Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles 2011
DOI: 10.1145/2043556.2043563
|View full text |Cite
|
Sign up to set email alerts
|

Differentiated storage services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(20 citation statements)
references
References 37 publications
0
20
0
Order By: Relevance
“…In order to classify the application I/O behaviors, NVMRA should be able to be aware of the application information from I/O requests. Therefore, we modify file system and block device driver to transfer the application information from applications to NVMRA layer [53]. NVMRA can issue read/write operations to the memory device layer, which can control the NVM or flash memory chip.…”
Section: Methodsmentioning
confidence: 99%
“…In order to classify the application I/O behaviors, NVMRA should be able to be aware of the application information from I/O requests. Therefore, we modify file system and block device driver to transfer the application information from applications to NVMRA layer [53]. NVMRA can issue read/write operations to the memory device layer, which can control the NVM or flash memory chip.…”
Section: Methodsmentioning
confidence: 99%
“…4: Arbitrary sequence of requests over time techniques, however, require hardware and firmware modifications which limits both their applicability and generality. Altering the storage stack to feed semantic information of applications to the caching layer has been examined in [13] to improve the performance of databases. Such technique also suffers from poor generality.…”
Section: Related Workmentioning
confidence: 99%
“…To effectively use SSDs as the OS cache layer, modifications in the conventional caching policies such as Least Recently Used (LRU) and Clock have been suggested by the previous studies [8], [9], [10]. Another suggested approach in the previous work is prioritizing various request types such as filesystem metadata, read, and random requests by using either absolute or relative priority [11], [12], [13], [14]. The absolute priority employed in previous studies is inefficient as observed by a recent study [15].…”
Section: Introductionmentioning
confidence: 99%
“…Many early systems work on a single-server [7,25,34], or for a specific kind of workloads, such as media recording and streaming [23,46,47] or virtual machines [10].…”
Section: Related Workmentioning
confidence: 99%