wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RAID and It's Levels

profile
VL Patel
Sep 12, 2024
0 Likes
0 Discussions
159 Reads
Let's understand the RAID first, RAID (Redundant Array of Independent Disks) is like having backup copies of your important files stored in different places on several hard drives or solid-state drives (SSDs). If one drive stops working, your data is still safe because you have other copies stored on the other drives. It’s like having a safety net to protect your files from being lost if one of your drives breaks down.
Now let's understand RAID with view of Database, RAID in a Database Management System (DBMS) is a technology that combines multiple physical disk drives into a single logical unit for data storage. The main purpose of RAID is to improve data reliability, availability, and performance. 
Some Keys Points of RAID to understand:-
1.Reliability: How many disk faults can the system tolerate? 
2.Availability: What fraction of the total session time is a system in uptime mode, i.e. how available is the system for actual use? 
3.Performance: How good is the response time? How high is the throughput (rate of processing work)? Note that performance contains a lot of parameters, not just the two. 
4.Capacity: Given a set of N disks each with B blocks, how much useful capacity is available to the user? 

There are Different RAID Levels that are as follows:-
RAID-0 (Stripping) 
RAID-1 (Mirroring) 
RAID-2 (Bit-Level Stripping with Dedicated Parity)
RAID-3 (Byte-Level Stripping with Dedicated Parity)
RAID-4 (Block-Level Stripping with Dedicated Parity) 
RAID-5 (Block-Level Stripping with Distributed Parity) 
RAID-6 (Block-Level Stripping with two Parity Bits).

Some Advantages of RAID are:-
1.Data Redundancy 
2.Scalability
3.Performance Enhancement.

Some Disadvantages of RAID are:-
1.Cost Factor is more
2.Complexity in terms of setup.
3.Decreased Performance in parity calculations in terms of RAID-5 and RAID-6.

Comments ()


Sign in

Read Next

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Risk factors in service transistion

Blog banner

RAID - LEVELS OF RAID

Blog banner

Crypto tax evasion

Blog banner

Computer Security

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Virtual memory

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

NETWORK SECURITY RISKS

Blog banner

Jio .....A Revolution ?? ??

Blog banner

The Right way of cooking

Blog banner

How Cyber Forensics use in AI

Blog banner

How to Conquer Depression ?

Blog banner

Process states

Blog banner

Deadlock and Starvation

Blog banner

Flipkart

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

What is Virtual Memory

Blog banner

Life of a 2020-2021 student

Blog banner

The application udemy

Blog banner

Virtual Machine

Blog banner

Modern Operating System

Blog banner

OS Evolution Achievements

Blog banner

Processing Crime and Incident Scenes

Blog banner

Measuring IT Risk

Blog banner

VIRTUAL MEMORY

Blog banner

INTERNET SECURITY

Blog banner

Evolution of the Microprocesor

Blog banner

Security issues

Blog banner

Memory management

Blog banner

Go Daddy

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

I/O Buffering

Blog banner

Python as a tool for Data science task & project

Blog banner

Retiring ISS

Blog banner

E-security systems | CCTV

Blog banner

Getting into Anime

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Deadlock

Blog banner

Tracking Emails & Email Crimes

Blog banner