Erasure Codes Made So Simple, You ll Really Like Them
|
|
- Elvin Carroll
- 8 years ago
- Views:
Transcription
1 Erasure Codes Made So Simple, You ll Really Like Them W. David Schwaderer August 7, 214 Santa Clara, CA 1 Agenda Errors Versus Erasures HDD Bit Error Rate Implications RAID 4, 5, and 6 Review Objects and Dispersed Storage The Math Summary Questions 2 Errors Versus Erasures Communications Error Detection Asynchronous (Start/Stop) Communication Parity (e.g. Even/Odd) TCP/IP Checksums Ethernet CCITT-32 CRC (x+1) * Special Polynomial: (x 32 +x 26 +x 23 +x 22 +x 16 +x 12 +x 11 +x 1 +x 8 +x 7 +x 5 +x 4 +x 2 +x 1 +1 ) Low-Order Term Coefficients: == x4c11db7 (32 bits) Ethernet Frame HDR Payload CRC Transmitter Modulo 2 Divisor: x4c11db7 Receiver Modulo 2 Divisor: x4c11db7 Receiver remainder!= xdebb2e3 Error! position unknown Erasure: Error in known position Key Take Away: Special Polynomials; Magic Numbers; Bit-Wise, Modulo 2 Arithmetic 3 Santa Clara, CA 1
2 HDD Facts of Life Nominal raw BER values: 1-5 to 1-6 => Improve reliability using ECC ECC-corrected BER ratings: Desktop hard disks ~ 1 in 1 14 Enterprise hard disks ~ 1 in 1 15 (ten times better). Desktop hard disks have ~8X the capacity of an enterprise disks. => Large capacity disks experience inevitable uncorrectable bit errors Disk arrays use RAID to improve reliability. (Spreads data across multiple disks) RAID ~ Redundant Array of Inexpensive Disks ~ Redundant Array of Independent Disks 4 Disk 1 RAID 4 & 5 Parity Stripe Across LUN Devices... Disk 2 Disk 3 Disk N-1 Disk P RAID 5 Distributes Parity... Disk 1 Disk 2 Disk 3 Disk N-1 Disk P ERASURE! Rebuilds are fraught with peril.days and weeks.marginal reliability Large capacity disks experience inevitable uncorrectable bit errors Recovered Disk 1 N Total Disks, N-1 Disks, N-1 of N Can Lose One Disk, May Have Rebuild Problems 5 RAID 4 & 5 Parity Stripe Disk 1 Disk 2 Disk 3... Disk N-1 Disk P unsigned long SectorLba; for (SectorLba =, SectorLba < MAX_LBA, SectorLba++) { RAID 5 Distributes Parity Disk 1 Sector[SectorLba] Disk 2 Sector[SectorLba] Disk 3 Sector[SectorLba] Disk N-1 Sector[SectorLba] Parity Sector[SectorLba] } Santa Clara, CA 2
3 RAID 6 Parity Disk 1 Disk 2 Disk 3 Disk 4...???? Disk N-3 Disk P Disk Q Disk R ERASURES! Rebuilds are fraught with peril.days and weeks.marginal reliability? Large capacity disks experience inevitable uncorrectable bit errors Recovered Disk 1 Recovered Disk 2 Recovered Disk 3 N Total Disks, N-3 Disks, N-3 of N Can Lose Three Disks, Even Fewer Rebuild Problems 7 Objects & Information Dispersal One Object (of many on device?) P1 P2 P3 P4 P5 P6 P7 Disk Dispersing Object s Exploits: Collective storage device pool isolation/reliability Distributed scale-out infrastructure design strengths 1. Distributed rebuilds for lost object slices 2. Network bandwidth load balancing Eliminates 7X data redundancy and RAID rebuild weaknesses. However, extreme data availability brings no free lunch: Computations Read/Update/Write Workload Amplification Scale at Tail Laggard Compensations 14 of 21 8 Replication Storage Reclamation Object d Object Parities 9 Santa Clara, CA 3
4 Replication Storage Reclamation d Object Parities >5X Reclaimed Capacity 1 Club Members and Their Labels Finite Shape Club How many? Non Non Non Always One Member Three Non- Members Answer: Four Members Take Away: Club members and their labels are different. Once assigned, label assignments are immutable. 11 Club Member Arithmetic ZERO ZERO ZERO + = * = + = * = + = * = Reciprocal! MOD-4(6) + = * = +/- -/+ + = ZERO ZERO Take Away: Label assignments enable arithmetic operations. It s all about the labels Santa Clara, CA 4
5 Polynomial Shorthand Consider Degree 8 Polynomials ax 8 + bx 7 + cx 6 + dx 5 + ex 4 + fx 3 + gx 2 + hx 1 + kx Example Degree 8 Polynomial 4X 8 + X 7 + 2X X 5 + 1X 4 + 8X 3 + (-22)X X X Example Degree 8 Polynomial Shorthand Label! 13 X 8 + X 4 + X 3 + X (Special Polynomial) X 8 + X 7 + X 6 + X 5 + 1X 4 + 1X 3 + 1X 2 + X 1 + 1X = = x1d Polynomial Label! If α is a root, by definition: α 8 + α 4 + α 3 + α = So, α 8 + α 4 + α 3 + α = (α 4 + α 3 + α 2 + 1) = (α 4 + α 3 + α 2 + 1) or: α 8 = α 4 + α 3 + α α = 1 = α7 + α 6 + α 5 + α 4 + α 3 + α 2 + α + 1 ~ x1 α 1 = α = α7 + α 6 + α 5 + α 4 + α 3 + α 2 + 1α + ~ x2 α 2 =α2 = α7 + α 6 + α 5 + α 4 + α 3 + 1α 2 + α + ~ x4 α 3 =α3 = α 7 + α 6 + α 5 + α 4 + 1α 3 + α 2 + α + ~ x8 α 4 =α4 = α 7 + α 6 + α 5 + 1α 4 + α 3 + α 2 + α + ~ x1 α 5 =α5 = α 7 + α 6 + 1α 5 + α 4 + α 3 + α 2 + α + ~ x2 α 6 =α6 = α 7 + 1α 6 + α 5 + α 4 + α 3 + α 2 + α + ~ x4 α 7 =α7 = 1α 7 + α 6 + α 5 + α 4 + α 3 + α 2 + α + ~ x8 α 8 =α4 + α 3 + α = α 7 + α 6 + α 5 + 1α 4 + 1α 3 + 1α 2 + α + 1 ~ x1d α 9 =α(α 8 ) = α(α 4 + α 3 + α 2 + 1) = α 5 + α 4 + α 3 + α ~ x3a α 1 =α 2 (α 8 ) = α 2 (α 4 + α 3 + α 2 + 1) = α 6 + α 5 + α 4 + α 2 ~ x74 α 11 =α 3 (α 8 ) = α 3 (α 4 + α 3 + α 2 + 1) = α 7 + α 6 + α 5 + α 3 ~ xe8 b 7 b 6 b 5 b 4 b 3 b 2 b 1 b b 7 b 6 b 5 b 4 b 3 b 2 b 1 b α 12 =α 4 (α 8 ) = α 4 (α 4 + α 3 + α 2 + 1) = α 8 + α 7 + α 6 + α 4 = (α 4 + α 3 + α 2 + 1) + α 7 + α 6 + α 4 = α 7 + α 6 + α 3 + α ~ xcd Linear Feedback Shift Register α 254 = α 7 + α 3 + α 2 + α 1 ~ x8e α 255 =α (α 254 ) = α (α 7 + α 3 + α 2 + α 1 ) = α 8 + α 4 + α 3 + α 2 = (α 4 + α 3 + α 2 + 1) + α 4 + α 3 + α 2 = 1 = α 14 + Linear Algebra Review X + Y = 9 3X - Y = 2 X + Y = 3 3X - Y = 1 4X = 4 => X == 1 X + Y = 3 => Y == 2 15 Santa Clara, CA 5
6 Galois Field Overview A finite set of elements (e.g. 2 8, 2 16, etc.) that have: Arithmetic operator Multiplicative operator A zero member Negatives and Reciprocals ~ + ~ * Field operations always produce another element in the set. (Closure) In this discussion, our Galois Field has: 256 elements (thingees) labeled x1 to xff, and x - [GF(8)] An Arithmetic operator (addition and subtraction) ~ XOR A Multiplicative operator ( * and ) ~ exponent operations 16 Galois Multiplicative Operator (X ) (Y) = (α log α X ) ( α log α Y ) = α [(log α X + log α Y) modulus 255] Noting that α K α -K = α K-K = α = 1...it follows that 1/(α K ) = α -K 255 non-zero members So... (X )/(Y) = (α log α X )/( α log α Y ) = (α log α X ) (1/( α log α Y )) = (α log α X ) (α -log α Y ) = α [(log α X - log α Y ) modulus 255] Note: Exponent additions/subtractions operations are base Example Calculations x2b x6f = x8f From Log Table (Table 2) x2b = α xda 16 = α x6f = α x3d 16 = α 61 1 (Base 1 for Understanding Ease) So x2b x6f = α α 61 1 From Powers Table (Table 1) α x18 = x8f = α ( )mod255 1 = α (279 1)mod255 1 = α 24 1 = α x Santa Clara, CA 6
7 Example Calculations (cont.) Arithmetic (Addition, Subtraction): Multiplication: x3f x12 x2d x28 == b XOR 1.1 b =.11 b = x5 = α xa6 α xe = αxa6 + xe (From Table 2) (Base 16 Regular Addition) = α (x186)mod 255 = α x87 = xa9 Division: x3f (1/(x12)) = α xa6 α -xe = αxa6 - xe = α x1a5 - xe (From Table 1) (From Table 2) (Base 16 Regular Subtraction) (xa6 = xa6 + xff = ox1a5) = α xc5 = x8d (From Table 1) 19 Oddities Negative Values ~ XOR Thus, for any element V, V = -V since (V XOR V) = Reciprocals Let log α V == xnn (V ) Then 1/V = 1/(α xnn ) = α -xnn Proof: v/v = 1 = (α xnn ) / (α xnn ) = (α xnn ) [1/(α xnn )] = (α xnn ) (α -xnn ) (?) = (α xnn + -xnn ) = α = 1 2 Double Disk Failure Remembering Parity Disk P Generation: D 1 D 2 D 3 D N-2 = P (Normal RAID 5 Parity Generation) Parity Disk Q Generation: (K 1 D 1) (K 2 D 2) (K 3 D 3). (K N-2 D N-2 ) = Q Losing Disk 1 and 2 gives D 1 D 2 = P D 3 D N-2 = V 1 (1) (K 1 D 1) (K 2 D 2) = Q (K 3 D 3) (K N-2 D N-2 ) = V 2 (2) So... (K 1 D 1) (K 1 D 2) = (K 1 V 1) (K 1 D 1) (K 2 D 2) = V 2 Gives... D 2 (K 1 K 2) = (K 1 V 1) V 2 Or D 2 = ((K 1 V 1) V 2 ) / (K 1 K 2) Recover D 1 using RAID 5 Logic with P values 21 Santa Clara, CA 7
8 Summary Easy to Solve Independent Linear Equations X + Y = 3 3*X - Y = 1 Similarly, Losing Two Values Results in: X Y = V 1 x3 X Y = V 2 22 The End Thank you! schwaderer_1@comcast.net 23 Santa Clara, CA 8
How To Write A Hexadecimal Program
The mathematics of RAID-6 H. Peter Anvin First version 20 January 2004 Last updated 20 December 2011 RAID-6 supports losing any two drives. syndromes, generally referred P and Q. The way
More informationThe mathematics of RAID-6
The mathematics of RAID-6 H. Peter Anvin 1 December 2004 RAID-6 supports losing any two drives. The way this is done is by computing two syndromes, generally referred P and Q. 1 A quick
More informationThe finite field with 2 elements The simplest finite field is
The finite field with 2 elements The simplest finite field is GF (2) = F 2 = {0, 1} = Z/2 It has addition and multiplication + and defined to be 0 + 0 = 0 0 + 1 = 1 1 + 0 = 1 1 + 1 = 0 0 0 = 0 0 1 = 0
More informationSome facts about polynomials modulo m (Full proof of the Fingerprinting Theorem)
Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) In order to understand the details of the Fingerprinting Theorem on fingerprints of different texts from Chapter 19 of the
More informationCYCLIC REDUNDANCY CHECKS IN USB. Introduction. Two-minute mathematical background
CYCLIC REDUNDANCY CHECKS IN USB Introduction The USB specification calls for the use of Cyclic Redundancy Checksums (CRC) to protect all non-pid fields in token and data packets from errors during transmission.
More informationDistributed Storage Networks and Computer Forensics
Distributed Storage Networks 5 Raid-6 Encoding Technical Faculty Winter Semester 2011/12 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant Array of Inexpensive Disks,
More informationData Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
More informationAlgorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer
Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Institut für Informatik Wintersemester 2007/08 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant
More informationJUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson
JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials
More informationCopy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any.
Algebra 2 - Chapter Prerequisites Vocabulary Copy in your notebook: Add an example of each term with the symbols used in algebra 2 if there are any. P1 p. 1 1. counting(natural) numbers - {1,2,3,4,...}
More informationLecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic. Theoretical Underpinnings of Modern Cryptography
Lecture 6: Finite Fields (PART 3) PART 3: Polynomial Arithmetic Theoretical Underpinnings of Modern Cryptography Lecture Notes on Computer and Network Security by Avi Kak (kak@purdue.edu) January 29, 2015
More informationSOLVING POLYNOMIAL EQUATIONS
C SOLVING POLYNOMIAL EQUATIONS We will assume in this appendix that you know how to divide polynomials using long division and synthetic division. If you need to review those techniques, refer to an algebra
More information1.3 Algebraic Expressions
1.3 Algebraic Expressions A polynomial is an expression of the form: a n x n + a n 1 x n 1 +... + a 2 x 2 + a 1 x + a 0 The numbers a 1, a 2,..., a n are called coefficients. Each of the separate parts,
More informationThe Method of Partial Fractions Math 121 Calculus II Spring 2015
Rational functions. as The Method of Partial Fractions Math 11 Calculus II Spring 015 Recall that a rational function is a quotient of two polynomials such f(x) g(x) = 3x5 + x 3 + 16x x 60. The method
More information9. POLYNOMIALS. Example 1: The expression a(x) = x 3 4x 2 + 7x 11 is a polynomial in x. The coefficients of a(x) are the numbers 1, 4, 7, 11.
9. POLYNOMIALS 9.1. Definition of a Polynomial A polynomial is an expression of the form: a(x) = a n x n + a n-1 x n-1 +... + a 1 x + a 0. The symbol x is called an indeterminate and simply plays the role
More informationCHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY
January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.
More informationA Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems
A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems James S Plank Department of Computer Science University of Tennessee February 19, 1999 Abstract It is well-known that Reed-Solomon
More informationQuotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
More informationLinear Equations in One Variable
Linear Equations in One Variable MATH 101 College Algebra J. Robert Buchanan Department of Mathematics Summer 2012 Objectives In this section we will learn how to: Recognize and combine like terms. Solve
More informationHow To Understand And Understand The Power Of Aird 6 On Clariion
A Detailed Review Abstract This white paper discusses the EMC CLARiiON RAID 6 implementation available in FLARE 26 and later, including an overview of RAID 6 and the CLARiiON-specific implementation, when
More informationa 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4)
ROOTS OF POLYNOMIAL EQUATIONS In this unit we discuss polynomial equations. A polynomial in x of degree n, where n 0 is an integer, is an expression of the form P n (x) =a n x n + a n 1 x n 1 + + a 1 x
More informationReliability and Fault Tolerance in Storage
Reliability and Fault Tolerance in Storage Dalit Naor/ Dima Sotnikov IBM Haifa Research Storage Systems 1 Advanced Topics on Storage Systems - Spring 2014, Tel-Aviv University http://www.eng.tau.ac.il/semcom
More information2 Integrating Both Sides
2 Integrating Both Sides So far, the only general method we have for solving differential equations involves equations of the form y = f(x), where f(x) is any function of x. The solution to such an equation
More information3.2 The Factor Theorem and The Remainder Theorem
3. The Factor Theorem and The Remainder Theorem 57 3. The Factor Theorem and The Remainder Theorem Suppose we wish to find the zeros of f(x) = x 3 + 4x 5x 4. Setting f(x) = 0 results in the polynomial
More informationNon-Redundant (RAID Level 0)
There are many types of RAID and some of the important ones are introduced below: Non-Redundant (RAID Level 0) A non-redundant disk array, or RAID level 0, has the lowest cost of any RAID organization
More information1.7. Partial Fractions. 1.7.1. Rational Functions and Partial Fractions. A rational function is a quotient of two polynomials: R(x) = P (x) Q(x).
.7. PRTIL FRCTIONS 3.7. Partial Fractions.7.. Rational Functions and Partial Fractions. rational function is a quotient of two polynomials: R(x) = P (x) Q(x). Here we discuss how to integrate rational
More informationCS 153 Design of Operating Systems Spring 2015
CS 153 Design of Operating Systems Spring 2015 Lecture 22: File system optimizations Physical Disk Structure Disk components Platters Surfaces Tracks Arm Track Sector Surface Sectors Cylinders Arm Heads
More informationHow To Write A Disk Array
200 Chapter 7 (This observation is reinforced and elaborated in Exercises 7.5 and 7.6, and the reader is urged to work through them.) 7.2 RAID Disks are potential bottlenecks for system performance and
More informationApplication. Outline. 3-1 Polynomial Functions 3-2 Finding Rational Zeros of. Polynomial. 3-3 Approximating Real Zeros of.
Polynomial and Rational Functions Outline 3-1 Polynomial Functions 3-2 Finding Rational Zeros of Polynomials 3-3 Approximating Real Zeros of Polynomials 3-4 Rational Functions Chapter 3 Group Activity:
More informationData Corruption In Storage Stack - Review
Theoretical Aspects of Storage Systems Autumn 2009 Chapter 2: Double Disk Failures André Brinkmann Data Corruption in the Storage Stack What are Latent Sector Errors What is Silent Data Corruption Checksum
More informationFactorization Algorithms for Polynomials over Finite Fields
Degree Project Factorization Algorithms for Polynomials over Finite Fields Sajid Hanif, Muhammad Imran 2011-05-03 Subject: Mathematics Level: Master Course code: 4MA11E Abstract Integer factorization is
More informationData Storage - II: Efficient Usage & Errors
Data Storage - II: Efficient Usage & Errors Week 10, Spring 2005 Updated by M. Naci Akkøk, 27.02.2004, 03.03.2005 based upon slides by Pål Halvorsen, 12.3.2002. Contains slides from: Hector Garcia-Molina
More informationTamper protection with Bankgirot HMAC Technical Specification
Mars 2014 Tamper protection with Bankgirot HMAC Technical Specification Bankgirocentralen BGC AB 2013. All rights reserved. www.bankgirot.se Innehåll 1 General...3 2 Tamper protection with HMAC-SHA256-128...3
More informationApplication Note. Introduction AN2471/D 3/2003. PC Master Software Communication Protocol Specification
Application Note 3/2003 PC Master Software Communication Protocol Specification By Pavel Kania and Michal Hanak S 3 L Applications Engineerings MCSL Roznov pod Radhostem Introduction The purpose of this
More informationExercise 2 : checksums, RAID and erasure coding
Exercise 2 : checksums, RAID and erasure coding Sébastien Ponce May 22, 2015 1 Goals of the exercise Play with checksums and compare efficiency and robustness Use hand written version of RAID systems and
More informationCollege Algebra - MAT 161 Page: 1 Copyright 2009 Killoran
College Algebra - MAT 6 Page: Copyright 2009 Killoran Zeros and Roots of Polynomial Functions Finding a Root (zero or x-intercept) of a polynomial is identical to the process of factoring a polynomial.
More information1 Shapes of Cubic Functions
MA 1165 - Lecture 05 1 1/26/09 1 Shapes of Cubic Functions A cubic function (a.k.a. a third-degree polynomial function) is one that can be written in the form f(x) = ax 3 + bx 2 + cx + d. (1) Quadratic
More informationZeros of Polynomial Functions
Review: Synthetic Division Find (x 2-5x - 5x 3 + x 4 ) (5 + x). Factor Theorem Solve 2x 3-5x 2 + x + 2 =0 given that 2 is a zero of f(x) = 2x 3-5x 2 + x + 2. Zeros of Polynomial Functions Introduction
More informationminimal polyonomial Example
Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We
More informationData Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
More informationCM2202: Scientific Computing and Multimedia Applications General Maths: 2. Algebra - Factorisation
CM2202: Scientific Computing and Multimedia Applications General Maths: 2. Algebra - Factorisation Prof. David Marshall School of Computer Science & Informatics Factorisation Factorisation is a way of
More informationAlgebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.
This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra
More informationUNCORRECTED PAGE PROOFS
number and and algebra TopIC 17 Polynomials 17.1 Overview Why learn this? Just as number is learned in stages, so too are graphs. You have been building your knowledge of graphs and functions over time.
More informationBasics of Polynomial Theory
3 Basics of Polynomial Theory 3.1 Polynomial Equations In geodesy and geoinformatics, most observations are related to unknowns parameters through equations of algebraic (polynomial) type. In cases where
More informationFile System & Device Drive. Overview of Mass Storage Structure. Moving head Disk Mechanism. HDD Pictures 11/13/2014. CS341: Operating System
CS341: Operating System Lect 36: 1 st Nov 2014 Dr. A. Sahu Dept of Comp. Sc. & Engg. Indian Institute of Technology Guwahati File System & Device Drive Mass Storage Disk Structure Disk Arm Scheduling RAID
More informationZero: If P is a polynomial and if c is a number such that P (c) = 0 then c is a zero of P.
MATH 11011 FINDING REAL ZEROS KSU OF A POLYNOMIAL Definitions: Polynomial: is a function of the form P (x) = a n x n + a n 1 x n 1 + + a x + a 1 x + a 0. The numbers a n, a n 1,..., a 1, a 0 are called
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
More informationMath Review. for the Quantitative Reasoning Measure of the GRE revised General Test
Math Review for the Quantitative Reasoning Measure of the GRE revised General Test www.ets.org Overview This Math Review will familiarize you with the mathematical skills and concepts that are important
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for
More informationToday s Papers. RAID Basics (Two optional papers) Array Reliability. EECS 262a Advanced Topics in Computer Systems Lecture 4
EECS 262a Advanced Topics in Computer Systems Lecture 4 Filesystems (Con t) September 15 th, 2014 John Kubiatowicz Electrical Engineering and Computer Sciences University of California, Berkeley Today
More informationHow To Understand The Theory Of Algebraic Functions
Homework 4 3.4,. Show that x x cos x x holds for x 0. Solution: Since cos x, multiply all three parts by x > 0, we get: x x cos x x, and since x 0 x x 0 ( x ) = 0, then by Sandwich theorem, we get: x 0
More informationCaml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc cadmium@x9c.fr Released under the LGPL version 3 February 6, 2010 Abstract: This
More informationChapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.
Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize
More informationCS161: Operating Systems
CS161: Operating Systems Matt Welsh mdw@eecs.harvard.edu Lecture 18: RAID April 19, 2007 2007 Matt Welsh Harvard University 1 RAID Redundant Arrays of Inexpensive Disks Invented in 1986-1987 by David Patterson
More informationFault Tolerance & Reliability CDA 5140. Chapter 3 RAID & Sample Commercial FT Systems
Fault Tolerance & Reliability CDA 5140 Chapter 3 RAID & Sample Commercial FT Systems - basic concept in these, as with codes, is redundancy to allow system to continue operation even if some components
More information7. Some irreducible polynomials
7. Some irreducible polynomials 7.1 Irreducibles over a finite field 7.2 Worked examples Linear factors x α of a polynomial P (x) with coefficients in a field k correspond precisely to roots α k [1] of
More informationSolving DEs by Separation of Variables.
Solving DEs by Separation of Variables. Introduction and procedure Separation of variables allows us to solve differential equations of the form The steps to solving such DEs are as follows: dx = gx).
More informationFACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization
More informationTim Kerins. Leaving Certificate Honours Maths - Algebra. Tim Kerins. the date
Leaving Certificate Honours Maths - Algebra the date Chapter 1 Algebra This is an important portion of the course. As well as generally accounting for 2 3 questions in examination it is the basis for many
More informationA Systematic Approach to Factoring
A Systematic Approach to Factoring Step 1 Count the number of terms. (Remember****Knowing the number of terms will allow you to eliminate unnecessary tools.) Step 2 Is there a greatest common factor? Tool
More informationFile System Reliability (part 2)
File System Reliability (part 2) Main Points Approaches to reliability Careful sequencing of file system opera@ons Copy- on- write (WAFL, ZFS) Journalling (NTFS, linux ext4) Log structure (flash storage)
More informationPUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5.
PUTNAM TRAINING POLYNOMIALS (Last updated: November 17, 2015) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include
More informationSheet 7 (Chapter 10)
King Saud University College of Computer and Information Sciences Department of Information Technology CAP240 First semester 1430/1431 Multiple-choice Questions Sheet 7 (Chapter 10) 1. Which error detection
More informationTHE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS
THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear
More informationThe Factor Theorem and a corollary of the Fundamental Theorem of Algebra
Math 421 Fall 2010 The Factor Theorem and a corollary of the Fundamental Theorem of Algebra 27 August 2010 Copyright 2006 2010 by Murray Eisenberg. All rights reserved. Prerequisites Mathematica Aside
More information1.5. Factorisation. Introduction. Prerequisites. Learning Outcomes. Learning Style
Factorisation 1.5 Introduction In Block 4 we showed the way in which brackets were removed from algebraic expressions. Factorisation, which can be considered as the reverse of this process, is dealt with
More information1 Lecture: Integration of rational functions by decomposition
Lecture: Integration of rational functions by decomposition into partial fractions Recognize and integrate basic rational functions, except when the denominator is a power of an irreducible quadratic.
More informationIntroduction to Finite Fields (cont.)
Chapter 6 Introduction to Finite Fields (cont.) 6.1 Recall Theorem. Z m is a field m is a prime number. Theorem (Subfield Isomorphic to Z p ). Every finite field has the order of a power of a prime number
More informationLagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given.
Polynomials (Ch.1) Study Guide by BS, JL, AZ, CC, SH, HL Lagrange Interpolation is a method of fitting an equation to a set of points that functions well when there are few points given. Sasha s method
More informationA Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems
A Tutorial on Reed-olomon Coding for Fault-Tolerance in RAID-like ystems James lank Technical Report C-96-332 Department of Computer cience University of Tennessee IMORTANT The information dispersal matrix
More informationUseful Number Systems
Useful Number Systems Decimal Base = 10 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9} Binary Base = 2 Digit Set = {0, 1} Octal Base = 8 = 2 3 Digit Set = {0, 1, 2, 3, 4, 5, 6, 7} Hexadecimal Base = 16 = 2
More informationField Fundamentals. Chapter 3. 3.1 Field Extensions. 3.1.1 Definitions. 3.1.2 Lemma
Chapter 3 Field Fundamentals 3.1 Field Extensions If F is a field and F [X] is the set of all polynomials over F, that is, polynomials with coefficients in F, we know that F [X] is a Euclidean domain,
More informationexpression is written horizontally. The Last terms ((2)( 4)) because they are the last terms of the two polynomials. This is called the FOIL method.
A polynomial of degree n (in one variable, with real coefficients) is an expression of the form: a n x n + a n 1 x n 1 + a n 2 x n 2 + + a 2 x 2 + a 1 x + a 0 where a n, a n 1, a n 2, a 2, a 1, a 0 are
More informationPolynomials and Factoring
Lesson 2 Polynomials and Factoring A polynomial function is a power function or the sum of two or more power functions, each of which has a nonnegative integer power. Because polynomial functions are built
More informationWhat is RAID and how does it work?
What is RAID and how does it work? What is RAID? RAID is the acronym for either redundant array of inexpensive disks or redundant array of independent disks. When first conceived at UC Berkley the former
More informationECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
More informationPARALLEL I/O FOR HIGH PERFORMANCE COMPUTING
o. rof. Dr. eter Brezany arallele and Verteilte Datenbanksysteme 1 ARALLEL I/O FOR HIGH ERFORMANCE COMUTING Skriptum zur Vorlesung eter Brezany Institut für Scientific Computing Universität Wien E-Mail:
More informationFiling Systems. Filing Systems
Filing Systems At the outset we identified long-term storage as desirable characteristic of an OS. EG: On-line storage for an MIS. Convenience of not having to re-write programs. Sharing of data in an
More informationIntegrals of Rational Functions
Integrals of Rational Functions Scott R. Fulton Overview A rational function has the form where p and q are polynomials. For example, r(x) = p(x) q(x) f(x) = x2 3 x 4 + 3, g(t) = t6 + 4t 2 3, 7t 5 + 3t
More informationThe Division Algorithm for Polynomials Handout Monday March 5, 2012
The Division Algorithm for Polynomials Handout Monday March 5, 0 Let F be a field (such as R, Q, C, or F p for some prime p. This will allow us to divide by any nonzero scalar. (For some of the following,
More informationAlgebra I Vocabulary Cards
Algebra I Vocabulary Cards Table of Contents Expressions and Operations Natural Numbers Whole Numbers Integers Rational Numbers Irrational Numbers Real Numbers Absolute Value Order of Operations Expression
More informationSSDs and RAID: What s the right strategy. Paul Goodwin VP Product Development Avant Technology
SSDs and RAID: What s the right strategy Paul Goodwin VP Product Development Avant Technology SSDs and RAID: What s the right strategy Flash Overview SSD Overview RAID overview Thoughts about Raid Strategies
More informationGraphic Designing with Transformed Functions
Math Objectives Students will be able to identify a restricted domain interval and use function translations and dilations to choose and position a portion of the graph accurately in the plane to match
More information= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
More information3.6. Partial Fractions. Introduction. Prerequisites. Learning Outcomes
Partial Fractions 3.6 Introduction It is often helpful to break down a complicated algebraic fraction into a sum of simpler fractions. For 4x + 7 example it can be shown that x 2 + 3x + 2 has the same
More information3 1. Note that all cubes solve it; therefore, there are no more
Math 13 Problem set 5 Artin 11.4.7 Factor the following polynomials into irreducible factors in Q[x]: (a) x 3 3x (b) x 3 3x + (c) x 9 6x 6 + 9x 3 3 Solution: The first two polynomials are cubics, so if
More informationModern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)
Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Kevin Broughan University of Waikato, Hamilton, New Zealand May 13, 2010 Remainder and Factor Theorem 15 Definition of factor If f (x)
More informationSouth Carolina College- and Career-Ready (SCCCR) Pre-Calculus
South Carolina College- and Career-Ready (SCCCR) Pre-Calculus Key Concepts Arithmetic with Polynomials and Rational Expressions PC.AAPR.2 PC.AAPR.3 PC.AAPR.4 PC.AAPR.5 PC.AAPR.6 PC.AAPR.7 Standards Know
More informationReview. Lecture 21: Reliable, High Performance Storage. Overview. Basic Disk & File System properties CSC 468 / CSC 2204 11/23/2006
S 468 / S 2204 Review Lecture 2: Reliable, High Performance Storage S 469HF Fall 2006 ngela emke rown We ve looked at fault tolerance via server replication ontinue operating with up to f failures Recovery
More informationCSE-E5430 Scalable Cloud Computing P Lecture 5
CSE-E5430 Scalable Cloud Computing P Lecture 5 Keijo Heljanko Department of Computer Science School of Science Aalto University keijo.heljanko@aalto.fi 12.10-2015 1/34 Fault Tolerance Strategies for Storage
More informationDr Michael Cohen. This talk does not represent my Employer. April 2005
RAID Reconstruction And the search for the Aardvark Dr Michael Cohen This talk does not represent my Employer April 2005 1 RAID 0: Striping What is RAID? Improves performance due to parallel disk access
More informationFactoring Polynomials
Factoring Polynomials Hoste, Miller, Murieka September 12, 2011 1 Factoring In the previous section, we discussed how to determine the product of two or more terms. Consider, for instance, the equations
More informationNotes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
More informationChapter 1: Order of Operations, Fractions & Percents
HOSP 1107 (Business Math) Learning Centre Chapter 1: Order of Operations, Fractions & Percents ORDER OF OPERATIONS When finding the value of an expression, the operations must be carried out in a certain
More informationDisk Array Data Organizations and RAID
Guest Lecture for 15-440 Disk Array Data Organizations and RAID October 2010, Greg Ganger 1 Plan for today Why have multiple disks? Storage capacity, performance capacity, reliability Load distribution
More informationDiscrete Mathematics: Homework 7 solution. Due: 2011.6.03
EE 2060 Discrete Mathematics spring 2011 Discrete Mathematics: Homework 7 solution Due: 2011.6.03 1. Let a n = 2 n + 5 3 n for n = 0, 1, 2,... (a) (2%) Find a 0, a 1, a 2, a 3 and a 4. (b) (2%) Show that
More informationFOIL FACTORING. Factoring is merely undoing the FOIL method. Let s look at an example: Take the polynomial x²+4x+4.
FOIL FACTORING Factoring is merely undoing the FOIL method. Let s look at an example: Take the polynomial x²+4x+4. First we take the 3 rd term (in this case 4) and find the factors of it. 4=1x4 4=2x2 Now
More information5-3 Polynomial Functions. not in one variable because there are two variables, x. and y
y. 5-3 Polynomial Functions State the degree and leading coefficient of each polynomial in one variable. If it is not a polynomial in one variable, explain why. 1. 11x 6 5x 5 + 4x 2 coefficient of the
More informationby Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array!
by Scott Moulton @MyHardDriveDied.com Recover your P0RN from your RAID Array! WHAT IS THIS ABOUT? BRIEF Coverage ;) Unusual Arrays Intro to RAID About RAID 0 Sight Samples Sound Samples About RAID 5 Demo
More informationISTANBUL AYDIN UNIVERSITY
ISTANBUL AYDIN UNIVERSITY 2013-2014 Academic Year Fall Semester Department of Software Engineering SEN361 COMPUTER ORGANIZATION HOMEWORK REPORT STUDENT S NAME : GÖKHAN TAYMAZ STUDENT S NUMBER : B1105.090068
More information