Created by michael.0lsn
over 8 years ago
|
||
Question | Answer |
Network/Server Management | A single point of control to monitor and manage a networked system |
Performance Management | ISO's category for optimizing quality of service |
Baseline | Measuring the normal conditions of a Network or System through all stages of load |
Fault Tolerance | The term for preventing outages |
ROI | amount of value received relative to the amount of money invested |
MTBF | Average life span of a component |
MTTR | The average amount of time that it takes to repair a component |
AFR | Yearly failure rate written as a percentage |
HA | Less than 8.8 hours of downtime per year |
Workload Characterization | Number of User's a system can support and expected response time |
Disaster Recovery Plan | a written plan describing the steps a company or individual would take to restore computer operations in the event of a disaster |
RPO | The point, to which applications must be recovered in order to get the business back online after a disaster |
RTO | Maximum allowable time to bring the applications (RPO) back online after a disaster |
Backup Metadata | Information about the backup data |
Backup Catalogue | A metadata database maintained by the backup server |
Hot Backup | A backup performed while the application is running |
Differential | only files that have changed since the last FULL backup |
Incremental | files that have changed since the last FULL OR INCREMENTAL backup |
Synthetic full | a full backup created on the backup device from full and incremental or differentials |
Snapshots | “Point in Time” images of live systems |
CDP | Backup system continuously track changes in data |
Replication | keep a second, synchronized copy of data on a separate system |
HSM | Use different types of storage media, (RAID, disk, tape) each representing a different level of cost and speed of retrieval when access is needed. |
Deduplication | find and delete duplicated on the storage system |
SAN | A network that moves storage data only, not client data |
Rule 3-2-1 | You should have at least 3 backup copies on a couple of different media with at least one of those copies offsite |
Cloud Synched | A backup folder or drive that looks local but is on the cloud |
SAN backup architecture | Backup data is moved via a separate network designed for storage only |
Write penalty | The number of extra operations it takes to perform a write on a RAID system |
Disk IOPS | 1 / (average latency in seconds + average seek time in seconds) |
Multicast cluster MAC | each host in the cluster retains it's own MAC address as well as the MAC address of the cluster |
RAID 0 | Striped array with no fault tolerance |
RAID 3 | RAID that performs well under applications that just want one long sequential data transfer like video servers |
RAID 5 | RAID that has a write penalty of 4 |
RAID 6 | RAID that can withstand the loss of two disks |
IOPS | The most common measurement of a storage systems overall performance |
Distributed Computer Clustering | different parts of a program run simultaneously on two or more computers that are communicating with each other over a network |
Parallel Computer Clustering | simultaneous execution of the same task (split up and specially adapted) on multiple processors in order to obtain results faster |
Load Balancing each node in the cluster is configured to provide the same service | each node in the cluster is configured to provide the same service |
Quorum | ›Configuration information for the cluster |
Heartbeat | ›A message sent between cluster nodes at regular intervals to determine node availability |
Symmetric Cluster | Every server in the cluster performs active work |
Asymmetric Cluster | Also called active/passive clustering |
Round Robin cluster algorithm | ›distributes the load equally to each server in the cluster, regardless of the current number of connections or the response time |
Least-Connection cluster algorithm | sends requests to servers in a cluster, based on which server is currently serving the fewest connections |
9. What is the Multicast method of MAC addressing in clustering? | You can distribute incoming client requests to cluster hosts by sending to adapter multicast MAC address. -used when you only have one nic per node |
5 benefits of clustering | -Improve availability -Improve performance -Improve scalability -Improve manageability -Load balancing |
Deduplication | Reduces size of stored data File level or Block level Finds repetitive data Deletion of duplicate data uses pointers instead of copies |
Want to create your own Flashcards for free with GoConqr? Learn more.