CIS Test 1 Flashcards
Configure / design for optimal operational efficiency.Performance analysisVolume management, DB/application layout.ISL design for SANsChoice of RAID type and LUNs
Performance Management
Establishes guidelines for all configurations to achieve high availability based on service level requirements.
Availability Management
Disadvantage of target based deduplication
Increased network bandwidth and storage capacity requirements.
Disadvantage of source based deduplication
Increased overhead on the backup client.
Advantage of source based deduplication
Reduced storage capacity and network bandwidth requirements.
Type of deduplication where backup client sends native data to the backup device.
Target based deduplication
Type of deduplication where backup client sends only new, unique segments across the network to the backup device.
Source-based deduplication
Two types of deduplication
1) Source based (client) 2) Target based (storage device)
Type of backup usually created from the most recent full backup and all the incremental backups performed thereafter.
Synthetic (or constructed) backup
Type of backup used in implementations where the production volume resources cannot be exclusively reserved for a backup process for extended periods.
Synthetic (or constructed) backup
Type of backup which takes longer than an incremental backup, but is faster to restore.
Cumulative (or differential) backup
Backup which copies the data that has changed since the last full backup.
Cumulative (or differential) backup
A backup of the complete data on the production volumes at a certain point in time.
Full backup
Additional copy of data that can be used for restore and recovery purposes.
Backup
Provides the functionality to recognize and utilize alternate I/O path to data.
Multipathing software
Solutions and supporting technologies that enable business continuity and uninterrupted data availability
1) Eliminating single points of failure. 2) Multi-pathing software 3) Backup / restore 4) Replication
Provides RTO of 72 hours.
Restore from backup tapes at a cold site.
Provides RTO of 12 hours.
Restore from tapes at a hot site.
Provides RTO of 4 hours
Use of data vault to a hot site.
Provides RTO of ~1 hour.
Cluster production servers with controller-based disk mirroring.
Provides RTO of a few seconds.
Cluster production servers with bi-directional mirroring, enabling the applications to run at both sites simultaneously.
Recovery Time Objective (RTO)
Time within which systems, applications, or functions must be recovered after an outage. Amount of downtime that a business can endure and survive.
Recovery Point Objective (RPO)
Point in time to which systems and data must be recovered. Amount of data loss that a business can endure.
Site where an enterprise’s operations can be moved in the event of disaster and where the DR site infrastructure is up and running all the time.
Hot Site
Type of site where the IT infrastructure required to support DR is NOT activated.
Cold site
Group of servers and other necessary resources, coupled to operate as a single system.
Cluster
Coordinated process of restoring systems, data, and infrastructure required to support ongoing business operations in the event of a disaster.
Disaster Recovery (DR)
Processes and/or procedures for ensuring continued business operations.
Business Continuity (BC)
True or False: Having a single data model and toolset for unified storage enables a consistent management framework across many applications and workloads.
TRUE
True or False: In an object level access, data is access over a network in terms of self contained objects, using object IDs.
TRUE
Required to effectively pool storage and provide data access at file level, block level, and object level.
Unified Storage
Provides consolidated management interface for NAS, SAN, iSCSI, FCoE, and object-based technologies.
Unified Storage
What is a driver for object based storage?
Increasing amounts of unstructured data
How is an object identified in an object based storage environment?
By a unique object ID.
Limit on number of files in object based storage environment
No limit
What is used to generate an object ID?
Hashing function
Stores data in a flat address space
Object based storage
Combines data with rich metadata to create an “object”.
Object Based Storage
Eight Benefits of NAS
1) Supports comprehensive access to information. 2) Provides improved efficiency. 3) Provides improved flexibility. 4) Provides centralized storage. 5) Simplifies management. 6) Enables scalability. 7) Provides high availability - through native clustering. 8) Provides security integration to environment (user authentication and authorization).
Two options available for FCoE cabling
Twinax copper - Optical fiber
Four Benefits of Fibre Channel over Ethernet (FCoE)
1) Lowers CAPEX 2) Reduces power and cooling requirements 3) Enables consolidation of network infrastructure 4) Lowers TCO
Enables distributed FC SAN islands to be transparently interconnected over existing IP-based local, metro, and wide area networks.
FCIP
FC WWNs are similar to what used in IP networking?
MAC addresses
Length of a Fibre Channel address
24 bits
E_ports connect to what type of ports?
E-ports
N_ports connect to what type of ports?
F_ports
Fundamental purpose of a SAN
To provide compute access to storage resources
High end switches with a higher port count and better fault tolerance capabilities.
Directors
Three basic components of a SAN
1) Servers (compute systems) 2) Network infrastructure 3) Storage
Protocol used by a FC SAN
SCSI over FC
Concept-based storage networking technologies
1) Object-based storage2) Unified storage
Provides interconnection between CPU and attached devices.Latest version provides throughput of 133 MB/sec.
Peripheral Component Interconnect (PCI)
How can communication between compute and storage be accomplished?
By using channel or network technologies.
Network protocol examples
iSCSI (SCSI over IP) - FCoE (Fibre Channel over Ethernet) - FC (Fibre Channel)
Examples of channel protocols
PCIIDE/ATA/SATASCSI
Protocols typically used for compute to compute communication
Ethernet or TCIP/IP
Why is the LUN masking function implemented on the storage processor / controller?
To ensure that the volume access by servers is controlled appropriately, preventing unauthorized or accidental use in a shared environment.
Where is the LUN masking function implemented?
On the storage processor / controller
Process that provides data access control by defining which LUNs a compute system can access.
LUN Masking
How is access to LUNs by a compute system controlled?
LUN masking
Logical Unit Number (LUN)
A unique ID assigned to each logical unit created from the RAID set.
What is done with Logical Units after they are created?
After creation, LUs are then assigned to the compute system for their storage requirements.
How are Logical Units created from a RAID set?
By partitioning (seen as slices of the RAID set) the available capacity into smaller units.
True or False: RAID sets usually have large capacities because they combine the total capacity of individual drives in the set.
TRUE
How should a RAID set be created?
The RAID set should be created from the same type, speed and capacity drives to ensure the maximum usable capacity, reliability, and consistent performance.
What determines the availability, capacity, and performance of a RAID set in an ISS?
Two things: 1) the number of drives in the RAID set, and 2) the RAID level.
How are physical disks configured in an Intelligent Storage System (ISS)?
In an ISS, physical disks are logically grouped together to form a set, call a RAID set, on which a required RAID level is applied.
Key advantage of an Intelligent Storage System
A read request can be serviced DIRECTLY FROM CACHE if the requested data is found in cache.
Four Components of an Intelligent Storage System
1) Front-end 2) Cache 3) Back-end 4) Physical Disks
Why are Intelligent Storage Systems needed?
Disk drives alone, even with a RAID implementation, could not meet performance requirements of today’s applications.
RAID array highly optimized for high performance I/O processing.Has large amounts of cache for improving I/O performance.Has multiple I/O paths.Has operating environment that provides intelligence for managing cache.
Intelligent Storage System
Commonly used RAID Levels
RAID 0 - RAID 1 - Nested - RAID 3 - RAID 5 - RAID 6
RAID 6
Distributed parity RAID with dual parity.
RAID 5
Parity RAID with distributed parity across all the disks in the set.
RAID 3
Parity RAID with DEDICATED parity disk.
Nested RAID
Combinations of RAID levels.Example: RAID 1 + RAID 0
RAID 1
Disk mirroring
RAID 0
Striping with NO FAULT TOLERANCE
Disadvantage of Parity
Parity information is generated from data on the disks.As a result, parity is recalculated every time there is a change in data.This recalculation takes time and affects the performance during write operations.
What happens if a disk fails in a parity-enabled RAID set?
If one of the disks fails in a RAID set, the value of the failed disk’s data is calculated by using the parity information and the data on the surviving disks.
What calculates parity?
Calculation of parity is a function of the RAID controller.
Parity calculation method
Bitwise XOR2.
Where / how can parity information be stored?
Parity information can be stored: 1) On separate, dedicated disk drives, or 2) Distributed across all the drives in a RAID set.
Why is Parity RAID less expensive than Mirroring?
Because parity overhead is only a fraction of the total capacity.
A mathematical construct that allows re-creation of the missing data.
Parity
RAID method of protecting striped data from disk failure without the cost of mirroring.
Parity
What is Nested RAID?
Nested RAID is mirroring implemented with striped RAID, where entire stripes of a disk set are mirrored to stripes on the other disk set.
Why is mirroring expensive?
Because mirroring involves duplication of data - the amount of storage capacity required is twice the amount of data being stored.
Why does mirroring improve read performance?
Because read requests are serviced by both disks.
Why does write performance deteriorate with mirroring?
Because each write request manifests as two writes on the disk drives.
RAID technique that improves performance because read requests are serviced by both disks, but results in diminished write performance.
Mirroring
RAID technique where data is stored on two different disk drives, yielding two copies of data.
Mirroring
Benefit of RAID striping
Allows more data to be processed in a shorter time. Performance increases, when compared to writing / retrieving data to / from one disk at a time.
True or False: With RAID striping, all read-write heads work simultaneously.
True.
Does RAID striping provide fault tolerance?
No.
RAID technique of spreading data across multiple drives in order to use the drives in parallel.
Striping
Helps implement RAID techniques of striping, mirroring, and parity.
RAID controller
RAID techniques that form the basis for defining various RAID levels and determine the data availability and performance of a RAID set.
Striping, mirroring, and parity
How does RAID technology improve storage system performance?
By serving I/Os from multiple disks simultaneously.
Benefits of RAID technology
1) Data protection against drive failures 2) Improved storage system performance
Three RAID techniques
1) Striping 2) Mirroring 3) Parity
Improves storage system performance by serving I/Os from multiple disks simultaneously.
Redundant Array of Independent Disks (RAID)
Technology which utilizes multiple disk drives as a set to provide protection, capacity, and/or performance benefits.Overcomes limitations of disk drives.
Redundant Array of Independent Disks (RAID)
Provides ultra high performance required by mission-critical applications.Very low latency per I/O.Low power requirements.Very high throughput per drive.
Solid State Drives
Random read/write access.Uses mechanical parts for data access.Most popular storage device with large storage capacity.Will eventually fail.
Disk Drive
Write Once and Read Many (WORM)Limited in capacity and speedPopular in small, single-user environments
Optical Disk
Low cost solution for long term data storage.Sequential data access.Subject to physical wear and tear.Subject to storage / retrieval overheads.
Tape Drives
Four Basic Storage Device Options
1) Tape Drive 2) Optical Disk 3) Disk Drive 4) Solid State Drive
Types of media that may be used by a storage device
Magnetic Media - Optical Media - Solid State Media
Type of storage device used is based on what?
1) Type of data 2) Rate at which it is created and used
A resource that stores data persistently for subsequent use.
Storage
Enables the OS to recognize a device and to use a standard interface (provided as an API) to access and control devices.
Device driver
Special software that permits the OS to interact with a specific device (e.g., printer, mouse, or hard drive).
Device driver
Provides a set of OS commands, library subroutines, and other tools that enable the creation and control of logical storage.
Logical Volume Managers (LVM)
True or False: The logical storage structures appear contiguous to the OS and applications.
TRUE
Have the ability to define logical storage structures that can span multiple physical devices.
Logical Volume Managers (LVM)
Introduce a logical layer between the OS and physical storage.
Logical Volume Manager (LVM)
Provides basic security for the access and usage of all managed resources.
Operating System (OS)
Performs basic storage management tasks while managing other underlying components, such as the file system, volume manager, and device drivers.
Operating System (OS)
One of the most important services provided by the OS to the application.
Data access
Works between the application and physical components of the compute system
Operating System (OS)
Monitors and responds to user actions and the environment.
Operating System (OS)
Controls all aspects of a computing environment.
Operating System (OS)
Where can files reside?
Within a disk drive, a disk partition, or a logical volume.
Hierarchical structure of files
File system
Four Logical Components of a Compute System
1) File System 2) Operating System 3) Volume Manager 4) Device Drivers
Checkup mechanism between two nodes in a cluster to see whether a node is up and running
Exchange Heartbeat
Software that connects the nodes in the cluster and provides a single-system view to the clients that are using the cluster.
Cluster service
Method of grouping two or more servers (also known as Nodes) and making them work together as a single system.
Server Clustering
Benefits of blades server technology
1) Greatly increased server density. 2) Lower power and cooling costs. 3) Easier server expansion. 4) Simplified datacenter management.
Provides increased server performance and availability without increase in size, cost, or complexity.
Blade server
Enables the addition of server modules as hot-pluggable components
Blade server
Consolidates power- and system-level function into a single integrated chassis.
Blade server
Commonly used to deploy compute systems in a CDC
Blade server technology
Examples of compute systems
laptops / desktops - blade servers - complex cluster of servers - mainframes
Connectivity outlet on a HBA
Port
Provide connectivity outlets, known as ports, to connect the compute systems to the storage device.
Host Bus Adapter (HBA)
Example of a host controller that connects compute systems to Fibre Channel storage devices.
Host Bus Adapter (HBA)
Type of communication handled by basic I/O devices such as keyboard, mouse, etc.
User to compute
Type of communication enabled using host controller or host adapter
Compute to compute / storage
Type of compute facilitated by I/O devices
1) User to compute 2) Compute to compute / storage
Physical components of compute
CPUMemory - Input/Output (I/O) devices
Consists of physical components (hardware devices) and logical components (software and protocols).
Compute
Resource that runs applications with the help of underlying computing components.
Compute
Examples of DBMSs
MySQL - Oracle RDBMS - SQL Server
Collection of computer programs that control the creation, maintenance, and use of databases.Processes an application’s request for data.Instructs the OS to retrieve the appropriate data from storage.
Database Management System (DBMS)
Structured way to store data in logically organized tables that are interrelated.
Database
Three tiers of a typical business application that uses databases.
1) Front-end tier: the application user interface. 2) Middle tier: the computing logic or the application itself. 3) Back-end tier: the underlying databases that organize the data.
Four types of business applications
1) Email 2) Enterprise Resource Planning (ERP) 3) Decision Support System (DSS) 4) Data Warehouse (DW)
Two types of management applications
1) Resource management 2) Performance tuning
Two types of data protection applications
1) Backup 2) Replication
Four Types of Applications Commonly Deployed in a CDC
1) Business applications 2) Management applications 3) Data protection applications 4) Security applications
Two key I/O characteristics of an application
1) Read intensive vs. write intensive 2) Sequential vs. random
How can manageability be achieved?
Through automation and reduction of manual intervention in common tasks.
Seven Key Requirements of a Data Center
- Manageability 2. Availability 3. Performance 4. Flexibility 5. Scalability 6. Security 7. Data Integrity
Product which offers CDP and CRR functionality
EMC Recover Point
VNX based local replication software that creates point-in-time views or point-in-time copies of logical volumes.
EMC Snapview
Family of products used for full volume and pointer-based local replication in Symmetrix storage arrray
EMC Timefinder
Symmetrix software that performs SAN-based remote replication between Symmetrix and qualified storage arrays.Has full or incremental copy capabilities.
EMC Open Replicator
VNX-basaed software that enables storage array based remote replication
EMC MirrorView