Toward Eidetic Distributed File Systems. Xianzheng Dou, Jason Flinn, Peter M. Chen
|
|
- Gloria Wilkerson
- 6 years ago
- Views:
Transcription
1 Toward Eidetic Distributed File Systems Xianzheng Dou, Jason Flinn, Peter M. Chen
2 Rich file system features Modern file systems store more than just data Versioning: retention of past state Provenance-aware: connections between file data Problem: High costs for providing these rich features Xianzheng Dou 1
3 Versioning FS tradeoffs Frequency of versioning Less frequent Lower storage cost More frequent Higher storage cost 2
4 Versioning FS tradeoffs Frequency of versioning Less frequent Lower storage cost More frequent Higher storage cost Ext4 2
5 Versioning FS tradeoffs Frequency of versioning Less frequent Lower storage cost More frequent Higher storage cost Versionfs WAFL 2
6 Versioning FS tradeoffs Frequency of versioning Less frequent Lower storage cost More frequent Higher storage cost Elephant FS 2
7 Versioning FS tradeoffs Frequency of versioning Less frequent Lower storage cost More frequent Higher storage cost CVFS Wayback 2
8 Versioning FS tradeoffs Frequency of versioning Less frequent Lower storage cost More frequent Higher storage cost Any past user-level state? 2
9 Versioning FS tradeoffs Frequency of versioning Less frequent Lower storage cost More frequent Higher storage cost Any past user-level state? Any past file system state and any transient state 2
10 Provenance FS tradeoffs Details of connection information Lower granulartiy Lower storage cost Higher granularity Higher storage cost 3
11 Provenance FS tradeoffs Details of connection information Lower granulartiy Lower storage cost Higher granularity Higher storage cost Ext4 3
12 Provenance FS tradeoffs Details of connection information Lower granulartiy Lower storage cost Higher granularity Higher storage cost Connections 3
13 Provenance FS tradeoffs Details of connection information Lower granulartiy Lower storage cost Higher granularity Higher storage cost PASS 3
14 Provenance FS tradeoffs Details of connection information Lower granulartiy Lower storage cost Higher granularity Higher storage cost Complete byte-level provenance? 3
15 Background: eidetic systems[osdi 14] Recall any past user-level state By How pervasive to use deterministic X-ray How to record use and X-ray replay Record RECORD Log Latency Metric RECORD Logs of PLAY Log non-deterministic events Latency Metric Replay PLAY Mail Scope Request Mail Scope Request debug_peer_list List of root causes: mydomain.com 1) queue_directory 2) 3) Michael Chow 12 debug_peer_list List of root causes: mydomain.com 1) queue_directory 2) 3) Michael Chow 12 Xianzheng Dou 4
16 Background: eidetic systems[osdi 14] Recall any past user-level state By How pervasive to use deterministic X-ray How to record use and X-ray replay Record RECORD Log Latency Metric RECORD Logs of PLAY Log non-deterministic events Latency Metric Replay PLAY Mail Scope Request Mail Scope Request Provenance at the byte granularity debug_peer_list List of root causes: mydomain.com 1) debug_peer_list List of root causes: mydomain.com 1) queue_directory 2) queue_directory 2) Intra-process lineage: 3) dynamic information 3) tracking Michael Chow 12 Michael Chow 12 Inter-process lineage: data flow dependency graph Xianzheng Dou 4
17 A clean-sheet design of FS Eidetic systems prototype Graft eidetic support onto an existing FS Consider only local storage An eidetic distributed file system A small number of personal devices + cloud servers New design choices Fundamental unit of persistent storage File transfer Xianzheng Dou 5
18 Traditional distributed FS Xianzheng Dou 6
19 Traditional distributed FS Xianzheng Dou 6
20 Traditional distributed FS Xianzheng Dou 6
21 Traditional distributed FS Xianzheng Dou 6
22 Eidetic distributed file systems Xianzheng Dou 7
23 Eidetic distributed file systems Xianzheng Dou 7
24 Fundamental unit What is the fundamental unit of persistent storage? Xianzheng Dou 8
25 Fundamental unit What is the fundamental unit of persistent storage? Xianzheng Dou 8
26 Fundamental unit What is the fundamental unit of persistent storage? Replay Xianzheng Dou 8
27 Fundamental unit What is the fundamental unit of persistent storage? Xianzheng Dou 9
28 Fundamental unit What is the fundamental unit of persistent storage? Xianzheng Dou 9
29 Fundamental unit What is the fundamental unit of persistent storage? Fundamental unit: Logs of non-determinism Files are only considered as caches Xianzheng Dou 9
30 File persistency When is a file considered persistent on the server? Xianzheng Dou 10
31 File persistency When is a file considered persistent on the server? As long as logs generating the data are persistent Xianzheng Dou 10
32 File persistency When is a file considered persistent on the server? Xianzheng Dou 10
33 Updating server cache Should the server cache the file version?? Xianzheng Dou 11
34 Updating server cache Should the server cache the file version?? Probability of future access Costs for regeneration Xianzheng Dou 11
35 File transfer methods How are files transferred to the server? Xianzheng Dou 12
36 File transfer methods How are files transferred to the server? Xianzheng Dou 12
37 File transfer methods How are files transferred to the server? Xianzheng Dou 13
38 File transfer methods How are files transferred to the server? Xianzheng Dou 13
39 File transfer methods How are files transferred to the server? Compare computation costs with communication costs - by value (file data) - or by replay Xianzheng Dou 13
40 Read path How should a client read a particular version? Xianzheng Dou 14
41 Read path How should a client read a particular version? Xianzheng Dou 14
42 Available transfer methods How should a client read a particular version? Xianzheng Dou 15
43 Available transfer methods How should a client read a particular version? Xianzheng Dou 15
44 Available transfer methods How should a client read a particular version? Xianzheng Dou 15
45 Available transfer methods How should a client read a particular version? Xianzheng Dou 16
46 Available transfer methods How should a client read a particular version? Xianzheng Dou 16
47 Available transfer methods How should a client read a particular version? Xianzheng Dou 16
48 Available transfer methods How should a client read a particular version? Xianzheng Dou 17
49 Available transfer methods How should a client read a particular version? By value By replay on the client By replay on the server From peers Xianzheng Dou 17
50 Choosing the right method How should a client read a particular version? Server has the most complete knowledge Metrics User waiting time Monetary cost Client energy consumption Xianzheng Dou 18
51 Feasibility Eidetic system overheads Record 4 years of workstation data on a 4TB hard disk Under 8% performance overhead on most benchmarks Applications (log size vs. diff size) Logs are smaller image/audio editing, latex, make, slides editing Diffs are smaller: text editing File sharing Most files are not shared Xianzheng Dou 19
52 Conclusions A new point in the design space of Versioning file systems Provenance-aware file systems Hypothesis More effective in versioning and provenance Achieving reasonable overheads Under implementation Xianzheng Dou 20
53 Thank you! Xianzheng Dou 21
Knockoff: Cheap versions in the cloud. Xianzheng Dou, Peter M. Chen, Jason Flinn
Knockoff: Cheap versions in the cloud Xianzheng Dou, Peter M. Chen, Jason Flinn Cloud-based storage Google Drive Dropbox Pros: Ease-of-management Reliability Microsoft OneDrive Xianzheng Dou 1 Cloud-based
More informationEidetic Systems. David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M. Chen, University of Michigan
Eidetic Systems David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M. Chen, University of Michigan https://www.usenix.org/conference/osdi14/technical-sessions/presentation/devecsery This
More informationVarious Versioning & Snapshot FileSystems
Various Versioning & Snapshot FileSystems Our FileSystem versioning requirements, as I understand: A. Frequency of versioning at specified points-in-time B. Granularity of versioning a single or collection
More informationEidetic Systems. David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M. Chen University of Michigan. Abstract.
Eidetic Systems David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M. Chen University of Michigan Abstract The vast majority of state produced by a typical computer is generated, consumed,
More informationLoad-Sto-Meter: Generating Workloads for Persistent Memory Damini Chopra, Doug Voigt Hewlett Packard (Enterprise)
Load-Sto-Meter: Generating Workloads for Persistent Memory Damini Chopra, Doug Voigt Hewlett Packard (Enterprise) Application vs. Pure Workloads Benchmarks that reproduce application workloads Assist in
More informationEfficient, Scalable, and Provenance-Aware Management of Linked Data
Efficient, Scalable, and Provenance-Aware Management of Linked Data Marcin Wylot 1 Motivation and objectives of the research The proliferation of heterogeneous Linked Data on the Web requires data management
More informationClotho: Transparent Data Versioning at the Block I/O Level
Clotho: Transparent Data Versioning at the Block I/O Level Michail Flouris Dept. of Computer Science University of Toronto flouris@cs.toronto.edu Angelos Bilas ICS- FORTH & University of Crete bilas@ics.forth.gr
More informationPM Support in Linux and Windows. Dr. Stephen Bates, CTO, Eideticom Neal Christiansen, Principal Development Lead, Microsoft
PM Support in Linux and Windows Dr. Stephen Bates, CTO, Eideticom Neal Christiansen, Principal Development Lead, Microsoft Windows Support for Persistent Memory 2 Availability of Windows PM Support Client
More informationTopics. " Start using a write-ahead log on disk " Log all updates Commit
Topics COS 318: Operating Systems Journaling and LFS Copy on Write and Write Anywhere (NetApp WAFL) File Systems Reliability and Performance (Contd.) Jaswinder Pal Singh Computer Science epartment Princeton
More informationInterPlanetary Wayback
InterPlanetary Wayback Peer-to-Peer Permanence of Web Archives Mat Kelly, Sawood Alam, Michael L. Nelson, Michele C. Weigle Old Dominion University Web Science and Digital Libraries Research Group Norfolk,
More informationMethod-Level Phase Behavior in Java Workloads
Method-Level Phase Behavior in Java Workloads Andy Georges, Dries Buytaert, Lieven Eeckhout and Koen De Bosschere Ghent University Presented by Bruno Dufour dufour@cs.rutgers.edu Rutgers University DCS
More informationOperating Systems. File Systems. Thomas Ropars.
1 Operating Systems File Systems Thomas Ropars thomas.ropars@univ-grenoble-alpes.fr 2017 2 References The content of these lectures is inspired by: The lecture notes of Prof. David Mazières. Operating
More informationQoE Aware and Cell Capacity Enhanced Computation Offloading for Multi-Server Mobile Edge Computing Systems with Energy Harvesting Devices
QoE Aware and Cell Capacity Enhanced Computation Offloading for Multi-Server Mobile Edge Computing Systems with Energy Harvesting Devices Hai-Liang Zhao hliangzhao97@gmail.com Wuhan University of Technology
More informationCS 147: Computer Systems Performance Analysis
CS 147: Computer Systems Performance Analysis Test Loads CS 147: Computer Systems Performance Analysis Test Loads 1 / 33 Overview Overview Overview 2 / 33 Test Load Design Test Load Design Test Load Design
More informationSkylight A Window on Shingled Disk Operation. Abutalib Aghayev, Peter Desnoyers Northeastern University
Skylight A Window on Shingled Disk Operation Abutalib Aghayev, Peter Desnoyers Northeastern University What is Shingled Magnetic Recording (SMR)? A new way of recording tracks on the disk platter. Evolutionary
More informationComputer Science Department
Computer Science Department Technical Report NWU-CS-4-3 January 2, 24 Wayback: A User-level Versioning File System For Linux Brian Cornell Peter Dinda Fabián Bustamante Abstract In a typical file system,
More informationIOTA ARCHITECTURE: DATA VIRTUALIZATION AND PROCESSING MEDIUM DR. KONSTANTIN BOUDNIK DR. ALEXANDRE BOUDNIK
IOTA ARCHITECTURE: DATA VIRTUALIZATION AND PROCESSING MEDIUM DR. KONSTANTIN BOUDNIK DR. ALEXANDRE BOUDNIK DR. KONSTANTIN BOUDNIK DR.KONSTANTIN BOUDNIK EPAM SYSTEMS CHIEF TECHNOLOGIST BIGDATA, OPEN SOURCE
More informationIETF94: Access Networks Dormant Middleboxes
HOPS @ IETF94: Access Networks Dormant Middleboxes Joachim Fabini Institute of Telecommunications TU Wien, Vienna, Austria Motivation Commonly used network abstraction Networks are stateless copper wires
More informationCSC369 Lecture 9. Larry Zhang, November 16, 2015
CSC369 Lecture 9 Larry Zhang, November 16, 2015 1 Announcements A3 out, due ecember 4th Promise: there will be no extension since it is too close to the final exam (ec 7) Be prepared to take the challenge
More informationIP Multicast. Overview. Casts. Tarik Čičić University of Oslo December 2001
IP Multicast Tarik Čičić University of Oslo December 00 Overview One-to-many communication, why and how Algorithmic approach (IP) multicast protocols: host-router intra-domain (router-router) inter-domain
More informationOptimizing Flash-based Key-value Cache Systems
Optimizing Flash-based Key-value Cache Systems Zhaoyan Shen, Feng Chen, Yichen Jia, Zili Shao Department of Computing, Hong Kong Polytechnic University Computer Science & Engineering, Louisiana State University
More informationMilestone Solution Partner IT Infrastructure Components Certification Report
Milestone Solution Partner IT Infrastructure Components Certification Report Dell Storage PS6610, Dell EqualLogic PS6210, Dell EqualLogic FS7610 July 2015 Revisions Date July 2015 Description Initial release
More informationCOS 318: Operating Systems. NSF, Snapshot, Dedup and Review
COS 318: Operating Systems NSF, Snapshot, Dedup and Review Topics! NFS! Case Study: NetApp File System! Deduplication storage system! Course review 2 Network File System! Sun introduced NFS v2 in early
More informationDQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services
DQBarge: Improving Data-Quality Tradeoffs in Large-Scale Internet Services Michael Chow, University of Michigan; Kaushik Veeraraghavan, Facebook, Inc.; Michael Cafarella and Jason Flinn, University of
More informationDa-Wei Chang CSIE.NCKU. Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University
Chapter 11 Implementing File System Da-Wei Chang CSIE.NCKU Source: Professor Hao-Ren Ke, National Chiao Tung University Professor Hsung-Pin Chang, National Chung Hsing University Outline File-System Structure
More informationBzTree: A High-Performance Latch-free Range Index for Non-Volatile Memory
BzTree: A High-Performance Latch-free Range Index for Non-Volatile Memory JOY ARULRAJ JUSTIN LEVANDOSKI UMAR FAROOQ MINHAS PER-AKE LARSON Microsoft Research NON-VOLATILE MEMORY [NVM] PERFORMANCE DRAM VOLATILE
More informationStatistics Driven Workload Modeling for the Cloud
UC Berkeley Statistics Driven Workload Modeling for the Cloud Archana Ganapathi, Yanpei Chen Armando Fox, Randy Katz, David Patterson SMDB 2010 Data analytics are moving to the cloud Cloud computing economy
More informationBest Practices for Validating the Performance of Data Center Infrastructure. Henry He Ixia
Best Practices for Validating the Performance of Data Center Infrastructure Henry He Ixia Game Changers Big data - the world is getting hungrier and hungrier for data 2.5B pieces of content 500+ TB ingested
More informationBackground: disk access vs. main memory access (1/2)
4.4 B-trees Disk access vs. main memory access: background B-tree concept Node structure Structural properties Insertion operation Deletion operation Running time 66 Background: disk access vs. main memory
More informationCumulus: Filesystem Backup to the Cloud
Cumulus: Filesystem Backup to the Cloud 7th USENIX Conference on File and Storage Technologies (FAST 09) Michael Vrable Stefan Savage Geoffrey M. Voelker University of California, San Diego February 26,
More informationCSE 153 Design of Operating Systems
CSE 153 Design of Operating Systems Winter 2018 Lecture 22: File system optimizations and advanced topics There s more to filesystems J Standard Performance improvement techniques Alternative important
More informationShark: SQL and Rich Analytics at Scale. Michael Xueyuan Han Ronny Hajoon Ko
Shark: SQL and Rich Analytics at Scale Michael Xueyuan Han Ronny Hajoon Ko What Are The Problems? Data volumes are expanding dramatically Why Is It Hard? Needs to scale out Managing hundreds of machines
More informationCS 351 Exam 3 Mon. 5/11/2015
CS 351 Exam 3 Mon. 5/11/2015 Name: Rules and Hints You may use one handwritten 8.5 11 cheat sheet (front and back). This is the only additional resource you may consult during this exam. No calculators.
More informationDesign Tradeoffs for Data Deduplication Performance in Backup Workloads
Design Tradeoffs for Data Deduplication Performance in Backup Workloads Min Fu,DanFeng,YuHua,XubinHe, Zuoning Chen *, Wen Xia,YuchengZhang,YujuanTan Huazhong University of Science and Technology Virginia
More informationShared Virtual Memory. Programming Models
Shared Virtual Memory Arvind Krishnamurthy Fall 2004 Programming Models Shared memory model Collection of threads Sharing the same address space Reads/writes on shared address space visible to all other
More informationcsci 3411: Operating Systems
csci 3411: Operating Systems File Systems Gabriel Parmer Slides evolved from Silberschatz Today: File System Implementation We discussed abstractions for organizing persistent storage interfaces for programming
More informationAuthenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srini Devadas
Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srini Devadas Massachusetts Institute of Technology November 8th, CCSW 2013 Cloud Storage Model
More informationThe Fusion Distributed File System
Slide 1 / 44 The Fusion Distributed File System Dongfang Zhao February 2015 Slide 2 / 44 Outline Introduction FusionFS System Architecture Metadata Management Data Movement Implementation Details Unique
More informationComputer Architecture. Lecture 8: Virtual Memory
Computer Architecture Lecture 8: Virtual Memory Dr. Ahmed Sallam Suez Canal University Spring 2015 Based on original slides by Prof. Onur Mutlu Memory (Programmer s View) 2 Ideal Memory Zero access time
More informationOperating Systems. Lecture File system implementation. Master of Computer Science PUF - Hồ Chí Minh 2016/2017
Operating Systems Lecture 7.2 - File system implementation Adrien Krähenbühl Master of Computer Science PUF - Hồ Chí Minh 2016/2017 Design FAT or indexed allocation? UFS, FFS & Ext2 Journaling with Ext3
More information1. Creates the illusion of an address space much larger than the physical memory
Virtual memory Main Memory Disk I P D L1 L2 M Goals Physical address space Virtual address space 1. Creates the illusion of an address space much larger than the physical memory 2. Make provisions for
More informationReplication, History, and Grafting in the Ori File System Ali José Mashtizadeh, Andrea Bittau, Yifeng Frank Huang, David Mazières Stanford University
Replication, History, and Grafting in the Ori File System Ali José Mashtizadeh, Andrea Bittau, Yifeng Frank Huang, David Mazières Stanford University Managed Storage $5-10/GB+ $1/GB/Year Local Storage
More informationData Deduplication Methods for Achieving Data Efficiency
Data Deduplication Methods for Achieving Data Efficiency Matthew Brisse, Quantum Gideon Senderov, NEC... SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationEECS 482 Introduction to Operating Systems
EECS 482 Introduction to Operating Systems Winter 2018 Harsha V. Madhyastha Multiple updates and reliability Data must survive crashes and power outages Assume: update of one block atomic and durable Challenge:
More informationSoftware-Defined Data Infrastructure Essentials
Software-Defined Data Infrastructure Essentials Cloud, Converged, and Virtual Fundamental Server Storage I/O Tradecraft Greg Schulz Server StorageIO @StorageIO 1 of 13 Contents Preface Who Should Read
More informationMajor Project, CSD411
Major Project, CSD411 Deterministic Execution In Multithreaded Applications Supervisor Prof. Sorav Bansal Ashwin Kumar 2010CS10211 Himanshu Gupta 2010CS10220 1 Deterministic Execution In Multithreaded
More informationPhase Change Memory An Architecture and Systems Perspective
Phase Change Memory An Architecture and Systems Perspective Benjamin C. Lee Stanford University bcclee@stanford.edu Fall 2010, Assistant Professor @ Duke University Benjamin C. Lee 1 Memory Scaling density,
More informationBENCHMARK: PRELIMINARY RESULTS! JUNE 25, 2014!
BENCHMARK: PRELIMINARY RESULTS JUNE 25, 2014 Our latest benchmark test results are in. The detailed report will be published early next month, but after 6 weeks of designing and running these tests we
More informationAnnouncements. Reading Material. Map Reduce. The Map-Reduce Framework 10/3/17. Big Data. CompSci 516: Database Systems
Announcements CompSci 516 Database Systems Lecture 12 - and Spark Practice midterm posted on sakai First prepare and then attempt! Midterm next Wednesday 10/11 in class Closed book/notes, no electronic
More informationSecondary storage. CS 537 Lecture 11 Secondary Storage. Disk trends. Another trip down memory lane
Secondary storage CS 537 Lecture 11 Secondary Storage Michael Swift Secondary storage typically: is anything that is outside of primary memory does not permit direct execution of instructions or data retrieval
More informationCurrent Topics in OS Research. So, what s hot?
Current Topics in OS Research COMP7840 OSDI Current OS Research 0 So, what s hot? Operating systems have been around for a long time in many forms for different types of devices It is normally general
More informationCOS 318: Operating Systems. Journaling, NFS and WAFL
COS 318: Operating Systems Journaling, NFS and WAFL Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Journaling and LFS Network
More informationScale-out Data Deduplication Architecture
Scale-out Data Deduplication Architecture Gideon Senderov Product Management & Technical Marketing NEC Corporation of America Outline Data Growth and Retention Deduplication Methods Legacy Architecture
More informationECE902 Virtual Machine Final Project: MIPS to CRAY-2 Binary Translation
ECE902 Virtual Machine Final Project: MIPS to CRAY-2 Binary Translation Weiping Liao, Saengrawee (Anne) Pratoomtong, and Chuan Zhang Abstract Binary translation is an important component for translating
More informationIntroduction. CS3026 Operating Systems Lecture 01
Introduction CS3026 Operating Systems Lecture 01 One or more CPUs Device controllers (I/O modules) Memory Bus Operating system? Computer System What is an Operating System An Operating System is a program
More informationCloud-Native File Systems
Cloud-Native File Systems Remzi H. Arpaci-Dusseau Andrea C. Arpaci-Dusseau University of Wisconsin-Madison Venkat Venkataramani Rockset, Inc. How And What We Build Is Always Changing Earliest days Assembly
More informationTom Sas HP. Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee
Advanced PRESENTATION Data Reduction TITLE GOES HERE Concepts Tom Sas HP Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee SNIA Legal Notice The material contained in this tutorial
More informationMain Memory and the CPU Cache
Main Memory and the CPU Cache CPU cache Unrolled linked lists B Trees Our model of main memory and the cost of CPU operations has been intentionally simplistic The major focus has been on determining
More informationVirtual Memory. CS 351: Systems Programming Michael Saelee
Virtual Memory CS 351: Systems Programming Michael Saelee registers cache (SRAM) main memory (DRAM) local hard disk drive (HDD/SSD) remote storage (networked drive / cloud) previously: SRAM
More informationSNIA NVM Programming Model Workgroup Update. #OFADevWorkshop
SNIA NVM Programming Model Workgroup Update #OFADevWorkshop Persistent Memory (PM) Vision Fast Like Memory PM Brings Storage PM Durable Like Storage To Memory Slots 2 Latency Thresholds Cause Disruption
More informationSolace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery
Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery Java Message Service (JMS) is a standardized messaging interface that has become a pervasive part of the IT landscape
More informationEMPRESS Embedded RDBMS. Telecommunications and Networking
EMPRESS Embedded RDBMS in Telecommunications and Networking Highlights EMPRESS Embedded RDBMS Functionality What Distinguishes EMPRESS for Telecommunications and Networking EMPRESS Applications in Telecommunications
More informationPersistent Storage - Datastructures and Algorithms
Persistent Storage - Datastructures and Algorithms 1 / 21 L 03: Virtual Memory and Caches 2 / 21 Questions How to access data, when sequential access is too slow? Direct access (random access) file, how
More informationSoft Updates Made Simple and Fast on Non-volatile Memory
Soft Updates Made Simple and Fast on Non-volatile Memory Mingkai Dong, Haibo Chen Institute of Parallel and Distributed Systems, Shanghai Jiao Tong University @ NVMW 18 Non-volatile Memory (NVM) ü Non-volatile
More informationSFS: Random Write Considered Harmful in Solid State Drives
SFS: Random Write Considered Harmful in Solid State Drives Changwoo Min 1, 2, Kangnyeon Kim 1, Hyunjin Cho 2, Sang-Won Lee 1, Young Ik Eom 1 1 Sungkyunkwan University, Korea 2 Samsung Electronics, Korea
More informationLazy Persistency: a High-Performing and Write-Efficient Software Persistency Technique
Lazy Persistency: a High-Performing and Write-Efficient Software Persistency Technique Mohammad Alshboul, James Tuck, and Yan Solihin Email: maalshbo@ncsu.edu ARPERS Research Group Introduction Future
More informationFlash Memory Based Storage System
Flash Memory Based Storage System References SmartSaver: Turning Flash Drive into a Disk Energy Saver for Mobile Computers, ISLPED 06 Energy-Aware Flash Memory Management in Virtual Memory System, islped
More informationDiscriminating Hierarchical Storage (DHIS)
Discriminating Hierarchical Storage (DHIS) Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Zadok Stony Brook University Gopalan Sivathanu Google Inc. http://www.fsl.cs.sunysb.edu/ Discriminating Hierarchical
More informationInventory (input to ECOMP and ONAP Roadmaps)
Inventory (input to ECOMP and ONAP Roadmaps) 1Q2018 2Q2018 3Q2018 4Q2018 1Q2019 2Q2019 3Q2019 4Q2019 ONAP participation and alignment Operations, Product, and other features with A&AI design impact Inventory
More informationPYTHIA: Improving Datacenter Utilization via Precise Contention Prediction for Multiple Co-located Workloads
PYTHIA: Improving Datacenter Utilization via Precise Contention Prediction for Multiple Co-located Workloads Ran Xu (Purdue), Subrata Mitra (Adobe Research), Jason Rahman (Facebook), Peter Bai (Purdue),
More informationAlgorithms and Data Structures for Efficient Free Space Reclamation in WAFL
Algorithms and Data Structures for Efficient Free Space Reclamation in WAFL Ram Kesavan Technical Director, WAFL NetApp, Inc. SDC 2017 1 Outline Garbage collection in WAFL Usenix FAST 2017 ACM Transactions
More informationCS370 Operating Systems
CS370 Operating Systems Colorado State University Yashwant K Malaiya Spring 2018 Lecture 22 File Systems Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 Disk Structure Disk can
More informationFilesystem. Disclaimer: some slides are adopted from book authors slides with permission
Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Recap Directory A special file contains (inode, filename) mappings Caching Directory cache Accelerate to find inode
More informationCaching Memcached vs. Redis
Caching Memcached vs. Redis San Francisco MySQL Meetup Ryan Lowe Erin O Neill 1 Databases WE LOVE THEM... Except when we don t 2 When Databases Rule Many access patterns on the same set of data Transactions
More informationSOFT 437. Software Performance Analysis. Ch 7&8:Software Measurement and Instrumentation
SOFT 437 Software Performance Analysis Ch 7&8: Why do we need data? Data is required to calculate: Software execution model System execution model We assumed that we have required data to calculate these
More informationDisclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme
FUT3040BU Storage at Memory Speed: Finally, Nonvolatile Memory Is Here Rajesh Venkatasubramanian, VMware, Inc Richard A Brunner, VMware, Inc #VMworld #FUT3040BU Disclaimer This presentation may contain
More informationCouture: Tailoring STT-MRAM for Persistent Main Memory. Mustafa M Shihab Jie Zhang Shuwen Gao Joseph Callenes-Sloan Myoungsoo Jung
Couture: Tailoring STT-MRAM for Persistent Main Memory Mustafa M Shihab Jie Zhang Shuwen Gao Joseph Callenes-Sloan Myoungsoo Jung Executive Summary Motivation: DRAM plays an instrumental role in modern
More informationCaching and reliability
Caching and reliability Block cache Vs. Latency ~10 ns 1~ ms Access unit Byte (word) Sector Capacity Gigabytes Terabytes Price Expensive Cheap Caching disk contents in RAM Hit ratio h : probability of
More informationFile System Internals. Jo, Heeseung
File System Internals Jo, Heeseung Today's Topics File system implementation File descriptor table, File table Virtual file system File system design issues Directory implementation: filename -> metadata
More informationFrequently asked questions from the previous class survey
CS 370: OPERATING SYSTEMS [MASS STORAGE] Shrideep Pallickara Computer Science Colorado State University L29.1 Frequently asked questions from the previous class survey How does NTFS compare with UFS? L29.2
More informationSpeeding Up Cloud/Server Applications Using Flash Memory
Speeding Up Cloud/Server Applications Using Flash Memory Sudipta Sengupta and Jin Li Microsoft Research, Redmond, WA, USA Contains work that is joint with Biplob Debnath (Univ. of Minnesota) Flash Memory
More informationPart II: Data Center Software Architecture: Topic 2: Key-value Data Management Systems. SkimpyStash: Key Value Store on Flash-based Storage
ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective Part II: Data Center Software Architecture: Topic 2: Key-value Data Management Systems SkimpyStash: Key Value
More informationCompSci 516: Database Systems
CompSci 516 Database Systems Lecture 12 Map-Reduce and Spark Instructor: Sudeepa Roy Duke CS, Fall 2017 CompSci 516: Database Systems 1 Announcements Practice midterm posted on sakai First prepare and
More informationSystems Infrastructure for Data Science. Web Science Group Uni Freiburg WS 2012/13
Systems Infrastructure for Data Science Web Science Group Uni Freiburg WS 2012/13 Data Stream Processing Topics Model Issues System Issues Distributed Processing Web-Scale Streaming 3 System Issues Architecture
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationSamuel T. King, George W. Dunlap, and Peter M. Chen University of Michigan. Presented by: Zhiyong (Ricky) Cheng
Samuel T. King, George W. Dunlap, and Peter M. Chen University of Michigan Presented by: Zhiyong (Ricky) Cheng Outline Background Introduction Virtual Machine Model Time traveling Virtual Machine TTVM
More informationFS Consistency & Journaling
FS Consistency & Journaling Nima Honarmand (Based on slides by Prof. Andrea Arpaci-Dusseau) Why Is Consistency Challenging? File system may perform several disk writes to serve a single request Caching
More informationThread- Level Parallelism. ECE 154B Dmitri Strukov
Thread- Level Parallelism ECE 154B Dmitri Strukov Introduc?on Thread- Level parallelism Have mul?ple program counters and resources Uses MIMD model Targeted for?ghtly- coupled shared- memory mul?processors
More informationCFLRU:A A Replacement Algorithm for Flash Memory
CFLRU:A A Replacement Algorithm for Flash Memory CASES'06, October 23 25, 2006, Seoul, Korea. Copyright 2006 ACM 1-59593-543-6/06/0010 Yen-Ting Liu Outline Introduction CFLRU Algorithm Simulation Implementation
More informationIA91 SupportPac: Cache Nodes. WebSphere Business Integration Message Broker v5
IA91 SupportPac: WebSphere Business Integration Message Broker v5 1. Introduction It has been a requirement for some time to be able to store state in IBM s integration broker now called WebSphere Business
More informationFast Forward Storage & I/O. Jeff Layton (Eric Barton)
Fast Forward & I/O Jeff Layton (Eric Barton) DOE Fast Forward IO and Exascale R&D sponsored by 7 leading US national labs Solutions to currently intractable problems of Exascale required to meet the 2020
More informationCSE 373 OCTOBER 23 RD MEMORY AND HARDWARE
CSE 373 OCTOBER 23 RD MEMORY AND HARDWARE MEMORY ANALYSIS Similar to runtime analysis MEMORY ANALYSIS Similar to runtime analysis Consider the worst case MEMORY ANALYSIS Similar to runtime analysis Rather
More informationNon-Blocking Writes to Files
Non-Blocking Writes to Files Daniel Campello, Hector Lopez, Luis Useche 1, Ricardo Koller 2, and Raju Rangaswami 1 Google, Inc. 2 IBM TJ Watson Memory Memory Synchrony vs Asynchrony Applications have different
More informationPipelined processors and Hazards
Pipelined processors and Hazards Two options Processor HLL Compiler ALU LU Output Program Control unit 1. Either the control unit can be smart, i,e. it can delay instruction phases to avoid hazards. Processor
More informationChapter 5 C. Virtual machines
Chapter 5 C Virtual machines Virtual Machines Host computer emulates guest operating system and machine resources Improved isolation of multiple guests Avoids security and reliability problems Aids sharing
More informationChapter 12: File System Implementation
Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency
More informationCascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching
Cascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching Kefei Wang and Feng Chen Louisiana State University SoCC '18 Carlsbad, CA Key-value Systems in Internet Services Key-value
More informationOptimizing Software-Defined Storage for Flash Memory
Optimizing Software-Defined Storage for Flash Memory Avraham Meir Chief Scientist, Elastifile Santa Clara, CA 1 Agenda What is SDS? SDS Media Selection Flash-Native SDS Non-Flash SDS File system benefits
More informationEnabling Program Analysis Through Deterministic Replay and Optimistic Hybrid Analysis
Enabling Program Analysis Through Deterministic Replay and Optimistic Hybrid Analysis by David Devecsery A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of
More informationUsing Dynamic Voltage Frequency Scaling and CPU Pinning for Energy Efficiency in Cloud Compu1ng. Jakub Krzywda Umeå University
Using Dynamic Voltage Frequency Scaling and CPU Pinning for Energy Efficiency in Cloud Compu1ng Jakub Krzywda Umeå University How to use DVFS and CPU Pinning to lower the power consump1on during periods
More information