• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yi Jianliang, Chen Zhiguang, Xiao Nong, Lu Yutong. Proxy Based Metadata Optimization and Implementation in Parallel Filesystem[J]. Journal of Computer Research and Development, 2018, 55(2): 438-446. DOI: 10.7544/issn1000-1239.2018.20160796
Citation: Yi Jianliang, Chen Zhiguang, Xiao Nong, Lu Yutong. Proxy Based Metadata Optimization and Implementation in Parallel Filesystem[J]. Journal of Computer Research and Development, 2018, 55(2): 438-446. DOI: 10.7544/issn1000-1239.2018.20160796

Proxy Based Metadata Optimization and Implementation in Parallel Filesystem

More Information
  • Published Date: January 31, 2018
  • In high-performance computing environment, parallel file system faces a mega client. These clients often issue a large number of concurrent IO request to the system in the same period of time, making the metadata server under a huge pressure. On the other hand, concurrent read and write requests from these clients often relate to the same directory. It makes it difficult to schedule work load across multiple servers. Therefore, we add a proxy server between the client and the metadata server and propose corresponding optimization methods to reduce the work load of the metadata server. In this paper, we realize two aspects of optimization based on proxy server. First of all, since the high-performance computing program often access files concurrently, we consider merging the numerous requests into a big one and then sent it to metadata server. Secondly, concurrent IO from the high-performance computing program often points to the same directory. Traditional metadata load balancing mechanism commonly use sub-tree partitioning method to dispatch work load across multiple server. This method is unable to realize load balancing in the situation where all operations relate to the same directory. The paper realizes fine-grained load balancing by scheduling the operations from the same directory to the plurality of metadata servers.
  • Related Articles

    [1]Su Ning, Guo Junxia, Li Zheng, Zhao Ruilian. EFSM Amorphous Slicing Based Test Case Generation[J]. Journal of Computer Research and Development, 2017, 54(3): 669-680. DOI: 10.7544/issn1000-1239.2017.20151053
    [2]You Feng, Zhao Ruilian, Lü Shanshan. Output Domain Based Automatic Test Case Generation[J]. Journal of Computer Research and Development, 2016, 53(3): 541-549. DOI: 10.7544/issn1000-1239.2016.20148045
    [3]Liu Tieqiao, Kuang Jishun, Cai Shuo, You Zhiqiang. A New Method of Embedding Test Patterns into Test-per-Clock Bit Stream[J]. Journal of Computer Research and Development, 2014, 51(9): 2022-2029. DOI: 10.7544/issn1000-1239.2014.20130179
    [4]Chen Donghuo, Liu Quan. Generation of Test Cases Based on Symbolic Execution and LTL Formula Rewriting[J]. Journal of Computer Research and Development, 2013, 50(12): 2661-2675.
    [5]He Yanxiang, Chen Yong, Wu Wei, Xu Chao, and Wu Libing. Automatically Generating Error-Traceable Test Cases Based on Compiler[J]. Journal of Computer Research and Development, 2012, 49(9): 1843-1851.
    [6]Yan Jun, Guo Tao, Ruan Hui, Xuan Jifeng. JUTA: An Automated Unit Testing Framework for Java[J]. Journal of Computer Research and Development, 2010, 47(10): 1840-1848.
    [7]Zhang Min, Feng Dengguo, and Chen Chi. A Security Function Test Suite Generation Method Based on Security Policy Model[J]. Journal of Computer Research and Development, 2009, 46(10): 1686-1692.
    [8]Tao Qiuming, Zhao Chen, Wang Yongji. An Automated Method of Test Program Generation for Compiler Optimizations Based on Process Graph[J]. Journal of Computer Research and Development, 2009, 46(9): 1567-1577.
    [9]Chen Jinfu, Lu Yansheng, and Xie Xiaodong. A Fault Injection Model of Component Security Testing[J]. Journal of Computer Research and Development, 2009, 46(7): 1127-1135.
    [10]Yuan Jiesong, Wang Linzhang, Li Xuandong, and Zheng Guoliang. UMLTGF: A Tool for Generating Test Cases from UML Activity Diagrams Based on Grey-Box Method[J]. Journal of Computer Research and Development, 2006, 43(1): 46-53.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return