Note: Correction to the 1997 Tutorial on Reed-Solomon Coding
|
|
- Aron Warner
- 7 years ago
- Views:
Transcription
1 Note: Correction to the 1997 utorial on Reed-Solomon Coding James S Plank Ying Ding University of ennessee Knoxville, N 3799 [plank,ying]@csutkedu echnical Report U-CS Department of Computer Science University of ennessee April 24, Introduction In 1997, SPE published a tutorial by Plank [19] on implementing Reed-Solomon codes for erasure correction in redundant data storage systems he motivation of this tutorial was to present these codes, which are typically described mathematically by coding theorists, in a way accessible to the programmers who need to implement them he tutorial as published presented an information dispersal matrix, which does not have the properties claimed that the deletion of any rows results in an invertable matrix he purpose of this note is to present a correct information dispersal matrix that has the desired properties, and to put the work in current context 2 he Continued Need or Erasure Correcting Codes As disk array technology continued to blossom in the 1990 s [4, 5], a need arose to tolerate a disk s failure without waiting for the disk to be repaired Straight replication performs this fault-tolerance, but at a high storage overhead RAID Level 5 encoding, termed N+1 Parity [5], reduces the storage overhead for fault-tolerance, and allows a parity disk to store redundancy for data disks in such a way that the failure of any single disk may be tolerated However, as the number of disks in a disk array grows, so does the the need to tolerate multiple simultaneous failures Reed- Solomon coding has the properties necessary to add arbitrary levels of fault-tolerance to disk array systems One may add coding disks to data disks so that the failure of any disks may be tolerated, and although none of the levels of RAID employs Reed-Solomon codes, the original work on disk arrays make note of the codes desirable properties [5] 1
2 As wide-area network computing has become more popular, the uses of erasure-correcting codes have broadened Rizzo employs them to avoid retransmission in point-to-point [20] and multicast [21] communication protocols his work has resulted in standardization efforts for such codes in multicast scenarios from the IE [15, 1] Additional uses of Reed-Solomon codes have been in cryptography [], distributed data structures [10], energy-efficient wireless communication [7] and distributed checkpointing [1] he advent of wide-area and peer-to-peer storage systems has further motivated the need for erasure-correcting codes or example, OceanStore employs Reed-Solomon coding for RAID-like fault-tolerance in a wide-area file system [9] More interestingly, several content dispersal systems have noted that erasure coding can be used for caching rather than for fault-tolerance [2, 3, 22] Specifically, suppose that blocks of a file need to be stored in a wide-area storage substrate, so that clients in all parts of the network may access it With replication, clients must find the closest copies of each of the blocks in order to retrieve the file However, with erasure-correcting codes, extra coding blocks may be distributed with the blocks of the file so that each client need only retrieve the closest blocks in order to reconstruct the file As files grow in size, the power of this application will be immense; hence the need to correct the error of the 1997 Reed-Solomon coding tutorial here are other erasure coding techniques in addition to the one which this tutorial addresses Examples are ornado codes [13, 14], Cauchy Reed-Solomon codes [1] and other parity-based schemes [] Of these, ornado codes are worth special mention, as they form the backbone of the Digital ountain content dispersal system [2] ornado codes have a randomized structure so that with the addition of extra parity blocks, a file may be reconstructed from any blocks he randomized structure ensures that should be small In a performance evaluation conducted by Luby [12], ornado codes display significantly better encoding and decoding performance than the codes in this paper (termed Vandermonde-based Reed-Solomon codes ) for large data sizes and large values of of or small values, a true comparison has yet to be performed Currently, there is no implementation guide for ornado codes akin to [19] As the knowledge of their performance advantages become more widespread, perhaps this will change 3 A Correct Information Dispersal Matrix he desired properties for the information dispersal matrix for Reed-Solomon coding is that: It is an matrix he matrix in the first rows are the identity matrix Any submatrix formed by deleting rows of the matrix is invertible We denote the correct information matrix is derived from an Vandermonde matrix using a sequence of elementary matrix transformations: 1 Any column may be swapped with column 2
3 2 Any column may be replaced by, where 3 Any column may be replaced by adding a multiple of another column to it:, where and Since arithmetic is over a Galois field, the addition operation is bitwise exclusive-or ( ( ( ( he -th element of a Vandermonde matrix is defined to be :!! "#"" $%&'! "#"" $%& "#"" $%& *),+-0/1# *),+-2/3 *),+-0/1# "#""4*),+-0/1# $% 57 By definition, this matrix has the property that any submatrix formed by deleting rows of this matrix is invertible [17] Moreover, any matrix derived from this matrix by a sequence of elementary matrix transformations maintains this property (since elementary matrix operations do not change the rank of a matrix [11]) herefore, constructing the matrix is a simple matter of performing elementary transformations on the Vandermonde matrix until the first rows are the identity matrix he algorithm for doing constructing is as follows: Suppose the first :9<; rows of the matrix are identity rows, and,= At each step, we will turn row into an identity row, without altering the other identity rows If the -th element of row is equal to zero, find a column such that?> and the -th element of row is non-zero, and swap columns and Such a column is guaranteed to exist; otherwise the first rows of the matrix would not compose an invertible matrix Moreover,, swapping columns and will not alter the first A9; rows of the matrix Let B C be the value of the -th element of row Let BEDG HC be the multiplicative inverse B HC In other words, B HCIB HC DJ K; Since B C, B C DG is guaranteed to exist if B C K;, replace column with B DJ L Now B C = 1 or all columns 0 and B C M, replace column with 9 B C, where B HC is the -th element in row At the end of this step, rows 0 through are identity rows, and the matrix still has the property that the deletion of any rows yields an invertible matrix Repeat this process until the first rows are identity rows, and the construction of is complete Example As an example, we construct for ONP ON, over G(QSR ) As detailed in [19], in G(QR ), addition is performed by exclusive-or, and multiplication/division may be performed using logarithm tables, reproduced in able 1 he N Vandermonde matrix over U,V WQR is: 3
4 Q B gflog[i] gfilog[i] able 1: Logarithm tables for U,V QR ; ; ; Q Q N N N Row 0 is already an identity row o convert row 1, we note that B with 9 and with 9 he resulting matrix is: All that is left is to convert row 2 irst, since B C hen we replace with 9'N and 57 ; N Q Q N 5 ; ; ; ; Q ; N ; N ; Q C 57 C B C ;, so we need to replace K;, we need to replace with DG = : ; N Q ; Q N ; with ; ; ; ; ; ; ; 5 9 Q to yield our desired : 5 4
5 References [1] J Blomer, M Kalfane, M Karpinski, R Karp, M Luby, and D Zuckerman An XOR-based erasure-resilient coding scheme echnical Report R-95-04, International Computer Science Institute, August 1995 [2] J Byers, M Luby, M Mitzenmacher, and A Rege A digital fountain approach to reliable distribution of bulk data In ACM SIGCOMM 9, pages 5 7, Vancouver, August 199 [3] J W Byers, M Luby, and M Mitzenmacher Accessing multiple mirror sites in parallel: Using tornado codes to speed up downloads In IEEE INOCOM, pages , New York, NY, March 1999 [4] P M Chen, E K Lee, G A Gibson, R H Katz, and D A Patterson RAID: High-performance, reliable secondary storage ACM Computing Surveys, 2(2):145 15, June 1994 [5] G A Gibson Redundant Disk Arrays: Reliable, Parallel Secondary Storage he MI Press, Cambridge, Massachusetts, 1992 [] G A Gibson, L Hellerstein, R M Karp, R H Katz, and D A Patterson ailure correction techniques for large disk arrays In hird International Conference on Architectural Support for Programming Languages and Operating Systems, pages , Boston, MA, April 199 [7] P J M Havinga Energy efficiency of error correction on wireless systems, 1999 [] C S Jutla Encryption modes with almost free message integrity Lecture Notes in Computer Science, 2045, 2001 [9] J Kubiatowicz, D Bindel, Y Chen, P Eaton, D Geels, R Gummadi, S Rhea, H Weatherspoon, W Weimer, C Wells, and B Zhao Oceanstore: An architecture for global-scale persistent storage In Proceedings of ACM ASPLOS ACM, November 2000 [10] W Litwin and Schwarz Lh*rs: a high-availability scalable distributed data structure using Reed Solomon codes In Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pages ACM Press, 2000 [11] Lowenthal Linear Algebra with Linear Differential Equations John Wiley & Sons, Inc, New York, 1975 [12] M Luby Benchmark comparisons of erasure codes luby/ erasurehtml, 2002 [13] M Luby, M Mitzenmacher, and A Shokrollahi Analysis of random processes via and-or tree evaluation In 9th Annual ACM-SIAM Symposium on Discrete Algorithms, January 199 [14] M Luby, M Mitzenmacher, A Shokrollahi, D Spielman, and V Stemann Practical loss-resilient codes In 29th Annual ACM Symposium on heory of Computing,, pages ,
6 [15] M Luby, L Vicisano, J Gemmell, L Rizo, M Handley, and J Crowcroft orward error correction (EC) building block IE RC 3452 ( December 2002 [1] M Luby, L Vicisano, J Gemmell, L Rizo, M Handley, and J Crowcroft he use of forward error correction(ec) in reliable multicast IE RC 3453 ( December 2002 [17] J MacWilliams and NJA Sloane he heory of Error-Correcting Codes, Part I North-Holland Publishing Company, Amsterdam, New York, Oxford, 1977 [1] J S Plank Improving the performance of coordinated checkpointers on networks of workstations using RAID techniques In 15th Symposium on Reliable Distributed Systems, pages 7 5, October 199 [19] J S Plank A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems Software Practice & Experience, 27(9): , September 1997 [20] L Rizzo Effective erasure codes for reliable computer communication protocols ACM SIGCOMM Computer Communication Review, 27(2):24 3, 1997 [21] L Rizzo and L Vicisano RMDP: an EC-based reliable multicast protocol for wireless environments Mobile Computer and Communication Review, 2(2), April 199 [22] A I Rowstron and P Druschel Storage management and caching in PAS, a large-scale, persistent peer-topeer storage utility In Symposium on Operating Systems Principles, pages 1 201, 2001
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
More informationDistributed Storage Networks and Computer Forensics
Distributed Storage Networks 5 Raid-6 Encoding Technical Faculty Winter Semester 2011/12 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant Array of Inexpensive Disks,
More informationAlgorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Christian Schindelhauer
Algorithms and Methods for Distributed Storage Networks 5 Raid-6 Encoding Institut für Informatik Wintersemester 2007/08 RAID Redundant Array of Independent Disks Patterson, Gibson, Katz, A Case for Redundant
More informationA Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems
A Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems James S Plank Department of Computer Science University of Tennessee February 19, 1999 Abstract It is well-known that Reed-Solomon
More informationA Performance Comparison of Open-Source Erasure Coding Libraries for Storage Applications
A Performance Comparison of Open-Source Erasure Coding Libraries for Storage Applications Catherine D. Schuman James S. Plank Technical Report UT-CS-8-625 Department of Electrical Engineering and Computer
More informationPublication I. 2006 Institute of Electrical and Electronics Engineers (IEEE)
Publication I Mikko Pitkänen, Rim Moussa, Martin Swany, and Tapio Niemi. 2006. Erasure codes for increasing the availability of grid data storage. In: Proceedings of the Advanced International Conference
More informationA Reed-Solomon Code for Disk Storage, and Efficient Recovery Computations for Erasure-Coded Disk Storage
A Reed-Solomon Code for Disk Storage, and Efficient Recovery Computations for Erasure-Coded Disk Storage M. S. MANASSE Microsoft Research, Mountain View, California, USA C. A. THEKKATH Microsoft Research,
More informationMagnus: Peer to Peer Backup System
Magnus: Peer to Peer Backup System Naveen Gattu, Richard Huang, John Lynn, Huaxia Xia Department of Computer Science University of California, San Diego Abstract Magnus is a peer-to-peer backup system
More informationA Digital Fountain Approach to Reliable Distribution of Bulk Data
A Digital Fountain Approach to Reliable Distribution of Bulk Data John Byers, ICSI Michael Luby, ICSI Michael Mitzenmacher, Compaq SRC Ashu Rege, ICSI Application: Software Distribution New release of
More informationData Corruption In Storage Stack - Review
Theoretical Aspects of Storage Systems Autumn 2009 Chapter 2: Double Disk Failures André Brinkmann Data Corruption in the Storage Stack What are Latent Sector Errors What is Silent Data Corruption Checksum
More informationStudy on Redundant Strategies in Peer to Peer Cloud Storage Systems
Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang
More informationA Highly Scalable and Efficient Distributed File Storage System
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.12, December 2009 101 A Highly Scalable and Efficient Distributed File Storage System Fawad Riasat Raja Dr. Adeel Akram Faculty
More informationDistributed Systems (5DV147) What is Replication? Replication. Replication requirements. Problems that you may find. Replication.
Distributed Systems (DV47) Replication Fall 20 Replication What is Replication? Make multiple copies of a data object and ensure that all copies are identical Two Types of access; reads, and writes (updates)
More informationRateless Codes and Big Downloads
Rateless Codes and Big Downloads Petar Maymounkov and David Mazières NYU Department of Computer Science Abstract This paper presents a novel algorithm for downloading big files from multiple sources in
More informationSecuring Cloud Data Storage
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 1, Issue 6 (July-Aug. 2012), PP 43-49 Securing Cloud Data Storage S. P. Jaikar 1, M. V. Nimbalkar 2 1,2 (Department of Information
More informationA Tutorial on Reed-Solomon Coding for Fault-Tolerance in RAID-like Systems
A Tutorial on Reed-olomon Coding for Fault-Tolerance in RAID-like ystems James lank Technical Report C-96-332 Department of Computer cience University of Tennessee IMORTANT The information dispersal matrix
More informationImproving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities
Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities Kavitha Ranganathan, Adriana Iamnitchi, Ian Foster Department of Computer Science, The University
More informationIncreased Reliability with SSPiRAL Data Layouts
Increased Reliability with SSPiRAL Data Layouts Ahmed Amer University of Pittsburgh amer@cs.pitt.edu Darrell D. E. Long University of California, Santa Cruz darrell@cs.ucsc.edu Thomas Schwarz Santa Clara
More informationP2P Networking - Advantages and Disadvantages of Virtualization
Are Virtualized Overlay Networks Too Much of a Good Thing? Pete Keleher, Bobby Bhattacharjee, Bujor Silaghi Department of Computer Science University of Maryland, College Park keleher@cs.umd.edu 1 Introduction
More informationThree-Dimensional Redundancy Codes for Archival Storage
Three-Dimensional Redundancy Codes for Archival Storage Jehan-François Pâris Darrell D. E. Long Witold Litwin Department of Computer Science University of Houston Houston, T, USA jfparis@uh.edu Department
More informationDisaster Recovery Codes: Increasing Reliability with Large-Stripe Erasure Correcting Codes
Disaster Recovery Codes: Increasing Reliability with Large-Stripe Erasure Correcting Codes ABSTRACT Kevin M. Greenan Computer Science Dept. Univ. of California, Santa Cruz Santa Cruz, CA, USA kmgreen@cs.ucsc.edu
More informationEvaluation of Distributed Recovery in Large-Scale Storage Systems
Evaluation of Distributed Recovery in Large-Scale Storage Systems Qin Xin Ethan L. Miller Storage Systems Research Center University of California, Santa Cruz qxin, elm @cs.ucsc.edu Thomas J. E. Schwarz,
More informationBiff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets
Biff (Bloom Filter) Codes : Fast Error Correction for Large Data Sets Michael Mitzenmacher and George Varghese Abstract Large data sets are increasingly common in cloud and virtualized environments. For
More informationAuthenticating Real Time Packet Streams and Multicasts
Authenticating Real Time Packet Streams and Multicasts Alain Pannetrat, Réfik Molva Institut Eurécom, Sophia-Antipolis, France. Abstract In this work we propose a new stream authentication scheme that
More informationPractical Data Integrity Protection in Network-Coded Cloud Storage
Practical Data Integrity Protection in Network-Coded Cloud Storage Henry C. H. Chen Department of Computer Science and Engineering The Chinese University of Hong Kong Outline Introduction FMSR in NCCloud
More informationRethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads
Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads Osama Khan, Randal Burns Department of Computer Science Johns Hopkins University James Plank, William Pierce
More informationAONT-RS: Blending Security and Performance in Dispersed Storage Systems
AONT-RS: Blending Security and Performance in Dispersed Storage Systems Jason K. Resch Development Cleversafe, Inc. 222 S. Riverside Plaza, Suite 17 Chicago, IL 666 jresch@cleversafe.com James S. Plank
More informationHow To Write A Disk Array
200 Chapter 7 (This observation is reinforced and elaborated in Exercises 7.5 and 7.6, and the reader is urged to work through them.) 7.2 RAID Disks are potential bottlenecks for system performance and
More informationMATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
More informationA Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage
A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage James S. Plank University of Tennessee plank@cs.utk.edu Lihao Xu Wayne State University Jianqiang Luo Wayne
More informationMOST error-correcting codes are designed for the equal
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,
More informationOperating Systems. RAID Redundant Array of Independent Disks. Submitted by Ankur Niyogi 2003EE20367
Operating Systems RAID Redundant Array of Independent Disks Submitted by Ankur Niyogi 2003EE20367 YOUR DATA IS LOST@#!! Do we have backups of all our data???? - The stuff we cannot afford to lose?? How
More informationErasure correcting to enhance data security in cloud data storage
Erasure correcting to enhance data security in cloud data storage K.Shrividhya Department of computer science- Vels University shrividhya224@gmail.com A.Sajeevram Department of computer science Vels University
More informationLocality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin lgao@cs.utexas.edu One of the challenging problems in building replication
More informationTo Provide Security & Integrity for Storage Services in Cloud Computing
To Provide Security & Integrity for Storage Services in Cloud Computing 1 vinothlakshmi.s Assistant Professor, Dept of IT, Bharath Unversity, Chennai, TamilNadu, India ABSTRACT: we propose in this paper
More informationImproving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Department of Computer Science and Engineering University
More informationDistributing, Ensuring and Recovery of Data Stored in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationVerification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage
Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage Nithiavathy.R 1, Suresh.J 2 Department of Computer Science &Engineering, Coimbatore Institute of Engineering and Technology
More informationPeer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
More informationChristian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg
DAAD Summerschool Curitiba 2011 Aspects of Large Scale High Speed Computing Building Blocks of a Cloud Storage Networks 2: Virtualization of Storage: RAID, SAN and Virtualization Christian Schindelhauer
More informationEnhancing Peer to Peer Parallel Data Access with PeerFecT Laurent Dairaine, Laurent Lancérica, Jérôme Lacan
Enhancing Peer to Peer Parallel Data Access with PeerFecT Laurent Dairaine, Laurent Lancérica, Jérôme Lacan {Laurent.Dairaine, Laurent.Lancerica, Jerome.Lacan}@ensica.fr Tel : +(33)561618683 / Fax : +(33)561618688
More informationA Robust and Secure Overlay Storage Scheme Based on Erasure Coding
A Robust and Secure Overlay Storage Scheme Based on Erasure Coding Chuanyou Li Yun Wang School of Computer Science and Engineering, Southeast University Key Lab of Computer Network and Information Integration,
More informationSystems of Linear Equations
Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and
More informationSecure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
More informationUsing Shared Parity Disks to Improve the Reliability of RAID Arrays
Using Shared Parity Disks to Improve the Reliability of RAID Arrays Jehan-François Pâris Department of Computer Science University of Houston Houston, TX 7704-010 paris@cs.uh.edu Ahmed Amer Department
More informationLinear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
More informationSTAR : An Efficient Coding Scheme for Correcting Triple Storage Node Failures
STAR : An Efficient Coding Scheme for Correcting Triple Storage Node Failures Cheng Huang, Member, IEEE, and Lihao Xu, Senior Member, IEEE Abstract Proper data placement schemes based on erasure correcting
More informationA Practical Approach of Storage Strategy for Grid Computing Environment
A Practical Approach of Storage Strategy for Grid Computing Environment Kalim Qureshi Abstract -- An efficient and reliable fault tolerance protocol plays an important role in making the system more stable.
More informationLecture 36: Chapter 6
Lecture 36: Chapter 6 Today s topic RAID 1 RAID Redundant Array of Inexpensive (Independent) Disks Use multiple smaller disks (c.f. one large disk) Parallelism improves performance Plus extra disk(s) for
More informationRAID. Contents. Definition and Use of the Different RAID Levels. The different RAID levels: Definition Cost / Efficiency Reliability Performance
RAID Definition and Use of the Different RAID Levels Contents The different RAID levels: Definition Cost / Efficiency Reliability Performance Further High Availability Aspects Performance Optimization
More informationNon-Redundant (RAID Level 0)
There are many types of RAID and some of the important ones are introduced below: Non-Redundant (RAID Level 0) A non-redundant disk array, or RAID level 0, has the lowest cost of any RAID organization
More informationStorage Codes: Managing Big Data with Small Overheads
Storage Codes: Managing Big Data with Small Overheads Anwitaman Datta, Frédérique Oggier Nanyang Technological University, Singapore {anwitaman,frederique}@ntu.edu.sg WWW: http://sands.sce.ntu.edu.sg/codingfornetworkedstorage/
More informationEnsuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
More informationRow Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation
More informationSolving Systems of Linear Equations Using Matrices
Solving Systems of Linear Equations Using Matrices What is a Matrix? A matrix is a compact grid or array of numbers. It can be created from a system of equations and used to solve the system of equations.
More informationtechnology brief RAID Levels March 1997 Introduction Characteristics of RAID Levels
technology brief RAID Levels March 1997 Introduction RAID is an acronym for Redundant Array of Independent Disks (originally Redundant Array of Inexpensive Disks) coined in a 1987 University of California
More informationSelf-Adaptive Disk Arrays
Proc. 8 th International Symposium on Stabilization, Safety and Securiity of Distributed Systems (SSS 006), Dallas, TX, Nov. 006, to appear Self-Adaptive Disk Arrays Jehan-François Pâris 1*, Thomas J.
More informationHow To Write A Hexadecimal Program
The mathematics of RAID-6 H. Peter Anvin First version 20 January 2004 Last updated 20 December 2011 RAID-6 supports losing any two drives. syndromes, generally referred P and Q. The way
More informationThe four [10,5,4] binary codes
1 Preliminaries The four [10,,] binary codes There are four distinct [10; ; ] binary codes. We shall prove this in a moderately elementary way, using the MacWilliams identities as the main tool. (For the
More informationIPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha
IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand
More informationDependable Systems. 9. Redundant arrays of. Prof. Dr. Miroslaw Malek. Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs
Dependable Systems 9. Redundant arrays of inexpensive disks (RAID) Prof. Dr. Miroslaw Malek Wintersemester 2004/05 www.informatik.hu-berlin.de/rok/zs Redundant Arrays of Inexpensive Disks (RAID) RAID is
More informationLecture 1: Systems of Linear Equations
MTH Elementary Matrix Algebra Professor Chao Huang Department of Mathematics and Statistics Wright State University Lecture 1 Systems of Linear Equations ² Systems of two linear equations with two variables
More informationNotes 11: List Decoding Folded Reed-Solomon Codes
Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,
More informationLoad Balancing in Fault Tolerant Video Server
Load Balancing in Fault Tolerant Video Server # D. N. Sujatha*, Girish K*, Rashmi B*, Venugopal K. R*, L. M. Patnaik** *Department of Computer Science and Engineering University Visvesvaraya College of
More informationTornado: A Capability-Aware Peer-to-Peer Storage Network
Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,
More informationA DHT-based Backup System
A DHT-based Backup System Emil Sit, Josh Cates, and Russ Cox MIT Laboratory for Computer Science 10 August 2003 1 Introduction Distributed hash tables have been proposed as a way to simplify the construction
More informationTRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE TRUSTWORTHY STORAGE FOR SUPPORTING MODERATELY RELIABLE CLOUD SETTING Uppala Hari Krishna 1, G.Krishna Veni 2 1 M.Tech Student, Dept
More informationRAID Overview: Identifying What RAID Levels Best Meet Customer Needs. Diamond Series RAID Storage Array
ATTO Technology, Inc. Corporate Headquarters 155 Crosspoint Parkway Amherst, NY 14068 Phone: 716-691-1999 Fax: 716-691-9353 www.attotech.com sales@attotech.com RAID Overview: Identifying What RAID Levels
More informationOceanStor 9000 InfoProtector Technical White Paper. Issue 01. Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD.
OceanStor 9000 InfoProtector Technical White Paper Issue 01 Date 2014-02-13 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may
More informationN O T E S. A Reed Solomon Code Magic Trick. The magic trick T O D D D. M A T E E R
N O T E S A Reed Solomon Code Magic Trick T O D D D. M A T E E R Howard Community College Columbia, Maryland 21044 tmateer@howardcc.edu Richard Ehrenborg [1] has provided a nice magic trick that can be
More informationProtecting Data Against Early Disk Failures
Protecting Data gainst Early Disk Failures Jehan-François Pâris Dept. of Computer Science University of Houston Houston, TX 77204-3010 Thomas J. E. Schwarz Dept. of Computer Engineering Santa Clara University
More informationA Short Summary on What Happens When One Dies
Beyond the MDS Bound in Distributed Cloud Storage Jian Li Tongtong Li Jian Ren Department of ECE, Michigan State University, East Lansing, MI 48824-1226 Email: {lijian6, tongli, renjian}@msuedu Abstract
More informationIndex Terms: Data integrity, dependable distributed storage, Cloud Computing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Data Protection
More informationRAID 5 rebuild performance in ProLiant
RAID 5 rebuild performance in ProLiant technology brief Abstract... 2 Overview of the RAID 5 rebuild process... 2 Estimating the mean-time-to-failure (MTTF)... 3 Factors affecting RAID 5 array rebuild
More information1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
More informationidibs: An Improved Distributed Backup System
idibs: An Improved Distributed Backup System Faruck Morcos 1, Thidapat Chantem 1, Philip Little 1, Tiago Gasiba 2, and Douglas Thain 1 1 Department of Computer Science and Engineering, University of Notre
More informationHow To Create A Multi Disk Raid
Click on the diagram to see RAID 0 in action RAID Level 0 requires a minimum of 2 drives to implement RAID 0 implements a striped disk array, the data is broken down into blocks and each block is written
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationAn Area-Efficient Architecture of Reed-Solomon Codec for Advanced RAID Systems Min-An Song, I-Feng Lan, and Sy-Yen Kuo
An Area-Efficient Architecture of Reed-olomon Codec for Advanced RAID ystems Min-An ong, I-Feng Lan, and y-yen Kuo Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan E-mail:
More informationIndex Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
More informationDisk Array Data Organizations and RAID
Guest Lecture for 15-440 Disk Array Data Organizations and RAID October 2010, Greg Ganger 1 Plan for today Why have multiple disks? Storage capacity, performance capacity, reliability Load distribution
More informationPIONEER RESEARCH & DEVELOPMENT GROUP
SURVEY ON RAID Aishwarya Airen 1, Aarsh Pandit 2, Anshul Sogani 3 1,2,3 A.I.T.R, Indore. Abstract RAID stands for Redundant Array of Independent Disk that is a concept which provides an efficient way for
More informationPeer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
More informationDELL RAID PRIMER DELL PERC RAID CONTROLLERS. Joe H. Trickey III. Dell Storage RAID Product Marketing. John Seward. Dell Storage RAID Engineering
DELL RAID PRIMER DELL PERC RAID CONTROLLERS Joe H. Trickey III Dell Storage RAID Product Marketing John Seward Dell Storage RAID Engineering http://www.dell.com/content/topics/topic.aspx/global/products/pvaul/top
More informationHow To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, priya25mehta@gmail.com 2 M. Tech.
More informationStorTrends RAID Considerations
StorTrends RAID Considerations MAN-RAID 04/29/2011 Copyright 1985-2011 American Megatrends, Inc. All rights reserved. American Megatrends, Inc. 5555 Oakbrook Parkway, Building 200 Norcross, GA 30093 Revision
More informationSwisscom, January 2006. Raptor Codes. Amin Shokrollahi
Raptor Codes Amin Shokrollahi Synopsis 1. Some data Transmission Problems and their (conventional) solutions 2. Fountain Codes 2.1. Definition 2.2. Some type of fountain codes 2.3. LT-Codes 2.4. Raptor
More informationTECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS
TECHNOLOGY BRIEF August 1999 Compaq Computer Corporation Prepared by ISSD Technology Communications CONTENTS Executive Summary 1 Introduction 3 Subsystem Technology 3 Processor 3 SCSI Chip4 PCI Bridge
More informationRAID Triple Parity. Peter Corbett. Atul Goel ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords
RAID Triple Parity Atul Goel NetApp Inc atul.goel@netapp.com Peter Corbett NetApp Inc peter.corbett@netapp.com ABSTRACT RAID triple parity (RTP) is a new algorithm for protecting against three-disk failures.
More informationScalable Bloom Filters
Scalable Bloom Filters Paulo Sérgio Almeida Carlos Baquero Nuno Preguiça CCTC/Departamento de Informática Universidade do Minho CITI/Departamento de Informática FCT, Universidade Nova de Lisboa David Hutchison
More informationGeneral Framework for an Iterative Solution of Ax b. Jacobi s Method
2.6 Iterative Solutions of Linear Systems 143 2.6 Iterative Solutions of Linear Systems Consistent linear systems in real life are solved in one of two ways: by direct calculation (using a matrix factorization,
More informationData Storage Requirements for the Service Oriented Computing
Data Storage Requirements for the Service Oriented Computing Thomas Risse, Predrag Knežević Fraunhofer IPSI Integrated Publication and Information Systems Institute Dolivostrasse 15, 64293 Darmstadt, Germany
More informationSolving Linear Systems, Continued and The Inverse of a Matrix
, Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing
More informationThe mathematics of RAID-6
The mathematics of RAID-6 H. Peter Anvin 1 December 2004 RAID-6 supports losing any two drives. The way this is done is by computing two syndromes, generally referred P and Q. 1 A quick
More informationNew Algorithms for Load Balancing in Peer-to-Peer Systems
New Algorithms for Load Balancing in Peer-to-Peer Systems David R. Karger Matthias Ruhl MIT Laboratory for Computer Science Cambridge, MA 02139, USA {karger, ruhl}@theory.lcs.mit.edu Abstract Load balancing
More informationCS161: Operating Systems
CS161: Operating Systems Matt Welsh mdw@eecs.harvard.edu Lecture 18: RAID April 19, 2007 2007 Matt Welsh Harvard University 1 RAID Redundant Arrays of Inexpensive Disks Invented in 1986-1987 by David Patterson
More informationMATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
More informationData Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:
More informationA Hitchhiker s Guide to Fast and Efficient Data Reconstruction in Erasure-coded Data Centers
A Hitchhiker s Guide to Fast and Efficient Data Reconstruction in Erasure-coded Data Centers K V Rashmi 1, Nihar B Shah 1, Dikang Gu 2, Hairong Kuang 2, Dhruba Borthakur 2, and Kannan Ramchandran 1 ABSTRACT
More informationABSTRACT. Performance Improvements to Peer-to-Peer File Transfers Using Network Coding. Aaron A. Kelley, M.S. Mentor: William B. Poucher, Ph.D.
ABSTRACT Performance Improvements to Peer-to-Peer File Transfers Using Network Coding Aaron A. Kelley, M.S. Mentor: William B. Poucher, Ph.D. A common peer-to-peer approach to large data distribution is
More information