The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Erasure coding has been widely adopted to protect data storage against failures in production data centers. Given the hierarchical nature of data centers, characterizing the effects of erasure coding and redundancy placement on the reliability of erasure-coded data centers is critical yet largely unexplored. This paper presents a comprehensive simulation analysis of reliability on erasure-coded data...
The Internet is now present in our personal and professional life, where reliability and green communications are still open issues to be addressed. Usually, clients establish Service Level Agreements (SLAs) with their Internet Service Providers (ISPs), including parameters of reliability and bandwidth. On the other hand, the ISPs aim to maximize their profit by establishing as many SLAs as possible...
High performance systems require high levels of reliability. Many functions involved in telecommunication and IT networks have reliability requirements that can only be achieved by introducing redundant resources. In the telecom sector, recently, there has been a significant effort on moving carrier grade systems and functions to virtualized network infrastructure. The management and coordination...
Reliability is a critical metric in the design and development of scale-out data storage clusters. A general multiway replication-based declustering scheme has been widely used in enterprise large-scale storage systems to improve the I/O parallelism. Unfortunately, given an increasing number of node failures, how often a cluster starts losing data when being scaled-out is not well investigated. In...
Currently, the Internet is the main communication medium, however it does not guarantee Quality of Service. To contour this problem, companies establish Service Level Agreements with their Internet Service Providers, including parameters like bandwidth and reliability of the network. This paper presents an algorithm for virtual network allocation in a reliability context, where a feasible bandwidth...
Typical models for analysis of storage system reliability assume independent and exponentially distributed times to failure. Also the rebuild time periods are often assumed to be deterministic or to follow an exponential distribution, or alternatively a Weibull distribution. As a first step towards a generalization of these models, we consider more general non-exponential distributions for failure...
High availability WAN connectivity can be achieved with a single service provider link built with high quality hardware, redundancy, and SLA guarantees, or by bundling a number of inexpensive connections together, similar to RAID for computer storage. In this paper, we investigate the performance of a Redundant Array of Independent Internet Connections (RAIIC). We discuss proper planning and signaling...
Distributed and peer-to-peer storage systems are foreseen as an alternative to the traditional data centers and in-house backup solutions. In the past few years many peer-to- peer storage systems have been proposed. Most of them rely on the use of erasure codes to introduce redundancy to the data. This kind of system depends on many parameters that need to be well tuned, such as the factor of redundancy,...
In this work we design retransmission schemes for broadcast networks which use simple network coding techniques. In particular we consider a wireless system with a shared feedback channel, wherein the number of transmission errors can be estimated by polling or voice-vote mechanisms. As a result, the feedback bandwidth is independent of the users in the system. We then develop analytical models to...
Network virtualization is becoming an irresistible trend for building future Internet. It enables multiple virtual networks running on the same physical substrate, by which network service can be deployed on a customized virtual network to get better performance. In this paper, we propose a method to achieve more reliable live streaming service by deploying it over multiple virtual networks, namely...
For a given amount of storage overhead, erasure coding offers a higher degree of survivability than pure replication. Consequently, erasure coding attracts much attention these years in the research area of reliable distributed storage systems. Although numerous erasure codes have been put forward, how to choose erasure coding parameters to maximize system reliability has not yet been sufficiently...
In this paper, we argue that the reliability of large-scale storage systems can be significantly improved by using better reliability metrics and more efficient policies for recovering from hardware failures. Specifically, we make three main contributions. First, we introduce NDS (Normalcy Deviation Score), a new metric for dynamically quantifying the reliability status of a storage system. Second,...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
With an increased focus on national security and public safety communications, the US Congress revisited its plan to reclaim television broadcaster frequencies to be reallocated and auctioned by the FCC and it specifically allocated a portion of that spectrum for use by public safety. The FCC was charged with the duty of auctioning this spectrum and licensing it to create a public safety network....
This paper describes a methodology for building a reliable internet core router that considers the vulnerability of its electronic components to single event upset (SEU). It begins with a set of meaningful system level metrics that can be related to product reliability requirements. A specification is then defined that can be effectively used during the system architecture, silicon and software design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.