Coding Schemes for Distributed Storage Systems Min Ye Advisor: Alexander Barg ECE/ISR, University of Maryland

August 11, 2017

Motivation: Distributed Storage Systems (DSS)

• DSS spread data across thousands of storage nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

2/1

Motivation: Distributed Storage Systems (DSS)

• DSS spread data across thousands of storage nodes • Individual storage nodes fail frequently

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

2/1

Motivation: Distributed Storage Systems (DSS)

• DSS spread data across thousands of storage nodes • Individual storage nodes fail frequently • Need redundancy to protect data

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

2/1

Replication: large storage overhead

Can tolerate any 2 node failures Storage overhead = 3×

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

3/1

Erasure-Correcting Codes: optimal storage efficiency

Add 2 parity nodes to every 3 data nodes Form an (n = 5, k = 3) code

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

4/1

Erasure-Correcting codes: optimal storage efficiency

Can tolerate any 2 node failures Storage overhead = 1.67×

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

5/1

Disk I/O and network flow of the repair process Repair a failed node

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

6/1

Disk I/O and network flow of the repair process Repair a failed node

Access more nodes ⇒ greater number of disk I/O operations

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

6/1

Disk I/O and network flow of the repair process Repair a failed node

Access more nodes ⇒ greater number of disk I/O operations Download more data from functioning nodes ⇒ larger network flow Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

6/1

Compare Erasure Codes to Replication

Storage overhead Number of disk I/O (access) Network flow (bandwidth)

Min Ye, Ph.D. Dissertation Defense

Erasure Codes Small Large Large

Coding Schemes for Distributed Storage Systems

Replication Large Small Small

August 11, 2017

7/1

Compare Erasure Codes to Replication

Storage overhead Number of disk I/O (access) Network flow (bandwidth)

Erasure Codes Small Large Large

Replication Large Small Small

We prefer Erasure Codes due to their small storage overhead

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

7/1

Compare Erasure Codes to Replication

Storage overhead Number of disk I/O (access) Network flow (bandwidth)

Erasure Codes Small Large Large

Replication Large Small Small

We prefer Erasure Codes due to their small storage overhead

Want to improve the access and bandwidth of Erasure Codes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

7/1

Important metrics and operations Metric

Operation

locality/ access

repair

bandwidth/ communication

error correction

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

8/1

Important metrics and operations Operation

Metric 1

locality/ access bandwidth/ communication

repair

error correction

1 Locally Recoverable codes (local recovery)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

8/1

Important metrics and operations Operation

Metric 1

locality/ access

repair 2

bandwidth/ communication

error correction

1 Locally Recoverable codes (local recovery) 2 Regenerating codes (local recovery)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

8/1

Important metrics and operations Operation

Metric 1

locality/ access

repair

3 2

bandwidth/ communication

error correction

1 Locally Recoverable codes (local recovery) 2 Regenerating codes (local recovery) 3 LDPC codes (global recovery)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

8/1

Important metrics and operations Operation

Metric 1

locality/ access

repair

3 2

bandwidth/ communication

4

error correction

1 Locally Recoverable codes (local recovery) 2 Regenerating codes (local recovery) 3 LDPC codes (global recovery) 4 Fractional decoding (global recovery) Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

8/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F:

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F: • code length n

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F: • code length n • k data nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F: • code length n • k data nodes • r = n − k parity nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F: • code length n • k data nodes • r = n − k parity nodes • each codeword coordinate is a vector of dimension ` over F

Each Ci is a vector in F `

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F: • code length n • k data nodes • r = n − k parity nodes • each codeword coordinate is a vector of dimension ` over F

Each Ci is a vector in F ` • contents of any r nodes can be determined by the other k nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F: • code length n • k data nodes • r = n − k parity nodes • each codeword coordinate is a vector of dimension ` over F

Each Ci is a vector in F ` • contents of any r nodes can be determined by the other k nodes

• MDS scalar codes: each coordinate is a scalar in F

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F: • code length n • k data nodes • r = n − k parity nodes • each codeword coordinate is a vector of dimension ` over F

Each Ci is a vector in F ` • contents of any r nodes can be determined by the other k nodes

• MDS scalar codes: each coordinate is a scalar in F • View scalar codes as vector codes over some subfield of F

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

MDS codes

• (n, k, `) MDS array code (vector codes) over field F: • code length n • k data nodes • r = n − k parity nodes • each codeword coordinate is a vector of dimension ` over F

Each Ci is a vector in F ` • contents of any r nodes can be determined by the other k nodes

• MDS scalar codes: each coordinate is a scalar in F • View scalar codes as vector codes over some subfield of F • ` is the degree of the field extension

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

9/1

Main focus and background

• Main focus: The bandwidth of MDS codes for the repair task and error correction

task.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

10 / 1

Main focus and background

• Main focus: The bandwidth of MDS codes for the repair task and error correction

task. • Repair bandwidth: the minimum amount of data we need to download in order to

recover failed nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

10 / 1

Main focus and background

• Main focus: The bandwidth of MDS codes for the repair task and error correction

task. • Repair bandwidth: the minimum amount of data we need to download in order to

recover failed nodes • MDS codes with smallest possible repair bandwidth are called Minimum Storage

Regenerating (MSR) Codes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

10 / 1

Main contributions

• We give explicit constructions of MSR codes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

11 / 1

Main contributions

• We give explicit constructions of MSR codes • MSR codes exist, but explicit constructions were only available for some particular

parameters.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

11 / 1

Main contributions

• We give explicit constructions of MSR codes • MSR codes exist, but explicit constructions were only available for some particular

parameters. • Explicit construction of MSR codes for general parameters was an open problem.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

11 / 1

Main contributions

• We give explicit constructions of MSR codes • MSR codes exist, but explicit constructions were only available for some particular

parameters. • Explicit construction of MSR codes for general parameters was an open problem. • We give various explicit constructions of such codes for any given parameters.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

11 / 1

Main contributions

• We give explicit constructions of MSR codes • MSR codes exist, but explicit constructions were only available for some particular

parameters. • Explicit construction of MSR codes for general parameters was an open problem. • We give various explicit constructions of such codes for any given parameters. • The first explicit constructions for general parameters in the literature

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

11 / 1

Main contributions

• We give explicit constructions of MSR codes • MSR codes exist, but explicit constructions were only available for some particular

parameters. • Explicit construction of MSR codes for general parameters was an open problem. • We give various explicit constructions of such codes for any given parameters. • The first explicit constructions for general parameters in the literature

• We introduce the “Fractional decoding” problem: study the optimal bandwidth of

MDS codes for error correction task.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

11 / 1

Main contributions

• We give explicit constructions of MSR codes • MSR codes exist, but explicit constructions were only available for some particular

parameters. • Explicit construction of MSR codes for general parameters was an open problem. • We give various explicit constructions of such codes for any given parameters. • The first explicit constructions for general parameters in the literature

• We introduce the “Fractional decoding” problem: study the optimal bandwidth of

MDS codes for error correction task. • We give lower bound and explicit constructions that achieve the lower bound

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

11 / 1

Cut-set bound for MDS array codes • Cut-set bound for the repair of single node failure • (n, k, `) MDS array code over field F

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

12 / 1

Cut-set bound for MDS array codes • Cut-set bound for the repair of single node failure • (n, k, `) MDS array code over field F • connect to d surviving (helper) nodes to recover the failed node

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

12 / 1

Cut-set bound for MDS array codes • Cut-set bound for the repair of single node failure • (n, k, `) MDS array code over field F • connect to d surviving (helper) nodes to recover the failed node • the number of ‘downloaded’ symbols in F is called the repair bandwidth β

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

12 / 1

Cut-set bound for MDS array codes • Cut-set bound for the repair of single node failure • (n, k, `) MDS array code over field F • connect to d surviving (helper) nodes to recover the failed node • the number of ‘downloaded’ symbols in F is called the repair bandwidth β β≥

Min Ye, Ph.D. Dissertation Defense

d` d+1−k

(Dimakis et al., 2010)

Coding Schemes for Distributed Storage Systems

August 11, 2017

12 / 1

Cut-set bound for MDS array codes • Cut-set bound for the repair of single node failure • (n, k, `) MDS array code over field F • connect to d surviving (helper) nodes to recover the failed node • the number of ‘downloaded’ symbols in F is called the repair bandwidth β β≥

d` d+1−k

(Dimakis et al., 2010)

• The right-hand side is a decreasing function of d, thus β → min if d = n − 1

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

12 / 1

Cut-set bound for MDS array codes • Cut-set bound for the repair of single node failure • (n, k, `) MDS array code over field F • connect to d surviving (helper) nodes to recover the failed node • the number of ‘downloaded’ symbols in F is called the repair bandwidth β β≥

d` d+1−k

(Dimakis et al., 2010)

• The right-hand side is a decreasing function of d, thus β → min if d = n − 1

• Cut-set bound for the repair of multiple node failures • h failed nodes, d helper nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

12 / 1

Cut-set bound for MDS array codes • Cut-set bound for the repair of single node failure • (n, k, `) MDS array code over field F • connect to d surviving (helper) nodes to recover the failed node • the number of ‘downloaded’ symbols in F is called the repair bandwidth β β≥

d` d+1−k

(Dimakis et al., 2010)

• The right-hand side is a decreasing function of d, thus β → min if d = n − 1

• Cut-set bound for the repair of multiple node failures • h failed nodes, d helper nodes β≥

Min Ye, Ph.D. Dissertation Defense

dh` d+h−k

(Cadambe et al., 2013)

Coding Schemes for Distributed Storage Systems

August 11, 2017

12 / 1

Cut-set bound for MDS array codes • Cut-set bound for the repair of single node failure • (n, k, `) MDS array code over field F • connect to d surviving (helper) nodes to recover the failed node • the number of ‘downloaded’ symbols in F is called the repair bandwidth β β≥

d` d+1−k

(Dimakis et al., 2010)

• The right-hand side is a decreasing function of d, thus β → min if d = n − 1

• Cut-set bound for the repair of multiple node failures • h failed nodes, d helper nodes β≥

dh` d+h−k

(Cadambe et al., 2013)

• (h, d)-optimal repair property: if the lower bound can be achieved for the recovery

of any h failed nodes from any d helper nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

12 / 1

(1, d)-optimal repair property • Most common scenario: single node failure

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

13 / 1

(1, d)-optimal repair property • Most common scenario: single node failure • Most works devoted to MDS array codes with (1, d)-optimal repair property (MSR

codes)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

13 / 1

(1, d)-optimal repair property • Most common scenario: single node failure • Most works devoted to MDS array codes with (1, d)-optimal repair property (MSR

codes) • Explicit low rate (≤ 1/2) construction is known (Rashmi et al., ’11, Suh et al., ’11)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

13 / 1

(1, d)-optimal repair property • Most common scenario: single node failure • Most works devoted to MDS array codes with (1, d)-optimal repair property (MSR

codes) • Explicit low rate (≤ 1/2) construction is known (Rashmi et al., ’11, Suh et al., ’11) • High rate regime (> 1/2) • r ≤ 3: explicit construction of MDS codes with (1, n − 1)-optimal repair property available (Wang et al., ’11, Tamo et al., ’13, Papailiopoulos et al., ’13, Raviv et al., ’15) • r > 3: only existence proofs, over large enough finite fields (Tamo et al., ’13, etc.)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

13 / 1

(1, d)-optimal repair property • Most common scenario: single node failure • Most works devoted to MDS array codes with (1, d)-optimal repair property (MSR

codes) • Explicit low rate (≤ 1/2) construction is known (Rashmi et al., ’11, Suh et al., ’11) • High rate regime (> 1/2) • r ≤ 3: explicit construction of MDS codes with (1, n − 1)-optimal repair property available (Wang et al., ’11, Tamo et al., ’13, Papailiopoulos et al., ’13, Raviv et al., ’15) • r > 3: only existence proofs, over large enough finite fields (Tamo et al., ’13, etc.) • Various papers relaxed the condition of (1, d)-optimal repair property – only

require optimal repair of systematic nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

13 / 1

(1, d)-optimal repair property • Most common scenario: single node failure • Most works devoted to MDS array codes with (1, d)-optimal repair property (MSR

codes) • Explicit low rate (≤ 1/2) construction is known (Rashmi et al., ’11, Suh et al., ’11) • High rate regime (> 1/2) • r ≤ 3: explicit construction of MDS codes with (1, n − 1)-optimal repair property available (Wang et al., ’11, Tamo et al., ’13, Papailiopoulos et al., ’13, Raviv et al., ’15) • r > 3: only existence proofs, over large enough finite fields (Tamo et al., ’13, etc.) • Various papers relaxed the condition of (1, d)-optimal repair property – only

require optimal repair of systematic nodes • Even under this relaxed requirement, no explicit construction are known for rate larger

than 1/2 and r > 3

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

13 / 1

(1, d)-optimal repair property • Most common scenario: single node failure • Most works devoted to MDS array codes with (1, d)-optimal repair property (MSR

codes) • Explicit low rate (≤ 1/2) construction is known (Rashmi et al., ’11, Suh et al., ’11) • High rate regime (> 1/2) • r ≤ 3: explicit construction of MDS codes with (1, n − 1)-optimal repair property available (Wang et al., ’11, Tamo et al., ’13, Papailiopoulos et al., ’13, Raviv et al., ’15) • r > 3: only existence proofs, over large enough finite fields (Tamo et al., ’13, etc.) • Various papers relaxed the condition of (1, d)-optimal repair property – only

require optimal repair of systematic nodes • Even under this relaxed requirement, no explicit construction are known for rate larger

than 1/2 and r > 3 • High-rate constructions are the most important in practice: Facebook employs

MDS code with rate 0.71 and 4 parity nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

13 / 1

Our results: Explicit high-rate constructions • We solve the open problem of constructing explicit high-rate MSR codes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

14 / 1

Our results: Explicit high-rate constructions • We solve the open problem of constructing explicit high-rate MSR codes • Start from basic case: explicit constructions of MDS codes with (1, n − 1)-optimal

repair property (the first explicit high-rate construction for r > 3 in the literature)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

14 / 1

Our results: Explicit high-rate constructions • We solve the open problem of constructing explicit high-rate MSR codes • Start from basic case: explicit constructions of MDS codes with (1, n − 1)-optimal

repair property (the first explicit high-rate construction for r > 3 in the literature) • Simple extension: explicit constructions of MDS codes with (1, d)-optimal repair

property, k ≤ d ≤ n − 1

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

14 / 1

Our results: Explicit high-rate constructions • We solve the open problem of constructing explicit high-rate MSR codes • Start from basic case: explicit constructions of MDS codes with (1, n − 1)-optimal

repair property (the first explicit high-rate construction for r > 3 in the literature) • Simple extension: explicit constructions of MDS codes with (1, d)-optimal repair

property, k ≤ d ≤ n − 1 • Further extension: Given any n and r, we present explicit (n, k = n − r, `) MDS

array codes with universal (h, d)-optimal repair property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

14 / 1

Our results: Explicit high-rate constructions • We solve the open problem of constructing explicit high-rate MSR codes • Start from basic case: explicit constructions of MDS codes with (1, n − 1)-optimal

repair property (the first explicit high-rate construction for r > 3 in the literature) • Simple extension: explicit constructions of MDS codes with (1, d)-optimal repair

property, k ≤ d ≤ n − 1 • Further extension: Given any n and r, we present explicit (n, k = n − r, `) MDS

array codes with universal (h, d)-optimal repair property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously. • Our construction is available for any rate, any number of parity nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

14 / 1

Our results: Explicit high-rate constructions • We solve the open problem of constructing explicit high-rate MSR codes • Start from basic case: explicit constructions of MDS codes with (1, n − 1)-optimal

repair property (the first explicit high-rate construction for r > 3 in the literature) • Simple extension: explicit constructions of MDS codes with (1, d)-optimal repair

property, k ≤ d ≤ n − 1 • Further extension: Given any n and r, we present explicit (n, k = n − r, `) MDS

array codes with universal (h, d)-optimal repair property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously. • Our construction is available for any rate, any number of parity nodes • The only explicit construction for h > 1 in the literature

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

14 / 1

Our results: Explicit high-rate constructions • We solve the open problem of constructing explicit high-rate MSR codes • Start from basic case: explicit constructions of MDS codes with (1, n − 1)-optimal

repair property (the first explicit high-rate construction for r > 3 in the literature) • Simple extension: explicit constructions of MDS codes with (1, d)-optimal repair

property, k ≤ d ≤ n − 1 • Further extension: Given any n and r, we present explicit (n, k = n − r, `) MDS

array codes with universal (h, d)-optimal repair property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously. • Our construction is available for any rate, any number of parity nodes • The only explicit construction for h > 1 in the literature • Can optimally recover any number of erasures from any set of helper nodes. Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

14 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes • (n, k = n − r, ` = rn ) MDS array code which can optimally repair any single node

failure from all the other surviving nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

15 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes • (n, k = n − r, ` = rn ) MDS array code which can optimally repair any single node

failure from all the other surviving nodes • Ci = (ci,0 , ci,1 , . . . , ci.`−1 )T

Min Ye, Ph.D. Dissertation Defense

c1,0 c1,1 .. .

c2,0 c2,1 .. .

c1,`−1

c2,`−1

... ... .. . ...

cn,0 cn,1 .. . cn,`−1

Coding Schemes for Distributed Storage Systems

August 11, 2017

15 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes • (n, k = n − r, ` = rn ) MDS array code which can optimally repair any single node

failure from all the other surviving nodes • Ci = (ci,0 , ci,1 , . . . , ci.`−1 )T

c1,0 c1,1 .. .

c2,0 c2,1 .. .

c1,`−1

c2,`−1

... ... .. . ...

cn,0 cn,1 .. . cn,`−1

• Each row forms a Generalized Reed-Solomon code with different evaluation points

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

15 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes • (n, k = n − r, ` = rn ) MDS array code which can optimally repair any single node

failure from all the other surviving nodes • Ci = (ci,0 , ci,1 , . . . , ci.`−1 )T

c1,0 c1,1 .. .

c2,0 c2,1 .. .

c1,`−1

c2,`−1

... ... .. . ...

cn,0 cn,1 .. . cn,`−1

• Each row forms a Generalized Reed-Solomon code with different evaluation points

• Evaluation points λi,j , 1 ≤ i ≤ n, 0 ≤ j ≤ r − 1: rn distinct elements in F

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

15 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes • (n, k = n − r, ` = rn ) MDS array code which can optimally repair any single node

failure from all the other surviving nodes • Ci = (ci,0 , ci,1 , . . . , ci.`−1 )T

c1,0 c1,1 .. .

c2,0 c2,1 .. .

c1,`−1

c2,`−1

... ... .. . ...

cn,0 cn,1 .. . cn,`−1

• Each row forms a Generalized Reed-Solomon code with different evaluation points

• Evaluation points λi,j , 1 ≤ i ≤ n, 0 ≤ j ≤ r − 1: rn distinct elements in F • F: any finite field with size |F| ≥ rn

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

15 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes

• ` = rn (r-ary expansion idea, Cadambe et al., ’11, Tamo et al., ’13)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

16 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes

• ` = rn (r-ary expansion idea, Cadambe et al., ’11, Tamo et al., ’13) • For a = 0, 1, . . . , ` − 1, write r-ary expansion a = (a1 , a2 , . . . , an )

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

16 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes

• ` = rn (r-ary expansion idea, Cadambe et al., ’11, Tamo et al., ’13) • For a = 0, 1, . . . , ` − 1, write r-ary expansion a = (a1 , a2 , . . . , an ) • Evaluation points for a-th row: (λ1,a1 , λ2,a2 , . . . , λn,an )

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

t = 0, 1, . . . , r − 1

August 11, 2017

16 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes

• ` = rn (r-ary expansion idea, Cadambe et al., ’11, Tamo et al., ’13) • For a = 0, 1, . . . , ` − 1, write r-ary expansion a = (a1 , a2 , . . . , an ) • Evaluation points for a-th row: (λ1,a1 , λ2,a2 , . . . , λn,an )

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1

• MDS property follows from the fact that each row is an MDS code

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

16 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes

• ` = rn (r-ary expansion idea, Cadambe et al., ’11, Tamo et al., ’13) • For a = 0, 1, . . . , ` − 1, write r-ary expansion a = (a1 , a2 , . . . , an ) • Evaluation points for a-th row: (λ1,a1 , λ2,a2 , . . . , λn,an )

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1

• MDS property follows from the fact that each row is an MDS code • Low-complexity encoding, update and repair procedures

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

16 / 1

Construction 1: (1, n − 1)-optimal repair MDS codes

• ` = rn (r-ary expansion idea, Cadambe et al., ’11, Tamo et al., ’13) • For a = 0, 1, . . . , ` − 1, write r-ary expansion a = (a1 , a2 , . . . , an ) • Evaluation points for a-th row: (λ1,a1 , λ2,a2 , . . . , λn,an )

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1

• MDS property follows from the fact that each row is an MDS code • Low-complexity encoding, update and repair procedures • (1, n − 1)-optimal repair: can recover a column by downloading `/r elements of F

from each of the other columns

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

16 / 1

(1, n − 1)-optimal repair property

• a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an )

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

17 / 1

(1, n − 1)-optimal repair property

• a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an ) •

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

t = 0, 1, . . . , r − 1

August 11, 2017

17 / 1

(1, n − 1)-optimal repair property

• a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an ) •

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1



λti,ai ci,a +

X

λtj,aj cj,a = 0

j6=i

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

17 / 1

(1, n − 1)-optimal repair property

• a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an ) •

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1



λti,ai ci,a +

X

λtj,aj cj,a = 0

j6=i



λti,u ci,a(i,u) +

X

λtj,aj cj,a(i,u) = 0,

u = 0, 1, . . . , r − 1

j6=i

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

17 / 1

(1, n − 1)-optimal repair property

• a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an ) •

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1



λti,ai ci,a +

X

λtj,aj cj,a = 0

j6=i



λti,u ci,a(i,u) +

X

λtj,aj cj,a(i,u) = 0,

u = 0, 1, . . . , r − 1

j6=i

• r−1 X u=0

Min Ye, Ph.D. Dissertation Defense

λti,u ci,a(i,u) +

r−1 X X

λtj,aj cj,a(i,u) = 0

u=0 j6=i

Coding Schemes for Distributed Storage Systems

August 11, 2017

17 / 1

(1, n − 1)-optimal repair property

r−1 X

λti,u ci,a(i,u) +

r−1 XX ( λtj,aj cj,a(i,u) ) = 0, j6=i

u=0

     |  +

X j6=i

    |

Min Ye, Ph.D. Dissertation Defense

t = 0, 1, . . . , r − 1

u=0

1 λi,0 .. . λr−1 i,0

... ... .. . ...

1 λi,1 .. . λr−1 i,1

1



λi,r−1 .. . λr−1 i,r−1

   

{z

Vandermonde, rank = r

1 λj,aj .. . λr−1 j,aj

1 λj,aj .. . λr−1 j,aj {z

... ... .. . ...

aligned, rank = 1

1 λj,aj .. . λr−1 j,aj

}|

ci,a(i,0) ci,a(i,1) .. .

    

ci,a(i,r−1) {z }

desired information

    

cj,a(i,0) cj,a(i,1) .. .

    

=0

cj,a(i,r−1) }

Coding Schemes for Distributed Storage Systems

August 11, 2017

18 / 1

(1, n − 1)-optimal repair property

r−1 X

λti,u ci,a(i,u) +

j6=i

u=0

     r−1 X

r−1 XX ( λtj,aj cj,a(i,u) ) = 0,

cj,a(i,u)

|

u=0

 +

X j6=i

    |

Min Ye, Ph.D. Dissertation Defense

t = 0, 1, . . . , r − 1

u=0

1 λi,0 .. . λr−1 i,0

... ... .. . ...

1 λi,1 .. . λr−1 i,1

1



λi,r−1 .. . λr−1 i,r−1

   

{z

Vandermonde, rank = r

1 λj,aj .. . λr−1 j,aj

1 λj,aj .. . λr−1 j,aj {z

... ... .. . ...

aligned, rank = 1

1 λj,aj .. . λr−1 j,aj

}|

ci,a(i,0) ci,a(i,1) .. .

    

ci,a(i,r−1) {z }

desired information

    

cj,a(i,0) cj,a(i,1) .. .

    

=0

cj,a(i,r−1) }

Coding Schemes for Distributed Storage Systems

August 11, 2017

19 / 1

(1, n − 1)-optimal repair property

• ci,a(i,0) , ci,a(i,1) , . . . , ci,a(i,r−1) can be determined by {

Min Ye, Ph.D. Dissertation Defense

Pr−1

Coding Schemes for Distributed Storage Systems

u=0

cj,a(i,u) }j6=i

August 11, 2017

20 / 1

(1, n − 1)-optimal repair property

• ci,a(i,0) , ci,a(i,1) , . . . , ci,a(i,r−1) can be determined by {

Pr−1 u=0

cj,a(i,u) }j6=i

• ` elements in Ci : partition into `/r groups of size r

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

20 / 1

(1, n − 1)-optimal repair property

• ci,a(i,0) , ci,a(i,1) , . . . , ci,a(i,r−1) can be determined by {

Pr−1 u=0

cj,a(i,u) }j6=i

• ` elements in Ci : partition into `/r groups of size r • Each group can be determined by downloading a scalar in F from each of the

other nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

20 / 1

(1, n − 1)-optimal repair property

• ci,a(i,0) , ci,a(i,1) , . . . , ci,a(i,r−1) can be determined by {

Pr−1 u=0

cj,a(i,u) }j6=i

• ` elements in Ci : partition into `/r groups of size r • Each group can be determined by downloading a scalar in F from each of the

other nodes • In total: only need to download `/r elements of F from each of the other nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

20 / 1

Construction 2: (1, d)-optimal repair MDS codes • s = d + 1 − k, Construction 1 is a special case of Construction 2

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

21 / 1

Construction 2: (1, d)-optimal repair MDS codes • s = d + 1 − k, Construction 1 is a special case of Construction 2 • (n, k = n − r, ` = sn ) MDS array code which can optimally repair any single erasure

from any d helper nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

21 / 1

Construction 2: (1, d)-optimal repair MDS codes • s = d + 1 − k, Construction 1 is a special case of Construction 2 • (n, k = n − r, ` = sn ) MDS array code which can optimally repair any single erasure

from any d helper nodes • Ci = (ci,0 , ci,1 , . . . , ci.`−1 )T

Min Ye, Ph.D. Dissertation Defense

c1,0 c1,1 .. .

c2,0 c2,1 .. .

c1,`−1

c2,`−1

... ... .. . ...

cn,0 cn,1 .. . cn,`−1

Coding Schemes for Distributed Storage Systems

August 11, 2017

21 / 1

Construction 2: (1, d)-optimal repair MDS codes • s = d + 1 − k, Construction 1 is a special case of Construction 2 • (n, k = n − r, ` = sn ) MDS array code which can optimally repair any single erasure

from any d helper nodes • Ci = (ci,0 , ci,1 , . . . , ci.`−1 )T

c1,0 c1,1 .. .

c2,0 c2,1 .. .

c1,`−1

c2,`−1

... ... .. . ...

cn,0 cn,1 .. . cn,`−1

• Each row forms a Generalized Reed-Solomon code with different evaluation points

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

21 / 1

Construction 2: (1, d)-optimal repair MDS codes • s = d + 1 − k, Construction 1 is a special case of Construction 2 • (n, k = n − r, ` = sn ) MDS array code which can optimally repair any single erasure

from any d helper nodes • Ci = (ci,0 , ci,1 , . . . , ci.`−1 )T

c1,0 c1,1 .. .

c2,0 c2,1 .. .

c1,`−1

c2,`−1

... ... .. . ...

cn,0 cn,1 .. . cn,`−1

• Each row forms a Generalized Reed-Solomon code with different evaluation points • Evaluation points λi,j , 1 ≤ i ≤ n, 0 ≤ j ≤ s − 1: sn distinct elements in F

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

21 / 1

Construction 2: (1, d)-optimal repair MDS codes • s = d + 1 − k, Construction 1 is a special case of Construction 2 • (n, k = n − r, ` = sn ) MDS array code which can optimally repair any single erasure

from any d helper nodes • Ci = (ci,0 , ci,1 , . . . , ci.`−1 )T

c1,0 c1,1 .. .

c2,0 c2,1 .. .

c1,`−1

c2,`−1

... ... .. . ...

cn,0 cn,1 .. . cn,`−1

• Each row forms a Generalized Reed-Solomon code with different evaluation points • Evaluation points λi,j , 1 ≤ i ≤ n, 0 ≤ j ≤ s − 1: sn distinct elements in F • F: any finite field with size |F| ≥ sn

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

21 / 1

Construction 2: (1, d)-optimal repair MDS codes

• s = d + 1 − k, ` = sn

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

22 / 1

Construction 2: (1, d)-optimal repair MDS codes

• s = d + 1 − k, ` = sn • For a = 0, 1, . . . , ` − 1, write s-ary expansion a = (a1 , a2 , . . . , an )

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

22 / 1

Construction 2: (1, d)-optimal repair MDS codes

• s = d + 1 − k, ` = sn • For a = 0, 1, . . . , ` − 1, write s-ary expansion a = (a1 , a2 , . . . , an ) • Evaluation points for a-th row: (λ1,a1 , λ2,a2 , . . . , λn,an )

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

t = 0, 1, . . . , r − 1

August 11, 2017

22 / 1

Construction 2: (1, d)-optimal repair MDS codes

• s = d + 1 − k, ` = sn • For a = 0, 1, . . . , ` − 1, write s-ary expansion a = (a1 , a2 , . . . , an ) • Evaluation points for a-th row: (λ1,a1 , λ2,a2 , . . . , λn,an )

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1

• MDS property follows from the fact that each row is an MDS code

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

22 / 1

Construction 2: (1, d)-optimal repair MDS codes

• s = d + 1 − k, ` = sn • For a = 0, 1, . . . , ` − 1, write s-ary expansion a = (a1 , a2 , . . . , an ) • Evaluation points for a-th row: (λ1,a1 , λ2,a2 , . . . , λn,an )

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1

• MDS property follows from the fact that each row is an MDS code • Low-complexity encoding, update and repair procedures

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

22 / 1

Construction 2: (1, d)-optimal repair MDS codes

• s = d + 1 − k, ` = sn • For a = 0, 1, . . . , ` − 1, write s-ary expansion a = (a1 , a2 , . . . , an ) • Evaluation points for a-th row: (λ1,a1 , λ2,a2 , . . . , λn,an )

λt1,a1 c1,a + λt2,a2 c2,a + · · · + λtn,an cn,a = 0,

t = 0, 1, . . . , r − 1

• MDS property follows from the fact that each row is an MDS code • Low-complexity encoding, update and repair procedures • (1, d)-optimal repair property: • given any set of d helper nodes • can recover a column by downloading `/s elements of F from each of the d helper nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

22 / 1

(1, d)-optimal repair property • a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an )

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

23 / 1

(1, d)-optimal repair property • a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an ) •

λt1,a1 c1,a +

n X

λtj,aj cj,a = 0,

t = 0, 1, . . . , r − 1

j=2

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

23 / 1

(1, d)-optimal repair property • a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an ) •

λt1,a1 c1,a +

n X

λtj,aj cj,a = 0,

t = 0, 1, . . . , r − 1

j=2



λt1,u c1,a(1,u) +

n X

λtj,aj cj,a(1,u) = 0,

u = 0, 1, . . . , s − 1

j=2

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

23 / 1

(1, d)-optimal repair property • a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an ) •

λt1,a1 c1,a +

n X

λtj,aj cj,a = 0,

t = 0, 1, . . . , r − 1

j=2



λt1,u c1,a(1,u) +

n X

λtj,aj cj,a(1,u) = 0,

u = 0, 1, . . . , s − 1

j=2

• s−1 X u=0

Min Ye, Ph.D. Dissertation Defense

λt1,u c1,a(1,u) +

s−1 X n X

λtj,aj cj,a(1,u) = 0

u=0 j=2

Coding Schemes for Distributed Storage Systems

August 11, 2017

23 / 1

(1, d)-optimal repair property • a(i, u) = (a1 , a2 , . . . , ai−1 , u, ai+1 , ai+2 , . . . , an ) •

λt1,a1 c1,a +

n X

λtj,aj cj,a = 0,

t = 0, 1, . . . , r − 1

j=2



λt1,u c1,a(1,u) +

n X

λtj,aj cj,a(1,u) = 0,

u = 0, 1, . . . , s − 1

j=2

• s−1 X

λt1,u c1,a(1,u) +

u=0

s−1 X n X

λtj,aj cj,a(1,u) = 0

u=0 j=2

• s−1 X

λt1,u c1,a(1,u) +

u=0

n X j=2

s−1 X λtj,aj ( cj,a(1,u) ) = 0,

t = 0, 1, . . . , r − 1

u=0

|

{z

}

,µj,a

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

23 / 1

(1, d)-optimal repair property

s−1 X

λt1,u c1,a(1,u) +

u=0

Min Ye, Ph.D. Dissertation Defense

n X

λtj,aj µj,a = 0,

t = 0, 1, . . . , r − 1

j=2

Coding Schemes for Distributed Storage Systems

August 11, 2017

24 / 1

(1, d)-optimal repair property

s−1 X

λt1,u c1,a(1,u) +

u=0

n X

λtj,aj µj,a = 0,

t = 0, 1, . . . , r − 1

j=2

    

1 λ1,0 .. . λr−1 1,0

|

1



λ1,s−1 .. . λr−1 1,s−1

   

{z

1

1

 λ2,a2  + .  .. λr−1 2,a2

λ3,a3 .. . λr−1 3,a3

... ... .. . ...

c1,a(1,0) c1,a(1,1) .. .

    

c1,a(1,s−1) }

r≥s, full column rank



Min Ye, Ph.D. Dissertation Defense

... ... .. . ...

1 λ1,1 .. . λr−1 1,1

1



λn,an .. . λr−1 n,an

   

µ2,a µ3,a .. . µn,a

Coding Schemes for Distributed Storage Systems

   =0 

August 11, 2017

24 / 1

(1, d)-optimal repair property

s−1 X

λt1,u c1,a(1,u) +

u=0

n X

λtj,aj µj,a = 0,

t = 0, 1, . . . , r − 1

j=2

    

1 λ1,0 .. . λr−1 1,0

|

... ... .. . ...

1 λ1,1 .. . λr−1 1,1

1



λ1,s−1 .. . λr−1 1,s−1

   

{z

1

1

 λ2,a2  + .  .. λr−1 2,a2

λ3,a3 .. . λr−1 3,a3

... ... .. . ...

    

c1,a(1,s−1) }

r≥s, full column rank



c1,a(1,0) c1,a(1,1) .. .

1



λn,an .. . λr−1 n,an

   

µ2,a µ3,a .. . µn,a

   =0 

Want to show that (µ2,a , µ3,a , . . . , µn,a ) forms an MDS code with dimension d.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

24 / 1

(1, d)-optimal repair property • r−s=n−1−d

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

25 / 1

(1, d)-optimal repair property • r−s=n−1−d • Want to find an (r − s) × r matrix P such that

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

25 / 1

(1, d)-optimal repair property • r−s=n−1−d • Want to find an (r − s) × r matrix P such that •

   P 

1 λ1,0 .. . λr−1 1,0

|

1 ... λ1,1 . . . .. .. . . λr−1 ... 1,1 {z

1



λ1,s−1 .. . λr−1 1,s−1

   

1

 λ2,a2  +P .  .. λr−1 2,a2 |

1 λ3,a3 .. . λr−1 3,a3 {z

... ... .. . ...

1 λn,an .. . λr−1 n,an

parity check matrix of an MDS code

Min Ye, Ph.D. Dissertation Defense

    

c1,a(1,s−1) }

=0



c1,a(1,0) c1,a(1,1) .. .



µ2,a   µ3,a   .   .. µn,a }

Coding Schemes for Distributed Storage Systems

   =0 

August 11, 2017

25 / 1

(1, d)-optimal repair property

• Each row of P: coefficients of a polynomial of degree less than r

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

26 / 1

(1, d)-optimal repair property

• Each row of P: coefficients of a polynomial of degree less than r •

p0 (x) =

s−1 Y (x − λ1,u ),

degree s

u=0

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

26 / 1

(1, d)-optimal repair property

• Each row of P: coefficients of a polynomial of degree less than r •

p0 (x) =

s−1 Y (x − λ1,u ),

degree s

u=0

p1 (x) = xp0 (x),

Min Ye, Ph.D. Dissertation Defense

degree s + 1

Coding Schemes for Distributed Storage Systems

August 11, 2017

26 / 1

(1, d)-optimal repair property

• Each row of P: coefficients of a polynomial of degree less than r •

p0 (x) =

s−1 Y (x − λ1,u ),

degree s

u=0

Min Ye, Ph.D. Dissertation Defense

p1 (x) = xp0 (x),

degree s + 1

p2 (x) = x2 p0 (x),

degree s + 2

Coding Schemes for Distributed Storage Systems

August 11, 2017

26 / 1

(1, d)-optimal repair property

• Each row of P: coefficients of a polynomial of degree less than r •

p0 (x) =

s−1 Y (x − λ1,u ),

degree s

u=0

p1 (x) = xp0 (x),

degree s + 1

p2 (x) = x2 p0 (x),

degree s + 2 .. .

pr−s−1 (x) = xr−s−1 p0 (x),

Min Ye, Ph.D. Dissertation Defense

degree r − 1

Coding Schemes for Distributed Storage Systems

August 11, 2017

26 / 1

(1, d)-optimal repair property

• Each row of P: coefficients of a polynomial of degree less than r •

p0 (x) =

s−1 Y (x − λ1,u ),

degree s

u=0

p1 (x) = xp0 (x),

degree s + 1

p2 (x) = x2 p0 (x),

degree s + 2 .. .

pr−s−1 (x) = xr−s−1 p0 (x),

degree r − 1

• Write

pi (x) = pi,0 + pi,1 x + pi,2 x2 + · · · + pi,r−1 xr−1

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

26 / 1

(1, d)-optimal repair property



   P= 

Min Ye, Ph.D. Dissertation Defense

p0,0 p1,0 .. .

p0,1 p1,1 .. .

p0,2 p1,2 .. .

pr−s−1,0

pr−s−1,1

pr−s−1,2

... ... .. . ...

Coding Schemes for Distributed Storage Systems

p0,r−1 p1,r−1 .. .

    

pr−s−1,r−1

August 11, 2017

27 / 1

(1, d)-optimal repair property



   P= 

p0,0 p1,0 .. .

p0,1 p1,1 .. .

p0,2 p1,2 .. .

pr−s−1,0

pr−s−1,1

pr−s−1,2

... ... .. . ...



p0,r−1 p1,r−1 .. .

   

pr−s−1,r−1



    P  

1 x x2 .. .



      =    

xr−1

Min Ye, Ph.D. Dissertation Defense



p0 (x) p1 (x) p2 (x) .. . pr−s−1 (x)





      =    

p0 (x) xp0 (x) x2 p0 (x) .. . xr−s−1 p0 (x)

Coding Schemes for Distributed Storage Systems

      

August 11, 2017

27 / 1

(1, d)-optimal repair property •

p0 (x) =

s−1 Y (x − λ1,u ) u=0



   P     = 

1 λ1,0 .. . λr−1 1,0

1 λ1,1 .. . λr−1 1,1

p0 (λ1,0 ) λ1,0 p0 (λ1,0 ) .. . λr−s−1 p0 (λ1,0 ) 1,0

... ... .. . ...

1



λ1,s−1 .. . λr−1 1,s−1

   

p0 (λ1,1 ) λ1,1 p0 (λ1,1 ) .. . r−s−1 λ1,1 p0 (λ1,1 )

... ... .. . ...

p0 (λ1,s−1 ) λ1,s−1 p0 (λ1,s−1 ) .. . r−s−1 λ1,s−1 p0 (λ1,s−1 )

    

=0

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

28 / 1

(1, d)-optimal repair property •

p0 (x) =

s−1 Y (x − λ1,u ) u=0





1

1

 λ2,a2 λ3,a3  P . ..  .. . λr−1 λr−1 2,a2 3,a3  p0 (λ2,a2 )  λ2,a2 p0 (λ2,a2 )  = ..  . λr−s−1 p0 (λ2,a2 ) 2,a2 |

... ... .. . ...

1



λn,an .. . λr−1 n,an

   

p0 (λ3,a3 ) λ3,a3 p0 (λ3,a3 ) .. . r−s−1 λ3,a p0 (λ3,a3 ) 3 {z

... ... .. . ...

p0 (λn,an ) λn,an p0 (λn,an ) .. . r−s−1 λn,a p0 (λn,an ) n

the parity matrix of a GRS code with length n − 1 and dimension d

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

     }

August 11, 2017

29 / 1

(1, d)-optimal repair property •

   P 

1 λ1,0 .. . λr−1 1,0

|

1 ... λ1,1 . . . .. .. . . λr−1 ... 1,1 {z

1



λ1,s−1 .. . λr−1 1,s−1

   

1

 λ2,a2  +P .  .. λr−1 2,a2 |

1 λ3,a3 .. . λr−1 3,a3 {z

... ... .. . ...

   

c1,a(1,s−1)

1



λn,an .. . λr−1 n,an

   

parity check matrix of a GRS code

Min Ye, Ph.D. Dissertation Defense



}

=0



c1,a(1,0) c1,a(1,1) .. .

µ2,a µ3,a .. . µn,a

   =0 

}

Coding Schemes for Distributed Storage Systems

August 11, 2017

30 / 1

(1, d)-optimal repair property •

   P 

1 λ1,0 .. . λr−1 1,0

|

1 ... λ1,1 . . . .. .. . . λr−1 ... 1,1 {z

1



λ1,s−1 .. . λr−1 1,s−1

   

1

 λ2,a2  +P .  .. λr−1 2,a2 |

1 λ3,a3 .. . λr−1 3,a3 {z

... ... .. . ...

    

c1,a(1,s−1) }

=0



c1,a(1,0) c1,a(1,1) .. .

1



λn,an .. . λr−1 n,an

   

parity check matrix of a GRS code

µ2,a µ3,a .. . µn,a

   =0 

}

• (µ2,a , µ3,a , . . . , µn,a ) forms an MDS code: can correct errors

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

30 / 1

(1, d)-optimal repair property •

   P 

1 λ1,0 .. . λr−1 1,0

|

1 ... λ1,1 . . . .. .. . . λr−1 ... 1,1 {z

1



λ1,s−1 .. . λr−1 1,s−1

   

1

 λ2,a2  +P .  .. λr−1 2,a2 |

1 λ3,a3 .. . λr−1 3,a3 {z

... ... .. . ...

    

c1,a(1,s−1) }

=0



c1,a(1,0) c1,a(1,1) .. .

1



λn,an .. . λr−1 n,an

   

parity check matrix of a GRS code

µ2,a µ3,a .. . µn,a

   =0 

}

• (µ2,a , µ3,a , . . . , µn,a ) forms an MDS code: can correct errors • Optimal error resilience capability

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

30 / 1

Construction 3: Optimally recover any erasure pattern

• Set s = lcm(1, 2, . . . , n − k) in Construction 2

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

31 / 1

Construction 3: Optimally recover any erasure pattern

• Set s = lcm(1, 2, . . . , n − k) in Construction 2 • (n, k, ` = sn ) MDS array codes with the (h, d)-optimal repair property for all

1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

31 / 1

Construction 3: Optimally recover any erasure pattern

• Set s = lcm(1, 2, . . . , n − k) in Construction 2 • (n, k, ` = sn ) MDS array codes with the (h, d)-optimal repair property for all

1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously • Can optimally recover any erasure pattern from any set of helper nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

31 / 1

Construction 3: Optimally recover any erasure pattern

• Set s = lcm(1, 2, . . . , n − k) in Construction 2 • (n, k, ` = sn ) MDS array codes with the (h, d)-optimal repair property for all

1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously • Can optimally recover any erasure pattern from any set of helper nodes • Can be constructed over any field F with size |F| ≥ sn

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

31 / 1

Construction 3: Optimally recover any erasure pattern

• Set s = lcm(1, 2, . . . , n − k) in Construction 2 • (n, k, ` = sn ) MDS array codes with the (h, d)-optimal repair property for all

1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously • Can optimally recover any erasure pattern from any set of helper nodes • Can be constructed over any field F with size |F| ≥ sn • Low-complexity encoding, update and repair procedures

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

31 / 1

Construction 3: Optimally recover any erasure pattern

• Set s = lcm(1, 2, . . . , n − k) in Construction 2 • (n, k, ` = sn ) MDS array codes with the (h, d)-optimal repair property for all

1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously • Can optimally recover any erasure pattern from any set of helper nodes • Can be constructed over any field F with size |F| ≥ sn • Low-complexity encoding, update and repair procedures • Optimal error resilience in the repair process

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

31 / 1

Systematic generator VS. non-systematic parity check

• k × n systematic generator matrix

    

Min Ye, Ph.D. Dissertation Defense

I 0 .. . 0

0 I .. . 0

... ... .. . ...

0 0 .. . I

A1,1 A1,2 .. . A1,k

A2,1 A2,2 .. . A2,k

... ... .. . ...

Coding Schemes for Distributed Storage Systems

Ar,1 Ar,2 .. . Ar,k

    

August 11, 2017

32 / 1

Systematic generator VS. non-systematic parity check

• k × n systematic generator matrix

    

I 0 .. . 0

0 I .. . 0

... ... .. . ...

0 0 .. . I

A1,1 A1,2 .. . A1,k

A2,1 A2,2 .. . A2,k

... ... .. . ...

Ar,1 Ar,2 .. . Ar,k

    

• Every square submatrix needs to be invertible. Optimally repair systematic nodes.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

32 / 1

Systematic generator VS. non-systematic parity check

• k × n systematic generator matrix

    

I 0 .. . 0

0 I .. . 0

... ... .. . ...

0 0 .. . I

A1,1 A1,2 .. . A1,k

A2,1 A2,2 .. . A2,k

... ... .. . ...

Ar,1 Ar,2 .. . Ar,k

    

• Every square submatrix needs to be invertible. Optimally repair systematic nodes. • r × n parity check matrix

    

Min Ye, Ph.D. Dissertation Defense

A1,1 A2,1 .. . Ar,1

A1,2 A2,2 .. . Ar,2

A1,3 A2,3 .. . Ar,3

... ... .. . ...

A1,n A2,n .. . Ar,n

Coding Schemes for Distributed Storage Systems

    

August 11, 2017

32 / 1

Systematic generator VS. non-systematic parity check

• k × n systematic generator matrix

    

I 0 .. . 0

0 I .. . 0

... ... .. . ...

0 0 .. . I

A1,1 A1,2 .. . A1,k

A2,1 A2,2 .. . A2,k

... ... .. . ...

Ar,1 Ar,2 .. . Ar,k

    

• Every square submatrix needs to be invertible. Optimally repair systematic nodes. • r × n parity check matrix

    

A1,1 A2,1 .. . Ar,1

A1,2 A2,2 .. . Ar,2

A1,3 A2,3 .. . Ar,3

... ... .. . ...

A1,n A2,n .. . Ar,n

    

• Only require every r × r submatrix to be invertible. Optimally repair all nodes.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

32 / 1

Block Vandermonde structure



      

Min Ye, Ph.D. Dissertation Defense

I A1 A21 .. . Ar−1 1

I A2 A22 .. . Ar−1 2

I A3 A23 .. . Ar−1 3

... ... ... .. . ...

I An A2n .. . Ar−1 n

Coding Schemes for Distributed Storage Systems

      

August 11, 2017

33 / 1

Block Vandermonde structure



      

I A1 A21 .. . Ar−1 1

I A2 A22 .. . Ar−1 2

I A3 A23 .. . Ar−1 3

... ... ... .. . ...

I An A2n .. . Ar−1 n

      

• Commuting: Ai Aj = Aj Ai

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

33 / 1

Block Vandermonde structure



      

I A1 A21 .. . Ar−1 1

I A2 A22 .. . Ar−1 2

I A3 A23 .. . Ar−1 3

... ... ... .. . ...

I An A2n .. . Ar−1 n

      

• Commuting: Ai Aj = Aj Ai • Ai − Aj invertible

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

33 / 1

Block Vandermonde structure



      

I A1 A21 .. . Ar−1 1

I A2 A22 .. . Ar−1 2

I A3 A23 .. . Ar−1 3

... ... ... .. . ...

I An A2n .. . Ar−1 n

      

• Commuting: Ai Aj = Aj Ai • Ai − Aj invertible • Construction 1-3: diagonal matrices naturally commute

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

33 / 1

Permutation matrices and optimal access

• Choose Ai to be permutation matrices (Cadambe et al., ’11, Tamo et al., ’13)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

34 / 1

Permutation matrices and optimal access

• Choose Ai to be permutation matrices (Cadambe et al., ’11, Tamo et al., ’13) • Optimal access property: reduce the amount of data read, the disk I/O

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

34 / 1

Permutation matrices and optimal access

• Choose Ai to be permutation matrices (Cadambe et al., ’11, Tamo et al., ’13) • Optimal access property: reduce the amount of data read, the disk I/O • For any n and r, explicit (n, k = n − r, ` = sn ) MDS array codes with the

(h, d)-optimal access property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

34 / 1

Permutation matrices and optimal access

• Choose Ai to be permutation matrices (Cadambe et al., ’11, Tamo et al., ’13) • Optimal access property: reduce the amount of data read, the disk I/O • For any n and r, explicit (n, k = n − r, ` = sn ) MDS array codes with the

(h, d)-optimal access property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously • Can be constructed over any field F with size |F| ≥ n + 1

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

34 / 1

Permutation matrices and optimal access

• Choose Ai to be permutation matrices (Cadambe et al., ’11, Tamo et al., ’13) • Optimal access property: reduce the amount of data read, the disk I/O • For any n and r, explicit (n, k = n − r, ` = sn ) MDS array codes with the

(h, d)-optimal access property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously • Can be constructed over any field F with size |F| ≥ n + 1 • Optimal error resilience in the repair process

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

34 / 1

Permutation matrices and optimal access

• Choose Ai to be permutation matrices (Cadambe et al., ’11, Tamo et al., ’13) • Optimal access property: reduce the amount of data read, the disk I/O • For any n and r, explicit (n, k = n − r, ` = sn ) MDS array codes with the

(h, d)-optimal access property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously • Can be constructed over any field F with size |F| ≥ n + 1 • Optimal error resilience in the repair process • Encoding and update complexity is higher

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

34 / 1

Permutation matrices and optimal access

• Choose Ai to be permutation matrices (Cadambe et al., ’11, Tamo et al., ’13) • Optimal access property: reduce the amount of data read, the disk I/O • For any n and r, explicit (n, k = n − r, ` = sn ) MDS array codes with the

(h, d)-optimal access property for all 1 ≤ h ≤ r and k ≤ d ≤ n − h simultaneously • Can be constructed over any field F with size |F| ≥ n + 1 • Optimal error resilience in the repair process • Encoding and update complexity is higher • M. Ye and A. Barg, “Explicit constructions of high-rate MDS array codes with

optimal repair bandwidth,” IEEE Transactions on Information Theory, vol. 63, no. 4, pp. 2001–2014, April 2017.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

34 / 1

Small sub-packetization ` • Smaller ` ⇒ smaller node size ⇒ lower system complexity

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

35 / 1

Small sub-packetization ` • Smaller ` ⇒ smaller node size ⇒ lower system complexity • Beyond block Vandermonde structure and commuting matrices

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

35 / 1

Small sub-packetization ` • Smaller ` ⇒ smaller node size ⇒ lower system complexity • Beyond block Vandermonde structure and commuting matrices • For any n and r, explicit (n, k = n − r, ` = rdn/re ) optimal-access MDS array code

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

35 / 1

Small sub-packetization ` • Smaller ` ⇒ smaller node size ⇒ lower system complexity • Beyond block Vandermonde structure and commuting matrices • For any n and r, explicit (n, k = n − r, ` = rdn/re ) optimal-access MDS array code • Best known sub-packetization `, nearly optimal

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

35 / 1

Small sub-packetization ` • Smaller ` ⇒ smaller node size ⇒ lower system complexity • Beyond block Vandermonde structure and commuting matrices • For any n and r, explicit (n, k = n − r, ` = rdn/re ) optimal-access MDS array code • Best known sub-packetization `, nearly optimal • Can be constructed over any field F with size |F| ≥ n + r

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

35 / 1

Small sub-packetization ` • Smaller ` ⇒ smaller node size ⇒ lower system complexity • Beyond block Vandermonde structure and commuting matrices • For any n and r, explicit (n, k = n − r, ` = rdn/re ) optimal-access MDS array code • Best known sub-packetization `, nearly optimal • Can be constructed over any field F with size |F| ≥ n + r • Low complexity encoding and repair procedures

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

35 / 1

Small sub-packetization ` • Smaller ` ⇒ smaller node size ⇒ lower system complexity • Beyond block Vandermonde structure and commuting matrices • For any n and r, explicit (n, k = n − r, ` = rdn/re ) optimal-access MDS array code • Best known sub-packetization `, nearly optimal • Can be constructed over any field F with size |F| ≥ n + r • Low complexity encoding and repair procedures • M. Ye and A. Barg, “Explicit constructions of optimal-access MDS codes with

nearly optimal sub-packetization,” IEEE Transactions on Information Theory, 2017 (arXiv:1605.08630).

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

35 / 1

Small sub-packetization ` • Smaller ` ⇒ smaller node size ⇒ lower system complexity • Beyond block Vandermonde structure and commuting matrices • For any n and r, explicit (n, k = n − r, ` = rdn/re ) optimal-access MDS array code • Best known sub-packetization `, nearly optimal • Can be constructed over any field F with size |F| ≥ n + r • Low complexity encoding and repair procedures • M. Ye and A. Barg, “Explicit constructions of optimal-access MDS codes with

nearly optimal sub-packetization,” IEEE Transactions on Information Theory, 2017 (arXiv:1605.08630). • Sasidharan et al., 2016, Li et al., ISIT 2017: Same parameters, very similar

constructions, appeared after our paper was posted on arXiv

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

35 / 1

Evaluation in Amazon Cluster

M. Ye et al., “Pairing up for regeneration: The Mantra for fast and efficient node repair in distributed storage,” poster presented at USENIX Annual Technical Conference, July 12-14, 2017, Santa Clara, CA. Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

36 / 1

Repairing Reed-Solomon codes • Guruswami-Wootters (STOC-2016, IEEE-TIT-2017)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

37 / 1

Repairing Reed-Solomon codes • Guruswami-Wootters (STOC-2016, IEEE-TIT-2017) • Linear repair scheme: trace repair framework

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

37 / 1

Repairing Reed-Solomon codes • Guruswami-Wootters (STOC-2016, IEEE-TIT-2017) • Linear repair scheme: trace repair framework • View RS codes as array codes over some subfield of the symbol field

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

37 / 1

Repairing Reed-Solomon codes • Guruswami-Wootters (STOC-2016, IEEE-TIT-2017) • Linear repair scheme: trace repair framework • View RS codes as array codes over some subfield of the symbol field • Repair bandwidth is smaller than under the trivial approach, but far away from the

cut-set bound

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

37 / 1

Repairing Reed-Solomon codes • Guruswami-Wootters (STOC-2016, IEEE-TIT-2017) • Linear repair scheme: trace repair framework • View RS codes as array codes over some subfield of the symbol field • Repair bandwidth is smaller than under the trivial approach, but far away from the

cut-set bound

• Dau-Milenkovic (ISIT-2017)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

37 / 1

Repairing Reed-Solomon codes • Guruswami-Wootters (STOC-2016, IEEE-TIT-2017) • Linear repair scheme: trace repair framework • View RS codes as array codes over some subfield of the symbol field • Repair bandwidth is smaller than under the trivial approach, but far away from the

cut-set bound

• Dau-Milenkovic (ISIT-2017) • Generalize G-W results to a larger set of parameters

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

37 / 1

Repairing Reed-Solomon codes • Guruswami-Wootters (STOC-2016, IEEE-TIT-2017) • Linear repair scheme: trace repair framework • View RS codes as array codes over some subfield of the symbol field • Repair bandwidth is smaller than under the trivial approach, but far away from the

cut-set bound

• Dau-Milenkovic (ISIT-2017) • Generalize G-W results to a larger set of parameters • Repair bandwidth is still far away from the cut-set bound

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

37 / 1

Repairing Reed-Solomon codes • Guruswami-Wootters (STOC-2016, IEEE-TIT-2017) • Linear repair scheme: trace repair framework • View RS codes as array codes over some subfield of the symbol field • Repair bandwidth is smaller than under the trivial approach, but far away from the

cut-set bound

• Dau-Milenkovic (ISIT-2017) • Generalize G-W results to a larger set of parameters • Repair bandwidth is still far away from the cut-set bound

• Open problem: Can RS codes (or any scalar MDS codes) achieve the cut-set

bound?

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

37 / 1

Our results • Explicit construction of RS codes achieving the cut set bound

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough • Is this gap a necessary penalty for scalar codes to achieve cut-set bound?

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough • Is this gap a necessary penalty for scalar codes to achieve cut-set bound?

• An almost matching lower bound on ` of scalar linear MSR codes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough • Is this gap a necessary penalty for scalar codes to achieve cut-set bound?

• An almost matching lower bound on ` of scalar linear MSR codes • ` ≥ e(1+o(1))k log k

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough • Is this gap a necessary penalty for scalar codes to achieve cut-set bound?

• An almost matching lower bound on ` of scalar linear MSR codes • ` ≥ e(1+o(1))k log k

• I. Tamo, M. Ye and A. Barg, “Optimal repair of Reed-Solomon codes: Achieving the cut-set bound,” IEEE Symposium on Foundations of Computer Science (FOCS), 2017.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough • Is this gap a necessary penalty for scalar codes to achieve cut-set bound?

• An almost matching lower bound on ` of scalar linear MSR codes • ` ≥ e(1+o(1))k log k

• I. Tamo, M. Ye and A. Barg, “Optimal repair of Reed-Solomon codes: Achieving the cut-set bound,” IEEE Symposium on Foundations of Computer Science (FOCS), 2017. • Explicit construction of RS codes achieving the cut set bound asymptotically

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough • Is this gap a necessary penalty for scalar codes to achieve cut-set bound?

• An almost matching lower bound on ` of scalar linear MSR codes • ` ≥ e(1+o(1))k log k

• I. Tamo, M. Ye and A. Barg, “Optimal repair of Reed-Solomon codes: Achieving the cut-set bound,” IEEE Symposium on Foundations of Computer Science (FOCS), 2017. • Explicit construction of RS codes achieving the cut set bound asymptotically • available for any n and r; repair bandwidth ≤ (n + 1)`/r

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough • Is this gap a necessary penalty for scalar codes to achieve cut-set bound?

• An almost matching lower bound on ` of scalar linear MSR codes • ` ≥ e(1+o(1))k log k

• I. Tamo, M. Ye and A. Barg, “Optimal repair of Reed-Solomon codes: Achieving the cut-set bound,” IEEE Symposium on Foundations of Computer Science (FOCS), 2017. • Explicit construction of RS codes achieving the cut set bound asymptotically • available for any n and r; repair bandwidth ≤ (n + 1)`/r • Cut-set bound is (n − 1)`/r, ratio goes to 1, asymptotically optimal

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Our results • Explicit construction of RS codes achieving the cut set bound • Given any k < d < n, we construct explicit (n, k) RS codes with (1, d)-optimal repair

property • ` = e(1+o(1))n log n , super-exponential • For MSR array codes, ` = rn/(r+1) (Wang et al., ’16): exponential is enough • Is this gap a necessary penalty for scalar codes to achieve cut-set bound?

• An almost matching lower bound on ` of scalar linear MSR codes • ` ≥ e(1+o(1))k log k

• I. Tamo, M. Ye and A. Barg, “Optimal repair of Reed-Solomon codes: Achieving the cut-set bound,” IEEE Symposium on Foundations of Computer Science (FOCS), 2017. • Explicit construction of RS codes achieving the cut set bound asymptotically • available for any n and r; repair bandwidth ≤ (n + 1)`/r • Cut-set bound is (n − 1)`/r, ratio goes to 1, asymptotically optimal • M. Ye and A. Barg, “Explicit constructions of MDS array codes and RS codes with

optimal repair bandwidth,” ISIT 2016, pp.1202-1206. Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

38 / 1

Fractional decoding: Global decoding from partial information Code of length n over Fq

C3

C2

C1

)

) C2

C1

f 2(

f1 (

Cn

...

f3 (C3 )

f n(

) Cn

decoder Suppose that Size of (f1 (C1 ), f2 (C2 ), . . . , fn (Cn )) ≤ αn`,

α≤1

How many errors can the decoder correct?

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

39 / 1

Fractional decoding: Global decoding from partial information

1 Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Fractional decoding: Global decoding from partial information

• (n, k) MDS code C = {C = (C1 , . . . , Cn )}

1 Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Fractional decoding: Global decoding from partial information

• (n, k) MDS code C = {C = (C1 , . . . , Cn )} • Each Ci is a vector of dimension ` over F

1 Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Fractional decoding: Global decoding from partial information

• (n, k) MDS code C = {C = (C1 , . . . , Cn )} • Each Ci is a vector of dimension ` over F • Suppose that on average in each coordinate we download an α fraction of the

codeword symbol (possibly, distorted by noise), α < 1

1 Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Fractional decoding: Global decoding from partial information

• (n, k) MDS code C = {C = (C1 , . . . , Cn )} • Each Ci is a vector of dimension ` over F • Suppose that on average in each coordinate we download an α fraction of the

codeword symbol (possibly, distorted by noise), α < 1 • The total number of symbols of F available to the decoder1 is αn`. What can be

said about the number of (worst-case) correctable errors?

1

these symbols may be functions of the received symbols Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Fractional decoding: Global decoding from partial information

• (n, k) MDS code C = {C = (C1 , . . . , Cn )} • Each Ci is a vector of dimension ` over F • Suppose that on average in each coordinate we download an α fraction of the

codeword symbol (possibly, distorted by noise), α < 1 • The total number of symbols of F available to the decoder1 is αn`. What can be

said about the number of (worst-case) correctable errors? Call this number the α-decoding radius

1

these symbols may be functions of the received symbols Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Fractional decoding: Global decoding from partial information

• (n, k) MDS code C = {C = (C1 , . . . , Cn )} • Each Ci is a vector of dimension ` over F • Suppose that on average in each coordinate we download an α fraction of the

codeword symbol (possibly, distorted by noise), α < 1 • The total number of symbols of F available to the decoder1 is αn`. What can be

said about the number of (worst-case) correctable errors? Call this number the α-decoding radius • Main results:

1

these symbols may be functions of the received symbols Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Fractional decoding: Global decoding from partial information

• (n, k) MDS code C = {C = (C1 , . . . , Cn )} • Each Ci is a vector of dimension ` over F • Suppose that on average in each coordinate we download an α fraction of the

codeword symbol (possibly, distorted by noise), α < 1 • The total number of symbols of F available to the decoder1 is αn`. What can be

said about the number of (worst-case) correctable errors? Call this number the α-decoding radius • Main results: • A bound on the α-decoding radius

1

these symbols may be functions of the received symbols Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Fractional decoding: Global decoding from partial information

• (n, k) MDS code C = {C = (C1 , . . . , Cn )} • Each Ci is a vector of dimension ` over F • Suppose that on average in each coordinate we download an α fraction of the

codeword symbol (possibly, distorted by noise), α < 1 • The total number of symbols of F available to the decoder1 is αn`. What can be

said about the number of (worst-case) correctable errors? Call this number the α-decoding radius • Main results: • A bound on the α-decoding radius • A matching code construction

1

these symbols may be functions of the received symbols Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

40 / 1

Decoding radius as a function of α

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

41 / 1

Decoding radius as a function of α • r1 (n, k) = b(n − k)/2c

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

41 / 1

Decoding radius as a function of α • r1 (n, k) = b(n − k)/2c • A trivial lower bound: Puncturing an (n, k) MDS code, we obtain

rα (n, k) ≥ b(αn − k)/2c for any k/n ≤ α ≤ 1

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

41 / 1

Decoding radius as a function of α • r1 (n, k) = b(n − k)/2c • A trivial lower bound: Puncturing an (n, k) MDS code, we obtain

rα (n, k) ≥ b(αn − k)/2c for any k/n ≤ α ≤ 1 • Singleton-like upper bound:

rα (n, k) ≤ b(n − k/α)/2c

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

41 / 1

Decoding radius as a function of α • r1 (n, k) = b(n − k)/2c • A trivial lower bound: Puncturing an (n, k) MDS code, we obtain

rα (n, k) ≥ b(αn − k)/2c for any k/n ≤ α ≤ 1 • Singleton-like upper bound:

rα (n, k) ≤ b(n − k/α)/2c Main result: We construct codes with α-decoding radius that matches the upper bound

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

41 / 1

Decoding radius as a function of α • r1 (n, k) = b(n − k)/2c • A trivial lower bound: Puncturing an (n, k) MDS code, we obtain

rα (n, k) ≥ b(αn − k)/2c for any k/n ≤ α ≤ 1 • Singleton-like upper bound:

rα (n, k) ≤ b(n − k/α)/2c Main result: We construct codes with α-decoding radius that matches the upper bound

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

41 / 1

Summary • We constructed various families of MSR array codes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes • Optimal error resilience capability during the repair process

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes • Optimal error resilience capability during the repair process • Optimal access property and optimal sub-packetization `

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes • Optimal error resilience capability during the repair process • Optimal access property and optimal sub-packetization `

• We constructed explicit RS codes with optimal repair property

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes • Optimal error resilience capability during the repair process • Optimal access property and optimal sub-packetization `

• We constructed explicit RS codes with optimal repair property • Show that there exist scalar MSR codes by constructing explicit RS codes with optimal

repair property

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes • Optimal error resilience capability during the repair process • Optimal access property and optimal sub-packetization `

• We constructed explicit RS codes with optimal repair property • Show that there exist scalar MSR codes by constructing explicit RS codes with optimal

repair property • An almost matching lower bound on the sub-packetization of scalar linear MSR codes

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes • Optimal error resilience capability during the repair process • Optimal access property and optimal sub-packetization `

• We constructed explicit RS codes with optimal repair property • Show that there exist scalar MSR codes by constructing explicit RS codes with optimal

repair property • An almost matching lower bound on the sub-packetization of scalar linear MSR codes

• We introduced a new problem of fractional decoding (decoding from an αn

proportion of the received vector)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes • Optimal error resilience capability during the repair process • Optimal access property and optimal sub-packetization `

• We constructed explicit RS codes with optimal repair property • Show that there exist scalar MSR codes by constructing explicit RS codes with optimal

repair property • An almost matching lower bound on the sub-packetization of scalar linear MSR codes

• We introduced a new problem of fractional decoding (decoding from an αn

proportion of the received vector) • The decoding radius rα (n, k) is a function of α and (n, k)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Summary • We constructed various families of MSR array codes • Optimally recover any number of erasures from any set of helper nodes • Optimal error resilience capability during the repair process • Optimal access property and optimal sub-packetization `

• We constructed explicit RS codes with optimal repair property • Show that there exist scalar MSR codes by constructing explicit RS codes with optimal

repair property • An almost matching lower bound on the sub-packetization of scalar linear MSR codes

• We introduced a new problem of fractional decoding (decoding from an αn

proportion of the received vector) • The decoding radius rα (n, k) is a function of α and (n, k) • We give the exact expression of the decoding radius rα (n, k).

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

42 / 1

Some open problems

• Construct explicit MSR codes with sub-packetization ` = rn/(r+1)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

43 / 1

Some open problems

• Construct explicit MSR codes with sub-packetization ` = rn/(r+1) • ` = rn/(r+1) is the best known sub-packetization value of MSR codes (Wang et al., ’16)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

43 / 1

Some open problems

• Construct explicit MSR codes with sub-packetization ` = rn/(r+1) • ` = rn/(r+1) is the best known sub-packetization value of MSR codes (Wang et al., ’16) • only existence proof, no constructions

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

43 / 1

Some open problems

• Construct explicit MSR codes with sub-packetization ` = rn/(r+1) • ` = rn/(r+1) is the best known sub-packetization value of MSR codes (Wang et al., ’16) • only existence proof, no constructions

• Close the gap between achievable sub-packetization value and the lower bound

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

43 / 1

Some open problems

• Construct explicit MSR codes with sub-packetization ` = rn/(r+1) • ` = rn/(r+1) is the best known sub-packetization value of MSR codes (Wang et al., ’16) • only existence proof, no constructions

• Close the gap between achievable sub-packetization value and the lower bound • the best known lower bound (Goparaju et al., ’14):

2 log2 `(logr/(r−1) ` + 1) ≥ k.

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

43 / 1

Some open problems

• Construct explicit MSR codes with sub-packetization ` = rn/(r+1) • ` = rn/(r+1) is the best known sub-packetization value of MSR codes (Wang et al., ’16) • only existence proof, no constructions

• Close the gap between achievable sub-packetization value and the lower bound • the best known lower bound (Goparaju et al., ’14):

2 log2 `(logr/(r−1) ` + 1) ≥ k. • Sub-packetization dependent bound on repair bandwidth (Cadambe-Mazumdar,

’15)

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

43 / 1

Some open problems

• Construct explicit MSR codes with sub-packetization ` = rn/(r+1) • ` = rn/(r+1) is the best known sub-packetization value of MSR codes (Wang et al., ’16) • only existence proof, no constructions

• Close the gap between achievable sub-packetization value and the lower bound • the best known lower bound (Goparaju et al., ’14):

2 log2 `(logr/(r−1) ` + 1) ≥ k. • Sub-packetization dependent bound on repair bandwidth (Cadambe-Mazumdar,

’15) • Cut-set bound is obtained without any restrictions on `

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

43 / 1

Some open problems

• Construct explicit MSR codes with sub-packetization ` = rn/(r+1) • ` = rn/(r+1) is the best known sub-packetization value of MSR codes (Wang et al., ’16) • only existence proof, no constructions

• Close the gap between achievable sub-packetization value and the lower bound • the best known lower bound (Goparaju et al., ’14):

2 log2 `(logr/(r−1) ` + 1) ≥ k. • Sub-packetization dependent bound on repair bandwidth (Cadambe-Mazumdar,

’15) • Cut-set bound is obtained without any restrictions on ` • What if we require ` < L? How does the lower bound change as L decreases?

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

43 / 1

Publication list: Journal papers Coding for distributed storage: 1. Min Ye and A. Barg, “Explicit constructions of optimal-access MDS codes with nearly optimal sub-packetization,” IEEE Transactions on Information Theory, 2017, arXiv:1605.08630. 2. Min Ye and A. Barg, “Explicit constructions of high-rate MDS array codes with optimal repair bandwidth,” IEEE Transactions on Information Theory, vol. 63, no. 4, pp. 2001–2014, April 2017, arXiv:1605.00454. Statistics 1. Min Ye and A. Barg, “Optimal Schemes for Discrete Distribution Estimation under Locally Differential Privacy,” submitted to IEEE Transactions on Information Theory, May 2017, arXiv:1702.00610. 2. Min Ye and A. Barg, “Asymptotically optimal private estimation under mean square loss,” arXiv:1708.00059. Polar codes 1. T. C. Gulcu, Min Ye and A. Barg, “Construction of polar codes for arbitrary discrete memoryless channels,” submitted to IEEE Transactions on Information Theory, March 2016, arXiv:1603.05736. 2. Min Ye and A. Barg, “Polar codes for distributed hierarchical source coding” Advances in Mathematics of Communications, vol. 9, no. 1, pp. 87–103, 2015, arXiv:1404.5501. Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

44 / 1

Publication list: Conference papers Coding for distributed storage: 1. I. Tamo, Min Ye and A. Barg, “Optimal repair of Reed-Solomon codes: Achieving the cut-set bound,” 58th Annual IEEE Symposium on Foundations of Computer Science (FOCS), Berkeley, CA, 2017. 2. I. Tamo, Min Ye and A. Barg, “Fractional decoding: Error correction from partial information,” in IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, 2017, pp. 998–1002 (arXiv:1701.06969). 3. M. Vajha, G. Kini, B. Puranik, V. Ramkumar, E. Lobo, B. Sasidharan, P.V. Kumar, Min Ye, A. Barg, S. Hussain, S. Narayanamurthy, and S. Nandi, “Pairing up for regeneration: The Mantra for fast and efficient node repair in distributed storage,” poster presented at USENIX Annual Technical Conference, July 12-14, 2017, Santa Clara, CA. 4. Min Ye and A. Barg, “Explicit constructions of MDS array codes and RS codes with optimal repair bandwidth,” in IEEE International Symposium on Information Theory, Barcelona, Spain, 2016, pp. 1202–1206.

Statistics: 5. Min Ye and A. Barg, “Optimal Schemes for Discrete Distribution Estimation under Local Differential Privacy,” in IEEE International Symposium on Information Theory, Aachen, Germany, 2017, pp. 759–763.

Polar codes: 6. T. C. Gulcu, M. Ye, and A. Barg, “Construction of polar codes for arbitrary discrete memoryless channels,” in IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, July 11-15, 2016, pp. 51–55 7. Min Ye and A. Barg, “Polar codes using dynamic kernels,” in IEEE International Symposium on Information Theory (ISIT), Hong Kong, 2015, pp. 231–235. 8. Min Ye and A. Barg, “Universal source polarization and an application to a multi-user problem” in 52nd Annual Allerton Conference on Communication Control and Computing, 2014, pp. 805–812. Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

45 / 1

Thank you

Min Ye, Ph.D. Dissertation Defense

Coding Schemes for Distributed Storage Systems

August 11, 2017

46 / 1

Coding Schemes for Distributed Storage Systems

Aug 11, 2017 - Erasure-Correcting Codes: optimal storage efficiency. Add 2 parity nodes to every 3 data nodes. Form an (n = 5, k = 3) code. Min Ye, Ph.D. Dissertation Defense. Coding Schemes for Distributed Storage Systems. August 11, 2017. 4 / 1 ...

1MB Sizes 1 Downloads 302 Views

Recommend Documents

Availability in Globally Distributed Storage Systems - USENIX
Abstract. Highly available cloud storage is often implemented with complex, multi-tiered distributed systems built on top of clusters of commodity servers and disk drives. So- phisticated management, load balancing and recovery techniques are needed

Availability in Globally Distributed Storage Systems - Usenix
layered systems for user goals such as data availability relies on accurate ... live operation at Google and describe how our analysis influenced the design of our ..... statistical behavior of correlated failures to understand data availability. In

Availability in Globally Distributed Storage Systems - USENIX
*Now at Dept. of Industrial Engineering and Operations Research. Columbia University the datacenter environment. We present models we derived from ...

Availability in Globally Distributed Storage Systems - Usenix
(Sections 5 and 6). • Formulate a Markov ..... Figure 6: Effect of the window size on the fraction of individual .... burst score, plus half the probability that the two scores are equal ... for recovery operations versus serving client read/write

Transforms for High-Rate Distributed Source Coding
As for quantization for distributed source coding, optimal design of ... expected Lagrangian cost J = D+λ R, with λ a nonnegative real number, for high rate R.

Polytope Codes for Distributed Storage in the Presence ...
are used in numerous cloud services, and across peer-to-peer networks. ..... By our argument above that every node has access to Σf , any node that can view ...

Bigtable: A Distributed Storage System for ... - Research at Google
service consists of five active replicas, one of which is ... tains a session with a Chubby service. .... ble to networking issues between the master and Chubby,.

A Survey on Network Codes for Distributed Storage - IEEE Xplore
ABSTRACT | Distributed storage systems often introduce redundancy to increase reliability. When coding is used, the repair problem arises: if a node storing ...

Shared Memory for Distributed Systems - CiteSeerX
Our business in every ..... Thus the objective is to design a software simulator which in turn will provide a set ...... scheduling strategy to be used for page faults.

Distributed Algorithms for Minimum Cost Multicast with Network Coding
optimal coding subgraphs in network coding is equivalent to finding the optimal ... The node relays the data it receives, but makes no change to the data content.

Distributed Space-Time Coding for Two-Way Wireless ...
XX, NO. XX, XX 2008. 1. Distributed Space-Time Coding for Two-Way. Wireless Relay ... of a general wireless network, TWRC could also lead to network ...

Distributed Utility Maximization for Network Coding Based Multicasting ...
include for example prior works on Internet flow control [9] and cross-layer ...... wireless network using network coding have been formulated in [20], [21] ..... [3] T. Ho, R. Koetter, M. Médard, D. R. Karger, and M. Effros, “The benefits of codi

Adaptive Distributed Network-Channel Coding For ...
cooperative wireless communications system with multiple users transmitting independent ...... Cambridge: Cambridge University Press, 2005. [13] SAGE, “Open ...

Distributed Space-Time Coding for Two-Way Wireless ...
coding for two-way wireless relay networks, where communica- tion between two ... of Singapore and Defence Science and Technology Agency (DSTA), Singa-.

Distributed Utility Maximization for Network Coding Based Multicasting ...
wireless network using network coding have been formulated in [20], [21] ..... [3] T. Ho, R. Koetter, M. Médard, D. R. Karger, and M. Effros, “The benefits of coding ...

quantization and transforms for distributed source coding
senders and receivers, such that data, or noisy observations of unseen data, from one or more sources, are separately encoded by each ..... The flexible definition of rate measure is introduced to model a variety of lossless codecs for the quantizati

Distributed Utility Maximization for Network Coding ...
The obtained r∗ and g∗ will be used as the operating pa- rameters of the practical network coding system. Specifically, the source node will set the end-to-end ...

Coordination of V2G and Distributed Wind Power Using the Storage ...
Coordination of V2G and Distributed Wind Power Using the Storage-like Aggregate PEV Model.pdf. Coordination of V2G and Distributed Wind Power Using the ...

CStorage: Distributed Data Storage in Wireless Sensor ...
ments) of the signal employing compressive sensing (CS) tech- niques [6, 7]. On the ..... Networks,” Technical. Report, University of Southern California,, 2009.

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Identity-Based Secure Distributed Data Storage with Dual ... - IJRIT
In Cryptographic. File System scheme the reliability of the perceptive file is provided by digital signature methods and the message authentication codes. (MAC).

Statistical Workload Shaping for Storage Systems
due to the cost efficiencies of centralized management and high reliability. .... by decomposing a large request the application per- ..... hosting platforms,” in Proc.

Automatic Reconfiguration of Distributed Storage - Research at Google
Email: [email protected]. Alexander ... Email: 1shralex, [email protected] ... trators have to determine a good configuration by trial and error.