Solved

want to know what RAID is ?

Posted on 2003-10-22
8
233 Views
Last Modified: 2010-04-27
Hi ,
i need a very good explanation what raid is ?
how it comes in the hardware way and in the software way ?
and an explanation about the raid types will be appriciated too

Thanks

Victor
0
Comment
Question by:victorbx
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9599803
Victor,

Check this

http://www.webopedia.com/TERM/R/RAID.html


Scroll down to see RAID levels

Do you want more ?

Sunray
0
 
LVL 4

Author Comment

by:victorbx
ID: 9599924
what are the diffrences between the software version and the hardware version if there is any ?

0
Salesforce Has Never Been Easier

Improve and reinforce salesforce training & adoption using WalkMe's digital adoption platform. Start saving on costly employee training by creating fast intuitive Walk-Thrus for Salesforce. Claim your Free Account Now

 
LVL 16

Assisted Solution

by:Kyle Schroeder
Kyle Schroeder earned 100 total points
ID: 9600095
Software RAID is controlled by the operating system and device drivers to perform the RAID function (i.e. writing duplicate information to both disks of a RAID-1 array).  The OS knows it is working with RAID.  Using hardware-based RAID, the OS doesn't know that there is a RAID card sitting there that is doing the real work of striping/mirroring/etc, it looks at the array as a single drive and lets the hardware (RAID card, etc) deal with the details.

-dog*
0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 400 total points
ID: 9600105
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9600621
Do you want more info ?

Sunray
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9612227
Thanks


Sunray
0
 

Expert Comment

by:aprovenc
ID: 10981007
Is RAID only a fault tolerant for data or can it also protect operating system and Weblogic?
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
pc, laptop  monitor connection configurations
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question