Optimizing RAID 6 performance and reliability using Reed-Solomon codes: Implementation, analysis, and exploration of alternative methods

Research Article
Open access

Optimizing RAID 6 performance and reliability using Reed-Solomon codes: Implementation, analysis, and exploration of alternative methods

Yifan Yang 1*
  • 1 School of Telecommunications Engineering, Xidian University, Xi'an, 710126, China    
  • *corresponding author yangyifan@stu.xidian.edu.cn
Published on 31 January 2024 | https://doi.org/10.54254/2755-2721/31/20230165
ACE Vol.31
ISSN (Print): 2755-273X
ISSN (Online): 2755-2721
ISBN (Print): 978-1-83558-287-9
ISBN (Online): 978-1-83558-288-6

Abstract

This manuscript offers an exhaustive exploration of Reed-Solomon codes and their role in Redundant Array of Independent Disks level 6 (RAID 6) systems. The use of these codes is instrumental in enhancing data reliability and bolstering system fault tolerance. A detailed examination and analysis of Reed-Solomon codes deliver pivotal insights into the performance optimization process of RAID 6 systems. Despite the widespread usage of Reed-Solomon codes, these codes come with their own set of challenges, such as increased computational complexity, which could potentially hamper system performance. Considering this, this paper explores potential alternatives to Reed-Solomon codes, specifically - Row-Diagonal Parity (RDP), Liberation Codes for RAID 6, and Johnston's Code (J-Code). Each of these alternatives carries its unique set of benefits and limitations, which calls for a careful selection process based on specific application scenarios. The manuscript also probes into how these alternatives can be effectively related to RAID 6 systems. With the rapid expansion of data centers and cloud computing, the demand for data reliability and fault tolerance continues to surge. Future research is anticipated to revolve around the optimization of RAID 6 systems, particularly focusing on the selection and implementation of the most suitable coding scheme. Furthermore, studying and applying a wider range of alternatives to meet diverse requirements will also be a significant area of focus.

Keywords:

Reed-Solomon codes, RAID 6, data reliability, fault tolerance, computational complexity, performance optimization, RDP, RAID-6 liberation code, J-Code, data centers, cloud computing.

Yang,Y. (2024). Optimizing RAID 6 performance and reliability using Reed-Solomon codes: Implementation, analysis, and exploration of alternative methods. Applied and Computational Engineering,31,261-267.
Export citation

References

[1]. Yue, Y., Wu, R., Hou, R., et al. (2023). Efficient Reed–Solomon Redundant Arrays of Independent Disks 6 Exclusive OR Accelerator with Scaling Scheme. Sensors and Materials, 35(5), 1519-1531.

[2]. Song, Y., Zhang, Q., & Wang, B. (2023). FACHS: Adaptive Hybrid Storage Strategy Based on File Access Characteristics. IEEE Access, 11, 16855-16862.

[3]. Ramkumar, M.P., Balaji, N., Emil Selvan, G.S.R., & Jeya Rohini, R. (2019). RAID-6 Code Variants for Recovery of a Failed Disk. In J. Nayak, A. Abraham, B. Krishna, G. Chandra Sekhar, & A. Das (Eds.), Soft Computing in Data Analytics (Advances in Intelligent Systems and Computing, vol 758). Springer, Singapore.

[4]. Wu, R., Chen, J., Huang, P., Wang, L., Wang, M., & Wu, Y. (2021). An efficient RAID scaling scheme for RS-RAID6. In 2021 2nd International Conference on Artificial Intelligence and Information Systems (ICAIIS 2021). Association for Computing Machinery, New York, NY, USA, Article 59, 1–6.

[5]. Tang, Y. J., & Zhang, X. (2021). Fast en/decoding of Reed-Solomon codes for failure recovery. IEEE Transactions on Computers, 71(3), 724-735.

[6]. Huang, Z., Jiang, H., Shen, Z., Che, H., Xiao, N., & Li, N. (2020). Optimal Encoding and Decoding Algorithms for the RAID-6 Liberation Codes. In 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), New Orleans, LA, USA, pp. 708-717.

[7]. Zhang, X., Liang, N., Liu, Y., et al. (2022). SA-RSR: A read-optimal data recovery strategy for XOR-coded distributed storage systems. Frontiers of Information Technology & Electronic Engineering, 23(6), 858-875.

[8]. Zong, Y., & Huang, G. (2021). Safe Storage Algorithm of Spreadsheet Data Based on Internet of Things Technology. In International Conference on Advanced Hybrid Information Processing. Cham: Springer International Publishing, pp. 254-269.

[9]. Zhu, J., Li, S., & Li, J. (2023). Information-theoretically private matrix multiplication from mds-coded storage. IEEE Transactions on Information Forensics and Security, 18, 1680-1695.

[10]. Chen, Y. (2022). Efficiency Comparison of Row-Diagonal Parity and EVENODD Encoded Check Disk Repair Algorithms. In 2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE), Frankfurt, Germany, pp. 55-58.


Cite this article

Yang,Y. (2024). Optimizing RAID 6 performance and reliability using Reed-Solomon codes: Implementation, analysis, and exploration of alternative methods. Applied and Computational Engineering,31,261-267.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 2023 International Conference on Machine Learning and Automation

ISBN:978-1-83558-287-9(Print) / 978-1-83558-288-6(Online)
Editor:Mustafa İSTANBULLU
Conference website: https://2023.confmla.org/
Conference date: 18 October 2023
Series: Applied and Computational Engineering
Volume number: Vol.31
ISSN:2755-2721(Print) / 2755-273X(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).

References

[1]. Yue, Y., Wu, R., Hou, R., et al. (2023). Efficient Reed–Solomon Redundant Arrays of Independent Disks 6 Exclusive OR Accelerator with Scaling Scheme. Sensors and Materials, 35(5), 1519-1531.

[2]. Song, Y., Zhang, Q., & Wang, B. (2023). FACHS: Adaptive Hybrid Storage Strategy Based on File Access Characteristics. IEEE Access, 11, 16855-16862.

[3]. Ramkumar, M.P., Balaji, N., Emil Selvan, G.S.R., & Jeya Rohini, R. (2019). RAID-6 Code Variants for Recovery of a Failed Disk. In J. Nayak, A. Abraham, B. Krishna, G. Chandra Sekhar, & A. Das (Eds.), Soft Computing in Data Analytics (Advances in Intelligent Systems and Computing, vol 758). Springer, Singapore.

[4]. Wu, R., Chen, J., Huang, P., Wang, L., Wang, M., & Wu, Y. (2021). An efficient RAID scaling scheme for RS-RAID6. In 2021 2nd International Conference on Artificial Intelligence and Information Systems (ICAIIS 2021). Association for Computing Machinery, New York, NY, USA, Article 59, 1–6.

[5]. Tang, Y. J., & Zhang, X. (2021). Fast en/decoding of Reed-Solomon codes for failure recovery. IEEE Transactions on Computers, 71(3), 724-735.

[6]. Huang, Z., Jiang, H., Shen, Z., Che, H., Xiao, N., & Li, N. (2020). Optimal Encoding and Decoding Algorithms for the RAID-6 Liberation Codes. In 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), New Orleans, LA, USA, pp. 708-717.

[7]. Zhang, X., Liang, N., Liu, Y., et al. (2022). SA-RSR: A read-optimal data recovery strategy for XOR-coded distributed storage systems. Frontiers of Information Technology & Electronic Engineering, 23(6), 858-875.

[8]. Zong, Y., & Huang, G. (2021). Safe Storage Algorithm of Spreadsheet Data Based on Internet of Things Technology. In International Conference on Advanced Hybrid Information Processing. Cham: Springer International Publishing, pp. 254-269.

[9]. Zhu, J., Li, S., & Li, J. (2023). Information-theoretically private matrix multiplication from mds-coded storage. IEEE Transactions on Information Forensics and Security, 18, 1680-1695.

[10]. Chen, Y. (2022). Efficiency Comparison of Row-Diagonal Parity and EVENODD Encoded Check Disk Repair Algorithms. In 2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE), Frankfurt, Germany, pp. 55-58.