STAR: An efficient coding scheme for correcting triple storage node failures

被引:0
|
作者
Huang, C [1 ]
Xu, LH [1 ]
机构
[1] Microsoft Res, Redmond, WA 98052 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Proper data placement schemes based on erasure correcting code are one of the most important components for a highly available data storage system. For such schemes, low decoding complexity for correcting (or recovering) storage node failures is essential for practical systems. In this paper, we describe a new coding scheme, which we call the STAR code, for correcting triple storage node failures (erasures). The STAR code is an extension of the double-erasure-correcting EVENODD code, and a modification of the generalized triple-erasure-correcting EVENODD code. The STAR code is an MDS code, and thus is optimal in terms of node failure recovery capability for a given data redundancy. We provide detailed STAR code's decoding algorithms for correcting various triple node failures. We show that the decoding complexity of the STAR code is much lower than those of the existing comparable codes, thus the STAR code is practically very meaningful for storage systems that need higher reliability.
引用
收藏
页码:197 / 210
页数:14
相关论文
共 50 条
  • [21] Efficient Signature Scheme for Network Coding
    Porat, Ely
    Waisbard, Erez
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [22] The effect of node failures in substar reliability of a star network - A combinatorial approach
    Latifi, Shahram
    Palaniappan, Venka
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS, PROCEEDINGS, 2007, : 166 - +
  • [23] Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
    Du, Rong
    Zhao, Chenglin
    Li, Shenghong
    Li, Jian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2014,
  • [24] Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
    Rong Du
    Chenglin Zhao
    Shenghong Li
    Jian Li
    EURASIP Journal on Wireless Communications and Networking, 2014
  • [25] Network Coding-Based Protection Strategy Against Node Failures
    Aly, Salah A.
    Kamal, Ahmed E.
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 2388 - 2392
  • [26] Download time analysis for distributed storage systems with node failures
    Hellemans, Tim
    Yardi, Arti
    Bodas, Tejas
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 2060 - 2065
  • [27] NEIGHBORING DIRECTION RUNLENGTH CODING - AN EFFICIENT CONTOUR CODING SCHEME
    CHAUDHURI, BB
    CHANDRASHEKHAR, S
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1990, 20 (04): : 916 - 921
  • [28] An efficient FGS coding scheme for interlaced scalable video coding
    Zheng, Yanyan
    Ji, Xiangyang
    Wu, Feng
    Zhao, Debin
    Gao, Wen
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 2485 - +
  • [29] Double and Triple Node-Erasure-Correcting Codes Over Complete Graphs
    Yohananov, Lev
    Efron, Yuval
    Yaakobi, Eitan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (07) : 4089 - 4103
  • [30] Network Coding in Node-Constrained Line and Star Networks
    Yazdi, S. M. Sadegh Tabatabaei
    Savari, Serap A.
    Kramer, Gerhard
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (07) : 4452 - 4468