Tag Archives: data

The Truth about RAID Technology

RAID – Redundant Array of Inexpensive (or sometimes “Independent”) Disks – is a method of combining several hard drives into one logical unit. It can offer fault tolerance and higher throughput levels than a single hard drive or group of independent hard drives.

RAID is a mature technology that speeds up data access while at the same time protecting your data from hard disk failure. RAID is quickly becoming a necessary component in every network since data loss and downtime can prove both fatal and financially destructive. Most networks are designed to provide instant access to massive amounts of data. More and more employees have to access customer and other databases. Intranets and corporate Web sites provide access to huge databases online.
RAID provides increased storage capacities, and protects your important data from hard drive failure.
RAID Levels:
RAID 0
RAID 1
RAID 3
RAID 5
RAID 10
There are multiple benefits of using RAID:
Reliability
Scalability
Real-time data recovery with uninterrupted access when a hard drive fails
System uptime and network availability
Protection against data loss
multiple drives working in parallel increase system performance
A disk system with RAID capability can protect its data and provide on-line, immediate access to its data, despite a single disk failure (some RAID storage systems can withstand two concurrent disk failures). RAID capability also provides for the on-line reconstruction of the contents of a failed disk to a replacement disk.
RAID offers faster hard drive performance and nearly complete data safety. Storage requirements are expanding as file sizes get bigger and rendering needs get more complex. If you handle very large images or work on audio and video files, faster data throughput means enhanced productivity. RAID can be backed up to tape while the system is in use.
There are 5 most commonly used RAID levels. These levels are not ratings, but rather classifications of functionality. Different RAID levels offer dramatic differences in performance, data availability and data integrity depending on the specific I/O environment. There is no single RAID level that is perfect for all users.
Storage Requirements can be calculated through RAID Calculator.

RAID 0: STRIPING
RAID 0 refers to striping data across multiple disks without any redundant information. Data is divided into blocks and distributed sequentially among the disks. This level is also referred to as pure striping. The number of disk drives needed to create a RAID 0 is one or more. In other words, a single drive can be configured as a RAID 0 array. This type of array can be used to enhance performance in either a request rate intensive or transfer rate intensive environment. Unfortunately, striping reduces the level of data availability since a disk failure will cause the entire array to be inaccessible.

RAID 0 was not defined originally but has become a commonly used term.

Advantages:
Easy to Implement
No capacity loss – all storage is usable

Disadvantages:
Not a “true” RAID due to the lack of fault-tolerance
Failure of only one disk will result in loss of all data on the array
RAID 1: MIRRORING / DUPLEXING
RAID 1 is the first defined level that allows a measure of data redundancy. Data written to one disk drive is simultaneously written to another disk drive. If one disk fails, the other disk can be used to run the system and reconstruct the failed disk. Since the disk is mirrored, it does not matter if one of them fails because both disks contain the same data at all times.
RAID level 1 provides high data availability since two complete copies of all information are maintained. In addition, read performance may be enhanced if the array controller allows simultaneous reads from both members of a mirrored pair. Higher availability will be achieved if both disks in a mirror pair are on separate I/O busses, known as duplexing.

Advantages:
Higher read performance than a single disk

Disadvantages:
Requires twice the desired disk space
RAID 3: SRTIPING AND PARITY
In RAID 3, data is striped across a set of disks. In addition, parity is generated and stored on a dedicated disk. With RAID 3, data chunks are much smaller than the average I/O size and the disk spindles are synchronized to enhance throughput in transfer rate intensive environments. RAID 3 is well suited for CAD/CAM or imaging type applications as well as streaming media. Since parity is used, a RAID 3 stripe set can withstand a single disk failure without losing data or access to data.
Advantages:
Good data availability
High performance for transfer rate intensive applications
Cost effective – only 1 extra disk is required for parity

Disadvantages:
Poor random I/O performance
Disk failure has a significant impact on performance
RAID 5: SRTIPING AND PARITY
RAID 5, similar to level 3, stripes data and parity to generate redundancy. However, instead of requiring entirely new disk for parity storage, the parity is distributed through the stripe of the disk array.
In RAID 5 both parity and data are striped across a set of separate disks. Next, the new parity is calculated. Finally, the new data and parity are written to separate disks. Data chunks are much larger than the average I/O size, but are still resizable. Disks are able to satisfy requests independently which provides high read performance in a request rate intensive environment. Since parity information is used, a RAID 5 stripe can withstand a single disk failure without losing data or access to data.

Advantages:
Highest read data transaction rates
Cost effective – only 1 extra disk is required

Disadvantages:
Individual block data transfer rate same as a single disk.
RAID 10
RAID 10 is technically (RAID 1 + RAID 0), a combination of RAID 1 and 0 – mirroring and striping, but without parity. RAID 10 is a stripe across a number of mirrored drives. It is implemented as a striped array whose segments are RAID 1 arrays. RAID 10 has the same fault tolerance as RAID level 1, as well as the same overhead for fault-tolerance as mirroring alone.

Advantages:
Very high I/O rates are achieved by striping RAID 1 segments
Excellent solution for sites that would normally use RAID 1
Great for Oracle and other databases which need high performance and fault tolerance.

Disadvantages:
Expensive to maintain
As with Raid 1 total capacity is equal to half of the total capacity of all disk in the array.

The Truth about RAID Technology

RAID – Redundant Array of Inexpensive (or sometimes “Independent”) Disks – is a method of combining several hard drives into one logical unit. It can offer fault tolerance and higher throughput levels than a single hard drive or group of independent hard drives.

RAID is a mature technology that speeds up data access while at the same time protecting your data from hard disk failure. RAID is quickly becoming a necessary component in every network since data loss and downtime can prove both fatal and financially destructive. Most networks are designed to provide instant access to massive amounts of data. More and more employees have to access customer and other databases. Intranets and corporate Web sites provide access to huge databases online.
RAID provides increased storage capacities, and protects your important data from hard drive failure.
RAID Levels:
RAID 0
RAID 1
RAID 3
RAID 5
RAID 10
There are multiple benefits of using RAID:
Reliability
Scalability
Real-time data recovery with uninterrupted access when a hard drive fails
System uptime and network availability
Protection against data loss
multiple drives working in parallel increase system performance
A disk system with RAID capability can protect its data and provide on-line, immediate access to its data, despite a single disk failure (some RAID storage systems can withstand two concurrent disk failures). RAID capability also provides for the on-line reconstruction of the contents of a failed disk to a replacement disk.
RAID offers faster hard drive performance and nearly complete data safety. Storage requirements are expanding as file sizes get bigger and rendering needs get more complex. If you handle very large images or work on audio and video files, faster data throughput means enhanced productivity. RAID can be backed up to tape while the system is in use.
There are 5 most commonly used RAID levels. These levels are not ratings, but rather classifications of functionality. Different RAID levels offer dramatic differences in performance, data availability and data integrity depending on the specific I/O environment. There is no single RAID level that is perfect for all users.
Storage Requirements can be calculated through RAID Calculator.

RAID 0: STRIPING
RAID 0 refers to striping data across multiple disks without any redundant information. Data is divided into blocks and distributed sequentially among the disks. This level is also referred to as pure striping. The number of disk drives needed to create a RAID 0 is one or more. In other words, a single drive can be configured as a RAID 0 array. This type of array can be used to enhance performance in either a request rate intensive or transfer rate intensive environment. Unfortunately, striping reduces the level of data availability since a disk failure will cause the entire array to be inaccessible.

RAID 0 was not defined originally but has become a commonly used term.

Advantages:
Easy to Implement
No capacity loss – all storage is usable

Disadvantages:
Not a “true” RAID due to the lack of fault-tolerance
Failure of only one disk will result in loss of all data on the array
RAID 1: MIRRORING / DUPLEXING
RAID 1 is the first defined level that allows a measure of data redundancy. Data written to one disk drive is simultaneously written to another disk drive. If one disk fails, the other disk can be used to run the system and reconstruct the failed disk. Since the disk is mirrored, it does not matter if one of them fails because both disks contain the same data at all times.
RAID level 1 provides high data availability since two complete copies of all information are maintained. In addition, read performance may be enhanced if the array controller allows simultaneous reads from both members of a mirrored pair. Higher availability will be achieved if both disks in a mirror pair are on separate I/O busses, known as duplexing.

Advantages:
Higher read performance than a single disk

Disadvantages:
Requires twice the desired disk space
RAID 3: SRTIPING AND PARITY
In RAID 3, data is striped across a set of disks. In addition, parity is generated and stored on a dedicated disk. With RAID 3, data chunks are much smaller than the average I/O size and the disk spindles are synchronized to enhance throughput in transfer rate intensive environments. RAID 3 is well suited for CAD/CAM or imaging type applications as well as streaming media. Since parity is used, a RAID 3 stripe set can withstand a single disk failure without losing data or access to data.
Advantages:
Good data availability
High performance for transfer rate intensive applications
Cost effective – only 1 extra disk is required for parity

Disadvantages:
Poor random I/O performance
Disk failure has a significant impact on performance
RAID 5: SRTIPING AND PARITY
RAID 5, similar to level 3, stripes data and parity to generate redundancy. However, instead of requiring entirely new disk for parity storage, the parity is distributed through the stripe of the disk array.
In RAID 5 both parity and data are striped across a set of separate disks. Next, the new parity is calculated. Finally, the new data and parity are written to separate disks. Data chunks are much larger than the average I/O size, but are still resizable. Disks are able to satisfy requests independently which provides high read performance in a request rate intensive environment. Since parity information is used, a RAID 5 stripe can withstand a single disk failure without losing data or access to data.

Advantages:
Highest read data transaction rates
Cost effective – only 1 extra disk is required

Disadvantages:
Individual block data transfer rate same as a single disk.
RAID 10
RAID 10 is technically (RAID 1 + RAID 0), a combination of RAID 1 and 0 – mirroring and striping, but without parity. RAID 10 is a stripe across a number of mirrored drives. It is implemented as a striped array whose segments are RAID 1 arrays. RAID 10 has the same fault tolerance as RAID level 1, as well as the same overhead for fault-tolerance as mirroring alone.

Advantages:
Very high I/O rates are achieved by striping RAID 1 segments
Excellent solution for sites that would normally use RAID 1
Great for Oracle and other databases which need high performance and fault tolerance.

Disadvantages:
Expensive to maintain
As with Raid 1 total capacity is equal to half of the total capacity of all disk in the array.

How to get a self signed certificate?

SSL makes use of what is known as asymmetric cryptography, commonly referred to as public key cryptography (PKI). With public key cryptography, two keys are created, one public, one private. Anything encrypted with either key can only be decrypted with its corresponding key. Thus if a message or data stream were encrypted with the server’s private key, it can be decrypted only using its corresponding public key, ensuring that the data only could have come from the server.

If SSL utilizes public key cryptography to encrypt the data stream traveling over the Internet, why is a certificate necessary? The technical answer to that question is that a certificate is not really necessary – the data is secure and cannot easily be decrypted by a third party. However, certificates do serve a crucial role in the communication process. The certificate, signed by a trusted Certificate Authority (CA), ensures that the certificate holder is really who he claims to be. Without a trusted signed certificate, your data may be encrypted; however, the party you are communicating with may not be whom you think. Without certificates, impersonation attacks would be much more common.

Step 1: Generate a Private Key

The openssl toolkit is used to generate an RSA Private Key and CSR (Certificate Signing Request). It can also be used to generate self-signed certificates which can be used for testing purposes or internal usage.

The first step is to create your RSA Private Key. This key is a 1024 bit RSA key which is encrypted using Triple-DES and stored in a PEM format so that it is readable as ASCII text.

Step 2: Generate a CSR (Certificate Signing Request)

Once the private key is generated a Certificate Signing Request can be generated. The CSR is then used in one of two ways. Ideally, the CSR will be sent to a Certificate Authority, such as Thawte or Verisign who will verify the identity of the requestor and issue a signed certificate. The second option is to self-sign the CSR, which will be demonstrated in the next section.

During the generation of the CSR, you will be prompted for several pieces of information. These are the X.509 attributes of the certificate. One of the prompts will be for “Common Name (e.g., YOUR name)”. It is important that this field be filled in with the fully qualified domain name of the server to be protected by SSL. If the website to be protected will be https://public.akadia.com, then enter public.akadia.com at this prompt.

Step 3: Remove Passphrase from Key

One unfortunate side-effect of the pass-phrased private key is that Apache will ask for the pass-phrase each time the web server is started. Obviously this is not necessarily convenient as someone will not always be around to type in the pass-phrase, such as after a reboot or crash. mod_ssl includes the ability to use an external program in place of the built-in pass-phrase dialog, however, this is not necessarily the most secure option either. It is possible to remove the Triple-DES encryption from the key, thereby no longer needing to type in a pass-phrase. If the private key is no longer encrypted, it is critical that this file only be readable by the root user! If your system is ever compromised and a third party obtains your unencrypted private key, the corresponding certificate will need to be revoked.

Step 4: Generating a Self-Signed Certificate

At this point you will need to generate a self-signed certificate because you either don’t plan on having your certificate signed by a CA, or you wish to test your new SSL implementation while the CA is signing your certificate. This temporary certificate will generate an error in the client browser to the effect that the signing certificate authority is unknown and not trusted.

Step 5: Installing the Private Key and Certificate

When Apache with mod_ssl is installed, it creates several directories in the Apache config directory. The location of this directory will differ depending on how Apache was compiled.

Step 6: Configuring SSL Enabled Virtual Hosts

Step 7: Restart Apache and Test