6.4 KiB
Erasure Coding
We present an interleaved erasure code that is able to encode arbitrary amounts of data despite the relatively small Reed-Solomon codeword size.
Overview
Erasure coding has several complementing uses in the Codex system. It is superior to replication because it provides greater redundancy at lower storage overheads; it strengthens our remote storage auditing scheme by allowing to check only a percentage of the blocks rather than checking the entire dataset; and it helps with downloads as it allows retrieving K arbitrary pieces from any nodes, thus avoiding the so called "stragglers problem".
We employ an Reed-Solomon code with configurable K and M parameters per dataset and an interleaving structure that allows us to overcome the limitation of a small Galois field (GF) size.
Limitations of small GF fields
Terminology
- A
codeword(C) is the maximum amount of data that can be encoded together, it cannot surpass the size of the GF field. For exampleC <= GF(2^8) = C <= 256. - A
symbol(s) is an element of the GF field. Acodewordis composed of a number of symbols up to the size of the GF field. For example a field ofGF(2^8) = 256contains up to 256 symbols. The size of the symbol in bytes is also limited by the size of the GF field, a symbol inGF(2^8)will have a max size of 8 bits or 1 byte.
The size of the codeword determines the maximum number of symbols that an error correcting code can encode and decode as a unit. For example, a Reed-Solomon code that uses a Galois field of 2^8 can only encode and decode 256 symbols together. In other words, the size of the field imposes a natural limit on the size of the data that can be coded together.
Why not use a larger field? The limitations are mostly practical, either memory or CPU bound, or both. For example, most implementation rely on one or more arithmetic tables which have a linear storage overhead proportional to the size of the field. In other words, a fields of 2^{32} would require generating and storing several 4GB tables and it would still only allow coding 4GB of data at a time, clearly this isn't enough when the average high definition video file is several times larger than that and specially when the expectation is to allow handling very large, potentially terabyte size datasets, routinely employed in science and big-data.
Interleaving
Interleaving is the process of combining or interweaving several symbols from disparate parts of the source data in ways that minimizes the likelihood that any sequence of these symbols damaged together compromises the rest of the data.
In our case, the primary requirement is to ensure that we're preserving the dataset in its entirety and any K elements are still enough to recover the original dataset. This is important to emphasize, we cannot simply encode a chunk of data individually, that would only protect that individual chunk, the code should protect the dataset in its entirety, even if it is terabytes size.
A secondary but important requirement is to allow appending data without having to re-encode the entire dataset.
Codex Interleaving
Codex employs a type of interleaving where every K symbols spaced at S intervals, are encoded with additional M parity symbols equally spaced at S intervals. This results in a logical matrix where each row is S symbols long and each column is N=K+M symbols tall.
The algorithm looks like the following:
- Given a dataset chunked in equally sized blocks and rounded up to the next multiple of
K, whereKrepresents the number of symbols to be coded together andMthe resulting parity symbols. - Take
K,Sspaced blocks andKsymbolssfrom each of the selected blocks at offset 0 and encode intoMparity symbols, each placed in newSspaced blocks at the same offset and appended to the end of the sequence of original blocks. Repeat this steps at offset1*sizeof(GF(p))and so on. - Repeat the above steps for the length of the entire dataset.
Bellow is a graphical outline of the process:
The sequence of original blocks
The logical matrix resulting from stacking each S symbols together, where K=3 and S=4
Symbols and Coding direction. Each cell corresponds to a symbol s and each column of symbols are coded together
The resulting matrix with parity blocks added, where K=3, M=2, N=5 and S=4
The resulting structure is a matrix of height N and width S. It allows loosing any M "rows" of the matrix and still reconstructing the original dataset. Of course, loosing more than M symbols in a given column would still render the entire dataset invalid, but the likelihood of that happening is mitigated by placing the individual original and parity blocks on independent locations.
Moreover, the resulting dataset is still systematic, which means that the original blocks are unchanged and can be used without prior decoding.
Data placement and erasures
The code introduced in the above section satisfies our original requirement of any K blocks allowing to reconstruct the original dataset. In fact, one can easily see that every row in the resulting matrix is a standalone element and any K rows will allow reconstructing the original dataset.
However, the code is K elements strong only if we operate under the assumption that each failure is independent of each other. Thus, it is a requirement that each row is placed independently. Moreover, the overall strength of the code decreases based on the number of dependent failures. If we place N rows on two independent locations, we can only tolerate M=N/2 failures, three will allow tolerating M=N/3 failures and so on. Hence, the code is only as strong as the number of independent locations each element is stored on. Thus, each row and better yet, each element (block) of the matrix should be stored independently and in a pattern mitigating dependence, meaning that placing elements of the same column together should be avoided.
Adversarial vs random erasures
If the above placement rules are respect, there is still a problem that needs to be addressed - random erasures. Both the code and the placement rules protect against random erasures, meaning erasures that aren't targeted or coordinated in any way, it doesn't protect against adversarial erasures - targeted or coordinated erasures.