Skip to main content

Towards Efficient Execution of Erasure Codes on Multicore Architectures

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7134))

Abstract

Erasure codes can improve the availability of distributed storage in comparison with replication systems. In this paper, we focus on investigating how to map systematically the Reed-Solomon and Cauchy Reed-Solomon erasure codes onto the Cell/B.E. and GPU multicore architecture. A method for the systematic mapping of computation kernels of encoding/decoding algorithms onto the Cell/B.E. architecture is proposed. This method takes into account properties of the architecture on all three levels of its parallel processing hierarchy. The performance results are shown to be very promising. The possibility of using GPUs is studied as well, based on the Cauchy version of Reed-Solomon codes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chen, T., Raghavan, R., Dale, J.N., Iwata, E.: Cell Broadband Engine Architecture and its first implementation: A performance view. IBM Journal of Research and Development 51(5), 559–572 (2007)

    Article  Google Scholar 

  2. Collins, R., Plank, J.: Assessing the Performance of Erasure Codes in the Wide-Area. In: Proc. 2005 Int. Conf. Dependable Systems and Networks, DSN 2005, pp. 182–187. IEEE Computer Society (2005)

    Google Scholar 

  3. Curry, M.L., Skjellum, A., Ward, H.L., Brightwell, R.: Arbitrary Dimension Reed-Solomon Coding and Decoding for Extended RAID on GPUs. In: Proc. 3rd Petascale Data Storage Workshop, PDSW 2008 (2008)

    Google Scholar 

  4. Curry, M.L., Skjellum, A., Ward, H.L., Brightwell, R.: Accelerating Reed-Solomon coding in RAID systems with GPUs. In: IPDPS 2008, pp. 1–6. IEEE Press (2008), http://www.bibsonomy.org/bibtex/2e7f39d74179b4d96fea4d89df77c5d6b/dblp

  5. Fatahalian, K., Houston, M.: GPUs: A Closer Look. Comm. ACM 51, 50–57 (2008)

    Article  Google Scholar 

  6. Kher, V., Kim, Y.: Securing Distributed Storage: Challenges, Techniques, and Systems. In: ACM Workshop on Storage Security and Survivability, pp. 9–25 (2005)

    Google Scholar 

  7. MacKay, D.J.C.: Fountain Codes. IEE Proc. – Communications 152(6), 1062–1068 (2005)

    Article  Google Scholar 

  8. Nickolls, J., Buck, I., Garland, M., Skadron, K.: Scalable Parallel Programming with CUDA. Queue 6(2), 40–53 (2008)

    Article  Google Scholar 

  9. OpenCL - The open standard for parallel programming of heterogeneous systems, http://www.khronos.org/opencl

  10. Plank, J.: A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Software – Practice & Experience 27(9), 995–1012 (1997)

    Article  Google Scholar 

  11. Plank, J., Ding, Y.: Note: Correction to the 1997 tutorial on Reed-Solomon coding. Software – Practice & Experience 35(2), 189–194 (2005)

    Article  Google Scholar 

  12. Plank, J., Simmerman, S., Schuman, C.: Jerasure: A Library in C/C++ Facilitating Erasure Coding for Storage Applications, https://www.cs.utk.edu/~plank/plank/papers/CS-08-627.pdf

  13. Plank, J., Thomason, M.: A Practical Analysis of Low-Density Parity-Check Erasure Codes for Wide-Area Storage Applications. In: Proc. 2004 Int. Conf. Dependable Systems and Networks, pp. 115–124. IEEE Comp. Soc. (2004)

    Google Scholar 

  14. Plank, J., Xu, L.: Optimizing Cauchy Reed-Solomon codes for fault-tolerant network storage applications. In: NCA 2006: 5th IEEE Int. Symp. Network Computing Applications, pp. 173–180 (2006)

    Google Scholar 

  15. Weatherspoon, H., Kubiatowicz, J.D.: Erasure Coding Vs. Replication: A Quantitative Comparison. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 328–338. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  16. Williams, S., Oliker, L., Vuduc, R., Shalf, J., Yelick, K., Demmel, J.: Optimization of sparse matrix-vector multiplication on emerging multicore platforms. Parallel Computing 35, 178–194 (2009)

    Article  Google Scholar 

  17. Wozniak, M., Olas, T., Wyrzykowski, R.: Parallel Implementation of Conjugate Gradient Method on Graphics Processors. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2009. LNCS, vol. 6067, pp. 125–135. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  18. Wyrzykowski, R., Kuczynski, L.: Towards Secure Data Management System for Grid Environment Based on the Cell Broadband Engine. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2007. LNCS, vol. 4967, pp. 825–834. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  19. Wyrzykowski, R. Kuczynski, L., Rojek, K.: Mapping AES Cryptography and Whirlpool Hashing onto Cell/B.E. Architecture. In: Proc. PARA 2008 (2010) (accepted for publication)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kristján Jónasson

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wyrzykowski, R., Kuczynski, L., Wozniak, M. (2012). Towards Efficient Execution of Erasure Codes on Multicore Architectures. In: Jónasson, K. (eds) Applied Parallel and Scientific Computing. PARA 2010. Lecture Notes in Computer Science, vol 7134. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28145-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28145-7_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28144-0

  • Online ISBN: 978-3-642-28145-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics