- 1.C. Amza, A. L. Cox, S. D. Warkadas, P. Kelehr, H, Lu, R. Rajam0ny, W. Yu, and W. Zwaenepoel, "TreadMarks: Shared Memory Computing on Networks of Workstations", IEEE Computer, Vol.29, No.2, 1996, pp. 18-28]] Google ScholarDigital Library
- 2.W.J. Bolosky, ,and M. L. Scott, "False Sharing and its Effect on Shared Memory Performance", Proceedings of the USENLV Symposium on Experiences with Distributed and Multiprocessor Systems (SEDMS IL), Sept. 1993, pp.57-72]]Google Scholar
- 3.P. Brezany, {nput/Otttput intensive Massively Parallel Computing: Language Sttpport, Automatic Parallelization, Advanced Optimization, and Runtime Systems, Lecture Notes in Computer Science, Vol. 1220, Springer Verlag. 1997]] Google ScholarDigital Library
- 4.L. F. Cabrera, and D. D, E. Long, "Swift: Using distributed disk striping to provide high l/O data rates", Proceedings of USENIX Computing Systems, Fall 1991, pp.405-433]] Google ScholarDigital Library
- 5.P.M. Chen, E. K. Lee, G. A. Gibson, R. H. Katz, and D. A. Patterson; "RAID: High-Performance, Reliable Secondary Storage", ACM Computing Surveys, Vol.26, No.2, June 1994, pp. 145-185]] Google ScholarDigital Library
- 6.S.J. Eggers, and T. E. leremiassen, "Eliminating False Sharing", Proceedings of the 1991 international Conference on Parallel Processing, August 1991, Vol. I, pp.377-381]]Google Scholar
- 7.G.A. Gibson, D. F. Nagle, K. Amid, F. W. Chang, E. M. Feinberg, H. Gobioff, C. Lee, B. Ozceri, E. Riedel, D. Rochberg, and J, Zelenka, "File Server Scaling with Network-Attached Secure Disks", Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems, June 1997,]] Google ScholarDigital Library
- 8.K. Hwang, and Z. Xu; Scalable Parallel Computing: Technology, Architecture, programming, WCB/ McGraw-Hill Co,, 1998]] Google ScholarDigital Library
- 9.R.L. Hyde, and B. D. Fleisch. "Degenerate Sharing", Proceedings of the 1994 International Conference on Parallel Processing, 1994, Vol. I, pp.267-270]] Google ScholarDigital Library
- 10.H. Jin, X. Zhou. and P. Cheng, "Track-based Improved LRU Algorithm for Disk Array", Proceedings of 15th IMACS World Congress on Scientific Comptaation ,~lodeling and Applied Mathematics, Wissenshaft & I'echnik Verlag, 1997, Berlin, Germany. Vol. IV, pp.583-588]]Google Scholar
- 11.V. Khera, R. P. Larowe, and C. S. Ellis, "An Architecture-lndependent Analysis of False Sharing", Computer Science Department, Duke University, TR 93-006, Oct. 1993]] Google ScholarDigital Library
- 12.V. Khera, "Factor Affecting False Sharing on Page- GranulariW Cache-Coherent Shared-Memory Multiprocessors", Computer Science Department, Ehke University, CS-1994-37. Dec. 1994]] Google ScholarDigital Library
- 13.A. Merchant, and P. S. Yu, "Analytic Modeling of Clustered RAID with Mapping Based on Nearly Permutation". IEEE Transactions on Computer, Vol.45, No.3, March 1996, pp.367-373]] Google ScholarDigital Library
- 14.A. N. Mourad, W. K. Fuchs, and D. G. Sbba, "Assigning Sites to Redundant Clusters in a Distributed Storage System". Proceedings of 1993 International Conference on Parallel Processing, Vol. I, pp.64-71]] Google ScholarDigital Library
- 15.S. Nakamura, H. Minemura. T. Yamaguchi, H. Shimizu, T. Watanabe, and T. Mizuno, "Cluster-based disk array Style Video Server". IEICE Transactions on Communication, VoI.E79-B, No.S, August 1996, pp. 1030-1037]]Google Scholar
- 16.E. Riedel, G. A. Gibson, and C. Faloutaos, "Active Storage For Large-scale Data Mining and Multimedia", Proceedings of the 24th International Coherence on Very large Databases (V~DB'98), August 1998]] Google ScholarDigital Library
- 17.M. Stonebraker, and G. A. Schloss, "C lust~- based disk array- a New Multiple Copy Algorithm", Proceedings of the Sixth International Conference on Data Engineering, Feb, 1990, pp.430,.437]] Google ScholarDigital Library
Index Terms
- False sharing problems in cluster-based disk arrays
Recommendations
Higher reliability redundant disk arrays: Organization, operation, and coding
Parity is a popular form of data protection in redundant arrays of inexpensive/independent disks (RAID). RAID5 dedicates one out of N disks to parity to mask single disk failures, that is, the contents of a block on a failed disk can be reconstructed by ...
Parity logging disk arrays
Parity-encoded redundant disk arrays provide highly reliable, cost-effective secondary storage with high performance for reads and large writes. Their performance on small writes, however, is much worse than mirrored disks—the traditional, highly ...
On Variable Scope of Parity Protection in Disk Arrays
In a common form of a RAID 5 architecture, data is organized on a disk array consisting of N + 1 disks into stripes of N data blocks and one parity block (with parity block locations staggered so as to balance the number of parity blocks on each disk). ...
Comments