Article summary sample RAID systems

Summary:  The article discusses the usefulness of different data protection techniques. A formal method is employed to analyze the design of data protection techniques. A model I used to analyze if the usual parity-based RAID systems are enough in the modern world where there are unforeseen failures on disk drives.

Strengths: A comprehensive discussion and literature review has been provided about different errors that can occur on the modern hard drives like latent sector errors, corruption, torn writes, lost writes and misdirected writes. A simple model checker has been designed to analyze data protection schemes. A new model has been built instead of using an existing one.

Weaknesses: The research has used very simple techniques coupled with RAID which might not be so successful when complex errors occur. This research also does not through light on the reasons why the design proposed here is preferable to the fault injection method.

Future directions: The research can be evolved to understand the data protection techniques that will be necessary for next generation of disk errors and issues. This research ill assist in the production and design of successful storage system in the future.

Questions:

  1. How will the proposed design react to the security protocols?
  2. What will be the response of the model if an addition of an appendix with a few added information is introduced to each disk block?