Free Essay

Unit 2 Assignment 1 Disk Redundancy

In: Computers and Technology

Submitted By clubsalvie1
Words 492
Pages 2
NT1230 Client Server Networking 1

1 Originally RAID stood for Redundant Array of Inexpensive Disks and is now commonly referred to as (Redundant Array of Independent Disks), is a data storage virtualization technology that combines multiple disks for the purpose of data redundancy.
2 We use raid when data accessibility and performance is critical.
3 the Levels of Raid
A RAID 0: Consists of striping without mirroring or parity -- A RAID 0 setup splits data evenly across two or more disks, it is important to note that RAID 0 has no added redundancy for handling disk failures the same as with a spanned volume.
B RAID 1: Consists of data mirroring but without parity or striping. -- With a Raid 1 setup, it creates an exact copy (or mirror) of data on two or more disks. If one of the drives goes down your array will still be functional until the effected drive can be fixed or replaced.
C RSoftware RAID is configured and managed by the operating system of the host computer.
All processing via software RAID is handled by the host computer’s CPU. Traditionally hardware RAID offered better I/O performance but with technological advancements offered on CPU and operating system technologies, there is very little difference in performance between hardware and software RAID.
Hetzner has removed hardware RAID from its product offering as software RAID offers a better price/performance ratio over hardware RAID.
For customers who still wish to have hardware RAID configured on their new TruServ™ Plus, it is available at a monthly premium.

Our Hardware RAID logical disks are configured in a RAID 1 configuration which is controlled by a dedicated RAID expansion card. This expansion card handles all transactions to and from the logical disks.
AID 5: Has block-level striping with distributed parity -- A RAID 5 setup uses block-level striping with parity data distributed across all disks in the RAID Array. Meaning one drive can fail and your server will remain functional it’s fixed or a replacement can be installed. RAID 5 requires at least 3 drives while also increases read/write speeds and making use of the available disk space more efficient.
D RAID 6 extends RAID 5 by providing double parity block, which provides fault tolerance for up to two failed drives at a time.
4 RAID 0 is normally used to increase performance, although it can also be used as a way to create a large logical volume out of two or more physical disks.
5 Because if at least 1 drive operates then the data is safe
6 Raid 5, faster read/write speeds and more efficient use of available disk space.
7 The difference between software and hardware RAID is the location from where processing is performed. For software RAID processing is performed by the host server’s CPU (Central processing unit), whereas for hardware RAID processing is performed by an external CPU located on a dedicated RAID card.…...

Similar Documents

Free Essay

Unit 2 Assignment 1 Disk Redundancy Research

...Assignment Title Unit 2. Assignment 1. Disk Redundancy Research Assignment Overview: Using the Internet and the ITT Tech Virtual Library, research the following questions, and provide your thoughts on each one. Submit your answers in a Word Document and ensure that you cite any resources you utilized with the proper APA format. 1. What does RAID stand for? RAID stands for Redundant Array of Inexpensive Disks 2. When would we use RAID? 3. Define the following types of RAID: a.RAID 0: Striped Set -- A RAID 0 setup splits data evenly across two or more disks. It is important to note that RAID 0 was not one of the original RAID levels, and is not redundant. If one drive goes down your server will need to be restored from backup b. RAID 1 Mirrored Set -- A Raid 1 setup creates an exact copy (or mirror) of data on two or more disks. A typical setup just has two drives that are setup to mirror data. If one drive goes down your server will still be functional until a scheduled drive replacement can be installed. c. RAID 5 Striped Set with Parity -- A RAID 5 setup uses block-level striping with parity data distributed across all disks in the RAID Array. This means you can have one drive fail and your server will remain functional until a scheduled drive replacement can be installed. RAID 5 also increases read/write speeds while using the available disk space efficiently. d. RAID 6 Similar to RAID 5 but not as widely used, RAID 6 performs either two parity......

Words: 422 - Pages: 2

Free Essay

Unit 1 Assignment 2

...Unit 1 Assignment 2 The Internal Use Only data classification standard of Richman Investments has many different infrastructures domains that are affected via internal use only data classification. More than all others, the three infrastructures that are affected the most are the User Domain, Workstation Domain and the LAN Domain. The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network. The Workstation Domain is also another domain infrastructure that has great reason to be affect by internal use only data because this is where the user connects to the our network. The reason that this can cause security threats and other problems is because this domain can be connected via a personal laptop or even a cell phone or other mobile device. The final infrastructure domain that is greatly affected is the LAN domain. The reason that this domain infrastructure is affected by internal use only data is because this domain is the open domain available companywide, to anybody in the building or even near the building via a wireless device. If we watch these specific areas closer and implement some......

Words: 275 - Pages: 2

Free Essay

Unit 2 Assignment 1: Disk Redundancy Research

...Unit 2 Assignment 1: Disk Redundancy Research December 14, 2013 1) What does RAID stand for? RAID stands for? RAID stands for Redundant Array of Independent Disks. 2) When would we use RAID? RAID can be used by either individual users or large network users to store data across multiple locations to increase fault tolerance. 3) Define the following types of RAID: a) RAID 0 b) RAID 1 c) RAID 5 d) RAID 6 RAID 0 | Strips data without redundancy. Provides faster performance, but it lacks fault tolerance. | RAID 1 | Known as disk mirroring. This method doesn’t strip data, it saves all data intact across at least two disks to provide fault tolerance. | RAID 5 | Uses rotating parity to store data. There is do data duplication, but the parity data can be used to reconstruct data. Mostly used by large organizations for data that is not performance sensitive. | RAID 6 | Same as RAID 5, but adds another parity scheme to increase fault tolerance. | 4) Why is RAID 0 of any use if it offers no redundancy? RAID 0 allows data to be broken up in order to allow faster access to data. 5) Why do you think that RAID 1 can be the most expensive? Why would people utilize it if it’s so costly? RAID 1 can be the most expensive because it requires an entire drive to make a duplicate of any data and the more copies you want, the more drives you need. People still use is because it makes complete copies of data, not partial ones. The complete copies allow......

Words: 405 - Pages: 2

Free Essay

Unit 2. Assignment 1 Disk Redundancy Researc

...NT1230 Unit 2. Assignment 1 Disk Redundancy Research 1. What does RAID stand for? Redundant Array of Inexpensive Disk 2. When would we use RAID? When you have a vast amount of data to need to be backup or to improve speed of the system. 3. Define the following types of RAID: a. RAID 0: Splits data evenly across two or more disks (striped) without parity information for speed. RAID 0 was not one of the original RAID levels and provides no data redundancy. RAID 0 is normally used to increase performance, although it can also be used as a way to create a large logical disk out of two or more physical ones. b. RAID 1: An exact copy (or mirror) of a set of data on two disks. This is useful when read performance or reliability is more important than data storage capacity. Such an array can only be as big as the smallest member disk. c. RAID 5: Comprises block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but one be present to operate. Upon failure of a single drive, subsequent reads can be calculated from the distributed parity such that no data is lost. RAID 5 requires at least three disks. d. RAID 6: Extends RAID 5 by adding an additional parity block; thus it uses block-level striping with two parity blocks distributed across all member disks. 4. Why is RAID 0 of any use if it offers no redundancy? It splits data evenly across two or more disks (striped) without parity......

Words: 415 - Pages: 2

Free Essay

Unit 2 Assignment 1

...IS3340-WINDOWS SECURITY | Recommendations for Access Controls | Unit 2 Assignment 1 | | [Type the author name] | 4/3/2014 | | Access Control is the defined as “the selective restriction of access to a place or other resource”, in the RFC 4949. “The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.” Simply put the ability to read, write, modify, or deleting information or files is what Access Control is. It is more than this, in the permissions (authorization) granted to each Security Group or Individual User. The permissions mentioned in the previous paragraph are rights that a user is allowed to access, create, modify, or delete the file(s) inside a file folder, or objects. These are all permissions (authorizations) controlled by the Authorized Windows Security Personnel of the file structure. We will list some examples of how this outlined and what the impact would be, but first understand that requirements for the permissions is controlled from the Group Level, other than by Individual User, because it is easier to control from a security standpoint when you want to modify these abilities. There are four folders created (D:\ERPdocuments, D:\ERPdocuments\HRfiles, D:\ERPdocuments\SFfiles, D:\ERPdocuments\MGRfiles) which we want to allow specific permissions for certain functions (tasks). For example; by modifying the permissions under the specific user account for HRmanager to include...

Words: 436 - Pages: 2

Free Essay

Unit 2 Assignment 1

...Eric Satchell NT1330 Service Provider Types Unit 2 Assignment 1 July 3, 2014 Comparing Service Providers There are a lot of companies providing services, but AT&T provided telephone communication to the public. AT&T monopolized the telecommunication industry until the United States took them to court for antitrust and won. AT&T was broken up into eleven smaller companies, call Baby Bells. One of the companies that derived from this law suit was the Regional Bell Operating Company or RBOC. RBOC was a term that described one of the US telephone companies that provided telephone, telegraph, and long distance to the consumers. RBOC is part of a local exchange carrier allowed to compete for business. RBOC services internet service which in turn dealt with digital data. The merging companies provided different types of service based on the Telecommunication Act of 1996. ILEC or incumbent local exchange carrier is a telephone company that provided local telephone communications before the ruling to break up the Ma Bell Company. The FCC ruled that the ILECs must provide other telecommunications service providers access to their equipment to be able to provide a better rate to the consumer. This......

Words: 480 - Pages: 2

Free Essay

Nt1230 Unit 2 Assignment 1

...NT1230 Unit 2 Disk Redundancy 1. RAID stands for Redundant Array of Independent Disks. A way of logically putting multiple disks together into a single array, getting more reliability and faster capabilities. 2. Use RAID if redundancy and reliability are important. If there are problems with your computer RAID will give you more throughputs enabling you to read and write data from multiple drives instead of one. 3. A. RAID 0: Known as stripping. Where data is stored across any number of disks. You can have from two (2) to thirty two (32) physical disks. If one disk fails, all information is lost. There is no redundancy. B. RAID 1: Known as mirroring. Data is written identically across all drives in the array. Used mainly for redundancy. No data will be lost if a drive fails. You must have two (2) disks. C. RAID 5: Data is split over three or more discs, in a way that protects the data if any of the discs fail. Parity is stored on all of the discs in the drive array, which means that if one disc fails, you won't lose all of your information. Reading is faster since the data has more drives to read from. Writing is a downfall due to the fact that the data has to be compared and processed in order to create the parity. Must have 3 disk minimum and from 8 to 16 maximum. D. RAID 6: Is like RAID 5 with the stripping and parity across the array of disks but adds a second set of parity information for each block of data. Level-6 requires a minimum of four......

Words: 488 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to......

Words: 414 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...Introduction to Networking Unit 2: Assignment 1 Indentifying Network Topologies Identify the major needs and major stakeholders for computer networks and network applications. The major stakeholders for computer networks and network applications are the ones who use it or relay on it to do business. The main stakeholders are the ones who uses the network or applications to get their work done for their company. The next stakeholder is the company or people who rely on the first company to get what they need. The ones who design the applications or the network are stakeholders in the fact they need to make sure their work is done properly so others can do their job. The owners are also stakeholders in the fact that others rely on their people and software to get their work done. Then there is the end-users who are also stakeholders because we need the network and applications to do our daily job. Identify the classifications of networks and how they are applied to various types of enterprises. PAN (Personal Area Network)—personal. You as an individual and the range is around that person LAN (Local Area Network)—network of interconnected computers within a small geographic area. Area of LAN’s are a room, building or group of buildings, offices, schools. The range is 10m – 1km MAN (Metropolitan Area Network)—a network design for a town or a city. The range is about 10km.Examples would be London, England or Geneva, Switzerland, WAN (Wide Area Network—a network that......

Words: 289 - Pages: 2

Free Essay

Unit 2 Assignment 1

...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is......

Words: 274 - Pages: 2

Premium Essay

Unit 1 Assignment 2

...September 25, 2014 NT 2580 Unit 1 assignment 2 A Data Classification Standard is information or data shared internally by an organization. The private information or data may not be included; core communications are not planned to leave the organization. The report is designed to describe and explain the standards for the “Internal use only” data classification at the Richman Investments location, this report will address which IT set-up domains are affected by the standard and how. The first IT set-up affected by core use is the User Domain. The User Domain describes the people who access an organization’s information system. The user domain will enforce an Acceptable Use Policy (AUP) that defines what each user can and cannot do with the company’s data. With company users, any outsiders, contractor’s or third party agents will also need to agree and comply with the Acceptable Use Policy. Any violation will be taken up with management or the proper establishments to access further corrective action. Work Station Domain: This is where most of the company’s users connect to get to the IT set-up. No personal devices or removable media may be allowed on this network ever. All devices and removable media will be issued by the company for official work use. Access Control Lists (ACLs): ACLs will be tired up to appropriately define which access the users are allowed to use. Any violation causes an immediate suspension of rights and the person(s) in violation will be subject to......

Words: 413 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...10/ 1/ 2014 NT2580 Unit 2 assignment 1 The workgroup consists of three primary workgroups, which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch. To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation: First it is important to understand the variables considered in this timeline formula. The WoV is the period within which defensive measures are reduced, compromised, or lacking. The WoV covers a timeline from the moment vulnerability is discovered and identified by the vendor. It also includes the time taken to create, publish, and finally apply a fix to the vulnerability. It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within...

Words: 286 - Pages: 2

Free Essay

Unit 2 Disk Redundancy

...Unit 2. Assignment 1. Disk Redundancy Research 1. What does RAID stand for? Raid stands for Redundant Array of Independent Disks 2. When would we use RAID? You would use RAID to combine multiple hard drives. 3. Define the following types of RAID: a. RAID 0 RAID 0 increases performance and splits data evenly between 2 drives b. RAID 1 RAID 1 mirrors both drives. c. RAID 5 RAID 5 uses 3 drives and uses striping to divide across all drives with additional parity data divided across all disks. d. RAID 6 RAID 6 is similar to RAID 5 but adds an additional parity block to each drive writing 2 parity blocks for each bit of data striped across the disks. 4. Why is RAID 0 of any use if it offers no redundancy? Because it splits the data evenly among the 2 hard drives 5. Why do you think that RAID 1 can be the most expensive? Why would people utilize it if it’s so costly? Because you will run out of space faster but you will always have a copy of your data if 1 of the drives ever fails. 6. If you, as a home computer user, were to purchase a form of RAID, which would you choose and why? I think I would try RAID 10 since it has the ability to use the advantages of RAID 1 and 0 I will have the mirroring on my secondary disks and no redundancy. 7. What is the difference between software RAID and hardware RAID? Hardware has a specially built controller to that handles the drives and costs more and the software has no specialized hardware is needed....

Words: 281 - Pages: 2

Premium Essay

Unit 2 Assignment 1

...Course GS1145 06/28/2015 6:00PM Dear Mrs. Phifer, As a returning student to college I have very few if any questions. I know you are thinking if that is the case then why you haven’t graduated from a college or university. But the reason for so little questions and concerns is because I’ve realized my mistakes and I’ve come to terms with those mistakes and I’m currently in the process of making corrections to those mistakes. Anyways some of the few questions that I do have are as follows: 1. What if I want to go ahead on assignments am I allowed to? 2. How will this course assist me with my goals of obtaining an associate’s degree? 3. How will this course benefit me? Along with these questions and concerns I also have a few challenges that I need to overcome, one of those being time management with having to work all day attend school after gives me a very limited amount of time to finish and complete assignments. That’s one thing that be fixing this semester because procrastination has been my friend for far too long. Another challenge I would say is a big factor would be as previously mentioned procrastination I put tasks off for long periods of time, school being one of those tasks and it has caused some pretty good opportunities to slip away from me. Even though I have some challenges I still possess some good strengths a couple of them being persistence and motivation, both of them are essential qualities that are needed to finish and complete school......

Words: 464 - Pages: 2

Free Essay

Unit 2 Assignment 1

...NT1310 Week 2 – Unit 2 Assignment 1 Service Provider Types There are five different types of telecommunication types to date. First of which is RBOC – (regional bell operating company) which was a telephone company created as a result of the breakup of AT&T. The seven original regional Bell companies were Ameritech, Bell Atlantic, BellSouth, NYNEX, Pacific Bell, Southwestern Bell, and US WEST. The reason why this was so important was because these companies are what provided local telephone service while AT&T provided the long distance phone service. These are what made up the Local Exchanges or the LEC’s. ILEC or incumbent local exchange carrier was a telephone provider that provided local service prior to the telecommunications act of 1996. These play a major role because these carriers are what own the local loops/exchange and facilities in that area. CLEC’s are the exact same thing except they are the competitor to the ILEC’s but provided their own networking and switches for local service. MSO or Multi system Operator – is owner of multiple cable and satellite television systems. This ties into what an ISP is. An ISP is simply and Internet service provider that provides a mean for accessing the internet. MSO is majorly known for being cable companies, because of this cable companies are providing internet to cable customers (usually as bundles with their plan). They work within each other because......

Words: 314 - Pages: 2