2021
DOI: 10.3390/app11083298
|View full text |Cite
|
Sign up to set email alerts
|

Erasure-Coding-Based Storage and Recovery for Distributed Exascale Storage Systems

Abstract: Various techniques have been used in distributed file systems for data availability and stability. Typically, a method for storing data in a replication technique-based distributed file system is used, but due to the problem of space efficiency, an erasure-coding (EC) technique has been utilized more recently. The EC technique improves the space efficiency problem more than the replication technique does. However, the EC technique has various performance degradation factors, such as encoding and decoding and i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…It has incalculable execution encoding, decoding, and input/yield corruption elements in general. Kim [29] proposes a buffering and joining method in which several I/O demands that occur during encoding are combined and treated as one. It offers four recovery options for distributing the disk input/yield loads generated during decoding.…”
Section: A Related Workmentioning
confidence: 99%
“…It has incalculable execution encoding, decoding, and input/yield corruption elements in general. Kim [29] proposes a buffering and joining method in which several I/O demands that occur during encoding are combined and treated as one. It offers four recovery options for distributing the disk input/yield loads generated during decoding.…”
Section: A Related Workmentioning
confidence: 99%
“…In other research, the applications of Reed-Solomon erasure code are for environments other than the one in this paper, showing a gap in its applications to Dicoogle PACS. In this regard, it is worth mentioning that the study carried out in [77] used values of k = 2, 4, 8 and m = 2, 2, 2. Likewise, in [78], the authors used k = 6, 10 and m = 3, 4.…”
Section: B Softwarementioning
confidence: 99%