Preserving data 4 risks co ncy safety c/e Preserving data Sebastien Ponce sebastien.ponce@cern.ch CERN Thematic CERN School of Computing 2018 1/43 S.Ponce-CERN
Preserving data 1 / 43 S. Ponce - CERN risks consistency safety c/c Preserving data S´ebastien Ponce sebastien.ponce@cern.ch CERN Thematic CERN School of Computing 2018
Preserving data 花5 In the previous episodes... o We've found out how to store data efficiently o And how to distribute it o And even how to distribute the computation 2/43 S.Ponce-CERN
Preserving data 2 / 43 S. Ponce - CERN risks consistency safety c/c In the previous episodes... We’ve found out how to store data efficiently And how to distribute it And even how to distribute the computation Today Let’s make sure we do not lose or corrupt our nice data !
Preserving data In the previous episodes... We've found out how to store data efficiently o And how to distribute it o And even how to distribute the computation Today Let's make sure we do not lose or corrupt our nice data 2/43 S.Ponce-CERN
Preserving data 2 / 43 S. Ponce - CERN risks consistency safety c/c In the previous episodes... We’ve found out how to store data efficiently And how to distribute it And even how to distribute the computation Today Let’s make sure we do not lose or corrupt our nice data !
Preserving data risls conaistency safety c/c Outline Risks of data loss and corruption ② Data consistency ●Checksums ●Block checksums ③ Data safety ●Redundancy ●Parity ●Erasure coding Conclusion 3/43 S.Ponce-CERN
Preserving data 3 / 43 S. Ponce - CERN risks consistency safety c/c Outline 1 Risks of data loss and corruption 2 Data consistency Checksums Block checksums 3 Data safety Redundancy Parity Erasure coding 4 Conclusion
Preserving data risks consistency safety c/e Risks of data loss and corruption ① Risks of data loss and corruption 2 Data consistency Data safety Conclusion 4/43 S.Ponce-CERN
Preserving data 4 / 43 S. Ponce - CERN risks consistency safety c/c Risks of data loss and corruption 1 Risks of data loss and corruption 2 Data consistency 3 Data safety 4 Conclusion