Non-standard RAID levels
Although all RAID implementations differ from the specification to some extent, some companies and open-source projects have developed non-standard RAID implementations that differ substantially from the standard. Additionally, there are non-RAID drive architectures, providing configurations of multiple hard drives not referred to by RAID acronyms.
Double parity
Now part of RAID 6, double parity features two sets of parity checks, like traditional RAID 6. Differently, the second set is not another set of points in the over-defined polynomial which characterizes the data. Rather, double parity calculates the extra parity against a different group of blocks. For example, in our graph both RAID 5 and 6 consider all A-labeled blocks to produce one or more parity blocks. However, it is fairly easy to calculate parity against multiple groups of blocks, one can calculate all A blocks and a permuted group of blocks.RAID-DP
RAID-DP is proprietary NetApp RAID implementation available only in ONTAP systems. RAID DP implements RAID 4, except with an additional disk that is used for a second parity, so it has the same failure characteristics of a RAID 6. The performance penalty of RAID-DP is typically under 2% when compared to a similar RAID 4 configuration.RAID 5E, RAID 5EE, and RAID 6E
RAID 5E, RAID 5EE, and RAID 6E generally refer to variants of RAID 5 or 6 with an integrated hot-spare drive, where the spare drive is an active part of the block rotation scheme. This spreads I/O across all drives, including the spare, thus reducing the load on each drive, increasing performance. It does, however, prevent sharing the spare drive among multiple arrays, which is occasionally desirable.Intel Matrix RAID
Intel Matrix RAID is a feature present in the ICH6R and subsequent Southbridge chipsets from Intel, accessible and configurable via the RAID BIOS setup utility. Matrix RAID supports as few as two physical disks or as many as the controller supports. The distinguishing feature of Matrix RAID is that it allows any assortment of RAID 0, 1, 5, or 10 volumes in the array, to which a controllable portion of each disk is allocated.As such, a Matrix RAID array can improve both performance and data integrity. A practical instance of this would use a small RAID 0 volume for the operating system, program, and paging files; second larger RAID 1 volume would store critical data. Linux MD RAID is also capable of this.
Linux MD RAID 10
The software RAID subsystem provided by the Linux kernel, called Linux MD RAID|, supports the creation of both classic RAID 1+0 arrays, and non-standard RAID arrays that use a single-level RAID layout with some additional features.The standard "near" layout, in which each chunk is repeated times in a -way stripe array, is equivalent to the standard RAID 10 arrangement, but it does not require that evenly divides. For example, an 2 layout on two, three, and four drives would look like:
2 drives 3 drives 4 drives
-------- ---------- --------------
A1 A1 A1 A1 A2 A1 A1 A2 A2
A2 A2 A2 A3 A3 A3 A3 A4 A4
A3 A3 A4 A4 A5 A5 A5 A6 A6
A4 A4 A5 A6 A6 A7 A7 A8 A8
.. .. .. .. .. .. .. .. ..
The four-drive example is identical to a standard RAID 1+0 array, while the three-drive example is a software implementation of RAID 1E. The two-drive example is equivalent to RAID 1.
The driver also supports a "far" layout, in which all the drives are divided into sections. All the chunks are repeated in each section but are switched in groups. For example, 2 layouts on two-, three-, and four-drive arrays would look like this:
2 drives 3 drives 4 drives
-------- ------------ ------------------
A1 A2 A1 A2 A3 A1 A2 A3 A4
A3 A4 A4 A5 A6 A5 A6 A7 A8
A5 A6 A7 A8 A9 A9 A10 A11 A12
.. .. .. .. .. .. .. .. ..
A2 A1 A3 A1 A2 A2 A1 A4 A3
A4 A3 A6 A4 A5 A6 A5 A8 A7
A6 A5 A9 A7 A8 A10 A9 A12 A11
.. .. .. .. .. .. .. .. ..
"Far" layout is designed for offering striping performance on a mirrored array; sequential reads can be striped, as in RAID 0 configurations. Random reads are somewhat faster, while sequential and random writes offer about equal speed to other mirrored RAID configurations. "Far" layout performs well for systems in which reads are more frequent than writes, which is a common case. For a comparison, regular RAID 1 as provided by Linux software RAID, does not stripe reads, but can perform reads in parallel.
The md driver also supports an "offset" layout, in which each stripe is repeated times and offset by devices. For example, 2 layouts on two-, three-, and four-drive arrays are laid out as:
2 drives 3 drives 4 drives
-------- ---------- ---------------
A1 A2 A1 A2 A3 A1 A2 A3 A4
A2 A1 A3 A1 A2 A4 A1 A2 A3
A3 A4 A4 A5 A6 A5 A6 A7 A8
A4 A3 A6 A4 A5 A8 A5 A6 A7
A5 A6 A7 A8 A9 A9 A10 A11 A12
A6 A5 A9 A7 A8 A12 A9 A10 A11
.. .. .. .. .. .. .. .. ..
It is also possible to combine "near" and "offset" layouts.
In the examples above, is the number of drives, while,, and are given as parameters to mdadm|'s option. Linux software RAID also supports creation of standard RAID 0, 1, 4, 5, and 6 configurations.
RAID 1E
Some RAID 1 implementations treat arrays with more than two disks differently, creating a non-standard RAID level known as RAID 1E. In this layout, data striping is combined with mirroring, by mirroring each written stripe to one of the remaining disks in the array. Usable capacity of a RAID 1E array is 50% of the total capacity of all drives forming the array; if drives of different sizes are used, only the portions equal to the size of smallest member are utilized on each drive.One of the benefits of RAID 1E over usual RAID 1 mirrored pairs is that the performance of random read operations remains above the performance of a single drive even in a degraded array.
RAID-Z
The ZFS filesystem provides RAID-Z, a data/parity distribution scheme similar to RAID 5, but using dynamic stripe width: every block is its own RAID stripe, regardless of blocksize, resulting in every RAID-Z write being a full-stripe write. This, when combined with the copy-on-write transactional semantics of ZFS, eliminates the write hole error. RAID-Z is also faster than traditional RAID 5 because it does not need to perform the usual read-modify-write sequence. RAID-Z does not require any special hardware, such as NVRAM for reliability, or write buffering for performance.Given the dynamic nature of RAID-Z's stripe width, RAID-Z reconstruction must traverse the filesystem metadata to determine the actual RAID-Z geometry. This would be impossible if the filesystem and the RAID array were separate products, whereas it becomes feasible when there is an integrated view of the logical and physical structure of the data. Going through the metadata means that ZFS can validate every block against its 256-bit checksum as it goes, whereas traditional RAID products usually cannot do this.
In addition to handling whole-disk failures, RAID-Z can also detect and correct silent data corruption, offering "self-healing data": when reading a RAID-Z block, ZFS compares it against its checksum, and if the data disks did not return the right answer, ZFS reads the parity and then figures out which disk returned bad data. Then, it repairs the damaged data and returns good data to the requestor.
There are five different RAID-Z modes: RAID-Z0, RAID-Z1, RAID-Z2, RAID-Z3, and mirror.
Drive Extender
Drive Extender is a specialized case of JBOD RAID 1 implemented at the file system level.Microsoft announced in 2011 that Drive Extender would no longer be included as part of Windows Home Server Version 2, Windows Home Server 2011. As a result, there has been a third-party vendor move to fill the void left by DE. Included competitors are Division M, the developers of Drive Bender, and StableBit's DrivePool.
BeyondRAID
BeyondRAID is not a true RAID extension, but consolidates up to 12 SATA hard drives into one pool of storage. It has the advantage of supporting multiple disk sizes at once, much like JBOD, while providing redundancy for all disks and allowing a hot-swap upgrade at any time. Internally it uses a mix of techniques similar to RAID 1 and 5. Depending on the fraction of data in relation to capacity, it can survive up to three drive failures, if the "array" can be restored onto the remaining good disks before another drive fails. The amount of usable storage can be approximated by summing the capacities of the disks and subtracting the capacity of the largest disk. For example, if a 500, 400, 200, and 100 GB drive were installed, the approximate usable capacity would be 500 + 400 + 200 + 100 − 500 = 700 GB of usable space. Internally the data would be distributed in two RAID 5-like arrays and two RAID 1-like sets:
Drives
| 100 GB | 200 GB | 400 GB | 500 GB |
----------
| x | unusable space
----------
-------------------
| A1 | A1 | RAID 1 set
-------------------
-------------------
| B1 | B1 | RAID 1 set
-------------------
----------------------------
| C1 | C2 | Cp | RAID 5 array
----------------------------
-------------------------------------
| D1 | D2 | D3 | Dp | RAID 5 array
-------------------------------------
BeyondRaid offers a RAID 6–like feature and can perform hash-based compression using 160-bit SHA1 hashes to maximize storage efficiency.
Unraid
Unraid is a Linux-based operating system optimized for media file storage.Disadvantages include slower write performance than a single disk and bottlenecks when multiple drives are written concurrently. However, Unraid allows support of a cache pool which can dramatically speed up the write performance. Cache pool data can be temporarily protected using BTRFS RAID 1 until Unraid moves it to the array based on a schedule set within the software.
Advantages include lower power consumption than standard RAID levels, the ability to use multiple hard drives with differing sizes to their full capacity and in the event of multiple concurrent hard drive failures, only losing the data stored on the failed hard drives compared to standard RAID levels which offer striping in which case all of the data on the array is lost when more hard drives fail than the redundancy can handle.
CRYPTO softraid
In OpenBSD, CRYPTO is an encrypting discipline for the softraid subsystem. It encrypts data on a single chunk toprovide for data confidentiality. CRYPTO does not provide redundancy.