• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Qi Xiaoying, Tang Xian, Liang Zhichao, Meng Xiaofeng. OAFTL: An Efficient Flash Translation Layer for Enterprise Application[J]. Journal of Computer Research and Development, 2011, 48(10): 1918-1926.
Citation: Qi Xiaoying, Tang Xian, Liang Zhichao, Meng Xiaofeng. OAFTL: An Efficient Flash Translation Layer for Enterprise Application[J]. Journal of Computer Research and Development, 2011, 48(10): 1918-1926.

OAFTL: An Efficient Flash Translation Layer for Enterprise Application

More Information
  • Published Date: October 14, 2011
  • NAND flash based devices usually introduce a software firmware called flash translation layer (FTL) to simulate the flash memory like a block device. FTL is critical to the performance of flash-based devices. Most existing FTL algorithms work normally in embedded systems. However, they behave poorly when there are frequent random accesses in enterprise applications. In this paper, we propose an operation aware flash translation layer (OAFTL) for enterprise-scale storage devices based on page-level mapping scheme. OAFTL manages the entries cached in RAM according to readwrite operations separately. Besides, OAFTL supplies a log page for translation page to relieve frequent updates of translation information to improve performance. The experiment result shows that our OAFTL algorithm works effectively for enterprise workload. In our experiments, OAFTL improves the total performance by more than 20 percent compared with the existing methods.
  • Related Articles

    [1]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [2]Wu Linyang, Luo Rong, Guo Xueting, Guo Qi. Partitioning Acceleration Between CPU and DRAM: A Case Study on Accelerating Hash Joins in the Big Data Era[J]. Journal of Computer Research and Development, 2018, 55(2): 289-304. DOI: 10.7544/issn1000-1239.2018.20170842
    [3]Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming. Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
    [4]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [5]Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954
    [6]Yuan Xinpan, Long Jun, Zhang Zuping, Luo Yueyi, Zhang Hao, and Gui Weihua. Connected Bit Minwise Hashing[J]. Journal of Computer Research and Development, 2013, 50(4): 883-890.
    [7]Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
    [8]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [9]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    [10]Liu Ji. One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis[J]. Journal of Computer Research and Development, 2008, 45(3): 563-569.

Catalog

    Article views (896) PDF downloads (371) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return