期刊文献+

MSDD:一种结合重复数据删除技术的内存交换机制 被引量:1

MSDD: a Memory Swap Scheme with Data Deduplication
下载PDF
导出
摘要 内存交换操作中频繁的外存访问是制约程序运行性能的一个重要因素.提出一种结合重复数据删除技术的内存交换机制MSDD(Memory Swap with Data Deduplication),通过删除交换页面中的重复页面减少换出操作,从而降低交换操作对程序运行性能的影响.针对交换操作延迟敏感和内存紧缺的特点,MSDD机制采用了改进的MD5算法计算页面的数字指纹以限制其计算时延,同时通过哈希表存储删冗元数据以在内存空间占用率与删冗元数据的检索速率两方面取得权衡.在四种典型应用程序上的实验测试结果表明,MSDD机制可以减少内存换出操作达36.73%,提高程序运行性能达15.0%. Frequent access to external storage in memory swap operations significantly decreases the performance of applications. This paper presents a memory swap scheme with data deduplicaiton ( MSDD ), Which decreases swapping out operations by deleting redun- dant pages to mitigate the effect incurred by the swap operations. Given that the swapping out operation is sensitive to the operation latency and the size of the available memory, MSDD uses the improved MD5 algorithm to efficiently calculate digital fingerprints of pages and stores deduplication metadata by employing the hash-table to balance the size of memory occupancy and the retrieval time of deduplication metadata. Experiments results on four typical applications show that MSDD decreases operations of memory swap out by 36.73% and improves the performance of applications by 15.0%.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第5期989-993,共5页 Journal of Chinese Computer Systems
基金 国家科技重大专项课题子课题(2013ZX03002004-003)资助
关键词 内存交换操作 重复数据删除 MSDD 改进的MD5算法 哈希表 memory swap operation data deduplication MSDD improved MD5 algorithm hash-table
  • 相关文献

参考文献18

  • 1Diwaker G, Sangmin L, Michael V, et al. Difference engine: harnessing memory redundancy in virtual machines [C]. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, San Diego, California, 2008: 309-322.
  • 2Badam A, Pai V. SSDAlloc: hybrid SSD/RAM memory management made easy [C]. In Proceeding of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI ' 11 ) , 2011.
  • 3Wang C, Vazhkudai S, Ma X, et al. NVMalloc: exposing an aggregate SSD store as a memory partition in extreme-scale machines [C]. In Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium (IPDPS) 2012, Shanghai, China, 2012: 957-968.
  • 4敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. 被引量:119
  • 5付印金,肖侬,刘芳.重复数据删除关键技术研究进展[J].计算机研究与发展,2012,49(1):12-20. 被引量:64
  • 6Jain N, Dahlin M, Tewari R. Taper: tiered approach for eliminating redundancy in replica synchronization [C]. In USENIX Conference on File and Storage Technologies, 2005: 281-294.
  • 7Wang Wei-yan, Zeng Chen. An evaluation of using deduplicationin swappers [EB/OL]. http://pages. cs. wisc. edu/ - zeng/ cs736. html, December ,2010.
  • 8Koller R, Rangaswami R. I/O deduplication . utilizing content similarity to improve I/O performance [C]. In Proceeding of USENIX FAST ,2010.
  • 9Debnathb, Senguptas, Lij. ChunkStash: speeding up inline storage deduplication using flash memory [C]. In Proceedings of USENIX' IO,Boston, MA, June,2010.
  • 10Srinivasan K, Bisson T, Goodson G, et al. iDedup: Latency-aware, inline data deduplication for primary storage [C]. In Proceedings of the Tenth USENIX Conference on File and Storage Technologies (FAST '12), San Jose, CA, February,2012.

二级参考文献87

  • 1Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 2Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 3Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 4You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 5Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 6Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 7Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 8Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 9U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-2:Secure Hash Standard.2002.http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

共引文献151

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部