An application-aware data storage model

Todd A. Anderson, James Griffioen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

We describe a new application-controlled file persistence model in which applications select the desired stability from a range of persistence guarantees. This new abstraction extends conventional abstractions by allowing applications to specify a file's volatility and methods for automatic reconstruction in case of loss. The model allows applications, particularly ones with weak persistence requirements, to leverage the memory space of other machines to improve their performance. An automated (filename-matching) interface permits legacy applications to take advantage of the variable persistence guarantees without being modified. Our prototype implementation shows significant speed-ups, in some cases more than an order of magnitude over conventional network file systems such as NFS version 3.

Original languageEnglish
Title of host publicationProceedings of the 1999 USENIX Annual Technical Conference
ISBN (Electronic)1880446332, 9781880446331
StatePublished - 1999
Event1999 USENIX Annual Technical Conference - Monterey, United States
Duration: Jun 6 1999Jun 11 1999

Publication series

NameProceedings of the 1999 USENIX Annual Technical Conference

Conference

Conference1999 USENIX Annual Technical Conference
Country/TerritoryUnited States
CityMonterey
Period6/6/996/11/99

Bibliographical note

Publisher Copyright:
© 1999 by The USENIX Association All Rights Reserved.

Funding

This work supported in part by NSF grant numbers CCR-9309176, CDA-9320179, CDA-9502645 and DARPA grant number DAAH04-96-1-0327.

FundersFunder number
National Science Foundation (NSF)CDA-9320179, CDA-9502645, CCR-9309176
Defense Advanced Research Projects AgencyDAAH04-96-1-0327

    ASJC Scopus subject areas

    • General Computer Science

    Fingerprint

    Dive into the research topics of 'An application-aware data storage model'. Together they form a unique fingerprint.

    Cite this