The Essentials of Computer Organization and Architecture by Null Linda & Lobur Julia
Author:Null, Linda & Lobur, Julia
Language: eng
Format: epub
Publisher: Jones & Bartlett Learning
Published: 2014-02-13T16:00:00+00:00
FIGURE 7.28 RAID-2, Bit Interleave Data Striping with a Hamming Code
7.9.4 RAID Level 3
Like RAID-2, RAID-3 stripes (interleaves) data one bit at a time across all of the data drives. Unlike RAID-2, however, RAID-3 uses only one drive to hold a simple parity bit, as shown in Figure 7.29. The parity calculation can be done quickly in hardware using an exclusive OR (XOR) operation on each data bit (shown as bn) as follows (for even parity):
Parity = b0 XOR b1 XOR b2 XOR b3 XOR b4 XOR b5 XOR b6 XOR b7
Equivalently,
Parity = (b0 + b1 + b2 + b3 + b4 + b5 + b6 + b7) mod 2
A failed drive can be reconstructed using the same calculation. For example, assume that drive number 6 fails and is replaced. The data on the other seven data drives and the parity drive are used as follows:
b6 = b0 XOR b1 XOR b2 XOR b3 XOR b4 XOR b5 XOR Parity XOR b7
RAID-3 requires the same duplication and synchronization as RAID-2, but is more economical than either RAID-1 or RAID-2 because it uses only one drive for data protection. RAID-3 has been used in some commercial systems over the years, but it is not well suited for transaction-oriented applications. RAID-3 is most useful for environments where large blocks of data would be read or written, such as with image or video processing.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Coding Theory | Localization |
Logic | Object-Oriented Design |
Performance Optimization | Quality Control |
Reengineering | Robohelp |
Software Development | Software Reuse |
Structured Design | Testing |
Tools | UML |
Deep Learning with Python by François Chollet(12400)
Hello! Python by Anthony Briggs(9752)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9638)
The Mikado Method by Ola Ellnestam Daniel Brolund(9633)
Dependency Injection in .NET by Mark Seemann(9163)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8148)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7653)
Grails in Action by Glen Smith Peter Ledbrook(7565)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7390)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6279)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(6242)
Microservices with Go by Alexander Shuiskov(6007)
Practical Design Patterns for Java Developers by Miroslav Wengner(5920)
Test Automation Engineering Handbook by Manikandan Sambamurthy(5892)
Angular Projects - Third Edition by Aristeidis Bampakos(5228)
Kotlin in Action by Dmitry Jemerov(4918)
The Art of Crafting User Stories by The Art of Crafting User Stories(4811)
NetSuite for Consultants - Second Edition by Peter Ries(4770)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(4581)
