SlideShare a Scribd company logo
1
Chapter 4
Resource Monitoring and Management
2
 Outlines
 Resource Monitoring & Management I
 Stand-alone systems (Memory, Disk Use, CPU Use)
 Monitoring Tools
 Routine Resource Maintenance
 Resource Monitoring & Management II
 Bandwidth
 File & Mail Servers
 Network Printers
 Remote Administration
 Performance
 RAID
 SCSI
3
Resource Monitoring and Management
 Resource Monitoring and Management (RMM)
 the process of tracking and optimizing the use of resources within a
system or application.
 This can include monitoring the usage of CPU, memory, disk space,
network bandwidth, and other system resources to ensure that they
are being used efficiently and effectively.
 Resource monitoring can help identify potential performance issues or
bottlenecks before they become critical, and enable administrators to
take proactive measures to optimize resource allocation and prevent
downtime.
4
Resource Monitoring and Management
The Resource Monitor window includes five tabs:
1. Overview: contains a complete list of processes running on the
system.
2. CPU: displays column lists of Processes, Services, Associated Handles
and Associated Modules; charts of CPU Usage (separate for every
core)
3. Memory: displays overall Physical Memory consumption and separate
consumption of every Process; charts of Used Physical Memory,
Commit Charge and Hard Faults/sec
4. Disk: displays Processes with Disk Activity, Disk Activity and Storage;
charts of Disk Usage (KB/sec) and Disk Queue Lengths
5
Resource Monitoring and Management
The Resource Monitor window includes five tabs…
5. Network: displays Processes with Network Activity, Network Activity,
TCP Connections and Listening Ports; charts of Network Usage
(separate for every adapter) and TCP Connections resource monitoring
aspect of the tool: CPU, Memory, Disk, and Network
6
Resource Monitoring and Management
Figure 1. This figure shows a Resource Monitor
All program  Control Panel System and Security  Administrative Tools  Resource monitoring
7
 Processes with Disk Activity
When monitoring processes with disk activity, a list of all running
processes that are using disk resources is displayed.
1. Image: the name of the process executable file.
2. PID: the process ID number associated with the process.
3. Read (B/sec): average number of bytes read per second by the
process in the past minute.
4. Write (B/sec): average number of bytes written per second by the
process in the past minute.
5. Total (B/sec): average number of bytes accessed per second (both
read and write) in the past minute.
Resource Monitoring and Management
8
Disk Activity
 Is read and write operations that occur on a computer's hard disk or
storage device.
 When monitoring disk activity, some disk monitoring tools may
information such as:
 File: name of the file that is being used by the active process.
 I/O Priority: the priority of I/O transfers that can be used to
prioritize disk access for certain processes
 Response Time (ms): the disk response time in milliseconds
 This can be used to identify potential bottlenecks issues related to
disk access times.
Resource Monitoring and Management
9
 Storage
 Logical Disk. the drive letter associated with a disk.
 Physical disk.: which physical disk is being monitored on this line?
 Active Time (%). shows the percentage of time that the disk is not idle
and is actively serving requests. If a disk is constantly running at very
high levels (say, more than 80%).
 Available Space (MB). How much disk space is available on volume?
 Total Space (MB). What is the total size of the volume?
 Disk Queue Length. average disk queue length.
 The queue length metric displays the number of outstanding requests
(read and write) at any given time.
Resource Monitoring and Management
10
Network Activity
refers to the exchange of data between devices on a network,
including incoming and outgoing data packets.
It can be monitored and analyzed using network monitoring tools
Provide insight into network performance, security, and usage.
Network I/O : to the transfer of data between a computer or
device and a network
 Network Utilization: the amount of network bandwidth that is
being used at any given time
 Address: IP or MAC address
Resource Monitoring and Management
11
Resource Monitoring and Management
Network Activity …
TCP Connections
 Local Address: the IP address of the device that initiating a
network connection.
 Local Port: a network port number used by the device that
initiating a network connection
 Remote Address: the IP address of the device that receiving data
from a network connection.
 Remote Port: a network port number used by computer that
receiving data from a network connection.
 Packet Loss : the percentage of data packets that are lost during
transmission over a network.
12
Network Activity …
Listening Ports: a network port on a computer or device that is open and
waiting for incoming network connections
Address:-refers to an IP address or a MAC address.
Protocol: s a set of rules and procedures for transmitting data
between devices on a network
Firewall: used to monitors and controls incoming and outgoing
network traffic based on predefined security rules.
Status: the current state of a network connection or service.
E.g. service may be running or stopped, a network connection may be
established or disconnected, or a firewall rule may be enabled or disabled.
Resource Monitoring and Management
13
Monitoring Tools
 Several monitoring tools available for Windows servers used to monitor
resource usage and performance.
 some popular tools are:
PRTG Network Monitor: A comprehensive network monitoring tool
that used to monitor Windows Server resources such as CPU usage,
memory, disk space, and network utilization.
It provides real-time alerts and detailed performance reports.
SolarWinds Server & Application Monitor: a monitoring tool that
used to monitor windows server resources, applications, and services,
provides real-time alerts, performance metrics, and detailed reporting.
Resource Monitoring and Management
14
 Monitoring Tools
 Zabbix: provides real-time monitoring, alerting, and visualization of
system performance data.
 Prometheus: an open-source monitoring and alerting toolkit that
specializes in time-series data and can monitor system resources,
applications, and network performance.
Nagios: a popular open-source system monitoring tool that can
monitor a wide range of system resources, including servers,
applications, and network devices.
Resource Monitoring and Management
15
Routine Resource Maintenance
 It is the regular upkeep of system resources to ensure that they are
operating efficiently and effectively.
 This can include tasks such as:
 Disk cleanup: cleaning up unnecessary files and folders from system
 Defragmentation: help optimize disk usage and improve system
performance.
 Software updates: Keeping the operating system and software
applications up-to-date
 Security updates:
 Regular backups
 Hardware maintenance: fans, power supplies, and cooling systems
16
Bandwidth:- the maximum amount of data that transmitted over a
network or internet connection in a given amount of time.
Measured in bits per second (bps), Kbps, Mbps, or Gbps.
It is a critical factor in determining the speed and efficiency of data
transmission.
Determines how quickly data can be transferred between devices on
a network or between a device and the internet.
Resource Monitoring and Management II
17
 A file server is a server that dedicated to storing and managing files
that accessed by authorized users on a network.
Types of file server
A file server may be dedicated or non-dedicated.
A dedicated server is designed specifically for use as a file server,
with workstations attached for reading and writing files and databases.
the practice of having a unique IP and specific server serving only
for specific user
A Non dedicated server for general use as a file server
a number of websites and people can benefit from the same server.
Resource Monitoring and Management
18
 Network printers are printers that are connected to a network and
can be accessed by multiple users from different devices.
 Remote administration is the process of managing and controlling a
computer or network from a remote location.
 Enables administrators to manage systems and networks from a
central location, which can increase efficiency and reduce costs
 Benefits to remote administration, including:
 Increased efficiency:.
 Cost savings:
 Improved security
Resource Monitoring and Management
19
 The speed and efficiency with which software performs its intended
tasks.
 Algorithm design: well-designed algorithms can improve the speed and
efficiency of software.
 Code optimization: reducing the time and resources required to execute
code.
 Hardware resources: faster processors, more memory, and faster storage
can all improve software performance.
 Network performance: rely on network communication.
Performance
20
 a technology that allows multiple hard drives to be used together to
improve performance, reliability, and/or storage capacity.
 It is used in servers and storage devices to provide fault tolerance and
improve performance.
 There are several RAID levels, each with its own characteristics:
 RAID 0
 uses striping to spread data across multiple drives, which can improve
performance
 allowing the data to be read and written to multiple drives simultaneously.
Redundant Array of Independent Disks(RAID)
21
 Drawback: it does not provide redundancy, so if one drive fails, all data is
lost.
 RAID 1
 uses mirroring to create identical copies of data on two drives.
 Provides redundancy, as if one drive fails, the other can continue to
function.
 Drawback : does not improve performance as data is only written to one
drive at a time
Redundant Array of Independent Disks(RAID)
22
 RAID 5
 uses striping with parity to improve performance and provide redundancy.
 Data is spread across multiple drives, and parity information is stored on
each drive.
 If one drive fails, missing data can be reconstructed using the parity
information on the remaining drives and requires at least three drives.
Redundant Array of Independent Disks(RAID)
23
 RAID 6
 It is similar to RAID 5, but uses two sets of parity information to
provide redundancy even if two drives fail simultaneously.
 It requires at least four drives.
Redundant Array of Independent Disks(RAID)
24
 RAID 10
 Combines mirroring and striping to provide both performance and
redundancy.
 Data is mirrored across two sets of drives and striped across those sets
 It requires at least four drives.
Redundant Array of Independent Disks(RAID)
25
 a set of standards for connecting and transferring data between computers
and peripheral devices, such as hard drives, tape drives, and scanners.
 It is used in server and storage environments, where high performance and
reliability are critical.
 There are several types of SCSI interfaces, including:
 SCSI-1
 It was the first SCSI standard, introduced in 1986.
 It supports data transfer rates of up to 5 MB/s and allows for up to 8
devices to be connected to a single bus.
Small Computer System Interface(SCSI)
26
 SCSI-2
 It was introduced in 1990 and added new features, such as
disconnect/reconnect and synchronous data transfer.
 It also increased the maximum data transfer rate to 10 MB/s and allowed
for up to 16 devices to be connected to a single bus.
 SCSI-3
 It is the most recent SCSI standard, introduced in 1996.
 It added several new features, such as packetized data transfer and
support for Fibre Channel and Serial Attached SCSI (SAS) interfaces.
 It also increased the maximum data transfer rate to 80 MB/s and allowed
for up to 32 devices to be connected to a single bus.
Small Computer System Interface(SCSI)
27
 SCSI interfaces offer several advantages over other interfaces, such as IDE
and SATA including:
 High performance: support high data transfer rates and low latency,
which makes them ideal for server and storage environments.
 Scalability: support multiple devices on a single bus, which makes them
easy to scale as storage needs grow.
 Reliability: use a robust protocol and are designed for enterprise
environments, which makes them more reliable than consumer-grade
interfaces.
Small Computer System Interface(SCSI)
28

More Related Content

PPT
Network management
Mohd Arif
 
PPT
Chapter 7 - Resource Monitoring & Management.ppt
gadisaAdamu
 
PPT
Network management aa
Dhani Ahmad
 
PPTX
Geek Sync | Infrastructure for the Data Professional: An Introduction
IDERA Software
 
PPTX
Lecture 12 monitoring the network
Wiliam Ferraciolli
 
PDF
Introdunction to Network Management Protocols - SNMP & TR-069
William Lee
 
DOCX
Basic Concepts and Types of Network Management
Sorath Asnani
 
PPTX
Infrastructure for DBAs
PeterShore4
 
Network management
Mohd Arif
 
Chapter 7 - Resource Monitoring & Management.ppt
gadisaAdamu
 
Network management aa
Dhani Ahmad
 
Geek Sync | Infrastructure for the Data Professional: An Introduction
IDERA Software
 
Lecture 12 monitoring the network
Wiliam Ferraciolli
 
Introdunction to Network Management Protocols - SNMP & TR-069
William Lee
 
Basic Concepts and Types of Network Management
Sorath Asnani
 
Infrastructure for DBAs
PeterShore4
 

Similar to this is the slide design for chapter 4 of reource monitoring and mamangemnt (20)

PPT
network-management Web base.ppt
AssadLeo1
 
PDF
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
DOC
Performance management strategy
katharine300
 
PPTX
20 Windows Tools Every SysAdmin Should Know
Power Admin LLC
 
PPT
Management Tools Desirable features Management Architectures Simple Network ...
jeronimored
 
PPT
Chapter09
Muhammad Ahad
 
PPTX
Network Monitoring Basics
Rob Dunn
 
PPT
Ch24 system administration
Raja Waseem Akhtar
 
PPTX
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
PPT
Networking course khurram shahzad
khurrak_shahzad
 
PPT
Administrating Your Network
zaisahil
 
PPTX
LEC 2.pptx
LesterCubos
 
PPTX
Maintenance of Hospital Information System
Dr Jasbeer Singh
 
PPTX
Understanding the Windows Server Administration Fundamentals (Part-2)
Tuan Yang
 
PPTX
Manage services presentation
Len Moncrieffe
 
PPTX
Unit 1 network management
bhavikaorg
 
PPTX
Network Management Fundamentals - Back to the Basics
SolarWinds
 
PPTX
CISA Training - Chapter 4 - 2016
Hafiz Sheikh Adnan Ahmed
 
PPTX
Introduction to Network and System Administration
Duressa Teshome
 
network-management Web base.ppt
AssadLeo1
 
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
Performance management strategy
katharine300
 
20 Windows Tools Every SysAdmin Should Know
Power Admin LLC
 
Management Tools Desirable features Management Architectures Simple Network ...
jeronimored
 
Chapter09
Muhammad Ahad
 
Network Monitoring Basics
Rob Dunn
 
Ch24 system administration
Raja Waseem Akhtar
 
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
Networking course khurram shahzad
khurrak_shahzad
 
Administrating Your Network
zaisahil
 
LEC 2.pptx
LesterCubos
 
Maintenance of Hospital Information System
Dr Jasbeer Singh
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Tuan Yang
 
Manage services presentation
Len Moncrieffe
 
Unit 1 network management
bhavikaorg
 
Network Management Fundamentals - Back to the Basics
SolarWinds
 
CISA Training - Chapter 4 - 2016
Hafiz Sheikh Adnan Ahmed
 
Introduction to Network and System Administration
Duressa Teshome
 
Ad

Recently uploaded (20)

PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PDF
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
PDF
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
PDF
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PDF
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
PPTX
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
PPTX
CDH. pptx
AneetaSharma15
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
Autodock-for-Beginners by Rahul D Jawarkar.pptx
Rahul Jawarkar
 
PDF
Sunset Boulevard Student Revision Booklet
jpinnuck
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Types of Literary Text: Poetry and Prose
kaelandreabibit
 
The Picture of Dorian Gray summary and depiction
opaliyahemel
 
1.Natural-Resources-and-Their-Use.ppt pdf /8th class social science Exploring...
Sandeep Swamy
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
CDH. pptx
AneetaSharma15
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Autodock-for-Beginners by Rahul D Jawarkar.pptx
Rahul Jawarkar
 
Sunset Boulevard Student Revision Booklet
jpinnuck
 
Ad

this is the slide design for chapter 4 of reource monitoring and mamangemnt

  • 2. 2  Outlines  Resource Monitoring & Management I  Stand-alone systems (Memory, Disk Use, CPU Use)  Monitoring Tools  Routine Resource Maintenance  Resource Monitoring & Management II  Bandwidth  File & Mail Servers  Network Printers  Remote Administration  Performance  RAID  SCSI
  • 3. 3 Resource Monitoring and Management  Resource Monitoring and Management (RMM)  the process of tracking and optimizing the use of resources within a system or application.  This can include monitoring the usage of CPU, memory, disk space, network bandwidth, and other system resources to ensure that they are being used efficiently and effectively.  Resource monitoring can help identify potential performance issues or bottlenecks before they become critical, and enable administrators to take proactive measures to optimize resource allocation and prevent downtime.
  • 4. 4 Resource Monitoring and Management The Resource Monitor window includes five tabs: 1. Overview: contains a complete list of processes running on the system. 2. CPU: displays column lists of Processes, Services, Associated Handles and Associated Modules; charts of CPU Usage (separate for every core) 3. Memory: displays overall Physical Memory consumption and separate consumption of every Process; charts of Used Physical Memory, Commit Charge and Hard Faults/sec 4. Disk: displays Processes with Disk Activity, Disk Activity and Storage; charts of Disk Usage (KB/sec) and Disk Queue Lengths
  • 5. 5 Resource Monitoring and Management The Resource Monitor window includes five tabs… 5. Network: displays Processes with Network Activity, Network Activity, TCP Connections and Listening Ports; charts of Network Usage (separate for every adapter) and TCP Connections resource monitoring aspect of the tool: CPU, Memory, Disk, and Network
  • 6. 6 Resource Monitoring and Management Figure 1. This figure shows a Resource Monitor All program  Control Panel System and Security  Administrative Tools  Resource monitoring
  • 7. 7  Processes with Disk Activity When monitoring processes with disk activity, a list of all running processes that are using disk resources is displayed. 1. Image: the name of the process executable file. 2. PID: the process ID number associated with the process. 3. Read (B/sec): average number of bytes read per second by the process in the past minute. 4. Write (B/sec): average number of bytes written per second by the process in the past minute. 5. Total (B/sec): average number of bytes accessed per second (both read and write) in the past minute. Resource Monitoring and Management
  • 8. 8 Disk Activity  Is read and write operations that occur on a computer's hard disk or storage device.  When monitoring disk activity, some disk monitoring tools may information such as:  File: name of the file that is being used by the active process.  I/O Priority: the priority of I/O transfers that can be used to prioritize disk access for certain processes  Response Time (ms): the disk response time in milliseconds  This can be used to identify potential bottlenecks issues related to disk access times. Resource Monitoring and Management
  • 9. 9  Storage  Logical Disk. the drive letter associated with a disk.  Physical disk.: which physical disk is being monitored on this line?  Active Time (%). shows the percentage of time that the disk is not idle and is actively serving requests. If a disk is constantly running at very high levels (say, more than 80%).  Available Space (MB). How much disk space is available on volume?  Total Space (MB). What is the total size of the volume?  Disk Queue Length. average disk queue length.  The queue length metric displays the number of outstanding requests (read and write) at any given time. Resource Monitoring and Management
  • 10. 10 Network Activity refers to the exchange of data between devices on a network, including incoming and outgoing data packets. It can be monitored and analyzed using network monitoring tools Provide insight into network performance, security, and usage. Network I/O : to the transfer of data between a computer or device and a network  Network Utilization: the amount of network bandwidth that is being used at any given time  Address: IP or MAC address Resource Monitoring and Management
  • 11. 11 Resource Monitoring and Management Network Activity … TCP Connections  Local Address: the IP address of the device that initiating a network connection.  Local Port: a network port number used by the device that initiating a network connection  Remote Address: the IP address of the device that receiving data from a network connection.  Remote Port: a network port number used by computer that receiving data from a network connection.  Packet Loss : the percentage of data packets that are lost during transmission over a network.
  • 12. 12 Network Activity … Listening Ports: a network port on a computer or device that is open and waiting for incoming network connections Address:-refers to an IP address or a MAC address. Protocol: s a set of rules and procedures for transmitting data between devices on a network Firewall: used to monitors and controls incoming and outgoing network traffic based on predefined security rules. Status: the current state of a network connection or service. E.g. service may be running or stopped, a network connection may be established or disconnected, or a firewall rule may be enabled or disabled. Resource Monitoring and Management
  • 13. 13 Monitoring Tools  Several monitoring tools available for Windows servers used to monitor resource usage and performance.  some popular tools are: PRTG Network Monitor: A comprehensive network monitoring tool that used to monitor Windows Server resources such as CPU usage, memory, disk space, and network utilization. It provides real-time alerts and detailed performance reports. SolarWinds Server & Application Monitor: a monitoring tool that used to monitor windows server resources, applications, and services, provides real-time alerts, performance metrics, and detailed reporting. Resource Monitoring and Management
  • 14. 14  Monitoring Tools  Zabbix: provides real-time monitoring, alerting, and visualization of system performance data.  Prometheus: an open-source monitoring and alerting toolkit that specializes in time-series data and can monitor system resources, applications, and network performance. Nagios: a popular open-source system monitoring tool that can monitor a wide range of system resources, including servers, applications, and network devices. Resource Monitoring and Management
  • 15. 15 Routine Resource Maintenance  It is the regular upkeep of system resources to ensure that they are operating efficiently and effectively.  This can include tasks such as:  Disk cleanup: cleaning up unnecessary files and folders from system  Defragmentation: help optimize disk usage and improve system performance.  Software updates: Keeping the operating system and software applications up-to-date  Security updates:  Regular backups  Hardware maintenance: fans, power supplies, and cooling systems
  • 16. 16 Bandwidth:- the maximum amount of data that transmitted over a network or internet connection in a given amount of time. Measured in bits per second (bps), Kbps, Mbps, or Gbps. It is a critical factor in determining the speed and efficiency of data transmission. Determines how quickly data can be transferred between devices on a network or between a device and the internet. Resource Monitoring and Management II
  • 17. 17  A file server is a server that dedicated to storing and managing files that accessed by authorized users on a network. Types of file server A file server may be dedicated or non-dedicated. A dedicated server is designed specifically for use as a file server, with workstations attached for reading and writing files and databases. the practice of having a unique IP and specific server serving only for specific user A Non dedicated server for general use as a file server a number of websites and people can benefit from the same server. Resource Monitoring and Management
  • 18. 18  Network printers are printers that are connected to a network and can be accessed by multiple users from different devices.  Remote administration is the process of managing and controlling a computer or network from a remote location.  Enables administrators to manage systems and networks from a central location, which can increase efficiency and reduce costs  Benefits to remote administration, including:  Increased efficiency:.  Cost savings:  Improved security Resource Monitoring and Management
  • 19. 19  The speed and efficiency with which software performs its intended tasks.  Algorithm design: well-designed algorithms can improve the speed and efficiency of software.  Code optimization: reducing the time and resources required to execute code.  Hardware resources: faster processors, more memory, and faster storage can all improve software performance.  Network performance: rely on network communication. Performance
  • 20. 20  a technology that allows multiple hard drives to be used together to improve performance, reliability, and/or storage capacity.  It is used in servers and storage devices to provide fault tolerance and improve performance.  There are several RAID levels, each with its own characteristics:  RAID 0  uses striping to spread data across multiple drives, which can improve performance  allowing the data to be read and written to multiple drives simultaneously. Redundant Array of Independent Disks(RAID)
  • 21. 21  Drawback: it does not provide redundancy, so if one drive fails, all data is lost.  RAID 1  uses mirroring to create identical copies of data on two drives.  Provides redundancy, as if one drive fails, the other can continue to function.  Drawback : does not improve performance as data is only written to one drive at a time Redundant Array of Independent Disks(RAID)
  • 22. 22  RAID 5  uses striping with parity to improve performance and provide redundancy.  Data is spread across multiple drives, and parity information is stored on each drive.  If one drive fails, missing data can be reconstructed using the parity information on the remaining drives and requires at least three drives. Redundant Array of Independent Disks(RAID)
  • 23. 23  RAID 6  It is similar to RAID 5, but uses two sets of parity information to provide redundancy even if two drives fail simultaneously.  It requires at least four drives. Redundant Array of Independent Disks(RAID)
  • 24. 24  RAID 10  Combines mirroring and striping to provide both performance and redundancy.  Data is mirrored across two sets of drives and striped across those sets  It requires at least four drives. Redundant Array of Independent Disks(RAID)
  • 25. 25  a set of standards for connecting and transferring data between computers and peripheral devices, such as hard drives, tape drives, and scanners.  It is used in server and storage environments, where high performance and reliability are critical.  There are several types of SCSI interfaces, including:  SCSI-1  It was the first SCSI standard, introduced in 1986.  It supports data transfer rates of up to 5 MB/s and allows for up to 8 devices to be connected to a single bus. Small Computer System Interface(SCSI)
  • 26. 26  SCSI-2  It was introduced in 1990 and added new features, such as disconnect/reconnect and synchronous data transfer.  It also increased the maximum data transfer rate to 10 MB/s and allowed for up to 16 devices to be connected to a single bus.  SCSI-3  It is the most recent SCSI standard, introduced in 1996.  It added several new features, such as packetized data transfer and support for Fibre Channel and Serial Attached SCSI (SAS) interfaces.  It also increased the maximum data transfer rate to 80 MB/s and allowed for up to 32 devices to be connected to a single bus. Small Computer System Interface(SCSI)
  • 27. 27  SCSI interfaces offer several advantages over other interfaces, such as IDE and SATA including:  High performance: support high data transfer rates and low latency, which makes them ideal for server and storage environments.  Scalability: support multiple devices on a single bus, which makes them easy to scale as storage needs grow.  Reliability: use a robust protocol and are designed for enterprise environments, which makes them more reliable than consumer-grade interfaces. Small Computer System Interface(SCSI)
  • 28. 28