SlideShare a Scribd company logo
1 of 15
Storage devices I.
Page 2
Instructor, PACE-IT Program – Edmonds Community College
Areas of Expertise Industry Certifications
 PC Hardware
 Network Administration
 IT Project Management
 Network Design
 User Training
 IT Troubleshooting
Qualifications Summary
Education
 M.B.A., IT Management, Western Governor’s University
 B.S., IT Security, Western Governor’s University
Entrepreneur, executive leader, and proven manger
with 10+ years of experience turning complex issues
into efficient and effective solutions.
Strengths include developing and mentoring diverse
workforces, improving processes, analyzing
business needs and creating the solutions
required— with a focus on technology.
Page 3
– Types of storage devices
– SCSI
– RAID
PACE-IT.
Page 4
Storage devices I.
Page 5
– Traditional internal hard disk drives.
» The spinning platter type of hard disk.
» PATA = Parallel AT Attachment Interface.
» SATA = Serial AT Attachment Interface.
– Non-traditional internal hard disk drives.
» SSD = Solid State Drive.
» SCSI = Small Computer System Interface.
» RAID = Redundant Array of Inexpensive Disks.
– Floppy disk drives.
» 8” floppy: first commercial disk drive, but it is now obsolete.
» 5.25” floppy: followed the 8” drive and was very common in
the early PC market, but it too is now obsolete.
» 3.5” floppy: most successful of the floppy disk drives. They
are not very common now but it is still possible to find them
in the workplace. Had a maximum capacity (in most cases)
of 1.44 MB.
Storage devices I.
Page 6
– CD-ROM (Compact Disk – Read Only
Memory).
» Commonly uses the PATA or SATA interface.
» Has a maximum capacity of 700 MB.
» Originally CDs could only be read from not written to.
» A CD-RW is a combo drive (aka a CD burner); allows for
writing to the CD.
– DVD-ROM (Digital Video Disk – Read
Only Memory).
» Has a maximum capacity of 4.7 GB, or 8.5 GB for a dual-
layer.
» DVD-RW: a combo drive that allows for writing to the DVD.
– BD-R (Blu-ray Disk – Read)
» The common internal interface is SATA.
» Has a maximum capacity of 25 GB to 128 GB.
» BD-RE: a combo drive that can write and erase data.
Storage devices I.
Page 7
– External storage devices.
» As a general rule, all of the internal storage devices are
available for an external connection. The only difference
is that the interface tends to be different.
– Common external connections.
» USB = Universal Serial Bus.
» FireWire.
» eSATA = External Serial AT Attachment.
– Ethernet storage.
» NAS = Network Attached Storage.
» SAN = Storage Attached Network.
» Cloud storage solutions.
Storage devices I.
Page 8
Storage devices I.
Page 9
– Small Computer System Interface (SCSI).
» SCSI is pronounced “scuzzy” and it was standardized in
1986.
» SCSI was not very popular in the home market due to the
cost of SCSI devices and the management of those devices.
» SCSI was very popular in the enterprise market because the
devices were very robust and could be easily (fairly easily)
chained together. When chained, the last device needed to
be terminated in order to stop signal bounce.
» SCSI’s longevity has lead to different versions being on the
market.
» Most, but not all, SCSI devices were “hot swappable,”
meaning that the system didn’t need to be shut down in
order for a defective device to be replaced and a new one
added in.
– Main types of SCSI.
» Narrow = 8 total components (1 controller and 7 devices).
» Wide = 16 total components (1 controller and 15 devices).
Storage devices I.
Page 10
Storage devices I.
Page 11
– Redundant Array of Inexpensive Disks
(RAID).
» RAID is taking multiple disks or storage volumes and
combining them to achieve performance gains, or fault
tolerance, or performance gains and fault tolerance.
– RAID 0 (stripe set).
» Requires a minimum of two volumes: data is striped between
the drives (write a block of data to one volume, write the next
block to the other).
» Offers the best performance out of all of the RAID types (in
most situations).
» It is not fault tolerant; if one drive fails, the whole set is ruined.
– RAID 1 (mirror set).
» Requires a minimum of two volumes: data is mirrored
between the drives (the system writes each block of data at
least twice).
» Offers extremely fast read times, but it is slow to write.
» It is fault tolerant; if one drive fails, the data is still safe.
Storage devices I.
Page 12
– RAID 5 (striping with parity).
» Requires a minimum of three volumes: stripes data
across two drives and adds a parity block to the third
drive in a rotating manner.
» The parity block adds fault tolerance to the RAID. If any
one disk fails, the data on it can be rebuilt by combining
the data on the other two disks with the parity blocks.
» Not as fast as RAID 0, but offers better performance than
RAID 1 while still providing fault tolerance.
– RAID 10 (stripe of mirrors)
» A.K.A. RAID 1 + 0.
» Requires a minimum of four volumes: a mirror set is also
striped.
» Next to RAID 0, offers the best performance while
offering a high degree of fault tolerance.
Storage devices I.
Page 13
Storage devices I.
Storage devices include hard disk drives, solid state drives, floppy drives,
and optical media. The common internal interfaces are PATA and SATA.
Common external connections include: USB, FireWire, eSATA, SCSI (not
so much anymore), and Ethernet solutions.
Topic
Types of devices.
Summary
Small Computer System Interface. Was a popular enterprise solution
because the devices could be chained together, “hot swapped,” and tended
to be more robust than other solutions. Narrow SCSI allows for a total of
eight devices, while Wide SCSI allows for 15 total devices.
SCSI.
RAID can add performance, or fault tolerance, or performance and fault
tolerance. RAID 0 is a striped set. RAID 1 is a mirror set. RAID 5 is a stripe
with parity. RAID 10 (RAID 1 + 0) is a stripe of mirrors. RAID 0 offers the
best performance but no fault tolerance. RAID 10 is popular because of the
performance gains and fault tolerance.
RAID.
Page 14
THANK YOU
This workforce solution was 100 percent funded by a $3 million grant awarded by the
U.S. Department of Labor's Employment and Training Administration. The solution was
created by the grantee and does not necessarily reflect the official position of the U.S.
Department of Labor. The Department of Labor makes no guarantees, warranties, or
assurances of any kind, express or implied, with respect to such information, including
any information on linked sites and including, but not limited to, accuracy of the
information or its completeness, timeliness, usefulness, adequacy, continued availability
or ownership. Funded by the Department of Labor, Employment and Training
Administration, Grant #TC-23745-12-60-A-53.
PACE-IT is an equal opportunity employer/program and auxiliary aids and services are
available upon request to individuals with disabilities. For those that are hearing
impaired, a video phone is available at the Services for Students with Disabilities (SSD)
office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call
425.354.3113 on a video phone for more information about the PACE-IT program. For
any additional special accommodations needed, call the SSD office at 425.640.1814.
Edmonds Community College does not discriminate on the basis of race; color; religion;
national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran
status; or genetic information in its programs and activities.

More Related Content

What's hot (10)

Pace IT - Display Devices
Pace IT - Display DevicesPace IT - Display Devices
Pace IT - Display Devices
 
Pace IT - Cables and Connections
Pace IT - Cables and ConnectionsPace IT - Cables and Connections
Pace IT - Cables and Connections
 
Pace IT - Custom Configurations
Pace IT - Custom ConfigurationsPace IT - Custom Configurations
Pace IT - Custom Configurations
 
Pace IT - Common Laptop Components
Pace IT - Common Laptop ComponentsPace IT - Common Laptop Components
Pace IT - Common Laptop Components
 
PACE-IT: Operation System Features
PACE-IT: Operation System FeaturesPACE-IT: Operation System Features
PACE-IT: Operation System Features
 
Pace IT - Microsoft OS and Requirements
Pace IT - Microsoft OS and RequirementsPace IT - Microsoft OS and Requirements
Pace IT - Microsoft OS and Requirements
 
A+chapter 1 identify principles of personal computers
A+chapter 1  identify principles of personal computersA+chapter 1  identify principles of personal computers
A+chapter 1 identify principles of personal computers
 
Faq Multiuser P Cstation
Faq Multiuser P CstationFaq Multiuser P Cstation
Faq Multiuser P Cstation
 
Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)Pace IT - Install and Configure OS (Part 2)
Pace IT - Install and Configure OS (Part 2)
 
Z4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OSZ4R: Intro to Storage and DFSMS for z/OS
Z4R: Intro to Storage and DFSMS for z/OS
 

Similar to Pace IT - Storage Devices (part 1)

Similar to Pace IT - Storage Devices (part 1) (20)

PC Hardware Servicing Hand Out 2
PC Hardware Servicing Hand Out 2PC Hardware Servicing Hand Out 2
PC Hardware Servicing Hand Out 2
 
PACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and RaidPACE-IT: Troubleshooting Hard Drives and Raid
PACE-IT: Troubleshooting Hard Drives and Raid
 
Raid Recovery
Raid RecoveryRaid Recovery
Raid Recovery
 
disk structure and multiple RAID levels .ppt
disk structure and multiple  RAID levels .pptdisk structure and multiple  RAID levels .ppt
disk structure and multiple RAID levels .ppt
 
Raid
Raid Raid
Raid
 
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability The All-Flash SAP HANA Solution: Performance, Economics, and Reliability
The All-Flash SAP HANA Solution: Performance, Economics, and Reliability
 
RAID LEVELS
RAID LEVELSRAID LEVELS
RAID LEVELS
 
Various raid levels pros & cons
Various raid levels pros & consVarious raid levels pros & cons
Various raid levels pros & cons
 
112667416 raid-seminar
112667416 raid-seminar112667416 raid-seminar
112667416 raid-seminar
 
RAID seminar
RAID seminarRAID seminar
RAID seminar
 
Database 3
Database 3Database 3
Database 3
 
Raid technology
Raid technologyRaid technology
Raid technology
 
Open Ware Ramsan Dram Ssd
Open Ware Ramsan  Dram SsdOpen Ware Ramsan  Dram Ssd
Open Ware Ramsan Dram Ssd
 
Apresentacao Solid Access Corp Presentation Openware 5 20 10
Apresentacao Solid Access Corp Presentation Openware 5 20 10Apresentacao Solid Access Corp Presentation Openware 5 20 10
Apresentacao Solid Access Corp Presentation Openware 5 20 10
 
SEMINAR
SEMINARSEMINAR
SEMINAR
 
Spinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still CountsSpinning Brown Donuts: Why Storage Still Counts
Spinning Brown Donuts: Why Storage Still Counts
 
Spinning Brown Donuts
Spinning Brown DonutsSpinning Brown Donuts
Spinning Brown Donuts
 
Linux admin
Linux adminLinux admin
Linux admin
 
MS-CIT Unit 7.pptx
MS-CIT Unit 7.pptxMS-CIT Unit 7.pptx
MS-CIT Unit 7.pptx
 
RAID
RAIDRAID
RAID
 

More from Pace IT at Edmonds Community College

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)Pace IT at Edmonds Community College
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPace IT at Edmonds Community College
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 

More from Pace IT at Edmonds Community College (20)

PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 2)
 
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
PACE-IT, Security+ 6.3: Introduction to Public Key Infrastructure (part 1)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 1)
 
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
PACE-IT, Security+ 6.1: Introduction to Cryptography (part 2)
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 1)
 
PACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication ServicesPACE-IT, Security + 5.1: Summary of Authentication Services
PACE-IT, Security + 5.1: Summary of Authentication Services
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
PACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement TechniquesPACE-IT, Security+3.6: Security Enhancement Techniques
PACE-IT, Security+3.6: Security Enhancement Techniques
 
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)PACE-IT, Security+3.5: Types of Application Attacks (part 2)
PACE-IT, Security+3.5: Types of Application Attacks (part 2)
 
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)PACE-IT, Security+3.5: Types of Application Attacks (part 1)
PACE-IT, Security+3.5: Types of Application Attacks (part 1)
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Pace IT - Storage Devices (part 1)

  • 2. Page 2 Instructor, PACE-IT Program – Edmonds Community College Areas of Expertise Industry Certifications  PC Hardware  Network Administration  IT Project Management  Network Design  User Training  IT Troubleshooting Qualifications Summary Education  M.B.A., IT Management, Western Governor’s University  B.S., IT Security, Western Governor’s University Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.
  • 3. Page 3 – Types of storage devices – SCSI – RAID PACE-IT.
  • 5. Page 5 – Traditional internal hard disk drives. » The spinning platter type of hard disk. » PATA = Parallel AT Attachment Interface. » SATA = Serial AT Attachment Interface. – Non-traditional internal hard disk drives. » SSD = Solid State Drive. » SCSI = Small Computer System Interface. » RAID = Redundant Array of Inexpensive Disks. – Floppy disk drives. » 8” floppy: first commercial disk drive, but it is now obsolete. » 5.25” floppy: followed the 8” drive and was very common in the early PC market, but it too is now obsolete. » 3.5” floppy: most successful of the floppy disk drives. They are not very common now but it is still possible to find them in the workplace. Had a maximum capacity (in most cases) of 1.44 MB. Storage devices I.
  • 6. Page 6 – CD-ROM (Compact Disk – Read Only Memory). » Commonly uses the PATA or SATA interface. » Has a maximum capacity of 700 MB. » Originally CDs could only be read from not written to. » A CD-RW is a combo drive (aka a CD burner); allows for writing to the CD. – DVD-ROM (Digital Video Disk – Read Only Memory). » Has a maximum capacity of 4.7 GB, or 8.5 GB for a dual- layer. » DVD-RW: a combo drive that allows for writing to the DVD. – BD-R (Blu-ray Disk – Read) » The common internal interface is SATA. » Has a maximum capacity of 25 GB to 128 GB. » BD-RE: a combo drive that can write and erase data. Storage devices I.
  • 7. Page 7 – External storage devices. » As a general rule, all of the internal storage devices are available for an external connection. The only difference is that the interface tends to be different. – Common external connections. » USB = Universal Serial Bus. » FireWire. » eSATA = External Serial AT Attachment. – Ethernet storage. » NAS = Network Attached Storage. » SAN = Storage Attached Network. » Cloud storage solutions. Storage devices I.
  • 9. Page 9 – Small Computer System Interface (SCSI). » SCSI is pronounced “scuzzy” and it was standardized in 1986. » SCSI was not very popular in the home market due to the cost of SCSI devices and the management of those devices. » SCSI was very popular in the enterprise market because the devices were very robust and could be easily (fairly easily) chained together. When chained, the last device needed to be terminated in order to stop signal bounce. » SCSI’s longevity has lead to different versions being on the market. » Most, but not all, SCSI devices were “hot swappable,” meaning that the system didn’t need to be shut down in order for a defective device to be replaced and a new one added in. – Main types of SCSI. » Narrow = 8 total components (1 controller and 7 devices). » Wide = 16 total components (1 controller and 15 devices). Storage devices I.
  • 11. Page 11 – Redundant Array of Inexpensive Disks (RAID). » RAID is taking multiple disks or storage volumes and combining them to achieve performance gains, or fault tolerance, or performance gains and fault tolerance. – RAID 0 (stripe set). » Requires a minimum of two volumes: data is striped between the drives (write a block of data to one volume, write the next block to the other). » Offers the best performance out of all of the RAID types (in most situations). » It is not fault tolerant; if one drive fails, the whole set is ruined. – RAID 1 (mirror set). » Requires a minimum of two volumes: data is mirrored between the drives (the system writes each block of data at least twice). » Offers extremely fast read times, but it is slow to write. » It is fault tolerant; if one drive fails, the data is still safe. Storage devices I.
  • 12. Page 12 – RAID 5 (striping with parity). » Requires a minimum of three volumes: stripes data across two drives and adds a parity block to the third drive in a rotating manner. » The parity block adds fault tolerance to the RAID. If any one disk fails, the data on it can be rebuilt by combining the data on the other two disks with the parity blocks. » Not as fast as RAID 0, but offers better performance than RAID 1 while still providing fault tolerance. – RAID 10 (stripe of mirrors) » A.K.A. RAID 1 + 0. » Requires a minimum of four volumes: a mirror set is also striped. » Next to RAID 0, offers the best performance while offering a high degree of fault tolerance. Storage devices I.
  • 13. Page 13 Storage devices I. Storage devices include hard disk drives, solid state drives, floppy drives, and optical media. The common internal interfaces are PATA and SATA. Common external connections include: USB, FireWire, eSATA, SCSI (not so much anymore), and Ethernet solutions. Topic Types of devices. Summary Small Computer System Interface. Was a popular enterprise solution because the devices could be chained together, “hot swapped,” and tended to be more robust than other solutions. Narrow SCSI allows for a total of eight devices, while Wide SCSI allows for 15 total devices. SCSI. RAID can add performance, or fault tolerance, or performance and fault tolerance. RAID 0 is a striped set. RAID 1 is a mirror set. RAID 5 is a stripe with parity. RAID 10 (RAID 1 + 0) is a stripe of mirrors. RAID 0 offers the best performance but no fault tolerance. RAID 10 is popular because of the performance gains and fault tolerance. RAID.
  • 15. This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53. PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.