SlideShare a Scribd company logo
Lecture 4
Storage Devices
Irfan Ali Memon
Sukkur IBA
Hierarchy of
memory/ storage
devices
Hard Disk
RAM
Cache
Reg.
Mr. Southbridge Mr. Librarian
Study room’s
file cabinet
Study table
Student
Study room Home Library City Library
Mr. Northbridge
Analogy
Cache memory
CPU Registers
Microprocessor Southbridge;
I/O controller;
IO controller hub (ICH)
Disk controller
CPU RAM Disk storage
Northbridge;
Memory Controller Hub (MCH)
Computers
Magnetic
storage
History
Parkinson’s law: Data expands to fill the space
available for storage

Corollary: Work expands to fill the time available.
1956: IBM invented the first storage
system; had 50 disks of 2 foot diameter!
The capacity …. 5 MB
Currently, we have hard disks of > 1.5 TB
Do we need more storage capacity
How they function:
Sector
Track
Photo credits: www.howstuffworks.com
Floppy drive
spins at 300 RPM;
takes .2 second to find data;
holds up to 1.44 MB data
ZIP disk is an example
high-capacity floppy disk
(~100 MB)
Photo credits: http://preview.tinyurl.com/6aj52l
Hard disk drive
spins at 5400, 7200, 10000, 15000 RPM;
takes 6 to 12 milliseconds to find data;
holds up to 1.5 TB data
Most commonly used storage media
Sequential access (not random)
Can store very large amounts of data
Commonly used for:
Backups
Infrequently used data
Optical
storage
How they function:
Lands (1s) reflect data; Pits (binary 0s) scatter data
Compact
disc label
lens lens
prism prism
laser
diode
laser
diode
Light-
sensing
diode
Light-
sensing
diode
0 1
pit land
• CD-ROM (Capacity: 650 MB)
CD speed is based on the original CD
speed (150 kbps); 10 X will read
1,500 Kbps
• DVD-ROM (Capacity up to 18 GB)
Use both sides of the disk; can read
CD-ROMs
Read only optical drives:
• CD-R (Capacity: 650/700 MB)
Can record once; cannot be changed
Can keep adding until disk full
• CD-RW (Capacity up to 650/700 MB)
Can record and can rewrite too (upto 100 times)
Cannot be read in all CD players
Recordable optical drives:
• Photo-CD (developed by Kodak)
Photo storage;
Add until disk is full
(like CD-R)
Original pictures
cannot be changed
Recordable optical drives:
• DVD-R (Capacity: 4.7/ 8.5 GB)
Several formats; none standardized
Cannot be read in all players
• DVD-RAM
Allows reusing DVD media; Not
standardized; Easily writable
Cannot be read in all players
Recordable optical drives:
Solid-state
storage
How they function:
No moving parts
(unlike magnetic/ optical storage)
A solid-state drive (SSD) is a data storage
device that uses solid-state memory to
store persistent data.
An SSD using SRAM or DRAM (instead of
flash memory) is often called a RAM-drive.
Flash memory:
Found in cameras and USB drives
Combination of RAM and ROM
Long term updateable storage
Smart card:
Credit cards with a chip
Chip stores data
May be used as electronic cash
Hotels use for electronic keys
Solid State Disks (SSD):
Large amount of SDRAM
Extremely fast
Volatile storage
Require battery backups
Most have hard disks copying data
Performance
comparison
RAM
Compact Disc
Floppy Disk
Tape
Hard Diskcost speed
Storage
hierarchy
Average access time
Depends on 1) RPM, 2) time to access track
Hard disk: 6 to 12 ms; CD drive: 80 to 800 ms
In contrast, RAM access time is in nanoseconds
Transfer rate
Hard disk: 15 – 160 Mbps;
CD drive: base rate= 150 Kbps; 24x; 48x
Floppy disks: 45 Kbps
How is storage used by
operating systems
Formatting
Disk formatting is the process of preparing a hard
disk or other storage medium for use, including
setting up an empty file system [Wikipedia].
2 levels of formatting:
Low-level: drawing tracks and sectors on disk
High-level: creating filesytem and bootsector
(sometimes called quick or logical format)
File Systems
A file system is a logical method of
configuring data on a disk’s surface.
Listing of where files are stored
Common file systems include:
1. File Allocation Table (FAT)
2. FAT32
3. NTFS
4. EXT2/EXT3 (Linux)
Optimizing computer
performance
Deleting unneeded files
Disk defragmentation
Disk defragmentation
disk after defragmentation process
file 1 after defragmenting
Scanning HDD for errors
File compression
http://tinyurl.com/5hb8pp

More Related Content

What's hot

External memory
External memoryExternal memory
External memory
riddhishg
 
Storage devices lesson 1
Storage devices lesson 1Storage devices lesson 1
Storage devices lesson 1
Professor Thor
 
ISDD Back Up Strategies
ISDD Back Up StrategiesISDD Back Up Strategies
ISDD Back Up Strategies
Forrester High School
 
Storage devices
Storage devicesStorage devices
Storage devices
shidabahri810
 
Storage devices
Storage devicesStorage devices
Storage devices
PradeepRaj
 
Secondary storage devices.
Secondary storage devices.Secondary storage devices.
Secondary storage devices.
umamani113
 
Presentation of the big external memory
Presentation of the big external memoryPresentation of the big external memory
Presentation of the big external memory
Luis Fernando
 
Storage and Storage Devices
Storage and Storage DevicesStorage and Storage Devices
Storage and Storage Devices
Compare Infobase Limited
 
Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
Ashish Kumar
 
Storage devices
Storage devicesStorage devices
Storage devices
latifah2001
 
Storage devices and features
Storage devices and featuresStorage devices and features
Storage devices and features
Shubham Nahar
 
Chapter04 storage devices
Chapter04 storage devicesChapter04 storage devices
Chapter04 storage devices
shidabahri810
 
Storage Devices
Storage DevicesStorage Devices
Storage Devices
Kontawan Poopat
 
storage devices
storage devicesstorage devices
storage devices
Momina Mateen
 
Storage Device
Storage DeviceStorage Device
Storage Device
Neena Thanasaenchok
 
Storage devices
Storage devicesStorage devices
Storage devices
Sandeep Kumawat
 
storage devices and its types
 storage devices and its types storage devices and its types
storage devices and its types
sabin kafle
 
Storage System and Backup Media
Storage System and Backup MediaStorage System and Backup Media
Storage System and Backup Media
ImranulHasan6
 
storage devices
storage devicesstorage devices
storage devices
luisduenas36
 
Types of Storage Devices
Types of  Storage DevicesTypes of  Storage Devices
Types of Storage Devices
Maryam Fida
 

What's hot (20)

External memory
External memoryExternal memory
External memory
 
Storage devices lesson 1
Storage devices lesson 1Storage devices lesson 1
Storage devices lesson 1
 
ISDD Back Up Strategies
ISDD Back Up StrategiesISDD Back Up Strategies
ISDD Back Up Strategies
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Secondary storage devices.
Secondary storage devices.Secondary storage devices.
Secondary storage devices.
 
Presentation of the big external memory
Presentation of the big external memoryPresentation of the big external memory
Presentation of the big external memory
 
Storage and Storage Devices
Storage and Storage DevicesStorage and Storage Devices
Storage and Storage Devices
 
Gaurav ppt
Gaurav pptGaurav ppt
Gaurav ppt
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Storage devices and features
Storage devices and featuresStorage devices and features
Storage devices and features
 
Chapter04 storage devices
Chapter04 storage devicesChapter04 storage devices
Chapter04 storage devices
 
Storage Devices
Storage DevicesStorage Devices
Storage Devices
 
storage devices
storage devicesstorage devices
storage devices
 
Storage Device
Storage DeviceStorage Device
Storage Device
 
Storage devices
Storage devicesStorage devices
Storage devices
 
storage devices and its types
 storage devices and its types storage devices and its types
storage devices and its types
 
Storage System and Backup Media
Storage System and Backup MediaStorage System and Backup Media
Storage System and Backup Media
 
storage devices
storage devicesstorage devices
storage devices
 
Types of Storage Devices
Types of  Storage DevicesTypes of  Storage Devices
Types of Storage Devices
 

Viewers also liked

Disk formatting
Disk formattingDisk formatting
Disk formatting
Dan Louie Bernardino
 
What is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virusWhat is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virus
mudasserakram
 
8. operations security
8. operations security8. operations security
8. operations security
7wounders
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
Adetula Bunmi
 
Computer System Overview,
Computer System Overview, Computer System Overview,
Computer System Overview,
Sajid Marwat
 
Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )
Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )
Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )
Neeraj Bhandari
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
prashant3535
 

Viewers also liked (7)

Disk formatting
Disk formattingDisk formatting
Disk formatting
 
What is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virusWhat is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virus
 
8. operations security
8. operations security8. operations security
8. operations security
 
Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Computer System Overview,
Computer System Overview, Computer System Overview,
Computer System Overview,
 
Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )
Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )
Secondary storage devices by Neeraj Bhandari ( Surkhet.Nepal )
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 

Similar to Week4 final

Presentation on computer data storage
Presentation on computer data storage Presentation on computer data storage
Presentation on computer data storage
GLG
 
Intro ch 05_a
Intro ch 05_aIntro ch 05_a
Intro ch 05_a
Syed Arslan Rizvi
 
Intro Ch 06 A
Intro Ch 06 AIntro Ch 06 A
Intro Ch 06 A
ali00061
 
Disk storage devices
Disk storage devicesDisk storage devices
Disk storage devices
Miyuru Dhammage
 
19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf
JESUNPK
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
Afaq Siddiqui
 
Storage devices
Storage devicesStorage devices
Storage devices
GNag R'Varma
 
Chapter 3
Chapter 3Chapter 3
computer memory ,., .
computer memory ,., .computer memory ,., .
computer memory ,., .
santokh00700
 
Storage Devices PPt For class 9
Storage Devices PPt For class 9Storage Devices PPt For class 9
Storage Devices PPt For class 9
Saurabh Singh
 
Storage Media and File Organisation.pptx
Storage Media and File Organisation.pptxStorage Media and File Organisation.pptx
Storage Media and File Organisation.pptx
husainsadikarvy
 
Types of memory (bba 1st)
Types of memory (bba 1st)Types of memory (bba 1st)
Types of memory (bba 1st)
basitnazir
 
Storage and File Structure in DBMS
Storage and File Structure in DBMSStorage and File Structure in DBMS
Storage and File Structure in DBMS
A. S. M. Shafi
 
Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
Swarnima Tiwari
 
MEMORY.pptx
MEMORY.pptxMEMORY.pptx
Chapter1 9-07
Chapter1 9-07Chapter1 9-07
Chapter1 9-07
dereennn
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
Anshumali Singh
 
Datastorage
DatastorageDatastorage
Datastorage
Anshumali Singh
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
Mehedi Hasan
 
Thiru
ThiruThiru

Similar to Week4 final (20)

Presentation on computer data storage
Presentation on computer data storage Presentation on computer data storage
Presentation on computer data storage
 
Intro ch 05_a
Intro ch 05_aIntro ch 05_a
Intro ch 05_a
 
Intro Ch 06 A
Intro Ch 06 AIntro Ch 06 A
Intro Ch 06 A
 
Disk storage devices
Disk storage devicesDisk storage devices
Disk storage devices
 
19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf19IS305_U4_LP10_LM10-22-23.pdf
19IS305_U4_LP10_LM10-22-23.pdf
 
Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)Introduction of storage devices(Brief Knowledge)
Introduction of storage devices(Brief Knowledge)
 
Storage devices
Storage devicesStorage devices
Storage devices
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
computer memory ,., .
computer memory ,., .computer memory ,., .
computer memory ,., .
 
Storage Devices PPt For class 9
Storage Devices PPt For class 9Storage Devices PPt For class 9
Storage Devices PPt For class 9
 
Storage Media and File Organisation.pptx
Storage Media and File Organisation.pptxStorage Media and File Organisation.pptx
Storage Media and File Organisation.pptx
 
Types of memory (bba 1st)
Types of memory (bba 1st)Types of memory (bba 1st)
Types of memory (bba 1st)
 
Storage and File Structure in DBMS
Storage and File Structure in DBMSStorage and File Structure in DBMS
Storage and File Structure in DBMS
 
Computer MEMORY
Computer MEMORYComputer MEMORY
Computer MEMORY
 
MEMORY.pptx
MEMORY.pptxMEMORY.pptx
MEMORY.pptx
 
Chapter1 9-07
Chapter1 9-07Chapter1 9-07
Chapter1 9-07
 
Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Datastorage
DatastorageDatastorage
Datastorage
 
Live memory forensics
Live memory forensicsLive memory forensics
Live memory forensics
 
Thiru
ThiruThiru
Thiru
 

More from Irfan Ali Memon

MaMarksheet
MaMarksheetMaMarksheet
MaMarksheet
Irfan Ali Memon
 
IT Ait ict quiz_two
IT Ait ict quiz_twoIT Ait ict quiz_two
IT Ait ict quiz_two
Irfan Ali Memon
 
Week14 final
Week14 finalWeek14 final
Week14 final
Irfan Ali Memon
 
Week13 final
Week13 finalWeek13 final
Week13 final
Irfan Ali Memon
 
Week12 final
Week12 finalWeek12 final
Week12 final
Irfan Ali Memon
 
Week11 final
Week11 finalWeek11 final
Week11 final
Irfan Ali Memon
 
Week10 final
Week10 finalWeek10 final
Week10 final
Irfan Ali Memon
 
Week9 final
Week9 finalWeek9 final
Week9 final
Irfan Ali Memon
 
Week8 final
Week8 finalWeek8 final
Week8 final
Irfan Ali Memon
 
Week7 final
Week7 finalWeek7 final
Week7 final
Irfan Ali Memon
 
Uc13.chapter.16
Uc13.chapter.16Uc13.chapter.16
Uc13.chapter.16
Irfan Ali Memon
 
Uc13.chapter.15
Uc13.chapter.15Uc13.chapter.15
Uc13.chapter.15
Irfan Ali Memon
 
Uc13.chapter.14
Uc13.chapter.14Uc13.chapter.14
Uc13.chapter.14
Irfan Ali Memon
 
Uc13.chapter.13
Uc13.chapter.13Uc13.chapter.13
Uc13.chapter.13
Irfan Ali Memon
 
Uc13.chapter.12
Uc13.chapter.12Uc13.chapter.12
Uc13.chapter.12
Irfan Ali Memon
 
Uc13.chapter.11
Uc13.chapter.11Uc13.chapter.11
Uc13.chapter.11
Irfan Ali Memon
 
Uc13.chapter.10
Uc13.chapter.10Uc13.chapter.10
Uc13.chapter.10
Irfan Ali Memon
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
Irfan Ali Memon
 
Uc13.chapter.08
Uc13.chapter.08Uc13.chapter.08
Uc13.chapter.08
Irfan Ali Memon
 
Uc13.chapter.07
Uc13.chapter.07Uc13.chapter.07
Uc13.chapter.07
Irfan Ali Memon
 

More from Irfan Ali Memon (20)

MaMarksheet
MaMarksheetMaMarksheet
MaMarksheet
 
IT Ait ict quiz_two
IT Ait ict quiz_twoIT Ait ict quiz_two
IT Ait ict quiz_two
 
Week14 final
Week14 finalWeek14 final
Week14 final
 
Week13 final
Week13 finalWeek13 final
Week13 final
 
Week12 final
Week12 finalWeek12 final
Week12 final
 
Week11 final
Week11 finalWeek11 final
Week11 final
 
Week10 final
Week10 finalWeek10 final
Week10 final
 
Week9 final
Week9 finalWeek9 final
Week9 final
 
Week8 final
Week8 finalWeek8 final
Week8 final
 
Week7 final
Week7 finalWeek7 final
Week7 final
 
Uc13.chapter.16
Uc13.chapter.16Uc13.chapter.16
Uc13.chapter.16
 
Uc13.chapter.15
Uc13.chapter.15Uc13.chapter.15
Uc13.chapter.15
 
Uc13.chapter.14
Uc13.chapter.14Uc13.chapter.14
Uc13.chapter.14
 
Uc13.chapter.13
Uc13.chapter.13Uc13.chapter.13
Uc13.chapter.13
 
Uc13.chapter.12
Uc13.chapter.12Uc13.chapter.12
Uc13.chapter.12
 
Uc13.chapter.11
Uc13.chapter.11Uc13.chapter.11
Uc13.chapter.11
 
Uc13.chapter.10
Uc13.chapter.10Uc13.chapter.10
Uc13.chapter.10
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
Uc13.chapter.08
Uc13.chapter.08Uc13.chapter.08
Uc13.chapter.08
 
Uc13.chapter.07
Uc13.chapter.07Uc13.chapter.07
Uc13.chapter.07
 

Recently uploaded

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Week4 final

Editor's Notes

  1. Kinds of storage devices: Magnetic devices use a magnet Optical devices use lasers Solid-state devices have physical switches Media is the material storing data Storage devices manage the media Motivations for studying storage devices: 1. Storage devices are essential components of computers. 2. We can improve our computer’s performance through disk optimization.
  2. A ranking of computer memory devices, with devices having the fastest access time at the top of the hierarchy, and devices with slower access times but larger capacity and lower cost at lower levels. The hierarchical arrangement of storage in current computer architectures is called the memory hierarchy. It is designed to take advantage of memory locality in computer programs. Each level of the hierarchy has the properties of higher bandwidth, smaller size, and lower latency than lower levels. Most modern CPUs are so fast that for most program workloads, the locality of reference of memory accesses and the efficiency of the caching and memory transfer between different levels of the hierarchy are the practical limitation on processing speed. As a result, the CPU spends much of its time idling, waiting for memory I/O to complete. The levels of memory in a computer. From fastest to slowest speed, they are: Processor registers – fastest possible access (usually 1 CPU cycle), only hundreds of bytes in size Level 1 (L1) cache – often accessed in just a few cycles, usually tens of kilobytes Level 2 (L2) cache – higher latency than L1 by 2 to 10 times, often 512 KB or more Main memory – may take hundreds of cycles, but can be multiple gigabytes. Secondary and Tertiary storage – several seconds latency, can be huge
  3. Analogy: The student has a study table at home, that can keep 1 to 2 books. He has a file cabinet at a hand span's length that can store 10 books. The bigger file cabinet is kept in the home library that can store up to 100 books. The city library (5 kms away), on the other hand, has many cabinets and can store thousands of books. The student is not very intelligent in the sense that he needs to be told everything that is to be done, i.e., he needs to be given data and instructed what to do with it. Note the hierarchical structure: 1 book on study table; 10 books on study room's file cabinet; 100 books in home library; and 1000s of books in the city library. The study room file cabinet only stores the book that the students needs at this time, or will need very soon. Due to their small size, the study table and study room's file cabinet can store a limited number of data/ instructions only. The city library acts a repository (collection) of instructions to solve problems (called programs) and data. The student can only work (process) data/ instructions that are on his study table. The student can extend his hand to the study room's file cabinet (cache) to fetch some book/ instructions in a very short time. He has hired a very efficient assistant called Northbridge that will bring him the data/ instructions he requires from the home library (RAM) to the study room file cabinet (cache memory) and then to his study table (CPU registers) in a short time. The student prefers that most of the instructions/data are present on the study room file cabinet (cache memory) since it requires minimal waiting. If the instructions/ data are not present on the study room final cabinet, the assistant Northbridge can fetch the data from the home library in a short time. The thing the student dislikes most is that the required instruction/ data is not available even in the home library (RAM); in such a case, another assistant Southbridge (who is quite lazy and slow) has to co-ordinate with the city librarian (disk controller) to get the books delivered; this often takes a long time and the student has to sit idle all this while to his dismay.
  4. Let's now explain what the analogy meant: the student is the CPU; the study table (used to store the books temporally) is CPU registers; the file cabinet at a hand span's length is the cache memory; the file cabinet in the home library is the RAM; the file cabinet in the Library is the hard disk; the assistant to fetch documents from home library is the Northbridge chip; the assistant to fetch documents from the city library is the Southbridge chip. The CPU can only decode instructions and operate on data in the CPU registers (that is a kind of very quick memory private to the CPU). The programs/instructions stored on hard disk firstly have to be brought to RAM by Southbridge. When these instructions/data are referred to by the CPU, they are taken to the CPU registers and are stored in the cache en-route in case the data/instructions are referred to again---in such a case, the request would be fulfilled by the cache itself and the data would not have to brought from RAM. It's obvious that if the student has to perform efficiently, most of the data should be in the study room file cabinet (cache memory). Caching usually adopts two approaches to ensure that requested data/information is available: 1) Hold on the recently used instructions/ data since usually if you refer once to an instruction/ data, chances are that you would refer to it again soon. 2) Predict what instructions/ data, the CPU would require next. The better the prediction, the better the performance of the CPU.
  5. Nonvolatile Information isn’t lost when computer is turned off. Many types – Depends on your needs Most common form of storage Hard drives, floppy drives, tape All magnetic drives work the same
  6. The hard disk drive has short and fascinating history.  In 24 years it evolved from a monstrosity with fifty two-foot diameter disks holding five MBytes (5,000,000 bytes) of data to today's drives measuring 3 /12 inches wide and an inch high (and smaller) holding 400 GBytes (400,000,000,000 bytes/characters).  Here, then, is the short history of this marvelous device. (http://www.duxcw.com/digest/guides/hd/hd2.htm) n 1956 IBM invented the first computer disk storage system, the 305 RAMAC (Random Access Method of Accounting and Control).  This system could store five MBytes.  It had fifty, 24-inch diameter disks! In 1980, Seagate Technology introduced the first hard disk drive for microcomputers, the ST506.  It was a full height (twice as high as most current 5 1/4" drives) 5 1/4" drive, with a stepper motor, and held 5 Mbytes.
  7. Data storage and retrieval Media is covered with iron oxide Read/write head is a magnet Magnet writes charges on the media Positive charge is a 1 Negative charge is a 0 Magnet reads charges Drive converts charges into binary
  8. Data organization Disks must be formatted before use Format draws tracks on the disk Tracks is divided into sectors Amount of data a drive can read Tracks, cylinders Sectors, clusters Platter
  9. Mylar plastic Easily damaged Diskettes Also known as floppy disks Read with a disk drive Mylar disk Spin at 300 RPM Takes .2 second to find data 3 ½ floppy disk holds 1.44 MB Zip disk: 100 MB or 250 MB = 170 floppies Iomega™ Need a special drive Superdisk: 120 MB Laptops Imation™ Hi FD Disks: 200 MB Sony Can read a 1.44 floppy
  10. Thick and rigid; Large capacity; High speed; Magnetic Use Metal Platters; Each platter has 2 sides Sensitive (Hard disk crash) You can lose data! Primary storage device in a computer Spin between 5,400 to 15,000 RPM Data found in 9.5 ms or less Drive capacity usually greater than 40 GB
  11. Backup files on a tape cartridge Must be accessed sequentially from beginning to end. To illustrate, compare the modern audio CD to the antiquated 8-track. On a CD if you wish to hear song 1 over and over, you simply press repeat. In an 8-track, you often must play the entire tape before the song can be repeated.
  12. Optical Disks: CD and DVD Uses reflected light Data is read by lasers Size varies – 3.5” to 14” 4” X 4” is the most common Rotation speed is important 24X speed accesses 3.6 MB per second
  13. Data is stored physically No magnets or laser Very fast
  14. No moving parts Costly “Flash” memory for laptops, cameras, MP3. Lower read time --- they are much faster than hard drives. For more details, study http://en.wikipedia.org/wiki/Solid_state_disk
  15. No moving parts Costly “Flash” memory for laptops, cameras, MP3.
  16. No moving parts Costly “Flash” memory for laptops, cameras, MP3.
  17. No moving parts Costly “Flash” memory for laptops, cameras, MP3.
  18. A ranking of computer memory devices, with devices having the fastest access time at the top of the hierarchy, and devices with slower access times but larger capacity and lower cost at lower levels. The hierarchical arrangement of storage in current computer architectures is called the memory hierarchy. It is designed to take advantage of memory locality in computer programs. Each level of the hierarchy has the properties of higher bandwidth, smaller size, and lower latency than lower levels. Most modern CPUs are so fast that for most program workloads, the locality of reference of memory accesses and the efficiency of the caching and memory transfer between different levels of the hierarchy are the practical limitation on processing speed. As a result, the CPU spends much of its time idling, waiting for memory I/O to complete. The levels of memory in a computer. From fastest to slowest speed, they are: Processor registers – fastest possible access (usually 1 CPU cycle), only hundreds of bytes in size Level 1 (L1) cache – often accessed in just a few cycles, usually tens of kilobytes Level 2 (L2) cache – higher latency than L1 by 2 to 10 times, often 512 KB or more Main memory – may take hundreds of cycles, but can be multiple gigabytes. Secondary and Tertiary storage – several seconds latency, can be huge
  19. Each track and sector is labeled Some are reserved Listing of where files are stored File Allocation Table (FAT) FAT32 NTFS Data is organized in clusters Size of data the OS handles
  20. Disk optimization Handled by operating system tool Routine disk maintenance Optimization should be run monthly Clean up unnecessary files Delete temp files Uninstall unused programs Delete obsolete data files Files should be cleaned weekly
  21. Scan a disk for errors Bad spots on the media Find and fix the error Move data to a good spot Mark the spot as bad Disks should be scanned monthly
  22. Defragment a disk Files fragment when resaved Fragmented files load slower Defragment puts the fragments together Disks should be defragged monthly
  23. Scan a disk for errors Bad spots on the media Find and fix the error Move data to a good spot Mark the spot as bad Disks should be scanned monthly
  24. File compression Shrinks the size of a file Takes up less space on disk Reduce a disks performance Will increase disk capacity PKZip, WinZip and WinRAR MP3s are created using compression. If a audio song is recorded on a hard drive, the required storage is about 1 MB per second. When the MP3 compression is applied, the size is reduced to about 1 MB per minute. Windows XP provides several compression routines. It provides for .zip file compression and archive creation. Zip archives can be accessed like normal folders. Folders can be compressed to shrink the contents. Finally, the entire disk can be compressed .