Academic literature on the topic 'Redundant Arrays of Inexpensive Disks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Redundant Arrays of Inexpensive Disks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Redundant Arrays of Inexpensive Disks"

1

Malhotra, M., and K. S. Trivedi. "Reliability Analysis of Redundant Arrays of Inexpensive Disks." Journal of Parallel and Distributed Computing 17, no. 1-2 (January 1993): 146–51. http://dx.doi.org/10.1006/jpdc.1993.1013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patterson, David A., Garth Gibson, and Randy H. Katz. "A case for redundant arrays of inexpensive disks (RAID)." ACM SIGMOD Record 17, no. 3 (June 1988): 109–16. http://dx.doi.org/10.1145/971701.50214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Quaglia, Francesco, and Bruno Ciciani. "Performance vs. cost of redundant arrays of inexpensive disks." Simulation Practice and Theory 7, no. 2 (April 1999): 153–70. http://dx.doi.org/10.1016/s0928-4869(98)00026-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Graham, David Matthew, Michael James Graham, and Mel Mupparapu. "Use of redundant arrays of inexpensive disks in orthodontic practice." American Journal of Orthodontics and Dentofacial Orthopedics 151, no. 4 (April 2017): 816–20. http://dx.doi.org/10.1016/j.ajodo.2016.10.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khiat, Abdelhamid. "Cloud-oriented fault tolerance technique based on resource state." Multiagent and Grid Systems 17, no. 4 (March 7, 2022): 335–49. http://dx.doi.org/10.3233/mgs-220356.

Full text
Abstract:
In this paper, we propose a new cloud reactive fault management technique called Hybrid Redundant Array of Independent resources for cloud computing (H_RAIC). The latter uses a new concept called Redundant Array of Independent resources for cloud computing (CRAIR), which is inspired by a powerful conventional technique called Redundant Arrays of Inexpensive Disks (RAID). H_RAIC takes into consideration the cloud resources state and aims to satisfy both cloud users and cloud provider requirements. Our solution was compared with the replication technique which represents a specific case of CRAIR, and with other CRAIR levels defined in this paper. The results show that our technique is a promising solution, that can be used to meet both user and provider requirements.
APA, Harvard, Vancouver, ISO, and other styles
6

Newberg, L., and D. Wolfe. "String layouts for a redundant array of inexpensive disks." Algorithmica 12, no. 2-3 (September 1994): 209–24. http://dx.doi.org/10.1007/bf01185211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Elerath, Jon, and Michael Pecht. "A Highly Accurate Method for Assessing Reliability of Redundant Arrays of Inexpensive Disks (RAID)." IEEE Transactions on Computers 58, no. 3 (March 2009): 289–99. http://dx.doi.org/10.1109/tc.2008.163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Li Qiang. "A Method for RAID Availability Analysis Based on Bernoulli Trials." Applied Mechanics and Materials 701-702 (December 2014): 129–35. http://dx.doi.org/10.4028/www.scientific.net/amm.701-702.129.

Full text
Abstract:
With the processing speeds of processors increasing rapidly, the inefficiency of disk I/O performance has been becoming the bottleneck of computer systems and network transmission. So, Redundant Arrays of Independent (or Inexpensive) Disks (RAID) with the purpose of promoting disks parallel accessing , disks space utilization and user data availability has been adopted by DAS and SAN, and has been applied widely. However, the more quantity and capacity that disks have, the more mistakes that would take place, so RAID availability analysis has become an important and urgent issue. The paper proposed a set of availability computational modeling for RAID storage system via Bernoulli trials and binomial distribution. On the basis of it, it can be analyzed that combination orders and methods have an effect on RAID availability in the state of mixed combination; it also can be analyzed that disk quantity is associated with RAID availability. Both of them provide powerful decision support and theoretical foundation for user selecting RAID construction solution, and help users save cost of storage.
APA, Harvard, Vancouver, ISO, and other styles
9

JUMANI, Vish. "Redundant Array of Inexpensive Disks (RAID): Technology Description, Characterizations, Comparisons, Usage and Cost Benefits." Journal of the Magnetics Society of Japan 18, S_1_PMRC_94_1 (1994): S1_53–58. http://dx.doi.org/10.3379/jmsjmag.18.s1_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Culbreth, Scott, and Scott Graham. "Demonstrating Redundancy Advantages of a Three-Channel Communication Protocol." International Conference on Cyber Warfare and Security 18, no. 1 (February 28, 2023): 513–22. http://dx.doi.org/10.34190/iccws.18.1.964.

Full text
Abstract:
Multi-Channel communications have the potential to provide advantages in security and redundancy. One widespread example of additional security is the use of 2 Factor Authentication wherein an authorization code is sent via a separate channel. As another example, spread spectrum technology offers resilience against channel interference. However, no currently deployed communication protocols take advantage of the full spectrum of security and performance gains that can be obtained through transmitting data over multiple channels. Taking inspiration from Redundant Array of Inexpensive Disks (RAID) and their use of data striping and mirroring, a secure multi-channel communication protocol was developed that is able to have greater security than an equivalent single channel system while also having greater resiliency against data corruption, therefore requiring fewer, if any, retransmissions than a single channel system when operating in a low availability environment. This approach admittedly comes with significant overhead, both in the use of additional channels and the need for additional processing. Whether the security and availability gains are worth the costs is an open question, with specific answers highly dependent on the particular applications. A specific multi-channel communication protocol, with three independent channels, and incorporating duplication on the bit level, was built and exercised within the OMNeT++ simulation environment in order to examine specific aspects of performance and security of the protocol. This exercise demonstrates that a secure multi-channel protocol operates with less latency than an equivalent single channel system when experiencing less than 50% channel corruption due to adversarial injection, resulting in reduced data loss and need for re-transmissions.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Redundant Arrays of Inexpensive Disks"

1

Elerath, Jon Garrett. "Reliability model and assessment of redundant arrays of inexpensive disks (RAID) incorporating latent defects and non-homogeneous Poisson process events." College Park, Md. : University of Maryland, 2007. http://hdl.handle.net/1903/6733.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2007.
Thesis research directed by: Mechanical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
2

Muppalaneni, Nitin. "Adaptive Hierarchial RAID." Thesis, Indian Institute of Science, 1998. https://etd.iisc.ac.in/handle/2005/3926.

Full text
Abstract:
Redundant Arrays of Inexpensive Disks or RAID is a popular method of improving the reliability and performance of disk storage. Of various levels of RAID, mirrored or RAID1 and rotating parity or RAID5 configurations have become moat popular. Mirrored or RAID1 provides best overall performance and is easier to configure, but has 100 percent storage overhead for the redundancy. Rotating parity or RAID5, on the other hand, is quite inexpensive for the redundancy it provides, shorn impressive performance for reads and full-stripe writes in normal mode, but the small write performance is poor due to the read-modify-write cycle involved. The performance drops drastically when one of the disks fails and the system enters degraded mode. Also RAID5 is relatively difficult to configure. Typical non-scientific system disk access patterns exhibit very high locality of reference. This thesis presents the design and implementation of an Adaptive Hierarchical RAID array to exploit this high locality. Frequently accessed data is migrated towards the top of the hierarchy and not so frequently acee88ed data is moved down the hierarchy, thus adaptively rearranging itself to the access patterns. Previous work on Adaptive Hierarchical RAID such as HP AutoRAID has explored one part of the design space, namely design of configurable storage at the SGSI level with no interaction with higher level layers like volume manager. This thesis explores a different design point: namely, one that is centered at the volume manager layer. This is important also for the reason that with fibre channel disks and SCSI-3, Storage Area Networks (SAN) no longer need a conventional controller but a modified version of a controller that is more close to a volume manager.
APA, Harvard, Vancouver, ISO, and other styles
3

Muppalaneni, Nitin. "Adaptive Hierarchial RAID." Thesis, Indian Institute of Science, 1998. http://hdl.handle.net/2005/50.

Full text
Abstract:
Redundant Arrays of Inexpensive Disks or RAID is a popular method of improving the reliability and performance of disk storage. Of various levels of RAID, mirrored or RAID1 and rotating parity or RAID5 configurations have become moat popular. Mirrored or RAID1 provides best overall performance and is easier to configure, but has 100 percent storage overhead for the redundancy. Rotating parity or RAID5, on the other hand, is quite inexpensive for the redundancy it provides, shorn impressive performance for reads and full-stripe writes in normal mode, but the small write performance is poor due to the read-modify-write cycle involved. The performance drops drastically when one of the disks fails and the system enters degraded mode. Also RAID5 is relatively difficult to configure. Typical non-scientific system disk access patterns exhibit very high locality of reference. This thesis presents the design and implementation of an Adaptive Hierarchical RAID array to exploit this high locality. Frequently accessed data is migrated towards the top of the hierarchy and not so frequently acee88ed data is moved down the hierarchy, thus adaptively rearranging itself to the access patterns. Previous work on Adaptive Hierarchical RAID such as HP AutoRAID has explored one part of the design space, namely design of configurable storage at the SGSI level with no interaction with higher level layers like volume manager. This thesis explores a different design point: namely, one that is centered at the volume manager layer. This is important also for the reason that with fibre channel disks and SCSI-3, Storage Area Networks (SAN) no longer need a conventional controller but a modified version of a controller that is more close to a volume manager.
APA, Harvard, Vancouver, ISO, and other styles
4

Nanda, Sanjeeb. "GRAPH THEORETIC MODELING: CASE STUDIES IN REDUNDANT ARRAYS OF INDEPENDENT DISKS AND NETWORK DEFENSE." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3165.

Full text
Abstract:
Graph theoretic modeling has served as an invaluable tool for solving a variety of problems since its introduction in Euler's paper on the Bridges of Königsberg in 1736 . Two amongst them of contemporary interest are the modeling of Redundant Arrays of Inexpensive Disks (RAID), and the identification of network attacks. While the former is vital to the protection and uninterrupted availability of data, the latter is crucial to the integrity of systems comprising networks. Both are of practical importance due to the continuing growth of data and its demand at increasing numbers of geographically distributed locations through the use of networks such as the Internet. The popularity of RAID has soared because of the enhanced I/O bandwidths and large capacities they offer at low cost. However, the demand for bigger capacities has led to the use of larger arrays with increased probability of random disk failures. This has motivated the need for RAID systems to tolerate two or more disk failures, without sacrificing performance or storage space. To this end, we shall first perform a comparative study of the existing techniques that achieve this objective. Next, we shall devise novel graph-theoretic algorithms for placing data and parity in arrays of n disks (n ≥ 3) that can recover from two random disk failures, for n = p – 1, n = p and n = 2p – 2, where p is a prime number. Each shall be shown to utilize an optimal ratio of space for storing parity. We shall also show how to extend the algorithms to arrays with an arbitrary number of disks, albeit with non-optimal values for the aforementioned ratio. The growth of the Internet has led to the increased proliferation of malignant applications seeking to breach the security of networked systems. Hence, considerable effort has been focused on detecting and predicting the attacks they perpetrate. However, the enormity of the Internet poses a challenge to representing and analyzing them by using scalable models. Furthermore, forecasting the systems that they are likely to exploit in the future is difficult due to the unavailability of complete information on network vulnerabilities. We shall present a technique that identifies attacks on large networks using a scalable model, while filtering for false positives and negatives. Furthermore, it also forecasts the propagation of security failures proliferated by attacks over time and their likely targets in the future.
Ph.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
APA, Harvard, Vancouver, ISO, and other styles
5

Muppalaneni, Nitin. "Adaptive Hierarchical RAID." Thesis, 1998. http://etd.iisc.ac.in/handle/2005/2171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Muppalaneni, Nitin. "Adaptive Hierarchical RAID." Thesis, 1998. http://etd.iisc.ernet.in/handle/2005/2171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Hui-Min, and 陳慧敏. "A Study of PCB Layout for the Redundant Arrays of Independent Disks (RAID) in the High Speed Ethernet." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/49982364658920783719.

Full text
Abstract:
碩士
明新科技大學
電子工程研究所
96
The skills concerned with computer have been advancing considerably over recent decades. Nowadays, both enterprises and individuals rely on computer more than they ever did, and with the computer data growing, the saving devices turn from 360KB, 1.44MB and 100MB to hundreds of GB and even TB. Once any problems such as deficient room and damaged data come up, things will be very troublesome. Therefore, the issues about saving and safety of computer data become paramount. In the medium and large-scaled enterprises, due to the more complete staff and system, the MIS and relevant departments will cope with this kind of problems. However, for the small-scaled companies, SOHO and individuals and families, a simple saving and back-up system is relatively indispensable. This article is going to introduce the saving system plan that combines the Ethernet function and RAID (Redundant Arrays of Independent Disks). Through the most convenient connection channel, Ethernet, the whole company and family can easily manipulate and connect the computers. In addition, it is unnecessary to change the original Network line greatly, and both the safety and convenience of saving room can simultaneously upgrade. This plan includes the function able to extend the hard discs. Users can extend the capacity and back up data according to their using styles and needs. In this article, we will explain the generally RAID level. And the power source management of the system and some important IC. Then propose the function block of system. We will give a full description of the design of hardware. Finally, we will prove that this kind of hardware can actually be put into practice and this equipment can be a simple back up tool for computer data.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Redundant Arrays of Inexpensive Disks"

1

Gibson, Garth A. Redundant disk arrays: Reliable, parallel secondary storage. Berkeley, Calif: Computer Science Division (EECS), University of California, Berkeley, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Redundant disk arrays: Reliable, parallel secondary storage. Cambridge, Mass: MIT Press, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Redundant Arrays of Inexpensive Disks"

1

Fujimoto, Kazuhisa. "Redundant Arrays of Independent Disks." In Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4899-7993-3_1333-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wada, Kenichi. "Redundant Arrays of Independent Disks." In Encyclopedia of Database Systems, 2359. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_1333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fujimoto, Kazuhisa. "Redundant Arrays of Independent Disks." In Encyclopedia of Database Systems, 3135–36. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_1333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cecchet, Emmanuel, Julie Marguerite, and Willy Zwaenepoel. "Partial Replication: Achieving Scalability in Redundant Arrays of Inexpensive Databases." In Lecture Notes in Computer Science, 58–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27860-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"A Case for Redundant Arrays of Inexpensive Disks (RAID)." In High Performance Mass Storage and Parallel I/O. IEEE, 2009. http://dx.doi.org/10.1109/9780470544839.ch1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Heyn, Tyson. "Redundant Arrays of Independent Disks (RAID)." In Encyclopedia of Information Assurance, 2463–67. CRC Press, 2010. http://dx.doi.org/10.1081/e-eia-120046794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thomasian, Alexander. "Redundant Arrays of Independent Disks - RAID." In Storage Systems, 269–336. Elsevier, 2022. http://dx.doi.org/10.1016/b978-0-32-390796-5.00014-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Redundant Arrays of Inexpensive Disks"

1

Patterson, David A., Garth Gibson, and Randy H. Katz. "A case for redundant arrays of inexpensive disks (RAID)." In the 1988 ACM SIGMOD international conference. New York, New York, USA: ACM Press, 1988. http://dx.doi.org/10.1145/50202.50214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Haichuan, Longfa Pan, and Duanyi Xu. "Optical array for Video-on-Demand (VOD) system." In Symposium on Optical Memory. Washington, D.C.: Optica Publishing Group, 1996. http://dx.doi.org/10.1364/isom.1996.otub.4.

Full text
Abstract:
Although RAID (Redundant Array of Inexpensive Disk) technology has been widely used in HDD (Hard Disk Drive) array in the past several years, optical array just begins its steps using optical drive with higher data transfer rate and faster seeking operation1. Optical drive (especially CD-ROM) have improved sustain transfer rate by several times, and some special designed optical drives can reduce seek time near to HDD. These progresses make it possible that low cost optical array become outside memory of video server in Video-on-Demand1,2,3 system instead of expensive HDD array. A new kind of RAID form can reduce distance between different data segments. So this new data strategy reduce the seeking time too, which make optical array can be accessed by more users simultaneously than before.
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Peter M., Garth A. Gibson, Randy H. Katz, and David A. Patterson. "An evaluation of redundant arrays of disks using an Amdahl 5890." In the 1990 ACM SIGMETRICS conference. New York, New York, USA: ACM Press, 1990. http://dx.doi.org/10.1145/98457.98509.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Redundant Arrays of Inexpensive Disks"

1

Chen, Peter M. An Evaluation of Redundant Arrays of Disks using an Amdahl 5890. Fort Belvoir, VA: Defense Technical Information Center, May 1989. http://dx.doi.org/10.21236/ada631683.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography