Achieving Fault Tolerance Using Raid Technology

2916 words - 12 pages

Achieving Fault Tolerance Using RAID TechnologyData storage, integrity, and availability are critical concerns in enterprise network environments. A Single Large Expensive Drive (SLED) running in a network server is the network's single point of failure; if the hard drive crashes then the network crashes. Dependence on hard disk storage combined with the volatility of every hard disk's Mean Time between Failure (MTBF) has led to the widespread adoption of Redundant Arrays of Independent Disks (RAID) technology. RAID enables enterprises to take advantage of the fault tolerant data redundancy, improved availability and performance, and disk drive failover capability designed into disk array subsystems to maintain data integrity and availability before, during and after a hard disk failure.The Birth of RAIDThe RAID acronym was introduced in a 1988 paper by University of California at Berkeley scientists David Patterson, Garth Gibson, and Randy Katz proposing strategies to use an array of inexpensive disk drives that appear as a single logical disk to the host operating system to simplify disk management, boost disk Input/Output (I/O) performance, lower latency (the time it takes for a packet of data to get from one designated point to another), maintain data integrity, and maximize fault tolerance to recover from hard disk crashes beyond the capabilities of a SLED. The Redundant Array of Inexpensive Disks strategy has dominated the fault tolerant storage industry ever since. As the price of disk drives diminished, the RAID acronym later became Redundant Array of Independent Disks. RAID controllers, the hardware component that creates a RAID array from Just a Bunch of Disks (JBOD) sharing a common bus, continue to be a focal point of product development (Leider, 2001).Hard disk redundancy is the fault tolerance objective of implementing RAID technology in network servers as a form of online data backup in case of disk drive failure. If one array drive fails, a redundant failover drive can be automatically activated or a new drive can be inserted manually without turning the server off (hot swappable). The method of redundant drive activation depends on the level of RAID in operation (Advanced Computer & Network Corporation, 2005).RAID TerminologyThe data storage industry recognizes seven standard RAID levels, each designed for varying degrees of fault tolerance, I/O bandwidth, and storage capacity:•RAID Level 0: Striping without Fault Tolerance•RAID Level 1: Mirroring•RAID Level 2: Parallel Array, Hamming Code•RAID Level 3: Byte-Level Striping with Dedicated Parity Disk.•RAID Level 4: Block-Level Striping with Dedicated Parity Disk•RAID Level 5: Striping with Distributed Parity•RAID Level 6: Block-Level Striping with Dual Distributed ParityThe most widely used RAID levels are 0, 1, and 5. The remaining levels are rarely used in commercial environments. RAID levels can also be combined, or nested, for even...

Find Another Essay On Achieving Fault Tolerance Using RAID Technology

The Effect Of Decentralized Information On Programming Languages

1991 words - 8 pages Abstract The adaptive steganography approach to Byzantine fault tolerance is defined not only by the analysis of local-area networks, but also by the key need for the Internet [15]. In this work, we show the improvement of the transistor. In order to answer this problem, we prove that Smalltalk can be made random, scalable, and linear-time. Table of Contents 1) Introduction 2) Probabilistic Algorithms 3) Implementation 4) Results 4.1

Fault Tolerance Essay

1436 words - 6 pages Fault Tolerance is described as a design feature that allows a system to continue operating in spite of errors or problems that occur. "Many areas of fault tolerance are considered when designing or altering information systems. These include but are not limited to, power system, transaction journalizing, database shadowing or mirroring, raid technologies, network redundancy, and security to name a few" (UOP, 2005). Many organizations rely on

Dense Wavelength Division Multiplexing (DWDM) And Fiber Optic Technology

1179 words - 5 pages has pushed the telecommunications backbone to its limits. As seen in Figure A, the internet did not become very popular until mid-1999. These companies chose to implement high capacity SONET networks to alleviate their bandwidth limitations. By using Time Division Multiplexing (TDM), the SONET technology of that time allowed for the transfer of data at bit rates of 2.5 Gbps. Unfortunately, they were unable to foresee the immense augmentation in

Response of every Type of Software Error

1643 words - 7 pages of error are determined which allow service to be maintained. The approach presents a classification scheme for errors and techniques for the provision of software fault tolerance in real-time systems. For Error classification, errors will be classified according to a set of definitions, internal error that can be adequately handled by the process in which the error is detected. External error, that cannot be adequately handled by the process in

McBride Financial LAN Boise Location

2024 words - 8 pages Area Networks, making the technology affordable to more small businesses, but most small businesses are still using RAID configurations in servers to provide fault tolerance and tape backups using third party software (such as BrightStor ARCServe® or Veritas Backup Exec®) stored in offsite locations to provide disaster recovery. SBS adds some mechanisms to disk arrays and offsite backups that enhance data security. SBS contains Shadow

Cloud Computing

760 words - 4 pages enterprise use cloud computing to increase customer services. By using cloud computing, enterprise can stay in competitive and updates the business by using latest information technology environment. According to Richard Hill (2013) the enterprise cloud computing is the use of cloud computing for competitive advantage. The competitive advantage goes beyond savings in the procurement, management and maintenance of infrastructure, by providing a

Business Writing

861 words - 3 pages boldface, font changes, all caps, and dashes. Underlining draws the eye into a word and using italics and boldface provides an emphasis to the word. Changing to a different font adds interest. Printing works in all caps in the equivalent to shouting them. Dashes can also be effective in capturing attention. 7. List four techniques for achieving emphasis through style. Ch. 3 Four techniques for achieving emphasis through style are using

My Plans for Postgraduate Studies and Career Interests

593 words - 2 pages to achieve performance and responsiveness of the overall search engine. Here I have learned the concepts on parallel indexing through cluster columns so as achieving fault tolerance through row clusters. Working in this project also influenced me to pursue my postgraduate studies in the relevant research area.

To Discipline or Not Discipline

791 words - 4 pages and simply using it makes a person threatening.” (7) By classifying technology as dangerous as alcohol, drugs and weapons, Plunkett is creating the sense that any use of technology is hazardous to the health of students, which should be alarming to those in Silicon Valley. Electing to use words such as dangerous and threatening, Plunkett generates a sense of urgency to Silicon Valley and others to eradicate the zero tolerance policy in schools

The Audience's Response to 'Let him have it!' and 'The Daily Mail' in Peter Medak's Film

2923 words - 12 pages film is biased and influences how we think, it makes us see him as innocent and misled. The newspaper article emphasises on the shooting of the police officer and makes out that the raid was made by ‘gangsters’. Neither media sources say what happened without using hyperbole, generalising information or leaving certain information out to produce the information source that they want to.

mplementation of FSM-MBIST and Design of Hybrid MBIST for Memory cluster in Asynchronous SoC

1220 words - 5 pages . Programmable FSM based MBIST Architecture. International Journal of Digital Application & Contemporary research, Volume 1, Issue 7. NurQamarina Mohd Noor, Azilah Saparon,Yusrina Yusof. 2010. Programmable MBIST Merging FSM and Microcode Techniques Using Macro Commands. 25th International Symposium on Defect and Fault Tolerance in VLSI Systems. Said Hamdioui1, Ad J. van de Goor, Mike Rodgers. 2002. March SS: A Test for All Static Simple RAM Faults. Proceedings of the 2002 IEEE International Workshop on Memory Technology, Design and Testing. http://en.wikipedia.org/wiki/Discrete_wavelet_transform www.eng.auburn.edu

Similar Essays

Raid: Redundant Array Of Inexpensive Disks

963 words - 4 pages . RAID 1 mirrors the data across multiple disks without parity or stripping; resulting in the best possible fault tolerance and good read performance. However because of the mirrored nature of RAID 0, it has the worst space efficiency, where the useable capacity of a RAID 0 array is 50% of the available drives in the set. In addition there is a slight reduction in writing performance since the data has to written and verified to multiple disks

Redundant Array Of Independent Disks (More Commonly Known As A Rain Array)

2716 words - 11 pages regenerated onto this new drive in the array. The various levels of RAID architectures as described by Charles M. Kozierok are defined below.RAID is a method of combining several hard drives into one logical unit. It can offer fault tolerance and higher throughput levels than a single hard drive or group of independent hard drives. RAID stands for Redundant Array of Inexpensive (or sometimes "Independent") Disks.RAID is a mature technology that speeds

Various Levels And Types Of Raid

930 words - 4 pages mirroring. RAID-1 is a good choice for performance-critical, fault-tolerant environments. In addition, RAID-1 is the only choice for fault-tolerance if no more than two drives are desired.RAID Level 2 is intended for use with drives that do not have built-in error correction by implementing error correction on the RAID controller. Since all SCSI drives support built-in error detection, RAID-2 adds unnecessary overhead when using SCSI drives.RAID Level

Dsl Vs Cable Essay

2621 words - 10 pages Raid VIA KT133 ATX From: Bryan W Date: Wednesday, 18th October, 2000 Review: A memo to Wayne H, Most or all Vortex cards do not work with motherboards using the VIA KT 133, not Abit's fault, blame VIA *smile*.Rating: [5 of 5 Stars!] Product: Abit Socket A Ultra ATA100 Raid VIA KT133 ATX From: tore d Date: Sunday, 22nd October, 2000 Review: I've built alot of computers using different types of motherboards. By far this motherboard