File System in Data-Centric Computing

01/04/2019
by   Viacheslav Dubeyko, et al.
0

The moving computation on the edge or near to data is the new trend that can break the bandwidth wall and to unleash the power of next generation NVM or SCM memory. File system is the important OS subsystem that plays the role of mediator between the user-space application and storage device. The key goal of the file system is to represent the file abstraction and to build the files' namespace. In the current paradigm the file system needs to copy the metadata and user data in the DRAM of the host with the goal to access and to modify the user data on the host side. The DAX approach doesn't change the concept but to build the way to bypass the page cache via the direct access to file's content in persistent memory. Generally speaking, for the case of data-centric computing, the file system needs to solve the opposite task not to copy data into page cache but to deliver the processing activity near data on the storage device side.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/02/2018

DurableFS: A File System for Persistent Memory

With the availability of hybrid DRAM-NVRAM memory on the memory bus of C...
research
03/25/2019

Comparative Analysis of Distributed and Parallel File Systems' Internal Techniques

A file system optimization is the most common task in the file system fi...
research
02/25/2021

Checkpointing with cp: the POSIX Shared Memory System

We present the checkpointing scheme of Abacus, an N-body simulation code...
research
03/13/2019

Basic Performance Measurements of the Intel Optane DC Persistent Memory Module

Scalable nonvolatile memory DIMMs will finally be commercially available...
research
09/14/2023

Sync+Sync: A Covert Channel Built on fsync with Storage

Scientists have built a variety of covert channels for secretive informa...
research
08/14/2021

A Policy-based Versioning SSD with Intel SGX

Privileged malware neutralizes software-based versioning systems and des...
research
07/24/2019

A Forensic Audit of the Tor Browser Bundle

The increasing use of encrypted data within file storage and in network ...

Please sign up or login with your details

Forgot password? Click here to reset