• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Qiang, Liang Jie, Xu Yinlong, Li Yongkun. Research of SSD Array Architecture Based on Workload Awareness[J]. Journal of Computer Research and Development, 2019, 56(4): 755-766. DOI: 10.7544/issn1000-1239.2019.20170832
Citation: Zhang Qiang, Liang Jie, Xu Yinlong, Li Yongkun. Research of SSD Array Architecture Based on Workload Awareness[J]. Journal of Computer Research and Development, 2019, 56(4): 755-766. DOI: 10.7544/issn1000-1239.2019.20170832

Research of SSD Array Architecture Based on Workload Awareness

More Information
  • Published Date: March 31, 2019
  • The fixed data layout of traditional array system and the locality of workloads cause the partial disks of the array system to become hot disks, which affects the reliability and the overall concurrency performance of the array system. This paper proposes a new RAID architecture for SSD array systems, HA-RAID, which leverages hot/cold data separation and sliding window techniques. The main idea is that HA-RAID divides the disk array into hot disks and ordinary disks, which stores hot data on hot disks and cold data on ordinary disks, and it changes the role of each disk dynamically by moving a fixed-length sliding window. So, each disk has the opportunity to become a hot disk and stores hot data which achieves the purpose of storing hot data evenly on each disk. Experiments under real-world workloads on a RAID-0 array system composed of eight commercial SSDs show that HA-RAID can achieve an even distribution of hot data across all disks and reduce the percentage of hot disks appearing in the array to almost zero. This implies that HA-RAID achieves load balance and wear balance at the device level. In terms of performance, HA-RAID reduces the average response time by 12.01%~41.06% which achieves the I/O performance enhancement, compared with traditional RAID-0 array.
  • Related Articles

    [1]Dai Hua, Yang Geng, Xiao Fu, Zhou Qiang, He Ruiliang. An Energy-Efficient and Privacy-Preserving Range Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 983-993. DOI: 10.7544/issn1000-1239.2015.20140066
    [2]Chen Wei, Xu Ruomei, Li Yuling. A Privacy-Preserving Integrity-Verification-Based Top-k Query Processing[J]. Journal of Computer Research and Development, 2014, 51(12): 2585-2592. DOI: 10.7544/issn1000-1239.2014.20140666
    [3]Ouyang Jia, Yin Jian, Liu Shaopeng, Liu Yubao. An Effective Differential Privacy Transaction Data Publication Strategy[J]. Journal of Computer Research and Development, 2014, 51(10): 2195-2205. DOI: 10.7544/issn1000-1239.2014.20130824
    [4]Xue Kaiping, Zhu Bin, Hong Peilin, and Lu Hancheng. An Energy Efficient Scheduling Mechanism for Real-time Services in 802.16e[J]. Journal of Computer Research and Development, 2011, 48(9): 1608-1615.
    [5]Fu Xiong, Wang Ruchuan, and Deng Song. An EnergyEfficient Data Storage Method in Wireless Sensor Network[J]. Journal of Computer Research and Development, 2009, 46(12): 2111-2116.
    [6]Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui. A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy[J]. Journal of Computer Research and Development, 2009, 46(3): 498-504.
    [7]Wang Dashan, Huang Liusheng, Xu Hongli, Wu Junmin, Zhang Junxia. Wireless Sensor Network Energy-Efficient Placement Algorithm Based on Vector[J]. Journal of Computer Research and Development, 2008, 45(4): 626-635.
    [8]Sun Dayang, Liu Yanheng, Wang Aimin. An Aggregation Tree Constructing Algorithm Based on Energy Consumption Assessment[J]. Journal of Computer Research and Development, 2008, 45(1): 104-109.
    [9]Liu Xin, Wang Quanyu, and Jin Xuliang. An Energy-Aware Data Gathering and Routing Protocol for WSN[J]. Journal of Computer Research and Development, 2008, 45(1): 83-89.
    [10]Luo Yuhong, Chen Songqiao, and Wang Jianxin. An Algorithm Based on Mobility Prediction and Probability for Energy-Efficient Multicasting in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2006, 43(2): 231-237.

Catalog

    Article views (963) PDF downloads (359) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return