A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Flexible Architecture of Disk Array
1997
Journal of the Magnetics Society of Japan
Redundant Array of Independent Disks (RAID) IS the most etlicient way to avoid the bottleneck problem between I/O subsystem's performance and the CPU processing power. ...
Two kinds of special structures, RAID_table and RAID_map are proposed in order to implement FlexArch. ...
Each byte in the map illustrates the usage of the corresponding block in the disk array. ...
doi:10.3379/jmsjmag.21.s2_351
fatcat:4rb73lkl7nbwxpt27fvmvwqts4
Redundant Array of Inexpensive Disks (RAID): Technology Description, Characterizations, Comparisons, Usage and Cost Benefits
1994
Journal of the Magnetics Society of Japan
The disk arrays can be configured differently to provide different levels of operational capabilities, each providing special advantages in reliability and data availability, speed and economy. ...
They were investigating the use of an array of small capacity, inexpensive personal computer direct access storage devices (DASD) managed by a special type of a controller. as an alternative to the single ...
several devices in the disk array. ...
doi:10.3379/jmsjmag.18.s1_53
fatcat:u3ngsyjkrjebpkou7rslweilqu
Page 176 of SMPTE Motion Imaging Journal Vol. 106, Issue 3
[page]
1997
SMPTE Motion Imaging Journal
RAID 3 is a redundant array of individual disks in which a single parity drive is used for redundancy.
. ...
RAID 5 is a redundant array of individual disks in which the parity information is spi- raled across all the drives.
. ...
An Enterprise-Grade Open-Source Data Reduction Architecture for All-Flash Storage Systems
2022
Abstract Proceedings of the 2022 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems
In this paper, we conduct an extensive set of experiments on an enterprise all-flash storage (AFS) system equipped with an open-source data reduction module, i.e., RedHat VDO, and reveal novel observations ...
We then offer cross-layer optimizations to enhance the performance of AFS, which range from deriving new optimal hardware RAID configurations up to modifications of the enterprise storage stack tailored ...
Storage and Processing (HPDS) Corporation, Tehran, Iran, and by the European IO-SEA project, which is supported by the European High-Performance Computing Joint Undertaking (JU) and the German Ministry of ...
doi:10.1145/3489048.3530963
fatcat:gs45cb6qsjdb7gamtchnejiiqa
Page 1420 of Mathematical Reviews Vol. , Issue 2000b
[page]
2000
Mathematical Reviews
M. (1-BELLS5; Naperville, IL)
Flexible usage of redundancy in disk arrays. (English summary) Theory Comput. Syst. 32 (1999), no. 5, 561-587. ...
Summary: “It is well known that dedicating one disk’s worth of space in a disk array to parity check information can allow the ar- ray to tolerate a single failure. ...
The mechanisms can effectively aggregate the bandwidth from a large number of distributed disks and statistically tolerate pear-disk performance variation. ...
For example, for a 1GB data access using 64 disks, RobuSTore achieves average bandwidth of 186MBps for write and 400MBps for read, nearly 6x and 15x that achieved by a RAID-0 system. ...
Acknowledgements Supported in part by the National Science Foundation under awards NSF EIA-99-75020 Grads and NSF Cooperative Agreement ANI-0225642 (OptIPuter), NSF CCR-0331645 (VGrADS), NSF NGS-0305390 ...
doi:10.1145/1362622.1362682
dblp:conf/sc/XiaC07
fatcat:ukojijue75bm7plahfvdioonf4
Information Dispersion over Redundant Arrays of Optimal Cloud Storage for Desktop Users
2011
2011 Fourth IEEE International Conference on Utility and Cloud Computing
Despite the advances in technology, the practical usefulness and longevity of so-called cloud storage is limited in today's systems which severely impacts the acceptance and adoption rates. ...
Finally, a brief analysis of measurements performed by us shows how well the system performs in a real distributed cloud storage environment. ...
ACKNOWLEDGEMENTS This work has received funding under project number 080949277 by means of the European Regional Development Fund (ERDF), the European Social Fund (ESF) and the German Free State of Saxony ...
doi:10.1109/ucc.2011.11
dblp:conf/ucc/SpillnerBMMTS11
fatcat:c7enxvsclngo5f6pkflpiiw3ai
Active Storage System
2018
International Journal for Research in Applied Science and Engineering Technology
An RPC is also called a subroutine call. 1) The client calls a client stub passes parameters to the stub. 2) The client stub packs the parameters in form of a message. ...
is done using the regular procedure call mechanism. 5) When the server process completes, the parameters are passed to the server stub, which then packs the parameters in form of a message. ...
Redundant Array of Independent disks (Raid) Redundant Array of Independent Disks (RAID) is a data storage virtualization technique that combines many levels of physical disk drive components into one or ...
doi:10.22214/ijraset.2018.6083
fatcat:z4ii73b42rdydpcsm2qt6mdjfy
Storage architecture with integrity, redundancy and encryption
2009
2009 IEEE International Symposium on Parallel & Distributed Processing
Extending RAID6, it allows for failures of multiple disks, encrypts data on disk, and stores checksums to detect faulty data without disks failing, which occurs e.g. in solid state disks due to wear out ...
We propose a storage system that treats confidentiality, integrity and availability of data in a unified manner. ...
Related Work RAID (Redundant Array of Inexpensive Disks) is a common technique used to increase performance, reliability or both. It has been introduced in [2] . ...
doi:10.1109/ipdps.2009.5160901
dblp:conf/ipps/KleinK09
fatcat:ru563cl4yze5tcbpl4xstzlqkq
Alpha Entanglement Codes: Practical Erasure Codes to Archive Data in Unreliable Environments
2018
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
We evaluate how several redundancy schemes perform in unreliable environments and show that alpha entanglement codes are flexible and practical codes. ...
Data centres that use consumer-grade disks drives and distributed peer-to-peer systems are unreliable environments to archive data without enough redundancy. ...
V.E.G. thanks Jay Lofstead, Ahmed Amer, Kragen Sitaker, and Hugues Mercier for stimulating discussions, and to Luiz Barroso for answering questions regarding availability in global systems. ...
doi:10.1109/dsn.2018.00030
dblp:conf/dsn/Estrada-Galinanes18
fatcat:t6yzk6yionfe7mdekrj2f5xeme
Fast Recovery and Low Cost Coexist: When Continuous Data Protection Meets the Cloud
2014
IEICE transactions on information and systems
In this paper, a novel block-level CDP system architecture: MYCDP is proposed to utilize cloud resources as the back-end storage. ...
It also supports deletion of arbitrary versions without risk of invalidating some other versions. ...
Acknowledgements This work is supported by the National Natural Science Foundation of China (61202081) and the 863 Program of China (2012AA012609). ...
doi:10.1587/transinf.e97.d.1700
fatcat:3s3qimjuwfgwngcv3ubnltfdnq
The Redesigned BaBar Event Store: Believe the Hype
[article]
2003
arXiv
pre-print
Programming interfaces were designed before sufficient usage information became available. Performance and efficiency were traded off for added flexibility to cope with future demands. ...
The Event Store redesign is intended to eliminate redundant features while adding new ones, increase overall performance, and contain the physical storage cost of the world's largest database. ...
Share redundant data A lot of data is identical in successive events. ...
arXiv:cs/0306023v1
fatcat:ezwrufird5cc7k2pnsqypllj44
Mathematical methods and models of improving data storage reliability including those based on finite field theory
2014
Contemporary Engineerng Sciences
Novel approaches already exist which are based on software methods to ensure data consistency over time in large data sets, but efficiency of these approaches has not been extensively explored in practice ...
yet, especially because experimenting with petabyte scale systems in real world requires substantial investment of time and resources. ...
Universal identifier of the agreement RFMEFI57914X0010. ...
doi:10.12988/ces.2014.411236
fatcat:7nwtaesuivefljqw44iuqfx2gy
A Beowulf-class computing cluster for the Monte Carlo production of the LHCb experiment
2003
Computer Physics Communications
In this paper we describe the architecture of the cluster, and discuss the technical solutions adopted for each specialized sub-system. (V.M. ...
Vagnoni). cross section) to make precise measurements of CPviolation and rare decays of the B-mesons [1]. ...
Harris for useful discussions and for the critical review of the manuscript. ...
doi:10.1016/s0010-4655(02)00677-x
fatcat:y32wmvnirveodofoiksyv6ktse
Intel's New AES Instructions for Enhanced Performance and Security
[chapter]
2009
Lecture Notes in Computer Science
Together, these instructions provide full hardware support for AES, offering high performance, enhanced security, and a great deal of software usage flexibility, and are therefore useful for a wide range ...
Some special usage models of this architecture are also described. ...
Many people contributed to the concepts, the studies, the definition of the architecture, and to the micro-architectural implementation. ...
doi:10.1007/978-3-642-03317-9_4
fatcat:2gwel6mi2zd7jdfxr2bg4ziora
« Previous
Showing results 1 — 15 out of 6,133 results