Shared (Disk) File Systems

Size: px
Start display at page:

Download "Shared (Disk) File Systems"

Transcription

1 Shared (Disk) File Systems Matthew T. OÕKeefe Associate Professor Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Mieapolis, MN

2 Outlie of Talk The Problem of Shared Disk File Systems Distributed File Systems Shared File Systems: Defiitio ad Key Properties Example Shared File System Desigs Global File System Ð Architecture Ð Curret Implemetatio Coclusios

3 File Systems ad Shared Disks: The Problem Shared disk etwork itercoects like Fibre Chael help solve importat techical issues Ð Itercoect legth, umber of ports, speed Ð These are of course extremely importat But there are sigificat opportuities to leverage these ew capabilities to develop SCSI-based etwork file systems These file systems could be more scalable, cheaper, more reliable tha curret etwork-attached storage that uses NFS

4 File Systems ad Shared Disks: The Problem The storage idustry will evolve SCSI towards very smart disks that do file (istead of block operatios) Ð That efficietly support cachig ad coherecy o the drive Ð That build o the iterface improvemets to allow totally ew storage architectures Ñ SMP-like multiple-cliet architectures Ð The advaced developmet ad research work i this area is happeig ow! NSIC/NASD workig group (Gibso) Compaies like Tricord out frot techically

5 The New Opportuity: Exploitig Shared Disks Shared Disks Classic NFS GFS Cliet GFS Cliet NFS Cliet CPU Memory Disks CPUs Memory Disks CPU Memory Disks GFS Cliet GFS Cliet CPU Memory Disk Storage Area Network CPU Memory Disk NFS Cliet CPU Memory Disk CPUs NFS Server Memory Disks NFS Cliet CPU Memory Disk Network Storage Pool Sub-pool 0 Sub-pool 1 Sub-pool 2 Sub-pool 3 Sub-pool 4 Solid State Sigle Disk RAID 5 Software Striped Disks RAID 3 Disk Farm

6 Explosive Data Growth Both documets ad applicatios are becomig more mediarich, drivig up file sizes Cotiued growth i capacity of memories ad disks promotes further file growth Example eviromet: digital productio houses Ð Seaker et is preferred data trasport media Ð Academy film format: about 3000x4000 pixels per frame Ð With 14-bits per RGB compoet: 42-bits per pixel Ð At 24 frames/secodñ2.0 GB for 1 secod of film Ð 30 secods Megabytes sec thru Fibre Chael

7 Potetial New Applicatios Better Web server desigs based o shared rather tha replicated disks Ð Web server desigs:

8 Potetial New Applicatios More efficiet parallel databases for data miig, other parallelquery-based applicatios Ð Sigificat advatages to shared disk i cluster eviromets Cluster-based applicatios which require high capacity ad high badwidth Ð Film ad video Ð Feature film idustry, advertisig, local TV statios Ultimately, the right way to do distributed storage across the eterprise Ð Especially with smart disks

9 Classic Cliet-Server Distributed File Systems SuÕs NFS (Network File System), Novell Netware, MicrosoftÕs La Maager Traditioal DFSÕes use cetral server approach: Ð may cliets share data through 1 cetral server Basic assumptio: disks are ot smart ad caot be attached to a etwork Geerally complex ad iefficiet from stadpoit of really large datasets Ð sychroous writes Ð cliet cachig

10 DFS Evolutio NFS got the ball rollig i the mid-1980õs Popular but is well kow to be iefficiet Ð sychroous writes ad write-through Ð statelessess meas more retries Ð protocol stack overheads NFS is popular for several reasos Ð Its sematics are fuzzy so it ca ÒworkÓ i may differet Oses Ð Brute-force hardware approaches ca be used i some cases to icrease performace

11 NFS Executio Path Cliet Server User Applicatio VFS VFS NFS Cliet NFS Server Local FS XDR RPC Cliet XDR RPC Server Buffer Cache Memory TCP IP TCP IP Memory Storage Device Drivers Network Device Drivers Network Device Drivers Host Adapter Network Adapter Network Adapter

12 Treds i Distributed File Systems AFS (DFS/DCE) ad Coda use Distributed Servers distributed ame spaces Ð redudacy Ð very aggressive cachig, loose sharig sematics Ð better scalig, usable i Wide Area Network Ð complex, difficult to cofigure, closed system Still o cocept of attachig devices directly to etworks Ð Except for iches like maiframes ad supercomputig

13 Mergig Cliets ad Servers New approaches to DFS desig allow machies to act as both cliets ad servers Merged cliet-server desigs Ð Coda ad BerkeleyÕs xfs More fuctioality migratig to cliets A atural effect give that computig systems today are drive by the desktop Cliets are gettig closer to servers i their capabilities

14 Future of Distributed File Systems NFS ad other DFSÕes rule file sharig today i LAN eviromets Ð these protocols have ot drive the Web eve though i some ways they are better protocols Ð Web techologies may displace curret LAN DFSÕes Ð DFSÕes have geerally ot exploited LAN locality to improve performace: istead focus is portability

15 Future of Distributed File Systems Traditioal distributed file systems solve a problem that o loger exists Ñ machies could ot talk to each otherõs storage devices Ð But they will cotiue to exist Ð Network-attached storage will allow NFS servers to be costructed from clusters of machies that share disks Fie-graied read/write sharig geerally ot supported Ð for example with NFS you ca ever be sure if the data you are readig is the latest copy if some other cliet has writte to that file Ð AFS has sessio sematics

16 I/O Iterfaces Chael iterfaces (e.g., SCSI) Ð Coect computers to storage devices ad other peripherals Ð High-performace, low coectivity, short coectio distaces Network iterfaces (e.g., Etheret) Ð Coects computers to other computers Ð Lower performace, high coectivity, log coectio distaces Merged iterface Ñ Fibre Chael Ð Both a chael ad etwork iterface Ð Supports storage attached to a etwork

17 Eablig Techologies Fibre Chael Ð High badwidth, low latecy etwork ad chael iterface Ð Highly scaleable, very flexible topologies Ð Becomig high-volume, hece lower-cost Ð Support from a wide-variety of adapter, computer, etworkig, ad storage vedors Network-attached Storage (NAS) Ð Have your disks ad share them too Ð Allows direct data trasfer betwee disks ad cliets Together, Fibre Chael ad NAS eable SCSI-based storage area etworks (SANs).

18 Fibre Chael Matthew T. OÕKeefe Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Mieapolis, MN

19 Fibre Chael: Itroductio Fibre Chael (FC) merges features from both etworks ad chael iterfaces to create a storage iterface that is Ð Fast Fiber optic serial iterface Ð Scalable I the umber of odes, devices supported per ode, ad etwork badwidth available per ode Ð Efficiet Lots of low-level processig performed i silico Ð Ope, high-volume, idustry stadard May strog vedors ad OEMs participatig i Fibre Chael developmet ad productio Idustry groups: FCLC ad FCA

20 FC Layers FC fuctioality implemeted across multiple layers Ð Physical media ad trasmissio rates Ð Ecodig scheme Ð Framig protocol ad flow cotrol Ð Commo services Ð upper-level protocol iterfaces

21 Physical ad Sigalig Layer FC-0 Ð Covers physical characteristics of the iterface ad media icludig cables, coectors, drivers, trasmitters ad receivers Ð Sigle- ad multi-mode fiber optics 1 GHz shippig ow, up to 4 GHz defied i stadard 1000s of meters Ð Copper coax for shorter distaces (LANs) FC-1 Ð dc-balaced 8B/10B code scheme (thak you IBM) used for clock recovery, byte sychroizatio, ad ecode/decode Ð Comma character isures proper byte ad word aligmet Ð Good error detectio capabilities ad simple logic implemetatio for the ecoder ad decoder

22 FC Topologies Dedicated Poit-to-Poit Ð Direct coectio betwee sigle host ad disk F_Port Fabric F_Port Arbitrated Loop L_Port L_Port L_Port Ð N_port Shared Badwidth Arbitrated Loop Ð Hubs used to coect odes i shared loop topology N_Port N_Port N_Port Poit-to-Poit N_Port Ð NL_ports Switched Fabric for Scalable Badwidth Ð Multiple switches itercoect ito a Fabric Ð N_ports to F_ports, NL_ports to FL_ports

23 Framig ad Sigalig Layer (FC-2) Defies trasport mechaism idepedet of upper layer protocols Self-cofigurig ad supports poit-to-poit, arbitrated loop ad switched eviromets N_port is ode (server, workstatio or peripheral) Ð If port coected to a loop, it becomes a NL_port Ð Data commuicatios occur betwee itercoected ports Ð Each ode has a ASIC with a embedded FC Lik Cotrol Facility Ð Each port ca act as a origiator, respoder, or both ad has a uique idetifier: N_port or NL_port Idetifier

24 FC-2: Framig Layer Defies the framig structure ad provides the followig fuctios: Ð robust 32-bit cyclic redudacy check Ð Various classes of service to provide ad maage Circuit switchig Frame switchig Datagram services Fractioal badwidth virtual circuits Ð A flow-cotrol scheme that guaratees delivery Buffer-to-buffer Node-to-ode Ð Built i protocol to aid i maagig the lik, cotrol the FC cofig, perform error recovery, ad recover lik ad port status iformatio

25 FC Desig Philosophy Desiged to be hardware-itesive: use low-cost ICs to miimize software overheads Cotets of frame determie destiatio At gigabit speeds decisios must be made i hardware FC-2 ordered sets, frames, sequeces, exchages

26 NASD Idustry Stadardizatio efforts Disks should be smart devices (they are already pretty clever, as are HBAs) File level operatios performed at the disks Ð Rather tha blocks have objects Ð The objects are directories, files, ad objects related to recovery Joit idustry effort led by Gibso et al. Ð Seagate, StorageTek, IBM, ad others ItÕs clear SCSI will be the trasport protocol Ð This is where SCSI-4 is headed

27 Shared File Systems A architecture for distributed file systems based upo shared storage Fully exploits the special characteristics of Fibre Chael-based LANs Key feature is that cliets trasfer data directly from the device across the SAN (Storage Area Network)

28 Shared File Systems Key characteristics: Ð Hece more tha oe cliet may access the data from the same storage device Ð The device is shared betwee cliets via some kid of itercoectio etwork Ð Shared file systems must recogize the existece of other cliets accessig the same storage devices ad file system data ad metadata Directly through the metadata Through a file maager Precludes most local file systems: these cosider storage devices as owed ad accessed by a sigle host computer

29 Shared File Systems (Advatages) Advatages iclude (1) Availability is icreased sice whe a sigle cliet fails aother cliet ca still access the associated data ad cotiue the failed cliets work (2) Load-balacig a mixed workload amog multiple cliets sharig disks is simplified by cliets ability to quickly access ay portio of the dataset o ay of the disks (3) Poolig of storage devices ito a shared disk memory equally accessible to all cliets i the system is possible (4) Scalability i capacity, coectivity, ad badwidth ca be achieved without limitatios iheret i file systems desiged with cetral servers

30 Example Shared File Systems DEC Vaxcluster (mid 1980s) IBM Sysplex (maiframes) Oracle Parallel Database Server (~1990) LLNLÕs HPSS CrayÕs Shared File System (1994) Veritas Cluster File System (1998) IBMÕs Parallel Jouraled File System (1995) GibsoÕs NASD project at CMU (1995) U. MiesotaÕs Global File System (1996)

31 Classifyig Shared File Systems (SFS) Symmetric or Asymmetric? A shared file system is symmetric if Ð ay cliet ca perform ay file system operatio without ecessarily iteractig with aother cliet I asymmetric shared file systems a cliet must first make a request through a file maager executig o aother cliet Ð File maager typically maages File system metadata Checks file access permissios Provides cliet with ifo ecessary access data directly o disk via the SAN

32 Asymmetric Shared File Systems Asymmetric shared file systems replace the server with the file maager Ð cliets must access metadata through the file maager which effectively cotrols cliet access to files Ð sometime called 3rd-party trasfer: the file maager is a 3rd-party which sets up xfer betwee cliet ad device Ð oce trasfer approved, direct trasfer is possible

33 Asymmetric SFS Asymmetric shared file system advatages: Ð file maager desig will geerally re-use file server code Ð cetralized desig is simpler Asymmetric shared file system disadvatages: Ð same problem as cliet-server: server is a bottleeck to scalability (but does ease badwidth ad capacity issues) Ð must write both cliet ad file maager code Ð cetralized loggig ad lockig itroduce bottleecks Ð file maager machie is a sigle poit of failure

34 SFS Lockig Where is lockig performed? Ð i the cliets or file maager: cetralized file maager (CMU NASD, CFS, HPSS) distributed lock maager (Vaxcluster, Oracle PDS) Ð DLMÕs are otoriously difficult to desig i the cotext of cliet failures Ð i the devices or etwork: devices (GFS, Cray SFS) Ð simpler protocol to desig Ð requires pool of fie-grai locks i the device or etwork Ð these locks must be fast

35

36 IBM Sysplex Matthew T. OÕKeefe Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Mieapolis, MN

37 IBM Sysplex IBM has bee clusterig maiframes for a log time JES eases task of distributig work amog a cluster of maiframes I 1994, additioal hardware ad software provided to allow more fie-grai data sharig ad parallelism Cluster of up to 32 MVS/ESA systems ruig System/390 maiframes (figure) Ð Multiple machies share data through ESCON directors Ð Provides simultaeous access to disk

38 IBM Sysplex Ð ESCON director works like Digital Star coupler ad Fibre Chael switch or hub i GFS Allows multiple simultaeous trasfers Ð ESCON is 12-Mbyte/sec coectio to S/390s Ð Sysplex timer provides commo real-time referece for all systems Cosistet data ad time stampig of trasactios File modificatios Other parallel operatios

39 Sysplex Couplig Facility Sysplex couplig facility is a hardware assist for performace ehacemet: it provides Ð Cluster-wide locks Ð Stable electroic storage for cachig Sysplex-wide ifo such as Global work queues Commo read/write data Sysplex Timer ad Couplig Facility are the ÒextraÓ hardware itroduced to improve Sysplex performace i 1994

40 Exploitig Cluster Parallelism i Sysplex Parallel applicatios executig across the cluster will exploit Couplig Facility ad Timer Pfister: Òlist of applicatios is Acroym CityÓ Ð IMS DB (Iformatio Maagemet System Database Maager) is a hierarchical database product Ð DB2 (Database 2) Ñ relatioal database product Ð VSAM (Virtual Storage Access Method) Ð RACF (Remote Access Cotrol Facility) Ñ security Ð JES2 for job etry

41 Sys Admi Tools i Sysplex System admiistratio utilities allow creatio of a sigle poit of cotrol Ð Sigle cosole from which target area ca be maaged ad admiistered for etire cluster Ð ESCON Maager moitors ad maages I/O cofiguratio ad status Ð others

42 Sysplex Summary Symmetric or asymmetric? Not clear to me from my sources Lockig? Performed o device Ñ Sysplex couplig facility or ESCON Director Ð SCSIÕs RESERVE/RELEASE is a descedat of this IBM facility for lockig devices whe multiple machies may access them Proprietary or ope storage itercoect? ESCON is basically proprietary Existig file systems modified to work with cluster

43 DEC Vaxclusters Matthew T. OÕKeefe Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Mieapolis, MN

44 Vaxcluster System Developed by DEC to provide a highly available system that provides users with a sigle system image across a cluster of Vax workstatios Origial implemetatios used the CI (Cluster Itercoect) Ñ custom 70 Megabits (Mbps) etwork that itercoects both computers ad disk cotrollers Ð Star Coupler A symmetric shared file system for Vaxcluster odes Ð Lockig hadled through the DLM: Distributed Lock Maager

45 Distributed Lock Maager (DLM) DLM: a cliet-based lock maager that provides a geeralized lock service for all resources i the Vax cluster Ð Devices Ð Prit services Ð Files Ð Other abstractios defied by the OS

46 DLM Lock maager allows cliets to request ad release a lock Ð Each request specifies a lockig mode: varyig levels of exclusive cotrol o associated resource Exclusive: o other host may read or write to the resource Cocurret read access: other cliets may read or write to the shared resource

47 DLM Desig Issues DLM hadles cluster-wide sychroizatio Several goals iflueced the desig: Ð Programs usig DLM should ru i both sigle ode ad cluster cofiguratios Ð Lock services must be efficiet to support system-level software that makes frequet requests Lock maager must miimize the umber of messages eeded to maage the locks I sigle-ode eviromet the lock maager should recogize the simpler eviromet ad bypass cluster-specific overheads Ð Lock maager must recover from failures of odes holdig locks so that survivig odes ca cotiue to access shared resources i a cosistet maer

48 Distributed Lock Maager (DLM) Lock requests may be queued Ð Oce resource becomes available, the requestig cliet is so iformed via a callback Ð Implies sigificat state associated with each lock regardig the status of outstadig requests for the lock DLM is distributed across the cliets i Vaxcluster Ð Provides load balacig across the parallel resource: the locks This aids scalability Ð Locks are cached o requestig cliet if possible Ð Must work i the presece of cliet failures

49 VMS File System ad Vaxclusters Origial VMS file system was modified to use the DLM to support shared, simultaeous access to Ð Files Ð Associated metadata Directories, files, volumes Extesive cachig used i origial local VMS file system Ð This approach preserved i Vaxcluster implemetatio Ð Versio umbers were associated with lock operatios Ð Stale cache data detected as a disparity betwee versio umbers caused by earlier file update operatios performed by other cliets

50 Versio Numbers ad Cachig Example: cliets A ad B both accessig file foo Ð Assume both A ad B have the file cached ad both are allowed to read ad write the file Ð A makes first access (read) to foo: lock versio umber (v) is 1 Versio umber Ò1Ó is associated with cached data o A Ð B makes 2d access (read) to foo : lock v still 1 v Ò1Ó associated with cached data o B Ð A makes 3rd access (write) to foo: lock v icremeted to 2 v Ò2Ó ow associated with cached data o A Ð B makes 4th access (read) to foo: sice lock v is Ò2Ó but cached v is Ò1Ó, B kows it must ot use its cached copy Reads data directly from disk istead

51 Cachig Data with Deferred Writeback Software Iterrupt Optio: whe requestig a exclusive lock, process ca specify it be otified by software iterrupt Ð if aother lock request o the resource is forced to block Ð The a process owig the lock ca cache ad repeatedly modify the data Ð Data is writte back to disk ad lock released whe the lock is otified that it is blockig aother process

52 Lock Maager Features Lock maager provides a lock coversio service to chage the lockig mode o a existig lock Coversios are faster tha ew lock requests because table etry represetig the lock already exists Applicatios will frequetly hold a ull lock o a resource ad the covert it to a more restricted access mode later

53 Lock Maager Implemetatio The lock maager implemetatio iteded to Ð distribute overhead of lock maagemet throughout the cluster Ð while still miimizig the iter-ode traffic eeded to perform lock services The lock table is therefore divided ito two parts (both of which are distributed): Ð Resource lock descriptios Ð Resource lock directory system Each resource has a master ode resposible for gratig locks o the resource

54 Master Node for a Lock Ð Master maitais a list of grated locks queue of waitig requests for that resource Ð Note that the master for all operatios for a sigle tree is the ode o which the lock request for the root was made Ð The master maitais the lock data for its resource tree But ay ode holdig a lock o a resource mastered by aother ode keeps its ow copy of the resource ad lock descriptios Ð The resource directory system maps a resource ame ito the ame of the master ode for that resource The directory database is distributed amog odes willig to share the overhead associated with processig directory requests

55 Lockig a Resource Ð Give a resource ame, a ode ca trivially compute the resposible directory as a fuctio of the ame strig ad the umber of directory odes Ð To lock a resource, the lock maager seds a lock request message to the directory for that resource: Ð The directory respods i oe of 3 ways: 1) if directory is o master ode for that resource, lock request performed ad cofirmatio retured 2) if directory is ot o master ode but it fids the resource defied, it returs the idetity of the master ode 3) if directory fids resource udefied, it returs a message tellig requestig ode to master the resource itself

56 Lockig a Resource Ð I best cases (1 & 3) above, two messages required to request a lock: case 2 takes four messages Ð Ulock executed with oe message Ð If lock request is for sub-resource i a resource tree the requestig process will either Be located o the master ode (local request) or Will kow who the master for its paret is Ñ allows bypass of directory lookup Ð I ay case umber of messages idepedet of umber of machies i the cluster

57 Vaxcluster File System Summary Symmetric or asymmetric? Symmetric Lockig? Performed o cliets usig DLM Proprietary or ope storage itercoect? CI ad Star Coupler are proprietary Existig file systems modified to work with cluster

58 Cray Shared File System (SFS) Cray had a customer who required that multiple (at least 4) C90s be able to access the same data directly ad be costatly available Ð this evolved later ito a more geeral product (though to my kowledge few are istalled) This required a shared disk solutio Cray modified their ow Uicos (CrayÕs versio of UNIX) file system

59 SFS Goals Commo storage device to share file system data ad metadata High badwidth All machies i the ÒcomplexÓ are peers Ñ o server Re-use existig UNICOS file system code Works with all the stadard UNICOS utilities High availability

60 ÒSpecialÓ Versio of SFS 4 C90s shared a commo SSD (Solid State Disk) which held the file system ad metadata Separate arbitratio device to cotrol access to shared data ad metadata: Ð semaphore device kow as the SMP: serializes operatios usig atomic test-ad-set Ð SMP ca tur aroud request from C90 i 6 microsecods Ð special-purpose hardware: redudat Ñ 2048 locks Ð cofusig poit: what are usually called locks the paper calls ÒsemaphoresÓ

61 Phase 2 SFS Geeralized SFS to work with more stadard, less expesive peripherals Geerally available software i UNICOS 9.0 I phase 2 the shared media is a HiPPI disk array Arbitratio service provided by a SPARC workstatio attached to the HiPPI switch (HSMP) Ð dedicated to SMP operatio Ñ 1 millisecod turaroud Ð locks implemeted as IPI-3 disk commads

62 SFS-2 Operatio UNICOS employs typical UNIX file system desig priciples Diodes o disk reside i special Òdiode regiosó Ð diode is 256 bytes log Ð with 4096-byte disk block, 16 iodes per iode regio block Ð o RAID-5 device with 64K block size there are 256 iodes per iode block

63 SFS-2 Operatio Noe of the stadard UNIX bufferig was used i SFS Diode lockig must be doe exterally Ð differet from stadard UNIX where i-memory lock sufficiet to serialize access amog may processes I SFS, lockig accomplished both with the exteral semaphore ÒdeviceÓ (HSMP) ad by scribblig lockig iformatio ito the diode

64 SFS-2 Read May cotiguous SFS diodes map to sigle semaphore (lock) Semaphore used like a test-ad-set bit whe accessig a Òiode sectoró: a cotiguous set of diodes Ð semaphore acts like test-ad-set bit: if busy try agai later Ð if semaphore is acquired, eter ame of C90 that grabbed it i the semaphore Oce semaphore acquired, the the particular diode to be acquired must also be locked by writig ito diode fields o disk

65 SFS-2 Read If diode i sector acquired, we set lock ad write that diode sector back out to disk ad release semaphore Read of disk data the performed Followig read, repeat previous sequece to ulock the diode Ð acquire semphore Ð acquire diode lock Ð ulock ad write back diode ito Òiode sectoró

66 SFS-2 Read Lots of traffic: at least 4 HiPPI packets set per read(!) assumig o lock coflicts Diode sector must be read ad re-writte twice No bufferig as i o-shared case Sigificat performace degradatio, attack by Ð file lockig Ð large user buffers Ð reduced directory lockig Ð faster metadata devices

67 SFS-3 Operatio SFS-3 implemets series of improvemets A optimizatio proposed was to lock files i Òread-dataÓ or Òwrite-dataÓ mode (i.e. like traditioal UNIX file locks) Ð kow as Òdata locksó i SFS jargo Ð use fields i the diode itself (like the Òdiode sectoró lock) Ð lock state ad idetity of the C90 owig the lock

68 SFS-3 Operatio Multiple read locks are allowed Ð i-memory iode serializes reads from sigle C90 with multiple processes accessig same file Oly oe process o oe machie may ow a write-lock, ad the oly if there are o read locks i place

69 SFS-3 Operatio File lockig uses fctl commad (F_SETLK ad F_GETLK) Ð but i SFS these are ot advisory locks Ð always work across the whole file Lock state kept o disk ad o-processor UNICOS ca be set to always do Direct I/O Ñ as i origial SFS, whe request ot aliged UNICOS ca break up the request ito aliged ad u-aliged requests

70 SFS-3 Operatio Pre-allocatio for writes proposed to reduce metadata access ad related semaphore ops Recovery i SFS depeds o cetral shared table i HSMP device Ð oe semaphore for recovery: oly oe machie ca do recovery at ay oe time Ð HSMP maitais heartbeat status of machies i cluster Ð durig recovery semaphores held by failed cliets must be released ad disk metadata ÒfixedÓ

71 More SFS Performace Improvemets No locks o directories while beig searched Realized that lockig the diode umber i the semaphore device would be useful Ð Òiode sectoró still locked for writes Ð diode ad device umbers combied ito 32-bit umber locked i semaphore Ñ symbolic semaphores Ð keep track of machie holdig the semaphore Ñ like a versio umber but more limited i usefuless

72 SFS Differeces with GFS GFS decouples sharig from lockig also decouples sharig from clusterig GFS has o restrictios o read- ad write- sharig Diodes ot cocetrated i sigle sector o disk Ð why is this good/bad?

73 Cray SFS Summary Symmetric or asymmetric? symmetric Lockig? Performed i device or etwork switch Proprietary or ope storage itercoect? HiPPI, though ot proprietary, is low volume Existig file systems modified to work with for shared file system problem

74 NASD: Network Attached Secure Disks Matthew T. OÕKeefe Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Mieapolis, MN

75 NASD Overview Gibso has proposed Network Attached Shared Disks (NASD) as a stadard for shared storage devices NASD goes beyod previous shared disk storage systems i two key areas Ð Security Ð Objects NASD-based file systems as curretly proposed use file maager for directory ad certai cryptographic operatios Ð Mechaisms provided to keep these overheads low

76 NASD Overview NASD could potetially allow symmetric shared file system desigs as well Secure commuicatios betwee disks ad cliets achieved usig capabilities that have bee cryptographically sealed Ð Support for cryptographic operatios placed o the devices

77 NASD Overview NASD systems dramatically raise the sematic level of disk drive operatios Ð From fixed-size blocks to variable-sized objects Ð Objects ca be files or directories; support for partitios (cotaiers for separate groups of files) is provided Higher sematic level for objects o devices meas that fewer disk commads eed be set over the etwork per file operatio Ð Reduces etwork overheads ad improves scalability

78 Properties of NASD (Gibso) Direct Trasfer: data accessed by a filesystem cliet trasferred betwee NASD drive ad the cliet without store-ad-forward through file server Asychroous Filesystem Oversight: file maager retais some file server fuctioality as it relates to filesystem policies Ð Goal is to reduce overheads of additioal checks required i shared storage eviromet (i.e., ca this cliet access data o this drive?) Ð Offloads this work to the drive to keep load small o file maager as more cliets ad devices added to system

79 Properties of NASD (Gibso) Cryptographic support for request itegrity: NASD drives must be capable of computig keyed digests o commad ad status fields with little or o performace pealty Ð Required sice o sychroous filesystem oversight ad o assumptio etwork betwee cliets ad disk is secure Ð Caot deped o trusted cliets Ð With hardware support for cryptography i a drive, highperformace data itegrity, data privacy ad commad privacy are feasible

80 Properties of NASD (Gibso) Storage Self-Maagemet: NASD drives kow a lot more about the ature of the data that they hold due to the higher level of abstractio (compared to SCSIÕs liear array of radomlyaccessible blocks) Ð Hece blocks associated with a sigle file i a object ca be kept cotiguous Ð Access patters to file objects as a whole discered more easily due to cocept of a object Ð Exteds SCSI already extesive error recovery ad self-checkig ad reportig of drive ad media state to file objects Ð Reduce overall cost of storage maagemet

81 NASD Objects ad Operatios Curret SCSI disks provide virtual liear-block iterface Ð Virtual because moder disks trasparetly re-map storage sectors to hide defective media ad variatios i track desities Ð Locality based optimizatios supported sice blocks small distace apart i the liear address space are physically close Ð More advaced SCSI devices also implemet: RAID Data compressio Dyamic block remappig

82 NASD Objects ad Operatios NASD abados idea that file maagers uderstad ad directly cotrol layout NASD drives store variable-legth logical byte-streams called objects

83 NASD Filesystems Filesystems request objects from the drive to hold the fileõs data Ð Read ad write operatios apply to a byte regio withi a object Ð Layout of the object o the drive determied by the NASD drive itself Ð Sequetial addressed i file NASD objects allocated o media for fast sequetial access Objects ca be clustered: several obejects placed together o proximity list (multiple liear block lists)

84 NASD Objects ad Operatios Proximity o object list ecourages proximity o physical media NASD supports secure commuicatios usig capabilities that have bee cryptographically sealed by the right authority (filesytem maager or partitio maager) Ð shared secret betwee NASD drive ad the authority Ð Four-level key hierarchy icludes master key (system level, chaged very ifrequetly, ot stored olie) ad drive key Ñ log-term o-lie key used to maipulate NASD partitios; chaged whe compromise feared

85 NASD Summary Symmetric or asymmetric? Asymmetric as curretly proposed Lockig? Performed o cliets or file maager Proprietary or ope storage itercoect? SCSI, so its ope Existig file systems like AFS ad NFS modified to work with NASD Ð Good scalig so far from 4 to 8 cliets

86 The Global File System (GFS) A shared file system developed at the Uiversity of Miesota A collaboratio with Seagate, Prisa, Brocade ad other FC vedors Ñ a ope system Hardware solutio to the problem of distributed file system desig Orieted towards applicatios that have lots of big files ad that require high badwidth New desig will provide more geeral architecture

87 GFS Executio Path Cliet User Applicatio VFS Memory GFS Cliet Storage Device Drivers Host Adapter Network Storage Pool

88 Global File System (GFS) Network Storage Pool Ñ a shared address space of disk blocks Ð like a shared memory i a SMP (symmetric multiprocessor) Ð implemeted i the Òpool driveró layer beeath the file system Ð pool layers implemets: locks stripig pool_assemble to assemble etwork devices ito shared pool of devices Fibre-Chael-specific stuff like ame service etc. Ð pool partitioed ito subpools

89 A Distributed GFS Eviromet GFS Cliet GFS Cliet CPU Memory Disks CPUs Memory Disks GFS Cliet GFS Cliet CPU Memory Disk CPU Memory Disk Storage Area Network Network Storage Pool Sub-pool 0 Sub-pool 1 Sub-pool 2 Sub-pool 3 Sub-pool 4 Solid State Sigle Disk RAID 5 Software Striped Disks RAID 3

90 Global File System (GFS) A symmetric shared file system Ð odes are idepedet ad act as peers relative to the storage devices: o file maager Ð like a SMP cliets are like processors etwork storage pool is the shared memory ay cliet ca execute ay portio of the kerel or ay applicatio Ð SMP architecture domiates todayõs multiprocessor desigs Most efficiet for load-balacig ad throughput efficiecy

91 GFS Cosistecy Ð similar to test-ad-set locks i memory Test-ad-set, Clear may locks per device: multiple lock accesses across parallel devices ca be made Ð lockig performed o the devices odes compete for pool of locks kept o the storage devices DLOCK SCSI commad developed to implemet fie-grai lockig SCSI RESERVE/RELEASE graularity is too high (whole device) SCSI DLOCKS provides a pool of 1000s of locks which the file system may the map to shared metadata as required

92 GFS Orgaizatio ad Structure Super block: cotais Mout iformatio ad static Resource Group Idex Multiple Resource Groups: Ð metadata partitioed ito groups for scalability ad load balacig Ð Resource Group Block bit maps for free data blocks data blocks Ð diodes (disk iodes) Ñ oe per file, dyamically allocated Ð metadata Ñ poiter blocks ad idirect poiter blocks Ð real data blocks

93 GFS Orgaizatio ad Architecture Super block Ð Maitais mout iformatio ad static file system attributes Resource Groups Ð Partitios ad distributes file system resources for parallel accesses Ð Allocated per subpool i the etwork storage pool Ð Cotais bitmaps used for block allocatio Ð Similar to Allocatio Groups i Silico GraphicsÕ XFS Device Lock 1 Resource Block - 0 Diode Bitmaps Data Block Bitmaps Diode - 0 Diode - w Data Block - 0 Data Block - q Device Lock 0 Super Block with Resource Idex 0 1 Resource Block - 1 Diode Bitmaps Data Block Bitmaps Diode - w+1 Diode - x Data Block - q+1 Data Block - r Device Lock 2 Resource Block - Diode Bitmaps Data Block Bitmaps Diode - y+1 Diode - z Data Block - s+1 Data Block - t Resource Group - 0 Resource Group - 1 Resource Group - Device Lock +1

94 GFS Orgaizatio ad Architecture GFS Diode Idirect Blocks Data Blocks Diode Number Resource Group Number File Type Mode Ower/Group Number of Liks Access Times Bookkeepig Ifo Dyamic Block Allocatio Ð Ð Available file system blocks may be freely allocated to directory or file diodes, poiter blocks, or data blocks Iode ad diode umbers based o storage pool address elimiatig lookup idirectio

95 Mappig Files to Resource Groups ad Subpools Network Storage Pool (NSP) Subpool 0 Subpool 1 Subpool 2 Subpool 3 Subpool 4 RG0 RG1 RG2 RG3 RG4 RG5 RG6 RG7 RG8 RG9 RG10 RG11 file6 file14 file10 file8 file1 file7 dir1 rootdir Resource Group 0 file7 file8 file1 dir1 dir3 file16 file2 file4 dir2 file6 file17 file10 dir3 file2 file16.1 Resource Group 6 file14 file6 dir2 Resource Group 10 file16.2 rootdir Directory Tree Resource Group 7

96 Compariso of GFS ad NFS Cotrol ad Data Paths NFS Cliet Server User Applicatio VFS VFS NFS Cliet NFS Server Local FS Memory XDR RPC Cliet TCP IP Network Device Drivers Network Adapter XDR RPC Server TCP IP Network Device Drivers Network Adapter Memory Buffer Cache Storage Device Drivers Host Adapter Cliet GFS User Applicatio VFS Memory GFS Cliet Storage Device Drivers Host Adapter Network Storage Pool

97 Diode Stuffig Directory ad file diodes occupy a etire file system block Ð As block size icreases header iformatio stays costat Ð Block utilizatio decreases decreases leadig to iteral fragmetatio Place user data i the uused diode space Ð Reduce iteral fragmetatio Ð Elimiate poiter idirectio Ð Elimiate a additioal read operatio Magic umber Diode umber / disk address Resource group umber Device lock umber File type File mode User ad group IDs Lik cout Ope cout Bytes ad blocks i file Time stamps Height of metadata tree Poiter[0] Poiter[1] Poiter[2] Poiter[3]... Poiter[-2] Poiter[-1]

98 GFS Cachig Some metadata is cached o the cliets Ð locks are polled to determie if metadata is stale or ot Ð callbacks i SCSI-3 would be ice Small files cached i cliet via diode stuffig Ð stuff data i same file system block as the diode (disk iode) We would like to do much more explicit data ad metadata cachig o the device Ð shared by all systems fast, low overhead

99 Performace Testig (May 1997) Test scalig as both cliets ad disk arrays were added 4-cliet, 4-array cofiguratio Ð Seagate disk drives, Ciprico 7000 arrays Ð SGI Challeges, Brocade switch, Prisa HAs Parameters tested Ð file trasfer time ad badwidth Ð file size ad request size are varied DLOCK performace: Ð about 1 millisecod for both Seagate ad Ciprico

100 Performace Tests: Cofiguratio Array A Array B Array C Array D Disks Loop Switch Port 0 Port 1 Port 0 Port 0 Port 0 Cliet W Cliet X Cliet Y Cliet Z

101 Performace Results: Sigle Host

102 Performace Results: Trasfer Rate Aggregate Trasfer Rate (MB/s) GFS 256 MB Create GFS 256 MB Read GFS 256 MB Write 0.0 1/2 2/3 3/4 Cliets/Devices

103 Performace Results: Speedup GFS 256 MB Create GFS 256 MB Read GFS 256 MB Write Scaled Speedup /2 2/3 3/4 Cliets/Devices

104 Performace Results: Trasfer Rate Aggregate Trasfer Rate (MB/s) GFS 256 MB Create GFS 256 MB Read GFS 256 MB Write 0.0 1/1 2/2 3/3 4/4 Cliets/Arrays

105 Performace Results: Speedup GFS 256 MB Create GFS 256 MB Read GFS 256 MB Write Scaled Speedup /1 2/2 3/3 4/4 Cliets/Arrays

106 Summary of Performace Results Scalig was good with separate root directory device Ð lockig ad dir searches isolated to oe device ot trasferrig data Scalig was bad without separate root dir device Ð resource groups were ot allocated uiformly across devices Ð DLOCK commads itermigled with SCSI data commads: this is bad DLOCK sittig behig a big read or write will hurt performace of urelated operatios

107 Summary of Performace Results Bottom lie: poor scalig caused by implemetatio ot the GFS architecture Ð DLOCKs ca ad will be made faster sice they are implemeted i hardware Ð more cachig where useful iteral to GFS cliet Ð miimize use of locks i GFS cliet code recetly reduced umber of locks used by factor of 3

108 Summary of Scalig Study Our results show the GFS approach to cluster file system desig is at least feasible Architecture scales well (so far) Ð 4 cliets ad 4 arrays: Power Challege Ð curretly testig 8-way scalability o a cluster of 8 SGI O2Õs Ð goal: scales to 32 or 64 cliets past 64 cliets will eed hierarchy of GFS ÒdomaisÓ both for performace ad to ease admiistratio

109 Summary of Scalig Study Lots of uaswered questios Ð What if you actually have decet cachig o the devices Ð Faster locks with richer parallel sematics (multiple readers sigle writer) Ð Head-of-queue taggig of DLOCK commads Ð More efficiet lock usage by GFS (reductio by factor of three of umber of locks ecessary) Ð Sigle cliet optimizatios Ð More aggressive cliet cachig Ð More sophisticated mappig of metadata to locks to reduce bottleecks

110 Badwidth Characterizatio Two parameter tests Ð Request size varied expoetially from 64 KB to 4 MB Ð Trasfer, or file, size varied expoetially from 64 KB to 512 MB Test cofiguratio Ð Sigle Silico Graphics O2 desktop workstatio Ð Prisa NetFX PCI-32 Fibre Chael host bus adapter Ð Sigle Ciprico Rimfire 7010 Fibre Chael RAID-3 Ð Brocade Silkworm 16-port Fibre Chael switch

111 Badwidth Characterizatio File System Buffer Cache regular User Space System Call Iterface raw direct Stream Head Module(s) Characterize the badwidth for the give test cofiguratio for each subsystem Quatify the amout of overhead icurred by each subsystem by examiig badwidth losses Device Drivers Hardware Layer

112 Host Adapter Badwidth Buffered Write Badwidth for Prisa Fibre Chael SCSI Driver w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Buffered Read Badwidth for Prisa Fibre Chael SCSI Driver w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Request Size (KB) Trasfer Size (KB) Badwidth (MB/s) Request Size (KB) Trasfer Size (KB) Badwidth (MB/s)

113 Network Storage Pool Badwidth Buffered Write Badwidth for Network Storage Pool Driver w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Buffered Read Badwidth for Network Storage Pool Driver w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Request Size (KB) Trasfer Size (KB) Badwidth (MB/s) Request Size (KB) Trasfer Size (KB) Badwidth (MB/s)

114 GFS Badwidth Buffered Read Badwidth for Global File System w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Request Size (KB) 512 Buffered Write Badwidth for Global File System 256 w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Direct Write Badwidth for Global File System w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Trasfer Size (KB) Badwidth (MB/s) Request Size (KB) Direct Read Badwidth for Global File System w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Trasfer Size (KB) Badwidth (MB/s) Badwidth (MB/s) Badwidth (MB/s) Request Size (KB) Trasfer Size (KB) Request Size (KB) Trasfer Size (KB)

115 XFS Buffered Read Badwidth for XFS w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Buffered Write Badwidth for XFS Request Size (KB) 256 w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Direct Write Badwidth for XFS w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Trasfer Size (KB) Badwidth (MB/s) Request Size (KB) Direct Read Badwidth for XFS w/ Silico Graphics O 2 ad Ciprico RF7010 RAID Trasfer Size (KB) Badwidth (MB/s) Badwidth (MB/s) Badwidth (MB/s) Request Size (KB) Trasfer Size (KB) Request Size (KB) Trasfer Size (KB)

116 Relative Subsystem Efficiecies Relative Efficiecy Prisa NetFX Driver Network Stora ge Pool Driver Global File Syste m XFS Buffered I/ O Writes Mea 100.0% 95.6% 24.9% 87.8% Stadard Deviatio Miimum 100.0% 90.4% 9.7% 43.7% Maximum 100.0% 100.5% 38.8% 475.0% Reads Mea 100.0% 97.2% 25.7% 64.5% Stadard Deviatio Miimum 100.0% 92.3% 14.7% 31.8% Maximum 100.0% 103.6% 68.8% 319.0% Direct I/O Writes Mea 29.6% 112.3% Stadard Deviatio Miimum 16.4% 94.6% Maximum 79.1% 375.8% Reads Mea 31.4% 115.4% Stadard Deviatio Miimum 16.9% 99.4% Maximum 74.5% 215.9% Overall Mea 100.0% 96.4% 27.6% 90.0% Stadard Deviatio Miimum 100.0% 90.4% 9.7% 31.8% Maximum 100.0% 103.6% 79.1% 475.0%

117 The SCSI Device Lock Commad Techical Descriptio Curret Implemetatio ad Proposed Improvemets Stadardizatio Collaboratio with Seagate

118 GFS: Future Plas NT port i collaboratio with idustry Ope Source versio o Liux IRIX versio give away to film ad video idustry, others

119 Overview ad Coclusios New ope, high-volume, relatively low-cost NAS iterfaces make widespread use of shared (disk) file systems potetially possible More research eeded: Ð Previous systems have ot succeeded i scalig past a small umber of cliets Ð Distributed coherece, cachig, ad recovery issues must be resolved ad the solutios stadardized by the idustry perform i cliet, file maager, etwork, or device Ð NASD keys i o two most importat issues objects ad security Ð Promise is better performace, better storage maagemet by the devices, ad ew applicatios i parallel clusters

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

SCI Reflective Memory

SCI Reflective Memory Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1 Advaced Architectures Master Iformatics Eg. 2017/18 A.J.Proeça Memory Hierarchy (most slides are borrowed) AJProeça, Advaced Architectures, MiEI, UMiho, 2017/18 1 Itroductio Programmers wat ulimited amouts

More information

Outline n Introduction n Background o Distributed DBMS Architecture

Outline n Introduction n Background o Distributed DBMS Architecture Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

The University of Adelaide, School of Computer Science 22 November Computer Architecture. A Quantitative Approach, Sixth Edition.

The University of Adelaide, School of Computer Science 22 November Computer Architecture. A Quantitative Approach, Sixth Edition. Computer Architecture A Quatitative Approach, Sixth Editio Chapter 2 Memory Hierarchy Desig 1 Itroductio Programmers wat ulimited amouts of memory with low latecy Fast memory techology is more expesive

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Pipeliig Sigle-Cycle Disadvatages & Advatages Clk Uses the clock cycle iefficietly the clock cycle must

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Review: The ACID properties

Review: The ACID properties Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

BE Software Upgrades to ITALYCS 5. It s in the. Software

BE Software Upgrades to ITALYCS 5. It s in the. Software BE Software Upgrades to ITALYCS 5 It s i the Software UPGRADES WE OFFER Brampto Egieerig is offerig customers with ITALYCS 2 ad ITALYCS 4 systems the opportuity to upgrade their existig systems to the

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Isn t It Time You Got Faster, Quicker?

Isn t It Time You Got Faster, Quicker? Is t It Time You Got Faster, Quicker? AltiVec Techology At-a-Glace OVERVIEW Motorola s advaced AltiVec techology is desiged to eable host processors compatible with the PowerPC istructio-set architecture

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002 ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Data Warehousing. Paper

Data Warehousing. Paper Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial

More information

Chapter 2 Distributed Information Systems Architecture

Chapter 2 Distributed Information Systems Architecture Prof. Dr.-Ig. Stefa Deßloch AG Heterogee Iformatiossysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@iformatik.ui-kl.de Chapter 2 Distributed Iformatio Systems Architecture Chapter Outlie (Distributed)

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 20 Itroductio to Trasactio Processig Cocepts ad Theory Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Trasactio Describes local

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW

L I N U X. Unit 6 S Y S T E M DHCP & DNS (BIND) A D M I N I S T R A T I O n DPW it 6 HCP & (B) oa Warre HCP ervice yamically assigs a P address to requestig machies P addresses are leased scope of addresses ca be assiged or excluded from assigmet HCP servers do ot talk to each other

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS SIAM J. SCI. COMPUT. Vol. 22, No. 6, pp. 2113 2134 c 21 Society for Idustrial ad Applied Mathematics FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS ZHAO ZHANG AND XIAODONG ZHANG

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

The CCITT Communication Protocol for Videophone Teleconferencing Equipment

The CCITT Communication Protocol for Videophone Teleconferencing Equipment The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

Goals of the Lecture UML Implementation Diagrams

Goals of the Lecture UML Implementation Diagrams Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.

More information

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately.

Workflow model GM AR. Gumpy. Dynagump. At a very high level, this is what gump does. We ll be looking at each of the items described here seperately. Workflow model GM AR Gumpy RM Dyagump At a very high level, this is what gump does. We ll be lookig at each of the items described here seperately. User edits project descriptor ad commits s maitai their

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor Advanced Issues

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor Advanced Issues COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Advaced Issues Review: Pipelie Hazards Structural hazards Desig pipelie to elimiate structural hazards.

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION. Thomas Wiedemann

VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION. Thomas Wiedemann Proceedigs of the 2000 Witer Simulatio Coferece J. A. Joies, R. R. Barto, K. Kag, ad P. A. Fishwick, eds. VISUALSLX AN OPEN USER SHELL FOR HIGH-PERFORMANCE MODELING AND SIMULATION Thomas Wiedema Techical

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

EE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering

EE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering EE 4363 1 Uiversity of Miesota Midterm Exam #1 Prof. Matthew O'Keefe TA: Eric Seppae Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Twi Cities Campus EE 4363 Itroductio to Microprocessors

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

File system: intro. n n n. n n n n n n

File system: intro. n n n. n n n n n n File Systems File system: itro I computig, a file system is a method for storig ad orgaizig computer files it makes it easy to fid ad access data File systems may use a storage device such as a hard disk

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Computer Architecture ELEC3441

Computer Architecture ELEC3441 CPU-Memory Bottleeck Computer Architecture ELEC44 CPU Memory Lecture 8 Cache Dr. Hayde Kwok-Hay So Departmet of Electrical ad Electroic Egieerig Performace of high-speed computers is usually limited by

More information

Big Data Capacity Planning: Achieving Right Sized Hadoop Clusters and Optimized Operations

Big Data Capacity Planning: Achieving Right Sized Hadoop Clusters and Optimized Operations Big Data Capacity Plaig: Achievig Right Sized Hadoop Clusters ad Optimized Operatios Abstract Busiesses are cosiderig more opportuities to leverage data for differet purposes, impactig resources ad resultig

More information

BEA Tuxedo. Introducing the BEA Tuxedo System

BEA Tuxedo. Introducing the BEA Tuxedo System BEA Tuxedo Itroducig the BEA Tuxedo System BEA Tuxedo Release 7.1 Documet Editio 7.1 May 2000 Copyright Copyright 2000 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software ad documetatio

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle:

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle: Recursio Recursio Jordi Cortadella Departmet of Computer Sciece Priciple: Reduce a complex problem ito a simpler istace of the same problem Recursio Itroductio to Programmig Dept. CS, UPC 2 Mathematical

More information