Illustrate basic strategy used in raid, Computer Engineering

Assignment Help:

Q. Illustrate Basic strategy used in RAID?

Basic strategy used in RAID is to replace large capacity disk drive with multiple smaller capacity disks. Data on these disks is distributed to allow concurrent access so improving overall input/output performance. It also provides an easy way of incrementing capacity of the disk. Please note that one of the major features of design is to compensate for increase in probability of failure of multiple disks by the use of parity information. Seven levels of RAID are given in Figure displayed above. Please note that levels 2 and 4 aren't commercially offered.

In RAID technologies have 2 significant performance considerations:

  • Data Transfer Rate
  • I/O Request rate

High data transfer rate depends on:

  • Path between particular disks and Memory.
  • Fulfilment of an I/O request by multiple disks of disk array. Therefore increasing the transfer rate.

I/O request rate is defined as time taken to fulfil an I/O request. This is a significant consideration while dealing with transaction processing systems such as Railway reservation system. A high I/O request rate can be acquired through distributing data requests on multiple disks.


Related Discussions:- Illustrate basic strategy used in raid

Differentiate between exception and validation testing, Differentiate betwe...

Differentiate between exception and validation testing. - Validation testing is done to test the software in conformance to the needs specified. It aims to demonstrate that the

Explain about decimal numbers, Q. Explain about Decimal Numbers? Deci...

Q. Explain about Decimal Numbers? Decimal number system has 10 digits signified by 0,1,2,3,4,5,6,7,8 and 9. Any decimal number can be signified as a string of these digits an

Additions of numbers by using 2’s complement, Add +25 to -15 by using 2's c...

Add +25 to -15 by using 2's complement ? Ans. Firstly convert the numbers 25 and 15 in its 8-bit binary equivalent and determine the 2's complement of 15, after that add +25 to -

Linq file extension, What is the LINQ file extension that interacts with Co...

What is the LINQ file extension that interacts with Code Behind objects. Ans) its .dbml

State the use parameters and parameter definition modules, State the Use pa...

State the Use parameters and parameter definition modules. Parameters aren't preprocessor definitions and they have scope (for example parameters are associated with specific

What are the components of loadrunner, The workings of LoadRunner are The V...

The workings of LoadRunner are The Virtual User Generator, Controller, and the Agent process, LoadRunner examines and Monitoring, LoadRunner Books Online. What Component of LoadRun

Explain debug monitors, Explain Debug monitors. Debug monitors give d...

Explain Debug monitors. Debug monitors give debugging support for a program. A debug monitor executes the program being debugged in its own control thereby giving execution e

By which MTU is specified, MTU is specified by? MTU is specified by har...

MTU is specified by? MTU is specified by hardware technology.

Discuss about the bus and memory transfer, Discuss about the Bus and Memory...

Discuss about the Bus and Memory Transfer A read action implies transfer of information to outside environment from a memory word, whereas storage of information inside memory

Micooperation, please suggest me ,how to write microopertions,and study for...

please suggest me ,how to write microopertions,and study for computer architecture

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd