Sunday, July 12, 20:06
Home inet #1 RAID Devices: Advantages, Disadvantages, and Categories

#1 RAID Devices: Advantages, Disadvantages, and Categories

Today consumers are accustomed to having direct and uninterrupted access to online services. As a service manager, you have the ability to choose between many kinds of systems and infrastructures for critical online applications. One of the features that the administrator needs to consider is RAID, but more important is the choice of the RAID setup structure.

raid-diataxseis-pleonekthmata-meionekthmata

RAID, originally from the redundant array of independent (or inexpensive) disks, is a disk subsystem that keeps the files on multiple disks and succeeds higher speeds, fault tolerance or even 2 together.

There are two ways to implement a RAID layout: Hardware or Software.

Managing a hardware layout is done by a dedicated hardware controller on which the disks are connected. The controller does its own calculations as it has a microprocessor built into it to avoid overloading the system. Nowadays, however, today's processors have evolved so much that this privilege is virtually unnecessary. However, a controller provides an extra level of security with the Battery Backup Unit (BBU), as in the event of an unexpected power failure, no records are lost.

The RAID software is through the operating system and is the most cost-effective way to implement it as it does not require additional hardware resources.

Below we can see one of the simplest RAID devices used, while in our next article, we will analyze even more provisions.

RAID 0 (Disk striping):

The RAID 0 device shares the data on 2 or above drives, known as striping, allowing for greater data throughput. Each file is read by multiple disks by combining the speed of all media together. However, it does not provide some kind of error tolerance as it does not keep copies of the files nor parity info (more about parity in next article). Both or more disks appear as a partition, so if one is spoiled, it spoils the entire array, leading to data loss. This layout is usually used to record live streams where speed comes first while reliability is second.

The sequel to the article ... in the link below.

1 COMMENT

LEAVE ANSWER

Please enter your comment!
Please enter your name here

SecNews
SecNewshttps://www.secnews.gr
In a world without fences and walls, who needs Gates and Windows

LIVE NEWS

TrickBot malware accidentally warns victims that they have been infected

The famous TrickBot malware accidentally left a test module that warns the victims that they are infected and should contact ...

Financial institutions: The risk of data breach is higher!

According to a report, financial institutions tend to be at greater risk of data breach due to a lack of proper security controls ....

Google Chrome: Import, export and backup stored passwords

Google Chrome Password Manager lets you save usernames and passwords and ...

Apple: do not cover the camera on MacBook devices

Many users today have a habit of covering their laptop camera in order to protect themselves from any surveillance through it. However...

COVID-19-workplace: What can you do to avoid becoming a source of infection?

The number of COVID-19 cases worldwide seems to be increasing. However, most countries have ...

The best books of 2020, according to Amazon

If you like good books and are looking for new additions to your collection, choose from the 5 best books, according to ...

US Secret Service: Warns of increased attacks on MSPs

In June, the US Secret Service warned the private sector as well as government agencies that there has been a worrying increase ...

Create an imaginative meme and win a OnePlus Nord

One of the most anticipated financial smartphones of OnePlus, the OnePlus Nord, is going to be presented soon at an event that will take place ...

Sony: Invest $ 250 Million in Fortnite Epic Games!

Sony has made an investment of $ 250 million to acquire a 1,4% stake in Epic Games, ...

C-Data FTTH OLT devices contain backdoors

Serious vulnerabilities and backdoors were discovered by two security researchers in the firmware of 29 FTTH OLT devices, the popular equipment provider C-Data.