wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RAID

profile
Harshil Savaliya
Sep 09, 2024
0 Likes
0 Discussions
32 Reads

RAID (Redundant Array of Independent Disks) is like having backup copies of your important files stored in different places on several hard drives or solid-state drives (SSDs). If one drive stops working, your data is still safe because you have other copies stored on the other drives. It’s like having a safety net to protect your files from being lost if one of your drives breaks down.


RAID (Redundant Array of Independent Disks) in a Database Management System (DBMS) is a technology that combines multiple physical disk drives into a single logical unit for data storage. The main purpose of RAID is to improve data reliability, availability, and performance. There are different levels of RAID, each offering a balance of these benefits.

Key Evaluation Points for a RAID System

Reliability: How many disk faults can the system tolerate? 

Availability: What fraction of the total session time is a system in uptime mode, i.e. how available is the system for actual use? 

Performance: How good is the response time? How high is the throughput (rate of processing work)? Note that performance contains a lot of parameters, not just the two. 

Capacity: Given a set of N disks each with B blocks, how much useful capacity is available to the user


Comments ()


Sign in

Read Next

Know your Processors!

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Mental Health

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

All you need to know about Website Traffic

Blog banner

GIS REMOTE SENSING

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Beauty of indian railway

Blog banner

Modern Operating System

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

What is OS Fingerprinting?

Blog banner

Disk Scheduling

Blog banner

Music helps reduce stress

Blog banner

Data Visualization in Decision-Making

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Benefits and drawback of web security.

Blog banner

Network Security Risks

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Clustering Techniques

Blog banner

Security Threats Faced and Countermeasures adopted by Organizations to avoid them

Blog banner

Concurrency management in operating systems

Blog banner

Blockchain Transactions

Blog banner

Virtual memory

Blog banner

Memory Management

Blog banner

Instagram

Blog banner

Open Source Project By Google

Blog banner

Health and fitness in technology

Blog banner

Diwali

Blog banner

Memory Management

Blog banner

You'll get to know about Pankaj Negi

Blog banner

Banaras

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

A Deep Dive

Blog banner

Footprinting

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Webmail

Blog banner

Operating System Objectives and Functions

Blog banner

Docker Framework

Blog banner