Improving Throughput in Cloud Storage System
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 6
Abstract
Because the cloud serves many workloads concurrently, its disk access pattern is highly random and heterogeneous. In addition, because various virtual machines access to files respectively, meta data utilization and small write requests are increased. In order to build a system for these patters, we should analyze the modern techniques used at cloud system. First, we show that a SATA controller has enough processing capability to serve six disks without performance degradation. Motivated by this experiment, we compare three disk configurations by executing benchmark applications. From the result, we observe that accessing independent disks directly provides better performance than RAID-0 and RAID-5. Lastly, we performed experiment about comparing frequently used protocols (NFS, iSCSI)[8] and got the result that iSCSI[10] showed better performance than NFS[11]
Authors and Affiliations
Chanho Choi , Shin-gyu Kim , Hyeonsang Eom , Heon Y. Yeom
Guaranteed Packet Transfer in MANET In and Out of Coverage Areas and Energy Saving Using Random Casting
The main objective analysis of packet loss in coverage area nd less coverage area and reduced packet loss and increase e reliability in MANET . Each node on its neighborhood formation is updated in a timely manner to...
ANALYSIS OF ELECTRONIC VOTING SYSTEM IN VARIOUS COUNTRIES
India is the world’s largest democracy with a population of more than 1 billion; India has an electorate of more than 668 million and covers 543 parliamentary constituencies. Voting is the bridge between the governed and...
Image Compression Using Fast 2-D DCT Technique
Image Compression is a method, which reduces the size of the data to reduce the amount of space required to store the data. The Discrete cosine transform (DCT) is a method for transforms a signal or image from spatial do...
Fault tolerant workflow scheduling based on replication and resubmission of tasks in Cloud Computing
The aim of workflow scheduling system is to schedule the workflows within the user given deadline to achieve a good success rate. Workflow is a set of tasks processed in a predefined order based on its data and control d...
A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks
The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing pro...