wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RAID

profile
Harshil Savaliya
Sep 09, 2024
0 Likes
0 Discussions
32 Reads

RAID (Redundant Array of Independent Disks) is like having backup copies of your important files stored in different places on several hard drives or solid-state drives (SSDs). If one drive stops working, your data is still safe because you have other copies stored on the other drives. It’s like having a safety net to protect your files from being lost if one of your drives breaks down.


RAID (Redundant Array of Independent Disks) in a Database Management System (DBMS) is a technology that combines multiple physical disk drives into a single logical unit for data storage. The main purpose of RAID is to improve data reliability, availability, and performance. There are different levels of RAID, each offering a balance of these benefits.

Key Evaluation Points for a RAID System

Reliability: How many disk faults can the system tolerate? 

Availability: What fraction of the total session time is a system in uptime mode, i.e. how available is the system for actual use? 

Performance: How good is the response time? How high is the throughput (rate of processing work)? Note that performance contains a lot of parameters, not just the two. 

Capacity: Given a set of N disks each with B blocks, how much useful capacity is available to the user


Comments ()


Sign in

Read Next

Race Condition in Operating Theatre

Blog banner

Memory Management Techniques

Blog banner

Types of threads

Blog banner

Threads in OS

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Tools to support CSI activities

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Facebook marketing

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

RAID

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Memory Management

Blog banner

Data Lake

Blog banner

Self defence

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Types of Viruses

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

INTERNET SECURITY

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

What is Email? Uses of Emails

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

A little bit of salt is all the hash needs!

Blog banner

social media issue

Blog banner

Whatsapp Messenger

Blog banner

File Organization and Access

Blog banner

Short note on expert system

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

How to use open SSL for web server - browser communication

Blog banner

Social Engineering Attacks

Blog banner

Deadlocks in Operating Systems

Blog banner

BrainGate Technology

Blog banner

Meshoo

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Major achievement

Blog banner

SAVE TREES

Blog banner

Shoulders

Blog banner

Importance of education

Blog banner

Memory management

Blog banner

Risk mitigation and management

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner