In the last couple of years, RAID (Redundant Array of
Independent Disks) technology has grown from a server option
to a data protection requirement. The first implementations of
RAID in 1990 were very expensive controller boards with highperformance
I/O processors that were as powerful as the host
CPU.At that time, when hardware-based RAID solutions were
the only option, the cost of a RAID controller limited the usage
to high-priced servers
Today, RAID is found everywhere – from an operating system
software feature to a stand-alone controller providing advanced
data integrity in high-end storage area networks. It can be found
in mobile environments such as laptops, as well as desktops,
workstations, servers, and external enclosures with a larger
number of hard disk drives. RAID is even included in TV settop
boxes or personal storage devices.
This white paper provides a high-level overview of the various
RAID solutions. It begins by defining “Software RAID” vs.
“Hardware RAID”, explains how these different RAID
implementations work and the benefits of each implementation,
and helps you make a decision on which RAID solution is best
for your application.