pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Understanding the Seven Levels of RAID Arrays

I previously covered an article on the new research on RAID arrays, which has originated from FASTA Universidad. The latter half of their paper covers the different RAID levels that you should be aware of. Here is an overview of this very important research.

Learning the Nuances of the Seven Levels of RAID Arrays

The RAID specification is defined at seven different RAID levels. The seven RAID levels are as follows:

? RAID 0: RAID array disks are fragmented into chunks according to

bands, also called stripes, which allows the data handler to use the disks in parallel to

perform read/write operations on each disc. This RAID level provides

excellent performance, but no data redundancy.

? RAID 1: also called “mirror array”, defines a data disk and one or more disks.

Mirror disks are identical copies of the data disk and can be

automatically replaced if a fault occurs. This RAID level allows parallel reading

of the mirrored parts, but the main advantage of this way is that it

performs an “automatic backup” of the data disk to protect the information

against a physical rupture of all but one of the disks that make up the array.

? RAID 5: The disks in the RAID array are fragmented into bands, allowing the data handler to perform

parallel reading and writing on multiple disks. Each band

that corresponds to each disk is called chunk and an XOR function is calculated from the

N-1 chunks of band data. The parity chunk is distributed between disks for

different bands of the array, and thus prevents a single disc from loading with the array.

The writing task is associated with parity storage. This allows for better

performance of the entire array, as the use of the disks tends to be uniform. 

Parity chunks allow the array to withstand the failure of one of the disks and continue

running in degraded form, waiting for the disk to change, and reconstruct the

lost disk when a replacement disk is available. RAID 5 is a balance between

capacity, performance and data redundancy.

? RAID 6: can be considered a variant of RAID 5 where two RAIDs are calculated.

Different parity functions allow the data handler to recover the array even if two

Disks fail. Again, there is a delicate balance between capacity, performance and redundancy.

In particular, this level of RAID makes it possible to retrieve from the RAID.

There may be a case where a second disc is broken during reconstruction.

In levels 5 and 6 it is also necessary to specify how the chunks will be distributed.

There is also a parity between the different bands. Three standard algorithms are usually applied, as shown here: Left

Asymmetric, Left Symmetric and Right Asymmetric. The difference between the three lies in the mode

in which parity and order are distributed.

RAID can be implemented by both software and hardware. The implementations of

Software RAID allow flexibility and provide different advantages at different levels. There is usually a tradeoff with performance, since the tasks required to manage the disks and

parity calculation must be carried out by the operating system, introducing the processor

as part of the critical path of the storage system.

In the case of a hardware-implemented RAID, some degree of flexibility is lost.

Performance is gained: the operating system delegates the tasks of

administration and calculation to the RAID controller. The controller is exposed to the host as one or more virtual disks.

In addition, RAID controllers can be implemented to write caches and circuits.

This requires a specific calculation for the parity functions, which allow to bring the arrangement closer to the theoretical maximum performance.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Communications

Latest Articles

Popular Types of Computer Viruses

Computer viruses can wreck havoc to the operations of the computer. A computer virus is a type of malware that is intentionally written to gain entry into your computer, without your knowledge or permission. It has the capacity to modify or replicate itself, in which case it will continue spreading. … [Read More...]

CD-ROM File Systems

The Yellow Book does not actually specify how data is to be stored on, or retrieved from, CD-ROM. Over the years a number of such file systems have been developed for the CD-ROM's various operating system platforms. The most common of these … [Read More...]

Hard Disk Maintenance – Error Checking using Windows XP ScanDisk tools

Chkdsk.exe is a utility which verifies the logical integrity of a file system. In the event of the utility encountering logical inconsistencies in file system data, it will perform the necessary actions to repair the file system data. The equivalent utility in earlier versions of Windows … [Read More...]

Everything You Need to Know About Video Editing Programs

The demand for video marketing services is skyrocketing. In Europe alone, the market for video marketing is projected to be worth $673 million by … [Read More...]

The Impact of Modern Technology on Relationships

Technology has changed dating in tremendous ways. It has gradually become more immersed in the modern quest for intimacy. In 1995, only 2% of … [Read More...]

Benefits of Instagram as a Powerful Marketing Tool for B2B Brands

The ever-growing popularity of the social networking app Instagram makes it a popular channel for businesses to launch their services, advertising, … [Read More...]

6 Simple Ways to Improve Security of Windows Computers

Millions of Windows PC users experience some form of cybercrime every year. According to one study, there were 2,953 reported cyberattacks between … [Read More...]

2021 PC Hardware Releases to Bolster Your Gaming

If you are a PC gamer, then chances are you are looking to upgrade your kit over the coming year. However, a lot of money can go into building the … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Enhanced Dot Pitch Monitors

Developed by Hitachi, EDP is the newest mask technology, coming to market in late 1997. This takes a slightly different approach, concentrating more … [Read More...]

Merom – Intel’s mobile Core 2 Duo CPU technology guide

The announcement of the successor to the Intel Core Duo processor in the summer of 2006 also marked the reunification of Intel's desktop and … [Read More...]

Protect Your Business with Online Reputation Management

As a company grows the potential for negative comments online become more common. This type of activity needs to be monitored for potential issues.  … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors