56
CLIENT SERVER COMPUTING –DATA STORAGE II ME CSE 2015-16 ODD SEMESTER (III SEMESTER) 1

Data storage csc

Embed Size (px)

Citation preview

Page 1: Data storage csc

CLIENT SERVER COMPUTING –DATA STORAGE II ME CSE

2015-16 ODD SEMESTER (III SEMESTER)

1

Page 2: Data storage csc

TopicsMagnetic DiskMagnetic TapeCD ROMWormOptical DiskMirrored DiskFault ToleranceRAID

Network Protection Devices

Power Protection DevicesClient Server System

DevelopmentRemote System

Management

2

Page 3: Data storage csc

Magnetic Disk• There are various types of auxiliary storage; all of them

involve some type of magnetic disk.• It uses magnetism to store the data on a magnetic surface.• The advantages associated with such type of storage media

– high storage capacity, – reliable and – provides direct access to the data.

3

Page 4: Data storage csc

Magnetic Disk• The available magnetic

disks are – Diskette

–Floppy disk

4

Page 5: Data storage csc

Magnetic Disk– Hard Disk

5

Page 6: Data storage csc

Magnetic Disk• What happens when a disk is formatted?

– Whether all data is erased? – Surfaces are checked for physical and magnetic defects. – A root directory is created to list where things are on the disk.– The capacity of a magnetic disk depends on several factors.

6

Page 7: Data storage csc

Magnetic Tape• Magnetic tape is a secondary storage device, generally

used for backup purposes.• They are permanent and not volatile by nature.• The speed of access can be quite slow, however, when the

tape is long and what you want is not near the start.• So this method is used primarily for major backups of large

amounts of data.

7

Page 8: Data storage csc

Magnetic Tape• The format method will

determine the some important characteristics like–Density –Block–Gap

8

Page 9: Data storage csc

CD-ROM• CD-ROM (Compact Disc, read-only-memory) is an adaptation of

the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound.

• Although the disc media and the drives of the CD and CD-ROM are, in principle, the same, there is a difference in the way data storage is organized.

• Two new sectors were defined–CD-ROM Mode 1 for storing computer data.–CD-ROM Mode 2 for compressed audio or video/graphic data.

9

Page 10: Data storage csc

CD-ROM• Data Encoding and Reading

– The CD-ROM, like other CD adaptations, has data encoded in a spiral track beginning at the center and ending at the outermost edge of the disc. 

– The spiral track holds approximately 650 MB of data. That's about 5.5 billion bits.

– The track pitch can range from 1.5 to 1.7 microns, but in most cases is 1.6 microns.

10

Page 11: Data storage csc

CD-ROM• Constant Linear Velocity (CLV)

– CLV  is the principle by which data is read from a CD-ROM.– Principle states that the read head must interact with the data

track at a constant rate, whether it is accessing data from the inner or outermost portions of the disc. 

11

Page 12: Data storage csc

WORM• WORM (write once, read many) is a data storage

technology that allows information to be written to a disc a single time and prevents the drive from erasing the data.

• The discs are intentionally not rewritable, because they are especially intended to store data that the user does not want to erase accidentally.

• Used for the archival purposes of organizations such as government agencies or large enterprises. 

12

Page 13: Data storage csc

WORM• The discs have varied in size from 5.25 to 14 inches wide,

in varying formats ranging from 140MB to more than 3 GB per side of the (usually) double-sided medium.

• Data is written to a WORM disc with a low-powered laser that makes permanent marks on the surface.

13

Page 14: Data storage csc

WORM Top: the hybrid

organic/inorganic semiconductor WORM memoryBottom: Diagram of the WORM memory element used in this study Also shown is the chemical structure of the two-component electrochromic polymer PEDOT (polyethylenedioxythiophene (PEDT): polystyrene sulphonic acid (PSS) 

14

Page 15: Data storage csc

Optical DiskAn optical disc holds much more data.The greater control and focus possible with laser beams (in

comparison to tiny magnetic heads) means that more data can be written into a smaller space.

An optical disc is an electronic data storage medium that can be written to and read using a low-powered laser beam.

Storage capacity increases with each new generation of optical media. Emerging standards, such as Blu-ray, offer up to 27 gigabytes (GB) on a single-sided 12-centimeter disc.

Optical discs are inexpensive to manufacture.

15

Page 16: Data storage csc

Variants Read-Only (Factory Pressed)•Read-only discs are pressed from a master at the time of manufacture and cannot be erased.CD-ROM, DVD-ROM, DVD-Video and BD-ROM (Blu-ray).Write-Once (Burnable)•Write-once discs are recorded in the user's environment but cannot be erased. They include the CD-R, DVD-R, DVD+R, BD-R (Blu-ray), WORM discs, as well as magneto-optic (MO) discs in WORM mode.Rewritable (Phase Change and Magneto Optic)•Rewritable discs can be written and re-written numerous times. Employing phase change technology, consumer-oriented products include CD-RW, DVD-RAM, DVD-RW, DVD+RW and BD-RE (Blu-ray)

16

Page 17: Data storage csc

RAIDRedundant Arrays of Independent DisksMotivation

Typical memory bandwidths 150 MB/sec

Typical disk bandwidths 10 MB/sec

Result: I/O-bound applications limited by disk bandwidth (not just by disk latency!)

17

Page 18: Data storage csc

Solution: Exploit ParallelismStripe the data across an

array of disksmany alternative striping

strategies possibleExample: consider a big

file striped across N disksstripe width is S byteshence each stripe unit is

S/N bytessequential read of S bytes

at a time

18

Page 19: Data storage csc

Performance BenefitSequential read or write of

large fileapplication (or I/O buffer

cache) reads in multiples of S bytes

controller performs parallel access of N disks

aggregate bandwidth is N times individual disk bandwidth

(assumes that disk is the bottleneck)

19

Page 20: Data storage csc

N concurrent small read or write requests

randomly distributed across N drives (we hope!)common in database and Web server environments

20

Page 21: Data storage csc

RAID ApproachesMany alternative approaches to achieving this redundancy

RAID levels 1 through 5

hot sparing allows reconstruction concurrently with accesses

Key metrics to evaluate alternativeswasted space due to redundancylikelihood of “hot spots” during heavy loadsdegradation of performance during repair

21

Page 22: Data storage csc

RAID Level 1Also known as “mirroring”

To read a block:read from either data disk or backup

To write a block:write both data and backup disksfailure model determines whether

writes can occur in parallel

Backups can be located far way: safeguard against site failure

22

Page 23: Data storage csc

RAID Levels 2 & 3These are bit-interleaved

schemesIn Raid Level 2, P contains

memory-style ECCIn Rail Level 3, P contains

simple parityRarely used today

23

Page 24: Data storage csc

RAID 4Block-interleaved parityWasted storage is small:

one parity block for N data blocks

Key problem: parity disk becomes a hot

spotwrite access to parity disk

on every write to any block

24

Page 25: Data storage csc

RAID 5Rotated parityWastage is small: same as

in Raid 4Parity update traffic is

distributed across disks

25

Page 26: Data storage csc

RAID 5 Actions

26

Page 27: Data storage csc

Network Protection Device /Security Appliance Security Appliance or Network Protection is used to control

network access of a computer

27

Page 28: Data storage csc

Network Protection DevicesNetwork Protection Devices

28

• It is designed to protect computer networks from unwanted traffic• Examples include–CyberRoam Security devices, Firewalls ,Secured Routers etc.,

• 4 Types of Network Protection devices –Active devices –Passive devices –Preventative devices –Unified Threat Management (UTM)

Page 29: Data storage csc

Active devices - block unwanted traffic. Eg: such devices are firewalls, anti virus scanning devices, and content filtering devices.

Passive devices - detect and report on unwanted traffic, such as intrusion detection appliances.

Preventative devices - scan networks and identify potential security problems (such as penetration testing and vulnerability assessment appliances).

Unified Threat Management (UTM) appliances combine features together into one system, such as some firewalls, content filtering, web caching etc.

29

Page 30: Data storage csc

Eg1: CyberRoam Security Device• Available as UTMs and Next Generation Firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS. • This ensures high levels of network security, network connectivity, continuous availability.• Offers enterprise-class security and high flexibility with protection against blended threats, malware, Trojans, DoS, DDoS, IP spoofing attacks, spam, intrusions and data leakage.• http://www.cyberoam.com/networksecurity.html

30

Page 31: Data storage csc

Eg2: Cisco PIX (Private Internet eXchange)

• IP firewall and network address translation (NAT)appliance• First commercially available firewall product to introduce protocol specific filtering with the introduction of the "fixup" command• PIX "fixup" capability allows the firewall to apply additional security policies to connections • Incorporates IPSec VPN gateway functionality

31

Page 32: Data storage csc

Power Protection Devices and its need?

32

• Power protection system - connected to a single power-protection source, such as an uninterruptible power supply (UPS). • First, power-protection equipment must contend with an increasingly wide range of system configurations. –Servers, workstations, routers, hubs, bridges and other sensitive components must all be taken into consideration.

• Second, as computer-based systems become more integral to telecommunications operations a minor power problem has catastrophic effects

Page 33: Data storage csc

Uninterruptible power supply ( UPS)

33

• Uninterruptible power source, UPS or battery/flywheel backup - electrical apparatus that provides emergency power when the input power source, typically mains power, fails. • A UPS differs from an auxiliary or emergency power system or standby generator• Provides near-instantaneous protection from input power interruptions, by supplying energy stored in batteries,supercapacitors, or flywheels. • The on-battery runtime of most uninterruptible power sources is relatively short but sufficient to start a standby power source or properly shut down the protected equipment.

Page 34: Data storage csc

Power Management (PM)

34

• Typically used to protect hardware such as computers, data centers, telecommunication equipment or other electrical equipment• Three general categories of modern UPS systems are

–on-line,–line-interactive and–Standby

• Power management (PM) requires the UPS to report its status to the computer it powers via a communications link such as a serial port, Ethernet and Simple Network Management Protocol, GSM/GPRS or USB• A subsystem in the OS that processes the reports and generates notifications, PM events, or commands an ordered shut down.

Page 35: Data storage csc

System Administration•System administration is the field of work in which someone manages one or more systems like software, hardware, servers or workstations. • Its goal is ensuring the systems are running efficiently and effectively.•Duties of a system administrator.

35

Page 36: Data storage csc

System Administrator's Responsibilities • Morning checks of systems/software.• Performing backups of data.• Applying operating system updates, and configuration changes.• Installing and configuring new hardware/software.• Adding/deleting/creating/modifying user account information, resetting passwords,

etc.• Answering technical queries.• Responsibility for security.• Responsibility for documenting the configuration of the system.• Troubleshooting any reported problems.• System performance tuning.• Keeping the network up and running.• Technical support

36

Page 37: Data storage csc

Reliability, Availability and Serviceability (RAS)Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.•The term was first used by IBM to define specifications for their mainframe s and originally applied only to hardware .•Reliability-> ability of a computer-related hardware or software component to consistently perform according to its specifications.•In theory, a reliable product is totally free of technical errors.•In practice, vendors commonly express product reliability as a percentage.•Availability ->ratio of time a system or component is functional to the total time it is required or expected to function.•Serviceability -> expression of the ease with which a component, device or system can be maintained and repaired.

37

Page 38: Data storage csc

Key elements of RAS are:•Over-engineering, which is designing systems to specifications better than minimum requirements.•Duplication, which is extensive use of redundant systems and components.•Recoverability, which is the use of fault-tolerant engineering methods.•Automatic updating, which is keeps OSs and applications current without user intervention.•Data backup , which prevents catastrophic loss of critical information.•Data archiving , which keeps extensive records of data in case of audits or other recovery needs.

38

Page 39: Data storage csc

Network Management• Network management refers to the broad subject of managing computer

networks. There exists a wide variety of software and hardware products that help

network system administrators manage a network.• Network management covers a wide area, including:

– Security: ensuring that the network is protected from unauthorized users.

– Performance: eliminating bottlenecks in the network.– Reliability: making sure the network is available to users and

responding to hardware and software malfunctions.

39

Page 40: Data storage csc

Architecture

40

Page 41: Data storage csc

NETWORK MANAGEMENT SYSTEM Network management system (NMS) is a set of hardware

or software tools that allow an IT professional to supervise the individual components of a network within a larger network management framework.

41

Page 42: Data storage csc

NMSNetwork management system components assist with: Network device discovery - identifying what devices are present on a network.

Network device monitoring - monitoring at the device level to determine the health of network components and the extent to which their performance matches capacity plans and intra-enterprise service-level agreements (SLAs).

42

Page 43: Data storage csc

NMSNetwork performance analysis - tracking performance indicators such as bandwidth utilization, packet loss, latency, availability and uptime of routers, switches and other Simple Network Management Protocol (SNMP) -enabled devices.

Intelligent notifications - configurable alerts that will respond to specific network scenarios by paging, emailing, calling or texting a network administrator.

43

Page 44: Data storage csc

SNMP Simple Network Management Protocol (SNMP) is the protocol governing network management and the monitoring of network devices and their functions.

SNMP uses the User Datagram Protocol (UDP) and is not necessarily limited to TCP/IP networks.

44

Page 45: Data storage csc

ComponentsAn SNMP-managed network consists of three key components:

Managed device - A managed device or the network element is a part of the network that requires some form of monitoring and management e.g. routers, switches, servers, workstations, printers, UPSs, etc...

Agent — software which runs on managed devices. Network management station (NMS) — software which runs on the manager.

45

Page 46: Data storage csc

Principle of SNMP Communication

46

Page 47: Data storage csc

Remote Systems Management Security

REMOTE ADMINISTRATION:• Remote administration refers to controlling a computer

from a remote location.• Software that allows remote administration is becoming

increasingly common and is often used when it is difficult or impractical to be physically near a system in order to use it.

• A remote location may refer to a computer in the next room or one on the other side of the world.

47

Page 48: Data storage csc

Security requirements• Confidentiality• Integrity• Authentication• Non-repudiation• Availability• Access control

48

Page 49: Data storage csc

Security services

49

Page 50: Data storage csc

What are Remote Management Services?

• Cisco Remote Management Services (RMS) enable us to simplify the adoption and management of technologies.

• Through maximized high performance and increasedavailability and use of these solutions, we can realize our return on technology investments faster with proactive,continuous remote monitoring and management of the network

50

Page 51: Data storage csc

RMS • With RMS, we can anticipate, identify and resolve

issuesfaster and with greater accuracy while retaining as much visibility and control as our desire.

• Our renowned support comes from certified Cisco experts with extensive experience across a broad spectrum of technologies combined with a wealth of best practices, Cisco intellectual capital, smart capabilities and service automation that truly differentiate the customer experience.

51

Page 52: Data storage csc

Remote Management Services Overview

52

Page 53: Data storage csc

RMS ValuePeople, Tools and Processes• Utilizing ITIL methodologies and Cisco best practices to

fully utilize the depth of our global user experiences to trend, analyze and quickly resolve issues faster.

• This increases the value of our investment by improving the user experience with clearly defined processes.

• The power of our industry leading standards, tools and automation specifically address your support challenges, effectively reaching resolution faster and consistently managing complex enterprise environments

53

Page 54: Data storage csc

RMS ValuePeople, Tools and Processes

54

Page 55: Data storage csc

NETWORK MANAGEMENT ISSUES• Failure to properly configure firewalls– In a good network design, an enterprise should protect its

systems with both network and host firewalls.– Failing to properly configure firewalls creates a foothold for

the exploitation of other vulnerabilities.• Failure to authenticate network users.– It's a good idea to use some form of authentication

technology, such as 802.1x, to ensure that devices connecting to your network are associated with an authorized user.

55

Page 56: Data storage csc

• Use of weak (or no) wireless encryption.– Believe it or not, many enterprises still use WEP encryption to

"protect" their networks.–WEP encryption is fundamentally flawed and should never be

relied upon to secure a wireless network. Use WPA encryption instead.

• Failure to patch.– Everyone knows that it's important to apply vendor security

patches to systems and applications.– In fact, a recent study showed that many Oracle administrators

have never applied patches to their systems.– This is a bad idea, as hackers keep a close eye on security

bulletins, looking for exploitable flaws. 56