Raid and its working, DOT NET Programming

Assignment Help:

What is RAID and how does it work?

The Redundant Array of Independent Disks (RAID) is a term used for describing the technique of improving data availability through the use of arrays of the disks and various data-striping methodologies. The Disk arrays are the groups of disk drives that work together to achieve higher data-transfer and I/O rates than those provided by single large drives.The array is a set of multiple disk drives plus a specialized controller (an array controller) that keeps the track of how data is distributed across the drives. The Data for a particular file is written in segments to the different drives into the array rather than being written to a single drive.

For reliability and speed,it is always better to have more disks. When these disks are arranged in a certain patterns and are use a specific controller, they are known as Redundant Array of Inexpensive Disks (RAID) set. There are various numbers associated with the RAID, but the most common are 1, 5 and 10.

The RAID 1 works by duplicating the same writes on two hard drives. Let us assume that you have two 20 Gigabyte drives. In RAID 1, the data is written at the same time to both the drives. The RAID1 is optimized for fast writes.

The RAID 5 works by writing the parts of data across all the drives in the set (it requires atleast three drives). If a drive failed, then the entire set would be worthless. To combat this problem, one of the drives stores a "parity" bit. Think of a math problem, such as 3 + 7 = 10. You may think of the drives as storing one of the numbers, and the 10 is the parity part. By removing anyone of the numbers, you can get it back by referring to the other two, like : 3 + X = 10. Of course, losing more than one could be evil. The RAID 5 is optimized for reads.

The RAID 10 is a bit of a combination of both the types. It does not store a parity bit, Therefore it is faster, but it duplicates the data on two drives to be safe. You require at least four drives for RAID 10. This type of RAID is probably the best compromise for a database server.


Related Discussions:- Raid and its working

Connect a software application to a database backend, Connect a Software Ap...

Connect a Software Application to a Database Backend Acquire the knowledge and develop the skills needed to prototype an end user application using a rapid application dev

Name the proxy file to use a web service., Mention the name of the director...

Mention the name of the directory where it is essential to locate the proxy file to use a Web service. The proxy file must be kept in the /bin directory. This directory is situ

Ntier, The problem statement is pretty simple. We need a software implement...

The problem statement is pretty simple. We need a software implementation of a Point of Sale terminal at a typical store. The users of the system are the cashiers sitting at the sa

I need c# gmail api and wikia api, Project Description: I am preparing a...

Project Description: I am preparing a speech recognition program and need a quick code to get it done I am seeking for someone to create a Gmail API that can get subject, and co

In search of urgent assistance with loading an asp.net site, In search of u...

In search of urgent assistance with loading an ASP.net website In search of assistance with loading an ASP.net website installation onto a new server, job will start nearly D

What is a gateway, What is a gateway or Router? A node that is linked t...

What is a gateway or Router? A node that is linked to two or more networks is commonly called as router or Gateway. It generally forwards message from single network to another

Project baselines, What is a project baselines? The Project base line d...

What is a project baselines? The Project base line defines a logical closure of any deliverable or cycle. For example you have done the requirement phase with sign off from the

Different accessibility levels in .net, What are the different accessibilit...

What are the different accessibility levels in .NET? The five levels of access modifiers are as follows:- Private: The members of the class only have the access.

Asp.net authentication process, Can you explain how the ASP.NET authenticat...

Can you explain how the ASP.NET authentication process works?   The ASP.NET does not run by itself, it runs inside the process of the IIS. So there are 2  authentication layer

We need long term kentico developer, We need Long term Kentico developer ne...

We need Long term Kentico developer needed I want a solid Kentico developer that I can rely on to handle overflow work. Usually this will include about 5 hours of work each week

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd