• Title/Summary/Keyword: buffer pool

Search Result 18, Processing Time 0.03 seconds

An Analysis of the Overhead of Multiple Buffer Pool Scheme on InnoDB-based Database Management Systems (InnoDB 기반 DBMS에서 다중 버퍼 풀 오버헤드 분석)

  • Song, Yongju;Lee, Minho;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1216-1222
    • /
    • 2016
  • The advent of large-scale web services has resulted in gradual increase in the amount of data used in those services. These big data are managed efficiently by DBMS such as MySQL and MariaDB, which use InnoDB engine as their storage engine, since InnoDB guarantees ACID and is suitable for handling large-scale data. To improve I/O performance, InnoDB caches data and index of its database through a buffer pool. It also supports multiple buffer pools to mitigate lock contentions. However, the multiple buffer pool scheme leads to the additional data consistency overhead. In this paper, we analyze the overhead of the multiple buffer pool scheme. In our experimental results, although multiple buffer pool scheme mitigates the lock contention by up to 46.3%, throughput of DMBS is significantly degraded by up to 50.6% due to increased disk I/O and fsync calls.

Improved UPC Algorithm Adopting a Dynamic Spacer for Traffic Control in ATM Networks (ATM망에서 트래픽 제어용 동적 지연기를 적용한 개선된 UPC 알고리즘)

  • Kim Wu Woan
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.192-200
    • /
    • 2005
  • In this paper, an improved User Parameter Control (UPC) algorithm is proposed for controlling traffic in ATM networks. The present algorithm consists of Cell Buffer, Red Token Pool, Green Token Pool, and Spacer. A token is generated at a certain time period, and the tokens are consumed one each time a cell arrives. At this time, if the delay element, named Spacer, is empty, the cell comes into the network. On the other hand, if Spacer is not empty, the cell cannot come into the network. In addition, in the case that tokens do not exist in Token Pool, the corresponding cell is thrown away The arbitrary function of the token used in this paper is removed. Instead, the token is used only to control network traffic. This research proposes new UPC Algorithm to improve the current cell delay rate and cell loss rate by dynamically adopting the delay element, named Spacer, with respect to the traffic condition, which is different from controlling that the cell comes into the network after a certain delay time period.

  • PDF

Fluid Flow Analysis of the Threshold based Leaky Bucket Scheme

  • Park, Chul-Geun
    • Journal of Electrical Engineering and information Science
    • /
    • v.3 no.2
    • /
    • pp.274-279
    • /
    • 1998
  • We investigate a Leaky Bucket(LB) scheme with a threshold in the data buffer, where leaky rate changes depending on the contents of data buffer. We use the fluid flow model for the analysis of the LB scheme with a threshold. We model the bursty input source as markov modulated fluid flow(MMFF) As performance measures we obtain loss probability and mean delay. We present some numerical results to show the effects of the level of a threshold, the rate of token generation, the size of token pool, and the size the data buffer on the performances of the LB scheme with a threshold.

  • PDF

A Digital Right Management System based on Shared Key fool for Video Data Protection (동영상 데이터 보호를 위한 공유 키 풀 기반의 DRM 시스템)

  • Kim Jung-Jae;Park Jae-Pyo;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.183-190
    • /
    • 2005
  • In this thesis, first, we propose I-frame encryption techniques of video data for video data itself encryption and propose license agent that processing user's certification and decryption in client system automatically when user execute encrypted video data in system server. License agent runs user's certification, encryption and decryption of video data based on PID(Public Key Infrastructure) using shared key-pool when execute of video data. Also, compose duplex buffer control and propose real time decryption method using efficient buffer scheduling to reduce much playing delay times that happen processing decryption when execute of videoa data of high-capacity.

Access Frequency Based Selective Buffer Cache Management Strategy For Multimedia News Data (접근 요청 빈도에 기반한 멀티미디어 뉴스 데이터의 선별적 버퍼 캐쉬 관리 전략)

  • Park, Yong-Un;Seo, Won-Il;Jeong, Gi-Dong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2524-2532
    • /
    • 1999
  • In this paper, we present a new buffer pool management scheme designed for video type news objects to build a cost-effective News On Demand storage server for serving users requests beyond the limitation of disk bandwidth. In a News On Demand Server where many of users request for video type news objects have to be serviced keeping their playback deadline, the maximum numbers of concurrent users are limited by the maximum disk bandwidth the server provides. With our proposed buffer cache management scheme, a requested data is checked to see whether or not it is worthy of caching by checking its average arrival interval and current disk traffic density. Subsequently, only granted news objects are permitted to get into the buffer pool, where buffer allocation is made not on the block basis but on the object basis. We evaluated the performance of our proposed caching algorithm through simulation. As a result of the simulation, we show that by using this caching scheme to support users requests for real time news data, compared with serving those requests only by disks, 30% of extra requests are served without additional cost increase.

  • PDF

THE DISCRETE-TIME ANALYSIS OF THE LEAKY BUCKET SCHEME WITH DYNAMIC LEAKY RATE CONTROL

  • Choi, Bong-Dae;Choi, Doo-Il
    • Communications of the Korean Mathematical Society
    • /
    • v.13 no.3
    • /
    • pp.603-627
    • /
    • 1998
  • The leaky bucket scheme is a promising method that regulates input traffics for preventive congestion control. In the ATM network, the input traffics are bursty and transmitted at high-speed. In order to get the low loss probability for bursty input traffics, it is known that the leaky bucket scheme with static leaky rate requires larger data buffer and token pool size. This causes the increase of the mean waiting time for an input traffic to pass the policing function, which would be inappropriate for real time traffics such as voice and video. We present the leaky bucket scheme with dynamic leaky rate in which the token generation period changes according to buffer occupancy. In the leaky bucket scheme with dynamic leaky rate, the cell loss probability and the mean waiting time are reduced in comparison with the leaky bucket scheme with static leaky rate. We analyze the performance of the proposed leaky bucket scheme in discrete-time case by assuming arrival process to be Markov-modulated Bernoulli process (MMBP).

  • PDF

Optimization of Buffers Capacity in Tandem Queueing Systems with Batch Markovian Arrivals Process

  • Kim, Che-Soong;Lee, Seok-Jun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.2
    • /
    • pp.16-23
    • /
    • 2007
  • Tandem queueing systems well suit for modeling many telecommunication systems. Recently, very general $BMAP/G/1/N/1{\to}{\bullet}/PH/1/M-1$ type tandem queues were constructively studied. In this paper we illustrate application of the obtained results for optimization of a buffer pool design.

  • PDF

ONE-DIMENSIONAL ANALYSIS OF THERMAL STRATIFICATION IN THE AHTR COOLANT POOL

  • Zhao, Haihua;Peterson, Per F.
    • Nuclear Engineering and Technology
    • /
    • v.41 no.7
    • /
    • pp.953-968
    • /
    • 2009
  • It is important to accurately predict the temperature and density distributions in large stratified enclosures both for design optimization and accident analysis. Current reactor system analysis codes only provide lumped-volume based models that can give very approximate results. Previous scaling analysis has shown that stratified mixing processes in large stably stratified enclosures can be described using one-dimensional differential equations, with the vertical transport by jets modeled using integral techniques. This allows very large reductions in computational effort compared to three-dimensional CFD simulation. The BMIX++ (Berkeley mechanistic MIXing code in C++) code was developed to implement such ideas. This paper summarizes major models for the BMIX++ code, presents the two-plume mixing experiment simulation as one validation example, and describes the codes' application to the liquid salt buffer pool system in the AHTR (Advanced High Temperature Reactor) design. Three design options have been simulated and they exhibit significantly different stratification patterns. One of design options shows the mildest thermal stratification and is identified as the best design option. This application shows that the BMIX++ code has capability to provide the reactor designers with insights to understand complex mixing behavior with mechanistic methods. Similar analysis is possible for liquid-metal cooled reactors.

The Design of th GRACE-LB Algorithm for Congestion Control in Broadband ISDN ATM Network (광대역 ISDN ATM 네트워크의 과잉 밀집 제어를 위한 GRACE-LB 알고리즘의 설계)

  • 곽귀일;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.5
    • /
    • pp.708-720
    • /
    • 1993
  • The new preventive control mechanisms for traffic management in BISDN/ATM networks can be divided into Connection Admission Control(CAC), Usage Parameter Control (UPC), and Priority Control. Of these mechanism, Usage Parameter Control continuously monitors the parameters admitted in the network's entry point to guarantee quality of service of connections already admitted. Upon detecting traffic that violates the negotiated parameter, it takes the necessary control measures to prevent congestion. Among these traffic control methods, this paper focuses on the Usage Parameter Control method, and proposes and designs GRACE-LB(Guaranteed Rate Acceptance & Control Element-using Leaky Bucket) which improves upon existing UPC models. GRACE-LB modifies the previous LB model by eliminating the cell buffer, dividing the token Pool into two pools, Long-term pool, Short-term pool, and changing the long-term token generating form using 'Cycle Token' into the same bursty form as the traffic source. Through this, GRACE-LB achieves effective control of the Average Bit Rate(ABR) and burst duration of bursty multimedia traffic which previous LB models found difficult to control. Also, since GRACE-LB can e implemented using only simple operations and there are no cell buffers in it, it has the merit of being easily installed at any place.

  • PDF

Isolation of High Quality RNA from Seeds of the Mungbean (Vigna radiata) (녹두 종자의 RNA 분리 방법)

  • Kim, Kyeong-Im;Ku, Ja-Hwan
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.51 no.spc1
    • /
    • pp.274-276
    • /
    • 2006
  • Mungbean (Vigna radiata) is a legume to East Asia that has great potential for development as traditional food and industrial crop. It produces both protein and starch rich grain. The low variability of the existing gene pool of the mungbean limits the use of conventional plant breeding to address this problem. For this purpose, an efficient means of RNA isolation from mungbean seed tissues was developed. The quality of RNA obtained by this method was sufficient for use in RT-PCR and RNA analysis.