SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Effect of Disk Prefetching of Guest OS
       on Storage Deduplication
       Kuniyasu Suzaki †, Toshiki Yagi †,
        Kengo Iijima †, Cyrille Artho †,
            Yoshihito W t b
            Y hihit Watanabe ††

        †

                      Research Center for Information Security


        ††
                                                                 1
Motivation (1/2)
• Normal OS is installed on fully virtualized environment
  and assumes there are real devices.
• Do the optimization techniques of operating system
  work well for virtual devices?
   – Virtualized devices are developed to get native performance,
     but most virtual devices have their original restrictions
     which are not hidden from the view of performance.


• Should Guest OS adjust the virtual devices with
  traditional optimization techniques?
                                                                    2
Motivation (2/2)
• Our approach is not to devlop a para-virtualized device
  driver and I/O Passthrough.

• Our approach
   – Guest OS recognizes the feature of virtual device and adjust
     the behavior for it.
       • Current OS has many optimization techniques and tools.




                                                                    3
Our targets
• virtual device (storage)
   – CAS: Content Addressable Storage
      • Manage virtual block device with deduplication.
      • CAS has original restrictions; Occupancy problem, size
        mismatching, and alignment problem.
• G t OS: Li
  Guest OS Linux
   – readahead: Disk prefetch mechanism in Linux kernel
          – System call “readahead” is different function.
   – block reallocation of file system
      • A kind of defrag tool. We developed “ext-optimizer”
        which reallocate data block using access profile.

                                                                 4
CAS: Content addressable Storage
• Data is not addressed by its physical location. Data is
  addressed by a unique name (a secure hash is used usually)
  derived from the content.
• Same contents are expressed by one original content (same
  hash) and others are addressed by indirect link. (Storage
  Deduplication)
   – Plan9 has Venti [USENIX FAST02]
   – Data Domain (EMC) Deduplication [USENIX FAST08]
                  (     )    p       [                 ]
   – LBCAS (Loopback Content Addressable Storage) [LinuxSymp09]

          Virtual Disk                                        CAS Storage Archive
                                                 Indexing

                                    Address       SHA-1
                               0000000-0003FFF   4ad36ffe8…
                               0004000-0007FFF   974daf34a…                 New block
                               0008000-000BFFF   2d34ff3e1…                 is created
                               000C000-000FFFF   974daf34a…
                                  …                     …                   with new
                                                                              SHA-1


                                                          sharing
                                  Deduplication
Optimization for Disk Access
• Disk prefetch “readahead”
   – Linux kernel has a disk prefetch mechanism called “readahead”.
     Prefeached data are stored in memory (page cache). The
     coverage size of prefeatch is changed dynamically by the hit rate
     of page chache.
• System Call “readahead”
   – It is not directly related to the disk prefetch but it achieves same
     function from user space.
   – System Call “readahead” populates the page cache with whole
     data from a file. Thus, whole data of a file is stored at page cache.
       • It is not efficient for the view of prefeatch.
   – We refer this function “u-readahead” in this presentation.        6
Performance Issues on CAS
• 2 types of block size mismatch
   (1) between File System and LBCAS (Static Mismatch)
      • ext2/3 4KB block size
      • LBCAS 64KB-512KB chunk size
          – Occupancy (Rate of necessary data in a LBCAS chunk) is low.
              » Kitagawa[LinuxKongress2006] reported the occupancy was 30% on
                KNOPPIX 3.8.2 on 256KB LBCAS.
   (2) between readahead and LBCAS (Dynamic Mismatch)
       • readahead 4KB-128KB coverage size
      • LBCAS 64KB-512KB chunk size
         – Size mismatch
             » Small readahead causes low occupancy.
             » Large readahead requires many LBCAS chunks for an access.
         – Alignment problem
             » When readahead covers the alignment of LBCAS, redundant
               chunk is required.                                     7
Access mismatch in chunk of LBCAS
•    Occupancy (necessary data in a chunk) depends on the necessary data.
•    Large readahead requires many chunks.
•    Wnen an access crosses over the LBCAS alignment, redundant chuck is allocated.
                      Ext2/3 File System      readahead           LBCAS
    Access request    (4K)                    (4K~128K)           (256KB)

                                                                           Occupancy is low
                                                  Small readahead




                                                                           Many chunk
                                                  Large readahead          searches and
                                                                           allocation for an
                                                                           access




                                                  Alignment Access
                                                                            Redundant
                                                                            chunk

                                                                                        8
               Files       Block search       Disk access             LBCAS Chunk
                                              via readahead
Solution
1. (for static mismatch) Increase occupancy by reallocate
   necessary data in a LBCAS chunk.
2. (for dynamic mismatch) Keeps large coverage size of
   readahead by sequential access and high hit rate of page
   cache.

• Increasing locality of reference.
• “ext-optimizer” repacks the data blocks of ext2/3 file
  system to be in line.
   – The repacking is based on the block access profile.
   – As the results, ext-optimizer increases the occupancy and
     constant high cache hit rate by sequential access.          9
Ext-optimizer: Access profile and reallocation
                            App                           ext-optimizer                      App
   User


                                                 Access Profile
   Kernel                                        (via /proc/ )
                              VFS                                                              VFS



                   File System Driver (ext2/3)                                      File System Driver (ext2/3)
                            Profiler



                 Page Cache (Memory)                                              Page Cache (Memory)

 Readahead is
small and many                                                     Readahead
 (worm-eaten)                                                     is sequential
                         Block Driver                                                     Block Driver
    access                                                            access
                          (Loopback)                                                       (Loopback)


   Device

                                                         Reallocate                                          10
          scattered                                                         gathered
Block Relocation: Ext-optimizer [LinuxKongress06]
•     Change data blocks to be arranged in line. Structure of meta data is not changed.
•     The arrangement is based on the access profile.
•     Feature:
        – Normal driver is used.
        – The fragmentation is occurred from the view of file
        – The relocation increases page-cache hit. readahead extend the coverage size.

    Mode                                                     Mode
    Owner info                                               Owner info
    Size                                                     Size
                                                                                             high
    Timestamps                                               Timestamps                   occupancy
    Direct Blocks                                            Direct Blocks




    Indirect Blocks                                          Indirect Blocks

    Double Indirect                                          Double Indirect

    Triple Indirect                                          Triple Indirect




                                                                                          11
Performance Analysis

• Confirm the effect of ext-optimizer on LBCAS for Guest
  OS booting.
   – Ubuntu 9.04 (2.6.28) installed on ext3 (8GB) with KVM-60.
      • The ext3 was optimized by ext-optimizer for boot profile.
      • The disk image is translated to LBCAS (64KB - 256KB).
• Compare with
   – Normal
   – u-readahead: user level readahead (system call) for booting
   – ext-optimizer

                                                                    12
Disk Image Analyzed by DAVL
                  (Disk Allocation Viewer for Linux)




          Fragmentation 0.21%                   Fragmentation 1.11%


                                                                       Data used
System                                                                booting are
 block                                                                made in line
                                Non
                                Non-
                             contiguous
                               block




                            contiguous
                              block




                                                                         13
         normal                                  ext2/3opt
Disk Access Trace at boot time
• Ext-optimizer relocate data blocks, which are
  required at boot time, at the top of virtual disk.

Red: normal
Blue: ext2/3opt
                    s)
              Time (s




                          0      2.0    4.0      6.0      8.0
                                                                14
                                        Address (GB)
Histogram of Access for readahead coverage
• Ext-optimizer reduced small “readahead”.
        Frequency




                    0     32           64                 128
                                                                15
                        Coverage size of readahead (KB)
Amount of data on each processing level
                                     normal           u-readahead    ext2/3opt
 Amount of files (number, average)   203MB (2,248 Av: 92KB)
 Amount of required blocks           127MB
 Amount of disk access which         208MB           231MB           140MB
 includes coverage of readahead
                                     6,379           5, 827          2,129
 (count, average coverage size)
                                     33KB            41KB            67KB

Amount of required chunk MB, Occupancy % (127MB/ Amount of Chunk MB)

LBCAS size normal                       u-readahead           ext2/3opt
64KB       247, 51.5%                   272, 46.9%            144, 88.7%
128KB      290, 43.9%                   315, 40.3%            149, 85.3%
256KB      358, 35.5%                   386, 35.0%            159, 80.0%
512KB              474, 26.9%           508, 25.1%            176, 71.8%         16
Discussion
• In this talk, I eliminate the effect of deduplication, but it is
  not high on a single disk image, even if the chuck is small.
   – Deduplicaion is effective on merging updated images.
   – Performance is more important.


• Memory on a virtual machine also has deduplication
  mechanism (Differential Engine[OSDI’09], Satori[USENIX’09],
  etc). Guest OS should adjust the behavior.
   – SLINKY[USENIX05] and our paper [HotSec10] utilizes memory
     deduplication for security.


                                                               17
Conclusion
• Virtual devices have their original restrictions which are
  not hidden from the view of performance.
• The guest OS should recognize the feature of virtual
  device and adjust the behavior for virtual device with
  traditional ti i ti t h i
  t diti l optimization techniques.
• We showed an example for CAS(Content Addressable
  Storage) with disk prefeatching and block reallocation.




                                                          18

Contenu connexe

Tendances

Introduction to hadoop and hdfs
Introduction to hadoop and hdfsIntroduction to hadoop and hdfs
Introduction to hadoop and hdfsTrendProgContest13
 
Hadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenesHadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenesNitin Khattar
 
Apache Hadoop YARN, NameNode HA, HDFS Federation
Apache Hadoop YARN, NameNode HA, HDFS FederationApache Hadoop YARN, NameNode HA, HDFS Federation
Apache Hadoop YARN, NameNode HA, HDFS FederationAdam Kawa
 
Hadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
Hadoop World 2011: HDFS Federation - Suresh Srinivas, HortonworksHadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
Hadoop World 2011: HDFS Federation - Suresh Srinivas, HortonworksCloudera, Inc.
 
Ph.D. thesis presentation
Ph.D. thesis presentationPh.D. thesis presentation
Ph.D. thesis presentationdavidkftam
 
Cache-partitioning
Cache-partitioningCache-partitioning
Cache-partitioningdavidkftam
 
DaStor/Cassandra report for CDR solution
DaStor/Cassandra report for CDR solutionDaStor/Cassandra report for CDR solution
DaStor/Cassandra report for CDR solutionSchubert Zhang
 
Linux Symposium 2009 Slide Suzaki "Effect of readahead and file system block ...
Linux Symposium 2009 Slide Suzaki "Effect of readahead and file system block ...Linux Symposium 2009 Slide Suzaki "Effect of readahead and file system block ...
Linux Symposium 2009 Slide Suzaki "Effect of readahead and file system block ...Kuniyasu Suzaki
 
Oct 2012 HUG: Hadoop .Next (0.23) - Customer Impact and Deployment
Oct 2012 HUG: Hadoop .Next (0.23) - Customer Impact and DeploymentOct 2012 HUG: Hadoop .Next (0.23) - Customer Impact and Deployment
Oct 2012 HUG: Hadoop .Next (0.23) - Customer Impact and DeploymentYahoo Developer Network
 
Embedded Database Technology | Interbase From Embarcadero Technologies
Embedded Database Technology | Interbase From Embarcadero TechnologiesEmbedded Database Technology | Interbase From Embarcadero Technologies
Embedded Database Technology | Interbase From Embarcadero TechnologiesMichael Findling
 
Sep 2012 HUG: Giraffa File System to Grow Hadoop Bigger
Sep 2012 HUG: Giraffa File System to Grow Hadoop Bigger Sep 2012 HUG: Giraffa File System to Grow Hadoop Bigger
Sep 2012 HUG: Giraffa File System to Grow Hadoop Bigger Yahoo Developer Network
 
Apache con 2013-hadoop
Apache con 2013-hadoopApache con 2013-hadoop
Apache con 2013-hadoopSteve Watt
 
Apache HBase for Architects
Apache HBase for ArchitectsApache HBase for Architects
Apache HBase for ArchitectsNick Dimiduk
 
Virtualization Primer for Java Developers
Virtualization Primer for Java DevelopersVirtualization Primer for Java Developers
Virtualization Primer for Java DevelopersRichard McDougall
 

Tendances (20)

Introduction to hadoop and hdfs
Introduction to hadoop and hdfsIntroduction to hadoop and hdfs
Introduction to hadoop and hdfs
 
Hadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenesHadoop Distributed File System(HDFS) : Behind the scenes
Hadoop Distributed File System(HDFS) : Behind the scenes
 
Apache Hadoop YARN, NameNode HA, HDFS Federation
Apache Hadoop YARN, NameNode HA, HDFS FederationApache Hadoop YARN, NameNode HA, HDFS Federation
Apache Hadoop YARN, NameNode HA, HDFS Federation
 
Hadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
Hadoop World 2011: HDFS Federation - Suresh Srinivas, HortonworksHadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
Hadoop World 2011: HDFS Federation - Suresh Srinivas, Hortonworks
 
Ph.D. thesis presentation
Ph.D. thesis presentationPh.D. thesis presentation
Ph.D. thesis presentation
 
Mongo db roma replication and sharding
Mongo db roma replication and shardingMongo db roma replication and sharding
Mongo db roma replication and sharding
 
Cache-partitioning
Cache-partitioningCache-partitioning
Cache-partitioning
 
Dfs in iaa_s
Dfs in iaa_sDfs in iaa_s
Dfs in iaa_s
 
Tutorial Haddop 2.3
Tutorial Haddop 2.3Tutorial Haddop 2.3
Tutorial Haddop 2.3
 
DaStor/Cassandra report for CDR solution
DaStor/Cassandra report for CDR solutionDaStor/Cassandra report for CDR solution
DaStor/Cassandra report for CDR solution
 
Linux Symposium 2009 Slide Suzaki "Effect of readahead and file system block ...
Linux Symposium 2009 Slide Suzaki "Effect of readahead and file system block ...Linux Symposium 2009 Slide Suzaki "Effect of readahead and file system block ...
Linux Symposium 2009 Slide Suzaki "Effect of readahead and file system block ...
 
Oct 2012 HUG: Hadoop .Next (0.23) - Customer Impact and Deployment
Oct 2012 HUG: Hadoop .Next (0.23) - Customer Impact and DeploymentOct 2012 HUG: Hadoop .Next (0.23) - Customer Impact and Deployment
Oct 2012 HUG: Hadoop .Next (0.23) - Customer Impact and Deployment
 
Embedded Database Technology | Interbase From Embarcadero Technologies
Embedded Database Technology | Interbase From Embarcadero TechnologiesEmbedded Database Technology | Interbase From Embarcadero Technologies
Embedded Database Technology | Interbase From Embarcadero Technologies
 
Sep 2012 HUG: Giraffa File System to Grow Hadoop Bigger
Sep 2012 HUG: Giraffa File System to Grow Hadoop Bigger Sep 2012 HUG: Giraffa File System to Grow Hadoop Bigger
Sep 2012 HUG: Giraffa File System to Grow Hadoop Bigger
 
Apache con 2013-hadoop
Apache con 2013-hadoopApache con 2013-hadoop
Apache con 2013-hadoop
 
Hadoop 1.x vs 2
Hadoop 1.x vs 2Hadoop 1.x vs 2
Hadoop 1.x vs 2
 
Hadoop HDFS
Hadoop HDFSHadoop HDFS
Hadoop HDFS
 
Ceph
CephCeph
Ceph
 
Apache HBase for Architects
Apache HBase for ArchitectsApache HBase for Architects
Apache HBase for Architects
 
Virtualization Primer for Java Developers
Virtualization Primer for Java DevelopersVirtualization Primer for Java Developers
Virtualization Primer for Java Developers
 

En vedette

IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...benzfire
 
Tailoring NAS Proxies for Virtual Machines
Tailoring NAS Proxies for Virtual MachinesTailoring NAS Proxies for Virtual Machines
Tailoring NAS Proxies for Virtual MachinesThe Linux Foundation
 
Virtual Appliance Developer
Virtual Appliance DeveloperVirtual Appliance Developer
Virtual Appliance DeveloperSvitlanaSikora
 
F5 Broadens Platform Offerings with New Virtual and Hardware-Based Applicatio...
F5 Broadens Platform Offerings with New Virtual and Hardware-Based Applicatio...F5 Broadens Platform Offerings with New Virtual and Hardware-Based Applicatio...
F5 Broadens Platform Offerings with New Virtual and Hardware-Based Applicatio...jasonenriquez
 
Emulex Connect Architecture :The Next Generation of Virtual I/O
Emulex Connect Architecture:The Next Generation of Virtual I/OEmulex Connect Architecture:The Next Generation of Virtual I/O
Emulex Connect Architecture :The Next Generation of Virtual I/OEmulex Corporation
 

En vedette (6)

IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
IBM Offers ISVs a Fast Track for Virtual Appliance Deployment on New IBM Pure...
 
XS Japan 2008 App Data English
XS Japan 2008 App Data EnglishXS Japan 2008 App Data English
XS Japan 2008 App Data English
 
Tailoring NAS Proxies for Virtual Machines
Tailoring NAS Proxies for Virtual MachinesTailoring NAS Proxies for Virtual Machines
Tailoring NAS Proxies for Virtual Machines
 
Virtual Appliance Developer
Virtual Appliance DeveloperVirtual Appliance Developer
Virtual Appliance Developer
 
F5 Broadens Platform Offerings with New Virtual and Hardware-Based Applicatio...
F5 Broadens Platform Offerings with New Virtual and Hardware-Based Applicatio...F5 Broadens Platform Offerings with New Virtual and Hardware-Based Applicatio...
F5 Broadens Platform Offerings with New Virtual and Hardware-Based Applicatio...
 
Emulex Connect Architecture :The Next Generation of Virtual I/O
Emulex Connect Architecture:The Next Generation of Virtual I/OEmulex Connect Architecture:The Next Generation of Virtual I/O
Emulex Connect Architecture :The Next Generation of Virtual I/O
 

Similaire à ASPLOS2011 workshop RESoLVE "Effect of Disk Prefetching of Guest OS "

VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualizationSisimon Soman
 
Caching principles-solutions
Caching principles-solutionsCaching principles-solutions
Caching principles-solutionspmanvi
 
Storage virtualization citrix blr wide tech talk
Storage virtualization citrix blr wide tech talkStorage virtualization citrix blr wide tech talk
Storage virtualization citrix blr wide tech talkSisimon Soman
 
인메모리 클러스터링 아키텍처
인메모리 클러스터링 아키텍처인메모리 클러스터링 아키텍처
인메모리 클러스터링 아키텍처Jaehong Cheon
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case studyLavanya G
 
Pm 01 bradley stone_openstorage_openstack
Pm 01 bradley stone_openstorage_openstackPm 01 bradley stone_openstorage_openstack
Pm 01 bradley stone_openstorage_openstackOpenCity Community
 
Openstorage with OpenStack, by Bradley
Openstorage with OpenStack, by BradleyOpenstorage with OpenStack, by Bradley
Openstorage with OpenStack, by BradleyHui Cheng
 
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...Databricks
 
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...Databricks
 
Oracle rac 10g best practices
Oracle rac 10g best practicesOracle rac 10g best practices
Oracle rac 10g best practicesHaseeb Alam
 
It's the End of Data Storage As We Know It (And I Feel Fine)
It's the End of Data Storage As We Know It (And I Feel Fine)It's the End of Data Storage As We Know It (And I Feel Fine)
It's the End of Data Storage As We Know It (And I Feel Fine)Stephen Foskett
 
Scalable Web Solutions - Use Case: Regulatory Reform In Vietnam On eZ Publish...
Scalable Web Solutions - Use Case: Regulatory Reform In Vietnam On eZ Publish...Scalable Web Solutions - Use Case: Regulatory Reform In Vietnam On eZ Publish...
Scalable Web Solutions - Use Case: Regulatory Reform In Vietnam On eZ Publish...Ivo Lukač
 
My sql with enterprise storage
My sql with enterprise storageMy sql with enterprise storage
My sql with enterprise storageCaroline_Rose
 
Scale your Alfresco Solutions
Scale your Alfresco Solutions Scale your Alfresco Solutions
Scale your Alfresco Solutions Alfresco Software
 
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...Lindsey Aitchison
 
Near Real time Indexing Kafka Messages to Apache Blur using Spark Streaming
Near Real time Indexing Kafka Messages to Apache Blur using Spark StreamingNear Real time Indexing Kafka Messages to Apache Blur using Spark Streaming
Near Real time Indexing Kafka Messages to Apache Blur using Spark StreamingDibyendu Bhattacharya
 
OS Slide Ch12 13
OS Slide Ch12 13OS Slide Ch12 13
OS Slide Ch12 13庭緯 陳
 
Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 

Similaire à ASPLOS2011 workshop RESoLVE "Effect of Disk Prefetching of Guest OS " (20)

VDI storage and storage virtualization
VDI storage and storage virtualizationVDI storage and storage virtualization
VDI storage and storage virtualization
 
Caching principles-solutions
Caching principles-solutionsCaching principles-solutions
Caching principles-solutions
 
Storage virtualization citrix blr wide tech talk
Storage virtualization citrix blr wide tech talkStorage virtualization citrix blr wide tech talk
Storage virtualization citrix blr wide tech talk
 
인메모리 클러스터링 아키텍처
인메모리 클러스터링 아키텍처인메모리 클러스터링 아키텍처
인메모리 클러스터링 아키텍처
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Pm 01 bradley stone_openstorage_openstack
Pm 01 bradley stone_openstorage_openstackPm 01 bradley stone_openstorage_openstack
Pm 01 bradley stone_openstorage_openstack
 
Openstorage with OpenStack, by Bradley
Openstorage with OpenStack, by BradleyOpenstorage with OpenStack, by Bradley
Openstorage with OpenStack, by Bradley
 
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
 
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
Apache Spark on Supercomputers: A Tale of the Storage Hierarchy with Costin I...
 
Oracle rac 10g best practices
Oracle rac 10g best practicesOracle rac 10g best practices
Oracle rac 10g best practices
 
It's the End of Data Storage As We Know It (And I Feel Fine)
It's the End of Data Storage As We Know It (And I Feel Fine)It's the End of Data Storage As We Know It (And I Feel Fine)
It's the End of Data Storage As We Know It (And I Feel Fine)
 
Scalable Web Solutions - Use Case: Regulatory Reform In Vietnam On eZ Publish...
Scalable Web Solutions - Use Case: Regulatory Reform In Vietnam On eZ Publish...Scalable Web Solutions - Use Case: Regulatory Reform In Vietnam On eZ Publish...
Scalable Web Solutions - Use Case: Regulatory Reform In Vietnam On eZ Publish...
 
My sql with enterprise storage
My sql with enterprise storageMy sql with enterprise storage
My sql with enterprise storage
 
Openstorage Openstack
Openstorage OpenstackOpenstorage Openstack
Openstorage Openstack
 
Inexpensive storage
Inexpensive storageInexpensive storage
Inexpensive storage
 
Scale your Alfresco Solutions
Scale your Alfresco Solutions Scale your Alfresco Solutions
Scale your Alfresco Solutions
 
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
Building an Oracle Grid with Oracle VM on Dell Blade Servers and EqualLogic i...
 
Near Real time Indexing Kafka Messages to Apache Blur using Spark Streaming
Near Real time Indexing Kafka Messages to Apache Blur using Spark StreamingNear Real time Indexing Kafka Messages to Apache Blur using Spark Streaming
Near Real time Indexing Kafka Messages to Apache Blur using Spark Streaming
 
OS Slide Ch12 13
OS Slide Ch12 13OS Slide Ch12 13
OS Slide Ch12 13
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 

Plus de Kuniyasu Suzaki

RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)Kuniyasu Suzaki
 
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)Kuniyasu Suzaki
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告Kuniyasu Suzaki
 
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)Kuniyasu Suzaki
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiKuniyasu Suzaki
 
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?Kuniyasu Suzaki
 
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)Kuniyasu Suzaki
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Kuniyasu Suzaki
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiKuniyasu Suzaki
 
BMC: Bare Metal Container @Open Source Summit Japan 2017
BMC: Bare Metal Container @Open Source Summit Japan 2017BMC: Bare Metal Container @Open Source Summit Japan 2017
BMC: Bare Metal Container @Open Source Summit Japan 2017Kuniyasu Suzaki
 
USENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationUSENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationKuniyasu Suzaki
 
Io t security-suzki-20170224
Io t security-suzki-20170224Io t security-suzki-20170224
Io t security-suzki-20170224Kuniyasu Suzaki
 
”Bare-Metal Container" presented at HPCC2016
”Bare-Metal Container" presented at HPCC2016”Bare-Metal Container" presented at HPCC2016
”Bare-Metal Container" presented at HPCC2016Kuniyasu Suzaki
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kuniyasu Suzaki
 
Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Kuniyasu Suzaki
 
Slide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiSlide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiKuniyasu Suzaki
 
OSセキュリティチュートリアル
OSセキュリティチュートリアルOSセキュリティチュートリアル
OSセキュリティチュートリアルKuniyasu Suzaki
 
Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Kuniyasu Suzaki
 
Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Kuniyasu Suzaki
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 

Plus de Kuniyasu Suzaki (20)

RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
RISC-Vのセキュリティ技術(TEE, Root of Trust, Remote Attestation)
 
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
遠隔デバイスとの信頼を築くための技術とその標準(TEEP RATS)
 
IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告IETF111 RATS: Remote Attestation ProcedureS 報告
IETF111 RATS: Remote Attestation ProcedureS 報告
 
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)Slide presented at FIT 2021 Top Conference  (Reboot Oriented IoT, ACSAC2021)
Slide presented at FIT 2021 Top Conference (Reboot Oriented IoT, ACSAC2021)
 
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu SuzakiACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
 
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
TEE (Trusted Execution Environment)は第二の仮想化技術になるか?
 
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
 
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
 
RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzaki
 
BMC: Bare Metal Container @Open Source Summit Japan 2017
BMC: Bare Metal Container @Open Source Summit Japan 2017BMC: Bare Metal Container @Open Source Summit Japan 2017
BMC: Bare Metal Container @Open Source Summit Japan 2017
 
USENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory DisaggregationUSENIX NSDI17 Memory Disaggregation
USENIX NSDI17 Memory Disaggregation
 
Io t security-suzki-20170224
Io t security-suzki-20170224Io t security-suzki-20170224
Io t security-suzki-20170224
 
”Bare-Metal Container" presented at HPCC2016
”Bare-Metal Container" presented at HPCC2016”Bare-Metal Container" presented at HPCC2016
”Bare-Metal Container" presented at HPCC2016
 
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
 
Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)Report for S4x14 (SCADA Security Scientific Symposium 2014)
Report for S4x14 (SCADA Security Scientific Symposium 2014)
 
Slide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by SuzakiSlide used at ACM-SAC 2014 by Suzaki
Slide used at ACM-SAC 2014 by Suzaki
 
OSセキュリティチュートリアル
OSセキュリティチュートリアルOSセキュリティチュートリアル
OSセキュリティチュートリアル
 
Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies Nested Virtual Machines and Proxies
Nested Virtual Machines and Proxies
 
Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護Bitvisorをベースとした既存Windowsのドライバメモリ保護
Bitvisorをベースとした既存Windowsのドライバメモリ保護
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 

Dernier

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

ASPLOS2011 workshop RESoLVE "Effect of Disk Prefetching of Guest OS "

  • 1. Effect of Disk Prefetching of Guest OS on Storage Deduplication Kuniyasu Suzaki †, Toshiki Yagi †, Kengo Iijima †, Cyrille Artho †, Yoshihito W t b Y hihit Watanabe †† † Research Center for Information Security †† 1
  • 2. Motivation (1/2) • Normal OS is installed on fully virtualized environment and assumes there are real devices. • Do the optimization techniques of operating system work well for virtual devices? – Virtualized devices are developed to get native performance, but most virtual devices have their original restrictions which are not hidden from the view of performance. • Should Guest OS adjust the virtual devices with traditional optimization techniques? 2
  • 3. Motivation (2/2) • Our approach is not to devlop a para-virtualized device driver and I/O Passthrough. • Our approach – Guest OS recognizes the feature of virtual device and adjust the behavior for it. • Current OS has many optimization techniques and tools. 3
  • 4. Our targets • virtual device (storage) – CAS: Content Addressable Storage • Manage virtual block device with deduplication. • CAS has original restrictions; Occupancy problem, size mismatching, and alignment problem. • G t OS: Li Guest OS Linux – readahead: Disk prefetch mechanism in Linux kernel – System call “readahead” is different function. – block reallocation of file system • A kind of defrag tool. We developed “ext-optimizer” which reallocate data block using access profile. 4
  • 5. CAS: Content addressable Storage • Data is not addressed by its physical location. Data is addressed by a unique name (a secure hash is used usually) derived from the content. • Same contents are expressed by one original content (same hash) and others are addressed by indirect link. (Storage Deduplication) – Plan9 has Venti [USENIX FAST02] – Data Domain (EMC) Deduplication [USENIX FAST08] ( ) p [ ] – LBCAS (Loopback Content Addressable Storage) [LinuxSymp09] Virtual Disk CAS Storage Archive Indexing Address SHA-1 0000000-0003FFF 4ad36ffe8… 0004000-0007FFF 974daf34a… New block 0008000-000BFFF 2d34ff3e1… is created 000C000-000FFFF 974daf34a… … … with new SHA-1 sharing Deduplication
  • 6. Optimization for Disk Access • Disk prefetch “readahead” – Linux kernel has a disk prefetch mechanism called “readahead”. Prefeached data are stored in memory (page cache). The coverage size of prefeatch is changed dynamically by the hit rate of page chache. • System Call “readahead” – It is not directly related to the disk prefetch but it achieves same function from user space. – System Call “readahead” populates the page cache with whole data from a file. Thus, whole data of a file is stored at page cache. • It is not efficient for the view of prefeatch. – We refer this function “u-readahead” in this presentation. 6
  • 7. Performance Issues on CAS • 2 types of block size mismatch (1) between File System and LBCAS (Static Mismatch) • ext2/3 4KB block size • LBCAS 64KB-512KB chunk size – Occupancy (Rate of necessary data in a LBCAS chunk) is low. » Kitagawa[LinuxKongress2006] reported the occupancy was 30% on KNOPPIX 3.8.2 on 256KB LBCAS. (2) between readahead and LBCAS (Dynamic Mismatch) • readahead 4KB-128KB coverage size • LBCAS 64KB-512KB chunk size – Size mismatch » Small readahead causes low occupancy. » Large readahead requires many LBCAS chunks for an access. – Alignment problem » When readahead covers the alignment of LBCAS, redundant chunk is required. 7
  • 8. Access mismatch in chunk of LBCAS • Occupancy (necessary data in a chunk) depends on the necessary data. • Large readahead requires many chunks. • Wnen an access crosses over the LBCAS alignment, redundant chuck is allocated. Ext2/3 File System readahead LBCAS Access request (4K) (4K~128K) (256KB) Occupancy is low Small readahead Many chunk Large readahead searches and allocation for an access Alignment Access Redundant chunk 8 Files Block search Disk access LBCAS Chunk via readahead
  • 9. Solution 1. (for static mismatch) Increase occupancy by reallocate necessary data in a LBCAS chunk. 2. (for dynamic mismatch) Keeps large coverage size of readahead by sequential access and high hit rate of page cache. • Increasing locality of reference. • “ext-optimizer” repacks the data blocks of ext2/3 file system to be in line. – The repacking is based on the block access profile. – As the results, ext-optimizer increases the occupancy and constant high cache hit rate by sequential access. 9
  • 10. Ext-optimizer: Access profile and reallocation App ext-optimizer App User Access Profile Kernel (via /proc/ ) VFS VFS File System Driver (ext2/3) File System Driver (ext2/3) Profiler Page Cache (Memory) Page Cache (Memory) Readahead is small and many Readahead (worm-eaten) is sequential Block Driver Block Driver access access (Loopback) (Loopback) Device Reallocate 10 scattered gathered
  • 11. Block Relocation: Ext-optimizer [LinuxKongress06] • Change data blocks to be arranged in line. Structure of meta data is not changed. • The arrangement is based on the access profile. • Feature: – Normal driver is used. – The fragmentation is occurred from the view of file – The relocation increases page-cache hit. readahead extend the coverage size. Mode Mode Owner info Owner info Size Size high Timestamps Timestamps occupancy Direct Blocks Direct Blocks Indirect Blocks Indirect Blocks Double Indirect Double Indirect Triple Indirect Triple Indirect 11
  • 12. Performance Analysis • Confirm the effect of ext-optimizer on LBCAS for Guest OS booting. – Ubuntu 9.04 (2.6.28) installed on ext3 (8GB) with KVM-60. • The ext3 was optimized by ext-optimizer for boot profile. • The disk image is translated to LBCAS (64KB - 256KB). • Compare with – Normal – u-readahead: user level readahead (system call) for booting – ext-optimizer 12
  • 13. Disk Image Analyzed by DAVL (Disk Allocation Viewer for Linux) Fragmentation 0.21% Fragmentation 1.11% Data used System booting are block made in line Non Non- contiguous block contiguous block 13 normal ext2/3opt
  • 14. Disk Access Trace at boot time • Ext-optimizer relocate data blocks, which are required at boot time, at the top of virtual disk. Red: normal Blue: ext2/3opt s) Time (s 0 2.0 4.0 6.0 8.0 14 Address (GB)
  • 15. Histogram of Access for readahead coverage • Ext-optimizer reduced small “readahead”. Frequency 0 32 64 128 15 Coverage size of readahead (KB)
  • 16. Amount of data on each processing level normal u-readahead ext2/3opt Amount of files (number, average) 203MB (2,248 Av: 92KB) Amount of required blocks 127MB Amount of disk access which 208MB 231MB 140MB includes coverage of readahead 6,379 5, 827 2,129 (count, average coverage size) 33KB 41KB 67KB Amount of required chunk MB, Occupancy % (127MB/ Amount of Chunk MB) LBCAS size normal u-readahead ext2/3opt 64KB 247, 51.5% 272, 46.9% 144, 88.7% 128KB 290, 43.9% 315, 40.3% 149, 85.3% 256KB 358, 35.5% 386, 35.0% 159, 80.0% 512KB 474, 26.9% 508, 25.1% 176, 71.8% 16
  • 17. Discussion • In this talk, I eliminate the effect of deduplication, but it is not high on a single disk image, even if the chuck is small. – Deduplicaion is effective on merging updated images. – Performance is more important. • Memory on a virtual machine also has deduplication mechanism (Differential Engine[OSDI’09], Satori[USENIX’09], etc). Guest OS should adjust the behavior. – SLINKY[USENIX05] and our paper [HotSec10] utilizes memory deduplication for security. 17
  • 18. Conclusion • Virtual devices have their original restrictions which are not hidden from the view of performance. • The guest OS should recognize the feature of virtual device and adjust the behavior for virtual device with traditional ti i ti t h i t diti l optimization techniques. • We showed an example for CAS(Content Addressable Storage) with disk prefeatching and block reallocation. 18