wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

RAID

profile
Harshil Savaliya
Sep 09, 2024
0 Likes
0 Discussions
32 Reads

RAID (Redundant Array of Independent Disks) is like having backup copies of your important files stored in different places on several hard drives or solid-state drives (SSDs). If one drive stops working, your data is still safe because you have other copies stored on the other drives. It’s like having a safety net to protect your files from being lost if one of your drives breaks down.


RAID (Redundant Array of Independent Disks) in a Database Management System (DBMS) is a technology that combines multiple physical disk drives into a single logical unit for data storage. The main purpose of RAID is to improve data reliability, availability, and performance. There are different levels of RAID, each offering a balance of these benefits.

Key Evaluation Points for a RAID System

Reliability: How many disk faults can the system tolerate? 

Availability: What fraction of the total session time is a system in uptime mode, i.e. how available is the system for actual use? 

Performance: How good is the response time? How high is the throughput (rate of processing work)? Note that performance contains a lot of parameters, not just the two. 

Capacity: Given a set of N disks each with B blocks, how much useful capacity is available to the user


Comments ()


Sign in

Read Next

“CONSISTENCY” in Social Media Marketing

Blog banner

The seven-step improvement process

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Some facts about Technology

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Record Blocking

Blog banner

The Memory Hierarchy

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Monday. com App

Blog banner

CONCURRENCY

Blog banner

Install Ubuntu in Vmware

Blog banner

Multicore and multithreading 171

Blog banner

MYNTRA

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Child labour

Blog banner

GOOGLE

Blog banner

Ola

Blog banner

Virtual machine and virtualizing

Blog banner

SMARTSHEET

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

"Audit" In Data Science

Blog banner

Virtual Memory

Blog banner

Types of Malware in Cyber Security

Blog banner

Best password managers: Reviews of the top products

Blog banner

Microsoft Windows Overview

Blog banner

Decision Tree: A Diagram Model

Blog banner

What is HTML?

Blog banner

security controls

Blog banner

MODERN OPERATING SYSTEM

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Dove’s Real Beauty Campaign- Case Study

Blog banner

Question

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Dangers of Using Public WiFis

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

How to kiss

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner