Proceedings of the Third ACM Symposium on Cloud Computing 2012
DOI: 10.1145/2391229.2391237
|View full text |Cite
|
Sign up to set email alerts
|

Using vector interfaces to deliver millions of IOPS from a networked key-value storage server

Abstract: The performance of non-volatile memories (NVM) has grown by a factor of 100 during the last several years: Flash devices today are capable of over 1 million I/Os per second. Unfortunately, this incredible growth has put strain on software storage systems looking to extract their full potential.To address this increasing software-I/O gap, we propose using vector interfaces in high-performance networked systems. Vector interfaces organize requests and computation in a distributed system into collections of simil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
11
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 19 publications
1
11
0
Order By: Relevance
“…[17] presents M-Lock, which is a framework that helps accelerate distributed transactions on key-value stores in cloud computing platforms. Finally, [18] attempts to address the increasing software-I/O gap in key-value stores by using vector interfaces in high-performance networked systems as the basis for key-value storage servers, where they demonstrate that they can provide 1.6 million requests per second with a median latency below one millisecond thanks to the high speed of non-volatile memories. All these previous efforts are different from ours in the sense that they are targeting at accurate key-value stores while our approach is approximate by nature.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…[17] presents M-Lock, which is a framework that helps accelerate distributed transactions on key-value stores in cloud computing platforms. Finally, [18] attempts to address the increasing software-I/O gap in key-value stores by using vector interfaces in high-performance networked systems as the basis for key-value storage servers, where they demonstrate that they can provide 1.6 million requests per second with a median latency below one millisecond thanks to the high speed of non-volatile memories. All these previous efforts are different from ours in the sense that they are targeting at accurate key-value stores while our approach is approximate by nature.…”
Section: Related Workmentioning
confidence: 99%
“…Among its various forms, key-value (k-v) stores have emerged as a popular option for storing and querying billions of key-value pairs [1], [2], [3] [4]. Examples of such services include Amazon Dynamo [5], Memcached [6] (used by Facebook and Twitter, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Since we only know their XOR result, and the encoding scheme we designed earlier does not guarantee that the encodings give unique values when three or more of them are combined, we only provide an opportunistic approach for three-item decoding. For more than three items that are mapped to the same cell, we consider the cell to be non-decodable 1 . The opportunistic algorithm works as follows.…”
Section: F Decoding Superimposed Encodingsmentioning
confidence: 99%
“…Key-value (k-v) storage has been used as a crucial component for many different network applications, such as social networks, online retailers, and cloud computing [1], [2]. Example implementations include Dynamo [3], Cassandra [4], Memcached [5], Redis [6], and BigTable [7].…”
Section: Introductionmentioning
confidence: 99%
“…Note that many other challenges exist, including but not limited to the following: 1) making the storage stack much higher performance to take advantage of the low latency and high parallelism of raw flash devices [189] (similarly to what we discussed in Section 5.3 with respect to the Persistent Memory Manager), 2) providing transactional support in the flash translation layer for better system performance and flexibility [120], 3) taking advantage of application-and system-level information to manage flash memory in a way that improves performance, efficiency, lifetime and cost. These are great research directions to explore, but, for brevity, we will not discuss them in further detail.…”
Section: Flash Memory Scaling Challengesmentioning
confidence: 99%