This section includes 7 InterviewSolutions, each offering curated multiple-choice questions to sharpen your Current Affairs knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
How Will You Get The Wwn Of All Your Hba’s To Provision San Storage? |
Answer»
lscfg –v –l fcs#
fcmsutil /dev/td#
emulexcfg –emc or
/usr/sbin/lpfc/lputil
There are several ways to get HBA WWNs on VM
/sys/class/scsi_host/hostN/device/fc_host/hostN/port_name
lscfg –v –l fcs# fcmsutil /dev/td# emulexcfg –emc or /usr/sbin/lpfc/lputil There are several ways to get HBA WWNs on VM /sys/class/scsi_host/hostN/device/fc_host/hostN/port_name
|
|
| 2. |
What Are The Generic Method To Provision San Storage From Any Array? |
Answer»
|
|
| 3. |
With Active- Passive Storage Array What Multipathing Policy You Will Choose? |
|
Answer» USE FIXED, or Preferred, path MANAGEMENT policy to INTELLIGENTLY segment workload across both CONTROLLERS. Use Fixed, or Preferred, path management policy to intelligently segment workload across both controllers. |
|
| 4. |
What Are Multi-pathing Schemes And Which One To Use For Optimal Performance? |
Answer»
Types of policy:
Types of policy: |
|
| 5. |
You Need To Provision San Storage With A Certain Iops. How Will You Find What Kind Of Disks You Need? |
Answer»
To calculate IOPS of a HARD disk drive: 1 IOPS = ————————————— (Average Latency) + (Average Seek Time) To calculate IOPS in a RAID: (TOTAL Workload IOPS * Percentage of workload that is read operations) + (Total Workload IOPS * Percentage of workload that is read operations * RAID IO Penalty) To calculate IOPS of a Hard disk drive: 1 IOPS = ————————————— (Average Latency) + (Average Seek Time) To calculate IOPS in a RAID: (Total Workload IOPS * Percentage of workload that is read operations) + (Total Workload IOPS * Percentage of workload that is read operations * RAID IO Penalty) |
|
| 6. |
As A San Administrator How Will You Tell Your Boss How Many Drives Are Required For A Requirement? |
|
Answer» Use the formula: Total Approximate Drives REQUIRED = (RAID Group IOPS / (Hard DRIVE Type IOPS)) + Large Random I/O adjustment + Hot SPARES + System Drives. Use the formula: Total Approximate Drives required = (RAID Group IOPS / (Hard Drive Type IOPS)) + Large Random I/O adjustment + Hot Spares + System Drives. |
|
| 7. |
How To Calculate Hdd Capacity? |
|
Answer» Capacity = Heads X CYLINDERS X SECTORS X Block SIZE Capacity = Heads X Cylinders X Sectors X Block Size |
|
| 8. |
How Will You Calculate Hdd Capacity? |
|
Answer» Capacity = HEADS X Cylinders X SECTORS X Block Size Capacity = Heads X Cylinders X Sectors X Block Size |
|
| 9. |
If You Know I/o Load And Iops, How Will You Calculate How Many Drives Will Be Needed? |
|
Answer» Total APPROXIMATE Drives = (RAID Group IOPS / (Hard DRIVE TYPE IOPS)) + Large Random I/O ADJUSTMENT + Hot Spares + System Drives Total Approximate Drives = (RAID Group IOPS / (Hard Drive Type IOPS)) + Large Random I/O adjustment + Hot Spares + System Drives |
|
| 10. |
How Will You Calculate Number Of Drives Required? |
|
Answer» Total Approximate Drives REQUIRED = (RAID GROUP IOPS / (Hard DRIVE Type IOPS)) + Large RANDOM I/O adjustment + Hot Spares + System Drives Total Approximate Drives required = (RAID Group IOPS / (Hard Drive Type IOPS)) + Large Random I/O adjustment + Hot Spares + System Drives |
|
| 11. |
Is The Queue Depth =execution Throttle= Maximum Number Of Simultaneous I/o For Each Lun On A Particular Path To The Storage Port? |
|
Answer» Calculation of the maximum queue DEPTH: The queue depth is the number of I/O operations that can be RUN in PARALLEL on a device. Calculation of the maximum queue depth: The queue depth is the number of I/O operations that can be run in parallel on a device. |
|
| 12. |
What Is Q-depth? How To Calculate It? |
|
Answer» The queue depth is the maximum NUMBER of COMMANDS that can be QUEUED on the system at the same time. The queue depth is the maximum number of commands that can be queued on the system at the same time. |
|
| 13. |
How Will You Calculate Max Iops An Hba Port Can Generate To Any Lun? |
|
Answer» Max IOPS an HBA PORT can generate to any LUN = (Device Queue DEPTH per LUN * (1 / (STORAGE LATENCY in ms/1000))) Max IOPS an HBA Port can generate to any LUN = (Device Queue Depth per LUN * (1 / (Storage Latency in ms/1000))) |
|
| 14. |
How Will You Find Errors On Various Os Operating Systems To Troubleshoot Problems? |
|
Answer» I will check the OS log files/EVENT logs for errors: AIX: errpt -a I will check the OS log files/event logs for errors: AIX: errpt -a |
|
| 15. |
For Troubleshooting Have You Collected Logs From A San Switch? |
|
Answer» YES. I have been using Brocade Fabric and I have used “support save “to collect various logs for any issues. Syntax: supportsave [ os | platform | l2 | l3 | custom | core | all ] <TFTP SERVER IP> <RELATIVE path> <user_tag> Yes. I have been using Brocade Fabric and I have used “support save “to collect various logs for any issues. Syntax: supportsave [ os | platform | l2 | l3 | custom | core | all ] <tftp server IP> <relative path> <user_tag> |
|
| 16. |
What Is Buffer-to-buffer Credits? |
|
Answer» Buffer credits, also called buffer-to-buffer credits (BBC) are used as a flow control method by Fibre Channel technology and represent the number of frames a PORT can store. Fibre Channel interfaces use buffer credits to ensure all PACKETS are delivered to their destination. Flow-control mechanism to ensure that Fibre Channel switches do not run out of BUFFERS, so that switches do not drop frames .overall performance can be boosted by optimizing the buffer-to-buffer credit ALLOTTED to each port. Buffer credits, also called buffer-to-buffer credits (BBC) are used as a flow control method by Fibre Channel technology and represent the number of frames a port can store. Fibre Channel interfaces use buffer credits to ensure all packets are delivered to their destination. Flow-control mechanism to ensure that Fibre Channel switches do not run out of buffers, so that switches do not drop frames .overall performance can be boosted by optimizing the buffer-to-buffer credit allotted to each port. |
|
| 17. |
How Will You Calculate Number Of Buffers Required? |
|
Answer» Number of BUFFERS: BB_Credit = [port speed] X [ROUND trip TIME] / [frame SIZE] Number of Buffers: BB_Credit = [port speed] x [round trip time] / [frame size] |
|
| 18. |
Which Load Balancing Policies Are Used Between Inter Switch Links? Explain With An Example? |
|
Answer» I have used Brocade SAN and it has these load balancing policies:
I have used Brocade SAN and it has these load balancing policies: |
|
| 19. |
What Best Practices You Will Follow To Setup Isl Trunking? |
Answer»
|
|
| 20. |
How Will You Decide How Many Storage Arrays Can Be Attached To A Single Host? |
|
Answer» use: Fan Out For EXAMPLE 10:1. I will determine this RATIO, based on the server platform and PERFORMANCE REQUIREMENT by CONSULTING Storage vendors use: Fan Out For example 10:1. I will determine this ratio, based on the server platform and performance requirement by consulting Storage vendors |
|
| 21. |
What Is Drooping? How To Check It? |
|
Answer» Drooping= BANDWIDTH INEFFICIENCY Drooping begins if: BB_Credit<RTT/SF Where RTT = Round Trip TIME SF = Serialization delay for a data frame Drooping= Bandwidth Inefficiency Drooping begins if: BB_Credit<RTT/SF Where RTT = Round Trip Time SF = Serialization delay for a data frame |
|
| 22. |
What Factors You Will Consider For Designing A San? |
Answer»
Design should address three separate levels:
Design should address three separate levels: |
|
| 23. |
Explain Your Experience With Disk Sparing? |
|
Answer» SAN Storage array has data integrity built into it. A storage array uses spae disk drives to take the place of any disk drives that are blocked because of errors. Hot spares are available and will spare out predictively when a drive fails. There are TWO types of disk sparing: Dynamic Sparing: Data from the failed or blocked drive is copied directly to the new spare drive from the FAILING drive Correction Copy: Data is regenerated from the remaining good drives in the parity GROUP. For RAID 6, RAID 5, and RAID 1, after a failed disk has been replaced, the data is copied back to its ORIGINAL LOCATION, and the spare disk is then available. SAN Storage array has data integrity built into it. A storage array uses spae disk drives to take the place of any disk drives that are blocked because of errors. Hot spares are available and will spare out predictively when a drive fails. There are two types of disk sparing: Dynamic Sparing: Data from the failed or blocked drive is copied directly to the new spare drive from the failing drive Correction Copy: Data is regenerated from the remaining good drives in the parity group. For RAID 6, RAID 5, and RAID 1, after a failed disk has been replaced, the data is copied back to its original location, and the spare disk is then available. |
|
| 24. |
Can You Allocate A Lun Larger Than 2.19tb Limit Of Mbr ? |
|
Answer» Use GPT. GUID Partition Table, GPT is a part of the EFI standard that defines the layout of the partition table on a hard drive. GPT PROVIDES redundancy by WRITING the GPT header and partition table at the beginning of the disk and also at the end of the disk. GPT Uses 64-bit LBA for storing Sector NUMBERS. GPT disk can theoretically support up to 2^64 LBAs. Assuming 512 byte sector emulation, maximum capacity of a GPT disk = 9.4 x 10^21 bytes = 9.4 zettabytes (ZB) Use GPT. GUID Partition Table, GPT is a part of the EFI standard that defines the layout of the partition table on a hard drive. GPT provides redundancy by writing the GPT header and partition table at the beginning of the disk and also at the end of the disk. GPT Uses 64-bit LBA for storing Sector numbers. GPT disk can theoretically support up to 2^64 LBAs. Assuming 512 byte sector emulation, maximum capacity of a GPT disk = 9.4 x 10^21 bytes = 9.4 zettabytes (ZB) |
|
| 25. |
How Will You Calculate Iops Per Drive? |
|
Answer» To CALCULATE IOPS per drive the formula I will use is: 1000 / (SEEK Time + LATENCY) = IOPS To calculate IOPS per drive the formula I will use is: 1000 / (Seek Time + Latency) = IOPS |
|
| 26. |
How To Calculate Rpms Of Ssd? |
|
Answer» SSD DRIVES have no MOVABLE PARTS and therefore have no RPM. SSD drives have no movable parts and therefore have no RPM. |
|
| 27. |
How Will You Calculate The Required Band Width With Write Operations? |
|
Answer» The required Bandwidth=the required bandwidth is DETERMINED by MEASURING the average number of WRITE OPERATIONS and the average SIZE of write operations over a period of time. The required Bandwidth=the required bandwidth is determined by measuring the average number of write operations and the average size of write operations over a period of time. |
|
| 28. |
How Will You Calculate Raw Capacity? |
|
Answer» Raw Capacity= Usable + Parity |
|
| 29. |
How Do You Know What Type Of Fibre Cable Is Needed? |
|
Answer» Select it on the basis of transmission distance. If the distance is less than a couple of MILES, I will USE MULTIMODE fibre cable. If the distance is more than 3-5 miles, I will use SINGLE mode fibre cable. Select it on the basis of transmission distance. If the distance is less than a couple of miles, I will use multimode fibre cable. If the distance is more than 3-5 miles, I will use single mode fibre cable. |
|
| 30. |
Explain The Device Masking Architecture In Storage Arrays? |
|
Answer» The device masking commands ALLOW you to: Assign and mask access privileges of hosts and adapters CONNECTED in a Fibre Channel TOPOLOGY to storage arrays and devices. Specify the host bus adapters (HBAs) through which a host can access storage arrays devices. Display or list device masking objects and their RELATIONSHIPS: Typical objects are hosts, HBAs, storage arrays devices, and Fibre Channel Adapter (FA) ports. Modify properties, such as names and access privileges associated with device masking objects (for example, CHANGE the Name of a host). The device masking commands allow you to: Assign and mask access privileges of hosts and adapters Connected in a Fibre Channel topology to storage arrays and devices. Specify the host bus adapters (HBAs) through which a host can access storage arrays devices. Display or list device masking objects and their relationships: Typical objects are hosts, HBAs, storage arrays devices, and Fibre Channel Adapter (FA) ports. Modify properties, such as names and access privileges associated with device masking objects (for example, change the Name of a host). |
|
| 31. |
What Is The Difference Between Hard And Soft Zoning? |
Answer»
|
|
| 32. |
What Is Port Zoning? |
|
Answer» Port zoning utilizes physical ports to DEFINE security zones. A USER’s access to data is determined by what physical port he or she is connected to. With port zoning, zone information must be updated every time a user changes switch ports. In addition, port zoning does not allow zones to overlap. Port zoning is normally IMPLEMENTED using HARD zoning, but could also be implemented using SOFT zoning. Port zoning utilizes physical ports to define security zones. A user’s access to data is determined by what physical port he or she is connected to. With port zoning, zone information must be updated every time a user changes switch ports. In addition, port zoning does not allow zones to overlap. Port zoning is normally implemented using hard zoning, but could also be implemented using soft zoning. |
|
| 33. |
What Is Wwn Zoning? |
|
Answer» WWN zoning uses name servers in the switches to EITHER allow or block access to PARTICULAR World Wide Names (WWNs) in the fabric. A major advantage of WWN zoning is the ability to recable the fabric without having to redo the ZONE information. WWN zoning is susceptible to unauthorized access, as the zone can be BYPASSED if an attacker is able to spoof the World Wide Name of an authorized HBA. WWN zoning uses name servers in the switches to either allow or block access to particular World Wide Names (WWNs) in the fabric. A major advantage of WWN zoning is the ability to recable the fabric without having to redo the zone information. WWN zoning is susceptible to unauthorized access, as the zone can be bypassed if an attacker is able to spoof the World Wide Name of an authorized HBA. |
|
| 34. |
What Is Lun, Logical Unit Number? |
|
Answer» LOGICAL Unit Number or LUN is a logical REFERENCE to entire physical disk, or a subset of a larger physical disk or disk volume or portion of a STORAGE subsystem. Logical Unit Number or LUN is a logical reference to entire physical disk, or a subset of a larger physical disk or disk volume or portion of a storage subsystem. |
|
| 35. |
How Will You Ensure That San-attached Tape Devices Are Represented Consistently In A Host Operating System? |
Answer»
Practical examples: For Emulex HBA on a Solaris host for setting up persistent binding: # lputil
Using option 5 will perform a manual persistent binding and the file is: /kernel/drv/lpfc.conf file. lpfc.conf file looks like: fcp-bind-WWNN=”50060XY484411 c6c11:lpfc0t1″, Reconfigure: # touch /reconfigure Practical examples: For Emulex HBA on a Solaris host for setting up persistent binding: # lputil Using option 5 will perform a manual persistent binding and the file is: /kernel/drv/lpfc.conf file. lpfc.conf file looks like: fcp-bind-WWNN=”50060XY484411 c6c11:lpfc0t1″, Reconfigure: # touch /reconfigure |
|
| 36. |
Why We Need Lun Masking? |
|
Answer» LUN Masking is important because Windows based SERVERS attempt to WRITE volume labels to all available LUN’s. This can render the LUN’s UNUSABLE by other operating systems and can result in data loss. Device masking lets you CONTROL your host HBA access to certain storage arrays devices. A device masking database, based in the storage arrays unit, eliminates conflicts through centralized monitoring and access records. Both HBA and storage arrays director ports in their Channel topology are uniquely identified by a 64-bit World Wide Name (WWN). For ease of use, you can associate an ASCII World Wide Name (AWWN) with each WWN. LUN Masking is important because Windows based servers attempt to write volume labels to all available LUN’s. This can render the LUN’s unusable by other operating systems and can result in data loss. Device masking lets you control your host HBA access to certain storage arrays devices. A device masking database, based in the storage arrays unit, eliminates conflicts through centralized monitoring and access records. Both HBA and storage arrays director ports in their Channel topology are uniquely identified by a 64-bit World Wide Name (WWN). For ease of use, you can associate an ASCII World Wide Name (AWWN) with each WWN. |
|
| 37. |
What Is Lun Masking? |
|
Answer» LUN (Logical Unit Number) Masking is an AUTHORIZATION process that makes a LUN AVAILABLE to some HOSTS and unavailable to other hosts. LUN Masking is implemented primarily at the HBA (Host Bus Adapter) level. LUN Masking implemented at this level is VULNERABLE to any ATTACK that compromises the HBA. Some storage controllers also support LUN Masking. LUN (Logical Unit Number) Masking is an authorization process that makes a LUN available to some hosts and unavailable to other hosts. LUN Masking is implemented primarily at the HBA (Host Bus Adapter) level. LUN Masking implemented at this level is vulnerable to any attack that compromises the HBA. Some storage controllers also support LUN Masking. |
|