Fast Flexible IO : A Compositional Approach to Storage Construction for High-Performance Devices

07/25/2018
by   Daniel G. Waddington, et al.
0

Building storage systems has remained the domain of systems experts for many years. They are complex and difficult to implement. Extreme care is needed to ensure necessary guarantees of performance and operational correctness. Furthermore, because of restrictions imposed by kernel-based designs, many legacy implementations have traded software flexibility for performance. Their implementation is restricted to compiled languages such as C and assembler, and reuse tends to be difficult or constrained. Nevertheless, storage systems are implicitly well-suited to software reuse and compositional software construction. There are many logical functions, such as block allocation, caching, partitioning, metadata management and so forth, that are common across most variants of storage. In this paper, we present Comanche, an open-source project that considers, as first-class concerns, both compositional design and reuse, and the need for high-performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/02/2018

ECI-Cache: A High-Endurance and Cost-Efficient I/O Caching Scheme for Virtualized Platforms

In recent years, high interest in using Virtual Machines (VMs) in data c...
research
04/25/2019

A Survey on Tiering and Caching in High-Performance Storage Systems

Although every individual invented storage technology made a big step to...
research
06/18/2023

A Survey on User-Space Storage and Its Implementations

The storage stack in the traditional operating system is primarily optim...
research
05/16/2018

A Software-Defined Approach for QoS Control in High-Performance Computing Storage Systems

High-performance computing (HPC) storage systems become increasingly cri...
research
05/02/2021

Metadata Interpretation Driven Development

Despite decades of engineering and scientific research efforts, separati...
research
11/10/2021

MAJORCA: Multi-Architecture JOP and ROP Chain Assembler

Nowadays, exploits often rely on a code-reuse approach. Short pieces of ...

Please sign up or login with your details

Forgot password? Click here to reset