SlideShare a Scribd company logo
1 of 11
STORAGE TECHNOLOGY
CSNB 393
Section 01
GROUP ASSIGNMENT 2
Lecturer: Mr. Md Nabil Bin Ahmad Zawawi
Fahmy Khawarizmy Bin Zainan SN097085
Muhammad Mu’izuddin Bin Muhsinon SN097083
Nor Hisyam Bin Mohd Johan SN097086
INTRODUCTION
This proposal aim to convince our team to be as a consultant for a new bank that is trying to
enter Malaysian market. We need to ensure that the bank are on strategic location for them to
set up their main office in Malaysia. We should provide reason why that location is the best
and what make it suitable. The surroundings are very important and the advantage of the chosen
location.
We also need to give suggestion on Storage Area Network (SAN) technology, Content Address
Storage (CAS) technology and Storage Virtualization if any to be used for that bank.
We need to consider what RAID level are suitable to be used and should be implemented by
the bank. Considering the price and safety of the bank.
Bank should have backup and recovery if anything happen, so or team need to ensure the best
location for the hot site and the cold site. It must have good infrastructure nad
telecomunications facilities.
QUESTION 1
Suggestion Location For New Bank to Start Up
Street View New Location For New Bank to Start Up
Why we choose this location
 The location for the new bank to set setup is very strategic. There are a lot of parking
space where bank customer can easily park their car. The parking space also are walking
distance from the bank.
 Lots of Public Transport in front of the Bank. Examples: Taxi, Bus.
 There is a lot of road access to the bank.
 Police station is just around 5 minutes away from the bank. If anything happened Police
can arrived with-in 5 minutes.
 There is also a Car Showroom nearby the location of the new bank. If the car agent
want to make a loan with the new bank, it just a walking distance.
 There are not a lot of Bank nearby the location. With start up the new bank, it can make
attract local people at the location.
 There is also a mosque located nearby the new bank location. In Friday if the workers
want to go to Friday’s prayer, is just walking distance for the location of the new bank.
QUESTION 2
Suggestions on SAN technology, CAS technology and storage virtualization (if any) to be used
by their banks.
SAN Technology
 EMC2 (Computer Data Storage Company)
EMC is a leading provider of IT storage hardware solutions to promote data backup and
recovery and accelerate the journey to cloud computing.
Simplify the purchase, implementation, and use of EMC backup and archive software while
lowering costs and protecting investments. This suite includes EMC Avamar, EMC
NetWorker, EMC Data Domain Boost for Enterprise Applications, EMC SourceOne, and EMC
Data Protection Advisor, with both an EMC MozyEnterprise cloud option and/or Syncplicity
hybrid cloud option for backup.
CAS Technology
 ECM (Enterprise Content Management)
A formalized means of organizing and storing an organization's documents, and other content,
that relate to the organization's processes. The term encompasses strategies, methods, and tools
used throughout the lifecycle of the content.
ECM aims to make the management of corporate information easier through simplifying
storage, security, version control, process routing, and retention. The benefits to an
organization include improved efficiency, better control, and reduced costs. For example, many
banks have converted to storing copies of old checks within ECM systems as opposed to the
older method of keeping physical checks in massive paper warehouses. Under the old system,
a customer request for a copy of a check might take weeks, as the bank employees had to
contact the warehouse where the right box, file, and check, would need to be located. The check
would then need to be pulled, a copy made and mailed to the bank where it would finally be
mailed to the customer. With an ECM system in place, the bank employee simply queries the
system for the customer’s account number and the number of the requested check. When the
image of the check appears on screen, the bank is able to mail it immediately to the customer,
usually while the customer is still on the phone.
Storage Virtualization
 OpenStack
OpenStack software controls large pools of compute, storage, and networking resources
throughout a data center, managed through a dashboard or via the OpenStack API. OpenStack
works with popular enterprise and open source technologies making it ideal for heterogeneous
infrastructure.
Hundreds of the world’s largest brands rely on OpenStack to run their businesses every day,
reducing costs and helping them move faster. OpenStack has a strong ecosystem, and users
seeking commercial support can choose from different OpenStack-powered products and
services in the Market place.
The software is built by a thriving community of developers, in collaboration with users, and
is designed in the open at our Summits.
QUESTION 3
The suitable RAID level that should be implemented by the bank is RAID-6. This is because
RAID-6 gives more usable capacity the more disks you add. Since RAID-6 comprises four
disks, only 50% of that space is available as usable capacity, but the proportion of usable space
increases as you add more drives. The bank has a lot of customers, then it will need RAID-6
provide large storage to store a lot of information about the customers.
RAID 6 uses two independent parity schemes that maintain array integrity. Figure A represents
RAID 6.
Figure A
The grey blocks are the parity bits, but the two parity algorithms exist separately on their
blocks. RAID 6 has more overhead in terms of usable storage compared to the raw amount, as
well as a more complex RAID controller algorithm.
The price is a little bit high compared with RAID-5 and RAID-3 because it has better
performance and store large data. I do not think that it would be a problem to the bank since
the bank is one of the big company. Implementing RAID 6 is also more expensive because of
the two extra disks required for parity. RAID 6 requires more processing power. RAID 6 makes
two parity calculations for each write operation, so it's slower to write than most other RAID
levels. It would be a problem to the bank since the bank is one of the big company.
The data safety for RAID-6 is it provide striping with dual parity. Data is striped across several
physical drives and dual parity is used to store and recover data. It tolerates the failure of two
drives in an array, providing better fault tolerance than other RAID. Dual parity protects against
data loss if second HDD fails. Furthermore, Bank need long data retention periods, such as
archiving or disk-based backup.
QUESTION 4
Hot Site
-> In Data Center or building that have partial duplicate for a primary IT operation, including
complete computer systems and near-real-time backups for systems, applications and data.
-> Typically are duplicates of existing data centers.
-> Commercial disaster recovery service that allows a business to continue computer and
network operations in the event of a computer or equipment disaster. For example, if an
enterprise's data centerbecomes inoperable, that enterprise can move all data processing
operations to a hot site. A hot site has all the equipment needed for the enterprise to continue
operation, including office space and furniture, telephone jacks and computer equipment.
Example of Hot Site
Hot Site in Cyberjaya
Cold Site
-> Open space in Data Center or simply empty buildings that are wired for power,
communications.
-> Similar type of disaster recovery service that provides office space, but the customer
provides and installs all the equipment needed to continue operations. A cold site is less
expensive, but it takes longer to get an enterprise in full operation after the disaster.
-> Typically, a business has an annual contract with a company that offers hot and cold site
services with a monthly service charge. Some disaster recovery services offerbackup services
so that all company data is available regardless of whether a hot site or cold site is used. If an
enterprise must use a hot or cold site, there are usually daily fees and other incidental fees in
addition to the basic service charge.
Example of Cold Site
Cold Site in Putrajaya
CONCLUSION
Lastly, the technology that have been used to startup the company are suitable. The location
gain benefit for the new bank and have many advantages.
The steps that have been taken are realy well managed. The RAID level are important, and the
recovery system use the best software have provided.
This bank can be able to compete with the current bank.

More Related Content

What's hot

Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data securitybalasahebcomp
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for InsuranceNIIT Technologies
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...IOSR Journals
 
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP OpsIRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP OpsIRJET Journal
 
Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...IJECEIAES
 
Conference Paper: Enabling Privacy Mechanisms in Apache Storm
Conference Paper: Enabling Privacy Mechanisms in Apache StormConference Paper: Enabling Privacy Mechanisms in Apache Storm
Conference Paper: Enabling Privacy Mechanisms in Apache StormEricsson
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...Ulf Mattsson
 
Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...Conference Papers
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE csandit
 
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...IJERA Editor
 

What's hot (17)

accelerate-intelligent-solutions-with-machine-learning-platform-brief
accelerate-intelligent-solutions-with-machine-learning-platform-briefaccelerate-intelligent-solutions-with-machine-learning-platform-brief
accelerate-intelligent-solutions-with-machine-learning-platform-brief
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data security
 
Data masking techniques for Insurance
Data masking techniques for InsuranceData masking techniques for Insurance
Data masking techniques for Insurance
 
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...Enabling Public Audit Ability and Data Dynamics for Storage  Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
 
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP OpsIRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
 
Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...
 
Conference Paper: Enabling Privacy Mechanisms in Apache Storm
Conference Paper: Enabling Privacy Mechanisms in Apache StormConference Paper: Enabling Privacy Mechanisms in Apache Storm
Conference Paper: Enabling Privacy Mechanisms in Apache Storm
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 
Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Data science
Data scienceData science
Data science
 
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
BIG DATA TECHNOLOGY ACCELERATE GENOMICS PRECISION MEDICINE
 
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Stora...
 

Similar to Report Storage

Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 
3 Data Center infrastructure Design Mistakes.pptx
3 Data Center infrastructure Design Mistakes.pptx3 Data Center infrastructure Design Mistakes.pptx
3 Data Center infrastructure Design Mistakes.pptxBluechip Gulf IT Services
 
1cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11CloudStar
 
The Benefits of Cloud Storage for Businesses in 2023.pptx
The Benefits of Cloud Storage for Businesses in 2023.pptxThe Benefits of Cloud Storage for Businesses in 2023.pptx
The Benefits of Cloud Storage for Businesses in 2023.pptxWP CONSULTANTS & SOLUTIONS LLC
 
Cloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfCloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfAmeliaWong21
 
Hyperconverged Solution For Retail and Hospitality
Hyperconverged Solution For Retail and HospitalityHyperconverged Solution For Retail and Hospitality
Hyperconverged Solution For Retail and HospitalityDataCore Software
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
 
Storage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsStorage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsDataCore Software
 
Business Continuity and Planning
Business Continuity and PlanningBusiness Continuity and Planning
Business Continuity and PlanningShashwat Shankar
 
Wp a-break-in-the-clouds
Wp a-break-in-the-cloudsWp a-break-in-the-clouds
Wp a-break-in-the-cloudsMohsen Tayefeh
 
datacore-1-341M4XT
datacore-1-341M4XTdatacore-1-341M4XT
datacore-1-341M4XTGary Mason
 
Due by 11316 9pm PSTGiven the pieces of information provided i.docx
Due by 11316 9pm PSTGiven the pieces of information provided i.docxDue by 11316 9pm PSTGiven the pieces of information provided i.docx
Due by 11316 9pm PSTGiven the pieces of information provided i.docxsagarlesley
 
Distributed capture greater value lower cost
Distributed capture greater value lower costDistributed capture greater value lower cost
Distributed capture greater value lower costCAPSYS Technologies
 
Efficient Data Centers Are Built On New Technologies and Strategies
Efficient Data Centers Are Built On New Technologies and StrategiesEfficient Data Centers Are Built On New Technologies and Strategies
Efficient Data Centers Are Built On New Technologies and StrategiesCMI, Inc.
 
2020 Cloud Data Lake Platforms Buyers Guide - White paper | Qubole
2020 Cloud Data Lake Platforms Buyers Guide - White paper | Qubole2020 Cloud Data Lake Platforms Buyers Guide - White paper | Qubole
2020 Cloud Data Lake Platforms Buyers Guide - White paper | QuboleVasu S
 

Similar to Report Storage (20)

Today's Need To Manage The Storage Polymorphism
Today's Need To Manage The Storage PolymorphismToday's Need To Manage The Storage Polymorphism
Today's Need To Manage The Storage Polymorphism
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 
3 Data Center infrastructure Design Mistakes.pptx
3 Data Center infrastructure Design Mistakes.pptx3 Data Center infrastructure Design Mistakes.pptx
3 Data Center infrastructure Design Mistakes.pptx
 
1cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11cloudstar cloud store.v1.1
1cloudstar cloud store.v1.1
 
The storage matrix netmagic
The storage matrix   netmagicThe storage matrix   netmagic
The storage matrix netmagic
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
The Benefits of Cloud Storage for Businesses in 2023.pptx
The Benefits of Cloud Storage for Businesses in 2023.pptxThe Benefits of Cloud Storage for Businesses in 2023.pptx
The Benefits of Cloud Storage for Businesses in 2023.pptx
 
Cloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdfCloud vs On-prem Data Warehouse.pdf
Cloud vs On-prem Data Warehouse.pdf
 
Generic RLM White Paper
Generic RLM White PaperGeneric RLM White Paper
Generic RLM White Paper
 
Hyperconverged Solution For Retail and Hospitality
Hyperconverged Solution For Retail and HospitalityHyperconverged Solution For Retail and Hospitality
Hyperconverged Solution For Retail and Hospitality
 
Technoally presentation
Technoally presentationTechnoally presentation
Technoally presentation
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
Storage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applicationsStorage Strategies Now- Virtualizaing Busines Critical applications
Storage Strategies Now- Virtualizaing Busines Critical applications
 
Business Continuity and Planning
Business Continuity and PlanningBusiness Continuity and Planning
Business Continuity and Planning
 
Wp a-break-in-the-clouds
Wp a-break-in-the-cloudsWp a-break-in-the-clouds
Wp a-break-in-the-clouds
 
datacore-1-341M4XT
datacore-1-341M4XTdatacore-1-341M4XT
datacore-1-341M4XT
 
Due by 11316 9pm PSTGiven the pieces of information provided i.docx
Due by 11316 9pm PSTGiven the pieces of information provided i.docxDue by 11316 9pm PSTGiven the pieces of information provided i.docx
Due by 11316 9pm PSTGiven the pieces of information provided i.docx
 
Distributed capture greater value lower cost
Distributed capture greater value lower costDistributed capture greater value lower cost
Distributed capture greater value lower cost
 
Efficient Data Centers Are Built On New Technologies and Strategies
Efficient Data Centers Are Built On New Technologies and StrategiesEfficient Data Centers Are Built On New Technologies and Strategies
Efficient Data Centers Are Built On New Technologies and Strategies
 
2020 Cloud Data Lake Platforms Buyers Guide - White paper | Qubole
2020 Cloud Data Lake Platforms Buyers Guide - White paper | Qubole2020 Cloud Data Lake Platforms Buyers Guide - White paper | Qubole
2020 Cloud Data Lake Platforms Buyers Guide - White paper | Qubole
 

More from Muhd Mu'izuddin

More from Muhd Mu'izuddin (20)

CCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the networkCCNA 3 - Troubleshooting the network
CCNA 3 - Troubleshooting the network
 
Visualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital EvidenceVisualization of Computer Forensics Analysis on Digital Evidence
Visualization of Computer Forensics Analysis on Digital Evidence
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
 
Final Year Project Report Example
Final Year Project Report ExampleFinal Year Project Report Example
Final Year Project Report Example
 
Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design   Design Scenario Network Analysis & Design
Design Scenario Network Analysis & Design
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
 
Artificial Intelligence - 2
Artificial Intelligence - 2Artificial Intelligence - 2
Artificial Intelligence - 2
 
Artificial Intelligence - 1
Artificial Intelligence - 1Artificial Intelligence - 1
Artificial Intelligence - 1
 
Itcb213 short essay
Itcb213   short essayItcb213   short essay
Itcb213 short essay
 
ITCB312
ITCB312ITCB312
ITCB312
 
Hubungan Etnik
Hubungan EtnikHubungan Etnik
Hubungan Etnik
 
Ethics & Philosophy
Ethics & PhilosophyEthics & Philosophy
Ethics & Philosophy
 
Project
ProjectProject
Project
 
Outline long report
Outline long reportOutline long report
Outline long report
 
Windows 7 installation
Windows 7 installationWindows 7 installation
Windows 7 installation
 
CSNB244 Lab5
CSNB244 Lab5CSNB244 Lab5
CSNB244 Lab5
 
Nota dakwah
Nota dakwahNota dakwah
Nota dakwah
 
Database lab1
Database lab1   Database lab1
Database lab1
 
Fyp slide presentation muiz
Fyp slide presentation muizFyp slide presentation muiz
Fyp slide presentation muiz
 
Pair assignment
Pair assignmentPair assignment
Pair assignment
 

Report Storage

  • 1. STORAGE TECHNOLOGY CSNB 393 Section 01 GROUP ASSIGNMENT 2 Lecturer: Mr. Md Nabil Bin Ahmad Zawawi Fahmy Khawarizmy Bin Zainan SN097085 Muhammad Mu’izuddin Bin Muhsinon SN097083 Nor Hisyam Bin Mohd Johan SN097086
  • 2. INTRODUCTION This proposal aim to convince our team to be as a consultant for a new bank that is trying to enter Malaysian market. We need to ensure that the bank are on strategic location for them to set up their main office in Malaysia. We should provide reason why that location is the best and what make it suitable. The surroundings are very important and the advantage of the chosen location. We also need to give suggestion on Storage Area Network (SAN) technology, Content Address Storage (CAS) technology and Storage Virtualization if any to be used for that bank. We need to consider what RAID level are suitable to be used and should be implemented by the bank. Considering the price and safety of the bank. Bank should have backup and recovery if anything happen, so or team need to ensure the best location for the hot site and the cold site. It must have good infrastructure nad telecomunications facilities.
  • 3. QUESTION 1 Suggestion Location For New Bank to Start Up Street View New Location For New Bank to Start Up
  • 4. Why we choose this location  The location for the new bank to set setup is very strategic. There are a lot of parking space where bank customer can easily park their car. The parking space also are walking distance from the bank.  Lots of Public Transport in front of the Bank. Examples: Taxi, Bus.  There is a lot of road access to the bank.  Police station is just around 5 minutes away from the bank. If anything happened Police can arrived with-in 5 minutes.  There is also a Car Showroom nearby the location of the new bank. If the car agent want to make a loan with the new bank, it just a walking distance.  There are not a lot of Bank nearby the location. With start up the new bank, it can make attract local people at the location.  There is also a mosque located nearby the new bank location. In Friday if the workers want to go to Friday’s prayer, is just walking distance for the location of the new bank.
  • 5. QUESTION 2 Suggestions on SAN technology, CAS technology and storage virtualization (if any) to be used by their banks. SAN Technology  EMC2 (Computer Data Storage Company) EMC is a leading provider of IT storage hardware solutions to promote data backup and recovery and accelerate the journey to cloud computing. Simplify the purchase, implementation, and use of EMC backup and archive software while lowering costs and protecting investments. This suite includes EMC Avamar, EMC NetWorker, EMC Data Domain Boost for Enterprise Applications, EMC SourceOne, and EMC Data Protection Advisor, with both an EMC MozyEnterprise cloud option and/or Syncplicity hybrid cloud option for backup. CAS Technology  ECM (Enterprise Content Management) A formalized means of organizing and storing an organization's documents, and other content, that relate to the organization's processes. The term encompasses strategies, methods, and tools used throughout the lifecycle of the content. ECM aims to make the management of corporate information easier through simplifying storage, security, version control, process routing, and retention. The benefits to an organization include improved efficiency, better control, and reduced costs. For example, many banks have converted to storing copies of old checks within ECM systems as opposed to the older method of keeping physical checks in massive paper warehouses. Under the old system, a customer request for a copy of a check might take weeks, as the bank employees had to contact the warehouse where the right box, file, and check, would need to be located. The check would then need to be pulled, a copy made and mailed to the bank where it would finally be mailed to the customer. With an ECM system in place, the bank employee simply queries the system for the customer’s account number and the number of the requested check. When the image of the check appears on screen, the bank is able to mail it immediately to the customer, usually while the customer is still on the phone.
  • 6. Storage Virtualization  OpenStack OpenStack software controls large pools of compute, storage, and networking resources throughout a data center, managed through a dashboard or via the OpenStack API. OpenStack works with popular enterprise and open source technologies making it ideal for heterogeneous infrastructure. Hundreds of the world’s largest brands rely on OpenStack to run their businesses every day, reducing costs and helping them move faster. OpenStack has a strong ecosystem, and users seeking commercial support can choose from different OpenStack-powered products and services in the Market place. The software is built by a thriving community of developers, in collaboration with users, and is designed in the open at our Summits.
  • 7. QUESTION 3 The suitable RAID level that should be implemented by the bank is RAID-6. This is because RAID-6 gives more usable capacity the more disks you add. Since RAID-6 comprises four disks, only 50% of that space is available as usable capacity, but the proportion of usable space increases as you add more drives. The bank has a lot of customers, then it will need RAID-6 provide large storage to store a lot of information about the customers. RAID 6 uses two independent parity schemes that maintain array integrity. Figure A represents RAID 6. Figure A The grey blocks are the parity bits, but the two parity algorithms exist separately on their blocks. RAID 6 has more overhead in terms of usable storage compared to the raw amount, as well as a more complex RAID controller algorithm. The price is a little bit high compared with RAID-5 and RAID-3 because it has better performance and store large data. I do not think that it would be a problem to the bank since the bank is one of the big company. Implementing RAID 6 is also more expensive because of the two extra disks required for parity. RAID 6 requires more processing power. RAID 6 makes two parity calculations for each write operation, so it's slower to write than most other RAID levels. It would be a problem to the bank since the bank is one of the big company. The data safety for RAID-6 is it provide striping with dual parity. Data is striped across several physical drives and dual parity is used to store and recover data. It tolerates the failure of two drives in an array, providing better fault tolerance than other RAID. Dual parity protects against data loss if second HDD fails. Furthermore, Bank need long data retention periods, such as archiving or disk-based backup.
  • 8. QUESTION 4 Hot Site -> In Data Center or building that have partial duplicate for a primary IT operation, including complete computer systems and near-real-time backups for systems, applications and data. -> Typically are duplicates of existing data centers. -> Commercial disaster recovery service that allows a business to continue computer and network operations in the event of a computer or equipment disaster. For example, if an enterprise's data centerbecomes inoperable, that enterprise can move all data processing operations to a hot site. A hot site has all the equipment needed for the enterprise to continue operation, including office space and furniture, telephone jacks and computer equipment. Example of Hot Site
  • 9. Hot Site in Cyberjaya Cold Site -> Open space in Data Center or simply empty buildings that are wired for power, communications. -> Similar type of disaster recovery service that provides office space, but the customer provides and installs all the equipment needed to continue operations. A cold site is less expensive, but it takes longer to get an enterprise in full operation after the disaster. -> Typically, a business has an annual contract with a company that offers hot and cold site services with a monthly service charge. Some disaster recovery services offerbackup services so that all company data is available regardless of whether a hot site or cold site is used. If an enterprise must use a hot or cold site, there are usually daily fees and other incidental fees in addition to the basic service charge.
  • 10. Example of Cold Site Cold Site in Putrajaya
  • 11. CONCLUSION Lastly, the technology that have been used to startup the company are suitable. The location gain benefit for the new bank and have many advantages. The steps that have been taken are realy well managed. The RAID level are important, and the recovery system use the best software have provided. This bank can be able to compete with the current bank.