0%

Book Description

This effective self-study guide offers 100% coverage of the challenging SCSP SNIA Certified Storage Professional exam

Get complete coverage of all the SCSP exam objectives inside this comprehensive resource. Written by Eric Vanderburg, a leading expert on storage certification and training, this authoritative guide covers exam S10-110 in full detail. You’ll find learning objectives at the beginning of each chapter, exam tips, and practice exam questions with in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.

COVERS ALL EXAM TOPICS, INCLUDING:

• Spinning disk and flash
• RAID
• Fibre Channel and iSCSI
• SANs, NAS, DAS, and storage arrays
• Virtualization
• Cloud storage and cloud services
• Storage management
• Software defined storage
• Business continuity, backup, and recovery
• Security, access control, and encryption
• Information lifecycle management
• Storage heating, cooling, and power
• Data migration and replication
• Compliance
• Storage tiering
• Deduplication and compression

Book Description

This effective self-study guide offers 100% coverage of the challenging SCSP SNIA Certified Storage Professional exam

Get complete coverage of all the SCSP exam objectives inside this comprehensive resource. Written by Eric Vanderburg, a leading expert on storage certification and training, this authoritative guide covers exam S10-110 in full detail. You’ll find learning objectives at the beginning of each chapter, exam tips, and practice exam questions with in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.

COVERS ALL EXAM TOPICS, INCLUDING:

• Spinning disk and flash
• RAID
• Fibre Channel and iSCSI
• SANs, NAS, DAS, and storage arrays
• Virtualization
• Cloud storage and cloud services
• Storage management
• Software defined storage
• Business continuity, backup, and recovery
• Security, access control, and encryption
• Information lifecycle management
• Storage heating, cooling, and power
• Data migration and replication
• Compliance
• Storage tiering
• Deduplication and compression

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Dedication
  5. Contents at a Glance
  6. Contents
  7. Acknowledgments
  8. Introduction
  9. Chapter 1 Storage Essentials
    1. How Disk Storage Systems Work
    2. Physical Components
    3. Solid-State Drive
    4. Electrical and Mechanical Differences
    5. I/O vs. Throughput
    6. Capacity vs. Speed
    7. Available Disk Interfaces and Their Characteristics
    8. ATA
    9. SCSI
    10. Fibre Channel
    11. SAS
    12. PCI Versions
    13. Multiple Disks for Larger Storage and Fault Tolerance
    14. RAID Levels
    15. JBOD
    16. Hardware, Host-Based, and Software Implementations
    17. Hosts Interaction with Disks
    18. File Systems
    19. Chapter Summary
    20. Chapter Review Questions
    21. Chapter Review Answers
  10. Chapter 2 Storage Infrastructure
    1. Storage Arrays
    2. Controller Head
    3. Disk Enclosure
    4. Hot-Swap
    5. Storage Area Networks
    6. Fibre Channel
    7. Fabric
    8. FC or iSCSI Protocol
    9. Block Mode
    10. File System on Host
    11. Direct Attached Storage
    12. SCSI
    13. SAS
    14. eSATA
    15. FC
    16. Network Attached Storage
    17. Components
    18. UNC-Addressable Storage
    19. TCP/IP-Based Storage
    20. NAS File System Protocols
    21. Ethernet-Based Storage
    22. Cloud Storage
    23. Cloud Storage Types
    24. Cloud Storage Methods
    25. Chapter Summary
    26. Chapter Review Questions
    27. Chapter Review Answers
  11. Chapter 3 Storage Networking
    1. Fibre Channel Storage Network
    2. Components
    3. Protocols
    4. Topologies
    5. ISL
    6. Port Channel
    7. Trunking
    8. Port Types
    9. Tools
    10. iSCSI Storage Network
    11. Block Mode
    12. Initiator
    13. Target
    14. Ethernet Switching
    15. Ethernet Features
    16. Tools
    17. Storage over a WAN
    18. Bandwidth
    19. Latency
    20. Flow Control
    21. Chapter Summary
    22. Chapter Review Questions
    23. Chapter Review Answers
  12. Chapter 4 Storage Hardware
    1. Cables
    2. Optical Cables
    3. Copper Cables
    4. Storage Networking Devices
    5. HBA
    6. NIC
    7. CNA
    8. Repeaters and Amplifiers
    9. Ethernet Switch
    10. Fiber Hub
    11. Fiber Switch
    12. Director
    13. Router
    14. Hot-Swappable Network Components
    15. Removable Storage
    16. Tape Media
    17. Optical Media
    18. Flash Media
    19. Chapter Summary
    20. Chapter Review Questions
    21. Chapter Review Answers
  13. Chapter 5 Virtualization
    1. Types of Storage Virtualization
    2. Tape Virtualization
    3. Disk Virtualization
    4. Block Virtualization
    5. File Virtualization
    6. Host Virtualization
    7. LVM
    8. Virtual Provisioning
    9. Implementing Host Virtualization
    10. Array-Based Virtualization
    11. Virtual Provisioning of the Array
    12. Implementing Array-Based Virtualization
    13. Network Virtualization
    14. Concepts
    15. Methods
    16. Provisioning the Logical Fabric
    17. Chapter Summary
    18. Chapter Review Questions
    19. Chapter Review Answers
  14. Chapter 6 Storage Management
    1. Storage Provisioning
    2. LUN Provisioning
    3. Thick Provisioning
    4. Thin Provisioning
    5. Thin Provisioning Woes
    6. Best Practices for Disk Provisioning
    7. Oversubscription
    8. Management Protocols
    9. SNMP
    10. WBEM
    11. SMI-S
    12. In-Band vs. Out-of-Band Management
    13. Storage Administration
    14. GUI
    15. CLI
    16. Configuration Management
    17. Information Technology Infrastructure Library
    18. Storage Monitoring, Alerting, and Reporting
    19. Settings Thresholds
    20. Trending
    21. Forecasting and Capacity Planning
    22. Recording a Baseline
    23. Setting Alerts
    24. Displaying Performance Data in Windows with Performance Monitor
    25. Auditing Log Files
    26. Backup Logs
    27. Alerting Methods
    28. Software-Defined Storage
    29. SDS Caveats
    30. Chapter Summary
    31. Chapter Review Questions
    32. Chapter Review Answers
  15. Chapter 7 Business Continuity
    1. Business Continuity Objectives
    2. Integrity
    3. Availability
    4. Reliability
    5. Data Value and Risk
    6. Recovery Point Objective
    7. Recovery Time Objective
    8. Mean Time Between Failures
    9. Mean Time to Failure
    10. Backup Frequency
    11. Rotation Schemes
    12. Continuous Data Protection
    13. Contention of Media
    14. Impact on Production
    15. Backup Reliability
    16. Backup and Restore Methods
    17. Backup Implementation Methods
    18. Backup Reliability Methods
    19. Backup Locations
    20. Disk-to-Disk
    21. Disk-to-Tape
    22. VTL
    23. Disk-to-Disk-to-Tape
    24. Vaulting and E-vaulting
    25. Offsite Tape Storage
    26. Array-Based Backups
    27. Chapter Summary
    28. Chapter Review Questions
    29. Chapter Review Answers
  16. Chapter 8 Security
    1. Access Control
    2. Authentication
    3. Authorization
    4. Interoperability
    5. Encryption
    6. Encryption Keys
    7. Data at Rest
    8. Data in Motion
    9. Host Encryption
    10. Storage Visibility
    11. LUN Security
    12. Zoning
    13. iSCSI Security
    14. Storage Segmentation
    15. Chapter Summary
    16. Chapter Review Questions
    17. Chapter Review Answers
  17. Chapter 9 Design
    1. Storage Architecture Components
    2. Types of Storage Architecture
    3. High Availability
    4. Online Transaction Processing
    5. Cloud Services
    6. Redundancy
    7. Clustering
    8. Power Supply
    9. Controller
    10. Redundant Paths to Disks
    11. Hot Spare
    12. Multipath I/O
    13. Hot-Swap
    14. Path/Bus
    15. Switch
    16. HBA
    17. NIC
    18. Link Aggregation
    19. Array
    20. Cache Redundancy
    21. Replication
    22. Point-in-Time Replication
    23. Continuous Replication
    24. Scope
    25. Site Redundancy
    26. Consistency
    27. Chapter Summary
    28. Chapter Review Questions
    29. Chapter Review Answers
  18. Chapter 10 Environment
    1. Facilities
    2. Cable Management
    3. Cooling
    4. Humidity Control
    5. Fire Suppression
    6. Storage Power Requirements
    7. AC
    8. DC
    9. Grounding
    10. Sufficient Capacity
    11. Division of Circuits
    12. Uninterruptable Power Supply
    13. Safety
    14. Weight Considerations
    15. Antistatic Devices
    16. Chapter Summary
    17. Chapter Review Questions
    18. Chapter Review Answers
  19. Chapter 11 Advanced Topics
    1. Information Lifecycle Management
    2. Value of Data Based on Frequency of Access
    3. HSM
    4. Storage Tiers
    5. Compliance
    6. Retention Policy
    7. Archiving and Purging
    8. Preservation and Litigation Holds
    9. Advanced Storage Methods
    10. Content-Addressable Storage
    11. Object-Oriented Storage
    12. Deduplication and Compression
    13. Deduplication Levels
    14. Inline and Postprocess Deduplication
    15. Source and Target Deduplication
    16. Deduplication Software and Appliances
    17. Performance and Capacity Implications
    18. Reduction Ratios for Data Types
    19. Chapter Summary
    20. Chapter Review Questions
    21. Chapter Review Answers
  20. Chapter 12 Performance and Troubleshooting
    1. Optimize Performance
    2. Necessary IOPS
    3. Random vs. Sequential I/O
    4. RAID Performance
    5. Defragmentation
    6. Cache
    7. Impact of Replication
    8. Partition Alignment
    9. Queue Depth
    10. Storage Device Bandwidth
    11. Network Device Bandwidth
    12. Adequate Share Capacity
    13. Performance Metrics and Tools
    14. Switch
    15. Array
    16. Host Tools
    17. Network Troubleshooting
    18. Connectivity Issues
    19. VLAN Issues
    20. Zoning Issues
    21. Interoperability Issues
    22. Host Troubleshooting
    23. Hardware or Software Incompatibility
    24. Outdated Firmware or Drivers
    25. Incorrect NIC Configuration
    26. Bad Connector
    27. Bad Cable
    28. Bad Port
    29. Bad NIC
    30. NIC Improperly Connected
    31. Incorrect Firewall Settings
    32. Incorrect Cluster or Multipath Settings
    33. Backup Troubleshooting
    34. Space Limitations
    35. Open Files
    36. Virus Scanning
    37. Permissions
    38. Chapter Summary
    39. Software References
    40. Chapter Review Questions
    41. Chapter Review Answers
  21. Appendix Practice Exam
    1. Questions
    2. Quick Answer Key
    3. In-Depth Answers
    4. Analyzing Your Results
  22. Index
3.145.166.7