pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Understanding the Seven Levels of RAID Arrays

I previously covered an article on the new research on RAID arrays, which has originated from FASTA Universidad. The latter half of their paper covers the different RAID levels that you should be aware of. Here is an overview of this very important research.

Learning the Nuances of the Seven Levels of RAID Arrays

The RAID specification is defined at seven different RAID levels. The seven RAID levels are as follows:

? RAID 0: RAID array disks are fragmented into chunks according to

bands, also called stripes, which allows the data handler to use the disks in parallel to

perform read/write operations on each disc. This RAID level provides

excellent performance, but no data redundancy.

? RAID 1: also called “mirror array”, defines a data disk and one or more disks.

Mirror disks are identical copies of the data disk and can be

automatically replaced if a fault occurs. This RAID level allows parallel reading

of the mirrored parts, but the main advantage of this way is that it

performs an “automatic backup” of the data disk to protect the information

against a physical rupture of all but one of the disks that make up the array.

? RAID 5: The disks in the RAID array are fragmented into bands, allowing the data handler to perform

parallel reading and writing on multiple disks. Each band

that corresponds to each disk is called chunk and an XOR function is calculated from the

N-1 chunks of band data. The parity chunk is distributed between disks for

different bands of the array, and thus prevents a single disc from loading with the array.

The writing task is associated with parity storage. This allows for better

performance of the entire array, as the use of the disks tends to be uniform. 

Parity chunks allow the array to withstand the failure of one of the disks and continue

running in degraded form, waiting for the disk to change, and reconstruct the

lost disk when a replacement disk is available. RAID 5 is a balance between

capacity, performance and data redundancy.

? RAID 6: can be considered a variant of RAID 5 where two RAIDs are calculated.

Different parity functions allow the data handler to recover the array even if two

Disks fail. Again, there is a delicate balance between capacity, performance and redundancy.

In particular, this level of RAID makes it possible to retrieve from the RAID.

There may be a case where a second disc is broken during reconstruction.

In levels 5 and 6 it is also necessary to specify how the chunks will be distributed.

There is also a parity between the different bands. Three standard algorithms are usually applied, as shown here: Left

Asymmetric, Left Symmetric and Right Asymmetric. The difference between the three lies in the mode

in which parity and order are distributed.

RAID can be implemented by both software and hardware. The implementations of

Software RAID allow flexibility and provide different advantages at different levels. There is usually a tradeoff with performance, since the tasks required to manage the disks and

parity calculation must be carried out by the operating system, introducing the processor

as part of the critical path of the storage system.

In the case of a hardware-implemented RAID, some degree of flexibility is lost.

Performance is gained: the operating system delegates the tasks of

administration and calculation to the RAID controller. The controller is exposed to the host as one or more virtual disks.

In addition, RAID controllers can be implemented to write caches and circuits.

This requires a specific calculation for the parity functions, which allow to bring the arrangement closer to the theoretical maximum performance.

Filed Under: Communications

Latest Articles

i915 Chipset

Announced at the same time as the i925X Express, the i915 Express chipset family - codenamed Grantsdale and comprising the i915P and i915G chipsets - have the same features as its sibling with the exception of some specific performance … [Read More...]

GPRS Technology

The difficulties the international industry standard bodies have had in approving all of the necessary standards has led to a delay in the deployment of 3G wireless systems. To lessen the impact of these delays, General Packet Radio Service … [Read More...]

Microsoft Debacle Emphasizes Importance of Quality Control in Software

Microsoft set off a chain of criticism when it rolled out its Windows update in 2018. This was a huge debacle that created a lot of frustration for countless customers, which reflected poorly on Microsoft’s brand image. Microsoft responded by assuring customers it would make quality control a … [Read More...]

Tips on How to Land a Remote Job in Cyber Security

The demand for skilled cyber security professionals is growing as well as a number of threats and risks. Any company needs an expert or team to … [Read More...]

Video Tutorials for Anyone Wanting to Learn About Big Data

Did you know that we create about 2.5 quintillion bytes of data every single day? There is no denying the fact that big data is changing our world in … [Read More...]

Video Tutorials to Help Canva Users Shorten their Learning Curve

Canva is a very popular design software that is used by over 55 million designers. It is a robust application, but it can be tricky for beginners to … [Read More...]

Great Videos to Learn About Cricut Design Space

Cricut Design Space is one of the best digital design applications for people trying to create projects for Cricut projects. You can create a lot of … [Read More...]

Great Videos on Dangerous Computer Viruses

Computer viruses are obnoxious programs that can wreak havoc on even the most sophisticated machines. The good news is that people will be better … [Read More...]

Best Creative Commons Videos on Learning Adobe Illustrator

Adobe Illustrator is one of the most popular design tools available. The tool has been around since 1987 and is used by over 90% of the world's … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Browser Hijacker: The I-beta.com Virus

The I-beta.com virus belongs to the classification of browser hijacker which is generally distributed by means of online free downloads. At first, it … [Read More...]

A Description and Explanation of Satellite Broadband and How It Works

Whilst the advent of its RADSL variant may have increased the range of ADSL from 3.5km to 5.5km, the fact is that the … [Read More...]

Secure Your Connection to the Internet with VPN

With all the news of people being spied on while using the Internet, it is no wonder that more people are looking for ways to secure their online … [Read More...]

[footer_backtotop]

Copyright © 2022 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors