Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'0 2006
DOI: 10.1109/aict-iciw.2006.90
|View full text |Cite
|
Sign up to set email alerts
|

Erasure Codes for Increasing the Availability of Grid Data Storage

Abstract: In this paper, we describe the design of a highly-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Various solutions to the centralized version of this problem have been proposed, and are based on well known coding schemes such as Fountain codes [6] or MDS codes [16]. To distribute the information from multiple sources throughout the network so that each node stores a coded packet as if obtained by centralized LT (Luby Transform) coding [12], Lin et al [11] proposed a solution that uses random walks with traps.…”
Section: Introductionmentioning
confidence: 99%
“…Various solutions to the centralized version of this problem have been proposed, and are based on well known coding schemes such as Fountain codes [6] or MDS codes [16]. To distribute the information from multiple sources throughout the network so that each node stores a coded packet as if obtained by centralized LT (Luby Transform) coding [12], Lin et al [11] proposed a solution that uses random walks with traps.…”
Section: Introductionmentioning
confidence: 99%
“…Our earlier work has shown how large files can be efficiently striped and erasure coded for storage both in local [20] and in Grid environments [21]. The chosen striping scheme easily works with data entities at the quite arbitrary sizes, similar to our ADUs.…”
Section: Storage In the Networkmentioning
confidence: 99%
“…Data recovery, however, is trickier than replication. Erasure codes have been examined and shown to be effective for grid systems and highly available distributed storage systems, respectively [18,19]. The storage space requirements for several file high-availability strategies are shown in Fig.…”
Section: B) New Requirements and Metricsmentioning
confidence: 99%