Storage Device Configuration (part 2)

Video Activity

This module discusses Redundant Array of Independent Disks (RAID), RAID 0-6. Also discussed are file system types: Unix file system, new technology file system, file allocation table, virtual machine file system, Z file system and extended file system. Finally, the module closes with different byte sizes: kilobyte, megabyte, gigabyte, terabyte, pet...

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

2 hours 28 minutes
Video Description

This module discusses Redundant Array of Independent Disks (RAID), RAID 0-6. Also discussed are file system types: Unix file system, new technology file system, file allocation table, virtual machine file system, Z file system and extended file system. Finally, the module closes with different byte sizes: kilobyte, megabyte, gigabyte, terabyte, petabyte, Exabyte, zettabyte and yottabyte.

Video Transcription
next we have rates and I'll raise. There are several different types of race that will be talking about. We have raid zero red one. We also have raid zero plus one and one plus zero, also called 10.
We have raised five Raid six each. One of these are very important, and each one of these provide redundancy for the network in case there's a disaster to a particular hard drive. Raid. Zero rate zero is strapping. This is where information is striped from one hard drive to the next hard drive.
If you take a file, say, for instance, Firefox.
You had two hard drives set up with Grade zero. The program Firefox. Half of it might be saved here, and the other half will be saved on this side. This allows you for quick access.
If you have two hard drives here, you're able to pull the information quickly and you're able to get the information out of it. I'll read a little bit from here and read a little bit from here. Rechargeable Work independently, also with radio the stores.
If you have 100 gig hard drive here on 100 gig hard drive here you have 200 gigs, but there is no fault tolerance whenever it comes to rate zero. Radio is primarily for performance on Lee.
Next is Ray one, which is Mirror Mirror is where it's a complete replica of the other hard drive.
Say, for instance, the program Firefox, you say fart box here. It will also save it to this side.
So whatever's on this hard drive is on what's on this hard drive with Raid one. If you have 100 gig hard drive here and then 100 gig hard drive here, you only have 100 gigs total. You don't have 200 gigs because the hard drives are mirrored back and forth. One benefit out of Raid one is that
the computer is able to access information from both hard jobs at the same time. So if one hard drive is being used, is pulling a different program, say Microsoft Word.
One hard drive is pulling Microsoft work. It will pull from the other hard drive firefights if needed, so that away it's able T to perform its functions. That the user wants
Raid zero plus one is where you have a first rate zero which is striving. And then you have raved one at the higher tier, which is nearing.
So you'll have two hard drives, strapping information and then that those two hard drives will be mirrored to the other side.
This allows you with the reliability but performance. At the same time, this hard drive fells is unusable. Well, you had the second hard drive over here and be able to use it. You just replace this hard drive and all the information is replicated back and you're able to perform
as if nothing happened. Red one plus zero is the exact opposite of raid zero plus one.
It's where you have mirroring first, and then those mirrors are striped back and forth. So therefore it this hard drive dies. It's using this hard drive over here.
Another thing I'd like to point out is if each one of these hard drives are 100 gigs, you're only actually using 200 gigs. You have 400 gives worth of hard drives, but you're on Lee actually using 200 gigs because of the mirror. Next is rate five and write five is probably the most common raid that most companies use
Ray five is
striping, but with the parody.
So what you have here is you have each one of these hard drives split into four sections. If each one of these hard drives is, ah 100 gigs,
then because of the parody, you only have 300 gigs available. What you have in Raid five is where the hard drive is split into four sections. The hard drive will be split into 25 gigs sections,
and each section would be used across each hard drive. But then, the very last this would have a parody of these three hard drives consolidated
the next one,
which would be the other 25 gigs
instead of it being on the last hard drive. The parody is right here,
so this allows you to have a redundancy but also tohave striping. So you have speed with reliability whenever it comes to write five.
The good benefit out of this is if any one of these hard drives fell and you need to replace it, you can pull it out, put in the next hard drive and be able to use it as if nothing ever happened.
The parody and thought of each one of these drives will replicate to that hard drives that a way you're able to restore your information. Users do not notice this
Raid six is the exact same is Ray five, but it has to parody drives, so you're using
two hard drives for your parody. If you notice here it has
the first section here, a one a two, a three. But then there's also two additional parodies on here.
Same thing goes for B one B, two to a parodies and then be three at the other end. Race six allows you to lose two hard drives and still be able to continue your normal operations
with Raid. If you have two hard drives and one hard drive is that 150 gigs and the other hard drives at 100 gigs?
Whenever you raid them out, you will have 100 games on each hard drive. That extra 50 gigs will just be lost.
There it comes, a raid. Each hard drive has to be the same, and if you put in a 50 gig hard drive with all the others will reduce down to 50 gigs. Even if one of them is a 500 gig. So it's very, very important that whenever you're using rate to have all your hard drives match to use the exact same hard drives.
So that way you're able to do the functions that you need to d'oh
all systems tie. Sir, When we talk about the bite sizes, we're also gonna be talking about different ball systems use with each operating system. Next, I would like to point out the bite sizes with bite sizes. You have kilobyte megabytes, gigabytes, terabytes, petabytes, exabytes, set of eyes and yada bites.
Each one of them is that it is the next level of storage. 1024 kilobytes make one megabyte. However, 1000 24 megabytes make one gig, but each they keep moving up in the same manner. So to be able to get from killer buys two gigabytes,
you can take 1000 24 times 1000 24 that's how you'll get one megabyte.
No, we're talking about some of these false systems. They exceed 21 yacht, a bite.
So I wanted to be able to point out the sizes of them and how
each one is the next tier
Currently, most computers have terabytes. However, Five years ago, nobody had terabytes and everybody had gig of us. They would use around 100 gigs and then they would fill that up. Now, the next level out is one terabyte. One terabyte will run you about $100. However,
less than five years ago,
500 gigs would be about $100. A technology increases. The size is also increased. Units follow system you f s.
This is really developing units in this UNIX based operating system. For you to be able to load a units machine, you have to have the unique spot system installed onto it
used the high Roker structure
and it's the top level. The top level is called route, which is also represented by a slash
with unit's file system. That max volume size is one you gotta fight.
However, the max file size is 32 petabytes also with U. F s. It doesn't offer any encryption. So if you're using U. F s, you're not able to encrypt your hard drive to keep it unseen from other people. Next, we have ante F s u technology follow system NT F s was developed by Microsoft
and it was developed so that away they will be able to provide compression bone shallow copy
decryption follows system. Also called the S s in quota
court. It is also very important whenever it comes to Ante F s
UT F s has a maximum size of 256 terabytes.
However, the max
file size 16 terabytes
and then it does offer and Christian, which is what f s is with GFS, you're able to encrypt your volumes so that away you're able to
keep your information secure from other people.
That sounds were fall allocation table.
It is the legacy follow system that is used in most
thumb drives. Anything less than 32 gigs
is primarily for removable media
that does not support features for encryption, for permissions are encryptions.
A lot of times, companies will not let you have thumb drives inside the building, and the reason they don't let you have thumb drives is because if you take a file from N. C. F s and you transfer it to a fat formatted system like a thumb drive, then it will lose all of his permissions on all of us encryptions. If you take a fall and you move it from ante F s
fat 32
you'll be able to access it as if
there were no permissions in the first place.
That has a maximum size of two terabytes, but it has a foul max file size of four gigabytes,
but it offers no encryption. The M F s stands for virtual machine file system, the M F S is used primarily for virtual machines. Be spear in the SX, use VFX,
and they stored this images and snapshots of the file. So basically it thinks that it's an actual hard drive, but it's in all reality. It's a file. Whenever you used the EMS, we'll talk about Liam's a lot later on. But when we used the EMS, you take that file and it uses it as if it's a hard drive,
because it saves it as a file. It allows service to be able to read and write to it at the exact same time.
The F S has a maximum size of 64 terabytes, max file size two terabytes, and it doesn't offer encryption.
The F S defense was created by some microsystem and is primarily a false system and logical volume manager.
It does protect against that a corruption as the primary means of using C. F s. That weight keeps your files from becoming corrupt.
And it supports hi storage capacity. Most of times, the F s is used in Lenox. It's not using Windows, but the F S has a match volume size of 16. Edit by
Max File size of 16 advice, but it does not offer encryption. The next one that we have is the ex D N E. X T was primarily created for Lennox itself.
It doesn't
offer encryption, but it was based off the Lenox system.
Yes, he is a default false system whenever it comes to Lennox
Currently, right now we're using e x t four
e x t four offers one gotta bite. It also has a Maxwell size of 32 petabytes,
and it offers no encryption
on this lesson. We talked about the stories types in configuration. We talked about Terry.
We also talked about raid and how rate is implemented inside of a network. And we talked about the different follow system types. This library, I t my missus Lingam, and I hope you guys learned a lot
Up Next