scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
22 Jul 2002
TL;DR: In this paper, the authors present a system and method for testing integrity of data transmitted across a network connection, which generally includes creating one or more test threads on one of the test clients attached to a server through the network connection.
Abstract: Embodiments of the present invention generally provide a system and method for testing integrity of data transmitted across a network connection. In one embodiment, the method generally includes creating one or more test threads on one or more test clients attached to a server through the network connection. The method further includes, for each test thread, generating a data load on the data connection by repetitively writing test data patterns to a data file on the server, reading data patterns from the data file, and comparing the data patterns read from the data file to the test data patterns written to the data file to detect data corruptions. The method may further include measuring data throughput between the one or more test clients and the server and generating debug information if a data corruption is detected by one of the test threads.

17 citations

Proceedings ArticleDOI
24 Jun 2019
TL;DR: SANS-SOUCI is able to perform repair for both software (function) and sensor produced data corruption with very low overhead and is evaluated using a portable, open source, distributed IoT platform, example applications, and microbenchmarks.
Abstract: Motivated by the growth of Internet of Things (IoT) technologies and the volumes and velocity of data that they can and will produce, we investigate automated data repair for event-driven, IoT applications. IoT devices are heterogeneous in their hardware architectures, software, size, cost, capacity, network capabilities, power requirements, etc. They must execute in a wide range of operating environments where failures and degradations of service due to hardware malfunction, software bugs, network partitions, etc. cannot be immediately remediated. Further, many of these failure modes cause corruption in the data that these devices produce and in the computations "downstream" that depend on this data.To "repair" corrupted data from its origin through its computational dependencies in a distributed IoT setting, we explore SANS-SOUCI--a system for automatically tracking causal data dependencies and re-initiating dependent computations in event-driven IoT deployment frameworks. SANS-SOUCI presupposes an event-driven programming model based on cloud functions, which we extend for portable execution across IoT tiers (device, edge, cloud). We add fast, persistent, append-only storage and versioning for efficient data robustness and durability. SANS-SOUCI records events and their causal dependencies using a distributed event log and repairs applications dynamically, across tiers via replay. We evaluate SANS-SOUCI using a portable, open source, distributed IoT platform, example applications, and microbenchmarks. We find that SANS-SOUCI is able to perform repair for both software (function) and sensor produced data corruption with very low overhead.

17 citations

Patent
30 Aug 2004
TL;DR: In this article, a data corruption checker is integrated into the data backup operation, which can skip over minor corruptions and back up the non-corrupt files, or can abort the backup and locate a major corruption.
Abstract: In one embodiment, a data corruption checker is integrated into the data backup operation. In one embodiment, the data corruption checker can skip over minor corruptions and back up the non-corrupt files, or can abort the backup and locate a major corruption. In one embodiment, the present invention includes receiving a backup command at a storage server, the backup command requesting that the storage server perform a backup operation on a storage component, scanning a set of inodes associated with the storage component to determine a subset of inodes corresponding to files to be backed up, and, as part of the scanning, identifying one or more corrupted files.

17 citations

Patent
Janet E. Adkins1, Joon Chang1
16 May 2007
TL;DR: In this article, a system for managing a file system is presented, where each data block in the file system that is owned by the image is searched for and then it is determined whether a data block owned by an image is marked in a first map and a second map.
Abstract: A system for managing a file system. In response to a user selecting an image of the file system to perform a rollback operation, each data block in the file system that is owned by the image is searched for. Then, it is determined whether a data block owned by the image is marked in a first map and a second map. In response to determining that the data block owned by the image is marked in the first map and the second map, the data block is marked in a third map. In response to determining that the data block owned by the image is marked in the third map, a new data block is allocated in the file system. Subsequently, data from the data block owned by the image is copied to the new data block in the file system prior to performing the rollback operation to avoid a collision that causes data corruption.

17 citations

Patent
17 Nov 2008
TL;DR: A duplicate address discovery process detects duplicate MAC addresses or duplicate unique port identifiers within the network, alerts attached devices of the duplicates, and takes action to avoid data corruption that might be caused by such duplicate addresses as discussed by the authors.
Abstract: A duplicate address discovery process detects duplicate MAC addresses or duplicate unique port identifiers within the network, alerts attached devices of the duplicates, and takes action to avoid data corruption that might be caused by such duplicate addresses.

17 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727