ccs367-storagetechnologiesquestionbank
ccs367-storagetechnologiesquestionbank
Data is a collection of raw facts from real world entities Data can come in the
form of text, observations, figures, images, numbers, graphs, or symbols.
Examples
Handwritten letters, a printed book, a family photograph, a movie on video tape,
printed and duly signed copies of mortgage papers, a bank’s ledgers, and an account
holder’s passbooks are all examples of data
Data in this form is called digital data and is accessible by the user only after it is
processed by a computer.
Types
structured
unstructured
1
5. Define information with example.
Five core elements are essential for the basic functionality of a data center
Application
Database
Server and operating system
Network
Storage array
2
10. List out the key challenges in managing information.
The information lifecycle is the “change in the value of information” over time.
When data is first created, it often has the highest value and is used frequently. As data
ages, it is accessed less frequently and is of less value to the organization.
Business-centric
Centrally managed
Policy-based
Heterogeneous
Optimized
3
16. What is cloud computing?
Cloud computing refers to the delivery of computing services over the internet,
including storage, processing power, and software applications.
There are the following three types of cloud service models are
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
There are the following four types of cloud deployment models are
Private cloud
Public cloud
Hybrid cloud
Community cloud
19. List out the desirable Advantages and disadvantages of cloud computing.
Advantages:
Easy implementation
Accessibility
No hardware required
Cost per head
Flexibility for growth
Efficient recovery
Disadvantages:
No longer in control
May not get all the features
No Redundancy
Bandwidth issues.
4
20. What Is Big data analytics?
Big data analytics is the process of collecting, examining, and analysing large
amounts of data to discover market trends, insights, and patterns that can help companies
make better business decisions.
Hadoop
Spark
Data integration software
Stream analytics tools
Predictive analytics hardware and software
Data mining tools
NoSQL databases
Facebook
Google+
Twitter(x)
Faceparty
Linkedin
Flickr
WhatsApp
Hike
5
26. List out the types of mobile communication.
Data center virtualization is the transfer of physical data centers into digital data centers
(i.e.,virtual) using a cloud software platform, enabling companies to remotely access
information and applications.
Data center virtualization is the process of creating a virtual server—sometimes
called a software defined data center (SDCC) from traditional, physical servers.
PART-B QUESTIONS
6
9. Explain the cloud service models and give the advantage and disadvantages of
each service model.
10. Write a short note on
a. Benefits of big data analytics
b. Big data in the real world
c. Types of big data analytics
d. Big data analytics tools
13. Explain the characteristic and pillars of the third platform services.
14. Discuss the necessary steps involved to implement third platform transformation.
15. Define SDDC and explain the key components of software defined data center.
7
UNIT II- INTELLIGENT STORAGE SYSTEMS AND RAID
8
6. How to measure the cache memory read performance?
Read performance is measured in terms of the read hit ratio, or the hit rate, usually
expressed as a percentage. This ratio is the number of read hits with respect to the total
number of read requests.A higher read hit ratio improves the read performance.
9
15. What are the factors to affect the performance of disk drive?
Disk Service Time
Seek Time
Rotational Latency
Data Transfer Rate
10
23. What are the categories of intelligent storage systems?
Intelligent storage systems generally fall into one of the following two categories:
High-end storage systems
Midrange storage systems
BRIEF DESCRIPTION
24. Define scale-up and scale-out storage architecture.
Scale-up data storage architecture, storage drives are added to increase storage capacity
and performance.
Scale-out storage architecture uses software-defined storage (SDS) to separate the
storage hardware from the storage software, letting the software act as the controllers.
PART-B QUESTIONS
1. Explain the key components of hard disk drive and solid state drive.
2. Explain key components of an intelligent storage system.
3. How to calculate cache memory performance? And explain Read and Write operation
performed in cache memory .
4. Discuss the various algorithms for cache memory management
5. Write note on
a. Physical disk drive
b. LNU(logical unit number) masking
c. Platter
d. Spindle with R/W head
6. Explain the factor that affect the performance of hard disk drives and solid state drives
7. Give an example to illustrate addressing of hard disk drives and solid state drives.
11
12. Compute the number of drives required to support the application in different RAID
environments if 10K RPM drives with a rating of 130 IOPS per drive were used.
UNIT III STORAGE NETWORKING TECHNOLOGIES AND VIRTUALIZATION
PART-A-TWO MARK QUESTION & ANSWERS
2. Define virtualization.
Virtualization is the technique of masking or abstracting physical resources, which
simplicationes the infrastructure and accommodates the increasing pace of business and
technological changes. It increases the utilization and capability of IT resources, such as
servers, networks, or storage devices, beyond their physical limits.
Virtualization simplifies resource management by pooling and sharing resources for
maximum utilization and makes them appear as logical resources with enhanced
capabilities.
12
Bridged iSCSI connectivity - Bridged topologies enable the co-existence of FC with IP
by providing iSCSI-to-FC bridging functionality. For example, the initiators can exist in
an IP environment while the storage remains in an FC SAN.
4. What is zoning?
Zoning allows for inner segmentation of the switched fabric. Zoning can be used to
instigate a barrier between different environments.
Only the members of the same zone can communicate within that zone; all other attempts
from outside are rejected.
Zoning can be implemented in the following ways:
Hardware zoning
Software zoning
13
Data can be accessed using the Network File System (NFS) protocol for Unix or Linux,
or the Server Message Block (SMB) protocol for Microsoft Windows.
14
in control functions at the network components level, the software external to the
components takes over the control functions.
17. Difference between Multimode fiber (MMF) cable and Single-mode fiber (SMF).
Multimode fiber (MMF) cable carries multiple beams of light projected at different
angles simultaneously onto the core of the cable.
In an MMF transmission, multiple light beams travelling inside the cable tend to
disperse and collide. This collision weakens the signal strength after it travels a certain
distance a process known as modal dispersion.
Due to modal dispersion, an MMF cable is typically used for short distances,
commonly within a data center.
Single-mode fiber (SMF) carries a single ray of light projected at the center of the
core. The small core and the single light wave help to limit modal dispersion.
Single-mode Provides minimum signal attenuation over maximum distance (up to 10
km).
A single mode cable is used for long-distance cable runs, and the distance usually
depends on the power of the laser at the transmitter and the sensitivity of the receiver.
15
Fibre channel switched fabric (FC-SW)
PART-B QUESTIONS
1. Explain in detail about Block-based, File-based, Object-based and Unified Storage systems.
2. Describe in detail about the components and architecture of FC SAN
3. Write a note on FC SAN topologies and connectivity
4. Describe in detail about zoning and link aggregation
5. What is Virtual SAN of FC SAN. Explain in detail.
6. Explain in detail about the IP SAN Protocols (iSCSI protocol Stack, FCIP protocol Stack)
7. Explain in detail about zoning and aggregation in iSCSI IP SAN
8. Explain the components, performance and addressing in FCIP
9. Explain in detail about the components and architecture of FCoE
10. Describe about Converged Enhanced Ethernet
11. Write notes on benefits of all storage systems in storage networking technologies.
12. Explain the architecture of unified storage technologies.
13. Explain in details about the software defined architecture
14. Discuss the various FC topologies in detail.
16
15. Write note on
a. FC SAN virtualization
b. IP SAN
16. What is uses of iSCSI ? Explain key components of an iSCSI and host connectivity.
17. Explain the various topologies used in iSCSI connectivity.
18. Write notes on
a. iSCSI protocol stack
b. link Aggregation
c. Switch Aggregation
d. What are the parameters to consider to selecting
Aggregation switch?
17
UNIT IV BACKUP, ARCHIVE AND REPLICATION
18
6. How to differs Hot backup from cold backup?
Hot backup and cold backup are the two methods deployed for backup. They are based
on the state of the application when the backup is performed.
Online archive: The storage device is directly connected to the host to make the data
immediately available. This is best suited for active archives.
Nearline archive: The storage device is connected to the host and infor- mation is local, but
the device must be mounted or loaded to access the information.
Offline archive: The storage device is not directly connected, mounted, or loaded. Manual
intervention is required to provide this service before information can be accessed..
19
14. List out the types of data migrations.
Storage migration
Database migration
Application migration
Cloud migration
Business process migration.
15. What are the challenges faced during data migration process?
Source data.
Wrong data formats
Mapping data
Sustainable governance
Security
20
20. Difference between Data migration and data conversion.
Data migration is the process of transferring data between data storage systems or
formats.
Data conversion is the process of changing data from one format to another. If a legacy
system and a new system have identical fields, an organization could just do a data
migration; however, the data from the legacy system is generally different and needs to
be modified before migrating. Data conversion is often a step in the data migration
process.
PART-B QUESTIONS
1. Explain the BC planning lifecycle process.
2. Discuss in detail about backup architecture and their methods.
3. Define data deduplication and explain the various types of data deduplication
4. Explain the cloud based and mobile device backup process.
5. Write notes on
a. Types of Data archive
b. Types of Data migrations
6. Explain the various Data replication process.
7. Discuss the various strategies used in data migrations and phases of data
migration process.
8. Explain in detail Disaster Recovery As A Service (DRAAS)
21
UNIT V-SECURING STORAGE INFRASTRUCTURE
22
Digital security controls
Cybersecurity controls
Cloud security controls
5. Define Governance.
Governance is the set of policies, rules, or frameworks that a company uses to achieve its
business goals. It defines the responsibilities of key stakeholders, such as the board of
directors and senior management.
8. Define Compliance
Compliance is the act of following rules, laws, and regulations. It applies to legal
and regulatory requirements set by industrial bodies and also for internal corporate
policies.
23
Security information and event management
Auditing
PART-B QUESTIONS
24
b. Risk management
c. Compliance
d. Benefits Of GRC
5. Explain the various challenges faced during GRC implementation process.
6. Explain the functions and process involved in storage infrastructure management.
25