0% found this document useful (0 votes)
14 views

Bengal College of Engineering and Technology: Report On Storage Strategies

Uploaded by

vatskumarsourav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Bengal College of Engineering and Technology: Report On Storage Strategies

Uploaded by

vatskumarsourav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

BENGAL COLLEGE OF

ENGINEERING AND TECHNOLOGY

REPORT ON STORAGE STRATEGIES

SUBMITTED BY
NAME: - VATS KR. SOURAV
SUBJECT: – DATABASE MANAGEMENT SYSTEM
SEMESTER: - 6TH (3RD YEAR)
UNIVERSITY ROLL NO.: - 12500221027
SUBMITTED TO: - PROF. DIPANKAR DAS
ACKNOWLEDGEMENT

I am overwhelmed in all humbleness and gratefulness to


acknowledge my depth to all those who have helped me to put
these ideas well above the level of simplicity and into something
concrete. I would like to express my special thanks of gratitude
to my teacher as well as our principal who gave me the excellent
opportunity to do this wonderful project on this topic, which
also helped me in doing a lot of Research and I came to know
about so many new things. I am thankful to them. Any attempt
at any level can ‘t be satisfactorily completed without the
support and guidance of my parents and friends.
CONTENTS

• Acknowledgement
• Abstract
• Introduction
• Methodology
• Discussion
• Application
• Conclusions
• References
Abstract

This paper explores effective storage strategies within data


storage management systems, examining various approaches to
optimize storage utilization, enhance data retrieval efficiency,
and ensure scalability. Through an analysis of different storage
architectures, tiering mechanisms, and data placement strategies,
we aim to provide insights into improving overall system
performance and addressing the evolving challenges in modern
data storage environments.
INTRODUCTION

Database Management System is the collection of interrelated


data/information or a set of programs that manages controls and
accesses the use of data. Through DBMS, users can manage the
data efficiently in a database to increase accessibility and
productivity. For example – Employee records and telephone
Books have all the different contacts saved in a single place very
efficiently.
So, a Database System is a software system, having an organized
collection of structured information, stored in a computer system.
It enables the user to create, maintain, define, and control access
to the database.
Uses of DBMS
• To increase productivity through real-time component data.
• For Reducing the data redundancy and inconsistency.
• To enhance data integrity.
• For Retrieving the data.
• For Data Security.
• For Data Indexing.
METHODOLOGY
Data storage management systems employ various strategies to
optimize storage. These include:

1. Tiered Storage: Utilizing different storage media based on


performance requirements. Frequently accessed data is stored on
high-performance disks, while less accessed data may reside on
slower, more cost-effective storage.

2. Compression and Deduplication: Reducing data size


through compression and eliminating duplicate data with
deduplication techniques to save storage space.

3. RAID (Redundant Array of Independent Disks):


Implementing RAID configurations for data redundancy and
improved performance. Different RAID levels offer various
trade-offs between redundancy, performance, and capacity.

4. Data Archiving: Moving infrequently accessed data to


archival storage to free up primary storage space. Archiving
involves long-term retention of data at a lower cost.
5. Cloud Storage: Leveraging cloud storage services for
scalability, accessibility, and cost-effectiveness. Hybrid storage
solutions combine on-premises and cloud storage for flexibility.

6. Snapshot and Backup: Creating point-in-time copies


(snapshots) and regular backups to ensure data availability and
recovery in case of failures or data corruption.

7. Storage Virtualization: Abstracting physical storage


resources into a virtualized layer, simplifying management, and
enabling dynamic allocation of storage resources.

8. Quality of Service (QoS): Prioritizing and allocating storage


resources based on application requirements, ensuring critical
workloads receive adequate performance.

9. Storage Monitoring and Analytics: Utilizing monitoring


tools to track storage performance, capacity, and health.
Analytics help in predicting and preventing potential issues.

10. Data Lifecycle Management (DLM): Managing data


through its entire lifecycle, from creation to deletion.
Automatically migrating or archiving data as it becomes less
critical or frequently accessed.
Strategic selection and implementation of these techniques
contribute to efficient data storage management, optimizing
performance, cost, and reliability.
DISCUSSION

Storage Types in DBMS


The records in databases are stored in file formats. Physically, the
data is stored in electromagnetic format on a device. The
electromagnetic devices used in database systems for data storage
are classified as follows:
1. Primary Memory
2. Secondary Memory
3. Tertiary Memory

1. Primary Memory

The primary memory of a server is the type of data storage that is


directly accessible by the central processing unit, meaning that it
does not require any other devices to read from it. The primary
memory must, in general, function flawlessly with equal
contributions from the electric power supply, the hardware
backup system, the supporting devices, the coolant that moderates
the system temperature, etc.
• The size of these devices is smaller, and they are volatile.
• According to performance and speed, the primary memory
devices are the fastest devices, and this feature is in direct
correlation with their capacity.
• These primary memory devices are usually more expensive
due to their increased speed and performance.

2. Secondary Memory

Data storage devices known as secondary storage, as the name


suggests, are devices that can be accessed for storing data that will
be needed at a later point in time for various purposes or database
actions. Therefore, these types of storage systems are sometimes
called backup units as well. Devices that are plugged or connected
externally fall under this memory category, unlike primary
memory, which is part of the CPU. The size of this group of
devices is noticeably larger than the primary devices and smaller
than the tertiary devices.

3. Tertiary Memory

For data storage, Tertiary memory refers to devices that can hold
a large amount of data without being constantly connected to the
server or the peripherals. A device of this type is connected either
to a server or to a device where the database is stored from the
outside.
• Tertiary storage provides more space than other types of
device memory but is most slowly performing, the cost of
tertiary storage is lower than primary and secondary. To make
a backup of data, this type of storage is commonly used for
making copies from servers and databases.
• The ability to use secondary devices and to delete the contents
of the tertiary devices is similar.

Some Interesting Facts:

• Researchers from the Uni of Michigan and the Uni of Illinois


conducted a study whereby they dropped USB sticks
containing HTML files that have image tags embedded in a
nearby car park. They found that 48% of the flash drives were
picked up and connected them to a PC. 68% of users
neglected to take any safety precautions or scans.
• The highest potential USB flash drive 3.0 today is 2 TB –
released by Kingston and known as the Data Traveler
Ultimate GT (generation terabyte).
• Trek Technology and IBM were the first to begin selling USB
flash drives 1.0 and, later, 1.1, in 2000.

Difficulties:

• Configuring, testing, and monitoring of system are required in


Network storage devices.
• Network storage devices are more complex to configure and
manage.
APPLICATION

1. Performance Optimization: Employing tiered storage


strategies ensures that frequently accessed data is stored on
high-performance devices, while less frequently accessed data
can be moved to slower but more cost-effective storage,
optimizing overall system performance.

2. Data Backup and Recovery: Implementing robust backup


and recovery strategies ensures data integrity and availability in
case of system failures or data corruption, enhancing overall
system reliability.

3. Cost Efficiency: Utilizing storage virtualization and data


deduplication strategies can help reduce storage costs by
efficiently managing data redundancy and optimizing storage
resources.

4. Scalability: Storage strategies enable systems to scale


seamlessly by accommodating growing data volumes.
Implementing scalable storage solutions ensures that the system
can handle increased workloads without sacrificing
performance.
5. Data Archiving: Archiving strategies involve moving
infrequently accessed data to long-term, cost-effective storage
solutions, freeing up primary storage for more critical and active
data. This helps in maintaining efficient storage usage.
CONCLUSION

In conclusion, effective storage strategies in data storage


management systems are crucial for optimizing performance,
ensuring data integrity, and managing costs. Balancing factors
like data access frequency, storage types (e.g., SSDs, HDDs),
and implementing tiered storage solutions can enhance overall
system efficiency. Regular monitoring, data compression, and
deduplication further contribute to an organized and efficient
storage infrastructure, meeting the evolving needs of data-driven
environments.
References
.
1 Data Storage and Querying in DBMS - GeeksforGeeks

2. Data Storage and its Sorts - GeeksforGeeks

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy