RAID Level 10 & 50 Data Security PDF
Document Details
Uploaded by barrejamesteacher
null
EC-Council
Tags
Summary
This document discusses RAID level 10 and 50, and their advantages and disadvantages for data security professionals and computer science students. It explains the combination of striping and mirroring in RAID configurations, demonstrating the advantages and disadvantages of using different RAID models. It also provides insights into data storage and networking in storage area networks for system administrators.
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Data Security RAID Level 10: Blocks Striped and Mirrored RAID 10 is a combination of RAID 0 (striping volume....
Certified Cybersecurity Technician Exam 212-82 Data Security RAID Level 10: Blocks Striped and Mirrored RAID 10 is a combination of RAID 0 (striping volume. data) and RAID 1 (disk mirroring), and its implementation i 1 requires at least four drives - — 2 RADL MDY,y... ( It has the same fault tolerance as RAID level 1, and the same ( mirroring overhead as Raid 0 ] t. It stripes the data across mirrored pairs. The mirroring provides redundancy and improves performance. The data striping provides maximum performance RAID Level 10: Blocks Striped and Mirrored RAID level 10 includes disk striping and mirroring in a nested hybrid RAID level. It is a combination of RAID level 1 and RAID level 0. It is also called as a “stripe of mirrors.” This level can symbolically be represented as RAID 1+0 or RAID 10. RAID 10 includes the mirroring of RAID 1 without parity and the striping of RAID 0. The performance of RAID 10 is higher than a RAID 1. RAID level 10 has the same fault tolerance as RAID level 1. It requires @ minimum of four drives for its operation. RAID 10 is a great choice for database servers, web servers, email servers, etc., and can be implemented on hardware or software. The mirroring provides redundancy and improves performance. The data striping provides maximum performance. Advantages of RAID Level 10 = Improved 1/O operations: With a combination of RAID levels 1 and 0, it provides improved I/O |/O operations. = Better throughput: Compared with other RAID levels, RAID 10 provides better throughput and higher latency. = Efficient write operations: The write operations are efficient in this level. Therefore, RAID 10 is often implemented on database servers and other servers that perform write operations. Disadvantages of RAID Level 10 = Expensive: RAID 10 is expensive than other RAID levels as it requires twice as many disks. Module 15 Page 1873 Certified Cybersecurity Technician Copyright © by EG-Council EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security RAID 1+0 P O RAID RAIDOO T T T T L TTT.. RAIDL........ Disk 0 Disk 1 Disk 2 Disk 3 Figure 15.91: RAID level 10 Module 15 Page 1874 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security RAID Level 50: Mirroring and Striping across Multiple RAID Levels QO RAID 50 is a combination of RAID 0 striping and the distributed parity of RAID 5 QO It is more fault tolerant than a RAID 5 but uses twice the parity overhead QO A minimum of six drives are required for setup. A drive from each segment can fail and the array will recover. If more than one drive fails in a segment, the array will stop functioning. Q This RAID level offers better reads and writes than a RAID 5 and the highest levels of redundancy and performance lg vuluos | ‘; 'éluuus'1 ool(o | o) [ ol | EEE oL e S8 T» W e e Copyright © by £ I, All Rights Reserved. Reproduction Is Strictly Prohibited. RAID Level 50: Mirroring and Striping across Multiple RAID Levels RAID level 50 includes mirroring and striping across multiple RAID levels. This level is a combination of a level 0 block-level striping and a level 5 distributed parity. The configuration of RAID level 50 requires a minimum of six drives. This level undergoes a hot swapping process when a disk fails. A drive from each segment can fail and the array will recover. If more than one drive fails in a segment, the array will stop functioning. RAID 50 is an improvement over RAID 5, specifically for its write operation and fault tolerance. RAID level 50 can be implemented on servers that run applications requiring higher fault tolerance, capacity, and random access performance. This level offers data protection and faster rebuilds than a RAID 5 system. A failed disk in a segment only affects that segment and not the entire array. Only that segment is then rebuilt. The rest of the array functions normally. Advantages = Security: The data stored in a RAID 50 is more secured than in a RAID 5. With a larger storage capacity, this level offers better security than RAID 5. =* Nondegradable: With the use of a minimum of six drives in the configuration, failure of one disk does not impact the server function on this level. =* Read and write performance: The read and write performance of RAID level 50 is far better than RAID level 5. Disadvantages = Controller: Only a sophisticated controller can handle RAID level 50. Module 15 Page 1875 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security RAID 5+0 RAIDO RAIDS RAIDS Disk 0 Disk 1 Disk 2 Disk 3 Disk 4 Disk4 Disk S5 Figure 15.92: RAID level 50 Module 15 Page 1876 Certified Cybersecurity Technician Copyright © by EG-Gouncil EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Storage Area Network (SAN) [® ] < I A SAN is a specialized, dedicated, and discrete high-speed network that -;: -m '; -um. -- - a ) -;, -; o- fi% ;a connects storage devices (disks, disk arrays, tapes, servers, etc.) with a i o- ,\ —ol high speed I/O I/0 interconnect (Fiber Channel, SAS, Ethernet, etc.) @ ({g I| AN Communication Infrastructure Layer a SANs are preferred in large enterprises because of reliable data transfer and flexible scalability @ A SAN supports data archival, backup, restore, transfer, retrieval, migration, I:[H Dzj []:'7 U:_"'l = =]E& @ E[; and mirroring from one storage device to another si ) pansiveSl ol sl il sacaies s’ ira | A vv @ ® The communication infrastructure layer provides the physical connections to the network devices Fiber Channel Channel Fiber Channel Channel |I SAN Switches SWItEhes - se -_’f;“ gy 5" ] b Fiber o1 el g |‘-.. Management.. eg Layer Layer =R The management layer organizes the connections, storage elements, and computer systems ar Storage Layer | ’:\~ g; Y Y. @ The storage layer hosts the storage devices % % 5? E? :n)us‘ ;},‘m,‘ Disk Systems RAID Tape Drive I Copyright © by EC- chl.l. All Rights Reserved. Reserved, ReproductionIs Strictly Prohibited Prohibited. Storage Area Network (SAN) A storage area network (SAN) is a high performance network that interconnects storage devices with multiple servers. The role of a SAN is to transfer stored resources available on the common network and reorganize them on an independent and high-performance network. This helps the servers to share their storage across the network. Primarily, a SAN enhances storage devices such as tape drives, disk drives, file servers, RAID, etc. A SAN implementation makes disk maintenance controllable and easier. The implementation needs a cable, a switch, and host bus adapters. Each storage system on the SAN must be interconnected, and in case of a physical interconnection, the bandwidth should support extreme data activities. We know that systems in a network connect to storage devices. However, a SAN implementation is necessary to ensure that all systems in a network are connected to each available storage device on the network. SAN allows these systems to take the ownership of storage devices; systems can exchange the ownership of storage devices among themselves. Understanding Storage Sharing The working of a SAN depends on client-server communication. Every organization has multiple servers that are connected to the systems. Example: If computer A needs some data from computer B, it will need a copy of the data from the server to which computer B is connected. This can be done through file transfer, inter- process communication, and backup. Although the data is transferred from computer B to computer A, it is possible that computer A may encounter untimely data errors, an expensive transfer between the two servers, or other operational processes. SAN architecture is the perfect solution for this issue. In SAN architecture, all servers are connected to storage devices such as tape drives, RAIDs, disk systems, etc. through a fiber channel. Thus, instead of Module 15 Page 1877 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security communicating with computer B for the data, computer A can directly get a copy of the data from the storage devices connected to the servers. For this process to be successful, data storage devices act as a common access point for all the servers. SAN storage sharing eliminates the scheduling of data transfers among servers. It reduces the cost of data transfer among servers. Storage devices help in timely transfer of data. SAN storage offers only block-level operations that do not provide file abstraction. However, if the file systems are structured on top of SAN, file access is provided which is known as a SAN file system. Now-a-days, in large organizations, SAN is a storage pool for servers that are connected via a network. The fiber channel is now replaced by iSCSI, which has become the choice of many mainstream organizations. Whatever be the size of the organization, SAN has become a consolidation of workloads in the network. A SAN supports data archival, backup, restore, transfer, retrieval, migration, and mirroring from one storage device to another. The communication infrastructure layer provides the physical connections to the network devices. The management layer organizes the connections, storage elements, and computer systems. The storage layer hosts the storage devices. Module 15 Page 1878 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security - @ = e — ; )os = au @ = :i Clients Clients i: Clients Clients : essssssssssssssssssssase A fesssssssssssssssnnssnnns Sesccsssssssssssssssssnns Sesssssssssssssssssnssnns “ “‘ Communication :. Infrastructure Layer 7y A................................ -- I—— -. ° g§ o o — E— Application Servers NAS NASFilter Filter ~ Database Servers A v\'4 P QR s e... Fiber Chaniel.. """. _ Management SAN Switches «gg. wgge o -