You are on page 1of 7

Contact www.solvedcare.

com for best and lowest cost solution or email


solvedcare@gmail.com

Emerging Technologies V1A

Assignment A
Q1.) What are the benefits of using multiple HBAs on a host?

Q2.) Why do formatted disks have less capacity than unformatted disks?

Q3.) How can a block-level virtualization implementation be used as a data


migration tool?
Explain how data migration will be accomplished and discuss the advantages of using
this
method for storage. Compare this method to traditional migration methods.

Q4.) The marketing department at a mid-size firm is expanding. New hires are being
added to the
department and they are given network access to the departments files. IT has
given marketing a
networked drive on the LAN, but it keeps reaching capacity every third week.
Current capacity is
500 gigabytes (and growing), with hundreds of files. Users are complaining about
LAN response
times and capacity. As the IT manager, what could you recommend to improve the
situation?

Q5.) An application specifies a requirement of 200 GB to host a database and other


files. It also
specifies that the storage environment should support 5,000 IOPS during its peak
processing
cycle. The disks available for configuration provide 66 GB of usable capacity, and
the
manufacturer specifies that they can support a maximum of 140 IOPS. The application
is
response time sensitive and disk utilization beyond 60 percent will not meet the
response time
requirements of the application. Compute and explain the theoretical basis for the
minimum
number of disks that should be configured to meet the requirements of the
application.

Q6 A large company is considering a storage infrastructureone that is scalable and


provides
high availability. More importantly, the company also needs performance for its
mission-critical
applications. Which storage topology would you recommend (SAN, NAS, IP SAN) and
why?

Q7). An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000
typical users at a
peak of 1 IOPS each, with a read/write ratio of 2:1. It is estimated that the
application also
experiences an overhead of 20 percent for other workloads. Calculate the IOPS
requirement for
RAID 1, RAID 3, and RAID 5

Q8). To access data in a SAN, a host uses a physical address known as a logical
block address
(LBA). A host using a CAS device does not use (or need) a physical address. Why?

Assignment B
Case Study
A hospital uses an application that stores patient X-ray data in the form of large
binary objects in
an Oracle database. The application is hosted on a UNIX server, and the hospital
staff accesses
the X-ray records through a Gigabit Ethernet backbone. Storage array provides
storage to the
UNIX server, which has 6 terabytes of usable capacity.

(a) Explain the core elements of the data center. What are the typical challenges
the
storage management team may face in meeting the service-level demands of the
hospital
staff?

(b) Describe how the value of this patient data might change over time.

Assignment C

1 What is the most basic level of storage


a. SAN
b. DAS
c. NAS
d. ISCSI

2 A NAS solution is most appropriate for what type of data environment


a. Secured Access
b. Shared access
c. Remote access
d. Parallel access

3 Fileystem is created using command.....


(A): Mkfs
(B): Format
(C): Fsck
(D): defrag

4 Every File or directory has unique.... ?


(A): Inode
(B): Directory
(C): Pathname
(D): Inode & pathname

5 Dirty buffer cache contains..... ?


(A): Invalid data
(B): New valid data
(C): File
(D): Inode

6 Following are some of the file sharing protocols ...


(A): Telnet
(B): NFS & CIFS
(C): FTP
(D): HTTP

7. File access protocols operate in which layer of the OSI model


(A): Application
(B): Session
(C): Transport
(D): All of these

8 Identify a network file protocol in the below mentioned set.


(A): FC
(B): SCSI
(C): SAN
(D): CIFS

9 What will be used by SAN to provide connectivity between hosts and storage?
(A): FC or iSCSI
(B): SCSI
(C): SAN
(D): CIFS

10 In FC structure which layer maps block I/O SCSI commands into FC FC-4
(A): FC-4
(B): FC-1
(C): FC-0
(D): None of the these

11 What are the major benefits of SAN?


(A): Centralized backup
(B): Storage consolidation
(C): LAN-less backup
(D): All of these

12 Which data storage technology offers the best performance?


(A): SAN
(B): DAS
(C): NAS
(D): ISCSI

13 Identify the data storage technology used in the below data center?
(A): SAN
(B): DAS
(C): NAS
(D): None of the these

14 Which two RAID types use parity for data protection?


(A): RAID 1 & 2
(B): RAID 4 & 5
(C): RAID 1 & 0
(D): RAID 3 &1
15 Which one of these is characteristic of RAID 5?
(A): Distributed parity
(B): No Parity
(C): All parity in a single disk
(D): Double Parity

16 Which of the following combinations can support RAID 05?


(A): 2 sets with 3 disks each
(B): 2 sets with 2 disks each
(C): 4 sets with 3 disks each
(D): 4 sets with 1 disk each

17 What is the minimum number of disks required for RAID1?


(A): 1
(B): 2
(C): 4
(D): 5

18 Which of the following raid levels provides maximum usable disk space?
(A): RAID 1
(B): RAID 0
(C): RAID 5
(D): RAID 6

19 The mean time to failure of a single disk is 200000 hrs. If an array of disks is
using 5 such disks, the mttf of the array is
(A): 200000 hrs
(B): 40000 hrs
(C): 1000000 hrs
(D): Can not be determined

20 Name the mechanism which provides the highest level of data protection
(A): RAID 0
(B): RAID 1
(C): RAID 6
(D): RAID 2

21 Which command is used to view NFS shared directories?


(A): share
(B): shareall
(C): sharetab
(D): dfshares

22 Which file would you edit to mount an NFS filesystem at system boot time?
(A): /etc/fstab
(B): /etc/dfs/dfstab
(C): /etc/vfstab
(D): /etc/nfstab
23 CIFS runs over the following protocols:
(A): TCP/IP
(B): FTP
(C): SNMP
(D): DNS

24 Which of the below is component of SAN


(A): Ethernet switch
(B): Fibre Switch
(C): Ethernet Card
(D): None of the these

25 What components on SAN can be virtualized


(A): Disk
(B): Tape Drive
(C): Tape Library
(D): All the these

26 Which is the correct statement


(A): Virtualization cloud presents itself as host to the host
(B): Virtualization cloud presents itself as targets to the host
(C): None of A or B
(D): Both A and B

27 A SAN network can have.. ?


(A): 1 FC switch
(B): 2 FC switch
(C): There can be many FC switches
(D): No FC switch

28 Which of the following is true?


(A): SAS is compatible with SATA physical layer
(B): SAS is not parallel SCSI
(C): SAS has multiple channels per port
(D): All the these

29 SAS Domain can have:


(A): 16256 devices in a single domain
(B): 128 expanders per domain
(C): 128 phys per expander
(D): All the these

30 Which of the following is false?


(A): SAS devices can have narrow ports and/or wide ports
(B): Expander port is a type of SAS port
(C): Each SAS port has a SAS address
(D): All the these

31 Which of the following layer is present in a SAS port?


(A): Transport layer
(B): Phy layer
(C): Port layer
(D): All the these

32 Which of the following protocol has slowest speed?


(A): SATA
(B): SAS
(C): FC-AL
(D): All the these

33 This is a repository for the storage, management, and dissemination of data in


which the mechanical, lighting, electrical and computer systems are designed for
maximum energy efficiency and minimum environmental impact.
(A): Storage lab
(B): Data Center
(C): Data warehouse
(D): Fabric

34 This is the process of assigning storage, usually in the form of server disk
drive space, in order to optimize the performance of a storage area network.
(A): Storage Provisioning
(B): Data mining
(C): Storage assignment
(D): Data Warehousing

35 Simply stated, these are large boxes that hold lots of hard disks.
(A): Host
(B): Tape library
(C): Switch
(D): Disk Array

36 This consists of the precautions taken so that the effects of a disaster will be
minimized.
(A): Data retrieval
(B): Disaster recovery
(C): Archive
(D): Replication

37 This is the practice of collecting computer files that have been packaged
together for backup, to transport to some other location, for saving away from the
computer so that more hard disks can be made available, or for some other purpose.
(A): Backup
(B): Archive
(C): Migration
(D): Compression

38 Which of the following company manufactures Raid arrays ?


(A): Hyundai
(B): Honda
(C): Hitachi
(D): Mitsubishi

39 An FC jammer-analyzer can be used to.. ?


(A): Capture all FC frames
(B): Tamper FC packets
(C): I/O performance
(D): All the these

40 Network level virtualization in a SAN fabric can be implemented by having


virtualization engine running in
(A): HBA
(B): FC switch
(C): Raid array
(D): All the these

Contact www.solvedcare.com for best and lowest cost solution or email


solvedcare@gmail.com

You might also like