skip to main content
10.1145/3462676.3462687acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceccConference Proceedingsconference-collections
research-article

Systematic Vandermonde CODEC PE for Erasure Codes

Authors Info & Claims
Published:07 September 2021Publication History

ABSTRACT

A systematic Vandermonde CODEC PE for erasure codes is proposed in this paper. The algorithm of the proposed CODEC PE is constructed by the Toeplitz matrix's characteristic first. Then split the decoding matrix into several small matrixes based on different scenarios. With that, the decoding operation can optimize to fixed parameters saved in memory and fetch to do the simple calculations when needed. After the combinatorial operation, the CODEC PE will give the final output. The PE is designed to work for both encoding and decoding with the same module but for different data and operations. The PE number is configurable to have the best performance in different erasure codes “r” situations and backward compatible by the control of the config module. The hardware architecture is fully verified at RTL level and synthesized with GF 12nm technology lib and simulation results showed 73.5% to 79.8% speed advantages compared to Gaussian elimination.

References

  1. Erik M. Ferragut. 2009. A dynamic erasure code for multicasting live data. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09>). Association for Computing Machinery, New York, NY, USA, Article 65, 1–4. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/1558607.Google ScholarGoogle Scholar
  2. Ojus Thomas Lee, Vijay Sharma, S. D Madhu Kumar, and Priya Chandran. 2019. Modelling multi level consistency in erasure code based storage systems. In Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC '19). Association for Computing Machinery, New York, NY, USA, 122–129. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/3297280.3297294Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Luigi Rizzo. 1997. Effective erasure codes for reliable computer communication protocols. SIGCOMM Comput. Commun. Rev. 27, 2 (Apr. 1997), 24–36. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/263876.263881Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. James Hendricks, Gregory R. Ganger, and Michael K. Reiter. 2007. Verifying distributed erasure-coded data. In Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing (PODC '07). Association for Computing Machinery, New York, NY, USA, 139–146. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/1281100.1281122Google ScholarGoogle Scholar
  5. Tianli Zhou and Chao Tian. 2020. Fast Erasure Coding for Data Storage: A Comprehensive Study of the Acceleration Techniques. ACM Trans. Storage 16, 1, Article 7 (April 2020), 24 pages. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/3375554Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ruizhen Wu, Lin Wang, and Yan Wu. 2020. A High-Speed Cauchy CODEC Algorithm for Distributed Storage System. Proceedings of the 2020 International Conference on Internet Computing for Science and Engineering. Association for Computing Machinery, New York, NY, USA, 20–24. DOI:https://doi.org/10.1145/3424311.3424313Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Vinay Amatya, Abhinav Vishnu, Charles Siegel, and Jeff Daily. 2017. What does fault tolerant deep learning need from MPI? In Proceedings of the 24th European MPI Users' Group Meeting (EuroMPI '17). Association for Computing Machinery, New York, NY, USA, Article 13, 1–11. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/3127024.3127037Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Marco Scavuzzo, Damian A. Tamburri, and Elisabetta Di Nitto. 2016. Providing big data applications with fault-tolerant data migration across heterogeneous NoSQL databases. In Proceedings of the 2nd International Workshop on BIG Data Software Engineering (BIGDSE '16). Association for Computing Machinery, New York, NY, USA, 26–32. DOI:https://doi-org.libproxy.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. b Arun Subbiah and Douglas M. Blough. 2005. An approach for fault tolerant and secure data storage in collaborative work environments. In Proceedings of the 2005 ACM workshop on Storage security and survivability (StorageSS '05). Association for Computing Machinery, New York, NY, USA, 84–93. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/1103780.1103793 erkeley.edu/10.1145/2896825.2896831Google ScholarGoogle Scholar
  10. Arun Subbiah and Douglas M. Blough. 2005. An approach for fault tolerant and secure data storage in collaborative work environments. In Proceedings of the 2005 ACM workshop on Storage security and survivability (StorageSS '05). Association for Computing Machinery, New York, NY, USA, 84–93. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/1103780.1103793Google ScholarGoogle Scholar
  11. Qing Liu, Dan Feng, Hong Jiang, Yuchong Hu, and Tianfeng Jiao. 2017. Systematic Erasure Codes with Optimal Repair Bandwidth and Storage. ACM Trans. Storage 13, 3, Article 26 (October 2017), 27 pages. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/3109479Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Michael Luby, Roberto Padovani, Thomas J. Richardson, Lorenz Minder, and Pooja Aggarwal. 2019. Liquid Cloud Storage. ACM Trans. Storage 15, 1, Article 2 (April 2019), 49 pages. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/3281276Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Michael P. Mesnier and Jason B. Akers. 2011. Differentiated storage services. SIGOPS Oper. Syst. Rev. 45, 1 (January 2011), 45–53. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/1945023.1945030Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kishori M. Konwar, N. Prakash, Nancy Lynch, and Muriel Médard. 2017. A Layered Architecture for Erasure-Coded Consistent Distributed Storage. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC '17. Association for Computing Machinery, New York, NY, USA, 63–72. DOI:https://doi-org.libproxy.berkeley.edu/10.1145/3087801.3087832Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. N Nagendra Prasad and J Rajesh Kumar, " High Speed Error Detection and Data Recovery Architecture for Video Applications," International Journal of Electrical and Electronic Engineering & Telecommunications, Vol. 2, No. 4, pp. 62-75, October 2013.Google ScholarGoogle Scholar
  16. Ghania Zerari, Abderrezak Guessoum, and Rachid Beguenane, "A New Design for Reducing Logic Utilizations in FPGA-Based Stochastic LDPC Decoders," International Journal of Electrical and Electronic Engineering & Telecommunications, Vol. 6, No. 4, pp. 1-5, October 2017. DOI: 10.18178/ijeetc.6.4.1-5. DOI:10.18178/ijeetc.6.4.1-5Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICECC '21: Proceedings of the 4th International Conference on Electronics, Communications and Control Engineering
    April 2021
    122 pages
    ISBN:9781450389129
    DOI:10.1145/3462676

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 September 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format