Raid and its working, DOT NET Programming

What is RAID and how does it work?

The Redundant Array of Independent Disks (RAID) is a term used for describing the technique of improving data availability through the use of arrays of the disks and various data-striping methodologies. The Disk arrays are the groups of disk drives that work together to achieve higher data-transfer and I/O rates than those provided by single large drives.The array is a set of multiple disk drives plus a specialized controller (an array controller) that keeps the track of how data is distributed across the drives. The Data for a particular file is written in segments to the different drives into the array rather than being written to a single drive.

For reliability and speed,it is always better to have more disks. When these disks are arranged in a certain patterns and are use a specific controller, they are known as Redundant Array of Inexpensive Disks (RAID) set. There are various numbers associated with the RAID, but the most common are 1, 5 and 10.

The RAID 1 works by duplicating the same writes on two hard drives. Let us assume that you have two 20 Gigabyte drives. In RAID 1, the data is written at the same time to both the drives. The RAID1 is optimized for fast writes.

The RAID 5 works by writing the parts of data across all the drives in the set (it requires atleast three drives). If a drive failed, then the entire set would be worthless. To combat this problem, one of the drives stores a "parity" bit. Think of a math problem, such as 3 + 7 = 10. You may think of the drives as storing one of the numbers, and the 10 is the parity part. By removing anyone of the numbers, you can get it back by referring to the other two, like : 3 + X = 10. Of course, losing more than one could be evil. The RAID 5 is optimized for reads.

The RAID 10 is a bit of a combination of both the types. It does not store a parity bit, Therefore it is faster, but it duplicates the data on two drives to be safe. You require at least four drives for RAID 10. This type of RAID is probably the best compromise for a database server.

Posted Date: 9/24/2012 4:26:45 AM | Location : United States

Related Discussions:- Raid and its working, Assignment Help, Ask Question on Raid and its working, Get Answer, Expert's Help, Raid and its working Discussions

Write discussion on Raid and its working
Your posts are moderated
Related Questions
Can we get a strongly typed resource class? You can now get strongly types classes in the VS.NET intellisense as shown in the figure below. Figure: - Strongly typed re

What are the naming conventions required for XML elements tags? The following are the naming conventions that need to be followed for XML elements tags: Element names should

What is an interface and what is an abstract class? Please, expand by examples of using both. Explain why.   In a interface class, all methods are abstract without execut

Web Developer Project Description: We need of an expert web developer for long term association, please apply with models if you have the subsequent skills: ASP.NET MVC 3

wiConstellation WEB site Project Description: Creation of a dynamic corporate WEB site with administration panel, requirement collaboration, product definition, Q&A, user man

Project Description: I need a simple app developed using C# or PHP which will talk to Tally ERP 9 using XML over HTTP. Only those who are well versed with Tally ERP 9 and its

Describe the services that UDDI provides to Web applications. UDDI gives the following types of services to a Web application: XML Schema for business descriptions - Contain

How can you implement a condition in a workflow? You can implement a condition by using either of the following ways: By creating a rule condition - Specifies that you can e

Web application and XML data storage One person should create a library (Java package of classes) for managing the list of bibliography entries, and for saving and loading th

What is black box testing & White box testing? The Black box testing is also termed as functional testing. It ignores how the internal functionality of a system works & depends