Erasure Codes Made So Simple, You ll Really Like Them

Size: px
Start display at page:

Download "Erasure Codes Made So Simple, You ll Really Like Them"

Transcription

1 Erasure Codes Made So Simple, You ll Really Like Them W. David Schwaderer August 7, 214 Santa Clara, CA 1 Agenda Errors Versus Erasures HDD Bit Error Rate Implications RAID 4, 5, and 6 Review Objects and Dispersed Storage The Math Summary Questions 2 Errors Versus Erasures Communications Error Detection Asynchronous (Start/Stop) Communication Parity (e.g. Even/Odd) TCP/IP Checksums Ethernet CCITT-32 CRC (x+1) * Special Polynomial: (x 32 +x 26 +x 23 +x 22 +x 16 +x 12 +x 11 +x 1 +x 8 +x 7 +x 5 +x 4 +x 2 +x 1 +1 ) Low-Order Term Coefficients: == x4c11db7 (32 bits) Ethernet Frame HDR Payload CRC Transmitter Modulo 2 Divisor: x4c11db7 Receiver Modulo 2 Divisor: x4c11db7 Receiver remainder!= xdebb2e3 Error! position unknown Erasure: Error in known position Key Take Away: Special Polynomials; Magic Numbers; Bit-Wise, Modulo 2 Arithmetic 3 Santa Clara, CA 1

2 HDD Facts of Life Nominal raw BER values: 1-5 to 1-6 => Improve reliability using ECC ECC-corrected BER ratings: Desktop hard disks ~ 1 in 1 14 Enterprise hard disks ~ 1 in 1 15 (ten times better). Desktop hard disks have ~8X the capacity of an enterprise disks. => Large capacity disks experience inevitable uncorrectable bit errors Disk arrays use RAID to improve reliability. (Spreads data across multiple disks) RAID ~ Redundant Array of Inexpensive Disks ~ Redundant Array of Independent Disks 4 Disk 1 RAID 4 & 5 Parity Stripe Across LUN Devices... Disk 2 Disk 3 Disk N-1 Disk P RAID 5 Distributes Parity... Disk 1 Disk 2 Disk 3 Disk N-1 Disk P ERASURE! Rebuilds are fraught with peril.days and weeks.marginal reliability Large capacity disks experience inevitable uncorrectable bit errors Recovered Disk 1 N Total Disks, N-1 Disks, N-1 of N Can Lose One Disk, May Have Rebuild Problems 5 RAID 4 & 5 Parity Stripe Disk 1 Disk 2 Disk 3... Disk N-1 Disk P unsigned long SectorLba; for (SectorLba =, SectorLba < MAX_LBA, SectorLba++) { RAID 5 Distributes Parity Disk 1 Sector[SectorLba] Disk 2 Sector[SectorLba] Disk 3 Sector[SectorLba] Disk N-1 Sector[SectorLba] Parity Sector[SectorLba] } Santa Clara, CA 2

3 RAID 6 Parity Disk 1 Disk 2 Disk 3 Disk 4...???? Disk N-3 Disk P Disk Q Disk R ERASURES! Rebuilds are fraught with peril.days and weeks.marginal reliability? Large capacity disks experience inevitable uncorrectable bit errors Recovered Disk 1 Recovered Disk 2 Recovered Disk 3 N Total Disks, N-3 Disks, N-3 of N Can Lose Three Disks, Even Fewer Rebuild Problems 7 Objects & Information Dispersal One Object (of many on device?) P1 P2 P3 P4 P5 P6 P7 Disk Dispersing Object s Exploits: Collective storage device pool isolation/reliability Distributed scale-out infrastructure design strengths 1. Distributed rebuilds for lost object slices 2. Network bandwidth load balancing Eliminates 7X data redundancy and RAID rebuild weaknesses. However, extreme data availability brings no free lunch: Computations Read/Update/Write Workload Amplification Scale at Tail Laggard Compensations 14 of 21 8 Replication Storage Reclamation Object d Object Parities 9 Santa Clara, CA 3

4 Replication Storage Reclamation d Object Parities >5X Reclaimed Capacity 1 Club Members and Their Labels Finite Shape Club How many? Non Non Non Always One Member Three Non- Members Answer: Four Members Take Away: Club members and their labels are different. Once assigned, label assignments are immutable. 11 Club Member Arithmetic ZERO ZERO ZERO + = * = + = * = + = * = Reciprocal! MOD-4(6) + = * = +/- -/+ + = ZERO ZERO Take Away: Label assignments enable arithmetic operations. It s all about the labels Santa Clara, CA 4

5 Polynomial Shorthand Consider Degree 8 Polynomials ax 8 + bx 7 + cx 6 + dx 5 + ex 4 + fx 3 + gx 2 + hx 1 + kx Example Degree 8 Polynomial 4X 8 + X 7 + 2X X 5 + 1X 4 + 8X 3 + (-22)X X X Example Degree 8 Polynomial Shorthand Label! 13 X 8 + X 4 + X 3 + X (Special Polynomial) X 8 + X 7 + X 6 + X 5 + 1X 4 + 1X 3 + 1X 2 + X 1 + 1X = = x1d Polynomial Label! If α is a root, by definition: α 8 + α 4 + α 3 + α = So, α 8 + α 4 + α 3 + α = (α 4 + α 3 + α 2 + 1) = (α 4 + α 3 + α 2 + 1) or: α 8 = α 4 + α 3 + α α = 1 = α7 + α 6 + α 5 + α 4 + α 3 + α 2 + α + 1 ~ x1 α 1 = α = α7 + α 6 + α 5 + α 4 + α 3 + α 2 + 1α + ~ x2 α 2 =α2 = α7 + α 6 + α 5 + α 4 + α 3 + 1α 2 + α + ~ x4 α 3 =α3 = α 7 + α 6 + α 5 + α 4 + 1α 3 + α 2 + α + ~ x8 α 4 =α4 = α 7 + α 6 + α 5 + 1α 4 + α 3 + α 2 + α + ~ x1 α 5 =α5 = α 7 + α 6 + 1α 5 + α 4 + α 3 + α 2 + α + ~ x2 α 6 =α6 = α 7 + 1α 6 + α 5 + α 4 + α 3 + α 2 + α + ~ x4 α 7 =α7 = 1α 7 + α 6 + α 5 + α 4 + α 3 + α 2 + α + ~ x8 α 8 =α4 + α 3 + α = α 7 + α 6 + α 5 + 1α 4 + 1α 3 + 1α 2 + α + 1 ~ x1d α 9 =α(α 8 ) = α(α 4 + α 3 + α 2 + 1) = α 5 + α 4 + α 3 + α ~ x3a α 1 =α 2 (α 8 ) = α 2 (α 4 + α 3 + α 2 + 1) = α 6 + α 5 + α 4 + α 2 ~ x74 α 11 =α 3 (α 8 ) = α 3 (α 4 + α 3 + α 2 + 1) = α 7 + α 6 + α 5 + α 3 ~ xe8 b 7 b 6 b 5 b 4 b 3 b 2 b 1 b b 7 b 6 b 5 b 4 b 3 b 2 b 1 b α 12 =α 4 (α 8 ) = α 4 (α 4 + α 3 + α 2 + 1) = α 8 + α 7 + α 6 + α 4 = (α 4 + α 3 + α 2 + 1) + α 7 + α 6 + α 4 = α 7 + α 6 + α 3 + α ~ xcd Linear Feedback Shift Register α 254 = α 7 + α 3 + α 2 + α 1 ~ x8e α 255 =α (α 254 ) = α (α 7 + α 3 + α 2 + α 1 ) = α 8 + α 4 + α 3 + α 2 = (α 4 + α 3 + α 2 + 1) + α 4 + α 3 + α 2 = 1 = α 14 + Linear Algebra Review X + Y = 9 3X - Y = 2 X + Y = 3 3X - Y = 1 4X = 4 => X == 1 X + Y = 3 => Y == 2 15 Santa Clara, CA 5

6 Galois Field Overview A finite set of elements (e.g. 2 8, 2 16, etc.) that have: Arithmetic operator Multiplicative operator A zero member Negatives and Reciprocals ~ + ~ * Field operations always produce another element in the set. (Closure) In this discussion, our Galois Field has: 256 elements (thingees) labeled x1 to xff, and x - [GF(8)] An Arithmetic operator (addition and subtraction) ~ XOR A Multiplicative operator ( * and ) ~ exponent operations 16 Galois Multiplicative Operator (X ) (Y) = (α log α X ) ( α log α Y ) = α [(log α X + log α Y) modulus 255] Noting that α K α -K = α K-K = α = 1...it follows that 1/(α K ) = α -K 255 non-zero members So... (X )/(Y) = (α log α X )/( α log α Y ) = (α log α X ) (1/( α log α Y )) = (α log α X ) (α -log α Y ) = α [(log α X - log α Y ) modulus 255] Note: Exponent additions/subtractions operations are base Example Calculations x2b x6f = x8f From Log Table (Table 2) x2b = α xda 16 = α x6f = α x3d 16 = α 61 1 (Base 1 for Understanding Ease) So x2b x6f = α α 61 1 From Powers Table (Table 1) α x18 = x8f = α ( )mod255 1 = α (279 1)mod255 1 = α 24 1 = α x Santa Clara, CA 6

7 Example Calculations (cont.) Arithmetic (Addition, Subtraction): Multiplication: x3f x12 x2d x28 == b XOR 1.1 b =.11 b = x5 = α xa6 α xe = αxa6 + xe (From Table 2) (Base 16 Regular Addition) = α (x186)mod 255 = α x87 = xa9 Division: x3f (1/(x12)) = α xa6 α -xe = αxa6 - xe = α x1a5 - xe (From Table 1) (From Table 2) (Base 16 Regular Subtraction) (xa6 = xa6 + xff = ox1a5) = α xc5 = x8d (From Table 1) 19 Oddities Negative Values ~ XOR Thus, for any element V, V = -V since (V XOR V) = Reciprocals Let log α V == xnn (V ) Then 1/V = 1/(α xnn ) = α -xnn Proof: v/v = 1 = (α xnn ) / (α xnn ) = (α xnn ) [1/(α xnn )] = (α xnn ) (α -xnn ) (?) = (α xnn + -xnn ) = α = 1 2 Double Disk Failure Remembering Parity Disk P Generation: D 1 D 2 D 3 D N-2 = P (Normal RAID 5 Parity Generation) Parity Disk Q Generation: (K 1 D 1) (K 2 D 2) (K 3 D 3). (K N-2 D N-2 ) = Q Losing Disk 1 and 2 gives D 1 D 2 = P D 3 D N-2 = V 1 (1) (K 1 D 1) (K 2 D 2) = Q (K 3 D 3) (K N-2 D N-2 ) = V 2 (2) So... (K 1 D 1) (K 1 D 2) = (K 1 V 1) (K 1 D 1) (K 2 D 2) = V 2 Gives... D 2 (K 1 K 2) = (K 1 V 1) V 2 Or D 2 = ((K 1 V 1) V 2 ) / (K 1 K 2) Recover D 1 using RAID 5 Logic with P values 21 Santa Clara, CA 7

8 Summary Easy to Solve Independent Linear Equations X + Y = 3 3*X - Y = 1 Similarly, Losing Two Values Results in: X Y = V 1 x3 X Y = V 2 22 The End Thank you! schwaderer_1@comcast.net 23 Santa Clara, CA 8

How To Write A Hexadecimal Program

How To Write A Hexadecimal Program The mathematics of RAID-6 H. Peter Anvin First version 20 January 2004 Last updated 20 December 2011 RAID-6 supports losing any two drives. syndromes, generally referred P and Q. The way

More information

The mathematics of RAID-6

The mathematics of RAID-6 The mathematics of RAID-6 H. Peter Anvin 1 December 2004 RAID-6 supports losing any two drives. The way this is done is by computing two syndromes, generally referred P and Q. 1 A quick

More information

The finite field with 2 elements The simplest finite field is

The finite field with 2 elements The simplest finite field is The finite field with 2 elements The simplest finite field is GF (2) = F 2 = {0, 1} = Z/2 It has addition and multiplication + and defined to be 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0 0 0 = 0 0 1 = 0

More information

Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem)

Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) In order to understand the details of the Fingerprinting Theorem on fingerprints of different texts from Chapter 19 of the

More information

CYCLIC REDUNDANCY CHECKS IN USB. Introduction. Two-minute mathematical background

CYCLIC REDUNDANCY CHECKS IN USB. Introduction. Two-minute mathematical background CYCLIC REDUNDANCY CHECKS IN USB Introduction The USB specification calls for the use of Cyclic Redundancy Checksums (CRC) to protect all non-pid fields in token and data packets from errors during transmission.

More information

Distributed Storage Networks and Computer Forensics

Distributed Storage Networks and Computer Forensics Distributed Storage Networks 5 Raid-6 Encoding Technical Faculty Winter Semester 2011/12 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant Array of Inexpensive Disks,

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer

Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Institut für Informatik Wintersemester 2007/08 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant

More information

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson

JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials

More information

Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any.

Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. Algebra 2 - Chapter Prerequisites Vocabulary Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. P1 p. 1 1. counting(natural) numbers - {1,2,3,4,...}

More information

Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic. Theoretical Underpinnings of Modern Cryptography

Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic. Theoretical Underpinnings of Modern Cryptography Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic Theoretical Underpinnings of Modern Cryptography Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) January 29, 2015

More information

SOLVING POLYNOMIAL EQUATIONS

SOLVING POLYNOMIAL EQUATIONS C SOLVING POLYNOMIAL EQUATIONS We will assume in this appendix that you know how to divide polynomials using long division and synthetic division. If you need to review those techniques, refer to an algebra

More information

1.3 Algebraic Expressions

1.3 Algebraic Expressions 1.3 Algebraic Expressions A polynomial is an expression of the form: a n x n + a n 1 x n 1 +... + a 2 x 2 + a 1 x + a 0 The numbers a 1, a 2,..., a n are called coefficients. Each of the separate parts,

More information

The Method of Partial Fractions Math 121 Calculus II Spring 2015

The Method of Partial Fractions Math 121 Calculus II Spring 2015 Rational functions. as The Method of Partial Fractions Math 11 Calculus II Spring 015 Recall that a rational function is a quotient of two polynomials such f(x) g(x) = 3x5 + x 3 + 16x x 60. The method

More information

9. POLYNOMIALS. Example 1: The expression a(x) = x 3 4x 2 + 7x 11 is a polynomial in x. The coefficients of a(x) are the numbers 1, 4, 7, 11.

9. POLYNOMIALS. Example 1: The expression a(x) = x 3 4x 2 + 7x 11 is a polynomial in x. The coefficients of a(x) are the numbers 1, 4, 7, 11. 9. POLYNOMIALS 9.1. Definition of a Polynomial A polynomial is an expression of the form: a(x) = a n x n + a n-1 x n-1 +... + a 1 x + a 0. The symbol x is called an indeterminate and simply plays the role

More information

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.

More information

A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems

A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems James S Plank Department of Computer Science University of Tennessee February 19, 1999 Abstract It is well-known that Reed-Solomon

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

Linear Equations in One Variable

Linear Equations in One Variable Linear Equations in One Variable MATH 101 College Algebra J. Robert Buchanan Department of Mathematics Summer 2012 Objectives In this section we will learn how to: Recognize and combine like terms. Solve

More information

How To Understand And Understand The Power Of Aird 6 On Clariion

How To Understand And Understand The Power Of Aird 6 On Clariion A Detailed Review Abstract This white paper discusses the EMC CLARiiON RAID 6 implementation available in FLARE 26 and later, including an overview of RAID 6 and the CLARiiON-specific implementation, when

More information

a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4)

a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4) ROOTS OF POLYNOMIAL EQUATIONS In this unit we discuss polynomial equations. A polynomial in x of degree n, where n 0 is an integer, is an expression of the form P n (x) =a n x n + a n 1 x n 1 + + a 1 x

More information

Reliability and Fault Tolerance in Storage

Reliability and Fault Tolerance in Storage Reliability and Fault Tolerance in Storage Dalit Naor/ Dima Sotnikov IBM Haifa Research Storage Systems 1 Advanced Topics on Storage Systems - Spring 2014, Tel-Aviv University http://www.eng.tau.ac.il/semcom

More information

2 Integrating Both Sides

2 Integrating Both Sides 2 Integrating Both Sides So far, the only general method we have for solving differential equations involves equations of the form y = f(x), where f(x) is any function of x. The solution to such an equation

More information

3.2 The Factor Theorem and The Remainder Theorem

3.2 The Factor Theorem and The Remainder Theorem 3. The Factor Theorem and The Remainder Theorem 57 3. The Factor Theorem and The Remainder Theorem Suppose we wish to find the zeros of f(x) = x 3 + 4x 5x 4. Setting f(x) = 0 results in the polynomial

More information

Non-Redundant (RAID Level 0)

Non-Redundant (RAID Level 0) There are many types of RAID and some of the important ones are introduced below: Non-Redundant (RAID Level 0) A non-redundant disk array, or RAID level 0, has the lowest cost of any RAID organization

More information

1.7. Partial Fractions. 1.7.1. Rational Functions and Partial Fractions. A rational function is a quotient of two polynomials: R(x) = P (x) Q(x).

1.7. Partial Fractions. 1.7.1. Rational Functions and Partial Fractions. A rational function is a quotient of two polynomials: R(x) = P (x) Q(x). .7. PRTIL FRCTIONS 3.7. Partial Fractions.7.. Rational Functions and Partial Fractions. rational function is a quotient of two polynomials: R(x) = P (x) Q(x). Here we discuss how to integrate rational

More information

CS 153 Design of Operating Systems Spring 2015

CS 153 Design of Operating Systems Spring 2015 CS 153 Design of Operating Systems Spring 2015 Lecture 22: File system optimizations Physical Disk Structure Disk components Platters Surfaces Tracks Arm Track Sector Surface Sectors Cylinders Arm Heads

More information

How To Write A Disk Array

How To Write A Disk Array 200 Chapter 7 (This observation is reinforced and elaborated in Exercises 7.5 and 7.6, and the reader is urged to work through them.) 7.2 RAID Disks are potential bottlenecks for system performance and

More information

Application. Outline. 3-1 Polynomial Functions 3-2 Finding Rational Zeros of. Polynomial. 3-3 Approximating Real Zeros of.

Application. Outline. 3-1 Polynomial Functions 3-2 Finding Rational Zeros of. Polynomial. 3-3 Approximating Real Zeros of. Polynomial and Rational Functions Outline 3-1 Polynomial Functions 3-2 Finding Rational Zeros of Polynomials 3-3 Approximating Real Zeros of Polynomials 3-4 Rational Functions Chapter 3 Group Activity:

More information

Data Corruption In Storage Stack - Review

Data Corruption In Storage Stack - Review Theoretical Aspects of Storage Systems Autumn 2009 Chapter 2: Double Disk Failures André Brinkmann Data Corruption in the Storage Stack What are Latent Sector Errors What is Silent Data Corruption Checksum

More information

Factorization Algorithms for Polynomials over Finite Fields

Factorization Algorithms for Polynomials over Finite Fields Degree Project Factorization Algorithms for Polynomials over Finite Fields Sajid Hanif, Muhammad Imran 2011-05-03 Subject: Mathematics Level: Master Course code: 4MA11E Abstract Integer factorization is

More information

Data Storage - II: Efficient Usage & Errors

Data Storage - II: Efficient Usage & Errors Data Storage - II: Efficient Usage & Errors Week 10, Spring 2005 Updated by M. Naci Akkøk, 27.02.2004, 03.03.2005 based upon slides by Pål Halvorsen, 12.3.2002. Contains slides from: Hector Garcia-Molina

More information

Tamper protection with Bankgirot HMAC Technical Specification

Tamper protection with Bankgirot HMAC Technical Specification Mars 2014 Tamper protection with Bankgirot HMAC Technical Specification Bankgirocentralen BGC AB 2013. All rights reserved. www.bankgirot.se Innehåll 1 General...3 2 Tamper protection with HMAC-SHA256-128...3

More information

Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification

Application Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification Application Note 3/2003 PC Master Software Communication Protocol Specification By Pavel Kania and Michal Hanak S 3 L Applications Engineerings MCSL Roznov pod Radhostem Introduction The purpose of this

More information

Exercise 2 : checksums, RAID and erasure coding

Exercise 2 : checksums, RAID and erasure coding Exercise 2 : checksums, RAID and erasure coding Sébastien Ponce May 22, 2015 1 Goals of the exercise Play with checksums and compare efficiency and robustness Use hand written version of RAID systems and

More information

College Algebra - MAT 161 Page: 1 Copyright 2009 Killoran

College Algebra - MAT 161 Page: 1 Copyright 2009 Killoran College Algebra - MAT 6 Page: Copyright 2009 Killoran Zeros and Roots of Polynomial Functions Finding a Root (zero or x-intercept) of a polynomial is identical to the process of factoring a polynomial.

More information

1 Shapes of Cubic Functions

1 Shapes of Cubic Functions MA 1165 - Lecture 05 1 1/26/09 1 Shapes of Cubic Functions A cubic function (a.k.a. a third-degree polynomial function) is one that can be written in the form f(x) = ax 3 + bx 2 + cx + d. (1) Quadratic

More information

Zeros of Polynomial Functions

Zeros of Polynomial Functions Review: Synthetic Division Find (x 2-5x - 5x 3 + x 4 ) (5 + x). Factor Theorem Solve 2x 3-5x 2 + x + 2 =0 given that 2 is a zero of f(x) = 2x 3-5x 2 + x + 2. Zeros of Polynomial Functions Introduction

More information

minimal polyonomial Example

minimal polyonomial Example Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

CM2202: Scientific Computing and Multimedia Applications General Maths: 2. Algebra - Factorisation

CM2202: Scientific Computing and Multimedia Applications General Maths: 2. Algebra - Factorisation CM2202: Scientific Computing and Multimedia Applications General Maths: 2. Algebra - Factorisation Prof. David Marshall School of Computer Science & Informatics Factorisation Factorisation is a way of

More information

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year. This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra

More information

UNCORRECTED PAGE PROOFS

UNCORRECTED PAGE PROOFS number and and algebra TopIC 17 Polynomials 17.1 Overview Why learn this? Just as number is learned in stages, so too are graphs. You have been building your knowledge of graphs and functions over time.

More information

Basics of Polynomial Theory

Basics of Polynomial Theory 3 Basics of Polynomial Theory 3.1 Polynomial Equations In geodesy and geoinformatics, most observations are related to unknowns parameters through equations of algebraic (polynomial) type. In cases where

More information

File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System

File System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID

More information

Zero: If P is a polynomial and if c is a number such that P (c) = 0 then c is a zero of P.

Zero: If P is a polynomial and if c is a number such that P (c) = 0 then c is a zero of P. MATH 11011 FINDING REAL ZEROS KSU OF A POLYNOMIAL Definitions: Polynomial: is a function of the form P (x) = a n x n + a n 1 x n 1 + + a x + a 1 x + a 0. The numbers a n, a n 1,..., a 1, a 0 are called

More information

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur

Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards

More information

Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test

Math Review. for the Quantitative Reasoning Measure of the GRE revised General Test Math Review for the Quantitative Reasoning Measure of the GRE revised General Test www.ets.org Overview This Math Review will familiarize you with the mathematical skills and concepts that are important

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for

More information

Today s Papers. RAID Basics (Two optional papers) Array Reliability. EECS 262a Advanced Topics in Computer Systems Lecture 4

Today s Papers. RAID Basics (Two optional papers) Array Reliability. EECS 262a Advanced Topics in Computer Systems Lecture 4 EECS 262a Advanced Topics in Computer Systems Lecture 4 Filesystems (Con t) September 15 th, 2014 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley Today

More information

How To Understand The Theory Of Algebraic Functions

How To Understand The Theory Of Algebraic Functions Homework 4 3.4,. Show that x x cos x x holds for x 0. Solution: Since cos x, multiply all three parts by x > 0, we get: x x cos x x, and since x 0 x x 0 ( x ) = 0, then by Sandwich theorem, we get: x 0

More information

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr

Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc cadmium@x9c.fr Released under the LGPL version 3 February 6, 2010 Abstract: This

More information

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize

More information

CS161: Operating Systems

CS161: Operating Systems CS161: Operating Systems Matt Welsh mdw@eecs.harvard.edu Lecture 18: RAID April 19, 2007 2007 Matt Welsh Harvard University 1 RAID Redundant Arrays of Inexpensive Disks Invented in 1986-1987 by David Patterson

More information

Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems

Fault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems Fault Tolerance & Reliability CDA 5140 Chapter 3 RAID & Sample Commercial FT Systems - basic concept in these, as with codes, is redundancy to allow system to continue operation even if some components

More information

7. Some irreducible polynomials

7. Some irreducible polynomials 7. Some irreducible polynomials 7.1 Irreducibles over a finite field 7.2 Worked examples Linear factors x α of a polynomial P (x) with coefficients in a field k correspond precisely to roots α k [1] of

More information

Solving DEs by Separation of Variables.

Solving DEs by Separation of Variables. Solving DEs by Separation of Variables. Introduction and procedure Separation of variables allows us to solve differential equations of the form The steps to solving such DEs are as follows: dx = gx).

More information

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization

More information

Tim Kerins. Leaving Certificate Honours Maths - Algebra. Tim Kerins. the date

Tim Kerins. Leaving Certificate Honours Maths - Algebra. Tim Kerins. the date Leaving Certificate Honours Maths - Algebra the date Chapter 1 Algebra This is an important portion of the course. As well as generally accounting for 2 3 questions in examination it is the basis for many

More information

A Systematic Approach to Factoring

A Systematic Approach to Factoring A Systematic Approach to Factoring Step 1 Count the number of terms. (Remember****Knowing the number of terms will allow you to eliminate unnecessary tools.) Step 2 Is there a greatest common factor? Tool

More information

File System Reliability (part 2)

File System Reliability (part 2) File System Reliability (part 2) Main Points Approaches to reliability Careful sequencing of file system opera@ons Copy- on- write (WAFL, ZFS) Journalling (NTFS, linux ext4) Log structure (flash storage)

More information

PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5.

PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5. PUTNAM TRAINING POLYNOMIALS (Last updated: November 17, 2015) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include

More information

Sheet 7 (Chapter 10)

Sheet 7 (Chapter 10) King Saud University College of Computer and Information Sciences Department of Information Technology CAP240 First semester 1430/1431 Multiple-choice Questions Sheet 7 (Chapter 10) 1. Which error detection

More information

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear

More information

The Factor Theorem and a corollary of the Fundamental Theorem of Algebra

The Factor Theorem and a corollary of the Fundamental Theorem of Algebra Math 421 Fall 2010 The Factor Theorem and a corollary of the Fundamental Theorem of Algebra 27 August 2010 Copyright 2006 2010 by Murray Eisenberg. All rights reserved. Prerequisites Mathematica Aside

More information

1.5. Factorisation. Introduction. Prerequisites. Learning Outcomes. Learning Style

1.5. Factorisation. Introduction. Prerequisites. Learning Outcomes. Learning Style Factorisation 1.5 Introduction In Block 4 we showed the way in which brackets were removed from algebraic expressions. Factorisation, which can be considered as the reverse of this process, is dealt with

More information

1 Lecture: Integration of rational functions by decomposition

1 Lecture: Integration of rational functions by decomposition Lecture: Integration of rational functions by decomposition into partial fractions Recognize and integrate basic rational functions, except when the denominator is a power of an irreducible quadratic.

More information

Introduction to Finite Fields (cont.)

Introduction to Finite Fields (cont.) Chapter 6 Introduction to Finite Fields (cont.) 6.1 Recall Theorem. Z m is a field m is a prime number. Theorem (Subfield Isomorphic to Z p ). Every finite field has the order of a power of a prime number

More information

Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given.

Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given. Polynomials (Ch.1) Study Guide by BS, JL, AZ, CC, SH, HL Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given. Sasha s method

More information

A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems

A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems A Tutorial on Reed-olomon Coding for Fault-Tolerance in RAID-like ystems James lank Technical Report C-96-332 Department of Computer cience University of Tennessee IMORTANT The information dispersal matrix

More information

Useful Number Systems

Useful Number Systems Useful Number Systems Decimal Base = 10 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} Binary Base = 2 Digit Set = {0, 1} Octal Base = 8 = 2 3 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7} Hexadecimal Base = 16 = 2

More information

Field Fundamentals. Chapter 3. 3.1 Field Extensions. 3.1.1 Definitions. 3.1.2 Lemma

Field Fundamentals. Chapter 3. 3.1 Field Extensions. 3.1.1 Definitions. 3.1.2 Lemma Chapter 3 Field Fundamentals 3.1 Field Extensions If F is a field and F [X] is the set of all polynomials over F, that is, polynomials with coefficients in F, we know that F [X] is a Euclidean domain,

More information

expression is written horizontally. The Last terms ((2)( 4)) because they are the last terms of the two polynomials. This is called the FOIL method.

expression is written horizontally. The Last terms ((2)( 4)) because they are the last terms of the two polynomials. This is called the FOIL method. A polynomial of degree n (in one variable, with real coefficients) is an expression of the form: a n x n + a n 1 x n 1 + a n 2 x n 2 + + a 2 x 2 + a 1 x + a 0 where a n, a n 1, a n 2, a 2, a 1, a 0 are

More information

Polynomials and Factoring

Polynomials and Factoring Lesson 2 Polynomials and Factoring A polynomial function is a power function or the sum of two or more power functions, each of which has a nonnegative integer power. Because polynomial functions are built

More information

What is RAID and how does it work?

What is RAID and how does it work? What is RAID and how does it work? What is RAID? RAID is the acronym for either redundant array of inexpensive disks or redundant array of independent disks. When first conceived at UC Berkley the former

More information

ECE 842 Report Implementation of Elliptic Curve Cryptography

ECE 842 Report Implementation of Elliptic Curve Cryptography ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic

More information

PARALLEL I/O FOR HIGH PERFORMANCE COMPUTING

PARALLEL I/O FOR HIGH PERFORMANCE COMPUTING o. rof. Dr. eter Brezany arallele and Verteilte Datenbanksysteme 1 ARALLEL I/O FOR HIGH ERFORMANCE COMUTING Skriptum zur Vorlesung eter Brezany Institut für Scientific Computing Universität Wien E-Mail:

More information

Filing Systems. Filing Systems

Filing Systems. Filing Systems Filing Systems At the outset we identified long-term storage as desirable characteristic of an OS. EG: On-line storage for an MIS. Convenience of not having to re-write programs. Sharing of data in an

More information

Integrals of Rational Functions

Integrals of Rational Functions Integrals of Rational Functions Scott R. Fulton Overview A rational function has the form where p and q are polynomials. For example, r(x) = p(x) q(x) f(x) = x2 3 x 4 + 3, g(t) = t6 + 4t 2 3, 7t 5 + 3t

More information

The Division Algorithm for Polynomials Handout Monday March 5, 2012

The Division Algorithm for Polynomials Handout Monday March 5, 2012 The Division Algorithm for Polynomials Handout Monday March 5, 0 Let F be a field (such as R, Q, C, or F p for some prime p. This will allow us to divide by any nonzero scalar. (For some of the following,

More information

Algebra I Vocabulary Cards

Algebra I Vocabulary Cards Algebra I Vocabulary Cards Table of Contents Expressions and Operations Natural Numbers Whole Numbers Integers Rational Numbers Irrational Numbers Real Numbers Absolute Value Order of Operations Expression

More information

SSDs and RAID: What s the right strategy. Paul Goodwin VP Product Development Avant Technology

SSDs and RAID: What s the right strategy. Paul Goodwin VP Product Development Avant Technology SSDs and RAID: What s the right strategy Paul Goodwin VP Product Development Avant Technology SSDs and RAID: What s the right strategy Flash Overview SSD Overview RAID overview Thoughts about Raid Strategies

More information

Graphic Designing with Transformed Functions

Graphic Designing with Transformed Functions Math Objectives Students will be able to identify a restricted domain interval and use function translations and dilations to choose and position a portion of the graph accurately in the plane to match

More information

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without

More information

3.6. Partial Fractions. Introduction. Prerequisites. Learning Outcomes

3.6. Partial Fractions. Introduction. Prerequisites. Learning Outcomes Partial Fractions 3.6 Introduction It is often helpful to break down a complicated algebraic fraction into a sum of simpler fractions. For 4x + 7 example it can be shown that x 2 + 3x + 2 has the same

More information

3 1. Note that all cubes solve it; therefore, there are no more

3 1. Note that all cubes solve it; therefore, there are no more Math 13 Problem set 5 Artin 11.4.7 Factor the following polynomials into irreducible factors in Q[x]: (a) x 3 3x (b) x 3 3x + (c) x 9 6x 6 + 9x 3 3 Solution: The first two polynomials are cubics, so if

More information

Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)

Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Kevin Broughan University of Waikato, Hamilton, New Zealand May 13, 2010 Remainder and Factor Theorem 15 Definition of factor If f (x)

More information

South Carolina College- and Career-Ready (SCCCR) Pre-Calculus

South Carolina College- and Career-Ready (SCCCR) Pre-Calculus South Carolina College- and Career-Ready (SCCCR) Pre-Calculus Key Concepts Arithmetic with Polynomials and Rational Expressions PC.AAPR.2 PC.AAPR.3 PC.AAPR.4 PC.AAPR.5 PC.AAPR.6 PC.AAPR.7 Standards Know

More information

Review. Lecture 21: Reliable, High Performance Storage. Overview. Basic Disk & File System properties CSC 468 / CSC 2204 11/23/2006

Review. Lecture 21: Reliable, High Performance Storage. Overview. Basic Disk & File System properties CSC 468 / CSC 2204 11/23/2006 S 468 / S 2204 Review Lecture 2: Reliable, High Performance Storage S 469HF Fall 2006 ngela emke rown We ve looked at fault tolerance via server replication ontinue operating with up to f failures Recovery

More information

CSE-E5430 Scalable Cloud Computing P Lecture 5

CSE-E5430 Scalable Cloud Computing P Lecture 5 CSE-E5430 Scalable Cloud Computing P Lecture 5 Keijo Heljanko Department of Computer Science School of Science Aalto University keijo.heljanko@aalto.fi 12.10-2015 1/34 Fault Tolerance Strategies for Storage

More information

Dr Michael Cohen. This talk does not represent my Employer. April 2005

Dr Michael Cohen. This talk does not represent my Employer. April 2005 RAID Reconstruction And the search for the Aardvark Dr Michael Cohen This talk does not represent my Employer April 2005 1 RAID 0: Striping What is RAID? Improves performance due to parallel disk access

More information

Factoring Polynomials

Factoring Polynomials Factoring Polynomials Hoste, Miller, Murieka September 12, 2011 1 Factoring In the previous section, we discussed how to determine the product of two or more terms. Consider, for instance, the equations

More information

Notes on Network Security Prof. Hemant K. Soni

Notes on Network Security Prof. Hemant K. Soni Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications

More information

Chapter 1: Order of Operations, Fractions & Percents

Chapter 1: Order of Operations, Fractions & Percents HOSP 1107 (Business Math) Learning Centre Chapter 1: Order of Operations, Fractions & Percents ORDER OF OPERATIONS When finding the value of an expression, the operations must be carried out in a certain

More information

Disk Array Data Organizations and RAID

Disk Array Data Organizations and RAID Guest Lecture for 15-440 Disk Array Data Organizations and RAID October 2010, Greg Ganger 1 Plan for today Why have multiple disks? Storage capacity, performance capacity, reliability Load distribution

More information

Discrete Mathematics: Homework 7 solution. Due: 2011.6.03

Discrete Mathematics: Homework 7 solution. Due: 2011.6.03 EE 2060 Discrete Mathematics spring 2011 Discrete Mathematics: Homework 7 solution Due: 2011.6.03 1. Let a n = 2 n + 5 3 n for n = 0, 1, 2,... (a) (2%) Find a 0, a 1, a 2, a 3 and a 4. (b) (2%) Show that

More information

FOIL FACTORING. Factoring is merely undoing the FOIL method. Let s look at an example: Take the polynomial x²+4x+4.

FOIL FACTORING. Factoring is merely undoing the FOIL method. Let s look at an example: Take the polynomial x²+4x+4. FOIL FACTORING Factoring is merely undoing the FOIL method. Let s look at an example: Take the polynomial x²+4x+4. First we take the 3 rd term (in this case 4) and find the factors of it. 4=1x4 4=2x2 Now

More information

5-3 Polynomial Functions. not in one variable because there are two variables, x. and y

5-3 Polynomial Functions. not in one variable because there are two variables, x. and y y. 5-3 Polynomial Functions State the degree and leading coefficient of each polynomial in one variable. If it is not a polynomial in one variable, explain why. 1. 11x 6 5x 5 + 4x 2 coefficient of the

More information

by Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array!

by Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array! by Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array! WHAT IS THIS ABOUT? BRIEF Coverage ;) Unusual Arrays Intro to RAID About RAID 0 Sight Samples Sound Samples About RAID 5 Demo

More information

ISTANBUL AYDIN UNIVERSITY

ISTANBUL AYDIN UNIVERSITY ISTANBUL AYDIN UNIVERSITY 2013-2014 Academic Year Fall Semester Department of Software Engineering SEN361 COMPUTER ORGANIZATION HOMEWORK REPORT STUDENT S NAME : GÖKHAN TAYMAZ STUDENT S NUMBER : B1105.090068

More information