Ct1110 Unit 3 Assignment 1 RAID

Words: 2613
Pages: 11

School: School of Computer Science and Information Technology
Course/unit code Assignment/assessment number
Date due
CPT110 2 (TWO) 3/02/2015 Course/unit name Introduction to Information Technology Lecturer/teacher name Abhijeet Anand Tutor (or marker’s) name
Student/s Family name Given name Student number Mazey Aaron s3529147
Declaration and statement of authorship: 1. I/we hold a copy of this work which can be produced if the original is lost/ damaged. 2. This is my/our original work and no part of it has been copied from any other student’s work or from any other source except where due acknowledgement is made. 3. No part of this work has been written for me/us by any other person except where such collaboration
…show more content…
Redundant Storage
Redundant storage means using more internal drives than necessary to store the information which allows you to store the same data in more than one place. The most popular way to do this is “the use of a type of RAID, which can be set up on storage devices with two internal drives or more”. An important thing to remember is that redundancy is not a form of backup, but just a fail-safe measure and you can still be vulnerable to data loss. (cnet, 2012)
2.1 RAID
RAID is an acronym for Redundant Array of Independent Disks. It’s the way of combining two or more individual drives into a single large storage location. “The disks included into the array are called array members and can be combined into the array in different ways which are known as RAID levels.” (freeraidrecovery, 2009)
2.2 Backup
“Backups are a copy of data, stored for the purpose of having a second copy of original data in case of loss of the original data occurs.” Backups are usually run on scheduled intervals and are not updated in real time which means when a disaster occurs data loss will occur to the data in the time between the last backup and the disaster. (thinksmarter, 2007)
2.3 Striping, mirroring and
…show more content…
In error correction we need to know the exact number of bits that are corrupted and also their exact location. The number of the errors and size of the message are very important. If we need to correct one single error in an 8 bit data unit then we must consider eight possible error locations. With the increase in both errors and size you get an increase in possibilities which makes correction harder.
There are two methods of error correction, the first is called Forward error correction. It is the process in which the receiver tries to guess the message by using redundant bits. The second is called retransmission and it is a technique in which the receiver detects the error and tells the sender to resend the data.
4.2 Transmission Control Protocol
TCP is considered as a reliable protocol and is responsible for breaking up the data into TCP Segments and then reassembling them at the receiving side. But because of the problems in network or different paths data takes to the destination we cannot be sure the data is in correct order. TCP is responsible for keeping the unordered segments in the right order and assures a reliable delivery by resending anything that gets lost. (omnisec,