• Title/Summary/Keyword: in-memory file systems

Search Result 121, Processing Time 0.026 seconds

Block Allocation Method for Efficiently Managing Temporary Files of Hash Joins on SSDs (SSD상에서 해시조인 임시 파일의 효과적인 관리를 위한 블록 할당 방법)

  • Joontae, Kim;Sangwon, Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.429-436
    • /
    • 2022
  • Temporary files are generated when the Hash Join is performed on tables larger than the memory. During the join process, each temporary file is deleted sequentially after it completes the I/O operations. This paper reveals for that the fallocate system call and file deletion-related trim options significantly impact the hash join performance when temporary files are managed on SSDs rather than hard disks. The experiment was conducted on various commercial and research SSDs using PostgreSQL, a representative open-source database. We find that it is possible to improve the join performance up to 3 to 5 times compared to the default combination depending on whether fallocate and trim options are used for temporary files. In addition, we investigate the write amplification and trim command overhead in the SSD according to the combination of the two options for temporary files.

The Effect of Absorbing Hot Write References on FTLs for Flash Storage Supporting High Data Integrity (데이터 무결성을 보장하는 플래시 저장 장치에서 잦은 쓰기 참조 흡수가 플래시 변환 계층에 미치는 영향)

  • Shim, Myoung-Sub;Doh, In-Hwan;Moon, Young-Je;Lee, Hyo-J.;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.3
    • /
    • pp.336-340
    • /
    • 2010
  • Flash storages are prevalent as portable storage in computing systems. When we consider the detachability of Flash storage devices, data integrity becomes an important issue. To assure extreme data integrity, file systems synchronously write all file data to storage accompanying hot write references. In this study, we concentrate on the effect of hot write references on Flash storage, and we consider the effect of absorbing the hot write references via nonvolatile write cache on the performance of the FTL schemes in Flash storage. In 80 doing, we quantify the performance of typical FTL schemes for workloads that contain hot write references through a wide range of experiments on a real system environment. Through the results, we conclude that the impact of the underlying FTL schemes on the performance of Flash storage is dramatically reduced by absorbing the hot write references via nonvolatile write cache.

A VLSI implementation of 32-bit RISC embedded controller (내장형 32비트 RISC 콘트롤러의 VLSI 구현)

  • 이문기;최병윤;이승호
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.10
    • /
    • pp.141-151
    • /
    • 1994
  • this paper describes the design and implementation of a RISC processor for embedded control systems. This RISC processor integrates a register file, a pipelined execution unit, a FPU interface, a memory interface, and an instruction prefetcher. Its characteristics include both single cycle executions of most instructions in a 2 phase 20 MHz frequency and the worst case interrupt latency of 7 cycles with the vectored interrupt handling that makes it possible to be applicable to the real time processing system. For efficient handling of multi-cycle instructions, data stationary hardwired control scheme equippedwith cycle counter was used. This chip integrates about 139K transistors and occupies 9.1mm$\times$9.1mm in a 1.0um DLM CMOS technology. The power dissipation is 0.8 Watts from a 5V supply at 20 MHz operation.

  • PDF

Data Transporting between Dynamic Model and Display Model of Power Plant Simulator (발전소 시뮬레이터의 다이나믹 모델과 디스플레이 모델간 데이터전송)

  • 김동욱
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1998.03a
    • /
    • pp.86-90
    • /
    • 1998
  • The safety and reliability of nuclear power plant operations relies heavily on the plant operators ability to respond to various emergency situations. It has become standard industry practice to utilize simulators to improve the safety and reliability of nuclear power plants operations. The simulators built for Younggwang#3,4, which is the basic model of the Korean Nuclear Power Plant design, has been developed precisely for this purpose. Dynamic Model and Display Model are developed under US3(UNIX Simulation Software Support System) environment in simulator for Younggwang#3,4. Since these two models are developed under each own operating system, it is necessary to develop a method for transporting data between these two systems. This paper descirves communication environment between Dynamic Model and Display Model, and addresses a file generation method for the Display Model, which will be necessary for designing MMI of MCR(Main Control Room) in the furture.

  • PDF

An Efficient Management and Sliding Window Query for Real-Time Stream Data to Require frequent Update (빈번한 변경을 요구하는 실시간 스트림 데이터의 효율적 관리 및 슬라이딩 윈도우 질의)

  • Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.509-516
    • /
    • 2008
  • Recently, the operator modules to control external devices are concerned about automatic management system to process continuously changed signals. These signals are the stream data of which characteristics are several numbers. a short report interval and asynchronous report time. It is necessary that the system brings about high accuracy and real time process for stream data. The typical queries of these systems consist of the current query to search the latest signal value, the snapshot query at a past time, the sliding window query from a past time to current. In this paper, we propose the efficient method to manage the above signals by using a file structured database in small-size operating systems. We also propose a query model to accommodate various queries including the sliding window query. The file database in the QNX adopts a delta version and a shared memory buffering method for the resource limit of a small storage and a low computing power.

Performance Analysis of FTL Algorithms in Flash Memory for Windows File Systems (윈도우즈(Windows) 파일 시스템에서 플래시 메모리의 FTL(Flash Translation Layer) 알고리즘 성능 분석)

  • Park Won-Joo;Yoo Hyun-Seok;Park Sung-Hwan;Kim Do-Yun;Park Sangwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.823-825
    • /
    • 2005
  • 이동 기기의 저장장치로 널리 사용되고 있는 플래시 메모리는 하드웨어적 특성으로 인하여 쓰기 전 소거(erase before write) 기법이 사용되고 있다. 이러한 특성으로 인하여 플래시 메모리에서는 성능을 증진시키기 위한 기법이 필요하게 되었으며, 이러한 소프트웨어 모듈을 FTL이라 한다. 플래시 메모리의 용량이 크게 늘어나면서 디스크를 대체할 제품이 등장하고 있으며, 이러한 디스크가 일반 컴퓨터에서의 저장장치로 채택되는 경우가 많아지고 있다. 본 연구에서는 플래시 메모리 기반의 디스크를 이용한 윈도우 파일 시스템에서의 여러 FTL 알고리즘의 성능을 분석, 비교하고, FTL 알고리즘의 올바른 개선 방향을 제시한다.

  • PDF

Performance Evaluation of Flash Memory and Hard-Disk File Systems for Embedded Applications (임베디드 응용을 위한 플래쉬 메모리와 하드디스크 파일 시스템의 성능 평가)

  • Kim, A-Lam;Lee, In-Hwan
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.280-284
    • /
    • 2007
  • 현재 임베디드 환경이 대두되면서 저장 매체로 플래쉬 메모리가 하드디스크를 대체하여 각광을 받고 있다. 이는 휴대폰과 같은 임베디드 환경의 이동성과 관련하여 플래쉬 메모리의 여러 물리적인 특징이 하드디스크보다 이런 환경에 적합하기 때문이다. 본 논문에서는 이런 부분은 배제하고 성능 측면만을 고려하여 하드디스크와 플래쉬 메모리를 비교해 보았다. 측정을 위해 2개의 보드를 사용하였다. 보드 1에서는 FAT 파일시스템 하드디스크와 FAT 플래쉬 메모리로 저장 매체에 따른 성능 측정을 위해 환경을 구축하였다. 보드 2는 FAT 플래쉬 메모리와 YAFFS 플래쉬 메모리로 플래쉬 메모리가 기존 파일시스템과 전용 파일시스템에 따라 얼마만큼의 성능 차이를 내는지 알아보기 위해 환경을 구축하였다.

  • PDF

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks

  • Zimba, Aaron;Wang, Zhaoshun;Chen, Hongsong;Mulenga, Mwenge
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3258-3279
    • /
    • 2019
  • Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to extort a ransom from them, as is the case with ransomware. This paper investigates advances in the cryptovirology landscape by examining the state-of-the-art cryptoviral attacks. In our approach, we perform digital autopsy on the malware's source code and execute the different malware variants in a contained sandbox to deduce static and dynamic properties respectively. We examine three cryptoviral attack structures: browser-based crypto mining, memory resident crypto mining and cryptoviral extortion. These attack structures leave a trail of digital forensics evidence when the malware interacts with the file system and generates noise in form of network traffic when communicating with the C2 servers and crypto mining pools. The digital forensics evidence, which essentially are IOCs include network artifacts such as C2 server domains, IPs and cryptographic hash values of the downloaded files apart from the malware hash values. Such evidence can be used as seed into intrusion detection systems for mitigation purposes.

Shadow Recovery for Column-based Databases (컬럼-기반 데이터베이스를 위한 그림자 복구)

  • Byun, Si-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.4
    • /
    • pp.2784-2790
    • /
    • 2015
  • The column-oriented database storage is a very advanced model for large-volume data transactions because of its superior I/O performance. Traditional data storages exploit row-oriented storage where the attributes of a record are placed contiguously in hard disk for fast write operations. However, for search-mostly data warehouse systems, column-oriented storage has become a more proper model because of its superior read performance. Recently, solid state drive using flash memory is largely recognized as the preferred storage media for high-speed data analysis systems. In this research, we propose a new transaction recovery scheme for a column-oriented database environment which is based on a flash media file system. We improved traditional shadow paging schemes by reusing old data pages which are supposed to be invalidated in the course of writing a new data page in the flash file system environment. In order to reuse these data pages, we exploit reused shadow list structure in our column-oriented shadow recovery(CoSR) scheme. CoSR scheme minimizes the additional storage overhead for keeping shadow pages and minimizes the I/O performance degradation caused by column data compression of traditional recovery schemes. Based on the results of the performance evaluation, we conclude that CoSR outperforms the traditional schemes by 17%.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.