1986 IEEE Second International Conference on Data Engineering 1986
DOI: 10.1109/icde.1986.7266238
|View full text |Cite
|
Sign up to set email alerts
|

Disk striping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
0

Year Published

1992
1992
2006
2006

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 189 publications
(64 citation statements)
references
References 0 publications
0
64
0
Order By: Relevance
“…The disk striping is the common technique to derive high throughput, such as in many types of RAID systems [3,10]. In the ordinary disk striping technique, the number of disks for a striping group is fixed and the placement manner of the fragments is static in a storage system.…”
Section: Disk Stripingmentioning
confidence: 99%
See 1 more Smart Citation
“…The disk striping is the common technique to derive high throughput, such as in many types of RAID systems [3,10]. In the ordinary disk striping technique, the number of disks for a striping group is fixed and the placement manner of the fragments is static in a storage system.…”
Section: Disk Stripingmentioning
confidence: 99%
“…To implement a high throughput storage system, striping technique using multiple disk drives are commonly used [3,9,10]. However, the number of disks for striping groups is fixed and the placement manner of fragments is static in the ordinary disk striping methods used for RAID 0, 3-5. Because it is difficult for them to provide different throughput for each objects and to reconfigure the cluster online, they have less flexibility and extensibility.…”
Section: Introductionmentioning
confidence: 99%
“…For example, parallelism has been proposed for disk arrays [15], tape arrays [16], [17], and even network transmissions [18]. In particular, the use of parallel disk systems have been studied extensively in VoD systems literatures [11], [12], [13], [14].…”
Section: Related Workmentioning
confidence: 99%
“…In this technique, data of a le are interleaved across numerous disks and accessed synchronously in parallel 15,7,13]. These schemes rely on a single controller to manage all of the disks.…”
Section: Introductionmentioning
confidence: 99%