Data storage method based on RS (Reed-Solomon) erasure codes
A data storage and erasure code technology, applied in the field of information processing, can solve problems such as wasting space and increasing costs, and achieve the effects of reducing costs, ensuring efficiency, and saving storage space
Inactive Publication Date: 2010-09-22
SHANGHAI JIAO TONG UNIV
3 Cites 45 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention belongs to the technical field of information processing, relating to a data storage method based on RS (Reed-Solomon) erasure codes. The method comprises the following steps of: carrying out blocking processing and grouping processing on files to be stored; transmitting original data blocks of each data group to data nodes, and carrying out RS encoding by the data nodes so that each data group is increased with a plurality of redundant data blocks on the basis of the original data blocks; storing the encoded data blocks in the same data group on a plurality of machine racks, wherein the number of the data blocks in the same data group on the same machine rack does not exceed the number of the redundant data blocks; adopting the RS erasure codes to restore the data blocks when the data blocks in the stored files are damaged, and obtaining the restored data blocks. The invention saves a large amount of storage space on the basis of ensuring daily usage efficiency. The requirements for the reliability of data storage can be flexibly set according to the importance of the files. More abundant storage strategies can be provided by setting the number of backup files and encoding parameters, and the cost for data storage is greatly reduced.
Application Domain
Memory adressing/allocation/relocationStatic storage +1
Technology Topic
Computer hardwareInformation processing +5
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Travel network cell division method based on Simhash algorithm
Owner:SHAANXI NORMAL UNIV
Gathering and releasing device of whip antenna
Owner:NAT UNIV OF DEFENSE TECH
Timing synchronous receiving method and device thereof
Owner:DATANG MICROELECTRONICS TECH CO LTD
Distributed storage system and distributed storage method based on erasure coding mechanism
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Hyperspectral real-time detection method based on recursive analysis
Owner:HARBIN ENG UNIV
Classification and recommendation of technical efficacy words
- save storage space
- low cost
Method of encoding structured low density check code
Owner:BEIJING UNIV OF POSTS & TELECOMM +1
Multi-focus image fusion method based on compressive sensing
Owner:XIDIAN UNIV
De-block effect filtering device and method
Owner:昆山杰得微电子有限公司
Distributed cache method and system
Owner:浙江杭海新城控股集团有限公司