1. The document discusses a cloud storage solution called NCCloud that applies network coding for efficient storage repair in a multi-cloud environment.
2. It proposes using erasure coding to stripe data across multiple cloud storage providers instead of replication to reduce storage costs during repair.
3. The solution introduces a new regenerating code called F-MSR code that allows for optimal repair bandwidth when disks fail in the multi-cloud setup.
Space ship depots continue to come online, with launches to the Moon occurring daily. The moon bases
have been stabilized, and humans are beginning to settle in.
Not surprisingly, many island nations fared better than expected during the outbreak. Their isolation could
be very valuable if we face a third round of infection before the earth has been evacuated. We need to get
them back on the grid as soon as possible. Japan, Madagascar, and Iceland are first on the list for
building infrastructures. Local teams have managed to get some equipment, but all you’ll have to start
with is one repository and blank hardware. As we’ve learned while building the depots, travel is
dangerous and difficult. You will need to create your infrastructure in a lab first, to ensure it will be able to
be quickly deployed by a local team. Once the process has been deemed successful, we will establish a
satellite link to the islands to get everything we need to the local repositories
This document provides a summary of implementing LDAP authentication for the IBM DS8000 storage system. Key points include:
- Configuring LDAP servers and Tivoli Storage Productivity Center for LDAP authentication.
- Creating certificates and a truststore file to enable secure communication between components.
- Configuring the DS8000 for LDAP authentication through the GUI or CLI and mapping LDAP groups to DS8000 roles.
- Administering users and groups in Tivoli Storage Productivity Center and mapping roles to LDAP groups for single sign-on.
The document provides guidance on setting up the necessary infrastructure and components to implement LDAP authentication for the DS8000. This allows centralized management of users through an LDAP directory and single
Metatron Technology Consulting 's MySQL to PostgreSQL ...webhostingguy
This document provides a guide for migrating a database from MySQL to PostgreSQL. It discusses key differences between the two databases, including features available in one but not the other. It also provides references for porting SQL functions and tools to help with the migration process. Common problems that may occur during migration like error messages are also addressed.
This document provides guidance for architects on designing and implementing a VMware vCloud environment. It discusses vCloud components and logical architecture, including the management cluster, resource groups, and vCloud Director constructs. It also covers establishing provider and organization virtual datacenters, networking options, templates, policies, and access. Guidelines are provided for monitoring, logging, security, availability, and sizing considerations. The intended audience is VMware-certified professionals familiar with vSphere and vCloud Director.
This document describes a semester project involving rigid body sound synthesis. The project uses modal synthesis in the frequency domain to generate contact sounds based on forces from a rigid body simulation. It utilizes various math libraries like Armadillo for linear algebra and SVDLIBC for sparse matrix decompositions. The simulation models rigid bodies using finite elements, computes their vibration modes, and plays back the resulting sounds using SDL audio. Key aspects covered include matrix formation, material parameters, modal analysis calculations, and audio playback implementation.
RDB Synchronization, Transcoding and LDAP Directory Services ...Videoguy
This document provides an overview and instructions for synchronizing data between mobile databases and back-end databases using IBM WebSphere Everyplace Access Version 4.1.1. It also covers using transcoding technologies to adapt portlet content for different devices. The key topics covered include:
- Configuring database synchronization between DB2 Everyplace and backend DB2 or Oracle databases
- Using transcoding technologies like XML stylesheets and annotations to customize content for devices
- A sample application demonstrating how to clip content from documents using internal and external annotation
This document describes extensions to PathMATE's C and C++ maps to improve static buffer management through the use of task-local memory pools. It overviews the types of pools (general purpose task pool, task-specific incident pool, default pool), how their block sizes are specified, how the feature can be disabled, and provides a high-level summary of the implementation and design details.
This document provides an overview of the Perl Reference Manual for CDF (Coordinate Data Frame). It discusses compiling Perl scripts that interface with CDF, the programming interface including item referencing, passing arguments, status constants, CDF formats, data types, encodings, and more. The standard and internal interfaces for CDF functions in Perl are also described.
Space ship depots continue to come online, with launches to the Moon occurring daily. The moon bases
have been stabilized, and humans are beginning to settle in.
Not surprisingly, many island nations fared better than expected during the outbreak. Their isolation could
be very valuable if we face a third round of infection before the earth has been evacuated. We need to get
them back on the grid as soon as possible. Japan, Madagascar, and Iceland are first on the list for
building infrastructures. Local teams have managed to get some equipment, but all you’ll have to start
with is one repository and blank hardware. As we’ve learned while building the depots, travel is
dangerous and difficult. You will need to create your infrastructure in a lab first, to ensure it will be able to
be quickly deployed by a local team. Once the process has been deemed successful, we will establish a
satellite link to the islands to get everything we need to the local repositories
This document provides a summary of implementing LDAP authentication for the IBM DS8000 storage system. Key points include:
- Configuring LDAP servers and Tivoli Storage Productivity Center for LDAP authentication.
- Creating certificates and a truststore file to enable secure communication between components.
- Configuring the DS8000 for LDAP authentication through the GUI or CLI and mapping LDAP groups to DS8000 roles.
- Administering users and groups in Tivoli Storage Productivity Center and mapping roles to LDAP groups for single sign-on.
The document provides guidance on setting up the necessary infrastructure and components to implement LDAP authentication for the DS8000. This allows centralized management of users through an LDAP directory and single
Metatron Technology Consulting 's MySQL to PostgreSQL ...webhostingguy
This document provides a guide for migrating a database from MySQL to PostgreSQL. It discusses key differences between the two databases, including features available in one but not the other. It also provides references for porting SQL functions and tools to help with the migration process. Common problems that may occur during migration like error messages are also addressed.
This document provides guidance for architects on designing and implementing a VMware vCloud environment. It discusses vCloud components and logical architecture, including the management cluster, resource groups, and vCloud Director constructs. It also covers establishing provider and organization virtual datacenters, networking options, templates, policies, and access. Guidelines are provided for monitoring, logging, security, availability, and sizing considerations. The intended audience is VMware-certified professionals familiar with vSphere and vCloud Director.
This document describes a semester project involving rigid body sound synthesis. The project uses modal synthesis in the frequency domain to generate contact sounds based on forces from a rigid body simulation. It utilizes various math libraries like Armadillo for linear algebra and SVDLIBC for sparse matrix decompositions. The simulation models rigid bodies using finite elements, computes their vibration modes, and plays back the resulting sounds using SDL audio. Key aspects covered include matrix formation, material parameters, modal analysis calculations, and audio playback implementation.
RDB Synchronization, Transcoding and LDAP Directory Services ...Videoguy
This document provides an overview and instructions for synchronizing data between mobile databases and back-end databases using IBM WebSphere Everyplace Access Version 4.1.1. It also covers using transcoding technologies to adapt portlet content for different devices. The key topics covered include:
- Configuring database synchronization between DB2 Everyplace and backend DB2 or Oracle databases
- Using transcoding technologies like XML stylesheets and annotations to customize content for devices
- A sample application demonstrating how to clip content from documents using internal and external annotation
This document describes extensions to PathMATE's C and C++ maps to improve static buffer management through the use of task-local memory pools. It overviews the types of pools (general purpose task pool, task-specific incident pool, default pool), how their block sizes are specified, how the feature can be disabled, and provides a high-level summary of the implementation and design details.
This document provides an overview of the Perl Reference Manual for CDF (Coordinate Data Frame). It discusses compiling Perl scripts that interface with CDF, the programming interface including item referencing, passing arguments, status constants, CDF formats, data types, encodings, and more. The standard and internal interfaces for CDF functions in Perl are also described.
This document provides an overview and instructions for installing, configuring, securing and using Hudson, an open source continuous integration server. It covers downloading and installing Hudson on various operating systems like Ubuntu, Red Hat and OpenSUSE. It also describes configuring global settings, plugins, projects and jobs in Hudson as well as securing Hudson through authentication and authorization. The document is intended as a manual for getting started with and managing Hudson.
Replication in PostgreSQL tutorial given in Postgres Conference 2019Abbas Butt
This document provides an overview of replication in PostgreSQL, including the various methods and configurations. It discusses replication at both the physical and logical levels. At the physical level, it covers disk-based replication using NAS, file system based replication using DRBD, and log shipping based approaches at both the file and block levels. It also covers logical replication using trigger-based replication with Slony-I, statement-based replication with pgpool-II, and logical decoding-based approaches. Details are provided on setting up and configuring each method, including performing failovers.
Privacy preserving back up and recovery of emergency dataZdravko Danailov
This document discusses privacy-preserving backup and recovery of emergency data in Germany's telematics system. It analyzes the existing scenario for backing up and recovering emergency data stored on electronic health cards. The existing scenario has disadvantages related to privacy and data security. The document proposes an improved scenario that uses secret sharing techniques like Krawczyk's secret sharing scheme to distribute encrypted emergency data fragments across multiple servers, allowing for privacy-preserving backup and recovery while avoiding single points of failure.
DDoS mitigation through a collaborative trust-based request prioritizationDavide Paltrinieri
This document summarizes a master's thesis on distributed denial of service (DDoS) attack mitigation through collaborative trust-based request prioritization. The thesis presents models of attackers, victims, and defenses. It describes the software architecture, which includes components like border routers, smart proxies, suspicion checking, logging, monitoring, a trust collaborative database, and an auditing room. It also discusses required software like SeleniumHQ and traffic control used in the implementation. The goal is to provide a concise 3-sentence summary of the key information and purpose.
This document provides an overview of the Debian Administrator's Handbook by Raphaël Hertzog and Roland Mas. It details the copyright and licensing information for the book, which is made available under both a Creative Commons license and the GNU General Public License. The book covers topics such as the Debian project, Debian distributions like Squeeze, and how to install and configure Debian.
The NetApp solution provides several benefits for Citrix XenDesktop deployments including:
1) Storage efficiency through thin provisioning, deduplication, and FlexClone which can save 50-90% on storage costs.
2) Performance enhancement using technologies like Virtual Storage Tiering and write optimization.
3) Improved operational agility through tight integration with partner solutions and simplified management.
4) Robust data protection for both virtual desktop operating systems and user data with low overhead.
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksVideoguy
This document summarizes a PhD thesis about free-riding resilient video streaming in peer-to-peer networks. The thesis contains research on two approaches: tree-based live streaming and swarm-based video-on-demand. For tree-based live streaming, the thesis presents the Orchard algorithm for constructing and maintaining trees to distribute video in a peer-to-peer network. It analyzes attacks on Orchard like free-riding and evaluates Orchard's performance under different conditions through experiments. For swarm-based video-on-demand, the thesis introduces the Give-to-Get approach for distributing video files and compares it to other peer-to-peer protocols. It evaluates Give-to-Get's performance in experiments
This document proposes a Web 3D Service (W3DS) specification for serving 3D geospatial data and scenes over the web. It defines operations like GetCapabilities and GetScene. GetScene takes viewing parameters like point of interest, pitch, yaw, and roll to request a 3D scene from the server. The response to GetScene is the 3D scene encoded in a specified format. This draft specification is intended to standardize access and rendering of geospatial data and scenes for 3D web clients and applications.
This document provides an introduction to the CS4344 lecture on technical issues and solutions in networked and mobile game development. It outlines the course objectives, assessment breakdown, workload, and additional resources. The lecture then discusses key concepts like networked games, multiplayer game architectures, and the challenges of building consistent, responsive, fair, and scalable networked games over best-effort networks.
This thesis proposes and evaluates several SDN-enabled traffic engineering solutions:
1. An OVX Testing Framework to test the OpenVirteX network hypervisor which virtualizes OpenFlow networks.
2. A Command Line Interface for the ONOS Segment Routing application to retrieve switch statistics and configure tunnels/policies.
3. An emulation of packet-optical networks using ONOS as a multi-layer SDN controller to optimize traffic flow across packet and optical domains.
4. A Maximum Weighted Alpha scheduling algorithm for input queued switches to provide throughput optimality under hybrid data traffic loads. Performance is evaluated in an SDN testbed.
This master's thesis investigates methods for computing multiple sense embeddings per polysemous word. The author extends the word2vec model to build a sense assignment model that simultaneously selects word senses in sentences and adapts the sense embedding vectors in an unsupervised learning approach. The model is implemented in Spark to enable training on large corpora. Sense vectors are trained on a Wikipedia corpus of nearly 1 billion tokens and evaluated on word similarity tasks using the SCWS and WordSim-353 datasets. Hyperparameter tuning is performed to analyze the effect of vector size, learning rate, and other parameters on model performance and training time. Nearest neighbors and example sentences are also examined to analyze the quality of the computed sense embeddings.
This document is a user guide for Dekart Private Disk MultiFactor software. It discusses how the software protects confidential data and workplaces using multiple authentication factors. It also outlines the software's installation process, components, hardware and software requirements, settings that can be configured, and getting started with the software.
The document is a Juniper Networks IS-IS Configuration Guide that provides documentation on configuring the Intermediate System to Intermediate System (IS-IS) routing protocol. It includes sections on IS-IS overview and standards, configuration concepts and examples, and tasks for configuring IS-IS on Juniper routers and switches. The guide covers features such as multi-topology IS-IS, dual stacking of IPv4 and IPv6, authentication, BFD, and route protection. It provides configuration examples for common IS-IS scenarios.
This document provides an overview of high availability solutions in SQL Server 2012, including AlwaysOn Failover Cluster Instances and AlwaysOn Availability Groups. It introduces Windows Server Failover Clustering (WSFC) and how SQL Server leverages it to provide high availability through redundancy at the server-instance level with Failover Cluster Instances and the database level with Availability Groups. It recommends AlwaysOn solutions for protecting SQL Server data and discusses SQL Server's relationship with and use of WSFC capabilities like health monitoring and failover coordination.
This document provides an overview and reference for machine learning algorithms. It includes sections on data preprocessing, regression, classification, clustering, association rule learning, and reinforcement learning. For each algorithm, it provides intuition, examples of implementation in Python and R, and references for further reading. The document serves as a question and answer guide for machine learning practitioners.
The document provides information about implementing Tivoli Data Warehouse 1.2, including its features, architecture, planning considerations, and setup instructions. It covers topics such as hardware and software requirements, physical and logical design choices, database sizing, security, and skills required. The document also provides step-by-step instructions for installing and deploying Tivoli Data Warehouse in both a single machine and distributed environment.
This document is a thesis submitted by Saeed Abbasi to the University of Laval investigating the use of open DNS resolvers in DNS reflection DDoS attacks. The thesis will profile open DNS resolvers to detect them, locate them geographically, fingerprint their operating systems and connectivity, and study their purpose. It will also assess the security of open DNS resolvers and their vulnerabilities. Finally, it will analyze the association between open DNS resolvers and malware threats. The goal is to gain a better understanding of DNS reflection DDoS attacks through investigating open DNS resolvers worldwide.
Robust link adaptation in HSPA EvolvedDaniel Göker
This master's thesis studies a robust link adaptation technique for HSDPA networks. The technique adds an offset to the estimated channel quality indicator (CQI) to account for errors caused by measurement delay and noise. Simulations compare the robust technique to existing CQI adjustment in terms of block error rate stability and throughput. Results show the robust technique achieves the target block error rate on average across different user speeds, while existing CQI adjustment performs best only at high speeds with large packets. The robust technique provides stability but cannot adapt to interference variations. Both methods may be needed for a flexible system.
This document provides step-by-step instructions for disaster recovery solutions for IBM TotalStorage SAN File System. It discusses four scenarios: 1) complete recovery to a different TCP/IP address, 2) complete recovery to the same TCP/IP address, 3) storage recovery using FlashCopy, and 4) replacing a failed MDS. It also covers recovering SAN File System clients and protecting files in the global namespace using backup tools like Tivoli Storage Manager.
This document provides step-by-step instructions for disaster recovery solutions for IBM TotalStorage SAN File System. It discusses four scenarios: 1) complete recovery to a different TCP/IP address, 2) complete recovery to the same TCP/IP address, 3) storage recovery using FlashCopy, and 4) replacing a failed MDS. It also covers recovering SAN File System clients and protecting files in the global namespace using backup tools like Tivoli Storage Manager.
ENERGY EFFICIENCY OF ARM ARCHITECTURES FOR CLOUD COMPUTING APPLICATIONSStephan Cadene
This thesis evaluates how the energy efficiency of the ARMv7 architecture based processors
Cortex-A9 MPCpre and Cortex-A8 compare in applications such as a SIPProxy
and a web server compared to Intel Xeon processors. The focus is on comparing
the energy efficiency between the two architectures rather than just the performance.
As the processors used in servers today have more computational power than
the Cortex-A9 MPCore, several of these slower but more energy efficient processors
are needed. Depending on the application, benchmarks indicate energy efficiency of
3-11 times greater for the ARM Cortex-A9 in comparison to the Intel Xeon. The topics
of interconnects between processors and overhead caused by using an increasing
number of processors, are left for later research
This document provides an overview and instructions for installing, configuring, securing and using Hudson, an open source continuous integration server. It covers downloading and installing Hudson on various operating systems like Ubuntu, Red Hat and OpenSUSE. It also describes configuring global settings, plugins, projects and jobs in Hudson as well as securing Hudson through authentication and authorization. The document is intended as a manual for getting started with and managing Hudson.
Replication in PostgreSQL tutorial given in Postgres Conference 2019Abbas Butt
This document provides an overview of replication in PostgreSQL, including the various methods and configurations. It discusses replication at both the physical and logical levels. At the physical level, it covers disk-based replication using NAS, file system based replication using DRBD, and log shipping based approaches at both the file and block levels. It also covers logical replication using trigger-based replication with Slony-I, statement-based replication with pgpool-II, and logical decoding-based approaches. Details are provided on setting up and configuring each method, including performing failovers.
Privacy preserving back up and recovery of emergency dataZdravko Danailov
This document discusses privacy-preserving backup and recovery of emergency data in Germany's telematics system. It analyzes the existing scenario for backing up and recovering emergency data stored on electronic health cards. The existing scenario has disadvantages related to privacy and data security. The document proposes an improved scenario that uses secret sharing techniques like Krawczyk's secret sharing scheme to distribute encrypted emergency data fragments across multiple servers, allowing for privacy-preserving backup and recovery while avoiding single points of failure.
DDoS mitigation through a collaborative trust-based request prioritizationDavide Paltrinieri
This document summarizes a master's thesis on distributed denial of service (DDoS) attack mitigation through collaborative trust-based request prioritization. The thesis presents models of attackers, victims, and defenses. It describes the software architecture, which includes components like border routers, smart proxies, suspicion checking, logging, monitoring, a trust collaborative database, and an auditing room. It also discusses required software like SeleniumHQ and traffic control used in the implementation. The goal is to provide a concise 3-sentence summary of the key information and purpose.
This document provides an overview of the Debian Administrator's Handbook by Raphaël Hertzog and Roland Mas. It details the copyright and licensing information for the book, which is made available under both a Creative Commons license and the GNU General Public License. The book covers topics such as the Debian project, Debian distributions like Squeeze, and how to install and configure Debian.
The NetApp solution provides several benefits for Citrix XenDesktop deployments including:
1) Storage efficiency through thin provisioning, deduplication, and FlexClone which can save 50-90% on storage costs.
2) Performance enhancement using technologies like Virtual Storage Tiering and write optimization.
3) Improved operational agility through tight integration with partner solutions and simplified management.
4) Robust data protection for both virtual desktop operating systems and user data with low overhead.
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksVideoguy
This document summarizes a PhD thesis about free-riding resilient video streaming in peer-to-peer networks. The thesis contains research on two approaches: tree-based live streaming and swarm-based video-on-demand. For tree-based live streaming, the thesis presents the Orchard algorithm for constructing and maintaining trees to distribute video in a peer-to-peer network. It analyzes attacks on Orchard like free-riding and evaluates Orchard's performance under different conditions through experiments. For swarm-based video-on-demand, the thesis introduces the Give-to-Get approach for distributing video files and compares it to other peer-to-peer protocols. It evaluates Give-to-Get's performance in experiments
This document proposes a Web 3D Service (W3DS) specification for serving 3D geospatial data and scenes over the web. It defines operations like GetCapabilities and GetScene. GetScene takes viewing parameters like point of interest, pitch, yaw, and roll to request a 3D scene from the server. The response to GetScene is the 3D scene encoded in a specified format. This draft specification is intended to standardize access and rendering of geospatial data and scenes for 3D web clients and applications.
This document provides an introduction to the CS4344 lecture on technical issues and solutions in networked and mobile game development. It outlines the course objectives, assessment breakdown, workload, and additional resources. The lecture then discusses key concepts like networked games, multiplayer game architectures, and the challenges of building consistent, responsive, fair, and scalable networked games over best-effort networks.
This thesis proposes and evaluates several SDN-enabled traffic engineering solutions:
1. An OVX Testing Framework to test the OpenVirteX network hypervisor which virtualizes OpenFlow networks.
2. A Command Line Interface for the ONOS Segment Routing application to retrieve switch statistics and configure tunnels/policies.
3. An emulation of packet-optical networks using ONOS as a multi-layer SDN controller to optimize traffic flow across packet and optical domains.
4. A Maximum Weighted Alpha scheduling algorithm for input queued switches to provide throughput optimality under hybrid data traffic loads. Performance is evaluated in an SDN testbed.
This master's thesis investigates methods for computing multiple sense embeddings per polysemous word. The author extends the word2vec model to build a sense assignment model that simultaneously selects word senses in sentences and adapts the sense embedding vectors in an unsupervised learning approach. The model is implemented in Spark to enable training on large corpora. Sense vectors are trained on a Wikipedia corpus of nearly 1 billion tokens and evaluated on word similarity tasks using the SCWS and WordSim-353 datasets. Hyperparameter tuning is performed to analyze the effect of vector size, learning rate, and other parameters on model performance and training time. Nearest neighbors and example sentences are also examined to analyze the quality of the computed sense embeddings.
This document is a user guide for Dekart Private Disk MultiFactor software. It discusses how the software protects confidential data and workplaces using multiple authentication factors. It also outlines the software's installation process, components, hardware and software requirements, settings that can be configured, and getting started with the software.
The document is a Juniper Networks IS-IS Configuration Guide that provides documentation on configuring the Intermediate System to Intermediate System (IS-IS) routing protocol. It includes sections on IS-IS overview and standards, configuration concepts and examples, and tasks for configuring IS-IS on Juniper routers and switches. The guide covers features such as multi-topology IS-IS, dual stacking of IPv4 and IPv6, authentication, BFD, and route protection. It provides configuration examples for common IS-IS scenarios.
This document provides an overview of high availability solutions in SQL Server 2012, including AlwaysOn Failover Cluster Instances and AlwaysOn Availability Groups. It introduces Windows Server Failover Clustering (WSFC) and how SQL Server leverages it to provide high availability through redundancy at the server-instance level with Failover Cluster Instances and the database level with Availability Groups. It recommends AlwaysOn solutions for protecting SQL Server data and discusses SQL Server's relationship with and use of WSFC capabilities like health monitoring and failover coordination.
This document provides an overview and reference for machine learning algorithms. It includes sections on data preprocessing, regression, classification, clustering, association rule learning, and reinforcement learning. For each algorithm, it provides intuition, examples of implementation in Python and R, and references for further reading. The document serves as a question and answer guide for machine learning practitioners.
The document provides information about implementing Tivoli Data Warehouse 1.2, including its features, architecture, planning considerations, and setup instructions. It covers topics such as hardware and software requirements, physical and logical design choices, database sizing, security, and skills required. The document also provides step-by-step instructions for installing and deploying Tivoli Data Warehouse in both a single machine and distributed environment.
This document is a thesis submitted by Saeed Abbasi to the University of Laval investigating the use of open DNS resolvers in DNS reflection DDoS attacks. The thesis will profile open DNS resolvers to detect them, locate them geographically, fingerprint their operating systems and connectivity, and study their purpose. It will also assess the security of open DNS resolvers and their vulnerabilities. Finally, it will analyze the association between open DNS resolvers and malware threats. The goal is to gain a better understanding of DNS reflection DDoS attacks through investigating open DNS resolvers worldwide.
Robust link adaptation in HSPA EvolvedDaniel Göker
This master's thesis studies a robust link adaptation technique for HSDPA networks. The technique adds an offset to the estimated channel quality indicator (CQI) to account for errors caused by measurement delay and noise. Simulations compare the robust technique to existing CQI adjustment in terms of block error rate stability and throughput. Results show the robust technique achieves the target block error rate on average across different user speeds, while existing CQI adjustment performs best only at high speeds with large packets. The robust technique provides stability but cannot adapt to interference variations. Both methods may be needed for a flexible system.
This document provides step-by-step instructions for disaster recovery solutions for IBM TotalStorage SAN File System. It discusses four scenarios: 1) complete recovery to a different TCP/IP address, 2) complete recovery to the same TCP/IP address, 3) storage recovery using FlashCopy, and 4) replacing a failed MDS. It also covers recovering SAN File System clients and protecting files in the global namespace using backup tools like Tivoli Storage Manager.
This document provides step-by-step instructions for disaster recovery solutions for IBM TotalStorage SAN File System. It discusses four scenarios: 1) complete recovery to a different TCP/IP address, 2) complete recovery to the same TCP/IP address, 3) storage recovery using FlashCopy, and 4) replacing a failed MDS. It also covers recovering SAN File System clients and protecting files in the global namespace using backup tools like Tivoli Storage Manager.
ENERGY EFFICIENCY OF ARM ARCHITECTURES FOR CLOUD COMPUTING APPLICATIONSStephan Cadene
This thesis evaluates how the energy efficiency of the ARMv7 architecture based processors
Cortex-A9 MPCpre and Cortex-A8 compare in applications such as a SIPProxy
and a web server compared to Intel Xeon processors. The focus is on comparing
the energy efficiency between the two architectures rather than just the performance.
As the processors used in servers today have more computational power than
the Cortex-A9 MPCore, several of these slower but more energy efficient processors
are needed. Depending on the application, benchmarks indicate energy efficiency of
3-11 times greater for the ARM Cortex-A9 in comparison to the Intel Xeon. The topics
of interconnects between processors and overhead caused by using an increasing
number of processors, are left for later research
This document is the master's thesis of Björn Wiberg submitted to Uppsala University in December 2002. The thesis describes porting the AODV-UU implementation of the AODV routing protocol from Linux to the ns-2 network simulator. It also details enabling trace-based simulations using log files from real-world experiments on the APE ad-hoc network testbed. The ported version aims to reuse the original AODV-UU source code as much as possible within ns-2. Results showed packet delivery ratios in simulations could closely match those observed in testbed experiments.
MatConvNet is a MATLAB toolbox that implements convolutional neural networks (CNNs) for computer vision tasks. It aims to provide a simple and flexible environment for researchers to prototype and test new CNN architectures. Key features include exposing CNN building blocks as MATLAB functions, optimized CPU and GPU implementations for efficient training of large models on large datasets, and the ability to easily develop new blocks within MATLAB. Pre-trained versions of popular CNN models are also provided.
This document is the master's thesis of Réka Szabó titled "Penetration testing of aws-based environments". The thesis investigates how penetration testing techniques can be applied specifically to AWS environments. It outlines a general penetration testing methodology for AWS, integrating existing tools into the process. A major focus is on authenticated penetration tests, where credentials are provided to allow testing for internal misconfigurations. The thesis contains chapters on AWS services, common AWS security issues, penetration testing methodology, and describes conducting both non-authenticated and authenticated penetration tests of AWS environments.
This document describes a student project to implement database systems on the SpiNNaker neuromorphic hardware architecture. The student developed a key-value store and relational database to run on SpiNNaker, evaluating its performance and limitations for general purpose computing. The conclusions from this work provide feedback that could help improve SpiNNaker's design for applications beyond neural network simulations. Challenges included dealing with unreliable communication, out-of-order execution, and API bugs in the neuromorphic system. Evaluation benchmarks analyzed reliability, throughput, and memory usage under the database workloads.
This document provides a summary of Linux advanced routing and traffic control techniques. It covers topics like routing with iproute2, policy routing, GRE and other tunneling methods, IPv6 tunneling, IPsec, multicast routing, traffic shaping with different queueing disciplines, load balancing across interfaces, packet marking with Netfilter, advanced packet filtering, kernel network parameters, and other advanced queueing disciplines. The goal is to provide hands-on guidance for configuring and managing routing, traffic control, and related Linux networking functions.
Emulex - Management Mind Meld (A. Ordoubadian)Ali Ordoubadian
Converged networking combines existing local area networks (LANs) and storage area networks (SANs) into a single high-performance 10 gigabit Ethernet framework. This results in an overlap of responsibilities for network and storage administrators. The document provides an overview of key storage and networking concepts to help administrators understand changes from converged networking and how it will impact their roles, covering topics such as SANs, performance, availability, security and management.
Emulex - Management Mind Meld (A. Ordoubadian)Ali Ordoubadian
Converged networking combines existing local area networks (LANs) and storage area networks (SANs) into a single high-performance 10 gigabit Ethernet framework. This results in an overlap of responsibilities for network and storage administrators. The document provides an overview of key storage and networking concepts to help administrators understand changes from converged networking and how it will impact their roles, covering topics such as SANs, performance, availability, security and management.
This document provides an overview and comparison of IBM Tivoli NetView and Netcool/Precision for IP Networks. It discusses the capabilities of each product for discovery, monitoring, network visualization, event management, diagnostic tools, user consoles, and integration with other IBM products. The document aims to help NetView customers understand options for migrating to the Netcool/Precision platform.
This document provides an overview of NoSQL databases, including the motives behind their emergence, common concepts and techniques, and examples of different types of NoSQL databases like key-value stores, document databases, and column-oriented databases. It aims to systematically describe the NoSQL movement and related technologies in a structured manner across multiple chapters. Specific databases covered include Amazon's Dynamo, Project Voldemort, CouchDB, MongoDB, Google's Bigtable, and Cassandra.
MatConvNet is a MATLAB toolbox that implements convolutional neural networks for computer vision tasks. It provides functions for common CNN layers like convolution, pooling, and normalization. These can be combined to easily prototype new CNN architectures. MatConvNet supports efficient GPU computation, allowing it to train complex models on large datasets. It aims to be a simple and flexible environment for computer vision researchers to experiment with CNNs within the MATLAB platform.
Db2 udb backup and recovery with ess copy servicesbupbechanhgmail
This document provides information about using IBM's Enterprise Storage Server (ESS) Copy Services capabilities with DB2 Universal Database (DB2 UDB) backup and recovery. It discusses ESS concepts and features like FlashCopy and Peer-to-Peer Remote Copy (PPRC). It also covers DB2 UDB backup and recovery terminology and how ESS Copy Services can be used to improve the backup process through snapshot technology. Specific scenarios for using FlashCopy and PPRC with DB2 UDB are described.
The IT industry has gained significant efficiency and flexibility as a direct result of virtualization. Organizations are moving toward a virtual datacenter (VDC) model, and flexibility, speed, scale and automation are central to their success. Although compute and memory resources are pooled and automated, networks and network services, such as security, have not kept pace. Traditional network and security operations not only reduce efficiency but also limit the ability of businesses to rapidly deploy, scale and protect applications. VMware vCloud® Networking and Security™ offers a network virtualization solution to overcome these challenges. This paper describes various components of the network virtualization solution and explains one of the key technology - VXLAN. It also provides design considerations that will help virtualization and network architects deploy this solution successfully in their environment.
This document is a thesis submitted by Richard Jones to the Department of Computing at Imperial College London in June 2015. It presents PUMA (Pseudo-Uniform Memory Access), a smart memory allocator that manages data in a NUMA-aware way for parallel applications. PUMA exposes an interface to execute kernels in parallel while ensuring each core accesses primarily local memory. It provides optional load balancing to adapt workloads where cores have different capabilities. The thesis evaluates PUMA by parallelizing a Large Ecosystem Model (LERM) using it. Results show PUMA improves performance by minimizing remote memory accesses and balancing workloads across cores.
This document discusses issues with processing large volumes of data and proposes an enterprise data warehouse architecture capable of handling big data. It aims to explain integrating Hadoop into existing data warehouses.
The first chapter introduces challenges of increased data volume, variety and velocity. It discusses skill shortages in big data and analytics. Existing data warehouses are built for reporting but not analyzing large, unaggregated data.
The second chapter outlines requirements for a new architecture and proposes a multi-platform data warehouse environment incorporating Hadoop. It describes Hadoop components like HDFS, YARN, Hive and tools like Sqoop.
The third chapter focuses on integrating Hadoop into existing data warehouses by implementing star schemas in Hive, addressing security,
This thesis explores accelerating isosurface rendering of volume data using GPU ray casting with an octree. It analyzes octree traversal types suitable for GPU implementation and develops a hybrid traversal combining stackless octree traversal with direct grid ray marching. The method was integrated into the WisS anthropology data viewer. The implementation achieves up to 3.5x speedup over the original ray marching, improving interactivity on large datasets. Challenges for GPU octree traversal are discussed along with directions for future work.
This document provides an overview of importing and exporting data in R. It discusses importing spreadsheet-like data, data from other statistical systems, relational databases, binary files, and image files. It also covers exporting to text files, XML, and connections. A variety of packages are described that facilitate working with different data formats and databases.
This document provides an introduction to the IBM GDPS family of offerings. It discusses business resilience requirements and how GDPS supports IT resilience through technologies like disk replication and automation. The document covers GDPS/PPRC, which uses IBM's Peer-to-Peer Remote Copy (PPRC) technology for continuous availability and disaster recovery. It also addresses infrastructure planning considerations for GDPS implementations.
Similar to my presentation of the paper "FAST'12 NCCloud" (20)
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
16. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion Background Erasure Codes Regenerating Codes
. Reed-Solomon Codes (RAID-6) [6]
.
Theorem (necessary and sufficient condition)
.
Every possible k × k submatrix obtained by removing (n − k) rows
from EM ′ has full rank.
equivalent expression of full rank:
rank = k
non-singular
.
.
. .
Alternative view:
Consider the linear space of
P = [Pi ]i=1,2,...,n = [F1 , F2 , . . . , Fk , C1 , C2 , . . . , Cn−k ], its
dimension is k, and any k out of n vectors form a basis of the
linear space.
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 7/20
34. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion the Paper’s Contributions F-MSR Code
. File Repair
.
Simulations
.
Consider multiple rounds of permanent node failures for different
values of n. In each round, we randomly pick a node to
permanently fail and trigger a repair.
.
.
Simulation result
.
If the loop of Steps 2 to 5 is repeated over 10 times ; bad repair
Only checking the MDS property, we see a bad repair very quickly:
after no more than 7 and 2 rounds for n = 8 and n = 12,
respectively.
.
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 14/20
37. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion the Paper’s Contributions F-MSR Code
. File Repair
Cost of two-phrase checking
k
MDS property check: enumerating Cn subsets of n nodes to
see if each of their corresponding encoding matrices forms a
full rank.
Repair MDS property check: for any failed node (out of n
nodes), we collect any one out of (n − k) chunks from the
other (n − 1) surviving nodes to reconstruct, therefore the
cost is n(n − k)(n−1) Cn .
k
Return to .. Unsolved Problems
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 14/20
38. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion the Paper’s Contributions F-MSR Code
. File Repair
Cost of two-phrase checking
k
MDS property check: enumerating Cn subsets of n nodes to
see if each of their corresponding encoding matrices forms a
full rank.
Repair MDS property check: for any failed node (out of n
nodes), we collect any one out of (n − k) chunks from the
other (n − 1) surviving nodes to reconstruct, therefore the
cost is n(n − k)(n−1) Cn .
k
Return to .. Unsolved Problems
We have to check more times for the current repair, but bad repair
will be rare in the future iterative repairs.
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 14/20
39. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion Repair Traffic Analysis Cost Analysis Experiments
. Repair Traffic
Native data size M
k(n − k) native chunks of size M/k(n − k)
k−1
Repair Traffic: M/k(n − k) × (n − 1) = M/k × (1 + )
n−k
1
For k = n − 2, Repair Traffic: M/2 × (1 + )
n−2
limn→∞ Repair Traffic = M/2
.
Save the repair traffic by close to 50% when n is large.
.
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 15/20
40. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion Repair Traffic Analysis Cost Analysis Experiments
. Cost Analysis
Table : Monthly price plans (in US dollars) for Amazon S3 (US
Standard), Rackspace Cloud Files and Windows Azure Storage, as of
September, 2011.
Amazon S3 Rackspace Azure
Storage (per GB) $0.14 $0.15 $0.15
Date transfer in (per GB) free free free
Date transfer out (per GB) $0.12 $0.18 $0.15
PUT,POST (per 10K requests) $0.10 free $0.01
GET (per 10K requests) $0.01 free $0.01
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 16/20
41. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion Repair Traffic Analysis Cost Analysis Experiments
. Cost Analysis
Metadata of F-MSR
Metadata size = 160B; file size = several MBs
Overhead due to GET requests during repair
Assuming S3 plan in Sep 2011, n = 4, k = 2, file size = 4MB
Conventional repair: 0.427%
F-MSR repair: 0.854%
.
Overhead cost is low.
.
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 16/20
42. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion Repair Traffic Analysis Cost Analysis Experiments
. Experiments
NCCloud deployment
Single machine connected to a cloud-of-clouds
n = 4, k = 2
Coding schemes
Reed-Solomon-based RAID-6 vs. F-MSR
Metric
Response time
Cloud environments:
Local cloud: OpenStack Swift
Commercial cloud: multiple containers in Azure
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 17/20
43. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion Repair Traffic Analysis Cost Analysis Experiments
. Response Time: Local Cloud
F-MSR has higher response
time due to
encoding/decoding
overhead.
F-MSR has slightly less
response time in repair, due
to less data download
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 18/20
44. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion Repair Traffic Analysis Cost Analysis Experiments
. Response Time: Commercial Cloud
No distinct response time difference, as network fluctuations play a
. . . . . . . . . . . . . . . . . . . .
bigger role in actual response time. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 19/20
45. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion
. Conclusion & Unsolved Problems
Conclusion:
Propose an implementable design of F-MSR:
Preserve storage cost.
Use less repair traffic.
Do not require storage nodes to have encoding capabilities.
Build NCCloud, which realizes F-MSR
Source code:
http://ansrlab.cse.cuhk.edu.hk/software/nccloud/
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 20/20
46. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion
. Conclusion & Unsolved Problems
Unsolved problems:
Repair costs is high when n and k are large: As we mentioned
before (Click .. here ), F-MSR uses two-phrase checking, which
consumes a lot of checking costs in the current repair phrase.
Just as Reed-Solomon codes use Vandermonde Matrix to
ensure MDS property, a better algorithm is still seeking to
replace the check-after-trying approach.
The reason why F-MSR chooses to download chunks from all
(n − 1) nodes for repairing a file comes from an argument in
[1]: The more nodes we download chunks from, the lower
repair traffic is. However, [1]’s conclusion is based on a
homogeneity model, and NCCloud’s multi-cloud solution is
actually a heterogeneous environment. Such a basis may be
invalid.
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 20/20
47. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion
A.G. Dimakis, P.B. Godfrey, Y. Wu, M.J. Wainwright, and
K. Ramchandran.
Network coding for distributed storage systems.
Information Theory, IEEE Transactions on, 56(9):4539–4551,
2010.
A.G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh.
A survey on network codes for distributed storage.
Proceedings of the IEEE, 99(3):476–489, 2011.
A. Duminuco and E. Biersack.
A practical study of regenerating codes for peer-to-peer
backup systems.
In Distributed Computing Systems, 2009. ICDCS’09. 29th
IEEE International Conference on, pages 376–384. IEEE, 2009.
C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P. Gopalan,
J. Li, and S. Yekhanin.
Erasure coding in windows azure storage.
. . . . . . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
presented by Shuai YUAN FAST’12: NCCloud 20/20
48. 1. Background – 2. Solution – 3. Evaluation – 4. Conclusion
In USENIX Annual Technical Conference (USENIX ATC),
2012.
J.S. Plank et al.
A tutorial on reed-solomon coding for fault-tolerance in
raid-like systems.
Software Practice and Experience, 27(9):995–1012, 1997.
I.S. Reed and G. Solomon.
Polynomial codes over certain finite fields.
Journal of the Society for Industrial & Applied Mathematics,
8(2):300–304, 1960.
B. Sklar.
Reed-solomon codes.
Downloaded from URL http://www. informit.
com/content/images/art. sub.–sklar7.
sub.–reed-solomo-n/elementLinks/art. sub.–sklar7.
sub.–reed-solomon. pdf,(unknown pub date), pages 1–33,
2001. . . . . . . . . . . . . . . .
.. .. .. .. .. .. .. .. .. .. .. .. .. .. .. ..
.
..
. . . .
.. .. ..
presented by Shuai YUAN FAST’12: NCCloud 20/20