TY - GEN
T1 - Exploiting idle CPU cores to improve file access performance
AU - Ueda, Takanori
AU - Hirate, Yu
AU - Yamana, Hayato
PY - 2009
Y1 - 2009
N2 - Many-core CPUs require many parallel computation tasks to reach their full potential because CPU cores become idle if they do not have enough computation tasks. How best to utilize a number of cores in many-core CPUs should be examined. In this paper, we propose exploitation of idle cores for improving file access performance. Idle cores are used to extract file access patterns from access logs and the extracted patterns are used to improve file cache efficiency by reordering the LRU (Least Recently Used) list based on the extracted patterns. Data mining techniques are used to extract access patterns to reduce computation overhead. Our method was evaluated by simulation and also implemented on Linux kernel 2.6.26 as a prototype system. In the simulation experiment, our method improved the cache-hit ratio up to 1.09% on DBT-2 (TPC-C) trace logs. Our prototype implementation on Linux improves DBT-2 performance up to 5.24% on a real machine.
AB - Many-core CPUs require many parallel computation tasks to reach their full potential because CPU cores become idle if they do not have enough computation tasks. How best to utilize a number of cores in many-core CPUs should be examined. In this paper, we propose exploitation of idle cores for improving file access performance. Idle cores are used to extract file access patterns from access logs and the extracted patterns are used to improve file cache efficiency by reordering the LRU (Least Recently Used) list based on the extracted patterns. Data mining techniques are used to extract access patterns to reduce computation overhead. Our method was evaluated by simulation and also implemented on Linux kernel 2.6.26 as a prototype system. In the simulation experiment, our method improved the cache-hit ratio up to 1.09% on DBT-2 (TPC-C) trace logs. Our prototype implementation on Linux improves DBT-2 performance up to 5.24% on a real machine.
KW - Access pattern
KW - Access pattern mining
KW - Buffer caching
KW - Many core
KW - Replacement algorithm
UR - http://www.scopus.com/inward/record.url?scp=70349128146&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70349128146&partnerID=8YFLogxK
U2 - 10.1145/1516241.1516334
DO - 10.1145/1516241.1516334
M3 - Conference contribution
AN - SCOPUS:70349128146
SN - 9781605584058
T3 - Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
SP - 529
EP - 535
BT - Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
T2 - 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC'09
Y2 - 15 January 2009 through 16 January 2009
ER -