首页 > 最新文献

2010 IEEE Fifth International Conference on Networking, Architecture, and Storage最新文献

英文 中文
A Deadlock-Free Non-minimal Fully Adaptive Routing Using Virtual Cut-Through Switching 基于虚拟直通交换的无死锁非最小全自适应路由
Yuri Nishikawa, M. Koibuchi, Hiroki Matsutani, H. Amano
System area networks (SANs), which usually employ virtual cut-through switching, have been used to connect hosts in modern PC clusters and massively parallel computers. In this paper, we propose a non-minimal fully adaptive deadlock-free routing mechanism for virtual-cut-through networks called “Semi-deflection”. Semi-deflection routing guarantees deadlock-free packet transfer without use of virtual channels by allowing non-blocking transfer between specific pairs of routers. As the result of throughput evaluation, Semideflection routing improved throughput by up to 26 percent compared with that of north-last turn model, which is a typical adaptive routing, and also reduced latency.
通常采用虚拟直通交换的系统区域网络(san)已被用于连接现代PC集群和大规模并行计算机中的主机。在本文中,我们提出了一种非最小的全自适应无死锁路由机制,称为“半偏转”虚拟直通网络。半偏转路由通过允许在特定对路由器之间的非阻塞传输,保证了不使用虚拟通道的无死锁数据包传输。经过吞吐量评估,半反射路由比典型的自适应路由北转模型提高了26%的吞吐量,并且减少了延迟。
{"title":"A Deadlock-Free Non-minimal Fully Adaptive Routing Using Virtual Cut-Through Switching","authors":"Yuri Nishikawa, M. Koibuchi, Hiroki Matsutani, H. Amano","doi":"10.1109/NAS.2010.50","DOIUrl":"https://doi.org/10.1109/NAS.2010.50","url":null,"abstract":"System area networks (SANs), which usually employ virtual cut-through switching, have been used to connect hosts in modern PC clusters and massively parallel computers. In this paper, we propose a non-minimal fully adaptive deadlock-free routing mechanism for virtual-cut-through networks called “Semi-deflection”. Semi-deflection routing guarantees deadlock-free packet transfer without use of virtual channels by allowing non-blocking transfer between specific pairs of routers. As the result of throughput evaluation, Semideflection routing improved throughput by up to 26 percent compared with that of north-last turn model, which is a typical adaptive routing, and also reduced latency.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125810722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of a c-Load-Collision-Protocol for Load-Balancing in Interactive Environments 交互式环境中用于负载平衡的c- load - collision -协议的评估
Tim Süß, T. Wiesemann, M. Fischer
Many professional cluster systems consist of nodes with different hardware configurations. Such heterogeneous environments require different load-balancing techniques than homogenous environments. The c-load-collision-protocol is able to achieve good results for data-management purposes. Using this protocol, we propose a way for load-balancing in interactive rendering environments. For this work, we implemented a parallel rendering system and took different picking strategies into account to compare the results. The advantage of our approach compared to other approaches is that we group the available nodes of a cluster into two different categories, based on the hardware abilities. Some nodes are used solely for rendering, while others serve as secondary storage and to assist the former ones by performing auxiliary calculations.
许多专业集群系统由具有不同硬件配置的节点组成。与同类环境相比,这种异构环境需要不同的负载平衡技术。c-load-collision-协议能够在数据管理方面取得很好的效果。利用该协议,我们提出了一种在交互式呈现环境中实现负载平衡的方法。在这项工作中,我们实现了一个并行渲染系统,并考虑了不同的选择策略来比较结果。与其他方法相比,我们的方法的优势在于,我们根据硬件能力将集群的可用节点分为两个不同的类别。有些节点仅用于呈现,而其他节点则用作辅助存储,并通过执行辅助计算来协助前一个节点。
{"title":"Evaluation of a c-Load-Collision-Protocol for Load-Balancing in Interactive Environments","authors":"Tim Süß, T. Wiesemann, M. Fischer","doi":"10.1109/NAS.2010.52","DOIUrl":"https://doi.org/10.1109/NAS.2010.52","url":null,"abstract":"Many professional cluster systems consist of nodes with different hardware configurations. Such heterogeneous environments require different load-balancing techniques than homogenous environments. The c-load-collision-protocol is able to achieve good results for data-management purposes. Using this protocol, we propose a way for load-balancing in interactive rendering environments. For this work, we implemented a parallel rendering system and took different picking strategies into account to compare the results. The advantage of our approach compared to other approaches is that we group the available nodes of a cluster into two different categories, based on the hardware abilities. Some nodes are used solely for rendering, while others serve as secondary storage and to assist the former ones by performing auxiliary calculations.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127154096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Adaptive and Selective Instruction Active Push Mechanism for Multi-core Architecture 一种多核结构的自适应选择性指令主动推送机制
Jun Zhang, K. Mei, Jizhong Zhao
Correct and effective instruction pre-fetch strategy is key technique to avoid instruction misses. Unfortunately, branch direction correctness and the accuracy of instruction pre-fetch is not very good, and the utilization ratio of memory bandwidth is relative low, all of these mentioned reasons are the main factors leading to instruction miss. This paper proposes an adaptive and selective instruction active push mechanism for multi-core architecture, called ASIAP. On one hand, request number of invalid instruction pre-fetch is decreased and precise instruction pre-fetch is carried on; on the other hand, part of non-sequential type requests are responded preferentially by a specific instruction active push unit adaptively and selectively. Simulation result indicates that, in double-core configuration, relative to three other strategies, Next_Line, Target_Line and Wrong_Path, the accuracy of ASIAP improves average 22.59%, 11.84% and 8.85% respectively. Relative to Next_Line, the reduction of L1 I-Cache miss ranges from 17.7% to 33.5%, average 26.08%.
正确有效的指令预取策略是避免指令丢失的关键技术。然而,分支方向的正确性和指令预取的准确性不是很好,内存带宽的利用率相对较低,这些都是导致指令丢失的主要原因。本文提出了一种多核架构的自适应选择性指令主动推送机制,称为ASIAP。一方面减少了无效指令预取请求数,进行了精确的指令预取;另一方面,部分非顺序型请求由特定指令主动推送单元自适应地、选择性地优先响应。仿真结果表明,在双核配置下,相对于Next_Line、Target_Line和Wrong_Path三种策略,ASIAP的准确率平均分别提高了22.59%、11.84%和8.85%。相对于Next_Line, L1 I-Cache缺失减少幅度为17.7% ~ 33.5%,平均为26.08%。
{"title":"An Adaptive and Selective Instruction Active Push Mechanism for Multi-core Architecture","authors":"Jun Zhang, K. Mei, Jizhong Zhao","doi":"10.1109/NAS.2010.15","DOIUrl":"https://doi.org/10.1109/NAS.2010.15","url":null,"abstract":"Correct and effective instruction pre-fetch strategy is key technique to avoid instruction misses. Unfortunately, branch direction correctness and the accuracy of instruction pre-fetch is not very good, and the utilization ratio of memory bandwidth is relative low, all of these mentioned reasons are the main factors leading to instruction miss. This paper proposes an adaptive and selective instruction active push mechanism for multi-core architecture, called ASIAP. On one hand, request number of invalid instruction pre-fetch is decreased and precise instruction pre-fetch is carried on; on the other hand, part of non-sequential type requests are responded preferentially by a specific instruction active push unit adaptively and selectively. Simulation result indicates that, in double-core configuration, relative to three other strategies, Next_Line, Target_Line and Wrong_Path, the accuracy of ASIAP improves average 22.59%, 11.84% and 8.85% respectively. Relative to Next_Line, the reduction of L1 I-Cache miss ranges from 17.7% to 33.5%, average 26.08%.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128457481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Route Discovery Algorithm for MANETs 面向多网的高效路由发现算法
Mznah Al-Rodhaan, A. Al-Dhelaan
On-demand routing protocols used in mobile ad hoc networks suffer from transmitting a huge number of control packets which increases the overhead. In this new algorithm (ERDA), we try to improve the route discovery algorithm by reducing the routing overhead in the presence of random traffic. ERDA broadcasts any route request travelling within their source node’s neighbourhood region according to the routing algorithm used. However, propagation of the route request is deliberately delayed outside this region to provide the associated chase packet with an opportunity to stop the fulfilled route request and minimise network congestion. The algorithm is adaptive and continuously updates the boundary of each source node’s neighbourhood to improve performance. We provide detailed performance evaluation using simulation modelling. Our result shows that ERDA improves the performance by minimizing the average end-to-end delay as well as the network overhead and congestion level.
移动自组织网络中使用的按需路由协议需要传输大量的控制数据包,这增加了开销。在这个新算法(ERDA)中,我们试图通过减少随机流量存在下的路由开销来改进路由发现算法。ERDA根据所使用的路由算法广播在其源节点邻近区域内传播的任何路由请求。然而,路由请求的传播被故意延迟到该区域之外,以提供相关的追逐包有机会停止已完成的路由请求并最小化网络拥塞。该算法具有自适应能力,并不断更新每个源节点的邻域边界以提高性能。我们使用仿真建模提供详细的性能评估。我们的结果表明,ERDA通过最小化平均端到端延迟以及网络开销和拥塞级别来提高性能。
{"title":"Efficient Route Discovery Algorithm for MANETs","authors":"Mznah Al-Rodhaan, A. Al-Dhelaan","doi":"10.1109/NAS.2010.30","DOIUrl":"https://doi.org/10.1109/NAS.2010.30","url":null,"abstract":"On-demand routing protocols used in mobile ad hoc networks suffer from transmitting a huge number of control packets which increases the overhead. In this new algorithm (ERDA), we try to improve the route discovery algorithm by reducing the routing overhead in the presence of random traffic. ERDA broadcasts any route request travelling within their source node’s neighbourhood region according to the routing algorithm used. However, propagation of the route request is deliberately delayed outside this region to provide the associated chase packet with an opportunity to stop the fulfilled route request and minimise network congestion. The algorithm is adaptive and continuously updates the boundary of each source node’s neighbourhood to improve performance. We provide detailed performance evaluation using simulation modelling. Our result shows that ERDA improves the performance by minimizing the average end-to-end delay as well as the network overhead and congestion level.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FPG-Grow: A Graph Based Pattern Grow Algorithm for Application Level IO Pattern Mining fpga -Grow:一种应用级IO模式挖掘的基于图的模式增长算法
Jingliang Zhang, Junwei Zhang, Lu Xu
The previous study of pattern discovery in storage systems focus on sequential pattern (SP) mining in lower level traces, but they don’t scale well to the application level. For patterns in application level are mostly composed of Contiguous Item Sequential Patterns (CISP) which are much simpler than SP, so it’s inefficient for the previous studies to mine CISP with clumsy SP mining algorithms. We propose a novel algorithm FPG-Grow which is more preferable for mining application level IO patterns. The FPG-Grow only scan the origin sequence in one-pass to construct a Frequent Pattern Graph (FPG), from which we can easily extract the CISPs by fetching the frequent sub-graphs with linear cost. Also we can do the verification efficiently by avoiding the origin sequence scan. Furthermore, the grow method will eliminate the information loss introduced by sequence cutting as C-Miner does. The experiment result shows that the FPG-Grow outperforms C-Miner prominently in mining with real application IO traces and the simulation result also proves the effectiveness of CISP in application IO optimizations.
以前对存储系统中模式发现的研究主要集中在较低级行的顺序模式(SP)挖掘,但它们不能很好地扩展到应用程序级别。由于应用层模式多由连续项目序列模式(CISP)组成,CISP比连续项目序列模式简单得多,使用笨拙的连续项目序列模式挖掘算法对CISP进行挖掘是低效的。我们提出了一种新的算法fpga - grow,它更适合于应用级IO模式的挖掘。fpga - grow算法只需要对原始序列进行一次扫描就能构造出频繁模式图(FPG),通过线性代价提取频繁子图就能很容易地提取出cisp。同时,通过避免原始序列扫描,可以有效地进行验证。此外,生长方法消除了序列切割带来的信息损失。实验结果表明,fpga - grow在真实应用IO轨迹的挖掘中明显优于C-Miner,仿真结果也证明了CISP在应用IO优化中的有效性。
{"title":"FPG-Grow: A Graph Based Pattern Grow Algorithm for Application Level IO Pattern Mining","authors":"Jingliang Zhang, Junwei Zhang, Lu Xu","doi":"10.1109/NAS.2010.23","DOIUrl":"https://doi.org/10.1109/NAS.2010.23","url":null,"abstract":"The previous study of pattern discovery in storage systems focus on sequential pattern (SP) mining in lower level traces, but they don’t scale well to the application level. For patterns in application level are mostly composed of Contiguous Item Sequential Patterns (CISP) which are much simpler than SP, so it’s inefficient for the previous studies to mine CISP with clumsy SP mining algorithms. We propose a novel algorithm FPG-Grow which is more preferable for mining application level IO patterns. The FPG-Grow only scan the origin sequence in one-pass to construct a Frequent Pattern Graph (FPG), from which we can easily extract the CISPs by fetching the frequent sub-graphs with linear cost. Also we can do the verification efficiently by avoiding the origin sequence scan. Furthermore, the grow method will eliminate the information loss introduced by sequence cutting as C-Miner does. The experiment result shows that the FPG-Grow outperforms C-Miner prominently in mining with real application IO traces and the simulation result also proves the effectiveness of CISP in application IO optimizations.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124654845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks 异构智能监控网络中的容错数据采集
Jing Deng, Meikang Qiu, Gang Wu
In this work, we focus on the problem of fault tolerant data collection in heterogeneous Intelligent Monitoring Networks(IMNs). IMNs are expected to have a wide range of applications in many fields such as forest monitoring, structural monitoring, and industrial plant monitoring. We present our fault tolerant datacollection scheme in the hierarchical structure of IMNs. We use an interesting technique borrowed from the popular BitTorrent software to maintain a highly efficient and robust data collection in IMNs with heterogeneous and faulty devices. In our proposed scheme, monitoring sensors are instructed to randomly select some overheard transmissions and process them in data fusion. Our preliminary study confirmed the benefits of the fault tolerant data collection strategy.
本文主要研究异构智能监控网络(IMNs)中的容错数据采集问题。IMNs在森林监测、结构监测、工业厂房监测等领域具有广泛的应用前景。提出了一种基于imn分层结构的容错数据采集方案。我们从流行的BitTorrent软件中借用了一种有趣的技术,在异构和故障设备的IMNs中保持高效和健壮的数据收集。在我们提出的方案中,监测传感器被指示随机选择一些窃听传输并在数据融合中处理它们。我们的初步研究证实了容错数据收集策略的好处。
{"title":"Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks","authors":"Jing Deng, Meikang Qiu, Gang Wu","doi":"10.1109/NAS.2010.21","DOIUrl":"https://doi.org/10.1109/NAS.2010.21","url":null,"abstract":"In this work, we focus on the problem of fault tolerant data collection in heterogeneous Intelligent Monitoring Networks(IMNs). IMNs are expected to have a wide range of applications in many fields such as forest monitoring, structural monitoring, and industrial plant monitoring. We present our fault tolerant datacollection scheme in the hierarchical structure of IMNs. We use an interesting technique borrowed from the popular BitTorrent software to maintain a highly efficient and robust data collection in IMNs with heterogeneous and faulty devices. In our proposed scheme, monitoring sensors are instructed to randomly select some overheard transmissions and process them in data fusion. Our preliminary study confirmed the benefits of the fault tolerant data collection strategy.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Early Experience and Evaluation of File Systems on SSD with Database Applications 基于数据库应用的SSD文件系统早期体验与评估
Yongkun Wang, K. Goda, M. Nakano, M. Kitsuregawa
Flash SSDs are being incorporated in many enterprise storage platforms recently. However, the characteristics of the flash SSD are quite different from that of hard disk. The IO strategies in the existing systems should be carefully evaluated. This paper provides an evaluation on the flash-based transaction processing system. Two file systems, traditional in-place update-based file system and log-structured file system, are selected as the representative of two write strategies. Usually, the log-structured file system is believed to play better on flash SSDs. Our experiment shows that the performance results of two database applications are diverse with two file systems on different flash SSDs. We analyze the performance in different configurations. Based on the analysis, we provide our experience on building the flash-based database system to better utilize the performance benefits of flash SSDs.
最近,许多企业存储平台都采用了闪存固态硬盘。然而,闪存固态硬盘的特性与硬盘有很大的不同。应当仔细评价现有系统中的IO战略。本文对基于flash的事务处理系统进行了评价。本文选择传统的基于就地更新的文件系统和日志结构的文件系统作为两种写策略的代表。通常,人们认为日志结构的文件系统在闪存ssd上运行得更好。我们的实验表明,在不同的闪存ssd上使用两个文件系统,两个数据库应用程序的性能结果是不同的。我们分析了不同配置下的性能。在此基础上,我们提供了构建基于闪存的数据库系统的经验,以便更好地利用闪存ssd的性能优势。
{"title":"Early Experience and Evaluation of File Systems on SSD with Database Applications","authors":"Yongkun Wang, K. Goda, M. Nakano, M. Kitsuregawa","doi":"10.1109/NAS.2010.12","DOIUrl":"https://doi.org/10.1109/NAS.2010.12","url":null,"abstract":"Flash SSDs are being incorporated in many enterprise storage platforms recently. However, the characteristics of the flash SSD are quite different from that of hard disk. The IO strategies in the existing systems should be carefully evaluated. This paper provides an evaluation on the flash-based transaction processing system. Two file systems, traditional in-place update-based file system and log-structured file system, are selected as the representative of two write strategies. Usually, the log-structured file system is believed to play better on flash SSDs. Our experiment shows that the performance results of two database applications are diverse with two file systems on different flash SSDs. We analyze the performance in different configurations. Based on the analysis, we provide our experience on building the flash-based database system to better utilize the performance benefits of flash SSDs.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125968059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A High Effective Indexing and Retrieval Method Providing Block-Level Timely Recovery to Any Point-in-Time 提供块级及时恢复到任何时间点的高效索引和检索方法
Yonghong Sheng, Dan Xu, Dongsheng Wang
Block-level continuous data protection (CDP) logs every disk write operation so that the disk can be rolled back to any arbitrary point-in-time within a time window. For each update operation is time stamped and logged, the indexing for such huge amounts of records is an important and challenging problem. Unfortunately, the conventional indexing methods can not efficiently record large numbers of versions and support instant “time-travel” types of queries in CDP. In this paper, we present an effective indexing method providing timely recovery to any point-in-time in comprehensive versioning systems, called the Hierarchical Spatial-Temporal Indexing Method (HSTIM). The basic principle of HSTIM is to partition the time domain and the production storage LBAs into time slice and segments respectively according to update frequency of disk IOs, and build separate index file for each segment. In order to meet the demands of instant view of history data, the metadata of production storage is independently indexed. For long-time history data retrieval requirements, index snapshot is introduced in HSTIM to reduce the retrieval time. Another distinctive feature of HSTIM is its incremental retrieval method, which achieves high query performance at time point t + t if neighboring time point t is queried previously. The paper compares HSTIM with traditional B+-tree and multi-version B-tree (MVBT) index in many aspects. Experiments with real workload IO trace files show that HSTIM can locate history data within 8.05 seconds for recovery point of 48 hours, while B+-tree consumes 24.04 seconds. If the index snapshot is applied, HSTIM can reduce such retrieval time within 3 seconds.
CDP (Block-level continuous data protection)记录磁盘的每次写操作,以便在一个时间窗口内将磁盘回滚到任意时间点。由于每个更新操作都有时间戳和日志,因此对如此大量的记录进行索引是一个重要且具有挑战性的问题。遗憾的是,传统的索引方法不能有效地记录大量的版本,也不能支持CDP中即时的“时间旅行”类型的查询。在本文中,我们提出了一种有效的索引方法,可以在综合版本控制系统中及时恢复到任何时间点,称为分层时空索引方法(HSTIM)。HSTIM的基本原理是根据磁盘io的更新频率,将时域和生产存储LBAs分别划分为时间片和时间段,并为每个时间段构建单独的索引文件。为了满足即时查看历史数据的需求,生产存储的元数据被独立索引。针对长时间的历史数据检索需求,在HSTIM中引入了索引快照来减少检索时间。HSTIM的另一个显著特点是它的增量检索方法,如果之前查询相邻的时间点t,则在时间点t + t处获得较高的查询性能。本文将HSTIM与传统B+树和多版本B-树(MVBT)索引进行了多方面的比较。对真实工作负载IO跟踪文件的实验表明,对于48小时的恢复点,HSTIM可以在8.05秒内找到历史数据,而B+-tree则需要24.04秒。如果应用索引快照,HSTIM可以在3秒内减少这种检索时间。
{"title":"A High Effective Indexing and Retrieval Method Providing Block-Level Timely Recovery to Any Point-in-Time","authors":"Yonghong Sheng, Dan Xu, Dongsheng Wang","doi":"10.1109/NAS.2010.63","DOIUrl":"https://doi.org/10.1109/NAS.2010.63","url":null,"abstract":"Block-level continuous data protection (CDP) logs every disk write operation so that the disk can be rolled back to any arbitrary point-in-time within a time window. For each update operation is time stamped and logged, the indexing for such huge amounts of records is an important and challenging problem. Unfortunately, the conventional indexing methods can not efficiently record large numbers of versions and support instant “time-travel” types of queries in CDP. In this paper, we present an effective indexing method providing timely recovery to any point-in-time in comprehensive versioning systems, called the Hierarchical Spatial-Temporal Indexing Method (HSTIM). The basic principle of HSTIM is to partition the time domain and the production storage LBAs into time slice and segments respectively according to update frequency of disk IOs, and build separate index file for each segment. In order to meet the demands of instant view of history data, the metadata of production storage is independently indexed. For long-time history data retrieval requirements, index snapshot is introduced in HSTIM to reduce the retrieval time. Another distinctive feature of HSTIM is its incremental retrieval method, which achieves high query performance at time point t + t if neighboring time point t is queried previously. The paper compares HSTIM with traditional B+-tree and multi-version B-tree (MVBT) index in many aspects. Experiments with real workload IO trace files show that HSTIM can locate history data within 8.05 seconds for recovery point of 48 hours, while B+-tree consumes 24.04 seconds. If the index snapshot is applied, HSTIM can reduce such retrieval time within 3 seconds.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120864548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Cache Blocks: An Efficient Scheme for Solid State Drives without DRAM Cache 缓存块:无DRAM缓存的固态硬盘的有效方案
Fei Wu, Xiang Chen, Ji-guang Wan
Most solid state drives use DRAM for device’s cache, the volatile memory provides the I/O Caching ability, and maintains the drives’ mapping table (indicates the correspondence between physical unit and logical unit). However, when the drives’ power shut down unexpected, the volatile DRAM memory may lose the caching data, which did not have time to write to the drives’ storage media, so the dirty data generated. This paper proposes an efficient management scheme for low cost Solid State Drives, with low cost ASIC controller chip, only has internal SRAM memory, and no external DRAM. We use a kind of Cache Blocks: when write requests come, write in these areas first, and write in the sequentially physical place, and the limited internal SRAM for the mapping tables maintaining and data transferring. We propose some efficient methods: 1)using flash memory as cache, 2) page mapping for cache blocks regions, block mapping for data blocks regions, 3) binding two planes operation, 4) using the idle internal plane SRAM as data buffer to improve the I/O performance, without DRAM. So we avoid the dirty data when the power loses unexpected. And this scheme is energy-efficient and low cost. We test the scheme on our own SSD test board, with the pool SRAM size, the I/O performances do not decrease two much, and the random write even better about 20%, compare to the SSD with DRAM. The experiment also shows, this scheme cuts about 21% energy than the DRAM architecture. And it may be adapted in consumer electronics area.
大多数固态驱动器使用DRAM作为设备的缓存,易失性存储器提供I/O缓存能力,并维护驱动器的映射表(指示物理单元和逻辑单元之间的对应关系)。然而,当驱动器意外断电时,易失性DRAM存储器可能丢失缓存数据,这些数据来不及写入驱动器的存储介质,因此产生脏数据。本文提出了一种高效的低成本固态硬盘管理方案,采用低成本的ASIC控制器芯片,只有内部SRAM存储器,没有外部DRAM。我们使用一种缓存块:当写请求来的时候,先在这些区域写,然后在顺序的物理位置写,有限的内部SRAM用于维护映射表和数据传输。我们提出了一些有效的方法:1)使用闪存作为缓存,2)缓存块区域的页面映射,数据块区域的块映射,3)绑定两平面操作,4)使用空闲的内部平面SRAM作为数据缓冲区以提高I/O性能,而不使用DRAM。避免了意外断电时产生的脏数据。该方案节能、成本低。我们在自己的SSD测试板上对该方案进行了测试,与池SRAM大小相比,I/O性能没有下降太多,随机写性能甚至比带有DRAM的SSD好20%左右。实验还表明,该方案比DRAM架构节能约21%。并可应用于消费电子领域。
{"title":"Cache Blocks: An Efficient Scheme for Solid State Drives without DRAM Cache","authors":"Fei Wu, Xiang Chen, Ji-guang Wan","doi":"10.1109/NAS.2010.58","DOIUrl":"https://doi.org/10.1109/NAS.2010.58","url":null,"abstract":"Most solid state drives use DRAM for device’s cache, the volatile memory provides the I/O Caching ability, and maintains the drives’ mapping table (indicates the correspondence between physical unit and logical unit). However, when the drives’ power shut down unexpected, the volatile DRAM memory may lose the caching data, which did not have time to write to the drives’ storage media, so the dirty data generated. This paper proposes an efficient management scheme for low cost Solid State Drives, with low cost ASIC controller chip, only has internal SRAM memory, and no external DRAM. We use a kind of Cache Blocks: when write requests come, write in these areas first, and write in the sequentially physical place, and the limited internal SRAM for the mapping tables maintaining and data transferring. We propose some efficient methods: 1)using flash memory as cache, 2) page mapping for cache blocks regions, block mapping for data blocks regions, 3) binding two planes operation, 4) using the idle internal plane SRAM as data buffer to improve the I/O performance, without DRAM. So we avoid the dirty data when the power loses unexpected. And this scheme is energy-efficient and low cost. We test the scheme on our own SSD test board, with the pool SRAM size, the I/O performances do not decrease two much, and the random write even better about 20%, compare to the SSD with DRAM. The experiment also shows, this scheme cuts about 21% energy than the DRAM architecture. And it may be adapted in consumer electronics area.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"129 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120899801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Reliable Distributed Secure Database System 一个可靠的分布式安全数据库系统的设计
Li Bai, S. Biswas, F. Ferrese
We propose to develop a design for a reliable distributed relational database management system to safeguard sensitive information. Each day, increasingly more highly sophisticated computer attacks are occurring in the information storage systems of financial institutions, eCommerce businesses, universities, hospitals and government agencies. We urgently need to develop a secure and dependable way to safeguard our information repositories and storage systems. In this research, we propose to develop a highly robust, dependable and secure relational database management system to prevent sensitive information from being lost, stolen or corrupted. The basic idea is to i) include a (k, n) threshold-based secret sharing scheme (k ≤ n) to provide privacy and durability in order to prevent sensitive information from being lost or stolen, ii) incorporate an efficient distributed database management design to enhance system performance and minimize interfered accesses contentions, and iii) integrate private information storage (PIS) schemes to reduce communication overhead and improve robustness of the system.
我们提出了一种可靠的分布式关系数据库管理系统的设计,以保护敏感信息。每天,金融机构、电子商务企业、大学、医院和政府机构的信息存储系统都发生越来越多的高度复杂的计算机攻击。我们迫切需要开发一种安全可靠的方法来保护我们的信息库和存储系统。在本研究中,我们建议开发一个高度稳健、可靠和安全的关系数据库管理系统,以防止敏感信息丢失、被盗或损坏。其基本思想是i)包括一个(k, n)基于阈值的秘密共享方案(k≤n),以提供隐私和持久性,以防止敏感信息丢失或被盗,ii)结合一个高效的分布式数据库管理设计,以提高系统性能和最小化干扰访问争用,以及iii)集成私有信息存储(PIS)方案,以减少通信开销和提高系统的鲁棒性。
{"title":"Design of a Reliable Distributed Secure Database System","authors":"Li Bai, S. Biswas, F. Ferrese","doi":"10.1109/NAS.2010.61","DOIUrl":"https://doi.org/10.1109/NAS.2010.61","url":null,"abstract":"We propose to develop a design for a reliable distributed relational database management system to safeguard sensitive information. Each day, increasingly more highly sophisticated computer attacks are occurring in the information storage systems of financial institutions, eCommerce businesses, universities, hospitals and government agencies. We urgently need to develop a secure and dependable way to safeguard our information repositories and storage systems. In this research, we propose to develop a highly robust, dependable and secure relational database management system to prevent sensitive information from being lost, stolen or corrupted. The basic idea is to i) include a (k, n) threshold-based secret sharing scheme (k ≤ n) to provide privacy and durability in order to prevent sensitive information from being lost or stolen, ii) incorporate an efficient distributed database management design to enhance system performance and minimize interfered accesses contentions, and iii) integrate private information storage (PIS) schemes to reduce communication overhead and improve robustness of the system.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116877151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2010 IEEE Fifth International Conference on Networking, Architecture, and Storage
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1