...How Speed of a Computer Is Affected By Different Storage Devices Traci Benge CIS/201 May 7, 2012 Charles Jacks Abstract Today’s computers have different ways to store data. Some examples of these ways are devices as the hard disk (aka magnetic disk), floppy disk, RAM, CD ROM, tape, and the flash (aka jump drive, USB memory stick, and thumb drive). Storage devices come in two different sources; primary or secondary. Each of these devices causes the computer to process data at different speeds. This paper will show how each of these devices store data and how they affect the speed of the computer. How Speed of a Computer Is Affected By Different Storage Devices The hard disk of a computer is a secondary type of storage. It can be either an external or internal source of storage for a computer. It is primarily to store a mass amount of data. The data remains stored on the hard disk indefinitely until permanently deleted. The hard disk stores the operating systems and application instructions. Without the hard disk the computer would not know how to open any of its operating systems or any of the other applications for the user. In this RAM (Random Access Memory) works with the hard disk. RAM is part of the primary storage; it contains a software program with small amounts of data for processing. When the computer boots up, it loads the whole program from the hard disk through RAM. Its storage capabilities get larger the farther away it is from...
Words: 1119 - Pages: 5
...configure a RAID 10 array, you need four drives, stripe the data on all four drives and mirror two against two. This RAID configuration allows you to get about double the performance and capacity of an individual drive, and you can lose up two drives without losing any data. 3. 3 topics mentioned in the video. * The meaning of RAID * Pros and cons of RAID configurations * How to configure RAID 4. 3 terms used in the video and their definitions. * Data striping: The technique of segmenting logically sequential data, such as a file. * RAID: Data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both. * RAID Controller: A hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in a computer or storage array so they work as a logical...
Words: 308 - Pages: 2
...Student Name: Justin Hennings Date Due: November 24, 2013 Date Submitted: November 24, 2013 Instructor: L. Chretien Subject: NT1230 Unit 10 Exercise 1 – Backup Plan How Grade: One hundred points total. Submission Requirements * Write a response to the email below by recommending solutions and explaining the rationale for your recommendations. * This is not a group project. All rules of plagiarism apply. * Cite your sources and references. * Include introductory and concluding paragraphs. Assignment Requirements Respond to the following email: -- FROM: Rebop Pakulah, Acme Engineering Company RE: Burning Smell in the server room in the US office. Hello most esteemed US computer guru, While visiting the US Office I noticed that there was a somewhat disconcerting smell in the server room. It reminded me of my uncle's cooking – somewhat burnt. I am concerned that the employees are not being responsible and having too many of their barbecue parties since we turned off their streaming Internet music to their cubicles. They swear by the Curley's barbecue sauce but I am not a fan. We are using tape backup in the server room. Could the barbecue smoke affect the tapes? I am concerned because all of our backup tapes are kept in that room. What would you suggest to take make sure the tapes are not affected by the smoke? Thank you again for you kind attention to this matter. Yours truly, Rebop Pakulah ---- Self-Assessment Checklist ...
Words: 522 - Pages: 3
...1. |Round robin scheduling is essentially the preemptive version of __________fsecond | | | | |1) |FIFO | |2) |Shortest job first | |3) |Shortest remaining | |4) |Longest time first | | |Correct Answer: FIFO [hide] | | | |Marks: 1 | | | | | | | | | | |2. |A page fault occurs | | | |1) |when the page is not in the memory | |2) |when the page is in the memory | |3) |when...
Words: 2016 - Pages: 9
...MASS-STORAGE SYSTEM ROMERO, MHICA ANGEL M . OUTLINE Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space Management RAID Structure Stable-Storage Implementation OBJECTIVES Describe the physical structure of secondary and tertiary storage devices and the resulting effects on the uses of the devices Explain the performance characteristics of mass-storage devices Discuss operating-system services provided for mass storage Magnetic Tapes Magnetic Disks Solid State Disks » Magnetic tape ˃ Was early secondary-storage medium ˃ Relatively permanent and holds large quantities of data ˃ Access time slow ˃ Random access ~1000 times slower than disk ˃ Mainly used for backup, storage of infrequently-used data, transfer medium between systems ˃ Kept in spool and wound or rewound past read-write head ˃ Once data under head, transfer rates comparable to disk ˃ 20-200GB typical storage ˃ Common technologies are 4mm, 8mm, 19mm, LTO-2 and SDLT » Magnetic disks provide bulk of secondary storage of modern computers ˃ Drives rotate at 60 to 200 times per second ˃ Transfer rate is rate at which data flow between drive and computer ˃ Positioning time (random-access time) is time to move disk arm to desired cylinder (seek time) and time for desired sector to rotate under the disk head (rotational latency) ˃ Head crash results from disk head making contact with the disk surface ...
Words: 365 - Pages: 2
...Online Storage Backup Systems CIS 512 8 June 2012 Table of contents Executive Summary…………………………………………………..3 Background…………………………………………………………..4 Current State of Technology…………………………………………7 Report of this Research………………………………………………9 Summary…………………………………………………………….11 References…………………………………………………………...12 Executive Summary Everything we do today in our private lives and in the business world has moved online. The amounts of data stored have increased exponentially over the years. The need for reliable data storage has also increased over the years. The media and methods in which we store our data has become as important as any other technology. As technology has advanced, more and more data is being stored and having reliable means of storage has become a challenge that IT professionals will continue to deal with in the future. In this paper, I will outline the different types of backups that have been used over the years. I will talk about how data backup and storage has move to an online arena. Finally I will talk about cloud storage and cloud computing. I will discuss how cloud computing will become the future of how we operate in the online world. Background The need for backing up data has existed for as long as we have been using computers. When we first started using computers, data was stored on floppy disks or tape drives. In the beginning the amounts of data...
Words: 2743 - Pages: 11
...of DAS, NAS and SAN. Choose the most appropriate storage for the UCC university results database and why you have chosen it. DAS is Direct Access Storage. DAS is connected directly to the server which enables quick access to the data, through the server. It is a block based storage, which means raw data can be stored directly onto a disk, instead of being stored on to files and then on to a disk. This would be an advantage if a database is being connected to DAS, such as an exam results database system because databases work better with block based storage. DAS contains multiple disk drives connected to a server.DAS is also a cheap and efficient method of storage. DAS uses a SCSI (Small Computer System Interface) cable. It hides the complexity of physical format. Every device attaches to the SCSI bus in a similar manner. Up to 8 or 16 devices can be attached to a single bus. A SCSI cable is a pretty secure cable; it cannot be hacked as it is a direct line to the network. If this cable breaks, you cannot access data you have stored. However, you can use multi-pathing to prevent this. Multi-pathing means having 2 cables instead of just one. Then if one cable fails, the other takes over. This means that multi-pathing is fault tolerant. NAS is Network Attached Storage. This is file based storage. File based storage is inefficient when using databases, because data must be written to a file system and then to disk storage. NAS can store any data that appears in the form...
Words: 776 - Pages: 4
...NATIONAL MANAGEMENT COLLEGE STORAGE TECHNOLOHY Submitted in partial fulfillment of the requirement For Diploma in Hardware Engineering MG AUNG KYAW SOE Roll No. 6 Batch 25 Diploma project report January, 2014 1 ACKNOWLEDGMENT First and foremost, I would like to thank my parents because I had attended “Diploma in Hardware Engineering”. Next, I would like to express my gratitude to Dr. Than Win (Principal of National Management Collage, Yangon) and Daw Khin Toe Yin (Managing Director of Winner Computer Group). Special thanks to Saya U Myo Aung Latt. A very grateful thanks to all my teachers, lectures and also teachers from laboratory for their supervision, advise and patience. Special thanks my hardware teachers Daw Ohnmar Myo, U Thein Moe, U Min Thu and U Win Naing Oo. 2 CONTENT Page CHAPTER – 1 1.1 1.2 INTRODUCTION 6 6 7 9 Computer data storage Storage Type 1.2.1 1.2.2 Primary storage Secondary storage CHAPTER – 2 2.1 2.2 STORAGE TECHNOLOGY 12 The basic components of data storage system Interaction with a storage system and other computer Components 12 13 13 14 15 16 17 18 2.3 2.4 2.5 2.6 2.7 2.8 2.9 Online storage vs. External hard drives Off-line storage Memory hierarchy Memory organization Main memory Secondary memory Type of storage technology CHAPTER 3 3.1 3.2 3.3 3.4 MAGNETIC STORAGE 19 20 21 23 23 24 24 How to work magnetic storage History Design Magnetic recording classes 3.4.1 3.4.2 3.4.3 Analog recording Digital...
Words: 9711 - Pages: 39
...Storage Switzerland White Paper Storage Infrastructures for Big Data Workflows Sponsored by: Prepared by: Eric Slack, Sr. Analyst May 2012 Storage Infrastructures for Big Data Workflows Introduction Big Data is a term used to describe data sets which have grown so large that traditional storage infrastructures are ineffective at capturing, managing, accessing and retaining them in an acceptable time frame. The thing that separates Big Data from simply a large archive is the need to process these data sets or to provide file access to multiple users quickly. Some Big Data use cases involve analytics, the computer-based analysis of large amounts of relatively small data objects, for the purpose of pulling business value from that information. Many of these involve files supporting transaction analysis or automated event processing, such as database or web analytics, which won’t be addressed in this white paper. Instead, this paper will deal with another form of Big Data that supports file processing workflows, often sequential in nature, where large files are shared by knowledge workers to create digital products, support research and perform analysis to increase productivity. Also considered will be Big Data supporting large file analytics in which files are shared by large, high performance compute clusters to support complex analysis and drive business decisions. Big Data File Processing Workflows Some of the industries using large file, Big Data sets in these two use cases...
Words: 2944 - Pages: 12
... Professor Brian Miller CTI-140-20 3/26/2017 RAID Assignment RAID is an array of independent disks made up of multiple individual disk storage devices. It is perceived by the operating system as a single logical unit. Data needed to be stored on a RAID are controlled by RAID controller, and be directed to different storage devices. Such a methodology is proved to be more efficient than the traditional method in the way that it places data in and retrieves data from different nodes, balancing the input and output actions and improving the overall performance and fault tolerance. There are different levels of RAID. Each of them employs one or more technology in dealing with storage virtualization. The following shows the setup...
Words: 853 - Pages: 4
...constructed for company use. Some are very costly, whereas, many can be downloaded as freeware. Depending on the user there is definitely software out there to meet their needs but it seems difficult for one to narrow down the abundance of options to choose one that will give them peace of mind. There is much to be said about the terminology of backup and recovery products. Terms such as storage, security and auto-backup are pretty self-explanatory. However, with terminology such as Asynchronous Replication and Deduplication, which both copy and store information in a unique way, a user could easily be lost in translation. After some research it is learned that a product such as “MyPc Backup” offers unlimited storage as well as support for less than ten dollars. It’s pretty straight forward without many frills but probably an excellent choice for home backup and recovery. On the other hand, companies with highly secure and crucial files may go with something like EMC’s Avamar. This product has all the bells and whistles one would expect from a top notch product including their deduplication storage solutions. Avamar seems to be pretty amazing software but depending on the plan purchased this product will cost anywhere from ten to twenty-five thousand dollars. Which, in the grand scheme of things, worth every penny to a large company that would be at risk of losing even more if their files were lost from a system crash not supported by proper...
Words: 297 - Pages: 2
...30Chapter 7 major topics: -Keyboards- Input device that contains keys you press to enter data and information into a computer or mobile device -Pointing devices -Mouse- fits under palm of your hand comfortably -as you move the mouse, the pointer on the screen moves with it -Touchpad- small, flat, rectangular pointing device - sensitive to pressure and motion -move finger on the touchpad in direction you want pointer to go -Pointing Stick- ball in-between keys on the keyboard that can control the pointer-- push in the direction you want the pointer to go -pressure sensitive, shaped like eraser on end of a pencil -Trackball- stationary device on the side of the mouse the size of a Ping-Pong ball -Optical Scanners- Light-sensing input device that converts printed text and images into a form the computer can process -Optical Readers- a device that uses a light source to read characters, marks, codes and then converts them into digital data that the computer can process -OCR (Optical Character Recognition) Devices- devices that usually include a small optical scanner for reading characters and sophisticated software to analyze what is read -OMR (Optical Mark Recognition) Devices- devices that read hand-drawn marks, such as...
Words: 3963 - Pages: 16
...Access Methods of Secondary Storage Devices Secondary Storage Device is storage medium which is used to store large amount of data permanently until it is changed by user. Though it stores information, it cannot be accessed directly by the CPU. The data stored in Secondary Storage Device can be accessed depending upon how it is stored on the device. Mainly there are two methods of accessing data from the Secondary Storage Device. 1) Sequential Access Method 2) Direct Access Method Sequential Access Method – This means the computer system must search the storage device from the beginning until the desired data is found. The most common sequential access device is magnetic tape where data is stored and processed sequentially. For example, a tape contains information regarding students of a school, to look student’s number 100’s information, the computer will have to start with student number 1 and then go pass 2, 3, 4 and so on until it comes to 100. This method is quite simple than other methods, but it is very slow (more time for searching data) & very suitable for bills & payroll applications. Direct Access Method – This is also known as random access, it means the computer can go directly to the location where the data is stored that the user wants. The most common direct access devices are magnetic disc & optical disc. In these devices, the data is stored as sequentially numbered blocks. Thus one can access block 12, then block 78, then block 5 &...
Words: 742 - Pages: 3
...Chapter 5 states everything we need to know about the importance of data storage technology. A typical computer system has multiple storage devices filling a variety of needs. Primary storage devices support immediate execution of programs, and secondary storage devices provide long-term storage of programs and data. The characteristics of speed, volatility, access method, portability, cost, and capacity vary between storage devices, forming a memory-storage hierarchy. Primary storage tends to be at the top of the hierarchy, with faster access speeds and higher costs per bit of storage, and secondary storage tends to be in the lower portion of the hierarchy, with slower access speeds and lower costs. Modern computers use memory implemented with semiconductors. Basic types of memory built from semiconductor microchips include random access memory (RAM) and nonvolatile memory (NVM). The primary RAM types are static and dynamic. Static RAM (SRAM) is implemented entirely with transistors; dynamic RAM (DRAM) is implemented with transistors and capacitors. SRAM s more complex circuitry is more expensive but provides faster access times. Neither type of RAM can match current microprocessor clock rates. NVM is usually relegated to specialized roles and secondary storage because of its slower write speeds and limited number of rewrites. Optical discs store data bits as variations in light reflection. An optical disc drive reads data bits by shining a laser beam onto a small disc location...
Words: 320 - Pages: 2
...Storage Technologies Nearly every facet of computer technology, like processor speed, memory capacity and I/O capabilities has seen dramatic improvements since its inception. The one technology that has lagged behind is storage. Although data storage has seen considerable improvements from its infancy in 1956, it has not seen major disruptive changes; though, according to the CEO of Pure Storage, Scott Dietzen, in this next decade it’s going to be storage’s turn to face disruptive change (Korbin, 2011). This means that as this decade takes its course, we’ll see major changes in the way we store our data. Pure Storage, a company focused on data storage, has proposed one solution to our need to effectively and efficiently store large amounts of data. We all have heard of flash memory—non-volatile computer storage that can be electrically erased and reprogrammed—and we also know that flash memory is quite expensive compared to traditional storage technologies. The benefit of adopting flash memory for storing data has been unrealized by enterprises, primarily due to the high cost of implementing such infrastructure. Nevertheless, for enterprises undertaking the transition to a virtualized environment, flash memory can be an alluring proposition. Faster, smaller and more efficient than traditional disk technologies, flash makes a convincing case (Korbin, 2011). Scott Dietzens’ Pure Storage company boasts a solution that delivers enterprise-caliber storage at a price point geared...
Words: 871 - Pages: 4