GAMMON: A Load Balancing Strategy for Local Computer Systems with Multiaccess Networks
IEEE Transactions on Computers
File concepts for parallel I/O
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
Dynamic file allocation in disk arrays
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
The design and implementation of a log-structured file system
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Design and Evaluation of primitives for Parallel I/O
Proceedings of the 1993 ACM/IEEE conference on Supercomputing
Parallel access to files in the Vesta file system
Proceedings of the 1993 ACM/IEEE conference on Supercomputing
Maximizing performance in a striped disk array
ISCA '90 Proceedings of the 17th annual international symposium on Computer Architecture
PDIS '91 Proceedings of the first international conference on Parallel and distributed information systems
An implementation of a log-structured file system for UNIX
USENIX'93 Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings
Hi-index | 0.00 |
A massively parallel computer handles massive amount of data with simultaneous access requests from multiple processors, and therefore the massively parallel computer must have a large capacity secondary storage system of very high concurrency. Such a storage system should consists many disks that are connected in parallel. With such large-scale parallel disk systems, access load balancing is extremely important to enhance the effective operation of all disks. In this paper, we propose a parallel file access method named DECODE (Dynamic Express Changing Of Data Entry) which perform dynamic load balancing over all disks according to the load status of each disk. The DECODE can achieve load balancing by changing the disk for writing data to the low load disk. The efficiency of this method was verified by preliminary performance evaluation using software simulation under various access conditions by changing the access pattern and the access size. And the effects of some parameters used in this method was evaluated also.