× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Here is a cut and paste of an IBM doc on this subject:

IBM Software Technical Document
__________________________________________________________________
/s_dir/slkbase.nsf/1ac66549a21402188625680b0002037e/e4899b4c32c9116f862565c2007cf565?OpenDocument&ExpandSection=1
 - 
_Section1/s_dir/slkbase.nsf/1ac66549a21402188625680b0002037e/e4899b4c32c9116f862565c2007cf565?OpenDocument&ExpandSection=1
 - _Section1Document Information
__________________________________________________________________

Document Title
Why Damage Can Occur on Raid-5 or Mirrored Drives

Document Description

Question: Why would I get damaged objects on my system that has a form of data 
protection running on it? This could be system-level mirroring or drive-level 
RAID-5 protection.

Answer: The reason that damaged objects can occur is that the basic concept 
behind these techniques is to improve system availability (for example, keep 
the system up) and recoverability (for example, prevent a loss of data) when 
disk drive failures occur. If a disk drive fails or has a problem, I/O 
operations are suspended to it and the system continues to run. When you next 
try and access the failed disk drive, with mirroring the data is read from the 
failed drive's mirrored copy and with RAID-5 the data is rebuilt from the 
parity set contained on the other RAID-5 drives.

As an extra benefit to availability and recoverability, they also offer very 
good data integrity, but it is not guaranteed to be 100 percent. The reason for 
this is because the system is reliant on either the hardware or software 
detecting a problem. When hardware sees a problem, the system functions like 
described above. This is how most data integrity is maintained, and with the 
newer hardware with more modern (robust) error detection techniques, this is 
even better.

As an example of how a damaged object could occur, consider the following 
scenario:
1       A disk drive has a problem and it damages an object internally. The 
hardware somehow doesn't detect that this problem has occurred so the disk 
drive still stays available.
2       The system then requests and reads that object onto the system (main 
memory) for processing.
3       If software does not detect the problem with the object on the system, 
that damaged object could be written back out to disk. With mirroring, both 
mirrored disk drives would then have copies of the damaged object and with 
RAID-5, the parity set would be updated with the information in the damaged 
object
The AS/400 Advanced Backup and Recovery Guide states the following:

Mirrored protection does not protect your system from damage to objects that 
occurs for reasons other than a DASD failure. For example, objects may be 
damaged if your system ends abnormally due to a power failure.




__________________________________________________
Kirk Goins
IBM Certified iSeries Technical Solutions Expert
IBM Certified Designing IBM e-Business Solutions
Pacific Information Systems - An IBM Premier Business Partner
503-674-2985           kirkg@pacinfosys.com


-----Original Message-----
From: Art Tostaine, Jr. [mailto:art@link400.com]
Sent: Thursday, August 29, 2002 2:08 PM
To: midrange-l@midrange.com
Cc: Barry Oppenheim
Subject: Raid problems


A customer of mine has those BCC drives that were talked about a couple of 
months ago.  One of them failed and the raid set showed
UNPROTECTED.

BCC sends new drive overnight (they wouldn't replace same day like IBM would).  
They send Decision Data to replace it.  EXCEPT, we
have tons of damaged objects.  How can objects get damaged if the disks are 
protected by RAID.

Customer called IBM support to talk about this and they say occasionally 
damaged objects can happen, even with Raid.

Has anyone else experienced this?

P.S. My customer may chime in here as he wanted the URL on how to join this 
list.

_________________
Art Tostaine, Jr.
CCA, Inc.
Jackson, NJ 08527

_______________________________________________
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@midrange.com
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/cgi-bin/listinfo/midrange-l
or email: MIDRANGE-L-request@midrange.com
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.