wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RAID

profile
Harshil Savaliya
Sep 09, 2024
0 Likes
0 Discussions
32 Reads

RAID (Redundant Array of Independent Disks) is like having backup copies of your important files stored in different places on several hard drives or solid-state drives (SSDs). If one drive stops working, your data is still safe because you have other copies stored on the other drives. It’s like having a safety net to protect your files from being lost if one of your drives breaks down.


RAID (Redundant Array of Independent Disks) in a Database Management System (DBMS) is a technology that combines multiple physical disk drives into a single logical unit for data storage. The main purpose of RAID is to improve data reliability, availability, and performance. There are different levels of RAID, each offering a balance of these benefits.

Key Evaluation Points for a RAID System

Reliability: How many disk faults can the system tolerate? 

Availability: What fraction of the total session time is a system in uptime mode, i.e. how available is the system for actual use? 

Performance: How good is the response time? How high is the throughput (rate of processing work)? Note that performance contains a lot of parameters, not just the two. 

Capacity: Given a set of N disks each with B blocks, how much useful capacity is available to the user


Comments ()


Sign in

Read Next

10 Survival Tips that might save your life

Blog banner

Install Ubuntu in Vmware

Blog banner

OPERATING SYSTEM OBJECTIVES AND FUNCTIONS

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

USPS mail

Blog banner

What are Virtual Machines

Blog banner

How Men and Women Process Pain Differently

Blog banner

Why Friendship at Work is Important

Blog banner

Wedding photographer

Blog banner

RAID

Blog banner

What does the Australian summer have in store for your oral health?

Blog banner

Broken Authentication Attacks

Blog banner

Points to consider if you're planning to visit Florida in 2026

Blog banner

Operating system

Blog banner

Objectives and functions of Operating System...

Blog banner

Characteristics of Etherum

Blog banner

Types Of Interrupt

Blog banner

The launch of UniMap by HERE

Blog banner

Microsoft powerpoint presentation

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

How Cyber Forensics use in AI

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Asana

Blog banner

SMARTSHEET

Blog banner

Electronic Funds Transfer

Blog banner

MENDELEY

Blog banner

Web Site

Blog banner

Modern Operating Systems.

Blog banner

INTRODUCTION TO C#

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

RAID

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

Memory management

Blog banner

Computer security techniques

Blog banner

Assignment 2

Blog banner

Why Time Management Is the Secret to College Success (and How to Master It)

Blog banner

GraphX:- A graph processing tool

Blog banner

Travel: Everything Everywhere!

Blog banner

Data Visualization in Decision-Making

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Topic: Sessions in Operating system

Blog banner