pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Understanding the Seven Levels of RAID Arrays

I previously covered an article on the new research on RAID arrays, which has originated from FASTA Universidad. The latter half of their paper covers the different RAID levels that you should be aware of. Here is an overview of this very important research.

Learning the Nuances of the Seven Levels of RAID Arrays

The RAID specification is defined at seven different RAID levels. The seven RAID levels are as follows:

? RAID 0: RAID array disks are fragmented into chunks according to

bands, also called stripes, which allows the data handler to use the disks in parallel to

perform read/write operations on each disc. This RAID level provides

excellent performance, but no data redundancy.

? RAID 1: also called “mirror array”, defines a data disk and one or more disks.

Mirror disks are identical copies of the data disk and can be

automatically replaced if a fault occurs. This RAID level allows parallel reading

of the mirrored parts, but the main advantage of this way is that it

performs an “automatic backup” of the data disk to protect the information

against a physical rupture of all but one of the disks that make up the array.

? RAID 5: The disks in the RAID array are fragmented into bands, allowing the data handler to perform

parallel reading and writing on multiple disks. Each band

that corresponds to each disk is called chunk and an XOR function is calculated from the

N-1 chunks of band data. The parity chunk is distributed between disks for

different bands of the array, and thus prevents a single disc from loading with the array.

The writing task is associated with parity storage. This allows for better

performance of the entire array, as the use of the disks tends to be uniform. 

Parity chunks allow the array to withstand the failure of one of the disks and continue

running in degraded form, waiting for the disk to change, and reconstruct the

lost disk when a replacement disk is available. RAID 5 is a balance between

capacity, performance and data redundancy.

? RAID 6: can be considered a variant of RAID 5 where two RAIDs are calculated.

Different parity functions allow the data handler to recover the array even if two

Disks fail. Again, there is a delicate balance between capacity, performance and redundancy.

In particular, this level of RAID makes it possible to retrieve from the RAID.

There may be a case where a second disc is broken during reconstruction.

In levels 5 and 6 it is also necessary to specify how the chunks will be distributed.

There is also a parity between the different bands. Three standard algorithms are usually applied, as shown here: Left

Asymmetric, Left Symmetric and Right Asymmetric. The difference between the three lies in the mode

in which parity and order are distributed.

RAID can be implemented by both software and hardware. The implementations of

Software RAID allow flexibility and provide different advantages at different levels. There is usually a tradeoff with performance, since the tasks required to manage the disks and

parity calculation must be carried out by the operating system, introducing the processor

as part of the critical path of the storage system.

In the case of a hardware-implemented RAID, some degree of flexibility is lost.

Performance is gained: the operating system delegates the tasks of

administration and calculation to the RAID controller. The controller is exposed to the host as one or more virtual disks.

In addition, RAID controllers can be implemented to write caches and circuits.

This requires a specific calculation for the parity functions, which allow to bring the arrangement closer to the theoretical maximum performance.

Filed Under: Communications

Latest Articles

Intel 820 Chipset

Test - Originally scheduled to be available concurrently with the Pentium III processor in the spring of 1999, Intel's much delayed 820 chipset was finally launched in November that year. Those delays - which had left Intel in the position not having a chipset that supported the 133MHz … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these sectors. For example, a growing number of cryptocurrency traders regularly utilise a VPN, in order to encrypt their web traffic and data and minimise the … [Read More...]

Simple Data Encryption and Boost Protection

Nowadays it is more important than ever to have security and protection over all aspects of your PC. We've learned the hard way that even wealthy companies and government institutions are at risk for dishonest dealings and these people spend millions on data security each year. It may make … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Windows 10 is Coming

In case you have not heard, Windows 10 is about to be released to the masses. The new version is set to be released on July 29, 2015, and you can … [Read More...]

Developing a Python to Extract Data from Your Smartphone

Many times we ask ourselves: "What part of the universe is this phone from?", even if we already know where it is, but we don't know which operator. … [Read More...]

Local Bus Interfaces

Intel 80286 motherboards were capable of running expansion slots and the processor at different speeds over the same … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors