Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Fulltextof"ISMBookExercise
Solutions.pdfUnixLabDirectory"
Seeotherformats
Chapter1
1.AhospitalusesanapplicationthatstorespatientXraydataintheformoflarge
binaryobjectsinanOracledatabase.TheapplicationishostedonaUNIXserver,
andthehospitalstaffaccessestheXrayrecordsthroughaGigabitEthernet
backbone.AnEMCCLARiiONstoragearrayprovidesstoragetotheUNIX
server,whichhas6TBofusablecapacity.Explainthecoreelementsofthedata
center.Whatarethetypicalchallengesthestoragemanagementteammayfacein
meetingtheserviceleveldemandsofthehospitalstaff?Describehowthevalue
ofthispatientdatamightchangeovertime.
Solution/Hint:
Coreelementsofthedatacenter:
Application
Databaseoracle
ServerandoperatingsystemUNIXserver
NetworkLAN,SAN
StoragearrayEMCCLARiiONstoragearray
Challenges:
Longtermpreservation
Highcost
Howpatientdatamightchangeovertime:
Forfirst60days,thepatientdataisaccessedfrequently
Afterthattherequirementofthepatientdataisveryless,soitcouldbe
movedtoCAS.
2.Anengineeringdesigndepartmentofalargecompanymaintainsover600,000
engineeringdrawingsthatitsdesigner'saccessandreuseintheircurrentprojects,
modifyingorupdatingthemasrequired.Thedesignteamwantsinstantaccessto
thedrawingsforitscurrentprojects,butiscurrentlyconstrainedbyan
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
1/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
infrastructurethatisnotabletoscaletomeettheresponsetimerequirements.The
teamhasclassifiedthedrawingsas"mostfrequentlyaccessed,""frequently
accessed,""occasionallyaccessed,"and"archive."
Suggestandprovidethedetailsforastrategyforthedesigndepartment
thatoptimizesthestorageinfrastructurebyusingILM.
Explainhowyouwilluse"tieredstorage"basedonaccessfrequency.
Detailthehardwareandsoftwarecomponentsyouwillneedtoimplement
yourstrategy.
Researchproductsandsolutionscurrentlyavailabletomeetthesolution
youareproposing.
Solution/Hint:
Classifythedataaccordingtoaccessfrequencyorvalueandusetiered
storagethatoptimizestheinfrastructurecostandperformancebyusing
ILM.
Storagerequirementcanbeclassifyas:
frequentlyuseddatashouldbeplacedinhighendstoragearray
occasionallyaccessedshouldbeinlowendstoragearray
andarchiveddatainspecializedCASsystem
Hardwareandsoftwarecomponentsneeded:
HighendandMidrangestoragearray
Contentaddressedstorage(CAS)
FCSAN,LAN
Server
Software:
ILMtool
Researchonfollowingproductsandsolutions(www.emc.com)
StoragearraysCLARiiON/Symmetrix
CASCentera
FCSANSwitches/Directors
ILMstrategy
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
2/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
3.Themarketingdepartmentatamidsizefirmisexpanding.Newhiresarebeing
addedtothedepartmentandtheyaregivennetworkaccesstothedepartment's
files.IThasgivenmarketinganetworkeddriveontheLAN,butitkeepsreaching
capacityeverythirdweek.Currentcapacityis500MB(andgrowing),with
hundredsoffiles.UsersarecomplainingaboutLANresponsetimesandcapacity.
AstheITmanager,whatcouldyourecommendtoimprovethesituation?
Solution/Hint:
NAS
4.Alargecompanyisconsideringastorageinfrastructureonethatisscalableand
provideshighavailability.Moreimportantly,thecompanyalsoneeds
performanceforitsmissioncriticalapplications.Whichstoragetopologywould
yourecommend(SAN,NAS,IPSAN)andwhy?
Solution/Hint:
SANisarecommendedsolution.
BecauseSANhashighscalabilityandavailability(usingdirectoror
switch).
Chapter2
WhatarethebenefitsofusingmultipleHBAsonahost?
Solution/Hint:
Highavailability
Anapplicationspecifiesarequirementof200GBtohostadatabaseandother
files.Italsospecifiesthatthestorageenvironmentshouldsupport5,000IOPS
duringitspeakprocessingcycle.Thedisksavailableforconfigurationprovide
66GBofusablecapacity,andthemanufacturerspecifiesthattheycansupporta
maximumof140IOPS.Theapplicationisresponsetimesensitiveanddisk
utilizationbeyond60percentwillnotmeettheresponsetimerequirementsofthe
application.Computeandexplainthetheoreticalbasisfortheminimumnumber
ofdisksthatshouldbeconfiguredtomeettherequirementsoftheapplication.
Solution/Hint:
Numberofdiskrequired=max(sizerequirement,IOPSrequirements)
Tomeetthesizerequirement=200GB/66GB=4disks
TomeettheIOPSrequirement=5000IOPS/(140x0.6IOPS)=60disks
=max(4,60)=60disks
Whichcomponentsconstitutethediskservicetime?Whichcomponent
contributesthelargestpercentageofthediskservicetimeinarandomI/O
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
3/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
operation?
Solution/Hint:
seektime,rotationallatencyandtransferrate
seektime
Whydoformatteddiskshavelesscapacitythanunformatteddisks?
Solution/Hint:
Inordertomakestoragedevicefunctional,itneedtobeformatted.
CommontypesofdriveformatsareFAT32,NTFSandext2.Ineachof
theformattingschemes,aportionofthestoragespaceisallocatedto
configuredfilesystemtoenablecatalogingdataonthediskdrive.
TheaverageI/Osizeofanapplicationis64KB.Thefollowingspecificationsare
availablefromthediskmanufacturer:averageseektime=5ms,7,200rpm,
transferrate=40MB/s.DeterminethemaximumIOPSthatcouldbeperformed
withthediskforthisapplication.Takingthiscaseasanexample,explainthe
relationshipbetweendiskutilizationandIOPS.
Solution/Hint:
Thediskservicetime(Rs)isakeymeasureofdiskperformance;and
Rsalongwithdiskutilizationrate(U)determinestheI/Oresponsetime
forapplications.
Thetotaldiskservicetime(Rs)isthesumofseektime(E),rotational
latency(L),andtheinternaltransfertime(X):
Rs=E+L+X
EisdeterminedbasedontherandomnessoftheI/Orequest.Land
Xaremeasuresprovidedbydiskvendorsastechnical
specificationsofthedisk.
Averageseektimeof5msinarandomI/Oenvironment,orE=5ms
Diskrotationspeedof7,200rpmfromwhichrotationallatency(L)
canbedetermined,whichisonehalfofthetimetakenforafull
rotationor
L=(0.5/7,200rpmexpressedinms)
40MB/sinternaldatatransferrate,fromwhichtheinternaltransfer
time(X)isderivedbasedontheblocksizeoftheI/O.
Withablocksizeof64KB,X=64KB/40MB
ConsequentlyRs=5ms+(0.5/7,200)+64KB/40MB
=5+4.167+1.6
=10.767ms
Themaximumno.ofI/OsservicedpersecondorIOPS=1/RS
Inotherwords,foranI/Owithablocksizeof64KBand
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
4/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Rs=10.767ms,themaximumIOPSwillbe
1/(10.767*10"3)=92.876IOPS
6.ConsideradiskI/OsysteminwhichanI/Orequestarrivesattherateof80IOPS.
Thediskservicetimeis6ms.
a.Computethefollowing:UtilizationofI/Ocontroller,Totalresponsetime,
Averagequeuesize,andTotaltimespentbyarequestinaqueue.
b.Computetheprecedingparameteriftheservicetimeishalved.
Solution/Hint:
Arrivalrate(a)=80IOPS,consequently,thearrivaltime
Ra=1/a=1/80=12.5ms
Rs=6ms(given)
1.Utilization(U)=Rs/Ra
=6/12.5=0.48or48%
2.Responsetime(R)=Rs/(1U)
=6/(10.48)=11.5ms
3.Averagequeuesize=U/(1U)
=(0.48)2/(l0.48)
=0.44
4.Timespentbyarequestinaqueue=UxR,orthetotalresponsetimeservice
time=0.48x11.5=5.52ms
Now,ifcontrollerpowerisdoubled,ortheservicetimeishalved;
consequentlyRs=3msinthisscenario.
1.Utilization(U)=Rs/Ra=3/12.5=0.24or24%
2.Responsetime(R)=Rs/(1U)=3/(10.24)=3.9ms
3.Averagequeuesize=U2/(lU)=(0.24)2/(10.24)=0.08
4.Timespentbyarequestinaqueue=0.24x3.9=0.936ms
7.RefertoQuestion6andplotagraphshowingtheresponsetimeandutilization,
considering20percent,40percent,60percent,80percent,and100percent
utilizationoftheI/Ocontroller.Describetheconclusionthatcouldbederived
fromthegraph.
Solution/Hint:
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
5/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
1.
Utilization=20%=0.2
Responsetime
7.5ms
2.
Itili/ation=40
%=0.4
Responsetime=
10ms
3.
Utilization=60
%=0.6
Responsetime
15ms
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
6/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
4.
1tiliAition=80
%=0.8
Responsetime
30ms
5.
LUili/ation=100
%=1
Responsetime=
infinity
70i
^,,,,,,,,
102030405060708090
Utilization(%)
Chapter3
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
7/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
1.WhyisRAID1notasubstituteforabackup?
Solution/Hint:
RAID1providesprotectionagainstdiskfailureandnotasolutionfordata
recoveryduetodisaster.
2.WhyisRAIDnotanoptionfordataprotectionandhighavailability?
Solution/Hint:
Itdoesnotprovideanydataprotection.
3.ExplaintheprocessofdatarecoveryincaseofadrivefailureinRAID5.
Solution/Hint:
ItperformsXORoperationbetweenremainingdisksandregeneratelost
data.
4.WhatarethebenefitsofusingRAID3inabackupapplication?
Solution/Hint:
BackupapplicationperformslargesequentialI/OsandRAID3givesbest
resultincaseoflargesequentialI/Ooperation.
5.DiscusstheimpactofrandomandsequentialI/OindifferentRAID
configurations.
Solution/Hint:
RAID
Random
Sequential
Goodforrandomreadsandpoorto
fairforsmallrandomwrites.
verygoodforsequentialreadsand
goodforlarge,sequentialwrites.
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
8/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Verygoodforrandomreads.Fair
forrandomwrite.Slowerdueto
parityoverhead.
Goodforsequentialreads.Fairto
goodforsequentialwrites.
1/0
Verygoodforrandomwrite.
Poortofairforsequentialwrites
6.A10Krpmdriveisratedtoperform130IOPS,anda15Krpmdriveisratedto
perform180IOPSforanapplication.Theread/writeratiois3:1.Computethe
RAIDadjustedIOPSforthe10Kand15KdrivesforRAID1,RAID5,andRAID
6.
Solution/Hint:QuestionInvalid
7.Anapplicationhas1,000heavyusersatapeakof2IOPSeachand2,000typical
usersatapeakof1IOPSeach,witharead/writeratioof2:1.Itisestimatedthat
theapplicationalsoexperiencesanoverheadof20percentforotherworkloads.
CalculatetheIOPSrequirementforRAID1,RAID3,RAID5,andRAID6.
Solution/Hint:
1000heavyusersatapeakof2IOPSeach=2000IOPS
2000typicalusersatapeakof1IOPSeach=2000IOPS
Assumemaximumconcurrency90%
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc
9/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
[(2000+2000)*0.9]=3600hostbasedIOPSfor3000usersduringpeak
activityperiod
read/writeratio2:1
8.ForQuestion7,computethenumberofdrivesrequiredtosupporttheapplication
indifferentRAIDenvironmentsif10Krpmdriveswitharatingof130IOPSper
drivewereused.
Solution/Hint:
NumberofdrivesrequiredtosupporttheapplicationindifferentRAID
environments,if10krpmdriveswitharatingof130IOPSperdrive
ForRAID1
ForRAID3
ForRAID5
ForRAID6
3600*2/3+(2*1/3*3600)
3600*2/3+(4*1/3*3600)
3600*2/3+(4*1/3*3600)
3600*2/3+(6*1/3*3600)
4800IOPS
7200IOPS
7200IOPS
9600IOPS
ForRAID1=4800/130=37drives
ForRAID3=7200/130=55drives
ForRAID5=7200/130=55drives
ForRAID6=9600/130=74drives
Chapter4
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
10/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
1.ConsiderascenarioinwhichanI/Orequestfromtrack1isfollowedbyanI/O
requestfromtrack2onasectorthatis180degreesawayfromthefirstrequest.A
thirdrequestisfromasectorontrack3,whichisadjacenttothesectoronwhich
thefirstrequestismade.Discusstheadvantagesanddisadvantagesofusingthe
commandqueuingalgorithminthisscenario.
Solution/Hint:
Inthisscenario,commandqueuingproviderotationallatencyoptimization
whererequestfromtrack3isservicedbeforerequest2toavoidone
rotationtiming.Assumeifrequest3isfromthesametrack1inthatcase
commandqueuingprovidesseektimeoptimizationandimprovesdisk
performance.
2.WhichapplicationbenefitsthemostbybypassingthewritecacheandWhy?
Solution/Hint:
ApplicationwithverylargesizeI/Owrites.
3.AnOracledatabaseusesablocksizeof4KforitsI/Ooperation.Theapplication
thatusesthisdatabaseprimarilyperformsasequentialreadoperation.Suggest
andexplaintheappropriatevaluesforthefollowingcacheparameters:cachepage
size,cacheallocation(readversuswrite),prefetchtype,andwriteasidecache.
Solution/Hint:
Cachepagesize:4K
Cacheallocation(readversuswrite):morereadcache
prefetchtype:fixedprefetch
Writeasidecache:Largevalue
Chapter5
1.DASprovidesaneconomicallyviablealternativetootherstoragenetworking
solutions.Justifythisstatement.
Solution/Hint:
Setuprequiresarelativelylowerinitialinvestment
Setupismanagedusinghostbasedtools,suchasthehostOS,whichmakes
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
11/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
storagemanagementtaskseasyforsmallandmediumenterprises.
Requiresfewermanagementtasks,andlesshardwareandsoftwareelements
tosetupandoperate.
2.HowistheprioritysequenceestablishedinawideSCSIenvironment?
Solution/Hint:
InawideSCSI,thedeviceIDsfrom8to15havethehighestpriority,butthe
entiresequenceofwideSCSIIDshaslowerprioritythannarrowSCSIIDs.
Therefore,theoverallprioritysequenceforawideSCSIis7,6,5,4,3,2,1,0,
15,14,13,12,11,10,9,and8.
3.WhyisSCSIperformancesuperiortothatofIDE/ATA?Explainthereasonsfrom
anarchitecturalperspective.
Solution/Hint:
SCSIoffersimprovedperformanceandexpandabilityandcompatibility
options,makingitsuitableforhighendcomputers.
Numberofdevicessupportedis16
SCSIarchitecturederivesitsbasefromtheclientserverrelationship
SCSIinitiator,oraclient,sendsarequesttoaSCSItarget,oraserver.
Thetargetperformsthetasksrequestedandsendstheoutputtotheinitiator
Whenadeviceisinitialized,SCSIallowsforautomaticassignmentofdevice
IDsonthebus,whichpreventstwoormoredevicesusingthesameSCSIIDs.
4.ResearchbladeserverarchitectureanddiscussthelimitationsofDASforthis
architecture.
Solution/Hint:DASLimitations
DASdoesnotscalewell,hasalimitednumberofports
AlimitedbandwidthinDASrestrictstheavailableI/Oprocessingcapability.
ThedistancelimitationsassociatedwithDAS
Inabilitytosharetheresources,unusedresourcescannotbeeasilyre
allocated,resultinginislandsofoverutilizedandunderutilizedstoragepools.
5.WhatwouldyouconsiderwhilechoosingserialorparalleldatatransferinaDAS
implementation?Explainyouranswerandjustifyyourchoice.
Solution/Hint:
Distanceandspeedarethekeyfactors
Serialdatatransfercanovercomethedistancelimitations
Paralleldatatransfercanovercometheseedlimitations
ParalleldatatransferissuitableforInternalDAS
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
12/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
SerialdatatransferissuitableforExternalDAS
6.Ifthreeharddiskdrivesareconnectedinadaisychainandcommunicateover
SCSI,explainhowtheCPUwillperformI/Ooperationswithaparticulardevice.
Solution/Hint:
Eachdiskwillbeidentifiedbycn|tn|dnnumber
Asthethreedisksareconnectedinadaisychaincnandtnnumberwillbe
thesameforallthedisks
SCSIcommands/responsewillbeusedforthecommunication
Chapter6
1.Whatiszoning?Discussascenario,
(i)wheresoftzoningispreferredoverhardzoning.
(ii)wherehardzoningispreferredoversoftzoning.
Solution/Hint:
ZoningisanFCswitchfunctionthatenablesnodeswithinthefabrictobe
logicallysegmentedintogroupsthatcancommunicatewitheachother.Azone
consistsofselecteddevices,suchashostbusadapters(HBAs)andstorage
devices,inthefabric.Devicesassignedtoonezonecancommunicatewithother
devicesinthesamezone,butnotwithdevicesinzonesofwhichtheyarenot
members.Thiszoningpracticeprovidesafast,efficient,andreliablemeansof
controllingtheHBAdiscovery/loginprocess.Withoutzoning,theHBAwill
attempttologintoallportsonthefabricduringdiscoveryandduringtheHBA's
responsetoastatechangenotification.Withzoning,thetimeandFibreChannel
bandwidthrequiredtoprocessdiscoveryandthestatechangenotificationare
minimized.
(i)SoftzoningisalsocalledWWNzoninganditispreferredwhenuserneed
flexibilitytophysicallymoveattachednodesbetweenswitchportsrecablethe
SAN,thatmaytakeplaceduringswitchmaintenanceandrepairwithout
reconfiguringthezoneinformation.ThisispossiblebecausetheWWNisstaticto
thenodeport.
(ii)Hardzoningisalsocalledportzoning,itisconvenientwhenthereisaneed
forhardwarereplacementasWWNisuniquelyassociatedwithahardware.
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
13/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
2.DescribetheprocessofassigningFCaddresstoanodewhenloggingintothe
networkforthefirsttime.
Solution/Hint::
Tologontothefabric,anodesendsaFLOGIframewiththeWorldWideNode
Name(WWNN)andWorldWidePortName(WWPN)parameterstothelogin
serviceatthewellknownFCaddressFFFFFE.Inturn,theswitchacceptsthe
loginandreturnsanAccept(ACC)framewiththeassignedFCaddressforthe
device.ImmediatelyaftertheFLOGI,theN_portregistersitselfwiththelocal
nameserverontheswitch,indicatingitsWWNN,WWPN,andassignedFC
address.
3.Seventeenswitches,with16portseach,areconnectedinameshtopology.How
manyportsareavailableforhostandstorageconnectivityifyoucreateahigh
availabilitysolution?
Solution/Hint:
Totalports=17*16=272
NumberofISL136
EachISLconsumes2ports
numberofportsavailableforhosts
4.DiscusstheadvantageofFCSWoverFCAL.
Solution/Hint::
Unlikealoopconfiguration,aFibreChannelswitchedfabric(FCSW)network
providesinterconnecteddevices,dedicatedbandwidth,andscalability.Theaddition
orremovalofadeviceinaswitchedfabricisminimallydisruptive;itdoesnotaffect
theongoingtrafficbetweenotherdevices(ascomparedtoFCAL).InFCSW,nodes
donotsharealoop;instead,dataistransferredthroughadedicatedpathbetweenthe
nodes.FCuses24bitfibrechanneladdressingschemeforconnectivitywhichcan
supportupto15milliondevices(FCALuses8bitaddressingwhichcansupportup
to127devicesonaloop)
5.HowflowcontrolworksinFCnetwork.
Solution/Hint::
Flowcontrolisusedtodefineandregulatethepaceofflowofdataframesbetween
senderandreceiverduringdatatransmission.FCtechnologyusestwoflowcontrol
mechanisms:buffertobuffercredit(BBCredit)andendtoendcredit(EECredit).
BB_Credit:Theprocessisasfollows
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
14/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
1.Atlogin,thetransmitterandthereceiverexchangeparametersandestablishthe
BBCreditvalue.
2.Thetransmitter'scountinitializestotheBBCreditvalue.
3.If(BBCredit>0),transmittersendsaframe,anddecrementsthecountper
transmittedframe.
4.AnRRDY(ReceiverReady)issentfromthereceivingporttothetransmitting
portforeveryavailablebufferonthereceivingside.
5.Thetransmitterincrementsthecountby1foreachRRDYitreceivesfromthe
receiver.Thetransmittingportmaintainsacountoffreereceiverbuffers.
5.Uponalinkreset,theBBCreditvalueresetstothevaluenegotiateduponlogin.
EE_Credit
Thefunctionofendtoendcredit,knownasEECredit,issimilartothatof
BB_Credit.(TheEECreditmechanismisusedfortheflowcontrolforclass1and
class2trafficonly).
6.Whyisclass3servicemostpreferredforFCcommunication?
Solution/Hint:
Nondedicatedconnection
BBcredit
Highbandwidthutilization
Supportformultiplexing
Chapter7
1.ListandexplaintheconsiderationsforcapacitydesignforbothCPUandstorage
inaNASenvironment.
Solution/Hint:
ThescalabilityofcapacitycanbeaconstraintinanintegratedNAS.However,
thegatewayNAScanscalefortherequiredconnectivityandstorage.
GatewayNASsharesCPUloadwithSANworkloadandmayfaceconstraint
onCPUutilization.Typically,CPUcapacityisnotthemajorbottleneckfactor
inaNASsystem,butotherconsiderationssuchasmemoryrequirement,
numberofnetworkports,filesystem,IOPSrequirements,alongwithstorage
capacityrequirementsareimportantfactor.
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
15/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
2.SANisconfiguredforbackuptoadiskenvironment,andthestorage
configurationhasadditionalcapacityavailable.CanyouhaveaNASgateway
configurationusethisSAN?Discusstheimplicationsofsharingthebackupto
diskSANenvironmentwithNAS.
Solution/Hint:
AstheadditionalcapacityisavailablegatewayNAScanbeimplemented.
Butduringthebackupwindowitwillhaveconsiderableperformanceimpact
onNetworkandhenceNAS.
3.ExplainhowtheperformanceofNAScanbeaffectediftheTCPwindowsizeat
thesenderandthereceiverarenotsynchronized.
Solution/Hint:
ThiswillaffecttheNASperformanceasthismayleadtoretransmissionof
data,lowerbandwidthutilization,performancedegradationofthenetwork,
intermittentconnectivity,anddatalinkerrors.
4.ResearchtheuseofbabyjumboframesandhowitaffectsNASperformance.
Solution/Hint:
CommonEthernetJumboframesizeis9000Bytes
Babyjumboframessizeis2.5KBBytes
5.ResearchthefilesharingfeaturesoftheNFSprotocol.
Hint:Researchquestion(refertoNFSprotocolsectioninthebook)
6.ANASimplementationconfiguredjumboframesontheNAShead,with9,000as
itsMTU.However,theimplementersdidnotseeanyperformanceimprovement
andactuallyexperiencedperformancedegradation.Whatcouldbethecause?
Researchtheendtoendjumboframesupportrequirementsinanetwork.
Solution/Hint:
Jumboframesareusedattheendpoint(NASHead)withMTUof9000
CheckiftheintermediatenetworkusesadifferentMTUsize(e.g.1500).
Thiscancausetheroutertodroppacketswhichthenhavetoretransmitatthe
TCPlayer.
Packetsarethenfragmentedandhavetoreassembletoaccommodatethe
differentMTUsizes.Thisdegradesnetworkperformance.
7.AcmeCorporationistryingtodecidebetweenanintegratedoragatewayNAS
solution.TheexistingSANatAcmewillprovidecapacityandscalability.TheIT
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
16/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
departmentisconsideringaNASsolutionfortheTrainingdepartmentatAcme
fortrainingvideos.Thevideoswouldonlybeusedbythetrainingdepartmentfor
evaluationofinstructors.PickaNASsolutionandexplainthereasonsforyour
choice.
Solution/Hint:
ExistingSAN;sothechoicewillbegatewayNAS
CheckifSANhasadditionalcapacityavailable.
Chapter8
1.HowdoesiSCSIhandletheprocessofauthentication?Researchtheavailable
options.
Solution/Hint::
CHAP(Challengehandshakeauthenticationprotocol)
2.ListsomeofthedatastorageapplicationsthatcouldbenefitfromanIPSAN
solution.
Solution/Hint:
ExtendingreachofexistingSAN
Disasterrecoverysolutions
Remoteofficeapplications
3.WhatarethemajorperformanceconsiderationsforFCIP?
Solution/Hint:
Refersection8.2.2FCIPPerformanceandsecurity
4.ResearchthemultipathingsoftwareavailableforaniSCSIenvironment.Writea
technicalnoteonthefeaturesandfunctionalityofEMCPowerPathsupportfor
iSCSI.
Hint:Researchwork
5.ResearchtheiSCSIcapabilitiesinaNASdevice;provideusecaseexamples.
Hint:Researchwork
6.Acompanyisconsideringimplementingstorage.Theydonothaveacurrent
storageinfrastructuretouse,buttheyhaveanetworkthatgivesthemgood
performance.DiscusswhethernativeorbridgediSCSIshouldbeusedandexplain
yourrecommendation.
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
17/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Solution/Hint:
NativeiSCSIimplementationdoesn'tinvolveanyFCcomponentswhile
BridgediSCSIimplementationinvolvesFCcomponents
Asthecompanydoesn'thavestorageinfrastructureandthenetworktheyhave
givesthemagoodperformancenativeiSCSIshouldbedeployed.
iSCSIenabledStorageisonlyneededifnativeiSCSIistobeimplementedin
thiscase.
7.TheIPbandwidthprovidedforFCIPconnectivityseemstobeconstrained.
DiscussitsimplicationsiftheSANsthataremergedarefairlylarge,with500
portsoneachside,andtheSANsatbothendsareconstantlyreconfigured.
Solution/Hint:
AsbandwidthisinsufficientIPnetworkwillbecomethebottleneck
Asthefabricsonbothsidesarefairlylargeandareconstantlyreconfigured
anydisruptionintheIPnetworkwillleadtoinstabilitiesinunifiedfabric.
Theseincludeasegmentedfabric,excessiveRSCNs,andhost
timeouts.
ThesolutioncanbetosegregateFCIPtrafficintoaseparatevirtualfabric,to
provideadditionalstability,
8.ComparedtoastandardIPframe,whatpercentageofreductioncanberealizedin
protocoloverheadinaniSCSIconfiguredtousejumboframeswithanMTU
valueof9,000?
Solution/Hint:
iSCSIPDUsize=1460bytes(containpayloadandadditionalheadersegment)
Jumboframesizeof9000MTUoutofwhichpayloadis8960
JumboFramesallowsasignificantamountofincreasedpayloadtobe
deliveredineachiSCSIPDU.
9.WhyshouldanMTUvalueofatleast2,500beconfiguredinabridgediSCSI
environment?
Solution/Hint:
FCsupportsframesizeof2148byte
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
18/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Chapter9
1.ExplainhowaCASsolutionfitsintotheILMstrategy.
Solution/Hint:
AccordingtoILMstrategyvalueofinformationchangesoveritslifecycle,when
createdvalueofinformationisveryhighanditisfrequentlyaccessedand
changed,henceplacedinahighperformancecostlystorage.Withthetimeits
valuedropsanditbecomesfixedcontentwhichisrarelyaccessed,butstillholds
placeincostlystoragespace.Forthecostoptimizationlessaccesseddatashould
bemovedtoarchivedandleavethecostlyspaceforhighvaluedata.CASisa
solutionforarchiveddata,whichnotonlyprovidecostbenefitbutalsoprovide
fasteraccessandreliablestoragetofixedcontent.
2.ToaccessdatainaSAN,ahostusesaphysicaladdressknownasalogicalblock
address(LBA).AhostusingaCASdevicedoesnotuse(orneed)aphysical
address.Why?
Solution/Hint:
Unlikefilelevelandblockleveldataaccessthatusefilenamesandthe
physicallocationofdataforstorageandretrieval,CASstoresdataandits
attributesasanobject.Thestoredobjectisassignedagloballyunique
addressknownasacontentaddresswhichisderivedfromtheactualbinary
representationofstoreddata.
3.TheITdepartmentofadepartmentalstoreusestapetoarchivedata.Explain45
majorpointsyoucouldprovidetopersuadetheITdepartmenttomovetoaCAS
solution.HowwouldyoursuggestionsimpacttheITdepartment?
Solution/Hint:
GuaranteedContentAuthenticityandIntegrity:Datacannotbemanipulated
oncestored,meetregulatoryandbusinesscompliance.
SingleInstanceStorage:Simplifiesstorageresourcemanagement,especially
whenhandlinglargeamountoffixedcontent.
FasterDataRetrieval:Comparedtotape
Technologyindependence:Aslongastheapplicationserverisabletomapthe
originalcontentaddressthedataremainsaccessible.
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
19/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Betterdataprotectionanddisposition:AllfixedcontentisstoredinCASonce
andisbackedupwithaprotectionscheme.
Chapter10
1.WhatdoVLANsvirtualize?DiscussVLANimplementationasavirtualization
technology.
Solution/Hint:
VLANstandforvirtualLANwhichhassameattributesasofphysicalLAN,butallows
hoststobegroupedtogethereveniftheyarenotlocatedonthesamenetworkswitch.
Withtheuseofnetworkreconfigurationsoftware,portsonthelayer2switchcanbe
logicallygroupedtogether,formingaseparate,VirtualLocalAreaNetwork.VLANshelp
tosimplifynetworkadministration.PortsinaVLANcanbelimitedtoonlythenumber
neededforaparticularnetwork.ThisallowsunusedportstobeusedinotherVLANs.
Throughsoftwarecommands,additionalportscanbeaddedtoanexistingVLANif
furtherexpansionisneeded.IfamachineneedstobemovedtoadifferentIPnetwork,
theportisreassignedtoadifferentVLANandthereisnoneedforthephysical
movementofcables.
3.Howcanablocklevelvirtualizationimplementationbeusedasadatamigrationtool?
Explainhowdatamigrationwillbeaccomplishedanddiscusstheadvantagesofusing
thismethodforstorage.Comparethismethodtotraditionalmigrationmethods.
Solution/Hint:
Conventionallydatamigrationneedsphysicalremappingofserverstonewstorage
locationwhichresultedinapplicationdowntimeandphysicalchanges.Inavirtualized
environmentvirtualvolumesareassignedtothehostoutofphysicalpoolofstorage
capacity.Datamigrationisachievedthroughthesevirtualvolumes.Tomoveavirtual
volume,virtualizationsoftwareperformsaredirectionofLOfromonephysicallocation
toanother.DespitethefactthattheLOisphysicallyredirectedtoanewlocationbythe
virtualizationsoftware,theaddressofthevirtualvolumepresentedtothehostnever
changes.Thisisaccomplishedthroughvirtualaddressing.Thisallowstheprocesstobe
transparentandnondisruptivetothehost.Additionally,sincethecopyingandremapping
isdonebythevirtualizationsystem,nohostcyclearerequired,freeingserverstobe
dedicatedtotheirproperapplicationcentricfunction.
Chapter11
1.Anetworkrouterhasafailurerateof0.02percentper1,000hours.Whatisthe
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
20/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
MTBFofthatcomponent?
Solution/Hint:
MTBFofnetworkrouter=1/Failurerate
=100*1000/0.02
=50,00,000hrs
2.TheITdepartmentofabankpromisescustomeraccesstothebankratetable
between9:00a.m.and4:00p.m.fromMondaytoFriday.Itupdatesthetable
everydayat8:00a.m.withafeedfromthemainframesystem.Theupdate
processtakes35minutestocomplete.OnThursday,duetoadatabasecorruption,
theratetablecouldnotbeupdated,andat9:05a.m.,itwasestablishedthatthe
tablehaderrors.Arerunoftheupdatewasdone,andthetablewasrecreatedat
9:45a.m.Verificationwasrunfor15minutes,andtheratetablebecameavailable
tothebankbranches.Whatwastheavailabilityoftheratetablefortheweekin
whichthisincidenttookplace,assumingtherewerenootherissues?
Solution/Hint:
Availability=totaluptime/totalscheduledtime
Totalscheduledtime=7hrs*5=35hrs
Totaluptime=34hrs(asonThursdayratetablewasmadeavailableat10:00am
insteadof9:00am)
Therefore,availabilityoftheratetablefortheweek=34/35
3.'Availabilityisexpressedintermsof9s."Explaintherelevanceoftheuseof9s
foravailability,usingexamples.
Solution/Hint:
Uptimeperyearisbasedontheexacttimelinessrequirementsofthe
service,thiscalculationleadstothenumberof"9s"representationfor
availabilitymetrics.
Forexample,aservicethatissaidtobe"five9savailable"isavailablefor
99.999percentofthescheduledtimeinayear(24x7x365).
Uptime(%)Downtime(%)DowntimeperDowntimeper
YearWeek
99.9990.0015.25minutes6sec
4.Provideexamplesofplannedandunplanneddowntimeinthecontextofdata
centeroperations.
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
21/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Solution/Hint:
Examplesofplanneddowntime:installation/integration/maintenanceof
newhardware,softwareupgradesorpatches,takingbackups,application
anddatarestores,facilityoperations(renovationandconstruction),
refresh/migrationoftestingenvironmenttotheproductiondata
Examplesofunplanneddowntime:failurecausedbydatabasecorruption,
componentfailure,humanerrors
5.HowdoesclusteringhelptominimizeRTO?
Solution/Hint:
RTOof1hour:Clusterproductionserverswithcontrollerbaseddisk
mirroring.
RTOofafewseconds:Clusterproductionserverswithbidirectional
mirroring,enablingtheapplicationstorunatbothsitessimultaneously.
6.Howisthechoiceofarecoverysitestrategy(coldandhot)determinedinrelation
toRTOandRPO?
Solution/Hint:
RTOandRPOsmallhotsite
RTOandRPOlargecoldsite
7.Assumethestorageconfigurationdesignshowninthefollowingfigure:
Performthesinglepointoffailureanalysisforthisconfigurationandprovidean
alternateconfigurationthateliminatesallsinglepointsoffailure.
Solution/Hint:
Singlepointoffailure:host,switch,storagearray,HBA,arrayportand
path
AlternateconfigurationasshownbelowtoavoidSPF
Host
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
22/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Storage
Array
t.iuslhimiISkrhrh
RedundantFCSwitcherI
Chapter12
1.Amanufacturingcorporationusestapeasitsprimarybackupstoragemedia
throughouttheorganization:
FullbackupsareperformedeverySunday.
IncrementalbackupsareperformedMondaythroughSaturday.
Theenvironmentcontainsmanybackupservers,backingupdifferent
groupsofservers.
Theemailanddatabaseapplicationshavetobeshutdownduringthe
backupprocess.
Duetothedecentralizedbackupenvironment,recoverabilityisoften
compromised.Therearetoomanytapesthatneedtobemountedtoperformafull
recoverincaseofacompletefailure.Thetimeneededtorecoveristoolengthy.
Thecompanywouldliketodeployaneasytomanagebackupenvironment.They
wanttoreducetheamountoftimetheemailanddatabaseapplicationsare
unavailable,andreducethenumberoftapesrequiredtofullyrecoveraserverin
caseoffailure.
Proposeabackupandrecoverysolutiontoaddressthecompany'sneeds.Justify
howyoursolutionensuresthattheirrequirementswillbemet.
Solution/Hint:
Thesolutionshouldhavethefollowingelements:
Centralizedbackupserver
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
23/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Backupagentstoavoidtherequirementforcriticalapplicationstobe
shutdownduringthebackupprocess.
Useofacumulativebackuppolicyinsteadofincrementalbackups,
reducingtheamountoftaperequiredforafullrestore.
2.TherearelimitedbackupdevicesinafilesharingNASenvironment.Suggesta
suitablebackupimplementationthatwillminimizethenetworktraffic,avoidany
congestion,andatthesametimenotimpacttheproductionoperations.Justify
youranswer.
Solution/Hint:
ThisisachievedbytheintroductionofNDMP,topromotedatatransportbetween
NASandbackupdevices.Duetoitsflexibilityitisnolongernecessaryto
transportthedatathroughthebackupserver.Dataissentfromthefilerdirectlyto
thebackupdevice,whilemetadataissenttothebackupserverfortracking
purposes.Thissolutionmeetsthestrategicneedtocentrallymanageandcontrol
distributeddata,whileminimizingnetworktraffic.NDMP3wayisusefulwhen
therearelimitedbackupdevicesintheenvironment,enablingtheNASdevice
controllingthebackupdevicetoshareitwithotherNASdevices,byreceiving
backupdataviaNDMP.
3.Discussthesecurityconcernsinbackupenvironment.
Solution/Hint:
Majorsecurityconcerninbackupenvironmentisspoofingbackupserver,backupclientor
backupnodeidentitybyunauthorizedhost,togainaccesstobackupdata.Anotherconcernis
backuptapebeinglost,stolen,ormisplaced,especiallyifthetapescontainhighlyconfide
ntial
information.Backuptotapeapplicationsarealsovulnerabletosecurityimplicationsifthe
y
donotencryptdatawhilebackingup.Lastlybackupdatashreddingshouldalso
consider,byperformingsafetapedataerasureoroverwritingiftheynolonger
required.
4.Whatarethevariousbusiness/technicalconsiderationsforimplementingabackup
solution,andhowdotheseconsiderationsimpactthebackupsolution/
implementation?
Solution/Hint:
>RTOandRPOaretheprimaryconsiderationsinselectingandimplementinga
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
24/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
>specificbackupstrategy.
>Retentionperiod
>Backupmediatype
>Backupgranularity
>Timeforperformingbackupandavailablebackupwindow
>Locationandtimeoftherestoreoperation
>filecharacteristics(location,size,andnumberoffiles)anddatacompression
5.Whatisthepurposeofperformingoperationbackup,disasterrecovery,
andarchiving?
Solution/Hint:
Operationbackup:Torestoredataintheeventofdatalossorlogicalcorruptions
Disasterrecovery:Forrestoringdataatanalternatesitewhentheprimarysiteis
incapacitatedduetoadisaster.
Archiving:Forlongtermdataretention(regulatorycomplianceorbusiness
requirement)
6.Listandexplaintheconsiderationsinusingtapeasthebackuptechnology.What
arethechallengesinthisenvironment?
Solution/Hint:
Advantages:
Offsitedatacopy
Lowerinitialcost
Challenges:
Reliability
Restoreperformance(mount,loadtoready,rewind,dismounttimes)
SequentialAccess
HVACcontrolledenvironment
Shipping/handlingchallenges
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
25/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
7.Describethebenefitsofusing"virtualtapelibrary"over"physicaltapes."
Features
Tape
VirtualTape
OffsiteCapabilities
Yes
Yes
Reliability
Noinherent
protectionmethods
RAID,spare
Performance
Subjecttomechanical
operations,loadtimes
Fastersinglestream
Use
Backuponly
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
26/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Backuponly
Chapter13
1.Whatistheimportanceofrecoverabilityandconsistencyinlocalreplication?
Solution/Hint:
Recoverabilityenablesrestorationofdatafromthereplicastotheproduction
volumesintheeventofdatalossordatacorruption.
RecoverabilitymustprovideminimalRPOandRTOforresuming
businessoperationsontheproductionvolumes.
Consistencyensurestherestartabilityfromdata.Businessoperationcannot
resumefrominconsistentdata.
2.Describetheusesofalocalreplicainvariousbusinessoperations.
Solution/Hint:
Alternatesourceforbackup
Fastrecovery
Decisionsupportactivitiessuchasreporting
Testingplatform
Datamigration
3.Whataretheconsiderationsforperformingbackupfromalocalreplica?
Solution/Hint:
ThereplicashouldbeconsistentPITcopyofthesource
Replicashouldnotbeupdatedwhenthebackupwindowisopen
4.Whatisthedifferencebetweenarestoreoperationandaresynchronization
operationwithlocalreplicas?Explainwithexamples.
Solution/Hint:
Restoreoperation
Sourceissynchronizedwiththetargetdata
Forexample,ifsourcecontainsadatabasewherealogicaldatacorruption
occurs,thedatacanberecoveredbyattachingthelatestPITreplicaofthe
sourceandmakingincrementalrestoreoperation.
Resynchronizationoperation
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
27/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Targetissynchronizedwiththesourcedata
Forexample,aftertargetisdetachedfromthesource,bothsourceand
targetdataareupdatedbythehost.Aftersometimethetargetneedstobe
synchronizedwiththesourcedata.Forthat,targetisagainattachedtothe
sourceandincrementalresynchronizationisperformed.
5.A300GBdatabaseneedstwolocalreplicasforreportingandbackup.Thereare
constraintsinprovisioningfullcapacityforthereplicas.Ithasbeendetermined
thatthedatabasehasbeenconfiguredon15disks,andthedailyrateofchangein
thedatabaseisapproximately25percent.Youneedtoconfiguretwopointer
basedreplicasforthedatabase.Describehowmuchcapacityyouwouldallocate
forthesereplicasandhowmanysavevolumesyouwouldconfigure.
Solution/Hint:
75GBofsavevolumesarerequired
space/capacityisallocated,sinceitispointerbasedreplica
6.ForthesamedatabasedescribedinQuestion5,discusstheadvantagesof
configuringfullvolumemirroringiftherearenoconstraintsoncapacity.
Solution/Hint:
Infullvolumemirroring,thesourceneednotbeup/healthyforrecovery.
7.AnadministratorconfiguressixsnapshotsofaLUNandcreateseightclonesof
thesameLUN.Theadministratorthencreatesfoursnapshotsforeachclonethat
wascreated.Howmanyusablereplicasarenowavailable?
Solution/Hint:
Usablereplicas=6+8+32=46
8.RefertoQuestion5.Havingcreatedthetworeplicasforbackupandreporting
purposes,assumeyouarerequiredtoautomatetheprocessesofbackupand
reportingfromthereplicasbyusingascript.Developascriptinapseudo
language(youcanusethestandardTimeFindercommandsfortheoperationsyou
needtoperform)thatwillfullyautomatebackupandreporting.Yourscript
shouldperformalltypesofvalidationsateachstep(e.g.,validatingwhethera
synchronizationprocessiscompleteoravolumemountissuccessfullydone).
Solution/Hint:
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
28/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Createaflowchartinsimplelanguage.
Chapter14
1.Anorganizationisplanningadatacentermigration.Theycanonlyafforda
maximumoftwohoursdowntimetocompletethemigration.Explainhowremote
replicationtechnologycanbeusedtomeetthedowntimerequirements.Whywill
theothermethodsnotmeetthisrequirement?
Solution/Hint:
SANbasedremotereplicationtechnologycanbeusedtoavoidthe
downtimeasitprovidenondisruptivedatamigration.
Conventionalmethodsneeddowntimetomigratedatafromonelocation
toother.
2.ExplaintheRPOthatcanbeachievedwithsynchronous,asynchronous,anddisk
bufferedremotereplication.
Solution/Hint:
RPOthatcanbeachievedwithsynchronousoftheorderofSeconds
RPOthatcanbeachievedwithasynchronousoftheorderofMinutes
RPOthatcanbeachievedwithDiskbufferedremotereplicationofthe
orderofhours
3.Discusstheeffectsofabunkerfailureinathreesitereplicationforthefollowing
implementation:
Multihopsynchronous+diskbuffered
Multihopsynchronous+asynchronous
Multitarget
Solution/Hint:
Multihopsynchronous+diskbuffered
Sameassynchronous+asynchronous
Multihopsynchronous+asynchronous
Ifthereisadisasteratthebunkersiteorifthereisanetworklinkfailure
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
29/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
betweenthesourceandbunkersites,thesourcesitewillcontinueto
operateasnormalbutwithoutanyremotereplication.Thissituationis
verysimilartotwositereplicationwhenafailure/disasteroccursatthe
targetsite.Theupdatestotheremotesitecannotoccurduetothefailurein
thebunkersite.Hence,thedataattheremotesitekeepsfallingbehind;but
theadvantagehereisthatifthesourcefailsaswellduringthistime,
operationscanberesumedattheremotesite.RPOattheremotesite
dependsonthetimedifferencebetweenthebunkersitefailureandsource
sitefailure.
Multitarget
Afailureofthebunkerortheremotesiteisnotconsideredadisaster
becausenormaloperationscancontinueatthesourcesitewhileremote
disasterrecoveryprotectionisstillavailablewiththesitethathasnot
failed.Anetworklinkfailuretoeitherthebunkersite(target1)orthe
remotesite(target2)enablesbusinessoperationstocontinue
uninterruptedatthesourcesitewhileremotedisasterrecoveryprotection
isstillavailablewiththesitethatcanbereached.
4.Discusstheeffectsofasourcefailureinathreesitereplicationforthefollowing
implementation,andtheavailablerecoveryoptions:
Multihopsynchronous+diskbuffered
Multihopsynchronous+asynchronous
Multitarget
Solution/Hint:
Multihopsynchronous+diskbuffered
Sameassynchronous+asynchronous
Multihopsynchronous+asynchronous
Ifthereisadisasteratthesource,operationsarefailedovertothebunker
sitewithzeroornearzerodataloss.Butunlikethesynchronoustwosite
situation,thereisstillremoteprotectionatthethirdsite.TheRPObetween
thebunkerandthirdsitecouldbeontheorderofminutes.
Multitarget
Ifasourcesitedisasteroccurs,BCoperationscanbestartedwiththe
bunker(target1)ortheremotesite(target2).Undernormal
circumstances,thedataatthebunkersiteisthemorerecentandupto
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
30/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
date.Hence,operationsareresumedwiththebunkersitedata.Insome
circumstances,thedataontheremotesiteismorecurrentthanthedataon
thebunkersiteforexample,ifthenetworklinksbetweenthesourceand
bunkersiteshasfailed.Inthiscase,theworkloadwouldcontinueatthe
sourcesitewithjusttheasynchronousreplicationtotheremotesite.Ifthe
synchronouslinksaredownlongenough,thenthedataattheremotesite
wouldbemorecurrentthanthedataatthebunkersite.Ifasourcesite
disasteroccursatthistime,thedataontheremotesiteshouldbeusedto
recover.Thenetworklinksbetweenthebunkerandremotesitesare
activatedinthissituationtoperformincrementalsynchronization.The
RPOisnearzeroifthebunkersitedataisused,anditisinminutesifthe
remotesitedataisused.
5.Ahostgenerates8,000I/OsatpeakutilizationwithanaverageI/Osizeof32KB.
Theresponsetimeiscurrentlymeasuredatanaverageof12msduringpeak
utilizations.WhensynchronousreplicationisimplementedwithaFibreChannel
linktoaremotesite,whatistheresponsetimeexperiencedbythehostifthe
networklatencyis6msperI/O?
Solution/Hint:
Actualresponsetime=12+(6*4)+(32*1024/8000)=40.096
Where12ms=currentresponsetime
6msperI/O=latency
32*1024/8000=datatransfertime
Chapter15
1.Researchthefollowingsecurityprotocolsandexplainhowtheyareused:
Hint:Researchwork
2.Astoragearraydialsasupportcenterautomaticallywheneveranerrorisdetected.
Thevendor'srepresentativeatthesupportcentercanlogontotheservice
processorofthestoragearraythroughtheInternettoperformdiagnosticsand
repair.Discusstheimpactofthisfeatureinasecurestorageenvironmentand
providesecuritymethodsthatcanbeimplementedtomitigateanymalicious
attacksthroughthisgateway.
Solution/Hint:
Modificationattacks
Inamodificationattack,theunauthorizeduserattemptstomodify
informationformaliciouspurposes.Amodificationattackcantargetdata
atrestordataintransit.Theseattacksposeathreattodataintegrity.
DenialofService
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
31/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
DenialofService(DoS)attacksdeniestheuseofresourcesto
legitimateusers.Theseattacksgenerallydonotinvolveaccesstoor
modificationofinformationonthecomputersystem.Instead,theyposea
threattodataavailability.Theintentionalfloodingofanetworkorwebsite
topreventlegitimateaccesstoauthorizedusersisoneexampleofaDoS
attack.
Eavesdropping
Whensomeoneoverhearsaconversation,theunauthorizedaccess
iscalledEavesdropping.
Snooping
Thisreferstoaccessinganotheruser'sdatainanunauthorized
way.Ingeneral,snoopingandeavesdroppingaresynonymous.
Managementaccess
Managementaccess,whethermonitoring,provisioning,ormanaging
storageresources,isassociatedwitheverydevicewithinthestorage
network.MostmanagementsoftwaresupportssomeformofCLI,system
managementconsoleorawebbasedinterface.
SControllingadministrativeaccess
Controllingadministrativeaccesstostorageaimsto
safeguardagainstthethreatsofanattackerspoofingan
administrator'sidentityorelevatinganotheruser'sidentityand
privilegestogainadministrativeaccess.Bothofthesethreats
affecttheintegrityofdataanddevices.Toprotectagainstthese
threats,administrativeaccessregulationandvariousauditing
techniquesareusedtoenforceaccountability.
fProtectingthemanagementinfrastructure
Protectingthemanagementnetworkinfrastructureisalso
necessary.Controlstoprotectthemanagementnetwork
infrastructureincludeencryptingmanagementtraffic,enforcing
managementaccesscontrols,andapplyingIPnetworksecurity
bestpractices.ThesebestpracticesincludetheuseofIProuters
andEthernetswitchestorestricttraffictocertaindevicesand
managementprotocols.
3.DevelopachecklistforauditingthesecurityofastorageenvironmentwithSAN,
NAS,andiSCSIimplementations.Explainhowyouwillperformtheaudit.
Assumethatyoudiscoveratleastfivesecurityloopholesduringtheauditprocess.
Listthemandprovidecontrolmechanismsthatshouldbeimplementedto
eliminatethem.
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
32/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Solution/Hint:
SAN,NAS,iSCSI
Servers(Production,management,backup,thirdparty,NAS)
oWhatdataorobjectwasaccessed/attemptedtoaccess?
oWhatactionwasperformed?
oWhenwasexecuted?
oWhoauthorizedandperformedtheaction?
oNFS/CIFSaccess(sharedfiles)
Fabric/IPnetwork
oPhysicalandlogicalaccess
Switches
oPhysicalandlogicalaccess
oZoning
Storage
oWhichvolumewasaccessed/attemptedtoaccess?
oWhatactionwasperformed?
oWhenwasexecuted?
oWhoauthorizedandperformedtheaction?
oLUNmasking
oProvisioning
oUpgrade/replacement
oHandlingofphysicalmedia
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
33/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
Process
Collectlogandcorrelate
Analyzeaccessandchangecontrol
oProductionandDRsite
oBackupandreplication
oThirdpartyservice
Checkalertingmechanism
Checksecuritycontrols
oPhysical
oAdministrative
oTechnological
Identifysecuritygap
Documentationandrecommendation
Fivesecurityloopholes
1.Authenticationallowsmultiplelogin
2.Nofirewall
3.Noauthenticationattheswitchlevel
4.Noencryptionforinflightdata
5.Poorphysicalsecurityatthedatacenter
Control
1.Restrictioninnumberofloginattempt,twopartpassword
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
34/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
2.Implementfirewalltoblockinappropriateordangeroustraffic
3.Authenticateusers/administratorsofFCswitchesusingRADIUS(Remote
AuthenticationDialInUserService),DHCHAP(DiffieHellmanChallenge
HandshakeAuthenticationProtocol),etc.
4.Encryptingthetrafficintransit
5.Increasesecuritymanpowerandimplementbiometricsecurity
Chapter16
1.DownloadEMCControlCentersimulatorandtheaccompanyinglabguidefrom
http://education.emc.com/ismbookandexecutethestepsdetailedinthelabguide.
Labexercise
2.Aperformanceproblemhasbeenreportedonadatabase.Monitoringconfirms
thatat12:00a.m.,aproblemsurfaced,andaccesstothedatabaseisseverely
affecteduntil3:00p.m.everyday.Thistimeslotiscriticalforbusinessoperations
andaninvestigationhasbeenlaunched.Areportingprocessthatstartsat12:00
p.m.contendsfordatabaseresourcesandconstrainstheenvironment.What
monitoringandmanagementprocedures,tools,andalertswouldyouestablishto
ensureaccessibility,capacity,performance,andsecurityinthisenvironment?
Hints:
Monitoring:
Settingupmonitoringandreportingforaccessibility,capacity,
performanceandsecurityonproductionandreplicationdata
MonitoringandmanagementtoolssuchasECCPerformancemanager
needtobedeploytogatherallperformancestatisticsdata(historicaldata)
Performanceanalysisperformanceconstraintisbecauseoftheresource
Management:
Requirement:Databaseneedtobereplicateforreportingprocess
SBasedonrequirementandinfrastructurechosenreplication
softwareneedtobedeploy
SProvisionstoragecapacityforreplication
fConfiguretheenvironmentforaccessingreplicateddata(need
configurationathost,networkandstorage)
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
35/36
6/13/2015
Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"
SConfigureadequatecapacitybasedonpolicyondataretention
andchange
SConfiguresecurityforreplicateddata
3.ResearchSMISandwriteatechnicalpaperondifferentvendorimplementations
ofstoragemanagementsolutionsthatcomplywithSMIS.
Researchwork
https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire
36/36