Sie sind auf Seite 1von 4

Q 1. Explain evolution of storage management technology.

Q 2. Differentiate between Magnetic and optical storage

. Q 3. What is ILM.Explain various stages of ILM

Q 4. What is data proliferation?

Q 5. Explain RAID 0,RAID 1 and nested RAID.

Ans1.When cosidering the different storage options.

1.DAS(Direct attached Storage)

2.SAN(Storage area networks)

3.NAS(Network attached storage)

4.RAID

5.Internet prorocol SAN

A Storage Area Network (SAN) applies a networking model to storage in the data center. The SANs
operate behind the servers to provide a common path between servers and stor age devices. Unlike
server-based Direct Attached Storage (DAS) and file-oriented Network Attached Storage (NAS)
solutions, SANs provide block level or file level access to data that is shared among computing and
personnel resources. The predominant SAN technology is implemented in a Fibre Channel (FC)
configuration, although new configurations are becoming popular including iSCSI and Fibre Channel
over Ethernet (FCoE). The media on which the data is stored is also changing.

With the growth of SANs and the worldwide domination of Internet Protocol (IP), using IP networks
to transport storage traffic is in the forefront of technical development. IP networks provide
increasing levels of manageability, interoperability and cost-effectiveness. By converging the storage
with the existing IP networks (LANs/MANs/WANs) immediate benefits are seen through storage
consolidation, virtualization, mirroring, backup, and management. The convergence also provides
increased capacities, flexibility, expandability and scalability.

The two main standards utilizing the IP protocol are FCoE (Fibre Channel over Ethernet), and iSCSI (ip
Small Computer System Interface). Both carry either Fibre Channel or SCSI commands incorporated
into an IP datagram. FCoE is different in that Fibre Channel commands are encapsulated into IP
traffic, but this requires a converged network adapter (CNA) that is capable of speaking both Fibre
Channel and Ethernet for encapsulation. iSCSI operates over standard Ethernet networks and
standard Ethernet adapters at the edge device called the initiator.

Ans2.The key difference between optical storage media, such as CDs and DVDs, and magnetic
storage media, such as hard drives and old-fashioned floppy disks, is in how computers read and
write information to them. One uses light; the other, electromagnetism.

Significance
Computers are binary, meaning that for them to understand information, it has to be boiled down to
a series of digits, each of which is a 1 or a 0. Storage media use different methods of representing
those digits.

Storage

Magnetic storage uses disks coated with a magnetic material. Each tiny bit of the disk carries a
magnetic charge; the direction of that charge determines whether it represents a 1 or a 0. Optical
storage, meanwhile, uses disks made of reflective material; how each bit reflects light--or doesn't
reflect it--determines whether it's a 1 or a 0.

Access

Magnetic storage devices use "read/write heads," electromagnets that detect (read) or change
(write) the magnetisation patterns on the disk. Optical storage devices use lasers to read the
reflections in the disk or "burn" the data pattern into the disks.

Advantages

In general, it's faster and easier to write data to magnetic storage media. However, data stored on
optical media tends to be more durable.

Ans3.information lifecycle management, ILM is the creation and management of a storage


infrastructure and the data that it maintains. All information, or data, in a storage network has a
specific lifecycle, from the time the information enters an organization's system to the time it is
archived or removed from the system.

The information may have a finite lifecycle where the data are eventually removed from a storage
network when the information becomes outdated or no longer needed-or an infinite lifecycle if the
information remains valuable to the organization retaining it.

There are six stages of knowledge.

1.Knowledge of Facts: know the information (eg. what year did Umar (radiallahu an) become the
Khalifa?)

2.Comprehension: think about the information and understand it (eg. the khalifa is in charge of the
entire Muslim ummah)

3.Application: learn and apply the knowledgeit helps you remember. Apply it to your context. What
does it mean for you and me, here, today?

4.Analysis: Analyze the information critically. Get a deeper understanding of the meaning.

5.Synthesis: Link the information to other information you know.

6.Evaluation: recognize more authentic information over other information.


If you study at a university in Canada, you may notice that most of what they teach you doesnt go
beyond the Comprehension stage. Some may reach the Application stage, depending on your field
or it may not.

Ans4.ata proliferation refers to the prodigious amount of data, structured and unstructured, that
businesses and governments continue to generate at an unprecedented rate and the usability
problems that result from attempting to store and manage that data. While originally pertaining to
problems associated with paper documentation, data proliferation has become a major problem in
primary and secondary data storage on computers.

While digital storage has become cheaper, the associated costs, from raw power to maintenance
and from metadata to search engines, have not kept up with the proliferation of data. Although the
power required to maintain a unit of data has fallen, the cost of facilities which house the digital
storage has tended to rise.

Problems caused[edit]

The problem of data proliferation is affecting all areas of commerce as the result of the availability of
relatively inexpensive data storage devices. This has made it very easy to dump data into secondary
storage immediately after its window of usability has passed. This masks problems that could gravely
affect the profitability of businesses and the efficient functioning of health services, police and
security forces, local and national governments, and many other types of organizations.[2] Data
proliferation is problematic for several reasons:

Proposed solutions[edit]

Applications that better utilize modern technology

Reductions in duplicate data (especially as caused by data movement)

Improvement of metadata structures

Improvement of file and storage transfer structures

User education and discipline[3]

The implementation of Information Lifecycle Management solutions to eliminate low-value


information as early as possible before putting the rest into actively managed long-term storage in
which it can be quickly and cheaply accessed.

Ans5.Standard RAID levels. RAID 0: This configuration has striping, but no redundancy of data. It
offers the best performance, but no fault tolerance. RAID 1: Also known as disk mirroring, this
configuration consists of at least two drives that duplicate the storage of data.

Nested RAID levels, also known as hybrid RAID, combine two or more of the standard RAID levels
(where "RAID" stands for "redundant array of independent disks") to gain performance, additional
redundancy or both, as a result of combining properties of different standard RAID layouts.[1][2]

Nested RAID levels are usually numbered using a series of numbers, where the most commonly used
levels use two numbers. The first number in the numeric designation denotes the lowest RAID level
in the "stack", while the rightmost one denotes the highest layered RAID level; for example, RAID 50
layers the data striping of RAID 0 on top of the distributed parity of RAID 5. Nested RAID levels
include RAID 01, RAID 10, RAID 100, RAID 50 and RAID 60, which all combine data striping with other
RAID techniques; as a result of the layering scheme, RAID 01 and RAID 10 represent significantly
different nested RAID levels.

Das könnte Ihnen auch gefallen