Note: Correction to the 1997 Tutorial on Reed-Solomon Coding

Size: px
Start display at page:

Download "Note: Correction to the 1997 Tutorial on Reed-Solomon Coding"

Transcription

1 Note: Correction to the 1997 utorial on Reed-Solomon Coding James S Plank Ying Ding University of ennessee Knoxville, N 3799 [plank,ying]@csutkedu echnical Report U-CS Department of Computer Science University of ennessee April 24, Introduction In 1997, SPE published a tutorial by Plank [19] on implementing Reed-Solomon codes for erasure correction in redundant data storage systems he motivation of this tutorial was to present these codes, which are typically described mathematically by coding theorists, in a way accessible to the programmers who need to implement them he tutorial as published presented an information dispersal matrix, which does not have the properties claimed that the deletion of any rows results in an invertable matrix he purpose of this note is to present a correct information dispersal matrix that has the desired properties, and to put the work in current context 2 he Continued Need or Erasure Correcting Codes As disk array technology continued to blossom in the 1990 s [4, 5], a need arose to tolerate a disk s failure without waiting for the disk to be repaired Straight replication performs this fault-tolerance, but at a high storage overhead RAID Level 5 encoding, termed N+1 Parity [5], reduces the storage overhead for fault-tolerance, and allows a parity disk to store redundancy for data disks in such a way that the failure of any single disk may be tolerated However, as the number of disks in a disk array grows, so does the the need to tolerate multiple simultaneous failures Reed- Solomon coding has the properties necessary to add arbitrary levels of fault-tolerance to disk array systems One may add coding disks to data disks so that the failure of any disks may be tolerated, and although none of the levels of RAID employs Reed-Solomon codes, the original work on disk arrays make note of the codes desirable properties [5] 1

2 As wide-area network computing has become more popular, the uses of erasure-correcting codes have broadened Rizzo employs them to avoid retransmission in point-to-point [20] and multicast [21] communication protocols his work has resulted in standardization efforts for such codes in multicast scenarios from the IE [15, 1] Additional uses of Reed-Solomon codes have been in cryptography [], distributed data structures [10], energy-efficient wireless communication [7] and distributed checkpointing [1] he advent of wide-area and peer-to-peer storage systems has further motivated the need for erasure-correcting codes or example, OceanStore employs Reed-Solomon coding for RAID-like fault-tolerance in a wide-area file system [9] More interestingly, several content dispersal systems have noted that erasure coding can be used for caching rather than for fault-tolerance [2, 3, 22] Specifically, suppose that blocks of a file need to be stored in a wide-area storage substrate, so that clients in all parts of the network may access it With replication, clients must find the closest copies of each of the blocks in order to retrieve the file However, with erasure-correcting codes, extra coding blocks may be distributed with the blocks of the file so that each client need only retrieve the closest blocks in order to reconstruct the file As files grow in size, the power of this application will be immense; hence the need to correct the error of the 1997 Reed-Solomon coding tutorial here are other erasure coding techniques in addition to the one which this tutorial addresses Examples are ornado codes [13, 14], Cauchy Reed-Solomon codes [1] and other parity-based schemes [] Of these, ornado codes are worth special mention, as they form the backbone of the Digital ountain content dispersal system [2] ornado codes have a randomized structure so that with the addition of extra parity blocks, a file may be reconstructed from any blocks he randomized structure ensures that should be small In a performance evaluation conducted by Luby [12], ornado codes display significantly better encoding and decoding performance than the codes in this paper (termed Vandermonde-based Reed-Solomon codes ) for large data sizes and large values of of or small values, a true comparison has yet to be performed Currently, there is no implementation guide for ornado codes akin to [19] As the knowledge of their performance advantages become more widespread, perhaps this will change 3 A Correct Information Dispersal Matrix he desired properties for the information dispersal matrix for Reed-Solomon coding is that: It is an matrix he matrix in the first rows are the identity matrix Any submatrix formed by deleting rows of the matrix is invertible We denote the correct information matrix is derived from an Vandermonde matrix using a sequence of elementary matrix transformations: 1 Any column may be swapped with column 2

3 2 Any column may be replaced by, where 3 Any column may be replaced by adding a multiple of another column to it:, where and Since arithmetic is over a Galois field, the addition operation is bitwise exclusive-or ( ( ( ( he -th element of a Vandermonde matrix is defined to be :!! "#"" $%&'! "#"" $%& "#"" $%& *),+-0/1# *),+-2/3 *),+-0/1# "#""4*),+-0/1# $% 57 By definition, this matrix has the property that any submatrix formed by deleting rows of this matrix is invertible [17] Moreover, any matrix derived from this matrix by a sequence of elementary matrix transformations maintains this property (since elementary matrix operations do not change the rank of a matrix [11]) herefore, constructing the matrix is a simple matter of performing elementary transformations on the Vandermonde matrix until the first rows are the identity matrix he algorithm for doing constructing is as follows: Suppose the first :9<; rows of the matrix are identity rows, and,= At each step, we will turn row into an identity row, without altering the other identity rows If the -th element of row is equal to zero, find a column such that?> and the -th element of row is non-zero, and swap columns and Such a column is guaranteed to exist; otherwise the first rows of the matrix would not compose an invertible matrix Moreover,, swapping columns and will not alter the first A9; rows of the matrix Let B C be the value of the -th element of row Let BEDG HC be the multiplicative inverse B HC In other words, B HCIB HC DJ K; Since B C, B C DG is guaranteed to exist if B C K;, replace column with B DJ L Now B C = 1 or all columns 0 and B C M, replace column with 9 B C, where B HC is the -th element in row At the end of this step, rows 0 through are identity rows, and the matrix still has the property that the deletion of any rows yields an invertible matrix Repeat this process until the first rows are identity rows, and the construction of is complete Example As an example, we construct for ONP ON, over G(QSR ) As detailed in [19], in G(QR ), addition is performed by exclusive-or, and multiplication/division may be performed using logarithm tables, reproduced in able 1 he N Vandermonde matrix over U,V WQR is: 3

4 Q B gflog[i] gfilog[i] able 1: Logarithm tables for U,V QR ; ; ; Q Q N N N Row 0 is already an identity row o convert row 1, we note that B with 9 and with 9 he resulting matrix is: All that is left is to convert row 2 irst, since B C hen we replace with 9'N and 57 ; N Q Q N 5 ; ; ; ; Q ; N ; N ; Q C 57 C B C ;, so we need to replace K;, we need to replace with DG = : ; N Q ; Q N ; with ; ; ; ; ; ; ; 5 9 Q to yield our desired : 5 4

5 References [1] J Blomer, M Kalfane, M Karpinski, R Karp, M Luby, and D Zuckerman An XOR-based erasure-resilient coding scheme echnical Report R-95-04, International Computer Science Institute, August 1995 [2] J Byers, M Luby, M Mitzenmacher, and A Rege A digital fountain approach to reliable distribution of bulk data In ACM SIGCOMM 9, pages 5 7, Vancouver, August 199 [3] J W Byers, M Luby, and M Mitzenmacher Accessing multiple mirror sites in parallel: Using tornado codes to speed up downloads In IEEE INOCOM, pages , New York, NY, March 1999 [4] P M Chen, E K Lee, G A Gibson, R H Katz, and D A Patterson RAID: High-performance, reliable secondary storage ACM Computing Surveys, 2(2):145 15, June 1994 [5] G A Gibson Redundant Disk Arrays: Reliable, Parallel Secondary Storage he MI Press, Cambridge, Massachusetts, 1992 [] G A Gibson, L Hellerstein, R M Karp, R H Katz, and D A Patterson ailure correction techniques for large disk arrays In hird International Conference on Architectural Support for Programming Languages and Operating Systems, pages , Boston, MA, April 199 [7] P J M Havinga Energy efficiency of error correction on wireless systems, 1999 [] C S Jutla Encryption modes with almost free message integrity Lecture Notes in Computer Science, 2045, 2001 [9] J Kubiatowicz, D Bindel, Y Chen, P Eaton, D Geels, R Gummadi, S Rhea, H Weatherspoon, W Weimer, C Wells, and B Zhao Oceanstore: An architecture for global-scale persistent storage In Proceedings of ACM ASPLOS ACM, November 2000 [10] W Litwin and Schwarz Lh*rs: a high-availability scalable distributed data structure using Reed Solomon codes In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pages ACM Press, 2000 [11] Lowenthal Linear Algebra with Linear Differential Equations John Wiley & Sons, Inc, New York, 1975 [12] M Luby Benchmark comparisons of erasure codes luby/ erasurehtml, 2002 [13] M Luby, M Mitzenmacher, and A Shokrollahi Analysis of random processes via and-or tree evaluation In 9th Annual ACM-SIAM Symposium on Discrete Algorithms, January 199 [14] M Luby, M Mitzenmacher, A Shokrollahi, D Spielman, and V Stemann Practical loss-resilient codes In 29th Annual ACM Symposium on heory of Computing,, pages ,

6 [15] M Luby, L Vicisano, J Gemmell, L Rizo, M Handley, and J Crowcroft orward error correction (EC) building block IE RC 3452 ( December 2002 [1] M Luby, L Vicisano, J Gemmell, L Rizo, M Handley, and J Crowcroft he use of forward error correction(ec) in reliable multicast IE RC 3453 ( December 2002 [17] J MacWilliams and NJA Sloane he heory of Error-Correcting Codes, Part I North-Holland Publishing Company, Amsterdam, New York, Oxford, 1977 [1] J S Plank Improving the performance of coordinated checkpointers on networks of workstations using RAID techniques In 15th Symposium on Reliable Distributed Systems, pages 7 5, October 199 [19] J S Plank A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems Software Practice & Experience, 27(9): , September 1997 [20] L Rizzo Effective erasure codes for reliable computer communication protocols ACM SIGCOMM Computer Communication Review, 27(2):24 3, 1997 [21] L Rizzo and L Vicisano RMDP: an EC-based reliable multicast protocol for wireless environments Mobile Computer and Communication Review, 2(2), April 199 [22] A I Rowstron and P Druschel Storage management and caching in PAS, a large-scale, persistent peer-topeer storage utility In Symposium on Operating Systems Principles, pages 1 201, 2001

How To Encrypt Data With A Power Of N On A K Disk

How To Encrypt Data With A Power Of N On A K Disk Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,

More information

Distributed Storage Networks and Computer Forensics

Distributed Storage Networks and Computer Forensics Distributed Storage Networks 5 Raid-6 Encoding Technical Faculty Winter Semester 2011/12 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant Array of Inexpensive Disks,

More information

Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer

Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Institut für Informatik Wintersemester 2007/08 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant

More information

A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems

A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems James S Plank Department of Computer Science University of Tennessee February 19, 1999 Abstract It is well-known that Reed-Solomon

More information

A Performance Comparison of Open-Source Erasure Coding Libraries for Storage Applications

A Performance Comparison of Open-Source Erasure Coding Libraries for Storage Applications A Performance Comparison of Open-Source Erasure Coding Libraries for Storage Applications Catherine D. Schuman James S. Plank Technical Report UT-CS-8-625 Department of Electrical Engineering and Computer

More information

Publication I. 2006 Institute of Electrical and Electronics Engineers (IEEE)

Publication I. 2006 Institute of Electrical and Electronics Engineers (IEEE) Publication I Mikko Pitkänen, Rim Moussa, Martin Swany, and Tapio Niemi. 2006. Erasure codes for increasing the availability of grid data storage. In: Proceedings of the Advanced International Conference

More information

A Reed-Solomon Code for Disk Storage, and Efficient Recovery Computations for Erasure-Coded Disk Storage

A Reed-Solomon Code for Disk Storage, and Efficient Recovery Computations for Erasure-Coded Disk Storage A Reed-Solomon Code for Disk Storage, and Efficient Recovery Computations for Erasure-Coded Disk Storage M. S. MANASSE Microsoft Research, Mountain View, California, USA C. A. THEKKATH Microsoft Research,

More information

Magnus: Peer to Peer Backup System

Magnus: Peer to Peer Backup System Magnus: Peer to Peer Backup System Naveen Gattu, Richard Huang, John Lynn, Huaxia Xia Department of Computer Science University of California, San Diego Abstract Magnus is a peer-to-peer backup system

More information

A Digital Fountain Approach to Reliable Distribution of Bulk Data

A Digital Fountain Approach to Reliable Distribution of Bulk Data A Digital Fountain Approach to Reliable Distribution of Bulk Data John Byers, ICSI Michael Luby, ICSI Michael Mitzenmacher, Compaq SRC Ashu Rege, ICSI Application: Software Distribution New release of

More information

Data Corruption In Storage Stack - Review

Data Corruption In Storage Stack - Review Theoretical Aspects of Storage Systems Autumn 2009 Chapter 2: Double Disk Failures André Brinkmann Data Corruption in the Storage Stack What are Latent Sector Errors What is Silent Data Corruption Checksum

More information

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang

More information

A Highly Scalable and Efficient Distributed File Storage System

A Highly Scalable and Efficient Distributed File Storage System IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.12, December 2009 101 A Highly Scalable and Efficient Distributed File Storage System Fawad Riasat Raja Dr. Adeel Akram Faculty

More information

Distributed Systems (5DV147) What is Replication? Replication. Replication requirements. Problems that you may find. Replication.

Distributed Systems (5DV147) What is Replication? Replication. Replication requirements. Problems that you may find. Replication. Distributed Systems (DV47) Replication Fall 20 Replication What is Replication? Make multiple copies of a data object and ensure that all copies are identical Two Types of access; reads, and writes (updates)

More information

Rateless Codes and Big Downloads

Rateless Codes and Big Downloads Rateless Codes and Big Downloads Petar Maymounkov and David Mazières NYU Department of Computer Science Abstract This paper presents a novel algorithm for downloading big files from multiple sources in

More information

Securing Cloud Data Storage

Securing Cloud Data Storage IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 6 (July-Aug. 2012), PP 43-49 Securing Cloud Data Storage S. P. Jaikar 1, M. V. Nimbalkar 2 1,2 (Department of Information

More information

A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems

A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems A Tutorial on Reed-olomon Coding for Fault-Tolerance in RAID-like ystems James lank Technical Report C-96-332 Department of Computer cience University of Tennessee IMORTANT The information dispersal matrix

More information

Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities

Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Kavitha Ranganathan, Adriana Iamnitchi, Ian Foster Department of Computer Science, The University

More information

Increased Reliability with SSPiRAL Data Layouts

Increased Reliability with SSPiRAL Data Layouts Increased Reliability with SSPiRAL Data Layouts Ahmed Amer University of Pittsburgh amer@cs.pitt.edu Darrell D. E. Long University of California, Santa Cruz darrell@cs.ucsc.edu Thomas Schwarz Santa Clara

More information

P2P Networking - Advantages and Disadvantages of Virtualization

P2P Networking - Advantages and Disadvantages of Virtualization Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park keleher@cs.umd.edu 1 Introduction

More information

Three-Dimensional Redundancy Codes for Archival Storage

Three-Dimensional Redundancy Codes for Archival Storage Three-Dimensional Redundancy Codes for Archival Storage Jehan-François Pâris Darrell D. E. Long Witold Litwin Department of Computer Science University of Houston Houston, T, USA jfparis@uh.edu Department

More information

Disaster Recovery Codes: Increasing Reliability with Large-Stripe Erasure Correcting Codes

Disaster Recovery Codes: Increasing Reliability with Large-Stripe Erasure Correcting Codes Disaster Recovery Codes: Increasing Reliability with Large-Stripe Erasure Correcting Codes ABSTRACT Kevin M. Greenan Computer Science Dept. Univ. of California, Santa Cruz Santa Cruz, CA, USA kmgreen@cs.ucsc.edu

More information

Evaluation of Distributed Recovery in Large-Scale Storage Systems

Evaluation of Distributed Recovery in Large-Scale Storage Systems Evaluation of Distributed Recovery in Large-Scale Storage Systems Qin Xin Ethan L. Miller Storage Systems Research Center University of California, Santa Cruz qxin, elm @cs.ucsc.edu Thomas J. E. Schwarz,

More information

Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets

Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets Michael Mitzenmacher and George Varghese Abstract Large data sets are increasingly common in cloud and virtualized environments. For

More information

Authenticating Real Time Packet Streams and Multicasts

Authenticating Real Time Packet Streams and Multicasts Authenticating Real Time Packet Streams and Multicasts Alain Pannetrat, Réfik Molva Institut Eurécom, Sophia-Antipolis, France. Abstract In this work we propose a new stream authentication scheme that

More information

Practical Data Integrity Protection in Network-Coded Cloud Storage

Practical Data Integrity Protection in Network-Coded Cloud Storage Practical Data Integrity Protection in Network-Coded Cloud Storage Henry C. H. Chen Department of Computer Science and Engineering The Chinese University of Hong Kong Outline Introduction FMSR in NCCloud

More information

Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads

Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads Osama Khan, Randal Burns Department of Computer Science Johns Hopkins University James Plank, William Pierce

More information

AONT-RS: Blending Security and Performance in Dispersed Storage Systems

AONT-RS: Blending Security and Performance in Dispersed Storage Systems AONT-RS: Blending Security and Performance in Dispersed Storage Systems Jason K. Resch Development Cleversafe, Inc. 222 S. Riverside Plaza, Suite 17 Chicago, IL 666 jresch@cleversafe.com James S. Plank

More information

How To Write A Disk Array

How To Write A Disk Array 200 Chapter 7 (This observation is reinforced and elaborated in Exercises 7.5 and 7.6, and the reader is urged to work through them.) 7.2 RAID Disks are potential bottlenecks for system performance and

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage

A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage James S. Plank University of Tennessee plank@cs.utk.edu Lihao Xu Wayne State University Jianqiang Luo Wayne

More information

MOST error-correcting codes are designed for the equal

MOST error-correcting codes are designed for the equal IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,

More information

Operating Systems. RAID Redundant Array of Independent Disks. Submitted by Ankur Niyogi 2003EE20367

Operating Systems. RAID Redundant Array of Independent Disks. Submitted by Ankur Niyogi 2003EE20367 Operating Systems RAID Redundant Array of Independent Disks Submitted by Ankur Niyogi 2003EE20367 YOUR DATA IS LOST@#!! Do we have backups of all our data???? - The stuff we cannot afford to lose?? How

More information

Erasure correcting to enhance data security in cloud data storage

Erasure correcting to enhance data security in cloud data storage Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University

More information

Locality Based Protocol for MultiWriter Replication systems

Locality Based Protocol for MultiWriter Replication systems Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin lgao@cs.utexas.edu One of the challenging problems in building replication

More information

To Provide Security & Integrity for Storage Services in Cloud Computing

To Provide Security & Integrity for Storage Services in Cloud Computing To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper

More information

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University

More information

Distributing, Ensuring and Recovery of Data Stored in Cloud

Distributing, Ensuring and Recovery of Data Stored in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology

More information

Peer-to-peer Cooperative Backup System

Peer-to-peer Cooperative Backup System Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup

More information

Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg DAAD Summerschool Curitiba 2011 Aspects of Large Scale High Speed Computing Building Blocks of a Cloud Storage Networks 2: Virtualization of Storage: RAID, SAN and Virtualization Christian Schindelhauer

More information

Enhancing Peer to Peer Parallel Data Access with PeerFecT Laurent Dairaine, Laurent Lancérica, Jérôme Lacan

Enhancing Peer to Peer Parallel Data Access with PeerFecT Laurent Dairaine, Laurent Lancérica, Jérôme Lacan Enhancing Peer to Peer Parallel Data Access with PeerFecT Laurent Dairaine, Laurent Lancérica, Jérôme Lacan {Laurent.Dairaine, Laurent.Lancerica, Jerome.Lacan}@ensica.fr Tel : +(33)561618683 / Fax : +(33)561618688

More information

A Robust and Secure Overlay Storage Scheme Based on Erasure Coding

A Robust and Secure Overlay Storage Scheme Based on Erasure Coding A Robust and Secure Overlay Storage Scheme Based on Erasure Coding Chuanyou Li Yun Wang School of Computer Science and Engineering, Southeast University Key Lab of Computer Network and Information Integration,

More information

Systems of Linear Equations

Systems of Linear Equations Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and

More information

Secure Way of Storing Data in Cloud Using Third Party Auditor

Secure Way of Storing Data in Cloud Using Third Party Auditor IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.

More information

Using Shared Parity Disks to Improve the Reliability of RAID Arrays

Using Shared Parity Disks to Improve the Reliability of RAID Arrays Using Shared Parity Disks to Improve the Reliability of RAID Arrays Jehan-François Pâris Department of Computer Science University of Houston Houston, TX 7704-010 paris@cs.uh.edu Ahmed Amer Department

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

STAR : An Efficient Coding Scheme for Correcting Triple Storage Node Failures

STAR : An Efficient Coding Scheme for Correcting Triple Storage Node Failures STAR : An Efficient Coding Scheme for Correcting Triple Storage Node Failures Cheng Huang, Member, IEEE, and Lihao Xu, Senior Member, IEEE Abstract Proper data placement schemes based on erasure correcting

More information

A Practical Approach of Storage Strategy for Grid Computing Environment

A Practical Approach of Storage Strategy for Grid Computing Environment A Practical Approach of Storage Strategy for Grid Computing Environment Kalim Qureshi Abstract -- An efficient and reliable fault tolerance protocol plays an important role in making the system more stable.

More information

Lecture 36: Chapter 6

Lecture 36: Chapter 6 Lecture 36: Chapter 6 Today s topic RAID 1 RAID Redundant Array of Inexpensive (Independent) Disks Use multiple smaller disks (c.f. one large disk) Parallelism improves performance Plus extra disk(s) for

More information

RAID. Contents. Definition and Use of the Different RAID Levels. The different RAID levels: Definition Cost / Efficiency Reliability Performance

RAID. Contents. Definition and Use of the Different RAID Levels. The different RAID levels: Definition Cost / Efficiency Reliability Performance RAID Definition and Use of the Different RAID Levels Contents The different RAID levels: Definition Cost / Efficiency Reliability Performance Further High Availability Aspects Performance Optimization

More information

Non-Redundant (RAID Level 0)

Non-Redundant (RAID Level 0) There are many types of RAID and some of the important ones are introduced below: Non-Redundant (RAID Level 0) A non-redundant disk array, or RAID level 0, has the lowest cost of any RAID organization

More information

Storage Codes: Managing Big Data with Small Overheads

Storage Codes: Managing Big Data with Small Overheads Storage Codes: Managing Big Data with Small Overheads Anwitaman Datta, Frédérique Oggier Nanyang Technological University, Singapore {anwitaman,frederique}@ntu.edu.sg WWW: http://sands.sce.ntu.edu.sg/codingfornetworkedstorage/

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute

More information

Row Echelon Form and Reduced Row Echelon Form

Row Echelon Form and Reduced Row Echelon Form These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation

More information

Solving Systems of Linear Equations Using Matrices

Solving Systems of Linear Equations Using Matrices Solving Systems of Linear Equations Using Matrices What is a Matrix? A matrix is a compact grid or array of numbers. It can be created from a system of equations and used to solve the system of equations.

More information

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels

technology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California

More information

Self-Adaptive Disk Arrays

Self-Adaptive Disk Arrays Proc. 8 th International Symposium on Stabilization, Safety and Securiity of Distributed Systems (SSS 006), Dallas, TX, Nov. 006, to appear Self-Adaptive Disk Arrays Jehan-François Pâris 1*, Thomas J.

More information

How To Write A Hexadecimal Program

How To Write A Hexadecimal Program The mathematics of RAID-6 H. Peter Anvin First version 20 January 2004 Last updated 20 December 2011 RAID-6 supports losing any two drives. syndromes, generally referred P and Q. The way

More information

The four [10,5,4] binary codes

The four [10,5,4] binary codes 1 Preliminaries The four [10,,] binary codes There are four distinct [10; ; ] binary codes. We shall prove this in a moderately elementary way, using the MacWilliams identities as the main tool. (For the

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

Dependable Systems. 9. Redundant arrays of. Prof. Dr. Miroslaw Malek. Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs

Dependable Systems. 9. Redundant arrays of. Prof. Dr. Miroslaw Malek. Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs Dependable Systems 9. Redundant arrays of inexpensive disks (RAID) Prof. Dr. Miroslaw Malek Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs Redundant Arrays of Inexpensive Disks (RAID) RAID is

More information

Lecture 1: Systems of Linear Equations

Lecture 1: Systems of Linear Equations MTH Elementary Matrix Algebra Professor Chao Huang Department of Mathematics and Statistics Wright State University Lecture 1 Systems of Linear Equations ² Systems of two linear equations with two variables

More information

Notes 11: List Decoding Folded Reed-Solomon Codes

Notes 11: List Decoding Folded Reed-Solomon Codes Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,

More information

Load Balancing in Fault Tolerant Video Server

Load Balancing in Fault Tolerant Video Server Load Balancing in Fault Tolerant Video Server # D. N. Sujatha*, Girish K*, Rashmi B*, Venugopal K. R*, L. M. Patnaik** *Department of Computer Science and Engineering University Visvesvaraya College of

More information

Tornado: A Capability-Aware Peer-to-Peer Storage Network

Tornado: A Capability-Aware Peer-to-Peer Storage Network Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,

More information

A DHT-based Backup System

A DHT-based Backup System A DHT-based Backup System Emil Sit, Josh Cates, and Russ Cox MIT Laboratory for Computer Science 10 August 2003 1 Introduction Distributed hash tables have been proposed as a way to simplify the construction

More information

TRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING

TRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE TRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING Uppala Hari Krishna 1, G.Krishna Veni 2 1 M.Tech Student, Dept

More information

RAID Overview: Identifying What RAID Levels Best Meet Customer Needs. Diamond Series RAID Storage Array

RAID Overview: Identifying What RAID Levels Best Meet Customer Needs. Diamond Series RAID Storage Array ATTO Technology, Inc. Corporate Headquarters 155 Crosspoint Parkway Amherst, NY 14068 Phone: 716-691-1999 Fax: 716-691-9353 www.attotech.com sales@attotech.com RAID Overview: Identifying What RAID Levels

More information

OceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD.

OceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD. OceanStor 9000 InfoProtector Technical White Paper Issue 01 Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may

More information

N O T E S. A Reed Solomon Code Magic Trick. The magic trick T O D D D. M A T E E R

N O T E S. A Reed Solomon Code Magic Trick. The magic trick T O D D D. M A T E E R N O T E S A Reed Solomon Code Magic Trick T O D D D. M A T E E R Howard Community College Columbia, Maryland 21044 tmateer@howardcc.edu Richard Ehrenborg [1] has provided a nice magic trick that can be

More information

Protecting Data Against Early Disk Failures

Protecting Data Against Early Disk Failures Protecting Data gainst Early Disk Failures Jehan-François Pâris Dept. of Computer Science University of Houston Houston, TX 77204-3010 Thomas J. E. Schwarz Dept. of Computer Engineering Santa Clara University

More information

A Short Summary on What Happens When One Dies

A Short Summary on What Happens When One Dies Beyond the MDS Bound in Distributed Cloud Storage Jian Li Tongtong Li Jian Ren Department of ECE, Michigan State University, East Lansing, MI 48824-1226 Email: {lijian6, tongli, renjian}@msuedu Abstract

More information

Index Terms: Data integrity, dependable distributed storage, Cloud Computing

Index Terms: Data integrity, dependable distributed storage, Cloud Computing Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection

More information

RAID 5 rebuild performance in ProLiant

RAID 5 rebuild performance in ProLiant RAID 5 rebuild performance in ProLiant technology brief Abstract... 2 Overview of the RAID 5 rebuild process... 2 Estimating the mean-time-to-failure (MTTF)... 3 Factors affecting RAID 5 array rebuild

More information

1 Solving LPs: The Simplex Algorithm of George Dantzig

1 Solving LPs: The Simplex Algorithm of George Dantzig Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.

More information

idibs: An Improved Distributed Backup System

idibs: An Improved Distributed Backup System idibs: An Improved Distributed Backup System Faruck Morcos 1, Thidapat Chantem 1, Philip Little 1, Tiago Gasiba 2, and Douglas Thain 1 1 Department of Computer Science and Engineering, University of Notre

More information

How To Create A Multi Disk Raid

How To Create A Multi Disk Raid Click on the diagram to see RAID 0 in action RAID Level 0 requires a minimum of 2 drives to implement RAID 0 implements a striped disk array, the data is broken down into blocks and each block is written

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

An Area-Efficient Architecture of Reed-Solomon Codec for Advanced RAID Systems Min-An Song, I-Feng Lan, and Sy-Yen Kuo

An Area-Efficient Architecture of Reed-Solomon Codec for Advanced RAID Systems Min-An Song, I-Feng Lan, and Sy-Yen Kuo An Area-Efficient Architecture of Reed-olomon Codec for Advanced RAID ystems Min-An ong, I-Feng Lan, and y-yen Kuo Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan E-mail:

More information

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai

More information

Disk Array Data Organizations and RAID

Disk Array Data Organizations and RAID Guest Lecture for 15-440 Disk Array Data Organizations and RAID October 2010, Greg Ganger 1 Plan for today Why have multiple disks? Storage capacity, performance capacity, reliability Load distribution

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for

More information

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks

More information

DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering

DELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering DELL RAID PRIMER DELL PERC RAID CONTROLLERS Joe H. Trickey III Dell Storage RAID Product Marketing John Seward Dell Storage RAID Engineering http://www.dell.com/content/topics/topic.aspx/global/products/pvaul/top

More information

How To Ensure Correctness Of Data In The Cloud

How To Ensure Correctness Of Data In The Cloud A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.

More information

StorTrends RAID Considerations

StorTrends RAID Considerations StorTrends RAID Considerations MAN-RAID 04/29/2011 Copyright 1985-2011 American Megatrends, Inc. All rights reserved. American Megatrends, Inc. 5555 Oakbrook Parkway, Building 200 Norcross, GA 30093 Revision

More information

Swisscom, January 2006. Raptor Codes. Amin Shokrollahi

Swisscom, January 2006. Raptor Codes. Amin Shokrollahi Raptor Codes Amin Shokrollahi Synopsis 1. Some data Transmission Problems and their (conventional) solutions 2. Fountain Codes 2.1. Definition 2.2. Some type of fountain codes 2.3. LT-Codes 2.4. Raptor

More information

TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS

TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS TECHNOLOGY BRIEF August 1999 Compaq Computer Corporation Prepared by ISSD Technology Communications CONTENTS Executive Summary 1 Introduction 3 Subsystem Technology 3 Processor 3 SCSI Chip4 PCI Bridge

More information

RAID Triple Parity. Peter Corbett. Atul Goel ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords

RAID Triple Parity. Peter Corbett. Atul Goel ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords RAID Triple Parity Atul Goel NetApp Inc atul.goel@netapp.com Peter Corbett NetApp Inc peter.corbett@netapp.com ABSTRACT RAID triple parity (RTP) is a new algorithm for protecting against three-disk failures.

More information

Scalable Bloom Filters

Scalable Bloom Filters Scalable Bloom Filters Paulo Sérgio Almeida Carlos Baquero Nuno Preguiça CCTC/Departamento de Informática Universidade do Minho CITI/Departamento de Informática FCT, Universidade Nova de Lisboa David Hutchison

More information

General Framework for an Iterative Solution of Ax b. Jacobi s Method

General Framework for an Iterative Solution of Ax b. Jacobi s Method 2.6 Iterative Solutions of Linear Systems 143 2.6 Iterative Solutions of Linear Systems Consistent linear systems in real life are solved in one of two ways: by direct calculation (using a matrix factorization,

More information

Data Storage Requirements for the Service Oriented Computing

Data Storage Requirements for the Service Oriented Computing Data Storage Requirements for the Service Oriented Computing Thomas Risse, Predrag Knežević Fraunhofer IPSI Integrated Publication and Information Systems Institute Dolivostrasse 15, 64293 Darmstadt, Germany

More information

Solving Linear Systems, Continued and The Inverse of a Matrix

Solving Linear Systems, Continued and The Inverse of a Matrix , Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing

More information

The mathematics of RAID-6

The mathematics of RAID-6 The mathematics of RAID-6 H. Peter Anvin 1 December 2004 RAID-6 supports losing any two drives. The way this is done is by computing two syndromes, generally referred P and Q. 1 A quick

More information

New Algorithms for Load Balancing in Peer-to-Peer Systems

New Algorithms for Load Balancing in Peer-to-Peer Systems New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing

More information

CS161: Operating Systems

CS161: Operating Systems CS161: Operating Systems Matt Welsh mdw@eecs.harvard.edu Lecture 18: RAID April 19, 2007 2007 Matt Welsh Harvard University 1 RAID Redundant Arrays of Inexpensive Disks Invented in 1986-1987 by David Patterson

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

A Hitchhiker s Guide to Fast and Efficient Data Reconstruction in Erasure-coded Data Centers

A Hitchhiker s Guide to Fast and Efficient Data Reconstruction in Erasure-coded Data Centers A Hitchhiker s Guide to Fast and Efficient Data Reconstruction in Erasure-coded Data Centers K V Rashmi 1, Nihar B Shah 1, Dikang Gu 2, Hairong Kuang 2, Dhruba Borthakur 2, and Kannan Ramchandran 1 ABSTRACT

More information

ABSTRACT. Performance Improvements to Peer-to-Peer File Transfers Using Network Coding. Aaron A. Kelley, M.S. Mentor: William B. Poucher, Ph.D.

ABSTRACT. Performance Improvements to Peer-to-Peer File Transfers Using Network Coding. Aaron A. Kelley, M.S. Mentor: William B. Poucher, Ph.D. ABSTRACT Performance Improvements to Peer-to-Peer File Transfers Using Network Coding Aaron A. Kelley, M.S. Mentor: William B. Poucher, Ph.D. A common peer-to-peer approach to large data distribution is

More information