SlideShare a Scribd company logo
Mr. Rajasekar Ramalingam
Lecturer – Department of Information Technology,
College of Applied Sciences – Sur,
Sultanate of Oman.
1. Storage devices & media
2. Characteristics of magnetic storage
3. Characteristics of hard disks
4. Characteristics of optical storage
5. Characteristics of optical disks
6. Use of tape storage
7. Types of mobile storage media
2
Refer to Chapter 7, Shelly, Cashman and Vermaat
 Memory usually refers to chips on the
motherboard inside the computer
◦ It is the computers thinking space
 Random Access Memory (RAM)
◦ It holds the data the computer is using 'right now'
◦ It is short-term, temporary and volatile
◦ It is emptied when power is turned off
◦ It is storage, and is called primary storage
◦ But usually called memory rather than storage
3
4
 Storage is often called secondary storage
 Permanent, stable, on-going
 Many different storage devices, can be
categorised by:
◦ Capacity - how much data can it hold?
◦ Technology e.g. magnetic, optical, flash
◦ Speed - how fast can it transfer data?
5
6
 Magnetic particles store data
 Different alignment = either zero or one
 Disk is formatted (see next slide)
◦ Divided into tracks and sectors
◦ Sectors are grouped into clusters
 Even if a file is very small, it will use an entire
cluster
 A large file may span several clusters
 Example - hard disk
7
Magnetic
Optical
Flash
8
 Maybe inside the system
unit…
 or portable
 Enclosed in an airtight
dustproof case
 Capacity is always
growing
9
Magnetic
Optical
Flash
 Has more than one disk - multiple platters
 Platters spin at 5 400 to
15 000 rpm
 Each platter has two read/write heads (one for each side)
 The read/write head is very close to the platter but doesn't
actually touch
 Arms move the read/write heads to the correct location on
the platter
10
Magnetic
Optical
Flash
11
 The hard disk also contains memory chips
 Improves access time
 Holds most recently used data
 When the CPU requests data, cache (say: cash)
is checked first, before moving any mechanical
parts
 Electronic access is faster than mechanical
access
12
Magnetic
Optical
Flash
 Uses a laser to read and
write data
 Usually 12 cm diameter
 Cheap and portable
 CD, DVD etc all share the
same underlying
technology:
 A track spirals from the
centre out to the edge
13
Magnetic
Optical
Flash
 When the laser passes over a flat area (land), the
beam is reflected. This is read as a 1.
 When the beam passes over a hollow (pit), the
light is bounced away. This is read as a 0.
14
Magnetic
Optical
Flash
15
16
17
 Miniature, mobile storage
 Data is stored electronically
on a memory chip
 Non-volatile
 Many form-factors
18
Magnetic
Optical
Flash
19
Magnetic
Optical
Flash
 USB drives, USB pen, pen drive etc
 Large range of shapes and capacities
 All connect through the computer's USB port
 The USB port may also be used to connect other
"storage" such as cameras, video cameras etc
 An an alternative to using a USB connection is a
FireWire connection
◦ Also called Sony i.Link or IEEE 1394
◦ Faster but more expensive (see table next slide)
20
Magnetic
Optical
Flash
 Usually, faster is more expensive
 Smaller and more portable is usually more
expensive
21
 Secondary storage is called permanent storage…
but it isn't really permanent
 Some paper storage devices are over 1000 years
old…will computer storage last that long?
22
 Large-scale storage
 One or more
servers provide
storage
 Storage needs are
always growing, so
system must be
able to expand
23
 Personal backups
◦ USB drive
◦ CD/DVD
◦ Portable hard disk
 Business backups
◦ Tape storage
 Magnetic, like video tape
 Slow but cheap and reliable
◦ Special backup servers
24

More Related Content

What's hot

secondary storage devices
secondary storage devicessecondary storage devices
secondary storage devices
Mubassira Mahmuda Supty
 
Hard disk drive
Hard disk driveHard disk drive
Hard disk drive
Awais Alam
 
Ssd – Solid State Drive
Ssd – Solid State DriveSsd – Solid State Drive
Ssd – Solid State Drive
Mild
 
Motherboard Components
Motherboard ComponentsMotherboard Components
Motherboard Componentsstooty s
 
Hard Disk Drive
Hard Disk DriveHard Disk Drive
Hard Disk Drive
ADVAIT MANE
 
Hard Disk Drive
Hard Disk Drive Hard Disk Drive
Hard Disk Drive
Rohan Awale
 
Hard Disk Componets
Hard Disk ComponetsHard Disk Componets
Hard Disk Componets
Pramod Ithape
 
Magnetic Disk
Magnetic Disk Magnetic Disk
Magnetic Disk
kalpita surve
 
Storage devices and features
Storage devices and featuresStorage devices and features
Storage devices and features
Shubham Nahar
 
Processing Devices
Processing DevicesProcessing Devices
Processing Devices
itsvineeth209
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
Rizwan Qamar
 
Working principle of a hard disk controller
Working principle of a hard disk controllerWorking principle of a hard disk controller
Working principle of a hard disk controller
Marajulislam3
 
Chapter 3 storage media and devices
Chapter 3   storage media and devicesChapter 3   storage media and devices
Chapter 3 storage media and devicesPratik Gupta
 
Storage Device
Storage DeviceStorage Device
Storage Device
Neena Thanasaenchok
 
Computer hardware
Computer hardware Computer hardware
Computer hardware
Raizen Jhay Garcia
 
Ch5 storagedevices(updated)
Ch5 storagedevices(updated)Ch5 storagedevices(updated)
Ch5 storagedevices(updated)cs001
 
Storage devices
Storage devicesStorage devices
Storage devices
Purvesh Shinde
 

What's hot (20)

secondary storage devices
secondary storage devicessecondary storage devices
secondary storage devices
 
Solid state drives
Solid state drivesSolid state drives
Solid state drives
 
Secondary Memory
Secondary MemorySecondary Memory
Secondary Memory
 
Hard disk drive
Hard disk driveHard disk drive
Hard disk drive
 
Ssd – Solid State Drive
Ssd – Solid State DriveSsd – Solid State Drive
Ssd – Solid State Drive
 
Motherboard Components
Motherboard ComponentsMotherboard Components
Motherboard Components
 
Hard Disk Drive
Hard Disk DriveHard Disk Drive
Hard Disk Drive
 
Hard Disk Drive
Hard Disk Drive Hard Disk Drive
Hard Disk Drive
 
Hard Disk Componets
Hard Disk ComponetsHard Disk Componets
Hard Disk Componets
 
Magnetic Disk
Magnetic Disk Magnetic Disk
Magnetic Disk
 
Storage devices and features
Storage devices and featuresStorage devices and features
Storage devices and features
 
Processing Devices
Processing DevicesProcessing Devices
Processing Devices
 
Computer storage devices
Computer storage devicesComputer storage devices
Computer storage devices
 
Working principle of a hard disk controller
Working principle of a hard disk controllerWorking principle of a hard disk controller
Working principle of a hard disk controller
 
Chapter 3 storage media and devices
Chapter 3   storage media and devicesChapter 3   storage media and devices
Chapter 3 storage media and devices
 
Memory hierarchy
Memory hierarchyMemory hierarchy
Memory hierarchy
 
Storage Device
Storage DeviceStorage Device
Storage Device
 
Computer hardware
Computer hardware Computer hardware
Computer hardware
 
Ch5 storagedevices(updated)
Ch5 storagedevices(updated)Ch5 storagedevices(updated)
Ch5 storagedevices(updated)
 
Storage devices
Storage devicesStorage devices
Storage devices
 

Similar to Digital storage

Backing storage media
Backing storage mediaBacking storage media
Backing storage media
Mirza Ćutuk
 
Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
Swarnima Tiwari
 
Computer storage MBA present.pptx
Computer storage MBA present.pptxComputer storage MBA present.pptx
Computer storage MBA present.pptx
fazilathshaikh1
 
Computer Organization deals with the structural relationship whereas; Compute...
Computer Organization deals with the structural relationship whereas; Compute...Computer Organization deals with the structural relationship whereas; Compute...
Computer Organization deals with the structural relationship whereas; Compute...
mayurjagdale4
 
Computer Introduction-Lecture02
Computer Introduction-Lecture02Computer Introduction-Lecture02
Computer Introduction-Lecture02
Dr. Mazin Mohamed alkathiri
 
Secondary storage Device.
Secondary storage Device.Secondary storage Device.
Secondary storage Device.
sajedul islam
 
Infinity
InfinityInfinity
Infinity
Md.Tanvir Asad
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
Tapan Khilar
 
Presentation on memory
Presentation on memoryPresentation on memory
Presentation on memory
Jamil Ahmed AKASH
 
Memory Presentation
Memory PresentationMemory Presentation
Memory Presentation
Imran Chowdhury
 
Memory devices
Memory devicesMemory devices
Memory devices
Satyam Sharma
 
Computers – A Gateway to Information(Memory)
Computers – A Gateway to Information(Memory)Computers – A Gateway to Information(Memory)
Computers – A Gateway to Information(Memory)
Tallat Satti
 
Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devisesdevaki123
 
memory, storage devices and media By ZAK
memory, storage devices and media By ZAKmemory, storage devices and media By ZAK
memory, storage devices and media By ZAK
Tabsheer Hasan
 
Primary and secondary Storage devices
Primary and secondary Storage devicesPrimary and secondary Storage devices
Primary and secondary Storage devices
Muhammad Usman
 
What is memory
What is memoryWhat is memory
What is memory
AzaanNaqvi
 
Storage hardware
Storage hardwareStorage hardware
Storage hardware
Adnan Malak
 
ict based lesson
ict based lesson ict based lesson
ict based lesson
sarab k
 

Similar to Digital storage (20)

Backing storage media
Backing storage mediaBacking storage media
Backing storage media
 
Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
 
Computer storage MBA present.pptx
Computer storage MBA present.pptxComputer storage MBA present.pptx
Computer storage MBA present.pptx
 
Computer Organization deals with the structural relationship whereas; Compute...
Computer Organization deals with the structural relationship whereas; Compute...Computer Organization deals with the structural relationship whereas; Compute...
Computer Organization deals with the structural relationship whereas; Compute...
 
Computer Introduction-Lecture02
Computer Introduction-Lecture02Computer Introduction-Lecture02
Computer Introduction-Lecture02
 
Secondary storage Device.
Secondary storage Device.Secondary storage Device.
Secondary storage Device.
 
Infinity
InfinityInfinity
Infinity
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
 
Presentation on memory
Presentation on memoryPresentation on memory
Presentation on memory
 
Memory system of a compture
Memory system of a comptureMemory system of a compture
Memory system of a compture
 
Memory Presentation
Memory PresentationMemory Presentation
Memory Presentation
 
Memory devices
Memory devicesMemory devices
Memory devices
 
Computers – A Gateway to Information(Memory)
Computers – A Gateway to Information(Memory)Computers – A Gateway to Information(Memory)
Computers – A Gateway to Information(Memory)
 
Storege or memory devises
Storege or memory devisesStorege or memory devises
Storege or memory devises
 
Memory
MemoryMemory
Memory
 
memory, storage devices and media By ZAK
memory, storage devices and media By ZAKmemory, storage devices and media By ZAK
memory, storage devices and media By ZAK
 
Primary and secondary Storage devices
Primary and secondary Storage devicesPrimary and secondary Storage devices
Primary and secondary Storage devices
 
What is memory
What is memoryWhat is memory
What is memory
 
Storage hardware
Storage hardwareStorage hardware
Storage hardware
 
ict based lesson
ict based lesson ict based lesson
ict based lesson
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
CAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
CAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
CAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
CAS
 
Malicious software
Malicious softwareMalicious software
Malicious software
CAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
CAS
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
CAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
CAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Human resources security
Human resources securityHuman resources security
Human resources security
CAS
 
Database security
Database securityDatabase security
Database security
CAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
CAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
CAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 

Digital storage

  • 1. Mr. Rajasekar Ramalingam Lecturer – Department of Information Technology, College of Applied Sciences – Sur, Sultanate of Oman.
  • 2. 1. Storage devices & media 2. Characteristics of magnetic storage 3. Characteristics of hard disks 4. Characteristics of optical storage 5. Characteristics of optical disks 6. Use of tape storage 7. Types of mobile storage media 2 Refer to Chapter 7, Shelly, Cashman and Vermaat
  • 3.  Memory usually refers to chips on the motherboard inside the computer ◦ It is the computers thinking space  Random Access Memory (RAM) ◦ It holds the data the computer is using 'right now' ◦ It is short-term, temporary and volatile ◦ It is emptied when power is turned off ◦ It is storage, and is called primary storage ◦ But usually called memory rather than storage 3
  • 4. 4
  • 5.  Storage is often called secondary storage  Permanent, stable, on-going  Many different storage devices, can be categorised by: ◦ Capacity - how much data can it hold? ◦ Technology e.g. magnetic, optical, flash ◦ Speed - how fast can it transfer data? 5
  • 6. 6
  • 7.  Magnetic particles store data  Different alignment = either zero or one  Disk is formatted (see next slide) ◦ Divided into tracks and sectors ◦ Sectors are grouped into clusters  Even if a file is very small, it will use an entire cluster  A large file may span several clusters  Example - hard disk 7 Magnetic Optical Flash
  • 8. 8
  • 9.  Maybe inside the system unit…  or portable  Enclosed in an airtight dustproof case  Capacity is always growing 9 Magnetic Optical Flash
  • 10.  Has more than one disk - multiple platters  Platters spin at 5 400 to 15 000 rpm  Each platter has two read/write heads (one for each side)  The read/write head is very close to the platter but doesn't actually touch  Arms move the read/write heads to the correct location on the platter 10 Magnetic Optical Flash
  • 11. 11
  • 12.  The hard disk also contains memory chips  Improves access time  Holds most recently used data  When the CPU requests data, cache (say: cash) is checked first, before moving any mechanical parts  Electronic access is faster than mechanical access 12 Magnetic Optical Flash
  • 13.  Uses a laser to read and write data  Usually 12 cm diameter  Cheap and portable  CD, DVD etc all share the same underlying technology:  A track spirals from the centre out to the edge 13 Magnetic Optical Flash
  • 14.  When the laser passes over a flat area (land), the beam is reflected. This is read as a 1.  When the beam passes over a hollow (pit), the light is bounced away. This is read as a 0. 14 Magnetic Optical Flash
  • 15. 15
  • 16. 16
  • 17. 17
  • 18.  Miniature, mobile storage  Data is stored electronically on a memory chip  Non-volatile  Many form-factors 18 Magnetic Optical Flash
  • 20.  USB drives, USB pen, pen drive etc  Large range of shapes and capacities  All connect through the computer's USB port  The USB port may also be used to connect other "storage" such as cameras, video cameras etc  An an alternative to using a USB connection is a FireWire connection ◦ Also called Sony i.Link or IEEE 1394 ◦ Faster but more expensive (see table next slide) 20 Magnetic Optical Flash
  • 21.  Usually, faster is more expensive  Smaller and more portable is usually more expensive 21
  • 22.  Secondary storage is called permanent storage… but it isn't really permanent  Some paper storage devices are over 1000 years old…will computer storage last that long? 22
  • 23.  Large-scale storage  One or more servers provide storage  Storage needs are always growing, so system must be able to expand 23
  • 24.  Personal backups ◦ USB drive ◦ CD/DVD ◦ Portable hard disk  Business backups ◦ Tape storage  Magnetic, like video tape  Slow but cheap and reliable ◦ Special backup servers 24

Editor's Notes

  1. Discuss current HD capacity and price.
  2. Rpm = revolutions per minute Discuss diagram - ask students to locate: Track, sector, top view of platter, side view of platter, read/write head, how many platters (2), how many sides available for storage (4)
  3. Discuss how the capacities on this table from the text are already outdated… ask students to discuss current capacity and what types they use.
  4. Many firms and organisations (e.g. libraries) are now realising that every 10-20 years or so they need to they need to re-record their archives. This is a serious issue for the transmission of cultural records, arts, literature and other history…all civilisations are able to look back on their recorded history in one medium or another, but given today's ubiquity of computer-based records, will this be able to happen in 500 years from now?
  5. Remind students of the importance of keeping backups in a different place