Amity MSC IT Sem IV Solved Assignment for Emerging Technologies | SolveZone
whatssapp

Product Detail

Amity MSC IT Sem IV Solved Assignment for Emerging Technologies

University  Amity blog
Service Type Blog
Course Assignment
Semester
Short Name or Subject Code Emerging Technologies
Product Assignment of Blog (Amity blog)
Pattern Section A,B,C Wise
Price
Click to view price

                          Emerging Technologies

                          Assignment A

Q1.) What are the benefits of using multiple HBAs on a host?

Q2.) Why do formatted disks have less capacity than unformatted disks?


Q3.) How can a block-level virtualization implementation be used as a data migration tool? Explain how data migration will be accomplished and discuss the advantages of using this method for storage. Compare this method to traditional migration methods.

Q4.) The marketing department at a mid-size firm is expanding. New hires are being added to the department and they are given network access to the department’s files. IT has given marketing a networked drive on the LAN, but it keeps reaching capacity every third week. Current capacity is 500 gigabytes (and growing), with hundreds of files. Users are complaining about LAN response times and capacity. As the IT manager, what could you recommend to improve the situation?

Q5.) An application specifies a requirement of 200 GB to host a database and other files. It also specifies that the storage environment should support 5,000 IOPS during its peak processing cycle. The disks available for configuration provide 66 GB of usable capacity, and the manufacturer specifies that they can support a maximum of 140 IOPS. The application is response time sensitive and disk utilization beyond 60 percent will not meet the response time requirements of the application. Compute and explain the theoretical basis for the minimum number of disks that should be configured to meet the requirements of the application.


Assignment B

Q1) A large company is considering a storage infrastructure—one that is scalable and provides high availability. More importantly, the company also needs performance for its mission-critical applications. Which storage topology would you recommend (SAN, NAS, IP SAN) and why?

Q2). An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typical users at a peak of 1 IOPS each, with a read/write ratio of 2:1. It is estimated that the application also experiences an overhead of 20 percent for other workloads. Calculate the IOPS requirement for RAID 1, RAID 3, and RAID 5

Q3). To access data in a SAN, a host uses a physical address known as a logical block address (LBA). A host using a CAS device does not use (or need) a physical address. Why?


Q4). Case Study
A hospital uses an application that stores patient X-ray data in the form of large binary objects in an Oracle database. The application is hosted on a UNIX server, and the hospital staff accesses the X-ray records through a Gigabit Ethernet backbone. Storage array provides storage to the UNIX server, which has 6 terabytes of usable capacity.
(a) Explain the core elements of the data center. What are the typical challenges the storage management team may face in meeting the service-level demands of the hospital staff?

(b) Describe how the value of this patient data might change over time.

Assignment C

Which cache management algorithm is based on the assumption that data will not be requested by the host when it has not been accessed for a while?
LRU
HWM
LWM
MRU

What does the area ID of the FC address identify?
Group of ports within a switch
B. An individual port within a fabric
Location of the name server within the fabric
Unique number provided to each switch in the fabric

An organization performs copy on first access (CoFA) replication to create a local replica of application data. To perform a successful restore, what should be considered?
Source devices must be healthy
Save location size must be larger than the size of all source devices
Save location size must be equa l to the size of all source devices
 All changes to the source and replica must be discarded before the restore starts.

Which host component eliminates the need to deploy separate adapters for FC and Ethernet communications?
Converged network adapter
TCP Offload Engine NIC
FCIP bridging adapter
iSCSI host bus adapter

What is a function of unified management software in cloud computing?
Defining cloud service attributes
Consolidating infrastructure resources scattered across one or more data centers
Metering based on usage of resources by the consumer
Providing an interface to consumers to request cloud services

Which EMC product provides the capability to recover data up to any point-in-time?
Recover Point
Networker
Avamar
Data Domain

What is needed to perform a non-disruptive migration of virtual machines (VMs) between hypervisors?
Hypervisors must have access to the same storage volume.
Physical machines running hypervisors must have the same configuration
Hypervisors must be running within the same physical machine
Both hypervisors must have the same IP address

Which iSCSI name requires an organization to own a registered domain name?
IQN
EUI
WWNN
WWPN

Which data center requirement refers to applying mechanisms that ensure data is stored and retrieved as it was received?
Integrity
Availability
Security
Performance

What describes a landing zone in a disk drive?
Area on which the read/write head rests
Area where the read/write head lands to access data
Area where the data is buffered before writing to platters
Area where sector-specific information is stored on the disk

Clients use which protocol to discover SMI Agents on Storage Area Network?
SLP (Service Location Protocol)
AGP (Agent Discovery Protocol)
SMIP (SMI Protocol)

__________ is the capability to continue as if nothing has happened, even after a major component failure.
redundancy
interoperability
fault tolerance
backup

Striping with parity is also known as RAID __________.
0
1
4
6

A storage device that is connected directly to a network is an example of __________.
network attached storage
storage area network
direct attached storage
RAID

Identify a network file protocol in the below mentioned set.
FC
CIFS
SCSI
NAS

More than one of the same component is an example of a __________ system.
scalable
redundant
RAID
back-up

Which one of the below is measured by MTBF?
Tolerance
Life time
Reliability
Quality

The purpose of backup is:
To restore a computer to an operational state following a disaster
To restore small numbers of files after they have been accidentally deleted
Is to free space in the primary storage
None of the above

Backup of the source data can be created
On the same device
On another device
At some other location
All the above

Which of the following backup technique is most space efficient?
Full backup
Incremental backup
Differential backup

Which of the following statements are true?
Data can be recovered fastest in online backup
Tape library is an example of nearline storage
Data recovery can take hours for offline backup
All the above
Ans- D

Which of the following qualifies as best DR (Disaster Recovery) site?
DR site in the same campus
DR site in the same city
DR site in the same country
DR site in a different country

In SAN storage model, the operating system view storage resources as —— devices
FC
SCSI
SAN
None of the above

To decide on a backup strategy for your organization, which of the following should you consider?
RPO (Recovery Point Objective)
RTO (Recovery Time Objective)
Both RPO & RTO
None of the above

Which of the following can be used for reducing recovery time?
Automatic failover
By taking backup on a faster device
Taking multiple backups – one in same location, another at different location
All the above

Which storage technology requires downtime to add new hard disk capacity
DAS
SAN
NAS
None of the above

Which of the following is Backup software?
Amanda
Bacula
IBM Tivoli Storage Manager
All the above

Data protection is required to recover from
Disk/System failures
Software corruption through virus
Human errors
All the above

The challenges for data protection are
Taking care of the old data
Backing up the dynamic data
All the above

Name the mechanism which provides the highest level of data protection
RAID 0
RAID 1
RAID 6

Disk controller driver in DAS architecture is replaced in SAN either with ——
FC Protocol
iSCSI
TCP/IP stack
Any one of the above

The drawback of data mirroring is
Backing up the data
Performance degradation
Difficulty involved in configuring the mirrored volume

With reference to Volume Manager, is the following statement TRUE or FALSE under specific configuration?
Volume manager provides protection against multiple disk failures
True
False


Which are all the statements valid statements w.r.t volume manager
Achieve protection against single/multiple disk failures
Sustain system/node failure
Get better performance compared to using individual disk
All the above

Point out the false statement. Volume can
Span across different partitions/disks
Span across different disk arrays
Be created on tape device
Be a shared volume

Identify the correct statements w.r.t. Journal File System (JFS)
JFS keeps pointers to all the stale data
While recovering data on a system, JFS helps in quicker recovery
All the above

Which topology is best suited for medium sized enterprise.
NAS
SAN
DAS

What is the most basic level of storage
SAN
DAS
NAS
ISCSI

Which three statements describe differences between Storage Area Network (SAN) and
Network Attached Storage (NAS) solutions? Choose three.
SAN is generally more expensive but provides higher performance
NAS uses TCP/IP for communication between hosts and the NAS server
NAS requires additional hardware on a host: a host bus adapter for connectivity
SAN uses proprietary protocols for communication between hosts and the SAN fabric

Demerits of DAS are. Choose two.
Interconnect limited to 10km
Excessive network traffic
Distance limitations
Inability to share data with other servers