Raid and its working, DOT NET Programming

Assignment Help:

What is RAID and how does it work?

The Redundant Array of Independent Disks (RAID) is a term used for describing the technique of improving data availability through the use of arrays of the disks and various data-striping methodologies. The Disk arrays are the groups of disk drives that work together to achieve higher data-transfer and I/O rates than those provided by single large drives.The array is a set of multiple disk drives plus a specialized controller (an array controller) that keeps the track of how data is distributed across the drives. The Data for a particular file is written in segments to the different drives into the array rather than being written to a single drive.

For reliability and speed,it is always better to have more disks. When these disks are arranged in a certain patterns and are use a specific controller, they are known as Redundant Array of Inexpensive Disks (RAID) set. There are various numbers associated with the RAID, but the most common are 1, 5 and 10.

The RAID 1 works by duplicating the same writes on two hard drives. Let us assume that you have two 20 Gigabyte drives. In RAID 1, the data is written at the same time to both the drives. The RAID1 is optimized for fast writes.

The RAID 5 works by writing the parts of data across all the drives in the set (it requires atleast three drives). If a drive failed, then the entire set would be worthless. To combat this problem, one of the drives stores a "parity" bit. Think of a math problem, such as 3 + 7 = 10. You may think of the drives as storing one of the numbers, and the 10 is the parity part. By removing anyone of the numbers, you can get it back by referring to the other two, like : 3 + X = 10. Of course, losing more than one could be evil. The RAID 5 is optimized for reads.

The RAID 10 is a bit of a combination of both the types. It does not store a parity bit, Therefore it is faster, but it duplicates the data on two drives to be safe. You require at least four drives for RAID 10. This type of RAID is probably the best compromise for a database server.


Related Discussions:- Raid and its working

Read an array and perform sorting - c# program, Read an Array and perform S...

Read an Array and perform Sorting - C# program Can any one assist me in performing sorting of an array.

Difference b/w system.string and system.stringbuilder class, What are the d...

What are the difference b/w System.String and System.StringBuilder classes? The System.StringBuilder can have mutable string where a variety of operations can be performed whil

What is xpath, What is XPath? XPath stands for XML Path. It is a langua...

What is XPath? XPath stands for XML Path. It is a language used to access dissimilar parts of an XML document, such as elements and attributes.

Set up a ftp file server and active ftp file transfer, Set up a FTP File Se...

Set up a FTP File Server and active FTP File Transfer using VB.NET The Job Description is as given: 1. Manually set up a FTP file server on a remote server. 2. Manually ad

Tfs - spirateam synchronization plug-in, We would like you to develop the s...

We would like you to develop the subsequent requirements in one plug-in already in production. The plug-in was developed in Visual Studio 2010 .NET Framework 4 C# and synchronizes

How to avoid deadlock in threading?, Avoid deadlock in threading The be...

Avoid deadlock in threading The best  and careful planning may avoid deadlocks.There are so many ways Microsoft has provided by which you can decrease deadlocks for example Int

Create and populate a checkboxlist control, Question: (a) The ObjectDa...

Question: (a) The ObjectDataSource control is an alternative design approach to using AccessDataSource or SqlDataSource controls. Explain and illustrate how an ObjectDataSourc

Finding the eoq and tbo - c# program, Finding the EOQ and TBO - C# Program:...

Finding the EOQ and TBO - C# Program: Need summer assignment help on c#.

Sql injection, What is SQl injection? This is a Form of attack on the  ...

What is SQl injection? This is a Form of attack on the  database-driven Web site in which the attacker executes the unauthorized SQL commands by taking merits of insecure code

Find out circumference and area of a circle – c# program, Find out circumfe...

Find out circumference and area of a circle - C# Program Need Help in Assignment.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd