2001
DOI: 10.1109/71.910866
|View full text |Cite
|
Sign up to set email alerts
|

Computing in the RAIN: a reliable array of independent nodes

Abstract: AbstractÐThe RAIN project is a research collaboration between Caltech and NASA-JPL on distributed computing and data storage systems for future spaceborne missions. The goal of the project is to identify and develop key building blocks for reliable distributed systems built with inexpensive off-the-shelf components. The RAIN platform consists of a heterogeneous cluster of computing and/or storage nodes connected via multiple interfaces to networks configured in fault-tolerant topologies. The RAIN software comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2001
2001
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 49 publications
0
16
0
Order By: Relevance
“…In particular, an implementation of a very simple protocol for this kind of local failure detectors is reported in [12] and [36] and its state machine description is depicted in Fig. 4.…”
Section: Local Failure Detectors Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, an implementation of a very simple protocol for this kind of local failure detectors is reported in [12] and [36] and its state machine description is depicted in Fig. 4.…”
Section: Local Failure Detectors Implementationmentioning
confidence: 99%
“…These results built a gap between group membership protocols that work in real systemsÐ-some of which have been around for many years, anticipating more theoretical resultsÐand the formal specifications that they satisfy. Examples of such real systems that run group membership protocols are Amoeba [33], [52], Isis [11], Transis [23], Totem [47], Horus [53], Relacs [5], and more recently Phoenix [40] and RAIN [12]. Researchers developing these systems are, of course, aware of the original impossibility result [28] and of its potential application to their membership protocols [17], but they also believe that their systems can work under assumptions that can easily be verified in practice.…”
Section: Historical Backgroundmentioning
confidence: 99%
“…RDP [10] and X Code [30]). Although there are storage systems based on both types of codes, the XOR codes outperform the others significantly [25] and form the basis of most recent storage systems [7,9,18]. This paper addresses the issue of optimizing the encoding performance of XOR codes.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, both academic and industrial storage systems have addressed this issue by relying on erasure codes to tolerate component failures. Examples include projects such as OceanStore [20], GFS [12], RAIF [18], and RAIN [7], and companies like Network Appliance [22], HP [29], IBM [13], Cleversafe [9] and Allmydata [2], employing erasure codes such as RDP [10], B Code [31] and Reed-Solomon Codes [27,6].…”
Section: Introductionmentioning
confidence: 99%
“…There are standard techniques for caching information on a local device (Halinger and Hohlfeld, 2010) (Nguyen and Dong, 2011) and accessing information remotely when needed, but they typically assume a reliable, high bandwidth network connection between devices (Bohossian et al, 2001) (Rhea et al, 2001). Other techniques try to deal with slow networks (Suel et al, 2004) (Shinkuma et al, 2011), but do not use the domain knowledge of applications that use this storage.…”
Section: Introductionmentioning
confidence: 99%