2015
DOI: 10.1109/tdsc.2015.2399313
|View full text |Cite
|
Sign up to set email alerts
|

A Hotness Filter of Files for Reliable Non-Volatile Memory Systems

Abstract: Flash memory has been widely utilized in embedded systems and consumer electronics, because of its low-power consumption, high-performance access, non-volatility, and shock resistance. A flash-memory device is different from a typical hard-disk device and requires a sophisticated management method to improve the reliable endurance and provide the efficient storage management. To improve the reliable endurance and provide the efficient storage management, the previous works have demonstrated that the identifica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…As mentioned before, the limited endurance of NVM devices may cause some cells or blocks/pages to wear out faster than others, since some data may be updated much more frequently than others [61], [118], [135]. This results in permanent loss of these blocks, reduced storage capacity and possibly in file corruption.…”
Section: ) Endurancementioning
confidence: 99%
See 1 more Smart Citation
“…As mentioned before, the limited endurance of NVM devices may cause some cells or blocks/pages to wear out faster than others, since some data may be updated much more frequently than others [61], [118], [135]. This results in permanent loss of these blocks, reduced storage capacity and possibly in file corruption.…”
Section: ) Endurancementioning
confidence: 99%
“…Wu et al [134], [135] use two different heuristics to identify if frequently updated (hot) files are present. For instance, files that are marked as read-only, files belonging to specific users that rarely log into the system, read-only operating system files and files that are rarely accessed or are related to processes that rarely run, are good candidates for cold or frequently read files.…”
Section: ) Endurancementioning
confidence: 99%
“…The primary goal of these works is to increase I/O bandwidth with multi channel architectures, enabling the interleaving of data over multiple flash chips. Reference [16] augments this with a hot-cold data identification technique that improves endurance of the system. However, these techniques do not provide mechanisms to protect data in case of failure, or guarantee the upper bound of I/O access latency.…”
Section: B Related Workmentioning
confidence: 99%
“…The past two decades witness considerable efforts on studies of HDI from direct scheme [6], [7] to indirect scheme [5], [8]- [12]. The HDC [6] and two-level LRU [7] analyze the access behaviors by directly recording the statistical rule of logical block addresses (LBAs).…”
mentioning
confidence: 99%
“…In summary, all these HDI schemes focus on how to effectively capture the frequency and recency information of write accesses with less runtime consumptions and memory overheads. However, LBA accesses tend to be stochastic and time-variant [5], [10]- [12]. It is challenging to precisely identify the hot ratio of all kinds of workloads even for the recent state-of-the-art HDI schemes.…”
mentioning
confidence: 99%