Hi John, Thanks for the reply.
It seems that to understand the internal mechanism and the algorithmic structure of ceph, knowledge of Information theory is necessary ☺. Thanks Kumar From: John Wilkins [mailto:[email protected]] Sent: Monday, May 19, 2014 10:18 PM To: Gnan Kumar, Yalla Cc: Loic Dachary; [email protected] Subject: Re: [ceph-users] Erasure coding I have also added a big part of Loic's discussion of the architecture into the Ceph architecture document here: http://ceph.com/docs/master/architecture/#erasure-coding On Mon, May 19, 2014 at 5:35 AM, <[email protected]<mailto:[email protected]>> wrote: Hi Loic, Thanks for the reply. Thanks Kumar -----Original Message----- From: Loic Dachary [mailto:[email protected]<mailto:[email protected]>] Sent: Monday, May 19, 2014 6:04 PM To: Gnan Kumar, Yalla; [email protected]<mailto:[email protected]> Subject: Re: [ceph-users] Erasure coding Hi, The general idea to preserve resilience but save space compared to replication. It costs more in terms of CPU and network. You will find a short introduction here : https://wiki.ceph.com/Planning/Blueprints/Dumpling/Erasure_encoding_as_a_storage_backend https://wiki.ceph.com/Planning/Blueprints/Firefly/Erasure_coded_storage_backend_%28step_3%29 For the next Ceph release Pyramid Codes will help reduce the bandwidth requirements https://wiki.ceph.com/Planning/Blueprints/Giant/Pyramid_Erasure_Code Cheers On 19/05/2014 13:52, [email protected]<mailto:[email protected]> wrote: > Hi All, > > > > What exactly is erasure coding and why is it used in ceph ? I could not get > enough explanatory information from the documentation. > > > > > > Thanks > > Kumar > > > ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ > > This message is for the designated recipient only and may contain privileged, > proprietary, or otherwise confidential information. If you have received it > in error, please notify the sender immediately and delete the original. Any > other use of the e-mail by you is prohibited. Where allowed by local law, > electronic communications with Accenture and its affiliates, including e-mail > and instant messaging (including content), may be scanned by our systems for > the purposes of information security and assessment of internal compliance > with Accenture policy. > ______________________________________________________________________________________ > > www.accenture.com<http://www.accenture.com> > > > _______________________________________________ > ceph-users mailing list > [email protected]<mailto:[email protected]> > http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com > -- Loïc Dachary, Artisan Logiciel Libre _______________________________________________ ceph-users mailing list [email protected]<mailto:[email protected]> http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com -- John Wilkins Senior Technical Writer Intank [email protected]<mailto:[email protected]> (415) 425-9599 http://inktank.com
_______________________________________________ ceph-users mailing list [email protected] http://lists.ceph.com/listinfo.cgi/ceph-users-ceph.com
