Tuesday, September 29, 23:44
Home inet #1 RAID Devices: Advantages, Disadvantages, and Categories

#1 RAID Devices: Advantages, Disadvantages, and Categories

Today consumers are accustomed to having direct and uninterrupted access to online services. As a service manager, you have the ability to choose between many kinds of systems and infrastructures for critical online applications. One of the features that the administrator needs to consider is RAID, but more important is the choice of the RAID setup structure.

raid-diataxseis-pleonekthmata-meionekthmata

RAID, originally from the redundant array of independent (or inexpensive) disks, is a disk subsystem that keeps the files on multiple disks and succeeds higher speeds, fault tolerance or even 2 together.

There are two ways to implement a RAID layout: Hardware or Software.

Managing a hardware layout is done by a dedicated hardware controller on which the disks are connected. The controller does its own calculations as it has a microprocessor built into it to avoid overloading the system. Nowadays, however, today's processors have evolved so much that this privilege is virtually unnecessary. However, a controller provides an extra level of security with the Battery Backup Unit (BBU), as in the event of an unexpected power failure, no records are lost.

The RAID software is through the operating system and is the most cost-effective way to implement it as it does not require additional hardware resources.

Below we can see one of the simplest RAID devices used, while in our next article, we will analyze even more provisions.

RAID 0 (Disk striping):

The RAID 0 device shares the data on 2 or above drives, known as striping, allowing for greater data throughput. Each file is read by multiple disks by combining the speed of all media together. However, it does not provide some kind of error tolerance as it does not keep copies of the files nor parity info (more about parity in next article). Both or more disks appear as a partition, so if one is spoiled, it spoils the entire array, leading to data loss. This layout is usually used to record live streams where speed comes first while reliability is second.

The sequel to the article ... in the link below.

1 COMMENT

LEAVE ANSWER

Please enter your comment!
Please enter your name here

SecNews
SecNewshttps://www.secnews.gr
In a world without fences and walls, who needs Gates and Windows

LIVE NEWS

How to use the YEAR function in Microsoft Excel

If you need to quickly export the year from a date in Microsoft Excel, you can use the YEAR function. This will ...

5G: Nokia wins deal after Huawei shut down!

Nokia has signed a major 5G agreement with the largest British telecommunications group BT, after the exclusion of Huawei!

Palmerworm hackers have been hiding in corporate networks for months

The company Symantec reported that the attacks against organizations in the USA, Japan, Taiwan and China are carried out with the aim of ...
00:01:52

Cannabis: Covid-19 has dramatically increased its users worldwide

The global pandemic seems to be driving consumers to cannabis, and vaporizer manufacturers are setting record sales. From newly established companies to ...

Security concern after Airbnb breach

Last week, the popular Airbnb platform reported a series of privacy breaches in its application, which endangered personal information ...

Bitcoin: Holder convicted of participating in fraud

A federal judicial committee has convicted a bitcoin exchange owner of participating in an online auction fraud. On September 28, a federal ...
00:01:58

Hackers attacked Washington public services

According to sources, hackers have launched an extensive, multifaceted cyber attack against the state of Washington. https://www.youtube.com/watch?v=R2vM0OqD6cE

How to connect Disney + with Google Assistant

Chromecast, Android TV and smart screens work great with Google Assistant. You can easily use your voice ...

Ransomware 2020: How have organizations around the world been affected?

Ransomware is one of the most dangerous and common threats facing organizations around the world. The ransomware attacks ...

An Amazon executive used corporate information for her personal transactions

On Monday, the SEC (US Securities and Exchange Commission) said that at least from January 2016 to July 2018, the ...