0 ratings0% found this document useful (0 votes) 25 views4 pagesIsm - Nov - 2023 QP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
[Reg No]R [A [2 [1 J: Jr Jo Jo [3 Jo [4 le Jo]:
B.Tech DEGREE EXAMINATION, NOVEMBER 2023
Fifth to Seventh Semester
18CSE360T - INFORMATION STORAGE AND MANAGEMENT
or the candidates admitted during the academic year 2020 - 202] & 2021 - 2022)
i, Part - A should be answered in OMR sheet within first 40 minutes and OMR sheet should be handed
_, hall invigilator at the end of 40 minute.
ii, Part - Band Part - C should be answered in answer booklet.
Time: 3 Hours Max. Mark
PART - A (20 x 1 = 20 Marks) Barta BL
Answer all Questions
1 is the process of assigning storage resources to hosts based on capacity, 1 1
availability, and performance requirements of applications running on the hosts, .
(A) Storage Provisioning (B) Network Provisioning
(©) User Provisioning (D) Server Provisioning.
2. Data is transferred between the disk controller and magnetic through the 1 1
read-write (R/W) head —
(A) Spindle B) Platter
(©) RW head @) Tape :
is a technique of abstracting physical resources such as compute, 1 1
morage and astwork und making them appeatas lepical revcurees a
(A) Prov B) Virtualization
(C) Monitoring (D) Reporting
4, The storage architecture that cannot be shared with any other server is called
(A) Instance storage architecture (B) Information centric storage
architecture
(D) Virtual storage
(C) Server centric storage architecture
5. Which one is not true?
(A) iSCSI gateway is used to enable
communication between iSCSI host
FC storage
(©) iSCSI initiator is configured with
gateway’s IP address
(B) ISCSI gateway works as bridge
between FC and IP network
(D) iSCSI gateway is configured as FC
target
6 A company named Brocade Communications Systems LLC has the world wide 1 2
name as 10:00:00:60:69:00:23:74. In the given name, identify the bits representing
the company ID.
(A) 100000 (B) 000006
(©) 006069 (D) 606900
7. Which three statements describe differences between Storage Area Network (SAN) 1 2
and Network Attached Storage (NAS) solutions? Choose three.
i, SAN is generally more expensive but provides higher performance
NAS uses TCP/IP for communication between hosts and the NAS server
NAS requires additional hardware on a host: a host bus adapter for connectivity
iv, SAN uses proprietary protocols for communication between hosts and the SAN
fabric.
29NFS-7-1
Page tot8. In the context of FC (Fibre Channel) and iSCSI (Internet Small Computer System
Interface), what does "FC scan" typically refer to?
(A) A network scanning tool ®) — for detecting faulty
cables
(C) A process to discover Fibre Channel _(D) A tool for analyzing internet traffic
devices
9. This validation scheme is called the __, scheme since transactions execut:
optimistically, assuming they will be able fo Taish execution and validate at the end,
(A) Validation protocol (B) Validation-based protocol
(©) Timestamp protocol ©) Optimistic concurrency-control
10. In backup to tape environment, what does ‘shoe shining; mean?
(A) Writing data from multiple streams —_(B) Process of emulating disk drives
ona single tape and presenting as tapes to backup
software
(©) Repeated back and forth motion that (D) Process of deleting redundant
a tape drive makes when there is an content in the backup data
interruption in the backup data
stream
11. Consider a 24-bit FC address of N_Port. There are 239 available addres:
i of N Port. ses for
domain ID. Therefore, the maximum possible number of node Ports ina Switched
fabric is :
(A) 61,184 (B) 65,536
(©) 57,121 @) 15,663,104
12. A repository at a remote site where data can be periodically or
continuously copied
(A) Data vault B) Hot site
(© Cold site (@) Server Cluster
13, Network security can be configured on the FC switch by using
(A) integrity check (B) security check
(©) data control lists () access control lists
14, Eaves dropping and snooping refers to
(A) modification attack ) types of passive attack
(C) types of active attack () denial of service
15, Security monitoring also helps to track unauthorized configuration changes of
storage
(A) Infrastructure elements (B) substitute elements
(C) backup elements (D) data elements
16. Which technique is used for the detection of errors caused by noise or other
impairments during transmission from the transmitter to the receiver?
(A) Error Correction (B) Error Detection
(©) Availability (D) Accountability
1. is a control mechanism on the switches that segments the network into
Specific paths to be used for the data traffic
(A) Snooping (B) Vulnerability
(©) Zoning (D) Denial of service
1 A hosts an active cloud service and is further accessed by a cloud
consumer for administrative purposes.
(A) Virtual Server B) Physical server
(C) Logical server () Database Server
Page2ot4plement the resource replication mechanism
technology is used to
19,
fo replicate cloud-based IT resources.
(A) Cloud computing (B) Virtualization
(C) Data privacy (D) Encryption a
20. In cloud storage level, are the lowest level of storage and the closest to
the hardware.
(A) Files (B) Datasets
(© Blocks @) Objects
Marks BL
PART - B (5 x 4 = 20 Marks)
Answer any 5 Questions ‘
21. Differentiate virtual and traditional storage provisioning. .
medical college uses an application that stores patient X-ray data in the form ofgielle
22. A medical college uses an application that stores patient X-ray data in the Form of
large binary objects in an Oracle database. The ap] x
server, and the medical college staff accesses the Xray records through Gigabit
Ethernet backbone. Storage array provides storage to the UNIX server, which has
terabytes of usable capacity. Explain the core elements of the data center.
23, A cloud consumer is using a virtual server within an IaaS environment, second one is
accessing the a ready-made PaaS environment, third is using the SaaS, Discuss the
challenges faced by Service provider.
is Bon 3
24. A university is considering implementing storage. They do not have a current storage
inffastmctire to use, but ihey have a network that gives them good performance.
Discuss whether native or bridged iSCSI should be used and explain your
recommendation.
Compare the policies of file sharing protocols supported by NAS to handle file VO 4
request fo a remote file system.
25.
26. Write short nodes on charge back report 4
27. List out the steps for Kerberos authentication. 4
PART - C (5 x 12 = 60 Marks) Marks
Answer all Questions
2
28. (a) How will you create and navigate a virtual storage machine?
(OR)
(b) (DA group of friends are doing a project and wanted to expand their business
by creating a virtual environment. They were confused in choosing the
service provider. What are the challenges faced by the consumers.
(ii) Uninterrupted service of Data Centers is critical for success of Business.
Explain the characteristics of a data center that ensures reliable Data,
29. (a) Demonstrate the details of CAS an object-based storage device designed for 12
secure online storage and retrieval of fixed content with needed features for
configuration and Tracing,
(OR)
(b) A large company is considering a storage infrastructure one that is scalable
and provides high availability. More importantly, the company also needs
Performance for its mission-critical applications. Which storage topology
would you recommend (SAN, NAS, IP SAN) and why?
Page3of430. (a) (i) Provide real-world examples of how the below concept apply to different
(a) rane
" “industries or organizations. : i dont
i jonents and requires all three to be operational
Soko Monday through Peay, Failure of component 1 occurs as follows:
- Monday lo failure
Tuesday a.m, to 7 a.m.
Wednesday = No failure
Thursday = 4 p.m. to 8 p.m.
Friday = 8 a.m. to ll am,
Calculate the MTBF and MTTR of component 1.
(OR)
(&) @ List and briefly describe the Steps involved in Backup and restore
operations with the necessary diagram,
GBC pana Plstninglofien involves multiple stakeholders, including executives,
obs fessionals, employees, and ext.
‘ermal partners. Using a common set of
Gayrres that everyone involved in BC activities can commmsicate
fffectively and understand the concepts being discussed This common
language facilitates collaboration and coordination during planning and
we
‘1. (a) Illustrate Performance monitoring with a neat sketch s
(OR)
© Exnln ‘in detail'ebout one way and two way of Securing Implementation in
32. (@ Explain the selection procedure of deployment model for cloud.
(OR)
jhe following with necessary diagrams:
3) Cloud deployment Models
) Cloud Service Models
(®) Describe
tenes