Advanced Search
    Zhao Yuelong, Xie Xiaoling, Cai Yongcai, Wang Guohua, and Liu Lin. A Strategy of Small File Storage Access with Performance Optimization[J]. Journal of Computer Research and Development, 2012, 49(7): 1579-1586.
    Citation: Zhao Yuelong, Xie Xiaoling, Cai Yongcai, Wang Guohua, and Liu Lin. A Strategy of Small File Storage Access with Performance Optimization[J]. Journal of Computer Research and Development, 2012, 49(7): 1579-1586.

    A Strategy of Small File Storage Access with Performance Optimization

    More Information
    • Published Date: July 14, 2012
    • In distributed file system, the management of small file storage access has encountered some problems, such as poor access performance, low disk space utilization rate, high file transfer delay, etc. To solve these problems, this paper proposes a strategy of small file storage access (SFSA) with performance optimization. SFSA can try to store logical continuous data on continuous space of physical disks as far as possible, and use a cache to act as metadata server and improve utilization rate of cache by using simplified file information node. Therefore it can improve the performance of small file storage access. In order to solve the problem of low disk space utilization rate, SFSA still uses a method of writing optimization which combines the dirty data with its related data in file folder domain into a single I/O request, so, it can reduce the number of file fragments. In addition, according to the principle of data locality, we also propose a method which sends the highly accessed small files ahead of time. It reduces the overhead of network connection and improves the file transfer performance.Theoretical analysis and experimental results show that the design idea and method of SFSA strategy can improve the performance of small file storage access effectively.
    • Related Articles

      [1]Fu Hao, Long Chun, Gong Liangyi, Wei Jinxia, Huang Pan, Lin Yanzhong, Sun Degang. Malicious Domain Detection Technology Based on Semantic Graph Learning[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440375
      [2]Xiao Mengnan, He Ruifang, Ma Jinsong. Event Detection Based on Hierarchical Latent Semantic-Driven Network[J]. Journal of Computer Research and Development, 2024, 61(1): 184-195. DOI: 10.7544/issn1000-1239.202220447
      [3]Yao Siyu, Zhao Tianzhe, Wang Ruijie, Liu Jun. Rule-Guided Joint Embedding Learning of Knowledge Graphs[J]. Journal of Computer Research and Development, 2020, 57(12): 2514-2522. DOI: 10.7544/issn1000-1239.2020.20200741
      [4]Cheng Xiaoyang, Zhan Yongzhao, Mao Qirong, Zhan Zhicai. Video Semantic Analysis Based on Topographic Sparse Pre-Training CNN[J]. Journal of Computer Research and Development, 2018, 55(12): 2703-2714. DOI: 10.7544/issn1000-1239.2018.20170579
      [5]Tong Ming, Ding Liwei, and Ji Chenglong. Fusion of HCRF and AAM Highlight Events Detection in Soccer Videos[J]. Journal of Computer Research and Development, 2014, 51(1): 225-236.
      [6]Huang Tianqiang, Yu Yangqiang, Guo Gongde, Qin Xiaolin. Trajectory Outlier Detection Based on Semi-Supervised Technology[J]. Journal of Computer Research and Development, 2011, 48(11): 2074-2082.
      [7]Liu Sipei, Liu Dayou, Qi Hong, and Guan Jinghua. Composing Semantic Web Service with Description Logic Rules[J]. Journal of Computer Research and Development, 2011, 48(5): 831-840.
      [8]Li Haibo, Zhan Dechen, Xu Xiaofei. Integration Verification of Workflow Business Rule Semantic[J]. Journal of Computer Research and Development, 2009, 46(7): 1143-1151.
      [9]Zhang Maoyuan, Zou Chunyan, Lu Zhengding. A Fuzzy Classification of Web Pages Based on the Transposition-Learning Rule[J]. Journal of Computer Research and Development, 2007, 44(1): 99-104.
      [10]Yang Wu, Yun Xiaochun, Li Jianhua. An Efficient Approach to Intrusion Detection Based on Boosting Rule Learning[J]. Journal of Computer Research and Development, 2006, 43(7): 1252-1259.
    • Cited by

      Periodical cited type(0)

      Other cited types(1)

    Catalog

      Article views (1053) PDF downloads (1321) Cited by(1)

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return