False sharing problems in cluster-based disk arrays

With the development of workstation cluster, more research is focused on single system image (SSI). As a part of SSI, single Ii0 space plays an important role in the application of I/O intensive applications. Cluster-based disk array is one of the RAID techniques in a cluster environment. False sharing problem in the cluster-based disk array is studied in this paper. We discuss different cases of false sharing in the cluster-based disk array. The results are useful to those who work on RAID architecture and cluster computing in general.

[1]  Brett D. Fleisch,et al.  Degenerate Sharing , 1994, ICPP.

[2]  Darrell D. E. Long,et al.  Swift: Using Distributed Disk Striping to Provide High I/O Data Rates , 1991, Comput. Syst..

[3]  Philip S. Yu,et al.  Analytic Modeling of Clustered RAID with Mapping Based on Nearly Random Permutation , 1996, IEEE Trans. Computers.

[4]  Philip S. Yu,et al.  Brief Contributions Analytic Modeling of Clustered RAID with Mapping Based on Nearly Randlom Permutation , 1996 .

[5]  Alan L. Cox,et al.  TreadMarks: shared memory computing on networks of workstations , 1996 .

[6]  Garth A. Gibson,et al.  RAID: high-performance, reliable secondary storage , 1994, CSUR.

[7]  Michael Stonebraker,et al.  Distributed RAID-a new multiple copy algorithm , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[8]  Michael L. Scott,et al.  False sharing and its effect on shared memory performance , 1993 .

[9]  Bin Cong,et al.  Scalable Parallel Computing: Technology, Architecture, Programming , 1999, Scalable Comput. Pract. Exp..

[10]  Vivek Khera,et al.  Factors Affecting False Sharing on Page-Granularity Cache-Coherent Shared-Memory Multiprocessors , 1994 .

[11]  Peter Brezany Runtime system for parallel input-output , 1997 .

[12]  Vivek Khera,et al.  An Architecture-Independent Analysis of False Sharing , 1993 .

[13]  Christos Faloutsos,et al.  Active Storage for Large-Scale Data Mining and Multimedia , 1998, VLDB.

[14]  Daniel G. Saab,et al.  Assigning Sites to Redundant Clusters in a Distributed Storage System , 1993, 1993 International Conference on Parallel Processing - ICPP'93.

[15]  Jim Zelenka,et al.  File server scaling with network-attached secure disks , 1997, SIGMETRICS '97.

[16]  Susan J. Eggers,et al.  Eliminating False Sharing , 1991, ICPP.