15CS754 SAN Solution Manual
15CS754 SAN Solution Manual
15CS754 SAN Solution Manual
1. Explain the core elements and key characteristics of Data Centre elements with a neat
diagram
(08Marks)
Answer:
Data Centre: It is a facility that contains storage, compute, network, and other IT
resources to provide centralized data-processing capabilities.
2. Discuss the functionalities of a Logical Volume Manager, with a neat diagram 08 Marks
Hosts
Logical Volume
Physical Volume
Partitioning Concatenation
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 2: Data Center Environment 11
3. Define the two main goals of RAID; Explain the below mentioned RAID techniques with
suitable diagrams.
a. RAID 1+0
b. RAID 0+1
Explain why RAID 0 is not an option for data protection and high availability?
(08 Marks)
Answer: Performance limitation of disk drive
An individual drive has a certain life expectancy
o Measured in MTBF (Mean Time Between Failure)
o The more the number of HDDs in a storage array, the larger the probability for
disk failure. For example:
o If the MTBF of a drive is 750,000 hours, and there are 100 drives in the
array, then the MTBF of the array becomes 750,000 / 100, or 7,500 hours
o RAID was introduced to mitigate this problem
o RAID provides:
o Increase capacity
o Higher availability
Increased performance
RAID LEVELS
NESTED RAID
o Combines the performance benefits of RAID 0 with the redundancy benefit of RAID 1.
o RAID 0+1 – Mirrored Stripe
o Data is striped across HDDs, then the entire stripe is mirrored.
o If one drive fails, the entire stripe is faulted.
o Rebuild operation requires data to be copied from each disk in the healthy stripe,
causing increased load on the surviving disks.
o RAID 1+0 – Striped Mirror
o Data is first mirrored, and then both copies are striped across multiple HDDs.
o When a drive fails, data is still accessible from its mirror.
o Rebuild operation only requires data to be copied from the surviving disk into the
replacement disk.
4. An application has 1,000 heavy users at the peak of 2 IOPS each and 2,000 Typical users
at the peak of 1 IOPS each, with read/ write ratio of 2:1. It is also estimated that the
application also experiences an overhead of 20 Percent for other workloads. Calculate the
IOPS requirements for RAID 1, RAID 3, RAID 5, and RAID 6.
5. Define Intelligent Storage Systems? Explain with a neat diagram the components of an
Intelligent Storage Systems. (08Marks)
• Provides large amount of cache and multiple I/O paths that enhances the performance
• Has an operating environment that provides
Intelligent cache management
Array resource management
Connectivity to heterogeneous hosts
• Supports flash drive, virtual provisioning, and automated storage tiering
EMC Proven Professional. Copyright © 2012 EMC Corporation. All Rights Reserved. Module 4: Intelligent Storage System 5
Answer:
Cache is semiconductor memory where data is placed temporarily to reduce the time required
to service I/O requests from the host.
Structure of Cache
Cache consists of the data store and tag RAM. The data store holds the data while tag R.
Tag RAM includes a dirty bit flag, which indicates whether the data in cache has been
committed to the disk or not
RAM to determine whether the required data is available in cache. If the requested data is
found in the cache, it is called a read cache hit or read hit and data is sent directly to the host,
without any disk operation If the requested data is not found in cache, it is called a cache
miss and the data must be read from the disk
Write operations with cache provide performance advantages over writing directly to disks.
When an I/O is written to cache and acknowledged, it is completed in far less time (from the
host’s perspective) than it would take to write directly to disk
Write-back cache: Data is placed in cache and an acknowledgment is sent to the host
immediately and committed later.
Cache Implementation
Cache can be implemented as either dedicated cache or global cache. With dedicated cache,
separate sets of memory locations are reserved for reads and writes. In global cache, both
reads and writes can use any of the available memory addresses.
Cache Management
Least Recently Used (LRU): An algorithm that continuously monitors data access in cache
and identifies the cache pages that have not been accessed for a long time.
Most Recently Used (MRU): An algorithm that is the converse of LRU. In MRU, the pages
that have been accessed most recently are freed up or marked for reuse.
Idle flushing: Occurs continuously, at a modest rate, when the cache utilization level is
between the high and low watermark.
High watermark flushing: Activated when cache utilization hits the high watermark. The
storage system dedicates some additional resources to flushing. This type of flushing has
minimal impact on host I/O processing.
Forced flushing: Occurs in the event of a large I/O burst when cache reaches 100 percent of
its capacity, which significantly affects the I/O response time. In forced flushing, dirty pages
are forcibly flushed to disk.
Cache mirroring: Each write to cache is held in two different memory locations on two
independent memory cards.
Cache vaulting: Cache is exposed to the risk of uncommitted data loss due to power
failure. This problem can be addressed in various ways: powering the memory with a
battery until AC power is restored or using battery power to write the cache content to the
disk.
7. Explain the components of Storage Area Networks (SAN)? Illustrate transmission of data
in Fibre Channel Arbitrated Loop (FC-AL) configuration with a neat diagram.
Answer:
Shown is an example comparing Virtual Provisioning (on the right) with traditional storage
provisioning (on the left). The example demonstrates the benefit of better capacity utilization.
With traditional provisioning, three LUNs are created and presented to one or more hosts,
using traditional provisioning methods. The total usable storage capacity of the storage
system is 2 TB.
• The size of LUN 1 is 500 GB, of which 100 GB is actual data and 400 GB is
allocated unused capacity.
• The size of LUN 2 is 550 GB, of which 50 GB is actual data and 500 GB is allocated
unused capacity.
• The size of LUN 3 is 800 GB, of which 200 GB is actual data and 600 GB is
allocated unused capacity.
In total, the storage system stores 350 GB of actual data, 1.5 TB of allocated unused capacity,
and only 150 GB of available capacity for other applications.
If we consider the same 2 TB storage system with Virtual Provisioning, the differences are quite
dramatic. Although the system administrator creates the same size LUNs for LUNs 1, 2, and 3,
there is no allocated unused capacity. In total, the storage system with Virtual Provisioning stores
the same 350 GB of actual data as the other storage system, with 1.65 TB of capacity available
for other applications, versus only 150 GB in the traditional storage system.
Answer: