Towards reliable backup on the net by combining markets, swarming and erasure codes
نویسنده
چکیده
We present CyberStash, a blueprint for a wide-area storage network that is both more reliable and more scalable than traditional storage methods. Our principal goal is to make advanced backup technology accessible to regular consumers. The chosen architecture is therefore simple to use and maintain. Because of its global span CyberStash can serve not only as a backup tool, but as a cornerstone enabling the vision of pervasive computing [1], [2]. We identify requirements, present an architecture and analytically find a lower bound on reliability that surpasses traditional approaches.
منابع مشابه
In-network redundancy generation for opportunistic speedup of data backup
Erasure coding is a storage-efficient alternative to replication for achieving reliable data backup in distributed storage systems. During the storage process, traditional erasure codes require a unique source node to create and upload all the redundant data to the different storage nodes. However, such a source node may have limited communication and computation capabilities, which constrain t...
متن کاملA Non-MDS Erasure Code Scheme for Storage Applications
This paper investigates the use of redundancy and self repairing against node failures indistributed storage systems using a novel non-MDS erasure code. In replication method, accessto one replication node is adequate to reconstruct a lost node, while in MDS erasure codedsystems which are optimal in terms of redundancy-reliability tradeoff, a single node failure isrepaired after recovering the ...
متن کاملAn Efficient Multicast Distribution Scheme Combining Erasure Codes and Direct Requests
For the efficient multicast distribution services on the Internet, suppressing the influence of packet loss is important issues. As a solution of this problem, Forward Error Correction (FEC) based on ReedSolomon codes is usually used. However, in the case of content delivery services for a large amount of data, this approach is not suitable. In this paper, we focus on the erasure codes which ar...
متن کاملWyner-Ziv Video Compression and Fountain Codes for Receiver-Driven Layered Multicast
The proliferation of video streaming applications that distribute data to a large number of clients motivates the design of fast and reliable multimedia delivery systems capable to adapt effectively to diverse transmission conditions. Receiver-driven layered multicast (RLM) efficiently addresses the issue of heterogeneity in clients’ available bandwidths and packet loss rates by shifting rate c...
متن کاملLifetime and availability of data stored on a P2P system: Evaluation of redundancy and recovery schemes
This paper studies the performance of Peer-to-Peer storage and backup systems (P2PSS). These systems are based on three pillars: data fragmentation and dissemination among the peers, redundancy mechanisms to cope with peers churn and repair mechanisms to recover lost or temporarily unavailable data. Usually, redundancy is achieved either by using replication or by using erasure codes. A new cla...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007