Professional Documents
Culture Documents
INSTITUTE OF
TECHNOLOGY
Improvement Assessment Test – NOV.2015
Fault Tolerance
To mitigate a single point of failure, systems are designed with redundancy, such that
the system will fail only if all the components in the redundancy group fail.
This ensures that the failure of a single component does not affect data availability.
Data centers follow stringent guidelines to implement fault tolerance.
Careful analysis is performed to eliminate every single point of failure.
All enhancements in the infrastructure to mitigate single points of failures are
emphasized:
Configuration of multiple HBAs to mitigate single HBA failure.
Configuration of multiple fabrics to account for a switch failure.
Configuration of multiple storage array ports to enhance the storage array’s availability.
o RAID configuration to ensure continuous operation in the event of disk failure.
o Implementing a storage array at a remote site to mitigate local site failure.
Full-Volume Mirroring
In full-volume mirroring, the target is attached to the source and established as a
mirror of the source.
Existing data on the source is copied to the target. New updates to the source are
also updated on the target.
After all the data is copied and both the source and the target contain identical
data, the target can be considered a mirror of the source.
While the target is attached to the source and the synchronization is taking place,
the target remains unavailable to any other host. However, the production host can
access the source.
After synchronization is complete, the target can be detached from the source and
is made available for BC operations.
5. Explain the storage array based remote replication with any three modes.
Synchronous Replication Mode-3 marks, Asynchronous Replication Mode-3 marks
Disk-Buffered Replication Mode-4 marks
For remote replication over extended distances, optical network technologies such as
dense wavelength division multiplexing (DWDM), coarse wavelength division
multiplexing (CWDM), and synchronous optical network (SONET) are deployed.
DWDM
DWDM is an optical technology by which data from different channels are carried
at different wavelengths over a fiber-optic link.
It is a fiber-optic transmission technique that uses light waves to transmit data
parallel by bit or serial by character.
It integrates multiple light waves with different wavelengths in a group and directs
them through a single optical fiber.
The multiplexing of data from several channels into a multicolored light stream
transmitted on a single optical fiber has opened up the conventional optical fiber
bandwidth by breaking it into many channels, each at a different optical
wavelength.
Each wavelength can carry a signal at a bit rate less than the upper limit defined
by the electronics; typically up to several gigabits per second.
SONET
SONET (synchronous optical network) is a network technology that involves
transferring a large payload through an optical fiber over long distances time within
the optical fiber.
SONET multiplexes data streams of different speeds into a frame and sends them
across the network.
The European variation of SONET is called synchronous digital hierarchy (SDH).
SONET/SDH uses generic framing procedure (GFP) and supports the transport of
both packet-oriented (Ethernet, IP) and character-oriented (FC) data.
7. a) List and explain the attributes of Storage security frame work.
List- 1 marks, Explanation -5 marks
Accountability service: Refers to accounting for all the events and operations that
takes place in data center infrastructure
Confidentiality service: Provides the required secrecy of information and ensures
that only authorized users have access to data. Data in transit and at rest can be
encrypted to maintain its confidentiality. In addition to restricting unauthorized users
from accessing information, confidentiality services also implement traffic flow
protection measures as part of the security protocol..
Integrity service: Ensures that the information is unaltered. The objective of the
service is to detect and protect against unauthorized alteration or deletion of
information.
Availability service: This ensures that authorized users have reliable and timely
access to data.. Availability services are also implemented on communication systems
used to transmit information among computers that may reside at different locations.
Assets
Information is one of the most important assets for any organization.
Other assets include hardware, software, and the network infrastructure required to
access this information.
Threats
Threats are the potential attacks that can be carried out on an IT infrastructure.
These attacks can be classified as active or passive.
Passive attacks are attempts to gain unauthorized access into the system.
Vulnerability
The paths that provide access to information are the most vulnerable to potential
attacks. Each of these paths may contain various access points, each of which
provides different levels of access to the storage resources.
It is very important to implement adequate security controls at all the access points on
an access path.
8. Explain the SAN security architecture and SAN security mechanisms.
Architecture -3 marks, Security Mechanism- 3 marks, Zoning -$ marks
Storage networking environments are a potential target for unauthorized access, theft, and
misuse because of the vastness and complexity of these environments. Therefore, security
strategies are based on the defense in depth concept, which recommends multiple
integrated layers of security.
Zone B (Firewall)
Zone C (Access Control
Switch)
Zone D (ACL and Zoning
Zone E (Switch to Switch/
Zone F (Distance Extension
Zone G (Switch-Storage)