36,743 research outputs found

    EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures

    Get PDF
    We present a novel method, that we call EVENODD, for tolerating up to two disk failures in RAID architectures. EVENODD employs the addition of only two redundant disks and consists of simple exclusive-OR computations. This redundant storage is optimal, in the sense that two failed disks cannot be retrieved with less than two redundant disks. A major advantage of EVENODD is that it only requires parity hardware, which is typically present in standard RAID-5 controllers. Hence, EVENODD can be implemented on standard RAID-5 controllers without any hardware changes. The most commonly used scheme that employes optimal redundant storage (i.e., two extra disks) is based on Reed-Solomon (RS) error-correcting codes. This scheme requires computation over finite fields and results in a more complex implementation. For example, we show that the complexity of implementing EVENODD in a disk array with 15 disks is about 50% of the one required when using the RS scheme. The new scheme is not limited to RAID architectures: it can be used in any system requiring large symbols and relatively short codes, for instance, in multitrack magnetic recording. To this end, we also present a decoding algorithm for one column (track) in error

    The use of simulation in the design of a road transport incident detection algorithm

    No full text
    Automatic incident detection is becoming one of the core tools of urban traffic management, enabling more rapid identification and response to traffic incidents and congestion. Existing traffic detection infrastructure within urban areas (often installed for traffic signal optimization) provides urban traffic control systems with a near continuous stream of data on the state of traffic within the network. The creation of a simulation to replicate such a data stream therefore provides a facility for the development of accurate congestion detection and warning algorithms. This paper describes firstly the augmentation of a commercial traffic model to provide an urban traffic control simulation platform and secondly the development of a new incident detection system (RAID-Remote Automatic Incident Detection), with the facility to use the simulation platform as an integral part of the design and calibration process. A brief description of a practical implementation of RAID is included along with summary evaluation results

    RAID-2: Design and implementation of a large scale disk array controller

    Get PDF
    We describe the implementation of a large scale disk array controller and subsystem incorporating over 100 high performance 3.5 inch disk drives. It is designed to provide 40 MB/s sustained performance and 40 GB capacity in three 19 inch racks. The array controller forms an integral part of a file server that attaches to a Gb/s local area network. The controller implements a high bandwidth interconnect between an interleaved memory, an XOR calculation engine, the network interface (HIPPI), and the disk interfaces (SCSI). The system is now functionally operational, and we are tuning its performance. We review the design decisions, history, and lessons learned from this three year university implementation effort to construct a truly large scale system assembly

    Eksplorasi Pemanfaatan Docker Untuk Mempermudah Pengelolaan Instalasi Komputer Di Laboratorium Komputer Teknik Informatika Universitas Kristen Petra

    Full text link
    Docker is an application that is based on open source technology that allows developers or anyone to create, run, do experiments and launch application in a container. Docker make the process of packaging application components together quickly in an isolated container, so it can run in local infrastructure without changing configuration on the container. Docker also very light and fast when compared to hypervisor-based virtual machine.Department of Information Engineering of Petra Christian University has a considerable number of students, which the number usually hundreds, while the number of computers in the laboratory of Department of Information number is not as much as the students. With this amount is not comparable, then some students work in the same computer alternately. It makes the students cannot be comfortable working on one computer, because configuring a computer on every lesson is different. Therefore, implementation of Docker application carried out in the laboratory.Docker implementation and RAID storage system and after implementation, testing was done by measuring the speed of docker image transfer. The resulting data were used to development of container system and evaluate the speed of RAID storage system are used

    CORE: Augmenting Regenerating-Coding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems

    Full text link
    Data availability is critical in distributed storage systems, especially when node failures are prevalent in real life. A key requirement is to minimize the amount of data transferred among nodes when recovering the lost or unavailable data of failed nodes. This paper explores recovery solutions based on regenerating codes, which are shown to provide fault-tolerant storage and minimum recovery bandwidth. Existing optimal regenerating codes are designed for single node failures. We build a system called CORE, which augments existing optimal regenerating codes to support a general number of failures including single and concurrent failures. We theoretically show that CORE achieves the minimum possible recovery bandwidth for most cases. We implement CORE and evaluate our prototype atop a Hadoop HDFS cluster testbed with up to 20 storage nodes. We demonstrate that our CORE prototype conforms to our theoretical findings and achieves recovery bandwidth saving when compared to the conventional recovery approach based on erasure codes.Comment: 25 page
    • …
    corecore