• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Zhiguang, Xiao Nong, Liu Fang, and Du Yimo. A High Performance Reliable Storage System Using HDDs as the Backup of SSDs[J]. Journal of Computer Research and Development, 2013, 50(1): 80-89.
Citation: Chen Zhiguang, Xiao Nong, Liu Fang, and Du Yimo. A High Performance Reliable Storage System Using HDDs as the Backup of SSDs[J]. Journal of Computer Research and Development, 2013, 50(1): 80-89.

A High Performance Reliable Storage System Using HDDs as the Backup of SSDs

More Information
  • Published Date: January 14, 2013
  • SSD (solid state drive) has been widely deployed due to its high performance. But, its cost and reliability have not met the demand of large-scale storage systems. RAID (redundant arrays of inexpensive disks) is a conventional scheme to enhance reliability. However, existing RAID schemes are not effective for SSDs anymore. Instead, we propose a hybrid array consisting of SSDs and HDDs (hard disk drive): SSDs are used for responding to I/O requests, and HDDs supply backup for SSDs. The hybrid array guarantees both performance and reliability at a reasonable cost. However, HDDs lose to SSDs in term of both latency and bandwidth. Therefore, we employ a nonvolatile memory to bridge the latency gap, and take other two measures to improve HDD’s bandwidth. Firstly, workloads within an HDD are reconfigured to be more sequential. Secondly, multiple HDDs collaborate with each other to supply much higher aggregate bandwidth. By these ways, HDDs can replicate SSDs’ data in time. We implement a prototype to evaluate the proposed array. First of all, we demonstrate that the hybrid array is feasible. Then, we compare the hybrid array with other solutions. Experimental results show that the hybrid array covers both performance and reliability, and is also cost-effective.
  • Related Articles

    [1]Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia. Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM[J]. Journal of Computer Research and Development, 2019, 56(11): 2330-2338. DOI: 10.7544/issn1000-1239.2019.20190376
    [2]Yao Sheng, Xu Feng, Zhao Peng, Ji Xia. Intuitionistic Fuzzy Entropy Feature Selection Algorithm Based on Adaptive Neighborhood Space Rough Set Model[J]. Journal of Computer Research and Development, 2018, 55(4): 802-814. DOI: 10.7544/issn1000-1239.2018.20160919
    [3]Dong Hongbin, Teng Xuyang, Yang Xue. Feature Selection Based on the Measurement of Correlation Information Entropy[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695. DOI: 10.7544/issn1000-1239.2016.20160172
    [4]Tang Chenghua, Liu Pengcheng, Tang Shensheng, Xie Yi. Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection[J]. Journal of Computer Research and Development, 2015, 52(3): 718-728. DOI: 10.7544/issn1000-1239.2015.20130601
    [5]Zhang Fengbin and Wang Tianbo. Real Value Negative Selection Algorithm with the n-Dimensional Chaotic Map[J]. Journal of Computer Research and Development, 2013, 50(7): 1387-1398.
    [6]Zhang Zhenhai, Li Shining, Li Zhigang, and Chen Hao. Multi-Label Feature Selection Algorithm Based on Information Entropy[J]. Journal of Computer Research and Development, 2013, 50(6): 1177-1184.
    [7]Zheng Liming, Zou Peng, Han Weihong, Li Aiping, Jia Yan. Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network[J]. Journal of Computer Research and Development, 2012, 49(9): 1972-1981.
    [8]Zhang Xiang, Deng Zhaohong, Wang Shitong, Choi Kupsze. Maximum Entropy Relief Feature Weighting[J]. Journal of Computer Research and Development, 2011, 48(6): 1038-1048.
    [9]Chen Shitao, Chen Guolong, Guo Wenzhong, and Liu Yanhua. Feature Selection of the Intrusion Detection Data Based on Particle Swarm Optimization and Neighborhood Reduction[J]. Journal of Computer Research and Development, 2010, 47(7): 1261-1267.
    [10]Hou Jian, Peng Jiayin, Zhang Yuzhuo, Zhang Chengyi. A Reverse Triple I Algorithm for Fuzzy Reasoning Based on Maximum Fuzzy Entropy Principle[J]. Journal of Computer Research and Development, 2006, 43(7): 1180-1185.

Catalog

    Article views (1063) PDF downloads (730) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return