Sei sulla pagina 1di 36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Fulltextof"ISMBookExercise
Solutions.pdfUnixLabDirectory"
Seeotherformats
Chapter1

1.AhospitalusesanapplicationthatstorespatientXraydataintheformoflarge
binaryobjectsinanOracledatabase.TheapplicationishostedonaUNIXserver,
andthehospitalstaffaccessestheXrayrecordsthroughaGigabitEthernet
backbone.AnEMCCLARiiONstoragearrayprovidesstoragetotheUNIX
server,whichhas6TBofusablecapacity.Explainthecoreelementsofthedata
center.Whatarethetypicalchallengesthestoragemanagementteammayfacein
meetingtheserviceleveldemandsofthehospitalstaff?Describehowthevalue
ofthispatientdatamightchangeovertime.
Solution/Hint:
Coreelementsofthedatacenter:
Application
Databaseoracle
ServerandoperatingsystemUNIXserver
NetworkLAN,SAN
StoragearrayEMCCLARiiONstoragearray
Challenges:
Longtermpreservation
Highcost
Howpatientdatamightchangeovertime:
Forfirst60days,thepatientdataisaccessedfrequently
Afterthattherequirementofthepatientdataisveryless,soitcouldbe
movedtoCAS.
2.Anengineeringdesigndepartmentofalargecompanymaintainsover600,000
engineeringdrawingsthatitsdesigner'saccessandreuseintheircurrentprojects,
modifyingorupdatingthemasrequired.Thedesignteamwantsinstantaccessto
thedrawingsforitscurrentprojects,butiscurrentlyconstrainedbyan

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

1/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

infrastructurethatisnotabletoscaletomeettheresponsetimerequirements.The
teamhasclassifiedthedrawingsas"mostfrequentlyaccessed,""frequently
accessed,""occasionallyaccessed,"and"archive."
Suggestandprovidethedetailsforastrategyforthedesigndepartment
thatoptimizesthestorageinfrastructurebyusingILM.
Explainhowyouwilluse"tieredstorage"basedonaccessfrequency.
Detailthehardwareandsoftwarecomponentsyouwillneedtoimplement
yourstrategy.
Researchproductsandsolutionscurrentlyavailabletomeetthesolution
youareproposing.
Solution/Hint:
Classifythedataaccordingtoaccessfrequencyorvalueandusetiered
storagethatoptimizestheinfrastructurecostandperformancebyusing
ILM.
Storagerequirementcanbeclassifyas:
frequentlyuseddatashouldbeplacedinhighendstoragearray
occasionallyaccessedshouldbeinlowendstoragearray
andarchiveddatainspecializedCASsystem

Hardwareandsoftwarecomponentsneeded:
HighendandMidrangestoragearray
Contentaddressedstorage(CAS)
FCSAN,LAN
Server
Software:
ILMtool
Researchonfollowingproductsandsolutions(www.emc.com)
StoragearraysCLARiiON/Symmetrix
CASCentera
FCSANSwitches/Directors
ILMstrategy

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

2/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

3.Themarketingdepartmentatamidsizefirmisexpanding.Newhiresarebeing
addedtothedepartmentandtheyaregivennetworkaccesstothedepartment's
files.IThasgivenmarketinganetworkeddriveontheLAN,butitkeepsreaching
capacityeverythirdweek.Currentcapacityis500MB(andgrowing),with
hundredsoffiles.UsersarecomplainingaboutLANresponsetimesandcapacity.
AstheITmanager,whatcouldyourecommendtoimprovethesituation?
Solution/Hint:
NAS
4.Alargecompanyisconsideringastorageinfrastructureonethatisscalableand
provideshighavailability.Moreimportantly,thecompanyalsoneeds
performanceforitsmissioncriticalapplications.Whichstoragetopologywould
yourecommend(SAN,NAS,IPSAN)andwhy?
Solution/Hint:
SANisarecommendedsolution.
BecauseSANhashighscalabilityandavailability(usingdirectoror
switch).

Chapter2

WhatarethebenefitsofusingmultipleHBAsonahost?
Solution/Hint:
Highavailability
Anapplicationspecifiesarequirementof200GBtohostadatabaseandother
files.Italsospecifiesthatthestorageenvironmentshouldsupport5,000IOPS
duringitspeakprocessingcycle.Thedisksavailableforconfigurationprovide
66GBofusablecapacity,andthemanufacturerspecifiesthattheycansupporta
maximumof140IOPS.Theapplicationisresponsetimesensitiveanddisk
utilizationbeyond60percentwillnotmeettheresponsetimerequirementsofthe
application.Computeandexplainthetheoreticalbasisfortheminimumnumber
ofdisksthatshouldbeconfiguredtomeettherequirementsoftheapplication.
Solution/Hint:
Numberofdiskrequired=max(sizerequirement,IOPSrequirements)
Tomeetthesizerequirement=200GB/66GB=4disks
TomeettheIOPSrequirement=5000IOPS/(140x0.6IOPS)=60disks
=max(4,60)=60disks
Whichcomponentsconstitutethediskservicetime?Whichcomponent
contributesthelargestpercentageofthediskservicetimeinarandomI/O

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

3/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

operation?
Solution/Hint:
seektime,rotationallatencyandtransferrate
seektime
Whydoformatteddiskshavelesscapacitythanunformatteddisks?
Solution/Hint:
Inordertomakestoragedevicefunctional,itneedtobeformatted.
CommontypesofdriveformatsareFAT32,NTFSandext2.Ineachof
theformattingschemes,aportionofthestoragespaceisallocatedto
configuredfilesystemtoenablecatalogingdataonthediskdrive.
TheaverageI/Osizeofanapplicationis64KB.Thefollowingspecificationsare
availablefromthediskmanufacturer:averageseektime=5ms,7,200rpm,
transferrate=40MB/s.DeterminethemaximumIOPSthatcouldbeperformed
withthediskforthisapplication.Takingthiscaseasanexample,explainthe
relationshipbetweendiskutilizationandIOPS.
Solution/Hint:
Thediskservicetime(Rs)isakeymeasureofdiskperformance;and
Rsalongwithdiskutilizationrate(U)determinestheI/Oresponsetime
forapplications.
Thetotaldiskservicetime(Rs)isthesumofseektime(E),rotational
latency(L),andtheinternaltransfertime(X):
Rs=E+L+X

EisdeterminedbasedontherandomnessoftheI/Orequest.Land
Xaremeasuresprovidedbydiskvendorsastechnical
specificationsofthedisk.
Averageseektimeof5msinarandomI/Oenvironment,orE=5ms
Diskrotationspeedof7,200rpmfromwhichrotationallatency(L)
canbedetermined,whichisonehalfofthetimetakenforafull
rotationor
L=(0.5/7,200rpmexpressedinms)
40MB/sinternaldatatransferrate,fromwhichtheinternaltransfer
time(X)isderivedbasedontheblocksizeoftheI/O.
Withablocksizeof64KB,X=64KB/40MB
ConsequentlyRs=5ms+(0.5/7,200)+64KB/40MB
=5+4.167+1.6
=10.767ms
Themaximumno.ofI/OsservicedpersecondorIOPS=1/RS
Inotherwords,foranI/Owithablocksizeof64KBand

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

4/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Rs=10.767ms,themaximumIOPSwillbe
1/(10.767*10"3)=92.876IOPS
6.ConsideradiskI/OsysteminwhichanI/Orequestarrivesattherateof80IOPS.
Thediskservicetimeis6ms.
a.Computethefollowing:UtilizationofI/Ocontroller,Totalresponsetime,
Averagequeuesize,andTotaltimespentbyarequestinaqueue.
b.Computetheprecedingparameteriftheservicetimeishalved.
Solution/Hint:
Arrivalrate(a)=80IOPS,consequently,thearrivaltime
Ra=1/a=1/80=12.5ms
Rs=6ms(given)
1.Utilization(U)=Rs/Ra
=6/12.5=0.48or48%
2.Responsetime(R)=Rs/(1U)
=6/(10.48)=11.5ms
3.Averagequeuesize=U/(1U)
=(0.48)2/(l0.48)
=0.44
4.Timespentbyarequestinaqueue=UxR,orthetotalresponsetimeservice
time=0.48x11.5=5.52ms
Now,ifcontrollerpowerisdoubled,ortheservicetimeishalved;
consequentlyRs=3msinthisscenario.
1.Utilization(U)=Rs/Ra=3/12.5=0.24or24%
2.Responsetime(R)=Rs/(1U)=3/(10.24)=3.9ms
3.Averagequeuesize=U2/(lU)=(0.24)2/(10.24)=0.08
4.Timespentbyarequestinaqueue=0.24x3.9=0.936ms

7.RefertoQuestion6andplotagraphshowingtheresponsetimeandutilization,
considering20percent,40percent,60percent,80percent,and100percent
utilizationoftheI/Ocontroller.Describetheconclusionthatcouldbederived
fromthegraph.
Solution/Hint:

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

5/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

1.

Utilization=20%=0.2

Responsetime

7.5ms

2.

Itili/ation=40

%=0.4

Responsetime=

10ms

3.

Utilization=60

%=0.6

Responsetime

15ms

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

6/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

4.

1tiliAition=80

%=0.8

Responsetime

30ms

5.

LUili/ation=100

%=1

Responsetime=

infinity

70i

^,,,,,,,,
102030405060708090
Utilization(%)

Chapter3

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

7/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

1.WhyisRAID1notasubstituteforabackup?
Solution/Hint:
RAID1providesprotectionagainstdiskfailureandnotasolutionfordata
recoveryduetodisaster.
2.WhyisRAIDnotanoptionfordataprotectionandhighavailability?
Solution/Hint:
Itdoesnotprovideanydataprotection.
3.ExplaintheprocessofdatarecoveryincaseofadrivefailureinRAID5.
Solution/Hint:
ItperformsXORoperationbetweenremainingdisksandregeneratelost
data.
4.WhatarethebenefitsofusingRAID3inabackupapplication?
Solution/Hint:
BackupapplicationperformslargesequentialI/OsandRAID3givesbest
resultincaseoflargesequentialI/Ooperation.
5.DiscusstheimpactofrandomandsequentialI/OindifferentRAID
configurations.
Solution/Hint:

RAID

Random

Sequential

Goodforrandomreadsandpoorto
fairforsmallrandomwrites.

verygoodforsequentialreadsand
goodforlarge,sequentialwrites.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

8/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Verygoodforrandomreads.Fair
forrandomwrite.Slowerdueto
parityoverhead.

Goodforsequentialreads.Fairto
goodforsequentialwrites.

1/0

Verygoodforrandomwrite.

Poortofairforsequentialwrites

6.A10Krpmdriveisratedtoperform130IOPS,anda15Krpmdriveisratedto
perform180IOPSforanapplication.Theread/writeratiois3:1.Computethe
RAIDadjustedIOPSforthe10Kand15KdrivesforRAID1,RAID5,andRAID
6.
Solution/Hint:QuestionInvalid

7.Anapplicationhas1,000heavyusersatapeakof2IOPSeachand2,000typical
usersatapeakof1IOPSeach,witharead/writeratioof2:1.Itisestimatedthat
theapplicationalsoexperiencesanoverheadof20percentforotherworkloads.
CalculatetheIOPSrequirementforRAID1,RAID3,RAID5,andRAID6.

Solution/Hint:

1000heavyusersatapeakof2IOPSeach=2000IOPS
2000typicalusersatapeakof1IOPSeach=2000IOPS

Assumemaximumconcurrency90%

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Direc

9/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

[(2000+2000)*0.9]=3600hostbasedIOPSfor3000usersduringpeak
activityperiod
read/writeratio2:1

8.ForQuestion7,computethenumberofdrivesrequiredtosupporttheapplication
indifferentRAIDenvironmentsif10Krpmdriveswitharatingof130IOPSper
drivewereused.
Solution/Hint:
NumberofdrivesrequiredtosupporttheapplicationindifferentRAID
environments,if10krpmdriveswitharatingof130IOPSperdrive

ForRAID1
ForRAID3
ForRAID5
ForRAID6

3600*2/3+(2*1/3*3600)
3600*2/3+(4*1/3*3600)
3600*2/3+(4*1/3*3600)
3600*2/3+(6*1/3*3600)

4800IOPS
7200IOPS
7200IOPS
9600IOPS

ForRAID1=4800/130=37drives
ForRAID3=7200/130=55drives
ForRAID5=7200/130=55drives
ForRAID6=9600/130=74drives

Chapter4

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

10/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

1.ConsiderascenarioinwhichanI/Orequestfromtrack1isfollowedbyanI/O
requestfromtrack2onasectorthatis180degreesawayfromthefirstrequest.A
thirdrequestisfromasectorontrack3,whichisadjacenttothesectoronwhich
thefirstrequestismade.Discusstheadvantagesanddisadvantagesofusingthe
commandqueuingalgorithminthisscenario.
Solution/Hint:
Inthisscenario,commandqueuingproviderotationallatencyoptimization
whererequestfromtrack3isservicedbeforerequest2toavoidone
rotationtiming.Assumeifrequest3isfromthesametrack1inthatcase
commandqueuingprovidesseektimeoptimizationandimprovesdisk
performance.
2.WhichapplicationbenefitsthemostbybypassingthewritecacheandWhy?
Solution/Hint:
ApplicationwithverylargesizeI/Owrites.
3.AnOracledatabaseusesablocksizeof4KforitsI/Ooperation.Theapplication
thatusesthisdatabaseprimarilyperformsasequentialreadoperation.Suggest
andexplaintheappropriatevaluesforthefollowingcacheparameters:cachepage
size,cacheallocation(readversuswrite),prefetchtype,andwriteasidecache.
Solution/Hint:
Cachepagesize:4K
Cacheallocation(readversuswrite):morereadcache
prefetchtype:fixedprefetch
Writeasidecache:Largevalue

Chapter5

1.DASprovidesaneconomicallyviablealternativetootherstoragenetworking
solutions.Justifythisstatement.
Solution/Hint:
Setuprequiresarelativelylowerinitialinvestment
Setupismanagedusinghostbasedtools,suchasthehostOS,whichmakes

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

11/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

storagemanagementtaskseasyforsmallandmediumenterprises.
Requiresfewermanagementtasks,andlesshardwareandsoftwareelements
tosetupandoperate.
2.HowistheprioritysequenceestablishedinawideSCSIenvironment?
Solution/Hint:
InawideSCSI,thedeviceIDsfrom8to15havethehighestpriority,butthe
entiresequenceofwideSCSIIDshaslowerprioritythannarrowSCSIIDs.
Therefore,theoverallprioritysequenceforawideSCSIis7,6,5,4,3,2,1,0,
15,14,13,12,11,10,9,and8.
3.WhyisSCSIperformancesuperiortothatofIDE/ATA?Explainthereasonsfrom
anarchitecturalperspective.
Solution/Hint:
SCSIoffersimprovedperformanceandexpandabilityandcompatibility
options,makingitsuitableforhighendcomputers.
Numberofdevicessupportedis16
SCSIarchitecturederivesitsbasefromtheclientserverrelationship
SCSIinitiator,oraclient,sendsarequesttoaSCSItarget,oraserver.
Thetargetperformsthetasksrequestedandsendstheoutputtotheinitiator
Whenadeviceisinitialized,SCSIallowsforautomaticassignmentofdevice
IDsonthebus,whichpreventstwoormoredevicesusingthesameSCSIIDs.
4.ResearchbladeserverarchitectureanddiscussthelimitationsofDASforthis
architecture.
Solution/Hint:DASLimitations
DASdoesnotscalewell,hasalimitednumberofports
AlimitedbandwidthinDASrestrictstheavailableI/Oprocessingcapability.
ThedistancelimitationsassociatedwithDAS
Inabilitytosharetheresources,unusedresourcescannotbeeasilyre
allocated,resultinginislandsofoverutilizedandunderutilizedstoragepools.
5.WhatwouldyouconsiderwhilechoosingserialorparalleldatatransferinaDAS
implementation?Explainyouranswerandjustifyyourchoice.
Solution/Hint:
Distanceandspeedarethekeyfactors
Serialdatatransfercanovercomethedistancelimitations
Paralleldatatransfercanovercometheseedlimitations
ParalleldatatransferissuitableforInternalDAS

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

12/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

SerialdatatransferissuitableforExternalDAS

6.Ifthreeharddiskdrivesareconnectedinadaisychainandcommunicateover
SCSI,explainhowtheCPUwillperformI/Ooperationswithaparticulardevice.
Solution/Hint:
Eachdiskwillbeidentifiedbycn|tn|dnnumber
Asthethreedisksareconnectedinadaisychaincnandtnnumberwillbe
thesameforallthedisks
SCSIcommands/responsewillbeusedforthecommunication

Chapter6

1.Whatiszoning?Discussascenario,
(i)wheresoftzoningispreferredoverhardzoning.
(ii)wherehardzoningispreferredoversoftzoning.
Solution/Hint:
ZoningisanFCswitchfunctionthatenablesnodeswithinthefabrictobe
logicallysegmentedintogroupsthatcancommunicatewitheachother.Azone
consistsofselecteddevices,suchashostbusadapters(HBAs)andstorage
devices,inthefabric.Devicesassignedtoonezonecancommunicatewithother
devicesinthesamezone,butnotwithdevicesinzonesofwhichtheyarenot
members.Thiszoningpracticeprovidesafast,efficient,andreliablemeansof
controllingtheHBAdiscovery/loginprocess.Withoutzoning,theHBAwill
attempttologintoallportsonthefabricduringdiscoveryandduringtheHBA's
responsetoastatechangenotification.Withzoning,thetimeandFibreChannel
bandwidthrequiredtoprocessdiscoveryandthestatechangenotificationare
minimized.
(i)SoftzoningisalsocalledWWNzoninganditispreferredwhenuserneed
flexibilitytophysicallymoveattachednodesbetweenswitchportsrecablethe
SAN,thatmaytakeplaceduringswitchmaintenanceandrepairwithout
reconfiguringthezoneinformation.ThisispossiblebecausetheWWNisstaticto
thenodeport.
(ii)Hardzoningisalsocalledportzoning,itisconvenientwhenthereisaneed
forhardwarereplacementasWWNisuniquelyassociatedwithahardware.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

13/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

2.DescribetheprocessofassigningFCaddresstoanodewhenloggingintothe
networkforthefirsttime.
Solution/Hint::
Tologontothefabric,anodesendsaFLOGIframewiththeWorldWideNode
Name(WWNN)andWorldWidePortName(WWPN)parameterstothelogin
serviceatthewellknownFCaddressFFFFFE.Inturn,theswitchacceptsthe
loginandreturnsanAccept(ACC)framewiththeassignedFCaddressforthe
device.ImmediatelyaftertheFLOGI,theN_portregistersitselfwiththelocal
nameserverontheswitch,indicatingitsWWNN,WWPN,andassignedFC
address.
3.Seventeenswitches,with16portseach,areconnectedinameshtopology.How
manyportsareavailableforhostandstorageconnectivityifyoucreateahigh
availabilitysolution?
Solution/Hint:
Totalports=17*16=272
NumberofISL136
EachISLconsumes2ports
numberofportsavailableforhosts
4.DiscusstheadvantageofFCSWoverFCAL.

Solution/Hint::
Unlikealoopconfiguration,aFibreChannelswitchedfabric(FCSW)network
providesinterconnecteddevices,dedicatedbandwidth,andscalability.Theaddition
orremovalofadeviceinaswitchedfabricisminimallydisruptive;itdoesnotaffect
theongoingtrafficbetweenotherdevices(ascomparedtoFCAL).InFCSW,nodes
donotsharealoop;instead,dataistransferredthroughadedicatedpathbetweenthe
nodes.FCuses24bitfibrechanneladdressingschemeforconnectivitywhichcan
supportupto15milliondevices(FCALuses8bitaddressingwhichcansupportup
to127devicesonaloop)
5.HowflowcontrolworksinFCnetwork.
Solution/Hint::
Flowcontrolisusedtodefineandregulatethepaceofflowofdataframesbetween
senderandreceiverduringdatatransmission.FCtechnologyusestwoflowcontrol
mechanisms:buffertobuffercredit(BBCredit)andendtoendcredit(EECredit).
BB_Credit:Theprocessisasfollows

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

14/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

1.Atlogin,thetransmitterandthereceiverexchangeparametersandestablishthe
BBCreditvalue.
2.Thetransmitter'scountinitializestotheBBCreditvalue.
3.If(BBCredit>0),transmittersendsaframe,anddecrementsthecountper
transmittedframe.
4.AnRRDY(ReceiverReady)issentfromthereceivingporttothetransmitting
portforeveryavailablebufferonthereceivingside.
5.Thetransmitterincrementsthecountby1foreachRRDYitreceivesfromthe
receiver.Thetransmittingportmaintainsacountoffreereceiverbuffers.
5.Uponalinkreset,theBBCreditvalueresetstothevaluenegotiateduponlogin.
EE_Credit
Thefunctionofendtoendcredit,knownasEECredit,issimilartothatof
BB_Credit.(TheEECreditmechanismisusedfortheflowcontrolforclass1and
class2trafficonly).
6.Whyisclass3servicemostpreferredforFCcommunication?
Solution/Hint:
Nondedicatedconnection
BBcredit
Highbandwidthutilization
Supportformultiplexing

Chapter7

1.ListandexplaintheconsiderationsforcapacitydesignforbothCPUandstorage
inaNASenvironment.
Solution/Hint:
ThescalabilityofcapacitycanbeaconstraintinanintegratedNAS.However,
thegatewayNAScanscalefortherequiredconnectivityandstorage.
GatewayNASsharesCPUloadwithSANworkloadandmayfaceconstraint
onCPUutilization.Typically,CPUcapacityisnotthemajorbottleneckfactor
inaNASsystem,butotherconsiderationssuchasmemoryrequirement,
numberofnetworkports,filesystem,IOPSrequirements,alongwithstorage
capacityrequirementsareimportantfactor.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

15/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

2.SANisconfiguredforbackuptoadiskenvironment,andthestorage
configurationhasadditionalcapacityavailable.CanyouhaveaNASgateway
configurationusethisSAN?Discusstheimplicationsofsharingthebackupto
diskSANenvironmentwithNAS.
Solution/Hint:
AstheadditionalcapacityisavailablegatewayNAScanbeimplemented.
Butduringthebackupwindowitwillhaveconsiderableperformanceimpact
onNetworkandhenceNAS.
3.ExplainhowtheperformanceofNAScanbeaffectediftheTCPwindowsizeat
thesenderandthereceiverarenotsynchronized.
Solution/Hint:
ThiswillaffecttheNASperformanceasthismayleadtoretransmissionof
data,lowerbandwidthutilization,performancedegradationofthenetwork,
intermittentconnectivity,anddatalinkerrors.
4.ResearchtheuseofbabyjumboframesandhowitaffectsNASperformance.
Solution/Hint:
CommonEthernetJumboframesizeis9000Bytes
Babyjumboframessizeis2.5KBBytes
5.ResearchthefilesharingfeaturesoftheNFSprotocol.
Hint:Researchquestion(refertoNFSprotocolsectioninthebook)
6.ANASimplementationconfiguredjumboframesontheNAShead,with9,000as
itsMTU.However,theimplementersdidnotseeanyperformanceimprovement
andactuallyexperiencedperformancedegradation.Whatcouldbethecause?
Researchtheendtoendjumboframesupportrequirementsinanetwork.
Solution/Hint:
Jumboframesareusedattheendpoint(NASHead)withMTUof9000
CheckiftheintermediatenetworkusesadifferentMTUsize(e.g.1500).
Thiscancausetheroutertodroppacketswhichthenhavetoretransmitatthe
TCPlayer.

Packetsarethenfragmentedandhavetoreassembletoaccommodatethe
differentMTUsizes.Thisdegradesnetworkperformance.
7.AcmeCorporationistryingtodecidebetweenanintegratedoragatewayNAS
solution.TheexistingSANatAcmewillprovidecapacityandscalability.TheIT

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

16/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

departmentisconsideringaNASsolutionfortheTrainingdepartmentatAcme
fortrainingvideos.Thevideoswouldonlybeusedbythetrainingdepartmentfor
evaluationofinstructors.PickaNASsolutionandexplainthereasonsforyour
choice.
Solution/Hint:
ExistingSAN;sothechoicewillbegatewayNAS
CheckifSANhasadditionalcapacityavailable.

Chapter8

1.HowdoesiSCSIhandletheprocessofauthentication?Researchtheavailable
options.
Solution/Hint::
CHAP(Challengehandshakeauthenticationprotocol)
2.ListsomeofthedatastorageapplicationsthatcouldbenefitfromanIPSAN
solution.
Solution/Hint:
ExtendingreachofexistingSAN
Disasterrecoverysolutions
Remoteofficeapplications
3.WhatarethemajorperformanceconsiderationsforFCIP?
Solution/Hint:
Refersection8.2.2FCIPPerformanceandsecurity
4.ResearchthemultipathingsoftwareavailableforaniSCSIenvironment.Writea
technicalnoteonthefeaturesandfunctionalityofEMCPowerPathsupportfor
iSCSI.
Hint:Researchwork
5.ResearchtheiSCSIcapabilitiesinaNASdevice;provideusecaseexamples.
Hint:Researchwork
6.Acompanyisconsideringimplementingstorage.Theydonothaveacurrent
storageinfrastructuretouse,buttheyhaveanetworkthatgivesthemgood
performance.DiscusswhethernativeorbridgediSCSIshouldbeusedandexplain
yourrecommendation.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

17/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Solution/Hint:
NativeiSCSIimplementationdoesn'tinvolveanyFCcomponentswhile
BridgediSCSIimplementationinvolvesFCcomponents
Asthecompanydoesn'thavestorageinfrastructureandthenetworktheyhave
givesthemagoodperformancenativeiSCSIshouldbedeployed.
iSCSIenabledStorageisonlyneededifnativeiSCSIistobeimplementedin
thiscase.
7.TheIPbandwidthprovidedforFCIPconnectivityseemstobeconstrained.
DiscussitsimplicationsiftheSANsthataremergedarefairlylarge,with500
portsoneachside,andtheSANsatbothendsareconstantlyreconfigured.
Solution/Hint:
AsbandwidthisinsufficientIPnetworkwillbecomethebottleneck
Asthefabricsonbothsidesarefairlylargeandareconstantlyreconfigured
anydisruptionintheIPnetworkwillleadtoinstabilitiesinunifiedfabric.
Theseincludeasegmentedfabric,excessiveRSCNs,andhost
timeouts.

ThesolutioncanbetosegregateFCIPtrafficintoaseparatevirtualfabric,to
provideadditionalstability,

8.ComparedtoastandardIPframe,whatpercentageofreductioncanberealizedin
protocoloverheadinaniSCSIconfiguredtousejumboframeswithanMTU
valueof9,000?
Solution/Hint:
iSCSIPDUsize=1460bytes(containpayloadandadditionalheadersegment)
Jumboframesizeof9000MTUoutofwhichpayloadis8960
JumboFramesallowsasignificantamountofincreasedpayloadtobe
deliveredineachiSCSIPDU.
9.WhyshouldanMTUvalueofatleast2,500beconfiguredinabridgediSCSI
environment?
Solution/Hint:
FCsupportsframesizeof2148byte

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

18/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Chapter9

1.ExplainhowaCASsolutionfitsintotheILMstrategy.
Solution/Hint:
AccordingtoILMstrategyvalueofinformationchangesoveritslifecycle,when
createdvalueofinformationisveryhighanditisfrequentlyaccessedand
changed,henceplacedinahighperformancecostlystorage.Withthetimeits
valuedropsanditbecomesfixedcontentwhichisrarelyaccessed,butstillholds
placeincostlystoragespace.Forthecostoptimizationlessaccesseddatashould
bemovedtoarchivedandleavethecostlyspaceforhighvaluedata.CASisa
solutionforarchiveddata,whichnotonlyprovidecostbenefitbutalsoprovide
fasteraccessandreliablestoragetofixedcontent.
2.ToaccessdatainaSAN,ahostusesaphysicaladdressknownasalogicalblock
address(LBA).AhostusingaCASdevicedoesnotuse(orneed)aphysical
address.Why?
Solution/Hint:
Unlikefilelevelandblockleveldataaccessthatusefilenamesandthe
physicallocationofdataforstorageandretrieval,CASstoresdataandits
attributesasanobject.Thestoredobjectisassignedagloballyunique
addressknownasacontentaddresswhichisderivedfromtheactualbinary
representationofstoreddata.
3.TheITdepartmentofadepartmentalstoreusestapetoarchivedata.Explain45
majorpointsyoucouldprovidetopersuadetheITdepartmenttomovetoaCAS
solution.HowwouldyoursuggestionsimpacttheITdepartment?
Solution/Hint:
GuaranteedContentAuthenticityandIntegrity:Datacannotbemanipulated
oncestored,meetregulatoryandbusinesscompliance.
SingleInstanceStorage:Simplifiesstorageresourcemanagement,especially
whenhandlinglargeamountoffixedcontent.
FasterDataRetrieval:Comparedtotape
Technologyindependence:Aslongastheapplicationserverisabletomapthe
originalcontentaddressthedataremainsaccessible.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

19/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Betterdataprotectionanddisposition:AllfixedcontentisstoredinCASonce
andisbackedupwithaprotectionscheme.

Chapter10

1.WhatdoVLANsvirtualize?DiscussVLANimplementationasavirtualization
technology.
Solution/Hint:
VLANstandforvirtualLANwhichhassameattributesasofphysicalLAN,butallows
hoststobegroupedtogethereveniftheyarenotlocatedonthesamenetworkswitch.
Withtheuseofnetworkreconfigurationsoftware,portsonthelayer2switchcanbe
logicallygroupedtogether,formingaseparate,VirtualLocalAreaNetwork.VLANshelp
tosimplifynetworkadministration.PortsinaVLANcanbelimitedtoonlythenumber
neededforaparticularnetwork.ThisallowsunusedportstobeusedinotherVLANs.
Throughsoftwarecommands,additionalportscanbeaddedtoanexistingVLANif
furtherexpansionisneeded.IfamachineneedstobemovedtoadifferentIPnetwork,
theportisreassignedtoadifferentVLANandthereisnoneedforthephysical
movementofcables.
3.Howcanablocklevelvirtualizationimplementationbeusedasadatamigrationtool?
Explainhowdatamigrationwillbeaccomplishedanddiscusstheadvantagesofusing
thismethodforstorage.Comparethismethodtotraditionalmigrationmethods.
Solution/Hint:
Conventionallydatamigrationneedsphysicalremappingofserverstonewstorage
locationwhichresultedinapplicationdowntimeandphysicalchanges.Inavirtualized
environmentvirtualvolumesareassignedtothehostoutofphysicalpoolofstorage
capacity.Datamigrationisachievedthroughthesevirtualvolumes.Tomoveavirtual
volume,virtualizationsoftwareperformsaredirectionofLOfromonephysicallocation
toanother.DespitethefactthattheLOisphysicallyredirectedtoanewlocationbythe
virtualizationsoftware,theaddressofthevirtualvolumepresentedtothehostnever
changes.Thisisaccomplishedthroughvirtualaddressing.Thisallowstheprocesstobe
transparentandnondisruptivetothehost.Additionally,sincethecopyingandremapping
isdonebythevirtualizationsystem,nohostcyclearerequired,freeingserverstobe
dedicatedtotheirproperapplicationcentricfunction.

Chapter11

1.Anetworkrouterhasafailurerateof0.02percentper1,000hours.Whatisthe

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

20/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

MTBFofthatcomponent?
Solution/Hint:
MTBFofnetworkrouter=1/Failurerate
=100*1000/0.02
=50,00,000hrs
2.TheITdepartmentofabankpromisescustomeraccesstothebankratetable
between9:00a.m.and4:00p.m.fromMondaytoFriday.Itupdatesthetable
everydayat8:00a.m.withafeedfromthemainframesystem.Theupdate
processtakes35minutestocomplete.OnThursday,duetoadatabasecorruption,
theratetablecouldnotbeupdated,andat9:05a.m.,itwasestablishedthatthe
tablehaderrors.Arerunoftheupdatewasdone,andthetablewasrecreatedat
9:45a.m.Verificationwasrunfor15minutes,andtheratetablebecameavailable
tothebankbranches.Whatwastheavailabilityoftheratetablefortheweekin
whichthisincidenttookplace,assumingtherewerenootherissues?
Solution/Hint:
Availability=totaluptime/totalscheduledtime
Totalscheduledtime=7hrs*5=35hrs
Totaluptime=34hrs(asonThursdayratetablewasmadeavailableat10:00am
insteadof9:00am)
Therefore,availabilityoftheratetablefortheweek=34/35
3.'Availabilityisexpressedintermsof9s."Explaintherelevanceoftheuseof9s
foravailability,usingexamples.
Solution/Hint:
Uptimeperyearisbasedontheexacttimelinessrequirementsofthe
service,thiscalculationleadstothenumberof"9s"representationfor
availabilitymetrics.
Forexample,aservicethatissaidtobe"five9savailable"isavailablefor
99.999percentofthescheduledtimeinayear(24x7x365).
Uptime(%)Downtime(%)DowntimeperDowntimeper
YearWeek
99.9990.0015.25minutes6sec
4.Provideexamplesofplannedandunplanneddowntimeinthecontextofdata
centeroperations.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

21/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Solution/Hint:
Examplesofplanneddowntime:installation/integration/maintenanceof
newhardware,softwareupgradesorpatches,takingbackups,application

anddatarestores,facilityoperations(renovationandconstruction),
refresh/migrationoftestingenvironmenttotheproductiondata
Examplesofunplanneddowntime:failurecausedbydatabasecorruption,
componentfailure,humanerrors
5.HowdoesclusteringhelptominimizeRTO?
Solution/Hint:
RTOof1hour:Clusterproductionserverswithcontrollerbaseddisk
mirroring.
RTOofafewseconds:Clusterproductionserverswithbidirectional
mirroring,enablingtheapplicationstorunatbothsitessimultaneously.
6.Howisthechoiceofarecoverysitestrategy(coldandhot)determinedinrelation
toRTOandRPO?
Solution/Hint:
RTOandRPOsmallhotsite
RTOandRPOlargecoldsite
7.Assumethestorageconfigurationdesignshowninthefollowingfigure:

Performthesinglepointoffailureanalysisforthisconfigurationandprovidean
alternateconfigurationthateliminatesallsinglepointsoffailure.
Solution/Hint:
Singlepointoffailure:host,switch,storagearray,HBA,arrayportand
path
AlternateconfigurationasshownbelowtoavoidSPF

Host

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

22/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Storage
Array

t.iuslhimiISkrhrh

RedundantFCSwitcherI

Chapter12

1.Amanufacturingcorporationusestapeasitsprimarybackupstoragemedia
throughouttheorganization:
FullbackupsareperformedeverySunday.
IncrementalbackupsareperformedMondaythroughSaturday.
Theenvironmentcontainsmanybackupservers,backingupdifferent
groupsofservers.
Theemailanddatabaseapplicationshavetobeshutdownduringthe
backupprocess.
Duetothedecentralizedbackupenvironment,recoverabilityisoften
compromised.Therearetoomanytapesthatneedtobemountedtoperformafull
recoverincaseofacompletefailure.Thetimeneededtorecoveristoolengthy.
Thecompanywouldliketodeployaneasytomanagebackupenvironment.They
wanttoreducetheamountoftimetheemailanddatabaseapplicationsare
unavailable,andreducethenumberoftapesrequiredtofullyrecoveraserverin
caseoffailure.
Proposeabackupandrecoverysolutiontoaddressthecompany'sneeds.Justify
howyoursolutionensuresthattheirrequirementswillbemet.
Solution/Hint:
Thesolutionshouldhavethefollowingelements:
Centralizedbackupserver

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

23/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Backupagentstoavoidtherequirementforcriticalapplicationstobe
shutdownduringthebackupprocess.
Useofacumulativebackuppolicyinsteadofincrementalbackups,
reducingtheamountoftaperequiredforafullrestore.
2.TherearelimitedbackupdevicesinafilesharingNASenvironment.Suggesta
suitablebackupimplementationthatwillminimizethenetworktraffic,avoidany
congestion,andatthesametimenotimpacttheproductionoperations.Justify
youranswer.
Solution/Hint:
ThisisachievedbytheintroductionofNDMP,topromotedatatransportbetween
NASandbackupdevices.Duetoitsflexibilityitisnolongernecessaryto
transportthedatathroughthebackupserver.Dataissentfromthefilerdirectlyto
thebackupdevice,whilemetadataissenttothebackupserverfortracking
purposes.Thissolutionmeetsthestrategicneedtocentrallymanageandcontrol
distributeddata,whileminimizingnetworktraffic.NDMP3wayisusefulwhen
therearelimitedbackupdevicesintheenvironment,enablingtheNASdevice
controllingthebackupdevicetoshareitwithotherNASdevices,byreceiving
backupdataviaNDMP.

3.Discussthesecurityconcernsinbackupenvironment.

Solution/Hint:
Majorsecurityconcerninbackupenvironmentisspoofingbackupserver,backupclientor
backupnodeidentitybyunauthorizedhost,togainaccesstobackupdata.Anotherconcernis
backuptapebeinglost,stolen,ormisplaced,especiallyifthetapescontainhighlyconfide
ntial
information.Backuptotapeapplicationsarealsovulnerabletosecurityimplicationsifthe
y
donotencryptdatawhilebackingup.Lastlybackupdatashreddingshouldalso
consider,byperformingsafetapedataerasureoroverwritingiftheynolonger
required.
4.Whatarethevariousbusiness/technicalconsiderationsforimplementingabackup
solution,andhowdotheseconsiderationsimpactthebackupsolution/
implementation?
Solution/Hint:
>RTOandRPOaretheprimaryconsiderationsinselectingandimplementinga

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

24/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

>specificbackupstrategy.
>Retentionperiod
>Backupmediatype
>Backupgranularity
>Timeforperformingbackupandavailablebackupwindow
>Locationandtimeoftherestoreoperation
>filecharacteristics(location,size,andnumberoffiles)anddatacompression
5.Whatisthepurposeofperformingoperationbackup,disasterrecovery,
andarchiving?
Solution/Hint:
Operationbackup:Torestoredataintheeventofdatalossorlogicalcorruptions
Disasterrecovery:Forrestoringdataatanalternatesitewhentheprimarysiteis
incapacitatedduetoadisaster.
Archiving:Forlongtermdataretention(regulatorycomplianceorbusiness
requirement)
6.Listandexplaintheconsiderationsinusingtapeasthebackuptechnology.What
arethechallengesinthisenvironment?
Solution/Hint:
Advantages:
Offsitedatacopy
Lowerinitialcost
Challenges:
Reliability
Restoreperformance(mount,loadtoready,rewind,dismounttimes)
SequentialAccess
HVACcontrolledenvironment
Shipping/handlingchallenges

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

25/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

7.Describethebenefitsofusing"virtualtapelibrary"over"physicaltapes."

Features

Tape

VirtualTape

OffsiteCapabilities

Yes

Yes

Reliability

Noinherent
protectionmethods

RAID,spare

Performance

Subjecttomechanical
operations,loadtimes

Fastersinglestream

Use

Backuponly

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

26/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Backuponly

Chapter13

1.Whatistheimportanceofrecoverabilityandconsistencyinlocalreplication?
Solution/Hint:
Recoverabilityenablesrestorationofdatafromthereplicastotheproduction
volumesintheeventofdatalossordatacorruption.
RecoverabilitymustprovideminimalRPOandRTOforresuming
businessoperationsontheproductionvolumes.
Consistencyensurestherestartabilityfromdata.Businessoperationcannot
resumefrominconsistentdata.
2.Describetheusesofalocalreplicainvariousbusinessoperations.
Solution/Hint:
Alternatesourceforbackup
Fastrecovery
Decisionsupportactivitiessuchasreporting
Testingplatform
Datamigration
3.Whataretheconsiderationsforperformingbackupfromalocalreplica?
Solution/Hint:
ThereplicashouldbeconsistentPITcopyofthesource
Replicashouldnotbeupdatedwhenthebackupwindowisopen
4.Whatisthedifferencebetweenarestoreoperationandaresynchronization
operationwithlocalreplicas?Explainwithexamples.
Solution/Hint:
Restoreoperation
Sourceissynchronizedwiththetargetdata
Forexample,ifsourcecontainsadatabasewherealogicaldatacorruption
occurs,thedatacanberecoveredbyattachingthelatestPITreplicaofthe
sourceandmakingincrementalrestoreoperation.
Resynchronizationoperation

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

27/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Targetissynchronizedwiththesourcedata
Forexample,aftertargetisdetachedfromthesource,bothsourceand
targetdataareupdatedbythehost.Aftersometimethetargetneedstobe
synchronizedwiththesourcedata.Forthat,targetisagainattachedtothe
sourceandincrementalresynchronizationisperformed.
5.A300GBdatabaseneedstwolocalreplicasforreportingandbackup.Thereare
constraintsinprovisioningfullcapacityforthereplicas.Ithasbeendetermined
thatthedatabasehasbeenconfiguredon15disks,andthedailyrateofchangein
thedatabaseisapproximately25percent.Youneedtoconfiguretwopointer

basedreplicasforthedatabase.Describehowmuchcapacityyouwouldallocate
forthesereplicasandhowmanysavevolumesyouwouldconfigure.
Solution/Hint:
75GBofsavevolumesarerequired
space/capacityisallocated,sinceitispointerbasedreplica
6.ForthesamedatabasedescribedinQuestion5,discusstheadvantagesof
configuringfullvolumemirroringiftherearenoconstraintsoncapacity.
Solution/Hint:
Infullvolumemirroring,thesourceneednotbeup/healthyforrecovery.
7.AnadministratorconfiguressixsnapshotsofaLUNandcreateseightclonesof
thesameLUN.Theadministratorthencreatesfoursnapshotsforeachclonethat
wascreated.Howmanyusablereplicasarenowavailable?
Solution/Hint:
Usablereplicas=6+8+32=46
8.RefertoQuestion5.Havingcreatedthetworeplicasforbackupandreporting
purposes,assumeyouarerequiredtoautomatetheprocessesofbackupand
reportingfromthereplicasbyusingascript.Developascriptinapseudo
language(youcanusethestandardTimeFindercommandsfortheoperationsyou
needtoperform)thatwillfullyautomatebackupandreporting.Yourscript
shouldperformalltypesofvalidationsateachstep(e.g.,validatingwhethera
synchronizationprocessiscompleteoravolumemountissuccessfullydone).
Solution/Hint:

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

28/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Createaflowchartinsimplelanguage.

Chapter14

1.Anorganizationisplanningadatacentermigration.Theycanonlyafforda
maximumoftwohoursdowntimetocompletethemigration.Explainhowremote
replicationtechnologycanbeusedtomeetthedowntimerequirements.Whywill
theothermethodsnotmeetthisrequirement?
Solution/Hint:
SANbasedremotereplicationtechnologycanbeusedtoavoidthe
downtimeasitprovidenondisruptivedatamigration.
Conventionalmethodsneeddowntimetomigratedatafromonelocation
toother.
2.ExplaintheRPOthatcanbeachievedwithsynchronous,asynchronous,anddisk
bufferedremotereplication.
Solution/Hint:
RPOthatcanbeachievedwithsynchronousoftheorderofSeconds
RPOthatcanbeachievedwithasynchronousoftheorderofMinutes
RPOthatcanbeachievedwithDiskbufferedremotereplicationofthe
orderofhours
3.Discusstheeffectsofabunkerfailureinathreesitereplicationforthefollowing
implementation:
Multihopsynchronous+diskbuffered
Multihopsynchronous+asynchronous
Multitarget
Solution/Hint:
Multihopsynchronous+diskbuffered
Sameassynchronous+asynchronous
Multihopsynchronous+asynchronous
Ifthereisadisasteratthebunkersiteorifthereisanetworklinkfailure

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

29/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

betweenthesourceandbunkersites,thesourcesitewillcontinueto
operateasnormalbutwithoutanyremotereplication.Thissituationis
verysimilartotwositereplicationwhenafailure/disasteroccursatthe
targetsite.Theupdatestotheremotesitecannotoccurduetothefailurein
thebunkersite.Hence,thedataattheremotesitekeepsfallingbehind;but
theadvantagehereisthatifthesourcefailsaswellduringthistime,
operationscanberesumedattheremotesite.RPOattheremotesite
dependsonthetimedifferencebetweenthebunkersitefailureandsource
sitefailure.
Multitarget
Afailureofthebunkerortheremotesiteisnotconsideredadisaster
becausenormaloperationscancontinueatthesourcesitewhileremote
disasterrecoveryprotectionisstillavailablewiththesitethathasnot
failed.Anetworklinkfailuretoeitherthebunkersite(target1)orthe

remotesite(target2)enablesbusinessoperationstocontinue
uninterruptedatthesourcesitewhileremotedisasterrecoveryprotection
isstillavailablewiththesitethatcanbereached.
4.Discusstheeffectsofasourcefailureinathreesitereplicationforthefollowing
implementation,andtheavailablerecoveryoptions:
Multihopsynchronous+diskbuffered
Multihopsynchronous+asynchronous
Multitarget
Solution/Hint:
Multihopsynchronous+diskbuffered
Sameassynchronous+asynchronous
Multihopsynchronous+asynchronous
Ifthereisadisasteratthesource,operationsarefailedovertothebunker
sitewithzeroornearzerodataloss.Butunlikethesynchronoustwosite
situation,thereisstillremoteprotectionatthethirdsite.TheRPObetween
thebunkerandthirdsitecouldbeontheorderofminutes.
Multitarget
Ifasourcesitedisasteroccurs,BCoperationscanbestartedwiththe
bunker(target1)ortheremotesite(target2).Undernormal
circumstances,thedataatthebunkersiteisthemorerecentandupto

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

30/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

date.Hence,operationsareresumedwiththebunkersitedata.Insome
circumstances,thedataontheremotesiteismorecurrentthanthedataon
thebunkersiteforexample,ifthenetworklinksbetweenthesourceand
bunkersiteshasfailed.Inthiscase,theworkloadwouldcontinueatthe
sourcesitewithjusttheasynchronousreplicationtotheremotesite.Ifthe
synchronouslinksaredownlongenough,thenthedataattheremotesite
wouldbemorecurrentthanthedataatthebunkersite.Ifasourcesite
disasteroccursatthistime,thedataontheremotesiteshouldbeusedto
recover.Thenetworklinksbetweenthebunkerandremotesitesare
activatedinthissituationtoperformincrementalsynchronization.The
RPOisnearzeroifthebunkersitedataisused,anditisinminutesifthe
remotesitedataisused.
5.Ahostgenerates8,000I/OsatpeakutilizationwithanaverageI/Osizeof32KB.
Theresponsetimeiscurrentlymeasuredatanaverageof12msduringpeak
utilizations.WhensynchronousreplicationisimplementedwithaFibreChannel
linktoaremotesite,whatistheresponsetimeexperiencedbythehostifthe
networklatencyis6msperI/O?
Solution/Hint:
Actualresponsetime=12+(6*4)+(32*1024/8000)=40.096
Where12ms=currentresponsetime
6msperI/O=latency
32*1024/8000=datatransfertime

Chapter15

1.Researchthefollowingsecurityprotocolsandexplainhowtheyareused:
Hint:Researchwork
2.Astoragearraydialsasupportcenterautomaticallywheneveranerrorisdetected.
Thevendor'srepresentativeatthesupportcentercanlogontotheservice
processorofthestoragearraythroughtheInternettoperformdiagnosticsand
repair.Discusstheimpactofthisfeatureinasecurestorageenvironmentand
providesecuritymethodsthatcanbeimplementedtomitigateanymalicious
attacksthroughthisgateway.
Solution/Hint:
Modificationattacks
Inamodificationattack,theunauthorizeduserattemptstomodify
informationformaliciouspurposes.Amodificationattackcantargetdata
atrestordataintransit.Theseattacksposeathreattodataintegrity.
DenialofService

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

31/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

DenialofService(DoS)attacksdeniestheuseofresourcesto
legitimateusers.Theseattacksgenerallydonotinvolveaccesstoor
modificationofinformationonthecomputersystem.Instead,theyposea
threattodataavailability.Theintentionalfloodingofanetworkorwebsite
topreventlegitimateaccesstoauthorizedusersisoneexampleofaDoS
attack.
Eavesdropping
Whensomeoneoverhearsaconversation,theunauthorizedaccess
iscalledEavesdropping.
Snooping
Thisreferstoaccessinganotheruser'sdatainanunauthorized
way.Ingeneral,snoopingandeavesdroppingaresynonymous.
Managementaccess
Managementaccess,whethermonitoring,provisioning,ormanaging
storageresources,isassociatedwitheverydevicewithinthestorage
network.MostmanagementsoftwaresupportssomeformofCLI,system
managementconsoleorawebbasedinterface.
SControllingadministrativeaccess
Controllingadministrativeaccesstostorageaimsto
safeguardagainstthethreatsofanattackerspoofingan
administrator'sidentityorelevatinganotheruser'sidentityand
privilegestogainadministrativeaccess.Bothofthesethreats
affecttheintegrityofdataanddevices.Toprotectagainstthese
threats,administrativeaccessregulationandvariousauditing
techniquesareusedtoenforceaccountability.
fProtectingthemanagementinfrastructure
Protectingthemanagementnetworkinfrastructureisalso
necessary.Controlstoprotectthemanagementnetwork

infrastructureincludeencryptingmanagementtraffic,enforcing
managementaccesscontrols,andapplyingIPnetworksecurity
bestpractices.ThesebestpracticesincludetheuseofIProuters
andEthernetswitchestorestricttraffictocertaindevicesand
managementprotocols.
3.DevelopachecklistforauditingthesecurityofastorageenvironmentwithSAN,
NAS,andiSCSIimplementations.Explainhowyouwillperformtheaudit.
Assumethatyoudiscoveratleastfivesecurityloopholesduringtheauditprocess.
Listthemandprovidecontrolmechanismsthatshouldbeimplementedto
eliminatethem.

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

32/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Solution/Hint:

SAN,NAS,iSCSI

Servers(Production,management,backup,thirdparty,NAS)
oWhatdataorobjectwasaccessed/attemptedtoaccess?
oWhatactionwasperformed?
oWhenwasexecuted?
oWhoauthorizedandperformedtheaction?
oNFS/CIFSaccess(sharedfiles)
Fabric/IPnetwork
oPhysicalandlogicalaccess
Switches
oPhysicalandlogicalaccess
oZoning
Storage
oWhichvolumewasaccessed/attemptedtoaccess?
oWhatactionwasperformed?
oWhenwasexecuted?
oWhoauthorizedandperformedtheaction?
oLUNmasking
oProvisioning
oUpgrade/replacement
oHandlingofphysicalmedia

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

33/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

Process

Collectlogandcorrelate
Analyzeaccessandchangecontrol
oProductionandDRsite
oBackupandreplication
oThirdpartyservice
Checkalertingmechanism
Checksecuritycontrols

oPhysical
oAdministrative
oTechnological
Identifysecuritygap
Documentationandrecommendation

Fivesecurityloopholes

1.Authenticationallowsmultiplelogin
2.Nofirewall
3.Noauthenticationattheswitchlevel
4.Noencryptionforinflightdata
5.Poorphysicalsecurityatthedatacenter
Control

1.Restrictioninnumberofloginattempt,twopartpassword

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

34/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

2.Implementfirewalltoblockinappropriateordangeroustraffic
3.Authenticateusers/administratorsofFCswitchesusingRADIUS(Remote
AuthenticationDialInUserService),DHCHAP(DiffieHellmanChallenge
HandshakeAuthenticationProtocol),etc.
4.Encryptingthetrafficintransit
5.Increasesecuritymanpowerandimplementbiometricsecurity

Chapter16

1.DownloadEMCControlCentersimulatorandtheaccompanyinglabguidefrom
http://education.emc.com/ismbookandexecutethestepsdetailedinthelabguide.
Labexercise
2.Aperformanceproblemhasbeenreportedonadatabase.Monitoringconfirms
thatat12:00a.m.,aproblemsurfaced,andaccesstothedatabaseisseverely
affecteduntil3:00p.m.everyday.Thistimeslotiscriticalforbusinessoperations
andaninvestigationhasbeenlaunched.Areportingprocessthatstartsat12:00
p.m.contendsfordatabaseresourcesandconstrainstheenvironment.What
monitoringandmanagementprocedures,tools,andalertswouldyouestablishto
ensureaccessibility,capacity,performance,andsecurityinthisenvironment?
Hints:
Monitoring:
Settingupmonitoringandreportingforaccessibility,capacity,
performanceandsecurityonproductionandreplicationdata
MonitoringandmanagementtoolssuchasECCPerformancemanager
needtobedeploytogatherallperformancestatisticsdata(historicaldata)
Performanceanalysisperformanceconstraintisbecauseoftheresource
Management:
Requirement:Databaseneedtobereplicateforreportingprocess
SBasedonrequirementandinfrastructurechosenreplication
softwareneedtobedeploy
SProvisionstoragecapacityforreplication
fConfiguretheenvironmentforaccessingreplicateddata(need
configurationathost,networkandstorage)

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

35/36

6/13/2015

Fulltextof"ISMBookExerciseSolutions.pdfUnixLabDirectory"

SConfigureadequatecapacitybasedonpolicyondataretention
andchange
SConfiguresecurityforreplicateddata
3.ResearchSMISandwriteatechnicalpaperondifferentvendorimplementations
ofstoragemanagementsolutionsthatcomplywithSMIS.
Researchwork

https://archive.org/stream/ISMBookExerciseSolutions.pdfUnixLabDirectory/ISM%20Book%20Exercise%20Solutions.pdf%20%20Unix%20Lab%20Dire

36/36

Potrebbero piacerti anche