A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation (Englisch)

In: Journal of Systems and Software   ;  86 ,  3  ;  744-750  ;  2012
  • ISSN:
  • Aufsatz (Zeitschrift)  /  Elektronische Ressource

Wie erhalte ich diesen Titel?


Download ist DRM geschützt.

Kommerziell Vergütung an den Verlag: 36,00 € Grundgebühr: 4,00 € Gesamtpreis: 40,00 €
Akademisch Vergütung an den Verlag: 36,00 € Grundgebühr: 2,00 € Gesamtpreis: 38,00 €

Highlights ► An HDFS-based RAMCloud Storage System (RCSS) is proposed to improve random I/O performance for HDFS-based applications. ► RCSS is designed and implemented in Java, and is now available for application deployment. ► An performance evaluation on RCSS is conducted, and performance comparisons among RCSS, RAM-HDFS and HDFS are provided.

Abstract Few cloud storage systems can handle random read accesses efficiently. In this paper, we present a RAMCloud Storage System, RCSS, to enable efficient random read accesses in cloud environments. Based on the Hadoop Distributed File System (HDFS), RCSS integrates the available memory resources in an HDFS cluster to form a cloud storage system, which backs up all data on HDFS-managed disks, and fetches data from disks into memory for handy accesses when files are opened for read or specified by users for memory storage. We extend the storage capacity of RCSS to that of the substrate disk-based HDFS by multiplexing all the available memory resources. Furthermore, RCSS supports MapReduce, which is a popular cloud computing paradigm. By serving data from memory instead of disks, RCSS can yield high random I/O performance with low latency and high throughput, and can achieve good availability and scalability as HDFS.

  • Titel:
    A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation
  • Autor / Urheber:
  • Erschienen in:
  • Verlag:
    Elsevier Inc.
  • Erscheinungsjahr:
  • Format / Umfang:
    7 pages
  • ISSN:
  • DOI:
  • Medientyp:
    Aufsatz (Zeitschrift)
  • Format:
    Elektronische Ressource
  • Sprache:
  • Schlagwörter:
  • Datenquelle:
  • Exportieren:
  • ORKG:

Inhaltsverzeichnis – Band 86, Ausgabe 3

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

A mapping study to investigate component-based software system metrics
Abdellatief, Majdi / Sultan, Abu Bakar Md / Ghani, Abdul Azim Abdul / Jabar, Marzanah A. | 2012
An improved DCT-based perturbation scheme for high capacity data hiding in H.264/AVC intra frames
Lin, Tseng-Jung / Chung, Kuo-Liang / Chang, Po-Chun / Huang, Yong-Huai / Liao, Hong-Yuan Mark / Fang, Chiung-Yao | 2012
A sliding window based algorithm for frequent closed itemset mining over data streams
Nori, Fatemeh / Deypir, Mahmood / Sadreddini, Mohamad Hadi | 2012
Optimization of adaptation plans for a service-oriented architecture with cost, reliability, availability and performance tradeoff
Potena, Pasqualina | 2012
Sirius: A heuristic-based framework for measuring web usability adapted to the type of website
Torrente, M. Carmen Suárez / Prieto, A. Belén Martínez / Gutiérrez, Darío Alvarez / de Sagastegui, M. Elena Alva | 2012
Improving feature location using structural similarity and iterative graph mapping
Peng, Xin / Xing, Zhenchang / Tan, Xi / Yu, Yijun / Zhao, Wenyun | 2012
Optimal univariate microaggregation with data suppression
Laszlo, Michael / Mukherjee, Sumitra | 2012
Beyond ATAM: Early architecture evaluation method for large-scale distributed systems
Zalewski, Andrzej / Kijas, Szymon | 2012
SMSCrypto: A lightweight cryptographic framework for secure SMS transmission
Pereira, Geovandro C.C.F. / Santos, Mateus A.S. / de Oliveira, Bruno T. / Simplicio Jr., Marcos A. / Barreto, Paulo S.L.M. / Margi, Cíntia B. / Ruggiero, Wilson V. | 2012
BotMosaic: Collaborative network watermark for the detection of IRC-based botnets
Houmansadr, Amir / Borisov, Nikita | 2012
A reversible data hiding method by histogram shifting in high quality medical images
Huang, Li-Chin / Tseng, Lin-Yu / Hwang, Min-Shiang | 2012
Efficient Hamming weight-based side-channel cube attacks on PRESENT
Zhao, Xinjie / Guo, Shize / Zhang, Fan / Wang, Tao / Shi, Zhijie / Liu, Huiying / Ji, Keke / Huang, Jing | 2012
A RAMCloud Storage System based on HDFS: Architecture, implementation and evaluation
Luo, Yifeng / Luo, Siqiang / Guan, Jihong / Zhou, Shuigeng | 2012
SQLIA detection and prevention approach for RFID systems
Abawajy, Jemal | 2012
Constrained frequent pattern mining on univariate uncertain data
Liu, Ying-Ho / Wang, Chun-Sheng | 2012
Knowledge discovery of weighted RFM sequential patterns from customer sequence databases
Hu, Ya-Han / Huang, Tony Cheng-Kui / Kao, Yu-Hua | 2012
A delay-constrained and priority-aware channel assignment algorithm for efficient multicast in wireless mesh networks
Lin, Jenn-Wei / Zhuang, Jian-Yan | 2012
A computer virus spreading model based on resource limitations and interaction costs
Huang, Chung-Yuan / Lee, Chun-Liang / Wen, Tzai-Hung / Sun, Chuen-Tsai | 2012
Securing color information of an image by concealing the color palette
Chaumont, M. / Puech, W. / Lahanier, C. | 2012
Triple-image encryption scheme based on one-time key stream generated by chaos and plain images
Liu, Hongjun / Wang, Xingyuan | 2012
Communities of Web service registries: Construction and management
Sellami, Mohamed / Bouchaala, Olfa / Gaaloul, Walid / Tata, Samir | 2012
AFChecker: Effective model checking for context-aware adaptive applications
Liu, Yepang / Xu, Chang / Cheung, S.C. | 2012
Corrigendum to “A variable-length model for masquerade detection” [J. Syst. Softw. 85 (2012) 2470–2478]
Xiao, Xi / Tian, Xinguang / Zhai, Qibin / Xia, Shutao | 2012
Editorial Board
| 2013