SlideShare a Scribd company logo
1 of 56
CLIENT SERVER COMPUTING –DATA
STORAGE
II ME CSE
2015-16 ODD SEMESTER (III SEMESTER)
1
Topics
Magnetic Disk
MagneticTape
CD ROM
Worm
Optical Disk
Mirrored Disk
FaultTolerance
RAID
Network Protection Devices
Power Protection Devices
Client Server System Development
Remote System Management
2
Magnetic Disk
• There are various types of auxiliary storage; all of them involve some type of magnetic
disk.
• It uses magnetism to store the data on a magnetic surface.
• The advantages associated with such type of storage media
– high storage capacity,
– reliable and
– provides direct access to the data.
3
Magnetic Disk
• The available magnetic disks are
– Diskette –Floppy disk
4
Magnetic Disk
– Hard Disk
5
Magnetic Disk
• What happens when a disk is formatted?
– Whether all data is erased?
– Surfaces are checked for physical and magnetic defects.
– A root directory is created to list where things are on the disk.
– The capacity of a magnetic disk depends on several factors.
6
Magnetic Tape
• Magnetic tape is a secondary storage device, generally used for backup purposes.
• They are permanent and not volatile by nature.
• The speed of access can be quite slow, however, when the tape is long and what you
want is not near the start.
• So this method is used primarily for major backups of large amounts of data.
7
Magnetic Tape
• The format method will determine
the some important characteristics
like
– Density
– Block
– Gap
8
CD-ROM
• CD-ROM (Compact Disc, read-only-memory) is an adaptation of the CD that is
designed to store computer data in the form of text and graphics, as well as hi-fi stereo
sound.
• Although the disc media and the drives of the CD and CD-ROM are, in principle, the
same, there is a difference in the way data storage is organized.
• Two new sectors were defined
– CD-ROM Mode 1 for storing computer data.
– CD-ROM Mode 2 for compressed audio or video/graphic data.
9
CD-ROM
• Data Encoding and Reading
– The CD-ROM, like other CD adaptations, has data encoded in a spiral track beginning
at the center and ending at the outermost edge of the disc. 
– The spiral track holds approximately 650 MB of data.That's about 5.5 billion bits.
– The track pitch can range from 1.5 to 1.7 microns, but in most cases is 1.6 microns.
10
CD-ROM
• Constant LinearVelocity (CLV)
– CLV  is the principle by which data is read from a CD-ROM.
– Principle states that the read head must interact with the data track at a constant rate,
whether it is accessing data from the inner or outermost portions of the disc. 
11
WORM
• WORM (write once, read many) is a data storage technology that allows
information to be written to a disc a single time and prevents the drive from
erasing the data.
• The discs are intentionally not rewritable, because they are especially intended to
store data that the user does not want to erase accidentally.
• Used for the archival purposes of organizations such as government agencies or
large enterprises. 
12
WORM
• The discs have varied in size from 5.25 to 14 inches wide, in varying formats
ranging from 140MB to more than 3 GB per side of the (usually) double-sided
medium.
• Data is written to aWORM disc with a low-powered laser that makes permanent
marks on the surface.
13
WORM
Top: the hybrid organic/inorganic
semiconductorWORM memory
Bottom: Diagram of theWORM
memory element used in this study Also
shown is the chemical structure of the
two-component electrochromic polymer
PEDOT (polyethylenedioxythiophene
(PEDT): polystyrene sulphonic acid
(PSS) 
14
Optical Disk
An optical disc holds much more data.
The greater control and focus possible with laser beams (in comparison to tiny
magnetic heads) means that more data can be written into a smaller space.
An optical disc is an electronic data storage medium that can be written to and
read using a low-powered laser beam.
Storage capacity increases with each new generation of optical media.
Emerging standards, such as Blu-ray, offer up to 27 gigabytes (GB) on a single-
sided 12-centimeter disc.
Optical discs are inexpensive to manufacture.
15
Variants
Read-Only (Factory Pressed)
•Read-only discs are pressed from a master at the time of manufacture and cannot
be erased.CD-ROM, DVD-ROM, DVD-Video and BD-ROM (Blu-ray).
Write-Once (Burnable)
•Write-once discs are recorded in the user's environment but cannot be erased.
They include the CD-R, DVD-R, DVD+R, BD-R (Blu-ray),WORM discs, as well as
magneto-optic (MO) discs inWORM mode.
Rewritable (Phase Change and Magneto Optic)
•Rewritable discs can be written and re-written numerous times. Employing phase
change technology, consumer-oriented products include CD-RW, DVD-RAM,
DVD-RW, DVD+RW and BD-RE (Blu-ray)
16
RAID
Redundant Arrays of Independent Disks
Motivation
Typical memory bandwidths ≈ 150 MB/sec
Typical disk bandwidths ≈ 10 MB/sec
Result: I/O-bound applications limited by disk bandwidth
 (not just by disk latency!)
17
Solution: Exploit Parallelism
Stripe the data across an array of disks
many alternative striping strategies
possible
Example: consider a big file striped
across N disks
stripe width is S bytes
hence each stripe unit is S/N bytes
sequential read of S bytes at a time
18
Performance Benefit
Sequential read or write of large file
application (or I/O buffer cache)
reads in multiples of S bytes
controller performs parallel access of
N disks
aggregate bandwidth is N times
individual disk bandwidth
(assumes that disk is the bottleneck)
19
N concurrent small read or write requests
randomly distributed across N drives
(we hope!)
common in database andWeb server
environments
20
RAID Approaches
Many alternative approaches to achieving this redundancy
RAID levels 1 through 5
hot sparing allows reconstruction concurrently with accesses
Key metrics to evaluate alternatives
wasted space due to redundancy
likelihood of “hot spots” during heavy loads
degradation of performance during repair
21
RAID Level 1
Also known as “mirroring”
To read a block:
read from either data disk or backup
To write a block:
write both data and backup disks
failure model determines whether writes can
occur in parallel
Backups can be located far way:
safeguard against site failure
22
RAID Levels 2 & 3
These are bit-interleaved schemes
In Raid Level 2, P contains memory-
style ECC
In Rail Level 3, P contains simple
parity
Rarely used today
23
RAID 4
Block-interleaved parity
Wasted storage is small: one parity
block for N data blocks
Key problem:
parity disk becomes a hot spot
write access to parity disk on every
write to any block
24
RAID 5
Rotated parity
Wastage is small: same as in Raid 4
Parity update traffic is distributed
across disks
25
RAID 5 Actions
26
Network Protection Device /Security Appliance
 SecurityAppliance or Network Protection is used to control network access of a
computer
27
Network Protection DevicesNetwork Protection Devices
28
• It is designed to protect computer networks from
unwanted traffic
• Examples include
–CyberRoam Security devices, Firewalls ,Secured Routers etc.,
• 4 Types of Network Protection devices
–Active devices
–Passive devices
–Preventative devices
–Unified Threat Management (UTM)
 Active devices - block unwanted traffic. Eg: such devices are firewalls, anti virus
scanning devices, and content filtering devices.
 Passive devices - detect and report on unwanted traffic, such as intrusion
detection appliances.
 Preventative devices - scan networks and identify potential security problems (such
as penetration testing and vulnerability assessment appliances).
 UnifiedThreat Management (UTM) appliances combine features together into one
system, such as some firewalls, content filtering, web caching etc.
29
Eg1: CyberRoam Security Device
• Available as UTMs and Next Generation Firewalls, deliver
enterprise-class network security with stateful inspection firewall,
VPN and IPS.
• This ensures high levels of network security, network connectivity,
continuous availability.
• Offers enterprise-class security and high flexibility with protection
against blended threats, malware, Trojans, DoS, DDoS, IP spoofing
attacks, spam, intrusions and data leakage.
• http://www.cyberoam.com/networksecurity.html
30
Eg2: Cisco PIX (Private Internet eXchange)
• IP firewall and network address translation (NAT)appliance
• First commercially available firewall product to introduce
protocol specific filtering with the introduction of the
"fixup" command
• PIX "fixup" capability allows the firewall to apply additional
security policies to connections
• Incorporates IPSec VPN gateway functionality
31
Power Protection Devices and its need?
32
• Power protection system - connected to a single power-
protection source, such as an uninterruptible power supply
(UPS).
• First, power-protection equipment must contend with an
increasingly wide range of system configurations.
–Servers, workstations, routers, hubs, bridges and other sensitive
components must all be taken into consideration.
• Second, as computer-based systems become more integral
to telecommunications operations a minor power problem
has catastrophic effects
33
• Uninterruptible power source, UPS or battery/flywheel backup -
electrical apparatus that provides emergency power when the input power
source, typically mains power, fails.
• A UPS differs from an auxiliary or emergency power system or standby
generator
• Provides near-instantaneous protection from input power interruptions,
by supplying energy stored in batteries,supercapacitors, or flywheels.
• The on-battery runtime of most uninterruptible power sources is relatively
short but sufficient to start a standby power source or properly shut down
the protected equipment.
Power Management (PM)
34
• Typically used to protect hardware such as computers, data
centers, telecommunication equipment or other electrical equipment
• Three general categories of modern UPS systems are
–on-line,
–line-interactive and
–Standby
• Power management (PM) requires the UPS to report its status to the
computer it powers via a communications link such as a serial
port, Ethernet and Simple Network Management Protocol,
GSM/GPRS or USB
• A subsystem in the OS that processes the reports and generates
notifications, PM events, or commands an ordered shut down.
System Administration
•System administration is the field of work in which
someone manages one or more systems like software,
hardware, servers or workstations.
•Its goal is ensuring the systems are running efficiently and
effectively.
•Duties of a system administrator.
35
System Administrator's Responsibilities
• Morning checks of systems/software.
• Performing backups of data.
• Applying operating system updates, and configuration changes.
• Installing and configuring new hardware/software.
• Adding/deleting/creating/modifying user account information, resetting passwords, etc.
• Answering technical queries.
• Responsibility for security.
• Responsibility for documenting the configuration of the system.
• Troubleshooting any reported problems.
• System performance tuning.
• Keeping the network up and running.
• Technical support
36
Reliability, Availability and Serviceability (RAS)
Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be
considered when designing, manufacturing, purchasing or using a computer product or component.
•The term was first used by IBM to define specifications for their mainframe s and originally applied only
to hardware .
•Reliability-> ability of a computer-related hardware or software component to consistently perform
according to its specifications.
•In theory, a reliable product is totally free of technical errors.
•In practice, vendors commonly express product reliability as a percentage.
•Availability ->ratio of time a system or component is functional to the total time it is required or
expected to function.
•Serviceability -> expression of the ease with which a component, device or system can be maintained
and repaired.
37
Key elements of RAS are:
•Over-engineering, which is designing systems to specifications better than minimum
requirements.
•Duplication, which is extensive use of redundant systems and components.
•Recoverability, which is the use of fault-tolerant engineering methods.
•Automatic updating, which is keeps OSs and applications current without user intervention.
•Data backup , which prevents catastrophic loss of critical information.
•Data archiving , which keeps extensive records of data in case of audits or other recovery needs.
38
Network Management
• Network management refers to the broad subject of managing
computer networks.

There exists a wide variety of software and hardware products that help
network system administrators manage a network.
•
Network management covers a wide area, including:
–
Security: ensuring that the network is protected from unauthorized
users.
–
Performance: eliminating bottlenecks in the network.
–
Reliability: making sure the network is available to users and
responding to hardware and software malfunctions.
39
Architecture
40
NETWORK MANAGEMENT SYSTEM
Network management system (NMS) is a set of hardware or software tools that
allow an IT professional to supervise the individual components of a network
within a larger network management framework.
41
NMS
Network management system components assist with:

Network device discovery - identifying what devices are present on a
network.

Network device monitoring - monitoring at the device level to determine the
health of network components and the extent to which their performance matches
capacity plans and intra-enterprise service-level agreements (SLAs).
42
NMS
Network performance analysis - tracking performance indicators such as
bandwidth utilization, packet loss, latency, availability and uptime of routers,
switches and other Simple Network Management Protocol (SNMP) -enabled
devices.
Intelligent notifications - configurable alerts that will respond to specific
network scenarios by paging, emailing, calling or texting a network administrator.
43
SNMP
Simple Network Management Protocol (SNMP) is the protocol governing
network management and the monitoring of network devices and their functions.
SNMP uses the User Datagram Protocol (UDP) and is not necessarily
limited toTCP/IP networks.
44
Components
An SNMP-managed network consists of three key components:
Managed device - A managed device or the network element is a part of the
network that requires some form of monitoring and management e.g. routers,
switches, servers, workstations, printers, UPSs, etc...
Agent — software which runs on managed devices.
Network management station (NMS) — software which runs on the
manager.
45
Principle of SNMP Communication
46
Remote Systems Management Security
REMOTE ADMINISTRATION:
• Remote administration refers to controlling a computer from a remote location.
• Software that allows remote administration is becoming increasingly common and
is often used when it is difficult or impractical to be physically near a system in
order to use it.
• A remote location may refer to a computer in the next room or one on the other
side of the world.
47
Security requirements
• Confidentiality
• Integrity
• Authentication
• Non-repudiation
• Availability
• Access control
48
Security services
49
What are Remote Management Services?
• Cisco Remote Management Services (RMS) enable us to simplify the adoption
and management of technologies.
• Through maximized high performance and increasedavailability and use of these
solutions, we can realize our return on technology investments faster with
proactive,continuous remote monitoring and management of the network
50
RMS
• With RMS, we can anticipate, identify and resolve issuesfaster and with greater
accuracy while retaining as much visibility and control as our desire.
• Our renowned support comes from certified Cisco experts with extensive
experience across a broad spectrum of technologies combined with a wealth of
best practices, Cisco intellectual capital, smart capabilities and service
automation that truly differentiate the customer experience.
51
Remote Management Services Overview
52
RMS ValuePeople, Tools and Processes
• Utilizing ITIL methodologies and Cisco best practices to fully utilize the depth
of our global user experiences to trend, analyze and quickly resolve issues faster.
• This increases the value of our investment by improving the user experience with
clearly defined processes.
• The power of our industry leading standards, tools and automation specifically
address your support challenges, effectively reaching resolution faster and
consistently managing complex enterprise environments
53
RMS ValuePeople, Tools and Processes
54
NETWORK MANAGEMENT ISSUES
• Failure to properly configure firewalls
– In a good network design, an enterprise should protect its systems with both
network and host firewalls.
– Failing to properly configure firewalls creates a foothold for the exploitation of
other vulnerabilities.
• Failure to authenticate network users.
– It's a good idea to use some form of authentication technology, such as 802.1x, to
ensure that devices connecting to your network are associated with an authorized
user.
55
• Use of weak (or no) wireless encryption.
– Believe it or not, many enterprises still useWEP encryption to "protect" their networks.
– WEP encryption is fundamentally flawed and should never be relied upon to secure a
wireless network. UseWPA encryption instead.
• Failure to patch.
– Everyone knows that it's important to apply vendor security patches to systems and
applications.
– In fact, a recent study showed that many Oracle administrators have never applied patches
to their systems.
– This is a bad idea, as hackers keep a close eye on security bulletins, looking for exploitable
flaws.
56

More Related Content

What's hot

Mass storage structurefinal
Mass storage structurefinalMass storage structurefinal
Mass storage structurefinalmarangburu42
 
DBMS Unit IV and V Material
DBMS Unit IV and V MaterialDBMS Unit IV and V Material
DBMS Unit IV and V MaterialArthyR3
 
Hard disk & Optical disk (college group project)
Hard disk & Optical disk (college group project)Hard disk & Optical disk (college group project)
Hard disk & Optical disk (college group project)Vshal_Rai
 
Conceptual framework storage devices (2)
Conceptual framework   storage devices (2)Conceptual framework   storage devices (2)
Conceptual framework storage devices (2)Rajendra Sharma
 
Storage (Hard disk drive)
Storage (Hard disk drive)Storage (Hard disk drive)
Storage (Hard disk drive)0949778108
 
It6.6005 wk 3-2 - device management
It6.6005   wk 3-2 - device managementIt6.6005   wk 3-2 - device management
It6.6005 wk 3-2 - device managementz52200391
 
Working of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memoryWorking of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memoryDon Caeiro
 
Storage Devices And Backup Media
Storage Devices And Backup MediaStorage Devices And Backup Media
Storage Devices And Backup MediaTyrone Turner
 

What's hot (19)

S tora ge devices
S tora ge devicesS tora ge devices
S tora ge devices
 
DB_ch11
DB_ch11DB_ch11
DB_ch11
 
Mass storage structurefinal
Mass storage structurefinalMass storage structurefinal
Mass storage structurefinal
 
DBMS Unit IV and V Material
DBMS Unit IV and V MaterialDBMS Unit IV and V Material
DBMS Unit IV and V Material
 
Media Storage
Media StorageMedia Storage
Media Storage
 
Hard disk project
Hard disk projectHard disk project
Hard disk project
 
Hard disk PPT
Hard disk PPTHard disk PPT
Hard disk PPT
 
Storage Technologies
Storage TechnologiesStorage Technologies
Storage Technologies
 
Hard disk & Optical disk (college group project)
Hard disk & Optical disk (college group project)Hard disk & Optical disk (college group project)
Hard disk & Optical disk (college group project)
 
Conceptual framework storage devices (2)
Conceptual framework   storage devices (2)Conceptual framework   storage devices (2)
Conceptual framework storage devices (2)
 
Hard disk
Hard diskHard disk
Hard disk
 
Storage (Hard disk drive)
Storage (Hard disk drive)Storage (Hard disk drive)
Storage (Hard disk drive)
 
Storing data
Storing data Storing data
Storing data
 
It6.6005 wk 3-2 - device management
It6.6005   wk 3-2 - device managementIt6.6005   wk 3-2 - device management
It6.6005 wk 3-2 - device management
 
Tg01
Tg01Tg01
Tg01
 
Working of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memoryWorking of Volatile and Non-Volatile memory
Working of Volatile and Non-Volatile memory
 
RDBMS
RDBMSRDBMS
RDBMS
 
Hard Disk Drive
Hard Disk DriveHard Disk Drive
Hard Disk Drive
 
Storage Devices And Backup Media
Storage Devices And Backup MediaStorage Devices And Backup Media
Storage Devices And Backup Media
 

Similar to Data storage csc

Storage Networking and Overview ppt.pdf
Storage Networking and Overview ppt.pdfStorage Networking and Overview ppt.pdf
Storage Networking and Overview ppt.pdfDr. Sajal Saha
 
Basicarchitecturememory
BasicarchitecturememoryBasicarchitecturememory
BasicarchitecturememoryAditya Narang
 
19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdfJESUNPK
 
Storage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptxStorage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptxMalikAtiq4
 
secondarystoragedevices_by_sarthak_goel.pptx
secondarystoragedevices_by_sarthak_goel.pptxsecondarystoragedevices_by_sarthak_goel.pptx
secondarystoragedevices_by_sarthak_goel.pptxSarthakGoel39
 
Syllabus for interview
Syllabus for  interviewSyllabus for  interview
Syllabus for interviewSwapnil Kapate
 
Hard Disk Drive
Hard Disk Drive Hard Disk Drive
Hard Disk Drive Rohan Awale
 
Computer memory
Computer memoryComputer memory
Computer memoryJayapal Jp
 
Chapter 12 - Mass Storage Systems
Chapter 12 - Mass Storage SystemsChapter 12 - Mass Storage Systems
Chapter 12 - Mass Storage SystemsWayne Jones Jnr
 
BAIT1003 Chapter 5
BAIT1003 Chapter 5BAIT1003 Chapter 5
BAIT1003 Chapter 5limsh
 
DIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICESDIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICESStaus Nyongesa
 
G9_WATERFALLS_DWIZY_Q2_PT2.pptx
G9_WATERFALLS_DWIZY_Q2_PT2.pptxG9_WATERFALLS_DWIZY_Q2_PT2.pptx
G9_WATERFALLS_DWIZY_Q2_PT2.pptxAlexCainoyJr
 
Secondary storage
Secondary storageSecondary storage
Secondary storageAmni Muin
 
Storage devices ppt by abhishek srivastava
Storage devices ppt by abhishek srivastavaStorage devices ppt by abhishek srivastava
Storage devices ppt by abhishek srivastavaAbhishek Srivastava
 

Similar to Data storage csc (20)

Storage Networking and Overview ppt.pdf
Storage Networking and Overview ppt.pdfStorage Networking and Overview ppt.pdf
Storage Networking and Overview ppt.pdf
 
Basicarchitecturememory
BasicarchitecturememoryBasicarchitecturememory
Basicarchitecturememory
 
Ex chapter7 questions
Ex chapter7   questionsEx chapter7   questions
Ex chapter7 questions
 
19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf
 
Storage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptxStorage_Devices-WPS_Office.pptx
Storage_Devices-WPS_Office.pptx
 
MS-CIT Unit 7.pptx
MS-CIT Unit 7.pptxMS-CIT Unit 7.pptx
MS-CIT Unit 7.pptx
 
Disks.
Disks.Disks.
Disks.
 
secondarystoragedevices_by_sarthak_goel.pptx
secondarystoragedevices_by_sarthak_goel.pptxsecondarystoragedevices_by_sarthak_goel.pptx
secondarystoragedevices_by_sarthak_goel.pptx
 
Syllabus for interview
Syllabus for  interviewSyllabus for  interview
Syllabus for interview
 
3.1 storage devices_and_media (1)
3.1 storage devices_and_media (1)3.1 storage devices_and_media (1)
3.1 storage devices_and_media (1)
 
DAS RAID NAS SAN
DAS RAID NAS SANDAS RAID NAS SAN
DAS RAID NAS SAN
 
Hard Disk Drive
Hard Disk Drive Hard Disk Drive
Hard Disk Drive
 
Computer memory
Computer memoryComputer memory
Computer memory
 
Chapter 12 - Mass Storage Systems
Chapter 12 - Mass Storage SystemsChapter 12 - Mass Storage Systems
Chapter 12 - Mass Storage Systems
 
BAIT1003 Chapter 5
BAIT1003 Chapter 5BAIT1003 Chapter 5
BAIT1003 Chapter 5
 
DIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICESDIRECT ACCESS STORAGE DEVICES
DIRECT ACCESS STORAGE DEVICES
 
G9_WATERFALLS_DWIZY_Q2_PT2.pptx
G9_WATERFALLS_DWIZY_Q2_PT2.pptxG9_WATERFALLS_DWIZY_Q2_PT2.pptx
G9_WATERFALLS_DWIZY_Q2_PT2.pptx
 
Secondary storage
Secondary storageSecondary storage
Secondary storage
 
Storage devices ppt by abhishek srivastava
Storage devices ppt by abhishek srivastavaStorage devices ppt by abhishek srivastava
Storage devices ppt by abhishek srivastava
 
Chap72&73
Chap72&73Chap72&73
Chap72&73
 

More from Ashwin Ananthapadmanabhan (8)

Hat app document
Hat app documentHat app document
Hat app document
 
Ashwin resume
Ashwin   resumeAshwin   resume
Ashwin resume
 
Virtual reality with glove one – enabling technology
Virtual reality with glove one – enabling technologyVirtual reality with glove one – enabling technology
Virtual reality with glove one – enabling technology
 
Survey of client tools
Survey of client toolsSurvey of client tools
Survey of client tools
 
Csc sys development
Csc sys developmentCsc sys development
Csc sys development
 
Csc network
Csc networkCsc network
Csc network
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 
Csc concepts
Csc conceptsCsc concepts
Csc concepts
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 

Data storage csc

  • 1. CLIENT SERVER COMPUTING –DATA STORAGE II ME CSE 2015-16 ODD SEMESTER (III SEMESTER) 1
  • 2. Topics Magnetic Disk MagneticTape CD ROM Worm Optical Disk Mirrored Disk FaultTolerance RAID Network Protection Devices Power Protection Devices Client Server System Development Remote System Management 2
  • 3. Magnetic Disk • There are various types of auxiliary storage; all of them involve some type of magnetic disk. • It uses magnetism to store the data on a magnetic surface. • The advantages associated with such type of storage media – high storage capacity, – reliable and – provides direct access to the data. 3
  • 4. Magnetic Disk • The available magnetic disks are – Diskette –Floppy disk 4
  • 6. Magnetic Disk • What happens when a disk is formatted? – Whether all data is erased? – Surfaces are checked for physical and magnetic defects. – A root directory is created to list where things are on the disk. – The capacity of a magnetic disk depends on several factors. 6
  • 7. Magnetic Tape • Magnetic tape is a secondary storage device, generally used for backup purposes. • They are permanent and not volatile by nature. • The speed of access can be quite slow, however, when the tape is long and what you want is not near the start. • So this method is used primarily for major backups of large amounts of data. 7
  • 8. Magnetic Tape • The format method will determine the some important characteristics like – Density – Block – Gap 8
  • 9. CD-ROM • CD-ROM (Compact Disc, read-only-memory) is an adaptation of the CD that is designed to store computer data in the form of text and graphics, as well as hi-fi stereo sound. • Although the disc media and the drives of the CD and CD-ROM are, in principle, the same, there is a difference in the way data storage is organized. • Two new sectors were defined – CD-ROM Mode 1 for storing computer data. – CD-ROM Mode 2 for compressed audio or video/graphic data. 9
  • 10. CD-ROM • Data Encoding and Reading – The CD-ROM, like other CD adaptations, has data encoded in a spiral track beginning at the center and ending at the outermost edge of the disc.  – The spiral track holds approximately 650 MB of data.That's about 5.5 billion bits. – The track pitch can range from 1.5 to 1.7 microns, but in most cases is 1.6 microns. 10
  • 11. CD-ROM • Constant LinearVelocity (CLV) – CLV  is the principle by which data is read from a CD-ROM. – Principle states that the read head must interact with the data track at a constant rate, whether it is accessing data from the inner or outermost portions of the disc.  11
  • 12. WORM • WORM (write once, read many) is a data storage technology that allows information to be written to a disc a single time and prevents the drive from erasing the data. • The discs are intentionally not rewritable, because they are especially intended to store data that the user does not want to erase accidentally. • Used for the archival purposes of organizations such as government agencies or large enterprises.  12
  • 13. WORM • The discs have varied in size from 5.25 to 14 inches wide, in varying formats ranging from 140MB to more than 3 GB per side of the (usually) double-sided medium. • Data is written to aWORM disc with a low-powered laser that makes permanent marks on the surface. 13
  • 14. WORM Top: the hybrid organic/inorganic semiconductorWORM memory Bottom: Diagram of theWORM memory element used in this study Also shown is the chemical structure of the two-component electrochromic polymer PEDOT (polyethylenedioxythiophene (PEDT): polystyrene sulphonic acid (PSS)  14
  • 15. Optical Disk An optical disc holds much more data. The greater control and focus possible with laser beams (in comparison to tiny magnetic heads) means that more data can be written into a smaller space. An optical disc is an electronic data storage medium that can be written to and read using a low-powered laser beam. Storage capacity increases with each new generation of optical media. Emerging standards, such as Blu-ray, offer up to 27 gigabytes (GB) on a single- sided 12-centimeter disc. Optical discs are inexpensive to manufacture. 15
  • 16. Variants Read-Only (Factory Pressed) •Read-only discs are pressed from a master at the time of manufacture and cannot be erased.CD-ROM, DVD-ROM, DVD-Video and BD-ROM (Blu-ray). Write-Once (Burnable) •Write-once discs are recorded in the user's environment but cannot be erased. They include the CD-R, DVD-R, DVD+R, BD-R (Blu-ray),WORM discs, as well as magneto-optic (MO) discs inWORM mode. Rewritable (Phase Change and Magneto Optic) •Rewritable discs can be written and re-written numerous times. Employing phase change technology, consumer-oriented products include CD-RW, DVD-RAM, DVD-RW, DVD+RW and BD-RE (Blu-ray) 16
  • 17. RAID Redundant Arrays of Independent Disks Motivation Typical memory bandwidths ≈ 150 MB/sec Typical disk bandwidths ≈ 10 MB/sec Result: I/O-bound applications limited by disk bandwidth  (not just by disk latency!) 17
  • 18. Solution: Exploit Parallelism Stripe the data across an array of disks many alternative striping strategies possible Example: consider a big file striped across N disks stripe width is S bytes hence each stripe unit is S/N bytes sequential read of S bytes at a time 18
  • 19. Performance Benefit Sequential read or write of large file application (or I/O buffer cache) reads in multiples of S bytes controller performs parallel access of N disks aggregate bandwidth is N times individual disk bandwidth (assumes that disk is the bottleneck) 19
  • 20. N concurrent small read or write requests randomly distributed across N drives (we hope!) common in database andWeb server environments 20
  • 21. RAID Approaches Many alternative approaches to achieving this redundancy RAID levels 1 through 5 hot sparing allows reconstruction concurrently with accesses Key metrics to evaluate alternatives wasted space due to redundancy likelihood of “hot spots” during heavy loads degradation of performance during repair 21
  • 22. RAID Level 1 Also known as “mirroring” To read a block: read from either data disk or backup To write a block: write both data and backup disks failure model determines whether writes can occur in parallel Backups can be located far way: safeguard against site failure 22
  • 23. RAID Levels 2 & 3 These are bit-interleaved schemes In Raid Level 2, P contains memory- style ECC In Rail Level 3, P contains simple parity Rarely used today 23
  • 24. RAID 4 Block-interleaved parity Wasted storage is small: one parity block for N data blocks Key problem: parity disk becomes a hot spot write access to parity disk on every write to any block 24
  • 25. RAID 5 Rotated parity Wastage is small: same as in Raid 4 Parity update traffic is distributed across disks 25
  • 27. Network Protection Device /Security Appliance  SecurityAppliance or Network Protection is used to control network access of a computer 27
  • 28. Network Protection DevicesNetwork Protection Devices 28 • It is designed to protect computer networks from unwanted traffic • Examples include –CyberRoam Security devices, Firewalls ,Secured Routers etc., • 4 Types of Network Protection devices –Active devices –Passive devices –Preventative devices –Unified Threat Management (UTM)
  • 29.  Active devices - block unwanted traffic. Eg: such devices are firewalls, anti virus scanning devices, and content filtering devices.  Passive devices - detect and report on unwanted traffic, such as intrusion detection appliances.  Preventative devices - scan networks and identify potential security problems (such as penetration testing and vulnerability assessment appliances).  UnifiedThreat Management (UTM) appliances combine features together into one system, such as some firewalls, content filtering, web caching etc. 29
  • 30. Eg1: CyberRoam Security Device • Available as UTMs and Next Generation Firewalls, deliver enterprise-class network security with stateful inspection firewall, VPN and IPS. • This ensures high levels of network security, network connectivity, continuous availability. • Offers enterprise-class security and high flexibility with protection against blended threats, malware, Trojans, DoS, DDoS, IP spoofing attacks, spam, intrusions and data leakage. • http://www.cyberoam.com/networksecurity.html 30
  • 31. Eg2: Cisco PIX (Private Internet eXchange) • IP firewall and network address translation (NAT)appliance • First commercially available firewall product to introduce protocol specific filtering with the introduction of the "fixup" command • PIX "fixup" capability allows the firewall to apply additional security policies to connections • Incorporates IPSec VPN gateway functionality 31
  • 32. Power Protection Devices and its need? 32 • Power protection system - connected to a single power- protection source, such as an uninterruptible power supply (UPS). • First, power-protection equipment must contend with an increasingly wide range of system configurations. –Servers, workstations, routers, hubs, bridges and other sensitive components must all be taken into consideration. • Second, as computer-based systems become more integral to telecommunications operations a minor power problem has catastrophic effects
  • 33. 33 • Uninterruptible power source, UPS or battery/flywheel backup - electrical apparatus that provides emergency power when the input power source, typically mains power, fails. • A UPS differs from an auxiliary or emergency power system or standby generator • Provides near-instantaneous protection from input power interruptions, by supplying energy stored in batteries,supercapacitors, or flywheels. • The on-battery runtime of most uninterruptible power sources is relatively short but sufficient to start a standby power source or properly shut down the protected equipment.
  • 34. Power Management (PM) 34 • Typically used to protect hardware such as computers, data centers, telecommunication equipment or other electrical equipment • Three general categories of modern UPS systems are –on-line, –line-interactive and –Standby • Power management (PM) requires the UPS to report its status to the computer it powers via a communications link such as a serial port, Ethernet and Simple Network Management Protocol, GSM/GPRS or USB • A subsystem in the OS that processes the reports and generates notifications, PM events, or commands an ordered shut down.
  • 35. System Administration •System administration is the field of work in which someone manages one or more systems like software, hardware, servers or workstations. •Its goal is ensuring the systems are running efficiently and effectively. •Duties of a system administrator. 35
  • 36. System Administrator's Responsibilities • Morning checks of systems/software. • Performing backups of data. • Applying operating system updates, and configuration changes. • Installing and configuring new hardware/software. • Adding/deleting/creating/modifying user account information, resetting passwords, etc. • Answering technical queries. • Responsibility for security. • Responsibility for documenting the configuration of the system. • Troubleshooting any reported problems. • System performance tuning. • Keeping the network up and running. • Technical support 36
  • 37. Reliability, Availability and Serviceability (RAS) Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component. •The term was first used by IBM to define specifications for their mainframe s and originally applied only to hardware . •Reliability-> ability of a computer-related hardware or software component to consistently perform according to its specifications. •In theory, a reliable product is totally free of technical errors. •In practice, vendors commonly express product reliability as a percentage. •Availability ->ratio of time a system or component is functional to the total time it is required or expected to function. •Serviceability -> expression of the ease with which a component, device or system can be maintained and repaired. 37
  • 38. Key elements of RAS are: •Over-engineering, which is designing systems to specifications better than minimum requirements. •Duplication, which is extensive use of redundant systems and components. •Recoverability, which is the use of fault-tolerant engineering methods. •Automatic updating, which is keeps OSs and applications current without user intervention. •Data backup , which prevents catastrophic loss of critical information. •Data archiving , which keeps extensive records of data in case of audits or other recovery needs. 38
  • 39. Network Management • Network management refers to the broad subject of managing computer networks.  There exists a wide variety of software and hardware products that help network system administrators manage a network. • Network management covers a wide area, including: – Security: ensuring that the network is protected from unauthorized users. – Performance: eliminating bottlenecks in the network. – Reliability: making sure the network is available to users and responding to hardware and software malfunctions. 39
  • 41. NETWORK MANAGEMENT SYSTEM Network management system (NMS) is a set of hardware or software tools that allow an IT professional to supervise the individual components of a network within a larger network management framework. 41
  • 42. NMS Network management system components assist with:  Network device discovery - identifying what devices are present on a network.  Network device monitoring - monitoring at the device level to determine the health of network components and the extent to which their performance matches capacity plans and intra-enterprise service-level agreements (SLAs). 42
  • 43. NMS Network performance analysis - tracking performance indicators such as bandwidth utilization, packet loss, latency, availability and uptime of routers, switches and other Simple Network Management Protocol (SNMP) -enabled devices. Intelligent notifications - configurable alerts that will respond to specific network scenarios by paging, emailing, calling or texting a network administrator. 43
  • 44. SNMP Simple Network Management Protocol (SNMP) is the protocol governing network management and the monitoring of network devices and their functions. SNMP uses the User Datagram Protocol (UDP) and is not necessarily limited toTCP/IP networks. 44
  • 45. Components An SNMP-managed network consists of three key components: Managed device - A managed device or the network element is a part of the network that requires some form of monitoring and management e.g. routers, switches, servers, workstations, printers, UPSs, etc... Agent — software which runs on managed devices. Network management station (NMS) — software which runs on the manager. 45
  • 46. Principle of SNMP Communication 46
  • 47. Remote Systems Management Security REMOTE ADMINISTRATION: • Remote administration refers to controlling a computer from a remote location. • Software that allows remote administration is becoming increasingly common and is often used when it is difficult or impractical to be physically near a system in order to use it. • A remote location may refer to a computer in the next room or one on the other side of the world. 47
  • 48. Security requirements • Confidentiality • Integrity • Authentication • Non-repudiation • Availability • Access control 48
  • 50. What are Remote Management Services? • Cisco Remote Management Services (RMS) enable us to simplify the adoption and management of technologies. • Through maximized high performance and increasedavailability and use of these solutions, we can realize our return on technology investments faster with proactive,continuous remote monitoring and management of the network 50
  • 51. RMS • With RMS, we can anticipate, identify and resolve issuesfaster and with greater accuracy while retaining as much visibility and control as our desire. • Our renowned support comes from certified Cisco experts with extensive experience across a broad spectrum of technologies combined with a wealth of best practices, Cisco intellectual capital, smart capabilities and service automation that truly differentiate the customer experience. 51
  • 53. RMS ValuePeople, Tools and Processes • Utilizing ITIL methodologies and Cisco best practices to fully utilize the depth of our global user experiences to trend, analyze and quickly resolve issues faster. • This increases the value of our investment by improving the user experience with clearly defined processes. • The power of our industry leading standards, tools and automation specifically address your support challenges, effectively reaching resolution faster and consistently managing complex enterprise environments 53
  • 54. RMS ValuePeople, Tools and Processes 54
  • 55. NETWORK MANAGEMENT ISSUES • Failure to properly configure firewalls – In a good network design, an enterprise should protect its systems with both network and host firewalls. – Failing to properly configure firewalls creates a foothold for the exploitation of other vulnerabilities. • Failure to authenticate network users. – It's a good idea to use some form of authentication technology, such as 802.1x, to ensure that devices connecting to your network are associated with an authorized user. 55
  • 56. • Use of weak (or no) wireless encryption. – Believe it or not, many enterprises still useWEP encryption to "protect" their networks. – WEP encryption is fundamentally flawed and should never be relied upon to secure a wireless network. UseWPA encryption instead. • Failure to patch. – Everyone knows that it's important to apply vendor security patches to systems and applications. – In fact, a recent study showed that many Oracle administrators have never applied patches to their systems. – This is a bad idea, as hackers keep a close eye on security bulletins, looking for exploitable flaws. 56