pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

RAID Configuration Advances from FASTA (Part I)

I recently came across some valuable research from a publication from FASTA Universidad in Buenos Aires, which focus on new developments in RAID configurations. I will share the research in two separate articles to make it more digestible.

Over the past eight years, the Research Group on Operative Systems and Computer Forensics of Universidad FASTA in Buenos Aires has been trying to define and improve a Unified Process of

Information Retrieval (PURI) for RAID systems. This initial work was extended to adapt it and

apply it to Smart-phones as well as to Distributed Systems.

During the development of this process, aspects of computer forensics were detected with

tools called “lacking niches”.

Undergraduate and graduate school students presented a number of projects on these RAID systems.

In the study of Distributed Systems and Cloud Computing environments, the following issues were analyzed:

  • distributed computing environments
  • The presence of servers and their impact
  • Specific types of machines or cloud systems.

One topic that gained special interest, both for the technical challenge

as well as by the need of computer experts, was the reconstruction of disk arrays.

The use of RAID arrays with both medium to large storage capacities, presents several challenges to

forensic computer scientists, including those who do not have the capacity to

store sufficient RAID volume for their projects. There isn’t a reliable procedure for the acquisition

of RAID arrangements.

If the correct procedures are not followed,

the array becomes little more than a worthless stack of disks (or disk images), as it would be difficult to access information in a coherent manner.

In the most recent paper they published, basic concepts of RAID and file systems have been presented.

The simulations required the use of a problem situation, a test environment and a proposed technique for performing the test.

THEORICAL FRAMEWORK

RAID fixes

RAID (Redundant Array of Independent Disks) is a technology that allows you to combine

multiple storage devices and basically merges them into a single, consolidated disk for all intents and purposes. RAID establishes a synergy between the devices that make up the array,

providing the following advantages:

? Performance: the joint operation of the multiple devices enables the use of parallel read and write operations, which would not be possible with a single device.

? Speed: a higher transfer rate is achieved by distributing the data across multiple devices.

? I/O operations per second: when you can parallelize access to the devices.

plots on different disks more operations can be responded to

on the disks.

? Fault tolerance: RAID, in some of its modes of operation, allows for

redundancy in the data. In these cases the failure of a disk does not compromise the

information, but the performance is degraded to replace the device and

restore the arrangement.

? Capacity: as a result of combining the devices, a device is obtained.

equal to or larger than each of the individual devices.

? Cost-effectiveness: these characteristics are obtained from combining real disks with a relatively low cost. If you were looking for a real unique device with the same

features that a disk array, if it existed, then it would probably be a lot

more expensive. Therefore, RAID arrays have a much lower cost per data unit of storage.

The RAID configuration used will determine the extent of which the data is reinforced.

As this followup article we will write will show, there are some inefficient configurations that sacrifice the capacity

of storage for redundancy, or vice versa (sacrifice redundancy for greater capacity

of storage). There are also configurations that establish a balance between capacity

and redundancy, but they come with a tradeoff of lower performance.

The configuration metadata of the disks that make up a RAID array are stored in

a structure called superblock RAID, or DDF structure according to the nomenclature of the

SNIA. This structure stores the relevant information to determine which arrangement and

virtual drive belongs to each disk, as well as the configuration parameters, parity type,

band size, cache and other factors.

Filed Under: Communications

Latest Articles

Keep your Computer free from Viruses and More

Computer technology is advancing at a blistering pace, with each new year bringing stunning leaps and bounds over the previous year's already amazing software and hardware. But there is one problem that plagues computers no matter how advanced they are: Viruses. Viruses come in many forms, … [Read More...]

IT Security Rules for Small Business to Consider

IT Security is not just for big business. Small businesses are just as susceptible as their larger counter parts. In fact, there are times were they are more easily prayed upon by cyber criminals. Make sure your business is not prone to security failures by following these basic steps. Know Where … [Read More...]

Photo Retouching

While scanners provide an effective means of capturing colour images, that's often just the beginning. Once a photograph, for example, has been digitised, its appearance can be dramatically altered by use of a bitmap editor or paint … [Read More...]

Everything You Need to Know About Sourcing Circuit Boards From U.S. Suppliers

In This Article This article includes: Why Source PCBs From the United States?How to Get a Quote From a U.S.-Based PCB ManufacturerThe Top U.S. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Smart Protection Tips Against Cloud Hack

It’s only few months that iCloud had been popular all over the world courtesy of some Hollywood celebrities. However, what happened is really not in a … [Read More...]

WAP Technology

Also crucial to making net access viable from mobile wireless devices is WAP, the Wireless Application Protocol. WAP is a … [Read More...]

Video Tutorials to Help Canva Users Shorten their Learning Curve

Canva is a very popular design software that is used by over 55 million designers. It is a robust application, but it can be tricky for beginners to … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors