An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks

Size: px
Start display at page:

Download "An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks"

Transcription

1 An Algorithm for a Two-Disk Fault-Tolerant Array with (Prime 1) Disks Sanjeeb Nanda and Narsingh Deo School of Computer Science University of Central Florida Orlando, Florida sanjeeb@earthlink.net, deo@cs.ucf.edu

2 Abstract In recent years commercial Redundant Arrays of Inexpensive Disks systems have gained considerable appeal due to their enhanced I/O bandwidths, capacities and economy. However, the continued demand for larger capacities at low cost, has led to the use of larger arrays with compromised disk quality. This has challenged RAID systems to offer better fault-tolerance without sacrificing performance or space. In this paper, we present an algorithm for recovery from two random disk failures in an array of (P 1) disks, where P is a prime number. The algorithm relies on exclusive-or parity bit-computed uniformly across all the disks. We give a constructive proof of the correctness of the algorithm and demonstrate the key steps with examples.

3 I. Introduction While CPU throughputs have doubled approximately every two years, enhancements to I/O bandwidth, in contrast, have been relatively conservative. In fact, I/O bottlenecks continue to restrict many applications from fully exploiting their processors. This fact motivated Patterson et al. to introduce Redundant Arrays of Inexpensive Disks (RAID) [5, 12, 13], which substitutes large expensive disks with arrays of inexpensive disks to provide greater cumulative I/O bandwidth. However, such arrays are probabilistically more susceptible to failure than their disks individually. Fortunately, several forms of RAID effectively solve this problem. Patterson originally defined RAID levels 0 through 5 [12] and the RAID Advisory Board subsequently added level 6 to the existing definitions. A RAID level 0 with N disks may partition each disk into equal sized blocks and order the blocks in a round-robin fashion. This enhances I/O throughput by permitting up to N blocks to be accessed concurrently when reading from, or writing to the array sequentially. Fig. 1 displays the order of the data blocks in a RAID level 0 with N disks and M data blocks per disk. But, RAID level 0 does not offer any redundancy. In contrast, levels 1 through 5 provide tolerance to the failure of exactly one disk in the array N N + 1 N + 2 N + 3 2N 2N + 1 2N + 2 2N + 3 3N (M 1)N + 1 (M 1)N + 2 (M 1)N + 3 MN Disk 1 Disk 2 Disk 3 Disk N Fig. 1. RAID level 0 with N disks and M blocks per disk, with the order of each block in the array indicated by an integer value. Since RAID levels 1 through 5 can recover from only one disk failure, their use is typically confined to smaller arrays where the probability of two or more disk failures is negligible. In fact, RAID levels 1 and 5 are common choices in such environments. RAID level 1 is simply a pair of disks with the data on any one

4 being mirrored on the other. Since this scheme does not use parity, it is computationally inexpensive and therefore, has relatively good I/O performance. However, its drawback is that, it consumes half the array s space for storing redundant data. In contrast, a RAID level 5 consists of at least three disks using parity to provide redundancy and various optimizations to enhance its performance [2, 6]. On the other hand, large arrays may need to tolerate two or more disk failures. A popular method that achieves this partitions an array of disks into RAID subsets each tolerant to a single disk failure and then creates another RAID level by using each aforementioned subset as a disk. In fact, practically every contemporary RAID controller offers RAID levels using this method. Some salient ones are RAID levels 10 and 50. RAID level 10 is obtained by creating a RAID level 0 using subsets that are each a RAID level 1. Similarly, RAID level 50 is obtained by creating a RAID level 0 using subsets that are each a RAID level 5. Fig. 2 displays a RAID 10 using three subsets of RAID level 1. Note that, identically ordered blocks in the array contain the same data M 2 3M 2 3M 1 3M 1 3M 3M Subset 1 (RAID 1) Subset 2 (RAID 1) Subset 3 (RAID 1) Fig. 2. A RAID level 10 with three virtual disks, each comprised of two disks, with the order of each block in the array given by an integer value. Note that, blocks in each pair of disks comprising a RAID 1 subset are identically ordered and therefore contain identical data. Although such arrays can tolerate as many disk failures as there are subsets, each failure is restricted to a unique subset. Thus, there is a compelling need for arrays that can tolerate multiple arbitrary disk failures. For most practical array sizes, the probability of occurrence of more than two simultaneous disk failures is generally small enough to be ignored, and a lesser number of failures can be tackled by the use of RAID systems resistant to two disk failures.

5 For this purpose, the RAID Advisory Board defined RAID level 6 as one that can tolerate two arbitrary disk failures. Numerous implementations of this type have been developed over the years, each with advantages and disadvantages. A well-known technique based on Reed-Solomon codes [14] has not gained much commercial favor because it uses Galois Field arithmetic to compute parities, which is computationally more expensive than using exclusive-or. Park proposed an algorithm [10] for evaluating the number of disks N and the configuration of data and parity, when given the ratio of disk space R used for storing parity. However, the solution is generally not optimal because RN is often greater than 2. The EVENODD technique proposed by Blaum et al. [1] allows non-prime values for the number of disks in the array only by artificially extending the actual size of the array to a prime number with imaginary disks containing 0 s as their contents. The latter scheme has greater computational complexity when the number of disks is non-prime and calculations to derive parity have to factor in the presence of the imaginary disks. In this paper, we present an algorithm to create an array of (P 1) disks, where P is prime, which can recover from the failure of any two arbitrary disks in the array. The algorithm generates a solution with (P 3)/2 blocks of data and one block of parity per disk, each block being of equal size. Each parity block s value is then obtained by computing the bit-wise exclusive-or of (P 3) data blocks that are specified by the algorithm. The solution is then extended for practical use by repeating the data and parity configuration of the (P 1)/2 data and parity blocks an integral number of times. The algorithm embodies numerous strengths that make it more attractive than competing techniques that provide tolerance to two arbitrary disk failures. First, the fraction of space used for storing parity in an array with (P 1) disks is 2/(P 1). This ratio is optimal because a solution to reconstruct two disk failures with a lesser value is not possible. Second, the algorithm distributes parity uniformly over all the disks, permitting data to be read from, and parity to be written to all disks concurrently. This maximizes cumulative I/O throughput to the disks. Third, the algorithm is computationally inexpensive because it calculates each parity block s value by using exclusive-or operations only. Finally, since (P 1) is even, this algorithm is well suited for many external storage enclosures that accommodate an even number of disks. Next, we shall state our algorithm and then, prove its correctness.

6 II. Algorithm To Create A 2-Disk Fault-Tolerant Array Of (P 1) Disks Let P 5 be a prime and M P = (m ij ) be a matrix with m ij = (2P i j 1) mod P, 0 i, j P 1. Let d 0, d 1, d 2, d P 2 be an array of P 1 disks, where P is prime. Each disk contains (P 3)/2 data blocks and a parity block. Each data block in disk d is assigned a unique unordered pair {x, y} as a data-block tag if m xy = m dd, and the parity block the singleton [d] as a parity-block tag, where 0 x, y P 2. The parity in the block with tag [d] is then calculated by taking the bit-wise exclusive-or of all data blocks with tags having d as an element. In other words, the data in the block with tag {x, y} is used to calculate the parities in the blocks with tags [x] and [y]. Fig. 3 displays the pseudo-code that implements the algorithm. In the pseudocode we represent the disks in an array by the variable d, and the equal sized blocks within each disk by the variable b. Fig. 4 displays the result of the algorithm applied to create a two-disk fault-tolerant array with six disks. for i 0 to (P 1) do for j i to (P 1) do m(i, j) (2P i j 1) mod P; for disk d 0 to (P 2) do { b 0; for i 0 to (P 3) do for j (i + 1) to (P 2) do if (m(i, j) = m(d, d)) then { block b in disk d is assigned data-block tag {i, j}; b b + 1; } } block b of disk d is assigned parity-block tag [d]; Fig. 3. Pseudo-code to implement the algorithm.

7 {3, 4} {0, 2} {1, 3} {2, 4} {0, 1} {0, 3} {2, 5} {4, 5} {0, 4} {1, 5} {3, 5} {1, 2} [0] [1] [2] [3] [4] [5] Fig. 4. Algorithm applied to create a six-disk system. III. Proof Of Correctness Of The Algorithm As defined earlier in our algorithm, P 5 is a prime and M P = (m ij ) is a matrix with m ij = (2P i j 1) mod P, 0 i, j P 1. Fig. 5 illustrates M 7 as an example Fig. 5. The matrix M 7. Now, we state and prove some properties needed to prove the correctness of our algorithm. Property 1 Let S(x) = {(i, j) m ij = x} and S(y) = {(i, j) m ij = y}, 0 x, y P 1. Let, r S(x) S(y) be a function, with r(i, j) = (i, k). Similarly, let c S(y) S(x) be a function, with c(i, j) = (k, j). Note that r and c are isomorphic. Thus, r represents a move from an entry with value x to an entry with value y on the same row, and c represents a move from an entry with value y to an entry with value x on the same column. Then, given

8 elements of the form (i, i) S(x) and (j, j) S(y), r (c r) ½(P 1) (i, i) = (j, j). In other words, exactly P total moves, comprised of ½(P + 1) moves of the form r interleaved with ½(P 1) moves of the form c, are required to start from m ii = x and reach m jj = y. For example in M 7, let r S(6) S(2), and c S(2) S(6). Then, exactly seven total moves comprised of r alternating with c are needed to start from the (0, 0) entry on the major diagonal, having value 6, and reach the (2, 2) entry on the major diagonal, having value 2. The sequence of coordinates traversed is as follows (0, 0), (0, 4), (3, 4), (3, 1), (6, 1), (6, 5), (2, 5), (2, 2) Proof Let, r S(x) S(y), with r(i, j) = (i, k). Since 2P i j 1 x (mod P) and 2P i k 1 y (mod P), it follows that k j = x y; hence k = j + x y. Thus, a move of the form r takes us from the (i, j) entry to the (i, j + x y) entry. Similarly, let c S(y) S(x), with c(i, k) = (l, k). Since, 2P i k 1 y (mod P) and 2P l k 1 x (mod P), it follows that l i = y x; hence l = i + y x. Thus, a move of the form c takes us from the (i, k) = (i, j + x y) entry to the (l, k) = (i + y x, j + x y) entry. Then, the composition (c r) S(x) S(x) takes us from the (i, j) entry to the (i + y x, j + x y) entry. Now, suppose we start from the (i, i) entry with m ii = x, then (c r) S(x) S(x) takes us from the (i, i) entry to the (i + y x, i + x y) entry. It is then easy to see that the (i + y x, i + x y) entry is not on the major diagonal, for else we would have i + y x i + x y (mod P), that is, 2(x y) 0 (mod P). A contradiction. Using the same argument we can show that, for any integer n 1, (c r) n S(x) S(x) will take us from the (i, i) entry to the (i + n(y x), i + n(x y)) entry, and that, the latter cannot be on the major diagonal. However, r (c r) ½(P 1) S(x) S(y) will take us from the (i, i) entry to the (i + ½(P 1)(y x), i + ½(P 1)(x y) + x y) entry. It is then easy to see that the latter is an entry on the major diagonal since, i + ½(P 1)(y x) (i + ½(P 1)(x y) + x y) = P(y x) 0. Thus, ½(P + 1) moves of the form r interleaved with ½(P 1) moves of the form c are required to start from m ii = x and reach m jj = y, for a total of exactly P moves.

9 Let d 0, d 1, d 2, d P 2 be an array of (P 1) disks with data-block tags. A sequence of data-block tags {{u 0, v 0 }, {u 1, v 1 }, {u 2, v 2 }, {u K, v K }} from both disks is called a path if {u i, v i } {u i + 1, v i + 1 } = 1, where 0 i < K, and K P 4. Such a path is a cycle if {u k, v k } {u 0, v 0 } = 1. Property 2 Proof No pair of disks in d 0, d 1, d 2, d P 2 can have a cycle of data-block tags. Suppose to the contrary that a pair of disks d x and d y has a cycle C = {{u 0, v 0 }, {u 1, v 1 }, {u 2, v 2 }, {u K, v K }} of data-block tags, K P 4. Note that, each tag {u i, v i } in the sequence is obtained from the coordinates of an entry in M P with value m xx or m yy. Furthermore, if a tag in C corresponds to the coordinates of an entry with value m xx then its preceding and succeeding tags in C correspond to the coordinates of an entry with value m yy. Thus, the cycle C describes a sequence of alternating horizontal and vertical moves in M P that starts, without loss of generality, at an entry with value m xx and moves horizontally to an entry with value m yy, followed by a vertical move to an entry with value m xx, and so on, until we arrive back at the starting entry with value m xx with a vertical move. Let S (x) = {(i, j) m ij = m xx } and Let S (y) = {(i, j) m ij = m yy }. Let, r S (x) S (y) be a function with r(i, j) = (i, k), and let c S (y) S (x) be a function with c(i, j) = (k, j). Then, using arguments from the proof of Property 1, we can show that, (c r) n S (x) S (x) takes us from the (i, j) entry to the (i + n(y x), j + n(x y)) entry, for any integer n 1. Hence, the presence of C implies that, i + n(y x) i (mod P), and j + n(x y) j (mod P). Since x y, n must equal P. This is a contradiction, since K P 4; and therefore, n (P 3)/2. A path of data-block tags T = {{u 0, v 0 }, {u 1, v 1 }, {u K, v K }} in a pair of disks d x and d y is a maximal path if there does not exist any tag {u, v} in d x or d y such that, {u, v} T, and either {u 0, v 0 } {u, v} = 1 or {u K, v K } {u, v} = 1. Then, we observe that every data block tag in disks d x and d y must lie on a maximal path. Let us now prove the following theorem. Theorem The array of disks d 0, d 1, d 2, d P 2 can tolerate two disk failures.

10 Proof Assume disks d x and d y have failed, where x, y {0, 1, P 2}. Let T = {{u 0, v 0 }, {u 1, v 1 }, {u K, v K }} be a maximal path of data-block tags in d x and d y, K P 4 Assume without loss of generality that {u 0, v 0 } {u 1, v 1 } = {v 0 } and {u K 1, v K 1 } {u K, v K } = {u K }. Then, the parity-block tags [u 0 ] or [v K ] cannot both lie on the failed disks. Suppose to the contrary that parity-block tags [u 0 ] and [v K ] both lie on the failed disks. Then, the tag [u 0 ] must lie on the same disk as the data-block tag {u K, v K }, and [v K ] must lie on the same disk as the data-block tag {u 0, v 0 }, because by construction, a data block on a disk does not contribute to the parity in that disk s parity block. Now, the sequence of tags [u 0 ], {u 0, v 0 }, {u 1, v 1 }, {u K, v K }, [v K ] corresponds to the sequence of coordinates in M P starting with (u 0, u 0 ) followed by coordinates (u 0, v 0 ), (u 1, v 1 ), (u K, v K ), and ending with the (v K, v K ). A traversal through the aforementioned sequence of coordinates would require exactly P moves, by Property 1. This is a contradiction for K P 4, and therefore the sequence [u 0 ], {u 0, v 0 }, {u 1, v 1 }, {u K, v K }, [v K ] contains at most P 1 tags describing P 2 moves. Hence, the tags [u 0 ] or [v K ] cannot both lie on the failed disks. Suppose [u 0 ] does not lie on a failed disk. Then, we can reconstruct the failed disks starting with the data block with tag {u 0, v 0 } using its parity in parity block with tag [u 0 ] and the remaining data blocks contributing to that parity, none of which can be on disk d x or d y for the following reason. If there is a data block on disks d x or d y different from the one with tag {u 0, v 0 } contributing to the parity in the parity block with tag [u 0 ], then that data block would have a tag of the form {u 0, v} or {v, u 0 } and could be added to the maximal path T if it is not already in T. This would be a contradiction for T is maximal. On the other hand, if {u 0, v} or {v, u 0 } is already in T, then T would form a cycle. This too would be a contradiction, for by Property 2 no path in disks d x and d y can have a cycle. Once the data block with tag {u 0, v 0 } has been reconstructed, we can next reconstruct the data block with tag {u 1, v 1 } by observing that {u 0, v 0 } {u 1, v 1 } = {v 0 } and therefore, all the remaining data blocks contributing to the parity in the parity block with tag [v 0 ] are intact or have been reconstructed. In this manner we can iteratively reconstruct all data blocks whose tags occur in the maximal path T. Furthermore, since each data block tag lies on some maximal path, we can reconstruct all corresponding data blocks. Thereafter, the reconstruction of the blocks containing parity is trivial.

11 References [1] M. Blaum, J. Brady, J. Bruck, and J. Menon, EVENODD An efficient scheme for tolerating double disk failures in RAID architectures, IEEE Transactions on Computers, vol. 44, no. 2, pp , [2] P. M. Chen and E. K. Lee, Striping in a RAID level 5 disk array, Proceedings of the 1995 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems, pp , [3] P. M. Chen and D. A. Patterson, Maximizing performance in a striped disk array, Proceedings of the 17 th IEEE Annual International Symposium on Computer Architecture, pp , [4] J. N. Gray, et al., Parity striping of disk arrays Low cost reliable storage with acceptable throughput, Proceedings of the 16 th International Conference on Very Large Data Bases, pp , [5] R. H. Katz, D. A. Patterson and G. A. Gibson, Disk system architectures for high performance computing, Proceedings of the IEEE, vol. 77, no. 12, pp , Dec [6] E. K. Lee and R. H. Katz, The Performance of Parity Placements in Disk Arrays, IEEE Transactions on Computers, vol. 42, no. 6, pp , Jun [7] W. Litwin and T. Schwarz, Lh*rs A high availability scalable data structure using Reed Solomon codes, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp ACM Press, [8] R. R. Muntz, and J. C. S. Lui, Performance analysis of disk arrays under failure, Proceedings of the 16 th International Conference on Very Large Data Bases, pp , [9] S. W. Ng, Improving disk performance via latency reduction, IEEE Transactions on Computers, vol. 40, no. 1, pp , [10] C.-I. Park, Efficient placement of parity and data to tolerate two disk failures in disk array systems, IEEE Transactions on Parallel and Distributed Systems, pp , [11] C.-I. Park and T.-Y. Choe, Striping in Disk Array RM2 Enabling the tolerance of double disk failures, Supercomputing

12 [12] D. A. Patterson, G. A. Gibson, and R. H. Katz, A case for redundant arrays of inexpensive disks, Proceedings of the ACM SIGMOD, pp , Jun [13] D. A. Patterson, P. M. Chen, G. Gibson, and R. H. Katz, Introduction to redundant arrays of inexpensive disks, Proceedings of the IEEE COMP- CON, pp , Spring [14] J. S. Plank, A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems, Software - Practice and Experience, vol. 27, no. 9, pp , [15] P. Scheuermann, G. Weikum and P. Zabback, Data partitioning and load balancing in parallel disk systems, VLDB Journal, vol. 7, no. 1, pp , [16] H. Simitci and D. A. Reed, Adaptive disk striping for parallel input/output, Proceedings of the Seventh NASA Goddard Conference on Mass Storage Systems, IEEE Computer Society Press, pp , [17] P. Triantafillou and C. Faloutsos, Overlay striping and optimal parallel I/O for modern applications, Parallel Computing, vol. 24, no. 1, pp , 1998.

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

416 Distributed Systems

416 Distributed Systems 416 Distributed Systems RAID, Feb 26 2018 Thanks to Greg Ganger and Remzi Arapaci-Dusseau for slides Outline Using multiple disks Why have multiple disks? problem and approaches RAID levels and performance

More information

RAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures

RAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures RAID+: Deterministic and Balanced Data Distribution for Large Disk Enclosures Guangyan Zhang, Zican Huang, Xiaosong Ma SonglinYang, Zhufan Wang, Weimin Zheng Tsinghua University Qatar Computing Research

More information

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences

More information

Ultimate Codes: Near-Optimal MDS Array Codes for RAID-6

Ultimate Codes: Near-Optimal MDS Array Codes for RAID-6 University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Technical reports Computer Science and Engineering, Department of Summer 014 Ultimate Codes: Near-Optimal MDS Array

More information

Cauchy MDS Array Codes With Efficient Decoding Method

Cauchy MDS Array Codes With Efficient Decoding Method IEEE TRANSACTIONS ON COMMUNICATIONS Cauchy MDS Array Codes With Efficient Decoding Method Hanxu Hou and Yunghsiang S Han, Fellow, IEEE Abstract arxiv:609968v [csit] 30 Nov 206 Array codes have been widely

More information

IBM Research Report. Construction of PMDS and SD Codes Extending RAID 5

IBM Research Report. Construction of PMDS and SD Codes Extending RAID 5 RJ10504 (ALM1303-010) March 15, 2013 Computer Science IBM Research Report Construction of PMDS and SD Codes Extending RAID 5 Mario Blaum IBM Research Division Almaden Research Center 650 Harry Road San

More information

S-Code: Lowest Density MDS Array Codes for RAID-6

S-Code: Lowest Density MDS Array Codes for RAID-6 University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Technical reports Computer Science and Engineering, Department of Summer 2014 S-Code: Lowest Density MDS Array Codes

More information

Redundant Array of Independent Disks

Redundant Array of Independent Disks Redundant Array of Independent Disks Yashwant K. Malaiya 1 Redundant Array of Independent Disks (RAID) Enables greater levels of performance and/or reliability How? By concurrent use of two or more hard

More information

On Locally Recoverable (LRC) Codes

On Locally Recoverable (LRC) Codes On Locally Recoverable (LRC) Codes arxiv:151206161v1 [csit] 18 Dec 2015 Mario Blaum IBM Almaden Research Center San Jose, CA 95120 Abstract We present simple constructions of optimal erasure-correcting

More information

Some Classes of Invertible Matrices in GF(2)

Some Classes of Invertible Matrices in GF(2) Some Classes of Invertible Matrices in GF() James S. Plank Adam L. Buchsbaum Technical Report UT-CS-07-599 Department of Electrical Engineering and Computer Science University of Tennessee August 16, 007

More information

Coping with disk crashes

Coping with disk crashes Lecture 04.03 Coping with disk crashes By Marina Barsky Winter 2016, University of Toronto Disk failure types Intermittent failure Disk crash the entire disk becomes unreadable, suddenly and permanently

More information

Redundant Array of Independent Disks

Redundant Array of Independent Disks Redundant Array of Independent Disks Yashwant K. Malaiya 1 Redundant Array of Independent Disks (RAID) Enables greater levels of performance and/or reliability How? By concurrent use of two or more hard

More information

IBM Research Report. Notes on Reliability Models for Non-MDS Erasure Codes

IBM Research Report. Notes on Reliability Models for Non-MDS Erasure Codes RJ10391 (A0610-035) October 24, 2006 Computer Science IBM Research Report Notes on Reliability Models for Non-MDS Erasure Codes James Lee Hafner, KK Rao IBM Research Division Almaden Research Center 650

More information

Distributed storage systems from combinatorial designs

Distributed storage systems from combinatorial designs Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

A New Minimum Density RAID-6 Code with a Word Size of Eight. James S. Plank

A New Minimum Density RAID-6 Code with a Word Size of Eight. James S. Plank A New Minimum Density RAID-6 Code with a Word Size of Eight James S. Plank Department of Electrical Engineering and Computer Science University of Tennessee Knoxville, TN 37996 plank@cs.utk.edu Appearing

More information

Probabilistic Systems Analysis Spring 2018 Lecture 6. Random Variables: Probability Mass Function and Expectation

Probabilistic Systems Analysis Spring 2018 Lecture 6. Random Variables: Probability Mass Function and Expectation EE 178 Probabilistic Systems Analysis Spring 2018 Lecture 6 Random Variables: Probability Mass Function and Expectation Probability Mass Function When we introduce the basic probability model in Note 1,

More information

Binary MDS Array Codes with Optimal Repair

Binary MDS Array Codes with Optimal Repair IEEE TRANSACTIONS ON INFORMATION THEORY 1 Binary MDS Array Codes with Optimal Repair Hanxu Hou, Member, IEEE, Patric P. C. Lee, Senior Member, IEEE Abstract arxiv:1809.04380v1 [cs.it] 12 Sep 2018 Consider

More information

A New Minimum Density RAID-6 Code with a Word Size of Eight. James S. Plank

A New Minimum Density RAID-6 Code with a Word Size of Eight. James S. Plank A New Minimum Density RAID-6 Code with a Word Size of Eight James S. Plank plank@cs.utk.edu Technical Report CS-08-612 Department of Electrical Engineering and Computer Science University of Tennessee

More information

Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems

Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems Permutation Codes: Optimal Exact-Repair of a Single Failed Node in MDS Code Based Distributed Storage Systems Viveck R Cadambe Electrical Engineering and Computer Science University of California Irvine,

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

Coding for loss tolerant systems

Coding for loss tolerant systems Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon

More information

Maximally Recoverable Codes with Hierarchical Locality

Maximally Recoverable Codes with Hierarchical Locality Maximally Recoverable Codes with Hierarchical Locality Aaditya M Nair V Lalitha SPCRC International Institute of Information Technology Hyderabad India Email: aadityamnair@researchiiitacin lalithav@iiitacin

More information

Transposition Mechanism for Sparse Matrices on Vector Processors

Transposition Mechanism for Sparse Matrices on Vector Processors Transposition Mechanism for Sparse Matrices on Vector Processors Pyrrhos Stathis Stamatis Vassiliadis Sorin Cotofana Electrical Engineering Department, Delft University of Technology, Delft, The Netherlands

More information

FAULT TOLERANT SYSTEMS

FAULT TOLERANT SYSTEMS ﻋﻨﻮان درس ﻧﺎم اﺳﺘﺎد 1394-95 ﻧﺎم درس ﻧﺎم رﺷﺘﻪ ﻧﺎم ﮔﺮاﯾﺶ ﻧﺎم ﻣﻮﻟﻒ ﻧﺎم ﮐﺎرﺷﻨﺎس درس FAULT TOLERANT SYSTEMS Part 8 RAID Systems Chapter 3 Information Redundancy RAID - Redundant Arrays of Inexpensive (Independent

More information

CSE 4201, Ch. 6. Storage Systems. Hennessy and Patterson

CSE 4201, Ch. 6. Storage Systems. Hennessy and Patterson CSE 4201, Ch. 6 Storage Systems Hennessy and Patterson Challenge to the Disk The graveyard is full of suitors Ever heard of Bubble Memory? There are some technologies that refuse to die (silicon, copper...).

More information

Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system

Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Error Detection, Correction and Erasure Codes for Implementation in a Cluster File-system Steve Baker December 6, 2011 Abstract. The evaluation of various error detection and correction algorithms and

More information

Matrix Assembly in FEA

Matrix Assembly in FEA Matrix Assembly in FEA 1 In Chapter 2, we spoke about how the global matrix equations are assembled in the finite element method. We now want to revisit that discussion and add some details. For example,

More information

Zigzag Codes: MDS Array Codes with Optimal Rebuilding

Zigzag Codes: MDS Array Codes with Optimal Rebuilding 1 Zigzag Codes: MDS Array Codes with Optimal Rebuilding Itzhak Tamo, Zhiying Wang, and Jehoshua Bruck Electrical Engineering Department, California Institute of Technology, Pasadena, CA 91125, USA Electrical

More information

IBM Research Report. R5X0: An Efficient High Distance Parity-Based Code with Optimal Update Complexity

IBM Research Report. R5X0: An Efficient High Distance Parity-Based Code with Optimal Update Complexity RJ 0322 (A0408-005) August 9, 2004 Computer Science IBM Research Report R5X0: An Efficient High Distance Parity-Based Code with Optimal Update Complexity Jeff R. Hartline Department of Computer Science

More information

Information redundancy

Information redundancy Information redundancy Information redundancy add information to date to tolerate faults error detecting codes error correcting codes data applications communication memory p. 2 - Design of Fault Tolerant

More information

Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes

Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes Progressive Algebraic Soft-Decision Decoding of Reed-Solomon Codes Li Chen ( 陈立 ), PhD, MIEEE Associate Professor, School of Information Science and Technology Sun Yat-sen University, China Joint work

More information

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department

More information

BDR: A Balanced Data Redistribution Scheme to Accelerate the Scaling Process of XOR-based Triple Disk Failure Tolerant Arrays

BDR: A Balanced Data Redistribution Scheme to Accelerate the Scaling Process of XOR-based Triple Disk Failure Tolerant Arrays BDR: A Balanced Data Redistribution Scheme to Accelerate the Scaling Process of XOR-based Triple Disk Failure Tolerant Arrays Yanbing Jiang 1, Chentao Wu 1, Jie Li 1,2, and Minyi Guo 1 1 Department of

More information

Communication Efficient Secret Sharing

Communication Efficient Secret Sharing 1 Communication Efficient Secret Sharing Wentao Huang, Michael Langberg, Senior Member, IEEE, Joerg Kliewer, Senior Member, IEEE, and Jehoshua Bruck, Fellow, IEEE Abstract A secret sharing scheme is a

More information

LDPC Code Design for Distributed Storage: Balancing Repair Bandwidth, Reliability and Storage Overhead

LDPC Code Design for Distributed Storage: Balancing Repair Bandwidth, Reliability and Storage Overhead LDPC Code Design for Distributed Storage: 1 Balancing Repair Bandwidth, Reliability and Storage Overhead arxiv:1710.05615v1 [cs.dc] 16 Oct 2017 Hyegyeong Park, Student Member, IEEE, Dongwon Lee, and Jaekyun

More information

Lowest Density MDS Array Codes for Reliable Smart Meter Networks

Lowest Density MDS Array Codes for Reliable Smart Meter Networks Lowest Density MDS Array Codes for Reliable Smart Meter Networks Magnus Sandell, Senior Member, IEEE, and Filippo Tosato, Member, IEEE 1 arxiv:1310.3695v2 [cs.it] 6 Nov 2013 Abstract In this paper we introduce

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University

More information

Linear Programming Bounds for Robust Locally Repairable Storage Codes

Linear Programming Bounds for Robust Locally Repairable Storage Codes Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,

More information

Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels

Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels 1 Linear Programming Decoding of Binary Linear Codes for Symbol-Pair Read Channels Shunsuke Horii, Toshiyasu Matsushima, and Shigeichi Hirasawa arxiv:1508.01640v2 [cs.it] 29 Sep 2015 Abstract In this paper,

More information

IEEE TRANSACTIONS ON INFORMATION THEORY 1

IEEE TRANSACTIONS ON INFORMATION THEORY 1 IEEE TRANSACTIONS ON INFORMATION THEORY 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Proxy-Assisted Regenerating Codes With Uncoded Repair for Distributed Storage Systems Yuchong Hu,

More information

Balanced Locally Repairable Codes

Balanced Locally Repairable Codes Balanced Locally Repairable Codes Katina Kralevska, Danilo Gligoroski and Harald Øverby Department of Telematics, Faculty of Information Technology, Mathematics and Electrical Engineering, NTNU, Norwegian

More information

14.1 Finding frequent elements in stream

14.1 Finding frequent elements in stream Chapter 14 Streaming Data Model 14.1 Finding frequent elements in stream A very useful statistics for many applications is to keep track of elements that occur more frequently. It can come in many flavours

More information

Balanced Locally Repairable Codes

Balanced Locally Repairable Codes Balanced Locally Repairable Codes Katina Kralevska, Danilo Gligoroski and Harald Øverby Department of Telematics, Faculty of Information Technology, Mathematics and Electrical Engineering, NTNU, Norwegian

More information

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,

More information

Distributed Data Storage Systems with. Opportunistic Repair

Distributed Data Storage Systems with. Opportunistic Repair Distributed Data Storage Systems with 1 Opportunistic Repair Vaneet Aggarwal, Chao Tian, Vinay A. Vaishampayan, and Yih-Farn R. Chen Abstract arxiv:1311.4096v2 [cs.it] 6 Nov 2014 The reliability of erasure-coded

More information

NEC PerforCache. Influence on M-Series Disk Array Behavior and Performance. Version 1.0

NEC PerforCache. Influence on M-Series Disk Array Behavior and Performance. Version 1.0 NEC PerforCache Influence on M-Series Disk Array Behavior and Performance. Version 1.0 Preface This document describes L2 (Level 2) Cache Technology which is a feature of NEC M-Series Disk Array implemented

More information

Fault Tolerate Linear Algebra: Survive Fail-Stop Failures without Checkpointing

Fault Tolerate Linear Algebra: Survive Fail-Stop Failures without Checkpointing 20 Years of Innovative Computing Knoxville, Tennessee March 26 th, 200 Fault Tolerate Linear Algebra: Survive Fail-Stop Failures without Checkpointing Zizhong (Jeffrey) Chen zchen@mines.edu Colorado School

More information

Report on PIR with Low Storage Overhead

Report on PIR with Low Storage Overhead Report on PIR with Low Storage Overhead Ehsan Ebrahimi Targhi University of Tartu December 15, 2015 Abstract Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz

More information

Efficient random number generation on FPGA-s

Efficient random number generation on FPGA-s Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 1. pp. 313 320 doi: 10.14794/ICAI.9.2014.1.313 Efficient random number generation

More information

PowerApps Optimal Power Flow Formulation

PowerApps Optimal Power Flow Formulation PowerApps Optimal Power Flow Formulation Page1 Table of Contents 1 OPF Problem Statement... 3 1.1 Vector u... 3 1.1.1 Costs Associated with Vector [u] for Economic Dispatch... 4 1.1.2 Costs Associated

More information

GF(2 m ) arithmetic: summary

GF(2 m ) arithmetic: summary GF(2 m ) arithmetic: summary EE 387, Notes 18, Handout #32 Addition/subtraction: bitwise XOR (m gates/ops) Multiplication: bit serial (shift and add) bit parallel (combinational) subfield representation

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

In-Memory Computing of Akers Logic Array

In-Memory Computing of Akers Logic Array In-Memory Computing of Akers Logic Array Eitan Yaakobi Electrical Engineering California Institute of Technology Pasadena, CA 91125 yaakobi@caltechedu Anxiao (Andrew) Jiang Computer Science and Engineering

More information

an author's https://oatao.univ-toulouse.fr/18723 http://dx.doi.org/10.1109/isit.2017.8006599 Detchart, Jonathan and Lacan, Jérôme Polynomial Ring Transforms for Efficient XOR-based Erasure Coding. (2017)

More information

COMPUTER SCIENCE TRIPOS

COMPUTER SCIENCE TRIPOS CST0.2017.2.1 COMPUTER SCIENCE TRIPOS Part IA Thursday 8 June 2017 1.30 to 4.30 COMPUTER SCIENCE Paper 2 Answer one question from each of Sections A, B and C, and two questions from Section D. Submit the

More information

The E8 Lattice and Error Correction in Multi-Level Flash Memory

The E8 Lattice and Error Correction in Multi-Level Flash Memory The E8 Lattice and Error Correction in Multi-Level Flash Memory Brian M Kurkoski University of Electro-Communications Tokyo, Japan kurkoski@iceuecacjp Abstract A construction using the E8 lattice and Reed-Solomon

More information

Regular Sparse Crossbar Concentrators

Regular Sparse Crossbar Concentrators Regular Sparse Crossbar Concentrators Weiming Guo and A. Yavuz Oruç Electrical Engineering Department College Park, MD 20742 ABSTRACT A bipartite concentrator is a single stage sparse crossbar switching

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

Scheduling periodic Tasks on Multiple Periodic Resources

Scheduling periodic Tasks on Multiple Periodic Resources Scheduling periodic Tasks on Multiple Periodic Resources Xiayu Hua, Zheng Li, Hao Wu, Shangping Ren* Department of Computer Science Illinois Institute of Technology Chicago, IL 60616, USA {xhua, zli80,

More information

A HIGH-SPEED PROCESSOR FOR RECTANGULAR-TO-POLAR CONVERSION WITH APPLICATIONS IN DIGITAL COMMUNICATIONS *

A HIGH-SPEED PROCESSOR FOR RECTANGULAR-TO-POLAR CONVERSION WITH APPLICATIONS IN DIGITAL COMMUNICATIONS * Copyright IEEE 999: Published in the Proceedings of Globecom 999, Rio de Janeiro, Dec 5-9, 999 A HIGH-SPEED PROCESSOR FOR RECTAGULAR-TO-POLAR COVERSIO WITH APPLICATIOS I DIGITAL COMMUICATIOS * Dengwei

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Coding problems for memory and storage applications

Coding problems for memory and storage applications .. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:

More information

Transforming FSMs for Synthesis by Fault Tolerant Nano-PLAs

Transforming FSMs for Synthesis by Fault Tolerant Nano-PLAs Transforming FSMs for Synthesis by Fault Tolerant Nano-PLAs Ilya Levin, Osnat Keren Tel Aviv University, Israel; Bar Ilan University, Israel ilia1@post.tau.ac.il, kereno@eng.biu.ac.il Abstract The paper

More information

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 Star Joins A common structure for data mining of commercial data is the star join. For example, a chain store like Walmart keeps a fact table whose tuples each

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography Selçuk Baktır, Berk Sunar {selcuk,sunar}@wpi.edu Department of Electrical & Computer Engineering Worcester Polytechnic Institute

More information

A Tale of Two Erasure Codes in HDFS

A Tale of Two Erasure Codes in HDFS A Tale of Two Erasure Codes in HDFS Dynamo Mingyuan Xia *, Mohit Saxena +, Mario Blaum +, and David A. Pease + * McGill University, + IBM Research Almaden FAST 15 何军权 2015-04-30 1 Outline Introduction

More information

When MTTDLs Are Not Good Enough: Providing Better Estimates of Disk Array Reliability

When MTTDLs Are Not Good Enough: Providing Better Estimates of Disk Array Reliability When MTTDLs Are Not Good Enough: Providing Better Estimates of Disk Array Reliability Jehan-François Pâris Dept. of Computer cience University of Houston Houston, TX 770-00 paris@cs.uh.edu Thomas J. E.

More information

HW2 Solutions Problem 1: 2.22 Find the sign and inverse of the permutation shown in the book (and below).

HW2 Solutions Problem 1: 2.22 Find the sign and inverse of the permutation shown in the book (and below). Teddy Einstein Math 430 HW Solutions Problem 1:. Find the sign and inverse of the permutation shown in the book (and below). Proof. Its disjoint cycle decomposition is: (19)(8)(37)(46) which immediately

More information

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Bin Chen, Shu-Tao Xia, Jie Hao, and Fang-Wei Fu Member, IEEE 1 arxiv:160901136v1 [csit] 5 Sep 016 Abstract A code is said to be a r-local

More information

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel

Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Exact Probability of Erasure and a Decoding Algorithm for Convolutional Codes on the Binary Erasure Channel Brian M. Kurkoski, Paul H. Siegel, and Jack K. Wolf Department of Electrical and Computer Engineering

More information

On Encoding Symbol Degrees of Array BP-XOR Codes

On Encoding Symbol Degrees of Array BP-XOR Codes On Encoding Symbol Degrees of Array BP-XOR Codes Maura B. Paterson Dept. Economics, Math. & Statistics Birkbeck University of London Email: m.paterson@bbk.ac.uk Douglas R. Stinson David R. Cheriton School

More information

EDF Feasibility and Hardware Accelerators

EDF Feasibility and Hardware Accelerators EDF Feasibility and Hardware Accelerators Andrew Morton University of Waterloo, Waterloo, Canada, arrmorton@uwaterloo.ca Wayne M. Loucks University of Waterloo, Waterloo, Canada, wmloucks@pads.uwaterloo.ca

More information

An average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and

An average case analysis of a dierential attack. on a class of SP-networks. Distributed Systems Technology Centre, and An average case analysis of a dierential attack on a class of SP-networks Luke O'Connor Distributed Systems Technology Centre, and Information Security Research Center, QUT Brisbane, Australia Abstract

More information

chapter 12 MORE MATRIX ALGEBRA 12.1 Systems of Linear Equations GOALS

chapter 12 MORE MATRIX ALGEBRA 12.1 Systems of Linear Equations GOALS chapter MORE MATRIX ALGEBRA GOALS In Chapter we studied matrix operations and the algebra of sets and logic. We also made note of the strong resemblance of matrix algebra to elementary algebra. The reader

More information

Reliability Modeling of Cloud-RAID-6 Storage System

Reliability Modeling of Cloud-RAID-6 Storage System International Journal of Future Computer and Communication, Vol., No. 6, December 5 Reliability Modeling of Cloud-RAID-6 Storage System Qisi Liu and Liudong Xing Abstract Cloud storage is a crucial component

More information

Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication

Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication 1 Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication Qian Yu, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern

More information

Analysis and Construction of Galois Fields for Efficient Storage Reliability

Analysis and Construction of Galois Fields for Efficient Storage Reliability Analysis and Construction of Galois Fields for Efficient Storage Reliability Technical Report UCSC-SSRC-07-09 Kevin M. Greenan (kmgreen@cs.ucsc.edu) Ethan L. Miller (elm@cs.ucsc.edu) Thomas J. E. Schwarz,

More information

Communication Efficient Secret Sharing

Communication Efficient Secret Sharing Communication Efficient Secret Sharing 1 Wentao Huang, Michael Langberg, senior member, IEEE, Joerg Kliewer, senior member, IEEE, and Jehoshua Bruck, Fellow, IEEE arxiv:1505.07515v2 [cs.it] 1 Apr 2016

More information

Solution of Linear Systems

Solution of Linear Systems Solution of Linear Systems Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico May 12, 2016 CPD (DEI / IST) Parallel and Distributed Computing

More information

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction

Binary Primitive BCH Codes. Decoding of the BCH Codes. Implementation of Galois Field Arithmetic. Implementation of Error Correction BCH Codes Outline Binary Primitive BCH Codes Decoding of the BCH Codes Implementation of Galois Field Arithmetic Implementation of Error Correction Nonbinary BCH Codes and Reed-Solomon Codes Preface The

More information

Elliptic Curve Cryptography and Security of Embedded Devices

Elliptic Curve Cryptography and Security of Embedded Devices Elliptic Curve Cryptography and Security of Embedded Devices Ph.D. Defense Vincent Verneuil Institut de Mathématiques de Bordeaux Inside Secure June 13th, 2012 V. Verneuil - Elliptic Curve Cryptography

More information

SOLUTIONS FOR 2012 APMO PROBLEMS

SOLUTIONS FOR 2012 APMO PROBLEMS Problem. SOLUTIONS FOR 0 APMO PROBLEMS Solution: Let us denote by XY Z the area of the triangle XY Z. Let x = P AB, y = P BC and z = P CA. From y : z = BCP : ACP = BF : AF = BP F : AP F = x : follows that

More information

Proving Correctness of a Controller Algorithm for the RAID. Level 5 System. Mandana Vaziri-Farahani

Proving Correctness of a Controller Algorithm for the RAID. Level 5 System. Mandana Vaziri-Farahani Proving Correctness of a Controller Algorithm for the RAID Level 5 System by andana Vaziri-Farahani Submitted to the Department of Electrical Engineering and Computer Science in partial fulllment of the

More information

New Minimal Weight Representations for Left-to-Right Window Methods

New Minimal Weight Representations for Left-to-Right Window Methods New Minimal Weight Representations for Left-to-Right Window Methods James A. Muir 1 and Douglas R. Stinson 2 1 Department of Combinatorics and Optimization 2 School of Computer Science University of Waterloo

More information

Error-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories

Error-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories 2 IEEE International Symposium on Information Theory Proceedings Error-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories Hongchao Zhou Electrical Engineering Department California Institute

More information

Distributed Storage Systems with Secure and Exact Repair - New Results

Distributed Storage Systems with Secure and Exact Repair - New Results Distributed torage ystems with ecure and Exact Repair - New Results Ravi Tandon, aidhiraj Amuru, T Charles Clancy, and R Michael Buehrer Bradley Department of Electrical and Computer Engineering Hume Center

More information

Grothendieck s Inequality

Grothendieck s Inequality Grothendieck s Inequality Leqi Zhu 1 Introduction Let A = (A ij ) R m n be an m n matrix. Then A defines a linear operator between normed spaces (R m, p ) and (R n, q ), for 1 p, q. The (p q)-norm of A

More information

RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE

RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE Yuan-chun Zhao a, b, Cheng-ming Li b a. Shandong University of Science and Technology, Qingdao 266510 b. Chinese Academy of

More information

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo 3rd Biennial Canadian Discrete

More information