frequency of backup is dependant on RPO / RTO requirements
|
|
|
Term
What are Direct Attached Backups? |
|
Definition
a backup device is attached directly to the client. Only the metadata is sent to the backup server through the LAN.
- Frees LAN from backup traffic |
|
|
Term
What are LAN Based Backups? |
|
Definition
all servers are connected to the LAN and all storage devices are directly attached to the storage node. The data to be backed up is transferred from the backup client (source), to the backup device (destination), over the LAN, which may affect network performance.
- can minimize impact by config sep networks |
|
|
Term
Describe some attributes of EMC PowerPath |
|
Definition
- Host based software
- Resides between the application and SCSI Device Driver
- Provides intelligent I/O path management
- Is transparent to the application
- Automatic detection and recovery from host to array path failures
|
|
|
Term
What are SAN based backups? |
|
Definition
backup devices and clients attached to the SAN
YES THIS IS THE BOOK DEF! WTF MATE :) |
|
|
Term
|
Definition
uses both LAN and SAN - the data goes through both the LAN and the FCSAN |
|
|
Term
Describe an application server based backups |
|
Definition
the NAS head retrieves the data from storage over the network and transfers it to the backup client running on the application server. The backup client sends this data to a storage node, which in turn write the data to the backup device.
-overloads the network |
|
|
Term
Descride a severless backup in NAS |
|
Definition
the network share is mounted directly on the storage node. Avoids overloading the network during backup. Storage node acting as backup client - reads the data from the NAS head and write it to the backup device without involving the application server. |
|
|
Term
NAS Backup - NDMP- 2 -way |
|
Definition
backup is sent directly from the NAS head to the backup device, while metadata is sent to the backup server.
Network traffic is minimized by isolating data from the NAS head to the locally attached tape library. Only metadata is transported on the network.
-uses special protocol |
|
|
Term
NAS Backup - NDMP - 3 Way |
|
Definition
data is not transferred over the public network. A seperate private backup network must be established between all NAS heads and the "backup" NAS head to prevent any data transfer on the public network in order to avoid congestion.
- uses two NAS heads
- Private network
- used in a multibuilding env (college campus) |
|
|
Term
What are the benefits of backing up to tape? |
|
Definition
- Traditional backup destination
- Low cost
- Portable
- Sequential/linear access
- Multiple streaming
|
|
|
Term
What are the limitations of backing up to tape? |
|
Definition
- Reliability (restore performance)
- Sequential access
- can not be accessed by multiple hosts simultaneously
- Needs a controlled environment
- Wear and tear
- Shipping/handling charges
- Tape management challenges
- Need to encrypt data
|
|
|
Term
What are the benefits of backing up to disk? |
|
Definition
- Ease of implementation
- Fast access
- More reliable
- Random access
- Multiple hosts can access
- Enhanced overall backup and recovery
|
|
|
Term
What is the recovery time in minutes? |
|
Definition
The time from point of failure to return of service to e-mail users |
|
|
Term
What is a virtual library and its components? |
|
Definition
Its an array with special software - tape emulation engine. emulation SW has a database with a list of virtual tapes, and each virtual tape is assigned a portion of a LUN on the disk. |
|
|
Term
How does EMCs Networker Work? |
|
Definition
enables simultaneous access operations to a volume, for both reads and writes, as opposed to a single operation with tapes by making a copy of the production LUN and do a backup from the copy
- works within existing frameworks
-Accelerates and centralized backup process
The client generates tracking info and sends it to the server to facilitate point-in-time recoveries |
|
|
Term
What is local replication and its uses? |
|
Definition
replicating data within the same array or the same data center.
-alernate source for backup
-Fast recovery
-Decision support
-Testing platform
-Data migration |
|
|
Term
What do you consider when you're going to replicate data? |
|
Definition
Types
-Point-in time (PIT): non-zero RPO (how much data you can loose)
-Continuous: near zero RPO
What makes a replica good? - recoverability
/re-startability and consistency |
|
|
Term
What is consistency in terms of backup? |
|
Definition
is the primary requirement to ensure the usability of replica device.
Can be achieved in various ways:
For File System:
-offline - un-mount file system
-Online - flush hot buffers (space in memory)
For Database:
-Offline- shutdown database
-Online- data in hot backup mode |
|
|
Term
Describe flushing host buffer |
|
Definition
Flush memory (buffer) on the host before you make the copy. Done by the sync daemon (unix) |
|
|
Term
What is the dependent write I/O Principle? |
|
Definition
Dependant Write: a write I/O that will not be issued by an application until a prior related write I/O has completed - LOGICAL dependency - NOT a time dependency
-is inherent in all DBMS and is nessecary for protection against local outages |
|
|
Term
What is the process of holding an I/O in database consistency? |
|
Definition
the process of quiescing the database.
Steps:
1. hold I/O to all the devices at the same instant
2.Create the replica
3. Release the I/O |
|
|
Term
What are the two local replication technologies? |
|
Definition
Host based array
-logical volume manager (LVM) based mirroring
-File system Snapshot
Storage Array Based
-Full volume mirroring
-Pointer based full volume replication
-Pointer based virtual replication |
|
|
Term
What is LVM Based Mirroring? |
|
Definition
the LVM is responsible for creating and controlling the host-level logical volume. Components: physical volumes (disk), volume groups, and logical volumes.
Each logical partition in a logical volume is mapped two physical partitions on two different physical volumes. |
|
|
Term
What is File System Snapshot? |
|
Definition
Is a pointer based replica that requires a friction of the space used by the original file system.
-Uses copy on first write (COFW) principle
-Uses bitmap (to track the blocks that have changed on the production/source FS after creation of snap - initially all zero
-Block Map: used to indicate block address from which data is to be read when the data is accessed from the Snap FS - initially points to production/source FS
-Requires a fraction of the space |
|
|
Term
What are the limitations of host based replications? |
|
Definition
-LVM based replicas add overhead on host CPUs
-If host volumes are already storage array LUNs then the added redundancy provided by LVM mirroring is unnecessary
-Host based replicas can be usually presented back to the same server
-Keeping track of changes is a challenge after the replica has been created |
|
|
Term
Describe how a storage array based local replication works? |
|
Definition
-Replication is performed by the Array Operating Environment
-Replicas are on the same array
Types:
-Full-volume mirroring
-Pointer-based full volume replication - Clone
-Pointer -based virtual replication - snap |
|
|
Term
What is pointer based full volume replication? |
|
Definition
A clone
-Provides a full copy of the source data on the target
-Target device is made accessible for business operation as soon as the replication session is started
-Point-in- time is determined by the time of session activation
Two modes: Copy On First Access (COFA) and Full Copy Mode
-Clone will be the same size of larger |
|
|
Term
Describe detached full volume mirroring |
|
Definition
After synchronization is complete, the target can be detached from the source and made available for BC operations.
-PIT is determined by the time of detachment
-After detachment, re-synchronization can be incremental |
|
|
Term
|
Definition
Copy On First Access - Deferred Mode - not a full clone
Primarily used for testing and development
Data is copied from the source to the target on when:
-A write is issued for the first time after the PIT to a specific address on the source
-A read or write is issued for the first time after the PIT to a specific address on the target. |
|
|
Term
|
Definition
On session start, the entire contents of the source device is copied to the Targer device in the background.
-most vendors also provide SW to track d changes made to the source or target |
|
|
Term
What is pointer based virtual replication? |
|
Definition
SNAPS
-Targets do not hold actual data, but hold pointers to where the data is located.
-A replication session is setup between source and target device. Target devices are accessible immediately when session is started
-Moves data into a resource LUN Pool (RLP) |
|
|
Term
How are changes tracked in a database after PIT has been created? |
|
Definition
Done using bitmaps. The bits in the source and target bitmaps are all set to 0 when the replica is created. Any changes to the source or target are then flagged by setting the appropriate bits to 1 in the bitmap. |
|
|
Term
What are the two methods of Restore/Restart Operations? |
|
Definition
Restore the data from the target source (done incrementally, apps can be restarted before sync is complete
or
Start production on the target (must copy target before you start production) |
|
|
Term
What are some considerations of Restore/Restart? |
|
Definition
Before a restore: stop all access to the source and target. Based on RPO and data consistency identify target for restore, then perform restore.
Before starting production from Target: stop all access, identify target based on RPO, create a "gold" copy of target, start production on target |
|
|
Term
Restore/Restart Considerations for Pointer Based Full Volume (clone) and Virtual (snap) Replications |
|
Definition
Clone - restores can be performed to either the original source device or to any other device of like size
Snap - can be performed to the original source or to any other device of like size as long as the original source is healthy |
|
|
Term
Describe Local Replication Management on the Array |
|
Definition
- Replication management software resides on the storage array
-Provides an interface for easy and reliable replication management
-Two types of interfaces: command line (CLI) and GUI |
|
|
Term
What are EMCs local replication Solutions? |
|
Definition
Symmetrix Arrays
-TimeFinder/Clone (full)/Mirror(full)/Snap(pointer)
CLARiiON Arrays
SnapView Clone (full) and Snapshot (pointer) |
|
|
Term
What is Remote Replicating? |
|
Definition
the process of creating replicas of information assets at remote sites. |
|
|
Term
What is synchronous Replication? |
|
Definition
data is committed at both the source site and the target site before the write is acknowledged to the host. Any write to the source must be transmitted to and acknowledged by the target before signaling a write complete to the host.
- Provides the zero RPO and low RTO |
|
|
Term
What are the challenges of synchronous replication? |
|
Definition
- Response time extension for applications (data must trans to target site before write can be acknowledged)
-Bandwith - needs high bandwith
-Rarely deployed beyond 200 Km (125 miles) |
|
|
Term
What does asynchronous replication? |
|
Definition
- a write is committed to the source and immediately acknowledged to the host
-Data is buffered at the source and transmitted to the remote site later
- Finite RPO (replica will be behind by a little)
-The writes are timed stamped and applied in the order it was received. The written to target.
-Needs average bandwidth
-can be deployed over the long distance |
|
|
Term
What are the two remote replication technologies? |
|
Definition
Host Based: Logical Volume Manager (LVM) and supports both synchronous and asynchronous mode and logs shipping
Storage Array Based: support both synchronous and asynchronous mode. Disk buffered - consistent PITs - combines local and remote replication |
|
|
Term
|
Definition
is performed and managed at the volume group level. Writes to the source volume are transmitted to the remote host by LVM. The LVM on the remote host receives the writes and commits them to the remote volume group.
- created at the source |
|
|
Term
What are the advantages and disadvantages of LVM? |
|
Definition
Adv - different storage arrays and RAID protection can be used at the source and target sites.
-Response time issues can be eliminated with asynchronous mode, with extended RPO.
Disadvantage - Extended network outages require large log files and results in higher CPU overhead on host. |
|
|
Term
What is host based log shipping? |
|
Definition
Transactions to the source database are capture in logs, which are periodically transmitted by the source host to the remote host. The remote host rec. the logs and applies then to the remote database.
- Advantages: minimal CPU, low bandwidth, standby database consistent to last applied log |
|
|
Term
What is storage array based remote replication? |
|
Definition
-Replication is performed by the array operating environment so that host CPU resources can be devoted to production, arrays communicate over dedicated channels
-Replicas are on different arrays. Most used for disaster recovery. |
|
|
Term
How does array based synchronous replication work? |
|
Definition
1. Write is rec. by the source array from the host
2. Write is transmitted by the source array to the target array
3. Target array sends acknowledgement to the source array
4. Source array signals write complete to host |
|
|
Term
How does array based asynchronous replication work? |
|
Definition
1. Write is received by the source array from the host
2. Soure array signals write complete to host
3. Write is transmitted by source array to the target array
4. Target array send acknowledgement to the source array
- no impact on response time, extended distances between arrays, lower bandwidth |
|
|
Term
How do you ensure consistency in asynchronous replication? |
|
Definition
You can maintain a write order - attach a time stamp
or
Dependent write consistency (buffer the writes in the cache of the source array for a period of time) |
|
|
Term
What is Array based Disk Buffered Replication? |
|
Definition
local and remote replication technologies can be combined to create consistent PIT copies of data on target arrays.
-RPO is in HOURS
-Lower bandwidth is required
-Extended distance |
|
|
Term
What is three site replication
and what are the two types? |
|
Definition
-there is a bunker site between replication sites.
1. Cascade/Multihop
2. Triangle/Multi-taget - SRDF/Star in Symmertrix - concurrent replication of source to two different arrays. |
|
|
Term
Dscribe SAN Based Remote Replication |
|
Definition
-Replicate from one storage array to any other storage array over SAN/WAN
- can implement tiered storage, do data migrations, and remote vault
-heterogeneous array support
-No impact on LAN or servers |
|
|
Term
What are the terminologies in SAN Based Replication? |
|
Definition
Control Array: responsible for replication operations
Remote Array: to/from which data is being replicated
Operation (2):
-Push: data is pushed from control array to remote array
-Pull: data is pulled to the control array from remote array
* the names control/remote DO NOT indicate the direction of data flow, they only indicate which operation is being performed |
|
|
Term
What are the network options for Remote Replication? |
|
Definition
a dedicated or a shared network must be in place for remote replication
-uses an optical network for for extended distances: DWDM and SONET |
|
|
Term
|
Definition
Dense wavelength division multiplexing (DWDM) - puts data from different sources together on an optical fiber with each signal carried on its own separate light wavelength.
- up to 32 protected and 64 unprotected separate wavelengths of data can be multiplexed into a light stream transmitted on a single optical fiber. |
|
|
Term
|
Definition
-Synchronous Optical Network is Time Division Multiplexing (TDM) technology
-Implemented over long distances |
|
|
Term
What are the types of EMC remote replication? |
|
Definition
Symmetrix Arrays: SRDF/Synchronous and Asynchronous/Automatic Replication
CLARiiON Arrays: MirrorView (synchronous/asynchronous)
SAN Copy: SAN based remote replication solution for EMC CLARiiON |
|
|
Term
What is Storage Security? |
|
Definition
- The application of security principles and practices to storage networking (data storage + networking) technologies.
- The focus is secured access to information
- Begins with building a framework
|
|
|
Term
Describe a Storage Security Framework |
|
Definition
- A systemic way of defining security requirements
- The framework should incorporate:
- Anticipated security attacks
- Actions that comprise the security information
- Security measures
- Control designed to protect from these security attacks
|
|
|
Term
What are the attributes of a Storage Security Framework? |
|
Definition
- Confidentiality
- Provides the required secrecy of information
- Ensures only authorized users have access to data
- Integrity of data
- Ensures that the information is unaltered
- Availability of data
- Ensures that authorized users have reliable and timely access to data
- Accountability
- Accounting for all events and operations that take place in the data center infrastructure that can be audited or traced later
- Help to uniquely identify the actor that performed the action
|
|
|
Term
|
Definition
Referrs to the risk in terms of threats, assets and vulnerabilies.
|
|
|
Term
In terms of security, what are the most important assets for any organization? |
|
Definition
Information is one of the most important assets for any organization
|
|
|
Term
What are some considerations for security mechanisms? |
|
Definition
- It must provide easy access to information assets for authorized users
- Make it difficult for potential attackers to access and compromise the system
- It should only cost a fraction of the value of the protected asset
- It should cost a potential attacker more, in terms of money and time
|
|
|
Term
What are the two types of attacks that can be carried out on an IT infrastructure? |
|
Definition
- Active Attacks:
- Data Modification, Denial of Service (DoS), Repudiation attacks
- Passive Attacks:
- Attempts to gain unauthorized access to the system
- Threats to the confidentiality of information
|
|
|
Term
Where can vulnerabilities occur in an information system? |
|
Definition
Vulnerabilities can occur anywhere in a system.
- An attacker can bypass controls implemented at a single point in the system
- Failure anywhere in the system can jeopardize the security of information assets
- Loss of authenticationmay jeopardize confidentiality
- Loss of a devicejeopardizes availability
- Requires Defense in Depth
|
|
|
Term
What is Defense in Depth? |
|
Definition
The practice of protecting all access points within an environment.
- Reduces vulnerability to an attacker who can gain access to storage resources by bypassing inadequate security controls implemented at the vulnerable single point of access
|
|
|
Term
What are three factors to consider when assessing the extent to which an environment is vulnerable to security threats? |
|
Definition
- Attack Surface: The various entry points that an attacker can use to launch an attack
- Attack Vector: A step in a series of steps necessary to complete an attack
- Work Factor: The amount of time and effort required to exploit an attack vector.
|
|
|
Term
In terms of security vulnerabilities, what are some of the solutions to protect critical assets? |
|
Definition
- Minimize the attack surface
- Maximize the work factor
- Manage vulnerabilities
- Detect and remove vulnerabilities
- Install countermeasures to lessen impact
|
|
|
Term
What are some technical countermeasures to network vulnerabilities? |
|
Definition
Implementations in computer hardware, software and firmware |
|
|
Term
What are some non-technical countermeasures to network vulnerability? |
|
Definition
- Administrative Policies and Standards
- Physical Standards
|
|
|
Term
What are the three Security Domains? |
|
Definition
- Application: Involves access to stored data through the storage network
- Management: Involves access to storage and interconnect devices and to the data residing on those devices
- Backup & Data Storage: BURA access
|
|
|
Term
What does BURA stand for? |
|
Definition
Backup, Recovery and Archive |
|
|
Term
What are some of the threats in the Application Access Domain? |
|
Definition
- Spoofing user / host identity
- Elevation of user / host privileges
|
|
|
Term
What are some of the threats in the Management Access Domain? |
|
Definition
- Spoofing user / administrator identity
- Elevation of user / administrator privileges
- Tampering with Data
- Denial of Service
- Network snooping
|
|
|
Term
What are some of the threats in the BURA Domain? |
|
Definition
- Spoofing of User / Administrator Identity
- Elevation of User / Administrator privilege
- Tampering with Data
- Denial of Service
- Network snooping
|
|
|
Term
What are some of the Security Controls used in Storage Infrastructure? |
|
Definition
- User Authentication
- User Authorization
- Host and Storage authentication
- Access Control to Storage Objects
- Storage Access Monitoring
- Infrastructure Integrity
- Storage Network Encryption
- Management Network Encryption
- Management Access Control
- Primary to secondary Access Control
- Backup Encryption
- Replication Network Encryption
|
|
|
Term
What are some of the security implementations in SAN? |
|
Definition
- Traditional FC SANs are configured as an isolated private network making them inherently more secure
- However storage consolidation has lead to larger SAN designs that span multiple sites across enterprises
- This has led to the creation of Authenticating FC Entities
- Setting up Session Keys
|
|
|
Term
What are some of the basic SAN Security Mechanisms? |
|
Definition
- Array Based Volume Access Controls
- Security on FC Switch Ports
- Switch-Wide and Fabric-Wide Access Control
- Logical Partitioning of a fabric: Vertual SAN (VSAN)
|
|
|
Term
What is Array Based Volume Access Control? |
|
Definition
-
LUN Masking: Filters the list of LUNS that an HBA can access
-
S_ID Lockdown (EMC Symmetrix Arrays): Stronger variant of masking
-
Port Zoning: Zone Member is of the form (Switch_Domain_ID_Port_Number).
|
|
|
Term
What are some security measures on FC Switch Ports? |
|
Definition
- Port Binding: Limits devices that can attach to a particular switch port
- A node must be connected to its corresponding switch port for fabric access
- Mitigates but does not eliminate WWPN spoofing
- Port Lockdown / Port Lockout: Restricts the type of initialization of a switch port
- Typical variants include:
- Port cannot function as an E-Port, cannot be used for ISL
- Port role is restricted to just FL-Port, F-Port, E-Port or some combination
- Persistent Port Disable: Prevents a switch port from being enabled, even after a port disable
|
|
|
Term
What are some of the components of Switch-Wide and Fabric-Wide Access Control? |
|
Definition
- Access Control Lists (ACL):
- Device Connection Control- prevents unauthorized devices (identified by WWPN) from accessing the fabric
- Switch Connection Control - Prevents unauthorized switches (identified by WWPN) from joining the fabric
- Fabric Binding: Prevents an unauthorized switch from joining any existing switch in the fabric
- Role Based Access Control (RBAC): Specifies which user can have access to which device in a fabric
|
|
|
Term
What is Logical partitioning of a fabric? |
|
Definition
Deviding a physical topology into seperate logical fabrics.
- Administrator allocates switch ports to different VSANs
- A switch port (and the HBA or storage port assigned to it) can be in only one VSAN at a time
- Each VSAN has its own distinct active zone set and zones
- Fabric events in one VSAN are not propagated to the others
- Role based Management
|
|
|
Term
What are some authentication and authorization mechanisms used in NAS? |
|
Definition
NAS is open to multiple exploits, including viruses, worms, unauthorized acess, snooping and data tampering.
- Kerberos and Directory Services
- Firewalls
- Protection from unauthorized access and malicious attacks
|
|
|
Term
What are the types of Windows Access Control Lists used in NAS? |
|
Definition
- Discretionary ACLs
- Commonly referred to as ACL
- Used to determine access control
- System ACL (SACLs)
- Determines what accesses need to be audited if auditing is enabled
|
|
|
Term
Describe the UNIX Permissions used in NAS file sharing |
|
Definition
- User
- Permissions tell UNIX what can be done with that file and by whom
- Every file and directory (folder) has three access permissions
- Rights for the file owner
- Rights for the group you belong to
- Rights for all others in the facility
- File directory permission looks
|
|
|
Term
|
Definition
Challenge Handshake Authentication Protocol.
- A basic authentication mechanism that has been widely adopted by network devices and hosts
- Implemented as:
- One Way - Authentication Password configured on only on e side of the connection
- Two Way - Authentication password is configured on both sides of the connection requiring both nodes to validate the connection
|
|
|
Term
What is iSNS Discovery Domain? |
|
Definition
Internet Storage Name Server
- Functions the same way as FC Zones
- Provides functional groupings of devices in an IP-SAN
- In order for devices to communicate with one another, they must be configured in the same discovery domain
|
|
|
Term
What are the major storage infrastructure components that should be monitored? |
|
Definition
- Servers, Databases and Applications
- Network (SAN & IP)
- Storage Arrays
|
|
|
Term
Of the major storage components of an information storage infrastructure that should be monitored, what should they be monitored for? |
|
Definition
- Capacity
- Accessibility
- Performance
- Security
|
|
|
Term
What are some of the consequences of an Array Port Failure? |
|
Definition
If one of the Storage Array Ports fails, all of the storage volumes that are accessed through the switch connected to that port may become unavailable, depending on the type of array. |
|
|
Term
What are the levels of alerts used in monitoring? |
|
Definition
- Information Alert - Provides useful information and may not require administrator intervention
- Warning Alerts - Require administrator attention
- Fatal Alert - Require immediate administrative attention
|
|
|
Term
What are some ways to ensure high availability in storage infrastructures? |
|
Definition
**Eliminate Single Points of Failure**
-
Two or more:
-
Multipathing software with failover capability
-
RAID Protection
-
Redundant Fabrics
-
Configuring data backup and replication
-
Deploying a virtualized environment
|
|
|
Term
What is Performance Management? |
|
Definition
Ensures the optimal operational efficiency of all components.
- Performance analysis is an important activity that helps identify the performance of storage infrastructure components
|
|
|
Term
Describe the architecture of the EMC Control Center |
|
Definition
EMC Control Center Storage Management Suite provides and end to end integrated approach for dealing with multi-vendor storage reporting, monitoring and configuration and control tasks. It is made up of three tiers:
-
User interface Tier - Displays Data
-
Infrastructure Tier - Processes Data
-
Agent Tier - Collects Data
|
|
|