Raid and its working, DOT NET Programming

Assignment Help:

What is RAID and how does it work?

The Redundant Array of Independent Disks (RAID) is a term used for describing the technique of improving data availability through the use of arrays of the disks and various data-striping methodologies. The Disk arrays are the groups of disk drives that work together to achieve higher data-transfer and I/O rates than those provided by single large drives.The array is a set of multiple disk drives plus a specialized controller (an array controller) that keeps the track of how data is distributed across the drives. The Data for a particular file is written in segments to the different drives into the array rather than being written to a single drive.

For reliability and speed,it is always better to have more disks. When these disks are arranged in a certain patterns and are use a specific controller, they are known as Redundant Array of Inexpensive Disks (RAID) set. There are various numbers associated with the RAID, but the most common are 1, 5 and 10.

The RAID 1 works by duplicating the same writes on two hard drives. Let us assume that you have two 20 Gigabyte drives. In RAID 1, the data is written at the same time to both the drives. The RAID1 is optimized for fast writes.

The RAID 5 works by writing the parts of data across all the drives in the set (it requires atleast three drives). If a drive failed, then the entire set would be worthless. To combat this problem, one of the drives stores a "parity" bit. Think of a math problem, such as 3 + 7 = 10. You may think of the drives as storing one of the numbers, and the 10 is the parity part. By removing anyone of the numbers, you can get it back by referring to the other two, like : 3 + X = 10. Of course, losing more than one could be evil. The RAID 5 is optimized for reads.

The RAID 10 is a bit of a combination of both the types. It does not store a parity bit, Therefore it is faster, but it duplicates the data on two drives to be safe. You require at least four drives for RAID 10. This type of RAID is probably the best compromise for a database server.


Related Discussions:- Raid and its working

It systems analyst, Project Description: Someone to review all our IT sy...

Project Description: Someone to review all our IT systems / dfs replication / set up/ backups etc and give a report. Skills required: SQL, Microsoft Exchange, Windows Serv

Namespace-difference between namespace & assembly, NameSpace Namespace co...

NameSpace Namespace consists of 2  main basic functionality :- NameSpace Logically types group , ex. System.Web.UI logically groups our UI related features. In Object O

I need unity 3d texture painting plug-in, Project Description: I require...

Project Description: I require a custom texture painting plug-in for the latest version of Unity 3D. The project can have features that are common in Photoshop and Mari for pain

Checking for validity of an expression - c# program, Checking for validity ...

Checking for validity of an expression - C# Program Hello can you please provide me some examples regarding to the Checking for validity of an   expression in C#.

I need desktop app for website, I need Desktop App for website Project D...

I need Desktop App for website Project Description: We own a big website. Basically we want a desktop app or mobile app for our website. So people download and have our websi

Develop skype recorder application, Develop Skype Recorder Application + Se...

Develop Skype Recorder Application + Setup + Sourcecode + NICE UI Project Description: i need an application built which will allow user to record skype audio or video calls

Asp.net 2.0 application port to asp.net mvc, ASP.NET 2.0 application port t...

ASP.NET 2.0 application port to ASP.NET MVC Project Description: Legacy ASP.NET application for managing tasks for a private client needs a complete re-write. The applicat

Component diagrams, Explain Component diagrams Package: - The Pa...

Explain Component diagrams Package: - The Package logically make group of element of a UML model. Component: - It is the actual physical module or implementation of

How does cas works, How does CAS works? There are two key methods of CA...

How does CAS works? There are two key methods of CAS security policy- code groups and permissions. A code group contains assemblies in it in a manner that each .NET assembly is

Need data stream from laptop to phone, Need Data Stream from Laptop to Phon...

Need Data Stream from Laptop to Phone Project Description: I have a notepad file that is automatically generated in a set file name and format by acquisition software and wri

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd