• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Yuelong, Xie Xiaoling, Cai Yongcai, Wang Guohua, and Liu Lin. A Strategy of Small File Storage Access with Performance Optimization[J]. Journal of Computer Research and Development, 2012, 49(7): 1579-1586.
Citation: Zhao Yuelong, Xie Xiaoling, Cai Yongcai, Wang Guohua, and Liu Lin. A Strategy of Small File Storage Access with Performance Optimization[J]. Journal of Computer Research and Development, 2012, 49(7): 1579-1586.

A Strategy of Small File Storage Access with Performance Optimization

More Information
  • Published Date: July 14, 2012
  • In distributed file system, the management of small file storage access has encountered some problems, such as poor access performance, low disk space utilization rate, high file transfer delay, etc. To solve these problems, this paper proposes a strategy of small file storage access (SFSA) with performance optimization. SFSA can try to store logical continuous data on continuous space of physical disks as far as possible, and use a cache to act as metadata server and improve utilization rate of cache by using simplified file information node. Therefore it can improve the performance of small file storage access. In order to solve the problem of low disk space utilization rate, SFSA still uses a method of writing optimization which combines the dirty data with its related data in file folder domain into a single I/O request, so, it can reduce the number of file fragments. In addition, according to the principle of data locality, we also propose a method which sends the highly accessed small files ahead of time. It reduces the overhead of network connection and improves the file transfer performance.Theoretical analysis and experimental results show that the design idea and method of SFSA strategy can improve the performance of small file storage access effectively.
  • Related Articles

    [1]Zhai Ennan, Cao Jiamin, Qian Kun, Guan Yu. Towards Network Infrastructure Research for the Era of Large Language Models: Challenges, Practices, and Prospects[J]. Journal of Computer Research and Development, 2024, 61(11): 2664-2677. DOI: 10.7544/issn1000-1239.202440576
    [2]Wang Ting, Liu Gang. Software Defined Virtualized Access Network Supporting Network Slicing and Green Communication[J]. Journal of Computer Research and Development, 2021, 58(6): 1291-1306. DOI: 10.7544/issn1000-1239.2021.20201079
    [3]Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong. Delay-Aware Resource Scheduling Optimization in Network Function Virtualization[J]. Journal of Computer Research and Development, 2018, 55(4): 738-747. DOI: 10.7544/issn1000-1239.2018.20170926
    [4]Wang Junxiao, Qi Heng, Li Keqiu, Zhou Xiaobo. Real-Time Link Fault Detection as a Service for Datacenter Network[J]. Journal of Computer Research and Development, 2018, 55(4): 704-716. DOI: 10.7544/issn1000-1239.2018.20170941
    [5]Zhou Weilin, Yang Yuan, Xu Mingwei. Network Function Virtualization Technology Research[J]. Journal of Computer Research and Development, 2018, 55(4): 675-688. DOI: 10.7544/issn1000-1239.2018.20170937
    [6]Deng Xiaoheng, Cao Dejuan, Pan Yan, Shen Hailan, Chen Zhigang. An Optimized Credit Distribution Model in Social Networks with Time-Delay Constraint[J]. Journal of Computer Research and Development, 2017, 54(2): 382-393. DOI: 10.7544/issn1000-1239.2017.20151118
    [7]Wang Cong, Yuan Ying, Peng Sancheng, Wang Xingwei, Wang Cuirong, Wan Cong. Fair Virtual Network Embedding Algorithm with Topology Pre-Configuration[J]. Journal of Computer Research and Development, 2017, 54(1): 212-220. DOI: 10.7544/issn1000-1239.2017.20150785
    [8]Li Jianzhong and Gao Hong. Survey on Sensor Network Research[J]. Journal of Computer Research and Development, 2008, 45(1): 1-15.
    [9]Cai Zhiping, Yin Jianping, Liu Xianghui, Liu Fang, and Lü Shaohe. A Distributed Network Monitoring Model with Link Constraint[J]. Journal of Computer Research and Development, 2006, 43(4): 601-606.
    [10]Yang Peng and Wu Jiagao. Research on Network Service Architecture and Its Formal Model[J]. Journal of Computer Research and Development, 2005, 42(7): 1115-1122.

Catalog

    Article views (1053) PDF downloads (1321) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return