Linear exact repair rate region of (k + 1, k, k) distributed storage systems: A new approach

Mehran Elyasi, Soheil Mohajer, Ravi Tandon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Abstract

Characterizing the exact repair storage-vs-repair bandwidth tradeoff for distributed storage systems remains an open problem for more than four storage nodes. Motivated by the prevalence and practical applicability of linear codes, the exact repair problem when restricted to linear codes is considered. The main result of this paper is a new approach to develop bounds for exact repair distributed storage systems with linear codes (LDSS). Using this approach, the exact repair region for the (k + 1, k, k) LDSS is completely characterized. The new approach utilizes the properties of linear codes together with the exact repair constraints. These constraints are formally captured through an optimization problem with a recursive structure, and its solution finally yields the new bounds for the LDSS. These bounds together with recent code constructions characterize the exact repair region for (k + 1, k, k) LDSS.

Original languageEnglish (US)
Title of host publicationProceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2061-2065
Number of pages5
ISBN (Electronic)9781467377041
DOIs
StatePublished - Sep 28 2015
EventIEEE International Symposium on Information Theory, ISIT 2015 - Hong Kong, Hong Kong
Duration: Jun 14 2015Jun 19 2015

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
Volume2015-June
ISSN (Print)2157-8095

Other

OtherIEEE International Symposium on Information Theory, ISIT 2015
Country/TerritoryHong Kong
CityHong Kong
Period6/14/156/19/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Fingerprint

Dive into the research topics of 'Linear exact repair rate region of (k + 1, k, k) distributed storage systems: A new approach'. Together they form a unique fingerprint.

Cite this