pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

RAID Configuration Advances from FASTA (Part I)

I recently came across some valuable research from a publication from FASTA Universidad in Buenos Aires, which focus on new developments in RAID configurations. I will share the research in two separate articles to make it more digestible.

Over the past eight years, the Research Group on Operative Systems and Computer Forensics of Universidad FASTA in Buenos Aires has been trying to define and improve a Unified Process of

Information Retrieval (PURI) for RAID systems. This initial work was extended to adapt it and

apply it to Smart-phones as well as to Distributed Systems.

During the development of this process, aspects of computer forensics were detected with

tools called “lacking niches”.

Undergraduate and graduate school students presented a number of projects on these RAID systems.

In the study of Distributed Systems and Cloud Computing environments, the following issues were analyzed:

  • distributed computing environments
  • The presence of servers and their impact
  • Specific types of machines or cloud systems.

One topic that gained special interest, both for the technical challenge

as well as by the need of computer experts, was the reconstruction of disk arrays.

The use of RAID arrays with both medium to large storage capacities, presents several challenges to

forensic computer scientists, including those who do not have the capacity to

store sufficient RAID volume for their projects. There isn’t a reliable procedure for the acquisition

of RAID arrangements.

If the correct procedures are not followed,

the array becomes little more than a worthless stack of disks (or disk images), as it would be difficult to access information in a coherent manner.

In the most recent paper they published, basic concepts of RAID and file systems have been presented.

The simulations required the use of a problem situation, a test environment and a proposed technique for performing the test.

THEORICAL FRAMEWORK

RAID fixes

RAID (Redundant Array of Independent Disks) is a technology that allows you to combine

multiple storage devices and basically merges them into a single, consolidated disk for all intents and purposes. RAID establishes a synergy between the devices that make up the array,

providing the following advantages:

? Performance: the joint operation of the multiple devices enables the use of parallel read and write operations, which would not be possible with a single device.

? Speed: a higher transfer rate is achieved by distributing the data across multiple devices.

? I/O operations per second: when you can parallelize access to the devices.

plots on different disks more operations can be responded to

on the disks.

? Fault tolerance: RAID, in some of its modes of operation, allows for

redundancy in the data. In these cases the failure of a disk does not compromise the

information, but the performance is degraded to replace the device and

restore the arrangement.

? Capacity: as a result of combining the devices, a device is obtained.

equal to or larger than each of the individual devices.

? Cost-effectiveness: these characteristics are obtained from combining real disks with a relatively low cost. If you were looking for a real unique device with the same

features that a disk array, if it existed, then it would probably be a lot

more expensive. Therefore, RAID arrays have a much lower cost per data unit of storage.

The RAID configuration used will determine the extent of which the data is reinforced.

As this followup article we will write will show, there are some inefficient configurations that sacrifice the capacity

of storage for redundancy, or vice versa (sacrifice redundancy for greater capacity

of storage). There are also configurations that establish a balance between capacity

and redundancy, but they come with a tradeoff of lower performance.

The configuration metadata of the disks that make up a RAID array are stored in

a structure called superblock RAID, or DDF structure according to the nomenclature of the

SNIA. This structure stores the relevant information to determine which arrangement and

virtual drive belongs to each disk, as well as the configuration parameters, parity type,

band size, cache and other factors.

Filed Under: Communications

Latest Articles

DVD+R

The first DVD+RW drives had no capability to write to write-once DVD media. However, in early 2002 Verbatim became the first media maker to offer DVD+RW technology in both the ReWritable and Write-once formats. Like their DVD+RW media, the … [Read More...]

AMD Duron

Ever since AMD's repositioning of its Socket 7 based K6-III processor for exclusive use in mobile PCs in the second half of 1999, Intel's Celeron range of processors had enjoyed a position of dominance in the low-cost market segment. In … [Read More...]

share mac with windows

Sharing Folders from Mac OS X to Windows

People that are accustomed to working in Windows environments often cringe when having to work with Mac computers. But, sharing folders from OS X with Windows computers is not the pain that it used to be. OS X has native support for the Microsoft Server Message Block. This means you can configure a … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Five Tips to Convert Servers to Virtualization

Virtualization has become a popular topic in the business world. It makes sense on so many levels, and, therefore, it has been on the mind of many … [Read More...]

Updating Your Creative Soundcard Drivers

It's wise to check periodically to see if updated drives have been released for your sound card. For the Creative Audigy card, this means going to … [Read More...]

HDD Regenerator Review

HDD Regenerator HDD Regenerator is a program that is needed by all data recovery professionals. It's not really meant to recover files, but it is … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors